2 Dtic Ada189329
2 Dtic Ada189329
2 Dtic Ada189329
36
Q
II .2.
11 WO. 1111.0
11IN HAPfl
(y) RADC-TR-86- 159
Final Technical Report4
July 1987
00
University of Kansas
'r d
This report has been reviewed by the RADC Public Affairs Office (PA)
and is releasable to the National Technical Information Service (NTIS). At
NTIS it will be releasable to the general public, including foreign nations.
APPROVED: r
~Project RITCHIE
PETER J.Engineer
APPROVED: /,
JOHN A. RITZ
Directorate of Plans & Programs
If your address has changed or if you wish to be removed from the RADC mailing
list, or if the addressee is no longer employed by your organization, please
notify RADC (DCCL) Griffiss AFB NY 13441-5700. This will assist us in
maintaining a current mailing list.
. . . ,
-. . . .
-. . . . .
UNCLASSIFIED
SECURIJT LASSIFICATION OF THII PA01' /
ForM Approved
REPORT DOCUMENTATION PAGE OJmejNO8 o j4
aREPORT SECURITY CLASSIFICATION lbE RESTRICTIVE MARKINGS
UNCLASSIFIED N/A
2a. SECURITY CLASSIFIC-ATION AUTHORITY 3. DISTRIBUTION / AVAILABILITY OF REPORT
NIA -Approved for public release; distribution
2ib-.DECLASSIFICATION/ODOWNGRADING SCHEDULE unlimited.
N/A ____________________
-6c. ADDRESS (City, Stat, and Z1PCod@) I IS b. ADDRESS (CRtY,State, iand ZIP Code)
Telecommunications and Information Sciences lab Griffiss AFB NY 13441-570o
224 Nichols Hall, Campus West
Lawrence KS 6604 _______________________
'INIA
17. COSATI CODES kit. SUBJECT TERMS (Contnue on reverse dfnoceaq and identiy by bkICk numnber)
FIELD GROUP SUB-GROUP HP Adaptive Arrays HrF Comunications Systems
4 HP hannl Simlatin . F Adaptive Algorithms ,,
Thefrac o naatv array system Will not only be dependent upon the controlling
algorithm, but also upon the specific environment in which the array is used. Isolating the
Contributions Made solely by the control algorithm represents a formidable task, considering
* that adaptive array Systems are inherently used in situations in which the interference
environment is Initially unknownm, time-variant, or both. If an effective algorithm choice
isto be made, it is important to be able to compare array performances in identical
environments. The major focus of this study is to compare and contrast the performance of
4 various control algorithms under identical conditions in a Computer simulated adaptive HF
'-4 antenna array System. After examining adaptive array Systems and the role played by the
4 ~~~~controlling algorithms, this study concentrates on the selection andsiuaonfthe
specific algorithms. The simulation results are then presented in the form of a comparativ
r evaluation of the selected Control algorithms and relevant conclusions are drawn.
22a NAME OF RESPONSIBLE INDIVIDUAL 22b. TELEPHONE (include Are& Code) 22c. OFFICE SYMBOL
'..Peter J. Ritchie (315) 330-3077 RaDC (DCCL)
00 Form 1473. JUN 15 fte ious editiol are 06804ot. SECURITY CLASSIFICATION OF THIS OAGE
1. %.
-ii
7!-'
- % %i%-
•~. . . %% . . ., .
Appendix B. User Manual for HF Adaptive Antenna Array
Evaluation Facility .................................. 146
N 5Sw'J
xZ-J
LIST OF FIGURES
*_v-
04,
7.12 Convergence Histogram of Update Covariance Algorithm
in Channel 3 ............................................... 87
7.13 Convergence Histogram of Constrained LMS Algorithm
in ideal Channel (no signal present) ....................... 99
7.14 Convergence Histogram of Constrained LMS Algorithm
in Channel 2 (no signal present) .......................... 100
7.15 Convergence Histogram of Constrained LMS Algorithm
in Channel 3 (no signal present) .......................... 101
7.16 Convergence Summary for LMS Algorithms.................... 114
7.17 Convergence Summary for Constrained LMS Algorithm ......... 115
7.18 Convergence Summary for Update Covariance Algorithm ....... 116
7.19 Convergence Summary for Constrained LMS Algorithm
(no signal present) ....................................... 117
7.20 Alternate Antenna Geometry for Rhomboid Geometry .......... 119
7.21 Convergence Histogram of LMS Algorithm in Channel 2 for
-vi-
%
W e. e..e 4
~%p.~~j %~ *.,. J% ~ Ja\
for TET2 an
%• %
..¢
.r.
-vii- }
,~~~~~~~~~~~~~~.
., . , ,, =- , .-....
. .,. , .. . . ......
. . . . . . -.... . . . . . . . . . .,.. . . .. .. . ... . .... . . . . . . -. . . . . '
LIST OF TABLES
-v4'.,.
5~I, 4~V
%S
% % % % %
%S S.
LIST OF SYMBOLS
a- V' -ix .
.4- 44
*44
T
., , .., .V, - ., ' ", , -. \ , .v o,', ',(4
1.0 INTRODUCTION
a.I
% r,
(LMS) algorithm [1I. This algorithm uses gradient techniques to
asymptotically approach an optimal solution. At approximately the same time,
Howells and Applebaum were developing a sidelobe cancelling algorithm for
radar applications [2]. This algorithm exploited the fact that the signal of
interest was normally absent, and attempts to maximize a generalized signal-
to-noise ratio. Numerous algorithms were developed shortly thereafter. Among
the more common types are the Differential Steepest Descent algorithm,
constrained algorithms such as Griffiths' P-vector and Frost's Constrained
*LMS, and random search algorithms [3-5].
-2-
*4 4,%
slowly varying channel. Other factors that played a significant role in the
algorithm selection process include:
Once the control algorithms had been selected, attention was turned to
the development of the computer simulation models. The overall adaptive array
system model was defined first, followed by the software implementation of the
chosen control algorithms. In order to obtain relevant results regarding
* algorithm performance, it was imperative that the control algorithm be
isolated in the overall system model. In this way, identical environments
could be reproduced, and discrepancies in array performance could be
attributed solely to the differences in algorithms. It was also necessary to
define performance measures and develop a scheme to monitor the results in
order to make a comparative evaluation of the selected control algorithms.
-3-
. . %
*4'. . ,- . . t . - .- 6 . - . _. .- _ _._._ ._--.--. . . - . •u
operation are explained, and common notation which will be used in following
discussions is presented.
Once these fundamental aspects have been examined, each of the selected
algorithms is discussed in detail. Each discussion will include the
motivations for that algorithm's selection, and a description of how the
algorithm operates. It will also contain an explanation of the simulation
model that has been used.
The next section gives a presentation of the testing procedure and all
parameters that must be specified. The signal models, performance measures,
and simulation processes will be explained. The final section presents the
results in the form of graphs and offers conclusions concerning the algorithm
recommendations.
-2's
p.'
A' *
fiA.
_4
'.v ..-.
N
The output of each sensor element, xi(t), is simply the sum of the signal
components that arrive at that element.
.N
p -5-
* , ~~ 4 .
.4~ ~~~~~
. A . r
.4
.
,
%
. .* 4 ~~~
.
% . 4
%.~~-
*4,~~~ . %.4 %
Sensor Elementse'
?attern-froing Networkc
I I
I?.P ADAPTIVE
' -6-
% %
-W - W.'
where
si(t) is the desired signal component at element i
Also note that components of the same signal will differ from element to
element due to phase delay caused by the spatial separation of the sensors.
The sensor element array model that has been utilized in this study
contains some differences with models used in much of the related
literature. The most notable departure from virtually every simulation
conducted, is the use of a dipole model for the sensor elements. The use of
isotropic elements is almost universal among simulated studies. Factors such
as frequency dependence and directional gain of the elements themselves can
then be ignored. Although using dipole elements complicates the model,
"reality" is not compromised as severely. Also, many simulations are limited
to linear array alignments. Such alignments make phase calculations almost %
trivial, but may inhibit the array's ability to distinguish signals on the
basis of elevation arrival angle.
Wi wi A e (2.1)
where
22
A,
1 (ewl (ImJW1 })
and
-7-
' e1 7. .l
-1
0 -tan (Im{wi}/Re{wi})
Thus, the output of the sensor element i is assigned a gain, Ai, ind delayed
The sensor output/weight products are summed to produce the overall array
output signal, y(t), which can be written as
y(t) i
N
wi xi(t) x
TW (2.2)
xl(t) wl
x 2 (t) w2
x x 3 (t) w w3 (2.3)
• .
xN(t)J wN
... %-
-%f%
"p%
The variable complex weights are updated by the processor in such a way -.
A.
simulations require discrete samples. In the discussions and derivations that
- follow, signals will be represented as a sampled value. Also, in order to
represent bandpass signals, complex lowpass equivalent representation (CLPE)
has been utilized. A discussion of CLPE is given in Appendix A.
.1,q
1%1
.A.
.4 -.. -. :
The LMS algorithm was introduced and developed by Widrow in the mid
1960's [11. It uses gradient estimation techniques to arrive at an optimal
solution. The L[MS algorithm is probably the most popular of all adaptive
algorithms. It has been used in a variety of adaptive applications including
channel equalization, noise cancellation, .-
id antenna array systems. It has
V.. become somewhat of a standard and is frequently used as a performance
-1.0-
.-...
4W.,..- .
The operation of the 1.S algorithm is governed by the Mean Square Error
performance criterion. Before discussing the inner workings of the L14S
algorithm, this criterion will be explained as it adds valuable insight into
how the algorithm operates.
.4.
The LMS-controlled adaptive array system is shown in Figure 3.1 and will
be used to present the fundamental manner in which the MSE criterion is
used. For the moment, assume that the reference signal, d(k), is the actual
'4 value that is sent by the desired communicator. An error signal, e(k), is
defined as the difference between what was sent and what was received.
The LMS algorithm uses this error signal, along with the sensor element output ,
information, to calculate a new set of complex weight values. The weights are
computed such that the resulting error signal, and thus the MSE is reduced.
As this process is repeated, the mean square error approaches zero, signifying
that the value that was received was approximately equal to the value that was
sent.
%.4%
-X1-
x.?(k) -
LZ43 ALGORITHM
% %
% %
k -.
The goal of the LMS algorithm is to adjust the complex weights in order
The above equation represents the mean square error as a function of the
complex weights.O
d(k)xl(k)
d(k)x 2 (k)
p E (3.4)
'5
d(k)xN(k)
where d(k) is the scalar desired response and xi(k) is the output of sensor
element i.
-13-
IIV,
%
,. ;..%
,-.,,.. ,.-..-
I--. -,,.K. .::.,,... : . .. .. %,.-;,
., . , ..
: '. ,._ _. ..- i;T'.,. :.:-, N,'. . , .- ,, , :%,, ,, .%
Xl(k) Xl(k) Xl(k) x2(k) .... x (k) X(k)
R E . (3.5)
Once again, xi(k) is the output of sensor element i. The mean square error
can then be defined as
Notice that the minimum mean square error corresponds to the global 4,%
awa
=-2p + 2 Rw (3.7)
a.w
e2 (k)l
3 fE ..
a~a, N
Setting the gradient equal to zero, the optimal weights are found.
-14-
%%
w- -L-1 VI -V - VI MV)
ItN
%1
%r*-
-2p + 2Rw 0
=-R p (3.8)
n0PTIMUM
. This is an extremely important result and represents the matrix form of the
Weiner-Hopf equation.
The Weiner-Hopf equation defines the optimal weight settings in the mean
square sense. Intuitively, it may seem unreasonable to prescribe a
-16-
A % I
% %.
@4 -%
% %S
, , * ~ ~S.yg . '
",..
The LMS algorithm avoids explicit correlation
function measurement and C.
=-2p + 2 Rw
(2,
3Efr (k~
awN
The LMS algorithm estimates the gradient by using the square of a single error
sample instead of the MSE and differentiating with respect to the weights.
a 2(k)
w
a 2(k)
L N
Using this gradient estimate in place of the true gradient in (3.9) yields the
LMS algorithm.
-17-
V J.
%P
%
4,
1
EJj= E{-2e(k) x (k)1
- 2(Rw-p) = V (3.11)
The LMS algorithm does not require the angle of arrival of the desired signal
to be known a priori. If it is unknown, the weights are normally initialized
to an arbitrary value of 1 < 00.
i < 00
i < 00
w(0) (3.12)
i < 00
If the angle of arrival of the desired signal is known, however, the initial
weights can be chosen such that the initial antenna pattern effectively
"looks" directly at the desired signal.
-ja
e
e
d,
4
w ) (3.13)
r.."
.O.
- "N 4."
-18-
.....................................................
where -Qi is a phase value that exactly compensates for the phase delay due to
the spatial separation of the sensor elements. These values can be easily
V calculated if the angle of arrival and element locations are known.
Simulation of the LMS algorithm requires two routines. The weights are
initialized using the routine WEIGHTINIT. The initial weights are given as
The routine LMS updates the weights according to the update equations
that have been given. It requires both the sensor element outputs and the
overall array system output to adjust the weights. It also requires a
%! reference signal. In this model, it has been assumed that a known code is
available. It is assumed that the code at the receiver is synchronized with
the code (preamble) that is being sent. The channel model introduces delay,
The FORTRAN source code listings are given in Appendix C. Figure 3.3
depicts the modules discussed and illustrates the primary input and output
parameters. The variable names used in the program are shown in parenthesis.
The LMS algorithm is not without its drawbacks. It does not converge
terribly fast, but more importantly, it requires the presence of a reference
6 signal to adapt. In cases such as this one where the reference signal is not
always present, the weight values would have to be effectively frozen during
*1' -19-
• o%
i
array output
(WTDSUM)
-20-
., .. ,.,...,.'
,, . .'.p,.. . ..,. . . . . . ..... . .
4.0 CONSTRAINED LMS ALGORITHM
The second control algorithm selected for this study is the Constrained
LMS algorithm. It was developed by 0. L. Frost [5 ]. The name is somewhat
misleading as it suggests that this algorithm is simply a permutation of the p..
LMS algorithm. This is definitely not the case, and some of their contrasting
features are illustrated below in Table 3.1. The name may have been derived -
from the fact that, like the LMS algorithm, the Constrained LMS algorithm uses
a gradient approach.
occurring.
-21-
, I
%,- % .~ . %-
.*V . . ..
Table 3.1
Angle of Arrival
of Communication Not Required Required
.1 Signal __.
Performance
Criterion M.S.E. Maximum-Likelihood
r V .r
".".
,. . -22- "
.,-5.-::'./-*..5..-;.
S%%
,, '..-:-: .<- ? -',.q_,¢27;.,, , .'';-'-:)?'-,'-2
vM
The adaptive array system model which will be used to explain the r
operation of the Constrained LMS algorithm was presented in [5] and is shown
in Figure 4.1. Although this simulation deals with narrowband signals, the
original broadband processor model will be used in this discussion. The model
consists of N elements and J taps per element. When narrowband signals are
used a simplified model results and it will be described later. Also shown in
Figure 4.1 is an "equivalent processor" which aids in the understanding of how
From the desired signal's vantage point, the processors in Figure 4.1 are
equivalent. Each adaptive weight in the equivalent processor is simply equal
to the sum of the weights in the vertical column above it. With these values,
the signal components at the respective processor outputs are identical. By
assigning a value to these equivalent weights, a desired frequency response in
the look direction is selected. This introduces J constraint conditions.
Since there are N X J adjustable weights, the remaining N X J - J degrees of
freedom can be used to minimize the non-look direction noise power.
Minimizing non-look direction noise power is equivalent to minimizing total
output power because, regardless of how the weights are adjusted, the
constraints guarantee that the response in the look direction will not be -
degraded.
The basic manner in which the Constrained LMS algorithm operates has been
discussed. For the purpose of clarity, the primary steps taken by the
algorithm will now be re-emphasized. Delays in the spatial correction filter
'p. -23-
0
7 Z-- __:
-24-
O% .
are calculated to align the communication signal components on the sensors. A
desired response in the look direction is selected by assigning weight values
to the equivalent processor (the sum-on-column constraints are determined).
Once these tasks have been completed, adaptation begins and the processor
strives to minimize the total output power. The constraints guarantee that
there is no possibility of reducing power contributions made by the
communication signal. Mathematical derivations of the optimum constrained
weight solution and the Constrained LMS algorithm will now be presented.
The assumptions and definitions will be discussed first. Recall that the
signals at the sensor element outputs can be written as the combination of the
signal component and noise components
It is assumed that both the signal and noises can be modeled as zero-mean
random processes with unknown second-order statistics. The covariance
matrices are defined as follows:
T
Ejx(k) x (k)} =RXX
Ejs(k) s (k) - RS
.. 4,
T
Ejn(k) n (k)j - RN
It is also assumed that the signal component is uncorrelated with the noise
components.
T ,
E{n(k) s (k)j 0
.0
e
Finally, the expected value of the array output power is given by
Ejy (k)}
2()-
E{
w
wT x =
x(k) x (k) wi =
wT
X w (4.1)
(.1
1
"
,°i
- -25-
op r
.... ............... ,..............----
. . -4,.,4_" .,-. --*.. .. ,. . *
-.. *. _ °_. * - . . '.-. -.. 4,.,...- -- : . ,
. '.. j e €' -.
Recall that the adaptive weights in the equivalent processor dictated the
frequency response characteristic in the look direction. Define a J-
dimensional vector that guarantees the desired frequency response and L
represents the summed weight values of the j vertical columns as
f2
-S" f- (4.2)
L~ JM
The weights in the jth vertical column must sum to the selected number f
This constraint condition can be expressed as
'-S
T
c. w = f. j= , 2, 3, .--,N (4.3)
T 5
E[000..0 ....000..0 ....
.l..1 ....000..0 ....000..0] (4.4)
N N N N N
p. A constraint matrix can then be defined that satisfies all j equations given
by (4.3) as
CT w -f (4.6)
U...
-26-
" "
"" % " " S.
" ' ." " """" "" " S
" . . . .. . " ",S* " " " * . .. .
The constrained optimization problem statement can now be formulated.
The array output power, wT Rxx w, must be minimized subject to the constraint
condition CT w = f.
Once again, notice that the cost function is a quadratic function of the
4 weights. It is known that the gradient of this function is zero at the
minimum point. The optimum weights are then found by finding the gradient of
the function and setting it equal to zero.
V Rxx w + C X (4.8)
COST
Setting this result equal to zero yields the optimal weight solution.
Rxx w + C = 0
II -1
S-Rxx C A (4.9)
T T I
C wO = f --C[-Rxx C A]
[C Rxx C] f (4.10) i
-27-
-", X. %
?,,0 4'.~
The optimum constrained weight vector can now be expressed as
1 T 1
-- R [(C -x -I:
w(k + 1) = w(k) - j V
COST
The initial weight vector, w(O), must satisfy the constraint condition.
It is chosen as
T -1
w(O) = C(C C) f (4.13)
The updated weight vector must satisfy the constraint condition as well. This ad'
can be written as
'O, ~~~Ii-A(k) C
-[CT C-IT Rxx w(k) - cll_
_
[C TC][f - _~
C w(k)] (.4
(4.14)
-.' and the iterative relation for the update equation is expressed as
-
T -IcT T1) CT
w(k+l) w(k) - - C(C C) C JRxx w(k) + C(C [f - w(k)]
-28- '
O.1-,
'.: . ,.---
..,.-...
-..
_, '..:
.-.
.-,.
.-.
'-.---'.'...
.-
".-'
',,. .'.-.
'---'g--'--.
.•. ...-..-.. . .-."-
'.--- - .'.'--.-... .-..
.-. . '..-..
.-. .'-.. .-..'.. .
For the sake of convenience, two definitions are made. Define the NJ-
dimensional vector as
The tapped delay line in the broadband processor enables the user to
select a desired frequency response in the look direction. This study is not
concerned with such filtering because narrowband signal models are being
used. For the purposes of this simulation, it is only necessary that the
response of the adaptive array in the look direction be equal to unity. This
response can be achieved in the broadband model by setting one weight in the
equivalent processor equal to one and the remaining weights equal to zero. V,
This is somewhat wasteful, however, as the same response can be obtained using L
the simplified model shown in Figure 4.2. The explanations and definitions
that have been presented are still valid, but the tapped-delay line in the e.,
broadband model now consist of a single tap (weight). The weight in the
equivalent processor is assigned a value of i < 0 ° so that the adaptive array
has an all-pass distortionless response in the look direction. The sum of the
-29- II
. .-. .. .+-A..............................................................".................................
.. .+. . .• .+ .. ...
. • . .. . . . . . . . . .. . . . . , . .- . -+ ..........
. ..• . . . . . . ............. + . •._ - '
, . +• .. . • . .
+ - m+ ++ %. +'- . . . . . . . + . , . . . • . . - . . - . - .' . - m= . , + - m
, 4,
.%
Oqw
0-30- % %4
the outset.
T 1 J2 N
c = (e , e , "', e )
P I - (c c)IN"
=c/N
-31- C
%.%%
.....................................
S--.
I . . . . . . . . . .- . . .I - *x .- -- .- o.,II." I
ft,,
The weights are initialized using the WEIGHTINIT routine. They are
assigned a value of
f -ft
"'
P = I - (c c)/N
c./N
The FORTRAN source code listings are given in Appendix C. Figure 4.3
depicts the modules discussed and illustrates the primary input and output
parameters. The variable names used in the program are shown in parenthesis.
-32-
ft.7 ' t . f t ft f t f f t f t
oAS -'t ft . .t..t. .ft .. . .
%t-t'
J. ,
.J.
(XY)Wrqwwrrw.,. W
arrva ange o
(X,Y) WEIGHTINIT -
~arrival angle of
communication
signal F-
(PHI, THETA)
b-4,
weights
4. (COMPWT)-
array output
(STRDEL)
'S4
"-33-
% 33
% %
information signal changes appreciably. In that event, the algorithm treats
4. the signal as it would any other non-look direction signal - by placing a
deep null in its direction of arrival. The algorithm would have no way of
knowing that the "interference" it is trying to ignore carries desired
information. Secondly, its convergence rate is comparable to that of the LMS
algorithm. An algorithm that possesses a faster response will now be
examined.
k
e
r4. "
k
.4
-34
-. 4r
,-O4'
.. .. -34
O. .4.,
"0;< ..- ,. s,. < -: .---. u.-ss.- - - ...- s,.-,-..--.,-.-. -. ,- ,---,, '
5.0 UPDATE COVARIANCE ALGORITHM
presented by Monzingo and Miller [7] can also be used to avoid these
*expressed as
-HOPT = RXX-I P
.21.
estimate the sample covariance matrix rather than rely on gradient methods
that asymptotically approach an optimal solution. These algorithms calculate
The primary reason for the selection of the Update Covariance algorithm
* rate.
reference signal is required for adaptation. Once again, this eliminates the
need for complicated reference generation techniques. It does, however,
-35-
% %.
%--- - - - - - - - - - - .
Iv
Finally, recursive processors hold good promise for the future. They
require a digital implementation and this has been, and still is, their
primary disadvantage. The great technolog.cal strides made in the production
of very fast, inexpensive, and compact digital hardware, however, have
resulted in the consideration of recursive processors for applications that
I were previously out of the question. The improved convergence rates (measured
As the name implies, the Update Covariance algorithm uses the sample
covariance estimate, R, to summarize the effect of de-emphasizing the past %
data. The new sample covariance matrix estimate is given by
*T
Rxx(k+l) -a Rxx(k) + x (k+l) x (k+ ) (5.1)
-. .
4 The new estimate is equal to the new computed value x (k+l) xT(k+l) plus the
past estimate scaled by a factor of a. a is a number between 0 and I that is
used to determine the significance of past data. The inverse estimate then
becomes
R-1~+I 1 + 1Rxk T( I:
-I
(k+l) -- [R(k) +- --x (k+l) x(k+l) (5.2)
Note that calculating the inverse in this manner however, would require matrix
inversion, which is exactly what the algorithm is trying to avoid. Therefore
it is useful to invoke the following matrix identity
-36-
.% . %.
.:-.
..' ,,..,.
. -....
,..... - .,.....
.-..-- , ,,,.,',.,',,
,.-- -. .... .. , .,-..
' .,,... .,.,,.
... ,,,',..
--,-,,, i.,..
..
%.0 A ,-,
j (..[-.-.,
V1 .-
- I
[p-i + M* -1M] P- P11* T [MPM * r
+"]' P(53
41
The optimum weight solution can then be found by utilizing the Weiner-Hopf
equation
Multiplying both sides of equation 5.4 by the vector p yields the Update
Covariance weight update equation.
- X-I(k * xTkl)
R (k) x (k+l) x (k+l) w(k)
w(k+l) - [w(k) - xTk - * (5.5)
, a +_ (k+l) Rxx x (k+l)
Due to the fact that the Update Covariance algorithm can be thought of as an
entirely mathematical process, the simulation model will be dispensed with.
The software associated with this algorithm simply performs the computations
outlined in equations 5.4 and 5.5. L
-37-
-: ,. ---
. .---,": .-- - -.-
".".-. ---. -"- ..- : - : ". ---- "v. -. ""-v-.? .,-..- .".:.-' ':',,':.:,,:, ,."',.."""; ;*"
%) %
*.-
0 - ' '.".. -". - '.'
.,..-. . -. ' -. ' - '.'-0*-0. . ', , ,A,.-... . .'.-. - . ,'---.-."Z.* .,,, , ".,,'.. " '
5.3 Update Covariance Software Modules
The first time the weight update routine UPDCOVAR is called, the inverse
sample covariance estimate initialized to the identity matrix. After the
first call, a new sample covariance estimate is formed by performing the
. necessary computations. This result is then used to calculate the new weight
vector which is then passed to the pattern-forming network.
The FORTRAN source code is given in Appendix C. Figure 5.1 depicts the
modules that have been discussed and illustrates the primary input and output
,U parameters. The variable names used in the routines are shown in parenthesis. -
update the weights, where N is the number of sensor elements. The Update
Covariance processor requires on 2
the order of 5N computations to update the -.
'A. .. * ..
%•%%
-38-
~~~~~~~~~~~~.
..... , .-. , .. ,... •-- .- ... ,",4 .. . •............... . - ...
%,' •
•,.,'% %"
" " • "" ' " .... ,. " "" - " "• "- - "" "-. -" i,' . • . " ,- " - "
type of algorithm
(ALGTYP) WEIGHT INITIALIZATION
element location
(X,Y) SUBROUTINE initial weights (COMPWT) r
WEIGHTINIT
arrival angle of
communication
ft signal
(PHI, THETA)
-39--
%V
6.0 DESCRIPTION OF THE HF ADAPTIVE ARRAY SIMULATION MODEL
4.
Before an adaptive array system can be evaluated, the user must define
the array system and environment to be studied. The parameters that must be
specified can be divided into the following classes:
2. Interference environment
3. Array system
4. HF channel characteristics
5. Convergence characteristics
v. Appendix B contains the user manual for the simulation, giving complete
descriptions of the above parameters, as well as the actual user interface.
.4. In addition to a description of the input process, the manual also defines
user options for viewing the simulation output.
y(t) = wT x(t)
-40-
OZ.,
ii ii
i !i 2.*.4~i -. l.... -. .?!
-.. i5i. 57i?
. .i.i=?iiS. .li~ ii!? 1i iiiiil iii!i~ il2 77! i l!)!= jii~
2*'4
UNITS
ARRAY SYSTEM
Number of sensor elements ---
SIGNAL CHARACTERISTICS
Arrival angles, azimuth and elevation degrees
Number of Samples/bit ---
INTERFERRENCE CHARACTERISTICS
Number of Jamming signals
Arrival angles, azimuth and elevation degrees
J/S ratio dB
S/N (thermal) ratio dB
HF CHANNEL CHARACTERISTICS
Number of signal paths --
CONVERGENCE CHARACTERISTICS
Number of Convergences --- ,
SNR tolerance dB
4,'.
-41-
,2.1
%'.
*4,%
* 5
J6 N A
where x(t) contains both signal and noise components.
The array output can then be divided into signal and noise components.
The expected signal and noise power at the array output is given as
i- ,T ,T-
2 T
*T *T
E{lyn(t)I 2 } = wi = w in n ] w = w R w (6.1)
w R w
.-"SNR T (6.2)
-- -nn
T -1*
SNROP T =s
OPT -R -s (6.3)
As the name implies, the maximum achievable SNR is used to evaluate algorithm
performance. The goal (optimum SNR) is known, and by computing the current
SNR, it is possible to observe the degree of success that the algorithm is
* having in attaining this goal. The model is executed until it has reached a
user set SNR goal.
-42-
04% . . .
. . ..."."..
.- . .". ."... . . . "-"
"':-." . . . . . . . . ..-. ....,. .-. .. ".,... '/- .'.- .-' .- .".
....-.-...- . .... " • . ... " "-
•"'
r wr.. .. r r--, - w~
.r EE-PATH u . ....
*- i W'2" .'. -. "..
m4A
*-.
g, (t s2 tg3:i
" ":
Fgre
F, .2 Three-path HF Channel M~odel "
-43-
r AA..,'--
. Notice, however, that it is possible to get different channel "realizations"
using the same characteristic channel model (same delays and variances) by
simply using different random numbers. This plays an important role in the
performance evaluation.
Due to the fact that the HF channel is slowly varying, a single channel
realization is selected for each adaptation. The optimum SNR, which is
channel dependent, is then calculated and adaptation begins. The current SNR
is periodically calculated and if this value is not sufficiently close to the
optimum value (proximity to optimum entered by user and known as SNR
tolerance), the adaptation process is continued. When the SNR does approach
the optimum SNR, the algorithm is said to be "converged" and the number of
required iterations is recorded. A new HF channel realization (a new set of
- random numbers for the tap weights) is then selected. The entire process is
* repeated until the algorithm has converged the specified number of times
(user-entered). At that time, the average number of iterations is
calculated.
The purpose of this section is to explain the signal models and the
operation of the simulation program used in the study.
where
-44-
. .. .
-. . .. K .... . L % 7 r
in F.d '.
Ps desired signal power and
A(t) = +1, -L
~F':
where Qi is the phase of the desired signal at element i.
where
-
Si A(k) V exp (jQ ) ""
e
s(k) = A(k) /.P
e JQ
-45-
".~~~~ - -N ._
...............................................................- % .. . . . " *.".. ... % " . %~" ,- ",,. i, " ' , "4
'' %,., '' ,
6.3.2 Interference Model
The jamming signals in this study have been modeled as complex Gaussian
noises. This can be expressed as
where E(t) and F(t) are zero-mean random processes with a gaussian
distribution and a variance of 1. The power of the jammer is calculated from
.- the user-specified jammer-to-signal ratio.
In this study, thermal noise has been modeled by adding complex Gaussian
Noise to each element. This can be expressed as
where E(t) and F(t) are zero-mean processes with a Gaussian distribution and
variance of I.
-46-
0V%
-6 r2 .- & ' - AL&:i .- 1 - A
S (k) - A(k) V-7 exp(Ji)
jo-j(Q 1t Q2 ) -J(Ql QN )
e e e
e'2 1 -joe 2 N
'R =P *(6.9)
' e e • 0e
-J(Q2- I -J N -JO j
The noise correlation matrix can be written as the sum of the individual noise
mat rices.
RJ = P (6.9) '.
where
1
e-j e N
.4
e 2 1 e-j e 2 N (-1
" -4
e 1) e eJO
: : : : .r. 4 4 4 , 4 4,-.. . ,4%
an NTHERA a2 (6.12)
.. %
4'SNR -sR s
opt -n
a
-47- 44
IV. . - "
% % 4 P-
., w*TR w
SNR = *
w R w
The flow chart of Figure 6.3 depicts the order in which the described
operations are performed. The following is a brief discussion of how the
program operates.
The simulation begins with the user specifying the defining parameters
such as the element locations, selected algorithm, arrival angles, and
relative signal strengths, among others. The program must then calculate the
optimum SNR for a particular channel realization. This value will be used to
determine when the algorithm has converged. The antenna weights are then
initialized and the adaptation process begins.
The desired signal and jamming signals are determined first using the
models described. These signals are then passed to the HF channel model.
These "channelized" signals are then passed to the antenna routine which
calculates the contributions of all signals at each antenna element. The
output of each sensor element is multiplied by its corresponding weight, and
these products are summed to form an overall array system output. This
overall output and the output of each element is then passed to the selected
algorithm. The algorithm uses this information to adjust the weights.
The weights are updated by the selected algorithm and the current SNR is r
periodically computed. If this SNR is not close to the optimum value,
adaptation continues. If it is, however, the converged weights and the number
of convergence iterations are stored in a file. A new channel realization is
-48-
%
USER PARAMETER SPECIFICATION
INITIALIZE WEIGHTS
INCREMENT
UPDATE WEIGHTS SOUVRGENCE
SYES
STORE WEIGHTS
AND NO. OF ITERATIONS
YES
-49- 5
'5%
-. 7.0 SIMULATION RESULTS AND CONCLUSIONS
The purpose of this section is to illustrate the results that have been
obtained using the simulation model described in the previous section. From
these results, conclusions concerning the applicability of the particular
r.- .
° L'T .i ,..
0%
%-
0€ .W
S: 3NAL AZ U TH AL ANCLE ELEVATION ANGLE POWER
90. 0I0 00
90. 0 E60.0 20 d2
Y-A: Is
V V NV
MIN
Co s a t T st P r t r
Fi ur 7.
-51-
'.
5- 5
Z-r %
..-
..
y-
,..
%
"
"5,
-52-l
1
't 7ot
t
...
......
'
-5
3-
,--
r'.
?I
7.1 Test 1: Negligible Channel Effects
The results for all algorithms were averaged over 100 convergences. The
number of iterations for each convergence was recorded to produce the
histograms of Figures 7.4 through 7.6. In all cases, the SNR tolerance (the
proximity to the optimum SNR that determined covergence) was set to I dB. In
other words, the algorithms "converged" when the SNR was within i dB of the
optimum value. The results are tabulated in Table 7.1. The polar antenna
plots that follow verify that all of the algorithms did an excellent job in
placing nulls in the directions of the interferences.
Probably the most striking result obtained was the incredibly few
iterations required by the Update Covariance algorithm to converge. This
result can be misleading, however, due to the number of computations it
requires per iteration. Recall that the update covariance algorithm requires
about 5N complex computations for each iteration, where N is the number of
antenna elements. The LMS and Constrained LMS algorithms require on the order
of 2N and 5N2 computations per iteration respectively. Therefore the
-54-
04,
* .,,..-.."..----'...-1-
I~ TEM. I OHS
-55-
4.3L -A
U 4
.4
left ~ ~~~Re 0 SO --
-- 56
- -5 -
4.
OU .-
.. . .
lie ih,..
"'A"
1.
U 40A
E S.
4i i)
A otoIOa 6
.7 UTIO
inIel hne
-57
0p
i~i
LMS 100 318.0 103.5
ii -58-
A.- %.
As the error decreases, so does the amount that the weights can change.
The weight changes of the Constrained LMS algorithm however, will never
approach zero because the beam is constrained. Signal power will always
appear at the output, even if contributions of interferences are negligible.
Therefore, the weights will always change an appreciable amount, provided that
It therefore seems reasonable that the Constrained LMS algorithm will perform
better when the signal power is low or when it is absent altogether. This
illustrates an important advantage possessed by the Constrained LMS
4 algorithm. Unlike the others, the Constrained LMS algorithm could optimally
adjust the weights before actual signal transmission (including preamble)
begins. This is the major focus of TEST 4.
i 'V
i .4
%, %' %.
.4
""-59- ,, 4.,
I i
.;y.% %"
060
",.
iQ .' . - 6 0- :
•.4 ... #
%
1.d
30dB
-40dB ,
e 9' 5d
e (9igure0d)
-61a--
%* A
~rr W w-'yv~- -W-.- n r --- W -------. r Uww 'rW
"%'vs
nL
%" .%'
44
Jammer 1
.
900
%6
1800
4'.'
"5270 0°
'
.._ Azimuthal plot at 800 elevation
)
Arrow indicates arrival angle of Jammer 1 ( =90
t%'
1 :
Figure T1. Unadapted Antenna Pattern in Direction of Jammer
;
. (Figure B)
"-
-61b-
.
..
0dB
-20dB
-30dB
<5,
-40dB
.5-50dB
-62 a-
% %
% % %
45/
Jammer
900
1800 9=0o
"C.
;'- .'270 0
.
-I :, . ,., (Figure B ) C
"
*- "C-. ,,..S.,.-.,- -.--. "" '-'' " ".- > " '. .. " "- F . "" " " " ;-. " *""'.'0 -" ,,". "",
IVVV
s-, -62b-
OdB
-lOdB
-20dB
-30dB
-- " 1
~Jammer ,"i
-40dB
"=90 0 -50dB
/Z
(Figure A)
-63a-
'. * -
Jammer 1
900
I t I
'.,
1800 3d~ 0
u
C.
(Figure B)
-63b-
. .
%•
-,.--.
~z
~~OdB ".
o
Z A
• -20dB .-.
-30dB
Jammer1
"950dB
0
%=90
(Figure A)
-64a-
A% - . p p p
if Jammer 1
900
S...
"
I,,"-, '270
pU.
S....
A..
9
iA . "
%.'
-64b-
0dB
-10dB
-I40dB
e=900 5d
(Figure A)
-65a-
aN
900
(FgreB
*-65b-
* .. ,..%
20dB
Jammer 2-30dB
-20dB
=900. -50d
-66a-
900
N-
N-. 80
1800Z=
2700
(Figure B)
-6 6b-
'p.
%j
Vu-yA2
A e=ool
-20dB
3d.......
Jammer 2
9=90, -50dB r
(Figure A)
-67a-
NS
900
,-. Jammer 2
2700
m'I'
•
-67b
2700°
4
.
[:. (Figure B)
..
" i -67b-
N.
.4.,
z L
e=00
0dB
lOdB
-20dB
Jamne 30dB IA
-40dB
9:-90 0 50dB r
-68a-
I A W4I
%7
900
,9-
1800 93'= 0 P
-68b-
- .j inDiecioeorJmmr2
q
.4
•. '
(Figue B)
2700
4,..
4 ,9
.
*i .2o
44-
f ,
FiueT. pat
n Diectin
oaineAdpe
of amme92
atr
9]
7.2 Test 2: HF Channel With Moderate Delay Characteristics and Poor
Attenuation Characteristics
Each of the paths is given equal weighting. In other words, signal components
will not be attenuated more in one path than in another.
Once again, results for all algorithms were averaged over 100 -P-.
generated and given as Figures 7.7 - 7.9. The results are tabulated in Table -
7.2, and as the plots will verify, all algorithms did an effective job in
nulling out the jammers.
- amount of time to complete, the actual "convergence time" for the LMS would be
shorter. This is why it is important to take the computational complexity of
each iteration for the algorithms into account.
Once again, the Constrained LMS algorithm was the slowest in average
convergence. The results also indicate that the algorithm had a wide
fluctuation in the required number of iterations. As can be seen from Figure
7.7, the Constrained LMS algorithm had difficulty in attaining the "1 dB" r
threshold once the SNR had approached the optimal value. This problem can NN
array output, the weights will change an appreciable amount due to the signal
power (which now may be magnified by the existence of three paths). Once
optimal value in this test than in the previous one. It should also be noted
that in the event that the preamble was severely distorted by a channel,
covergence of any kind would be severely hampered. In other words, if the
received signal did not look much at all like the reference signal, the I
-69- -
. ., .
.. I~.. ~ * * ., a - . . ~~~~~~~~~~~%
.. %-~
.14.
0~~~' a"noM lw S
a% W V
7AU
"0
-A +. ".°
I -
L
[°
V
E
r
Ut
- A "
I.* .4
. in Channel 2
%71
-4
-4
A-
-- 4$
4$
* 4,
ow~ a
p.
---
ft
C
I
ft
'A, T
44
U
C .1~
F -
1
C
ft
U
C
'I
C h.
V
a.
-A.
-4
(.
N,
N
0 Se I.. isa ~. ~.
* N.
4 iT~TZOs6
'-'A
-4
A--
S
A'
in Channel 2
-72-
4.
4.
'A,
0
-................. ~ -- -- *
- ~ ~ . - -
-. .-
-........... * .. -- -. . .V. ''A~" N: -4 ~,AA '~ 4% 'A -
4
'A ~~44'A~'A "'4 '4%
V 1
"S
I,'
4-73
'-.'UPDATE COV. 100 26.3] 38.3
% %
5o.
_ ," -73
. signal, and the algorithm would continue to adjust the weights in an attempt
to force the output to be equal to the reference signal. In effect, it would
be trying to compensate for the channel effects, although it has no true means
-it doing so. This is an inherent problem with algorithms that require
references and is worth mentioning. It is also worth mentioning that the L4S
algorithm had no problem converging in this case, and the channel produced
some fairly bad smearing effects. Therefore, it can be assumed that the
:.hannel must get significantly worse than this to prevent convergence.
.. .
.-.. . . ~ . .. . . . . . . --. . *. . . .
-74-
%- - . -
SUMHARY OF PLOTS FOR TEST2
0 1*
:::5
",
i.: V ,.-,.
-75-
0N6
--~- -~ -~---- -W -y~- -'~ - - - - - - - - - .---
OdB
- - - - - - - - - - -.
9,-76a-
'S '9%
* .9.
900
' Jammer 1I
200
-76b-
OIAXg
KANSAS 2/3
UNIVCENTER FOR RESEARCH
FOR HFINCANTENNA ARRAYSCJ)
LAURENCE TELECOMMUNICRTIO
ADAPTIVE ALGORITHMS
-A199 229 .HAEGERT ET AL JUL 87 TISL-548 RAOC-TR-86-159
Ehhhhh7h
UNCLASSIFIED F3,8682-Si-C-895 F/G 9/1 UL&
EhhhhhhhhhhhhI
hhhomhollsomhE
W..L 3.6_
11-6
Mil
0dB
-20dB
e=90 0 -50dB
-77a-
901
Jammer 1
900
1800 9d=0 0
2700
(Figure B)
-77b-
0dB ^
-20dB
-30dB
inme
Dieto1fJme
-40d-
Z..
e=90 -5d
I Jammer 1
900
2700
-78b-
X
LAv
0dB
-30dB
-40dB
e=90* 5d
-79a-
Jammer 1
900
1800 90
2700
-79b-
-~~4
-'-A*j
%z N&
z
8=00
OdB
-20dB
-40dB
e=900 -50dB
,5i
-80a-
.%!
%
900
Jammer 2 "
1800 ,g0 0
2700
(Figure B)
-80b-
0dB
-20dB
Jammer 2-30dB
-40dB
G =900 -50dB
-8la-
900 I
alxa
1800 )=
Ipi
2700
-81b-
".2 , "
" ." ',""' ',"
. "' "","%'
' '.,'.*
w- J '
%' ""
', ' 'w'
','.' "
° ,W ,'
..
',.=
',',,,'
w..w
".".
.
I"
-10dB
-40dB
9=900 -50dB
(Figure A)
-82a-
A.
'.4'
.4~l~
900
Jame
180
.0 0
!, 7
27I'
0. (Figure B)
I -82b-
.5...
! z
e=o0
0dB
-40dB
4".
e=9o o _ -50dB
(Figure A)
.- 4, -83a- '-9
-4'
900
Jammer 2.b
NN
%%
1800270
'. 2700
0, .
%
S.
-83b-
'-%
as1w
7.3 TEST3: HF Channel with Poor Delay Characteristics and Poor Attenuation
Characteristics
This test differs from TEST2 in that the delay between signals arriving
from different paths is now doubled to 1.6666 msecs. ;.
Once again, results for all algorithms were averaged over 100
convergences. The convergences were monitored and histograms were generated
which indicate the nature of when the algorithms converged. The SNR tolerance
was set to I dB for all trials. All of the algorithms placed deep nulls in
the directions of the jamming signals, as the plots that follow will verify.
The results are shown in Table 7.3.
The Constrained LMS algorithm was the "loser" again. But the average
number of convergence iterations did not change significantly from TEST2.
This seems to indicate that the covergence difficulties are more related to
the magnification of the signal (existence of three paths) than the delay
between the paths.
The results indicate that the delay between the paths did not seriously
affect the performance of the LMS algorithm. Again, this fact suggests that
-84-
%- % %
% -d P %.1 %.1 -
I
.1.
U
[
V
3
C
Qu "beS -
C
I1TIwT| 6S --
JV
L%
-85-
".
m# .. '_ ',-.-'
'' ' .. .%'..\%
.' ' r."'-''.' .'4
%,. .Lv ." .'..*.'.%.-....,-.,-.% "-..,..."%" ' ' ," .* • -'.. .. .. .. .. .. .. ,.:.
:.. . : ,', ",". . . . .- ".. - . . .• ,, - . . .. . ..- .. ., .- ' -
" , . . . , , % ".%"%"%". % o. % % * . , °. . % " 'p . %
I.I
3
T
U
-- 0 IWO N
in Channel 3
-86-
- % % -
pH4,
H %
c~wfvqrL
404
14.
%
r 1"1'.-"
V%
"I %m I WI b 13~~
TABLE 7.3 TEST3 SUMMARY
'qi
4 -88- .?
SUMMARY OF PLOTS FOR TEST3 -
"p -8
U--
<p, I,r 89 -
." ,"" . 1."% ". .. ,' .% '," ." • . ,"," ," . " ." . " . " - ". . " 4 " ." ""." " . *.
Sn " '' "' "' ' - .- ' ', , 4 " ., . -. " '- " , " - ", . , ", " " - ".' '" ' . 'r
-2d
30dB
-40dB
~9=900
-90a
.
Nv,
.0 -
4 Jammer 1
900
1800
9..
2700
-90b-
1 J.
,. ,.
O #
0dB
-40dB
0=900 5d
(Figure A)
-9la-
K.
S Jammer1
900
1800 0
2700
-9lb-
411 ~ M> - N Z -p
z
0dB
-20dB
-30dB 4.4
in Direction of Jammer 1
(Figure A)
-92a-
A% %
SJammer I
900
1800 WWI
2700
IV
-92b-
-'V
; %
01
~ '~/
ez
40d
0=0
9=90 -0dB
46
-93a-
%* %
% %
{ Jammer 1
900
-93b
J, % %
1800 0
AMLI LF r
z
e=00
0dB
-10dB
-20dB
-40dB
9=900 -- -50dB
-94a-
% %
°
" -- - f r l. w rf rf . 9o
i ~ ~Jammer 2 .'
N.N
-,
,=0 o
1800
- 2700
. • " 5 -. ;
(Figure
' ,,€ %
B) 1-
""
""" "",r ,r" %'"
" ',,, ".,-.Jw
(" " ",,,,,,,r'. ,V"' ", ,,.," "." "w'
m .',h. ),. % ,) w", ,,,,,",,-'.- % " ,r " ,4.'
"'.,P.',".." ,'.w " ... . .-.... .l,
-94b-
%%
20dB
Jamer210dB
-40dB
9=900 -50d
g4.
-95a-
%4
%=0 5d
,V.
900
1800 Q 0~s
A.t % le %.
ftt%
% %f
z
e =00
-~ ' 0dB
-20dB %
Jammer 2 -30dB
,,. ,.
-, I
-40dB
e=900 -50dB
'.p
-96a-
-p
,,
a..,
... .
.. ..
...
.... ..,.,,....
.•,-.--.,
"
. - , ., .; ,, .,,, .. ,. . //
,...,,, .,,
. .,.
""'
, ,-,
,.
.. ,.,.'/k _ . ,aJ
-.
%
"" '" "" " "'" -
-p
o
.00
S90
. Jamer 2
'S--
12700
'V
J"
-'O4-
4-..
•,S..
270
% -. I-.
4:
- ',-
h. Z
z
e=o 0 OdB
=1 -
-20dB
-30dB
-20dB
e =900 -50dB
.5
%Figure T3.8 Update Covariance-Adapted Pattern --,
N
p •%
in Direction of Jammer 2
-.'N .'
'p,'& - . -, • ....
,f .- ,", • % - - .- ,,,_. ,.. .,. , (Figure
-.-.. .- A ) ,• . - .- . - . . - .- '
.,. . -
"9.
900
I:
.1'*
A
2700.
(Fiur B
~~-97b-
7.4 TEST4: Dependence of Convergence of Constrained LMS Algorithm on the
Presence of the Signal
It has been mentioned that the Constrained LMS algorithm will perform
better when the signal is absent than when it is present. In other words, if
the Constrained LMS algorithm was to be selected, sending a preamble would not
only be wasteful, it would be detrimental. Tests 1, 2 and 3 will now be
repeated for the Constrained 1MS with the "desired" signal (preamble) being
absent.
.. %
I). In other words, the Constrained LMS algorithm will have to attain the
same value of SNR as it did before.
The results are tabulated in Table 7.4. The polar antenna plots that
follow verify that the Constrained LMS algorithm places deep nulls in the
directions of the jammers without the benefit of any preamble whatsoever. The
number of average iterations required also validates the assumption that the
algorithm will perform better in the absence of the signal.
iterations for channels 2 and 3. When the signal is absent, however, the
algorithm actually had the smallest percentage deviation of all the algorithms
. tested. This is graphically illustrated by the histograms of Figures 7.13 -
7.15. This fact only strengthens the claim that the existence of the three
paths (and the signal magnification that results) is the primary culprit of
the convergence problems suffered by the Constrained LMS algorithm. When this
effect was nullified by eliminating the signal, convergence was fairly rapid
and quite consistent.
4:-.
-98-
% %,
%%~ ~~~~
.o *1,i
3 7'
1
SUE
7%%
*1m
iso
• .'
IN"
to to" 30 "e 40" 6"40 Go"
I TUT I am
a£
N %q IR
'
p% -.'1
L
c
v
g.00 :.
V,
0,I- 3T 00T-
%0
-100-
L~.,
,''.. -,..,.,. ,-.,:,. ..-. .,,-..-- ..- .-.- .,;.- ,-,- .-.-.-.-. '...-.- ,..-.-
.- ,'.- .-..,...- ,%
O1! %. %..
T.T. ..
,",,. .- .,.-•. . .. ..... .-,..- •.: .,"....... ' •. ..,,.
,,,",,,,,,,, u. .....-..
. .. ., ' - -.-. .- -.-...- , .-,..
... )
-/ A
-i01-
Table 7.4 TEST4 SUMMARY .-
012
:"ON 4..
z
0dB
-10dB
-20d
-3d
Jame
-40d
I, Figure T4.1
~Arrow
Elevation plot at 900 azimuth
* (Figure A)]
-103a-
'at.% % %
% Ji. " "
up%
't Jammner1
S. 900
CN.
)=
1800
* 270.
%4
[Z •
8 =00
OdB
• -lOdB
-20dB "-
30dB
Jammer 1 ".'..
-40dB
,S -
-104a-- ,*
5,,%.
.44
,-,..p . ._ ,. .. _. ,., .. , ... , .. . , .. . ,.. . ., , .. . . . . . . . .. . . . : -
L
18090 o =0
*
a
--
'
[O
~(
Figure B) '.
..
..
a,,r ..-,,.
-a .
a ..'.
-1-4b-
"." _
-. ....
- *
1 o. A,
."""""-. "- €".*." -a' -" " .L, ' ", 2 ;
€' " ",/ ' "- .... " " *"
e=0o
OdB
-10dB F,
r
-20dB
• Jammer 2 3d
S-40dB
S=900o5 .4,
.dB
Elevation plot at 1500
azimuth
414
-
- Arrow indicates arrival angle of Jammer 2 -4
(9=750 ) .;'
8= 9-105 a-
.,., -50dB -'
i..
.. A
ft.-
f-,
'%
"*-"tft
,, "
- .°'
,,,% / ., -,
••
"-...
'."
•"
"-..
'.
.:.'"
*..'
,"
.-.-.
',.
..'.."r"
.'°".
.4-
." ,. , .. '.4" -."•.,",",""-.'".,." % ',, ' .
'" . " ., ,,",,%."
"•%",."" ""•"- -[",'k . "". ",.'"""
4'. "'" , ,; " '-'
" f"t tp*
900
I
".
['-'-'-Jamm er 2
- OZ, -•
PP
n ,
% %
-"' 270 0
(Figure B)
N:
-10 5b- I
I ,d%
-
z
e=0
-0dB
-'3.
-40dB
:.:." ',
.-
e=90 0 -50dB
-106a-
a--
IlI
2700
(Figure B)
liv
-106b-
7.5 TEST5: Dependence of Adapted Antenna Pattern on Number of Required P
Iterations
not the adapted antenna patterns produced by widely separated convergences are
significantly different.
The polar antenna plots that follow were generated using the fastest and
€ '.'i'-V
[ ~.-"
-107-
". -107-
oS
- , * ,-* - . .. * -
zA
0 =00
30dB
Jammer
-40dB
SZZ.
e=900 -50dB
Fastest Convergence
Figure T5. 1 Adapted Elevation Patterns at 900 Azimut.1h
(Figure A)
Kw -
a -108a-
J
%6
-40dB
9=900-50dB
Slwet ovegec
(Figure.B)
-18b
6MWIW
Lrf
k w~
4, Jamer 1
900
* ~1800 ~0
2700
-109a-
.40,
4.%
Wk4
Jammer 1
900
4
g 0
1300
2700
Slowest Convergence
-109b-
*1.-
"'I
-30dB -'-
i%
%%%
.k ,tU. 44d
NA .
N.
IU-.
"
--"=90'
-50dB -
r . . r) (FJigure
% G=90 o
-50dB
• '. Fastest Convergence
"
~Figure T5.3 Adapted Elevation Patterns at 1500 Azimuth
'" '" '
(Figure A)
.
"." .
-ll~a-
.
'. .....
,"
~* -*.---.- ",
* ~e=ovI -
I *dv
10dB
-20dB r
4 -30dB
-40dB
r
e=90 0 -50dB
Slowest Convergence
(Figure B)
%
N.A.
4
Vaa
-- ~ ~ ~~~ r 'rr -. ~~~~ - W-.-W - r'W r rn -w,. r. r - rr-
900
1800 O0
as0'
2700
Slowest Convergence
Figure T5.4~ Adapted Azimuthal Patterns at 750 Elevation
I (Figure B)
,
-ilib-
p 4OQi.~
TEST SULMARY
For convenience, the results from Tests 1-4 are re-tabulated as shown in
Table 7.5. Also, Figures 7.16 - 7.19 track the performances of each algorithm
for identical convergences in each of the three channels tested.
% %
.4Z
,I.-6!AA-I-VLZ
L.A &I o. M.'C d%
-112-" ',
Table 7.5 Comparison of Convergence Properties for the
Adaptive Algorithms
ADA PT ','E
ADA
I:: AL CXA:;' L
-t CHA ;E 2
a
C-i
CA:.:
-er
cC:2.. 1 - - ,37
(no L::s
P .3.s ,ra~',, 88 59 8 1 06
I I'
10 7 26 38 29 43
COV AP TA CE '
:.:. -n 3 - .. ,
-113- U
,J..
k".,"
--..."."
'-..-.-'.,'-..',V,,:,-.'.-,'."',':...'..':,':,.:'..",,./
- ., i .-.
:- .'.'..-,'-,.-..
.'-."-. ... . . ,... . . , , .
,.',.---?..
. ..:,.
-- - -- - -- - -- - -
aA AL ftL w9
I.~IEA / -O OWf
4"..
%0U
Figure 7.16 Convergence Summary for LMS Algorithms
-114-
-% 'S.
5-~~~ - %
%-.*. - §> - S % CZ&iZ§:. -
v.~sS.
.~ - ~~v, S
OW91n 3
-30.
I
- -S
0 25 ee7 O1" 25 S
IaTIM
a%
,10
- - - -- •
~%
4-" .1.
"--
-" W.
II~
0
T 0 2.
/
-40
1 i1i o l,
-..-.-
4,.%"
-4 i 6- I I I I-.,
- I-I I I
/ . . . a, , m, , # l,,e, r , # = .. ,.. - : , . .. _
44
21 4N go "
(n sina present)W~
-
%
7.6 Testb: Investigation of an Alternate Antenna Geometry
This rhomboid pattern was chosen somewhat at random, and is not in any
way special. It was chosen simply to provide the simulation with a geometry
different from the rectangular array used elsewhere.
, The antenna plots for this case do show a difference in shape as compared
to those for the rectangular geometry. This is simply due to the change in
* the antenna array factor caused by the alternate geometry. Notice, however,
" that the general trend of the patterns is the same for both geometries. We
see only slight variations in the patterns as functions of both the
controlling algorithm and the channel characteristics.
m'..
-118- 1
S . ,
'-.
--,.-
,.-.,,-
- --s . " ..
.-. ',-. -.-. -.- .- " '- ' - .*'-' - . -, , --. - - - ' , -- - '- ---- -- - -. ' - '- ' . . -...- '". .-
"- -' '. -' ' ,.,- J -; -i '- -'
" <.''...,,.--
-. ",''.-"
."'. ""..
.-
°- . .'".".. . .-..
"-" . ."-.".
. ."..
.".. . .'.""..
.". .,,.. ."-.. . . . '.-' ''J '.-'•'
is',% %
'-" y axis .. ;
N',
y s
x axis N
i '-
Figure 7.20
t -119-
4-
-p.d
-4
% 1,.S
.2._ ,<. ,,.... ,.,, ., - -"v -"- r
,.e::.....................".-...- .-....
...... .. .---.--.--.-.
- .-
.-.
t.-. /'#,. .: .:.: :.: 'i,....AV'J' . %, " $*):;..
. . - -.---. , -..-. , - . -----.. , ...-... -?..- -.--.
tlml t
fL
q"j
-* U
31
* n
C
I I I r r
number of iterations
. ,
-120-
Li
..
,< ..... % %€
V %. A W,
* -
r s-'v-r.-r-'. ..
vI- . r '.. - - r. .' .J --
: . .- J: l. .
I -'p -
.46
'
"-.
e 0-
00 20048- 00 50
,p....
i-
C.-121-
5.
.- in
LMS Algorithm "
of Constrained
Histogram
Convergence -121-
Figure 7.22 Geometry
2 for Rhomboid
Channel
PIk--L71,.:,.: Ii -7RrK
Iv,,
60' *
4 Lk
i 40-
.. % ,n ,
,J- ",J
'Ib
-.Nott
,r"
212
,".. .I..
-2'-%
--]1 "-
-3
I q 1
e -
number of iterations
-123-
%.
%
Ar 9p %
413
e
F.
4 II
q 20-
b ' ?r
n
number of iterations
.9- J- : , - - , -. -,.-o.7.25
Figure >-, . ,...., ... Histogram
Convergence .-..-. ,.oof Constrained
. ,. ,.o. .,.-,.,...o
LMS Algorithm-...
in . . .o. -:
,-'9 " % " % , m , . - - . , . . .- ,. , . . % . % . , .- - . - - - - -
• ". Channel 3 for Rhomboid Geometry
**-...
>_*.4 _ .' . Y " * . -' .'-----'.'.'.'.-.-.- '
. .'. -'- .' * '. g . . '' ' ' -.-.- ' -. * ' ' - ".'''" "' ' '
. -9-, , .9-%;,. "-%%% '. ,;. ; .qZ.-,'. ' % '. ;7'--_; . --- :..',;-.;'-.---, l
4€ -12 4-
0 6 % .--
Hi t oq r am
u. .'.- ..
r -
wf
n
n of ieraio-
¢ I
.4
P
Figure 7.26 Convergence Histogram of Update Covariance Algorithm.
C'. q
-125-
'4 e
t]. '%_.
%%", * ' " Figure --. • ,
7.26"-"Convergence"-'-'-Histogram,,".of-"Update..
Covarian.',ce Algorithm " "P
:,, -,., , , ,,,,.,,.,...-. in.Channel-.-,.. 3...for Rhomboid, .,.,-.,..../....Geometry.. . ., ... ..
o. ..
%%"
SUMMARY OF PLOTS FOR TEST6 - RHOMBOID GEOMETRY
V .-
% ,
%4
•" ' ." ." " " ." ." .
.'- . .-.,.."
.-.- .P.,+.-..
',".
,''..
.
.-.-.
.,...... .p'"
,+t
'' ' ";+. ,. + '+',''
% ' ..
. .
"".s ',,, .,
."' " ' - .
%
.
,, .-. , ..-.. •
' ' . '"
•.
"" "
I
'....-
. ".".... .
z
OdB
% %
.40d
p.-
8=0 5d
e (F0gure0A)
-127a--
Jammer 1
900
\ -
180o 0 I=0"
I..>'..,
i
Figm;re 61 'nadapted Antenna Pattern in Direction of Jammer 1
(Figure B)
-127b-
O%.' %
0dB
.4,4 :1
-20dB
-30dB
-40dB
e=900 -50dB
(Figure A)
-128a- I
All
Jammer 1
900
S.
180
%. %
86=00I
20dB
-30dB -
"S a.e
-30dB f
e=90 -50dB
in Direction
A) of Jammer(Fgr
-129a- -
% %*
JAI- Ae.
I Jammer 1
900
15 0-- -3.
%.
p.
2700
Fi~g- re 76.3
(FigUi.e B
*% %
I Nk, . ----
20dB
-30dB
-40dB
9=900 -50dB
?ig r -.
nUdate Covariance-Adapted Pattern
in Direction of Jammer 1
* (Fig-.ire A)
-l3Oa-
I*1
.5A
Jae I'
900
30bft
%f
%.
lk 2700 11 MM
z
e=00
______ OdB
"', -lOdB
:: ., -40d ".
-30dB
~~Jammer 1 "
-40dB
.- S
-N.'
9 =90 0 -50dB ~
(Figure A)
-131a-
,+%,
@ | ,
Ja;MM er 1
900
1800 90
2700
Figue
T65 LM-Adapted Pattern in Direction of' Jammer 1
S (Figure B)
-13 ib-
0%
f.. ..-.~ ~ *~*%* -.- ~.-- --- p %
OdB
",% -20dB m
-30dB "
~~~Jammer 1",";i
%% %
(Figure A)
-132a-
4.
Jammer 1.
900
0270
wp-132b- %
.1w,
z I
9=0 o
0 d -_
-lOd B -:
-20dB
-30dB 4
Jammer 1
-40dB
8=900 -50dB
(Figure A)
L-133a-
!N N N
Ile e%% % % r % *N;..N: :'*: :*- *. . * N. \ .
Jammer 1
900
180----e
%
11
270
Fo RhmodGoer
%* %
Kv-P
z
0dB
.1 ,,-20d.
2 * -30dB
/"" "-"-40dB
::: .- -,.
9 =9o -- - - ..
--..- ----.. -50dB
,@ (Figure A)
• .8
-134a-
..
• Q.%
gj4j,2
4-€.j4 .j4jj, -.-.-.-. '. '
-j',-,.,- ,,. , , ., - '.,' .. ,.- .- -.. . ..-. --... .. -- , .... . '5/'
,,
5O " - - ' - ' " " '- ' : ' ' '' "
, --.
"I" "'': "" -" - : "...... °2 .: .. ..' - . : . .. . . .. .. < .. . .. . . . - - : .4","
''
900
Jammer 2
OIAA
%5
2700A
-134b4
r -C
% 5..% -". %?
41 , . . ,
", .1, % 2700
% %%.
e=00l
0dB
sN..
%-30dB
-40d
e=90o -50dB
;5. -135a-
*~ -'
--. 5 ~ .5. -N
900
Janmer 2
1800 2700
AWIN
-135A..
- 2700
e4o'..-.-o
OdB
-n4;.I
-20dB
•-,...
-44...
" '
.4-
-4 ,..,
e=90 0 -0dB
4-..:-
,,-4.-.,"'.
For Rhomboid Geometry
(Figure A)
%", ".
-136a- ,%
4-". . (. . . . . . . . . .
900
1800 ~0
2700
-136b-
L Lk
zA
lOd
- -20dB
-40dB
e=90 0 4-50dB
-137a- .
%%
W,
vi%
V,
zA
1800A'
=00S
2700
For
Gemetr Rombod
(Fiur B)
*17b
'A%
14
z
N 08=00
0d3
-20d
*P% %
.9=900
r
For Rhomboid Geometry
0 Figure T6.12 LMS-Adapted Pattern in
(Figure A)
AnrAN -
"7-Ai09 329 ADPTV AL 0RITI4NS FOR HF ANTENNA ARRAVS(U) K-ANSAS 3/3
FOR RESEARCH INC LAUdRENCE TELECOKNUNICATIO
TEUNIV
CENTER
0 HAEGERT ET AL JUL 87 TISL-5481 RADC-TR-86-159
UNCLASSIFIED F3860?2-8i-C-8265 F/G 9/1i U
SENSEhhhi
L111 1112.
IN HARI
900
p.1800
J=
2700
-138b-
A.%
V.w
e =900
(Figure A)
-1L3 9a-
I Selm
- - ~I--------_--
-
900
1800 J=
2700
-139b-
a% %
3' lip
*O~ &I.'
8=00 I d
0dB
-20dB
-40dB
e=90 0 5d
(Figure A)
-140a-
ALI;
1800 Jd900
180700
%~ %
till 11
J&
7.7 Conclusions and Recommendations
In all of the tests that were conducted, the Update Covariance algorithm
consistently outperformed the others in terms of required iterations for
convergence. It has also been shown that this can be an extremely misleading
quantity, as the algorithm may require more actual computations to converge.
Therefore, although the Update Covariance algorithm will converge in fewer
iterations, it will undoubtedly require significantly more time to complete
. each iteration. As an example, assume that it was desired to build an array
. consisting of 36 elements, and that the algorithm must converge on a preamble
3
100 msecs. in duration. The Update Covariance algorithm would then require N
+ 3N2 + 3N or approximately 50652 complex computations for each iteration. If
the algorithm needs 100 iterations to converge, a grand total of 5065200
complex computations must be completed in 100 msecs. This allows
approximately 19.74 nanoseconds to perform a complex computation. So despite
the comparatively few iterations required, implementing the Update Covariance
algorithm may place rigorous, if not unreasonable demands on the hardware.
Even if this can be attained, it seems unreasonable to implement such a system
when other algorithms can offer similar convergence times with much less
complicated hardware. It was shown that the LMS algorithm could converge with
fewer computations. And unlike the Update Covariance algorithm (which
involves matrix arithmetic), the computations of the LMS algorithm can be
performed simultaneously. In other words, the required 2N computations can be
performed N at a time as the update of one weight is independent of the update
of another. The required time for each iteration is therefore equal to the
*5, time it takes to perform 2 complex computations. This means that the actual
realtime convergence for 2.MSalgorithm is much less than that of the Update
* Covariance algorithm in all cases that have been presented.
The LMS algorithm is not without its drawbacks, however, as has been
V" mentioned. Probably the most notable is the reference requirement that has
been discussed. The channel model in this simulation posed not prohibitive
O,57
difficulties for the algorithm and, if it is a good representation of what
-. goes on in the HF channel as it is believed, the reference requirement should
not be a major obstacle. The reference signal generation will, however,
require precise synchronization between the arrival of the transmitted M
preamble and the preamble used as the reference. This may be a difficult
.0%.#-141-
-/,/ I4 ?
% ~
%* - * %* %, %
%,.-,
task. If not, however, the simulation study indicates that the LMS algorithm
would be an effective choice.
:JL
-142-
.d.i % %.-
. .1
-o .. .. " .-.. ,"-.
N... . - .. "- " " .- " - " ', ",,, "
REFERENCES
[3] B. Widrow and J.M. McCool, " A Comparison of Adaptive Algorithms Based
on the Method of Steepest Descent and Random Search," IEEE Transactions
on Antennas and Propagation, vol AP-24, no. 5, Sept. 1976.
[4] L.J. Griffiths, "A Simple Algorithm for Real-time Processing in Antenna
Arrays," Proceedings of the IEEE, vol. 57, Oct. 1969.
(51 O.L. Frost III, "An Algorithm for Linearly Constrained Adaptive Array
Processors," Proceedings of the IEEE, vol. 60, no. 8, Aug. 1972.
(61 K. Takao, M. Fujita, and T. Nishi, "An Adaptive Antenna Array Under
Directional Constraint," IEEE Transactions on Antennas and Propagation,
vol AP-24, no. 5, Sept 1976.
[8] L.E. Brennan, J.D. Mallet, I.S. Reed,"Adaptive Arrays in Airborne MTI
Radar," IEEE Transactions on Antennas and Propagation, vol AP-24, no.
5, Sept. 1976.
[13] P. Snow, " An Antenna Simulation for a Spread Spectrum System," M.S.
project report, Dept. of Electrical and Computer Engineering, 1984.
o~' ..-.,o,
-143-
I.4..
% %'q
%0
%' ~?W
APPENDIX A
where
where
JII
-144-
.P~
Finally, define the complex envelope u(t) as
so that
j2rrf t
ct
s(t) = re[u(t) e
g15
4 I
APPENDIX B
As shown in Figure B-I, the input phase is initiated with the command
@INPUT. This command file asks the user to input the name of the experiment
to be performed, and in this case we have chosen TESTI. The result of this is
the creation of a new subdirectory which is given the name EXPERIMENT
TESTI. This subdirectory, then, will provide a location for the simulation
run, and will contain all important output files produced. This, however, is
completely transparent to the user.
Again referring to Figure B-I, we see that as soon as the user determines
*the name of the experiment, he or she is immediately introduced to the first
menu of the actual input program. It is this routine which creates the data
file which is subsequently read by the simulation mainline. Before explaining
the actual variables appearing in this and the remaining menus, we first
consider the methods by which variables are input and new mer.us acquired.
-146-
%t..%
04.
-~~M ~ A*t .
changed on a run through the input program, it becomes the new default value -
Now that we may move through the input program, the variables themselves
will be explained. It will be expedient to cover the variables one menu at a
time since, in many cases, the variables within a menu are closely related.
For the following discussion, refer to Figures B-I through B-10.
These parameters are general and serve to set up the simulation at its
most basic level. Here, many of the variables are self-explanatory.
Here the user is asked to choose the type of algorithm which will control
the simulation.
This menu gives the user several options to construct the antenna array
to be used in the simulation. The array elements are dipole antennas (whip
above ground).
-147-
,. ....
me'+.'+"
.. +..- .-...
" * ,++*
* .'.. . .. . o. ., . . +"Z.. . . . ,,. ."..
. . . .-."... . . . . . . ... . 5
I. Number of antenna elements (maximum = 9 elements)
2. Number of incoming signals. This parameter is simply the total
number of impinging signals, including both the desired signal as
well as one or two jammers.
. 3. Dipole equivalent element length (meters). The length of an
equivalent dipole has been assumed to be twice the length of the
actual whip antennas. -
Here, the user is allowed to define the actual geometry of the array by
specifying the x and y coordinates of each element. This menu, again, is
variable in length depending on the number of elements entered earlier.
The user is prompted for the arrival angles of the incoming signals (in
degrees). It is always assumed that the friendly communicator is signal #1.
The azimuth and elevation angles are specified in terms of the spherical
coordinates PHI and THETA. Phi determines the azimuthal coordinate and is
defined to be 0 degrees on the x-axis and increasing toward the y-axis.
Theta, on the other hand, determines the elevation and is defined to be 0
degrees on the z-axis and increasing toward the x-y plane. Note that in our
case, it is only meaningful if theta is in the range from 0* to 90* as this
corresponds to the space above ground.
-148-
.,
BI.7 Menu 7: HF Channel Parameters
channel. It essentially chooses the number of taps in the tapped delay line
model employed by the channel.
entered in menu 7. Here the delay of each path is given in milliseconds and
is used in the HF channel model to simulate dispersiveness. Note that the
first delay is assumed to be zero, and the others are simply relative to the
first. Also, it should be noticed that the path delays should be integer
multiples of (1/Nyquist Rate). This is necessary, again, due to the
implementation of the HF channel model.
The HF channel model contains multipliers which allow signals emerging from
different paths to be attenuated separately. This menu lets the user assign a
different attenuation to each path.
of the convergence, but is also very difficult to obtain. For the most part,
6 only a trial and error type search will produce the optimum value. A rough
estimated value is calculated by the program, but it should not be trusted too
far. The default value may be repeatedly changed until the simulation model
is executed. Note that only 5 decimal places are provided by the input
but unfortunately only 5 are displayed. The actual value may be viewed simply
* by listing the parameter file.
-149- ' .
-"
%% . ,,
The purpose of this section is to explain the use of the output programs
which allow both a review of the input parameters, as well as the results, of
any test.
-
experiment do you wish to see the output?" After the response is given, which
in our case is TESTI, the program returns the menu shown in Figure B-I1. We
-. see that there are 8 choices of output, the first 3 simply being a review of
the input parameters of the test, while the remaining choices are actual data
output from the run. To explain the use of this menu, we will step through it
I
To invoke this or any other option, simply type the corresponding
in the test as well as the carrier frequency and equivalent dipole lengths of
the antennas. Also displayed are the amplitude and phase distributions for
each element resulting from the adaptation. To return, then, to the main menu
from this option, simply type <return> and Figure B-I will again appear.
The second screen which may be viewed, shown in Figure B-13, is also a
review of parameters, but here it is the channel information which is
displayed. Several other input quantities are also listed such as data rate,
-150-
~ ~ ~
.~ .. . ...
type of algorithm, number of convergences, and the convergence constant.
Again, to return to the main menu, just type <return>.
As shown in Figure B-14, this screen lets the user review the arrival
angles of the friendly signal as well as that of the jammers. Also, the
jammer to signal ratios are displayed for each of the jammers.
Typing 5 at the main menu level allows the user to examine the antenna
plots which have resulted from the simulation. This is probably the most
useful portion of the output program, as it allows immediate conformation of
the algorithm performance. Actually when Option 5 is chosen in the main menu,
a new menu appears as shown in Figure B-16. With this menu at hand, the user
is given the capability of examining any cut of the antenna pattern simply by
changing the menu entries. To better understand the capabilities, we will
step through each option of the sub-menu.
-151-
% "".-"-""
4V*N"%.%,,
82.5.2 Sub-Option 2: Fixed Angle PHI for Elevation Plot
allowed to vary over the range 0 to 180 degrees. For example, if PHI is equal
.. to 0, then the resulting elevation plot will exist in the x-z plane.
L .. ..
This option is very similar to the previous one in this menu, but here it
is THETA which we fix instead of PHI. This value is used to produce an
azimuth plot at some fixed elevation. For example, if THETA is 90 degrees,
the resulting azimuth plot would exist in the x-y plane. For values other
than 90 degrees, it should be realized that the resulting pattern does not
exist in a plane, but is simply the projection onto a plane of the field
values.
At the bottom of the screen on each antenna plot, the program asks
whether one wishes to see more antenna plots. If the response is yes then
O, control is returned to the menu of Figure B-16. On the other hand, if the
answer is no, the user is returned to the main menu (Figure B-1).
-152-
4W % % %' % e
B2.6 Option 6: View Histogram of Convergence Counts
This option produces a plot of the signal to noise ratio versus the
number of iterations. An example of this is shown in Figure B-19. This plot
The final available plot is shown in Figure B-20, and represents the
* magnitude of the error signal used by the LMS algorithm for adaptation. This
option may only be invoked if the controlling algorithm of the test is the
LMS, however. It is the only algorithm which makes use of an error signal,
and consequently the mainline only produces the output file for that case.
This plot is also stopped at 6250 iterations to get a reasonable number of
* %
• .4
.6,
-153-
.4. . 4 . ** . ** . * .,.-.,..
." -45-.;. .
S kinput
Whi.r i- the ri.e or this experimene": tostI
TMULLTIOH PQRPMETERt
4 20
'~.. NE>.T ENTRY PLEPfE (0k TO kEVIEW THE PAGE, -1 TO LEAVE THE PAGEJ
SIMULATION PARAMETERS
41"%
TYPE=I1 = LMS
-154 -
14L
.: . . .-
.d4TElNA NHRY r-wkmE crE.
1. i44 10 F OR J WIIIE P* I
-155
%
4 %.
%0
RELATrVE kNTENHA ELEMENT LOCATIONS
NE91SURE I4 METER.
CC .....
IPTE CF ELE'EHT 3
0. 9
2 Y CO0R:11 OATE OF E L EN ENT I1 e O O
5 -1
MEACURED 1H METERS
-1
DO fOu ,dlNT TO REVIEW ,ILL THE PARAMETERS ly-N)
% ,,%i
L oe--L'.u,.
b Y~Q.IMUTH kPHI) ;ND ELEVATION (THETA) COORDINATES OF INCOMING SISrL4AL,
~~~PHI=O IMPLIE: 7HE - I.PHI INCREASE: TOWARD THE Y-AXIS..,
mF CHANNEL PARAMETERS
,N
I NIMBER OF ODEL Or PQOPOGATION (TAPS) 0 N
-!
EA:;URED I ?1ILL;',ECONDS
IF PAH UM !E I 0I
L .)O.
0e e
.%', ~ ~~:
) EL,4Y ')F )Qirr 4¢JMFER rm
-Fgure 3- Menu 19 J n
".,
V.%
. °
---, -j ._l.3-. _%-.j..iwj.. '.' . ) . jL -. ' ..- V .... '.. .. %-'..'. %*.. -.- ..-.. -*. .
vi
I I
A,% %
OUTPUT- The Main Menu PO I
-o,
S. C 0.12 31 .32
C
9%. ":. '.' sot'
.0 .03
_ i
S,., O-k, 0 . ; -e.l --
* 1F. ,-,
, C. k) 8.3 - 1 . 24 "
' 8.(o @.,I -1 . :6
,9,
ft ro at o
"'D ulbOer
tat, R;ate , Cin bit
t Irie.s tS. ' -c
t i : 3I0
l1 I-A
-159-
aI I R
ar1a cc ,Ci* l
Avrce..na/nefrne i B
. . l Jill
V14 Jill aJl.%
Wvr~
i
,a1~~ lItrfrneu dl 28
ME.=
-LICE DESCRIPTION
" -
/Y
/ -..
- .,- ,
( /
/
/
, -
- , %
,,,' \ ..
1'61
4 " " ,
-161- '
HiLtooram.
-i El16
r j.
1
-, t
f
r
e
n
C
y0 H -¢
6_ number of iterations
p.,.
-162-
.-. "
s'rs v s numoer or iter
12C4
.4' ~n
d
1C4-4 I7
I .2a 0 I
-91be ofieain
Figre
-19 Sigal o niseplo
iI~iIi iI~ 1 I
*I
%~'
n
(%
2* *J-.
-0 LA
-1
IIt
,r
0- - "I I "
- 2 0
20 40@0 ROO@80
, number of iteratons
-164-
MISSION
of
Rome Air Development Center
A c, C
L' 1,17itJ'' c c,~t
i_'nm,
g a L c .'
¢c'm,
Iils c, T, c h i~t c at ' ziit.~ , :..,a
s(qpc . x Lt t t . ( S
C t_, Co I il i, c!
T"L 3 1 : . I.,
ESO i.a1
P 0c P05)al i ESV C 2WnC iIt5
zc o, c )z iecl ra ca 0cte
, a iI a. ti tt,
t,., , satec
L, i'l cc t om a LJ c, s a I
U ,,
a a t C, i iL tC la iItac ' C ..
,.1
. --.. . . . .
I ." . . . . . . . . . .
A
Do t
.1,,
.d*.n
•w
O5O/ • • • • • ,