131
Jammer Excision Based on Computational Intelligence Techniques Author Imran Zaka 05-UET/PhD-CASE-CP-13 Supervisor Syed Ismail Shah Professor, Department of Electrical and Computer Engineering DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING CENTRE FOR ADVANCED STUDIES IN ENGINEERING UNIVERSITY OF ENGINEERING AND TECHNOLOGY TAXILA NOVEMBER 2011

Jammer Excision Based on Computational Intelligence Techniques

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Jammer Excision Based on Computational Intelligence Techniques

Jammer Excision Based on ComputationalIntelligence Techniques

Author

Imran Zaka

05-UET/PhD-CASE-CP-13

Supervisor

Syed Ismail ShahProfessor, Department of Electrical and Computer Engineering

DEPARTMENT OF ELECTRICAL AND COMPUTERENGINEERING

CENTRE FOR ADVANCED STUDIES IN ENGINEERINGUNIVERSITY OF ENGINEERING AND TECHNOLOGY

TAXILA

NOVEMBER 2011

Page 2: Jammer Excision Based on Computational Intelligence Techniques
Page 3: Jammer Excision Based on Computational Intelligence Techniques
Page 4: Jammer Excision Based on Computational Intelligence Techniques

To

My parents

iv

Page 5: Jammer Excision Based on Computational Intelligence Techniques

Acknowledgments

I am thankful to my supervisor Dr. Syed Ismail Shah for the guidance and support

without which it would not have been possible to complete this research work. I am

also thankful to members of my PhD advisory committee for their worthy advices. I am

grateful to my PhD fellows especially Habib ur Rehman, Imran Shafi, Sajid Bashir and

Adnan Ahmad Khan for the useful discussions and inspiration.

I acknowlege enabling role of the Higher Education Commission (HEC) Islamabad,

Pakistan and appreciate its financial support through “Development of S&T Manpower

through Indigenous PhD (300 Scholars).

Imran Zaka1

2011

1E-mail: [email protected]

v

Page 6: Jammer Excision Based on Computational Intelligence Techniques

Abstract

This thesis deals with the removal of jamming signal in Code Division Multiple Access

(CDMA) system. Nature inspired computational intelligence techniques have been stud-

ied and applied for the removal of jamming signal from the corrupted received CDMA

signal. CDMA systems are generally immune from interference however if power of in-

terferer is higher than the immunity provided by processing gain, degradation in Bit

Error Rate (BER) performance is observed. Particle Swarm Optimization, Genetic Al-

gorithm, Artificial Bee Colony and Ant Colony Optimization are the computational in-

telligence techniques being proposed for removal of jammer from received CDMA signal.

These techniques have been optimized for fast convergence and minimum complexity.

Performance comparison with existing techniques has also been provided. Performance

improvement is shown by BER mininmization.

vi

Page 7: Jammer Excision Based on Computational Intelligence Techniques

List of Publications

The work presented in this thesis is based on the following publications:

Journal Publications

1. H. Rehman, S. I. Shah, I. Zaka and Jamil Ahmad, “An MBER-BLAST Algorithm

for OFDM-SDMA Communication using Particle Swarm Optimization” in Inter-

national Journal of Communication Systems, Vol 24, Issue 2, pp. 185-201, doi:

10.1002/dac.1149, February 2011.

2. I. Zaka, H. Rehman, S. I. Shah, and J. Ahmad, “GA and PSO based Jammer

Excision in CDMA,” in JCSC 19, No. 1, World Scientific Singapore, pp. 123-138,

Feb. 2010.

3. I. Zaka, H. Rehman, M. Naeem, S. I. Shah, and J. Ahmad, “Jammer Excision

in CDMA Using Particle Swarm Optimization,” in LNCS 5226, Springer-Verlag

Berlin Heidelberg, pp. 601-609, Sep. 2008.

4. H. Rehman, I. Zaka, and S. I. Shah, “MC-IDMA Communication in Frequency

Selective Multipath Fading Channels,” Mehran University Research Journal of

Engineering and Technology, Mehran University of Engineering and Technology,

Jamshoro, Pakistan, Vol. 27, No. 2, pp. 229-242, April, 2008.

5. H. Rehman, I. Zaka, M. Naeem, S. I. Shah, and J. Ahmad, “Minimum Bit Error

Rate Multiuser Detection for OFDM-SDMA Using Particle Swarm Optimization,”

LNCS 4681 Springer-Verlag Berlin Heidelberg, pp. 1247-1256, Aug., 2007.

6. H. Rehman, M. Naeem, I. Zaka, and S. I. Shah, “IDMA Assisted Multicarrier,

Multiantenna Communication In Fading Channels,” WSEAS Trans. Commun.,

vol. 5, pp. 549-555, March, 2006.

vii

Page 8: Jammer Excision Based on Computational Intelligence Techniques

Conference Publications

1. H. Rehman, I. Zaka, S. I. Shah and J. Ahmad, “Combined Equalization and

Channel Estimation for MC-IDMA Uplink Transmissions,” in Proc. IEEE Int Con-

ference on Networks and Communication (INCC, 2008 ), LUMS, Lahore Pakistan,

pp. 34-38, May, 2008.

2. H. Rehman, I. Zaka, M. Naeem, and S. I. Shah, “Multicarrier Interleave Division

Multiple Access Communication with Adaptive Subchannel Allocation,” in Proc.

IEEE Int conference on Electrical Engineering (ICEE 2007 ), Lahore Pakistan,

April, 2007.

3. H. Rehman, I. Zaka, M. Naeem, S. I. Shah, and J. Ahmad, “Multicode Multi-

carrier Interleave Division Multiple Access Communication ” in Proc. IEEE Int.

Multitopic Conference (INMIC’06 ), Islamabad, Pakistan, pp. 37-41, Dec., 2006.

4. H. Rehman, M. Naeem, I. Zaka, and S. I. Shah, “Multicarrier Interleave-Division

Multiple Access Communication in Multipath Channels,” in Proc. 5 th WSEAS

Int. Conf. Electronics, Hardware, Wireless and Optical Commun., Madrid, Spain,

pp. 20-25, Feb., 2006.

5. I. Zaka, H. Rehman, M. Azam, and S. I. Shah, “Comparison of Jammer Exci-

sion Techniques ” in Proc. IEEE Int. Multitopic Conference (INMIC’05 ), Karachi

Pakistan, Dec., 2005.

6. H. Rehman, M. Azam, I. Zaka, and S. I. Shah, “Design and Performance of

OFDM-CDMA System in Fading Channels,” in Proc. IEEE Int. Conference on

Emerging Technologies (ICET’05 ), Islamabad Pakistan, pp. 172-177, Sep., 2005.

viii

Page 9: Jammer Excision Based on Computational Intelligence Techniques

Contents

Acknowledgments v

Abstract vi

List of Publications vii

List of Figures xiii

List of Tables xv

List of Acronyms xvi

1 Introduction 1

1.1 Types of Jammers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

1.1.1 Full band jamming . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.1.2 Partial band jamming . . . . . . . . . . . . . . . . . . . . . . . . 3

1.1.3 Narrowband jamming . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.1.4 Tone jamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.1.5 Swept jamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.1.6 Pulse jamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

1.2 Techniques for Jammer Excision . . . . . . . . . . . . . . . . . . . . . . . 4

1.2.1 Frequency Domain Techniques . . . . . . . . . . . . . . . . . . . . 4

1.2.1.1 Time Frequency Distributions . . . . . . . . . . . . . . . 6

1.2.2 Predictive Techniques . . . . . . . . . . . . . . . . . . . . . . . . . 8

1.2.3 Code Aided Techniques . . . . . . . . . . . . . . . . . . . . . . . . 10

1.2.4 Wiener Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

1.3 Performance Improvement using Jammer Excision Techniques . . . . . . 12

1.3.1 Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

1.3.2 Acquisition Capability . . . . . . . . . . . . . . . . . . . . . . . . 13

ix

Page 10: Jammer Excision Based on Computational Intelligence Techniques

1.3.3 Detection of Spread Spectrum Signals . . . . . . . . . . . . . . . . 14

1.4 Estimation of Instantaneous Frequency of Jammer . . . . . . . . . . . . . 14

1.5 Purpose of Research/Motivation . . . . . . . . . . . . . . . . . . . . . . . 15

1.6 Outline of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

1.7 Summary of Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . 16

1.8 Organization of Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

2 Code Division Multiple Access 18

2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

2.2 Code Division Multiple Access . . . . . . . . . . . . . . . . . . . . . . . . 19

2.2.1 Multiple Access Capability . . . . . . . . . . . . . . . . . . . . . . 22

2.2.2 Immunity from Narrowband Interference . . . . . . . . . . . . . . 22

2.2.3 Resistance to Multipath Interference . . . . . . . . . . . . . . . . 23

2.2.3.1 RAKE Receiver . . . . . . . . . . . . . . . . . . . . . . . 25

2.2.4 Antijamming Capability . . . . . . . . . . . . . . . . . . . . . . . 25

2.2.5 Synchronous CDMA . . . . . . . . . . . . . . . . . . . . . . . . . 27

2.2.6 Asynchronous CDMA . . . . . . . . . . . . . . . . . . . . . . . . 29

2.2.7 Advantages of Asynchronous over Synchronous CDMA . . . . . . 30

2.2.7.1 Efficient Utilization of Spectrum . . . . . . . . . . . . . 30

2.2.7.2 Flexible PN Code Allocation . . . . . . . . . . . . . . . 30

2.3 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

2.4 Advantages of CDMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

2.4.1 Dynamic Power Control . . . . . . . . . . . . . . . . . . . . . . . 33

2.4.2 Soft Handover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

2.4.3 Frequency Reuse . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

2.4.4 Multiuser Detection . . . . . . . . . . . . . . . . . . . . . . . . . . 35

2.5 Frequency Hopping CDMA . . . . . . . . . . . . . . . . . . . . . . . . . 35

2.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

x

Page 11: Jammer Excision Based on Computational Intelligence Techniques

3 Nature Inspired Computational Intelligence Techniques 37

3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

3.2 Particle Swarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . 38

3.3 Variants of PSO Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . 41

3.3.1 Adaptive PSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

3.3.2 Constricted Version of PSO . . . . . . . . . . . . . . . . . . . . . 43

3.3.3 The Binary PSO . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

3.4 Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

3.4.1 Initialization of the Population . . . . . . . . . . . . . . . . . . . 48

3.4.2 Natural Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

3.4.3 Pairing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

3.4.3.1 Random Pairing . . . . . . . . . . . . . . . . . . . . . . 49

3.4.3.2 Rank Weighting Pairing . . . . . . . . . . . . . . . . . . 49

3.4.4 Mating or Cross-over . . . . . . . . . . . . . . . . . . . . . . . . . 50

3.4.5 Mutation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

3.4.6 Fitness Function . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

3.4.7 Choice of the Parameters of GA . . . . . . . . . . . . . . . . . . . 52

3.5 Artificial Bee Colony (ABC) Algorithm . . . . . . . . . . . . . . . . . . . 53

3.5.1 Initialization Phase . . . . . . . . . . . . . . . . . . . . . . . . . . 57

3.5.2 Employed Bees Phase . . . . . . . . . . . . . . . . . . . . . . . . . 57

3.5.3 Onlooker Bees Phase . . . . . . . . . . . . . . . . . . . . . . . . . 57

3.5.4 Scout Bees Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

3.6 Ant Colony Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

3.6.1 Update of Pheromone . . . . . . . . . . . . . . . . . . . . . . . . 62

3.6.2 Continuous Ant Colony Optimization . . . . . . . . . . . . . . . . 62

3.6.3 Convergence of ACO . . . . . . . . . . . . . . . . . . . . . . . . . 64

3.6.4 Applications of ACO . . . . . . . . . . . . . . . . . . . . . . . . . 65

xi

Page 12: Jammer Excision Based on Computational Intelligence Techniques

4 Jammer Excision in CDMA based on Computational Intelligence Tech-

niques 66

4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

4.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

4.3 Wiener Filtering for Jammer Excision in CDMA . . . . . . . . . . . . . . 68

4.4 PSO for Jammer Excision in CDMA . . . . . . . . . . . . . . . . . . . . 70

4.4.1 Optimization of PSO for Jammer Excision . . . . . . . . . . . . . 73

4.5 CGA for Jammer Excision in CDMA . . . . . . . . . . . . . . . . . . . . 74

4.6 ABC for Jammer Excision in CDMA . . . . . . . . . . . . . . . . . . . . 77

4.7 ACO for Jammer Excision in CDMA . . . . . . . . . . . . . . . . . . . . 80

5 Numerical Results and Discussions 83

5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

5.2 Computational Complexity and Implementation Issues . . . . . . . . . . 83

5.3 Simulation and Numerical Results . . . . . . . . . . . . . . . . . . . . . . 84

5.3.1 Comparison with Existing Techniques . . . . . . . . . . . . . . . . 89

5.3.2 Comparison between GA and PSO and ABC . . . . . . . . . . . . 90

5.3.3 Comments on ACO . . . . . . . . . . . . . . . . . . . . . . . . . . 93

5.4 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

6 Conclusions and Directions for Future Research 96

6.1 Directions for Future Research . . . . . . . . . . . . . . . . . . . . . . . . 97

A Gaussian Elimination Matrix Inversion 98

A.1 Gaussian Elimination Algorithm . . . . . . . . . . . . . . . . . . . . . . . 98

A.2 Computational Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . 99

Bibliography 100

xii

Page 13: Jammer Excision Based on Computational Intelligence Techniques

List of Figures

1.1 Jammer types based on channelized spectrum . . . . . . . . . . . . . . . 2

1.2 Basic structure of a transform domain exciser . . . . . . . . . . . . . . . 4

1.3 Adaptive transform domain interference suppression . . . . . . . . . . . . 5

1.4 Interference suppression using notch filter . . . . . . . . . . . . . . . . . . 6

1.5 Interference suppression using open loop adaptive filter . . . . . . . . . . 7

1.6 TFD of spread spectrum signal with Linear FM chirp Jammer . . . . . . 8

1.7 TFD of spread spectrum signal after excision . . . . . . . . . . . . . . . . 9

1.8 Basic structure of a predictive exciser . . . . . . . . . . . . . . . . . . . . 10

1.9 Structure of a tapped delay line predictor . . . . . . . . . . . . . . . . . . 10

1.10 Basic structure of a radiometer . . . . . . . . . . . . . . . . . . . . . . . 13

1.11 Radiometer with transform domain interference suppression . . . . . . . 14

2.1 Multiple access schemes. . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

2.2 Block diagram of DS-CDMA transmitter. . . . . . . . . . . . . . . . . . . 20

2.3 Block diagram of DS-CDMA receiver. . . . . . . . . . . . . . . . . . . . . 21

2.4 Multiple access in CDMA. . . . . . . . . . . . . . . . . . . . . . . . . . . 23

2.5 Interference rejection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

2.6 Principle of RAKE receiver. . . . . . . . . . . . . . . . . . . . . . . . . . 26

2.7 An example of four mutually orthogonal digital signals. . . . . . . . . . . 28

2.8 Principle of CDMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

2.9 Soft handover. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

3.1 Flowchart of PSO algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . 41

3.2 Modification of searching point of PSO . . . . . . . . . . . . . . . . . . . 44

3.3 Flowchart of Genetic Algorithm. . . . . . . . . . . . . . . . . . . . . . . . 46

3.4 Flowchart of Artificial Bee Colony algorithm. . . . . . . . . . . . . . . . . 54

3.5 Choice of shortest path by ants . . . . . . . . . . . . . . . . . . . . . . . 60

xiii

Page 14: Jammer Excision Based on Computational Intelligence Techniques

3.6 Flowchart of ACO algorithm. . . . . . . . . . . . . . . . . . . . . . . . . 61

3.7 Bit selection of ants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

4.1 Block diagram of a CDMA System with an Excision Filter. . . . . . . . . 67

4.2 Surface plot of the cost function. . . . . . . . . . . . . . . . . . . . . . . 69

4.3 Flow chart of the PSO algorithm for jammer excision. . . . . . . . . . . . 72

4.4 Flow chart of the GA for jammer excision. . . . . . . . . . . . . . . . . . 76

4.5 Flow chart of the ABC for jammer excision. . . . . . . . . . . . . . . . . 78

4.6 Flow chart of the ACO for jammer excision. . . . . . . . . . . . . . . . . 81

5.1 Bit Error Rate Performance of CDMA system . . . . . . . . . . . . . . . 84

5.2 BER performance vs Interfer power . . . . . . . . . . . . . . . . . . . . . 85

5.3 Convergence of fitness or objective function for different variants of PSO. 86

5.4 Convergence of fitness or objective function for various heuristic algorithms. 87

5.5 Frequency domain view of CDMA signal with jammer. . . . . . . . . . . 88

5.6 Time Frequency domain view of CDMA signal with jammer. . . . . . . . 89

5.7 Filter visualization after 50 iterations. . . . . . . . . . . . . . . . . . . . . 90

5.8 Filter visualization after 250 iterations. . . . . . . . . . . . . . . . . . . . 91

5.9 Filter visualization after 500 iterations. . . . . . . . . . . . . . . . . . . . 92

5.10 TF plot of CDMA signal with chirp jammer . . . . . . . . . . . . . . . . 95

xiv

Page 15: Jammer Excision Based on Computational Intelligence Techniques

List of Tables

3.1 Key terms used in PSO. . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

4.1 Inertial Weights for types of PSO . . . . . . . . . . . . . . . . . . . . . . 74

4.2 General Parameters for Simulation of GA . . . . . . . . . . . . . . . . . . 75

4.3 General Parameters for Simulation of ABC . . . . . . . . . . . . . . . . . 77

4.4 General Parameters for Simulation of ACO . . . . . . . . . . . . . . . . . 80

xv

Page 16: Jammer Excision Based on Computational Intelligence Techniques

List of Acronyms

ABC Artificial Bee Colony

ACO Ant Colony Optimization

AJ Anti Jamming

APP A Posteriori Probability

BER Bit Error Rate

BPSK Binary Phase Shift Keying

CATV Cable Television

CFIW Constriction Factors Inertial Weight

CDMA Code Division Multiple Access

CG Conjugate Gradient

CGA Continuous Genetic Algorithm

DS Direct Sequence

DSSS Direct Sequence Spread Spectrum

DTTB Digital Television Terrestrial Broadcasting

EA Evolutionary Algorithm

FIR Finite Impulse Response

FDMA Frequency Division Multiple Access

FEC Forward Error Correcting Codes

FFT Fast Fourier Transform

GA Genetic Algorithm

IEEE Institute of Electrical and Electronics Engineering

IF Instantaneous Frequency

IFFT Inverse Fast Fourier Transform

INLP Integer Nonlinear Optimization Problem

ISI Inter Symbol Interference

LAN Local Area Network

xvi

Page 17: Jammer Excision Based on Computational Intelligence Techniques

LDIW Linearly Decreasing Inertial Weight

LLR Log Likelihood Ratio

LMS Least Mean Squares

LPI Low Probability of Intercept

MAI Multiple Access Interference

MINLP Mixed-Integer Nonlinear Optimization Problem

ML Maximum Likelihood

MMSE Minimum Mean Square Error

MRC Maximum Ratio Combining

MT-CDMA Multitone-Code Division Multiple Access

MUD Multiuser Detector

NBI Narrowband Interference

NEIW Natural Exponential Inertial Weight

PIC Parallel Interference Cancellation

PN Pseudo Noise

PSO Particle Swarm Optimization

QAM Quadrature Amplitude Modulation

QoS Quality of Service

QPSK Quadrature Phase Shift Keying

RIW Random Inertial Weight

RF Radio Frequency

SD Sphere Detection

SDMA Space Division Multiple Access

SIC Serial Interference Cancellation

SNR Signal to Noise Ratio

SS Spread Spectrum

SSMA Spread Spectrum Multiple Access

STFT Short Time Fourier Transform

xvii

Page 18: Jammer Excision Based on Computational Intelligence Techniques

TDD Time Division Duplex

TDMA Time Division Multiple Access

TF Time Frequency

TFD Time Freqency Distribution

ZF Zero Forcing

xviii

Page 19: Jammer Excision Based on Computational Intelligence Techniques

Chapter 1

Introduction

Noise in a communication channel can be intentional or un-intentional. Intentional noise

is generally referred to as jamming and un-intentional as interference. Jamming is a

procedure that attempts to block the reception of a desired signal by the intended receiver

[1]. It is usually a signal with large power that cohabits the desired signal in frequency

spectrum, time slot or space with an objective to block or try to block the receiver from

getting desired signal. Jammer excision techniques intend to counter this threat. These

techniques attempt dimensional separation of the jammer. A jammer is analyzed for its

dimensions in terms of time, frequency or space and thus segregated from the desired

signal on this basis. Jammer excision techniques results in some degradation of the

desired signal, for example suppressing jammer frequencies will also lose desired signal

that occupies the same frequency band.

Jammer excision techniques often need to be time varying because of the dynamic

or changing nature of the jamming signal and the channel. A-priori information on the

statistics of the data being processed is needed for designing an optimum filter.

There exist many diverse techniques for jammer excision, which includes notched

filters [2], direct jammer synthesis [3], amplitude domain processing and adaptive anten-

nas. These techniques are classified broadly as adaptive notch filtering, decision feedback,

adaptive analog to digital conversion and non-linear techniques [4, 5].

The methods for suppressing interference/jamming of various types in Direct Sequence

(DS) and Frequency Hopped (FH) spread spectrum systems are discussed in [6] and it has

been concluded that linear and nonlinear filtering methods are particularly effective in

suppressing continuous-time narrowband interference. In [7–9] performance improvement

has been shown by the use of transversal filters in DS spread spectrum (DSSS) system

1

Page 20: Jammer Excision Based on Computational Intelligence Techniques

Figure 1.1: Jammer types based on channelized spectrum. (a) and (b) full band jam-ming, (c) contiguous partial band jamming, (d) noncontiguous partial band jamming,(e) narrowband noise jamming, (f) single tone jamming and (g) multi tone jamming.

in the presence of Narrowband Interference (NBI). Various methods have been proposed

for NBI suppression in [10–13].

1.1 Types of Jammers

There are several types of jammers that can be employed against a communication sys-

tem. Jammers are classified according to their distribution of jammer power in fre-

quency [14]. Some of these are illustrated in Figure 1.1 and briefly discussed as follows.

2

Page 21: Jammer Excision Based on Computational Intelligence Techniques

1.1.1 Full band jamming

A full band jammer occupies all the bandwidth being used by the affected communication

signal. It is also known as barrage jamming or broadband noise jamming. This type of

jamming directly corrupts the capacity of the channel. In this case jammer power is low

because limited jammer power is spread over a very wide bandwidth. This type of jam-

ming essentially raises the background (thermal) noise level for the receiver thus making

the communication system difficult to operate. It also decreases the range over which

the communication system is effective. It also disrupts the process of synchronization.

1.1.2 Partial band jamming

Partial band jamming puts energy of jamming signal into several channels of spectrum

under utilization but also leaving some of them unaffected. Channels being jammed

sometimes can be and other times can not be adjoining. This type of jamming when

optimally employed is able to perform even better than a full band jammer.

1.1.3 Narrowband jamming

All the energy is put in a single channel by a narrowband jammer.

1.1.4 Tone jamming

Single or multiple jammer tones are put in the spectrum by a tone jammer. A single

tone is put by a single tone jammer also known as a spot jammer. A number of tones

are placed by a multi-tone jammer. A multi-tone jammer is called comb jammer if the

tones placed by it are in adjoining channels.

1.1.5 Swept jamming

A tone sweeps the spectrum of interest in time by a swept jammer. The jamming tone

consists of a single frequency at any given instant of time. Its ever changing frequency

3

Page 22: Jammer Excision Based on Computational Intelligence Techniques

SS Receiver

Received Signal

H( )Estimated

Bit

Figure 1.2: Basic structure of a transform domain exciser

is able to jam a wide spectrum within a limited interval of time.

1.1.6 Pulse jamming

A pulse jammer continuously cycle through ‘ON’ and ‘OFF’ states. Pulses with short

width in time have a wider spectrum. It is comparable to partial band jamming.

1.2 Techniques for Jammer Excision

This section introduces jammer excision techniques in brief. The numerous techniques

for suppressing NBI can be classified into three fundamental categories.

1) Frequency Domain Techniques

2) Predictive Techniques

3) Code Aided Techniques

1.2.1 Frequency Domain Techniques

These techniques apply a notch filter however the implementation is unlike processing

in time domain. The signal received is converted from time domain to a new domain,

thus enabling an easy separation of desired and jamming signal. The jamming signal is

removed by a notch filter and then afterwards converted back to time domain. This signal

is then used for additional processing in the next stages of receiver. The general structure

of transform domain technique is shown in Figure 1.2. An adaptive version of transform

4

Page 23: Jammer Excision Based on Computational Intelligence Techniques

FourierTransform

MatchedFilter

InverseTransform

Switch orattenuator

EnvelopeDetector

ThresholdDevice

Corruptedinput

OutputData

Figure 1.3: Adaptive transform domain interference suppression

domain method is shown in Figure 1.3. The adaptive method is advantageous in the

situations when jammer do not severely distort the desired signal. In these situations the

excision can cause more degradation than the jammer. Various transforms for excising

jammer have been recommended including Real Time Fourier Transform, Time Frequency

Distributions, Wavelet Transforms, etc.

The insights into the spectral features of a signal are given by their analysis. Fourier

analysis is one of the most widely used tool for it [30]. It converts the time domain signal

into frequency domain in the form of a weighted sum of distinct frequency sinusoids. This

transformation gives the major frequencies constituting the time domain signal. The

received signal is transformed into frequency domain in real time and then its product

with a waveform suppresses the jammer power without significant loss of desired signal

power. Figure 1.4(a) shows the output of Fourier transform of received signal corrupted

by interference. The spectrum of excision filter is shown in Figure 1.4(b). The result

of multiplication of the two spectra is shown in Figure 1.4(c). This type of technique is

very practical for situations in which the jammer varies slowly or it is stationary. Fast

varying and nonstationary jammers require other transformations like Time Frequency

Distributions (TFD) [31].

5

Page 24: Jammer Excision Based on Computational Intelligence Techniques

Magnitude

Magnitude

ω

ω

InterferenceSpectrum

SignalSpectrum

H (ω)

ProductSpectrum

ω

Magnitude

(a)

(b)

(c)

Figure 1.4: Interference suppression using notch filter

1.2.1.1 Time Frequency Distributions

Time Frequency Distributions show the characteristics of signals in both frequency and

time domains at the same time [25]. TFD based techniques have great potential for their

usage in applications involving multiple disciplines. Jammers with non stationary char-

acteristics, e.g linear FM chirps and sinusoidal FM signals can be suppressed using TFDs.

Signals with random variations of instantaneous frequency (IF) can also be removed by

it efficiently. Figure 1.5 shows the application of TFD for jamming excision using open

loop adaptive filters. The IF of jammer is identified in the received signal and adaptive

6

Page 25: Jammer Excision Based on Computational Intelligence Techniques

Received Signal Bit EstimateAdaptive Notch Filter

Time Frequency Distribution

SS Receiver

Figure 1.5: Interference suppression using open loop adaptive filter

notch filter suppresses the jammer components in it.

Another more powerful technique based on time frequency distributions is Time Fre-

quency Masking. In this method the jammer signals can be localized in the T-F plane

and then removed without severely distorting the original signal [18–22]. First the Time-

Frequency analysis of the signal e.g. Short Time Fourier Transform (STFT) have to be

performed to compute an estimate Ax (n, ω) of the two-dimensional energy distribution

function of the signal. The time frequency masking is achieved by modifying the Ax (n, ω)

with a binary masking matrix M as

Ay (n, ω) = Ax (n, ω)M (n, ω) (1.1)

Where Ay (n, ω) is the two-dimensional energy distribution function of the masked signal.

The entry M (n, ω) is set to zero for an (n, ω) T-F point which corresponds to the

Instantaneous Frequency (IF) of interference and otherwise it is one. The output can be

synthesized by taking inverse transform e.g inverse STFT. TF masking techniques can

be applied using any one of the two possible approaches [23]. One approach first masks

out jammer then synthesize the desired signal which is further used for processing. In

the second approach the desired signal is masked out and jammer signal is synthesized

and afterwards subtracted from the received signal. Both methods are practical and the

7

Page 26: Jammer Excision Based on Computational Intelligence Techniques

Figure 1.6: TFD of spread spectrum signal with Linear FM chirp Jammer

choice is made on the ease of synthesis. TF analysis methods include Short Time Fourier

Transform, Wavelet Transform and Lapped Transform.

To illustrate the excision of jammer an example of a spread spectrum signal was taken

with AWGN and chirp jammer. T-F mask was applied for excising chirp jammer. Figure

1.6 shows spectrum of spreaded signal along with AWGN and chirp jammer. Figure

1.7 shows the spectrum after applying the TF Masking. It is evident that TF masking

suppresses the non stationary chirp jammer effectively.

1.2.2 Predictive Techniques

The predictive techniques work in time domain. These techniques take advantage of the

difference in ability to predict a broadband signal and a narrowband signal. In a sum

of broadband and narrowband signals, the narrowband can be predicted accurately and

8

Page 27: Jammer Excision Based on Computational Intelligence Techniques

Figure 1.7: TFD of spread spectrum signal after excision

its subtraction from the composite signal removes the narrowband signal. Hence this

method is of great importance for removing narrowband jammers from wideband signals.

The signal after subtraction of predicted signal from the received signal is used for further

processing in the receiver. Figure 1.8 shows the basic structure and process of this type

of techniques.

The predictive techniques can be either linear or non-linear. The most commonly used

linear predictor is finite impulse response (FIR) linear predictor which has a structure

of tapped delay line as shown in the Figure 1.9. In this structure a FIR filter with L

number of taps acts as a one step predictor. The discretized received signal r convolves

with FIR filter having coefficients α. The predicted sample rn is subtracted from the

current sample rn thus giving a residual sample En free from jammer. For a stationary

jammer optimal filter coefficients can be found by Levinson algorithm [33]. This structure

can easily be converted to an adaptable form by finding the coefficients using Least Mean

9

Page 28: Jammer Excision Based on Computational Intelligence Techniques

Estimating Filter

Received Signal

SS Receiver Bit Estimate

Figure 1.8: Basic structure of a predictive exciser

Squares (LMS) algorithm. There are also nonlinear predictors both fixed and adaptive

for suppressing the jammer.

D DD D

X X X

+

-+

rn rn-1 rn-2 rn-L

1(n) 2(n) L(n)

rn

En

Figure 1.9: Structure of a tapped delay line predictor

1.2.3 Code Aided Techniques

These techniques show even additional enhancement of performance with the help of

the knowledge of the structure desired signal. Many of these techniques are based on

10

Page 29: Jammer Excision Based on Computational Intelligence Techniques

the linear multiuser techniques [32]. Two of the most widely used techniques are Zero

Forcing (ZF) and Minimum Mean Square Error (MMSE). The ZF detector is also known

as decorrelating detector. In this type of detector the soft output of a convetional CDMA

detector is multiplied to the inverse of correlation matrix containing entries of correlations

amongst all code pairs. This operation decouples the various user’s data and eliminates

the Multiple Access Interference (MAI) and narrowband interference. A disadvantage of

ZF detector is noise enhancement. In order to avoid noise enhancement MMSE detector

decouples users data without enhancement of background noise. It uses an inverse of

modified correlation matrix which has been modified to cater the background noise. It

performs better than ZF in the presence of noise but its drawback is that it requires

estimate of received amplitudes. ZF detector has been proposed for NBI suppression

in [34] while MMSE was proposed in [35].

1.2.4 Wiener Filtering

Wiener filter reduces the effect of jamming by comparison with the desired noiseless

signal. Pilot sequence is transmitted for designing of filter and is known at the receiver.

Performance criterion of Wiener filter is minimum Mean Square Error(MSE). The MSE

is defined as:

MSE (w) = E[e2 (n)

]=

1

N

[N∑

k=1

(Pilotdata (n)− Filtereddata (n))2

](1.2)

The Wiener filter is designed to achieve an output close to the desired signal Pilotdata by

finding the optimum filter coefficients that minimize the MSE between the pilot signal

and filtered signal, which can be stated as:

wopt = arg min {MSE (w)} (1.3)

11

Page 30: Jammer Excision Based on Computational Intelligence Techniques

The Wiener filter coefficients wopt are given by:

wopt = R−1P (1.4)

Where R is the autocorrelation matrix of the received pilot signal and P, the cross

correlation matrix between the received signal and the pilot signal. Received signal is

filtered using this wopt as FIR filter weights to achive jammer free signal. The output of

the filter is further processed for detection.

1.3 Performance Improvement using Jammer Exci-

sion Techniques

Jammer excision techniques improve the performance of a communication system oper-

ating in a jamming environment. The performance improvement by these techniques is

reflected by the enhanced capacity, lesser error rate and greater acquisition capability

of the communication system. Another important application of these techniques is in

radiometer and intercept receivers. These are discussed in detail as follows.

1.3.1 Capacity

It is possible for narrowband users and DSSS users to coexist in the spectrum thus

enhancing overall capacity of the spectrum if only one of them has been utilizing it. This

coexistence requires either of them not to cause unbearable interference for the other.

Suppression of interference by narrowband users can be achieved using signal processing

techniques ensuring that DSSS users face only its bearable level. This performance

enhancement by suppression in DSSS system allows its users to reduce power thus in

turn providing relief to narrowband users [27]

12

Page 31: Jammer Excision Based on Computational Intelligence Techniques

Received Signal Bandpass

Filter IntegratorSquarer

Figure 1.10: Basic structure of a radiometer

1.3.2 Acquisition Capability

The synchronization of CDMA receiver with the transmitter with a preset uncertainty

is known as Code Acquisition. Once synchronization is achieved, it is maintained by the

tracking system that performs fine synchronization for the receiver. The vitally impor-

tant components of receiver include both code acquisition and tracking systems. The

desired signal can not be detected correctly if these systems stop functioning. Jamming

interference impairs the ability of the receiver to synchronize properly or keep itself in

synchronization. Narrowband jamming interference suppression enhances the code ac-

quisition system and helps tracking system keep the receiver in synchronization lock [28].

The two modes of acquisition system are Lock mode and Search mode. Search can be

either performed serially or in parallel. Narrowband suppression performs well for both

types of search. Multiple correlations are carried out concurrently in parallel search mode

while in serial search mode the received signal is correlated with reference waveforms one

after the other. The correlation that gives largest value indicates the synchronization

location. The lock mode follows sometimes directly after the preliminary result while at

other times the preliminary result is validated in search mode repeatedly before entering

it. In lock mode the position is continuously compared with a threshold that determines

whether to remain in lock mode or restart search mode synchronization.

Interference suppression makes the receiver invulnerable to interference during the

acquisition or synchronization. The system performance is enhanced in lock mode by

decreasing false alarm probability. The worst case of interference is a single tone jammer

positioned at transmitter’s carrier frequency [29].

13

Page 32: Jammer Excision Based on Computational Intelligence Techniques

Received Signal

Bandpass Filter IntegratorSquarerFourier

Transform X Inverse FourierTransform

H (ω)

Figure 1.11: Radiometer with transform domain interference suppression

1.3.3 Detection of Spread Spectrum Signals

The existence of SS communication is detected by using intercept receivers. A total power

radiometer is generally employed as an intercept receiver. The construction of radiometer

is given in Figure 1.10 and it includes bandpass filter, squarer and an integrator. This

instrument checks the presence of signal in a frequency range by monitoring integrator

output and comparing it with a threshold. A false alarm is generated if a narrowband

user is present in the same band even if no SS is present in the band. This is due to

its working principle of finding total received energy in the band. An excision filter as

shown in Figure 1.11 suppresses the narrowband interference and decrease the possibility

of false alarm. If interference is not suppressed, the system becomes useless [30].

1.4 Estimation of Instantaneous Frequency of Jam-

mer

Some of the methods mentioned in section 1.2 require perfect estimation of the IF of the

jammer to produce optimum results. Any error in its estimation will cause degradation

in signal to noise ratio (SNR). Instantaneous frequency can be estimated using time

frequency distributions [25]. Another method is time varying autoregressive model based

IF estimator [26].

14

Page 33: Jammer Excision Based on Computational Intelligence Techniques

1.5 Purpose of Research/Motivation

Computational intelligence techniques based on nature inspired heuristics have been ap-

plied to solve many diverse optimization problems. These problems include network

routing, scheduling and function optimization problems. Nature inspired optimization

algorithms are based on several natural models e.g. Evolutionary computation is based

on the natural process of evolution that includes Evolution Strategies [59], Genetic Pro-

gramming [58], Genetic Algorithms [56] and Evolutionary Programming [55]. The search

for food by ants led to Ant Colony Optimization [54], or social behavior of bird flock

inspired the Particle Swarm Optimization [57]. The universal application of these tech-

niques for solving diverse nature of problems is due to their generality. In order to get

superior outcome from these techniques, problem related alterations and hybrid versions

were evolved as well. This has led to existence of wide range of problems and vast number

of techniques. A researcher in this field therefore handles this multiplicity of problems

and techniques. It is essential to assess the recently developed techniques with variety

of problems. The suitability of variety of techniques is also tested for an optimization

problem. As a result, a model free situation that splits apart the algorithm and problem

realization compliments easy replacement of each of them. In this research, the problem

of optimal jamming excision is solved using generic, flexible and extensible computational

intelligence techniques.

1.6 Outline of the Thesis

Jammer excision can be achieved by designing an excision filter in time domain and then

can be applied on received signal, thus removing jamming signal from the desired signal.

Computational Intelligence techniques are a promising tool for efficient design of excision

filter. Computational Intelligence based techniques have been employed in this thesis

for jammer excision for CDMA system without any prior knowledge of instantaneous

frequency of the jammer. These are nature inspired and population based techniques.

15

Page 34: Jammer Excision Based on Computational Intelligence Techniques

These include

• Particle Swarm Optimization

• Continuous Genetic Algorithm

• Artificial Bee Colony

• Ant Colony Optimization

These techniques are introduced and discussed in more details in the subsequent chapters.

These techniques have been adapted and modified for optimal excision in this thesis. A

new variant of PSO is also proposed that outperforms existing ones. Optimal values of

control parameters for this application have been found out by experimentation. The

performance of designed filter is checked for Bit Error Rate of CDMA system and the

techniques are evaluated for their fast convergence.

1.7 Summary of Contributions

The author’s contribution in the field of jammer excision using computational intelligence

techniques is summarized as follows.

• Optimized Jammer Excision based on non-conventional Computational Intelligence

techniques has been presented for the first time according to the best of author’s

knowledge.

• Several Computional Intelligence techniques i.e. Particle Swarm optimization (PSO),

Genetic Algorithm (GA), Artificial Bee Colony (ABC) and Ant Colony Optimiza-

tion (ACO) have been applied for the first time to optimize a real-life jammer

excision problem.

• These techniques were optimized for the jammer excision by the tuning and choice

of parameter values.

16

Page 35: Jammer Excision Based on Computational Intelligence Techniques

• The proposed excision techniques have reasonably low complexity overhead, while

keeping a near optimal performance.

• The above research work has been presented in International Conference on In-

telligent Computing (ICIC 2008) and IEEE International Multitopic Conference

(INMIC 2005)

• Most of the work has been published in journals of international repute such as

Lecture Notes in Computer Science (LNCS), 5226, Springer-Verlag Berlin Heidel-

berg, pp. 601-609, 2008 and Journal of Circuits, Systems and Computers(JCSC)

vol. 19, No.1 (2010) pp. 123-138.

1.8 Organization of Thesis

The thesis is organized as follows. Initial part of the thesis deals with the basic concepts

of wireless communications and jammer excision. Chapter 2 discusses Code Division

Multiple Access Communication System. Nature inspired computational intelligence

techniques are discussed in chapter 3. Jammer excision using computational intelligence

techniques is given in chapter 4. Chapter 5 presents numerical results and discussions.

Finally chapter 6 concludes the thesis with recommended future work.

17

Page 36: Jammer Excision Based on Computational Intelligence Techniques

Chapter 2

Code Division Multiple Access

2.1 Introduction

Wireless communication is passing through its fastest growth of developments and chal-

lenges in the history. The desire for enormous increase in throughput and bandwidth

efficiency is also increasing. The greatest current challenge for future wireless commu-

nication systems is therefore to provide broadband mobile data access with a quality of

service (QoS) as high as possible. The key role in mobile radio techniques is played by

the effective bandwidth availability and only a limited bandwidth for data transmission

is available to each wireless service. It means that spectrum is a very scarce commodity

and it should be exploited as efficiently as possible. The desired increase in communica-

tion speed requires smarter and more complicated communication algorithms that can

exploit the available resources through various multiple access methods, as efficiently as

possible. At present following are the available means.

• Time

• Frequency

• Code

• Space

The first three resources above find applications in Time Division Multiple Access

(TDMA), Frequency Division Multiple Access (FDMA) and Code Division Multiple Ac-

cess (CDMA) respectively, even in combination, in existing systems. The resource of

space is now becoming popular for multiple access communication as Space Division

18

Page 37: Jammer Excision Based on Computational Intelligence Techniques

frequency

FDMA

timetimetime

frequencyfrequency

TDMA CDMA

Figure 2.1: Multiple access schemes.

Multiple Access (SDMA). It is accessed through the use of multiple antennas both on

the transmitter and the receiving side.

A part of the spectrum called channel is allocated to a pair of communicators for all

of the time in FDMA. All or at least a large of chunk of spectrum is allocated to a pair

of communicator for a part of the time known as slot in TDMA. CDMA is unique in

allotting whole spectrum for the entire time to every user. CDMA uses orthogonal codes

to distinguish users. Figure 2.1 shows pictorial view of all the schemes.

2.2 Code Division Multiple Access

Code Division Multiple Access is an emerging commercial communication technique. Its

origins are in the military and navigation systems. It provides a secure digital com-

munications that is now being used extensively for industrial and commercial purposes.

Spread spectrum communication will touch everybody’s life in the coming years. Appli-

cations for commercial spread spectrum range from wireless local area networks (LANs),

palmtop computers, radio modem devices for warehousing, integrated bar code scanner,

digital cellular telephone communications, city, area, state or country wide networks for

19

Page 38: Jammer Excision Based on Computational Intelligence Techniques

Figure 2.2: Block diagram of DS-CDMA transmitter.

passing faxes, computer data, e-mail, or multimedia data.

A type of CDMA known as time hopping spread spectrum multiple access [36] carries

asynchronous signals over a shared medium. CDMA was introduced in 1949 [36] that

exhibited interference averaging effect. De Rosa-Rogoff proposed in 1950 another sys-

tem called Direct Sequence Spectrum-Spectrum (DS-SS) with the concept of processing

gain. The cellular application of spectrum-spectrum WAN was suggested by Cooper

and Nettleton in 1978 [38]. Qualcomm investigated DS-CDMA technique which finally

commercialized the cellular Spectrum-Spectrum communication in the form of narrow

band CDMA IS-95 standard in July 1993 which started commercial operation in 1996.

Wideband CDMA technique have been studied during 1990s throughout the world

and several trial systems have been developed [39] having bandwidths of 5 MHz or more.

More multipaths can be resolved using the bandwidth of 5 MHz than a narrow bandwidth

thus enhancing performance and increasing diversity. Higher data rates can be supported

more efficiently by even wider bandwidths.

In CDMA, each user is allocated a distinct code for spreading its data. The receiver

decodes the received signal after reception and recovers the original data. This is possible

because the cross correlations between the code of desired user and the codes of other

20

Page 39: Jammer Excision Based on Computational Intelligence Techniques

Datademodulator

Codesynchronization/

tracking

CarrierGeneration

CodeGeneration

DespreadingData

Figure 2.3: Block diagram of DS-CDMA receiver.

users are small. Because the transmission bandwidth of the code is substantially greater

than the information bandwidth to achieve this particular operational advantage. The

encoded signal enlarges the spectrum of the signal and is therefore known as spread

spectrum modulation. The resulting signal is also called a spread-spectrum signal and

CDMA is often denoted as spread-spectrum multiple access (SSMA). These signals are

intentionally made to be much wider band than the information signal to make them

more noise-like. Being noise like, it is hard for an opponent to intercept or demodulate

the spread spectrum signals. The multiple access capability of CDMA is due to this

spectral spreading of the transmitted signal. The basic structure of a CDMA transmitter

is shown in Figure 2.2. If the spreading code have a duration Tc (also known as chip

duration), then

L =Tb

Tc

(2.1)

where Tb is the duration of the the transmitted bit (also known as bit duration of the

digital signal) and the bandwidth expansion factor L is also known as processing gain.

The bandwidth Wt of digitally transmitted signal is assumed to be limited within (1/Tb).

Note that Wt is equivalent to (1/Tc), and the data rate R is equivalent to (1/Tb), (2.1)

can also be written as

L =Wt

Wi

21

Page 40: Jammer Excision Based on Computational Intelligence Techniques

Block diagram of CDMA receiver is shown in Figure 2.3. The desired user code is

generated at the receiver, which is synchronized with the transmitter. The received

signal is correlated with this locally generated code for obtaining the information from

the received signal. The receivers necessarily require the desired users spreading code for

despreading received data.

While other communication techniques try to minimize the transmission bandwidth,

CDMA enlarges the transmission bandwidth. A number of properties of CDMA signals

differ from those of narrow band signals. Some of these are the following

2.2.1 Multiple Access Capability

Every user in CDMA utilizes same bandwidth all of the time, yet it has the ability to

discriminate each user’s signal by its distinct code. The only constraint on user codes for

distinguishing is to have low correlation with each other. The despreading operation of

the received signal with the desired user’s code only despreads the desired user’s signal

while other users signals remain spreaded. Thus the power of the desired user will be

larger than the power of the other interfering users and the desired user’s signal can be

extracted provided there are not too many users. Figure 2.4 shows an example which

shows signals of two CDMA users before and after spreading. Composite signal of both

users is shown in Figure 2.4(e) and Figure 2.4(f) shows the despreaded signal using code

of user 1.

2.2.2 Immunity from Narrowband Interference

Narrowband interference having energy below a threshold power level do not seriously

affect CDMA communication. As only a small fraction of spread spectrum signal is af-

fected by the narrowband signal, therefore it can be removed using a notch filter with

negligible loss to desired signal. The spreading operation of the narrow band signal with

the code signal spreads the narrow band signal thereby reducing the power of the interfer-

ence signal in the interference bandwidth as shown in Figure 2.5. The receiver despreads

22

Page 41: Jammer Excision Based on Computational Intelligence Techniques

1

2

1

2

1 & 2

2

1

(a)

(b)

(c)

(d)

(e)

(f)

Figure 2.4: Multiple access in CDMA.

the SS signal while spreading the interfering signal. This results in a strong despread

signal with interference reduced to a background noise. Forward Error Correcting Coding

(FEC) and interleaving can be used to assist in recovering this lost data.

2.2.3 Resistance to Multipath Interference

There is generally no direct line-of-sight path between transmitter and the receiver and

several time delayed and attenuated versions of the transmitted signal reach the receiver

23

Page 42: Jammer Excision Based on Computational Intelligence Techniques

s

i

(a)

i

s

(b)

Figure 2.5: Interference rejection.

as a consequence of reflections, scattering and diffractions off the buildings, hills and the

other obstacles in the environment. These signals, called multipath waves are added at

the receiver with different phases as a result of propagation delays and provide an effective

combined signal which can vary widely in amplitude and phase. Due to multipath effects,

the receiver goes on receiving copies of the transmitted signal and there is a sufficient time

difference between first and the last copy. This produces ISI in the received signal relative

to the transmitted signal. CDMA signals are designed withstand effects of multipath

fading. Multipath causes fading only in a fraction of the very wide bandwidth being

utilized by the SS signal. The loss caused by it is very minimal and recoverable similar

to the loss by narrowband interferer. The immunity of CDMA to multipath interference

is due to property of having very low correlation of the original pseudorandom code with

its delayed version. Even a delay of one chip duration induced by multipath channel

appears uncorrelated hence it is not taken into account.

Some CDMA receiving sets have the ability to exploit multipath components of the

signal by using a RAKE receiver. A simple receiver has only one correlator which is

tuned to the delay of strongest component of signal. On the other hand RAKE receiver

has a number of correlators that are tuned to different delays. These correlators combine

24

Page 43: Jammer Excision Based on Computational Intelligence Techniques

their outputs for improved performance.

2.2.3.1 RAKE Receiver

The CDMA receiver can resolve multipath signals that are delayed by more than a single

chip duration. TDMA and FDMA are not immune from multipath fading because these

are narrowband systems unable to resolve different multipath signals received. Equaliza-

tion is employed to mitigate effects of multipath by TDMA and FDMA. CDMA being

wideband takes advantage of multipath signals by combining their energy. Multiple cor-

relators (fingers) exist in a RAKE receiver which keep searching for various multipath

signals. Each correlator after despreading and demodulating a different multipath com-

bine together using for example, maximal ratio combining (MRC) to make the signal

stronger. Because the received multipath signals are faded independently from each

other, the performance is improved. Figure 2.6 illustrates the principle of RAKE re-

ceiver. Binary data is spread by the spreading code and is transmitted through a three

path channel after modulation. The multipath channel is modeled by a delay line, each

path having delays D1, D2, D3 and a1, a2, a3 corresponding attenuations. The composite

signal is demodulated at the receiver and is correlated by three fingers of the RAKE. In

each finger the code is time-aligned with the delay of the multipath signal. Each signal

is weighted by the complex conjugate path gain and after despreading the signals are

combined using MRC.

2.2.4 Antijamming Capability

CDMA has antijamming capability i.e. it is harder to jam than the narrowband signals.

Due to these features, the military has used SS for so many years. These applications

including guidance and communication systems. Although in recent times SS has mi-

grated to commercial communications from the military applications. The SS signals are

collected onto their original frequency at the receiver by despreading operation.

SS uses a much broader bandwidth than actually required for a signal in order to have

25

Page 44: Jammer Excision Based on Computational Intelligence Techniques

Binary Data Wideband

modulator

Code Generation

x

Carrier Generation

D1

D2

D3

+

a1

a2

a3

+

a1

a2

a3

x

x

x

C(t-D1)

C(t-D2)

C(t-D3)

RAKEReceiver

Demod

Figure 2.6: Principle of RAKE receiver.

improved signal to noise ratio. It uses spreading codes that give the signals after spreading

the properties of a broadband noise. These properties provide the communication a

feature known as Low Probability of Intercept (LPI). It is not possible by conventional

methods of narrowband communications to detect an ongoing SS communication.

Spread spectrum signal has energy spread in a wide frequency band with having low

noise like spectral density. Spread spectrum system is not affected by the presence of a

narrowband signal as the correlation receiver performs integration over a much broader

bandwidth. A narrowband interference signal is spread out by the correlator over the

entire bandwidth during detection. SNR at the receiver input is a factor to determine the

occurrence of interference. An interference threshold level exists for every spread spec-

trum system beyond which it is not possible to communicate. This level is associated

with the systems processing gain. Ratio of bandwidth after spreading to the bandwidth

of users signal before spreading is the processing gain. The interference rejection capa-

bility of a spread spectrum system is defined by its jamming margin. Following are the

parameters for calculating it.

S = received power for the desired signal in W.

J= received power for undesired signals in W (jamming, other multiple access users,

multipath, etc.).

Eb=received energy per bit for the desired signal.

26

Page 45: Jammer Excision Based on Computational Intelligence Techniques

N0=equivalent noise spectral power density in W/Hz.

Then the ratio of the equivalent noise power J to S is

J

S=N0W

Eb/Tb

=W/R

Eb/N0

(2.2)

When the value of Eb/N0 is set to that required for acceptable performance of the com-

munications system, then the ratio J/S bears the interpretation of a jamming margin.

Spread spectrum signals are resistant to jamming and interception by un-intended

user. Its signal can not be exploited especially in military applications where a non

network member can not listen or use information. Another feature is that it is hard to

spoof in which false traffic is introduced in a network. Security of the communication

is another feature that ensures secrecy and privacy. More than one levels of secrecy is

available using encryption without any significant increase in complexity. These features

are not required in routine applications or needs of a LAN however these are important

concepts.

2.2.5 Synchronous CDMA

Data strings are represented by mutually orthogonal vectors in synchronous CDMA.

The sum of the product of corresponding components of two vectors is called a dot

product. Two vectors are orthogonal if they satisfy the condition that their dot product

is zero. Two real-valued waveforms x (t) and y (t) are said to be orthogonal if their

cross-correlation Rxy (0) over Tb is zero, where

Rxy (0) =

∫ T

0

x (t) y (t) dt (2.3)

=

∫ Tb

0

am (t)Cm (t) an (t)Cn (t) dt (2.4)

= 0 (2.5)

27

Page 46: Jammer Excision Based on Computational Intelligence Techniques

Figure 2.7: An example of four mutually orthogonal digital signals.

where Cm (t) and Cn (t) are spreading codes assigned to users m and n respectively.

In discrete time, the two sequences x (t) and y (t) are orthogonal if their cross-product

Rxy (0) is zero. The cross product is defined as

Rxy = xTy =N∑

i=0

xiyi (2.6)

= amCm (i) anCn (i) (2.7)

= 0 (2.8)

Figure 2.7 shows few orthogonal signals.

28

Page 47: Jammer Excision Based on Computational Intelligence Techniques

2.2.6 Asynchronous CDMA

Two users were multiplexed using orthogonal Walsh codes in the preceding example for a

synchronous system. This multiplexing technique is known as Code Division Multiplexing

(CDM). All the users are synchronized so that their transmitted signals arrive at the same

time at the receiver. This method is employed for the link from base station to the mobile

stations because the coordinated transmissions are only possible from here.

However synchronization of mobile to base link is not perfectly possible due to the

motion of handset. It requires a special method to handle it. As the code sequences start

randomly it is not achievable mathematically to have mutually orthogonal code sequences

with different starting points. Asynchronous CDMA therefore employs distinct code

sequence for each user. Encoding and decoding is similar to the synchronous CDMA. The

codes used in Asynchronous CDMA are statistically uncorrelated but still summation of

many code sequences produce Multiple Access Interference (MAI). Central limit theorem

is applicable to approximate MAI as Gaussian noise when large number of simultaneous

users exists. MAI increases proportionally with the number of users if all of them are

received with equal signal strength. In this manner the desired signal will be slightly

impaired by the noise due to signals of other users when compared with synchronous

CDMA.

All the variants of CDMA employ processing gain to distinguish and recover signal

of desired user in the presence of signals of other users and interferers. At the receiver

the de-spreading only recovers the signal that is encoded with same PN code whereas

the signals encoded with different code become a wideband noise. The codes are either

unique or part of the same PN sequence with different offsets in time.

The control of transmitted signal’s power is very critical in CDMA to minimize MAI

produced by all users. Use of orthogonal signaling schemes in TDMA, FDMA and Syn-

chronous CDMA systems rejects any powerful signal. Asynchronous CDMA systems can

only partially reject the undesired signals. In the presence of strong interfering signals

of other users, the detection of desired users signal becomes impossible. It is therefore

29

Page 48: Jammer Excision Based on Computational Intelligence Techniques

necessary in Asynchronous CDMA to receive all signals with matching power. This issue

is known as Near Far Problem. It is addressed using a closed loop power control strategy

at base station to monitor and control transmit power of each of the mobile stations.

The privacy of sent data is ensured in asynchronous CDMA by spreading it with the

help of PN code. The spreading gives the modulated signal properties of noise. It is not

possible to decode spread spectrum signal by any receiver without having the actual code

that was used for encoding it. Unlike narrowband communications CDMA is immune

to jamming. The jamming signal can either corrupt the entire bandwidth or a part of

signal only with its limited power.

2.2.7 Advantages of Asynchronous over Synchronous CDMA

2.2.7.1 Efficient Utilization of Spectrum

The key benefit of Asynchronous CDMA in contrast to FDMA, Synchronous CDMA and

TDMA is its efficient use of spectrum in applications of mobile telephony. In TDMA

based systems it is ensured that transmission times of all users are synchronized to avoid

interference and received in respective time slot. Controlling synchronization perfectly

in a mobile scenario is not possible without allowing a guard time in each slot. This

additional time slot decreases the chance of interference by other users with a cost of

reduced spectral efficiency. FDMA systems in the same way uses guard bands inserted

between neighboring channels. The fast moving users in FDMA experience Doppler

effect due to which the frequency of the user may change and cause interference for the

neighboring channel’s user. Adjacent channels will be farther apart by using guard band

to avoid interference while consuming more spectral resource.

2.2.7.2 Flexible PN Code Allocation

There is a benefit of flexible allocation of PN codes to simultaneous users in asynchronous

CDMA system. There are limitations of frequency slots, time slots and orthogonal codes

30

Page 49: Jammer Excision Based on Computational Intelligence Techniques

in case of FDMA, TDMA and Synchronous CDMA respectively. These limitations make

the utilization of these systems under bursty traffic conditions. Asynchronous CDMA can

support any number of users only limited by the bit error rate. Bit error rate is increased

as the users increase due to rise in interference level. Mobile telephone systems have an

uneven load of calls and at times it has to face sharp increase in load. Under these spikes

of load asynchronous CDMA has to pay in terms of performance that varies randomly.

The mean performance is determined by the number of users and the utilization factor.

The users with higher usage get a constant probability of bit error while occasional users

experience a random rate.

The asynchronous CDMA suits well for a large number of users that have very less

data to send after unequal gaps of time. Under such bursty conditions of data traffic

FDMA, synchronous CDMA and TDMA can not give improved performance due to their

limitations of frequency channels, orthogonal codes and time slots respectively. These

limited resources need to be allocated and deallocated quite frequently. In contrast

asynchronous CDMA transmitter come on the air only when required otherwise they

remain off the air retaining the same code.

2.3 System Model

Consider CDMA system for uplink transmission shown in Figure 2.8. There are M active

users, each transmitting Binary Phase Shift Keying (BPSK) symbols. At the transmitting

side, say mth user bits are spread by a spreading code Cm so that the symbol is now

represented by a sequence of chips am.

At the receiver, the received signal is the result of the summation of the M spread

messages. Originally transmitted messages are recovered by multiplying the received

signal r by corresponding orthogonal codes. After multiplication, signal power is added

over a time interval of Tb, then integrators output is used to determine whether the bit

is -1 or +1. A positive output of integrator results in a decision of +1 and -1 is decided if

31

Page 50: Jammer Excision Based on Computational Intelligence Techniques

r

s1 h1

+sM

aM

na1 Enc

hMEnc

a1^

aM^

x

x

C1

CM

x

C1

x

CM

Figure 2.8: Principle of CDMA. M users are sending M separate bits, a1,a2,...,aM , si-multaneously in the same frequency band and at the same time. Through the use oforthogonal codes C1,C2,..., CM respectively, the receiver recovers the bits perfectly.

integrators output is negative. In an ideal case, the recovered messages a1 (t) and a2 (t)

match perfectly the original baseband messages a1 and a2.

When a code sequence is modulated over a carrier, it generates a signal which is

centered at the carrier frequency and having a frequency spectrum of [sin (x) /x]2. The

width of main lobe and side lobes is dependent on the modulating code’s clock speed.

The spectrum of DS-SS signal varies to some extent due to the modulated data and the

carrier.

The digital data to be encoded employs a local PN code for transmission in a Direct

Sequence (DS) spread spectrum system. The rate of this code is a lot more than the

rate of the data. Encoding operation involves exclusive OR operation between binary

data and the PN. This encoded output can further be secured using a scrambler. The

modulation used is double sideband suppressed carrier which is analogous to binary phase

shift keying (BPSK) which is most common modulation used for SS modulation.

At the receiver PN code is generated which is synchronized with that of transmitter.

This locally generated PN is used for decoding or correlating the required users signal

out of mixture of all users signal. This correlator is a special type of matched filter that

gives output for a signal encoded with the same PN code. If local PN code is changed

the correlator will be able to recover signal encoded by that PN. As the noises and

32

Page 51: Jammer Excision Based on Computational Intelligence Techniques

interferences have no correlation so these are ignored or suppressed by this correlator.

Component of received signal which is encoded with same PN is only decoded by it.

2.4 Advantages of CDMA

The advantages of CDMA are discussed as follows.

2.4.1 Dynamic Power Control

The limitation in CDMA system is due to interference. Every user is using the same

frequency that creates interference which degrades the call quality and system capacity.

Each user must transmit with minimum power so as to reduce interference while at the

same time maintaining the requisite Eb/N0. This ensures that the quality of service is

satisfactory. Eb/N0 is kept to lowest value for all users in order to achieve maximum

capacity. A mobile station receives constantly varying signal due to many factors that

includes interference, fading (both slow and fast), shadowing. etc. Dynamic power

control is used in the system to transmit with a limited power by both base station and

mobile station to keep the quality of the link under these changing conditions. Power

control also extends the life of battery and power amplifiers of base station.

2.4.2 Soft Handover

When a user travels from one cell to another during a call, the call is also transferred to

the new cell and it is known as a Handover. Conventionally in a handover the connection

with current cell is broken and reconnected to the new one, termed as hard handover.

Hard handover is also called break-before-make. Same frequency is used in all the cells of

CDMA system thus providing an opportunity to connect to new cell prior to disconnection

from current cell, this method is called soft handover or make-before-break. Shaded region

in Figure 2.9 shows a 3-way soft handover scenario. Power requirements of soft handover

are also less that helps in increasing capacity due to reduced interference.

33

Page 52: Jammer Excision Based on Computational Intelligence Techniques

Figure 2.9: Soft handover.

2.4.3 Frequency Reuse

The multiple access schemes like FDMA and TDMA use frequency planning to reuse

frequency being used at one cell in the system at other cell sites. The planning guaran-

tees that the various cells using the same frequency do not create interference for each

other. However CDMA uses same frequency in all the cells because the codes provide the

necessary channelization. This removes the overhead of frequency planning in CDMA

system. Instead of frequency planning the codes have to be planned so that neighboring

cells have no correlation between their codes or they are completely orthogonal.

Soft handovers are possible in CDMA systems as adjoining cells are also making use

of same frequencies. When a mobile station is simultaneously communicating with more

than one cells base station it is known as soft handover. Hard handovers are used in

other cellular systems which is different from soft handover. A mobile user experiences

sudden variation of signal strength. On the other hand, soft handover used in CDMA is

unnoticeable by user and offers better quality of signal.

34

Page 53: Jammer Excision Based on Computational Intelligence Techniques

2.4.4 Multiuser Detection

Multiuser or joint detection and decoding techniques (known as multiuser detection or

MUD) deal with demodulation of mutually interfering digital signals, which can improve

the capacity of the systems. Optimum multiuser detector refers to maximum likelihood

(ML) detector as suggested by Verdu [41]. The complexity of optimum multiuser detector

grows exponentially with the number of users. Several sub-optimal detectors both linear

and non-linear have been developed by researchers in order to overcome ML detector’s

complexity. Linear techniques are the decorrelating detector [42], the Minimum Mean

Square (MMSE) detector [43] while nonlinear techniques are the successive interference

cancellation (SIC) [44], parallel interference cancellation (PIC) [45] and the decision

feedback detector [46]. Another branch of multiuser detection scheme, referred to as

sphere detection (SD), has been proposed which is capable of achieving ML performance

at lower complexity [47, 48]. Furthermore the performance can be improved by using

forward error correcting codes such as turbo codes [49]. The success of turbo codes

inspired the researchers to study iterative multiuser detection [50–53].

2.5 Frequency Hopping CDMA

The simplest spread spectrum modulation according to usage is the frequency hopping.

All that is needed to convert a radio to frequency hopping radio is to have frequency

synthesizer controlled digitally. The transmission or reception frequencies are selected

by a PN code generator. Typically a band of frequencies is used for uniform hopping

of frequency. If the frequencies to be skipped are known before hand to the receiver

and the transmitter then uniform hopping over a band is not necessarily required. The

design of frequency hopped system can utilize narrowband radio methods using either

of the analog or digital modulation. PN code generator at the receiver is synchronized

for de-hopping. This synchronized PN code generator drives the frequency synthesizer

of local oscillator.

35

Page 54: Jammer Excision Based on Computational Intelligence Techniques

2.6 Conclusions

The technical challenges of progressing wireless communication are significant. The new

opportunities created by this new CDMA technology are also significant. We’ve discussed

here some of the very basic principles in spread spectrum.

36

Page 55: Jammer Excision Based on Computational Intelligence Techniques

Chapter 3

Nature Inspired Computational

Intelligence Techniques

3.1 Introduction

The growing advancements in computational power gave boost to the scientist’s and

engineer’s desire to explore optimum solutions for complicated filtering problems. The

normally employed brute force design methods are ever increasingly being substituted

by the modern optimization techniques. Numerical methods are able to be used for

perfect and efficient characterization of comparitive superiority of a particular design has

thrilled the engineers to apply stochastic global evolutionary optimizers. Some of these

techniques have been able to arouse much interest including Genetic Algorithm (GA) ,

Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Artificial Bee

Colony (ABC).

This chapter describes in brief the basic properties of PSO, GA, ACO and ABC

algorithms. GA has been founded on the natural evolution process which is an iterative

process and Darwinian evolution tries to evolve an organism with desirable features with

slow steps of a gradual process. GAs are well suited for combinatorial problems. Birds

and fishes move around in search of food, these living creatures achieve this objective

with a compound fusion of knowledge and random elements. PSO method with real

values is well suited for continuous domain problems nevertheless, employing a particular

representation allows PSO to solve binary problems also. Binary version of PSO is based

on continuous probability processes with certain thresholds. ACO algorithm is based on

social activities of ants in their colony. These have an ordered social organization which

37

Page 56: Jammer Excision Based on Computational Intelligence Techniques

enables the colony to carry out complex tasks which a single ant can never achieve.

ACO has been found very suitable for optimal resource allocation and combinatorial

optimization. ABC is derived from the ability of bees in a colony to find food source

positions containing high amounts of nectar. ABC can be employed to solve numerical

optimization problems of both constrained and unconstrained types.

3.2 Particle Swarm Optimization

Particle swarm optimization is a great optimization technique described by Eberhart and

Kennedy [60,61] predicated on the motion and learning ability of swarms. It employs the

rules of social communication inside a swarm to solve complex problems by constituting

a swarm of agents or particles that explore the whole search space in quest of the best

solution. In an N-dimensional space each particle is considered as a point that sets its

“flying” corresponding to its own flying experience in addition to the flying experience of

other particles. Every particle continues to record its position in the search space along

with the position which is best solution (fitness) found out until that time by it. This

is called personal best or pbest. There is also another position whose record is kept, is

the best value obtained until that time by any particle in the swarm. It is called gbest.

Main theme of PSO is to accelerate each particle in the direction of its pbest and the

gbest positions and randomly changing acceleration weights in every iteration. In each

iteration these two best positions are found out and every particle calculates its velocity

and position using following equations

vi+1s = φvi

s + α1γ1s

(ps − xi

s

)+ α2γ2s

(g − xi

s

)(3.1)

xi+1s = xi

s + vi+1s (3.2)

where s is particle index, i is the iteration index, v is the velocity of the particle, x is

the position of the particle, p is the pbest found by the particle, g is the gbest, and γ1

38

Page 57: Jammer Excision Based on Computational Intelligence Techniques

and γ2 are random numbers in the interval [0,1]. Two independent random numbers are

used to stochastically vary the relative pull of pbest and gbest. In (3.1), α1 and α2 are

the acceleration constants used to scale the contribution of cognitive and social elements

respectively and these can also be termed as learning factors and φ is the inertia function.

Table 3.1 summarizes the key terms used in the PSO algorithm.

PSO is dynamic, easily understandable, easy to implement and has low computational

overhead. The algorithm is very simple. Few lines of code are used iteratively. It is

faster by an order of magnitude than other Evolutionary Algorithms (EAs). It resists

getting stuck in a local optima. PSO has been applied as an engineering methodology in

many diverse fields i.e. determination of state of charge of batteries in a hybrid vehicle,

human performance assessment and diagnosis of human tremor. PSO also gives proof

of hypothetical aspects of mind, perception and intelligence. Ever since its discovery in

1995 PSO has sustained phases of advancement and alterations. It has been analyzed

and modified by many researchers for solving problems in various fields of science and

technology [63–67]. The earliest versions of PSO were continuous. Later on, a binary

version of PSO was formulated by Kennedy and Eberhart [66]. The particle position in

binary PSO is not real valued rather it is either a binary 0 or 1.

Researchers and scientists have simulated a variety of versions of the movement of

individual in a swarm i.e. a fish school or a flock of birds. Particularly, Heppner [70]

and Reynolds [71] have shown simulations of flock of birds. Heppner being a zoologist

was fascinated by the birds that flock in complete harmony while they suddenly alter

direction, scatter and regroup. Reynolds was attracted by the beauty of dance routine

type movement of bird flocks. These two scientists knew that the local processes modeled

by cellular automata have the key to predict or understand bird flock movement. In both

these models the key parameter was the distance between individuals and synchronous

flocking manners were thought to depend on keeping these distances between neighbors

within an optimum range. It seems reasonable to suppose all the animals forming a swarm

follow the same kind of laws for their social behavior. A sociobiologist E. O. Wilson has

39

Page 58: Jammer Excision Based on Computational Intelligence Techniques

Table 3.1: Key terms used in PSO.Term Explanationfitness A number representing goodness of a given solutionSwarm The entire collection of agents or particlesPosition Agent’s coordinates which represent solution to the problempbest Best fitness returned for a specific particlegbest Best fitness returned for the entire systemv Velocity of the particlex Position of the particleφ Inertia coefficientγ1 Random number ε[0, 1]γ2 Random number ε[0, 1]

written, in reference to fish schooling, “In theory at least, individual members of the

school can profit from the discoveries and previous experience of all other members of

the school during the search for food. This advantage can become decisive, outweighing

the disadvantages of competition for food items, whenever the resource is unpredictably

distributed in patches” [72]. It is concluded that an evolutionary advantage is achieved

by the information sharing between individuals. PSO has been developed using this

conclusion.

The modeling of human social behavior was the purpose behind this simulation, al-

though the bird flocking and fish schooling differ a lot. The biggest disparity is its

non-representational model. The motion of birds and fish is optimized for seeking food,

evading rapacious creatures and finding mates. Humans can change their bodily mo-

tion along with mental and observational parameters. Humans unlike some other social

creatures do not move in harmony with a group but they change their viewpoint and

thoughts to match that of their society. Another difference is the collision in computer

based simulation. Two creatures can not have same position unless they collide but

two humans may have similar thoughts and behavior. Humans are capable of avoiding

physical collisions and move around N-dimensional psychological space. Steering in the

psychological multidimensional space needs years of experience.

40

Page 59: Jammer Excision Based on Computational Intelligence Techniques

Initialize population with random position

(x) and velocity (v) vectors

For Each Agent

Evaluate Fitness

If fitness (x) > fitness (gbest)gbest = x

If fitness (x) > fitness (pbest)pbest = x Update Velocity

Update Position

Next Agent

gbest = parameters of best solution

Figure 3.1: Flowchart of PSO algorithm.

3.3 Variants of PSO Algorithm

There are different versions of PSO algorithms, but they all can be seen from an infor-

mational point of view: what kind of information each particle has access to, and how it

uses it. To illustrate this, here two versions, a constricted one and an adaptive one, are

analyzed in terms of probability to find a solution.

3.3.1 Adaptive PSO

Equations (3.1) and (3.2) describe velocity and position update equations including in-

ertia weight φ. Each particle calculates new velocity based on its previous velocity, its

personal best (pbest), global best (gbest) positions and update its position using the new

velocity in the solution space. The velocity is applied for a given time-step, and the par-

41

Page 60: Jammer Excision Based on Computational Intelligence Techniques

ticle moves to the next position. Figure 3.2 shows a graphical view of the modification

of searching point of a particle. The parameter φ is very important in determining the

type of trajectory the particle travels. Global search takes place when inertia weight

has a large value whereas local search is performed for a small value of inertia weight.

Suitable pick of inertia weight gives the equilibrium among the local and global search

ability of the swarm. If the value of φ is kept at zero the particle has velocity only due

to the positions pbest and gbest. Thus having no inertia the velocity of the particle can be

changed immediately if its motion is directed away from the known best positions. When

the value of inertia weight is kept low it allows the particle to search locally. Conversely

if the φ has a high value the chance of change in velocity of the particle is very low (parti-

cle keeps its actual path due to its high inertia) although when superior values of fitness

are available. Consequently inertia weight’s high value enhances global searching ability.

Selection of parameters affects the algorithm for its speed of convergence and ability of

finding the optimum. However the values are unique for each type of problem. Methods

based upon adaptive parameters have also been used [81, 82]. A class of these methods

is called deterministic which employ deterministic laws of changing values of parameters

i.e. when iterations increase the inertia weight decreases linearly [63, 81]. Experimental

results suggest it better to initially set the inertia to a large value and then gradually

decrease its value to obtain the refined solution [63]. Also, in [78, 79] it is proposed and

observed that decreasing the value of inertia as the iterations progress will allow global

exploration in the beginning and local exploration near the termination of algorithm.

Another class is that of adaptive methods in which the values of parameters are changed

on the basis of feedback information. An example of such a method is fuzzy adaptive

inertia weight [82]. In [84], an algorithm is developed that adapts swarm instead of pa-

rameters on individual level. The worst performing particles are substituted with fresh

particles so that all the particles contribute their due share in achieving their swarm’s

objective.

In this method choice of values of social and cognitive factors is not very significant

42

Page 61: Jammer Excision Based on Computational Intelligence Techniques

for the algorithm; however appropriate choice of their value might cause improved per-

formance. Performance is enhanced equally in terms of avoidance of local minima and

convergence rate. The values of these factors need to be catered for while selecting in-

ertia weight. Many diverse values are suggested for these parameters by various studies.

Presently the association between various parameters and their effects in various cases of

a single problem are not fully grasped. An example of this is that of dynamic optimization

problem [83] in which there is no simple relationship between the parameters.

Instead of adapting cognitive and social factors, PSO can also adapt a dynamic sys-

tem. In a dynamic system, the state changes in a repeated or non-repeated manner. The

changes may occur frequently or even continuously. Adaptive PSO for dynamic systems

has been considered in [86–88].

3.3.2 Constricted Version of PSO

In order to choose a right mixture of parameter values which can perform satisfactorily for

a broad variety of problems, a great deal of effort has been made by researchers. In [77]

it has been shown that the use of a constriction factor is necessary to ensure convergence

of particle swarm algorithm. A simplified expression incorporating constriction factor

can be written as

vi+1s = K

(vi

s + α1γ1s

(ps − xi

s

)+ α2γ2s

(g − xi

s

))(3.3)

ψ = (α1 + α2) > 4 (3.4)

χ =2∣∣∣2− ψ√ψ2 − 4ψ

∣∣∣ (3.5)

In [75], “Swarm Explosion ”phenomenon is avoided using the effect of velocity clamp-

ing. If the maximum velocity of particles is unbounded then velocity can increase limit-

lessly and resulting in an ever increasing swinging motion of particle around an optimum.

In [85], the parameter vmax is called velocity clamping which is kept at highest value for

43

Page 62: Jammer Excision Based on Computational Intelligence Techniques

xi

φvipipi-x

i

g

g-xivi+1

xi+1

xi

-xi

-xi

α2γ2(g-xi)

α1γ1(pi-xi)

Destination

O

Cognitive part

Social part

Figure 3.2: Modification of searching point of PSO, xi is the current position, and xi+1

is the modified position, similarly vi is the current velocity and vi+1 is the modifiedvelocity, xiand vi are the position and velocity of the particle, p and g are pbest and gbest

respectively.

the xmax positions in the solution space and significantly improved performance results

are obtained when using constriction factor approach. Additional studies show that this

method is not sufficient to keep particle’s velocities restricted and manageable. Com-

parison of evolutionary computational techniques [76], shows PSO can speedily locate

the area in which optimum is present but face difficulty in regulating velocity to make a

delicate search of the solution space.

In [77, 80], theoretical studies of convergence were performed. In [80], a method for

choice and adjustment of parameters is proposed. The proposed method is established

on the speed of convergence of the diverse combinations of parameter values. In [85],

the combination of both the velocity clamping and the constraint were used and yielded

excellent outcome. They employed values wmax= xmax.

44

Page 63: Jammer Excision Based on Computational Intelligence Techniques

3.3.3 The Binary PSO

Binary version of PSO is proposed in [66]. In earlier works this variant was not of much

interest. The particle position in binary version is not real valued, rather it is either binary

1 or 0. The probability distribution for position has been founded on mathematical

function of particle’s velocity. This distribution is used for randomly generating the

particle position. The particle position is updated using the following equation

xi+1s =

1

0

if γ3 <1

1+e−vi+1s

otherwise(3.6)

where γ3 is a number in [0,1] interval. If (γ1 and γ2) have value equal to zero that

results in the nulling of both cognitive and social parts of velocity then still binary PSO

randomly searches the solution space. In [106] PSO has been employed for sorting tasks.

A quantum based approach is suggested in [105] for amending equations of binary PSO

algorithm. Another version of binary PSO is proposed and analysed by Clerc [107] which

outperforms others.

3.4 Genetic Algorithm

Genetic Algorithms (GAs) derive their name from the genetic processes of natural evo-

lution. They were developed by Holland in the mid-1960s and have been implemented

successfully in a broad range of engineering applications, e.g., control engineering, the

design of neural and fuzzy systems etc. During the 1980s, the rapid progress in computer

technology permitted the use of the EAs in difficult large-scale optimization problems

and the methods rapidly diffused into the scientific community. Today, new applications

of EAs are being reported in large numbers and the field has finally achieved general

acceptance. Both exact and approximate solutions are found using GA. It is classified as

a global search heuristic. It belongs to special category of EA that use methods based

on biological evolutionary processes of crossover, inheritance, selection and mutation.

45

Page 64: Jammer Excision Based on Computational Intelligence Techniques

Initialize Population

SELECTIONselect parent #1 and #2

MUTATIONwith p=pmutation

Replace Population

2.3 0.210.5

Parameter Gene Chromosome

CROSSOVERwith p=pcross

Until Temporary Population is Full

Evaluate Fitness

Until Termination Criteria is met

Figure 3.3: Flowchart of Genetic Algorithm.

Every organism has a set of rules that determine the built up of an organism with

the help of life’s very minute building blocks. Genes are an organism’s encoded rules

that form thread like structures known as chromosomes. Particular quality/feature of an

individual corresponds to a gene. For example the color of skin, height, sex etc., all are

dictated by the particular gene combination. An individual’s genotype is its genes and

their combination while phenotype is the bodily manifestation of the genotype.

Genes are divided when two individuals/parents breed. The brood/child gets half of

its genes from its either parent. This process of making up of genes of child in such a

fashion is known as recombination. A gene can possibly get mutated but its occurrence

is very rare. The mutated gene does not usually show up in growth of phenotype but

sporadically it can introduce an entirely new feature.

The GAs for function optimization in computation, is applied in [56]. Many versions

46

Page 65: Jammer Excision Based on Computational Intelligence Techniques

of such evolutionary programming have been tried in various fields with varying degree of

success. The tunable optimization parameters of GA algorithms are key to the immensity

of its target applications. These parameters along with the borrowed fundamental ideas

of genetics construct search algorithms that are robust and require minimal problem

information. The algorithm starts with definition of three entities cost, cost function and

optimization variables. While solving the problem all prospective solutions are coded

as binary strings called chromosomes that act as an input to the cost function. An

experiment, a mathematical function or a game can be the cost function. The input

variables and output are related by the cost function. The choice of input variables

can change the output in the required manner also changing the cost which is difference

between the desired and actual output. The cost function is carefully selected by keeping

in view the variables that will be used. Algorithm starts with generation of an initial

population which is comprised of a group of chromosomes. The size of population and

length of chromosome are parameters depending upon the problem and are normally

kept fixed for a particular problem. All individuals in every generations are checked

for their fitness value based on the cost functions output. This evaluation gives each

individual a probability of being selected as a parent for next generation. In order to

create offspring from the pairs of parents already selected for mating the operation of

crossover is performed. Mutation operator is applied to these offspring thus producing

new individuals of the next generation. The members of previous population having

worst fitness are replaced by newly generated offspring. Algorithm repeats till objective

function is satisfactorily optimized. Following are the issues that need to be tackled with

care for the considered problem [89].

Original GA was in binary form. Binary GA solves many optimization problems that

stump traditional techniques, binary GA limits its performance to some extent when

used to solve problems in continuous domains due to quantization errors, and limited

number of bits to represent continuous variables. On the other hand, each variable re-

quires may many bits to represent it. If the number of variables is large, the size of the

47

Page 66: Jammer Excision Based on Computational Intelligence Techniques

chromosome is also large. When the variables are naturally quantized, the binary GA

fits nicely. However, when the variables are continuous, it is more logical to represent

them by floating-point numbers. This continuous GA also has the advantage of requir-

ing less storage than the binary GA because a single floating-point number represents

the variable. The continuous GA is inherently faster than the binary GA, because the

chromosomes do not have to be decoded prior to the evaluation of the cost function. In

this research we used continuous GA (CGA). The format of CGA is as follows.

3.4.1 Initialization of the Population

Initially GA randomly generates a big population of chromosomes. Each chromosome

is an array of real numbers and represents a possible solution of problem under con-

sideration. The population size is kept constant throughout the optimization. If the

chromosome has N variables (an N -dimensional optimization problem), then the i th

chromosome is written as an array with 1×N elements

xi = (xi1,xi2.............xiN) (3.7)

The initial population is a matrix of S rows like (3.7)

3.4.2 Natural Selection

Natural selection decides which chromosomes in the initial population are fit enough

to survive and possibly reproduce offspring in the next generation. Good parents are

found out for the next generation by the operation of selection on the basis of their

fitness value. It emulates the natural phenomenon of survival of the fittest as described

by Darwin’s theory. This theory implies that best individuals have greater chance to

survive and reproduce. The selection operator picks the strings that are above average

from current population and probabilistically replicate them in mating pool assuming

that better individuals have increased chances to reproduce even better offspring. It

48

Page 67: Jammer Excision Based on Computational Intelligence Techniques

is based on the fact that high correlation exists among the fitness of parents and their

offspring. In Genetics this correlation is termed heredity. Of the S chromosomes in a

given generation, only the top Nkeep are kept for mating and the rest are discarded to

make room for the new offspring.

Nkeep = bselection× Sc

The parameter selection is set to 0.5 in this research.

3.4.3 Pairing

Mothers and fathers pairs are formed in a random fashion. Each pair produces two

offspring that contain traits from each parent. In addition the parents survive to be

part of the next generation. The more similar the two parents, the more likely are the

offspring to carry the traits of the parents. There are various strategies of pairing, few

of them are presented here.

3.4.3.1 Random Pairing

This strategy uses a uniform random number to select chromosomes and parents to be

crossed over.

3.4.3.2 Rank Weighting Pairing

This approach is problem independent and finds the probability from the rank n, of the

chromosome. Let M = d(S −Nkeep) /2e be the number of matings. The cumulative

probabilities are used in selecting a chromosome.

Pn =n∑

q=1

Nkeep − q + 1∑Nkeep

q′=1q′

, n = 1, 2, 3, ..., Nkeep (3.8)

49

Page 68: Jammer Excision Based on Computational Intelligence Techniques

Two lists of parents are formed containing the indices of parents taking part in cross

over, one from each list. The lists are formed as

ji (k) = n, provided that Pn < φik ≤ Pn+1, n = 1, 2, 3, ..., Nkeep (3.9)

where k = 1, 2, 3, ...,M, i = 1, 2 and φik is a random number in [0 1] for all i and

k. Through crossover (recombination) numerical information is exchanged between two

random individuals.

3.4.4 Mating or Cross-over

Cross-over is the way through which information is shared among the population. The

simplest method of cross over is to choose one or more points in the chromosome to mark

as the cross over points. Then the variables between these points are swapped between

the two parents. The two offspring cm & cm+1 are generated as

cm (i) =

wJ1m (i)

wJ2m (i)

1 ≤ i ≤ nm

nm < i ≤ N(3.10)

cm+1 (i) =

wJ2m (i)

wJ1m (i)

1 ≤ i ≤ nm

nm < i ≤ N(3.11)

where m = 1, 3, 5, ...,M − 1, nm is the cross over point and nm ∈ ncp where

ncp = [n1, n2, n3, ..., nM ] (3.12)

Each nm is a random positive integer such that 1 ≤ nm ≤ N. Also jkm ∈ jk, k=1,2

j1 = [j11, j12, j13, ..., j1M ]

j2 = [j21, j22, j23, ..., j2M ] (3.13)

50

Page 69: Jammer Excision Based on Computational Intelligence Techniques

Each jk is found using (3.9) for all k. The problem with point cross over methods is that

no new information is introduced. The remedy is to introduce new genetic material. New

methods of mating are designed to combine variables from two parents.

cm (i) =

wj1m (i)

wj1m (i)− γm {wj1m (i)−wj2m (i)}

1 ≤ i < nm & nm < i ≤ N

i == nm

(3.14)

cm+1 (i) =

wj2m (i)

wj2m (i) + γm {wj1m (i)−wj2m (i)}

1 ≤ i < nm & nm < i ≤ N

i == nm

(3.15)

where γm is a random number such that 0 < γm < 1 for all m = 1, 2, ..M. An alternative

form of cross over which combines the features of two individual parents is [117]

cm (nm) = βwj1m (nm) + (1− β)wj2m (nm) (3.16)

cm+1 (nm) = (1− β)wj1m (nm) + βwj2m (nm) (3.17)

where β is a random number such that 0 < β < 1.

Crossover operator during the mating process generates two offspring by merging

the parts of the two selected parent’s strings. Offspring for replacement of bad parents

in older generation are produced in this step. Most common among them is the 1-

point crossover as shown above. Along the chromosome at randomly selected point,

substrings are swapped among parents for producing offspring. Crossover probability

pcross is user defined and normally it is high valued. When crossover is not permitted the

next generation includes the parents and their replicas, without any change.

3.4.5 Mutation

The function of mutation is to introduce occasional perturbations to the variables to

maintain the diversity in the population. The mutation in CGA is governed by the

51

Page 70: Jammer Excision Based on Computational Intelligence Techniques

following relation.

w (pi, qi) = (xh − xl)φ+ xl (3.18)

Random numbers pi and qi are chosen to select the chromosome (row) and variables

(columns) to be mutated in the population (matrix). Also pi ∈ {p1, p2, ..., Nmute} , and

qi ∈ {q1, q2, ..., Nmute} are arrays of random integers such that 1 ≤ pi ≤ S, and 1 ≤ qi ≤ N

and 0 < φ < 1, xh is the upper and xl the lower bound of the variable Nmute. A mutated

variable is replaced by a new random variable. Nmute is the total number of mutations

given by

Nmute = (S − 1)Nµ (3.19)

Where µ is the mutation rate set to 0.2 in this research.

3.4.6 Fitness Function

As GA mimics the Darwinian theory that is founded on the survival of the fittest among

a population of organisms and it also utilizes the inherent searching ability of the na-

ture. Therefore GAs are suitable for maximization problems. Minimization problems are

usually transformed into maximization problems by some suitable transformation [90].

Generally fitness function is initially defined using the objective function and later ge-

netic operations are performed repeatedly using it. Fitness function aims to check the

grade of each and every chromosome.

3.4.7 Choice of the Parameters of GA

The main parameters that must be considered in the design of a GA are the popula-

tion size S and the values of the probabilities of recombination/crossover and mutation.

The optimal choice of GA parameters is strictly problem dependent. There are no stan-

dard guidelines for parameter selection however some general guidelines on values that

give acceptable results have been established from experience. Following choices are the

guidelines.

52

Page 71: Jammer Excision Based on Computational Intelligence Techniques

• Population size S ∈ [60, 100].

• Use the roulette wheel or rank weighting selection method.

• Employ the one-point crossover operator with probability of cross over pcross ∈

[0.6, 0.9].

• Apply the mutation operator with probability of mutation pm ∈ [0.001, 0.02]

Choosing population size is the most difficult decision among all the other parame-

ters. In fact there exists no fixed value which is optimal. The choice relies heavily on

problem while considering other factors as well. A large sized population in GA may

have fast convergence and maximum probability of finding global optimum at the cost

of tremendous computational complexity. But there may exist a GA with smaller pop-

ulation size and moderate computational complexity at the cost of reduced probability

of finding global optimum. Moreover frequent occurrence of early convergence is also

observed. The tradeoff has to be made between probability of finding global optimum

and computational complexity. These genetic operators are attractive because they are

simple. An elitist policy in GA proposes to keep the fittest member in next generation en-

suring inopportune loss of best optimum doesn’t happen due to operations like mutation

or crossover.

3.5 Artificial Bee Colony (ABC) Algorithm

The behavior of swarms has led to many optimization algorithms. Bees are one of the

social insects that successfully collect nectar and survive natural challenges by their

collective efforts in a hive. Karaboga proposed an optimization algorithm in 2005 [99]

inspired by the foraging habits of a swarm of honey bees. This algorithm named as

Artificial Bee Colony (ABC) is based on simple rules like other swarm based algorithms

e.g. PSO, ACO and their variants. Control parameters include population size or colony

size and number of maximum cycles (iterations).

53

Page 72: Jammer Excision Based on Computational Intelligence Techniques

Initialize food source positions

Evaluate fitness function of each employed bee

Determine new food positions for

employed bees

Evaluate fitness function

Memorize the position of best food

source

Select food source for onlooker

Determine a neighbour food

source for onlooker

All onlookers distributed

Is termination criterion met ?

Find abandoned food source

Produce new position for the exhausted food source

Final food position

Yes

No

No

Yes

Figure 3.4: Flowchart of Artificial Bee Colony algorithm.

54

Page 73: Jammer Excision Based on Computational Intelligence Techniques

In this algorithm a population of artificial bees explores food sources and keeps modi-

fying the food sources over time with an objective to find a source with maximum nectar.

The bees are categorized into three types which are employed bees, scout bees and on-

looker bees. Employed bees bring the nectar and information about the source to the

hive. Onlooker bees wait for employed bees in hive and infer this information from the

employed bees by the dance on their return. New food sources are searched by scout

bees in the hive’s neighborhood. Employed bees on their return to hive bring nectar and

perform dance in dance area which indicates the food source quality to onlooker bees.

The longer their dance is, greater is the quality of the source they have returned from.

Variety of dances is observed by the onlooker bees and these choose the food source of

good quality. High quality food source lures larger number of onlooker bees. Onlooker

and scout bees turn into employed bees on the discovery of a new food source. Each time

when depletion of a food source occurs, the employed bees become either onlookers or

scouts. Employed bees along with onlooker bees carryout the task of food gathering while

the scout bees in the meantime explore neighborhood for new and better food sources.

The analogy of food source is used in ABC algorithm for getting optimum solution

for the problem under consideration from the possible solutions. Usually employed bees

and food sources are kept in same numbers. Initially food source positions are created

randomly. An ith food source is symbolized as

xi = (xi1,xi2.............xin)

where n is the number of parameters of the food source or dimensions of the solution de-

pending on the underlying problem. Following method is used for producing a contended

food source with the help of existing food source for each employed bee

x′

ij = xij + φij (xij + xmj) (3.20)

where φij is a uniform random variable in [-1,1], and xmj is a randomly selected jth

55

Page 74: Jammer Excision Based on Computational Intelligence Techniques

parameter of another randomly selected solution xm

xm = (xm1,xm2.............xmn)

It is noticeable that just a randomly chosen parameter is changed for getting a new

food source from previous source. ABC is a repetitive procedure. After the initialization

in each repetition of the algorithm, an employed bee determines a new food source

position by altering an existing food source position. The amount of nectar is determined

for the new position and compared with that of the previous source position. If new

position has greater nectar then it is remembered and the old position is disregarded or

else the previous position is remembered. If an existing food source position is discarded

then an employed bee turns into a scout bee until a new food source position is discovered.

Scout becomes an employed bee on finding new food source position. On its return after

newly found food source position the employed bee reports amount of nectar to onlooker

bees waiting in the hive. The amount of nectar is used by the onlookers to calculate

the probability. This probability selects a food source to be exploited. The food source

selection probability is calculated as

pi =fitness (xi)∑S

j=1 fitness (xj)(3.21)

Where S represents number of total food source positions. An employed bee discards a

food source to become a scout if it fails to improve a food source within a fixed number

of iterations. A scout searches the problem space randomly to find new food sources,

which is given by

xik = xmink +

(xmax

k − xmink

)× r (3.22)

where r is a random number. Allocation of the food source at random to a scout converts

it into an employed bee. The next iteration of ABC algorithm starts whenever a new

food source position is discovered. The algorithm is run repeatedly till the termination

56

Page 75: Jammer Excision Based on Computational Intelligence Techniques

criterion is satisfied. The ABC algorithm consists of following four phases.

3.5.1 Initialization Phase

In this phase scout bees randomly produce a set of food source positions. The amount

of nectar corresponding to these positions is calculated and control parameters are ad-

justed accordingly. Every food source position is a solution vector to the problem under

consideration for optimization. Each solution vector consists of variables that require

adjustment for minimizing the fitness or objective function.

3.5.2 Employed Bees Phase

The responsibility of employed bees is to find new positions of food sources close to the

memorized position with an aim to get more nectar. The amount of nectar or fitness is

also evaluated by them for the newly found positions. After evaluating the nectar amount

they compare it with the amount of previous position, the position of food source with

higher nectar is memorized and the other one is discarded. On their return to hive in

the dance area they provide the information to the onlooker bees about the amount of

nectar. The onlooker bees calculate the probability proportional to the nectar amount

and choose food source based on the probability. Each employed bee returns to search for

new position of food source around the position already memorized. Then again evaluate

the new position for nectar amount.

3.5.3 Onlooker Bees Phase

Employed bees return to hive and give details of food source to waiting onlooker bees.

Food sources are chosen by onlookers by calculating the probability which in turn depends

on the information of amount of nectar or the fitness value given in the dance area of

the hive by employed bees. An onlooker bee calculates the value of probability by using

the expression (3.21). Onlookers use equation (3.20) to determine fitness value of a

57

Page 76: Jammer Excision Based on Computational Intelligence Techniques

neighborhood food source of a selected food source.

3.5.4 Scout Bees Phase

Food source positions are randomly searched in a problems solution space by the scout

bees. Employed bees are converted to scout bees when their food sources are discarded or

when the solution do not get better after a preset number of iterations. After conversion

to scouts, they start looking for food positions/ solutions randomly. In this fashion

the food sources that are inferior at the start or become inferior after utilization, are

discarded and it can be treated as a negative feedback in the search. A review of ABC

algorithm is given below.

1. Initialize food source positions, set the value of limit and the maximum iteration

number.

2. Determine neighbour food source positions for the employed bees using (3.20) .

3. Calculate the nectar amounts or fitness value.

4. If all onlookers are assigned food sources, go to Step 7 . Otherwise, continue.

5. Select a food source for an onlooker using (3.21).

6. Determine a neighbour food source position for the onlooker using (3.20). and go

to Step 4.

7. Find the abandoned food source and allocate its employed bee as scout for searching

new food sources using (3.22).

8. Memorize the position of the best food source.

9. If the maximum iteration number is reached, output final food source positions and

stop otherwise go to Step 2.

58

Page 77: Jammer Excision Based on Computational Intelligence Techniques

Figure 3.4 shows the flow-chart of ABC algorithm. The development of the joint

cognition in a hive critically requires the sharing of information between the bees. In a

hive the site for information sharing is the dance area. Various types of dances that are

staged in this area include Tremble, Round and Waggle. The superiority of food source

is shared with other bees with the help of Waggle dance. Onlooker bees present on the

dance floor have the knowledge of the best currently available food sources because they

watch the several dances thus able to deduce the best among the sources. Employed

bees exchange their information according to the quality of their food sources. Onlooker

bees choose rich food source positions on the basis of probability based on the dance of

employed bees.

3.6 Ant Colony Optimization

Ant colony optimization algorithm (ACO) was proposed by Maco Dorigo in the year

1992 in his doctoral thesis [91, 92]. ACO is a method for finding solution to a problem

that requires extensive computation and in principle its working is based on probabilities.

This algorithm has got inspiration from the activities of ants in their colony in which they

act in perfect harmony. An ant colony has the ability of finding a minimum distance path

from their nest to a neighborhood food source in a limited time. Although individually

ants have restricted ability to learn but collectively these are able to accomplish great

tasks. Ants move haphazardly around their nest in search of food and if an ant finds

a food source it returns to the nest with the trail marked by pheromone. All the other

ants are attracted by the pheromone and follow the trail and also mark this trail by

their pheromone. As the amount of pheromone increases, it attracts more ants to follow

that same path. The pheromone also evaporates with time and paths that are longer

have greater evaporation and thus less attraction for ants than a shorter path with less

evaporation (more concentration of pheromone). In this manner shortest path amongst

the many paths between food source and nest is selected by ants. The longest path

59

Page 78: Jammer Excision Based on Computational Intelligence Techniques

Figure 3.5: Ants have two paths move from nest to the food source and eventually theshorter path is chosen by all the ants.

disappears with time due to evaporation and finally all the ants will follow the shortest

path as shown in Figure 3.5. The shortest path is retained because the rate of deposit

of pheromone is more than that of evaporation.

Surroundings are used by ants as means to share information. Pheromone deposit

is their indirect method for information swap about details of their work status. The

pheromone deposit can be regarded as positive feedback while evaporation can be consid-

ered as negative. Positive feedback reinforces the system while negative feedback saves

it from failure. Supposedly if equal amount of pheromone is over all the available paths

no path could be selected. The feedback allows overcoming that stagnation and allowing

selection of path. Thus the algorithm transits from an unstable to a stable state in which

searching and selection of the shortest path is continued.

The benefit of evaporation of pheromone is that it evades the possibility of convergence

at any solution representing local optima. The path selected by first ants will become

extremely striking for subsequent ones if evaporation does not take place. The search

of solution space will be very limited in such a scenario. The experimental observations

of biologists cite that if an ant colony has two alternate paths with different distances

between nest and a food source the ants have tendency to exploit the shorter path. [93,94].

ACO algorithm is based on imitating this social activity using simulation in which the

ants explore the graph depicting the problem under consideration for solution. Initially

60

Page 79: Jammer Excision Based on Computational Intelligence Techniques

Start

Launch new Iteration of Ants

Find new solutions

Solution Evaluation

Pheromone Deposition

Pheromone Evaporation

Solution Found

End

Is termination criterion met ?

Figure 3.6: Flowchart of ACO algorithm.

the algorithm tried to find the best possible path in a graph trying to imitate ants

movement in search of path between food source and the nest. Now a much broader

range of numerical problems can be solved based on different characteristics of ants

activities. Potentially good solutions are constructed by ACO using a pheromone matrix

τ={τij}. Initialization of τ are set τij = τinit > 0. It also takes advantage of heuristic

information using visibility

pkij (t) =

[τij(t)]

α·[ηij(t)]β

Pk∈j [τij(t)]

α·[ηij(t)]β

0

if the transition is allowed

otherwise(3.23)

61

Page 80: Jammer Excision Based on Computational Intelligence Techniques

where the visibility ηij (t) is defined as

ηij (t) =1

dij (t)

where dij (t) is the distance or arc length. The parameters α and β control the relative

significance of traversed path and its clarity. In the case of α= 0 the algorithm becomes

greedy and having several starting points. An early convergence is observed for high

values of α and weak convergence for low values. Typical values are in the range of 0.5 -

5.0. This is adjusted properly by repeated experiments.

3.6.1 Update of Pheromone

While building a solution, ants deposit pheromone on the paths they use. Consider the

kth ant that moves from node i across the path to node j changing amount of pheromone

τij as follows

τij (t+ 1) = γτij (t) + ∆τij (t)

where 0 < γ < 1 is the evaporation coefficient and it is set by usert, ∆τij (t) is sum of

contributions by all the ants that utilized move (ij) for constructing solution i.e.

∆τij (t) =∑

k

τ kij (t)

τ kij (t) =

Q

dij (t)

where Q is a constant

3.6.2 Continuous Ant Colony Optimization

The ACO algorithm discussed so far is for discrete combinatorial problems and the solu-

tion components are already known and it cannot be directly applied to the continuous

62

Page 81: Jammer Excision Based on Computational Intelligence Techniques

problems characterized by the decision variables having continuous domains. While ACO

algorithms originally developed to solve problems of discrete nature, they can be adapted

to solve continuous problems. There are various approaches for this adaption [101–104].

All these approaces are quite different conceptually from discrete ACO. In this research

we follow the approach proposed in [104]. As the solution here consists of M filter co-

efficients. Let each coefficient be represented by B bits. Then the ACO solution will

consists of B ×M bits. At each bit index b = 1 : B ×M , each ant have to select one of

the two option as shown in Figure 3.7. For example if an ant is at bit position 2, that is

0, it can either move to 0 (0→ 0) or to 1 (0→ 1). The probability for this selection can

be calculated as

P01 (t) =τ01

τ01 + τ00(3.24)

where, P01 is the probability associated with the sub-path (0→ 1), and τ00 and τ01 are

the artificial pheromones of the sub-paths (00, 01). In order to avoid the premature

convergence problems, a strategy established on the frequency-based memory has been

used. The frequency-based memory stores information about how often a sub-path is

followed by ants. By examining the pheromone amount, it is difficult to conclude whether

most ants follow a sub-path or not. But, it is very easy to do that by evaluating the

frequency information. The probability based on the frequency memory is calculated by

the following equation:

P01 (t) =

1

τ01(t)τ01(t)+τ00(t)

if (f × f01 < f00)

otherwise(3.25)

where f is a frequency factor chosen as 2. If the condition (f × f01 < f00) is satisfied, then

the path (0→ 1) is directly chosen; else the pheromone-based direction selection strat-

egy described in (3.24) is employed. Artificial pheromone is computed by the following

63

Page 82: Jammer Excision Based on Computational Intelligence Techniques

Figure 3.7: Bit selection of ants

formula

∆τ k01 (t, t+ 1) =

Q

objective value(k)

0

if kth ant passes the subpath (0→ 1)

otherwise(3.26)

After M ants in the colony complete the search process and produce their solutions,

the pheromone amount to be attached to the sub-path (0→ 1) between the time t and

(t+ 1) is computed as

∆τ01 (t+ 1) =M∑

k=1

∆τ k01 (t, t+ 1) (3.27)

The pheromone amount of the sub-path (0→ 1) at the time (t+1) is updated by the

following equation

τ01 (t+ 1) = ρτ01 (t) + ∆τ01 (t+ 1) (3.28)

ρ ∈ ]0, 1[ : Evaporation parameter. The selection is based on pheromone information of

each path.

3.6.3 Convergence of ACO

The global maxima or minima can be searched in limited time using some particular

variants of ACO. The convergence of ACO was first proved in the year 2000 for version

of ACO based on graph while for the other versions it was proved later. Estimation

of hypothetical convergence rate is extremely complex for such type of metaheuristic

techniques. Zlochin et. al. [97] have concluded that such type of techniques have possibly

a relationship with stochastic steepest descent based on cross entropy and distribution

estimation algorithm. These techniques were also classified by them as research based

64

Page 83: Jammer Excision Based on Computational Intelligence Techniques

model.

3.6.4 Applications of ACO

A wide ranging optimization problems of combinatorial nature have been solved using

ACO algorithm. These include optimal path finding for vehicles, resource allocation,

forecasting of many diverse phenomena, probabilistic problems, etc. ACO has also been

successful in finding near optimal solution for challenging problem of traveling salesman.

Initially ACO algorithm was known as ant system [98]. Its objective was to find solution

of the traveling salesman problem. In this multi-objective problem a shortest path is

sought for a number of cities to be visited in round trip with the constraint that each

city is visited only once. ACO shows better performance for the dynamic systems in

contrast to GA and simulated annealing. ACO algorithm is able to run endlessly and

adjust to any variations in allowable time constraints. In communication networks its

application is of special interest when its performance is required in a limited time.

ACO builds the shortest path from source to destination in a graph by grouping

together several paths. ACO has no exact description as it varies with respect to its ap-

plication and authors as well. Therefore a coarse definition of ACO is a population based

optimization technique in which an ant explores the search space. These ants keep record

of the best solutions and locate new best solution in the light of previous records. The

newly found best solutions are marked for optimizing further search. ACO is viewed as

population based algorithm employing probability distribution for changing in repeated

searches. The solutions are assembled in many repetitions for combinatorial problems.

It is likely to find an optimal solution for this type of problem. Considering traveling

salesman problem the optimal itinerary is devised by combining strongest sections of

best solutions alleviating the need of ant to travel the optimal route. The solution to

real valued problems can not be explained in this manner. ACO fits in the framework of

“Swarm Intelligence ”which generalizes the organizational behavior of social insects.

65

Page 84: Jammer Excision Based on Computational Intelligence Techniques

Chapter 4

Jammer Excision in CDMA based

on Computational Intelligence

Techniques

4.1 Introduction

In this chapter, the problem of jammer excision in Direct Sequence-Code Division Mul-

tiple Access (DS-CDMA) system is considered. The jammer excision is formulated as

an optimization problem and then solved by nature inspired computational intelligence

techniques.

Various optimization techniques have already been proposed for jammer excision in

DS-CDMA. Adaptive algorithms are proposed for estimation and suppression of NBI in

DS-SS system in [110]. Bijjani and Das have applied linear and non linear neural network

filters for suppression of NBI in DS spread spectrum system [111]. Higher order statistics

and GA has been used to reject NBI and has faster convergence than Least Mean Squares

(LMS) algorithm [112].

4.2 System Model

Considering a synchronous CDMA system. CDMA system with jammer excision is shown

in Figure 4.1 for a single user y. Consider the kth user transmitting Binary Phase Shift

Keying (BPSK) symbols. The users are separated by Pseudo Noise (PN) spreading

sequences of length L. The mth symbol of kth user is spread over L chips using a unit

66

Page 85: Jammer Excision Based on Computational Intelligence Techniques

Data Source

AWGN

Decision

PN Sequence

Excision Filter

PN Sequence

JammingSignal

X X+d d’

Figure 4.1: Block diagram of a CDMA System with an Excision Filter.

energy spreading sequence ck = {ck (1) , ck (2) , ..., ck (L)} ,where ck (l) ∈{±1/√L

}, l1 =

1, 2, .., L. The complex low pass equivalent transmitted signal for kth user can be written

as

sk (t) =∞∑

i=−∞

L−1∑l=0

ak (i) ck (l) p (t− lTc − iTs) (4.1)

where ak (i) and ck (l) are the i th information bit and l th chip of the spreading code of

k th user, L is the length of spreading code and is called the processing gain, L = Ts/Tc =

1/ (symbol rate). Ts is the symbol duration and Tc is the chip rate. In (4.1), p (t) is a

pulse satisfying the following relations:

p (t) =

1

0

−∆ ≤ t ≤ T′s −∆

otherwise(4.2)

The received signal in the presence of a jamming signal and Additive White Gaussian

Noise (AWGN) can be written as:

r (t) =K∑

k=1

∞∑i=−∞

L−1∑l=0

ak (i) ck (l) p (t− lTc − iTs) + J (t) + n (t) (4.3)

67

Page 86: Jammer Excision Based on Computational Intelligence Techniques

where K is the total number of users, n (t) is the AWGN and J (t) is the jamming signal.

J (t) can be written as sum of sinusoids:

J (t) =M∑

m=1

Am (i) sin (2πfmt+ φm) (4.4)

Where Am, fm and φm are amplitude, frequency and phase of m th sinusoid respectively.

The received signal r (t) is then sampled to get r (n) and convolved with a discrete excision

filter. The output of the filter with N filter coefficients/weights w is denoted by y (n)

and is given by:

y (n) =N∑

j=0

r (n− j)w (j) (4.5)

The received signal is then passed through a bank of K correlators or matched filter prior

to decision stage. This involves multiplication with users spreading code and averaging

it over symbol duration Ts. The output of the k th correlator at receiver is given by

uk (n) =1

L

Ts∑i=1

L−1∑l=0

y (i) ck (l) (4.6)

The bit is detected by a conventional single user detector by just determining the sign of

the correlator output. Let the detected bit be ak using a matched filter the detection is

made as

ak (n) = sign (< (uk (n))) (4.7)

where < (u) denotes real component of u.

4.3 Wiener Filtering for Jammer Excision in CDMA

Wiener filter reduces the effect of jamming by comparison with the desired noiseless

signal. Pilot sequence is transmitted for designing of filter and are known at receiver.

Performance criterion of Wiener filter is minimum Mean Square Error(MSE). The MSE

68

Page 87: Jammer Excision Based on Computational Intelligence Techniques

−1

0

1

−1−0.500.511.50.5

1

1.5

2

2.5

3

3.5

Filter Coeff. 1Filter Coeff. 2

Mea

n S

quar

e E

rror

Figure 4.2: Surface plot of the cost function.

is defined as:

E[e2 (n)

]=

1

N

[N∑

k=1

(dpilot (n)− y (n))2

](4.8)

The Wiener filter is designed to achieve an output close to the desired signal dpilot by

finding the optimum filter coefficients that minimize the MSE between the pilot data and

filtered signal, which can be stated as:

wopt = arg min E[e2 (n)

](4.9)

The Wiener filter coefficients w are given by:

wopt = R−1P (4.10)

Where R is the autocorrelation matrix of the received pilot signal and P, the cross

correlation matrix between the received signal and the pilot signal. Jammer free signal

69

Page 88: Jammer Excision Based on Computational Intelligence Techniques

is achieved using this wopt in equation (4.5). The output of the filter is further processed

for detection.

The Wiener filter solution is based on the assumptions that the signal and the noise are

stationary linear stochastic processes with known autocorrelation and cross correlation.

In practice the exact statistics (i.e. R and P) are not known, needed to compute the

optimal Wiener filter hence degrading the performance. Larger size of R and P is required

for more accurate estimates of correlation values resulting in large and better wopt . The

large sizes of R, P and wopt are too expensive computationally in many applications e.g.

real time communication. Efficient methods are required for calculation of matrix inverse

(R−1).

Proposed jamming excision based on nature inspired computational intelligence tech-

niques do not require the known statistics of the signal and the noise. These also alleviate

cumbersome calculations for finding inverse of matrix.

4.4 PSO for Jammer Excision in CDMA

There are wide varieties of problems that have been solved using PSO [66–68]. PSO

has been applied for achieving global optimization in non-linear and recursive adaptive

filter structures [108,109]. We have applied PSO for jammer excision of CDMA signal to

minimize the Mean Square Error (MSE) or cost function (4.8) between the pilot data and

filtered signal. Particle position w represents the detector weights and particle velocity

∆w represents the updating increment in the weight matrix i.e.

∆wi+1s = φ∆wi

s + α1γi1

(ps −wi

s

)+ α1γ

i2

(g −wi

s

)(4.11)

wi+1s = wi

s + ∆wi+1s (4.12)

First the initial population is generated with random positions W and velocities ∆W in

the initialization block of dimensions S × N , where S represents the swarm size and N

70

Page 89: Jammer Excision Based on Computational Intelligence Techniques

is the filter length. The current searching point of each agent is set to pbest. The best

evaluated value of pbest is set to gbest and agent number with best value is stored. Each

particle evaluates the cost function (4.8). If this value is less than the current pbest of

the agent, the gbest is replaced by the current value. If the best value of pbest is less than

the current gbest, the gbest is replaced by the best value and the agent number with its

value is stored. The current searching point of each agent is changed using (4.11) and

(4.12). This process will continue until the termination criterion is finally met. The PSO

algorithm for jammer excision in CDMA is described as follows

PSO Algorithm for Jammer Excision

Initialize particles with initial weight matrix W and increment matrix ∆W with

dimensions S ×N. Let ws represent s th row of W

for i=1:iterations

for s=1:S

1. Evaluate cost function (4.8) for sth row of W

if (fitness (ws)) < fitness (wpbest)

fitness (wpbest) = fitness (ws)

wpbest=ws

end if

end

2. Update W and ∆W equations (4.11) and (4.12)

gbest=min (pbest)

wgbest=W

(arg min

1≤n≤N(Pbest)

)end

3. wgbestis the solution

71

Page 90: Jammer Excision Based on Computational Intelligence Techniques

s=s+1

YesNo

Evaluate MSE for sth row of Wrepresented by ws

s=1

YesNoMSE(ws)<MSE(wpbest)s

wpbest=wss

Initialize (S×N) dimensionalrandom matrices W and W

s=1

<Ss

No

Yes

YesNo

Convergence criterion met?

s

Stop: wgbest is the optimal solution

Update W and W

m=arg min[MSE(wpbest)]wgbest=wpbest

s

m

min[MSE(wpbest)]<MSE(wgbest)1 s S

Figure 4.3: Flow chart of the particle swarm optimization algorithm, where S is theswarm size, W, ∆W and Wpbest are (S ×N) dimensional matrices, ws is the sth row ofW.

72

Page 91: Jammer Excision Based on Computational Intelligence Techniques

4.4.1 Optimization of PSO for Jammer Excision

Three parameters of PSO which can be tuned for optimal performance are acceleration

constants α1,α2 and inertial weight φ. Different values of α1 and α2 lead to improved

performance [62] and therefore the values were tuned and optimal values were found to

be 2.0 and 1.75 respectively and resulted in faster convergence towards optima. The

parameter φ is very important in determining the type of trajectory the particle travels.

A large inertia weight facilitates the global exploration while with a smaller one, the

particle is more intended to do local exploration. A proper choice of inertia weight

provides the balance between the global and local exploration ability of the swarm. There

is a number of proposed shemes of assigng value to inertial weight that give enhanced

performance as compared to a basic PSO algorithm with fixed inertia. Experimental

results suggest that it is better to initially set the inertia to a large value and then

gradually decrease its value to obtain the refined solution [63]. If inertial weight decreeases

linearly then it is called linearly decreasing inertial weight (LDIW) strategy. A natural

exponential inertial weight (NEIW) scheme for optimized performance has been suggested

in [118] that decreases inertial weight based on natural exponential function making the

convergence faster. Another modification was suggested by Eberhert [63] called random

inertial weight (RIW) in which inertial weight takes a random value between 0.5 and

1.0 enabling global search for optimal solution. Clerc et al. [77] suggested constriction

factors for improved performance and ability to find optima. Values of inertial weight and

acceleration constants can be calculated using these constriction factors and PSO using

these values can be called constriction factors inertial weight (CFIW) PSO. Values and

expressions of inertial weights for these schemes are shown in Table 4.1. The parameters

of PSO need to be tuned like any other adaptive algorithm for its optimal performance.

The choice of parameter values is made depending on the landscape and characteristics

of the cost function. In this paper we propose optimum values of the parameters for

the designing of an optimal excision filter having minimum MSE. These values have been

obtained from intensive experimental observations and simulation results. It outperforms

73

Page 92: Jammer Excision Based on Computational Intelligence Techniques

above mentioned schemes in terms of convergence rate. The inertial weight takes the value

between 0 and 0.5 randomly. These values optimize the search capability of particles to

find the minima of cost function for N filter coefficients.

4.5 CGA for Jammer Excision in CDMA

CGA is applied to find coefficients or weights of excision filter so as to minimize the cost

function (4.8). The flowchart of GA based algorithm for jammer excision in CDMA is

shown in Figure 4.4. The number of filter coefficients is N and the population size is

S. The coefficients are assumed to be the chromosomes in this application. A S × N

dimensional random matrix is generated to get an initial population of S individuals

each having N chromosomes. Generation counter variable gen is initialized with value

1. As each row of this matrix represents a filter therefore the MSE is evaluated for all

S rows. Individuals are sorted according to their respective MSE. The individual with

least MSE stands first and the one with highest stand last. The fraction of population

with highest fitness is selected for mating. New offsprings are produced after crossover

and mutation operations. Fitness of new generation is evaluated and generation counter

is incremented. Process of selection, crossover, mutation and evaluation is repeated

until termination or performance criterion is met. When generation counter hits maxi-

mum value or minimum MSE of the population is achieved the iterations are stopped.

The best individual/ filter with least MSE amongst the last population is the optimal

excision filter. Like any other optimization technique the parameters have to be tuned

Table 4.1: Inertial Weights for types of PSOPSO Type φ

Proposed 0.5×randConstriction Factor Inertial Weight (CFIW) 0.729Random Inertial Weight (RIW) 0.5+(rand/2)Linearly Decreasing Inertial Weight (LDIW) 0.9−→ 0.4

Natural Exponential Inertial Weight (NEIW) 0.4+0.5e−10k/K

74

Page 93: Jammer Excision Based on Computational Intelligence Techniques

Table 4.2: General Parameters for Simulation of GAParameter Value or Type

Mutation Type RandomCrossover Type Single PointProbability of Crossover 0.02Genome Type ContinuousInitialization RandomTermination Criterion Max. no. of iterations

for optimal performance. Summary of parameters and their values are given in Table 4.2.

CGA Algorithm for Jammer Excision

1. Initialize chromosomes with initial weight matrix W with dimensions S × N. Let

ws represent sth row of W

2. Evaluate the fitness/cost measure for ws ∈W for all s

3. for i=1:iterations

4. Select chromosomes for replacement from W

5. Select two sets of recombination chromosomes j1andj2 using (3.8) and (3.9).

6. Choose individuals from j1and j2 to enter the mating pool (MP)

7. Find the vector of random integers ncp containing cross over points

75

Page 94: Jammer Excision Based on Computational Intelligence Techniques

opt

Stop: opt

Figure 4.4: Flowchart of GA algorithm for finding optimal weights of an Excision Filterfor CDMA, where P is population size, N is number of filter coefficients and gen is thegeneration number.

8. Recombine chromosomes in MP using (3.14) and (3.15) forming cm and cm+1.

cm replaces wm.

9. Mutate chromosomes in W using (3.18)

10. Evaluate the fitness/cost measure for ws ∈W for all s

end for

11. ws with the least cost is the optimum solution

76

Page 95: Jammer Excision Based on Computational Intelligence Techniques

Table 4.3: General Parameters for Simulation of ABCParameter Value or Type

Initialization RandomColony Size 32Max. Iterations 500No. of Parameters 32No. of Food Sources 0.5 × Colony SizeMax. Trials 100Termination Criterion Max. no. of iterations

4.6 ABC for Jammer Excision in CDMA

ABC algorithm was applied to solve jammer excision problem. The general parameters

selected for the algorithm are summarised in Table 4.3. ABC algorithm improves the

randomly initialized weights with several trials per iteration. Onlooker bees try to im-

prove the weights which are found by Employed bees. Filter weights that do not improve

after repeated trials are abandoned and replaced with the ones randomly found by scout

bees. At termination the solution with best fitness is the excision filter. The flow chart

of ABC algorithm for jammer excision is shown in Figure 4.5. The ABC algorithm for

jammer excision is described below.

1. INITIALIZATION

Initialize food sources with initial weight matrix W with dimensions S×N. Let ws

represent s th row of W. Trial counters for each row are intialized to zero. Number

of employed bees, onlookers and scouts is initialized.

2. Evaluate fitness value of each row for each employed bee

3. EMPLOYED BEE PHASE

While (termination criteria is not met)

77

Page 96: Jammer Excision Based on Computational Intelligence Techniques

Initialize W matrix and no. of employed onlookers and scouts

Evaluate fitness function of each row for employed bees

Determine new set of filter coeff. for

employed bees

Evaluate fitness of new. Replace coeff.

or inc. trial

Memorizethe row with best fitness

Select a row of W for onlooker

Determine a new set of filter coeff. for

onlooker

All onlookers distributed

Is termination criterion met ?

Findabandonedrow of W. Excesstrials

Produce new set of coeff. for

abandonedrow &

Evaluate

Best fitness row is wopt

YesNo

No

Yes

Figure 4.5: Flowchart of ABC algorithm for finding optimal weights of an Excision Filterfor CDMA

4. Find new solution for all employed bees w,s for ws using (3.20)

5. Evaluate fitness using (4.8) for w,s

6. if (fitness (w,s) > fitness (ws))

Replace ws by w,s and reset trial counter Ts to zero.

else

Increment trial counter Ts

78

Page 97: Jammer Excision Based on Computational Intelligence Techniques

7. Find Ps using (3.21)

8. ONLOOKER BEE PHASE

Initialize k = 1, j = 1;

9. While (all onlookers are assigned food sources)

Randomly generate ςk ∈ [0, 1] for each kth onlooker.

if (ςk < Pj)

Assign a randomly selected row of W to an onlooker.

Select another row randomly other than the previous one for finding new w,s for

ws using (3.20)

10. Evaluate fitness using (4.8) for w,s

if (fitness (w,s) > fitness (ws))

Replace ws by w,s and reset trial counter Ts to zero.

Increment k

else

Increment trial counter Ts

Increment j

End While (onlookers)

79

Page 98: Jammer Excision Based on Computational Intelligence Techniques

Table 4.4: General Parameters for Simulation of ACOParameter Value or Type

Initialization RandomAnt Colony Size 32Max. Iterations 500No. of Parameters 32Bits per Parameter 32Frequency Factor 2Evaporation Parameter 0.5Constant Q 1Termination Criterion Max. no. of iterations

11. SCOUT BEE PHASE

Determine the food sources whose trial counter exceeds the “limit ”value

if(Tindex > limit)

Find a random solution w,index to replace abandoned windexusing (3.22)

12. Evaluate fitness using (4.8) for w,index

13. Select the row with best fitness.

14. Go to Employed Bee Phase

15. End While (termination criteria)

4.7 ACO for Jammer Excision in CDMA

ACO searches for the optimal jammer excision filter weights. The parameters and their

values are given in Table 4.4. ACO is inherently discrete so the filter weights are encoded

into bits and then again decoded to real numbers for fitness evaluation. Ants decide their

choice of bits on the amount of pheromone. Flow chart of ACO algorithm for jammer

excision is shown in Figure 4.6. The steps of algorithm are given below.

80

Page 99: Jammer Excision Based on Computational Intelligence Techniques

Initialize W matrixrandomly

Launch new Iteration of AntsEncode to binary

Find Trans. Probab.

Find new solutions based on Trans.

Probability. Update Freq and Ph. Incr.

Decode binary to real. Evaluation of

each row of W. Identify best fitness

row of W

PheromoneDeposition

PheromoneEvaporation

Row of W having best fitness is wopt

End

Is termination criterion met ?

Figure 4.6: Flowchart of ACO algorithm for finding optimal weights of an Excision Filterfor CDMA

1. Initialize particles (ants) with initial weight matrix W with dimensions S×N with

random coefficients,

for i = 1 : iterations

for j = 1 : no of ants

2. Encode real solution jth solution wj into binary solution bj.Each real coefficient in

encoded into M binary bits. Therefore each binary solution consists of N×M bits.

3. Find transition probalities, new solution b′j, update frequencies f and and compute

pheromone ∆τ as follows:

81

Page 100: Jammer Excision Based on Computational Intelligence Techniques

for k = 1 : NM

4. Evaluate transition probability for the kth bit of jth solution using (3.25)

5. Based on the transition probability, decide transition from kth bit of bj solution to

kth bit b′j i.e. (0→ 0) or (0→ 1) if bj (k) = 0 or (1→ 0) or (1→ 1) if bj (k) = 1.

if bj (k) == 0 & b′j (k) == 0, f00 (k) = f00 (k) + 1, ∆τ00 (k) = Q

Fk,∆τ01 (k) = 0

end if

if bj (k) == 0 & b′j (k) == 1, f01 (k) = f01 (k) + 1,∆τ01 (k) = Q

Fk,∆τ00 (k) = 0

end if

if bj (k) == 1 & b′j (k) == 1, f11 (k) = f11 (k) + 1,∆τ11 (k) = Q

Fk,∆τ10 (k) = 0

end if

if bj (k) == 1 & b′j (k) == 0, f10 (k) = f10 (k) + 1,∆τ10 (k) = Q

Fk,∆τ11 (k) = 0

end if

end for

6. Update pheromone using (3.27) and (3.28)

7. Decode binary solution b′j into real solution w

′j

8. Evaluate fitness for w′j using (4.8)

end for

9. Find a final solution w′

f corresponding to minimum fitness.

end for

82

Page 101: Jammer Excision Based on Computational Intelligence Techniques

Chapter 5

Numerical Results and Discussions

5.1 Introduction

In this chapter, the numerical results for various heuristic algorithms for the problem

of jammer excision in DS-CDMA system are presented and computational complexity is

evaluated and compared.

5.2 Computational Complexity and Implementation

Issues

The computation of Wiener filter coefficients, involve calculation of inverse of the cor-

relation matrix R. As shown in the appendix A computational complexity of inverting

an N×N matrix by Gaussian Elimination leads to O(n3). Although Gaussian Elimina-

tion method is not optimal and there exists a method (Strassen’s method) that requires

only O(nlog2(7)

)= O (n2.807) operations for a general matrix. But the programming of

Strassen’s algorithm is so awkward, and often Gaussian Elimination is still the preferred

method. Complexity of LMS C(LMS) is function of iterations, i.e. C(LMS) = f (K). Each

iteration of LMS requires calculation of gradient and inverse of the correlation matrix R

for updating weights. Thus making it K times more complex than Wiener.

The computational complexity of the population based algorithms i.e PSO, GA, ABC

and ACO is C(PSO), C(GA) , C(ABC), C(ACO) respectively and approximately same because

no computational intensive mathematical operation is involved except evaluation of cost

function. Let us denote it by C(pop). Then C(pop) is a function of swarm/population

size S and number of iterations. i.e. C(pop) = f (S ×K). Although C(pop) is more in-

83

Page 102: Jammer Excision Based on Computational Intelligence Techniques

tensive than C(LMS), but population based techniques can be implemented on parallel

processing architectures making them most suitable when reduced convergence time is

the key design parameter. Population based algorithms do not necessarily require initial

guess for their convergence towards optimal performance. As already discussed, C(PSO),

C(GA) C(ABC), C(ACO) is comparable, among these, PSO is preffered over the other algo-

rithms.

0 5 10 15 2010

−4

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

OPTIMALPSONOFILTERAWGN

Figure 5.1: Bit Error Rate Performance of CDMA system

One of the key advantages of PSO is the ease of implementation due to simplicity.

Unlike computationally expensive matrix inversions and complex operators, PSO merely

consists of two straightforward equations (4.11) and (4.12) for weight updates and simple

decision loop to update the pbest and gbest.

5.3 Simulation and Numerical Results

In this section, simulation results are presented to show the performance of various al-

gorithms. In these simulations, number of users is 16, processing gain is 64, filter length

is 32, swarm size is 32, and number of iterations for PSO algorithm is 75. Figure 5.1

84

Page 103: Jammer Excision Based on Computational Intelligence Techniques

−10 −5 0 5 10 15

10−4

10−3

10−2

10−1

100

SIR (dB)

BE

R

OPTIMALPSOTIME FREQUENCYNOFILTER

Figure 5.2: BER performance with noise power being kept constant and varying inter-ference power.

shows the average BER performance of the system with varying bit energy and keeping

the interference power constant. PSO based excision filter achieves the performance as

that of a Wiener filter (optimal) with less computational complexity and ease of imple-

mentation. Performance is also shown for no excision filter and without jammer (NBI)

cases in order to provide reference. Jammer excision filters provide mitigation against

the jammer as evident when their performance is compared with the case of without

mitigation. Increasing the bit energy has almost no effect on performance in the without

mitigation case. Figure 5.2 shows the BER performance of the system with constant

noise power and varying interference power. It can be seen that PSO achieves the op-

timal Wiener filter performance. The performance of excision filter based on TFDs is

also shown. It is evident that PSO based filter outperforms the one based on TF mask-

ing. Mitigation against jamming is clearly evident when performance of excision filter

is compared with no mitigation scenario. Excision filters provide more than 12 dBs of

gain when their BER performance is observed at very low Signal to Interference Ratio

(SIR) values (i.e. in the presence of high power jammer), which is usually the case in a

85

Page 104: Jammer Excision Based on Computational Intelligence Techniques

0 100 200 300 400 500

10−1

100

101

102

No. of Iterations

Mea

n S

quar

e E

rror

(M S

E)

NEIW−PSORIW−PSOLDIW−PSOCFIW−PSOProposed−PSOOptimal

Figure 5.3: Convergence of fitness or objective function for different variants of PSO.

jamming scenario. Some performance degradation is observed only at relatively high SIR

values as excision of a low power jammer also removes part of the signal of interest. In

such a scenario a SIR threshold is decided beyond which excision filter is turned off and

received signal is directly used for detection. In this case SIR of 15dB is the threshold

point. The convergence rate of objective function (4.8) with the number of iterations for

different variants of PSO is shown in Figure 5.3. Initially MSE for RIW-PSO descends

sharply until 50 iterations but then stops converging at a value quite higher than the

optimal. NEIW-PSO and LDIW-PSO fall in first few iterations then slowly converge to

optimal after 200 and 320 iterations respectively. CFIW-PSO performs quite better and

converges in 150 iterations. GA performs similar to CFIW for the first 50 iterations but

then diverges to meet optimal after 300 iterations. Proposed PSO with tuned parameters

converge to optimal performance in just 75 iterations. At 50 iterations the performance

of proposed exciser is near optimal and all the other techniques have significantly higher

MSE for the underlying problem. These results have been obtained by averaging it over

many iterations. Figure 5.4 shows the comparison of all the heuristics based computa-

tional intelligence algorithms considered in the thesis for excising jammer. LMS achieves

86

Page 105: Jammer Excision Based on Computational Intelligence Techniques

0 100 200 300 400 50010

−1

100

101

102

Iterations/Generations

MS

E

LMSACOABCPSOGAOptimal Wiener

Figure 5.4: Convergence of fitness or objective function for various heuristic algorithms.

optimal performance by slowly converging after 300 iterations. ACO achieves near opti-

mal performance at 500 iterations. ABC shows better convergence rate than ACO and

achieves optimal value after 400 iterations. PSO converges fastest, in less than 100 it-

erations while GA achieves near optimal at 200 iterations and completely converge at

300 iterations. PSO is observed to perform the best amongst all the other considered

algorithms.

The frequency domain view of CDMA signal with jammer is shown in Figure 5.5.

The TF plot of narrowbannd jammer is shown in Figure 5.6. A notch filter is designed

for jammer excision using computational intelligence techniques. Figures 5.7, 5.8 and

5.9 displays the plot of magnitude response 10log10H(ω) versus normalized frequency for

multiple filters designed by optimal and nature inspired techniques. Figure 5.7 shows

the results after 50 iterations of algorithm. The optimal Wiener filter shows deep notch

at the frequency of NBI at 0.25π radians and for other frequencies its response is flat.

Nature inspired heuristics PSO, GA and ABC have not yet converged. These algorithms

have created notch at jammer frequency but it is not as deep as that of optimal and at

other frequencies their response is not flat causing considerable degradation of desired

87

Page 106: Jammer Excision Based on Computational Intelligence Techniques

0 0.2 0.4 0.6 0.8 10

50

100

150

200

250

300

Mag

nitu

de

Normalized Frequency

Figure 5.5: Frequency domain view of CDMA signal with jammer.

signal. In Figure 5.8 we observe that PSO has been able to achieve near optimal weights

with same position and depth of notch after 250 iterations while GA and ABC are still

converging towards the optimal. In Figure 5.9 we observe that after 500 iterations the

PSO has already achieved the same weights as that of optimal while GA and ABC have

achieved near optimal values as evident from its frequency domain view.

Among all these algorithms PSO is seen to outperform all the other algoritms and it

converges to the optimum in less than 100 iterations.

A broadband jammer like a chirp jammer as shown in Figure 5.10 is superimposed

on a CDMA signal. This type of jammer is treated in this thesis as an intantaneously

narrowband signal and same system model is used. This is achieved by taking short

intervals of signal over which the frequency of jammer does not change significantly.

Excision filter is designed for each interval.

88

Page 107: Jammer Excision Based on Computational Intelligence Techniques

Figure 5.6: Time Frequency domain view of CDMA signal with jammer.

5.3.1 Comparison with Existing Techniques

Computational Intelligence Techniques are iterative in nature therefore comparison on

the basis of number of iterations or convergence rate can be made with existing iterative

scheme like LMS. The convergence speed of LMS is shown in the Figure 5.4. PSO and

GA converge prior to LMS while ACO and ABC converge later for a single processor

implementation. These CI based techniqes can be implemented on parallel architectures

and their convergence rate can be speeded leaving LMS far behind as it is not eligible

for parallel computing. TFD based approaches are very robust against non-stationary

jamming scenario therefore the BER performance of TF Masking is compared with that

of proposed techniques, as shown in Figure 5.2. It is evident from the figure that pro-

posed techniques provide more than 2 dB of advantage in bit energy as compared to TF

Masking. Getting a concentrated TFD of received signal is a challenge and TFD has to

be calculated repeatedly for better results thus making it computationally intensive.

89

Page 108: Jammer Excision Based on Computational Intelligence Techniques

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9−30

−25

−20

−15

−10

−5

0

5

10

15

Normalized Frequency (×π rad/sample)

Mag

nitu

de (

dB)

Magnitude Response (dB)

PSO

GA

ABC

OPTIMAL

Figure 5.7: Filter visualization after 50 iterations.

5.3.2 Comparison between GA and PSO and ABC

The objective of this section is to statistically compare the performance of PSO,ABC

and GA, for the problem of jamming excision in CDMA. Although GA, ABC and PSO

have many common properties, there are some differences as well. Unlike GA, PSO does

not have operators such as crossover and mutation. ABC also uses mutation operator

for new solutions but have fewer control parameters than GA. In PSO, the individuals or

solutions called particles fly through the search space and they are led by current optimal

particle. These particles update themselves with the internal velocity and they also have

memory which is an important factor in implementing the algorithm. PSO algorithm

allows one-way sharing of information to others. GA uses selection, while PSO algorithm

does not, and thus has the advantage of saving a lot of time. In GA, chromosomes share

information with each other, and thus the whole population moves like a single group

towards an optimal area. ABC also makes a detailed search locally during the onlooker

bee phase, thus regions of search space with better fitness are thoroughly searched for

optimal solution in shorter time.

90

Page 109: Jammer Excision Based on Computational Intelligence Techniques

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9−25

−20

−15

−10

−5

0

5

Normalized Frequency (×π rad/sample)

Mag

nitu

de (

dB)

Magnitude Response (dB)

PSO

GA

ABC

OPTIMAL

Figure 5.8: Filter visualization after 250 iterations.

As far as the crossover operator is concerned, its effects often vary over a run. At the

beginning the population of solutions is randomly initialized. By applying the crossover

operator, the newly obtained chromosomes can vary in the search space. Some can be

situated near the solution; meanwhile others can go out from the search space. At the

end of a run, populations converged to the optimum solution, meaning that many, if

not all, of the chromosomes have similar structures. At this moment applying crossover

influences less the new chromosomes. This implies that the crossover probability should

be altered as the iterations progress. It has a higher value at the start of iterations

and gradually decreased to a small value till the end. The operation of crossover is not

present in PSO however path of a particle alters in a stochastic fashion towards its pbest

and the gbest. The particles that show behavior similar to crossover during search are

those which are in the middle of subswarms that have gathered around local minima and

the ones present between two consecutive global minima. Exploration of the middle area

between two prospective minima by PSO resembles crossover in GA. Generally, crossover

in GA operates on the randomly selected parents implying randomness in evolution of an

individual. In PSO, a particle does not exchange materials with other particle, but its

91

Page 110: Jammer Excision Based on Computational Intelligence Techniques

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9−20

−15

−10

−5

0

5

Normalized Frequency (×π rad/sample)

Mag

nitu

de (

dB)

Magnitude Response (dB)

PSO

GA

ABC

OPTIMAL

Figure 5.9: Filter visualization after 500 iterations.

move is influenced by the move of the other particle. In this way, the move of a particle

is influenced by its own previous best position and by the global best position. The effect

of mutation operator is opposite to that of crossover operator. Mutation has less impact

on the chromosome at the beginning of the run and a bigger effect at the end of the run.

This is because at the beginning the population is randomly generated and swapping a

weight now does not change the chromosome so evidently as swapping a weight at the

end of the run, when the population has converged to the optimum solution. That is

why, in general, it uses a relatively small value of the mutation rate at the beginning

and it is increased at the end. Because each particle has a velocity, PSO mutation-

like behavior is directional, with a kind of builtin momentum . The difference between

pbest and the present location has some of this same flavor, but the maximum velocity

is the same for all parameters. The selection operator of GA supports the survival of

the best chromosome. This selection operator can be implemented in many ways. In an

elitist strategy the chromosome with the best fitness value is always moved to the next

generation regardless of the selection used. All particles persist in PSO as members of

population during an entire run of iterations so selection is not employed in it. Among

92

Page 111: Jammer Excision Based on Computational Intelligence Techniques

the evolutionary algorithms PSO is the only one that does not include survival of the

best strategy that replaces worst performing members of population. The traversed path

of a particle shows its blood line in PSO. In ABC, random solution by a scout can replace

a the best one found over the iterations and is not saved for future iterations. In this

manner ABC is somewhat greedy in selection.

This comparison shows that PSO has more advantages than GA such as PSO is easy

to implement, take less time and there are few parameters to adjust. However, GA is

better in global search while PSO is better in local search. ABC like PSO has fewer

control parameters.

PSO has the same effectiveness (finding the true global optimal solution) as the

GA but with significantly better computational efficiency (less function evaluations) by

implementing statistical analysis and formal hypothesis testing. ABC has a very robust

local and global search mechanism.

5.3.3 Comments on ACO

The ACO is inspired by the foraging behaviors of ant colonies. At the core of this behavior

the indirect communication between the ants enables them to find short paths between

their nest and food sources. This characteristic of real ant colonies is exploited in ACO

algorithm to solve mainly discrete optimization problems. ACO is more applicable for

problems where source and destination are predefined and specific. While for jamming

excision, the optimal solution lies in a continuous multidimensional space. PSO, GA and

ABC are inherently suitable for jamming excision problem. An attempt is made to adapt

ACO for the underlying problem by converting the continuous space into a combinatorial

problem in which ants find shortest path among the bits, but due to a limited number

of bits for the representation of real numbers, ACO cannot achieve the performance of

other algorithms.

93

Page 112: Jammer Excision Based on Computational Intelligence Techniques

5.4 Conclusions

A jammer excision problem is presented as an optimization problem and several solu-

tions based on nature inspired algorithms are presented. Simulation results of all the

algorithms are compared with those of the optimum Wiener filter. Wiener filter involves

the calculation of inverse of a large matrix whose size depends upon the size of weight-

ing matrix. Consequently complexity increases exponentially with the increase in size

of weighting matrix. Among all the algorithms, PSO based algorithm shows excellent

performance and drastically reduces the computational complexity and simplifies imple-

mentation. We conclude that PSO outperforms all the algorithms. It is simple in concept,

easy to implement and computationally efficient. Unlike other heuristic techniques PSO

has a flexible and well-balanced mechanism to enhance and adapt to global and local

explorations abilities.

94

Page 113: Jammer Excision Based on Computational Intelligence Techniques

Figure 5.10: TF plot of CDMA signal with chirp jammer

95

Page 114: Jammer Excision Based on Computational Intelligence Techniques

Chapter 6

Conclusions and Directions for

Future Research

This chapter presents the main conclusions of this thesis and the future work possibilities.

The research works that have been presented in the previous chapters will be summarised

and concluded along with the overall achievement to fulfil the aims and objectives of the

research. After that, all the possible modification which could give moral or intellectual

benefit to the performance of the presented methodologies that are used for this work

will be discussed in details as the future work.

This research is focused on jammer excision in CDMA using computational intelli-

gence techniques that are capable to deal with such problems rather than on theoretical

developments. In this thesis, the literature review of computational intelligence tech-

niques such as PSO, GA, ABC and ACO are given. The majority of the research show

that a lot of improvement is achieved using computational intelligence techniques. Fur-

thermore, these techniques has played a main role in improving the performance of opti-

mization algorithms problem. In this research the overview of jamming excision problems

has been given in detail. The complexity of excision problem is illustrated. Several algo-

rithms have been developed such as PSO, GA, ABC and ACO to solve jammer excision

problem in CDMA that can be classified as complex problem. In fact, this complexity

is basically caused by objectives and the size of the search space. The results of these

algorithms demonstrated that they are working effectively where good results can be

determined.

Optimized Jammer Excision using non-conventional meta-heuristic based approach

has been presented for the first time according to the best of author’s knowledge. Several

96

Page 115: Jammer Excision Based on Computational Intelligence Techniques

variants of the PSO and basic models of other techniques like GA, ABC and ACO

have been applied for the first time to optimize a real-life jammer excision problem. The

proposed jammer excision techniques result in a significant reduction of complexity, while

keeping a near optimal performance.

6.1 Directions for Future Research

Following the investigations described in this thesis, a number of projects could be taken

up, involving improving and extending some parts of this work. In the following subsec-

tions, extending works are given based on the model function

• The heuristic algorithms can be analyzed for future enhancement such that new

research could be focused to produce better solution by improving the effectiveness

and reducing the limitations. More possibilities for dynamically determining the

best destination through ACO can be evolved and a plan to endow PSO with

fitness sharing aiming to investigate whether this helps in improving performance.

In future the velocity of each individual can be updated by taking the best element

found in all iterations rather than that of the current iteration only.

• Real time implementation of the system, testing, and validation can be part of the

future work. This work can be implemented in the industry. This work will verify

and validate the capacity of the system in real time. In this case, some parts of the

model may need setting or modification.

• Hybridization of feasible heuristics can be made to enhance their performance and

speed up convergence.

97

Page 116: Jammer Excision Based on Computational Intelligence Techniques

Appendix A

Gaussian Elimination Matrix

Inversion

A.1 Gaussian Elimination Algorithm

Gaussian Elimination algorithm is as follows [116]

1. for, i = 1 : n− 1 do steps 2-4

2. Find p, the smallest integer with ≤ p ≤ n and apk 6= 0 if no apk is found, no unique

solution

3. if p 6= k then {Ep ←→ Ei} % swap if needed

4. for, j = i+ 1 : n do steps 5 and 6

5. mji = aji/aii

6. Ej − mjiEi ←→ Ei % Elimination

7. if ann 6= 0, no unique solution, STOP

8. xn = an,n+1/aii % start of backward substitution

9. for, j = n− 1 : 1

xi =[ai,n+1 −

∑nj=i+1 ai,jxj/aii

]end

end

end

10. x is the solution

98

Page 117: Jammer Excision Based on Computational Intelligence Techniques

A.2 Computational Complexity

This section again refers to [116]. In step 5, n − i divisions are performed. In step 6:

The replacement Ej − mjiEi → Ei requires mji multiplied by each term Ei, resulting

(n− i) (n− i+ 1) multiplications. After this is completed, each term of the resulting

equation is subtracted from the corresponding term Ej. This requires (n− i) (n− i+ 1)

subtractions. Therefore for each i = 1 : n− 1, the operations required in Steps 5 and 6

are:

Mult/Div: (n− i) + (n− i) (n− i+ 1) = (n− i) (n− i+ 2)

Add/Sub: (n− i) (n− i+ 1)

As∑n

j=1 1 = n∑mj=1 j = m(m+1)

2∑mj=1 j

2 = m(m+1)(2m+1)6

therefor summing over i

Mult/Div:∑n−1

i=1 (n− i) (n− i+ 2) = (n2 + 2n)∑n−1

i=1 1− 2 (n+ 1)∑n−1

i=1 i+∑n−1

i=1 i2

=2n3+3n2−5n6

Add/Sub:∑n−1

i=1 (n− i) (n− i+ 1) = n3−n3

Now we go to the back substitution portion,

Steps 8 and 9:

Step 8: 1 division

Step 9: multiplies and adds for each summation term, then 1 subtract and 1 divide.

So the total operation count in Steps 8 and 9:

Mult/Div: 1+∑n−1

i=1 [(n− i) + 1] = n2+n2

Add/Sub:∑n−1

i=1 [(n− i− 1) + 1] = n2−n2

Total Operation count:

Mult/Div: 2n3+3n2−5n6

+ n2+n2

= n3+3n2−n3

Add/Sub: n3−n3

+ n2−n2

= 2n3+3n2−5n6

Therefore this algorithm is an O (n3) operation.

99

Page 118: Jammer Excision Based on Computational Intelligence Techniques

Bibliography

[1] A. Papandreou-Suppapola, “Applications in Time-Frequency Signal Processing”,

Tempe, Arizona, CRC press, 2003.

[2] M. Amin, C. Wang and A. Lindsey, “Optimum Interference Mitigation in Spread

Spectrum Communications using Open Loop Adaptive Filters ”, IEEE Trans. on

Signal Processing, vol. 47(7), pp. 1966-1976, Jul. 1999.

[3] S. Lach, M.G. Amin and A. Lindsey, “Broadband Non-stationary Interference Ex-

cision in Spread Spectrum Communication System using Time Frequency Synthesis

Techniques”, Proc. IEEE International Conf. Acoustics, Speech and Signal Process-

ing, vol. 6, pp. 3257-3260, May 1998.

[4] J.D. Laster and J.H. Reed, “Interference Rejection in Digital Wireless Communica-

tions”, IEEE Signal Processing Magazine, vol. 14(3), pp. 37-62, May 1997.

[5] L. Liu, “FM Jammer Excision by using Time-Varying AR Filter in Spread Spectrum

Communication Systems ”, Proc. International Conference on Networking, Sensing

and Control, pp. 117-121, Apr 2010.

[6] J.G. Proakis,“Interference Suppression in Spread Spectrum Systems”, Proc. IEEE

International Symposium on Spread Spectrum Techniques and Applications, vol. 1,

pp. 259-266, 1996.

[7] L.M. Li and L.B. Milstein, “Rejection of Narrowband Interference in PN spread

Spectrum Systems using Transversal Filters”. IEEE Trans. Commun., vol. 30, pp.

925-928, 1982.

[8] S. Theodoridis, N. Kalouptsidis, J. Proakis and G. Koyas, “Interference Rejection

in PN Spread-Spectrum Systems with LS Linear Phase FIR Filters”. IEEE Trans.

on Commun., vol. 37(9), pp. 991-994, 1989.

100

Page 119: Jammer Excision Based on Computational Intelligence Techniques

[9] T. Hidalgo Stitz , “Filter Bank Techniques for the Physical Layer in Wireless Com-

munications ”, PhD Thesis, Tampere University of Technology, Tampere, Finland,

Oct 2010,

[10] M.J. Medley, G.J. Saulnier and P.K. Das, “Narrow-Band Interference Excision in

Spread Spectrum Systems using Lapped Transforms”. IEEE Trans. Commun. , vol.

45(11), pp. 1444-1455, 1997.

[11] D.C. Shin and C.L. Nikias, “Adaptive Interference Canceller for Narrowband and

Wideband Interference Using Higher Order Statistics ”. IEEE Trans. Signal Pro-

cessing, vol. 42(10), pp. 2715-2728, 1994.

[12] L.A. Rusch and H.V. Poor, “Narrowband Interference Suppression in CDMA Spread

Spectrum Communications ”. IEEE Trans. Commun., vol. 42(234), 1969-1979, 1994.

[13] H.L. Dukic, Z.S. Dobrosavljevic, Z.D. Stojanovic and I. S. Stojanovic, “Rejection

Of Narrowband Interference in DS Spread Spectrum Systems Using Two-Stage De-

cision Feedback Filters”, IEEE Intl. Sumposium Spread Spectrum Techniques and

Applications, vol. 2, pp. 526-529 , Jul. 1994.

[14] R.A. Poisel, “Modern Communications Jamming Principles and Techniques”, Nor-

wood, MA(USA), Artech House Publishers, 2004.

[15] J.W. Choi and N.I. Cho, “Narrow-Band Interference Suppression in Direct Sequence

Spread Spectrum Systems using a Lattice IIR Notch Filter”, Proc. IEEE Interna-

tional Conference on Acoustics, Speech, and Signal Processing, pp. 2237-2240, vol.

4, May 2001.

[16] R. Suleesathira and L.F. Chaparro, “Interference Mitigation in Spread Spectrum us-

ing Discrete Evolutionary and Hough Transforms”, Proc. IEEE International Con-

ference on Acoustics, Speech, and Signal Processing, vol.5, pp. 2821-2824, June

2000.

101

Page 120: Jammer Excision Based on Computational Intelligence Techniques

[17] A. Francos and M. Porat, “Analysis and Synthesis of Multicomponent Signals using

Positive Time Frequency Distributions”, IEEE Trans. Signal Processing, vol. 47(2),

Feb. 1999.

[18] X. Ouyang, and M. G. Amin, “Short Time Fourier Transform Receiver for Non-

stationary Interference Excision in Direct Sequence Spread Spectrum Communica-

tions”, IEEE Trans. on Signal Processing, vol. 49(4), pp. 851-863, Apr. 2001.

[19] E. Saatci, A. Akan, and N. Kabaoglu, “Broadband Jammer Excision in Spread

Spectrum Communication Systems using Time-Frequency Masking”, Proc. IEEE

Signal Processing Workshop on Higher-Order Statistics, pp. 48-51, June 1999.

[20] B. Saleh and N. Subotic, “Time-Variant Filtering Of Signals In The Mixed Time Fre-

quency Domain”, IEEE Transactions on Acoustics, Speech, and Signal Processing,

vol. 33(6), pp. 1479-1485, Dec. 1985.

[21] L.F. Chaparro and A. Alshehri, “Jammer Excision in Spread Spectrum Commu-

nications via Wiener Masking and Frequency-Frequency Evolutionary Transform”,

IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 4,

pp. 473-476, April 2003.

[22] S. Djukanovic, V. Popovic, M. Dakovic and L. Stankovic, “A Parametric Method

for Non-Stationary Interference Suppression in Direct Sequence Spread-Spectrum

Systems”, Signal Processing, Elsevier, vol. 91(6), pp. 1425-1431, Jun 2011.

[23] S.R. Lach, A.R. Lindsey and M.G. Amin,“Broadband nonstationary Interference

Excision for Spread Spectrum Communications using Time-Frequency Syntehesis”,

Proc. of the IEEE International Conference on Acoustics, Speech and Signal Pro-

cessing, vol. 6, pp. 3257-3260, 1998.

[24] N. Huang and J.K Aggarwal, “Frequency Domain Considerations of LSV Digital

Filters”, IEEE Trans. on Circuits and Systems, vol. 28(4), pp. 279-287, April 1981.

102

Page 121: Jammer Excision Based on Computational Intelligence Techniques

[25] M. G. Amin, “Interference Mitigation in Spread Spectrum Communication Systems

using Time-Frequency Distributions”, IEEE Trans. on Signal Processing, vol. 45(1)

, pp 90-101, Jan. 1997.

[26] Shan and A.A. Beex, “High Resoloution Instantaneous Frequency Estimation

based on Time-Varying AR Modeling”, IEEE International Symposium on Time-

Frequency and Time-Scale Analysis, pp. 109-112, Oct. 1998.

[27] R.L. Pickholz, L.B. Milstein and D.L. Schilling, “Spread Spectrum for Mobile Com-

munications”, IEEE Trans. on Vehicular Technology, vol. 40(2), pp. 313-322, May

1991.

[28] L.B. Milstein, “Interference Suppression to Aid Acquisition in DS Spread Spectrum

Communications ”, IEEE Trans Commun., vol. 36(11), pp. 1200-1202, Nov. 1988.

[29] D. Shklarsky, P.K. Das and L.B. Milstein, “Adaptive Narrowband Interference Sup-

pression”, Proc. Nat. Telecommun. Conf , pp. 15.2.1-15.2.4, Nov. 1979.

[30] L.B. Milstein, “Interference Rejection Techniques in Spread Spectrum Communica-

tions ”, IEEE Trans. on Commun., 76(6), pp. 657-671, Jun. 1988.

[31] S. Wang, Jian-Ping A., A. Wang and X.Bu, “A Minimum Value Based Threshold

Setting Strategy for Frequency Domain Interference Excision”, IEEE Signal Pro-

cessing Letters, vol. 17(5), pp. 501-504, May 2010.

[32] X. Wang and H.V. Poor, Wireless Communication Systems: Advanced Techniques

for Signal Processing, Pearson Education, 2004.

[33] B. Widrow and S.D. Stearns, “Adaptive Signal Processing”, Pearson Education,

1985.

[34] Fulian Yin and Lili Guo, “ZF Code-Aided Narrow-Band Interference Suppression for

Synchronous DS-CDMA Systems”, Proc. Intl. Conf. on Wireless Communications,

Networking and Mobile Computing, pp. 1-4, Oct. 2008.

103

Page 122: Jammer Excision Based on Computational Intelligence Techniques

[35] H.V Poor and X. Wang, “Blind Adaptive Suppression of Narrowband Digital Inter-

fers from Spread Spectrum Signals”, Wireless Personal Commun., vol. 6, pp. 69-96,

Jan. 1998.

[36] R.A. Scholtz, “The Evolution of Spread-Spectrum Multiple Access Communication”,

Kluwer Academic Publishers, Boston, MA, 1995.

[37] S.G. Glisic, and P.A. Leppanen , “A Conversation with Claude Shannon”, IEEE

Commun. Magazine, vol. 22(5), pp. 123-126, May 1984.

[38] G.R. Cooper and R.W. Nettleton, “A Spread Spectrum Technique for High Capacity

Mobile Communications”, IEEE Trans. Veh. Tech. vol. 27(4), pp. 264-275, Nov.

1978.

[39] T. Ojanpera, “An Overview of Research Activities for Third Generation Mobile

Communication”,Kluwer Academic Publishers, Dordrecht, Netherlands, pp. 415-

446, 1997.

[40] Richard van N., Ramjee P. , “OFDM for Wireless Multimedia Communication”,

Artech House, Boston, London, 2000.

[41] Verdu, “Multi-user Detection ”, Cambridge University Press, 1998.

[42] R. Lupas and S. Verdu, “Near-far Resistance of Multiuser Detectors in Asynchronous

Channels,”, IEEE Trans. Commun., vol. 38(4), pp. 496-508, April 1990.

[43] Z. Xie, R.T. Short, and C.K. Rushforth, “A Family of Suboptimum Detectors for

Coherent Multi-user Communications”, IEEE Journal Select. Areas Commun. , vol.

8(4), pp. 683-690, May 1990.

[44] P. Patel and J. Holtzman, “Analysis of a Simple Successive Interference Cancellation

Scheme in DS/CDMA System”, IEEE Journal Select. Areas Commun., vol 12(5),

pp. 509-519, June 1994.

104

Page 123: Jammer Excision Based on Computational Intelligence Techniques

[45] M.K. Varanasi and B. Aazhang, “Multistage Detection in Asynchronous Code-

Division Multiple Access Communications ”, IEEE Trans. Commun., vol. 38(4),

pp. 509-519, Apr. 1990.

[46] A. Duel-Hallen, “Decorrelating Decision Feedback Multiuser Detector for Code-

Division Multiple-Access Channel ”, IEEE Trans. Commun., vol. 41(2), pp. 285-290,

Feb. l993.

[47] D. Pham, K.R. Dattipati, P.K. Willet, and J. Luo, “An Improved Complex Sphere

Decoder for V-Blast System ”, IEEE Signal Process. Lett., vol. 11(9), pp. 748-751,

Sep. 2004.

[48] T. Cui and C. Tellambura, “Approximate ML Detection for MIMO Systems using

Multistage Sphere Decoding ”, IEEE Signal Process. Lett. , vol. 12(3), pp. 222-225,

Mar. 2005.

[49] M.C. Reed, C.B. Schlegel, P.D. Alexander and J.A. Asenstorfer, “Iterative Multi-

User Detection with FEC”, IEEE Trans. on Commun., vol. 46(12), pp. 1693-1699,

Dec. 1998.

[50] M. Moher and P. Guinand, “An Iterative Algorithm for Asynchronous Coded Mul-

tiuser Detection ”, IEEE Commun. Lett., vol. 2(8), pp. 229-231, Aug. 1998.

[51] M.C. Reed and P.D. Alexander, “Multiuser Detection using Antenna Arrays and

FEC on Multipath Channels”, IEEE Journal Selected Areas Commun., vol. 17(12),

pp. 2082-2089, Dec. 1999.

[52] X. Wang and H.V. Poor, “Iterative (turbo) Soft Interference Cancellation and De-

coding for Coded CDMA ”, IEEE Trans. Commun., vol. 47(7), pp. 1046-1061, July

1999.

105

Page 124: Jammer Excision Based on Computational Intelligence Techniques

[53] Z. Shi and C. Schlegel, “Joint Iterative Decoding of Serially Concatenated Error

Control Coded CDMA ”, IEEE Journal Selected Areas Commun. , vol. 19(8), pp.

1646-1653, Aug. 2001.

[54] M. Dorigo and G.Di Caro, “The Ant colony Optimization Meta-Heuristic ”, in “New

Ideas in Optimization ”, editors D. Crone, M. Dorigo and F. Glover, pp. 11-32, New

York, McGraw-Hill, 1999.

[55] L.J. Fogel, “Autonomous Automata”, Industrial Research, vol. 4, pp. 14-19, 1962.

[56] D.E. Goldberg, “Genetic Algorithms in Search ”, Optimization and Machine Learn-

ing”, Addison Wesley Longman, 1989.

[57] [13] J. Kennedy and R.C. Eberhart, “Particle swarm optimization”, Proc. IEEE

International Conference on Neural Networks, vol. 4, pp 1942-1948. IEEE Press,

1995.

[58] J.R. Koza, “Genetic Programming: On the Programming of Computers by Means

of Natural Selection”. The MIT Press, Cambridge MA, 1992.

[59] I. Rechenberg, “Evolution strategy: Optimization of technical systems by means of

biological evolution ”, Fromman-Holzboog, Verlag, 1973.

[60] J. Kennedy and R.C. Eberhart, “Particle Swarm Optimization ”, Proc. Intl. Conf.

Neural Networks, Perth Australia, IEEE Press, Piscataway NJ, pp. 1942-1948,

Nov./Dec. 1995.

[61] R. Eberhart, Y. Shi, and J. Kennedy, “Swarm Intelligence ”, San Mateo CA, Morgan

Kaufmann Academic Press, 2001.

[62] P.N. Suganthan, “Particle Swarm Optimizer with Neighbourhood Operator ”, Proc.

Congr. Evolutionary Computation, Washington DC, pp. 1958-1961, 1999.

106

Page 125: Jammer Excision Based on Computational Intelligence Techniques

[63] Y. Shi and R. Eberhart, “Empirical Study of Particle Swarm Optimization ”, Proc.

Congress on Evolutionary Computation, pp. 1945-1950, Jul. 1999.

[64] S.C. Esquivel and A.C. Coello Coello, “On the Use of Particle Swarm Optimization

with Multimodal Functions ”, Proc. IEEE Congress on Evolutionary Computation,

Canbella Australia, pp. 1130-1136, Dec. 2003.

[65] I.N. Kassabalidis, M.A. El-Shurkawi, R.J. Marks, L.S. Moulin and A.P. Alves da

Silva, “Dynamic Security Border Identification using Enhanced Particle Swarm Op-

timization ”, IEEE Trans. Power Systems, vol. 17, pp. 723-729, Aug. 2002.

[66] J. Kennedy and R.C. Eberhart, “A Discrete Binary Version of the Particle Swarm

Algorithm ”, Proc. Systems Man and Cybernetics, vol. 5, pp. 4104-4108, Oct. 1997.

[67] J. Kennedy, “The Particle Swarm: Social Adaptation of Knowledge ”, Proc. IEEE

Int. Conf. Evolutionary Computation, Indianapolis IN, pp. 303-308, Apr. 1997.

[68] H. Yoshida, Y. Fukuyama, K. Kwata, S. Takayama and Y. Nakanishi, “A Particle

Swarm Optimization for Reactive Power and Voltage Control considering Voltage

Security Assessment ”, IEEE Trans. Power Systems, vol. 15, pp. 1232-1239, Nov.

2001.

[69] P. Angeline, “Using Selection to Improve Particle Swarm Optimization ”, Proc.

IEEE Conf. Evolutionary Computation, pp. 84-89, 1998.

[70] F. Heppner and U. Grenander, “A Stochastic Nonlinear Model for Coordinated Bird

Flocks ”, E. Krasner Ed., The Ubiquity of Chaos, AAAS Publications, Washington

DC, 1990.

[71] C.W. Reynolds, “Flocks, Herds and Schools: A Distributed Behavioral Model ”,

Proc. Conf Computer Graphics and Interactive Techniques, vol. 21(4), pp. 25-34,

Jul. 1987.

107

Page 126: Jammer Excision Based on Computational Intelligence Techniques

[72] E.O. Wilson, “Sociobiology: The New Synthesis ”, Belknap Press, Cambridge MA,

1975.

[73] K.E. Parsopoulos and M.N. Vrahati, “Recent Approaches to Global Optimization

Problems through Particle Swarm Optimization ”, Natural Computing, vol. 1(2-3),

pp. 235-306, 2002.

[74] Frans van den Bergh, “An Analysis of Particle Swarm Optimizers ”, PhD Thesis,

University of Pretoria, South Africa, 2002.

[75] J. Kennedy, R.C. Eberhart and Y. Shi, “Swarm Intelligence ”, Morgan Kaufmann

Publishers, San Francisco, 2001.

[76] P.J. Angeline, “Evolutionary Optimization versus Particle Swarm Optimization:

Philosophy and Performance Differences ”, Proc. Conf. Evolutionary Programming,

vol. 1447, pp 601-610, Springer-Verlag GmbH, 1998.

[77] M. Clerc and J. Kennedy, “The Particle Swarm - Explosion, Stability, and Conver-

gence in a Multidimensional Complex Space ”, IEEE Trans. Evolutionary Compu-

tation, vol. 6(1), pp. 58-73, 2002.

[78] Y. Shi and R.C. Eberhart, “Parameter Selection in Particle Swarm Optimization ”,

Proc. Conf. Evolutionary Programming, vol. 1447, pp. 591-600, 1998.

[79] Y. Shi and R.C. Eberhart, “Empirical Study of Particle Swarm Optimization ”,

Proc. IEEE Congress Evolutionary Computation, pp. 1945-1950, Jul. 1999.

[80] I.C. Trelea, “The Particle Swarm Optimization Algorithm: Convergence Analysis

and Parameter Selection ”, Inf. Process. Lett., vol.85(6), pp. 317-325, 2003.

[81] Y. Shi and R. Eberhart, “Empirical Study of Particle Swarm Optimization ”, Proc.

IEEE Congress on Evolutionary Computation, pp. 1945-1950, Jul. 1999.

108

Page 127: Jammer Excision Based on Computational Intelligence Techniques

[82] Y. Shi and R. Eberhart, “Fuzzy Adaptive Particle Swarm Optimization ”, IEEE Int.

Conf. on Evolutionary Computation, vol. 1, pp. 101-106, May 2001.

[83] R. Eberhart and Y. Shi. “Particle Swarm Optimization: Developments, Applications

and Resources ”, IEEE Int. Conf. on Evolutionary Computation, vol. 1, pp. 81-86,

2001.

[84] X.F. Xie, W.J. Zhang and Z.L. Yang, “Adaptive Particle Swarm Optimization on

Individual Level ”, Proc. Intl. Conf. Signal Processing, Beijing, vol. 2, pp. 1215-1218,

Aug. 2002.

[85] R.C. Eberhart and Y. Shi, “Comparing Inertia Weights and Constriction Factors

in Particle Swarm Optimization ”, Proc. Congress Evolutionary Computing, vol. 1,

pp. 84-89, Jul. 2000.

[86] R.C. Eberhart and X. Hu, “Tracking and Optimization of Dynamic System using

PSO ”, Proc. Congress of Evolutionary Computation 2001, IEEE Press, Piscataway

NJ, pp. 94-97, 2001.

[87] X. Hu and R.C. Eberhart, “Tracking Dynamic Systems with PSO: Where’s the

Cheese ”, Proc. of Workshop PSO Applications, Purdue School of Engineering and

Technology, Indianapolis, 2001.

[88] X. Hu and R.C. Eberhart, “Adaptive Particle Swarm Optimization: Detection and

Response to Dynamic Systems ”, Proc. Congress on Evolutionary Computation, vol.

2(12-17), pp. 1666-1670, May 2002.

[89] Assaf Zaritsky, “Introduction to Genetic Algorithm” , Ben-Gurion University, Israel.

www.cs.bgu.ac.id/˜assafza

[90] S. Rajasekaran and G.A. Vijayalalakshmi Pai, “Neural Networks, Fuzzy Logic and

Genetic Algorithms: Synthesis and Applications”, Prentice-Hall, New Delhi, 2005.

109

Page 128: Jammer Excision Based on Computational Intelligence Techniques

[91] A. Colorni, M. Dorigo and V. Maniezzo, “Distributed Optimization by Ant Colonies

”, Proc. European Conf. Artificial Life, Paris, France, Elsevier Publishing, pp. 134-

142, 1991.

[92] M. Dorigo, “Optimization, Learning and Natural Algorithms ”, PhD Thesis, Po-

litecnico di Milano, Italy, 1992.

[93] S. Goss, S. Aron, J.L. Deneubourg and J.M. Pasteels, “The Self-organized Shortcuts

in the Argentine Ant ”, Naturwissenschaften, vol. 76(12), pp. 579-581, 1989.

[94] J.L. Deneubourg, S. Aron, S. Goss and J.M. Pasteels, “The Self-Organizing Ex-

ploratory Pattern of the Argentine Ant ”, Journal of Insect Behavior, Springer, vol.

3(2), pp. 159-168, 1990.

[95] T. Stutzle and H.H. Hoos, “MAX MIN Ant System ”, Future Generation Computer

Systems, vol. 16(8), pp. 889-914, 2000.

[96] Dorigo and L.M. Gambardella, “Ant Colony System : A Cooperative Learning Ap-

proach to the Traveling Salesman Problem ”, IEEE Trans. on Evolutionary Compu-

tation, vol. 1(1), pp. 53-66, Apr. 1997.

[97] X. Hu, J. Zhang and Y. Li,“Orthogonal Methods Based Ant Colony Search for

Solving Continuous Optimization Problems ”. Journal of Computer Science and

Technology, vol. 23(1), pp. 2-18, 2008.

[98] M. Dorigo, V. Maniezzo and A. Colorni, “Ant System: Optimization by a Colony

of Cooperating Agents ”, IEEE Trans. on Systems, Man and Cybernetics - Part B,

vol. 26(1), pp. 29-41, Feb. 1996.

[99] D. Karaboga, “An Idea Based on Honey Bee Swarm for Numerical Optimization ”,

Technical Report-TR06, Computer Engineering Dept. , Erciyes University, Turkey,

2005.

110

Page 129: Jammer Excision Based on Computational Intelligence Techniques

[100] M. Dorigo, E. Maniezzo and A. Colorani, “Ant System: Optimization by a Colony

of Cooperative Agents ”, IEEE Trans. on Systems, Man and Cybernetics, vol. 20(6),

pp. 19-41, 1996.

[101] B. Bilchev, I.C. Parmee, “The Ant Colony Metaphor for Searching Continuous

Design Spaces ”, Fogarty and Terence ed. , Lecture Notes in Comput Sci., vol. 993,

Springer, Berlin, pp. 25-39, 1995.

[102] N. Monmarche, G. Venturini and M. Slimane, “On How Pachycondyla Apicalis

Ants Suggest a New Search Algorithm ”, Future Generation Comput. Syst. , vol.

16(9), pp. 937-946, Jun. 2000.

[103] K. Socha, “ACO for Continuous and Mixed-Variable Optimization ”, M. Dorigo,

M. Birattari, C. Blum, L.M. Gambardella, F. Mondada and T. Stutzle ed. , Proc. of

Intl. Workshop on Ant Colony Optimization and Swarm Intelligence, Lecture Notes

in Comput. Sci. , vol. 3172, Springer, Berlin, pp. 53-61, 2004.

[104] T. Hiroyasu, M. Miki, Y. Ono and Y. Minami, “Ant Colony for Continuous Func-

tions ”, The Science and Engineering Review of Doshisha University, 2000.

[105] S. Yang, M. Wang, L. Jiao, “A Quantum Particle Swarm Optimization ”, Proc.

IEEE Congress on Evolutionary Computation, pp. 320-324, Jun. 2004.

[106] T. Sousa, A. Silva and A. Neves, “Particle Swarm based Data Mining Algorithms

for Classification Tasks ”, Parallel Computing, vol. 30(5-6), pp. 767-783, May/ Jun.

2004.

[107] M. Clerc,“Binary Particle Swarm Optimisers: Toolbox, Derivations and Mathe-

matical Insights ”, CCSD (Centre pour la Communication Scientifique Directe),

http://hal.archives-ouvertes.fr/hal-00122809/fr/, Jan. 2007.

111

Page 130: Jammer Excision Based on Computational Intelligence Techniques

[108] D.J. Krusienski and W.K. Jenkins, “Adaptive Filtering via Particle Swarm Opti-

mization ”, Proc. of the 37th Asilomar Conf. on Signals, Systems and Computers,

pp. 571-575, 2003.

[109] D.J. Krusienski and W.K. Jenkins, “Particle Swarm Optimization for Adaptive

IIR Filter Structures ”, Proc. Congress on Evolutionary Computation, vol. 1, pp.

965-970, Jun. 2004.

[110] J.W. Ketchum and J.G. Proakis, “Adaptive Algorithms for Estimating and Sup-

pressing Narrow-Band Interference in PN Spread-Spectrum Systems ”, IEEE Trans.

Commun. , vol. 30(5), pp. 913-924, May 1982.

[111] R. Bijjani and P.K. Das, “Rejection of Narrowband Interference in PN Spread-

Spectrum Systems using Neural Networks ”, Proc. IEEE Global Telecomm. Confer-

ence and Exhibition, ’Communications: Connecting the Future’, vol. 2, pp. 1037-

1041, Dec. 1990.

[112] L. Taijie, H. Guangrui and G. Qing, “Interference Rejection in Direct-Sequence

Spread Spectrum Communication Systems based on Higher-Order Statistics and

Genetic Algorithm ”, Proc. Intl. Conf. Signal Processing, vol. 3, pp. 1782-1785 ,

2000.

[113] N.J. Higham, “Accuracy and Stability of Numerical Algorithms ”, SIAM, Philadel-

phia USA, 1996.

[114] A.S. Householder, “The Theory of Matrices in Numerical Analysis ”. Dover Publi-

cations, USA, 1974.

[115] J. Holland, “Adaptation in Natural and Artificial Systems ”, Ann Arbor, MI: Uni-

versity of Michigan Press, 1975.

[116] http://www.physics.arizona.edu/˜restrepo/475A/Notes/sourcea/node62.html

112

Page 131: Jammer Excision Based on Computational Intelligence Techniques

[117] Za’er Salem Abo-Hammour,“Advaced Continuous Genetic Algorithms and their

Applications in Motion Planning of Robot Manipulators and in the Numerical Solu-

tion of Boundary Value Problems ”, PhD Thesis, PIEAS, Quaid-e-Azam University,

Islamabad, Pakistan, 2002.

[118] G. Chen, X. Huang, J. Jia and Z. Min, “Natural Exponential Inertia Weight Strat-

egy in Particle Swarm Optimization ”, Proc. 6th World Congr. on Intelligent Control

and Automation,Dalian, China, pp. 3672-3675, 2006.

113