12
2196 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 50, NO. 9, SEPTEMBER 2002 Analytical Blind Channel Identification Olivier Grellier, Pierre Comon, Senior Member, IEEE, Bernard Mourrain, and Philippe Trébuchet Abstract—In this paper, a novel analytical blind single-input single-output (SISO) identification algorithm is presented, based on the noncircular second-order statistics of the output. It is shown that statistics of order higher than two are not mandatory to re- store identifiability. Our approach is valid, for instance, when the channel is excited by phase shift keying (PSK) inputs. It is shown that the channel taps need to satisfy a polynomial system of de- gree 2 and that identification amounts to solving the system. We describe the algorithm that is able to solve this particular system entirely analytically, thus avoiding local minima. Computer results eventually show the robustness with respect to noise and to channel length overdetermination. Identifiability issues are also addressed. Index Terms—Blind channel estimation, minimum shift keying, multipath channels, noncircularity, second-order statistics, time- varying channels. I. INTRODUCTION B LIND identification methods depend on the characteristics of the input sources. For example, it is known that a system can only be identified up to an allpass filter when its input is Gaussian circular. Consequently, particular attention has been paid to the non-Gaussian inputs during the last two decades. In those situations, the phase information can be accessed using high-order statistics of the observations, and in the single-input single-output (SISO) case, the system is identified up to a scalar factor only. This has been studied in numerous papers, including the works of Shalvi–Weinstein [24] or Tugnait [28]. Here, we focus our attention on the noncircular character of inputs. An interesting class of noncircular signals is the discrete, which appears in wireless communications. In the SISO case, the discrete character has been used by few authors; Li [15], and Yellin and Porat [31] proposed deterministic approaches. The former is valid for binary inputs and is iterative. To our knowledge, the latter, which is quite complicated, is the only work available in the open literature addressing analytical blind identification of SISO channels with discrete inputs; it includes a clustering stage that is rather sensitive to noise. On the other hand, the discrete character has been broadly used for equal- ization [15] but often in an iterative manner [4]; key references are not cited here since equalization is out of the scope of the present paper. The constant modulus (CM) property, which is widely used in blind equalization, can hardly be used in blind identification. Manuscript received June 30, 2000; revised January 17, 2002. The associate editor coordinating the review of this paper and approving it for publication was Prof. Hideaki Sakai. O. Grellier is with Amadeus Development, Sophia-Antipolis, France. P. Comon is with the the I3S Laboratory, Algorithmes/Euclide-B, Sophia Antipolis, France. B. Mourrain and P. Trébuchet are with Galuud, Inrai Institute, Sophia Antipolis, France. Publisher Item Identifier 10.1109/TSP.2002.801887. The studied signals also have nonzero cyclo-stationary sta- tistics, which allows identification using second-order statistics only [11], [16]. However, for those signals, it is more interesting to use the cyclo-stationarity as a time diversity, which leads to the study of SIMO systems. Slock in [25] and Tong et al. in [26] have first taken advantage of oversampling of cyclo-stationary sources. With single-input multiple-output (SIMO) systems, second-order statistics only can be used, provided that the channels do not share a common root [1], [23], [30]. In this sense, the SIMO problem can be con- sidered to be easier than the SISO, in which one convention- ally resorts either to cyclostationarity (which induces diversity) or to high-order moments, e.g., constant modulus algorithms (CMAs). SIMO second-order methods can be divided into three families: 1) subchannel response matching (SRM) approach intro- duced by Xu [30], 2) subspace methods [18]; 3) linear prediction techniques [2], [25]. In this paper, the oversampling method (inducing a diversity) is not used, i.e., only SISO systems are studied. The novelty of our contribution is twofold. First, only second-order moments are used; they are shown to be sufficient to restore identifia- bility without resorting to higher order statistics. Second, an al- gebraic solution to a class of polynomial systems, constructed from a block of data, is introduced. Our approach is described mainly in the case of minumum shift keying (MSK) modula- tions, effectively approximating the digital modulation used in the GSM standard, but it holds valid for differential binary PSK (DBPSK) or quadrature PSK (QPSK) modulations. In addition, block methods are well matched to burst-mode communication systems (TDMA). For instance, at 900 MHz and 190 km/h, the coherence time is of order 2 ms; in the GSM system, this corresponds to only two bursts, or about 300 symbol periods. This example shows that block algorithms become necessary in a blind context and for reduced coherence times. The paper is organized as follows. Section II introduces the assumptions made on the input and the related second-order properties. Section III describes the principles of the novel pro- cedure used to solve polynomial systems; this procedure is de- tailed in Appendix C, whereas the standard technique of resul- tants is recalled in Appendix A but is not used in the paper. The selection of the best solution is described in Section IV. Some identifiability results are proved in Section V, and computer ex- periments are eventually presented in Section VI. II. MODEL AND BASIC PROPERTIES Assume that a finite sequence of input samples is fed into a finite impulse response (FIR) linear system of length , 1053-587X/02$17.00 © 2002 IEEE

Analytical blind channel identification - Signal

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Analytical blind channel identification - Signal

2196 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 50, NO. 9, SEPTEMBER 2002

Analytical Blind Channel IdentificationOlivier Grellier, Pierre Comon, Senior Member, IEEE, Bernard Mourrain, and Philippe Trébuchet

Abstract—In this paper, a novel analytical blind single-inputsingle-output (SISO) identification algorithm is presented, basedon the noncircular second-order statistics of the output. It is shownthat statistics of order higher than two are not mandatory to re-store identifiability. Our approach is valid, for instance, when thechannel is excited by phase shift keying (PSK) inputs. It is shownthat the channel taps need to satisfy a polynomial system of de-gree 2 and that identification amounts to solving the system. Wedescribe the algorithm that is able to solve this particular systementirely analytically, thus avoiding local minima. Computer resultseventually show the robustness with respect to noise and to channellength overdetermination. Identifiability issues are also addressed.

Index Terms—Blind channel estimation, minimum shift keying,multipath channels, noncircularity, second-order statistics, time-varying channels.

I. INTRODUCTION

B LIND identification methods depend on the characteristicsof the input sources. For example, it is known that a system

can only be identified up to an allpass filter when its input isGaussian circular. Consequently, particular attention has beenpaid to the non-Gaussian inputs during the last two decades. Inthose situations, the phase information can be accessed usinghigh-order statistics of the observations, and in the single-inputsingle-output (SISO) case, the system is identified up to a scalarfactor only. This has been studied in numerous papers, includingthe works of Shalvi–Weinstein [24] or Tugnait [28]. Here, wefocus our attention on the noncircular character of inputs.

An interesting class of noncircular signals is the discrete,which appears in wireless communications. In the SISO case,the discrete character has been used by few authors; Li [15],and Yellin and Porat [31] proposed deterministic approaches.The former is valid for binary inputs and is iterative. To ourknowledge, the latter, which is quite complicated, is the onlywork available in the open literature addressing analytical blindidentification of SISO channels with discrete inputs; it includesa clustering stage that is rather sensitive to noise. On the otherhand, the discrete character has been broadly used for equal-ization [15] but often in an iterative manner [4]; key referencesare not cited here since equalization is out of the scope of thepresent paper. The constant modulus (CM) property, which iswidely used in blind equalization, can hardly be used in blindidentification.

Manuscript received June 30, 2000; revised January 17, 2002. The associateeditor coordinating the review of this paper and approving it for publication wasProf. Hideaki Sakai.

O. Grellier is with Amadeus Development, Sophia-Antipolis, France.P. Comon is with the the I3S Laboratory, Algorithmes/Euclide-B, Sophia

Antipolis, France.B. Mourrain and P. Trébuchet are with Galuud, Inrai Institute, Sophia

Antipolis, France.Publisher Item Identifier 10.1109/TSP.2002.801887.

The studied signals also have nonzero cyclo-stationary sta-tistics, which allows identification using second-order statisticsonly [11], [16]. However, for those signals, it is more interestingto use the cyclo-stationarity as a time diversity, which leads tothe study of SIMO systems.

Slock in [25] and Tonget al.in [26] have first taken advantageof oversampling of cyclo-stationary sources. With single-inputmultiple-output (SIMO) systems, second-order statistics onlycan be used, provided that the channels do not share a commonroot [1], [23], [30]. In this sense, the SIMO problem can be con-sidered to be easier than the SISO, in which one convention-ally resorts either to cyclostationarity (which induces diversity)or to high-order moments, e.g., constant modulus algorithms(CMAs). SIMO second-order methods can be divided into threefamilies:

1) subchannel response matching (SRM) approach intro-duced by Xu [30],

2) subspace methods [18];3) linear prediction techniques [2], [25].In this paper, the oversampling method (inducing a diversity)

is not used, i.e., only SISO systems are studied. The novelty ofour contribution is twofold. First, only second-order momentsare used; they are shown to be sufficient to restore identifia-bility without resorting to higher order statistics. Second, an al-gebraic solution to a class of polynomial systems, constructedfrom a block of data, is introduced. Our approach is describedmainly in the case of minumum shift keying (MSK) modula-tions, effectively approximating the digital modulation used inthe GSM standard, but it holds valid for differential binary PSK(DBPSK) or quadrature PSK (QPSK) modulations. In addition,block methods are well matched to burst-mode communicationsystems (TDMA).

For instance, at 900 MHz and 190 km/h, the coherence timeis of order 2 ms; in the GSM system, this corresponds to onlytwo bursts, or about 300 symbol periods. This example showsthat block algorithms become necessary in a blind context andfor reduced coherence times.

The paper is organized as follows. Section II introduces theassumptions made on the input and the related second-orderproperties. Section III describes the principles of the novel pro-cedure used to solve polynomial systems; this procedure is de-tailed in Appendix C, whereas the standard technique of resul-tants is recalled in Appendix A but is not used in the paper. Theselection of the best solution is described in Section IV. Someidentifiability results are proved in Section V, and computer ex-periments are eventually presented in Section VI.

II. M ODEL AND BASIC PROPERTIES

Assume that a finite sequence of input samples is fedinto a finite impulse response (FIR) linear system of length,

1053-587X/02$17.00 © 2002 IEEE

Page 2: Analytical blind channel identification - Signal

GRELLIER et al.: ANALYTICAL BLIND CHANNEL IDENTIFICATION 2197

with (a priori complex) taps . Denote asthe corresponding output sequence of length, satisfying

where stands for a noise with unknown distribution, anddenotes transposition. In a standard manner, multidimen-

sional variables are stored in column vectors and denoted byboldface letters; for instance,

by construction.The input sequence is i.i.d. and assumed to follow a dis-

crete distribution, stemming from BPSK, MSK, or QPSK digitalmodulations [5], [22], and the channelis supposed time-in-variant during the observation record, which can be very short.The noise is introduced to take into account modeling errors,and computer experiments are run in Section VI for variousnoise levels. However, noise is ignored in the theoretical devel-opments so that it is considered only to be a nuisance for itsdistribution is assumed to be unknown.

Complex Gaussian random variables are nothing but a pair ofreal random variables. What allows simpler expressions of itsdistribution, moments, and related statistical objects is its circu-larity, which induces a correlation between real and imaginaryparts [12], [29]. For a scalar random variable, the circularityproperty at order 2 is characterized by the equation .A random variable is referred to asnoncircularat order 2 if thelatter moment is nonzero.

For non-Gaussian random variables, strict-sense circularitymeans invariance of the distribution by multiplication of a unitmodulus complex number (that is, a rotation in the complexplane), hence, the terminology. The concept has been introducedindependently in [6] and [21]. Various properties are investi-gated in depth in [21]. Some statistical aspects have been ad-dressed in [3]. Random variables whose distribution is not cir-cularly invariant are referred to asnoncircular.

The key statistical property used in this paper is that discretesignals are noncircular at given orders (at orderfor a PSK-random variable [3], [14]). However, only second-order statis-tics are used, so that onlynoncircularity at order 2will be ex-ploited. More precisely, for DBPSK modulated signals, noncir-cular and circular second-order correlations are given by

(1)

respectively. Next, we have, for MSK signals

(2)

(3)

and last, for DQPSK modulated signals

Re Re Re

Im Im Im

where if and elsewhere. Note the con-ditional expectation, which is necessary under the assumption

that the initial value is uniformly distributed, exhibitingcyclostationarity in the noncircular moment of MSK inputs.

Based on these properties, it is possible to derive a set of poly-nomial equations that the channel must satisfy. In the MSK case,we obtain

(4)

and in the BPSK case

(5)

In the QPSK case, we consider the equivalent problem (up toa rotation of ) of a QAM4 distributed source, whereis the sum of purely real and purely imaginary binary whiteand processes. It is necessary to consider real and imaginaryparts separately at the receiver because is not determin-istic, whereas the real and imaginary parts of have a deter-ministic square. This yields four families of equations. For sim-plicity, setting Re Im without restrictingthe generality, one gets

(6)

where and denote the real and imaginary parts of, and and those of , respectively.

Another obvious possibly would be to use fourth-order mo-ments, which would yield the family of equations

In this paper, only polynomial systems of degree 2 will be con-sidered; therefore, the latter property will not be utilized.

III. SOLVING THE POLYNOMIAL SYSTEM

In order to concentrate on principles, we will explain in de-tail the algorithm in the case of an MSK input, which seems tobe a good compromise between simplicity of developments andgenerality. The algorithm described in Section III-D is, never-theless, valid for other cases. Without restricting the generality,assume a channel of length . Then, from (4), the polyno-mial system given above based on noncircular statistics can beexplicitly written as

(7)

Page 3: Analytical blind channel identification - Signal

2198 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 50, NO. 9, SEPTEMBER 2002

where denotes the taps vector. The goalof this paper is to solve this polynomial system for taps .In a polynomial system having generally several solutions in afinite number, equations provided by standard circular statistics(covariance matching) are used to pick up the best solution in afinal stage.

A. Example in the Case of a Real Channel

As a simple particular case, consider a real channel, but out-side this section, the channel isalways assumed to be com-plex with no real roots, in accordance with identifiability resultsproved in Section V. Then, circular statistics yield

where andare given (they depend on statistics of observations

). Grouping of those equations results in

Using the first and third equations, one obtains

This equation eventually allows the calculation of and, up to a sign, and then .

This particular example shows that it is possible to identifya real channel by using thenoncircular second-orderstatisticstogether withcircular second-orderones, using a simple elim-ination procedure. Of course, this was valid only for real chan-nels. For general complex FIR channels, which is the case inwhich we are actually interested, the elimination procedure ismore complicated and is described in Section III-D.

B. Preliminaries

Consider the ring of polynomials in variableswith coefficients in the com-

plex field ; the dual space of is the set of linear forms fromto , which is denoted as . The evaluation of a polynomial

at a point , which is denoted as , is thelinear form that most interests us.

Let be polynomials of degree belonging to.Definition III.1: The ideal spanned by polynomials

is the set of polynomials of the form

with

The quotient ring is then defined as follows.Definition III.2: For any ideal included in , the quotient

algebra is the set of polynomial classesmodulo ideal , viz

The dual space of is the subspace of of linear formsvanishing on the ideal. In particular, the evaluation is inif and only if is a root of all polynomials belonging to. Thisis the fundamental property on which our approach is based.

Given a polynomial , define the multiplication operatorby as the mapping that associateswith

(8)

The transposed operator is by definition the mapping fromonto itself such that , ,

or, equivalently, .

C. Lemmas

Let be the subset of polynomials of degreeand belonging to . Bézout’s theorem [13, p. 227] states that

such a system

(9)

where , has either an infinity ofsolutions or a number of solutions smaller than or equal to.This extends more well-known results for a single polynomial( ) or for linear systems ( ). In what remains, weconsidergeneric systemshaving exactly solutions.

When the system has a finite number of solutions, the quo-tient is of finite dimension (in fact, the variety of solutions iszero-dimensional, which implies that is of finite dimensionbecause Hilbert’s polynomial [8] is of degree zero). Therefore,one conventional way to compute the solutions is to reduce theproblem to an eigenvector computation, as shown by the fol-lowing lemma.

Lemma III.3: Let be any given polynomial in . Then, theeigenvalues of the multiplication map in are the valuesof at the roots of the polynomial system.

Proof: Consider the polynomial. It vanishes at all the roots . Thus, by Hilbert’s

zero theorem (Nullstellensatz) [8], there exists a positive integer, such that or, equivalently, such that

in . In terms of operators, this means that

where denotes the identity operator of. Thus, for any eigen-pair of , we have andthus

As , must be one the values , , which com-pletes the proof.

The reverse inclusion will be proved by Lemma III.4, amongothers.

Besides, if , the eigenvalues of matrix of op-erator give the values of coordinate of the solu-tions. If we repeat this operation for each tap , we have the

solutions. However, a somewhat simpler solution is intro-duced by the following lemma and avoids the computation of

Page 4: Analytical blind channel identification - Signal

GRELLIER et al.: ANALYTICAL BLIND CHANNEL IDENTIFICATION 2199

all eigenvalues of every multiplication operator . In fact,all eigenvectors of asingleoperator are actually required.

Lemma III.4: Linear forms , where is anysolution of , are the eigenvectors of all matricesassociated with the eigenvalues , .

Proof: Using the definition of matrix and applying itto the linear form , we get

In other words, we have . Therefore, andare, respectively, the eigenvectors and eigenvalues of ma-

trix . This proves the lemma.If eigenvalues are not distinct, some eigenvectors are not

uniquely determined, which makes the previous lemma lessuseful. Yet, it can be proved that the common eigenvectors ofall operators are exactly the evaluation forms [19].Therefore, a solution consists of taking several forms, say,and , instead of a single one . and commuteand have the same eigenspaces. The indeterminacy can behandled in this way, but it is not reported here in detail.

Hence, the computation of the multiplication matrixappears as a key step in the proposed algorithm since

the eigenvectors of allow the finding of all the so-lutions of . Indeed, if we take for a basis of the set

of monomials ofglobal degree at most , the entries of the eigenvector areequal to in the dual basisof , where stands for any possible solution of. Moreprecisely, entries 2 to of any eigenvector of , whosefirst entry is normalized to 1, yield a solution to . Thisproperty is used in the numerical algorithm of Section III-D bymerely choosing . Any other polynomial could havemade it.

D. Computing Directly From the Polynomial System

As already mentioned, we prefer a more direct approach thanthat (more standard) described in Appendix A for computationalreasons. In order to simplify the discussion, we will use the fol-lowing example: Suppose that a channel of length isexcited by a MSK input. System is then equal to that in (7).In that case, the computation of the multiplication matrix can besplit into five steps.

First Step—Change in Variables:Suppose we use the fol-lowing change in variables: . The system in is im-plicitly defined by the system in

(10)

where ,, . The matrix is chosen so

that a simple basis can always be found for(that basis willcontain monomials of degree at most 1 in every variable). Anychoice of (by drawing it randomly) would lead to a systemthat can be solved by with probability one. Moreover, ifis not well chosen, the algorithm detects it because one of thematrices involved in the subsequent steps is rank deficient.

The next steps consist of expressing second-, third-, andfourth-degree monomials in the basis. We give, in Appendix C,the general procedure, but for more clarity, these steps areexplained in detail for the particular case of system (7), whichconsists of three equations of degree 2 in three variables.

Second Step—Choosing a Basis:A basis that can genericallysolve our kind of polynomial systems is composed of the neutralelement 1, the unknowns , and all the cross monomialsof degree less than or equal to, where each unknown appearswith a power equal to 1 or 0. In fact, it has been proved byMacaulay that such a basis is sufficient when there are no zerosat infinity (generic case) [27]. Here are two examples:and .

• Channel length :

• Channel length :

In the following, the column vector containing the elements ofthe basis will be denoted as . In this example, isof size 8. System (10) can then be rewritten as forsome matrix depending on and only.

This basis can always be used in our problem [27] because thesystem is a complete intersection (there are a finite number ofsolutions), and we first applied a generic change in the variables(there are no longer zeros at infinity). The reason is that in (7),some equations linked monomials and 1, which wouldhave not been linearly independent in.

Third Step—Expression of the Second-Degree Mono-mials: Suppose we want to find in the matrix associatedwith multiplication by . The monomials to be expressedare as follows: If

Monomials of the basis Monomials to be expressed

Some of these monomials are already in the basis, such as,, , and . The other monomials

, , , and have to be ex-pressed using the polynomial system.

According to (10), monomials , , and can beexpressed directly as a function of 1, , , , ,

, and , provided that is chosen correctly.

Page 5: Analytical blind channel identification - Signal

2200 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 50, NO. 9, SEPTEMBER 2002

In other words, monomials , , and can be ex-pressed directly as a function of the basis using (10)

(11)

for some matrix depending on only. Therefore, themonomial is now expressed in the basis ; in fact,

has here a null coefficient.Fourth Step—Expression of the Third-Degree Monomials:

Monomials and are now of interest. Thesemonomials can be written using the expression of the monomial

in the first row of (11). If we multiply this equationby , monomial appears in the left-hand side,and monomials , , , , ,

, and appear on the right-hand side.Among these monomials, one can distinguish those that arein the basis, like , , , and ,those that have already been expressed in the basis, like,and those that are unknown, like and .However, these unknown monomials are of the same typeas monomials and , and one can showthat expressing monomials , , ,

, , and all together using (11)leads to

(12)

for some matrix depending on only.Fifth Step—Expression of the Fourth-Degree Mono-

mials: Using the same method as before, one can expressmonomials such as using (12). See Appendix Cfor more details.

Having expressed all the monomials in the chosen basis, themultiplication matrix can be constructed. Once the multiplica-tion matrix is found for the arbitrarily chosen ,one computes the eigenvectors of , . Next, all thepossible solutions to the polynomial system are obtainedas . Then, the solutions inthe original coordinate system are given by . SeeAppendix C for details.

For the sake of clarity, we have described the elimination al-gorithm for a channel length of , but the principles hold

TABLE ISTEPS OF THEELIMINATION PROCEDURE

exactly the same for larger values of (with a larger numberof unknowns), such as , as in some subsequent computersimulations. As explicited in [27], the general algorithm goesalong the lines described in Table I.

IV. ESTIMATION OF THE CHANNEL

Selection of a Solution:In a final step, one chooses the so-lution among that best matches theactual channel by a moment matching method, as we explainnow.

A polynomial system rarely admits a unique solution, regard-less of the number of unknowns. Therefore, it is very likely thatwe obtain in practice distinct solutions that we can denoteas , . How-ever, circular statistics (3) have yet to be utilized. With this goal,denote

(13)

Then, because of (3), we have the well-known phase-blindrelation

(14)The procedure proposed in this paper consists of choosing thesolution minimizing the distance:

Arg Min

(15)hence, the name ofmoment matchingmethod. The whole algo-rithm is summarized in Table II.

Computational Complexity:It is worth noting that the largestpart of the computational load consists of building the multipli-cation matrix , which depends on the modulation (discretealphabet and trellis). Yet, it can be shown [9] that this matrix

is itself a polynomial function of the data moments whenthe polynomial system has no infinite solution. Thus, in an op-erational context, for a given modulation, one can only store thepolynomial coefficients of in a ROM; as a consequence, thecomputation of becomes negligible, and the overall data-de-pendent computations are dominated by the calculation of theeigenvectors of .

Page 6: Analytical blind channel identification - Signal

GRELLIER et al.: ANALYTICAL BLIND CHANNEL IDENTIFICATION 2201

TABLE IISUMMARY OF THE ALGORITHM

V. IDENTIFIABILITY

It is well known that blind identifiability can be carriedout only up to a complex multiplicative factor. Therefore,there are infinitely many solutions. However, if we arbitrarilyfix the source variance to 1 and the scalar phase inherentindeterminacy, which contains a fixed phase and a delay,then identifiability results can be stated. Thus, we may assumefrom now on that the channel is causal of degree , andwe want to prove that the joint use of circular and noncircularsecond-order output correlation functions yields anessentiallyunique solution (i.e., up to a unit modulus multiplicative factorand up to a time delay).

Lemma V.1:Suppose we look for a causal FIR channeloflength from given second-order circular statistics; then, thenumber of solutions isessentiallyfinite and bounded by .

Proof: The -transform of the circular covariance ofthe output is equal to since theinput is white and of unit variance. This shows that if iscausal, it can be determined from up to two kinds of inde-terminacies. First, can only be determined up to a multi-plicative constant phase factor. Second, if is transformedinto , where verifies ,remains the same. It is well known that is then an allpassfilter, i.e., of the following form, up to a delay

Since must be FIR and since is not FIR, isFIR only if each pole of is associated with one of theroots of . As a consequence, there is a finite number ofallpass filters such that is FIR. Therefore, if the phaseindeterminacy is fixed, there are at most possible FIRfilters that correspond to . If the roots of are not alldistinct or of unit modulus, there are indeed fewer possibilitiesthan . This proves Lemma V.1, which has been known formany years.

Theorem V.2:Suppose we look for an FIR channel oflength from given second-order circular and noncircular sta-tistics of the output when the input is stationary white. Then, upto complex phase and time delay indeterminacies, we have thefollowing:

• a unique solution if has no real root,• solutions if has distinct real roots.

Proof: Suppose now that we also use the noncircular co-variance . Its -transform is equalto . Yet, one can easily show thatrational filters satisfying are of the followingform, up to a delay:

Now, using statements made in the proof of Lemma V.1, allpassrational filters that also satisfy must havereal poles (and zeros). As a consequence, if has no realroots, cannot have real poles since is FIR, andthe allpass filter must be equal to 1. In this case, there isanessentiallyunique solution for , up to a sign. The factthat is known or not is of no importance since it is of unitmodulus and can be pulled into the inherent indeterminacies. If

has real roots, one must use the result of Lemma V.1.The number of solutions is thenessentiallyequal to .

When the input source is MSK, it is white but not stationary.However, identifiability still holds.

Corollary V.3: When the input source is white MSK, thejoint use of second-order circular and noncircular statistics ofthe output yield a unique solution for , up to a sign.

The proof is given in Appendix B. These identifiability resultsjustify the algorithm we have proposed and are summarized inSection IV.

VI. COMPUTERRESULTS

Tests are run on a random FIR channel ( ). At eachrun, the channel is a realization of a Clarke filter in the typicalurban (TU) mode. Every channel generated is specular and con-tains six paths, whose delays and attenuations are given in thefollowing table, according to the ETSI norm (GSM 05.05, De-cember 1995, six taps TU setting):

s

(dB)

In other words, each coefficient is a random complex cir-cular Gaussian variable whose standard deviation is given in the

Page 7: Analytical blind channel identification - Signal

2202 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 50, NO. 9, SEPTEMBER 2002

Fig. 1. Average BER at the output of a Viterbi algorithm using our channelestimate as a function of the SNR for various block lengths.

table. Note that the first path is not the strongest. The symbolrate is 271 ksymbol/s, which corresponds to a symbol period of3.68 s, whereas the delays above are also given ins (thesecases are those of GSM). The transmit filter is a raised cosinewith rolloff , and four samples have been generated persymbol period. The channel is excited by a MSK input. The per-formance is presented as a function of the SNR and of the length

of the observation block and averaged over 500 independentchannel trials.

Fig. 1 shows the average bit error rate (BER) obtained at theoutput of a Viterbi equalizer that uses our channel estimate. Thesolid, dashed, and dash-dotted lines correspond to block lengths

, , and , respectively. These per-formances are compared with the average BER obtained withthe actual channel (dotted line).

For high SNRs and or , the results showthe effects of moment estimation errors. These effects disappearfor , where the performances exhibit a loss of 2 dBcompared with the actual channel results.

Fig. 2 shows the average mean squares distance between theactual and the estimated channel. The solid, dashed, and dash-dotted lines correspond again to block lengths ,

, and , respectively.It appeared relevant to test the robustness of the algorithm

with respect to channel overestimation. Keeping in thealgorithm, tests have been run on a random FIR channel of ac-tual length . Fig. 3 shows the average BER obtained atthe output of a Viterbi equalizer that uses our channel estimatewhen (solid line) and (dashed line). Fig. 4 showsthe average mean square estimation error of the channel as afunction of the SNR and in the presence of overdetermination.These two performances are compared with the one obtainedwhen the actual channel is used (dash-dotted line). Hence, thistest illustrates the loss in performance encountered in the pres-ence of channel order overdetermination.

Fig. 2. Average mean square estimation error of the channel as a function ofthe SNR for BER at the output of the SNR for various block lengths.

Fig. 3. Average BER at the output of a Viterbi algorithm using our channelestimate as a function of the SNR and in presence of overdetermination.

Experiments for QPSK modulated inputs have not been run,but one can either treat real and imaginary parts separately, asexplained in Section II, or use fourth-order moments. Of course,the former is preferred (e.g., for IS95 standard), but the latterseems unavoidable in the case of/4-QPSK modulations, whichare found, for example, in the IS54 standard.

VII. CONCLUDING REMARKS

The blind identification method described in the paper isbased only on second-order statistics of the observation. We

Page 8: Analytical blind channel identification - Signal

GRELLIER et al.: ANALYTICAL BLIND CHANNEL IDENTIFICATION 2203

Fig. 4. Average mean square estimation error of the channel as a function ofthe SNR and in presence of overdetermination.

proved that it is not necessary to resort to higher order statistics,explicitly or implicitly (like in CMA), to identify a SISOchannel; next, we gave an analytical solution that was freeof local extrema problems. In addition, identifiability resultswere derived when an FIR channel is searched for, from bothcircular and noncircular moments. Finally, computer resultsshowed that the behavior of our algorithm depends on theestimation quality of the moments and on the accuracy of thedetermination of the channel length.

The extension to SIMO channels is rather straightforward andconsists essentially of code writing and computer experiments.In fact, there is no fundamental change in the algorithm. How-ever, there exist specific algorithms that work in the SIMO caseand not in the SISO case. For this reason, we believe our algo-rithm is more attractive in the SISO case.

APPENDIX

A. Computation of Matrix by Resultants

Many methods can be used to compute the multiplication ma-trix. Among them, the Gröbner bases are the most well known.They can be used to build a base of the quotient algebraandthen to compute the multiplication matrix with normal formscomputation. However, this method must be run in exact arith-metic and thus implies the use of big numbers. Another use ofthe Gröbner bases consists of the elimination of variablesand leads to the computation of the roots of a mono-variate poly-nomial of degree . Since these methods are too expensivein terms of computation load, we prefer to use a modification ofthe old method by Macaulay [17], which has been used to buildresultants.

This approach, which is discussed in this section for the sakeof completeness, can be considered to be an extension of theSylvester theorem to multivariate polynomials and, thus, could

seem natural. However, another simpler (but less standard) ap-proach is discussed in Section III D and Appendix C and hasbeen used throughout the paper. We now present Sylvester andMacaulay matrices and their properties.

1) Sylvester Matrices:Sylvester matrices are matricesthat represent maps of the form

where , , and are the spaces generated by monomials, , and , re-

spectively. Matrix , of size , thus has thefollowing structure:

......

where the entries of are the coefficients of the polynomialsso that and . The

determinant of is also called the resultant of polynomialsand . Of course, the construction procedure also applies formore than two polynomials.

2) Macaulay Matrices:The approach described abovecan be generalized to multivariate polynomials. Let

be polynomials of degreein variables (Note that

in the algorithm of Section III-D, all degrees are equal to, except .) Macaulay matrices [17] used to build the

resultant of these polynomials are matrices associated withmaps of the form

where the are subspaces spanned by a finite number ofmonomials in variables , which are denotedas , where and

. In this notation, is the set of respective powersof the variables of the monomials that span the subspace,

, each containing inte-gers. In a similar manner, definesuch that .

The matrix associated with this multivariate mapis suchthat its columns are the image, in the canonical basis, of themonomials in the polynomials . If denote the de-gree of polynomial , it can be shown that is of dimension

, where . In other words, its size is thatof the basis .

Matrix can be split in blocks:, where block is the canonical rep-

resentation of the image subspace of the monomialsby thepolynomial . Let us now explain the construction procedureon an example.

Example: Suppose that , , ,, and .

The critical degree is in this example,and we arbitrarily choose the basis .

Page 9: Analytical blind channel identification - Signal

2204 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 50, NO. 9, SEPTEMBER 2002

At each step of the procedure ,one looks for monomials left in that can be divided by ;in order to construct a basis of space , one divides thesemonomials by . In Step 1, monomials of divisible by

are . Ones sets removesfrom , and go to the next step. InStep 2, mono-

mials of divisible by reduce to . Thus,one sets and removes from what remained in

. It eventually remains that in , which consists ofthe basis of .

Every row of is associated with a monomial of, in a preassigned order; here, we choose arbitrarily

. The first two columns span thespace , the third one spans , and the last threecolumns span

The submatrices comprised within vertical bars can be denotedas , , and , respectively.

The sets of exponents associated with are thefollowing: , ,

, and the set associated with the wholespace isand actually describes.

3) Properties of Macaulay’s Matrices:The proof of the fol-lowing theorems are not given but can be found in [10], [17],and [20].

Theorem VIII.1: Consider the generic polynomialsystem , choose a polynomial , and buildthe Macaulay matrix associated with these polynomials.The set of monomials is a basis of the quotient algebra

and where is defined in Ap-pendix A2.

Hence, the construction of the Macaulay matrix yields a basisof the quotient algebra. The following theorem gives a meansto compute the matrix associated with the multiplication bythanks to the Macaulay matrices.

Theorem VIII.2: Suppose is a subset of , which is theset of exponents indexing the rows of; this is the case ifincludes a constant term. Then, matrixrewrites

where the rows and the columns ofare indexed by the mono-mials , and the columns of and are indexed by themonomials , where is different from zero. Then, forall polynomial systems , the matrix of the multipli-cation by in the quotient algebra isthe Schur complement of the block in the matrix

Thus, matrix can be directly computed from theMacaulay matrix associated with polynomials

[7]. However, if we take into account the relationships betweenthe monomials introduced in the polynomial system, thereexists a much simpler procedure to compute, as explainedin Section III-D and Appendix C.

B. Proof of Corollary V.3

Proof: When the input source is MSK, let us first showthat the noncircular covariance

has a -transform given by

(16)

In fact,, which, from (2), yields

or ). Now, takethe -transform over time index , and get

. Making thechange of variables eventually gives (16).

Now, suppose we have one solution satisfying (16).From the result above, we see that the whole set of rationalfilters satisfying (16) is then generated by , where

, and where poles of coincide withzeros of .

Yet, it can be easily shown that such filters take the followingform, up to an even delay:

Now, it can be seen that the only allpass filter satisfyingthat also satisfies is

. Therefore, the whole set of solution reduces to, up to a delay.

C. Computational Details

In this section, we detail the steps described in Section III-Din the particular case of system (7), which contains three equa-tions of degree 2 in three variables. Computer codes can bedownloaded from the web page of the second author. From theBézout lemma quoted in Section III-C, we already know thatthis system will have generally solutions.

1) First Step: The identity matrix is not suitable for be-cause some steps in the procedure will involve singular matrices.This comes from the fact that pure squares all appear in the firstequation only. Thus, the following choice is made:

(17)

2) Second Step:One chooses the basis , which containsthe eight monomials in the following, that we can arrange in avector:

Page 10: Analytical blind channel identification - Signal

GRELLIER et al.: ANALYTICAL BLIND CHANNEL IDENTIFICATION 2205

The system (7) can now be expressed in terms of the newvariables as

... (18)

where

The goal is now to express the matrix of operatorin the basis . For doing this, we need to have the ex-

pression of all monomials of , in particular, monomialssuch as , , or , as a function ofmonomials of itself.

3) Third Step: The pure squares are not in , butwe can obtain them from (18) by isolating the squares in theleft-hand side

(19)

where matrices and are functions of :

and where denotes theth column of (as in the Matlabnotation).

4) Fourth Step: Let us turn now to monomials of the form, . Take the first row of (19), and multiply it by

. A careful inspection then shows that dependsonly on becauseof the presence of zeros in matrix . Similarly, de-pends only on . Inorder to solve this problem, it suffices to write jointly the otherequations, which are obtained on one hand by multiplying thesecond row of (19) by and and on the other hand bymultiplying the third row of (19) by and . This even-tually yields the following system, after some manipulations:

(20)

where

Consequently, we have indeed expressed monomialsand in the basis .

5) Fifth Step: Last, let us turn to monomial .From (20), it can be seen that

Multiplying this relation by shows thatcan be expressed as a function of monomials , ,

, and ; the first monomial is expressedin thanks to (19), the second and the third thanks to (20),and the fourth is of the same nature as . In orderto obtain its expression, we will proceed along the same linesas in the previous paragraph. We will express jointly all threemonomials of the same type. This leads eventually to the linearsystem

(21)

where

Page 11: Analytical blind channel identification - Signal

2206 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 50, NO. 9, SEPTEMBER 2002

6) Solutions to the Polynomial System:The matrix of theoperator can now be obtained as

It admits generally eight eigenvectors , .Each of these eigenvectors gives a solution

because the first four entries ofare . The corresponding solutionsare obtained by transforming back to the original coordinatesystem .

REFERENCES

[1] K. Abed-Meraimet al., “On subspace methods for blind identification ofSIMO FIR systems,”IEEE Trans. Signal Processing, vol. 45, pp. 42–55,Jan. 1997.

[2] K. Abed-Meraim, E. Moulines, and P. Loubaton, “Prediction errormethod for second-order blind identification,”IEEE Trans. SignalProcessing, vol. 45, pp. 694–705, Mar. 1997.

[3] P. O. Amblard, M. Gaeta, and J. L. Lacoume, “Statistics for complexvariables and signals,”Signal Process., vol. 53, pp. 1–25, 1996.

[4] S. Barbarossa and A. Scaglione, “Blind equalization using cost functionmatched to the signal constellation,” inProc. Asilomar Conf, Signals,Syst., Comput., Pacific Grove, CA, 1997.

[5] S. Benedetto, E. Biglieri, and V. Castellani,Digital TransmissionTheory. Englewood Cliffs, NJ: Prentice-Hall, 1987.

[6] P. Comon, “Circularité et signaux aléatoires à temps discret,”Traitementdu Signal, vol. 11, no. 5, pp. 417–420, Dec. 1994.

[7] P. Comon, O. Grellier, and B. Mourrain, “Closed-form blind channelidentification with MSK inputs,” inProc. Asilomar Conf, Signals, Syst.,Comput., Pacific Grove, CA, Nov. 1–4, 1998, pp. 1569–1573.

[8] D. Cox, J. Little, and D. O’Shea, “Ideals, varieties, and algorithms: Anintroduction to computational algebraic geometry and commutative al-gebra,” inUndergraduate Texts in Mathematics. New York: Springer-Verlag, 1992.

[9] M. Elkadi and B. Mourrain, “Algorithms for residues and Lojasiewiczexponents,”J. Pure Appl. Algebra, vol. 153, pp. 27–44, 2000.

[10] I. Emiris and A. Rege, “Monomial bases and polynomial systemsolving,” in Proc. ACM Int. Symp. Symbolic Algebraic Comput.,Oxford, U.K., 1994, pp. 114–122.

[11] W. A. Gardner, “A new method of channel identification,”IEEE Trans.Commun., vol. 39, pp. 813–817, June 1991.

[12] N. R. Goodman, “Statistical analysis based on certain multivariate com-plex normal distributions,”Ann. Math. Stat., vol. 34, pp. 152–177, 1963.

[13] J. Harris, “Algebraic geometry, a first course,” inGraduate Texts inMath. New York: Springer, 1992, vol. 133.

[14] J. L. Lacoume, P. O. Amblard, and P. Comon, “Statistiques d’ordresupérieur pour le traitement du signal,” inColl. Sci. l’Ingénieur. Paris,France: Masson, 1997.

[15] T. H. Li, “Blind identification and deconvolution of linear systems drivenby binary random sequences,”Trans. Inform. Theory, vol. 38, pp. 26–38,Jan. 1992.

[16] Y. Li and Z. Ding, “ARMA system identification based on second-ordercyclostationarity,” IEEE Trans. Signal Processing, vol. 42, pp.3483–3494, Dec. 1994.

[17] F. S. Macaulay, “Some formulae in elimination,”Proc. London Math.Soc., vol. 1, no. 33, pp. 3–27, 1902.

[18] E. Moulines, P. Duhamel, J. F. Cardoso, and S. Mayrague, “Subspacemethods for the blind identification of multichannel FIR filters,”IEEETrans. Signal Processing, vol. 43, pp. 516–525, Feb. 1995.

[19] B. Mourrain, “Computing isolated polynomial roots by matrixmethods,”J. Symbolic Comput., Special Issue on Symbolic–NumericAlgebra for Polynomials, vol. 26, no. 6, pp. 715–738, Dec. 1998.

[20] B. Mourrain and V. Y. Pan, “Multivariate polynomials, duality and struc-tured matrices,”J. Complexity, vol. 16, pp. 110–180, 2000.

[21] B. Picinbono, “On circularity,”IEEE Trans. Signal Processing, vol. 42,pp. 3473–3482, Dec. 1994.

[22] J. G. Proakis,Digital Communications, 3rd ed. New York: McGraw-Hill, 1995.

[23] E. Serpedin and G. B. Giannakis, “A simple proof of a known blindchannel identifiability result,”IEEE Trans. Signal Processing, vol. 47,pp. 591–593, Feb. 1999.

[24] O. Shalvi and E. Weinstein, “New criteria for blind deconvolution ofnonminimum phase systems,”IEEE Trans. Inform. Theory, vol. 36, pp.312–321, Mar. 1990.

[25] D. T. M. Slock, “Blind fractionally-spaced equalization, perfect-re-construction filter banks and multichannel linear prediction,” inProc.ICASSP Conf., Adelaide, Australia, Apr. 1994.

[26] L. Tong, G. Xu, and T. Kailath, “Blind identification and equalizationbased on second-order statistics: A time domain approach,”IEEE Trans.Inform. Theory, vol. 40, pp. 340–349, Mar. 1994.

[27] P. Trebuchet and B. Mourrain, “Solving projective complete intersectionfaster,” in Proc. Int. Symp. Symbolic Algebraic Comput., C. Traverso,Ed., New York, 2000, pp. 231–238.

[28] J. Tugnait, “Comments on ‘New criteria for blind deconvolution of non-minimum phase systems’,”IEEE Trans. Inform. Theory, vol. 38, pp.210–213, Jan. 1992.

[29] R. A. Wooding, “The multivariate distribution of complex normal vari-ables,”Biometrika, vol. 43, pp. 212–215, 1956.

[30] G. Xu, H. Liu, L. Tong, and T. Kailath, “A least-squares approach toblind channel identification,”IEEE Trans. Signal Processing, vol. 43,pp. 813–817, Dec. 1995.

[31] D. Yellin and B. Porat, “Blind identification of FIR systems excited bydiscrete-alphabet inputs,”IEEE Trans. Signal Processing, vol. 41, pp.1331–1339, Mar. 1993.

Olivier Grellier was born in 1972. He graduatedfrom Supelec, Paris, France, in 1995 and receivedthe D.E.A. degree in 1995 from the University ofRennes I, Rennes, France. He received the Ph.D.degree in 2000 under the direction of P. Comon.

His Ph.D. dissertation was on blind deconvolutionand separation of discrete sources. His works werefocused, in particular, on analytical techniques. He isnow with Amadeus Development, Sophia-Antipolis,France.

Page 12: Analytical blind channel identification - Signal

GRELLIER et al.: ANALYTICAL BLIND CHANNEL IDENTIFICATION 2207

Pierre Comon (M’87–SM’95) graduated in 1982and received the Ph.D. degree in 1985, both from theUniversity of Grenoble, Grenoble, France. He laterreceived the Habilitation to lead Researches degreein 1995 from the University of Nice, Nice, France.

He has been in industry for nearly 13 years, firstwith Crouzet-Sextant between 1982 and 1985 andthen with Thomson Marconi between 1988 and1997. He spent 1987 in the ISL Laboratory, StanfordUniversity, Stanford, CA. He joined Eurecom in1997 and left there in the fall of 1998. He was an As-

sociate Research Director with CNRS from 1994 to 1998. He is now ResearchDirector with Laboratory I3S, CNRS, Sophia-Antipolis, France. His researchinterests include high-order statistics, blind deconvolution and equalization,digital communications, and statistical signal and array processing.

Dr. Comon was Associate Editor of the IEEE TRANSACTIONS ON SIGNAL

PROCESSINGfrom 1995 to 1998 and a member of the French National Com-mittee of scientific research from 1995 to 2000. He was the coordinator of theEuropean Basic Research Working Group ATHOS from 1992 to 1995. Between1992 and 1998, he was a member of the Technical and Scientific Council of theThomson Group. Since July 2001, he has been an Associate Editor with theIEEE TRANSACTIONS ONCIRCUITS AND SYSTEMS I, in the area of blind tech-niques; he is currently an IEEE Distinguished Lecturer for 2002 to 2003.

Bernard Mourrain was born in 1964. He receivedthe Agrégation de Mathématiques degree fromÉcole Normale Supérieure de Cachan in 1988 anddefended his thesis on invariant theory and effectivealgebra and geometry in 1991, under the direction ofM. Demazure.

Since 1991, he has been a Researcher at INRIA,where he leads the new group Galaad, which focusseson geometry, algebra, and applications. His main in-terests are polynomial systems solving and symboliccomputation. He is currently working on symbolic

and numerical methods in effective algebraic geometry based on linear algebratools and resultant formulations. Applications of these methods to computer vi-sion, robotics, signal processing and three-dimensional curves and surface ma-nipulations are a significant part of his work.

Philippe Trébuchet was born in 1975. He receivedthe Agrégation de Mathématiques degree from ÉcoleNormale Supérieure de Cachan in 2000.

He is currently working on algebraic methods forpolynomial system solving with the Galaad team,INRIA, France, under the direction of D. Lazardand B. Mourrain. His main interests are polynomialsystems solving and symbolic computation. Heis currently working on symbolic and numericalmethods in effective algebraic geometry based onlinear algebra tools and rewriting techniques. In

addition, he is concerned with practical applications, particularly in the fieldsof signal processing, computer vision, computational geometry, and robotics.