Weak signal detection in double transmission

Information

  • Patent Grant
  • 9825794
  • Patent Number
    9,825,794
  • Date Filed
    Wednesday, June 25, 2014
    10 years ago
  • Date Issued
    Tuesday, November 21, 2017
    7 years ago
  • Inventors
  • Examiners
    • Neff; Michael
    Agents
    • Lewis Roca Rothgerber Christie LLP
Abstract
Disclosed is a method for the detection of more than one signals contained in a receive signal, the method comprising: down-converting the receive signal, thereby providing a down-converted signal in a complex IQ base band; at least partially cancelling the strongest user in the down-converted signal, thereby allowing for the detection of a possible secondary user.
Description
CROSS-REFERENCED TO RELATED APPLICATION(S)

This Application is a National Phase Patent Application and claims priority to and the benefit of International Application Number PCT/IB2014/002319, filed on Jun. 25, 2014, which claims priority to and the benefit of European Patent Application No. EP13173671.2, filed Jun. 25, 2013, the entire contents of all of which are incorporated herein by reference.


FIELD OF INVENTION

The present invention relates to the field of signal transmission and in particular transmission of signals by different users on the same carrier at the same time.


BACKGROUND

In the transmission of signals (e.g. voice signals) it is known to have U users that transmit at the same time on the same nominal carrier frequency fcarrier, causing a so-called double transmission if U≧2. These U users correspond to U mobile or fixed stations, which transmit respective signals e.g. Double Side-Band full carrier Amplitude Modulated (DSB-AM) voice signals, termed A3E following ITU modulation code.


1 Summary


Double transmissions are a problem especially in Air Traffic Control (ATC) if they remain undetected, because only the strongest signal is perceived by the other side, the remaining signals might be overheard.


In view of the above-described situation, there exists a need for an improved technique that enables to cope with double transmission, while substantially avoiding or at least reducing one or more of the above-identified problems.


This need may be met by the subject matter according to the independent claims. Advantageous embodiments of the herein disclosed subject matter are described by the dependent claims.


According to an embodiment of a first aspect of the herein disclosed subject matter there is provided a method for the detection of more than one signal contained in a receive signal, the method comprising: down-converting the receive signal, thereby providing a down-converted signal in a complex IQ base band; at least partially cancelling the strongest user (user signal) in the down-converted signal, thereby allowing for the detection of a possible secondary user (secondary user signal).


According to an embodiment of a second aspect of the herein disclosed subject matter, there is provided a method of detecting CLIMAX signals, e.g. by detection of the spectral peaks caused by a carrier (e.g. a DSB-AM carrier), e.g. as described in chapter 5.1.


According to an embodiment of a third aspect a computer program product is provided, e.g. in the form of a program element or a computer readable medium comprising a program element, the program product (in particular the program element) being adapted for carrying out, when running on a processor device, the method according to the first aspect or an embodiment thereof.


According to an embodiment of a fourth aspect a receiver of a communication system is provided, the receiver comprising a controller being adapted for carrying out the method according to the first aspect or an embodiment thereof.


According to an embodiment of a fifth aspect a communication system is provided, the communication system comprising a receiver according to the fourth aspect or an embodiment thereof.


According to embodiments of the first aspect, the method is adapted for providing the functionality of one or more of the herein disclosed embodiments and/or for providing the functionality as required by one or more of the herein disclosed embodiments, in particular of the embodiments of the second, third, fourth and fifth aspect.


According to embodiments of the second aspect, the method is adapted for providing the functionality of one or more of the herein disclosed embodiments and/or for providing the functionality as required by one or more of the herein disclosed embodiments, in particular of the embodiments of the first, third, fourth and fifth aspect.


According to embodiments of the third aspect, the computer program is adapted for providing the functionality of one or more of the herein disclosed embodiments and/or for providing the functionality as required by one or more of the herein disclosed embodiments, in particular of the embodiments of the first, second, fourth and fifth aspect.


According to embodiments of the fourth aspect, the receiver is adapted for providing the functionality of one or more of the herein disclosed embodiments and/or for providing the functionality as required by one or more of the herein disclosed embodiments, in particular of the embodiments of the first, second, third and fifth aspect.


According to embodiments of the fifth aspect, the communication system is adapted for providing the functionality of one or more of the herein disclosed embodiments and/or for providing the functionality as required by one or more of the herein disclosed embodiments, in particular of the embodiments of the first, second, third and fourth aspect.


Generally herein, a reference to a user is intended to include a reference to a user signal and vice versa and is used to enhance clarity. For instance, a reference to “the strongest user” includes a reference to “the strongest user signal” and a reference to “a secondary user” includes a reference to “a secondary user signal”.


In the following, exemplary embodiments of the herein disclosed subject matter are described, any number and any combination of which may be realized in an implementation of the herein disclosed subject matter.


As used herein, reference to a program element is intended to include a reference to a set of instructions for controlling a computer system to effect and/or coordinate the performance of the respective method.


The computer program may be implemented as computer readable instruction code by use of any suitable programming language, such as, for example, JAVA, C++, and may be stored on a computer-readable medium (removable disk, volatile or non-volatile memory, embedded memory/processor, etc.). The instruction code is operable to program a computer or any other programmable device to carry out the intended functions. The computer program may be available from a network, such as the World Wide Web, from which it may be downloaded.


The herein disclosed subject matter may be realized by means of a computer program respectively software. However, the herein disclosed subject matter may also be realized by means of one or more specific electronic circuits respectively hardware. Furthermore, the herein disclosed subject matter may also be realized in a hybrid form, i.e. in a combination of software modules and hardware modules.


In the above there have been described and in the following there will be described exemplary embodiments of the subject matter disclosed herein with reference to methods, a computer program product, a receiver and a communication system. It has to be pointed out that of course any combination of features relating to different aspects of the herein disclosed subject matter is also possible. In particular, some features have been or will be described with reference to apparatus type embodiments whereas other features have been or will be described with reference to method type embodiments. However, a person skilled in the art will gather from the above and the following description that, unless other notified, in addition to any combination of features belonging to one aspect also any combination of features relating to different aspects or embodiments, for example even combinations of features of apparatus type embodiments and features of the method type embodiments are considered to be disclosed with this application.


The aspects and embodiments defined above and further aspects and embodiments of the herein disclosed subject matter are apparent from the examples to be described hereinafter and are explained with reference to the drawings, but to which the invention is not limited.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows an example of a five leg CLIMAX configuration with a voice communication system (VCS) and transmit (Tx) antennas.



FIG. 2 shows pre-processing of the receive signal r(k) for the frequency domain solutions.



FIG. 3 shows an overall detection scheme based on the detection of spectral lines belonging to DSB-AM signals.



FIG. 4 shows an example of masking of a double transmission caused by a transmission by a ground station.



FIG. 5 shows an example of a masked double transmission caused by a ground radio, followed by a double transmission caused only by at least two airborne users.



FIG. 6 shows schematically an Event Masking Logic.



FIG. 7 shows a communication system.





DETAILED DESCRIPTION

The illustration in the drawings is schematic. It is noted that in different figures, similar or identical elements are provided with the same reference signs or with reference signs. In such cases a repeated description is avoided for the sake of brevity.


Embodiments of the herein disclosed subject matter is based on the idea to make the detection of the overheard signals possible by detecting their occurrence, making a signaling by an appropriate means (audio-tone, visually or similar) to the operator feasible.


A mobile station might be e.g. an aircraft or a mobile ground station. A fixed station is always a ground radio. Whereas fixed ground stations often have a single transmitter, if so-called CLIMAX transmission is used a fixed ground station as a single user even sends multiple spectrally shifted copies of its transmit signal using multiple transmitters. This further complicates the detection problem, because the multiple transmissions by one user can be confused with multiple users. This CLIMAX detection problem is also solved by embodiments of the herein disclosed subject matter.


In addition, it might be useful to detect as to whether a double transmission is caused by (at least) two airborne users or a transmission including a ground station. This is highlighted in chapter 6.


In the following there is described an exemplary signal model, detection schemes for detecting double transmissions and statistical considerations in accordance with embodiments of the herein disclosed subject matter.


2 Signal Model


2.1 Transmit Signal of Mobile Users and Fixed Users


Each transmitting user u has his voice signal s(u)(t) multiplied by a real-valued positive modulation index in m(u), and then a real-valued constant added. This constant results in an unmodulated carrier component that adds to the AM-modulated carrier, which is modulated by m(u)·s(u)(t):











(

1
+


m

(
u
)


·


s

(
u
)




(
t
)




)

·

cos


(


2
·
π
·

f

carrier
,
Tx


(
u
)


·
t

+

ϕ
Tx

(
u
)



)



=



1
·

cos


(


2
·
π
·

f

carrier
,
Tx


(
u
)


·
t

+

ϕ
Tx

(
u
)



)






unmodulated





carrier



+




m

(
u
)


·


s

(
u
)




(
t
)


·

cos


(


2
·
π
·

f

carrier
,
Tx


(
u
)


·
t

+

ϕ
Tx

(
u
)



)






modulated





carrier



.






(
2.1
)







The m(u) are the individual modulation indices of the users u, u=1, 2, . . . , U. The modulation index m(u) is normally chosen to be around approximately 0.8 or higher, but below 1 to prevent overmodulation. The nominal carrier frequency fcarrier used for transmission is not exactly met due to hardware deviations, but is closely approximated by the actual carrier frequency of user u, which is denoted fcarrier,Tx(u). The Radio Frequency (RF) signal also has a carrier phase φTx(u). An RF amplifier with real-valued amplification PNL(u){·} provides the necessary transmit power, where NL denotes the non-linearity of the operator.


The transmit signal of each user u can be written

xNL(u)(t)=PNL(u){(1+m(u)·s(u)(t))·cos(2·π·fcarrier,Tx(u)·t+φTx(u))}, u=1,2, . . . U.   (2.2)


The memoryless nonlinearity PNL(u){·} has two effects on the signal to be transmitted. On the one hand, the amplitude of the transmit signal is distorted. This effect is termed AM-to-AM conversion and can be described by an operator PAM(u){·} working on the amplitude. On the other hand, the transmit signal is distorted in its phase. This effect is termed AM-to-PM conversion and is described by the operator PPM(u){·} distorting the phase. The resulting transmit signal of user u can be written

xNL(u)(t)=PAM(u){(1+m(u)·s(u)(t))}·cos(2·πfcarrier,Tx(u)·t+φTx(u)+PPM(u){(1+m(u)·s(u)(t))}).   (2.3)


AM-to-AM conversion is not a problem, when the nonlinearity is memoryless: It just leads to a different scaling of the transmit signal. AM-to-PM conversion, however, leads to a loss of the property of the phase corrected transmit signal to be conjugate symmetric about the carrier frequency. In practice, a non-linearity can often be ignored.


Therefore, we drop the subscript NL for the nonlinearity, and assume a linear real-valued amplification by a factor P(u). Therefore, the transmit signal can be written

x(u)(t)=P(u)·(1+m(u)·s(u)(t))·cos(2·πfcarrier,Tx(u)·t+φTx(u)).   (2.4)


Thus, we ignore the AM-to-AM and AM-to-PM conversion, deal with Equation (2.4) instead of Equation (2.2) and Equation (2.3) in the following, and mention the non-linear distortion only when necessary.


2.2 CLIMAX Transmission and Cross Coupled Mode


CLIMAX, also termed “off-set carrier operation” or simply multicarrier operation, is a ground-to-air voice communication solution that extends the coverage of the DSB-AM VHF voice communications by simultaneous transmission using multiple transmitters. There are different Multicarrier/CLIMAX-modes that may be used by a ground station. FIG. 1 shows an example of a five leg CLIMAX configuration with a voice communication system (VCS) 100 and transmit (Tx) antennas 102.


The term leg denotes one of the C paths to the antennas 102, each leg indexed by c, with c=1, . . . , C. There are C=5 antennas 102 in this example, each with its own transmitter, hence it is termed 5-carrier CLIMAX. In other embodiments, other numbers of antennas are provided. In each specific CLIMAX-mode, there is a set of fixed offset frequencies from the nominal carrier frequency fcarrier. Each offset frequency is assigned to another transmitter transmitting the same voice signal s(uCLIMAX)(k), i.e. the voice signal of the user uCLIMAX using this CLIMAX mode. This offset allows for preventing the degradation in speech intelligibility from heterodynes. Thus, each CLIMAX-mode is characterized by the spectrally shifted copies of the same voice signal s(uCLIMAX)(k) it is made up from. Each copy is transmitted by another transmitter at a different location in order to extend the coverage. Thus, in case of a ground station that uses CLIMAX transmission, there are even multiple copies of the same voice signal, transmitted over geographically separated antennas in order to improve coverage. These signal copies have a frequency offset so that the mobile radio can capture the strongest signal copy and its voiced sidebands, the weaker signal copies are typically filtered out in the mobile user's radio e.g. by a Phase Locked Loop (PLL). Thus, these multiple copies of the same signal correspond to only a single user, and must not be confused with the case when there are signals from different users. When CLIMAX is not active, we speak of the non-CLIMAX case.


CLIMAX offers various degrees of freedom on how the carrier offsets might be chosen. The following Table 2.1 lists some possible setups for 25 kHz, 50 kHz and 100 kHz channel space environments. Details can be found in ANNEX 10 to the Convention on International Civil Aviation Aeronautical Telecommunications, Volume III, 2nd edition 2007, part 2: voice communications systems, including amendment 85 (referred to as [ANNEX10] in the following).









TABLE 2.1







Examples of possible carrier frequency offsets for 25 kHz, 50 kHz


and 100 kHz channel space environments according to [ANNEX10].












# of







CLI-







MAX
Leg 1 Tx
Leg 2 Tx
Leg 3 Tx
Leg 4 Tx
Leg 5 Tx


legs
frequency
frequency
frequency
frequency
frequency





2
fcarrier + 5 kHz
fcarrier − 5 kHz
N/A
N/A
N/A


3
fcarrier + 7.3 kHz
fcarrier
fcarrier − 7.3 kHz
N/A
N/A


4
fcarrier + 7.5 kHz
fcarrier − 7.5 kHz
fcarrier + 2.5 kHz
fcarrier − 2.5 kHz
N/A


5
fcarrier
fcarrier − 7.5 kHz
fcarrier − 2.5 kHz
fcarrier + 2.5 kHz
fcarrier + 7.5 kHz









For 8.33 kHz channel space environments, the carrier frequency offsets have been proposed by Luc Deneufchâtel and Jacky Pouzet in “Annex 10 amendments to cover Climax operation on DSB-AM with 8.33 kHz channel spacing”, AERONAUTICAL COMMUNICATIONS PANEL (ACP), Working Group M (ACP WG-M), Montreal, Canada, 2006 (hereinafter referred to as [ANNEX10prop]) and shown in Table 2.2. Meanwhile, they are adopted in [ANNEX10].









TABLE 2.2







Possible carrier frequency offset for 8.33 kHz channel


space environments according to [ANNEX10prop].












# of







CLI-







MAX
Leg 1 Tx
Leg 2 Tx
Leg 3 Tx
Leg 4 Tx
Leg 5 Tx


legs
frequency
frequency
frequency
frequency
frequency





2
fcarrier +
fcarrier
N/A
N/A
N/A



2.5 kHz
2.5 kHz









The frequency offsets are chosen such as to prevent or diminish heterodynes present within the received speech signal. Independent of the channel space environments, the settings stated in Table 2.1 and Table 2.2 can be generalized as in the following Table 2.3.









TABLE 2.3







Generalization of [ANNEX10] in terms of possible carrier frequency offsets, e.g. fcarrier + ΔfCLIMAX, 2(2) means


the second carrier of 2 carrier CLIMAX, and, e.g. fcarrier + ΔfCLIMAX, 1(3) means the first carrier of 3 carrier CLIMAX.












# of







CLI-







MAX
Leg 1 Tx
Leg 2 Tx
Leg 3 Tx
Leg 4 Tx
Leg 5 Tx


legs
frequency
frequency
frequency
frequency
frequency





2
fcarrier + ΔfCLIMAX, 2(2)
fcarrier + ΔfCLIMAX, 1(2)
N/A
N/A
N/A


3
fcarrier + ΔfCLIMAX, 2(3)
fcarrier + ΔfCLIMAX, 3(3)
fcarrier + ΔfCLIMAX, 1(3)
N/A
N/A




with ΔfCLIMAX, 3(3) = 0





4
fcarrier + ΔfCLIMAX, 4(4)
fcarrier + ΔfCLIMAX,1(4)
fcarrier + ΔfCLIMAX, 3(4)
fcarrier + ΔfCLIMAX, 2(4)
N/A


5
fcarrier + ΔfCLIMAX, 5(5)
fcarrier + ΔfCLIMAX, 1(5)
fcarrier + ΔfCLIMAX, 2(5)
fcarrier + ΔfCLIMAX, 3(5)
fcarrier + ΔfCLIMAX, 4(5)



with ΔfCLIMAX, 5(5) = 0









In Table 2.3, ΔfCLIMAX,c(C) is the c-th CLIMAX offset of a C-carrier CLIMAX signal. E.g. for C=5-carrier CLIMAX, the offsets are

fCLIMAX,c(5)}c=15={ΔfCLIMAX,1(5),ΔfCLIMAX,2(5),ΔfCLIMAX,3(5),ΔfCLIMAX,4(5),ΔfCLIMAX,5(5)(=0)}.   (2.5)


The index c that determines a specific CLIMAX offset runs from the lowest to the highest frequency, excluding the middle carrier zero frequency offset if it exists (it exists only for 3-carrier and 5-carrier CLIMAX). If the middle carrier located at zero frequency offset exists, it has the index c=C, which is uneven in this case. E.g. for 3-carrier CLIMAX, c=C=3.


In case of a ground station that uses cross-coupling, the operator's DSB-AM signal is retransmitted in another sector by the nominal carrier frequency fcarrier in that sector. The retransmission in a certain sector might lead to a double transmission in the same way as an ordinary transmission by the operator in that same sector would do. Therefore, cross-coupling poses the same problem to the detector as an ordinary transmission from a ground station which is intended for that same sector. Thus, cross-coupling is included in the signal model used here. To sum up, the detector has no need to judge between original transmissions and retransmissions using cross-coupling.


2.3 Received Signal


According to an embodiment, the U users are received via receive antennas that are only used for signal reception, the transmit antennas are often located elsewhere. Often, only a single receive antenna is used. The received RF signal of each receive antenna is down-converted to the baseband. This down-conversion can be done either by analog mixing, including an optional intermediate frequency, followed by digital down-conversion, or also directly from RF to baseband, followed by analogue-to-digital conversion in the baseband, or in another fashion. Because the users' DSB-AM signals are in general received on different frequencies on the receiver side due to hardware oscillator errors and Doppler, the conversion to baseband can in general not compensate all carrier frequencies at the same time. The demodulation can either be done by the nominal carrier frequency, or, if an automatic demodulation is done e.g. by a Phase Locked Loop (PLL), by a resulting carrier frequency on which the PLL locks, which is usually the strongest received DSB-AM carrier in the receive signal mixture. In any case, in the complex IQ baseband, each user then has a different remaining frequency offset Δf(u) and phase offset φ(u) after conversion to IQ baseband. No matter how the demodulation and sampling is performed, the resulting signal is in general complex-valued in the baseband, it has an inphase (I) and a quadrature (Q) component.


It is possible to write the received signal in complex baseband of the sum of three terms: The first term is a sum of all possibly transmitted non-CLIMAX receive signals, so mobile users as well as non-CLIMAX ground stations. The second term contains the sum of all possibly transmitted CLIMAX signals including a possible middle carrier close to zero frequency in complex baseband (3-carrier and 5-carrier CLIMAX). The third term contains the noise.


One can also include a possible CLIMAX middle carrier close to zero in the first sum, and drop it from the second sum. The reason is that a CLIMAX middle carrier close to zero frequency on its own cannot easily be distinguished from an ordinary ground station or mobile user, if its statistically smaller frequency error is not considered.


With this absorption of a possibly transmitted CLIMAX middle carrier close to zero frequency, the equivalent baseband signal to the analogue RF signal is then represented by the analogue complex IQ-baseband signal r(t), given as











r


(
t
)


=





u
=
1

U








(

1
+


m

(
u
)


·


s

(
u
)




(
t
)




)

·

a

(
u
)


·

e

j
·

ϕ

(
u
)




·

e


j
·
2
·
π
·
Δ








f

(
u
)


·
t





+




c
=
1


2
·



C
2












(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
t
)




)

·

a
c

(

u
CLIMAX

)


·

e

j
·

ϕ
c

(

u
CLIMAX

)




·

e

j
·
2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,




c


(
C
)




)

·
t




+

n






(
t
)




,




(
2.6
)







which after sampling with sampling rate fs=1/Ts, so r(k)=r(t=k·Ts), k=0, 1, . . . , Ndata−1 reads:











r


(
k
)


=





u
=
1

U








(

1
+


m

(
u
)


·


s

(
u
)




(
k
)




)

·

a

(
u
)


·

e

j
·

ϕ

(
u
)




·

e


j
·
2
·
π
·
Δ








f

(
u
)


·
k
·

T
s






+




c
=
1


2
·



C
2












(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
k
)




)

·

a
c

(

u
CLIMAX

)


·

e

j
·

ϕ
c

(

u
CLIMAX

)




·

e

j
·
2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,




c


(
C
)




)

·
k
·

T
s





+

n






(
k
)




,

k
=
0

,
1
,





,






N
data

-
1

,




(
2.7
)







The operator ┌x┐ denotes the closest integer equal or below x.


Equation (2.7) is understood as follows:

    • C is the number of CLIMAX carriers. We define C=0 as 0-carrier CLIMAX-mode, which means that CLIMAX is not transmitted, and the sum in the second line of Equation (2.7) runs from the lower index c=1 to the upper index c=0 and is thus equal to zero, because the second index is lower than the first index. Thus, by allowing C=0 as a valid value, we would as a special case exclude CLIMAX in Equation (2.7).
    • As the CLIMAX offset for the carrier ΔfCLIMAX,c(C) for c=C, which is ΔfCLIMAX,c(C), is equal to zero following the convention in chapter 2.2, this CLIMAX carrier with index c=C is absorbed in the first line of Equation (2.7). and Δf(u) for u=uCLIMAX and c=C is Δf(u) for u=uCLIMAX, and we write

      Δfc(u)|u=uCLIMAX,c=C=ΔfC(uCLIMAX)=Δf(uCLIMAX).   (2.8)
    • The index u covers all the users' carriers, u=1, 2, . . . , U. It also covers a possible CLIMAX user u=uCLIMAX.


Here, k is the integer time index. a(u) and ac(u) are the (real-valued) overall channel gains of the individual user in the non-CLIMAX and the CLIMAX case, respectively, u=1, 2, . . . , U, including the amplifiers, path loss over the channel, transmit and receive losses in the radio front-ends, and other amplifying components. m(u) and mc(u) are the belonging modulation indices in the non-CLIMAX and CLIMAX case, respectively, and φ(u) and φc(u) are the belonging channel phases in the non-CLIMAX and CLIMAX case, respectively. By dealing with a simple channel gain instead of a filtering channel, we assume that the overall channel, including the physical channel, the amplifiers and all transmit and receive filters in RF, IF and baseband, to be non-frequency selective within the bandwidth of interest, so that the channel can be approximately described by a single filter tap. This assumption holds approximately, because the receive signal is narrowband. Trials showed that this assumption holds true with good approximation. If the non-frequency selectivity assumption would not hold, convolution with the overall channel impulse response would be required.


The (complex) channel gains b(u)=a(u)·ej·φ(u) and bc(u)=ac(u)·ej·φc(u) in the non-CLIMAX and CLIMAX cases, and the frequency offsets Δf(u) and Δfc(u) in the non-CLIMAX and CLIMAX cases, respectively, due to Doppler effect and oscillator errors on the transmitter (Tx) and the receiver (Rx) side are unknown. Also, the noise signal n(k) and the users' voice signals s(u)(k) are unknown.


Equation (2.7) holds, no matter where the sampling was performed, on an intermediate frequency or in the complex baseband. Ts is the sampling interval, so the inverse of the sampling frequency, on the receiver side. n(k) is assumed complex, white Gaussian noise with variance σn2. This is a common assumption that holds approximately.


In order to increase the received signal quality, multiple Rx antennas might be employed, and their outputs each follow Equation (2.7), but with different b(u) and bc(u), respectively, different Δf(u) and Δfc(u), respectively, and different noise realizations n(k) on each Rx antenna branch. These signals can be combined. Because combining analogue signals is difficult, the antenna with the largest signal-to-noise ratio is often chosen, termed selection combining.


3 Detection of Double Transmissions Based on Interference Cancellation and Peak Detection in Colored Noise


The receive signal r(k) is given in Equation (2.7).


One can observe from Table 2.1 and Table 2.2 and Equation (2.7) that:

    • If CLIMAX is used, all CLIMAX carriers







a
c

(

u
CLIMAX

)


·

e

j
·

ϕ
c

(

u
CLIMAX

)




·

e

j
·
2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,
c


(
C
)




)

·
k
·

T
s









    •  are well separated in frequency. This also holds for the CLIMAX middle carrier










a

(

u
CLIMAX

)


·

e

j
·

ϕ

(

u
CLIMAX

)




·


e


j
·
2
·
π
·
Δ








f

(

u
CLIMAX

)


·
k
·

T
s




.







    •  And it also holds when considering frequency offset errors Δf(uCLIMAX) or Δfc(uCLIMAX), respectively, because being ground stations, there is no Doppler effect in between ground transmitters and receivers and thus no contribution of the Doppler effect to Δf(uCLIMAX) or Δfc(uCLIMAX), respectively. Thus, the frequency offset errors Δf(u) or Δfc(u), respectively, are only due to hardware oscillator errors, which are small in ground transmitters and receivers due to their high quality oscillators.

    • Close to zero frequency, the carriers of mobile users a(u)·ej·φ(u)·ej·2·π·Δf(u)·k·Ts, u≠uCLIMAX and, in case of non-CLIMAX, a ground station or, in case of CLIMAX case A, a CLIMAX transmission










a

(

u
CLIMAX

)


·

e

j
·

ϕ

(

u
CLIMAX

)




·

e


j
·
2
·
π
·
Δ








f

(

u
CLIMAX

)


·
k
·

T
s










    •  might be transmitted. All these carriers close to zero frequency in baseband are not well separated in frequency. When transmitted, they will normally overlap to some degree, at least with their DSB-AM voiced sidebands, and weaker carriers might even be shadowed by the DSB-AM voice sidebands.





As outlined above, if CLIMAX transmission cannot be obviated, it is not sufficient to simply detect two carriers and say that a double transmission occurred, because if both carriers stem from a ground station that transmits CLIMAX, only a single user would be transmitting, and no double transmission occurred. Thus, it is important which frequencies the detected carriers have.


In the frequency domain, the carriers 1·a(u)·ej·φ(u)·ej·2·π·Δf(u)·k·Ts (which might be a CLIMAX carrier using the above convention









1
·

a
c

(
u
)


·

e

j
·

ϕ
c

(
u
)




·

e

j
·
2
·
π
·

(


Δ






f
c

(
u
)



+

Δ






f

CLIMAX
,
c


(
C
)




)

·
k
·

T
s






|

c
=
C



=


1
·

a
C

(
u
)


·

e

j
·

ϕ
C

(
u
)




·

e


j
·
2
·
π
·
Δ








f
C

(
u
)


·
k
·

T
s





=

1
·

a

(
u
)


·

e

j
·

ϕ

(
u
)




·

e


j
·
2
·
π
·
Δ








f

(
u
)


·
k
·

T
s







)





appear as distinct peaks in coloured noise, provided that the noise level at the peak frequency is low enough. The coloured noise is made up of the noise and the voiced sidebands.


The problem of how to best detect the carriers 1·a(u)·ej·φ(u)·ej·2·π·Δf(u)·k·Ts depends upon if they are to be detected close to zero frequency, where multiple signals of different users might overlap and are hard to detect, or close to distinct CLIMAX frequencies, where only single DSB-AM signals occur in coloured noise without overlap. This overlap of multiple DSB-AM signals close to zero frequency asks for interference cancellation: Once a stronger DSB-AM signal with a carrier close to zero frequency has been detected and cancelled, a second weaker user with a similar frequency offset can be detected more easily.


Close to zero frequency, the interference cancellation:

    • can be carried out in the time domain, so on the data samples r(k), or, in another embodiment, in the frequency domain.
    • can be designed to cancel only the carrier of the strongest user close to zero frequency, or cancel the whole DSB-AM signal component, including the voice sidebands, of the strongest user close to zero frequency. In order to cancel the whole DSB-AM signal component that is located close to zero frequency, a projection approach is proposed in the time domain and frequency domain.


Not close to zero frequency, the detection of distinct carriers is much easier, because interference could only occur from mobile users with extremely high Doppler frequencies and large oscillator errors. Therefore, these carriers appear without overlap as distinct peaks in coloured noise in the spectrum, where the noise is made up of noise and the DSB-AM's voice sidebands that the carrier belongs to.


In the following, first the interference cancellation approach is outlined, and then various options are outlined on how to detect the remaining peaks after interference cancellation as well as the detection of distinct peaks far apart from the zero frequency without interference cancellation.


Using Equation (2.7), it is in general required that the detector decides for one of the two hypotheses












H
0

:

r


(
k
)



=





u
=
1

U








(

1
+


m

(
u
)


·


s

(
u
)




(
k
)




)

·

a

(
u
)


·

e

j
·

ϕ

(
u
)




·

e


j
·
2
·
π
·
Δ








f

(
u
)


·
k
·

T
s






+




c
=
1


2
·



C
2












(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
k
)




)

·

a
c

(

u
CLIMAX

)


·

e

j
·

ϕ
c

(

u
CLIMAX

)




·

e

j
·
2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,




c


(
C
)




)

·
k
·

T
s





+

n






(
k
)




,

U

1

,

k
=




0

,
1
,





,


N
data

-
1

,




(
3.1
)









H
1

:

r


(
k
)



=





u
=
1

U








(

1
+


m

(
u
)


·


s

(
u
)




(
k
)




)

·

a

(
u
)


·

e

j
·

ϕ

(
u
)




·

e


j
·
2
·
π
·
Δ








f

(
u
)


·
k
·

T
s






+




c
=
1


2
·



C
2












(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
k
)




)

·

a
c

(

u
CLIMAX

)


·

e

j
·

ϕ
c

(

u
CLIMAX

)




·

e

j
·
2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,




c


(
C
)




)

·
k
·

T
s





+

n






(
k
)




,

U

2

,

k
=




0

,
1
,





,


N
data

-
1.





(
3.2
)







Note that the H0 hypothesis covers two cases: First, noise only, second, a single user, represented by a single DSB-AM modulated carrier in the non-CLIMAX case or multiple carriers in the CLIMAX case, in noise. The H1 hypothesis covers the case of two or more users, represented by two or more DSB-AM modulated carriers, in noise, compare Equation (2.7). In other words: As soon as a second user is detected, the H1 hypothesis is fulfilled.


This hypothesis testing problem can be simplified in the non-CLIMAX case:

    • If CLIMAX is not used, the second line of Equation (3.1) and Equation (3.2) can be dropped, because C=0.


      3.1 Interference Cancellation Using a Projection Approach to Detect Weaker Users


With strong overlap predominantly occurring in RF close to the carrier frequency, the overlap occurs in baseband close to zero frequency. We show below that we are able to cancel the one DSB-AM signal that appears to be the strongest close to zero frequency. By this we mean that a DSB-AM signal far apart from the zero frequency, e.g. a CLIMAX signal with carrier offset, could have a higher peak at its carrier offset, but we choose to cancel the signal that has the strongest carrier within a limited bandwidth around zero frequency where the overlap occurs. This can be achieved by performing frequency offset estimation of the DSB-AM signal that occurs strongest close to zero frequency e.g. by computing a periodogram and find the maximum in a limited bandwidth around zero frequency. The bandwidth of the maximum search must not contain the peaks far apart from zero frequency, so if CLIMAX is used, not contain the CLIMAX carriers.


In order to cancel the dominant DSB-AM signal, its frequency is first estimated, and the whole signal r(k) is demodulated by that frequency. The dominant carrier close to zero frequency can either be:

    • a noise sample in the pure noise case or in CLIMAX case B, where there is no carrier close to zero frequency, or a noise sample when the DSB-AM signal is weak. If after this demodulation, a significance of the noise sample is tested, the H0 hypothesis will be judged for with high probability.
    • a mobile user or non-CLIMAX ground station user, termed u=umax, resulting in an unmodulated carrier







a

(

u
max

)


·

e

j
·

ϕ

(

u
max

)




·


e


j
·
2
·
π
·
Δ








f

(

u
max

)


·
k
·

T
s




.







    • a CLIMAX ground station with a CLIMAX carrier c=C close to zero frequency (case A), termed u=uCLIMAX=umax, resulting in an unmodulated carrier














(
3.3
)

















a
c

(

u
CLIMAX

)


·

e

j
·

ϕ
c

(

u
CLIMAX

)




·






e

j
·
2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,




c


(
C
)




)

·
k
·

T
s










c
=
C

,


u
CLIMAX

=

u
max




=




a
C

(

u
max

)


·

e

j
·

ϕ
c

(

u
max

)




·










e


j
·
2
·
π
·
Δ








f
c

(

u
max

)


·
k
·

T
s










=




a

(

u
max

)


·

e

j
·

ϕ

(

u
max

)




·










e


j
·
2
·
π
·
Δ








f

(

u
max

)


·
k
·
T












    • (Note that this term cannot be distinguished from mobile or non-CLIMAX carrier because of the writing convention Equation (2.8), used for the last equation).





Now, the carrier belonging to the strongest DSB-AM signal user u=umax is taken out of the sum in the first line and r(k) is rewritten as:











r


(
k
)


=



(

1
+


m

(

u
max

)


·


s

(

u
max

)




(
k
)




)

·

a

(

u
max

)


·

e

j
·

ϕ

(

u
max

)




·

e


j
·
2
·
π
·
Δ








f

(

u
max

)


·
k
·

T
s





+





u
=
1


u


u
max



U








(

1
+


m

(
u
)


·


s

(
u
)




(
k
)




)

·

a

(
u
)


·

e

j
·

ϕ

(
u
)




·

e


j
·
2
·
π
·
Δ








f

(
u
)


·
k
·

T
s






+




c
=
1


2
·



C
2












(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
k
)




)

·

a
c

(

u
CLIMAX

)


·

e

j
·

ϕ
c

(

u
CLIMAX

)




·

e

j
·
2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,




c


(
C
)




)

·
k
·

T
s





+

n






(
k
)




,

k
=




0

,
1
,





,


N
data

-
1.





(
3.4
)







The higher signal amplitude of the strongest user keeps (e.g. prevents) the receiving operator from hearing weaker users' voice signals. In accordance with an embodiment, the idea is to cancel the strongest user, and to be able to detect the presence of weaker users' signals in order to warn the receiving operator that a double transmission occurred.


If we assume detection of the strongest peak within a given detector bandwidth that is comprised of the band higher than the highest negative CLIMAX carrier and lower than the lowest positive CLIMAX carrier, we have a detector bandwidth symmetric around zero frequency. In the following, we assume with no loss of generality that user u=umax is observed to have the strongest channel gain a(umax)≧a(u), u=1, 2, . . . , U, u≠umax, so that its frequency offset Δf(umax) and carrier phase φ(umax) can be easily estimated and corrected in the received signal. This can either be achieved using an analog PLL (Phase Locked Loop) that uses r(t) as an input signal and locks to the strongest carrier frequency and phase and uses it for demodulation. The demodulated signal is then sampled, resulting in rde mod(k). A digital PLL is an alternative to the analogue PLL. Alternatively, Δf(umax) and φ(umax) can be estimated from the sampled signal r(k), and a frequency and phase correction is carried out by multiplication with a complex phasor.


In any case, the demodulated signal is:














r

de





mod




(
k
)


=




r


(
k
)


·

e


-
j

·

(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)










=




(

1
+


m

(

u
max

)


·


s

(

u
max

)




(
k
)




)

·











a

(

u
max

)


·

e

j
·

(


ϕ

(

u
max

)


-


ϕ
^


(

u
max

)



)



·











e

j
·
2
·
π
·

(


Δ






f

(

u
max

)



-


f
^


(

u
max

)



)

·
k
·

T
s



+














u
=
1


u


u
max



U




(

1
+


m

(
u
)


·


s

(
u
)




(
k
)




)

·












a

(
u
)


·

e

j
·

(


ϕ

(
u
)


-


ϕ
^


(

u
max

)



)



·











e

j
·
2
·
π
·

(


Δ






f

(
u
)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s



+













c
=
1


2
·



C
2








(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
k
)




)

·

a
c

(

u
CLIMAX

)


·












e

j
·

(


ϕ
c

(

u
CLIMAX

)


-


ϕ
^


(

u
max

)



)



·










e

j
·
2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,
c


(
C
)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s














n


(
k
)


·

e


-
j

·

(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)




,

k
=
0

,
1
,





,


N
data

-
1.









(
3.5
)







The second line in Equation (3.5) shows the demodulated strongest user, the third line the remaining users, the fourth line the additional CLIMAX carriers and the fifth line the noise. All lines are frequency shifted by the estimated frequency offset and phase of the user umax. Being complex white Gaussian noise, the frequency shifted and phase rotated noise












n

de





mod




(
k
)


=


n


(
k
)


·

e


-
j

·

(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)





,

k
=
0

,
1
,





,


N
data

-
1





(
3.6
)







remains complex white Gaussian. From the second line of Equation (3.5), it can be observed that the strongest user is real valued with good approximation, if φ(umax)≈{circumflex over (φ)}(umax) and Δf(umax)≈Δ{circumflex over (f)}(umax), because







e

j
·

(


ϕ

(

u
max

)


-


ϕ
^


(

u
max

)



)




1





and







e

j
·
2
·
π
·

(


Δ






f

(

u
max

)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s




1





and the remaining quantities are real valued by definition. Thus, taking the imaginary part of rde mod(k) results in a cancellation of the strongest user:













Im


{


r

de





mod




(
k
)


}


=



Im


{


r


(
k
)


·

e


-
j

·

(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)




}








=



Im

  


{


(

1
+


m

(

u
max

)


·


s

(

u
max

)




(
k
)




)

·

a

(

u
max

)


·













e

j
·

(


ϕ

(

u
max

)


-


ϕ
^


(

u
max

)



)



·











e

j
·
2
·
π
·

(


Δ






f

(

u
max

)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s



}

+










Im


{








u
=
1


u


u
max



U




(

1
+


m

(
u
)


·


s

(
u
)




(
k
)




)

·

a

(
u
)


·








e

j
·

(


ϕ

(
u
)


-


ϕ
^


(

u
max

)



)



·

e

j
·
2
·
π
·

(


Δ






f

(
u
)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s







}


+











Im


{







c
=
1


2
·



C
2








(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
k
)




)

·








a
c

(

u
CLIMAX

)


·

e

j
·

(


ϕ
c

(

u
CLIMAX

)


-


ϕ
^


(

u
max

)



)



·






e

j
·
2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,
c


(
C
)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s






}


+











Im


{


n


(
k
)


·

e


-
j

·

(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)




}


,








(
3.7
)












k
=
0

,
1
,





,


N
data

-
1.














The second line in Equation (3.7) is approximately zero, the strongest user is cancelled.











Im


{


r

de





mod




(
k
)


}


=




Im


{


r


(
k
)


·

e


-
j

·

(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)




}




0
+





u
=
1


u


u
max



U




(

1
+


m

(
u
)


·


s

(
u
)




(
k
)




)

·

a

(
u
)


·

sin


(


2
·
π
·

(


Δ






f

(
u
)



-

Δ







f
^


(

u
max

)




)

·
k
·
T

+

(


ϕ

(
u
)


-


ϕ
^


(

u
max

)



)


)




+




c
=
1


2
·



C
2








(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
k
)




)

·

a
c

(

u
CLIMAX

)


·

sin


(


2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,
c


(
C
)



-

Δ







f
^


(

u
max

)




)

·
k
·
T

+

(


ϕ
c

(

u
CLIMAX

)


-


ϕ
^


(

u
max

)



)


)




+

Re



{

n


(
k
)


}

·

cos


(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)




+

Im



{

n
(
k
)

}

·

sin
(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)






,









k
=
0

,
1
,





,


N
data

-
1.





(
3.8
)







Thus, a projection of the phase and frequency compensated signal onto the imaginary axis results in a cancellation of the strongest user's signal.


The projection onto the imaginary axis can be generalized in the following way: The direction of the projection is defined by a straight line from the origin of the complex IQ-plane through the complex number p. The straight line perpendicular to the projection axis through p is a straight line through the complex number p=p·exp(−jπ/2)=−j·p=Im{p}−j·Re{p}, so that a projection operator that performs a projection on the axis spanned by p can be written











Proj
p



{
·
}


=



Re


{


{
·
}

·

p
*


}





p


2


=



Re


{


{
·
}

·

(


Re


{
p
}


-


j
·
Im



{
p
}



)


}





p


2


.






(
3.9
)







For the special case of a projection of p on p, Equation (3.9) yields














Proj
p



{

p


}


=





Re


{


p


·

p
*


}





p


2


=





Re


{


(


Im


{
p
}


-


j
·
Re



{
p
}



)

·









(


Re


{
p
}


-


j
·
Im



{
p
}



)

}







p


2









=





Re


{


-
j

·

(



Re
2



{
p
}


+


Im
2



{
p
}



)


}





p


2


=

Re



{






-
j

·

(



Re
2



{
p
}


+










Im
2



{
p
}


)







p


2


}

.









=



Re


{

-
j

}








=


0







(
3.10
)







Also, projection of r·p, with r real valued, on p, yields zero:











Proj
p



{

r
·

p



}


=



Re


{

r
·

p


·

p
*


}





p


2


=






Re


{

r
·

(


Im


{
p
}


-


j
·
Re



{
p
}



)

·









(


Re


{
p
}


-


j
·
Im



{
p
}



)

}







p


2


=
0.






(
3.11
)







The signal








r

f
-
comp




(
k
)


=


r


(
k
)


·

e


-
j

·

(


2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



)









is a complex phasor in the complex IQ-plane. Displacement of the phase compensated signal








r

de





mod




(
k
)


=


r


(
k
)


·

e


-
j

·

(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)









by multiplication with p results in a displaced signal perpendicular to the projection axis from the origin of the complex IQ-plane through the complex number p. Thus, projection Proj {·} of p·rde mod(k) onto the projection axis through p cancels the strongest user:














Proj
p



{


p


·


r

de





mod




(
k
)



}


=




Proj
p



{


p


·

r


(
k
)


·

e

-

j


(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

μ
max

)



)





}








=




Proj
p



{


p


·

(

1
+


m

(

u
max

)


·


s

(

u
max

)




(
k
)




)

·

a

(

u
max

)


·














e

j
·

(


ϕ

(

u
max

)


-


ϕ
^


(

u
max

)



)



·

e

j
·
2
·
π
·

(


Δ






f

(

u
max

)



-


Δ
^


(

u
max

)



)

·
k
·

T
S




}

+










Proj
p



{


p


·





u
=
1


u


u
max



U




(

1
+


m

(
u
)


·


s

(
u
)




(
k
)




)

·

a

(
u
)


·
















e

j
·

(


ϕ

(
u
)


-


ϕ
^


(

u
max

)



)



·

e

j
·
2
·

π


(


Δ






f

(
u
)



-

Δ







f
^


(

u
max

)




)


·
k
·

T
s




}

+










Proj
p



{


p


·




c
=
1


2
·



C
2








(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
k
)




)

·















a
c

(

u
CLIMAX

)


·

e

j
·

(


ϕ
c

(

u
CLIMAX

)


-


ϕ
^


(

u
max

)



)



·











e

j
·
2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,
c


(
c
)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s



}

+










Proj
p



{


p


·

n


(
k
)


·

e


-
j

·

(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)




}








=




Re


{






p


·

p
*

·

(

1
+


m

(

u
max

)


·


s

(

u
max

)




(
k
)




)

·

a

(

u
max

)


·







e

j
·

(


ϕ

(

u
max

)


-


ϕ
^


(

u
max

)



)

·




e

j
·
2
·
π
·

(


Δ






f

(

u
max

)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s










p


2


}


+











Re


{






p


·

p
*

·





u
=
1


u


u
max



U




(

1
+


m

(
u
)


·


s

(
u
)




(
k
)




)

·

a

(
u
)


·









e

j
·

(


ϕ

(
u
)


-


ϕ
^


(

u
max

)



)

·




e

j
·
2
·
π
·

(


Δ






f

(
u
)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s










p


2


}


+











Re


{






p


·

p
*

·




c
=
1


2
·



C
2








(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
k
)




)

·









a
c

(

u
CLIMAX

)


·

e

j
·

(


ϕ
c

(

u
CLIMAX

)


-


ϕ
^


(

u
max

)



)

·








e

j
·
2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,
c


(
C
)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s









p


2


}


+










Re


{



p


·

p
*

·

n


(
k
)


·

e

-

j


(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)








p


2


}








=



Re


{


-
j

·

(

1
+


m

(

u
max

)


·


s

(

u
max

)




(
k
)




)

·

a

(

u
max

)


·














e

j
·

(


ϕ

(

u
max

)


-


ϕ
^


(

u
max

)



)

·




e

j
·
2
·
π
·

(


Δ






f

(

u
max

)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s




}

+









Re


{


-
j

·





u
=
1


u


u
max



U




(

1
+


m

(
u
)


·


s

(
u
)




(
k
)




)

·

a

(
u
)


·
















e

j
·

(


ϕ

(
u
)


-


ϕ
^


(

u
max

)



)

·




e

j
·
2
·
π
·

(


Δ






f

(
u
)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s




}

+









Re


{


-
j

·




c
=
1


2
·



C
2








(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
k
)




)

·















a
c

(

u
CLIMAX

)


·

e

j
·

(


ϕ
c

(

u
CLIMAX

)


-


ϕ
^


(

u
max

)



)

·













e

j
·
2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,
c


(
C
)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s



}

+










Re


{


-
j

·

n
(
k
)

·

e


-
j

·

(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)




}


,











k
=
0

,
1
,





,


N
data

-
1.









(
3.12
)







Using

Re{−j·z}=Re{−j·[Re{z}+j·Im{z}]}=Re{Im{z}−j·Re{z}}=Im{z}   (3.13)


for Equation (3.12) we have the result of Equation (3.7)











(
3.14
)












Proj
p



{


p


·


r

de





mod




(
k
)



}


=



Im


{


r


(
k
)


·

e


-
j

·

(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)




}








=



Im


{


(

1
+


m

(
1
)


·


s

(
1
)




(
k
)




)

·

a

(
1
)


·

e

j
·

(


ϕ

(

u
max

)


-


ϕ
^


(

u
max

)



)



·













e

j
·
2
·
π
·

(


Δ






f

(

u
max

)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s



}

+









Im


{





u
=
1


u


u
max



U




(

1
+


m

(
n
)


·


s

(
n
)




(
k
)




)

·

a

(
u
)


·

e

j
·

(


ϕ

(
u
)


-


ϕ
^


(

u
max

)



)



·














e

j
·
2
·
π
·

(


Δ






f

(
u
)



-

Δ







f
^


(

u
max

)




)

·
k
·

T
s



}

+









Im


{




c
=
1


2
·



C
2








(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
k
)




)

·

a
c

(

u
CLIMAX

)


·













e

j
·

(


ϕ
c

(

u
CLIMAX

)


-


ϕ
^


(

u
max

)



)

·












e

j
·
2
·

π


(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,
c


(
C
)



-

Δ







f
^


(

u
max

)




)


·
k
·

T
s



}

+










Im


{


n


(
k
)


·

e


-
j

·

(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)




}


=











Im


{


r

de





mod




(
k
)


}


,

k
=
0

,
1
,





,


N
data

-
1.









which results again in Equation (3.8), so that the projection of rde mod(k) on the imaginary axis Im{rde mod(k)} is only a special, but easy to implement, case of the general projection of p·rde mod(k) on p, which is Projp{p·rde mod(k)}.












Proj
p



{


p


·


r

de





mod




(
k
)



}




0
+





u
=
1


u


u
max



U




(

1
+


m

(
u
)


·


s

(
u
)




(
k
)




)

·

a

(
u
)


·

sin


(


2
·
π
·

(


Δ






f

(
u
)



-

Δ







f
^


(

u
max

)




)

·
k
·
T

+

(


ϕ

(
u
)


-


ϕ
^


(

u
max

)



)


)




+




c
=
1


2
·



C
2








(

1
+


m
c

(

u
CLIMAX

)


·


s

(

u
CLIMAX

)




(
k
)




)

·

a
c

(

u
CLIMAX

)


·

sin


(


2
·
π
·

(


Δ






f
c

(

u
CLIMAX

)



+

Δ






f

CLIMAX
,
c


(
C
)



-

Δ







f
^


(

u
max

)




)

·
k
·
T

+

(


ϕ
c

(

u
CLIMAX

)


-


ϕ
^


(

u
max

)



)


)




+

Re



{

n
(
k
)

}

·

cos
(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)



+

Im



{

n
(
k
)

}

·

sin
(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)





,









k
=
0

,
1
,





,


N
data

-
1.





(
3.15
)







Note that a projection axis from the origin through

p′=p·exp(jπ/2)=j·p=−Im{p}+j·Re{p}=−[Im{p}−j·Re{p}]=−p   (3.16)


results in the same projection axis as the projection axis from the origin through p, because if p is an orthogonal vector to p, then it is also an orthogonal to p′=−p.


The remaining signal Projp{p·rde mod(k)} is made up of the remaining users signal components in the second line of Equation (3.15), modulated with a sine carrier that contains their frequency offsets and phase offsets, corrected by the frequency offset and phase offset of the strongest user. In the third and fourth line, the modulated noise components can be observed.


Equation (3.15) can now be used to detect if at least a single weaker user's signal is present and thus to check if the H1 hypothesis is fulfilled, so that a double transmission occurred. This is outlined in the following chapter.


3.2 Transforming the Projection Approach to the Frequency Domain


Instead of performing the projection approach in the time domain












Proj
p



{


p


·


r

de





mod




(
k
)



}


=


Im


{


r


(
k
)


·

e


-
j

·

(



2
·
π
·
Δ









f
^


(

u
max

)


·
k
·

T
s



+


ϕ
^


(

u
max

)



)




}


=

Im


{


r

de





mod




(
k
)


}




,




(
3.17
)







on the signal rde mod(k), according to another embodiment one can transform this signal also to the frequency domain and perform the cancellation there. This can be achieved using the fact that the strongest user's signal contained in rde mod(k) is real valued, see of Equation (3.5) and the notes below, and thus the Discrete Time Fourier Transform (DTFT) of the strongest user's signal contained in rde mod(k), which we denote Rstrongest,de mod(ej2π·f·Ts)=DTFT{rstrongest,de mod(k)}, is conjugate symmetric about frequency zero:

Rstrongest,de mod(ej2π·Ts)=Rstrongest,de mod*(e−j2π·f·Ts).   (3.18)


Because of the identity of complex numbers z











Im


{
z
}


=


1

2

j


·

(

z
-

z
*


)



,




(
3.19
)







with z* denoting the conjugate complex of z, RIm,de mod(ej2π·f·Ts) can be written














R

Im
,

de





mod





(

e

j





2


π
·
f
·

T
s




)


=




DTFT


{

Im


{


r

de





mod




(
k
)


}


}


=


1

2

j


·











DTFT


{



r

de





mod




(
k
)


-


r

de





mod

*



(
k
)



}








=




1

2

j


·


(



R

de





mod




(

e

j





2


π
·
f
·

T
s




)


-


R

de





mod

*



(

e


-
j






2


π
·
f
·

T
s




)



)

.









(
3.20
)







By the subtraction in the last line of Equation (3.25), all conjugate symmetric components contained in the Rde mod(ej2π·f·Ts)=DTFT{rde mod(k)} are subtracted, so that the strongest user's signal component Rstrongest,de mod(ej2π·f·Ts) is cancelled from the signal because of its conjugate symmetry stated in Equation (3.23). Thus, the strongest user can also be cancelled in the spectral domain, e.g. by subtracting the from the Discrete Fourier Transform (DFT) of rde mod(k) the conjugate complex, spectrally flipped DFT of the same signal:













DFT


{

Im


{


r

de





mod




(
k
)


}


}


=





1

2

j


·
DFT



{



r

de





mod




(
k
)


-


r

de





mod

*



(
k
)



}








=




1

2

j


·


(



R

de





mod




(
n
)


-


R

de





mod

*



(

N
-
1
-
n

)



)

.









(
3.21
)







Here, Rde mod(n) has the discrete frequency index n of the DFT. With zero-padding, the spectral peaks of weaker user's signal components contained in Rde mod(n) are enhanced an can be easily detected by a statistical test observing the weaker user's carrier peak above the noise threshold.


3.3 Spectral Line Detection in Colored Noise


In dealing with a feature that is observable in the frequency domain, we have to estimate the spectrum and discriminate the feature there.


According to P. Stoica, R. Moses, “Spectral Analysis of Signals,” Prentice Hall, Upper Saddle River, New Jersey, 2005 (referred to as [STO05] in the following), the spectral estimation problem can be formulated as follows: From a finite record of a stationary1 data sequence, estimate how the total power is distributed over frequency. Two broad approaches exist: non-parametric methods and parametric methods. Non-parametric methods can be interpreted as sweeping a narrowband filter through the bandwidth of interest, and the filter output power divided by the filter bandwidth is treated as a measure of the spectral content of the signal being processed. The non-parametric methods are based on the approximation of the periodogram by the Discrete Fourier Transform (DFT) in practice, see In particular, FIG. 2b) to e). Parametric methods, however, postulate a signal model for the data and hence for the belonging spectrum, and reduce the spectral estimation problem to a parameter estimation problem. They can achieve high frequency resolution. Non-parametric approaches, however, have a limited frequency resolution because of the DFT employed. 1For non-stationary data sequences, like voice signals, short-time stationary over time intervals Δtstationary is assumed, and the same approach can be followed as taken here. Often, segmentation of the data in possibly overlapping, short-time stationary subblocks is then used, as in the Short Time Fourier Transform (STFT).


Frequency resolution is the ability to resolve details of the signal in the spectrum. The frequency resolution of the DFT is approximately fs/Ndata [STO05], thus, is inversely proportional to the data record length Ndata. Thus, with non-parametric methods, two DSB-AM carriers can be resolved only with said frequency resolution of approximately fs/Ndata. Using parametric approaches such as Burg's method, the resolution is finer than for non-parametric methods. If distinct features in the voice signal were of interest, the resolution would be limited by the non-stationary character of the voice signal included, because the maximum time-window Δtstationary limits Ndata for a given sampling rate fs to Δstationary=Ndata/fs. However, we are interested in the spectral peaks here, stemming from the unmodulated carriers contained in the DSB-AM signal. The instationary voiced signal part is only interesting regarding its symmetry, which is clearly observable also with a simple DFT for interval lengths for which the voice signals are clearly instationary. Although CSTFT(n) in particular, FIG. 2e) provides a spectral estimate with less variance for given data record {r(k)}k=0Ndata−1 of length Ndata due to averaging over multiple DFTs on partial records shorter than Ndata, its resolution is worse than that of a single DFT with length Ndata. Thus, by using only the carriers, which are deterministic signal components, for detection, the frequency resolution is only limited by the allowed delay of the detector and the increase in complexity using larger data records, but not by the instationarity. By using a DFT window Ndata that is longer than the number of samples that a voice signal can be considered short-time stationary Δtstationary, the spectra of the non-stationary voice signal are averaged over the duration of the window, and non-stationary signal events from the voice component are not resolved as separate or distinct signal events. These events are just averaged out the larger Ndata is. This is desired, because voice features are not used here, and therefore, averaging them out similar to a noise signal, helps to suppress the instationary voice signal, not diminishing the stationary carriers, so that the carriers appear as more distinctive peaks in the spectrum.


Here, we detail the non-parametric approach, because the signal is comprised not only of tones, but also of voice signals. The parametric methods would have to include a modeling of the voiced sidebands. This can be done by assuming an Auto-Regressive (AR) model for the voice (e.g. Burg's method). This is not easy to parameterize. Model mismatch might lead to wrong detection results. The non-parametric methods, however, treat the voice spectrum below the spectral peaks as colored noise and are very robust to model mismatch.


The detector works directly on the estimated spectrum of the received samples r(k). By ‘directly’ we mean that a transform of the received samples r(k) to the spectral domain is performed e.g. by means of a Fourier transform, and that there are no nonlinearities employed in the time domain that do generate additional spectral features to detect in the frequency domain, as done e.g. by phase demodulation [Lipp10] or other nonlinearities that generate additional spectral lines. Here, estimating the spectrum of r(k), no additional spectral lines are generated at other frequencies than those occupied by the input signal r(k). In particular, FIG. 2a) shows the required pre-processing, In particular, FIG. 2b)-e) show some practical implementations using the Discrete Fourier Transform (DFT).


In particular, FIG. 2 shows Pre-processing of the receive signal r(k) without generation of additional spectral features prior to spectral estimation and detection. In particular, FIG. 2a) shows in a general form, optional windowing followed by either a linear spectral transform, consisting of operations such as segmentation as in e.g. the Welch method, windowing, zero padding, and time averaging of partial spectral estimates, e.g. performed by a linear estimator or by a nonlinear estimator (generally indicated at 202), resulting in a spectrum of the windowed time signal r(k). FIG. 2b) shows an exemplary implementation employing windowing (e.g. by a windowing unit 204), optional zero-padding (e.g. by a zero-padding unit 206) and FFT (e.g. by a Fourier transform unit 208). FIG. 2c) shows an exemplary implementation, similar to the one shown in FIG. 2b), but with a periodogram computation in a periodiogram computation unit 210, and optional averaging of periodograms (Bartlett method), e.g. by an averaging unit 212. FIG. 2d) shows a further exemplary implementation according to embodiments of the herein disclosed subject matter. The implementation in FIG. 2d) is similar to the one in FIG. 2b), but with magnitude computation, e.g. by a magnitude computation unit 214. FIG. 2e) shows a further exemplary implementation in accordance with embodiments of the herein disclosed subject matter, comprising computation of the Short Time Fourier Transform (STFT), see e.g. Bin Yang, “A Study Of The Inverse Short Fourier Transform,” Proc. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on, pp. 3541-3544, Mar. 31, 2008-Apr. 4, 2008 ([YANG08]), wherein the Welch method [STO05] is a special case. For example, in accordance with embodiments of the herein disclosed subject matter, an exemplary implementation comprises segmentation of the receive signal r(k) (e.g. by a segmentation unit 216), windowing of each segment (e.g. by a windowing unit 204), optional zero-padding of each segment (e.g. by a zero-padding unit 206), Fourier transformation of each segment (e.g. by a Fourier transform unit 208), periodogram computation in the segments, e.g. by a periodogram computation unit 210 and subsequent time averaging of the periodogram, e.g. by an averaging unit 212.


It is true that the magnitude computation or the squared magnitude computation are also nonlinear. However, working in the frequency domain instead of the time domain, these nonlinear operations neither generate additional spectral lines for detection, nor do they drop the modulus of the received samples r(k), as in Friedrich Lipp, “Method and device for detecting simultaneous double transmission of AM signals”, US patent No. 2010/0067570 A1, published Mar. 18, 2010 ([Lipp10]). They just serve for an extraction of the magnitude out of the complex-valued spectrum Rw(ej2π·f·Tsk), so the magnitude spectrum |Rw(ej2π·f·Tsk)| or the power spectral density estimate provided by the periodogram Cw(ej2π·f·Tsk)˜|Rw(ej2π·f·Tsk)|2, instead of modifying r(k) by a nonlinearity (phase demodulator [LIPP10], or nonlinear filtering, or polynomial) in the time domain and estimating thus the spectrum or a modified signal instead of r(k).


Other approaches to get refined spectral estimates of r(k) related to the magnitude spectrum exists. E.g., the squared magnitude spectrum of r(k) can be computed from the Fourier transform of the biased auto-correlation estimate rrwrw(κ), shown here with the DTFT:












C
w



(

e

j





2


π
·
f
·

T
s



k


)


=



1

N
data


·





R
w



(

e

j





2


π
·
f
·

T
s



k


)




2


=



1

N
data


·


R
w



(

e

j





2


π
·
f
·

T
s



k


)


·


R
w
*



(

e

j





2


π
·
f
·

T
s



k


)



=





k
=

-











k


=

-









r
w



(
k
)





r
w
*



(

k


)




e


-
j






2


π
·
f
·

f
s

·


T
s



(

k
-

k



)








=




κ
=
0



N
date

-
1






r


r
w



r
w





(
κ
)




e


-
j






2


π
·
f
·

T
s



κ








,








where




(
3.22
)













r
rr



(
κ
)


=




k
=

-









r
w



(
k
)






r
w
*



(

k
-
κ

)


.








(
3.23
)







Thus, if the squared magnitude spectrum of r(k) is chosen for spectral detection, the DFT of the auto-correlation can also be used to compute it, termed correlogram, as an alternative to computing the DFT and scaling its absolute squared value, termed periodogram, as in particular, FIG. 2c).


In practice, the bias of the auto-correlation estimate over N samples













r
^



r
w



r
w





(
κ
)


=


1

N
-


κ









k
=
0


N
-


κ


-
1






r
w
*



(
k
)





r
w



(

k
+
κ

)






,





κ
=
0

,





,

N
-
1





(
3.24
)







can additionally be reduced by tapering and windowing (e.g. the Blackman-Tukey approach). In addition, the variance of the estimate {circumflex over (r)}rr(κ) can be decreased by averaging or smoothing. If e.g. the auto-correlation is computed first, overlapped segments can be used for an improved autocorrelation estimate, prior to computing the DFT for estimating the periodogram. Until now, we have listed some approaches to provide good estimates of the spectrum, magnitude spectrum or power spectral density of r(k).


All the spectral estimators have one thing in common: The computed spectral estimates show distinct peaks at the carrier frequency of each user present transmitting a DSB-AM signal. Because no additional spectral lines are generated by nonlinearities, each peak corresponding to a user can be detected and cancelled from the spectrum. Each peak of a DSB-AM carrier is surrounded by voiced sidebands. The feature that is used for detection consists of the peaks from the computed spectrum of r(k), but does not consist of features generated due to nonlinear operations in the time domain, that have a different spectrum (e.g. periodogram). This is in contrast to e.g. [LIPP10], where a nonlinearity is used in the time domain in order to generate a feature that allows for the discrimination between the two hypothesis stated in Equation (3.1) and Equation (3.2). In [LIPP10], the nonlinear operation approach is to use a phase demodulator, and the detector works on the spectrum of the phase demodulated receive signal. Other nonlinear pre-processing approaches might exist. Estimating the spectrum of r(k), however, no new spectral lines are generated in the approach presented here, as produced e.g. by intermodulations due to nonlinearities in the time domain. This also holds for the above mentioned methods that first estimate the autocorrelation of the received samples, e.g. the Blackman-Tukey method, because due to Eq. (3.22) this is just the periodogram estimate. We will see below that in contrast to the nonlinearly in the time domain pre-processed detectors to generate spectral features for detection, e.g. by generation of spectral lines at additional frequencies, the detector that is based on spectral estimates of r(k) allows for the detector to be easily adapted to CLIMAX transmission, because the order of linear operations like filtering and DFT can be interchanged if no new spectral lines are generated, leading to a low complexity implementation. This is in contrast to [Lipp10], where the nonlinear phase demodulation is carried out in the time domain prior to a DFT, so that a filter for CLIMAX components cannot be interchanged with the nonlinearity. In addition, non-linear operations that generate additional spectral lines, as used e.g. in [Lipp10], increase the noise floor. The techniques used here, however, are optimum pre-processing techniques in terms of Maximum Likelihood Detection (MLD).


Spectral estimators have to work on finite sample records. If a continuous estimation is desired, the estimates stemming from successive time windows can be averaged and also overlapped. The multiplication with w(k) in particular, FIG. 2 cuts out a finite segment of samples r(k) to be processed. An alternative is the segmentation approach averaging over multiple time windows that is even capable to work interleaved for techniques working with overlapping windows of received samples. All techniques, with or without averaging, with or without overlapping, are linear operations on r(k) Bin Yang, “A Study Of The Inverse Short Fourier Transform,”Proc. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on, pp. 3541-3544, Mar. 31, 2008-Apr. 4, 2008, [Yang08]). w(k) has to have finite support for this, so only a finite number of samples in w(k) are non-zero. If the non-zero samples have the same height, no weighting in the time domain occurs. If the non-zero samples in w(k) are unequal, like in a Hann window or a Hamming window, the spectrum is additionally shaped by w(k).


3.4 Procedure for Multiple Peak Detection for DSB-AM Signals with Widely Separated Carrier Frequencies


Let us assume for a moment that the users' voice signals s(u)(k) in the signal model Equation (2.7) are zero-mean white Gaussian noise. Henceforth, we separate the above signal model Equation (2.7) in a noise part and a useful signal part. The noise part is made up of the additive white Gaussian noise and the users' voice signals assumed also white, see above. The useful signal part is made up of the DSB-AM carriers only. From this point of view, the receive signal r(k) from the signal model Equation (2.7) can be rewritten

r(k)=s(k)+q(k)   (3.25)


with the useful signal part










s


(
k
)


=




u
=
1

U







1
·

a

(
u
)


·

e

j
·

ϕ

(
u
)




·

e


j
·
2
·
π
·
Δ








f

(
u
)


·
k
·

T
s










(
3.26
)







and a white noise part










q


(
k
)


=





u
=
1

U




m

(
u
)


·


s

(
u
)




(
k
)


·

a

(
u
)


·

e

j
·

ϕ

(
u
)




·

e


j
·
2
·
π
·
Δ








f

(
u
)


·
k
·

T
s






+


n


(
k
)


.






(
3.27
)







Taking into account an infinite number of samples in the time domain, the DTFT can be written













R


(

e

j





2






π
·
f
·

T
s




)


=




S


(

e

j





2






π
·
f
·

T
s




)


+

Q


(

e

j





2






π
·
f
·

T
s




)









=






u
=
1

U







1
·

a

(
u
)


·

e

j
·

ϕ

(
u
)




·












δ


(

2






π
·

(

f
-

Δ






f

(
u
)




)

·

T
s



)


+

Q


(

e

j





2






π
·
f
·

T
s




)










(
3.28
)







For a finite number data sequence {rw(k)}k=0Ndata−1, the DTFT can be written














R
w



(

e

j





2






π
·
f
·

T
s




)


=





S
w



(

e

j





2






π
·
f
·

T
s




)


+


Q
w



(

e

j





2






π
·
f
·

T
s




)









=






u
=
1

U







1
·

a

(
u
)


·

e

j
·

ϕ

(
u
)




·












W


(

e

j





2






π
·

(

f
-

Δ






f

(
u
)




)

·

T
s




)


+


Q
w



(

e

j





2






π
·
f
·

T
s




)










(
3.29
)







where rw(k)=r(k)·w(k) is the windowed time signal. w(k) is the time domain window with finite support, W(ej2π·f·Ts) is the DTFT of w(k).


In addition, we assume that uniform prior probability distributions are assigned to the parameter vectors b=[b(1), b(2), . . . , b(U)]T and f=[Δf(1), Δf(2), . . . , Δf(U)]T and the detector not only detects the tones, but also estimates the corresponding frequencies, then the Generalized Likelihood Ratio Detector (GLRD), which uses the Maximum Likelihood (ML) joint estimates of b and f, is the optimum detector [WHA71].


Then, for a single tone (U=1), the signal model Equation (3.25) or Equation (3.28) consists only of a single spectral line and additive white Gaussian noise n(k) The single spectral line is due to the carrier of this user. The power of the spectral line is (a(1))2=|b(1)|2, and the power of the total additive white Gaussian noise is σq2. The total noise power assuming voice signals s(u)(k) to be noise is











σ
q
2

=


σ
n
2

+




u
=
1

U








(

σ
s

(
u
)


)

2




,




(
3.30
)







where the white Gaussian noise power of n(k) and the power of the users' voice signals s(u)(k), weighted by modulation index and channel gain, add up.


The noise power (σs(u))2 is defined

s(u))2=(m(u)·a(u))2·E{|s(u)(k)|2}.   (3.31)


The ML estimate is then the value of Δ{circumflex over (f)}(1) that maximizes the magnitude |Rw(ej2π·f·Ts)| of the Discrete Time Fourier Transform (DTFT)











R
w



(

e

j





2






π
·
f
·

T
s




)


=




k
=

-
0




N
data

-
1









r


(
k
)


·

w


(
k
)


·

e


-
j






2






π
·
f
·

T
s



k








(
3.32
)







as well as its scaled squared magnitude |Rw(ej2π·f·Ts)|2, termed periodogram Cw(ej2π·f·Ts) with











C
w



(

e

j





2






π
·
f
·

T
s




)


=


1

N
data









R
w



(

e

j





2






π
·
f
·

T
s




)




2

.






(
3.33
)







Here, w(k) is the window function with support only for k≧0 and k<Ndata, kεZ/. An example is the rectangular window function











w
R



(
k
)


=

{



1




for





0


k



N
data

-
1






0


else








(
3.34
)







that cuts out Ndata samples out of the data signal r(t) after sampling with the sampling rate. Thus, the estimator has only Ndata receive samples available for detection, so a finite window of samples. Denoting the strongest user's frequency offset by Δfp1, this peak p1 has the largest magnitude in the noiseless spectrum and is likely to be the largest magnitude in the noisy spectrum, thus, will be detected with high probability if the SNR is sufficient.


A classical GLRD that decides if a single user having a single spectral line is present (hypothesis true), or noise only (hypothesis false), would decide for hypothesis true if the maximum of the periodogram divided by the noise variance estimate {circumflex over (σ)}q2 exceeds a threshold γs2:












C
w



(

e

j





2






π
·
f
·

T
s




)




σ
^

q
2







>
true






<
false







γ
s
2

.





(
3.35
)







However, we are interested to detect two or more tones corresponding to two or more spectral lines. It is shown in [RBY76] that the ML detection of any spectral line can be carried out as if it were the only spectral line present, provided that the separation in frequency between it and any other spectral line is much larger than the frequency spacing of approximately fs/Ndata. If the frequency difference between the carriers exceeds this value, we call the frequency separation widely separated.


Because it is not known which user belongs to which detected peak, and b(u) is unknown at the receiver, the complex peak magnitude has to be estimated also. Henceforth, we denote by api, φpi and Δfpi the amplitude, phase and frequency of the detected peak i, i=1, 2, . . . .


The i-th frequency offset Δfpi can be estimated in the following fashion:










Δ







f
^


p
i



=

arg







max
f










k
=
0



N
data

-
1









r


(
k
)


·

w


(
k
)


·

e


-
j






2






π
·
f
·
k
·

T
s








2

.







(
3.36
)







When using the DFT, so estimating the frequency offset Δfpi and the complex gain bpi on a discrete frequency grid, zero padding of the windowed signal in the time domain leads to a better estimate due to a denser frequency grid. The coarse frequency estimate is










Δ







f
^



p
i

,
coarse



=

{








f
s


N
FFT


·


n
^

bin






for





0



n
bin




0.5
·

N
FFT


-
1









f
s


N
FFT


·

(


N
FFT

-


n
^

bin


)




else












where











n
^

bin


=

arg







max
n









k
=
0



N
data

-
1









r


(
k
)


·

w


(
k
)


·

e


-
j






2






π
·
n
·

k
/

N
FFT









2









(
3.37
)








is the maximum bin index of the discrete frequency-grid. Another, less complex approach is to use interpolation for the estimation of Δ{circumflex over (f)}pi and {circumflex over (b)}pi. The carrier frequency offset Δ{circumflex over (f)}pi of the i-th peak can be written

Δ{circumflex over (f)}pi=Δ{circumflex over (f)}pi,coarse+{circumflex over (Δ)}·fs/NFFT=({circumflex over (n)}bin+{circumflex over (Δ)})·fs/NFFT,   (3.38)


where −0.5≦{circumflex over (Δ)}<0.5 and Δ{circumflex over (f)}pi,coarse is given e.g. by Eq. (3.37). Thus, Δ accounts for the distance of the true peak from the maximum displayed grid sample, and {circumflex over (Δ)} is the estimate of Δ.


Other approaches exist, the literature is very rich here. The i-th amplitude api and phase φpi can be estimated:












b
^


p
i


=




k
=
0



N
data

-
1









r


(
k
)


·

w


(
k
)


·

e


-
j






2






π
·
Δ








f

p
i


·
k
·

T
s







,




(
3.39
)









a
^


p
i


=




b
^


p
i





,



ϕ
^


p
i


=


arg


(


b
^


p
i


)


.






(
3.40
)







In order to detect each spectral line separately, we shall evaluate its influence on the spectrum here. The DTFT of a spectral line







a

p
i


·

e

j
·

ϕ

p
i




·

e


j
·
2
·
π
·
Δ








f

p
i


·
k
·

T
s









belonging to a user after a finite time-windowing by w(k) can be easily computed to be














R
line



(

e

j





2






π
·
f
·

T
s




)


=






k
=
0



N
data

-
1









a

p
i


·

e

j
·

ϕ

p
i




·

e


j
·
2
·
π
·
Δ








f

p
i


·
k
·

T
s




·

w


(
k
)


·











e


-
j






2


π
·
f
·

T
s



k








=




a

p
i


·

e

j
·

ϕ

p
i




·




k
=
0



N
data

-
1





w


(
k
)


·












e

j
·
2
·
π
·

(


Δ






f

p
i



-
f

)

·
k
·

T
s









=




a

p
i


·

e

j
·

ϕ

p
i




·


W


(

e

j
·
2
·
π
·

(

f
-

Δ






f

p
i




)

·

T
s



)


.









(
3.41
)







E.g., in case of a rectangular window, we have













W


(

e

j





2






π
·

(

f
-

Δ






f

p
i




)

·

T
s




)


=




W
R



(

e

j





2






π
·

(

f
-

Δ






f

p
i




)

·

T
s




)








=




e


-
j

·
π
·

(

f
-

Δ






f

p
i




)

·

T
s

·

(


N
data

-
1

)



·












sin


(

π
·

(

f
-

Δ






f

p
i




)

·

T
s

·

N
data


)



sin


(

π
·

(

f
-

Δ






f

p
i




)

·

T
s


)



.








(
3.42
)







In an implementation, the obvious approach is to compute Rw(ej2π·f·Ts) on a discrete frequency grid of frequencies fn spaced fS/Ndata apart

fn=n·fs/Ndata   (3.43)


employing the DFT:

Rw(n)=Rw(ej2π·f·Ts)|f=fn=n·fs/Ndata.   (3.44)


For each single spectral line, we have the contribution to the spectrum














R
line



(
n
)


=





R
line



(

e

j





2






π
·
f
·

T
s




)






f
=


f
n

=

n
·


f
s

/

N
data













=




a

p
i


·

e

j
·

ϕ

p
i




·


W


(

e

j





2






π
·

(


n
/

N
data


-

Δ






f

p
i




T
s



)




)


.









(
3.45
)







Its estimate is












R
^

line



(
n
)


=



a
^


p
i


·

e

j
·


ϕ
^


p
i




·


W


(

e

j





2


π
·

(


n
/

N
data


-

Δ







f
^


p
i




T
s



)




)


.






(
3.46
)







E.g., in case of a rectangular window w(k)=wR(k), we have as a special case the DTFT










W


(

e

j





2


π
·

(


n
/

N
data


-

Δ






f

p
i




T
s



)




)


=



W
R



(

e

j





2


π
·

(


n
/

N
data


-

Δ






f

p
i




T
s



)




)


=


e


-
j

·
π
·

(


n
/

N
data


-

Δ







f

p
i


·

T
s




)

·

(


N
data

-
1

)



·



sin


(

π
·

(


n
/

N
data


-

Δ







f

p
i


·

T
s




)

·

N
data


)



sin


(

π
·

(


n
/

N
data


-

Δ







f

p
i


·

T
s




)


)



.







(
3.47
)







The magnitude of the maximum peak observed depends upon its position on the discrete frequency grid. If the peak is on a DFT bin, it is maximum. If the peak is not on the discrete frequency grid, the peak magnitude is diminished. If it is between two bins, it has a worse case degradation.


E.g. for a rectangular window, if Δfpi is an integer multiple nx of the frequency separation fs/Ndata (termed the ‘on bin’ case):

Δfpi=nx·fs/Ndata,  (3.48)

then











R
line



(

n
x

)


=


a

p
i


·

e

j
·

ϕ

p
i




·


N
data

.






(
3.49
)







If Δfpi is exactly positioned between two bins

Δfpi=(ny+0.5)·fs/Ndata,   (3.50)


which is termed the ‘off bin’ case, then the maximum spectral peak in Rline(n) is only approximately











R
line



(

n
y

)


=



a

p
i


·

e

j
·

ϕ

p
i




·

N
data

·

2
π





a

p
i


·

e

j
·

ϕ

p
i




·

N
data

·

0.64
.







(
3.51
)







For this reason, if the peak falls between two bins, the detection probability decreases, when the peak is searched in strong noise, so with a peak having small distance to the noise floor. The loss in detection probability can be diminished by zero padding the data r(k) by a zero padding factor LZP=NFFT/Ndata, so that NFFT−Ndata trailing zeros are appended to the (windowed) r(k) prior to the DFT of length NFFT, instead of directly performing a DFT of length Ndata on r(k). The frequency resolution Δfres obtained with a DFT of length Ndata is the same as the DFT of length NFFT of the zero padded sequence and is










Δ






f
res


=



f
s


N
data


.





(
3.52
)







That is, the frequency resolution is not improved by zero padding [STO05]. However, the amplitude resolution gets finer using zero padding, and the worst ‘off bin’ case with zero padding is now better than without zero padding, because the window-dependent spectral lobe of the peak is sampled spectrally with a finer frequency grid. The zero-padded discrete Fourier spectrum is then
















R
line



(
n
)


=




R
line



(

e

j





2


π
·
f
·

T
s




)






f
=


f
n

=


f
s

·

n
/

N
FFT











=




a

p

i







·

e

j
·

ϕ

p
i




·


W
(

e

j





2


π
·

(


n
/

N
FFT


-

Δ






f

p
i




T
s



)




)

.









(
3.53
)







E.g., in case of a rectangular window, we have










W


(

e

j





2


π
·

(


n
/

N
FFT


-

Δ






f

p
i




T
s



)




)


=



W
R



(

e

j





2


π
·

(


n
/

N
FFT


-

Δ






f

p
i




T
s



)




)


=


e


-
j

·
π
·

(


n
/

N
FFT


-

Δ







f

p
i


·

T
s




)

·

(


N
data

-
1

)



·



sin


(

π
·

(


n
/

N
FFT


-

Δ







f

p
i


·

T
s




)

·

N
data


)



sin


(

π
·

(


n
/

N
FFT


-

Δ







f

p
i


·

T
s




)


)



.







(
3.54
)







Thus, the discrete Fourier spectrum becomes
















R
line



(
n
)


=




R
line



(

e

j





2


π
·
f
·

T
s




)






f
=


f
n

=



n




·


f
s

/

N
FFT


·
Δ







f

p
i



=


(


n
bin

+
Δ

)

·


f
s

/

N
FFT












=




a

p
i


·

e

j
·

ϕ

p
i




·


W


(

e

j





2


π
·

(


n
/

N
FFT


-


(


n
bin

+
Δ

)

/

N
FFT



)




)


.









(
3.55
)







Its estimate is












R
^

line



(
n
)


=



a
^


p
i


·

e

j
·


ϕ
^


p
i




·


W


(

e

j





2


π
·

(


n
/

N
FFT


-


(



n
^

bin

+

Δ
^


)

/

N
FFT



)




)


.






(
3.56
)







E.g., in case of a rectangular window, we have













W


(

e

j





2


π
·

(


n
/

N
FFT


-


(


n
bin

+
Δ

)

/

N
FFT



)




)


=




W
R



(

e

j





2


π
·

(


n
/

N
FFT


-


(


n
bin

+
Δ

)

/

N
FFT



)




)








=




e


-
j

·
π
·


(

n
-

(


n
bin

+
Δ

)


)

/

N
FFT


·

(


N
data

-
1

)



·












sin


(

π
·


(

n
-

(


n
bin

+
Δ

)


)

/

N
FFT


·

N
data


)



sin


(

π
·


(

n
-

(


n
bin

+
Δ

)


)

/

N
FFT



)



.








(
3.57
)







If Rline(n) in Equation (3.55) stems from a rectangularly windowed spectral line, so no weighting in the time domain at all, just cutting the samples out of the data stream r(k), the discrete Fourier spectrum of this finite number or received samples results. If a window is used, the spectrum is Equation (3.55) with the sampled DTFT of the corresponding window used, instead of the rectangular window stated in Equation (3.57).


Now, as stated above, the influence of each spectral line on the spectrum can be evaluated by simply subtracting the (windowed) peak from the spectrum. E.g., in case of a rectangular window, the so called Dirichlet-Kernel










D


(
n
)


=


e


-
j

·
π
·

n
/

N
FFT


·

(


N
data

-
1

)



·


sin


(

π
·

n
/

N
FFT


·

N
data


)



sin


(

π
·

n
/

N
FFT



)








(
3.58
)







has to be weighted as in Equation (3.55) and has to be subtracted after having it shifted from its conjugate symmetric position about the bin zero by nbin+Δ to the appropriate fractional bin index:











(
3.59
)












W
R



(

e

j





2


π
·

(


n
/

N
FFT


-


(


n
bin

+
Δ

)

/

N
FFT



)




)


=



D


(

n
-

(


n
bin

+
Δ

)


)








=




e


-
j

·
π
·


(

n
-

(


n
bin

+
Δ

)


)

/

N
FFT


·

(


N
data

-
1

)



·












sin


(

π
·


(

n
-

(


n
bin

+
Δ

)


)

/

N
FFT


·

N
data


)



sin


(

π
·


(

n
-

(


n
bin

+
Δ

)


)

/

N
FFT



)



,








see Equation (3.55) and Equation (3.57) for comparison. Equation (3.55) consists of the sampled DTFT of the window function, which is in just a shifted Dirichlet kernel in case of a rectangular window, which is weighted by the (complex) peak magnitude








a

p
i


·

e

j
·

ϕ

p
i





,





and the whole term is spectrally shifted to the corresponding frequency Δfpi, which is sampled to the DFT grid.


Clearly, a non-parametric method based on the DFT can also detect multiple peaks by subtracting the effect of the peak in order to reduce the interference resulting from spectral leakage when detecting the second strongest peak, and optionally also less stronger peaks, until all peaks are taken into account for detection. Spectral leakage leads to bias when estimating the frequencies.


If the periodogram is used for spectral detection of peaks, see In particular, FIG. 2c),









C
^

line



(
n
)


=



1

N
data


·






R
^

line



(
n
)




2


=


1

N

data







·


(


a
^


(
u
)


)

2

·




W


(

e

j





2


π
·

(


n
/

N
FFT


-


(



n
^

bin

+

Δ
^


)

/

N
FFT



)




)




2








has to be subtracted, if the magnitude spectrum is used for the detection of peaks, |{circumflex over (R)}line(n)|=â(u)·|W(ej2π·(n/NFFT−({circumflex over (n)}bin+{circumflex over (Δ)})/NFFT))| has to be subtracted.


An alternative approach to peak detection is to compute the notch periodogram for detection of weaker DSB-AM carriers, where all stronger peaks are notched out in the notch periodogram, removing their influence from the periodogram. One peak after the other can be subtracted in this fashion, until no significant peak is left. The notch periodogram that notches out an estimated peak at Δfpi is computed:












P
notch



(

f
,

Δ







f
^


p
1




)


=


1


N




(

f
-

Δ







f
^


p
1




)



·







d
_

H



(
f
)


·



P
_



d
_



(

Δ







f
^


p
1



)






(

Δ







f
^


p
1



)


·

r
_




2








with




(
3.60
)









d
_



(
f
)


=


[


e


-
j






2

π





0


,

e


-
j






2

π






1

N
FFT




,

e


-
j






2

π






2

N
FFT




,





,
,

e


-
j






2

π








N
FFT

·
1


N
FFT





]

T


,




(
3.61
)








r
_

=





r


(
0
)


,

r


(
1
)


,

r


(
2
)


,





,
,

r


(


N
data

-
1

)


,


0
_



N
FFT

-

N
data






T


,




(
3.62
)








O
N

FFT

−N

data
a vector of NFFT−Ndata zeros to allow for optional zero padding, and












P
_



d
_



(

Δ







f
^


p
1



)






(

Δ







f
^


p
1



)


=


I
_

-



d
_



(

Δ







f
^


p
1



)


·


(




d
_

H



(

Δ







f
^


p
1



)


·


d
_



(

Δ







f
^


p
1



)



)


-
1


·




d
_

H



(

Δ







f
^


p
1



)


.







(
3.63
)







The term









d
_

H



(
f
)


·



P
_



d
_



(

Δ







f
^


p
1



)






(

Δ







f
^


p
1



)


·

r
_






in equation Eq. (3.60) can be rewritten











(
3.64
)














P
_



d
_



(

Δ







f
^


p
1



)






(

Δ







f
^


p

1








)


·

r
_


=




DTFT

N
data




{




P
_



d
_



(

Δ






f

p
1



)






(

Δ







f
^


p
1



)


·

r
_


}








=





DTFT

N
data




{

r
_

}


-












DTFT

N
data




{




d


(

Δ







f
^


p
1



)



N
data







scaled





complex


exponential





with



f
=

Δ







f
^


p
1







·




DTFT

N
data




{

r
_

}




|

f
=

Δ







f
^


p
1










spectral





peak





at


f
=

Δ







f
^


p
1








}







subtract





spectral





peak





at





f

=

Δ







f
^


p
1

















=





R
w



(

e

j





2


π
·
f
·

T
s




)


-


R
line



(

e

j





2


π
·
f
·

T
s




)









=





R
w



(

e

j





2


π
·
f
·

T
s




)


-



a
^


p
i


·












e

j
·


ϕ
^


p

i









·

W


(

e

j





2


π
·

(

f
-

Δ







f
^


p
i




)




T
s



)










and after sampling with f=fn=n·fs/Ndata
















d
_

H



(
n
)


·



P
_



d
_



(

Δ







f



p
1



)






(

Δ







f
^


p
1



)


·

r
_


=





R
w



(
n
)


-



a
^


p

i







·

e

j
·


ϕ
^


p
i




·











W
(

e






j





2






π
·

(


n
/

N
data


-

Δ







f
^


p
i




T
s



)





)







=





R
w



(
n
)


-


R
line



(
n
)










(
3.65
)







or, using zero padding and an FFT of size NFFT to have a finer grid f=fn=n·fs/NFFT in the frequency domain
















d
_

H



(
n
)


·



P
_



d
_



(

Δ







f
^


p
1



)






(

Δ







f
^


p
1



)


·

r
_


=





R
w



(
n
)


-



a
^


p
i


·

e






j
·


ϕ
^


p

i










·











W


(

e

j





2


π
·

(


n
/

N
FFT


-

Δ







f
^


p
i




T
s



)




)








=





R
w



(
n
)


-


R
line



(
n
)










(
3.66
)







so that:











P
notch



(

n
,

Δ







f
^


p
1




)


=


1


N




(

n
-

Δ








f
^


p
1


·

T
s

·

N
FFT




)



·






R
w



(
n
)


-


R
line



(
n
)





2






(
3.67
)







with:












(
3.68
)








N




(

n
-

Δ








f
^


p
i


·

T
s

·

N
FFT




)


=




N
data

-


N
data

·
















sin
(


2






π
·

(

f
-

Δ







f
^


p
i




)





T
s

·

N
data



2

)



N
data

·

sin
(


2






π
·

(

f
-

Δ







f
^


p
i




)




T
s


2

)





2





f
=


f
n

=

n
·


f
s

/

N
FFT













=




N
data

-


N
data

·
















sin
(

π
·

(



n
·

N
data



N
FFT


-

Δ








f
^


p
i


·

T
s

·

N
data




)


)



N
data

·

sin
(

π
·

(


n

N
FFT


-

Δ








f
^


p
i


·

T
s




)


)





2

.










The peak subtraction can be iterated to start all over after the last peak is detected, using a refined noise floor estimate and subtracting all peaks except that currently estimated. Or the peak subtraction can be performed interleaved, so that after each peak is detected, all or some previous peaks are re-estimated, before proceeding to the next peak.



FIG. 3 shows an overall detection scheme based on the detection of spectral lines belonging to DSB-AM signals. The noise variance can either be estimated from the time domain signal or from the spectral estimate.


According to an embodiment, the detection scheme is provided by a signal processing chain 300 illustrated in FIG. 3. The signal processing may comprise a segmentation unit 302 for segmenting (windowing) the receive signal r(k) and optional temporal weighting of samples. In accordance with an embodiment, the processing chain 300 further comprises a spectrum estimator 304 for estimation of the spectrum of r(k). In accordance with a further embodiment, the processing chain 300 further comprises a peak detector 306 for detection of spectral peaks above the noise floor. For estimation of the noise floor, a noise estimator 308 may be provided.


The number of detected peaks ND is reported to a decision logic 310 that decides











N
D






>

H
=

H
1










H
=

H
0







1

,




(
3.69
)







see FIG. 3. Upon decision for H1, the double transmission detection can be signalled to the air traffic controller.


Now, if we drop the assumption made above of voice signals to be white, the AM voice sidebands appear in the spectrum as coloured noise. Specifically, an upper and a lower sideband about the carrier frequency are observable. The unmodulated carriers are only detected in case that they are not hidden in the AM sidebands. So, the peak detection just described will work only for moderate power differences between the users.


Because spectral lines separated widely in frequency have limited influence on one another, a test for widely separated spectral lines can be carried out successively as follows:


A 2-Step Procedure for Detection of Widely Spaced DSB-AM Signals


Step 1:


Estimate the spectrum of r(k) using windowed, optionally averaged over multiple segments, optionally zero padded and optionally scaled versions of Fourier-related, subspace vector-related, or Wavelet related spectral estimates, see In particular, FIG. 2. Result: E.g. Rw(n), |Rw(n)|, |Rw(n)|2, Cw(n), or a high resolution pseudo spectrum (as it is obtained e.g. for the ESPRIT algorithm). For parametric methods, a model is postulated first, e.g. as in Burg's method. For subspace Eigen-analysis based spectral estimation methods such as MUSIC and ESPRIT, a high resolution spectral estimate or at least a pseudo-spectrum can be computed.


Step 2:


Detection of the peak pi=p1 in the spectral estimate of r(k) that has the highest magnitude. For non-parametric methods, this is typically carried out by finding the maximum of the DFT magnitude |Rw(n)|, squared magnitude |Rw(n)|2 or Cw(n), compare Equation (3.38).


Step 3:


The noise floor can be estimated by well known techniques, e.g. as disclosed in R. Martin, “Noise Power Spectral Density Estimation Based on Optimal Smoothing and Minimum Statistics,” IEEE Transaction on speech and audio processing, Vol. 9, No. 5, July 2001 ([RM01]) and the references therein. A simple estimate is obtained by averaging the spectral estimate over parts including only noise. Advanced techniques allow for the estimation of the colored, frequency dependent noise floor {circumflex over (σ)}q={circumflex over (σ)}q(ej2π·f·Ts). The resolution of the noise floor to the bin-spacing obtained by a DFT shall normally be sufficient: {circumflex over (σ)}q={circumflex over (σ)}q(n).


Step 4:


Decide if the strongest peak is significant, i.e., if it has a magnitude high enough above the noise floor. E.g. for non-parametric methods, the test for significance may be













a
^



p
1

·

N
data





σ
^

q







>


p
1






significant







<


p
1






not





significant







γ
1






or











a
^


p

1






2

·

N
data
2




σ
^

q
2







>


p
1






significant







<


p
1






not





significant







γ
1
2






(
3.70
)







and ap1 can be estimated from Equation (3.40), or, if assumed sufficient for the application, the highest magnitude DFT-peak is used as a coarse estimate. E.g. for parametric methods, the estimate âp1 can be taken from Equation (3.40) or from a suitably computed pseudo-spectrum that maintains the relative amplitude difference between signal and noise floor.


If the significance test shows a significant peak, then proceed, because ND>0 and, thus, H might be unequal to ND=0 otherwise ND=0.


Step 5:


In case of non-parametric methods, the bin index belonging to the highest magnitude peak is a coarse frequency estimate. Perform a fine frequency estimation to yield Δ{circumflex over (f)}p1, e.g. by using interpolation between the DFT frequency bins (J. Schoukens, R. Pintelon, H. van Hamme, “The interpolated Fast Fourer Transform: A comparative study,” IEEE Transaction on instrumentation and measurement, Vol. 41, No. 2, April 1992 ([Schou92])), see Equation (3.38), or by linear regression of DFT phases (S. M. Kay, “A fast and accurate single frequency estimator”, IEEE Transactions on Acoustics, Speech and Signal Processing 37, 1987}1990 ([Kay89])), or by using weighted linear regression of DFT phases, as done by the Weighted Phase Averaging (WPA) technique (S. Umesh, D. Nelson, “Computationally Efficient Estimation of Sinusoidal Frequency at Low SNR”, Proceedings of the 1996 IEEE International Conference on Acoustics Speech and Signal Processing, Atlanta (Ga.), 2797}2800 ([Ume06])). For parametric methods, this step can be omitted.


Step 6:


Perform removal of the strongest tone from the data in the time or frequency domain, e.g. by one of the following three methods (removal in the time domain, removal in the frequency domain and removal after demodulation in the time domain):

    • The removal in the time domain without demodulation means a subtraction of the sequence







{



a
^


p
i


·

e

j
·


ϕ
^


p
i




·

w


(
k
)


·

e


j
·
2
·
π
·
Δ









f
^


p
i


·
k
·

T
s





}


k
=
0



N
data

-
1






from {rw(k)}k=0Ndata−1 to get the receive signal that is cleaned from the strongest carrier











{


r

clean
,
1




(
k
)


}


k
=
0



N
data

-
1


=



{


r
w



(
k
)


}


k
=
0



N
data

-
1


-


{



a
^


p
i


·

e

j
·


ϕ
^


p
i




·

w


(
k
)


·

e


j
·
2
·
π
·
Δ









f
^


p
i


·
k
·

T
s





}


k
=
0



N
data

-
1







(
3.71
)









    • It is well suited for model based techniques and high resolution techniques, where the time-domain auto-correlation estimates need to be computed again after this removal. A new spectral estimate can be computed from the signal {rclean,1(k)}k=0Ndata−1, where the carrier of the strongest DSB-AM signal is now removed with high approximation.

    • The removal in the frequency domain without demodulation depends on the spectral representation used. E.g., the complex spectrum Rw(n), the magnitude spectrum |Rw(n)|, the periodogram Cw(n), the pseudospectrum or any scaled versions of the later might be used. It means to do from Rw(n) a subtraction of {circumflex over (R)}line(n), alternatively |{circumflex over (R)}line(n)| from the magnitude spectrum |Rw(n)|, alternatively Ĉline(n) of Cw(n), alternatively by using the notch periodogram Eq. (3.67) to remove the strongest carrier.

    • Alternatively, the signal r(k) can be demodulated prior to removal by the estimated frequency and phase to yield rde mod,coh,1(k) or rde mod,incoh,1(k), where















{


r


de





mod

,
coh
,
1




(
k
)


}


k
=
0



N
data

-
1


=


{


r


(
k
)


·

e


-
j

·


ϕ
^


p
i




·

e



-
j

·
2
·
π
·
Δ









f
^


p
i


·
k
·

T
s





}


k
=
0



N
data

-
1












and




(
3.72
)













{


r


de





mod

,
incoh
,
1




(
k
)


}


k
=
0



N
data

-
1


=



{


r


(
k
)


·

e



-
j

·
2
·
π
·
Δ









f
^


p
i


·
k
·

T
s





}


k
=
0



N
data

-
1


.






(
3.73
)









    • Removal of the strongest tone from the demodulated data in the time domain means removal of the DC component now, which can easily be estimated, e.g.














r
^

DC

=


1

N
data


·




k
=
0



N
data

-
1









r


de





mod

,
incoh
,
1




(
k
)








(
3.74
)









    • so that we get

      rde mod,incoh,clean,1(k)=rde mod,coh,1(k)−{circumflex over (r)}DC.   (3.75)

    • Of cause, rde mod,coh,1(k) could be employed instead of in Eq. (3.74), but the additional phase compensation is not required here and the phase estimation can be saved.

    • A new spectral estimate can be computed from the signal {rde mod,incoh,clean,1(k)}k=0Ndata−1, where in comparison to the original signal r(k) the carrier of the strongest DSB-AM signal is now removed with high approximation, only that the whole signal is demodulated now. This frequency shift needs to be taken into account especially for Multicarrier/CLIMAX mode to discriminate a multicarrier component from a secondary user.

    • Removal of the strongest peak from the demodulated data in the frequency domain means that the DFT Rde mod,coh,1(n) or Rde mod,incoh,1(n) respectively, has to be computed from the windowed, optionally zero padded rde mod,coh,1(k), or, rde mod,incoh,1(k), respectively, and a subtraction of the Dirichlet kernel WR (ej2π·(0/NFFT)) for the DFT of a single tone with rectangular window at frequency zero, or W(ej2π·(0/NFFT)) for the DFT of a single tone with arbitrary window at frequency zero, alternatively the absolute values |W(ej2π·(0/NFFT))| from the magnitude spectrum |Rde mod,coh,1(n)| or the squared absolute value |W(ej2π·(0/NFFT))|2 from the squared magnitude spectrum |Rde mod,coh,1(n)|2. When magnitude spectra are subtracted, it is sufficient to compute the spectrum from rde mod,incoh,1(k). The advantage of demodulation to a known frequency is that the spectrum of a peak at frequency zero that has to be subtracted can be pre-computed very easily. For the demodulation, estimation of the phase and its use in the demodulation is only required when Rde mod,coh,1(n) is involved, not its magnitude.





The result after the subtraction of the peak in the time domain or the frequency domain is that the remaining spectrum is without the influence of the strongest peak. Alternatively to the procedure just described for the removal in the frequency domain, the notch periodogram can be computed. It means that when removing tones from the periodogram, the squared Dirichlet spectrum is weighted.


Step 6: Now, the second strongest peak can be computed from the data when the first peak is already removed. It also has to be tested for significance by comparing its magnitude to the noise floor. If the second strongest peak is also significant, ND=2, else, ND=1.


After step 5, the two strongest peaks are tested for significance. The coarse and fine frequency estimates of the second strongest peak can be computed as under step 3.


If the second strongest peak is significant in a non-CLIMAX environment, the detector shall trigger: ND=2. If it is in a CLIMAX environment, the detector shall only trigger if not both peaks are in a CLIMAX frequency detection interval, see below, else: ND=1.


The procedure for the detection of widely spaced DSB-AM signals by removal of the carrier part only just described is only suitable

    • either for double transmissions that have similarly strong carriers,
    • or for the detection of single, isolated CLIMAX components in noise, see below for the CLIMAX case.


Otherwise, the second strongest carrier might vanish in the AM sidebands of the strongest user.


Step 7: Decide for the hypothesis H1 if ND else H0:








N
D






>

H
=

H
1










H
=

H
0







1

,





see Equation (3.69).


3.5 Procedure for Multiple Peak Detection for DSB-AM Signals: Refinement for Closely Spaced Carrier Frequencies


If we find a method to add to the case of widely separated frequencies a test for closely spaced frequencies, then we could use the non-parametric spectral estimation and detection method:

    • If the minimum frequency separation is larger than fs/Ndata, the unwindowed or windowed periodogram provides the basis for an excellent frequency estimation.
    • If the minimum frequency separation is smaller fs/Ndata, a hypothesis test might be carried out that performs a test on the presence of at least a second spectral line to judge in favor of H1 when the periodogram fails to detect the secondary users due to the lack of widely separated spectral lines.


A DSB-AM signal with carrier has a small frequency gap between a carrier and each sideband. It can therefore be assumed that within this small bandwidth around the carrier, the valid signal model is that of a complex exponential in white Gaussian noise. Only outside this small bandwidth, there is ‘colored noise’, so noise with a non-flat spectrum, from the AM sidebands. In case of two almost overlapping DSB-AM sidebands, the carriers are approximately spaced up to 2·fs/Ndata apart. So, the H1 hypothesis has a signal model of two complex exponentials in white Gaussian noise in the close spectral vicinity of the two overlapping carriers. Therefore, similar to the case of closely spaced sinusoids in white Gaussian noise, DSB-AM signals can be detected in the same way. One approach is to compute the notch periodogram, with a notch placed at the frequency estimate of the strongest peak, and to judge the remaining spectrum after the influence of the strongest peak is removed due to the notch. If the remaining spectrum is flat in the vicinity of the estimated frequency of the strongest peak, no second peak was present in the original spectrum, so ND=1. If there are peaks (or valleys) in the remaining spectrum, there is (at least) a second peak in the original spectrum, and ND=2. The detection region for this test shall cover approximately the frequency interval 2·fs/Ndata. The number of bins depends on the zero padding factor employed, for no zero padding, there are three bins involved. If the largest peak within the detection region has significant magnitude above the noise floor, ND=2, else ND=1. The test can be expanded to more than two users by putting even more notch frequencies in the notch periodogram, but that is not the application here and not necessary, because two users mean a double transmission already. If the time signal is demodulated by the estimated maximum peak frequency, so that the peak appears at zero frequency, instead of using the maximum peak, the difference between the peak and its spectral component at the negative frequency can be used. The latter metric is more robust to interference close to the maximum frequency peak (the carrier of the strongest user).


The hypothesis test for closely spaced DSB-AM signals can be integrated in the above procedure for the detection of widely spaced DSB-AM signals by extending step 6 to a step 6a.


3.6 Procedure for Multiple Peak Detection for DSB-AM Signals Based on the Difference Spectrum Between Sidebands


The users' voice signals are not white. Instead, they can be treated as colored noise. Being real-valued, we have already observed that certain symmetry conditions apply: There are approximate symmetric upper and lower sidebands centered about the carrier frequency. No matter how the complex equivalent IQ baseband Equation (2.7) is computed, its spectrum contains the superposition of multiple equivalent baseband DSB-AM signals v(u)(k). The above 2-Step-Detector can be modified insofar that not only the carriers, visible as spectral peaks, of the DSB-AM users are cancelled, but the whole voiced sidebands. This can be achieved by computation of the difference spectrum between the sidebands that for each user are approximately conjugate symmetric about the carrier frequency offset in IQ-baseband.


To be specific, we have observed that each users' useful signal component after phase correction by φ(u) to get v(u)(k)·e−jφ(u) has a conjugate symmetric spectrum about the frequency Δf(u). Because we observe the first peak p1, the equations have to be rewritten replacing the user index u by the peak index of the first peak, p1.


For the first detected peak p1, the component of the belonging user can be written:












v

p
1




(
k
)


=


(

1
+


m

p
1


·


s

p
1




(
k
)




)

·

a

p
1


·

e

j
·

ϕ

p
1




·

e


j
·
2
·
π
·
Δ








f

p
1


·
k
·

T
s






,





k
=
0

,
1
,





,


N
data

-
1.





(
3.76
)







The signal vp1(k) has a conjugate symmetric Discrete Time Fourier Transform (DTFT) about Δfp1 after phase correction. This symmetry condition is stated in Equation (3.77). The phase φp1 that is required for the phase correction can be estimated, e.g. from the phase of the carrier of the DSB-AM signal. The carrier is present at Δfp1:













V

p
1




(

e

j





2






π
·

(


Δ






f

p
1



-
f

)

·

T
s




)


·

e


-
j







ϕ

p
1





=


(



V

p
1




(

e

j





2


π
·

(


Δ






f

p
1



+
f

)

·

T
s




)


·

e


-
j







ϕ

p
1





)

*


,




(
3.77
)







where the DTFT Vp1(ej2π·f·Ts) is given by











V

p
1




(

e

j





2


π
·
f
·

T
s




)


=





k
=

-













v

p
1




(
k
)


·

e


-
j






2


π
·
f
·

T
s

·
k





=




k
=
0



N
data

-
1










v

p
1




(
k
)


·


e


-
j






2


π
·
f
·

T
s

·
k



.








(
3.78
)







The useful signal component of user u is real-valued after phase- and frequency offset compensation:












v


p
1

,

de





mod

,
coh
,
1




(
k
)


=




v

p
1




(
k
)


·

e


-
j

·

ϕ

p
1




·

e



-
j

·
2
·
π
·
Δ








f

p
1


·
k
·

T
s





=


(

1
+


m

p
1


·


s

p
1




(
k
)




)

·

a

p
1





,





k
=
0

,
1
,





,


N
data

-
1.





(
3.79
)







Including the phase in the demodulation means that the signal is demodulated phase-coherently.


Thus, the DTFT of vp1,de mod,coh,1(k) is conjugate symmetric about frequency zero:

Vp1,de mod,coh,1(ej2π·f·Ts)=Vp1,de mod,coh,1*(e−j2π·f·Ts).  (3.80)


The phase φpi and the frequency offset Δfp1 that are required for the phase and frequency correction can be estimated, e.g. from the phase of the carrier of the DSB-AM signal. The carrier is present at Δf(u).


The useful signal component of user u can also be demodulated incoherently regarding the phase φp1:












v


p
1

,

de





mod

,
incoh
,
1




(
k
)


=




v

p
1




(
k
)


·

e



-
j

·
2
·
π
·
Δ








f

p
1


·
k
·

T
s





=


(

1
+


m

p
1


·


s

p
1




(
k
)




)

·

a

p
1


·

e

j
·

ϕ

p
1







,





k
=
0

,
1
,





,


N
data

-
1.





(
3.81
)







This is useful if only the magnitude spectrum shall be used for spectral subtraction.


Then, the DTFT can be written:












V


p
1

,

de





mod

,
incoh
,
1




(

e

j





2


π
·

(


Δ






f

p
1



-
f

)

·

T
s




)


·

e


-
j







ϕ

p
1





=



(



V


p
1

,

de





mod

,
incoh
,
1




(

e


-




j






2


π
·

(


Δ






f

p
1



+
f

)

·

T
s




)


·

e


-
j







ϕ

p
1





)

*

.





(
3.82
)







Each users' signal component Equation (3.76) is frequency corrected to get vp1,de mod,incoh,1(k) as in Equation (3.81). It has a symmetric magnitude spectrum about the frequency zero and, therefore, a symmetric periodogram about the frequency zero:


The symmetry condition follows from Equation (3.82):












V


p
1

,

de





mod

,
incoh
,
1




(

e

j





2


π
·

(


Δ






f

p
1



-
f

)

·

T
s




)


·

e


-
j







ϕ

p
1





=




(



V


p
1

,

de





mod

,
incoh
,
1




(

e






j





2


π
·

(


Δ






f

p
1



-
f

)

·

T
s





)


·

e


-
j







ϕ

p
1





)

*






V


p
1

,

de





mod

,
incoh
,
1




(

e

j





2


π
·

(


Δ






f

p
1



-
f

)

·

T
s




)





=






V


p
1

,

de





mod

,
incoh
,
1




(

e

j





2


π
·

(


Δ






f

p
1



-
f

)

·

T
s




)










V


p
1

,

de





mod

,
incoh
,
1




(

e






j





2


π
·

(


Δ






f

p
1



-
f

)

·

T
s





)




2


=






V


p
1

,

de





mod

,
incoh
,
1




(

e

j





2


π
·

(


Δ






f

p
1



-
f

)

·

T
s




)




2

.







(
3.83
)







The properties Equation (3.77), Equation (3.80) and Equation (3.82) can now be employed for cancelling the voice signals from the spectrum. If only the magnitude spectrum shall be used for spectral subtraction, each users' signal component Equation (3.76) is frequency corrected to get vp1,de mod,incoh,1(k) as in Equation (3.81). As follows from Equation (3.82), it has a symmetric magnitude spectrum about the frequency zero and, therefore, a symmetric periodogram about the frequency zero. The advantage of spectral subtraction based on the magnitude spectrum is that the phase φp1 does not need to be estimated, only the frequency offset Δfp1 needs to be estimated, e.g. from the phase of the carrier of the DSB-AM signal.


The idea is now to estimate the frequency offset Δfp1 and, if not using the magnitude spectra only, the phase φp1 of each significant user and make use of the complex symmetry properties Equation (3.80) or, alternatively, Equation (3.77) or Equation (3.83), to cancel not only the carrier of each user as in the 2-step detector, but also to cancel the voiced sidebands. Cancellation of at least the voiced sidebands of the strongest user should be sufficient in order to make the carriers of lower power DSB-AM signals visible in the spectrum, and thus, detectable. The ‘noise floor’ that the pure peak detector observed is diminished by this approach, so that also users' signal components hidden in the voiced sidebands of other users become detectable and better detection results are achievable.


When using a DFT-related spectral estimate, the advantage of coherent demodulation is that the spectral samples of the DFT of each user demodulated by its carrier frequency are always symmetric and can be cancelled easily. If incoherent demodulation is used, the DFT samples of each user are only symmetric if the frequency of the peak of the users corresponds to the on-bin-case. It the frequency corresponds to an off-bin-case, the spectral samples need to be interpolated. Therefore, the frequency shift to an ‘on-bin’ frequency or a ‘mid-bin’ frequency, as done by demodulation of the receive signal with the carrier in the time domain, avoids interpolation, and the spectral samples can be directly subtracted.


That means that a shift by an arbitrary (integer) bin Δp1,int can be performed, plus the inclusion of the fractional bin Δp1,frac, to achieve either the ‘on-bin’ case or the ‘mid-bin’ case. In the time domain, the following demodulation has to be performed:


















r
~

w



(
k
)


=



r
w



(
k
)


·


e



-
j

·
2
·
π










Δ
~



p
1

·
frac






+


Δ
~



p
1

·
int




N
FFT



k




(

·

e


-
j

·


ϕ
^


p
1





)




,





(
3.84
)










with












Δ


p
1

,
frac


=

{





Δ




f
^


p
1


·

T
s

·

N
FFT



-

round


(

Δ




f
^


p
1


·

T
s

·

N
FFT



)






for











on



-


bin


-



case












Δ




f
^


p
1


·

T
s

·

N
FFT



-






(


round
(


Δ




f
^


p
1


·

T
s

·

N
FFT



-
0.5

)

+
0.5

)







for












m

id




-


bin


-




case
'












(
3.85
)







where the integer bin part {circumflex over (Δ)}p1,int can be any integer number.


The phase correction in Equation (3.84) is not required if we work on magnitude spectra |{tilde over (R)}w(n)| instead of {tilde over (R)}w(n), with {tilde over (R)}w(n)=DFTNFFT{{tilde over (r)}w(k)}, where it is understood the NFFT-DFT-Operator DFTNFFT{·} includes zero-padding of the sequence {{tilde over (r)}w(k)}k=0Ndata−1 by NFFT−NDFT trailing zeros.


2-Step-Detector to Cancel Voiced Sidebands of DSB-AM Signals in the Frequency Domain


Step 1:


Estimate frequency offset of the strongest peak. Optionally, if work on the complex spectral samples is intended, estimate also the phase of the strongest peak.


Step 2:


Demodulate the time domain signal by the estimated frequency offset. Optionally, if work on the complex spectral samples is intended, demodulate also with the phase. The sidebands of the voice components are conjugate symmetric about the frequency zero now.


Step 3:


Compute the difference spectrum between the spectral samples in positive bin direction and in negative bin direction. It is possible to estimate the spectral components directly, subtract only the magnitudes, or subtract the differences of the periodogram samples. Afterwards, the magnitude of the result should be computed, so that all spectral differences are positive (alternatively, negative for the negative magnitude). The strongest user has thus been cancelled, the second strongest user can be detected, e.g. by detecting its peak in the spectrum.


2-Step-Detector to Cancel Voiced Sidebands of DSB-AM Signals in the Time Domain


Step 1:


Estimate frequency offset of the strongest peak and the phase of the strongest peak.


Step 2:


Demodulate the time domain signal by the estimated frequency offset and rotate the complex phasor in the complex IQ-plane using the phase estimate of the carrier.


Step 3:


Cancel the strongest user signal using the projection operator Equation 3.9. This can be accomplished e.g. if in Step 2, the phase estimate is used to correct the carriers phase offset to zero, the projection is done by computing the imaginary part of the signal. The strongest user has thus been cancelled, the second strongest user can be detected, e.g. by detecting its peak in the spectrum.


4 Statistical Considerations: Computation of the Detector Threshold when Using the Projection Approach in the Spectral Domain


The noise n(k)=n′(k)+j·n″(k) is assumed zero-mean circular symmetric white Gaussian with variance E{|n(k)|2}=σn2n′2n″2. The variance of its real- and imaginary part is one half of the variance of the complex noise:











σ

n


2

=


E


{






n




(
k
)









2

}


=


σ
n
2

2



,


σ

n


2

=

E


{






n




(
k
)




2

=


σ
n
2

2


}



,





k
=
0

,
1
,





,


N
data

-
1.





(
4.1
)







Now, if the projection approach is used, we get:

P{p·nde mod(k)}=Im{n(ke−j·(2·π·Δ{circumflex over (f)}(u)·k·Ts+{circumflex over (φ)}(u))}=Im{ñ(k)}, k=0,1, . . . ,Ndata−1.   (4.2)


This means that the noise is demodulated by a complex rotation and than the imaginary part is taken. Rotation of a circular symmetric complex vector does not change its variance:











σ


n
~



2

=


E


{







n
~





(
k
)









2

}


=


E


{




Im


{


n
~



(
k
)


}




2

}


=


σ
n
2

2




,





k
=
0

,
1
,





,


N
data

-
1.





(
4.3
)







the variance of the noise vector is divided by two, and the useful signal variance is also divided by two:


It can be shown that the samples of the Ndata-DFT of a zero-mean circular symmetric Gaussian noise vector of length Ndata with variance σn2 are independent zero-mean Gaussian random variables with variance Ndata·σn2. The false alarm rate can be computed, provided that either no primary user is present or that the primary user is perfectly cancelled. In either case, under the H0 hypothesis, the above noise vector is present.


ñ(k) has the same variance as n(k), because the rotation of a circular symmetric Gaussian random variable results in a Gaussian random variable with the same variance.


After spectral subtraction, the noise variance of the DFT-samples of the difference spectrum is doubled: {tilde over (σ)}n2=2·σn2, because the subtraction of two independent Gaussian distributed random variable with zero mean and variance σn2 each yields a Gaussian distribution with zero mean and the addition of the variances of the two samples, so {tilde over (σ)}n2. When performing e.g. a Neyman-Pearson test, the test statistic consists of the DFT samples.


Thus, the detection problem can be reformulated for the spectral subtraction

















H
0

:


r

clean
,
l




(
k
)



=


n
~







(
k
)



,

k
=

,
1
,





,


N
data

-
1

,





(
4.4
)










H
1

:


r

clean
,
l




(
k
)



=





u
=
2

U




(

1
+


m

(
u
)


·


s

(
u
)




(
k
)




)

·

a

(
u
)


·

e

j
·

ϕ

(
u
)




·

e


j
·
2
·
π
·
Δ








f

(
u
)


·
k
·

T
s






+


n
~


k



)

,









U

1

,

k
=
0

,
1
,





,


N
data

-
1.





(
4.5
)







Here, rclean,1(k) is the time domain signal where the primary DSB-AM user has been removed by any of the methods described above.


An appropriate test statistic T(Δf(2)) is the periodogram










1

N
data











n
=
0



N
data

-
1






r

clean
,
1




(
k
)


·

e



-
j

·
2
·
π
·
Δ








f

(
2
)


·
k
·

T
s








2

.





(
4.6
)







The Generalized Likelihood Ratio Test (GLRT) for the search of the secondary user is












f


(



r
_

;

a

(
2
)



,

Δ






f

(
2
)



,

H
1


)



f
(







r
_

;

,

H
0


)







H
1





>




<





H
0





γ

,




(
4.7
)







where γ is the threshold of the test.


The GLRT can be shown to be










max

Δ






f

(
2
)







1

N
data










k
=
0



N
data

-
1






r

clean
,
1




(
k
)


·

e



-
j

·
2
·
π
·
Δ








f

(
2
)


·
k
·

T
s








2






H
1





>




<





H
0







ln


(
γ
)


·
2
·



σ
~

n
2

.







(
4.8
)







An appropriate test statistic for the computer is the discretized periodogram T(n)










T


(
n
)


=


1

N
data











n
=
0



N
data

-
1






r

clean
,
1




(
k
)


·

e


j2





π





kn


N
data











2


.






(
4.9
)







Under the H0 hypothesis, the Ndata-DFT of rclean,1(k)=ñ(k) consists of independent complex Gaussian noise samples with zero mean and variance Ndata·{tilde over (σ)}n2=Ndata·2·σn2.


The GLRT using the DFT can be written










max
n




T


(
n
)







H
1





>




<





H
0







ln


(
γ
)


·
2
·



σ
~

n
2

.







(
4.10
)







Ignoring the max-operation, the false alarm probability for each DFT bin is then with γ′=ln(γ)·2·{tilde over (σ)}n2













P

FA
,
bin


=



Pr


{



T


(
n
)


>

γ



;

H
0


}








=



Pr


{




T


(
n
)




σ
~

n
2


>


γ




σ
~

n
2



;

H
0


}








=




Q

χ
2
2




(


γ




σ
~

n
2


)









=



exp


(


γ



2
·


σ
~

n
2



)



,


γ


=

2
·


σ
~

n
2

·


ln


(
γ
)


.










(
4.11
)







The Detection problem at hand is the detection of a DSB-AM signal in the difference spectrum. By computation of the difference spectrum, the noise power is doubled. The false alarm probability is determined by the detector bandwidth in bins, termed L. L corresponds to the number of bins where the spectral peak of the DSB-AM signal carrier might occur.


The probability of false alarm is computed

PFA=1−(1−PFA,bin)L   (4.12)


and, using Eq. (4.11), the threshold is computed

γ′=2·{tilde over (σ)}n2·(−1)·ln(1−(1−PFA,bin)L)   (4.13)


The false alarm probability PFA can only be computed following Eq. (4.12) if no interpolation is used and no zero padding:

    • Using interpolation, the noise amplitude is slightly increased, and PFA is also increased.
    • Using zero padding, the noise samples are correlated, and the computation of PFA is complicated. PFA can be approximated using an additive small positive constant that depends on the zero padding factor in Eq. (4.11).


If the detector bandwidth is smaller than the FFT size, then, the detector bandwidth in Hz is the Nyquist frequency times L. If the maximum carrier frequency offset is larger than the Nyquist frequency, a peak might occur in the second Nyquist interval. It is then observed at the corresponding negative frequency of the Nyquist interval. If e.g. fs=8 kHz, the Nyquist frequency is 4 kHz. If the carrier frequency offset is 4.1 kHz, the peak is observed at −3.9 kHz. This is not a problem, if not a second user occurs with said negative carrier frequency offset of −3.9 kHz.


To sum up:

    • If the detector bandwidth L can be diminished because the maximum possible carrier frequency offset is smaller than the Nyquist bandwidth, this should be done to decrease the false alarm probability.
    • If the detector bandwidth L exceeds the FFT size, then L should be fixed to the FFT size. Peaks occurring at frequency larger than the Nyquist frequency are detected without loss in detection probability, provided that not a second user has a frequency offset with negative frequency that is on the same position as the first user.


      5 Detection of Double Transmissions in Multicarrier/Climax-Mode


If the detector for double-transmission receives such a CLIMAX signal made up of multiple spectrally shifted signal copies, it has to be designed to cope with them in so far that these multiple carriers, although transmitted from different transmitters, stem from only one user station and are thus not to be treated as double transmission. Thus, treating a CLIMAX signal as a double transmission would be a false alarm. This false alarm has to be avoided with high probability (i.e., occur with low probability): A CLIMAX signal shall not trigger the detector for double transmission. Therefore, the detector design has to take the CLIMAX signal into account, either by being robust to CLIMAX or by having the knowledge if and which CLIMAX mode is currently in use, and might possibly occur.


The detector shall trigger and thus, signal a double transmission with high probability:

    • if both, a CLIMAX signal and at least one airborne user, are present. The CLIMAX signal is said to be present if at least one signal component is detected.
    • two airborne users are present.


The detector shall not trigger:

    • if only one CLIMAX signal (with noise) is present, represented by a least one CLIMAX signal component.
    • if only one airborne user (with noise) is present.
    • If only noise is present.


There are CLIMAX-modes that have a signal copy present at the nominal carrier frequency (case A), and there are others that have no copy present (case B). E.g., the 3 and 5 carrier CLIMAX mode belong to case A, they have a signal component in the middle partial frequency band, whereas the 2 and 4 carrier CLIMAX modes belong to case B in Table 2.3.


Our approach to keep Multicarrier/CLIMAX-transmission from triggering the detector is:

    • To use the knowledge about different spectral occupation of the CLIMAX signal copies compared to non-CLIMAX components: Non-CLIMAX transmissions are always received close to the nominal carrier frequency, whereas CLIMAX signals have known frequency offsets from the carrier, as outlined above in Table 2.3, and can be separated spectrally by filtering.
    • Distinguishing CLIMAX- from non-CLIMAX-transmission by spectral separation has to take into account if a CLIMAX-mode that belongs to case A (signal copy present at nominal carrier frequency) is possible, or not.


If yes:

    • If a CLIMAX-mode that has a spectral copy at the nominal carrier frequency fc might be transmitted by a ground station. This is the case for 3 and 5 carrier CLIMAX, see Table 2.3. If the transmitted spectral copy can be received with sufficient signal power, the detector cannot distinguish this CLIMAX signal copy from an airborne user's signal that might also be received close to nominal carrier frequency fc. To solve this problem, if 3 or 5 carrier CLIMAX is transmitted, it should be configurable by the user if:
      • CASE 1: at least two signal copies need to be detected close to the nominal carrier frequency (1 CLIMAX and 1 airplane, or two airplanes)
      • CASE 2: one signal needs to be detected close to the nominal carrier frequency


and a pilot signal lies in the spectral separation of CLIMAX and non-CLIMAX transmission


Our way not to detect CLIMAX as a double transmission lies in the limited frequency error of each CLIMAX transmitter; all spectral copies of a CLIMAX signal can be well separated spectrally. Thus, a detection of a carrier in a certain band can be linked to an airborne user, a CLIMAX signal component, or, sometimes, to both.


Now, our idea is to compute the frequency limits that can occur in the worst case. These frequency limits might be calculated assuming a maximum allowed Doppler frequency and taking into account the maximum frequency offset ratings possible, e.g. those standardized in the ETSI norm [ETSI300676-1] (Electromagnetic compatibility and Radio spectrum Matters (ERM); Ground-based VHF hand-held, mobile and fixed radio transmitters, receivers and transceivers for the VHF aeronautical mobile service using amplitude modulation; Part 1: Technical characteristics and methods of measurement, ETSI EN 300 676-1 V1.4.1 (2007-04)). In any case, some spectral guard bands should be included in order to prevent radios from slightly exceeding these limits from triggering the detector for double transmission. Thus, taking into account the frequency offsets, valid frequency bands can be computed where a spectral copy might occur, and other bands, where a copy might not occur. Now, a detector working in the frequency domain can work only on these valid bands.


Having computed valid frequency bands, the users can be separated by filtering out the bands that are valid for the individual CLIMAX mode, and performing feature detection in theses filtered bands. When filtering, the filter at the nominal carrier frequency has to be computed taking into account the worst case frequency offset of the mobile user, which is larger than the carrier frequency offset of the ground station. The other filters can be computed from the maximum frequency offset ratings [ETSI300676-1].


5.1 If CLIMAX/Multicarrier is Signalled to the Detector:


We propose some strategies for the detection of a double transmission, when the exact CLIMAX/Multicarrier mode is signalled to the detector.


We start with low complexity strategies that are suboptimum in so far that the detection interval covers only a limited numb.


The procedure leading to decision about a double transmission can be the following:


Case A:






    • Step 1: Detect the strongest user within the partial frequency band IR1 around the carrier frequency, so after down-conversion to baseband, around the frequency zero. Test if this signal component is significant, e.g. by estimating its power or the magnitude of its peak above the noise floor. Search for a second strongest user inside the Nyquist band. Either subtract the peak spectrally, so that an AM signal without carrier is present with noise. Alternatively, the signal can be demodulated to zero frequency, followed by spectral subtraction of the sidebands. For this, the frequency peak detector above can be used. If there is a user signal present, a spectral subtraction can be performed to search for the second user. If a significant second signal is found within this band, a double transmission is decided for.

    • Note: Under regular circumstances, the detected signals can either be two mobile users or a mobile user and a ground station.

    • Step 2: Optionally, to cover the case that the copy of the CLIMAX signal within middle partial frequency band is to weak due to fading, the signal in this band can be frequency compensated by its frequency offset, and be cross-correlated with the also frequency offset compensated second strongest CLIMAX signal copy present. For this, the spectrum has to be searched for a significant second user outside the middle partial frequency band. If both are uncorrelated, the signal detected first around frequency zero is not a CLIMAX signal component, but belongs to an interferer, and the detector shall trigger. If both signals are correlated, they are both CLIMAX signal copies, and the detector shall not trigger. During the correlation, several lags have to be tested, because the signal copies within each CLIMAX partial band can be temporally shifted, because the stem from different transmitters at different geographical positions. This concludes the test. This optional additional comparison between signal components in different partial frequency bands improves the detection performance.


      Case B:

    • Step 1: Perform Step 1 as under “Case A”. The same holds here, so if there is more than one user, within this partial frequency band, the detector decides for a double transmission.

    • Note: Under regular circumstances, the detected signals can only be two mobile users, because in this CLIMAX mode, the ground station has no signal copy in the partial frequency band around zero.

    • Step 2: If a single significant user is found in the partial frequency band around frequency zero, it stems from a single mobile user, because for Case B, CLIMAX has no component in this band. An interference of this mobile user with a possible CLIMAX signal is to be tested. To achieve this, the remaining partial frequency bands have to be checked for significant signal components. This can be achieved by testing in all remaining partial frequency bands the largest user signal, alternatively the largest spectral component for significance, or perform another suitable feature detection to distinguish climax signal copies from the noise in these partial frequency bands.





Note that all non-CLIMAX modes, where no multiple carriers are used, are similar to case A, only that the additional copies are missing. Non-CLIMAX modes can therefore be treated described in Case A without performing step 2. The initial limitation to a partial frequency band improves the detection performance by eliminating those false alarm detections based on spectral components outside the maximum frequency ratings stated in [ETSI300676-1].


5.2 If CLIMAX/Multicarrier is not Signalled to the Detector: CLIMAX Auto Detection


If the CLIMAX/Multicarrier mode cannot be signalled to the detector, or if the interference from other CLIMAX/Multicarrier stations is severe, the detection of interferers is still possible. This mode is termed CLIMAX Auto detection not because the mode is estimated, but because detection of an interferer can still be performed.


The procedure is as follows:

    • Step 1: Perform Step 1 as under “Case A”. The same holds here, so if there is more than one user, within the partial frequency band around the frequency zero, the detector decides for a double transmission. If there is no such user, then decide against a double transmission. If there is only a single user, then proceed with Step 2 below.
    • Note: The detected signals can be two mobile users, two close ground stations with a bad frequency planning having a CLIMAX mode with signal copy at the partial frequency band around zero (case A), or a mixture of mobile stations and ground station having partial frequency band around zero (case A).
    • Step 2: Perform a procedure similar to Case B, Step 2: An interference of the signal component detected in the partial frequency band round zero frequency with a possible CLIMAX signal is to be tested. To achieve this, the remaining possible frequency bands have to be checked for significant signal components. Here, the remaining possible frequency bands are those that can be covered by a signal copy present in any possible CLIMAX mode. The test can be achieved by testing in all remaining possible partial frequency bands the largest user signal, alternatively the largest spectral component on significance in these bands, or perform another suitable feature detection to distinguish climax signal copies from the noise in these partial frequency bands. An easier, but slightly worse approach is to ignore all remaining partial frequency band limits and just search outside the partial frequency band around zero frequency offset error. If no significant user is detected in these remaining partial frequency bands, the detector decides for no interference present. If there is a significant user signal detected, then proceed to step 3.
    • Step 3: It is still unknown if the additional signal component found in the remaining partial frequency bands belongs to a CLIMAX signal of case A. To find out, the additional signal component is spectrally shifted to zero frequency, and cross-correlated with the spectrally demodulated primary signal detected in step 2. If the correlation is larger than a value that depends on the false alarm probability, the detector decides for double transmission present, otherwise against it.


Note: Spectral transformations (Fourier) and filtering are linear operators. As such, their order can be interchanged: Instead of first filtering out the partial frequency bands and then performing individual DFT-operations, the DFT can be done first, and then the ‘filtering’ is done by observing only certain bin indices as subbands. Therefore, the partial frequency bands can be computed from a filter that has a bandwidth large enough to see all CLIMAX components. The filtering is then done spectrally by observing signals between various frequency components that can be computed. This approach has the following advantages:


1) Only a single lowpass filter is required that covers the full bandwidth of interest, including CLIMAX components. Filtering first, however, requires multiple filters in order to separate the partial frequency bands.


2) Only a single DFT is required to produce the spectrum. Additional DFT might be required only for the difference spectrum computation, if desired.


3) The approach with a single filter allows an easy reconfiguration in hardware or software, because not multiple filters need to be computed, and there is only one structure. Between different CLIMAX modes, the only changes are in the decision logic and in the detection and decision process at the end of the chain.


If, however, the received signal is processed in a nonlinear fashion as in [LIPP10], before using spectral transformations, such as the linear DFT-Operation, the partial frequency bands have to be filtered out of the input signal first, so before the DFT-Operation. The reason is that the nonlinearity generates spectral lines outside the partial frequency band where the original signal resides. Therefore, nonlinear pre-processing requires a filtering of the partial frequency bands by individual filters, leading to increased computation requirements to perform the filtering.


6 Differentiating Airborne Double Transmissions from Mixed Airborne-Ground Station Caused Double Transmission by Masking of Events


As already mentioned in the introductory chapter, it is interesting to know as to whether a double transmission is caused by (at least) two airborne users (case A) or a transmission including a ground station (case G). The reason is that if the ground user interferes with an airborne user, the airborne user might notice this more easily, because he gets no response on his message. Also, this case occurs quite often and is not so hazardous as if two airborne users interfere.


Hence, according to an embodiment a receiver, detecting double transmission and signalling in response hereto a double transmission event to the VCS control center, is extended within the VCS by a unit named Event Masking Logic (EML) that combines the information that a double transmission has been detected with the information that a ground radio is currently transmitting which (at least likely) causes the double transmission.


A differentiation can be easily achieved by considering that in case G, there was an active transmission from a radio at the ground station while at the same time, at least one receive radio (receiver) detected a double transmission. If a receiver has detected a double transmission during the active transmission of the ground station, this additional information is present in the VCS. Thus, this information can be used to mask all double transmission events that occurred during or slightly after a transmission from a ground station radio connected to the VCS. Accordingly, in an embodiment the EML is adapted for signaling the event to a controller, in particular an Air Traffic Controller which in response hereto issues an operator observable signal, e.g. an acoustic and/or visual signal.



FIG. 4 shows an example of masking of a double transmission caused by a transmission by a ground station (ground radio transmission).

    • Event: A double transmission is detected, but due to the concurrent transmission of the ground station (overlapping in time t with the transmission of the airborne transmission (referred to as airborne radio 1 transmission in FIG. 4) it can be assumed and is determined by the EML that an airborne-based double transmission did not take place.



FIG. 5 shows an example of a masked double transmission caused by a ground radio, followed by a double transmission caused only by at least two airborne users:

    • First Event: A double transmission is detected, an airborne-based double transmission is not detected because the double transmission occurs due to the concurrent transmission of the ground station.
    • Second Event: A double transmission is detected, an airborne-based double transmission is also detected since after the end of the emission of the ground station only transmissions of airborne stations (i.e. airborne transmissions) are involved.


It is important to know that the time axis is in reference to the location of the event masking mechanism within the VCS. It will be typically located in the VCS network at a means that is able to interface both the transmitting ground radio as well as the receiving radios equipped with the basic double transmission detector.


A schematic of the Event Masking Logic 600 (EML) is shown in FIG. 6.


The input signals “double transmission detected” 602 from a receiver (e.g. a receiving ground station) and “active ground radio transmission” 604 are known to the VCS network.


Both signals might be time aligned at the inputs or delayed to suit the algorithm's detection performance. For example, an off-delay timer (not shown in FIG. 6) is on for the fixed period of time, the post-timing delay, after the “active ground radio transmission” input signal has already turned off. It is needed to align the two input signals if the basic double transmission detector needs a time so long for detection that the ground radio transmission is already over. In accordance with embodiments of the herein disclosed subject matter, the EML 600 is adapted for outputting a first output signal 606 indicating the event of a double transmission with a ground station involved if the active ground radio transmission signal 604 indicates that there is an active ground radio transmission and for outputting a second output signal 608 indicating the event of a double transmission where only airborne stations are involved if the active ground radio transmission signal 604 indicates that there is no active ground radio transmission.


The Event Masking Logic can be located at the Controller Working Position (CWP) or elsewhere in the VCS network a means suitable the capture the signals from a receive radio signaling “double transmission detected” and having the information of an active ground radio transmission.



FIG. 7 shows a communication system 700 according to embodiments of the herein disclosed subject matter.


The communication system 700 comprises a transmitter 702 with at least one transmit antenna 704 and a receiver 706 with at least one receive antenna 708. The receiver may be part of a receiving ground station and is, in accordance with an embodiment, communicatively coupled, 709, to a controller 710, e.g. to a Air traffic control. According to an embodiment, the communication system 700 is a voice communication system (VCS). Accordingly, in an embodiment, a signal 712 transmitted by the transmitter 702 to the receiver 706 is a Double Side-Band full carrier Amplitude Modulated (DSB-AM) voice signal. However, it should be understood that such a signal type is only used in an exemplary implementation of the herein disclosed subject matter where embodiments disclosed herein are useful. However, a person skilled in the art will readily recognize that the herein disclosed subject matter is applicable to numerous other situations.


It should further be noted that a processing chain, a controller or a receiver as disclosed herein is not limited to dedicated entities as described in some embodiments. Rather, the herein disclosed subject matter may be implemented in various ways and in various granularity while still providing the specified functionality.


According to embodiments of the invention, any suitable entity (e.g. components, units and devices) disclosed herein, e.g. the units described with regard to FIG. 2 and FIG. 3, are at least in part provided in the form of respective computer programs which enable a processor device to provide the functionality of the respective entities as disclosed herein. According to other embodiments, any suitable entity disclosed herein may be provided in hardware. According to other—hybrid—embodiments, some entities may be provided in software while other entities are provided in hardware.


It should be noted that any entity disclosed herein (e.g. components, units and devices) are not limited to a dedicated entity as described in some embodiments. Rather, the herein disclosed subject matter may be implemented in various ways and with various granularity on device level and/or software module level while still providing the specified functionality. Further, it should be noted that according to embodiments a separate entity (e.g. a software module, a hardware module or a hybrid module) may be provided for each of the functions disclosed herein. According to other embodiments, an entity (e.g. a software module, a hardware module or a hybrid module (combined software/hardware module)) is configured for providing two or more functions as disclosed herein. According to still other embodiments, two or more entities (e.g. part, portion, surface, component, unit, structure or device) are configured for providing together a function as disclosed herein.


According to an embodiment, the controller comprises a processor device including at least one processor for carrying out at least one computer program product or program element which may correspond to a respective software module.


It should be noted that the term “comprising” does not exclude other elements or steps and the “a” or “an” does not exclude a plurality. Also elements described in association with different embodiments may be combined. It should also be noted that reference signs in the claims should not be construed as limiting the scope of the claims.


Further, it should be noted that while the exemplary processing chains in the drawings include a particular combination of several embodiments of the herein disclosed subject matter, any other combination of embodiment is also possible and is considered to be disclosed with this application.


In summary, the herein disclosed subject matter includes in particular the following embodiments:


1. Method for the detection of more than one signal contained in a receive signal as described under “a 2-step procedure for detection of widely spaced DSB-AM”, where the signal is down-converted using the carrier frequency offset of the strongest user contained in the receive signal, whereby the strongest user is cancelled using a projection approach in the time domain, allowing for the detection of a possible secondary user.


2. Method following embodiment 1, whereby, except for the down-conversion sing the carrier frequency offset of the strongest user, only linear operations are carried out prior to the cancellation in the time or frequency domain.


3. Method using at least one of embodiments 1 or 2, where the receive signals contains a carrier signal component in an amplitude modulated signal.


4. Method using at least one of embodiments 1 to 3, where the strongest user allows for its cancellation thanks to its real-valuedness, so that it can be interpreted as a straight line in the complex inphase-quadrature (IQ) plane.


5. Method using at least one of embodiments 1 to 4, where the signal rest after cancellation of the strongest user allows a user to judge in favor or against of at least one additional secondary, weaker user.


6. Method using at least one of embodiments 1 to 5, where the means for judging for or against at least a secondary user is automated by a statistical test.


7. Method using at least one of embodiments 1 to 6, where the statistical test is a statistical test for the presence of cyclo-stationary in the signal rest, or a harmonic detector in noise on the signal rest, or a non-circularity test.


8. Method for the detection of more than one signal contained in a receive signal as described under “2-Step-Detector to Cancel Voiced Sidebands of DSB-AM In The Frequency Domain”, where the signal is down-converted using the carrier frequency offset of the strongest user contained in the receive signal, whereby the strongest user is cancelled using a subtraction of the conjugate symmetric sidebands of the Fourier transform of the signal in the frequency domain, allowing for the detection of at least one possible secondary user; or


Method for the detection of more than one signal contained in a receive signal as described under “Refined 2-Step-Detector to Cancel Voiced Sidebands of DSB-AM In The Time Domain”, where the signal is down-converted using the carrier frequency offset of the strongest user contained in the receive signal, whereby the strongest user is cancelled using a subtraction of the conjugate symmetric sidebands of the Fourier transform of the signal in the frequency domain, allowing for the detection of at least one possible secondary user.


9. Method following embodiment 8, whereby, except for the down-conversion sing the carrier frequency offset of the strongest user, only linear operations are carried out prior to the subtraction of the sidebands in the frequency domain, where the symmetric sidebands are cancelled.


10. Method following at least one of embodiments 8 or 9, whereby the sidebands of a periodogram are subtracted in the frequency domain.


11. Method following at least one of embodiments 8 to 10, whereby the sidebands of a magnitude spectrum are subtracted in the frequency domain.


12. Method for the detection of more than one signal contained in a receive signal as described under “2-Step-Detector to Cancel Voiced Sidebands of DSB-AM In The Time Domain”, where the signal is down-converted using the carrier frequency offset of the strongest user contained in the receive signal, whereby the strongest user is cancelled using a projection approach in the time domain, allowing for the detection of at least one possible secondary user.


13. Method following embodiment 12, whereby, except for the down-conversion sing the carrier frequency offset of the strongest user, only linear operations are carried out prior to the cancellation using a projection approach in the time domain.


14. Method following at least one of the preceding embodiments, whereby the signal after cancellation of the strongest user in the time domain or frequency domain is tested for additional CLIMAX users in their respective frequency bands.


15. Method for the detection of different double transmission events by combining the basic detection of double transmissions with additional information present within the VCS, in particular in combination with at least one of embodiments 1 to 14.


16. Method following embodiment 15, for the detection of the event that only airborne users are involved in a double transmission by a means that combines the information “double transmission detected” and “active ground radio transmission” by using logic combining of the signals present within the VCS.


17. Method following embodiment 16, that signals the event to the Air Traffic Controller by a suitable means (acoustic, visual or other).


18. Method following embodiment 15, for the detection of the event that a ground station is involved in a double transmission by a means that combines the information “double transmission detected” and “active ground radio transmission” by using logic combining of the signals present within the VCS.


19. Method following embodiment 18, that signals the event to the Air Traffic Controller by a suitable means (acoustic, visual or other).


20. Detection of CLIMAX signals by detection of the spectral peaks caused by a DSB-AM carrier, as described in chapter 5.1.


21. Detection of CLIMAX signals by detection of the spectral peaks caused by a DSB-AM carrier, as described in chapter 5.2.


Further, in order to recapitulate some of the above described embodiments of the present invention one can state:


Disclosed is a method for the detection of more than one signals contained in a receive signal, the method comprising: down-converting the receive signal, thereby providing a down-converted signal in a complex IQ base band; at least partially cancelling the strongest user in the down-converted signal, thereby allowing for the detection of a possible secondary user (e.g. Down-converting the receive signal by either the frequency-offset of the strongest user to zero frequency or by a frequency that lets the carrier of the strongest user reside on a frequency bin or in between two frequency bins).


LITERATURE



  • [STO05] P. Stoica, R. Moses, “Spectral Analysis of Signals,” Prentice Hall, Upper Saddle River, New Jersey, 2005.

  • [RM01] R. Martin, “Noise Power Spectral Density Estimation Based on Optimal Smoothing and Minimum Statistics,”IEEE Transaction on speech and audio processing, Vol. 9, No. 5, July 2001.

  • [WHA71] A. D. Whalen, “Detection of Signals in Noise,” Academic Press, New York, 1971.

  • [ETSI300676-1] Electromagnetic compatibility and Radio spectrum Matters (ERM); Ground-based VHF hand-held, mobile and fixed radio transmitters, receivers and transceivers for the VHF aeronautical mobile service using amplitude modulation; Part 1: Technical characteristics and methods of measurement, ETSI EN 300 676-1 V1.4.1 (2007-04).

  • [ANNEX10] ANNEX 10 to the Convention on International Civil Aviation Aeronautical Telecommunications, Volume III, 2nd edition 2007, part 2: voice communications systems, including amendment 85.

  • [ANNEX10prop] Luc Deneufchätel and Jacky Pouzet, “Annex 10 amendments to cover Climax operation on DSB-AM with 8.33 kHz channel spacing”, AERONAUTICAL COMMUNICATIONS PANEL (ACP), Working Group M (ACP WG-M), Montreal, Canada, 2006.

  • [Lipp10] Friedrich Lipp, “Method and device for detecting simultaneous double transmission of AM signals”, US patent No. 2010/0067570 A1, published Mar. 18, 2010.

  • [Yang08] Bin Yang, “A Study Of The Inverse Short Fourier Transform,” Proc. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on, pp. 3541-3544, Mar. 31, 2008-Apr. 4, 2008.

  • [Schou92] J. Schoukens, R. Pintelon, H. van Hamme, “The interpolated Fast Fourer Transform: A comparative study,”IEEE Transaction on instrumentation and measurement, Vol. 41, No. 2, April 1992.

  • [Kay89] S. M. Kay, “A fast and accurate single frequency estimator”, IEEE Transactions on Acoustics, Speech and Signal Processing 37, 1987}1990.

  • [Ume06] S. Umesh, D. Nelson, “Computationally Efficient Estimation of Sinusoidal Frequency at Low SNR”, Proceedings of the 1996 IEEE International Conference on Acoustics Speech and Signal Processing, Atlanta (Ga.), 2797}2800.


Claims
  • 1. A method for the detection of more than one signals contained in a receive signal, the method comprising: down-converting the receive signal, thereby providing a down-converted signal in a complex inphase-quadrature (IQ) base band; andat least partially cancelling a strongest user in the down-converted signal, thereby allowing for the detection of a possible secondary user;wherein the strongest user is at least partially cancelled by (i) using a projection approach in the time domain; or,(ii) using a subtraction of conjugate symmetric sidebands of a Fourier transform of the down-converted signal in the frequency domain.
  • 2. The method according to claim 1, wherein, before the strongest user is at least partially cancelled by using the projection approach, the down-converting of the receive signal is performed by using the carrier frequency offset of the strongest user contained in the receive signal such that in the base band the carrier of the strongest user is at zero frequency.
  • 3. The method according to claim 2, whereby except for complex mixing by a frequency offset or fractional frequency offset only linear operations are carried out prior to the cancellation in the time domain.
  • 4. The method according to claim 2, where the receive signals contains a carrier signal component in an amplitude modulated signal.
  • 5. The method according to claim 2, where the strongest user is cancelled based on its real-valuedness, where the real-valuedness allows to interpret the strongest user as a straight line in the complex inphase-quadrature (IQ) plane.
  • 6. The method according to claim 1, wherein, before the strongest user is at least partially cancelled using the subtraction, the down-converting of the receive signal is performed such that in the base band the carrier of the strongest user resides on a Discrete Fourier Transform frequency bin or between two Discrete Fourier Transform frequency bins.
  • 7. The method according to claim 6, whereby except for complex mixing by a frequency offset or fractional frequency offset only linear operations are carried out prior to the subtraction of the sidebands in the frequency domain, where the symmetric sidebands are cancelled.
  • 8. The method according to claim 6, whereby the sidebands of a periodogram are subtracted in the frequency domain; and/orwhereby the sidebands of a magnitude spectrum are subtracted in the frequency domain.
  • 9. The method according to claim 1, wherein the at least two signals contained in the receive signal are Double Side-Band full carrier Amplitude Modulated signals.
  • 10. The method according to claim 1, wherein the more than one signals are analogue modulated signals.
  • 11. A method for the detection of different double transmission events by combining a detection of more than one signal contained in a receive signal received by a receiver of a communication system, with additional information present within the communication system; wherein the different double transmission events include (i) an event that a ground station is involved in a double transmission, or (ii) an event that only airborne users are involved in a double transmission;wherein the detection of more than one signal contained in a receive signal comprises:down-converting the receive signal, thereby providing a down-converted signal in a complex inphase-quadrature (IQ) base band; andat least partially cancelling the strongest user in the down-converted signal, thereby allowing for the detection of a possible secondary user; andwherein the detection of the event that only airborne users are involved in a double transmission is performed by combining an information “double transmission detected” and “active ground radio transmission” by using logic combining of the signals present within the communication system; orwherein the detection of the event that a ground station is involved in a double transmission is performed by combining an information that a secondary user is detected in a time interval with the information that an active ground radio transmission occurred in the time interval.
  • 12. The method according to claim 11, wherein the detection of the event that only airborne users are involved in a double transmission further comprises signaling the event to a controller, in particular an Air Traffic Controller which in response hereto optionally issues an operator observable signal, in particular by a suitable means, in particular by acoustic means, visual means, or other means.
  • 13. The method according to claim 11, wherein the detection of the event that a ground station is involved in a double transmission is performed by using logic combining signals present within the communication system.
  • 14. A receiver of a communication system, being configured for receiving a receive signal comprising a controller for the detection of more than one signals contained in the receive signal; the controller being configured for down-converting the receive signal, thereby providing a down-converted signal in a complex inphase-quadrature (IQ) base band; andthe controller being configured for at least partially cancelling a strongest user in the down-converted signal, thereby allowing for the detection of a possible secondary user; andthe controller being configured for at least partially cancelling the strongest user by (i) using a projection approach in the time domain;or,(ii) using a subtraction of conjugate symmetric sidebands of a Fourier transform of the down-converted signal in the frequency domain.
Priority Claims (1)
Number Date Country Kind
13173671 Jun 2013 EP regional
PCT Information
Filing Document Filing Date Country Kind
PCT/IB2014/002319 6/25/2014 WO 00
Publishing Document Publishing Date Country Kind
WO2015/008165 1/22/2015 WO A
US Referenced Citations (6)
Number Name Date Kind
5603088 Gorday Feb 1997 A
20030206577 Liberti, Jr. Nov 2003 A1
20100054352 Huttunen et al. Mar 2010 A1
20100067570 Lipp Mar 2010 A1
20140167734 Detert Jun 2014 A1
20160149737 Detert May 2016 A1
Foreign Referenced Citations (1)
Number Date Country
10 2011 080 999 Feb 2013 DE
Non-Patent Literature Citations (11)
Entry
International Search Report corresponding to PCT/IB2014/002319, dated Feb. 20, 2015, 3 pages.
Whalen, “Detection of Signals in Noise,” Academic Press, N.Y., 1971, 418 pages.
Kay, “A Fast and Accurate Single Frequency Estimator,” IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 37, No. 12, Dec. 1989, pp. 1987-1990.
Schoukens, et al., “The interpolated Fast Fourier Transform: A Comparative Study,” IEEE Transaction on Instrumentation and Measurement, vol. 41, No. 2, Apr. 1992, pp. 226-232.
Umesh, et al., “Computationally Efficient Estimation of Sinusoidal Frequency At Low SNR,” Proceedings of the 1996 IEEE International Conference on Acoustics Speech and Signal Processing, Atlanta (GA), 1996, 4 pages.
Martin, “Noise Power Spectral Density Estimation Based on Optimal Smoothing and Minimum Statistics,” IEEE Transaction on speech and audio processing, vol. 9, No. 5, Jul. 2001, pp. 504-512.
Stoica, et al., “Spectral Analysis of Signals,” Prentice Hall, Upper Saddle River, New Jersey, 2005, 447 pages.
Deneufchâtel, et al., “Annex 10 amendments to cover Climax operation on DSB-AM with 8.33kHz channel spacing”, Aeronautical Communications Panel (ACP), Working Group M (ACP WG-M), Montreal, Canada, 2006, 7 pages.
Electromagnetic compatibility and Radio spectrum Matters (ERM); Ground-based VHF hand-held, mobile and fixed radio transmitters, receivers and transceivers for the VHF aeronautical mobile service using amplitude modulation; Part 1: Technical characteristics and methods of measurement, ETSI EN 300 676-1 V1.4.1, Apr. 2007, 43 pages.
Annex 10 to the Convention on International Civil Aviation Aeronautical Telecommunications, vol. III, 2nd edition 2007, part 2: voice communications systems, including amendment 85, Jul. 2007, 254 pages.
Yang, “A Study of the Inverse Short Fourier Transform,” Proc. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on, pp. 3541-3544, Mar. 31, 2008-Apr. 4, 2008.
Related Publications (1)
Number Date Country
20160142236 A1 May 2016 US