 Research
 Open access
 Published:
Blind sequential detection for sparse ISI channels
EURASIP Journal on Advances in Signal Processing volumeÂ 2018, ArticleÂ number:Â 6 (2018)
Abstract
We present a computationally efficient blind sequential detection method for data transmitted over a sparse intersymbol interference channel. Unlike blind sequential detection methods designed for general channels, the proposed method exploits the channel sparsity by using estimated channel sparsity to assist in the detection of the transmitted sequence. A Gaussian mixture model is used to describe sparse channels, and two treesearch strategies are applied to estimate the channel sparsity and the transmitted sequence, respectively. To demonstrate the performance improvement achieved by the proposed blind detector, we compare it to conventional joint channel and sequence detection methods that use sparse channel estimation techniques. Simulation results show that the proposed detector not only reduces computational complexity compared to existing methods but also provides superior performance, particularly when the signal to noise ratio is low.
1 Introduction
Intersymbol interference (ISI) poses a great challenge for reliable highspeed wireless communications, significantly degrading system performance, and hence channel equalization is typically employed at the receiver to mitigate its harmful effects. Due to the wide variety of physical conditions that induce frequency selectivity, wireless channels are often unknown and timevarying, thus posing an additional challenge to the receiver. One approach to combating timevarying distortion is via adaptive equalizers [1] that first use training symbols to estimate the channel and then perform conventional detection using the channel estimate. Transmitting a training sequence consumes bandwidth that could otherwise be used for transmission of information, however, and training sequences must be transmitted at regular intervals when the channel is time varying.
In order to improve spectral efficiency, considerable research effort has been devoted to the application of blind equalization techniques in wireless communication systems in recent decades [2â€“8]. A popular approach to blind equalization is to jointly estimate the unknown channel and transmitted data based on the maximum likelihood (ML) criterion [9]. The joint estimates are obtained using the leastsquares (LS) algorithm for channel estimation and the Viterbi algorithm (VA) for data detection. The LS algorithm is applied iteratively using the data along each surviving path of the VA trellis, generating channel estimates that are used in the search extending from each path. One major drawback of joint estimation methods is their potentially prohibitive complexity, particularly for long channels and/or large symbol alphabets. In order to simplify the blind equalization process, researchers have proposed blind sequential detection approaches that avoid explicit estimation of the channel [10, 11]. In [10], for example, a framework is developed for applying a blind Bayesian maximum likelihood (ML) sequence detector for ISI channels. The channel taps are modeled as stochastic quantities drawn from a known probability distribution, and the treebased stack algorithm is used to estimate the transmitted sequence based on a Bayesian probability metric that incorporates implicit estimation of the channel. While the Bayesian ML method achieves promising performance results for moderate channel lengths, computational complexity continues to be a drawback for longer channels.
Most existing blind equalization approaches have been designed to recover data transmitted over general (nonsparse) ISI channels. In highspeed wireless applications such as underwater acoustic (UWA) communications, ultrawide band (UWB) communications, and highdefinition television (HDTV) systems, the discretetime channel impulse response has a very large channel memory, but only a small number of significant channel coefficients contribute to the distortion of the transmitted signal. When blind equalization approaches that have been designed for general channels are applied to sparse channels, all channel coefficients are treated as significant when estimating the transmitted signal, yielding highcomputational burden for the receiver and decreasing the accuracy of the resulting data detection. If we take channel sparsity into consideration when designing the blind equalizer, both computational efficiency and performance can be improved.
In order to blindly estimate a sequence transmitted over a sparse channel, popular sparse channel estimation methods such as matching pursuit (MP), orthogonal matching pursuit (OMP), and basis pursuit (BP) [12â€“14] can be combined with the VA or stack algorithm using a joint channel estimation and data detection framework. As we show in Section 5, however, these conventional methods result in high complexity, particularly when signal to noise ratio (SNR) is low. In this paper, we propose a computationally efficient blind sequential detection method for recovering data transmitted over sparse ISI channels. Two treesearchbased algorithms are used in the blind detection process: the breadthfirst Malgorithm (MA) is used to estimate channel sparsity, and the bestfirst stack algorithm (SA) exploits the channel sparsity estimate to efficiently detect the transmitted sequence. The two algorithms use different strategies to search a tree structure. The MA extends all possible paths and retains the M paths with the highest likelihood at a given depth, while the SA extends only the path with the highest likelihood but retains unextended paths. The proposed method moves beyond existing blind sequential detection approaches by incorporating a statistical model of the sparse channel characteristics to reduce the number of path explorations required in the tree search. By combining the two treesearch algorithms in an iterative framework, we avoid the need for training data. Additionally, simulations show that computational complexity savings can be achieved when treesearch algorithms are used in place of conventional MP, OMP, and BP for sparse channel estimation.
The remainder of the paper is organized as follows. In Section 2, the overall system model is described, and the sparse channel model is presented. Section 3 provides an overview of the stackbased sequential detection method for unknown sparse ISI channels. The proposed blind sequential detection algorithm, which combines stackbased sequential detection with channel sparsity estimation using the MA, is described in Section 4. In Section 5, the proposed approach is compared to conventional joint channel estimation and data detection methods that use MP, OMP, and BP with respect to both performance and computational complexity. Section 6 concludes the paper.
2 System model
We consider a discretetime, baseband equivalent communication system, a block diagram of which is shown in Fig. 1. The information bits are passed through an error control encoder with rate \(R=\frac {1}{r}\). No training sequence is transmitted. For a block of information bits with length N, denoted by \({\mathbf {b}}_{1}^{N}\), a lengthrN sequence of coded bits, \({\mathbf {x}}_{1}^{rN}\), is generated. The encoded sequence is transmitted over a length L_{ h } sparse ISI channel \(\phantom {\dot {i}\!}{\mathbf {h}}=\,[\!h_{0}, \ldots, h_{L_{h}1}]\) with additive white Gaussian noise (AWGN) w_{ k } of variance Ïƒ^{2}. The received sequence \(\phantom {\dot {i}\!}{\mathbf {y}}_{1}^{rN} =\, [\!y_{1}, \ldots, y_{rN}]^{T}\) is the input to a detector that blindly estimates the transmitted information bits \({\mathbf {b}}_{1}^{N}\), where the received signal at time instant k, y_{ k }, k=1,2,â€¦,rN, is defined as
The lengthrN received sequence can be expressed in matrix form as \(y_{1}^{rN} = {\mathbf {X}}^{(rN)} {\mathbf {h}} + {\mathbf {w}}\), where the signal matrix X^{(rN)} is defined as
We assume that the channel has only L_{ a } active (nonzero) taps, \(\bar {{\mathbf {h}}}_{a}=\,[\!h_{0}, h_{1}, \ldots, h_{L_{a}1}]^{T}\), where L_{ a }â‰ªL_{ h }. In order to better describe the channel sparsity, we use d_{ i }âˆˆ{0,1} as an indicator to denote whether the ith tap, h_{ i }, is active or inactive:
Hence, \({\mathbf {d}} = \{d_{0},\ldots, d_{L_{h}1}\}\phantom {\dot {i}\!}\) is a binary vector that denotes the sparsity of the channel. We assume that d_{ i } is equally likely to be 0 and 1. The number of active channel taps, L_{ a }, therefore, can be expressed as L_{ a }=d_{0}, where the l_{0}norm of the vector d counts the number of nonzero elements in d.
In practical communication systems, channels cannot be exactly sparse; the inactive taps have very small (but nonzero) values. To reflect this, we use a Gaussian mixture to describe the channel tap values. Active taps are drawn from a zeromean Gaussian distribution with relatively large variance, while inactive taps are drawn from a zeromean Gaussian distribution with much smaller variance [15, 16]:
where \(\sigma _{0}^{2}\) denotes the variance of h_{ i } in the inactive state, and \(\sigma _{1}^{2} \gg \sigma _{0}^{2}\) denotes the variance of h_{ i } in the active state.
We further assume that the L_{ h } channel taps are independent. This assumption is well justified, especially for wireless fading channels that are rich in scattering [17â€“19]. The distribution of the channel h is then given by
where
Under this model, the channel is treated as a stochastic random vector at the receiver. The receiver has no knowledge of the channel taps h_{ i } nor of the sparsity vector d. The diagonal matrix Î“_{ d } that describes the channel sparsity in (4) varies with realizations of the vector d. The diagonal element Î±_{ i }=Î³_{1} indicates that the channel tap h_{ i } is active, and Î±_{ i }=Î³_{0} indicates that h_{ i } is inactive. We assume that the receiver has knowledge of the variance of active and inactive taps \(\sigma ^{2}_{0}\) and \(\sigma ^{2}_{1}\). We also assume that the receiver has knowledge of the code generator polynomial C, the variance of the AWGN Ïƒ^{2}, and the channel length L_{ h }. For simplicity, only binary phase shift keying (BPSK) encoded data is considered. Extension to transmission of data from larger constellations is straightforward.
3 Stack algorithm for unknown sparse ISI channels
The stack algorithm (SA), which was originally proposed for decoding convolutional and tree codes [20], is a bestfirst treesearch technique that can be used to approximate the ML solution to sequential detection problems [21]. When the SA is applied to sequential detection, the tree represents the space spanned by a sequence of transmitted bits. Each path in the tree represents a possible realization of the transmitted sequence. A metric is computed for each path; the path metric represents the likelihood that the corresponding bit sequence was transmitted, conditioned on the observations. At each time step, the SA extends the path with the highest likelihood (metric) and stores a set of possible paths and their associated metrics in a stack (or list) in order of decreasing metric value. The SA terminates when the top path in the stack reaches a leaf of the tree, or equivalently when the top path represents a full block of transmitted bits.
To navigate a tree using the SA, paths are progressively extended from depth 1 to depth N. Hence, the algorithm must compute the path metric for a partiallength sequence given a full block of observations; this partialpath metric is used to decide which path in the stack will be extended in the next stage. The metric derivation for unknown general ISI channels is introduced in [10]. For sparse ISI channels, we derive a new form for the path metric using the model defined in [10]. The probability that a lengthn sequence \({\mathbf {b}}_{1}^{n}=\,[\!b_{1}, b_{2}, \ldots, b_{n}]^{T}\) was transmitted given the complete received sequence \({\mathbf {y}}_{1}^{rN}\) and the code thus far, C^{(n)}, is expressed as
We can eliminate the term \(P\left ({\mathbf {y}}_{1}^{rN}C^{(n)}\right)\) since it is equal for all paths, and the path metric can be written as
We take the sparsity of the channel into consideration and find a closedform expression for the integral in (7) using the channel model given in (4). Applying the techniques used to derive the path metric for general unknown ISI channels in [10], we assume that \({\mathbf {y}}_{1}^{rN}\) is independent of \({\mathbf {y}}_{rn+1}^{rN}\) and that \({\mathbf {y}}_{rn+1}^{rN}\) is independent of \({\mathbf {b}}_{1}^{N}\) to obtain the following expression for the path metric:
where
and
Substituting (4) into (8) and integrating the quadratic exponential form yields:
where
Note that the term \(\left ({\mathbf {r}}_{yx}^{(rn)}\right)^{T}\left (R_{xx}^{(rn)} +\Gamma _{{\mathbf {d}}} \right)^{1} {\mathbf {r}}_{yx}^{(rn)}\) takes a form similar to the leastsquares estimate of the channel, demonstrating the implicit learning of the channel vector that is integrated in the metric of the treesearchbased detection approach.
Using the sparse channel model described in Section 2, we are able to incorporate prior information about channel sparsity into the path metric of the SA. However, the computation of \(m\!\left ({\mathbf {b}}_{1}^{n}\right) \) in (13) considers all possible realizations of the vector d. Without simplification, we would need to evaluate and sum \(\phantom {\dot {i}\!}2^{L_{h}}\) exponential terms, which is computationally impractical for channels with long delay spread. For a given sparse channel, the sparsity vector d is just one of the \(\phantom {\dot {i}\!}2^{L_{h}}\) possible binary vectors. Therefore, if the channel sparsity can be determined, the path metric can be computed for a unique vector d. In order to achieve this, we propose a computationally efficient sparsity estimation technique, described in the following section.
4 Computationally efficient blind sequential detection
4.1 Channel sparsity detection using the Malgorithm
The proposed method combines the Malgorithm (MA) and the stack algorithm (SA) to perform blind sequential detection; we refer to the overall algorithm as the MASA for simplicity. The MA is used to find the active channel tap indices and estimate the unique binary vector d corresponding to the sparse channel. The path metric of the SA is then computed using the channel sparsity estimated by the MA.
Both the MA [22] and the SA are built upon a tree structure representation of the space spanned by a sequence of transmitted bits. In contrast to the SA, however, the MA employs a breadthfirst strategy for searching the tree. At a given depth of the tree, it extends all possible paths and retains the M paths with the highest likelihood (or largest path metrics). In the tree structure of the SA, each path represents a possible realization of the transmitted sequence; the MA can be used to estimate the channel sparsity along each path. The SA path metrics can be computed using the estimated channel sparsity in combination with the observations and the symbol sequence associated with each path. The metrics are used to guide the tree search to find the most likely transmitted sequence. Such a mechanism establishes a foundation for combining the MA and the SA. A flow chart of the MASA algorithm is shown in Fig. 2.
To better illustrate the proposed algorithm, we provide a stepbystep procedure under the assumption that M=1.

(Initialization) Consider a partial path through the tree that represents a lengthn sequence \({\mathbf {b}}_{1}^{N}\). The MASA algorithm is initialized with the assumption that all channel taps are inactive, i.e., d^{(0)}= [ 0,0,â€¦,0]. The corresponding path metric can be computed as
$$ {{}\begin{aligned} \begin{array}{lll} m\!\left({\mathbf{b}}_{1}^{n}\right)_{{\mathbf{d}}^{(0)}}&\,=\,&B(y_{i}) \frac{\leftR_{xx}^{(rn)}+\Gamma_{{\mathbf{d}}^{(0)}}\right^{\frac{1}{2}}}{\left(\sqrt{2\pi\sigma_{0}^{2}}\right)^{L_{h}}} \\ &\;&\!\times\!\ \text{exp}\!\left(\! \frac{\left(\!{\mathbf{r}}_{yx}^{(rn)}\!\right)^{T} \left(\! R_{xx}^{(rn)} +\Gamma_{{\mathbf{d}}^{(0)}}\! \right)^{1} {\mathbf{r}}_{yx}^{(rn)}}{2 \sigma^{2}}\! \right) \\ &=&\! B(y_{i}) \left(\frac{1}{\sqrt{2\pi\sigma_{0}^{2}}}\right)^{L_{h}} \left{\mathbf{R}}\left({\mathbf{d}}^{(0)}\right)\right^{\frac{1}{2}} \\ &\;&\!\times\ \text{exp}\left(\frac{\left({\mathbf{r}}_{yx}^{(rn)}\right)^{T} {\mathbf{R}}^{1}\left({\mathbf{d}}^{(0)}\right) {\mathbf{r}}_{yx}^{(rn)} }{2 \sigma^{2}} \right), \end{array} \end{aligned}} $$(15)where
$$ {\mathbf{R}}\left({\mathbf{d}}^{(0)}\right) = R_{xx}^{(rn)} +\Gamma_{{\mathbf{d}}^{(0)}}, $$(16)and
$$ \Gamma_{{\mathbf{d}}^{(0)}} = \text{Diag}\{\gamma_{0}\}. $$(17)The vector d^{(0)} is assigned to \({\mathbf {d}}^{(0)}_{\ast }\), where the vector \({\mathbf {d}}^{(p)}_{\ast }\) is used to store the best (highest metric) vector obtained at the pth iteration. A set \(\mathcal {S}\) is defined to store the associated indices of the active channel taps at each iteration. Initialize iteration counter to p=0 and index vector to \(\mathcal {S}=\{\}\).

Change a single 0 element of the binary vector \({\mathbf {d}}^{(p)}_{\ast }\) to 1 to generate a set of L_{ h }âˆ’p possible binary vectors, \({\mathbf {d}}^{(p+1)}_{j}\), where \(j \not \in \mathcal {S} \in \{1, \ldots, L_{h}\}\) denotes that \({\mathbf {d}}^{(p+1)}_{j}\) is identical to \({\mathbf {d}}^{(p)}_{\ast }\) with the exception of the jth element.

Compute the path metric \(m\left ({\mathbf {b}}_{1}^{n}\right)_{{\mathbf {d}}^{(p+1)}_{j}}\) for each of the possible weight (p+1) vectors, and assign the vector that corresponds to the largest metric to the vector \({\mathbf {d}}^{(p+1)}_{\ast }\), i.e., \({\mathbf {d}}^{(p+1)}_{\ast }={\mathbf {d}}^{(p+1)}_{j^{\ast }}\), where
$$ j^{\ast} = \underset{j}{\text{argmax}} \; m\left({\mathbf{b}}_{1}^{n}\right)_{{\mathbf{d}}^{(p+1)}_{j}}, \; j \not\in {\mathcal{S}} \in \{1, \ldots, L_{h}\}. $$(18) 
Update the index vector \(\mathcal {S}\) by including j^{âˆ—}, and increment p by 1:
$$ {\mathcal{S}} = {\mathcal{S}} \cup j^{\ast}, \; \; \; \; \; \; p=p+1. $$(19) 
If all active channel tap indices are located or a stopping criterion (described in Section 4.3) is satisfied, terminate the algorithm; otherwise, return to step 1.
The final vector \({\mathbf {d}}^{(\hat {L}_{a})}_{\ast }\) provides the estimate of channel sparsity, where \(\hat {L}_{a}\) denotes the estimate of the active channel length. \(\hat {L}_{a}=L_{a}\) if L_{ a } is known at the receiver. The corresponding metric \(m\!\left ({\mathbf {b}}_{1}^{n}\right)_{{\mathbf {d}}^{(\hat {L}_{a})}_{\ast }}\) will be used by the SA to perform the tree search. For a given L_{ a }, the total number of the metric computations is given by \(1+(L_{a}+1)\left (L_{h}\frac {L_{a}}{2}\right)\). We will show in the next section that the number of metric computations can be further reduced. The proposed MAbased sparsity estimation is summarized in a flow chart in Fig. 3.
An example of the sparsity estimation procedure is shown in Fig. 4. The example considers a length4 channel with two active taps, h= [ h_{0},0,h_{1},0], and the figure shows the kth branch of the SA tree. The red boxes show the best sparsity vectors obtained at each iteration. We initialize the vector d^{(0)}= [ 0,0,0,0] and compute the path metric \(m\!\left ({\mathbf {b}}_{1}^{n}\right)_{{\mathbf {d}}^{(0)}}\) using (15). At step 1, there are four possibilities for the sparsity vector: \({\mathbf {d}}_{1}^{(1)},\ldots,{\mathbf {d}}_{4}^{(1)}\), and the corresponding path metric can be obtained similar to using (15) for each vector. We assume that \(m\!\left ({\mathbf {b}}_{1}^{n}\right)_{{\mathbf {d}}_{1}^{(1)}}\) is the largest path metric at this step, and thus \({\mathbf {d}}^{(1)}_{\ast }={\mathbf {d}}_{1}^{(1)}\), indicating that the first channel tap is active. From \({\mathbf {d}}^{(1)}_{\ast }\), three possibilities for the sparsity vector, \({\mathbf {d}}_{2}^{(2)},{\mathbf {d}}_{3}^{(2)}\), and \({\mathbf {d}}_{4}^{(2)}\), can be generated. The corresponding path metric for each vector is computed, and \(m\!\left ({\mathbf {b}}_{1}^{n}\right)_{{\mathbf {d}}_{3}^{(2)}}\) is assumed to be largest. Therefore, \({\mathbf {d}}^{(2)}_{\ast }={\mathbf {d}}_{3}^{(2)}\), indicating that the third channel tap is also active. Now that the two active taps have been located (and assuming the number of active taps is known), the sparsity estimation algorithm can be terminated. The quantity \(m\left ({\mathbf {b}}_{1}^{n}\right)_{{\mathbf {d}}_{3}^{(2)}}\) serves as the path metric for the SA at this branch.
4.2 Efficient metric computation
As described in the proposed MAbased sparsity estimation, a new path metric is computed at each iteration, involving both inversion of a matrix and computing its determinant. The total \(1+(L_{a}+1)\left (L_{h}\frac {L_{a}}{2}\right)\) metric computations are still a heavy burden for the detector. By exploiting the properties of matrices, we can further reduce the computational complexity and accelerate the metric update.
In order to develop a general expression for efficient metric computation, consider the binary sparsity vector obtained at the (pâˆ’1)th iteration: \({\mathbf {d}}^{(p1)}_{\ast }\). The matrix \({\mathbf {R}}\left ({\mathbf {d}}^{(p1)}_{\ast }\right)\) in the path metric is computed as
At the pth iteration, a set of L_{ h }âˆ’p vectors \({\mathbf {d}}^{(p)}_{i}\) is generated by turning just one 0 element of the vector \({\mathbf {d}}^{(p1)}_{\ast }\) to 1. The matrix \({\mathbf {R}}\left ({\mathbf {d}}^{(p)}_{i}\right)\) is given by
It is clear that \({\mathbf {R}}\left ({\mathbf {d}}^{(p)}_{i}\right)\) differs from \({\mathbf {R}}\left ({\mathbf {d}}^{(p1)}_{\ast }\right)\) in only one position: (i,i). Thus, by using the properties of matrix inversion, the inverse and determinant of \({\mathbf {R}}\left ({\mathbf {d}}^{(p)}_{i}\right)\) can be easily obtained from the inverse and determinant of \({\mathbf {R}}\left ({\mathbf {d}}^{(p1)}_{\ast }\right)\). We assume that we already have the inverse and determinant of \({\mathbf {R}}\left ({\mathbf {d}}^{(p1)}_{\ast }\right)\), denoted by \(V={\mathbf {R}}^{1}\left ({\mathbf {d}}^{(p1)}_{\ast }\right)\) and \(U=\left {\mathbf {R}}\left ({\mathbf {d}}^{(p1)}_{\ast }\right)\right \), respectively. \({\mathbf {R}}\left ({\mathbf {d}}^{(p)}_{i}\right)\) can then be expressed as
where Î²=Î³_{1}âˆ’Î³_{0} and u= [ 0,â€¦,1,â€¦,0]^{T}. The single nonzero element in the vector u is at index i. Applying the ShermanMorrison formula [23], the inverse of \({\mathbf {R}}\left ({\mathbf {d}}^{(p)}_{i}\right)\) can be expressed as
where V(:,i) is the ith column of the matrix V.
The determinant of \({\mathbf {R}}\left ({\mathbf {d}}^{(p)}_{i}\right)\) can be computed as
Combining Eqs. (23) and (24), the path metric associated with the sparsity vector \({\mathbf {d}}^{(p)}_{i}\) can be computed as
where Î¸=1+Î²V(i,i).
From (25), we can see that the path metric associated with the vector \({\mathbf {d}}^{(p)}_{i}\) can be computed via a simple update from the metric for \({\mathbf {d}}^{(p1)}_{\ast }\). The computation for the metric update is dominated by the vector multiplications, \(\left ({\mathbf {r}}_{yx}^{(rn)}\right)^{T} V(:, i)V(i, :) {\mathbf {r}}_{yx}^{(rn)}\). The inverse and determinant computations are no longer needed at every iteration; they are performed only once to obtain R^{âˆ’1}(d^{(0)}) and R(d^{(0)}) when the initial metric \(m\left ({\mathbf {b}}_{1}^{n}\right)_{{\mathbf {d}}^{(0)}}\) is computed.
4.3 Stopping criterion
The MAbased sparsity detection described in Section 4.1 relies on searching for active channel indices and terminates when all the active indices have been identified. In practical communication systems, the number of active taps, L_{ a }, is usually an unknown parameter. A stopping criterion must be implemented to terminate the iterative sparsity detection process without knowledge of L_{ a }. To address this, we compare the path metrics we obtain at the L_{ a }th and (L_{ a }+1)th iterations and use the difference between them to identify a stopping criterion.
At the L_{ a }th iteration, the best estimated sparse vector with L_{ a } nonzero elements is \({\mathbf {d}}^{(L_{a})}_{\ast }\), and the corresponding path metric can be written as
In the metric, the term \(\left (R_{xx}^{(rn)} + \Gamma _{{\mathbf {d}}^{(L_{a})}_{\ast }} \right)^{1} {\mathbf {r}}_{yx}^{(rn)}\) in the exponential function takes a form that is very similar to the LS estimation of the channel, \(\hat {{\mathbf {h}}}\). Thus, \(R_{yy}^{(rn)} [0]  \left ({\mathbf {r}}_{yx}^{(rn)}\right)^{T} \left (R_{xx}^{(rn)} +\Gamma _{{\mathbf {d}}^{(L_{a})}_{\ast }} \right)^{1} {\mathbf {r}}_{yx}^{(rn)}\) measures the error e between the received signal \({\mathbf {y}}_{1}^{rN}\) and the noisefree output predicted by the channel estimate \(\hat {{\mathbf {h}}}\) and assumed bit sequence \({\mathbf {x}}_{1}^{rN}\). At the (L_{ a }+1)th iteration, the metric \(m\left ({\mathbf {b}}_{1}^{n}\right)_{{\mathbf {d}}^{(L_{a}+1)}_{\ast }}\) associated with the best estimated sparse vector \({\mathbf {d}}^{(L_{a}+1)}_{\ast }\) is updated from the metric \(m\left ({\mathbf {b}}_{1}^{n}\right)_{{\mathbf {d}}^{(L_{a})}_{\ast }}\) according to
where \(\Delta _{L_{a}+1} = \left ({\mathbf {r}}_{yx}^{(rn)}\right)^{T} V(:, j^{\ast })V(j^{\ast }, :) {\mathbf {r}}_{yx}^{(rn)}\) denotes the contribution of the (L_{ a }+1)th estimated active tap to the error e, and j^{âˆ—} denotes the index of the L_{ a }th estimated active channel tap.
Assuming that the L_{ a } active channel taps are correctly located at the L_{ a }th iteration, no more active taps are contributing to the computation of the metric \(m\!\left ({\mathbf {b}}_{1}^{n}\right)_{{\mathbf {d}}^{(L_{a}+1)}_{\ast }}\). Therefore, the corresponding \(\Delta _{L_{a}+1}\) will depend only on additive noise. Given this, we can establish a stopping criterion as follows: For a sufficiently small Îµ, at the pth iteration, Î”_{ p }â‰¤Îµ, the algorithm is terminated. The number of active channel taps can be estimated as \(\hat {L}_{a}=p1\). The estimated sparse vector is \({\mathbf {d}}^{(p1)}_{\ast }\).
Assuming the algorithm estimates L_{ a } correctly, one additional round of iterations for p=L_{ a }+1 is implemented (relative to the number of iterations implement when L_{ a } is known). This involves L_{ h }âˆ’L_{ a } metric updates, which is only a small increase in computational complexity. When the noise level is high, the algorithm is more likely to estimate L_{ a } incorrectly. However, since the channel sparsity is estimated using path metrics that take noise into consideration, we are still able to achieve better channel sparsity estimation than is achieved using conventional methods, as we show in Section 5.
5 Simulation results and discussion
5.1 Performance comparison
In this section, we compare the proposed method to several conventional blind sequential detection methods, all of which are based on joint sparse channel estimation and data detection. The method introduced in [24], for example, finds an ML solution for a joint singleinput multipleoutput channel and sequence estimation problem using a twostep procedure: (1) channel estimates are obtained for every possible data sequence, and (2) the ML data sequence and corresponding channel estimate are selected. A leastsquares (LS) approach is used to implement step 1, and the VA is used to implement step 2. The LS channel estimation algorithm performs a pseudoinverse of the channel matrix. When the channel is long but sparse, LS does not provide reliable channel estimation since each tap estimate will have a nonzero value [25]. Additionally, for such channels, the VA is prohibitively complex due to the longchannel memory. Therefore, we use sparse channel estimation techniques such as matching pursuit (MP), orthogonal matching pursuit (OMP), and basis pursuit (BP) to replace the LS approach in the first step. In the second step, we use the SA, which is considerably more efficient than the VA for channels with long delay spread and suffers only minimal performance degradation [26]. The combined methods we consider are denoted by MPSA, OMPSA, and BPSA. In addition to these three methods, we also consider a recently proposed joint sparse channel and sequence detection method using the expectationmaximization (EM) algorithm, SCEM [27].
MP and OMP, two greedy algorithms originally proposed for sparse recovery problems, sequentially estimate the sparse channel by using a training sequence [14, 28]. MP applies sequential forward selection to determine a sparse representation of the channel h by using a training sequence and its corresponding received signal. The main difference between OMP and MP is that OMP avoids the reselection problem that occurs in each iteration of MP, thereby accelerating convergence of the algorithm and enhancing the accuracy of sparse channel estimation, but requiring extra computational effort. BP, also referred to as a form of compressed sensing (CS), obtains the sparse channel estimate by solving an l_{1}âˆ’l_{2} optimization problem defined in [29]. Numerical results in [30] show that BP delivers a better channel estimate than MP and OMP but requires increased complexity. In order to use MP, OMP, and BP for blind detection, MPSA, OMPSA, and BPSA employ the twostep procedure, described in detail in Section 4, to compute the metric at each path of the tree. On each branch of the tree, MP, OMP, and BP are first used to estimate the sparse channel using the realization of the coded sequence associated with a path. Each path metric is then computed using the estimated channel. The path metric governs the search through the tree to find the most likely transmitted sequence. The tree search continues until a leaf of the tree is reached [31].
The SCEM algorithm uses a different twostep procedure than the three methods described above [27]. The expectation (E) step performs sequential detection using forwardbackward recursions (BCJR). ML sparse channel estimation is performed in the maximization (M) step using the estimated sequence of symbols. Iteration between these two steps increases the joint likelihood until convergence is reached.
Simulations have been conducted for a length L_{ h }=10 sparse channel with L_{ a }=3 active taps. Information bits are encoded using a rate \(R=\frac {1}{2}\) convolutional code with generator polynomials g_{0}= [ 1,1,1] and g_{1}= [ 1,1,0]. The initial state of the register is set to [ 0,0]. Ten thousand blocks of 100 data bits each are transmitted over the sparse channel. For each data block, the active channel taps are drawn from a Gaussian distribution with zero mean and variance \(\sigma _{1}^{2}=1\), and the inactive taps are drawn from a Gaussian distribution with zero mean and variance \(\sigma _{0}^{2} = 0.01\). The channel energy is normalized to 1. The locations of active and inactive channel taps are randomly generated from a discrete uniform distribution for each block. For the three methods, the stack size of the SA is set to 10^{5} to make erasures rare. We assume that both the channel response and the number of active channel taps L_{ a } are unknown to the receiver. M is set to 1 when we use MA to estimate the channel sparsity in MASA.
A performance comparison of the five methods described above is shown in Fig. 5. The proposed MASA technique outperforms the competing methods, most substantially when SNR is low. This performance gap can be attributed to the fact that MASAâ€™s approach of estimating the channel sparsity based on the path metric is more robust to noise than are the competing approaches. As expected, OMPSA yields better performance than MPSA due to the introduction of the orthogonalization process. MP/OMP do not take the channel noise into consideration and therefore are more likely to incorrectly estimate the sparse channel. Thus, MPSA and OMPSA are outperformed by the other three methods. The BPSA and SCEM methods have very similar performance due to the similar procedures they adopt to solve l_{1}âˆ’l_{2} optimization problems.
In order to further investigate the performance of the proposed method, we consider a scenario in which a short training sequence is transmitted. In this case, we compare the MASA with methods that combine greedy algorithms with the VA, which attains the ML solution in the presence of AWGN. We can use MP, OMP, and BP to estimate the sparse channel using the training sequence. When training is available, each channel tap value can be estimated (rather than estimating only channel sparsity). Thus, sequential detection methods such as the VA can be applied using the estimated channel. Here, we compare the performance of the proposed MASA to that of BPVA, MPSA, and OMPSA. (The BPVA approach is selected for performance comparison because the individual algorithms show strong performance. SCEM is not included in this simulation, since it uses iterative EM other than the combination of greedy algorithms and sequential detection methods using graph structure.) Simulations are constructed under the same conditions described above. A known length10 training sequence is appended to each length100 block of data. Performance results for the four methods are shown in Fig. 6. We observe that the proposed MASA method still achieves the best performance among the four methods due to its iterative update of the channel within the treesearch process. BPVA outperforms the MP/OMPSA; by solving l_{1}âˆ’l_{2} optimization problems, BP can provide a better channel estimate than the MP/OMP, and the VA is able to achieve the ML estimation of the transmitted sequence.
5.2 Efficiency comparison
To illustrate the computational efficiency of the MASA method, we compare its computational requirements to those of the MPSA approach. (We consider only MPSA for complexity comparison because it is more computationally efficient than the OMPSA, BPSA, and SCEM approaches.) Since both methods operate on possible sequences represented by paths through the tree, we adopt the complexity of computing the metric for a lengthn path as the comparison criterion. In order to compute the metric for a given path, the MPSA method detects the channel sparsity first and computes the metric using the estimated channel sparsity, while the MASA method computes the initial metric for d^{(0)}= [ 0,â€¦,0] and updates the metric with the sparsity detection. The metric computation for MPSA using the estimated channel sparsity and the initial metric computation for MASA have the same complexity. Therefore, to compare the complexity of MPSA and MASA, we need only compare their computational complexity in channel sparsity detection. This complexity depends on the estimate of the active channel length, \(\hat {L}_{a}\), which is affected by the channel itself and by the noise level.
For a path with length n, MPSA constructs an nÃ—L_{ h } signal matrix X^{(n)}. At the pth iteration, a lengthn residual vector b_{ p } is projected onto the direction of each column of X^{(n)}, a_{ i }, i=1,â€¦,L_{ h }. For each iteration, L_{ h } inner product computations are performed. Furthermore, L_{ h } norm computations (inner products) of a_{ i } must be performed to scale the projection as shown in [12]. Therefore, after the estimated active channel length \(\hat {L}^{\text {(MPSA)}}_{a}\) is obtained, \(\hat {L}^{\text {(MPSA)}}_{a}\) iterations must be performed to estimate the sparsity. Hence, MPSA must perform \(\hat {L}^{\text {(MPSA)}}_{a} L_{h} + L_{h} = \left (\hat {L}^{\text {(MPSA)}}_{a}+1\right)L_{h}\) inner product computations between two lengthn vectors.
For a lengthn path, at each iteration, the MASA computes the metric update \(\frac {\sigma _{0}}{\sigma _{1} \sqrt {\theta }} \text {exp}\left (\frac {\beta }{2 \theta \sigma ^{2}} \left ({\mathbf {r}}_{yx}^{(n)}\right)^{T}\right. \left. V(:, j)V(j, :) {\mathbf {r}}_{yx}^{(n)} \right)\). We do not consider the multiplications of the constants \(\frac {\sigma _{0}}{\sigma _{1} \sqrt {\theta }}\) and \(\frac {\beta }{2 \theta \sigma ^{2}}\), since they are just a onetime operation. Thus, the complexity for each metric update is the inner product of two lengthn vectors, V(j,:) and \({\mathbf {r}}_{yx}^{(n)}\). To obtain the final metric, the metric update is computed \(\left (\hat {L}^{\text {(MASA)}}_{a}+1\right)\left (L_{h}\frac {1}{2}\hat {L}^{\text {(MASA)}}_{a}\right)\) times, so MASA must perform \(\left (\hat {L}^{\text {(MASA)}}_{a}+1\right)\left (L_{h}\frac {1}{2}\hat {L}^{\text {(MASA)}}_{a}\right)\) inner product computations between two lengthn vectors. The complexity comparison between the MPSA and MASA methods is summarized in Table 1.
When L_{ a } is known at the receiver, both methods will terminate after the L_{ a }th loop, \(\hat {L}^{\text {(MPSA)}} = \hat {L}^{\text {(MASA)}} = L_{a}\). Comparing the complexity expressions we derived above, MASA performs \(\frac {L_{a}(L_{a}+1)}{2}\) fewer inner product computations than MPSA at each path of the tree. While \(\frac {L_{a}(L_{a}+1)}{2}\) may not be a large number, the computational savings occur along each path. In the application of the SA, a large number of paths will be extended, particularly when SNR is low, making the complexity reduction achieved by MASA significant.
When L_{ a } is unknown, we use numerical results to make complexity comparisons. We evaluate the complexity of the MPSA and MASA methods empirically by comparing the average number of paths extended and the total number of inner product computations for each data block. As in the earlier simulations, we consider a length L_{ h }=10 channel with L_{ a }=3 active taps. Results from 10^{3} simulations are averaged, and the complexity comparison for various SNR values is shown in Table 2.
The results show that MASA extends fewer paths than MPSA, particularly when SNR is low, due to the robustness of the MASA method to noise in channel sparsity detection. As we can see from Table 2, for an SNR of 6 dB, MASA performs about 3Ã—10^{5} fewer inner product computations than MPSA, resulting in a roughly 75% reduction in complexity.
6 Conclusions
We have developed and evaluated a treebased sequential detection method for detecting data transmitted over a sparse ISI channel. We have focused on scenarios in which no training sequence is used in the system and proposed a computationally efficient blind sequential detection method using the MA and SA, both treesearchbased algorithms. A Gaussian mixture model is used to describe the sparse ISI channel, and the MA is applied to blindly estimate the channel sparsity. The estimated channel sparsity is then used to compute the path metrics within the SA, which guides the search in a tree. The MA and SA are combined to achieve blind sequential detection.
For performance comparison, we combined conventional sparse channel estimation techniques such as MP, OMP, and BP with the SA to jointly estimate the sparse channel and transmitted sequence; we considered both blind and semiblind (when a short training sequence is available) cases. Simulation results show that the proposed MASA method is more likely to correctly estimate the channel sparsity along each extended path of the tree than are the comparison methods. Conventional methods are more likely to generate inaccurate channel estimates when SNR is low, which not only limits the performance of the detector but also increases the computational burden. Additionally, we have shown the computational efficiency of the MASA approach when the number active taps, L_{ a } is known or unknown. Numerical results for unknown L_{ a } show that proposed MASA method achieves both significant computational savings and performance improvement when compared to conventional methods.
Future work will consider alternate channel models and simplifications to accommodate longer channels. We will also investigate the design of a modified SAMA approach that exploits a multiple tree structure [32] to further improve the efficiency of blind sequential detection.
References
SUH Qureshi, Adaptive equalization. Proc. IEEE. 73(9), 1349â€“1387 (1985).
M Chen, J Tuqan, D Zhi, A quadratic programming approach to blind equalization and signal separation. IEEE Trans. Signal Process.57(6), 2232â€“2244 (2009).
R Liu, Y Inouye, Blind equalization of MIMOFIR channels driven by white but higher order colored source signals. IEEE Trans. Inf. Theory. 48(5), 1206â€“1214 (2002).
I Santamaria, C Pantaleon, L Vielva, J Ibanez, Blind equalization of constant modulus signals using support vector machines. IEEE Trans. Signal Process.52(6), 1773â€“1782 (2004).
V Zarzoso, P Comon, Blind and semiblind equalization based on the constant power criterion. IEEE Trans. Signal Process.53(11), 4363â€“4375 (2005).
L Tong, G Xu, T Kailath, Blind identification and equalization based on secondorder statistics: a time domain approach. IEEE Trans. Inf. Theory. 40(2), 340â€“349 (1994).
S Chen, W Yao, L Hanzo, Semiblind adaptive spatial equalization for MIMO systems with highorder QAM signalling. IEEE Trans. Wireless Commun.7(11), 4486â€“4491 (2008).
H Nguyen, BC Levy, The expectationmaximization Viterbi algorithm for blind adaptive channel equalization. IEEE Trans. Commun.53(10), 1671â€“1678 (2005).
N Seshadri, Joint data and channel estimation using blind trellis search techniques. IEEE Trans. Commun.42(234), 1000â€“1011 (1994).
JK Nelson, AC Singer, in The 40th IEEE Annual Conference on Information Sciences and Systems. Bayesian ML sequence detection for ISI channels (Princeton, 2006), pp. 693â€“698.
RJ Johnson, P Schniter, TJ Endres, JD Behm, DR Brown, RA Casas, Blind equalization using the constant modulus criterion: a review. Proc. IEEE. 86(10), 1927â€“1950 (1998).
TT Cai, L Wang, Orthogonal matching pursuit for sparse signal recovery with noise. IEEE Trans. Inf. Theory. 57(7), 4680â€“4688 (2011).
T Kang, RA Iltis, in IEEE International Conference on Acoustics, Speech and Signal Processing. Matching pursuits channel estimation for an underwater acoustic OFDM modem (Las Vegas, 2008), pp. 5296â€“5299.
Z Hussain, J ShaweTaylor, DR Hardoon, C Dhanjal, Design and generalization analysis of orthogonal matching pursuit algorithms. IEEE Trans. Inf. Theory. 57(8), 5326â€“5341 (2011).
D Middleton, NonGaussian noise models in signal processing for telecommunications: new methods an results for class A and class B noise models. IEEE Trans. Inf. Theory. 45(4), 1129â€“1149 (1999).
T Zhang, J Dan, G Gui, IMAC: Impulsivemitigation adaptive sparse channel estimation based on Gaussianmixture model. Comput Res Repository. abs/1503.00800: (2015). https://arxiv.org/abs/1503.00800.
GG Raleigh, JM Cioffi, Spatiotemporal coding for wireless communications. IEEE Global Telecommun. Conf.3:, 1809â€“18143 (1996).
IE Telatar, Capacity of multiantenna Gaussian channels. Eur. Trans. Telecommun.10:, 585â€“595 (1999).
GJ Foschini, MJ Gans, On limits of wireless communications in a fading environment when using multiple antennas. Wirel. Pers. Commun.6:, 311â€“335 (1998).
R Johannesson, K Zigangirov, Fundamentals of convolutional coding (IEEE Press, New York, 1999).
RE Blahut, Algebraic codes for data transmission (Cambridge University Press, New York, 2003).
JB Anderson, Limited search trellis decoding of convolutional codes. IEEE Trans. Inf. Theory. 35(5), 944â€“955 (1989).
JE Gentle, Matrix algebra: theory, computations, and applications in statistics (Springer, New York, 2007).
S Chen, XC Yang, L Hanzo, in 6th IEE International Conference on 3G and Beyond. Blind joint maximum likelihood channel estimation and data detection for singleinput multipleoutput systems (Washington, DC, 2005), pp. 1â€“5.
SF Cotter, BD Rao, Sparse channel estimation via matching pursuit with application to equalization. IEEE Trans. Commun.50(3), 374â€“377 (2002).
F Xiong, A Zerik, E Shwedyk, Sequential sequence estimation for channels with intersymbol interference of finite or infinite length. IEEE Trans. Commun.38(6), 795â€“804 (1990).
G Mileounis, N Kalouptsidis, B Babadi, V Tarokh, in 17th IEEE International Conference on Digital Signal Processing (DSP). Blind identification of sparse channels and symbol detection via the EM algorithm (Corfu, 2011), pp. 1â€“5.
M Elad, Sparse and redundant representations: from theory to applications in signal and image processing (Springer, New York, 2010).
CR Berger, S Z, JC Preisig, P Willett, Sparse channel estimation for multicarrier underwater acoustic communication: from subspace methods to compressed sensing. IEEE Trans. Signal Process.58(3), 1708â€“1721 (2010).
J Huang, CR Berger, S Zhou, J Huang, Comparison of basis pursuit algorithms for sparse channel estimation in underwater acoustic OFDM.IEEE OCEANS.1â€“6 (2010). http://ieeexplore.ieee.org/document/5603522/.
W Zhou, Computationally efficient equalizer design. PhD thesis, George Mason University (2014).
W Zhou, JK Nelson, in 2013 IEEE International Conference on Acoustics, Speech and Signal Processing. Sequential detection for sparse channels via a multiple tree algorithm (Vancouver, 2013), pp. 4673â€“4677.
Acknowledgements
The authors would like to thank the editor and anonymous reviewers for their constructive comments which helped to improve the quality of this paper.
Funding
This material is based upon work supported by the National Science Foundation under Grant No. CCF1053932 (CAREER).
Author information
Authors and Affiliations
Contributions
The authors declare that all authors have materially participated in the research and have contributed equally to this paper. Both authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Ethics approval and consent to participate
Not applicable
Consent for publication
Not applicable
Competing interests
The authors declare that they have no competing interests.
Publisherâ€™s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Zhou, W., Nelson, J.K. Blind sequential detection for sparse ISI channels. EURASIP J. Adv. Signal Process. 2018, 6 (2018). https://doi.org/10.1186/s1363401705273
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363401705273