Method for decoding an RF signal bearing a sequence of symbols modulated by CPM and associated decoder

11496343 · 2022-11-08

Assignee

Inventors

Cpc classification

International classification

Abstract

A method for decoding an RF signal bearing a sequence of transmitted symbols modulated by CPM. The method includes, at the receiver: estimating model parameters {h, ω, Φ.sub.0} among which h characterizes a modulation index, ω characterizes a carrier frequency offset and Φ.sub.0 characterizes an initial phase offset, and detecting received symbols corresponding to said transmitted symbols of the sequence, wherein, at time nT where T is a symbol duration, the parameters {h, ω, Φ.sub.0} are estimated by solving a system of three linear equations whose: three unknowns {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} are respectively function of said model parameters {h, ω, Φ.sub.0}, and coefficients {B.sup.(n), C.sup.(n), D.sup.(n), F.sup.(n), G.sup.(n), H.sup.(n), v.sub.1.sup.(n), v.sub.2.sup.(n), v.sub.3.sup.(n)} are computed in a recursive way in function of: a sequence of symbols {â.sub.n} corresponding to the sequence of transmitted symbols up to time nT, and measured phases {Ψ.sub.k} of samples {y.sub.k} of the RF signal received from time (n−1)T to time nT.

Claims

1. A method for decoding an RF signal bearing a sequence of transmitted symbols modulated by using continuous phase modulation, the method comprising, at the level of a receiver (1) of said RF signal: estimating model parameters {h, ω, Φ.sub.0} among which a first parameter h characterizing a modulation index, a second parameter ω characterizing a carrier frequency offset and a third parameter Φ.sub.0 characterizing an initial phase offset, and detecting, within the received RF signal, received symbols corresponding to said transmitted symbols of the sequence, wherein, at time nT where T is a symbol duration and n∈N, the model parameters {h, ω, Φ.sub.0} are estimated by solving a system of three linear equations whose: a. three unknowns {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} are respectively functions of said model parameters {h, ω, Φ.sub.0}, and b. coefficients {B.sup.(n), C.sup.(n), D.sup.(n), F.sup.(n), G.sup.(n), H.sup.(n), v.sub.1.sup.(n), v.sub.2.sup.(n), v.sub.3.sup.(n)} are computed in a recursive way in function of: i. a sequence of symbols {â.sub.n} corresponding to the sequence of transmitted symbols up to time nT, and ii. measured phases {Ψ.sub.k} of samples {y.sub.k} of the RF signal received from time (n−1)T to time nT.

2. The method according to claim 1, wherein, in accordance with the formalism as introduced into the “background” part, the system of three linear equations is in the following matrix form: [ ω ^ ( n ) Φ ^ 0 ( n ) h ^ ( n ) ] = [ B ( n ) C ( n ) D ( n ) F ( n ) G ( n ) B ( n ) G ( n ) H ( n ) C ( n ) ] - 1 [ v 1 ( n ) v 2 ( n ) v 3 ( n ) ] with the matrix coefficients being in the form:
B.sup.(n)=Σ.sub.k∈I(n).sub.kr.sub.k or B.sup.(n)=B.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1).sub.kr.sub.k
C.sup.(n)=Σ.sub.k∈I(n)α.sub.kr.sub.k or C.sup.(n)=B.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)α.sub.kr.sub.k
D.sup.(n)=Σ.sub.k∈I(n)α.sub.k.sup.2r.sub.k or D.sup.(n)=B.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)α.sub.k.sup.2r.sub.k
F.sup.(n)=Σ.sub.k∈I(n)k.sup.2r.sub.k or F.sup.(n)=B.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)k.sup.2r.sub.k
G.sup.(n)=Σ.sub.k∈I(n)kr.sub.k or G.sup.(n)=B.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)kr.sub.k
H.sup.(n)=Σ.sub.k∈I(n)|y.sub.k| or H.sup.(n)=B.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)|y.sub.k|
v.sub.1.sup.(n)=Σ.sub.k∈I(n)α.sub.kr.sub.kΨ.sub.k or v.sub.1.sup.(n)=v.sub.1.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)α.sub.kr.sub.kΨ.sub.k
v.sub.2.sup.(n)=Σ.sub.k∈I(n)kr.sub.kΨ.sub.k or v.sub.2.sup.(n)=v.sub.2.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)kr.sub.kΨ.sub.k
v.sub.3.sup.(n)=Σ.sub.k∈I(n)r.sub.kΨ.sub.k or v.sub.3.sup.(n)=v.sub.3.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)r.sub.kΨ.sub.k where I(n) is a subset of indices between O and nM, r.sub.k is equal to one chosen among |y.sub.k| and a user defined constant, and α.sub.k is in the form:
α.sub.k=πΣ.sub.i=0.sup.n−Lâ.sub.i+2πΣ.sub.i=1.sup.L−1â.sub.n−1q(kT.sub.s+iT−nT) with nM≤k≤(n+1)M.

3. The method according to claim 1, wherein an (m+1).sup.th received symbol is detected by: computing a predicted phase Γ.sub.m of the RF signal received from time mT to time (m+1)T in function of a sequence of {â.sub.m} corresponding to the sequence of transmitted symbols up to time mT and in function of the unknowns {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} as estimated at time mT, and measuring phases {Ψ.sub.k} of samples {y.sub.k} of the RF signal received from time mT to time (m+1)T, then computing an error between a vector Ψ.sub.m of the measured phases {Ψ.sub.k} and said predicted phase Γ.sub.m in order to match both phases.

4. The method according to claim 3, wherein, in accordance with the formalism as introduced into the “background” part: a. the predicted phase Γ.sub.n is in the following form: Γ n = π h ^ ( n ) δ ^ n - L 1 + 2 π h ^ ( n ) .Math. i = 1 L - 1 a ^ n - i q i + Φ ^ 0 ( n ) + ω ^ ( n ) c n , with δ ^ n - L = .Math. i = 0 n - L a ^ i = δ ^ n - L - 1 + a ^ n - L b. The n.sup.th received symbol as detected is given by:
â.sub.n=sign(p.sub.n.sup.T[Ψ.sub.n−Γ.sub.n+ρ.sub.nΩ.sub.n]) where: Ψ.sub.n=angle([y.sub.nM y.sub.nM+1 . . . y.sub.nM+(M−1)].sup.T)=[Ψ.sub.nM Ψ.sub.nM+1 . . . Ψ.sub.nM+(M−1)].sup.T, Ω.sub.n=[(Φ.sub.nM−Φ.sub.nM−1), (Φ.sub.nM+1−Φ.sub.nM) . . . (Φ.sub.nM+(M−1)−Φ.sub.nM+(M−2))].sup.T ρ.sub.n is a user defined parameter, and p.sub.n is chosen among the following values: i. p.sub.n=1, ii. p.sub.n=q.sub.0, and iii. p.sub.n=r.sub.n⊙q.sub.0, with r.sub.n is equal to one chosen among |y.sub.n| and a user defined constant.

5. The method according to claim 1, wherein the unknowns {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} are as estimated by solving the system of three linear equations and/or as estimated in function of given values of said model parameters {h, ω, Φ.sub.0}.

6. The method according to claim 1, wherein said sequence of symbols {â.sub.n} comprises at least one among a sequence of presumed symbols and a sequence of symbols corresponding to samples {y.sub.k} of the received RF signal.

7. The method according to claim 6, wherein said presumed symbols are chosen among training symbols and a sequence of received symbols as detected.

8. The method according to claim 1, wherein said continuous phase modulation is based on Gaussian Frequency-Shift Keying (GFSK).

9. A decoder for decoding an RF signal bearing a sequence of transmitted symbols modulated by using continuous phase modulation, the decoder comprising a phase extractor, an estimator of model parameters {h, ω, Φ.sub.0}, a symbol detector, and a demultiplexer, designed altogether for implementing the method according to claim 1.

10. A computer-program product comprising software program instructions stored in a non-transitory computer readable medium, where execution of the software program instructions by at least one data processor results in performance of operations that comprise execution of the method according to claim 1.

11. The method according to claim 2, wherein an (m+1).sup.th received symbol is detected by: computing a predicted phase Γ.sub.m of the RF signal received from time mT to time (m+1)T in function of a sequence of {â.sub.m} corresponding to the sequence of transmitted symbols up to time mT and in function of the unknowns {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} as estimated at time mT, and measuring phases {Ψ.sub.k} of samples {y.sub.k} of the RF signal received from time mT to time (m+1)T, then computing an error between a vector Ψ.sub.m of the measured phases {Ψ.sub.k} and said predicted phase Γ.sub.m in order to match both phases.

12. The method according to claim 2, wherein the unknowns {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} are as estimated by solving the system of three linear equations and/or as estimated in function of given values of said model parameters {h, ω, Φ.sub.0}.

13. The method according to claim 3, wherein the unknowns {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} are as estimated by solving the system of three linear equations and/or as estimated in function of given values of said model parameters {h, ω, Φ.sub.0}.

14. The method according to claim 4, wherein the unknowns {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} are as estimated by solving the system of three linear equations and/or as estimated in function of given values of said model parameters {h, ω, Φ.sub.0}.

15. The method according to claim 2, wherein said sequence of symbols {â.sub.n} comprises at least one among a sequence of presumed symbols and a sequence of symbols corresponding to samples {y.sub.k} of the received RF signal.

16. The method according to claim 3, wherein said sequence of symbols {â.sub.n} comprises at least one among a sequence of presumed symbols and a sequence of symbols corresponding to samples {y.sub.k} of the received RF signal.

17. The method according to claim 4, wherein said sequence of symbols {â.sub.n} comprises at least one among a sequence of presumed symbols and a sequence of symbols corresponding to samples {y.sub.k} of the received RF signal.

18. The method according to claim 5, wherein said sequence of symbols {â.sub.n} comprises at least one among a sequence of presumed symbols and a sequence of symbols corresponding to samples {y.sub.k} of the received RF signal.

19. The method according to claim 2, wherein said continuous phase modulation is based on Gaussian Frequency-Shift Keying (GFSK).

20. The method according to claim 3, wherein said continuous phase modulation is based on Gaussian Frequency-Shift Keying (GFSK).

Description

BRIEF DESCRIPTION OF THE DRAWINGS

(1) FIG. 1 show a top-level block diagram of a receiver according to an embodiment of one aspect of the invention.

(2) FIG. 2 shows three graphs given, as simulation results, the Packet Error Rate (PER), Packet Loss Rate (PLR) and the Bit Error Rate (BER) as a function of Signal-to-Noise Ratio (SNR) on a log scale for a Bluetooth BR transmission with frames containing 30 bytes, the curves with stars have been obtained for a reference LDI decoder and the curves with rings have been obtained for the here proposed decoder according to an embodiment.

(3) FIG. 3 shows a graph of the evolutions of h.sup.(k) in function of the number of bits received at the decoder for multiple decoding methods, including the proposed one (See the curve with stars).

DETAILED DESCRIPTION

(4) The following detailed description of the invention refers to the accompanying drawings. While the description includes exemplary embodiments, other embodiments are possible, and changes may be made to the embodiments described without departing from the spirit and scope of the invention.

(5) Herein a system of equations may be defined as a finite set of equations for which common solutions exist.

(6) The term “training symbol” denotes a symbol making part of the sequence of symbols to be retrieved at the level of the receiver and already known by the receiver.

(7) FIG. 1 shows an example architecture of a receiver 1 designed for implementing the decoding method according to the first aspect of the invention.

(8) As shown in FIG. 1, such architecture may comprise at least: A phase extractor 11 depicted by the “angle” block, An estimator 12 of the model parameters {h, ω, Φ.sub.0} depicted by the “Model parameters estimation” block, A symbol detector 13 depicted by the “Symbol detection” block, and A demultiplexer 14 depicted by a trapezoid.

(9) The phase extractor 11 is designed for extracting the instantaneous phase Ψ.sub.k of each sample y.sub.k of the sampled RF signal.

(10) The estimator 12 is designed for estimating parameters {h, ω, Φ.sub.0} of a set of parameters among which a first parameter h characterizing a modulation index, a second parameter co characterizing a carrier frequency offset and a third parameter (Do characterizing an initial phase offset. These three parameters are called model parameters {h, ω, Φ.sub.0}. They are estimated by solving a system of three linear equations whose: a. three unknowns {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} are respectively function of said model parameters {h, ω, Φ.sub.0}, and b. coefficients {B.sup.(n), C.sup.(n), D.sup.(n), F.sup.(n), G.sup.(n), H.sup.(n), v.sup.(n), v.sub.1.sup.(n), v.sub.2.sup.(n), v.sub.3.sup.(n),} are computed in a recursive way in function of: i. a sequence of symbols {â.sub.n} corresponding to the sequence of transmitted symbols up to time nT, and ii. measured phases {Ψ.sub.k} of samples {y.sub.k} of the RF signal received from time (n−1)T to time nT.

(11) The symbol detector 13 is designed for detecting, within the received RF signal, received symbols corresponding to said transmitted symbols of the sequence. Its fundamental task is to reliably recover the transmitted symbols from the received RF signal.

(12) More particularly, the symbol detector 13 detects an (m+1).sup.th received symbol by: computing a predicted phase Γ.sub.m of the RF signal received from time mT to time (m+1)T in function of a sequence of {â.sub.m} corresponding to the sequence of transmitted symbols up to time mT and in function of the unknowns {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} as estimated at time mT, then computing an error term between a vector Ψ.sub.m of the measured phases {Ψ.sub.k} and said predicted phase Γ.sub.m in order to match both phases.

(13) Said measured phases {Ψ.sub.k} have been extracted from the received RF signal by said phase extractor 11. More particularly, the phase extractor 11 measures phases {Ψ.sub.k} of samples {y.sub.k} of the RF signal received from time mT to time (m+1)T, for the symbol detector 13 to detect the (m+1).sup.th received symbol.

(14) The symbol detector 13 is more particularly be comprised of a phase reconstructor depicted by the “Receive phase reconstruction” block and a comparator depicted by the “Projection” block, on FIG. 1.

(15) The phase reconstructor of the symbol detector 13 is designed for reconstructing the phase that a received symbol is presumed to have according to the model parameters {h, ω, Φ.sub.0} as estimated by the estimator 12. It computes said predicted phase Γ.sub.m.

(16) The comparator of the symbol detector 13 is designed for comparing: the vector Ψ.sub.m of the measured phases {Ψ.sub.k} and said predicted phase Γ.sub.m.

(17) Owing to such a comparison, an error term is computed that characterizes the mismatch or rather the level of matching of both phases.

(18) The estimator 12 of the model parameters {h, ω, Φ.sub.0} has been more particularly derived by maximizing, with some approximations, the likelihood criterion below:

(19) L ( h , ω , Φ 0 ) = - 1 σ 2 exp ( - 1 σ 2 .Math. k = 1 nM .Math. y k - A exp ( j ( Φ k ( h ) + Φ 0 + ω k T s ) ) .Math. 2 ) ,

(20) where, as already introduced above:
Φ.sub.k(h)=πh{circumflex over (δ)}.sub.n−L+2πhΣ.sub.i=0.sup.L−1â.sub.n−iq(kTs−(n−i)T) for nM≤k≤(n+1)M, and

(21) δ ^ n - L = .Math. i = 0 n - L a ^ i

(22) and assuming that the set {â.sub.i} up till time nT are known as estimates of the symbols {a.sub.i}.

(23) More particularly, assuming that: i. the signal-to-noise ratio is sufficiently moderate, and ii. the RF signal is a constant amplitude signal, with this assumption being notably fulfilled when the RF signal bears a sequence of symbols modulated by using CPM,

(24) the estimate at time nT of the model parameters {h, ω, Φ.sub.0} are computed with the following system of three linear equations:

(25) [ ω ^ ( n ) Φ ^ 0 ( n ) h ^ ( n ) ] = [ B ( n ) C ( n ) D ( n ) F ( n ) G ( n ) B ( n ) G ( n ) H ( n ) C ( n ) ] - 1 [ v 1 ( n ) v 2 ( n ) v 3 ( n ) ]
or, equivalently, with the expanded expressions:

(26) 0 κ ( n ) = D ( n ) F ( n ) H ( n ) + 2 B ( n ) C ( n ) G ( n ) - ( B ( n ) B ( n ) H ( n ) + C ( n ) C ( n ) F ( n ) + G ( n ) G ( n ) D ( n ) ) h ^ ( n ) = 1 κ ( n ) ( [ F ( n ) H ( n ) - G ( n ) G ( n ) ] v 1 ( n ) + [ C ( n ) G ( n ) - B ( n ) H ( n ) ] v 2 ( n ) + [ B ( n ) G ( n ) - C ( n ) F ( n ) ] v 3 ( n ) ) ω ^ ( n ) = 1 κ ( n ) ( [ C ( n ) G ( n ) - B ( n ) H ( n ) ] v 1 ( n ) + [ D ( n ) H ( n ) - C ( n ) C ( n ) ] v 2 ( n ) + [ B ( n ) C ( n ) - D ( n ) G ( n ) ] v 3 ( n ) ) Φ ^ 0 ( n ) = 1 κ ( n ) ( [ B ( n ) G ( n ) - C ( n ) F ( n ) ] v 1 ( n ) + [ B ( n ) C ( n ) - D ( n ) G ( n ) ] v 2 ( n ) + [ D ( n ) F ( n ) - B ( n ) B ( n ) ] v 3 ( n ) )
where {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} are the unknowns of the system and are respectively functions of said model parameters {h, ω, Φ.sub.0}, and wherein the matrix coefficients can be computed in a recursive way as:
B.sup.(n)=Σ.sub.k∈I(n).sub.kr.sub.k or B.sup.(n)=B.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1).sub.kr.sub.k
C.sup.(n)=Σ.sub.k∈I(n)α.sub.kr.sub.k or C.sup.(n)=B.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)α.sub.kr.sub.k
D.sup.(n)=Σ.sub.k∈I(n)α.sub.k.sup.2r.sub.k or D.sup.(n)=B.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)α.sub.k.sup.2r.sub.k
F.sup.(n)=Σ.sub.k∈I(n)k.sup.2r.sub.k or F.sup.(n)=B.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)k.sup.2r.sub.k
G.sup.(n)=Σ.sub.k∈I(n)kr.sub.k or G.sup.(n)=B.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)kr.sub.k
H.sup.(n)=Σ.sub.k∈I(n)|y.sub.k| or H.sup.(n)=B.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)|y.sub.k|
v.sub.1.sup.(n)=Σ.sub.k∈I(n)α.sub.kr.sub.kΨ.sub.k or v.sub.1.sup.(n)=v.sub.1.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)α.sub.kr.sub.kΨ.sub.k
v.sub.2.sup.(n)=Σ.sub.k∈I(n)kr.sub.kΨ.sub.k or v.sub.2.sup.(n)=v.sub.2.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)kr.sub.kΨ.sub.k
v.sub.3.sup.(n)=Σ.sub.k∈I(n)r.sub.kΨ.sub.k or v.sub.3.sup.(n)=v.sub.3.sup.(n−1)+Σ.sub.k∈I(n)\I(n−1)r.sub.kΨ.sub.k

(27) where I(n) is a subset of indices between 0 and nM, r.sub.k should be equal to |y.sub.k|, but could also be set a constant (for instance equal to 1, but preferably adapted in function of the signal-to-noise ratio), and a.sub.k is given by:
α.sub.k=πΣ.sub.i=0.sup.n−Lâ.sub.i+2πΣ.sub.i=1.sup.L−1â.sub.n−1q(kT.sub.s+it−nT) with nM≤k≤(n+1)M

(28) Note that α.sub.k can be viewed as a derivative of Φ.sub.k(h) over h.

(29) The demultiplexer 14 is used as usually within known decoders. It is used to switch from a training phase to a blind phase. During the training phase, the parameter estimation is done using a priori known transmitted symbols. In BT such a training phase happens for e.g., during the reception of the synchronization word which is known by the receiver. During the blind phase, the demodulator becomes a decision-directed algorithm.

(30) The symbol detector 13 is more particularly designed for obtaining an estimation b.sub.m+1 of the transmitted symbol a.sub.m+1 by “comparing” the phase of the samples received during the time period [mT . . . (m+1)T] with some reconstructed/predicted phase computed from the a-priori knowledge of the previous symbols up till time mT and the model parameters estimates at time mT, according to the following proceedings.

(31) Let's call Ψ.sub.n the vector of measured phases of the received signal, from time nT to (n+1)T:
Ψ.sub.n=angle([y.sub.nMy.sub.nM+1. . . y.sub.nM+(M−1)].sup.T)=[Ψ.sub.nMΨ.sub.nM+1 . . . Ψ.sub.nM+(M−1)].sup.T

(32) The parameter M is the oversampling factor. For instance, M=3. Note that according to the model described in the “background” section:

(33) Ψ n = h δ n - L 1 + 2 π h .Math. i = 0 L - 1 a n - i q i + Φ 0 1 + ω c n + ϑ ( angle ( i n + w n ) )
where c.sub.n=[nM, nM+1, . . . , nM+M−1].sup.T and θ( ) is a non-linear function.

(34) The detection is performed in 2 steps.

(35) First, the reconstruction block computes a predicted phase Γ.sub.n from the estimated sequence {â.sub.i} up to time (n−1)T:

(36) Γ n = π h ^ ( n ) δ ^ n - L 1 + 2 π h ^ ( n ) .Math. i = 1 L - 1 a ^ n - i q i + Φ ^ 0 ( n ) + ω ^ ( n ) c n , with δ ^ n - L = .Math. i = 0 n - L a ^ i = δ ^ n - L - 1 + a ^ n - L

(37) Then, the estimate â.sub.n of symbol a.sub.n is obtained through the closed form equation below:
â.sub.n=sign(p.sub.n.sup.T[Ψ.sub.n−Γ.sub.n+ρ.sub.nΩ.sub.n]).

(38) The component ρ.sub.nΩ.sub.n serves as robust regularization to interference and transmit filters as this parameter penalizes the slope of the phase of the received RF signal.

(39) Ω.sub.n contains the derivative of the measured phases, Ω.sub.n=[Φ.sub.nM−Φ.sub.nM−1), (Φ.sub.nM+1−Φ.sub.nM) . . . (Φ.sub.nM+(M−1)−Φ.sub.nM+(M−2))].sup.T and ρ.sub.n is a user defined parameter.

(40) p.sub.n is a projection vector. It can take different values such as: i. p.sub.n=1 i. p.sub.n=q.sub.0 iii. p.sub.n=r.sub.n⊙q.sub.0

(41) where ⊙ is the Hadamard operator and r.sub.n is equal to one chosen among |y.sub.n|=[y.sub.nMy.sub.nM+1 . . . y.sub.nM+(M−1)].sup.T and a user defined constant.

(42) The method according to the first aspect of the invention may begin by anyone of the estimation step(s) and the detection step(s) depending on the encountered context. Some example embodiments are briefly discussed below, that are not intended to be limiting.

(43) If the first symbols of the transmitted sequence are already known at the level of the receiver, some estimating steps can be implemented first in order to achieve estimates of the model parameters, during what could be called a learning phase. As shown on FIG. 3, discussed below, few tenths of a priori known or training symbols may be sufficient for the method to converge towards good estimates of the model parameters. These latter can then serve for implementing the detecting steps, thus detecting reliably, i.e., with estimates of model parameters characterizing the real world anomalies, the symbols of the sequence which follow the training ones.

(44) If the model parameters or estimates thereof are given or already known, for instance with reference to a previous decoding, the unknowns {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} can be estimated in function of the given values of said model parameters or estimates and the method could be implemented by beginning with some detecting steps, with using the unknowns {ĥ.sup.(n), {circumflex over (ω)}.sup.(n), {circumflex over (Φ)}.sub.0.sup.(n)} as estimated.

(45) The method further allows for switching anytime and as often as needed/desired between estimation and detection steps. In this sense, symbols as previously detected can serve for a new estimation of the model parameters and the previously estimated model parameters can serve for detecting newly received symbols.

(46) The method according to one or more embodiments is designed for decoding symbols coded by using the so-called CPM. Indeed, the assumptions made for reducing the likelihood criterion to the above given system of three linear equations is comprised of the assumption that the RF signal is a constant amplitude signal. This is the main or even the single assumption which could limit the choice of usable modulation schemes. In other words, any modulation scheme that achieves a constant amplitude signal, such as the GFSK one, may be used. Indeed, a very efficient and robust decoder is hereby provided which is resilient enough to decode GFSK signals in the presence of interference and synchronization errors. Others modulation schemes, such as the one known as OQPSK modulation and the one known as MSK modulation, should also be usable.

(47) From a complexity point of view, a rigorous complexity analysis shows that our algorithm operates in linear time, i.e., O(n), as neither exhaustive searches, nor expensive matrix decompositions (such as EVD, SVD, QR, LU, RRQR, Jordan, Schur, or the like) is required.

(48) The proposed method according to an embodiment also has a very low latency when compared to other near-optimal methods. These are key differentiators compared to the existing advanced GFSK decoder, which are usually based on Viterbi algorithm.

(49) FIG. 2 gives the Packet Error Rate (PER), the Packet Loss Rate (PLR), and the Bit Error Rate (BER) as a function of the Signal-to-Noise Ratio (SNR) on a log scale for a Bluetooth BR transmission. The curves with stars have been obtained for a reference LDI decoder and the curves with rings have been obtained for the here proposed decoder. One can see a performance gain of more than 4 dB of the proposed decoder compared to the LDI.

(50) From FIG. 3, with a simulated experiment generating random GFSK bits and a true h value being chosen to be 0.31, we can see the evolution of h.sup.(k) using multiple methods among which is the here proposed one (See curve with stars). It appears that the latter is the closest to the optimal (See continuous bold line). Furthermore note that the proposed method gives more accurate estimates in the range k∈[10,30] than the optimal brute force, this seems to be due to the nature of the proposed method, as it is search-free and grid-less, whereas the optimal value of h.sup.(k) comprises of an exhaustive search on a discretized grid, and hence is faced with gridding errors; indeed, a smaller grid size would yield a better performance, however, simulations would be much slower. In fact, the chosen step size in this experiment, which is small enough, already suffers from a very slow exponential time complexity, whereas the proposed one is linear.

(51) We see that the estimator 12 of the decoder 1 according to the second aspect of the invention enjoys good statistical properties, such as unbiasedness, sufficient statistics, variance (and thus MSE) reduction at each bit reception, and density function convergence per estimate. This means that the longer the transmit frame is (in terms of bits/bytes), the more reliable the estimator 12 is going to be.

(52) The foregoing description has provided, by way of exemplary and non-limiting examples, a full and informative description of the decoding method according to the invention. However, various modifications and adaptations may become apparent to those skilled in the relevant arts in view of the foregoing description, when read in conjunction with the accompanying drawings and the appended claims. As but some examples, the use of other similar or equivalent algorithms and data representations may be attempted by those skilled in the art. Further, the various names used for the different elements, variables and functions (e.g. symbol detector, presumed symbol, angle( )) are merely descriptive and are not intended to be read in a limiting sense, as these various elements, variables and functions can be referred to by any suitable names. All such and similar modifications of the teachings of this invention will still fall within the scope of the claims of this invention.

(53) Furthermore, some of the features of the exemplary embodiments of this invention may be used to advantage without the corresponding use of other features. As such, the foregoing description should be considered as merely illustrative of the principles, teachings and embodiments of this invention, and not in limitation thereof.