You are on page 1of 5

1

A Compressive Sensing Approach to NBI


Cancellation in Mobile OFDM Systems
Ahmad Gomaa, Student Member, IEEE, and Naofal Al-Dhahir, Fellow, IEEE
The University of Texas at Dallas, USA

Abstract—We propose a novel algorithm based on compres- the other tones. This technique was generalized in [6] using
sive sensing (CS) theory to estimate narrow band interfer- soft decisions of the OFDM symbols from the decoding unit.
ence (NBI) signals experiencing time-varying frequency-selective
fading channels in orthogonal frequency division multiplexing
Recently, compressive sensing (CS) theory [7], [8] has been
(OFDM) systems. In addition, we investigate the case of asyn- applied to reconstruct a sparse vector from insufficient noisy
chronous jamming where there is a frequency offset between the measurements. CS theory was first proposed in [9] to estimate
NBI and desired signals. Furthermore, we propose a reduced- the NBI signal exploiting its inherent sparsity in the frequency-
complexity implementation for our proposed algorithm with domain (FD). However, the NBI signal was assumed to
negligible performance loss. Finally, we show that our proposed
approach can be applied to both cyclic-prefix and zero-padding
be unfaded and synchronous with the desired signal at the
OFDM systems. Simulation results show the effectiveness of our receiver. Furthermore, only one NBI signal was assumed. In
proposed algorithm in mitigating NBI. this paper, we relax these assumptions and show that CS theory
can still be applied to estimate the jammer effectively and we
propose a reduced-complexity implementation. In [9], the CS-
I. I NTRODUCTION
based approach was proposed for zero-padded (ZP) OFDM;
Narrow-band interference (NBI) degrades the performance however, in this paper we show that the approach can be
of various wireline and wireless communications systems em- extended to cyclic-prefix (CP) OFDM as well. The rest of this
ploying orthogonal frequency division multiplexing (OFDM). paper is organized as follows. In the next section, we provide
For example, Non-intentional NBI impairs the performance a review of CS theory. For completeness, we give a review
of multi-band (MB) OFDM ultra wide bandwidth (UWB) of the CS-based approach for NBI estimation in Section III.
systems [1] where the other licensed systems operating in Section IV shows how the CS-based approach can be applied
the same band cause interference to the UWB system in to mobile and asynchronous jammers. A reduced-complexity
parts of the operating bandwidth. Wireless local area networks implementation for the CS-based approach is proposed in
(WLANs), e.g. 802.11g/n, suffer from NBI generated by Blue- Section V. The extension to CP-OFDM systems is presented
tooth devices operating in the same band [2]. In addition, NBI in Section VI. Finally, simulation results and conclusions
impairs wired systems such as Digital Subscriber Lines (DSL) are given in Sections VII and VIII, respectively. Notations:
and power line communications (PLC) as radio frequency Unless otherwise stated, lower and upper case bold letters
interference (RFI) from AM and amateur radio. Moreover, denote vectors and matrices, respectively. The matrices F
intentional NBI (jamming) may affect wireless networks used and I denote the Fast Fourier Transform (FFT) matrix and
in military applications. In this paper, we use the terms NBI the identity matrix, respectively, and their subscripts denote
and jammer interchangeably. theirs sizes. The matrix 0m×n denotes the all-zero matrix of
The problem of NBI mitigation for OFDM is not well size m × n. Also, ( )H , ( )∗ , and ( )−1 denote the matrix
investigated in the literature especially for MIMO systems, and complex-conjugate transpose, the complex conjugate, and the
only few techniques have been reported. One of the techniques matrix inverse operations, respectively. The j th element in a
is proposed in [3] where a prediction error filter (PEF) is used is denoted by a(j).
to whiten the narrow-band spectrum of the NBI. This method
assumes that the NBI is an auto-regressive (AR) process;
otherwise the PEF length must be very long to whiten the NBI II. C OMPRESSIVE S ENSING BACKGROUND
spectrum. The PEF is also used in [4] as an erasure insertion CS theory [7], [8] asserts that we can recover a sparse vector
mechanism that localizes the erasures to the tones surrounding x ∈ CN from a measurement vector y ∈ CM where M  N .
the interference without affecting the remaining tones. In [3], In other words, the exact solution of the under-determined
[4], only a single-tone NBI is assumed. However, in this paper, system of equations y = Ax + z can be computed where
we consider NBI affecting several OFDM subcarriers. In [5], A denotes the M × N measurement matrix and z ∈ CM
the first subcarrier is assumed to be interference free and is a zero-mean random noise vector with covariance matrix
the error term between the received and detected signals of Cz  E(zzH ). The word ”sparse” means that x contains few
the first subcarrier is used to predict the error term in the nonzero elements. The sparse vector x is recovered by solving
next subcarrier. A major drawback of this method is that the following l1 -norm constrained minimization problem [10]
errors in the interference estimate of one tone propagate to
This work is supported by a gift from RIM Inc.
min  x̃ 1 subject to  y − Ax̃ 2 ≤  (1)
x̃∈CN
2

where  . 1 and  . 2 denote the l1 -norm and the l2 -norm, this end, W is designed to be the projection matrix on the left
respectively, and  is chosen such that it bounds the amount null-subspace of Λ̃ as follows 2
of noise in the measurements. In fact, the convex optimization
problem in (1) is a second-order cone program and can be W = IP − Λ̃Λ̃† (6)
solved efficiently [11]. After solving (1), the support of x is −1
estimated with I = {k : x̃k = 0} which contains the estimated where Λ̃†  Λ̃H Λ̃ Λ̃H is the pseudo-inverse matrix [15].
indices of the nonzero elements in x. Then, x can be written Since Λ̃ is a tall matrix, it has a nontrivial (i.e. non-zero) left
as x = Sd where d is a vector containing the values of the null-subspace. Now, it is clear that we keep the received guard
nonzero elements of x. In addition, S is called the selection sequences to make Λ̃ a tall matrix. Multiplying Y by W, we
matrix whose elements are all zeros except for a single ’1’ in get
each column, and the indices of the rows containing these ’1’s = WY = WJ + WZ .
Y (7)

are included in I. We can write y as y = ASd + z, and use :=Z̃
the weighted least squares (WLS) estimation technique [12]
to estimate d as follows Then, the convex program in (1) is solved to estimate the NBI
 −1 H H −1 locations where W is the measurement matrix. Note that W
d̃ = SH AH C−1 z AS S A Cz y (2) is a rank-ν matrix. Hence, the linear system in (7) is under-
determined. Next, WLS is used to estimate the NBI amplitudes
III. NBI E STIMATION USING CS THEORY before cancelling the NBI signal from Y.
As will be justified later, our proposed techniques utilize
the guard sequences between successive OFDM blocks. To IV. P RACTICAL NBI MODELS
avoid inter-block interference (IBI), we use zero padding as
A. Mobile Jammer
the guard sequence instead of a cyclic prefix [13]. Denoting
the guard sequence length by ν and the data length by N , the In this section, we consider the case where the NBI source
received OFDM symbol in ZP-OFDM is given by is mobile and its channel is dispersive. Hence, the NBI signal
 H experiences a fast frequency-selective (FS) fading channel.
y = H FN 0N ×ν X + z + j (3) Denoting the channel matrix of the jammer by HJ , the received
 
:=Fzp faded NBI signal can be expressed as
where H is the P × P Circulant channel matrix where jM = HJ j = FH
P FP HJ FP J = FP 
H H
ΛJ J  FH
P JM (8)
P = N + ν, X is the frequency-domain (FD) data vector, z  
:=ΛJ :=JM
is the time-domain (TD) noise vector, j is the TD NBI signal,
and Fzp is called the ZP transmission matrix. Note that H where j  FH P J is the transmitted NBI signal. According
is considered Circulant thanks to the all-zero matrix 0N ×ν in to [16], ΛJ can be approximated as a banded matrix with
Fzp [13]. The TD NBI vector j can be expressed as j = FH PJ 2D + 1 main diagonals. When multiplied by J, ΛJ causes
where J is its FD vector whose elements are modeled as the FD NBI signal to spill over D adjacent subcarriers from

each side where D depends on the Doppler frequency of
dk , f ≤ k ≤ t
J(k) = (4) the jammer. Hence, higher jammer mobility results in larger
0, otherwise
jammer spectral width but JM can still be considered sparse.
where dk ∈ C denotes the NBI amplitude at the k-th So, CS theory can still be used to recover JM as before.
subcarrier, and f and t denote the first and last indices Note that we follow this approach since we do not have any
(subcarriers) of NBI, respectively. The NBI width is denoted knowledge about HJ because we can not ask the jammer to
by r  t − f + 1. Converting y into FD yields send us pilots to estimate its channel!
Y = FP y = 
ΛV X + Z + J (5)
:=Λ̃ B. Asynchronous Jammer
where V  FP Fzp , Z  FP z, and Λ  FP HFH
P is a Now, we discuss the important case where the jammer is
diagonal matrix whose diagonal is the P -point discrete Fourier not synchronous with the desired the signal; i.e. there is some
transform (DFT) of the first column of H. Note that Λ̃ is a frequency offset between the jammer and the desired signal at
tall matrix of size P × N as defined in (5). Our goal is to the receiver. In this case, the nth element of the received TD
estimate the NBI frequency support (NBI subcarrier indices f NBI vector joffset is given by
through t) and the NBI amplitudes df through dt . Note that
t
d 2π
J can be considered as a sparse signal since it represents a joffset (n) = √k ei P (k+α)n (9)
narrow-band interference. Hence, J can be recovered from Y k=f
P
using CS theory but X and Z are unknown so they are modeled √
as noise. To reduce the noise level, we cancel the unknown where i  −1 and the frequency offset is represented
  by α
data term in (5). Assuming knowledge1 of Λ and, hence, Λ̃ which is uniformly distributed over the interval − 12 , 12 . The
at the receiver, we multiply Y by W such that WΛ̃ = 0. To
2 Note that if P projects on the column subspace, then I − P projects on
1 Channel estimation is investigated in [14] its orthogonal complement which is the left null-subspace.
3

interference component on the lth subcarrier in FD can then function of α. The estimate of α, denoted by α̂, is chosen to
be written as maximize the following cost function
   2
t
1 − ei2πα  
dk  s ( 1−ei2πα
) 
Joffset (l) = . (10)  n=1 Jˆoffset

(ln ) i 2π (k−ln +α) 
P 1 − ei 2π
P (k−l+α)
 1−e P 
k=f
ζ(α) =  2 (15)
 
When α = 0, we get the expression in (4). Hence, the effect  (1−ei2πα ) 
 2π 
of the frequency offset is jammer spectral spreading. To see  1−ei P (k−ln +α) 
the spreading in matrix notation, we express joffset as where |.| denotes the absolute value. This maximization can
be implemented using grid search over  possible
 values of α
joffset = Hoffset j = Hoffset FH
PJ (11)
as follows. We quantize the interval − 21 , 12 into Nq levels,
i 2παn substitute each level for α in ζ(α), and set α̂ to the level
where Hoffset is a diagonal matrix with Hoffset (n, n) = e , P

n = 0, 1, .., P − 1. Note that Hoffset can be considered as that maximizes the cost function. Note that ζ(α) depends on
the time-varying channel matrix HJ defined in Section IV-A k which is the location of the jammer tone. As an estimate
 
but with a single channel tap. Hence, Λoffset  FP Hoffset FH
P
of k, we use k̂ = arg max Jˆoffset (ln ). Using α̂, we form
n
is a Circulant banded matrix and the number of its main an estimate for Λoffset , denoted by Λ̂offset . Then, we form
(significant) diagonals depends on α. Then, the measurement matrix as WΛoffset and solve the l1 -norm
constrained minimization problem to get an estimate for the
joffset = FH Λoffset J  FH
P  P Joffset (12)
 frequency support of J. If this estimate differs from k̂, we re-
:=Joffset estimate α using the new estimate of k. This refined estimate
Since Λoffset is banded, Joffset becomes a spread version of of α is only used to re-calculate Λ̂offset and the measurement
J. Considering Joffset as an approximately sparse vector, we matrix. Finally, we perform the WLS step to estimate the
can use the CS-based approach to estimate it as done in amplitude of the jammer and output the estimate of J denoted
Section IV-A for the case of mobile jammers. This technique by Ĵ. The new estimate for Joffset is given by
is labelled as ”without estimating α” in Section VII. However, J̃offset = Λ̂offset Ĵ. (16)
if Λoffset is known at the receiver, then the CS approach can
be applied to recover J instead of Joffset . This is achieved by Next, Joffset is cancelled from the received signal prior to the
absorbing Λoffset into the measurement matrix. To show this, detection and decoding steps. This technique is labelled as
we write Y as ”with estimating α” in Section VII. In [14], we use another
technique to deal with asynchronous jammers, viz. we use
= WY = WJoffset + WZ = WΛoffset J + WZ.
Y (13) receiver windowing to spectrally contain the jammer.

If Λoffset is not known at the receiver, then we apply CS theory V. A LTERNATIVE N ULLING M ETHOD
to estimate Joffset . In this case, the measurement matrix is W.
On the other hand, if Λoffset is known at the receiver, then we In Section III, we set W to be the projection matrix onto the
apply CS theory to estimate J. In this case, the measurement left null-subspace of Λ̃ to null out (cancel) the unknown data
matrix is WΛoffset . Since J is exactly sparse unlike Joffset , term. However, computing W requires the inversion of a P ×P
the solution of the l1 -norm constrained minimization problem matrix which is computationally intense although the diagonal
for J will be more accurate than that for Joffset . This is structure of Λ can be utilized to reduce the complexity. In this
because CS-based algorithms are designed for sparse vectors. section, we propose a simpler method to null out the unknown
Consequently, better NBI estimation and cancellation can be data term where we utilize the tall structure of Fzp . First, we
−1
achieved if Λoffset is known at the receiver. Note that the matrix multiply Y by G1  FH PΛ to get
Λoffset is completely determined by α. Hence, we propose the 1 = G1 Y = Fzp X + G1 Z + G1 J
Y (17)
following technique to estimate α for single-tone jammers and
believe that the extension to multiple-tone jammers is possible. where Λ−1 is easily computed since Λ is diagonal and the
First, we apply CS theory to get an initial estimate of Joffset . multiplication by FHP is efficiently implemented using the
Since this estimate is sparse, we extract its largest s nonzero inverse FFT operation. Recalling the structure
 of Fzp , we
elements. These extracted elements can be expressed as simply multiply Y 1 by G2  0ν×N Iν to null out the
  unknown data term as follows
dk 1 − ei2πα /P
Jˆoffset (ln ) = + e(ln ), 1 ≤ n ≤ s (14) 2 = G2 Y
Y 1 = G2 G1 J + G 2 G1 Z (18)

1 − ei P (k−ln +α)    
A Z̃

where e(ln ) is some error term at the (ln ) element, dk th


Note that the multiplication by G2 is equivalent to extract-
and k denote the amplitude and the location of the single ing the last ν elements of the vector Y 1 . Next, we apply
jamming tone, respectively. The idea is to estimate α from the CS-based technique to (18) to estimate J. However, the
{Jˆoffset (ln ), n = 1, 2, .., s} using the non-linear least squares disadvantage of this nulling scheme is the multiplication by
estimation technique [12] because Jˆoffset (ln ) is a non-linear Λ−1 which may amplify the noise if the channel frequency
4

response has nulls near the P -point DFT grid. As a remedy−1 then H in (20) would be H := HK where K is a sub-matrix
for this problem, we replace Λ−1 by ΛH ΛΛH + δIP of FH N constructed from the columns corresponding to IU .
where δ is a small constant proportional to the noise power. Multiplying y1 by W nulls the unknown data term and yields a
This remedy is inspired from the minimum mean square error measurement matrix A = WF  H . The reader can easily verify
N
criterion as an alternative to the zero forcing criterion. that all columns of A are zeros except those corresponding to
IK . Hence, AJ is zero and Wy contains only noise unless
1
VI. CS-BASED A PPROACH FOR CP-OFDM the jammed subcarriers indices were equal to IK .
The reason we did not use CP-OFDM in [9] is to avoid
the IBI in the guard sequence needed to get a tall matrix in VII. S IMULATION RESULTS
front of the unknown data term. In this section we present a We simulate the performance of an OFDM-based wireless
method to obtain a tall matrix in CP-OFDM without keeping system with N = 64, ν = 16, and L = 3 complex Gaussian
the guard sequence. This method is based on the fact that the channel taps of equal power in the presence of NBI. We
FD data vector X contains elements known at the receiver. employ a nonsystematic rate-1/2 convolutional code (CC) with
In WLANs, for example, X contains 12 null subcarriers and 4 octal generator (133,171) and constraint length = 7. Coded
pilot subcarriers. We denote the number of the known elements bits are quadrature phase shift keying (QPSK) modulated. The
of X as u. We denote the indices of the known and unknown signal-to-noise ratio (SNR) is defined as NEb
, and the signal-to-
o
elements of X as IK and IU , respectively. interference ratio (SIR) is defined as  t E|db |2 /r where Eb
The received CP-OFDM symbol after removing the cyclic ( k=f k )
prefix can be written as follows is the bit energy. The case of a mobile jammer with Doppler
frequency normalized to 5% of the subchannel spacing is
y = HFH
N QX + z + j (19) investigated in Fig. 1 where the BER is plotted against the
SNR for r = 1 and 4 jammed subcarriers. The case of r = 4 is
where H is the N ×N Circulant channel matrix, Q is an N ×N
encountered in WLANs with the frequency-hopping Bluetooth
pre-coding matrix inserted at the transmitter side, and z and j
signal acting as NBI. We also show the performance of the
are defined as before. The reason for inserting Q will become
interference-free case and the case where NBI is ignored at
clear shortly. To get a tall matrix in front of the unknown data
the receiver. The jammer Doppler frequency assumed in this
term, we do the following operation
paper corresponds to D = 1, i.e. 3 main diagonals. It worth
y1 = y − HFH
N Q1 X1 = HFN Q2 X2 + z + j
H
(20) mentioning that in the case of a mobile jammer, we do not per-
  form the WLS step; instead we take the solution of the l1 -norm

:=H
constrained minimization problem as the jammer estimate and
where Q1 and Q2 are sub-matrices of Q containing the cancel it from the received signal. The reason is that the mobile
columns corresponding to IK and IU , respectively. Similarly, jammer will spread over all the subcarriers and, hence, all the
X1 and X2 are sub-vectors of X containing the known and subcarriers will be jammed although with different amounts of
unknown elements of X, respectively. Observe that H is an jamming power. The asynchronous jammer case is investigated
N × (N − u) tall matrix in front of the unknown vector X2 . in Fig. 2 where we show the performance of our CS-based
Consequently, we can multiply y1 by W  = IN − H H † to approach with/without estimating α and with perfect knowl-
cancel the unknown data term and, then, apply the CS-based edge of α at the receiver. The performance with estimating
technique to estimate the NBI signal. However, to avoid the α is shown for various values of Nq where we observe that
inversion of a channel-dependent matrix, we follow a similar estimating α significantly improves the performance even for
approach to that in Section V. We convert y1 into FD to get small Nq where the complexity of the grid search is small. The
performance of the alternative nulling method for ZP-OFDM,
Y1 = FN y1 = ΛQ2 X + Z + J (21)
proposed in Section V, is compared with the conventional
where Λ is a diagonal matrix defined as Λ = FN HFH
N.
Next, method in Fig. 3. Although the alternative nulling method
we multiply Y1 by Λ−1 , which can computed easily since Λ shows a small performance loss compared to the conventional
is diagonal, to get one, the complexity of the latter is significantly reduced as it
1 = Λ−1 Y1 = Q2 X + Λ−1 Z + Λ−1 J. does not require the inversion of a channel-dependent matrix.
Y (22) Finally, the performance of our CS-based approach for CP-
1 by G = IN −Q2 Q†
Since Q2 is a tall matrix, we multiply Y OFDM systems is shown in Fig. 4 where it can effectively
2
to null out the unknown data term as follows cancel the NBI and, thus, significantly improves the BER.
Figure 5 shows the BER performance versus the SIR. We
2 = GY
Y 1 = GΛ−1 J + GΛ−1 Z . (23)
    emphasize that our approach requires no prior knowledge
A Z̃ about the jammer statistics, location, or power.
Next, our CS-based approach is applied to estimate J. Note
that G is computed only once at the receiver since it depends VIII. C ONCLUSION
only on Q2 which is known apriori at the receiver. To simplify In this paper, we showed how to apply the recent CS
the detection process and to keep the transmitted power theory to estimate mobile NBI signals experiencing fast and
unchanged, we choose the pre-coding matrix Q to be unitary, frequency-selective (FS) fading channels in OFDM-based sys-
i.e. QH Q = IN , and, hence, Q†2 = QH 2 . If Q is not present, tems. In addition, we investigate the asynchronous scenario
5

0 0
10 10

−1
10
−1
10 No NBI
r = 4 jamming tones
−2 Conventional Nulling Method
10
Alternative Nulling Method
BER

BER
−2
10
−3 No NBI Ignoring NBI
10
Ignoring NBI
−3
CS−based Approach 10
−4
10 r = 1 jamming tone

−5 −4
10 10
0 2 4 6 8 10 12 14 16 18 20 22 0 2 4 6 8 10 12 14 16 18 20
SNR (dB) Jammer length (r)

Fig. 1. BER versus SNR for 2 × 1 ZP-OFDM systems jammed by a mobile Fig. 3. BER versus jammer width for 2 × 1 ZP-OFDM systems using
jammer with SIR = -17 dB. conventional and alternative nulling methods. SNR = 18dB and SIR = -17dB.
0 0
10 10

−1
10
−1
10

−2 No NBI
10
BER

BER
−2 CS−based Approach
10
−3
10 Ignoring NBI
Our approach without estimating α
Our approach with estimating α, Nq = 40
−3
−4 Our approach with estimating α, Nq = 20 10
10
Our approach with known α
No NBI
−5 −4
10 10
0 2 4 6 8 10 12 14 16 18 20 22 0 2 4 6 8 10 12 14 16 18 20
SNR (dB) Jammer length (r)

Fig. 2. BER versus SNR for 2 × 1 ZP-OFDM systems jammed by a single-  Fig. 4. BER versus jammer width for 2 × 1 CP-OFDM systems with SNR
tone asynchronous jammer with SIR = -17dB, s = 10, and α ∈ U − 21 , 12 . = 18dB and SIR = -17dB.
0
10
when there is a frequency offset between the jammer and the No NBI
desired signal where we integrate CS theory with non-linear CS−based approach

least squares to estimate this frequency offset. Furthermore, 10


−1 Ignoring NBI

we propose a reduced-complexity implementation for our CS-


based approach where the inversion of a channel-dependent
BER

−2
10
matrix is avoided. Finally, we show that the CS-based ap- r = 1 jammed r = 4 jammed subcarriers
proach for NBI estimation is applicable not only to ZP-OFDM subcarrier

systems but also to CP-OFDM systems as well. 10


−3

R EFERENCES
−4
10
[1] A. Batra, J. Balakrishnan, G. Aiello, J. Foerster, and A. Dabak, “Design −20 −15 −10 −5 0 5 10 15 20
SIR (dB)
of a Multiband OFDM System for Realistic UWB Channel Environ-
ments,” IEEE Trans. on Microwave Theory and Techniques, vol. 52, pp.
Fig. 5. BER versus SIR for ZP-OFDM systems with r = 1 (dashed lines)
2123–2138, 2004.
and 4 (solid lines) jammed subcarriers and SNR = 18dB.
[2] J. Park, D. Kim, C. Kang, and D. Hong, “Effect of bluetooth interference
on OFDM-based WLAN,” in IEEE VTC-Fall, 2003. [10] E. Candes, J. Romberg, and T. Tao, “Stable signal recovery from
[3] A. Batra and J. Zeidler, “Narrowband interference mitigation in OFDM incomplete and inaccurate measurements,” Comm. on Pure and Appl.
systems,” in IEEE MILCOMM, 2008. Math, vol. 59, no. 9, pp. 1207–1223, 2006.
[4] ——, “Narrowband interference mitigation in BICM OFDM systems,” [11] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY:
in IEEE ICASSP, Apr. 2009. cambridge Univ. Press, 2004.
[5] D. Darsena, “Successive narrowband interference cancellation for [12] S. M. Kay, Fundamentals Of Statistical Signal Processing: Estimation
OFDM systems,” IEEE Commun. Letters, vol. 11, pp. 1–3, Jan. 2007. Theory. New Jersey: Prentice Hall, 1993.
[6] D. Darsena and F. Verde, “Successive NBI cancellation using soft [13] B. Muquet, Z. Wang, G. Giannakis, M. Courville, and P. Duhamel,
decisions for OFDM systems,” IEEE Signal Processing Letters, vol. 15, “Cyclic prefixing or zero padding for wireless multicarrier transmis-
pp. 873–876, 2007. sions?” IEEE Trans. on Comm., vol. 50, pp. 2136–2148, Dec. 2002.
[7] E. Candes, J. Romberg, and T. Tao, “Robust uncertainty principles: Exact [14] A. Gomaa and N. Al-Dhahir, “A novel sparsity aware approach for NBI
signal reconstruction from highly incomplete frequency information,” estimation in MIMO-OFDM,” Submitted,.
IEEE Trans. on Info. Theory, vol. 52, no. 2, pp. 489 – 509, Feb. 2006. [15] G. H. Golub and C. F. V. Loan, Matrix Computations-Third Edition.
[8] D. Donoho, “Compressed sensing,” IEEE Trans. on Information Theory, Baltimore, MD: Johns Hopkins Univ. Press, 1996.
vol. 52, no. 4, pp. 1289 – 1306, April 2006. [16] W. G. Jeon, K. H. Chang, and Y. S. Cho, “An equalization technique
[9] A. Gomaa, K. M. Zahidul Islam, and N. Al-Dhahir, “Two novel for orthogonal frequency-division multiplexing systems in time-variant
compressed-sensing algorithms for NBI detection in OFDM systems,” multipath channels,” IEEE Trans. on Comm., vol. 47, pp. 27–32, 1999.
in IEEE ICASSP, March 2010.

You might also like