Signal Activity Detection of Phase-Shift Keying Signals

Similar documents
An Invariance Property of the Generalized Likelihood Ratio Test

Detection theory 101 ELEC-E5410 Signal Processing for Communications

UNIFORMLY MOST POWERFUL CYCLIC PERMUTATION INVARIANT DETECTION FOR DISCRETE-TIME SIGNALS

Analysis of Minimum Hellinger Distance Identification for Digital Phase Modulation

PERFORMANCE COMPARISON OF THE NEYMAN-PEARSON FUSION RULE WITH COUNTING RULES FOR SPECTRUM SENSING IN COGNITIVE RADIO *

A GLRT FOR RADAR DETECTION IN THE PRESENCE OF COMPOUND-GAUSSIAN CLUTTER AND ADDITIVE WHITE GAUSSIAN NOISE. James H. Michels. Bin Liu, Biao Chen

Estimation of the Optimum Rotational Parameter for the Fractional Fourier Transform Using Domain Decomposition

Use of Wijsman's Theorem for the Ratio of Maximal Invariant Densities in Signal Detection Applications

Digital Transmission Methods S

Digital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10

Hyung So0 Kim and Alfred 0. Hero

ML Detection with Blind Linear Prediction for Differential Space-Time Block Code Systems

Two results in statistical decision theory for detecting signals with unknown distributions and priors in white Gaussian noise.

392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6. Problem Set 2 Solutions

Spectrum Sensing of MIMO SC-FDMA Signals in Cognitive Radio Networks: UMP-Invariant Test

UWB Geolocation Techniques for IEEE a Personal Area Networks

MULTIPLE-CHANNEL DETECTION IN ACTIVE SENSING. Kaitlyn Beaudet and Douglas Cochran

Direct-Sequence Spread-Spectrum

Detecting Parametric Signals in Noise Having Exactly Known Pdf/Pmf

Asymptotic Analysis of the Generalized Coherence Estimate

Expectation propagation for signal detection in flat-fading channels

Optimal Receiver for MPSK Signaling with Imperfect Channel Estimation

Weibull-Gamma composite distribution: An alternative multipath/shadowing fading model

Chapter 2 Signal Processing at Receivers: Detection Theory

STONY BROOK UNIVERSITY. CEAS Technical Report 829

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

WHEN IS A MAXIMAL INVARIANT HYPOTHESIS TEST BETTER THAN THE GLRT? Hyung Soo Kim and Alfred O. Hero

On joint CFO and channel estimation in single-user and multi-user OFDM systems

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques

Composite Hypotheses and Generalized Likelihood Ratio Tests

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems

The Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels

Optimal Diversity Combining Based on Linear Estimation of Rician Fading Channels

بسم الله الرحمن الرحيم

BASICS OF DETECTION AND ESTIMATION THEORY

Performance Analysis of Spread Spectrum CDMA systems

arxiv:cs/ v1 [cs.it] 11 Sep 2006

Lattices and Lattice Codes

On the Identification of SM and Alamouti. Coded SC-FDMA Signals: A Statistical-Based Approach

THIS paper is aimed at designing efficient decoding algorithms

CONSIDER two companion problems: Separating Function Estimation Tests: A New Perspective on Binary Composite Hypothesis Testing

Performance of Optimal Digital Page Detection in a Two-Dimensional ISI/AWGN Channel

CFAR TARGET DETECTION IN TREE SCATTERING INTERFERENCE

PSK bit mappings with good minimax error probability

CFAR DETECTION OF SPATIALLY DISTRIBUTED TARGETS IN K- DISTRIBUTED CLUTTER WITH UNKNOWN PARAMETERS

Uncertainty. Jayakrishnan Unnikrishnan. CSL June PhD Defense ECE Department

10. Composite Hypothesis Testing. ECE 830, Spring 2014

Virtual Array Processing for Active Radar and Sonar Sensing

Channel Estimation under Asynchronous Packet Interference

Modulation Classification and Parameter Estimation in Wireless Networks

Fundamentals of Statistical Signal Processing Volume II Detection Theory

Residual Versus Suppressed-Carrier Coherent Communications

Optimal and Suboptimal Signal Detection On the Relationship Between Estimation and Detection Theory

Data-aided and blind synchronization

A FEASIBILITY STUDY OF PARTICLE FILTERS FOR MOBILE STATION RECEIVERS. Michael Lunglmayr, Martin Krueger, Mario Huemer

USING multiple antennas has been shown to increase the

Parameter Estimation

Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks

Fast Near-Optimal Energy Allocation for Multimedia Loading on Multicarrier Systems

On the Multivariate Nakagami-m Distribution With Exponential Correlation

The Sorted-QR Chase Detector for Multiple-Input Multiple-Output Channels

Summary II: Modulation and Demodulation

Approximate Minimum Bit-Error Rate Multiuser Detection

DETECTION theory deals primarily with techniques for

UTA EE5362 PhD Diagnosis Exam (Spring 2011)

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback

A Design of High-Rate Space-Frequency Codes for MIMO-OFDM Systems

2. What are the tradeoffs among different measures of error (e.g. probability of false alarm, probability of miss, etc.)?

Comparison of DPSK and MSK bit error rates for K and Rayleigh-lognormal fading distributions

g(.) 1/ N 1/ N Decision Decision Device u u u u CP

The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals

FULL rate and full diversity codes for the coherent

Detection Theory. Chapter 3. Statistical Decision Theory I. Isael Diaz Oct 26th 2010

Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System

ACCURATE ASYMPTOTIC ANALYSIS FOR JOHN S TEST IN MULTICHANNEL SIGNAL DETECTION

ALARGE class of modern array processing techniques are

Soft-Decision-and-Forward Protocol for Cooperative Communication Networks with Multiple Antennas

Modifying Voice Activity Detection in Low SNR by correction factors

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths

Adaptive beamforming for uniform linear arrays with unknown mutual coupling. IEEE Antennas and Wireless Propagation Letters.

REVEAL. Receiver Exploiting Variability in Estimated Acoustic Levels Project Review 16 Sept 2008

This examination consists of 11 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

Lecture 8: Signal Detection and Noise Assumption

Synchronization of Spread Spectrum Signals

CHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz.

ADDITIVE noise is most often represented by a fixed

Local detectors for high-resolution spectral analysis: Algorithms and performance

Improved Multiple Feedback Successive Interference Cancellation Algorithm for Near-Optimal MIMO Detection

Wideband Spectrum Sensing for Cognitive Radios

Research Article Blind Channel Estimation Based on Multilevel Lloyd-Max Iteration for Nonconstant Modulus Constellations

MODERN wireless communication systems often require

Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics. 1 Executive summary

On capacity of multi-antenna wireless channels: Effects of antenna separation and spatial correlation

On the estimation of the K parameter for the Rice fading distribution

Electrical Engineering Written PhD Qualifier Exam Spring 2014

Detection theory. H 0 : x[n] = w[n]

A Simple Example Binary Hypothesis Testing Optimal Receiver Frontend M-ary Signal Sets Message Sequences. possible signals has been transmitted.

Transcription:

Signal Activity Detection of Phase-Shift Keying Signals A. A. Tadaion, M. Derakhtian, S. Gazor, M. M. Nayebi and M. R. Aref Abstract We propose computationally inexpensive and efficient solutions for signal activity detection of Phase Shift Keying (PSK) signals in Additive White Gaussian Noise. We consider the complex amplitude of the signal as well as the information sequence as the unknown parameters. In addition, the noise variance is assumed unknown. We derive the Generalized Likelihood Ratio Test (GLRT) and suggest a computationally efficient implementation thereof. Furthermore, we develop a new inexpensive detector for binary PSK signals, which we will refer to as the generalized energy detector. To evaluate the performance of these detectors, we attempt to derive a uniformly most powerful invariant test as an optimal detector. It turns out that the UMPI test exists only if the signal-to-noise ratio is known. We use this UMPI test in order to obtain an upper-bound performance for the evaluation of invariant detectors, such as the above mentioned GLRT. Simulation results illustrate and compare the performance and the efficiency of the proposed signal activity detectors. A.A. Tadaion and S. Gazor are currently with the Department of Electrical and Computer Engineering, Queen s University, Kingston, ON, K7L 3N6, Canada. Tel: (63) 533-659, Fax: (63) 533-665 Email: tadaion@ee.queensu.ca, s.gazor@queensu.ca M. Derakhtian, M. M. Nayebi and M. R. Aref are with the department of Electrical Engineering, Sharif University, Tehran, Iran. Email: derakhtian@mehr.sharif.edu, nayebi, aref@sharif.edu. This paper was presented in part at the IEEE Workshop on Statistical Signal Processing, 25.

2 I. INTRODUCTION Signal Activity Detection (SAD) is a critical stage in the implementation of an effective communication system. For instance, detection of the presence of digitally modulated signals is an important problem within the context of wireless packet switching networks. A user may attempt to transmit signals or is inactive. Particularly, in the presence of ambient noise, the reliability of the SAD scheme has a critical impact on the performance of these systems. Some approaches to address such a SAD problem are attempted for a variety of other applications including reconnaissance, surveillance, spectrum management and surveillance, signal confirmation, and some other intelligence gathering activities, interference identification, modulation classification and also in electronic warfare and threat analysis (e.g., see [] [2] and the references therein). For the presence detection of a PSK signal, the traditional method of the energy detector or radiometer, uses the energy level of the received signal as a criterion [2]. Such a method is susceptible to the a priori knowledge of the noise variance and interference [3]. Most of the existing signal detection methods not only assume that the signal or some of its parameters are known, but also require the noise variance in order to determine the decision threshold [4]. Krasner [] considered a model for the signal with unknown parameters (such as carrier frequency, carrier phase and symbol sequence) as random variables and developed the coherent and non-coherent detectors by averaging the detection criteria over the distribution of these parameters. If the probability density functions (pdfs) of the unknown parameters are provided, these detectors are able to detect the presence of a weak signal at the expense of high Computational Complexity (CC). Ramprashad and Parks proposed a locally most powerful invariant test to detect signals [8]. The most common assumption of the existing methods is that the noise variance is considered to be known, which in some practical situations may not hold. We assume neither any knowledge nor any distribution about the noise variance and the complex amplitude of the signal and propose a suboptimal inexpensive detector for the SAD problem. In addition, we derive an optimal invariant test for the case of the known Signal to Noise Ratio (SNR), and serve this optimal test in order to evaluate the efficiency of our detector which turns out to perform very close to the optimal detector. The remaining of the paper is organized as follows. In Section II, the SAD is discussed and by substituting the Maximum Likelihood (ML) estimates of the unknown parameters in the Likeli- DRAFT January 4, 26

3 hood Ratio (LR), a Generalized Likelihood Ratio (GLR) detector is derived in Subsection II-A. We suggest a simplified implementation with comparable performance to reduce the exponential CC due to the exhaustive search in the implementation of this GLR Test (GLRT). In Subsection II-B, we present an intuitive detector based on matched subspace detectors for the case of Binary PSK (BPSK) modulated signals which will be referred to as the Generalized Energy Detector (GED) with substantially reduced CC at the expense of some small negligible performance loss. In Subsection II-C, we derive a Uniformly Most Powerful Invariant (UMPI) test in known SNR to evaluate the performance of the proposed detectors. Simulation results and comparison of the proposed methods are reported in Section III for the presented SAD algorithms. Section IV concludes the paper. II. SIGNAL ACTIVITY DETECTION (SAD) In this section, the SAD of a PSK signal in Additive White Gaussian Noise (AWGN) is considered. Our signal detection is the following binary hypothesis test [8]: H : r = n, if PSK signal is absent, H : r = Ac + n, if PSK signal is active, where r = [r,, r ] T is the base band representation of the received signal vector, n = [n,, n ] T is the complex zero-mean white Gaussian noise with unknown variance σ 2 = E[ n i 2 ], c = [c, c,, c ] T is the data vector and A = A e jφ c is the unknown complex amplitude of the received signal, A the magnitude and φ c the carrier phase, which are assumed constant unknown during the period of observation [5]. The digitally modulated sequence c n is { } selected from the set of PSK alphabets C = e j 2πk M, k =,, M, where M is the number of constellation points, e.g., in the BPSK scheme c n C = {+, }. In this paper, we assume no Inter-Symbol Interference (ISI) and neglect synchronization inaccuracies in the sampling time and in the carrier frequency. In practice, the synchronization may be achieved using several methods, such as transmitting pilot-tones for all users or non-data-aided algorithms [2]. () A. Generalized Likelihood Ratio Detector In this subsection, to obtain the GLR detector for (), we substitute the ML estimates of the unknown parameters, A and σ 2, under each hypothesis in the PDFs of the observation under January 4, 26 DRAFT

4 each hypothesis and construct the LR [22]. The PDF of the observation r under the hypothesis H and H are follows: f(r; H ) = f(r; H ) = { (πσ 2 ) exp σ } r N 2 Ac 2, (2a) (πσ 2 ) N exp { σ 2 r 2 }. (2b) Maximizing the above density functions, the ML estimates of A and σ 2 are  = N ch r, σ 2 = r N Âc 2, σ 2 = N r 2. Since c k =, k =,, N, from (3) we have σ 2 = N r 2 N 2 c H r 2. Substituting (3) in (2a) and (2b) respectively, the ratio of the LFs is ( ) N ( f(r; H ) (3) (πe) σ = 2 ( ) f(r; H ) N = (3) where a (.) (πe) σ 2 N r 2 N r 2 c N H r 2 2 (3) ) N, (4) means substituting the results of equation numbered by (.) in the expression of a. Since x N is an increasing function of x, comparing the above likelihood ratio with the threshold T N is equivalent to comparing the comparison H if: N r 2 N r 2 N 2 ch r 2 N r 2 N r 2 N 2 ch r 2 with the threshold T. It is obvious that T is equivalent to T T ch r 2 N r 2. Therefore, the GLRT rejects L GLR (r) = where (.) H is the transpose conjugate, r 2 = max c C N c H r 2 N r 2 > η GLR, (5) k= r k 2 and the threshold η GLR is selected such that the probability of false alarm P fa equals a predetermined value. The detection threshold is independent of the SNR and can be obtained by Monte-Carlo simulation, assuming that signal is absent. Regardless of a phase ambiguity, the data sequence is also detected in this method. In general, the CC of (5) is of the order of O( C ), where C is the number of constellation points. If C is a large number (or if C is unknown), the CC of this detector could For instance in BPSK, this ambiguity is in the sign of vector c. Such an ambiguity is resolvable employing a differential modulation scheme. DRAFT January 4, 26

5 substantially be reduced by approximating c i e j r i e j r i or by selecting the nearest neighbor of in the constellation set. In such a case, the decision variable becomes the ratio of L -norm to L 2 -norm of the observed data. We propose the following simplified implementation of this exhaustive search which requires a CC of the order of O(N C ) and its performance is comparable to (5): Step : Choose ĉ C arbitrarily and set R = ĉ H r. Step 2: For k =,, N, choose ĉ k using the following: Step 3: Compare R 2 N r 2 = ĉ k = arg max Rk + c H k r k ; and Rk = R k + ĉ H k r k. (6) c k C max c C N ch r 2 with the threshold η N r 2 GLR. Simulation results illustrate that the performance of the above simplified implementation of GLR (S-GLR) is very close to the performance of the GLR implementation in (5). B. Generalized Energy Detector (GED) for BPSK Signals In this section, we propose an intuitive inexpensive detector with very low CC for the case of BPSK signals. Following (), if we denote t k = rk 2 then under H we get, t k = A 2 + n 2 k + 2Ac k n k = A 2 + w k, since for a BPSK signal we have c 2 k =. Assuming that the noise variance is small compared with the signal power, we have w k 2Ac k n k ; obviously w k is a zero-mean normal random variable with variance 4 A 2 σ 2 where A is an unknown parameter. Thus, under H, we have E[t k ] A 2 while under H, we have E[t k ]. The test problem using the observed signal t k is a particular case of the matched subspace detector (see e.g. [23] [25]) and the resulting detector rejects H if: 2 2 t k r 2 k k= k= T GED = = > η t k 2, (7) GED rk 2 2 k= k= where η GED is chosen such that the false alarm probability requirement is satisfied. C. Uniformly Most Powerful Invariant Detector The Uniformly Most Powerful (UMP) test does not necessarily exist for all composite hypothesis testing problems in which either one or both of the hypotheses contain unknown parameters January 4, 26 DRAFT

6 (e.g., see [26], [27]). Specifically, for the PSK signal detection in AWGN (), if the signal and noise parameters are unknown, the UMP test does not exist. We will show that the UMPI test does not exist either, except if the SNR is known. In invariant problems such as (), the GLRT is invariant and asymptotically UMPI [23], [26]. Therefore, the resulting UMPI detector can be used as an optimal detector in order to evaluate the performance of the detectors derived in the previous subsections. A classical approach to derive a UMPI test is to express the problem invariance in terms of a transformation group, choose a maximal invariant 2, derive the PDF of the maximal invariant under each hypothesis and construct the LR (for examples see [26], [28], [29]). In the following, we find the groups of transformations under which the problem is invariant. Then, we derive the maximal invariant statistic for the groups and its PDFs under each hypothesis in Appendices I and II, respectively. Since the resulting LR depends on the SNR of the probable signal, the UMPI test does not exist. However, assuming that the SNR is known, the performance of the resulting UMPI detector can be used as an upper bound for the evaluation of any other invariant test which assumes unknown SNR, such as the GLRTs derived in the previous subsections. We first show that the detection problem in () is invariant under the composition of the following transformation groups: G d = G e = { g d : g d (r) = d r, d C {} }, (8a) { } g e : g e (r) = e r, e = [e,, e ] T, e n C, (8b) where denotes the element-wise multiplication. The above transformations, scale G d and the element-wise multiplication G e, are groups, since they are closed sets and associative and contain the identity and inverse elements. In the following, we see that the distribution of the observations and the parameter spaces remains invariant under any composition of the transformation groups in (8) for each hypothesis. ) Under H, from r N (Ac, σ 2 I N ), we get g d (r) = d r N (dac, d 2 σ 2 I N ), where I N is the identity matrix. Since (A, σ 2 ) is unknown, the distribution family of the transformed signal is not changed. Under the null hypothesis, the proof is similar except that A =. 2 See [25] for the definition of the maximal invariant statistic. DRAFT January 4, 26

7 2) For the second group G e and under H, we have g e (r) = Ae c+e n N (Ae c, σ 2 I N ). Since e c C N and c C N are unknown, therefore the distribution family generated by N (Ac, σ 2 I N ) for different values of unknown parameters is identical with those generated by N (Ae c, σ 2 I N ). Under H, the proof is similar by substituting A =. We find the maximal invariant statistic for the composite group G consisting of the above subgroups G d and G e. Then, using the densities of this maximal invariant statistic under each hypothesis, we form the LR for SAD. In Appendix I, the maximal invariant statistic for the composite group G is derived as follows 3 : ( ) C (rn 2 ) C y = M h (M d (r)) = C r,, C, r r T, (9) where M h and M d are defined in Appendix I. We must note that this maximal invariant is derived in a number of steps where each step is associated to one of the subgroups. If the LR does not depend on the unknown parameters, the UMPI test is to compare this LR with a threshold. In Appendix II we derive the conditional distribution of the maximal invariant statistic y under each hypothesis and construct the LR as the following: 2 L(r) = e Nρ C C 2 exp rk u H k,j ρ k= N r 2 p ρ k= r 2 j= p= C rk u H k,j 2 p p!, () where the SNR is denoted by ρ = A 2 σ 2. The variable u k,j C, k =,, N is the k th component of the j th possible sequence where u,j =, j =,, C and therefore for u,j,, u N 2,j there are C different possible sequences to be considered. Since c is an N-tuple vector, there are C different possible sequences to be considered. The UMPI test, if it exits, rejects H, if L(r) > η UMPI, where the threshold is selected such that the probability of false alarm requirement is satisfied. Since L(r) in () depends on the SNR, the UMPI test can not be implemented if the SNR is unknown. In addition, provided the SNR value this UMPI test allows us to numerically evaluate an upper bound for the performance of any invariant test, such as the GLR detector derived in the previous subsection. 3 For a complex number z, the value M z denotes the unique solution of x M = z for which x π M, π M. January 4, 26 DRAFT

8 III. SIMULATION RESULTS We evaluate and compare the performance of the proposed detectors by simulations. In all simulations, the complex amplitude of the signal, the variance of the noise and the symbol sequence are unknown to the detectors, except in Figure where the SNR value is provided only to the UMPI detector. The SNR is defined as the ratio of the signal power to the noise variance,, ρ = A 2. In our simulations we determined the threshold in each test experimentally, σ 2 as follows: the decision statistics for 5 independent trials in the absence of signal were sorted in ascending order and the threshold was chosen as the % P fa percentile of the resulting data. For example for P fa =., the threshold is chosen as the. 5 = 3 th ordered data; i.e., such that % P fa of the decision statistics are above the threshold. Figure depicts the probability of detection versus SNR for the UMPI test () and GLRT (5), where N = 5 or N =, and P fa =. or P fa =. all for BPSK signals. Simulations illustrate how close the GLR performance to UMPI performance is even at small N, e.g. UMPI detector outperforms the GLR detector by only.5 db, while UMPI uses the SNR information for the detection with high CC and GLR detects the signal without this information. It is known that as N, the performance of the GLR test (which is a suboptimal test) approaches the performance of the UMPI test (which uses the knowledge of SNR and is optimal). This means that the GLR test is asymptotically optimal. Although the optimality of the GLR criterion is unknown in the general binary test problem with unknown parameters, we observe the close to optimal performance of the GLR test even for small values of N. Such a close performance has also been observed in some other problems, for example see [26]. The knowledge of SNR seems to result in no major performance improvement and the close performance of the suboptimal GLR test to the optimal UMPI bound illustrates the efficiency of the GLR test. Figure 2 illustrates a performance comparison of the different proposed SAD algorithms for BPSK signaling. Different number of data symbols is considered for simulations and the probability of false alarm is set to P fa =.. We observe that the performance improves as SNR or the number of samples increases. The performances of GLR (with exhaustive search) and S-GLR (simplified implementation) are indeed comparable (only about.7 db apart) while the CC of the latter is substantially lower. For the number of samples N = at a given probability of detection, the GLR results in.26 db improvement gain in SNR compared with DRAFT January 4, 26

9 the GED. The price paid for these gains is their higher CC. The trade-off between the number of multiplications performed in each detection algorithm (as the order of CC) and the performance loss (in db) is depicted in table I where the performance results are derived for N =. It is notable that GED is only applicable for BPSK signals. The low CC of S-GLR and GED in this comparison is observable. The performance of the S-GLR is compared for BPSK and QPSK at different sample numbers in Figure 3, where P fa =.. As we expect, for the same number of samples, the S-GLR performs better for BPSK than for QPSK since more unknown information is embedded in QPSK signals. In addition, increasing the number of samples improves the detection performance for both BPSK and QPSK signals. IV. CONCLUSION In this paper we studied the presence detection of PSK signals with unknown parameters in AWGN. We developed a computationally efficient detector using the GLR test and justified its performance by comparing against a UMPI test in smaller unknown parameter space. We proposed three detectors for the SAD. A GLR detector is derived and a simplified implementation is proposed with reduced CC and comparable performance as an efficient detector. An intuitive and simple detector for BPSK signals is also proposed and its performance is numerically evaluated to be close to the GLRT. In order to evaluate the performance of the proposed SAD algorithms, a UMPI test for known SNR is derived. We proved that the UMPI test does not exist if the SNR is unknown. Simulation results illustrate and compare the performances of the proposed detectors. The UMPI gives an upper performance bound. Since we observed that the new GLR solution performs close to this upper-bound, we imply that knowledge of SNR does not affect the GLRT performance considerably in the considered circumstances. Such a close performance has been also observed between the GLRT and the UMPI bound in some other problems, for example see [26]. However, the optimality of the GLR criterion is unknown in general case, and it is not easy to mathematically quantify the behavior of such a GLR test in general case. January 4, 26 DRAFT

APPENDIX I MAXIMAL INVARIANT STATISTIC FOR THE COMPOSITE GROUP G In this appendix, using the following theorem [23], we obtain the maximal invariant statistic for the composite group G in two steps, each related to finding a maximal invariant statistic for one of the subgroups. Theorem : Let G be a group of transformations and let G d and G e be two subgroups generating G. Suppose that x = M d (r) is a maximal invariant with respect to G d any g e G e, any r () and any r (2), we have and for M d (r () ) = M d (r (2) ) M d (g e (r () )) = M d (g e (r (2) )), () and there exists a maximal invariant statistic y = M h (x) under the group H of transformations g h (x) = M d (g e (r)), then y = M h (M d (r)) is maximal invariant with respect to G. Proof: See [23, Chapter 6, Theorem 2]. Therefore using the above theorem, a maximal invariant for the scale group G d is given by [ r x = M d (r) =,, r ] T. (2) r r This statistic is invariant, since [ d r M d (g d (r)) =,, d r ] T = d r d r [ r,, r ] T = M d (r). r r It is also maximal invariant, since for any given r () and r (2), from M d (r () ) = M d (r (2) ), we get r () n r () = r(2) n r (2) n =,, N 2., for n =,, N 2, i.e., taking d = r() r (2), we have r () n = r() r (2) r (2) n = d r n (2), for Following Theorem, in order to derive a maximal invariant for the second group, assuming M d (r () ) = M d (r (2) ), we get M d ( ge (r () ) ) = M d ( e r () ) = = [ [ e r () e r (),, e N 2r () N 2 e r () e r (2),, e N 2r (2) N 2 e r (2) e r (2) = M d ( ge (r (2) ) ). ] T ] T = M d ( e r (2) ) DRAFT January 4, 26

Therefore, the condition () is satisfied. Now, we should find a group G h which acts on x and then a maximal invariant under that group. According to Theorem, we have g h (x) = M d (g e (r)), therefore g h (x) = [h x,, h N 2 x N 2 ] T where h n = e n e C and a maximal invariant under G h is [ T y = C M h (x) = x C,, C x N 2] C, (3) C because from h n C, we get h C n =, therefore [ C M h (g h (x)) = h C x C, C h C N 2 x C N 2] T = M h (x). ( ) C ( ) C Furthermore n =,, N 2, from M h (x () ) = M h (x (2) ), we get x () n = x (2) n that means x () n = h n x (2) n where h n = e j2πk n C C, for some integer k n. Therefore g h (x (2) ) = x (), for some g h G h. Hence M h is the maximal invariant under the group G h. The maximal invariant under the composite group G is given by y = M h (M d (r)) = C ( r r where M h and M d are as defined in the above. ) C (rn 2 ) C,, C, r T, (4) APPENDIX II DERIVATION OF PDF OF THE MAXIMAL INVARIANT In this appendix, we derive the probability density function of the maximal invariant y under each hypothesis. It will be done in steps. The density of the observation r under H is: f(r; H ) = { (πσ 2 ) exp σ } r N 2 Ac 2 = e Nρ (πσ 2 ) N exp { σ 2 r 2 + 2 σ 2 Re ( Ar H c )}, where ρ = A 2. The distribution under H σ 2 is obtained by substituting A = in the above. In order to calculate the PDF of x, we consider the auxiliary variable α = r and use the simple relationship between x and r, i.e. r n = αx n, n =,, N 2. Therefore, the Jacobian determinant is α 2() and the PDF of [x, α] is as the following: f(x, α; H ) = e Nρ (πσ 2 ) N exp (5) { σ 2 α 2 ( x 2 + ) + 2 σ 2 Re ( Aα H ( x H c + c )) } α 2().(6) January 4, 26 DRAFT

2 The PDF of x can be obtained by integrating (6) over the auxiliary random variable α, i.e., f(x; H ) = f(x, α; H )dα, (7) α C = e Nρ (πσ 2 ) N α C α 2() e α Substituting the polar representation of α gives: f(x; H ) = e Nρ (πσ 2 ) N 2π 2 ( x 2 +) σ 2 + 2Re H (Aα (x H c+c )) σ 2 dα. α 2 e σ 2 α 2 ( x 2 +) e 2 σ 2 Re (A α e j α (x H c+c )) d α d α. (8) By virtue of the integral definition of the zero-order Bessel Function of the first kind [3], we get: 2π { 2 exp σ Re ( A α e ( } ( ) )) 2σ ( ) j α x H c + c 2 d α = 2πI Aα x H c + c 2. (9) Using the above, we simplify (8) and obtain the following PDF of x under H [3]: f(x; H ) = 2πe Nρ (πσ 2 ) N = (N )!e Nρ π α 2 e α 2 ( x 2 + ) ( 2 σ 2 I σ α ) ( ) A x H c + c 2 d α, (2) A(x H c+c ) 2 σ e 2 ( x 2 +) ( x 2 + ) N p= N The PDF of x under H is obtained by replacing A = in (2) as follows: f(x; H ) = The PDF of y in (3) is as following: (, if y i / f(y; H ) = C f x (t j y; H ), if y i j= p ( ( ) ) A x H c + c 2 p σ 2 ( x 2 + ) p!. (N )! π ( x 2 + ) N. (2) 2π C, 2π C ( 2π C, 2π C where t j = [t,j,, t,j ] T, and t k,j C is the k th component of the j th possible sequence and since t is an N-tuple vector, there are C different possible sequences to be considered (t,j =, j =,, C ). Therefore we have: f(y; H ) = (N )!e Nρ π y 2N C j= y H 2 e ρ k u k,j k= y 2 p= ], ], 2 N yk Hu k,j p ρ k= y 2 p (22) p!, (23) DRAFT January 4, 26

3 where u k,j = t k,j c k C is the k th component of the j th possible sequence and similarly there are C different possible such sequences to be considered (u,j =, j =,, C ). By replacing ρ = in (23), the PDF of y under H is f(y; H ) = (N )!2 π C j= y 2. (24) We obtain () by constructing L(r) = f(y;h ) f(y;h ) and some manipulation from (23), (24) and (9). Since, the LR in () depends on SNR of the probable signal, the UMPI test exists only if the SNR is known. REFERENCES [] N. F. Krasner, Optimal Detection of Digitally Modulated Signals, IEEE Transactions on Communications, vol., vol.com-3, No.5, pp.885-895, Jan. 982. [2] D.J. Terrieri, Principles of Secure Communication Systems, Dedham, MA: Artech, 985. [3] W.A. Gardner, Signal Interception: A Unifying Theoretical Framework for Feature Detection,, IEEE Transactions on Communications, vol., vol.36, No.8, pp.897-96, Aug. 988. [4] J.F. Kuehls and E. Geraniotis, Presence Detection of Binary-Phase-Keyed and Direct- Sequence Spread-Spectrum Signals Using a Prefilter-Delay-and-Multiply Device, IEEE Journal on Selected Areas in Communications, vol., vol.8, No.5, pp.95-933, Jun. 99. [5] A. Polydoros and K. Kim, On the Detection and Classification of Quadrature digital modulations in band-limited noise,, IEEE Transactions on Communications, vol., vol.38, No.8, pp.99-2, Aug. 99. [6] W.A. Gardner, C.M. Spooner, Signal Interception: Performance Advantages of Cyclic Feature Detectors, IEEE Trans. on Communication, pp.49-59, Jan. 992. [7] H.V. Poor, An Introduction to Signal Detection and Estimation, Springer, 994. [8] S.A. Ramprashad and T.W. Parks, Locally Most Powerful Invariant Tests for Signal Detection, IEEE Transactions on Information Theory, vol., vol.44, No.3, pp.283-88, May. 998. [9] E.E. Azzouz and A.K. Nandi, Automatic Modulation Recognition of Communication Signals, Kluwer Academic Publishers, Norwell, MA, 996. [] F.F. Liedtke, Computer simulation of an Automatic Classification procedure for Digitally Modulated Communication Signals with unknown parameters, Signal Processing, vol.6, pp.3-323, 984. [] W. Wei and J.M. Mendel, Maximum-likelihood classification for digital amplitude-phase modulations, IEEE Trans. on Commun., vol.48, no.2, pp.89-93, Feb. 2. [2] C.-Y. Huang and A. Polydoros, Likelihood methods for MPSK modulation classification, IEEE Trans. Commun., vol.43, no.2/3/4, pp.493-54, Feb./Mar./Apr. 995. [3] P. Panagiotou, A. Anastasopoulos and A. Polydoros, Likelihood ratio tests for modulation classification, in Proc. IEEE MILCOM, Los Angles, CA, vol.2, pp.67-674, 2. [4] D. Boiteau and C. Le Martret, A generalized maximum likelihood framework for modulation classification, in Proc. ICASSP 98, vol.4, pp.265-268, May 998. [5] A. Abdi, O. A. Dobre, R. Choudhry, Y. Bar-Ness, and W. Su, Modulation classification in fading channels using antenna arrays, Proc. IEEE MILCOM, 24. January 4, 26 DRAFT

4 [6] L. Hong and K.C. Ho, Classification of BPSK and QPSK Signals with unknown signal level using the Bayes technique, in Proc. International Symposium on Circuits and Systems. vol.4, pp.iv--iv-4, May 23. [7] K.M. Chugg, C.S. Long and A. Polydoros, Combined Likelihood Power Estimation and Multiple Hypothesis Modulation Classification, in Proc. ASILOMAR, pp.37-4, 995. [8] L. Hong and K.C. Ho, BPSK and QPSK Modulation Classification with Unknown Signal Level, Proc. IEEE MILCOM, 2. [9] B.-P. Paris, G. C. Orsak, H. Chen and N. Warke, Modulation classification in unknown dispersive environments, in Proc. ICASSP 97, vol. 2, pp. 2-24, April 997. [2] J. Venalainen, L. Terho and V. Koivunen, Modulation classification in fading multipath channel, in Conf. record 36 th Asimolar Conf. Signals, Systems and Computers, Nov. 3-6 22, vol. 2, pp. 89-894. [2] B.D. Hart, Maximum Likelihood Sequence Detection Using a Pilot Tone, IEEE Trans. Veh. Technology, Vol.9, No.42, pp.55-56, Mar. 2. [22] S.M. Kay, Fundamentals of Statistical Signal Processing: Detection Theory, Prentice Hall, 998. [23] E.L. Lehman, Testing Statistical Hypothesis, John Wiley, 986. [24] L. Scharf, Statistical Signal Processing, Addison-Wesley, 99. [25] T.S. Ferguson, Mathematical Statistics, Academic Press, 969. [26] S. M. Kay and J. R. Gabriel, Optimal Invariant Detection of a Sinusoid with Unknown Parameters, IEEE Transactions on Signal Processing, vol.sp-, vol. 5, No., pp.27-4, Jan. 22. [27] M. Derakhtian and M.M. Nayebi, UMP, ALR and GLR Tests and some Applications to Coherent Radar Detection, Proceeding of the IEEE International Symposium on Information Theory, ISIT-2, p. 388, June 25-3, 2. [28] J.R. Gabriel and S.M. Kay, Use of Wijsman s Theorem for the Ratio of Maximal Invariant Densities in Signal Detection Applications, in Proc. ASILOMAR, pp.756-762, 22. [29] A.A. Tadaion, M. Derakhtian, S. Gazor, M.R. Aref, A Fast Multiple Source Detection and Localization Array Signal Processing Algorithm Using ML Approach, Submitted to IEEE Transactions on Signal Processing, Feb. 25, revised and resubmitted August 25. [3] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 5th ed., New York: Academic, 994. DRAFT January 4, 26

5 TABLE I TRADE-OFF BETWEEN CC AND PERFORMANCE: THE ORDER OF THE NUMBER OF MULTIPLICATIONS (A MEASURE OF CC) AND PERFORMANCE IN EACH OF THE PROPOSED DETECTORS FOR N =. Detector Order of the Number of Complex Multiplications Performance Loss in db compared with UMPI UMPI > N 2 C N GLR N C ().5 S-GLR N C.2 GED N.3 Probability of Detection, P d.47.8.465.46.6.455 8.9 9.4 fa =. P fa =. N=5 N=5 P fa =. N=.2 UMPI GLR 5 5 Signal to Noise Ratio (db) Fig.. Performance Comparison of GLR and UMPI tests in terms of the Probability of Detection versus SNR for a BPSK signal with different number of samples N = 5, and different P fa =.,.. January 4, 26 DRAFT

6 Probability of Detection, P d.8.6.4.2 N=5 N= N=5 4 2 2 4 6 8 2 Signal to Noise Ratio (db) GLR S-GLR GED Fig. 2. Performance Comparison of GLR, S-GLR and GED for the SAD of a PSK signal. We considered a BPSK signal with different number of samples N = 5,, 5 and the probability of false alarm is P fa =.. DRAFT January 4, 26

7 Probability of Detection, P d.8.6.4.2 6 4 2 2 4 6 8 Signal to Noise Ratio (db) BPSK, N =3 BPSK, N =5 QPSK, N =3 QPSK, N =5 Fig. 3. Performance evaluation of S-GLR for the SAD of a PSK signal. We considered BPSK and QPSK signals with different number of samples N = 5, 3, and the probability of false alarm is P fa =.. January 4, 26 DRAFT