Sei sulla pagina 1di 14

3238 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO.

8, AUGUST 2008

A Block-by-Block Blind Post-FFT Multistage


Beamforming Algorithm for Multiuser OFDM
Systems Based on Subcarrier Averaging
Chong-Yung Chi, Chun-Hsien Peng, Kuan-Chang Huang, Teng-Han Tsai, and Wing-Kin Ma

Abstract—Chi et al. proposed a computationally efficient The OFDM has been adopted in digital audio broadcasting
fast kurtosis maximization algorithm for blind equalization (DAB) and digital video broadcasting-terrestrial (DVB-T), as
of multiple-input multiple-output linear time-invariant systems. well as wireless local area networks (WLANs) such as IEEE
This algorithm is also an iterative batch processing algorithm and
has been applied to blind source separation. This paper considers 802.11a and HIPERLAN [1], [3]–[8].
blind beamforming of multiuser orthogonal frequency division To maintain high-speed reliable radio transmission with a
multiplexing (OFDM) systems. Assuming that the channel is limited bandwidth, the use of antenna arrays (or multiple
static within one OFDM block, a blind post-FFT multistage
antennas) has been considered not only for antenna gain (or
beamforming algorithm (MSBFA) based on subcarrier averaging
is proposed. The algorithm basically comprises: i) source (path spatial diversity gain) as well as increase of spectral effi-
signal) extraction using a hybrid beamforming algorithm com- ciency, but also for interference suppression [1], [6], [8], [9].
posed of a Fourier beamformer and a kurtosis maximization Therefore, OFDM in conjunction with multiple-input multiple-
beamformer, ii) time delay estimation and compensation, iii) output (MIMO) signal processing has naturally been proposed
classification (path-to-user association) and blind maximum ratio
for broadband communications, especially in the beamforming
combining (of path signals). The designed beamformer is exactly
the same for all the subcarriers, effectively utilizes multipath design of the receiver, such as the pre-FFT beamforming
diversity for performance gain, and works well even in an structure (pre-FFT BFS) (as shown in Figure 1(a)) [1], [5]–
environment with spatially correlated sources. Some simulation [7], and post-FFT beamforming structure (post-FFT BFS) (as
results are presented to demonstrate the effectiveness of the shown in Figure 1(b)) [4]–[8].
proposed MSBFA.
A number of nonblind and blind beamforming algorithms
Index Terms—Orthogonal frequency division multiplexing for multiuser OFDM systems equipped with an antenna array
(OFDM), pre-FFT beamforming structure, post-FFT beamform-
ing structure, Fourier beamformer, kurtosis maximization, blind have been reported in the open literature. Nonblind algorithms
maximum ratio combining (BMRC). such as maximum ratio combining (MRC) [4], [6] and mini-
mum mean square error (MMSE) beamformers [1], [5], [6], [9]
require the channel to be estimated in advance through the use
I. I NTRODUCTION
of training sequences or pilot signals, consequently resulting

T HE need for high transmission rate and guaranteed


quality of service has grown rapidly in wireless com-
munication systems. To meet this need, orthogonal frequency
in reduced spectral efficiency. Therefore, blind algorithms with
no need of pilot signals may be preferable.
Capon’s minimum variance (MV) beamformer [9]–[12] has
division multiplexing (OFDM) has been considered one of been popularly used for blind beamforming in the areas of
the major techniques for next generation mobile communi- array signal processing and wireless communications. Al-
cations [1], [2]. It has been widely known that a receiver though the MV beamformer can suppress strong interfering
of OFDM systems can avoid intersymbol interference if the signals, it needs the direction of arrival (DOA) of the signal
guard interval (GI) is larger than the channel delay profile. of interest beforehand. Moreover, the MV beamformer fails
Manuscript received March 7, 2007; revised July 11, 2007 and October to work if there exist spatially correlated source signals (from
7, 2007; accepted November 21, 2007. The associate editor coordinating the different DOAs with the same arrival time at the receiving
review of this paper and approving it for publication was X. Gao. This work antenna array) [9], [11]–[15]. Some multiple linear constrained
was supported by the National Science Council, R.O.C., under Grants NSC
95-2219-E-007-004 and 96-2219-E-007-004. This work was partly presented methods [12]–[14], [16] and spatial smoothing methods [11],
at the 2005 International Symposium on Intelligent Signal Processing and [15] have been proposed to resolve the issue of spatially
Communication Systems (ISPACS), Hong Kong, Dec. 13-16, 2005, and partly correlated source signals, provided that DOAs of spatially
presented at the 8th IEEE Workshop on Signal Processing Advances in
Wireless Communications (SPAWC), Helsinki, Finland, June 17-20, 2007. correlated source signals are known or can be estimated
C.-Y. Chi (the corresponding author) is with the Institute of Communica- in advance. Nevertheless, even if the above issue can be
tions Engineering and the Department of Electrical Engineering, National Ts- effectively solved, the performance of the MV beamformer
ing Hua University, Hsinchu, Taiwan, R.O.C. (e-mail: cychi@ee.nthu.edu.tw).
C.-H. Peng, K.-C. Huang, and T.-H. Tsai are with the Institute of Com- is limited due to the lack of multipath diversity. A prominent
munications Engineering, National Tsing Hua University, Hsinchu, Taiwan, merit of the MV beamformer as applied to the pre-FFT BFS is
R.O.C. that it is a block-by-block processing algorithm (i.e., only one
W.-K. Ma is with the Department of Electronic Engineering, The Chinese
University of Hong Kong, Shatin, N.T., Hong Kong (e-mail: wkma@ieee.org). OFDM block is needed rather than a set of OFDM blocks), in
Digital Object Identifier 10.1109/TWC.2008.070269. contrast to blind beamforming algorithms based on the post-
1536-1276/08$25.00 
c 2008 IEEE

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
CHI et al.: A BLOCK-BY-BLOCK BLIND POST-FFT MULTISTAGE BEAMFORMING ALGORITHM FOR MULTIUSER OFDM SYSTEMS 3239

x [n ]
A/D

A/D Spatial
GI N-point
Processor S/P P/S u p ,l [k ]
Removal FFT
(Beamformer)

A/D

(a)

x [n ] [k ]

GI N-point
A/D S/P P/S
Removal FFT

GI N-point
A/D S/P P/S Proposed
Removal FFT
Beamforming u [k ]
Algorithm

GI N-point
A/D S/P P/S
Removal FFT

(b)

Fig. 1. Block diagrams for (a) Pre-FFT BFS and (b) Post-FFT BFS.

FFT BFS as reported in [2], [8], [17]. each for a subcarrier and the channel to be static over multiple
Blind beamforming algorithms associated with the post- OFDM blocks. In this paper, we propose a block-by-block
FFT BFS have also been reported in the open literature such blind Multistage Beamforming Algorithm (MSBFA) associated
as the blind adaptive constant modulus algorithm [8] and with the post-FFT BFS based on subcarrier averaging over one
subspace-based methods [2], [17] for which blind channel OFDM block. The designed beamformer is exactly the same
estimation is performed prior to the design of beamformer for all the subcarriers, effectively utilizes multipath diversity
for each subcarrier using multiple OFDM blocks. In other for performance gain, and is applicable in the presence of
words, a set of N beamformers (where N is the total number spatially correlated sources.
of subcarriers) each for a subcarrier is needed in addition to The remaining parts of the paper are organized as follows.
multiple OFDM blocks (which further require the channel to Section 2 reviews discrete-time instantaneous MIMO models
be static over these OFDM blocks). Therefore, it is desirable to associated with the pre-FFT BFS and post-FFT BFS. Section
design a block-by-block blind beamforming algorithm which 3 presents a hybrid source extraction scheme which is needed
is exactly the same for all the subcarriers and attains maximum in the proposed blind MSBFA to be presented in Section 4. In
multipath diversity gain at the same time. Section 5, we show some simulation results to support the
Recently, Chi et al. [18]–[22] proposed a computationally effectiveness of the proposed blind MSBFA. Finally, some
efficient fast kurtosis (a fourth-order statistic) maximization conclusions are drawn in Section 6.
algorithm (FKMA) with super-exponential convergence rate
and guaranteed convergence. It has been successfully applied II. MIMO M ODELS FOR B EAMFORMING OF M ULTIUSER
to blind beamforming, blind source separation (or independent OFDM S YSTEMS
component analysis), and blind maximum ratio combining
For ease of later use, let us define the following notations:
(BMRC). The FKMA is not applicable to the MIMO model
associated with the pre-FFT BFS (since the model inputs are n Discrete-time (sample) index
approximately Gaussian). However, the FKMA is applicable k Frequency bin (subcarrier) index
to the post-FFT BFS but it requires a set of N beamformers E{·} Expectation operator

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
3240 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 8, AUGUST 2008

· Euclidean norm of vectors or matrices A. MIMO Model for Pre-FFT BFS
IM M × M identity matrix For the pre-FFT BFS [1], [5]–[7] (see Figure 1(a)), the
c∗ Complex conjugate of a complex number c baseband discrete-time received signal x[n] given by (2) can
θp,l (−π/2 ≤ θp,l ≤ π/2) DOA associated with the lth be expressed as a Q × L instantaneous MIMO model
path of user p
a(θp,l ) Q × 1 steering vector associated with DOA θp,l x[n] = As[n] + w[n], n = −Ng , −Ng + 1, ..., N − 1, (4)
αp,l Path gain associated with DOA θp,l
τp,l Time delay associated with DOA θp,l in discrete- where
time domain after sampling A = (A1 , A2 , ..., AP )
Lp Total number of paths (or DOAs) associated with
user p = (a(1) , a(2) , ..., a(L) ), Q × L matrix (5)
L (= L1 + L2 + · · · + LP ) total number of paths (or
DOAs) of all the users. s[n] = (sT T T
1 [n], s2 [n], ..., sP [n])
T

Consider the uplink of a quasi-synchronous multiuser = (s(1) [n], s(2) [n], ..., s(L) [n])T , L × 1 vector (6)
OFDM system [2], [17], [23] (for which all the paths of all
the users fall within the GI) with P active users operating in are the Q × L mixing matrix (or DOA matrix) and the L × 1
outdoor rural environments. At the transmitter (equipped with input vector consisting of L source signals, respectively, in
a single antenna) of the user p, the data sequence up [k] is which
processed by serial-to-parallel (S/P) conversion, N -point IFFT Ap = (αp,1 a(θp,1 ), αp,2 a(θp,2 ), ..., αp,Lp a(θp,Lp )), (7)
operation, parallel-to-serial (P/S) conversion, and insertion of
Q × Lp matrix
a GI of length equal to Ng . Then the transmitted OFDM signal
of user p can be expressed as [3] sp [n] = (sp,1 [n], sp,2 [n], ..., sp,Lp [n])T , Lp × 1 vector
N −1 (8)
1 
sp [n] = up [k]ej2πkn/N (1) sp,l [n] = sp [n − τp,l ]. (9)
N
k=0
A remark for the MIMO model x[n] given by (4) associated
for n = −Ng , −Ng + 1, ..., N − 1, where up [k] is the data
with the pre-FFT BFS is as follows:
sequence of user p.
Assume that the channel is invariant within one OFDM (R1) One can observe, from (6), (8), and Assumptions (A1)
block and so are DOA θp,l , path gain αp,l and time delay τp,l . and (A3), that s[n] for each fixed n is a zero-mean
The receiver at the base station is equipped with a uniform random vector with all the random components being
linear antenna array of Q elements equally spaced by half a mutually statistically independent with E{s[n]sH [n]} =
1
carrier wavelength. The received baseband discrete-time signal N IL . Moreover, s[n] (comprising N -point IFFT of up [k]
can be expressed as by (1)) is approximately Gaussian by Central Limit
Theorem. On the other hand, the Q × L DOA matrix
P  Lp
A (see (5) and (7)) is of full column rank by Assump-
x[n] = αp,l a(θp,l )sp [n − τp,l ] + w[n] (2)
p=1 l=1
tion (A2) and each column a(i) of A only comprises
the component from a single path. These observations
for n = −Ng , ..., N − 1, where w[n] is a Q × 1 noise vector imply that only second-order statistics (SOS) based blind
and beamforming algorithms can be applied, such as the
a(θp,l ) = (1, e−jπ sin(θp,l ) , ..., e−j(Q−1)π sin(θp,l ) )T . (3) Capon’s MV beamformer and Fourier beanformer [9],
Next, let us make some general assumptions for the received but their performance is limited due to the lack of path
signal x[n] given by (2) as follows: diversity if there is no further processing for obtaining
path diversity gain that involves non-trivial path gain
(A1) u1 [k], u2 [k], ..., uP [k] are mutually independent identi-
estimation, time delay estimation and compensation, and
cally distributed (i.i.d.) quadriphase-shift keying (QPSK)
coherent combination of the extracted path signals in the
symbol sequences (i.e., up [k] for each k is a random
time domain.
variable with uniform probability mass function over the
−jπ/4
sample description space {±e jπ/4
, ±e }).
(A2) θq,m = θp,l for all (q, m) = (p, l) and Q ≥ L. B. MIMO Model for Post-FFT BFS
(A3) τp,l ∈ {0, ..., Ng } for all p and l (quasi-synchronous
As shown in Figure 1(b), after the processes of the removal
OFDM system) and τp,1 < · · · < τp,Lp .
of GI, S/P conversion, N -point FFT operation, and P/S con-
(A4) w[n] is zero-mean Gaussian with E{w[n]wH [n]} =
2 version at each receive antenna, the MIMO model for each
σw IQ , and is statistically independent of up [k], p = 1, 2,
subcarrier k of the post-FFT BFS can be established as follows
..., P .
[2], [8], [17]:
Next, let us present the MIMO models associated with the
two widely known beamforming structures of OFDM systems P  Lp

mentioned in the introduction section: the pre-FFT BFS as x[k] = αp,l a(θp,l )up [k]e−j2πkτp,l /N + w[k] (by (2))
shown in Figure 1(a) and the post-FFT BFS as shown in Figure p=1 l=1

1(b). = A(k) u(k) + w[k], k = 0, 1, ..., N − 1, (10)

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
CHI et al.: A BLOCK-BY-BLOCK BLIND POST-FFT MULTISTAGE BEAMFORMING ALGORITHM FOR MULTIUSER OFDM SYSTEMS 3241

where w[k] is also a Q × 1 white Gaussian noise vector, of the blind beamforming algorithms including the conven-
(k) T tional FKMA can be applied. In order to overcome the issue
u = (u1 [k], u2 [k], ..., uP [k]) , P × 1 vector (11)
of correlated components between up,l [k] and u∗p,m [k] for all
(k) (k) (k) (k)
A = (a1 , a2 , ..., aP ), Q × P matrix (12) l = m, let us present the following lemma which is needed in
the development of source extraction schemes to be presented
and each column of A(k) is given by
below and its proof is given in Appendix A.

Lp
a(k)
p = αp,l a(θp,l )e−j2πkτp,l /N . (13) Lemma 1. Let
l=1
N −1
A remark for the MIMO model x[k] given by (10) associ- 1 
up,l [k] = up,l [k] (18)
ated with the post-FFT BFS is as follows: N
k=0
(R2) By (11) and Assumption (A1), one can observe that denote the subcarrier average of up,l [k]. Under the assump-
all the up [k]’s in u(k) are zero-mean non-Gaussian tions (A1) and (A3), the following subcarrier averages con-
mutually statistically independent. Moreover, A(k) is of verge in probability as N → ∞:
full column rank by Assumption (A2) and each column
(k) p
ap of A(k) comprises multipath components implying (up,l [k])2  −→ 0, ∀ p and l, (19)
that some path diversity gain in the estimation of up [k] ∗ p
up,l [k](uq,m [k])  −→ 0, ∀ (p, l) = (q, m), (20)
may be expected but is channel dependent. Thus, blind
p
beamforming algorithms either using SOS such as blind where −→ denotes “convergence in probability” as N → ∞.
subspace methods [2] or using higher-order statistics
(HOS) such as the conventional FKMA [18], [20] are Next, let us define a notational mapping for the need in the
applicable to the estimation of up [k]. However, in gen- proposed source extraction schemes as follows
eral, they require many OFDM data blocks under the
assumption that the channel is static over these OFDM {(α(r) , θ(r) , τ (r) , u(r) [k]), r = 1, ..., L}
data blocks, and meanwhile a set of N beamformers is {(αp,l , θp,l , τp,l , up,l [k]), p = 1, ..., P, l = 1, ..., Lp },
needed because of A(k) = A(j) for all k = j, which may (21)
lead to higher computational complexity of the post-FFT
where the mapping between r and (p, l) is one-to-one. More-
BFS based beamformers compared with the pre-FFT BFS
over, let v (a Q×1 vector) denote a beamformer to be designed
based beamformers [1], [7].
and let e[k] denote the corresponding beamformer output, i.e.,
III. S OURCE E XTRACTION BY S UBCARRIER AVERAGING
The advantages of the two beamforming structures men- 
L
H T
e[k] = v x[k] = g u[k] + w[k] = g (r) u(r) [k] + w[k],
tioned in Section 2, low computational complexity for the pre- r=1
FFT BFS and path diversity gain for the post-FFT BFS, can (22)
be shared by re-expressing the MIMO model in (10) as where w[k] = v H w[k] and
x[k] = Au[k]+w[k], k = 0, 1, ..., N −1, (by (10) and (5)) gT = v H A = (g (1) , g (2) , ..., g (L) ). (23)
(14)
where the Q×L mixing matrix A given by (5) is the same for Suppose that in the presence of noise, e[k] is an estimate
all k, and the L × 1 source vector u[k] is defined as follows: of u(r) [k] up to an unknown scale factor. The input-output
cross-correlation (IOCC) method by ensemble averaging [18]–
u[k] = (uT T T T
1 [k], u2 [k], ..., uP [k]) , L × 1 vector (15) [20], [24], [25] is a widely known channel estimator (but
up [k] = (up,1 [k], up,2 [k], ..., up,Lp [k])T , Lp × 1 vector not an unbiased channel estimator) when a channel input
(16) is known or has been estimated. This motivates the IOCC
up,l [k] = up [k]e−j2πkτp,l /N . (17) channel estimation by subcarrier averaging, which is supported
by the following lemma:
Note that the MIMO model x[k] given by (14) (associated
with the post-FFT BFS) is nothing but an instantaneous Lemma 2. Under the assumptions (A1) through (A3) and the
MIMO model with the same DOA matrix A (see (5) and noise-free assumption,
(7)) associated with the MIMO model x[n] for the pre-FFT p
BFS (see (4)). x[k](u(r) [k])∗  −→ a(r) = α(r) a(θ(r) ), (24)
By treating the subcarrier k as the time index, it can
i.e., the subcarrier average based cross-correlation be-
be easily seen that each source component up,l [k] of
tween u(r) [k] and x[k] converges in probability to a(r) =
u[k] is a zero-mean wide-sense stationary complex ex-
α(r) a(θ(r) ) as N → ∞.
ponential signal with unity magnitude and i.i.d. phase
arg{up [k]} ∈ {±π/4, ±3π/4}, and meanwhile u[k] involves The proof of Lemma 2 is presented in Appendix B. Then the
correlated components associated with the same user because associated channel estimate can be expressed as follows:
E{up,l [k]u∗p,m [k]} = e−j2πk(τp,l −τp,m )/N = 0 for all l = m
(by (17) and Assumptions (A1) and (A3)), implying that none  (r) = x[k]
a e∗ [k], (by Lemma 2) (25)

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
3242 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 8, AUGUST 2008

where e[k] is the normalized beamformer output, B. KMBF by Subcarrier Averaging


e[k] = e[k]/|e[k]| e u jφ (r)
[k] (26) As the Fourier beamformer cannot completely suppress the
strong interfering signals, we present the KMBF by subcarrier
in which φ is the phase of the unknown scale factor in e[k]. averaging that does have this interference suppression feature.
An observation is that both a(θ(r) ) and a
 (r) are estimates Let us first define the kurtosis of u(i) [k] in the subcarrier
or approximations of the same steering vector a(θ(r) ) except domain as
for a complex scale factor, where θ(r) is a DOA estimate of
θ(r) . Therefore, a “blind performance index” is suggested to γ{u(i) [k]} = |u(i) [k]|4  − 2(|u(i) [k]|2 )2 − |(u(i) [k])2 |2 ,
verify the consistency between a(θ(r) ) and a
 (r) as follows: (34)
which is a function of u(i) [k] over all the subcarriers. It can
|aH (θ(r) )a(r) |
ρ(a(θ(r) ), a
 (r) ) = (27) be easily shown, by (19) and (34), that
a(θ(r) ) · 
a(r)  p
γ{u(i) [k]} −→ η (i) = −1, ∀ i. (35)
which is nothing but the magnitude of the normalized
cross-correlation between a(θ(r) ) and a  (r) and 0 ≤ Note that η (i) may depend on i for users’ symbol sequences
 (r)  (r)
ρ(a(θ ), a ) ≤ 1. The following remark can be inferred rather than QPSK symbol sequences.
straightforwardly: The objective function to be maximized for the design of
(R3) The better the estimation accuracy of both θ(r) and the beamformer v (a Q × 1 vector) is defined as
 (r) (i.e., the better performance of the associated blind
a |γ{e[k]}|
beamformer), the larger the value of ρ(a(θ(r) ), a
 (r) ) (or J(v) = J(e[k]) = (36)
(|e[k]|2 )2
the higher consistency between the two estimates a(θ(r) )
 (r) ). which is also called the “magnitude of normalized kurtosis of
and a
e[k]” where e[k] is given by (22). Note that the subcarrier
Next, let us present the source extraction scheme that in-
averages in J(v) given by (36) correspond to the ensem-
volves the Fourier beamformer and the kurtosis maximization
ble averages in the conventional “magnitude of normalized
beamformer (KMBF) both based on subcarrier averaging over
kurtosis of e[k]” [18]–[20], [24]–[27]. The performance of
one OFDM block.
the optimum beamformer v, denoted v KMBF , by maximizing
J(v) (see (36)) is supported by Theorem 1 below under the
A. Fourier Beamformer by Subcarrier Averaging
noise-free assumption, the preceding three assumptions (A1)
The Fourier beamformer by subcarrier averaging is given through (A3), and the following three assumptions:
by
1 (A5) τp,j = (τp,i + τp,l )/2, ∀ p, if Lp ≥ 3, where i, j, l

v FB = √ a(θ), (28) are distinct integers.
Q
(A6) τp,i + τp,l = τp,j + τp,m , ∀ p, if Lp ≥ 4, where i, j,
where l, m are distinct integers.
1
θ = arg max | √ aH (θ)x[k]|2  (29) (A7) |τp,j − τp,i | = |τq,m − τq,l |, ∀ p = q, j = i, and
|θ|≤π/2 Q
m = l, if Lp ≥ 2 and Lq ≥ 2.
is a DOA estimate of θ(r) . Under the assumptions (A1) Moreover, the following lemma is needed for the proof of
through (A3) and the noise-free assumption, it can be easily Theorem 1 and the proof of this lemma is given in Appendix
shown, by (20), that C.
p
θ −→ θ(r) (30)
for sufficiently large Q where r ∈ {1, 2, ..., L}. Therefore, the Lemma 3. Under the assumptions (A1) through (A3), (A5)
θ given by (29) can be thought of as a DOA estimate, say through (A7), and the noise-free assumption,
θ(r) , associated with one source of u[k] (usually the one with
p 
L
the largest path gain) as both Q and N are finite. Note that |e[k]|2  −→ |g (i) |2 (as N → ∞), (37)
the above beamformer is similar to the conventional Fourier i=1
beamformer [9] but operating in the subcarrier domain. As L 
L
p
θ = θ(r) (i.e., one DOA is known in advance), the Fourier γ{e[k]} −→ (i) (i) 4
η |g | = − |g (i) |4 (as N → ∞).
beamformer can efficiently extract one source signal u(r) [k] i=1 i=1
from x[k] (see (14)), and the associated beamformer output (38)
given by (22) with v replaced by v FB is given by
Theorem 1. Under the assumptions (A1) through (A3), (A5)
eFB [k] = v H
FB x[k]. (31) through (A7), and the noise-free assumption, J(v KMBF ) =
p p
Then the associated channel estimate a  FB can be ob- max{J(v)} −→ 1, v KMBF −→ v opt , and v H opt x[k] =
tained by (25) and (26) with e[k] replaced by eFB [k] = β (r) u(r) [k] where β (r) = 0 is an unknown constant and
eFB [k]/|eFB [k]| as r ∈ {1, ..., L} is an unknown integer.
a e∗FB [k],
 FB = x[k] (32) The proof of Theorem 1 is presented in Appendix D.
and the corresponding blind performance index is Although the objective function J(v) given by (36) is a highly
nonlinear function of v without closed-form solutions, fortu-
 a
ρFB = ρ(a(θ),  FB ). (by (27)) (33) nately, v KMBF can be obtained iteratively in the same fashion

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
CHI et al.: A BLOCK-BY-BLOCK BLIND POST-FFT MULTISTAGE BEAMFORMING ALGORITHM FOR MULTIUSER OFDM SYSTEMS 3243

as the FKMA proposed by Chi et al. [18]–[20]. The resultant the other assumptions (A1), (A2), and (A3) in Theorem
algorithm is referred to as the KMBF by subcarrier averaging. 1 are true. Additionally, the probability of the event that
(i−1) (i−1)
Given v KMBF and eKMBF [k] obtained at the (i−1)th iteration, violation of any of the three assumptions occurs depends
(i) on values of Ng (length of GI) and Lp (number of paths
v KMBF at the ith iteration is obtained by the proposed KMBF
through the following two steps. of each user). However, this drawback can be avoided by
(i) combining the KMBF and the Fourier beamformer to be
Step 1. Update v KMBF by presented in the next subsection.
R−1 ∗ (i−1) (R6) The proposed KMBF is also applicable to the case of
(i) x d (eKMBF [k], x[k])
v KMBF = , (39) binary phase-shift keying (BPSK) symbol sequences. For
 R−1 ∗ (i−1)
x d (eKMBF [k], x[k])  this case, in addition to the noise-free assumption and
where the assumptions (A1) through (A3) and (A5) to (A7)
H
Rx = x[k]x [k] (40) (required for the case of QPSK symbol sequences), three
more assumptions are required as follows:
is the subcarrier average based correlation matrix of x[k] and (A8) τq,m = (τp,i + τp,j )/2, ∀ m, q = p, and i = j if
d(e[k], x[k]) = |e[k]|2 e[k]x∗ [k] − 2|e[k]|2 e[k]x∗ [k] Lp ≥ 2;
2 ∗ ∗ (A9) τp,i + τp,l = τq,j + τq,m , ∀ q = p, i = l, and
− e [k]e [k]x [k] (41)
j = m, if Lp ≥ 2 and Lq ≥ 2;
is the subcarrier average based 4th-order cross-cumulant be- (A10) τp,i = τq,l , ∀ i, l, and q = p, if τp,i > 0 and
tween e[k] and x[k] over all the subcarriers. Then obtain the τq,l > 0;
(i)
associated eKMBF [k] by (22). for Lemma 3 and Theorem 1 to hold valid, and mean-
(i) (i−1) while 
Step 2. If J(v KMBF ) > J(v KMBF ), go to the next iteration; (i) −2, as τ (i) = 0
(i) η = (45)
otherwise re-update v KMBF through a gradient type optimiza- −1, as τ (i) = 0.
(i) (i−1)
tion algorithm such that J(v KMBF ) > J(v KMBF ) and obtain (The proof of Lemma 3 and Theorem 1 for the BPSK
(i)
the associated eKMBF [k]. case is similar to that for the QPSK case and thus omitted
The proposed KMBF is initialized by the Fourier beam- here.) Therefore, the proposed KMBF may fail to extract
(0)
former (i.e., v KMBF = v FB ), and its performance is supported a source with a higher probability for the BPSK case than
by Theorem 1 for infinite N and signal-to-noise ratio (SNR). for the QPSK case (see (R5)) due to the above three
Because both N and SNR are finite in practice, the source extra assumptions required, implying that the Fourier
signal extracted by the proposed KMBF is then an estimate beamformer may perform better than the KMBF, though
of one source signal in u[k] (see (15)) except for an unknown both of them are based on subcarrier averaging for the
scale factor, i.e., BPSK case.
(r) [k] β (r) u(r) [k].
eKMBF [k] = u (42)
C. Fourier-KMBF by Subcarrier Averaging
Then the associated channel estimate a  KMBF can be ob- We empirically found that the KMBF performs better than
tained by (25) and (26) with e[k] replaced by eKMBF [k] = the Fourier beamformer (both based on subcarrier averaging),
eKMBF [k]/|eKMBF [k]| as but the former requires three extra assumptions (A5), (A6) and
(A7). It may occur that while the assumption (A2) holds, these
a e∗KMBF [k],
 KMBF = x[k] (43)
three assumptions may not be valid all the time in practice,
and the corresponding blind performance index is thus limiting the performance of the KMBF. This motivates
 a the following two-step hybrid Fourier-KMBF which is free
ρKMBF = ρ(a(θ),  KMBF ). (by (27)) (44) from these three assumptions:
Three remarks for the proposed KMBF by subcarrier aver- (S1) Obtain the beamformer output e[k], channel estimate a ,
aging are as follows: and blind performance ρ of both the Fourier beamformer
(R4) As stated in [20], [24], the conventional FKMA uses and the KMBF presented in Section 3.1 and Section 3.2,
the MIMO super-exponential algorithm [28] (Step 1) respectively.
for fast convergence (basically with super-exponential (S2) Let ρmax = max{ρFB , ρKMBF }. If ρmax > ηd where
rate) which usually happens in most of iterations before ηd is a preassigned threshold, then obtain the extracted
convergence, and a gradient-type optimization method source and the channel estimate

(Step 2) for the guaranteed convergence. Empirically, we (eKMBF [k], a KMBF ), if ρmax = ρKMBF
) =
(e[k], a
found that the proposed iterative KMBF also shares the  FB ),
(eFB [k], a if ρmax = ρFB ,
fast convergence and guaranteed convergence advantages (46)
of the conventional FKMA. otherwise no more source signal (with enough power)
(R5) We should emphasize that all the assumptions for The- can be extracted.
orem 1 are sufficient conditions rather than necessary A remark about the proposed hybrid Fourier-KMBF is as
conditions for the proposed KMBF, although it may or follows:
may not fail to extract some sources when not all the extra (R7) Again, when not all the extra assumptions needed for
assumptions of (A5), (A6) and (A7) are satisfied while the corresponding modulation (i.e., QPSK or BPSK)

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
3244 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 8, AUGUST 2008

(See Section 4.2) {u1[ k ] , u2[ k ] , ... , uP[ k ]}


e [k]
Path Signal TDEC
[k] Update u p [ k ]
Extraction up [ k ]
Using through BMRC
Fourier-KMBF ε [k]
a [k]
ε [k] p
[k]
No
A − 1[ k] p Yes u p[ k ] = ε [ k ]
Deflation Classification p = P +1
P +1
Update P by P
?

(See Section 4.1) {u1[ k ] , u2[ k ], ... , uP[ k ]} (See Section 4.3)

Fig. 2. Signal processing procedure of the proposed blind MSBFA at stage th.

are satisfied while the other assumptions in Theorem 1 B. Time Delay Estimation and Compensation (TDEC)
are true, the selection scheme (46) will switch to the The unknown time delay τ (r) in the extracted path signal
Fourier beamformer since ρFB > ρKMBF in this case, e [k] (see (48)) can be estimated by subcarrier averaging as
indicating that the proposed hybrid Fourier-KMBF is an
intelligent selection scheme according to the performance τ(r) = arg max |(
e [k]ej2πkτ /N )4 | (49)
0≤τ ≤Ng
of the Fourier beamformer and the KMBF (see (R3)).
Therefore, all the extra assumptions (A5) through (A10) simply because |( e [k]ej2πkτ /N )4 | 0 for τ = τ (r) , while
can be removed. |(
e [k]e j2πkτ (r) /N 4
) | 1. Therefore, by (48) and (49), the
time delay compensated path signal estimate can be obtained
IV. P ROPOSED B LIND MSBFA
in a straightforward manner as
Under Assumptions (A1) through (A4), the proposed blind
(r)
MSBFA as shown in Figure 2 basically includes path sig- ε [k] = e [k]ej2πkτ /N
= β up [k] +  [k], (50)
nal extraction (i.e., source extraction), time delay estimation
and compensation, classification (path-to-user association) and where β is an unknown constant, the user p ∈ {1, 2, ..., P } is
BMRC (of paths) which are presented next, respectively. We also unknown since r is unknown, and  [k] is the estimation
also discuss the applicability of the proposed algorithm when error.
correlated paths are present.
C. Classification and BMRC
A. Multistage Path Signal Extraction Using Fourier-KMBF
Assume that at stage − 1, the time delay compensated
Assume that the path signal estimate e−1 [k] and the path signal estimates {ε1 [k], ε2 [k], ..., ε−1 [k]} (see (50)) have
channel estimate a  −1 are obtained at stage − 1 and that been optimally combined into a set of P symbol estimates,
x [k] is the MIMO signal deflated from x[k] at stage (i.e., S = { uq [k], q = 1, 2, ..., P} where the subscript ‘q’ is merely
all the contributions of the extracted path signals up to stage a “class number” (associated with a distinct user number) but
− 1 removed). As shown in Figure 2, at stage , not the actual user number because the implicit user number
 −1 e−1 [k].
x [k] = x−1 [k] − a (47) p associated with the extracted path signal ε [k] is unknown.
Therefore, it is needed to identify the association pair of
First, obtain a distinct DOA estimate θ = θ(r) by (29) with q [k] and ε [k] so that u
u q [k] can be updated through BMRC
()
x[k] replaced by x [k], and then calculate v FB by (28). processing.
  ) using the proposed Fourier-KMBF
Second, obtain (e [k], a Next, let q denote the magnitude of normalized cross-
(see (46)), where correlation by subcarrier averaging between ε [k] and u q [k]
(r)
(r) [k] β up [k]e−j2πkτ
e [k] = u /N
(by (17)) (48) defined as
u∗q [k]|
|ε [k]
in which β is an unknown constant, r ∈ {1, ..., L} is unknown q =  (51)
|ε [k]|2 |uq [k]|2 
and r maps uniquely to a “user p” (by (21)). Note that
the extracted path signal e [k] is basically free from error (0 ≤ q ≤ 1) and let
propagation from stage to stage [19]–[22] since x[k] instead
of x [k] is processed by the Fourier-KMBF at each stage. p = arg max {q }. (52)
1≤q≤P

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
CHI et al.: A BLOCK-BY-BLOCK BLIND POST-FFT MULTISTAGE BEAMFORMING ALGORITHM FOR MULTIUSER OFDM SYSTEMS 3245

As shown in Figure 2, if p < ηc (a preassigned threshold), The extraction and TDEC of this type of path signals need
ε [k] is classified as a member of a new class and then set further rigorous theoretical support though we have done some
p = P + 1 and u p [k] = ε [k], and update P by P + 1; promising preliminary studies which will be reported in the
otherwise ε [k] is classified as a member of the existent class p future due to space limit.
and update u p [k] by BMRC using the FKMA proposed by Chi
et al. [18]–[22], where the BMRC of u p [k] and ε [k] (which V. S IMULATION R ESULTS
is a coherent combination of u p [k] and ε [k]) can increase the
diversity gain of the updated u p [k] maximally. Two simulation examples are to be presented to justify the
effectiveness of the proposed MSBFA. Example 1 considers
the case of no correlated paths and Example 2 considers the
D. Applicability of MSBFA in the Presence of Correlated case of the presence of spatially correlated paths. Consider a
Paths four-user (P = 4) OFDM system with FFT size N = 1024,
In this subsection, we discuss the applicability of the length of GI Ng = 20, and antenna array size Q = 20. The
proposed algorithm when either the assumption (A3) or the synthetic MIMO signals x[n] were generated by (4) for users’
assumption (A2) can be partly relaxed. In practice, path signals symbol sequences up [k]’s being i.i.d. BPSK or QPSK signals
from different DOAs that belong to the same user may impinge with E{|up [k]|2 } = 1 and the noise vector w[n] being i.i.d.
on the receiver antenna array at the same time (i.e, with the zero-mean Gaussian with E{w[n]wH [n]} = σw 2
IQ . Then the
same time delay), forming a “cluster” of spatially correlated proposed MSBFA with the thresholds ηd = 0.75 and ηc = 0.5
path signals [9], [14], [15] and thus violating Assumption was employed to process the associated MIMO signal x[k]
(A3); path signals with different time delays that belong to the (see (14)) to estimate all the four users’ symbol sequences
same user may impinge on the receiver antenna array from the up [k]’s. For performance comparison, the same data (either
same DOA, forming a “cluster” of temporally correlated path pre-FFT data x[n] or post-FFT data x[k]) were processed by
signals and thus violating Assumption (A2). For the case of the theoretical nonblind MMSE and MRC beamformers as well
presence of spatially correlated paths, the proposed MSBFA as Capon’s MV beamformer. Twenty five hundred independent
is applicable. The reasons are as follows. runs were performed for different values of input SNR, defined
(m) (m)
Assume that {αp,l a(θp,l )sp [n − τp,l ], m = 1, 2, ..., Lp,l } as
is a cluster of Lp,l spatially correlated path signals impinging E{x[n] − w[n]2 }
(m) (m) Input SNR = . (see (4))
on the receiver antenna array where αp,l and θp,l are the P · E{w[n]2 }
path gain and DOA of each correlated signal in the cluster, The performance of each beamformer under test is evaluated
respectively. The received signal x[n] given by (2) remains in terms of the averaged symbol error rate (SER) of all the
valid except that αp,l a(θp,l ) must be replaced by users’ symbol estimates. Next, let us concentrate on Example

Lp,l 1.
(m) (m)
āp,l = αp,l a(θp,l ). (53) Example 1. (Environment without Correlated Paths)
m=1
All the multipath channel parameters (except time delay
The resultant MIMO signal model for the post-FFT BFS given parameters)
Lp used2 in this example are shown in Table 1. Note
by (14) (on which the proposed MSBFA is based) also keeps that l=1 |αp,l | = 1. Fifty sets of time delay parameters
valid except that the mixing matrix A is different due to the τp,l ∈ {0, 1, ..., Ng }, for p = 1, 2, ..., P and l = 1, 2, ..., Lp ,
replacement of αp,l a(θp,l ) by āp,l . Therefore, the proposed were generated randomly. For each set of time delay param-
MSBFA is able to effectively estimate the associated source eters, fifty sets of data x[n] were generated.
signal up,l [k] = up [k]e−j2πkτp,l /N as long as āp,l  is large In order to give insights into the performance of the
enough, implying its robustness to spatially correlated paths. proposed blind MSBFA, Figures 3(a) (for the QPSK case)
On the other hand, the Capon’s MV beamformer is incapable and 3(b) (for the BPSK case) show the performance (averaged
of extracting the associated source sp [n − τp,l ] regardless of SER) of the proposed MSBFA without BMRC (dashed lines),
the value of āp,l  because āp,l is no longer a steering vector where either the the Fourier beamformer (Section 3.1), or
of a certain DOA required by the Capon’s MV beamformer the KMBF (Section 3.2), or the Fourier-KMBF (Section 3.3)
[9], [11]–[15]. was used in the source (path signal) extraction. In addition,
For the case of the presence of temporally correlated paths the performance of the proposed blind MSBFA with BMRC
with the same DOA, an example is that one non-integer- is also presented (solid lines) where the Fourier-KMBF was
delayed path will lead to two (or more) consecutive integer- used in the source extraction. One can observe, from Figure
delayed paths in discrete-time domain after sampling, i.e., 3(a), that the proposed MSBFA without BMRC (dashed line)
τp,l+1 = τp,l + 1 (for two consecutive integer delays), which performs best when the Fourier-KMBF () is used, and that
will result in a combined path signal up,l [k] = up,l [k] + the proposed MSBFA with BMRC ( and solid line) performs
up,l+1 [k] = up,l [k](a + be−j2πk/N ) (where a and b are much better than the one without BMRC ( and dashed
constants) incident upon the receiver antenna array from the line). The same observations from Figure 3(a) can also be
same DOA. Though |τp,l+1 − τp,l | = 1 may happen in two applied to Figure 3(b). Moreover, it is worth mentioning that
different users, it is totally different from the case that (A7) is the proposed MSBFA without BMRC (dashed line) using the
not satisfied but (A1) through (A3) are satisfied as mentioned KMBF () performs better than using the Fourier beamformer
in (R5) simply due to the same DOA of the two paths. () for the QPSK case (see Figure 3(a)), while for the BPSK

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
3246 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 8, AUGUST 2008

TABLE I
M ULTIPATH CHANNEL PARAMETERS USED IN E XAMPLE 1 INCLUDING PATH GAINS AND DOA S .

Path User 1 User 2 User 3 User 4


Number (L1 = 4) (L2 = 2) (L3 = 2) (L4 = 2)
(l) α1,l θ1,l α2,l θ2,l α3,l θ3,l α4,l θ4,l
1 0.5442 45◦ 0.7634 −60◦ 0.8682 −45◦ 0.8944 60◦
2 0.5140 −30◦ 0.6459 80◦ 0.4961 35◦ 0.4472 −10◦
3 0.4837 20◦ — — — — — —
4 0.4535 0◦ — — — — — —

0
QPSK
10

-1
10 Without BMRC

-2
10 With BMRC

-3
Averaged SER

10

-4
10

-5
10

-6
10
KMBF used
-7
10 Fourier-KMBF used
Fourier Beamformer used
-8
10
-6 -4 -2 0 2 4 6 8 10
INPUT SNR (dB)
(a)

BPSK
0
10

-1
10
Without BMRC

-2
10

-3
10
With BMRC
Average SER

-4
10

-5
10

-6
10
KMBF used
-7
10 Fourier-KMBF used
Fourier Beamformer used
-8
10
-6 -4 -2 0 2 4 6 8 10
INPUT SNR (dB)
(b)

Fig. 3. Performance (averaged SER) of the proposed blind MSBFA (solid lines for BMRC included and dash lines for BMRC excluded) for (a) QPSK case
and (b) BPSK case, with no correlated paths.

case (see Figure 3(b)) the situation is just the contrary. These MRC beamformers ( and dash line), theoretic Capon’s MV
results are consistent with (R6). beamformer (♦ and dash line) (using theoretical correlation
matrix and true DOAs) and actual Capon’s MV beamformer
Next, some simulation results using the MSBFA, nonblind ( and dash line) (using the estimated correlation matrix
MMSE and MRC beamformers associated with the pre-FFT and estimated DOAs) because path diversity gain exists only
BFS or post-FFT BFS, and Capon’s MV beamformer associ- for the former (see (R1)). Note that the performance of the
ated with the pre-FFT BFS are shown in Figure 4(a) for the theoretic Capon’s MV beamformer is actually the same as
QPSK case and in Figure 4(b) for the BPSK case. One can the nonblind MMSE beamformer associated with the pre-
observe, from Figure 4(a), that the MSBFA ( and solid line), FFT BFS (dash line) and they perform better than the actual
nonblind MMSE ( and solid line) and MRC beamformers ( Capon’s MV beamformer. Moreover, the proposed MSBFA
and solid line) associated with the post-FFT BFS significantly works well with better performance than the nonblind MRC
outperform the other beamformers associated with the pre- beamformer associated with the post-FFT BFS, although the
FFT BFS including nonblind MMSE ( and dash line) and

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
CHI et al.: A BLOCK-BY-BLOCK BLIND POST-FFT MULTISTAGE BEAMFORMING ALGORITHM FOR MULTIUSER OFDM SYSTEMS 3247

QPSK
0
10

-1
10

-2
Pre-FFT BFS
10

-3 Post-FFT BFS

Averaged SER
10

-4
10

-5
10

-6 Nonblind MMSE Beamformer


10
Nonblind MRC Beamformer
-7 Proposed Blind MSBFA
10 Theoretic Capon's MV Beamformer
Actual Capon's MV Beamformer
-8
10
-6 -4 -2 0 2 4 6 8 10
INPUT SNR (dB)
(a)

BPSK
0
10
Nonblind MMSE Beamformer
-1 Nonblind MRC Beamformer
10 Proposed Blind MSBFA
Theoretic Capon's MV Beamformer
-2
10 Actual Capon's MV Beamformer
Pre-FFT BFS
-3 Post-FFT BFS
Averaged SER

10

-4
10

-5
10

-6
10

-7
10

-8
10
-6 -4 -2 0 2 4 6 8 10
INPUT SNR (dB)
(b)

Fig. 4. Performance (averaged SER) of beamformers under test associated with the pre-FFT BFS (dash lines) and those associated with the post-FFT BFS
(solid lines), for (a) QPSK case and (b) BPSK case, with no correlated paths.

performance of the former is slightly worse than that of the nonblind MMSE beamformer associated with the post-FFT
nonblind MMSE beamformer associated with the post-FFT BFS. Besides, all the beamformers under test perform better
BFS. The observations of Figure 4(a) also apply to Figure for higher input SNR except the Capon’s MV beamformer
4(b). (either theoretical one or actual one), which performs worse
(better) for higher input SNR as input SNR is higher (lower)
Example 2. (Environment with Spatially Correlated Paths)
All the channel parameters used in Example 1 are basically than 4 dB, demonstrating that it is not applicable in the
presence of spatially correlated paths.
used in this example, except that each path with DOA θp,l and
path gain αp,l is replaced by a cluster of Lp,l = 4 spatially The above simulation examples demonstrate the efficacy of
(m) (m) (1) the proposed blind MSBFA, in spite of no comparison with
correlated paths with distinct DOAs θp,l (|θp,l − θp,l | ≤
(m) (1) other block-by-block post-FFT beamforming algorithms for
5◦ ) and path gains αp,l  αp,l , m = 2, 3, ..., Lp,l , and multiuser OFDM systems since, to our best knowledge, so far
Lp (1) 2
l=1 |αp,l | = 1. none of them can be found in the open literature.
The simulation results corresponding to Figure 4 (for the
case of no correlated paths) are shown in Figure 5 for the case
VI. C ONCLUSION
of spatially correlated paths. Basically, all the observations
from Figures 4(a) (for the QPSK case) and 4(b) (for the We have presented a block-by-block post-FFT beamforming
BPSK case) apply to Figure 5(a) (for the QPSK case) and 5(b) algorithm based on subcarrier averaging, namely the blind
(for the BPSK case), respectively, i.e., beamformers associated MSBFA, which is well suited to outdoor rural environments
with the post-FFT BFS outperform those associated with the with some but not too many multiple paths, for the data
pre-FFT BFS, and the proposed MSBFA works well and sequence estimation of a multiuser OFDM system. It is also
outperforms the nonblind MRC beamformer associated with a multistage blind beamforming algorithm (without involving
the post-FFT BFS, but it performs slightly worse than the user identification) consisting of path signal extraction using

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
3248 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 8, AUGUST 2008

QPSK
0
10

-1
10
Pre-FFT BFS
-2
10

-3 Post-FFT BFS

Averaged SER
10

-4
10

-5
10

-6 Nonblind MMSE Beamformer


10
Nonblind MRC Beamformer
-7 Proposed Blind MSBFA
10 Theoretic Capon's MV Beamformer
Actual Capon's MV Beamformer
-8
10
-6 -4 -2 0 2 4 6 8 10
INPUT SNR (dB)
(a)

BPSK
0
10
Nonblind MMSE Beamformer
-1 Nonblind MRC Beamformer
10
Proposed Blind MSBFA
Theoretic Capon's MV Beamformer
-2
10
Pre-FFT BFS
Actual Capon's MV Beamformer

Post-FFT BFS
Averaged SER

-3
10

-4
10

-5
10

-6
10

-7
10

-8
10
-6 -4 -2 0 2 4 6 8 10
INPUT SNR (dB)
(b)

Fig. 5. Performance (averaged SER) of beamformers under test associated with the pre-FFT BFS (dash lines) and those associated with the post-FFT BFS
(solid lines), for (a) QPSK case and (b) BPSK case, with spatially correlated paths.

the proposed blind Fourier-KMBF, TDEC processing, classifi- A PPENDIX


cation and BMRC processing at each stage as shown in Figure
2. Note that the blind Fourier-KMBF used by the proposed A. Proof of Lemma 1
MSBFA is also an automatic selection scheme according to (l)

the performance of two blind beamformers, the KMBF and Assume that u(l) [k] = up [k]e−j2πτ k/N and u(m) [k] =
(m)
the Fourier beamformer, both using subcarrier averages over uq [k]e−j2πτ k/N (see (17) and (21)) are associated with
one OFDM block. Moreover, like the conventional FKMA, users p and q, respectively. By (18) and Assumptions (A1)
the KMBF by subcarrier averaging supported by Theorem and (A3), it can be easily shown that
1 is also a computationally fast source extraction algorithm.
N −1
Our simulation results demostrate that the proposed MSBFA 1  (l)

performs well no matter whether spatially correlated paths E{(u(l) [k])2 } = E{u2p [k]}e−j4πτ k/N
N
k=0
(resultant from the same arrival time of path signals from
distinct DOAs) are present or not, and its performance is close =0 (since E{u2p [k]} = 0), (54)
to the “optimal” nonblind MMSE beamformer associated with
the post-FFT BFS. The applicability of the proposed MSBFA
in the presence of temporally correlated paths with the same E{u(m) [k](u(l) [k])∗ }
DOA is currently being investigated. N −1
1  (m) (l)
= E{uq [k]u∗p [k]}e−j2π(τ −τ )k/N = 0 (55)
N
k=0

(where in obtaining (55), we have used the facts that τ (m) =


τ (l) for m = l and q = p, and that up [k] and uq [k] are zero-

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
CHI et al.: A BLOCK-BY-BLOCK BLIND POST-FFT MULTISTAGE BEAMFORMING ALGORITHM FOR MULTIUSER OFDM SYSTEMS 3249

mean statistically independent random variables for q = p), inferred that


N −1
1  (l) L
E{|(u(l) [k])2 |2 } = E{| (u [k])2 |2 } x[k](u(r) [k])∗  =  a(l) u(l) [k](u(r) [k])∗ 
N l=1
k=0

1 
N −1 N
 −1 
L
= E{ (u(l) [k1 ])2 ((u(l) [k2 ])∗ )2 } = a(l) u(l) [k](u(r) [k])∗ 
N2
k1 =0 k2 =0 l=1
p
1 
N −1 −→ a(r) = α(r) a(θ(r) ). (by (20)) (58)
= E{|u(l) [k1 ]|4 }
N2
k1 =0 Thus we have completed the proof of Lemma 2.

N −1 N
 −1
1
+ E{(u(l) [k1 ])2 ((u(l) [k2 ])∗ )2 }
N2
k1 =0 k2 =k1 C. Proof of Lemma 3
1
= Through the same procedure of the proof of Lemma 1, the
N

N −1 N
 −1 following subcarrier averages can be shown to converge in
1 4π (l)
+ E{u2p [k1 ]}E{(u∗p [k2 ])2 }e−j N τ (k1 −k2 )
probability as N → ∞:
N2
k1 =0 k2 =k1
p
1 u(l) [k]u(m) [k] −→ 0 (59)
= (since E{u2p [k]} = 0), (56) p
N (l)
(u [k]) ((u 2 (m) ∗ 2
[k]) )  −→ 0 (60)
p
and (l)
(u [k]) (u 2 (m) ∗ (i)
[k]) (u [k])  −→ 0 ∗
(61)
(l) (m) (i) ∗ (j) ∗ p
N −1
1  (m) u [k]u [k](u [k]) (u [k])  −→ 0 (62)
E{|u(m) [k](u(l) [k])∗ |2 } = E{| u [k](u(l) [k])∗ |2 }
N
k=0 where l, m, i, j are distinct integers. Note that the proofs of

N −1 N
 −1 (59) and (60) require the assumptions (A1) and (A3), that the
1
= E{ u(m) [k1 ](u(l) [k1 ])∗ (u(m) [k2 ])∗ u(l) [k2 ]} proof of (61) requires the assumptions (A1), (A3) and (A5),
N2
k1 =0 k2 =0 and that the proof of (62) requires the assumptions (A1), (A3),
 −1
1
N
(A6) and (A7).
= E{|u(m) [k1 ]|2 |u(l) [k1 ]|2 } With the assumptions (A1) through (A3) and (A5) through
N2
k1 =0
(A7), and the noise-free assumption, it can be shown, by (22),
N −1 N −1
1   (23), and (20), that
+ E{u(m) [k1 ](u(l) [k1 ])∗ (u(m) [k2 ])∗ u(l) [k2 ]}
N2
k1 =0 k2 =k1

L
2
1 
N −1 |e[k]|  = |g (l) |2 |u(l) [k]|2 
= E{|up [k1 ]|2 |uq [k1 ]|2 } l=1
N2
k1 =0 
L 
L

1 
N −1 N
 −1 + g (l) (g (m) )∗ u(l) [k](u(m) [k])∗ 
+ 2 E{uq [k1 ]u∗p [k1 ]u∗q [k2 ]up [k2 ]} l=1 m=1,m=l
N
k1 =0 k2 =k1
p 
L

·e −j2π(τ (m) −τ (l) )(k1 −k2 )/N −→ |g (l) |2 (63)


 l=1
1/N, for q = p
= (57)
0, for q = p, which is exactly (37), and by Lemma 1 and (59) through (62),
that
where in obtaining (57), we have used the fact that τ (m) = τ (l)
for l = m and q = p, and the fact that up [k1 ], up [k2 ], uq [k1 ] p 
L L

and uq [k2 ] are zero-mean statistically independent random |e[k]|4  − |e2 [k]|2 −→ η (l) |g (l) |4 + 2( |g (l) |2 )2 ,
variables as k2 = k1 for q = p. Because E{|(u(l) [k])2 |2 } → l=1 l=1
(64)
0 (by (56)) and E{|u(m) [k](u(l) [k])∗ |2 } → 0 (by (57)) as
N → ∞, both of (u(l) [k])2  and u(m) [k](u(l) [k])∗  converge as N → ∞ where tedious algebraic derivations in obtaining
in the mean-square sense to zero as N → ∞. Therefore, we (64) are omitted here due to limited space. According to (63),
have completed the proof for (19) and (20) since mean-square (64) and (34), one can infer that
convergence implies convergence in probability.
p 
L 
L
γ{e[k]} −→ η (l) |g (l) |4 = − |g (l) |4 (by (35)) (65)
B. Proof of Lemma 2 l=1 l=1

Under the assumptions (A1) through (A3) and the noise- as N → ∞ which is exactly (38). Thus we have completed
free assumption, and by (14), (5) and (15), it can be easily the proof of Lemma 3.

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
3250 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 8, AUGUST 2008

D. Proof of Theorem 1 [13] L. J. Griffiths and C. W. Jim, “An alternative approach to linearly con-
strained adaptive beamforming,” IEEE Trans. Antennas and Propagation,
Under the assumptions (A1) through (A3), (A5) through vol. 30, pp. 27–34, Jan. 1982.
(A7), and the noise-free assumption, and by (36), Lemma 3, [14] A. Luthra, “A solution to the adaptive nulling problem with a look-
and the carry-over property of “convergence in probability” as direction constraint in the presence of coherent jammers,” IEEE Trans.
Antennas and Propagation, vol. 34, pp. 702–710, May 1986.
N → ∞, one can easily infer [15] V. Reddy, A. Paulraj, and T. Kailath, “Performance analysis of the
p optimum beamformer in the presence of correlated sources and its
J(e[k]) = J(g) −→ JKMA (e[k]) = JKMA (g) behavior under spatial smoothing,” IEEE Trans. Acoustics, Speech, and
L Signal Processing, vol. 35, pp. 927–936, July 1987.
| l=1 η (l) |g (l) |4 | [16] K. Buckley, “Spatial/spectral filtering with linearly constrained mini-
= L . (66)
( l=1 |g (l) |2 )2 mum variance beamformers,” IEEE Trans. Acoustics, Speech, and Signal
Processing, vol. 35, pp. 249–266, Mar. 1987.
Because of |η (l) | = 1 for all l by (35), the set of all the local [17] Y.-Y. Cheng, Y. Lee, and H.-J. Li, “Subspace-MMSE blind channel
estimation for multiuser OFDM with receiver diversity,” in Proc. IEEE
optimum solutions for g such that JKMA (e[k]) is maximum Global Telecommunications Conference, vol. 4, San Francisco, CA, Dec.
has been known as S(g) = {g| g (l) ζ i , i = 1, 2, ..., L} where 2003, pp. 2295–2299.
ζ i is an L × 1 unit vector with the ith element equal to unity [18] C.-Y. Chi and C.-Y. Chen, “Blind beamforming and maximum ratio
combining by kurtosis maximization for source separation in multipath,”
and the other elements equal to zero. In other words, in Proc. IEEE Workshop on Signal Processing Advances in Wireless
p Communications, Taoyuan, Taiwan, Mar. 2001, pp. 243–246.
J(eKMBF [k]) = J(v KMBF ) −→ JKMA (g = g (r) ζ r ) = |η (r) | [19] C.-Y. Chi, C.-Y. Chen, C.-H. Chen, and C.-C. Feng, “Batch processing
algorithms for blind equalization using higher-order statistics,” IEEE
=1 Signal Processing Mag., vol. 20, pp. 25–49, Jan. 2003.
(67) [20] C.-Y. Chi, C.-C. Feng, C.-H. Chen, and C.-Y. Chen, Blind Equalization
p
and System Identificaiton. London: Springer, 2006.
and v KMBF −→ v opt for which v H H
opt x[k] = v opt Au[k] = [21] C.-Y. Chi, C.-H. Chen, and C.-Y. Chen, “Blind MAI and ISI suppression
(r) T for DS/CDMA systems using HOS-based inverse filter criteria,” IEEE
g u[k] = g ζ r u[k] = g u [k] (i.e., β = g (r) ), where
T (r) (r) (r)
Trans. Signal Processng, vol. 50, pp. 1368–1381, June 2002.
r ∈ {1, 2, ..., L}. Thus, we have completed the proof. [22] C.-H. Peng, C.-Y. Chi, and C.-W. Chang, “Blind multiuser detection by
kurtosis maximization for asynchronous multi-rate DS/CDMA systems,”
EURASIP J. Applied Signal Processing, vol. 2006, article ID 84930, 17
ACKNOWLEDGEMENTS pages, 2006.
The authors would like to sincerely thank Mr. Chen Xiang [23] S. Tsumura and S. Hara, “Design and performance of quasi-synchronous
multi-carrier CDMA system,” in Proc. IEEE 54th Vehicular Technology
and Mr. Cheng-Wei Lin for their helps and suggestions during Conference, vol. 2, Atlantic City, NJ, Oct. 2001, pp. 843–847.
the preparation and revision of the manuscript. [24] C.-Y. Chi and C.-H. Peng, “Turbo source extraction algorithm and
noncancellation source separation algorithms by kurtosis maximization,”
IEEE Trans. Signal Processing, vol. 54, pp. 2929–2942, Aug. 2006.
R EFERENCES [25] J. K. Tugnait, “Identification and deconvolution of multichannel linear
[1] M. Budsabathon, Y. Hara, and S. Hara, “Optimum beamforming for pre- non-Gaussian processes using higher order statistics and inverse filter
FFT OFDM adaptive antenna array,” IEEE Trans. Veh. Technol., vol. 53, criteria,” IEEE Trans. Signal Processing, vol. 45, pp. 658–672, Mar.
pp. 945–955, July 2004. 1997.
[2] Y. Zeng and T. S. Ng, “A subspace method for channel estimation of [26] Z. Ding, “A new algorithm for automatic beamforming,” in Proc. IEEE
multi-user multi-antenna OFDM system,” in Proc. IEEE International Conference Record of the Twenty-Fifth Asilomar Conference on Signals,
Symposium on Circuits and Systems, vol. 3, Bangkok, Thailand, May Systems and Computers, Pacific Grove, CA, Nov. 1991, pp. 689–693.
2003, pp. III-52–III-55. [27] Z. Ding and T. Nguyen, “Stationary points of a kurtosis maximization
[3] R. V. Nee and R. Prasad, OFDM for Wireless Multimedia Communica- algorithm for blind signal separation and antenna beamforming,” IEEE
tions. Boston: Artech House, 1999. Trans. Signal Processing, vol. 48, pp. 1587–1596, June 2000.
[4] M. Okada and S. Komaki, “Pre-DFT combining space diversity assisted [28] O. Shalvi and E. Weinstein, “Super-exponential methods for blind
COFDM,” IEEE Trans. Veh. Technol., vol. 50, pp. 487–496, Mar. 2001. deconvolution,” IEEE Trans. Inform. Theory, vol. 39, pp. 504–519, Mar.
[5] D. Bartolomé and A. I. Pérez-Neira, “MMSE techniques for space 1993.
diversity receivers in OFDM-based wireless LANs,” IEEE J. Select.
Areas Commun., vol. 21, pp. 151–160, Feb. 2003.
[6] H. Matsuoka and H. Shoki, “Comparison of pre-FFT and post-FFT
processing adaptive arrays for OFDM systems in the presence of
co-channel interference,” in Proc. IEEE International Symposium on
Personal, Indoor and Mobile Radio Communications, vol. 2, Beijing,
China, Sept. 2003, pp. 1603–1607.
[7] Z. Lei and F. P. S. Chin, “Post and pre-FFT beamforming in an OFDM
system,” in Proc. IEEE 59th Vehicular Technology Conference, vol. 1,
Milan, Italy, May 2004, pp. 39–43.
[8] V. Venkataraman, R. E. Cagley, and J. J. Shynk, “Adaptive beamforming
for interference rejection in an OFDM system,” in Proc. IEEE Con-
ference Record of the Thirty-Seventh Asilomar Conference on Signals,
Systems and Computers, vol. 1, Pacific Grove, CA, Nov. 2003, pp. 507–
511.
[9] J. C. Liberti and T. S. Rappaport, Smart Antennas for Wireless Com-
munications: IS-95 and Third Generation CDMA Applications. Prentice
Hall, 1999.
[10] J. Capon, “High-resolution frequency-wavenumber spectrum analysis,”
Proc. IEEE, vol. 57, pp. 1408–1418, Aug. 1969.
[11] T.-J. Shan and T. Kailath, “Adaptive beamforming for coherent signals
and interference,” IEEE Trans. Acoustics, Speech, and Signal Processing,
vol. 33, pp. 527–536, June 1985.
[12] H. Cox, R. Zeskind, and M. Owen, “Robust adaptive beamforming,”
IEEE Trans. Acoustics, Speech, and Signal Processing, vol. 35, pp. 1365–
1376, Oct. 1987.

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.
CHI et al.: A BLOCK-BY-BLOCK BLIND POST-FFT MULTISTAGE BEAMFORMING ALGORITHM FOR MULTIUSER OFDM SYSTEMS 3251

Chong-Yung Chi received the Ph.D. degree in Elec- Kuan-Chang Huang was born in Kaohsiung, Tai-
trical Engineering from the University of Southern wan, on December 19, in 1981. He received the
California in 1983. From 1983 to 1988, he was with B.S. degree from the Department of Electrical Engi-
the Jet Propulsion Laboratory, Pasadena, California. neering in 2004 and M.S. degree from the Institute
He has been a Professor with the Department of of Communications Engineering and Department of
Electrical Engineering since 1989 and the Institute Electrical Engineering, in 2006, National Tsing Hua
of Communications Engineering (ICE) since 1999 University, Hsinchu, Taiwan. His research interests
(also the Chairman of ICE for 2002–2005), National include digital signal processing and wireless com-
Tsing Hua University, Hsinchu, Taiwan. He co- munications.
authored a technical book, Blind Equalization and
System Identification, published by Springer 2006,
and published more than 140 technical (journal and conference) papers. His
current research interests include signal processing for wireless communica- Teng-Han Tsai was born in Taiwan, on January 1,
tions, and statistical signal processing. 1982. He received the B.S. from the department of
Dr. Chi is a senior member of IEEE. He has been a Technical Program Electrical Engineering, National Tsing Hua Univer-
Committee member for many IEEE sponsored workshops, symposiums and sity, Hsinchu, Taiwan, in 2005, and the M.S. degree
conferences on signal processing and wireless communications, including co- from the Institute of Communications Engineering
organizer and general co-chairman of IEEE SPAWC 2001, and Co-Chair of and Department of Electrical Engineering, National
Signal Processing for Communications Symposium, ChinaCOM 2008. He Tsing Hua University, Hsinchu, Taiwan, in 2007. His
was an Associate Editor of IEEE T RANSACTIONS ON S IGNAL P ROCESSING research interests include digital signal processing
(5/2001–4/2006), IEEE T RANSACTIONS ON C IRCUITS AND S YSTEMS II and wireless communications.
(1/2006–12/2007) and an editor (7/2003–12/2005) and a Guest Editor (2006)
of EURASIP J OURNAL ON A PPLIED S IGNAL P ROCESSING. Currently, he Wing-Kin Ma (M’01) received the B.Eng. (with
is an Associate Editor for the IEEE S IGNAL P ROCESSING L ETTERS , an first-class hons.) in electrical and electronic en-
Associate Editor for the IEEE T RANSACTIONS C IRCUITS AND S YSTEMS gineering from the University of Portsmouth,
I, and a member of Editorial Board of EURASIP S IGNAL P ROCESSING Portsmouth, U.K., in 1995, and the M.Phil. and
J OURNAL, and a member of IEEE Signal Processing Committee on Signal Ph.D. degrees, both in electronic engineering, from
Processing Theory and Methods. the Chinese University of Hong Kong (CUHK),
Hong Kong, in 1997 and 2001, respectively.
Chun-Hsien Peng was born in Taiwan, on Novem- He is currently an Assistant Professor in the
ber 21, 1978. He received the B.S. degree from Department of Electronic Engineering, CUHK. He
the Department of Electronic Engineering, National was with the Department of Electrical Engineering
Taipei University of Technology, Taipei, Taiwan, and the Institute of Communications Engineering,
in 2001, and the Ph.D. degree from the Institute National Tsing Hua University, Taiwan, also as an Assistant Professor, from
of Communications Engineering and Department of Aug. 2005 to Aug. 2007. He is still holding an adjunct position there. Prior to
Electrical Engineering, National Tsing Hua Uni- becoming a faculty, he held various research positions at McMaster University,
versity, Hsinchu, Taiwan, in 2006. Since January Canada, CUHK, Hong Kong, and the University of Melbourne, Australia.
2007, he has been with MediaTek Incorporated, His research interests are in signal processing and communications, with a
Hsinchu, where he works on the analysis, design, recent emphasis on MIMO techniques and convex optimization. Since Oct.
and implementation of the transceiver in worldwide 2007, he has been appointed as Associate Editor of IEEE T RANSACTIONS
interoperability for microwave access (WiMAX) systems. His research inter- ON S IGNAL P ROCESS . Dr. Ma’s Ph.D. dissertation was commended to be “of
ests include statistical signal processing, digital signal processing, and wireless very high quality and well deserved honorary mentioning” by the Faculty of
communications. Engineering, CUHK, in 2001.

Authorized licensed use limited to: VELLORE INSTITUTE OF TECHNOLOGY. Downloaded on August 4, 2009 at 10:32 from IEEE Xplore. Restrictions apply.

Potrebbero piacerti anche