A kind of method suppressing random access code false-alarm
Technical field
The present invention relates to communication technical field, more particularly, to a kind of side suppressing random access code false-alarm
Method.
Background technology
For cellular wireless mobile communication system, RACH be used for carrying out multiple access and up time
Between initial synchronisation.Training sequence in RACH is referred to as random access code.In some systems,
Use the cyclically shifted sequences with Cyclic Prefix as random access code.Such as, use in LTE system
ZC sequence, by Cyclic Prefix, is converted into linear convolution cyclic convolution, thus conveniently uses when receiving
The realization of frequency domain related algorithm.
In the receiver utilizing random access code designs, often face the false-alarm that relevant peaks energy leakage brings
Problem.Accompanying drawing 1 is receiver basic function module, including local sequence generating module 101, receives signal
Pretreatment module 102, correlation module 103 and detection and timing estimation module 104.
Receive signal pre-processing module 102 go receptions signal to be transformed into after Cyclic Prefix (CP) frequency domain and
The local sequence of local sequence generating module 101 output carries out complex conjugate dot product.Will in correlation module 103
Result carries out anti-Fourier change and is transformed into time domain, can obtain corresponding time domain correlation.Then detection with
Timing estimation module 104 finds peak-peak M, estimating noise power σ in each detection window2, and and peak
Value detection relative threshold γ compares.Can be peak-peak or other detection limit according to real system M.
There are two kinds of detection threshold at present: relative threshold and absolute thresholding.
Relative threshold: the correlation peak/noise power of signal;At given false-alarm mesh when γ is not send signal
The relative threshold determined under mark.
Definitely thresholding: size δ of estimating noise power2, by δ2It is multiplied with relative threshold γ and can obtain definitely
Thresholding γa。
If M/ is σ2More than γ, then explanation is successfully accessed, on the contrary failure.
In LTE system, use ZC sequence as random access code.Receive signal and be transformed into frequency domain and this
Ground sequence carries out complex conjugate dot product, obtains as NZCThe sequence of point.NZCIt is the length of frequency domain ZC sequence, one
As be prime number, need zero padding to arrive NIFFTPoint carries out anti-Fourier's change, NIFFTThe integral number power of generally 2.
Then to correlation modulus square, the waveform after modulus square as seen from Figure 2.
In the environment of noise power is stable, γaIt is held essentially constant.Along with the increase of signal to noise ratio, signal
Performance number increases, and in accompanying drawing 2, the secondary lobe spilling of signal can be increasing, can spill into adjacent detection window.
If the peak value of adjacent detection window is more than γa, false-alarm can be caused when detection, not have in the most current detection window
There is user to send, but have been detected by user.False-alarm is mainly by nearer several of distance objective detection window
Adjacent detection window energy leakage causes, it is therefore desirable to suppress the false-alarm that these adjacent detection windows cause.
Additionally, in the environment of frequency deviation (residual frequency departure and Doppler frequency shift), the position can fixed at distance peak value
Put generation submaximum value.It is d in this fixing position defined in LTE systemu, it and currently used root
Relating to parameters.Along with the increase of frequency deviation, distance main peak ± du, ± 2du, ± 3duEtc. submaximum value increasing.
If using single window detection scheme, at distance main peak ± du, ± 2duEtc. submaximum value can enter other inspection
Survey in the range of window.If peak value exceedes thresholding, illustrate to detect another one user, so can cause void
Alert.
If using three window Merge Scenarioses, by positive and negative submaximum value (distance main peak value ± du) merge with main peak
Detection.Apart from main window ± 2du, ± 3duEtc. submaximum value possibly be present at the main detection window of another one user
Or in duplicate detection window.When the detection window comprising these positions detects, if peak value exceedes door
Limit, illustrates to detect another one user, so can cause false-alarm.
Use some technology that false-alarm is suppressed at present.
For example, it is contemplated that to the Energy Leaking of relevant peaks, in a certain distance of peak value periphery detected not
Detect.Although avoiding false-alarm to a certain extent.But when multiple access, may can't detect away from
User close to from so that user close together is shielded, causes the decline of detection performance.
For another example, after receiving terminal random access code carries out time-domain correlated detection, when certain user being detected,
Frequency bias properties according to ZC sequence finds the position of the false-alarm caused by this user.When detecting other window,
These positions can be avoided to reach to suppress the purpose of false-alarm.But under the scene of multi-user, some is used
If family causes the position that exactly another one user normally accesses, position of false-alarm, can make to detect
To user lose the chance of access, reduce the detection probability of multi-user.
To sum up, existing suppression false-alarm technology exists the problem reducing the normal access probability of multi-user.
Summary of the invention
The embodiment of the present invention proposes a kind of method suppressing random access code false-alarm, is ensureing that multi-user is normal
In the case of access probability, effectively suppress false-alarm.
The technical scheme of the embodiment of the present invention is as follows:
A kind of method suppressing random access code false-alarm, the method includes:
Measure the peak value that in target detection window, random access code is corresponding;
Described peak value deduction non-targeted detection window is revealed energy and is obtained the correction peak value that random access code is corresponding;
Judge whether the user that described target detection window occurs is empty according to described correction peak value and absolute thresholding
Alert, if false-alarm, then labelling in described target detection window.
Farther include before the peak value that in described measurement target detection window, random access code is corresponding: to all of
Detection window carries out pre-detection, determines target detection window in the detection window detect peak value.
Described in the detection window detect peak value, determine that target detection window includes:
When high s/n ratio, described peak value is more than absolute thresholding, and distance detects that the detection window of peak value is nearer
In K detection window, at least the peak value of a detection window is more than absolute thresholding, it is determined that the inspection of peak value detected
Surveying window is target detection window, and K is less than or equal to 4.
Described in the detection window detect peak value, determine that target detection window includes:
In the case of there is frequency displacement, described peak value is more than absolute thresholding, determines each peak value being detected
Detection window is target detection window.
It is to be had detected that in the non-targeted detection window of user by least one that described non-targeted detection window reveals energy
The peak value that random access code is corresponding detects the product of inhibitive factor corresponding to window and determines with described non-targeted.
Farther include before the peak value that in described measurement target detection window, random access code is corresponding: transmitting terminal is sent out
Penetrate a random access lead code, measure the peak value that each detection window occurs;
At high s/n ratio and when at most having 2 adjacent windows that user occurs, described inhibitive factor include the first suppression because of
Son and the second inhibitive factor;
First inhibitive factor is equal to AK-1With AKRatio, AK-1It it is target detection window previous detection window label
For the energy of K-1 detection window, AKIt it is the peak value of target detection window;
Second inhibitive factor is equal to AK-2With AKRatio, AK-2It is that window is previous is numbered K-2 in K-1 detection
Detection window peak value;
K-1 detection window is numbered corresponding first suppression of detection window of K+1 with target detection window later detection window
The factor;
K-2 detection window is numbered corresponding second suppression of detection window of K+2 with K+1 detection window later detection window
The factor.
Farther include before the peak value that in described measurement target detection window, random access code is corresponding: transmitting terminal is sent out
Penetrate random access lead code, measure the peak value of each detection window;
At high s/n ratio and time at least user occur in 3 adjacent windows, described inhibitive factor include the first suppression because of
Son and the second inhibitive factor;
First inhibitive factor is equal to AK-1With AKRatio, AK-1It it is target detection window previous detection window label
For the peak value of K-1 detection window, AKIt it is the peak value of target detection window;
Second inhibitive factor is equal to zero;
K-1 detection window is numbered corresponding first suppression of detection window of K+1 with target detection window later detection window
The factor;
K-2 detection window is numbered corresponding second suppression of detection window of K+2 with K+1 detection window later detection window
The factor.
Farther include before the peak value that in described measurement target detection window, random access code is corresponding: transmitting terminal is sent out
Penetrate random access lead code, measure the peak value of each detection window;
At high s/n ratio and time at least user occur in 3 adjacent windows, described inhibitive factor include the first suppression because of
Son and the second inhibitive factor;
First inhibitive factor is equal to AK-1With AKRatio, AK-1It it is target detection window previous detection window label
For the energy of K-1 detection window, AKIt it is the peak value of target detection window;
Second inhibitive factor is equal to AK-2With AKRatio, AK-2It is that window is previous is numbered K-2 in K-1 detection
Detection window peak value;
K-1 detection window is numbered corresponding first suppression of detection window of K+1 with target detection window later detection window
The factor;
K-2 detection window is numbered corresponding second suppression of detection window of K+2 with K+1 detection window later detection window
The factor.
Farther include between the peak value that in described measurement target detection window, random access code is corresponding: transmitting terminal is sent out
Penetrate random access lead code, measure the peak value of each detection window;
In the case of there is frequency displacement, described inhibitive factor includes at least one sequence inhibitive factor;
The described sequence factor is equal to AK+dWith AKRatio, AK+dBe distance objective detection window be the detection of d
The peak value of window, AKIt it is the peak value of target detection window.
Described judge that whether user that described target detection window occurs is according to described correction peak value and absolute thresholding
False-alarm includes:
Described correction peak value is less than absolute thresholding, and the user that the most described target detection window occurs is false-alarm;
Otherwise, it determines the user that described target detection window occurs is not false-alarm.
From technique scheme it can be seen that in embodiments of the present invention, target detection window is first measured
The peak value that middle random access code is corresponding;The most described peak value deduction non-targeted detection window reveal energy obtain with
The correction peak value that machine access code is corresponding;Described target detection is judged according to described correction peak value and absolute thresholding
Whether the user that window detects is false-alarm, if described target detection window is false-alarm, then in described target detection
Labelling in window.Owing to may determine that whether target detection window is false-alarm according to correction peak value and absolute thresholding,
False-alarm is effectively suppressed in the case of ensure that the normal access probability of multi-user.
Accompanying drawing explanation
Fig. 1 is the structural representation of receiver basic function module;
Fig. 2 is the waveform diagram after modulus square;
Fig. 3 is the method flow schematic diagram of embodiment of the present invention suppression random access code false-alarm.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention express clearer, below in conjunction with attached
The present invention is further described in more detail for figure and specific embodiment.
In embodiments of the present invention, whether at high s/n ratio still in the case of frequency deviation, detain in peak value
Unless the energy that target detection window is revealed is obtained with revising peak value, judge that target is examined further according to revising peak value
Whether the user surveying window appearance is false-alarm.In the case of so ensure that the access probability of normal multi-user,
Effectively suppress false-alarm.
See the method flow schematic diagram that accompanying drawing 3 is suppression random access code false-alarm and specifically include following steps:
The peak value that in step 301, measurement target detection window, random access code is corresponding.
First, all of detection window is carried out pre-detection, i.e. detect the peak value in each detection window or other inspection
Measure, such as energy etc..Target detection window is determined in the detection window detect peak value.Wherein, this peak value
More than absolute thresholding.When high s/n ratio, distance detects that detection K of window of peak value detects in window at least
There is the peak value of a detection window more than absolute thresholding, it is determined that detection window peak value being detected is target detection window.
In LTE system, general K is less than or equal to 4 based on experience value.Certainly discounting for the problem of amount of calculation,
In order to ensure the degree of accuracy calculated, then the value of K is the bigger the better.In the case of there is frequency displacement, here
Determine include peak value be more than thresholding each detection window be target detection window.
Afterwards, peak value the record that in target detection window, random access code is corresponding is measured.
Step 302, described peak value deduction non-targeted detection window is revealed energy and is obtained corresponding the repairing of random access code
Positive peak;
Due to the energy likely having non-targeted detection window to reveal in target detection window, it is therefore desirable to revise step
301 peak values measured.The energy that the peak value deduction non-targeted detection window that random access code is corresponding is revealed is the most random
The correction peak value that access code is corresponding.Wherein, non-targeted detection window reveals energy is to be had detected that by least one
In the non-targeted detection window of user peak value corresponding to random access code and this non-targeted detect suppression corresponding to window because of
The product of son determines.
Step 303, judge, according to described correction peak value and definitely thresholding, the user that described target detection window occurs
Whether it is false-alarm, if false-alarm, then labelling in described target detection window.
If the correction peak value that step 302 obtains is less than absolute thresholding, it is determined that target detection window is false-alarm,
This target detection window is marked;Otherwise, it determines be not false-alarm.
Technical scheme is described in detail below in conjunction with specific embodiment.
Embodiment one
In the case of high s/n ratio, the detection window corresponding to root parameter u of current random access code has N number of
(detection window index is 1,2,3......, N).First all of detection window is carried out pre-detection, used
(flag=1 represents and has been detected by peak value for the judgement mark flag at family;Flag=0 represent be not detected by peak value).
There is user in k-th detection window, its pre-detection mark flagK=1, k-th detection window is probably very
Positive user, it is also possible to owing to the leakage of its adjacent detection window energy causes.
The size of the peak value (or other detection limit) of k-th user is MaxvalueK, it is revised
Peak value (or other detection limit) size is designated as Maxvalue_rK, Maxvalue_rKIt is by MaxvalueKIn
Obtain after possible adjacent window energy leakage part deduction.
Transmitting terminal launches a random access lead code, measures the peak value of each detection window.Pass through at receiving terminal
After process, the index of target detection window is K, and the size of its peak value (or other detection limit) is AK.Due to
User is different with the distance of base station, and the energy causing being leaked to adjacent detection window can slightly difference.Distance base station
Nearer user, the energy being leaked to K-1 detection window is relatively leaked to the energy of K+1 detection window relatively greatly, lets out
Dew is A to the peak value of K-1 detection windowK-1, then the first inhibitive factor G1=AK-1/AK.It is leaked to K-2
The energy that the energy of detection window is leaked to K+2 detection window relatively is relatively big, is leaked to the peak value of K-2 detection window
For AK-2, then the second inhibitive factor G2=AK-2/AK。
When high s/n ratio and during N >=1, N is the number of detection window, described inhibitive factor include G1 and
G2.K-1 detection window is numbered corresponding first suppression of detection window of K+1 with target detection window later detection window
The factor;The detection window corresponding second that K-2 detection window is numbered K+2 with K+1 detection window later detection window presses down
The factor processed.
N=4, be up to three adjacent windows preliminary examinations measure user, then:
Maxvalue_rK=MaxvalueK-Maxvalue K+1*G1*flag K+1
-Maxvalue K-1*G1*flag K-1
-Maxvalue K+2*G2*flag K+2
N=3, be up to two adjacent windows preliminary examinations measure user, then:
Maxvalue_rK=MaxvalueK-Maxvalue K+1*G1*flag K+1
-Maxvalue K-1*G1*flag K-1
N=2, be up to one adjacent windows preliminary examination measures user, then:
Maxvalue_rK=MaxvalueK-Maxvalue K+1*G1*flag K+1
Wherein flag value is 0 or 1, is that 1 expression this detection window in pre-judgement user occurs, is 0 expression
User does not occur.Consider adjacent windows possible influence each other after, carry out conclusive judgement: if
Maxvalue_rK< γα, it is determined that flagK=0 is false-alarm;Otherwise, the pre-court verdict before maintaining.
flag K=1.
Embodiment two
In the case of example two and embodiment one are suitable for high s/n ratio.In embodiment two, at least 3
Individual adjacent window, i.e. N >=4.Due in the embodied case, when inhibitive factor includes G1 and G2, amount of calculation
The biggest.In order to avoid substantial amounts of calculating, take into consideration only affecting G2 and can make G2=0 between adjacent windows.G1
Determination method identical with embodiment one.Certainly amount of calculation is not being considered, it is ensured that in the case of precision, adopt
Optimal by the scheme in embodiment one.
Embodiment three
In the environment of frequency deviation (residual frequency departure and Doppler frequency shift), the detection window that root parameter u is corresponding is entered
Row detection, obtains the judgement mark flag of user.If flagK=1, peak is MaxindexK。
Maxindexk±(du, 2du.......ndu) other all may be caused to detect window false-alarm.But it is as the increase of n, lets out
The energy of leakage can be more and more less.Therefore distance main peak value ± d is mainly considered when using single window detectionuThe energy at place
Leaking the impact on other detection window, all users that can obtain flag=1 may cause the position collection of false-alarm
Close Flasealarm_index.If needing consideration ± 2du, 3du.......nduPosition on energy leakage, can be right
Flasealarm_index expands.
If using three windows to merge detection, obtain the judgement mark flag of user.Detection is merged using three windows
Time mainly consider distance main peak value ± 2duThe impact on other detection window of the energy leakage at place, can obtain flagK
All users of=1 may cause location sets Flasealarm_index of false-alarm.If needing to consider
±3du.......nduPosition on energy leakage, Flasealarm_index can be expanded.
The flag of certain userK=1, first determine whether in Flasealarm_index the false alarm position of other user is whether
Enter target detection window.If it does, the number of record false alarm position and the peak value of correspondence thereof, would leak into
The energy of target detection window removes;If it does not exist, then terminate.Wherein, in Flasealarm_index
The position being likely to occur including false-alarm, the physical location of target detection window is also known, it can be determined that whether
Enter target detection window.
The size of the peak value (or other detection limit) of k-th user is Maxvaluek, by its revised peak
Value (or other detection limit) size is designated as Maxvalue_rk.M position is had to enter into the model of target detection window
Enclose, then
GmFor there is the sequence inhibitive factor under offset frequency situation.In the community of LTE low-speed mode, Yong Huyi
Dynamic meeting causes Doppler frequency shift, and produced frequency deviation is more stable.Only have a user at transmitting terminal to launch
Random access lead code, at receiving terminal after processing, the index of target detection window is K, its peak value (or
Other detection limit) size be AK, position is MaxindexK.Under a certain fixing frequency deviation, distance
MaxindexKPositive duPosition on the size of peak value (or other detection limit) be
, then
In like manner can be with computed range MaxindexKOther integral multiple duSequence inhibitive factor on position.Sequence suppression because of
Son can do suitable adjustment according to the translational speed of actual channel scenario and user.
After the impact considering frequency deviation, carry out conclusive judgement: if Maxvalue_rK< γα, it is determined that
flag K=0 is false-alarm;Otherwise, pre-judgement structure flag before maintainingK=1.
The above, only presently preferred embodiments of the present invention, it is not intended to limit the protection of the present invention
Scope.All within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made,
Should be included within the scope of the present invention.