Open Access is an initiative that aims to make scientific research freely available to all. To date our community has made over 100 million downloads. It’s based on principles of collaboration, unobstructed discovery, and, most importantly, scientific progression. As PhD students, we found it difficult to access the research we needed, so we decided to create a new Open Access publisher that levels the playing field for scientists across the world. How? By making research easy to access, and puts the academic needs of the researchers before the business interests of publishers.
We are a community of more than 103,000 authors and editors from 3,291 institutions spanning 160 countries, including Nobel Prize winners and some of the world’s most-cited researchers. Publishing on IntechOpen allows authors to earn citations and find new collaborators, meaning more people see your work not only from your own field of study, but from other related fields too.
Cognitive radio (CR) is a novel technology that allows to improve spectrum utilization by enabling opportunistic access to the licensed spectrum band by unlicensed users . This is accomplished through heterogeneous architectures and techniques of dynamic spectrum access. The CR is defined as an intelligent wireless communication system that is aware of its environment and is capable to learn from the environment and adapt its transmission parameters, such as frequency, modulation, transmission power and communication protocols .
An important aspect of a cognitive radio is spectrum sensing , which involves two main tasks: signal detection and modulation classification. Signal detection refers to detection of unused spectrum (spectrum holes). It is a simpler task and can be done, for example, by comparing the energy in the frequency band of interest with a predetermined threshold. This task is important so that the unlicensed users do not cause interference to licensed users. Modulation classification consists in automatically identifying the modulation scheme (PSK, FM, QAM, etc) of a given communication system with a high probability of success and in a short period of time. The identification of the modulation scheme allows the cognitive radio to demodulate the received signal. In order to accomplish the task of modulation classification, several data mining techniques can be applied, such as artificial neural networks, support vector machine, Bayesian classifiers, etc.
This chapter aims to evaluate different algorithms for classification of modulation signals on spectrum sensing. The features used for classification are based on a well-established technique called cyclostationarity [7, 10]. Based on these features are evaluated the performances of five data mining techniques: naïve bayes, decision tree, k-nearest neighbor (KNN), support vector machine (SVM) and artificial neural networks (ANN). The choice of such techniques was based on the fact that they are the most popular representatives of different learning paradigms.
2. The problem of modulation classification
A modulation classification system consists of a front end and a back end or classifier. The front end converts the received signal to a vector composed of elements. Having as input, the classifier decides the class among pre-determined modulation schemes. The process is depicted in the diagram below:
The feature selection is a key step in the performance of the classifier. This selection depends on factors such as the modulation type to be classified, the signal to noise ratio, the presence of fading, the frequency offset, etc. This chapter uses the cyclostationarity to extract features of modulation due to its reduced sensibility to noise and interfering signals, and also its ability to extract signal parameters such as the carrier frequency and the symbol rate .
In the literature there are numerous works that combine different techniques of extraction features and classifiers to perform the modulation classification, as shown in Table 1.
SNR (dB) (min:Δ:max)
AWGN/ freq. offset
BPSK, 4PAM, 16QAM, 8PSK
features derived from amplitude, frequency and phase
Examples of different front end and classifier used in the literature. NA: not available.
These works show good results in the experimental setup in which they were assessed. However, these works are evaluated on different operating conditions (signal-to-noise ratio, type of noise and distortion) and use different modulations. Thus, it is difficult to directly compare the results, or even to reproduce the results presented.
In this chapter, the comparison of main classifiers available in the literature is performed, considering the same operating conditions: five modulation schemes (AM, BPSK, QPSK, BFSK and 16QAM); channel with additive white Gaussian noise (AWGN) and Rayleigh multipath fading; all the modulated signals adopt the same symbol rate, sampling frequency and carrier frequency. For every modulation scheme 1500 samples are generated under each SNR (from -10 dB to 10 dB at intervals of 5 dB), in which 750 samples are used for training, and the other 750 samples for testing.
3. Front end: Cyclostationarity
Cyclostationarity is a technique that extracts features of the signals. Signals are characterized as cyclostationary since their mean and autocorrelation are periodic with some period . This is
for all and , where is a signal said to be cyclostationary.
Modulated signals are cyclostationary since they are coupled with several sources of periodicities such as sine wave carriers, pulse trains, repeating spreading, hopping sequences, or cyclic prefixes. These introduced periodicities cause spectral redundancy, which can be measured by the correlation between spectral components of cyclostationary signals. This periodicity appearing in transmitted signal of the users can be used by cognitive radio to detect and identify user signals.
Since the autocorrelation function of received signal is periodic, it can be represented by a Fourier Series, shown in Equation 1,
where is the Fourier Series coefficients called cyclic autocorrelation function with spectral components at cyclic frequencies . The Fourier coefficients may be obtained by Equation 2.
The density of spectral correlation is the Fourier Transform of cyclic autocorrelation function and spectral correlation function (SCF), , is the density of correlation between spectral components at and , and is given by Equation 3,
where is the spectral components of received signal at frequency with bandwidth as defined in Equation 4.
The SCF is a three-dimensional function; therefore, to reduce the calculations for the classifier, it is possible to use the peak values of normalized SCF as features to distinguish each modulation, that is, the cyclic domain profile (CDP), obtained by Equation 5.
In order to illustrate the use of the cyclostationarity technique, Figure 1 shows the estimation of the normalized SCF for BPSK and QPSK modulations respectively. The Figure 2 shows the cyclic domain profile for the BPSK and QPSK modulations. These examples adopted a sampling frequency Hz, carrier frequency Hz, cyclic frequency resolution Hz and frequency resolution Hz.
Note that different modulations have different CDP, thus these features were used as input to the block classifier. The cyclostationary features of modulated signals have been increasingly considered for use in a large range of applications, including signal detection, classification, synchronization and equalization. Its main advantages are the reduced sensibility to noise and interfering signals, and also its ability to extract signal parameters such as the carrier frequency and the symbol rate .
4.1. Naïve Bayes
The naïve Bayes classifier is based on Bayes’ theorem. This classifier is particularly useful when the input data dimensionality is high. Thus, to represent the classifier in the cognitive radio system, we adopt the nomenclature used in , where , , and are called posterior, likelihood, prior and evidence, respectively, and are related through Bayes’ rule,
This classifier attempts to select the label
which maximizes the posterior probability. However, neither nor is known. Hence, the classifiers use estimates and and maximize
In most cases, the prior can be reliably estimated by counting the labels in the training set, i.e., we assume that . In order to estimate is often the most difficult task. Hence, Bayes classifiers typically assume a parametric distribution where describes the distribution’s parameters to be determined (e.g., the mean and covariance matrix if the likelihood model is a Gaussian distribution).
The naïve Bayes algorithm assumes that the attributes of are conditionally independent of each other, given . It means that the algorithm simplifies the representation of , and the estimation problem from the training set. Whereas. In the case where , we have:
where is a general property from conditional probability definition, while is only valid for conditional independence. Generalizing Equation 9, we have:
When training a naďve Bayes classifier, this will produce a probability distribution and for all values of , i.e, , . To calculate the posterior probability of each class , we use Bayes’ theorem:
Assuming is conditionally independent given , we can rewrite Equation 10 as:
Equation 12 is the fundamental equation of a naïve Bayes classifier. Given a new sample , this equation shows how to calculate the probability for each . Such calculation depends only on observed attribute values and distributions and estimated from the data training. If it is desired only to the most likely value of , then we can simplify to
or, using the fact that the logarithm is a monotonic function:
4.2. Decision tree
A decision tree is a model of predictive machine learning which performs the decision of a new instance based on the value of its various attributes . It consists of a structure where leaf nodes represent tests of one or more attributes. The branches of these nodes are the possible values of these attributes. The terminal nodes are the result of classification. In order to perform the classification of a new instance, a decision tree is created based on the values of the attributes of the training set. This chapter uses the decision tree implemented in the Weka software, called J4.8, which is an implementation of the C4.5 algorithm, which was developed by J. Quinlan  and probably the most famous algorithm for the design of decision trees.
A decision tree is formed by a set of classification rules. Each path from the root to a leaf represents one of these rules. The decision tree should be set so that for each observation in the database, there is only one path from root to leaf. Classification rules are composed of an antecedent (precondition) and a consequent (conclusion). An antecedent should be formed by one or more predictive attributes, while the consequent defines the class or classes.
A key issue for building a decision tree is the strategy for the choice of features that can determine the class to which a sample belongs. Measures based on entropy are commonly used to address this problem, which measures the randomness of the value of a feature before deciding which feature to use to predict the class.
Decision trees are methods that use a recursive algorithm for successive divisions in a training set. The main problem is then the reliability of estimates of the error used to select the divisions. Despite the fact that estimate obtained with the training data used during the growth of the tree known as "resubstitution error" continues to decrease, generally, the choices of the division in higher levels of the tree does not produce very reliable statistics. Therefore, the quality of the sample directly influences the accuracy of the estimates of the error. Since each iteration of the algorithm divides the set of training data, the internal nodes make decisions from ever smaller samples. This means that the error estimates are less reliable as the tree grows. Thus, pruning methods have been used to minimize this problem and avoid overfitting [6, 23].
Basically, there are two classes of methods in pruning a decision tree: a post-pruning and pre-pruning. In this chapter the post-prune method is used, which consists in allowing the tree to grow to a maximum size, i.e., until the leaf nodes that have minimal impurity, for subsequent application of the pruning.
4.3. SVM classifier
A support vector machine (SVM) is a class of learning algorithms based on statistical learning theory, which implements the principle of structural risk minimization . The goal of an SVM classifier is to find a maximum margin hyperplane in a feature space. A hyperplane function is to be a decision surface such that the margin of separation between examples of one class and another is at a maximum .
More specifically, a SVM is a binary classifier given by
where is the kernel function between the test vector and the -th training example , with . The effectively used examples have and are called support vectors. In the literature, several possibilities of kernels are presented in applications involving pattern recognition, such as linear, Gaussian, polynomial, sigmoid and radial basis functions.
A SVM with a linear kernel given by the inner product between and can be converted to a perceptron where is pre-computed.
Therefore, linear SVMs were adopted in this chapter due to their lower computational cost when compared to non-linear SVMs with kernels such as the Gaussian . To combine the binary SVMs , to obtain this work adopted the all-pairs error-correcting output code (ECOC) matrix with Hamming decoding , where the winner class is the one with the majority of “votes”. Note that an alternative to all-pairs, which uses SVMs, is the one-vs-all ECOC that uses SVMs .
4.4. Artificial neural networks
Artificial neural networks (ANN) are parallel distributed systems composed of simple processing units called neurons that compute some mathematical function, usually nonlinear. Such units are arranged in one or more layers and interconnected by so-called synaptic weights. The intelligent behavior of ANN comes from the interactions between the processing units of the network.
A neuron consists of a sum of weights and inputs, and an activation function. The weight of the connections are set by a rule of training, according to the patterns presented. In this chapter, a neural network was used called multilayer perceptrons with the backpropagation algorithm for training, which has shown good results in classification problems.
The algorithm multilayer perceptron backpropagation (also called the generalized Delta Rule) consists in a process of supervised learning using a predetermined set of pairs of input and output to adjust the weights in the network using an error correction scheme held in propagation cycles [6, 9]. The backpropagation is divided into two phases: the first step is forward the input vector from the first through the last layer and to compare the output value to the desired value. The second phase consists of backwarding the error based on the last layer through the input layer by adjusting the weights of the neurons of the hidden layers. After adjusting all the weights of network, is given one more set of examples is given, ending a epoch. This process is repeated until the error is acceptable for the training set, referred to as the convergence time of the network.
The performance of a multilayer perceptron neural network during training depends on the following parameters :
Initialization of weights. The weights of the connections between neurons can be initialized randomly or uniformly.
Learning rate. The learning rate controls the speed of learning, increasing or decreasing the set of weights performed at each iteration during training. Intuitively, its value must be greater than 0 and less than 1. If the learning rate is too small, learning will take place very slowly. Where the rate is very large (greater than 1), the correction would be greater than the observed error, causing the neural network learning point exceeding its greatest value, making the training process unstable.
Transfer function parametrization. Also known as threshold logic, this function is the one which defines and sends out the value passed by the neuron activation function. The activation function can take many forms and methods. The best known are the following: linear function, sigmoid function and exponential function.
The classifiers that simply store the training data are called “lazy” classifiers, or known as IBL (instance based learning) . The k-nearest neighbor (KNN) is a method of this family and stores examples in memory as points in -dimensional space defined by attributes that describe the examples . Thus, for each new example to classify, KNN uses the training data to determine the examples in the database that are “nearest” to the example in the analysis. With each new example to be classified, a sweep in the training data, is made, which causes a large computational effort.
Suppose a training set with examples. Let be a new example, not yet classified. In order to classify it, calculate distances by a measure of similarity between and all examples in the training set and consider the K closest examples (with the lowest distance) for . The example is classified according to the most frequent class among the K examples found.
The distance between two examples is calculated by a measure of similarity. A popular measure of similarity is the Euclidian distance . This measure calculates the square root of the sum of the squares of the differences between the vectors and :
This chapter uses the Euclidean distance. Based on this metric, the KNN searches the “nearest neighbors” to classify new examples.
The simulations aim to evaluate the reliability of cyclostationarity technique for feature extraction and and to compare the performance of data mining techniques like naïve bayes, decision tree, KNN, SVM and ANN, under various conditions. The signals were modulated using AM, BPSK, QPSK, BFSK and 16-QAM modulations. The signals were propagated through two types of channel models: AWGN channel and an AWGN and multipath fading channel. The signal-to-noise ratio (SNR) was varied randomly from -10 to 10 dB as part of the simulation. In both channel models, carrier frequency GHz, sampling period = 0.167 ns, square-root raised cosine with roll-off factor , number of symbols 100, FFT points was used.
In order to implementation of the classifiers we used the WEKA software , which is a collection of machine learning algorithms for data mining tasks. Weka is open source software issued under the General Public License. We adopted the following settings for the classifiers:
Naïve Bayes: The naïve Bayes used a normal distribution for numeric attributes, and the parameter (UseKernelEstimator) set to False, which corresponds to the standard naive Bayes.
KNN: In the configuration we adopted the KNN search algorithm of neighbors based on Euclidean distance.
J4.8: The J4.8 has been configured with automatic selection for the confidence factor parameter C. Thus, the results presented represent the best result achieved for confidence factor values which varied between [0.1, 0.25 and 0.5];
SVM: The SVM has been configured with linear kernel (K = 0), with the cost parameter C ranging from [2, 1, 0.5 and 0.25] and degree of the kernel D = 3.
ANN: We adopted a neural network multilayer perceptron with learning algorithm backpropagation, the number of neurons in the hidden layer ranging from [60, 110, 130 and 160] neurons, learning rate ranging between a rate of [0.1, 0.5 and 0.9], and time varying between [0.1, 0.2 and 0.4].
5.1. Sample complexity
The first experiment aimed to analyze the accuracy of classifiers with the variation in the number of samples used in the training phase. This analysis was performed using the sample complexity curves .
The sample complexity curve aims to determine how many samples are required for the classifier to achieve a certain level of performance. The abscissa represents the number of samples in the training set and the ordinate represents the percentage of correct classifications obtained in the test phase. It should be noted that only the number of samples of the training set varies, while the number of samples in the test phase remains fixed.
The classifiers were trained with different numbers of samples, varying between [50, 150, 300, 450, 750 and 1000] samples of each modulation. In the test phase, 1000 samples were used for each modulation. Figure 3 through Figure 6 show the results obtained for a multipath fading channel, configured with Doppler frequency FD = 50 Hz and AWGN.
Through an analysis of sample complexity curves, it was decided to work with 750 training samples of each modulation, since this number had a good performance for the different classifiers which were evaluated.
5.2. Simulation result of AWGN channel
In this scenario, the SNR is varied from a range of -15 to 15 dB range. The training, testing and validation sets were composed of 750 different samples of each modulation. The classifiers were trained and tested with the same values of SNR. Figure 7 shows the results for the classification of AM, BPSK, QPSK and BFSK modulations.
The results show that for SNR values greater than -5 dB, all classifiers presented excellent performance with nearly 100% correct classification. Among the evaluated classifiers, the SVM had a higher percentage of correct classification, even for SNR values lower than -5 dB.
Table 2 allows the analysis of the performance of classifiers in the worst case, i.e., SNR = -15 dB. The results show that the greater number of errors occurs in the classification of QPSK and BPSK modulations, mainly by KNN (with 14.3 % errors) and decision tree J4.8 (16.5 % errors) classifiers.
Performance of classifiers in SNR = -15 dB.
Table 3 shows the confusion matrix of the J4.8 classifier considering a SNR = -15 dB. It is observed that at low SNR, the classification error occurs to distinguish the QPSK and BPSK modulation, due to distortions in their features. Figure 8 shows the profiles of the BPSK and QPSK modulations in SNR = -15 dB and 15 dB.
Classifier as -"/>
Confusion matrix of the J4.8 classifier, SNR = -15 dB.
In order to analyze the degree of generalization of the classifiers, two experiments were realized. In the first, the number of samples in training set was fixed at 750 samples for each modulation with SNR = 5 dB. The number of samples in the test set was varied with SNR values from -15 to 15 dB. The goal was to evaluate the performance of classifiers when tested with SNR values for which they were not trained. The results are shown in Figure 9. It is observed that SVM and ANN presented the best performance, which can be seen, for example, comparing the performance of classifiers in SNR = -5 dB.
The second experiment was to train classifiers with SNR values from -15 to 15 dB. Then the classifiers were tested with specific values of SNR, which are indicated on the axis of abscissa in Figure 9.
In this experiment, the performance of the classifiers obtained a considerable increase. The ANN and SVM classifiers presented the best performance; on the other hand, the naïve Bayes classifier had the worst performance.
Correct class. (%)
Performance of classifiers when trained and tested with different SNR values.
In the literature there are studies indicating that the classification of QAM using cyclostationarity is difficult due to the fact that high-order QAM modulations do not exhibit periodicity of 2nd order, or in some cases, exhibit similar characteristics of QPSK modulation . The results that follow show the performance of classifiers to classify the 16-QAM modulation. Figure 10 allows comparison of the performance of classifiers when the 16-QAM modulation is included.
The results show that at low SNR, the performance of the classifiers decreases, when included the 16-QAM modulation. However, with increasing SNR, the performance of the classifiers is close to 100% of a correct classification.
In general, the SVM classifier obtained the best results, which can be justified by their robustness, due to its mathematical formulation based on the search of the optimal solution. The naïve Bayes, despite being a simplistic method, also performed well, better than some classifiers already recognized as an ANN and KNN.
6. Simulation result of a multipath rayleigh fading and AWGN channel
Figure 11 through Figure 13 show the results for SNR values from -15 to 15 dB and Doppler frequency FD = [50, 150 and 300] Hz. Modulations used were AM, BPSK, QPSK, BFSK and 16-QAM.
The results show that in general, all the classifiers had good performance. However, the decision tree KNN and J4.8 proved very susceptible to noise, especially for SNR values between -15 dB and 5 dB.
Furthermore, comparison between the Rayleigh and AWGN channels shows that there was a decrease in the performance of the classifiers. In the experiments, it was used a uniform procedure was used for selection of models of classifiers (i.e., not invested much in the tune of a specific classifier). This may explain the variation in results for AWGN and multipath fading. A more detailed investigation about the parameters of classifiers such as SVM and ANN would probably improve the results. 1
This chapter discussed the task of modulation classification in cognitive radio. The modulation classification becomes fundamental, since this information allows the RC to adapt its transmission parameters for the spectrum to be shared efficiently, without causing interference to other users. A modulation classifier was implemented based on the characteristics of cyclostationarity of modulated signals. The performance of five data mining techniques were evaluated: naïve Bayes, decision tree J4.8, KNN, SVM, and ANN. In this evaluation, the signal classifications were performed to classifier AM, BPSK, BFSK, QPSK and 16-QAM modulations. An environment with multipath Rayleigh fading and AWGN was adopted.
Simulation results show that it is possible to classify the incoming signals, even at very low SNR, if the The cyclostationarity technique proved an effective technique for feature extraction, even in environments with low SNR. The SVM classifier with a linear kernel presented the best results, even in a fading multipath configuration.
The evaluation of algorithms for modulation classification proposed may serve as a starting point for researchers who want to compare results systematically.
Lilian Freitas, Yomara Pires, Jefferson Morais, João Costa and Aldebaro Klautau (September 12th 2012). Data Mining Applied to Cognitive Radio Systems, Advances in Data Mining Knowledge Discovery and Applications, Adem Karahoca, IntechOpen, DOI: 10.5772/51824. Available from:
Survey of Data Mining and Applications (Review from 1996 to Now)
By Adem Karahoca, Dilek Karahoca and Mert Şanver
We are IntechOpen, the world's leading publisher of Open Access books. Built by scientists, for scientists. Our readership spans scientists, professors, researchers, librarians, and students, as well as business professionals. We share our knowledge and peer-reveiwed research papers with libraries, scientific and engineering societies, and also work with corporate R&D departments and government entities.