Decision Feedback Modulation Recognition with Channel Estimation for Amplify and Forward Two-Path Consecutive Relaying Systems

Automatic modulation recognition (AMR) is an essential component in the design of smart radios that can intelligently communicate with their surroundings in order to make the most efficient use of available resources. Throughout the last few decades, this issue has been subjected to in-depth examination in the published research literature. To the best of the authors’ knowledge, there have only been a few studies that have been specifically devoted to the task of performing AMR across cooperative wireless transmissions. In this contribution, we examine the AMR problem in the context of amplify-and-forward (AAF) two-path consecutive relaying systems (TCRS) for the first time in the literature. We leverage the property of data redundancy associated with AAF-TCRS signals to design a decision feedback iterative modulation recognizer via an expectation-maximization procedure. The proposed recognizer incorporates the soft information produced by the data detection process as a priori knowledge to generate the a posteriori expectations of the information symbols, which are employed as training symbols. The proposed algorithm additionally involves the development of an estimate of the channel coefficients as a secondary activity. The simulation outcomes have validated the feasibility of the proposed design by demonstrating its capacity to achieve an excellent recognition performance under a wide range of running conditions. According to the findings, the suggested technique converges within six rounds, achieving perfect recognition performance at a signal-to-noise ratio of 14 dB. Furthermore, the minimal pilot-to-frame-size ratio necessary to successfully execute the iterative procedure is 0.07. In addition, the proposed method is essentially immune to time offset and performs well throughout a broad range of frequency offset. Lastly, the proposed strategy beats the existing techniques in recognition accuracy while requiring a low level of processing complexity.


Introduction
The increasing growth in the number of end-users in wireless communication networks has raised the reliability and stability criteria that must be satisfied by both current and future networks. Providing such conditions is challenging and requires building intelligent and sophisticated networks to ensure high quality-of-service for the end-users and to help with agile management of wireless network resources [1]. Automatic modulation recognition (AMR) plays a significant role in the development of such networks for numerous military and civilian applications such as threat assessment, link adaption, software-defined radio, spectrum monitoring, and cognitive radio [2][3][4][5][6][7][8][9]. Table 1 provides definitions for acronyms used in this work.
The modulation information may be incorporated in each broadcast frame when adaptive modulation is used to mitigate the effects of channel distortion or to offer ondemand data rate service [10,11]. However, such a strategy is not spectrum efficient for real wireless networks due to transmitting extra control information. After the signal has been detected and before it has been demodulated, AMR algorithms demonstrate their significance by determining the kind of modulation present at the receiver in order to perform accurate signal demodulation without requiring any prior information. This results in a reduction in the signal overhead and an enhancement in the spectrum's efficiency [12]. Another example that highlights the relevance of AMR is offered by cognitive radios, which permits unlicensed users to transmit their data over the bands that are currently being used by other legitimate users. An AMR algorithm is an essential part of the design of cognitive radios, and its primary function is to determine the kind of modulations that are already present in the signals that have been received [13][14][15]. This enables cognitive radios to communicate without causing harmful interference to users who are currently utilizing their bands. AMR has recently found practical applications in wireless sensor networks, which have evolved as potential solutions to a wide variety of real-life problems [16,17]. A viable AMR technique for sensor networks should provide a fusion centre, which merges local information obtained and/or created by separate sensing nodes [18]. Fusion techniques of this kind may be used at the data, feature, and decision levels [19]. The fusion center receives the raw signal data directly from each sensor node in a data-level fusion process. Despite the fact that each sensor is only needed to do little processing, the data-level fusion method requires a substantial transmission overhead from each sensor to the fusion center. In a feature-based fusion methods, each sensor extracts features from the collected data and then communicates the recovered features to the fusion center, which needs all sensors to be closely synchronized with each other in order to make a final judgment. In decision-layer fusion processes, each sensor creates a local judgement based on the extracted characteristics, which is then sent to the fusion centre, which derives the global judgement based on the local choices. In general, combined signals from a group of geographically distributed sensors will produce a higher performance for modulation recognition than any one node would achieve on its own [20]. For example, deep residual network and long short time memory are adopted for modulation recognition with distributed sensors [21], yielding better recognition accuracy than a single convolution neural network.
Alternatively, cooperative diversity is a relatively recent category of wireless communication systems in which network nodes assist each other in relaying information to improve connection reliability, spectrum efficiency, system capacity, and transmission coverage [22][23][24]. As a result, cooperative communication seems to be similar to a distributed multiple-input multiple-output (MIMO) system that utilizes a virtual antenna array. Amplify-and-forward (AAF), decode-and-forward, and compress-and-forward are examples of the cooperative protocols that have been developed so far [25][26][27]. Full-duplex and half-duplex relaying are the two primary varieties of this communication technique. Full-duplex communications occur when a relay is able to simultaneously send and receive signals within the same frequency range. Even though the relay is able to eliminate interference between the transmitted and received signals, a slight error in the cancellation process can result in a significant decrease in performance due to the fact that the power of the received signal is significantly less than that of the transmitted signal [28,29]. Because of this, it is recommended to employ half-duplex relaying, in which the relaying node either broadcasts or receives information at the same time. Half-duplex, on the other hand, suffers from the drawback of reduced spectral efficiency, which results in a throughput drop of fifty percent [30]. One possible solution to deal with this challenge is to use two-path consecutive relaying systems (TCRS) [31][32][33][34]. To be more detailed, the source broadcasts its information to one of the relays and the destination at any given time slot, while the other relay transfers the information it got from the source during the time slot preceding it to the destination. Because of this, the source is able to send data in a continuous manner, which allows the spectral efficiency loss to be restored.
There has been a significant amount of effort put into the information theoretic study of a variety of cooperative systems in order to predict the rates that are practical, the capacity restrictions, the diversity-multiplexing tradeoff, as well as data extraction and channel identification (e.g., [31,[35][36][37][38][39]). In spite of the significance of these discoveries, further research has to be conducted before cooperative systems may be put into reality. One of the most important difficulties that has to be tackled is determining how AMR is accomplished in cooperative systems. The development of AMR algorithms for cooperative systems has only been the focus of a relatively small number of research up to this time. Recently, the maximum-likelihood (ML) solution and cross-correlation functions were used in order to carry out AMR over decode-and-forward one-relay cooperative systems [40,41].
The following are the primary contributions of this study.
• For the first time in the lecture, an AMR algorithm for TCRS using an AAF protocol is proposed in this work. • Through the use of the expectation-maximization (EM) process [42,43], the maximumlikelihood (ML) principle is used to arrive at an estimate of the allotted modulation scheme.

•
The proposed algorithm makes use of the a posteriori probabilities that are acquired by the data detector as a priori knowledge to create the a posteriori expectations of the broadcast symbols, which are utilized as training symbols. • Instead of using different algorithms to predict the channel impulse responses that occur between the source and relays, the source and the destination, and the relays and the destination, we estimate a single parameter called the overall channel impulse response, which includes all these connections.
The remaining parts of the work are structured in the following manner. In Section 2, the cooperative system model under consideration is presented. The proposed AMR algorithm and its practical discussion are offered in Sections 3 and 4. The simulation results with appropriate analysis are provided in Section 5. Finally, we conclude the work in Section 6.

System Model
We examine a wireless cooperative network that includes a source (S), a destination (D), and two half-duplex relays (R 1 and R 2 ). All nodes have a single antenna, and relays employ an AAF protocol. The source data are sent in the form of frames, and each frame comprises W packets. Each packet is made up of C data symbols, all of which are taken at random and autonomously from a modulation constellation known as Φ. The key idea of adaptive modulation is that the source makes adjustments to its modulation scheme on a frame-by-frame basis in accordance with the channel impulse response. These adjustments are made in order to maximize cumulative capacity and reducing power consumption while preserving a level of service that is satisfactory. A limited number of pilots are integrated into data symbols to initiate the recognition operation as we will show later on.
The wth packet is expressed as is the mth data symbol of wth packet. The channel coefficient from terminal ι to terminal κ is represented as g ικ , where ι ∈ {S, R 1 , R 2 } and κ ∈ {R 1 , R 2 , D}. Channel coefficients stay the same during a given frame, but they change independently from one frame to the next.
The transmission protocol is broken up into W + 1 consecutive time slots that are all the same length, and during each slot, S sends independent W packets constantly. In the following description, we use the common assumption that the two relays are placed in close proximity to one another or at a more distant position [44,45]. In such a scenario, it is possible to employ a consecutive interference cancellation scheme at the relays. Because of this, the performance at the relays is quite similar to what it would be like if the inter-relay interference was completely eliminated. As observed in Figure 1, the procedure consists of two distinct stages: odd and even time slots.
R 2 is represented in terms of the preceding packet as [28] s (2b) where z is the (2b − 1)th noise vector at R 2 of length N coupled with the preceding source transmission and A 2 is the scaling factor provided as [29] Therefore, the received signals at R 1 and D can be written as [31] r (2b) where z (2b) D are the noise components at R 1 and D, respectively. Using (1) into (4), one writes [39] r (2b) where and z (2b) • At odd time slots 2b + 1, S conveys the packet p (2b+1) to R 2 and D while R 1 passes the information s is expressed in context of the previous packet as [35] s where z (2b) R 1 is the (2b)th noise vector at R 1 and A 1 is the scaling factor given as [31] A 1 = 1 The signals that are received at R 2 and D may be expressed as [38,39] where z represent the noise vector at R 2 and D, respectively. Using (1) into (11), one can show that [31] where and z The main objective of this study is to create a modulation recognition algorithm that takes use of the distinct structure of the received signals at the destination, r (2b)

Proposed Algorithm
The subsequent description will highlight how the procedures of modulation recognition and channel estimation are carried out. We begin with the ML criterion and build a data-aided (DA) recognizer and estimator. After that, a soft information assisted recognizer and estimator is constructed with the help of the EM algorithm. The unique structure of the signals that have been received is used to provide more accurate results.
We establish the following notations for use in mathematical representation. Let us , and [46,47] where † is the transpose operation, for odd values of w 0 1×N for even values of w, and p (w) = 0 1×N for odd values of w p (w) for even values of w, The received signal at D represented by (5) and (12) for the entire frame can written in a condensed form as [33] R = PG + Z, where Z is the noise vector produced by alternately mixing the components of (7) and (14).
The ML solutions of the modulation Φ and channel coefficients G are acquired by optimizing the log-likelihood function [37,39] Φ ,Ĝ = arg max Φ,G log Pr (R|Φ, G), (19) where Pr(•| ) is the probability density function of • given . Calculating the term of Pr(R|Φ, G) involves taking an average over all potential data symbols that correspond to the modulation format Φ as described by [34] Pr(R|Φ, G) = ∑

P(Φ)
Pr(R|P(Φ), G)Pr(P(Φ)), and where σ 2 n is the noise variance. It is essential to point out that we attach Φ to the matrix P described in (15) to underline that the transmission matrix is reliant on the particular modulation scheme that is chosen. One notes that the precise ML solution is extremely difficult, if not virtually impossible, to implement in practice. This is due to the fact that it necessitates the computation of (20) over a massive number of data symbols for each conceivable value of Φ. The EM approach offers a repetitive and conceptually straightforward mechanism for optimizing the log-likelihood, which may be used to a variety of problems. There are two processes of the operation at the iteration ξ + 1. 1.
E-process of the EM algorithm quantifies the expected value of log Pr(R|P(Φ), G) given the existing estimations of the parameters Φ and G. In particular, we create the following function [42] F Here E P(Φ) [·] signifies the average of the information symbols given the modulation type Φ.

2.
The M-process comprises optimizing the expectations that have been established in (22) as [43] Φ (ξ + 1),Ĝ(ξ + 1) = arg max The EM method cycles through repeated steps until it reaches a point of convergence [48]. We construct the following equation by combining (15) and (20) into (19) and removing the extraneous components, [49] where (·) and † are the real part and the conjugate transpose of a complex-valued vector, respectively, [48] and We carry out the following process in order to detach the joint maximization challenge of Φ and G of (23) as follows [15]Ĝ Here, we attach Φ into G to highlight the fact that G is updated for each conceivable value of Φ. PluggingĜ Φ (ξ + 1) into (23), the ξ + 1 update of Φ is found by optimizing the cost function shown below [34], where . represents the norm of a vector. The conclusive measurement of G is stated aŝ

Practical Discussion
It is essential to note the following practical implications: • The issue then arises of how the matrices of Ω(Φ) and Ψ(Φ) are really computed in reality. Since the expectation function is linear, we produce the matrix Ω(Φ) by simply replacing each ingredient of P(Φ) with the relevant a posteriori expectation. Typically, the a posteriori expectation of the mth element of the wth vector p (w) ,p (w) (m, Φ), given the modulation scheme Φ is produced as [48] p The wth vectorp (w) is created by concatenating all of these samples. This process is repeated for all unknown information symbols with w = 0, 1, · · · , W − 1. Therefore, the matrix Ω(Φ) is formed following the same way as reported in (15) with the use of p (w) instead of p (w) . • We are going to proceed with the widely held premise that the data symbols are not linked with one another. Therefore, the approximate computation for Ψ(Φ) is as follows [34] Ψ(Φ) ≈ E P(Φ) P † (Φ) R,Ĝ(ξ) × E P(Φ) P(Φ) R,Ĝ(ξ) , • In light of (30), computing the probability of Pr p (w) (m, Φ) = γ R,Φ(ξ),Ĝ(ξ) for each modulation scheme Φ is essential for the proposed recognition process. When we examine (4) and (11) more closely, we come to the conclusion that each information symbol is collected at the endpoint twice: once through the source-destination connection and once via the relay-destination route. As a result, the corresponding transmission structure may be thought of as being comparable to a convolutional encoder that only has a single memory component. A bank of N Bahl, Cocke, Jelinek, and RavivBCJR algorithms is used to create the optimum data detection, which is accomplished by employing a method that is similar to the one described in the earlier works of [38,39]. • In order to kick off the recognition and estimation processes, a small number of pilot symbols are included into the data symbols. As a result, the proposed approach is able to get preliminary estimations of the channel coefficient and the chosen modulation scheme. It is generally known that the accuracy of the evaluation will improve in proportion to the number of utilized pilots. Nevertheless, extending the length of the pilot symbols not only reduces the amount of energy that is allocated for the transfer of information but also slows down the data rate. As a consequence of this, the ratio between the specified amount of pilot symbols and the amount of the information symbols has to be sustained at a level that is as low as possible. This is accomplished by using the method that has been described, which refines the original estimations via a process of iterative improvement. We make use of the output of the demodulation procedure to compute the a posteriori expectations of the information symbols, which are then applied to the proposed recognizer and estimator as if they were pilot symbols. • It is worth noting that the quality of modulation recognition is strengthened by using a powerful error-correcting code to provide accurate feedback to the proposed technique. Furthermore, increasing the number of pilot symbols speeds up the suggested method's convergence. • The computational cost of the proposed AMR approach is examined by computing the number of needed floating point operations (fp) [15,50]. Multiplying two complex numbers needs 6 fp, whereas adding them only involves two fp. The study in the previous section shows that the required number of fp per iteration is roughly stated as 20W N. Assuming W = 10 and N = 100 with a processor speed of 10 Terafp per second, the processing time is 2 nanoseconds, which is sufficient for practical uses.

Simulation Results
Simulations have been implemented to assess how effectively the offered strategy behaves. The following is a list of the TCRS system's parameters, unless anything else has been provided. The transmission frame is made up of W = 25 packets. Each packet contains N = 100 data symbols. The pilot symbols take up 7 percent of each frame. Quadrature amplitude modulation (QAM) and phase shift key (PSK) modulation schemes with a modulation order M = 2 to 256 were taken into account.A convolutional code was used, with a constraint length of 5 and a rate of 0.5. Each channel path was described as a zero-mean complex-valued Gaussian random variable, with variance being computed as [51][52][53] where ι ∈ {S, R 1 , R 2 }, ς denoted to the path-loss exponent, u ικ was the separation between nodes ι and κ, and u SD was the separation between nodes S and D. For simulation reasons, we assign ς = 3.4, u SD = 1, u R 1 D = 0.55, and u R 2 D = 0.45. Here, all distances were normalized to u SD . As mentioned in the preceding mathematical advancements, the suggested technique is general in the sense that it can be applied to any other channel type. An evaluation metric for the proposed recognizer was the average probability of correct recognition, A r = 1 where Θ is a member of the set of modulation types and V is the cardinality of the modulation set under consideration. For example, we assume that the transmitter uses one of following modulation schemes, QPSK, 8-PSK, 16-QAM, and 64-QAM. Therefore, A r is described as Here Pr(Φ = QPSK|QPSK) is defined as the probability of recognizing QPSK modulation scheme at the receiver if the allocated modulation scheme at the transmitter is QPSK. The same definition is applied to other modulation schemes. Figure 2 illustrates A r performance of the offered recognizer as a function of symbolto-noise ratio, SNR, at iterations 1-6. Even at high SNR values, the performance during the first iteration of the recognition process is insufficient since it is initiated by a limited number of pilots. As the number of iterations grows, there is a steady rise in the level of performance achieved. This is because the suggested recognizer is able to make use of the soft information that is supplied by the data detector, which becomes more robust with each repetition. After the sixth round, there is no distinguishable boost in the system's performance. Because the vast majority of actual applications need for recognition accuracy of at least 90 percent, the minimum operational SNR would need to be more than 9 dB. In order to facilitate comparisons, we have also shown the recognition performance attained by the use of the methods outlined in [40,41]. The outcomes demonstrate that the proposed technique outperforms those methods, which are unable to provide adequate recognition performance despite using high SNR settings. The reason is that the methods of [40,41] follow a relaying strategy where the receiver sends back the decoded frame if it's received successfully. When the relays are unable to understand the received signal because of the channel conditions, the modulation recognition performance worsens.  [40] is displayed by the dashed lines, and the algorithm of [41] is indicated by the dot-dashed lines. Figure 3 provides A r performance of the suggested recognizer in a variety of scenarios at iteration 6. In the first scenario, we assume that the channel estimate is accurate and we treat all of the data symbols as if they were training symbols. This acts as an upper-bound for the recognizer that is being suggested. In the second scenario, we use a few number of pilots to kick off the proposed modulation recognizer on the assumption that the channel estimate is accurate. The third scenario takes into account the possibility of performing channel estimate as mentioned in (29) and also executing modulation recognition as indicated in (28). The findings reveals that the offered EM-based recognizer achieves a level of recognition performance comparable to that of the first and second scenarios. This provides more evidence that the iterative structure that was described is successful. Figure 4 depicts the impact of the number of pilots relative to the frame size at different values of SNR during iteration 6. It is well realized that the effective initialization is vital for EM-based schemes to run properly. The results indicate that the iterative recommended recognizer requires a ratio of at least 0.07 of the number of pilot symbols to frame size to achieve convergence. It is worth noting that the least number of pilots necessary to generate appropriate first estimations may vary depending on the system settings. In reality, the designer may put our estimate technique through its paces by varying system and connectivity settings, finally establishing the bare minimum number of pilots required to meet the criterion for every given parameter choice. After that, the findings are recorded into look-up databases so that they can be deployed on the hardware. The designer also has the option of arbitrarily selecting a sufficient number of pilots that are suited for a broad variety of system and connectivity characteristics. Table 2 shows the relationship between pilot to frame size ratio, recognition accuracy, and number of iterations necessary to converge at SNR = 14 dB. The results show that increasing the number of pilots improves the rate of recognition and reduces the number of iterations needed to reach convergence. Even with a considerable number of iterations, a small number of pilots does not result in adequate recognition performance. Furthermore, a massive proportion of pilots results in flawless recognition performance with a minimal amount of iterations.    Throughout the preceding discussions, we used the assumption that the receiver estimates and corrects the clock-timing and frequency mismatches in a precise manner. The next investigations evaluate how sensitive the recommended recognition approach is to these parameters. Figures 5 and 6 demonstrate, respectively, how the time offset τ and the frequency offset ν impact the recognition performance at different values of SNR during iteration 6. Here τ is normalized to the sampling duration and is represented as a two-way channel [1 − τ, τ] [46] and ν is normalized to the carrier frequency. These outcomes show that the suggested approach is relatively resistant to τ and delivers adequate performance over a broad range of ν.

Conclusions
We explored a decision feedback receiver architecture of a destination node for amplify and forward two-path consecutive relaying systems throughout this study. We developed a combined approach for iterative modulation recognition and channel estimation for channel impulse responses across source, relay, and destination nodes. It was shown that the maximum likelihood solution of the problem under consideration can be implemented via employing an expectation-maximization procedure. The acquisition of the preliminary estimations was generated by using a few pilot symbols. The suggested recognizer and estimator iteratively communicated and traded soft information with the data detector to achieve better overall performance. According to the simulation results, an outstanding recognition performance was shown to be exhibited in a variety of functional conditions. The recommended approach converged within six iterations and achieved flawless recognition performance at a signal-to-noise ratio of 14 dB. In addition, the minimum pilot-to-frame-size ratio required to conduct the iterative technique properly is 0.07. Finally, the proposed method was largely impervious to time offset and offered good performance across a wide range of frequency offset.