-
Sparse Actuator Scheduling for Discrete-Time Linear Dynamical Systems
Authors:
Krishna Praveen V. S. Kondapi,
Chandrasekhar Sriram,
Geethu Joseph,
Chandra R. Murthy
Abstract:
We consider the control of discrete-time linear dynamical systems using sparse inputs where we limit the number of active actuators at every time step. We develop an algorithm for determining a sparse actuator schedule that ensures the existence of a sparse control input sequence, following the schedule, that takes the system from any given initial state to any desired final state. Since such an a…
▽ More
We consider the control of discrete-time linear dynamical systems using sparse inputs where we limit the number of active actuators at every time step. We develop an algorithm for determining a sparse actuator schedule that ensures the existence of a sparse control input sequence, following the schedule, that takes the system from any given initial state to any desired final state. Since such an actuator schedule is not unique, we look for a schedule that minimizes the energy of sparse inputs. For this, we optimize the trace of the inverse of the resulting controllability Gramian, which is an approximate measure of the average energy of the inputs. We present a greedy algorithm along with its theoretical guarantees. Finally, we empirically show that our greedy algorithm ensures the controllability of the linear system with a small number of active actuators per time step without a significant average energy expenditure compared to the fully actuated system.
△ Less
Submitted 29 June, 2024;
originally announced July 2024.
-
Distributed IRSs Always Benefit Every Mobile Operator
Authors:
L. Yashvanth,
Chandra R. Murthy
Abstract:
We investigate the impact of multiple distributed intelligent reflecting surfaces (IRSs), which are deployed and optimized by a mobile operator (MO), on the performance of user equipments (UEs) served by other co-existing out-of-band (OOB) MOs that do not control the IRSs. We show that, under round-robin scheduling, in mmWave frequencies, the ergodic sum spectral efficiency (SE) of an OOB MO is mo…
▽ More
We investigate the impact of multiple distributed intelligent reflecting surfaces (IRSs), which are deployed and optimized by a mobile operator (MO), on the performance of user equipments (UEs) served by other co-existing out-of-band (OOB) MOs that do not control the IRSs. We show that, under round-robin scheduling, in mmWave frequencies, the ergodic sum spectral efficiency (SE) of an OOB MO is monotonic in the total number of IRS elements with a pre-log factor that depends on the channel properties of the OOB UE. We further show that the maximum achievable SE of OOB MO scales log-linearly in IRS elements. Then, by specifying the minimum number of IRSs as a function of the channel parameters, we design a distributed IRS system in which an OOB MO almost surely obtains the maximum SE. Finally, we prove that the outage probability at an OOB UE decreases exponentially in the number of IRSs, even though they are randomly configured from the UE's viewpoint. We numerically verify our theory and conclude that distributed IRSs always help every MO, but the MO controlling the IRSs benefits the most.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Thermal transport measurements of the charge density wave transition in CsV$_3$Sb$_5$
Authors:
Erik D. Kountz,
Chaitanya R. Murthy,
Dong Chen,
Linda Ye,
Mark Zic,
Claudia Felser,
Ian R. Fisher,
Steven A. Kivelson,
Aharon Kapitulnik
Abstract:
We study thermalization and thermal transport in single crystals of CsV$_3$Sb$_5$ through the CDW transition by directly measuring thermal diffusivity ($D$), thermal conductivity ($κ$), resistivity ($ρ$), and specific heat ($c$). Commensurate with previous reports, we observe a sharp, narrow anomaly in specific heat associated with a first order transition that results in a CDW state below…
▽ More
We study thermalization and thermal transport in single crystals of CsV$_3$Sb$_5$ through the CDW transition by directly measuring thermal diffusivity ($D$), thermal conductivity ($κ$), resistivity ($ρ$), and specific heat ($c$). Commensurate with previous reports, we observe a sharp, narrow anomaly in specific heat associated with a first order transition that results in a CDW state below $\sim94$ K. While a corresponding sharp anomaly in thermal diffusivity is also observed, resistivity and thermal conductivity only exhibit small steps at the transition, where the feature is sharp for resistivity and broader for thermal conductivity. Scrutinizing the thermal Einstein relation $κ=cD$, we find that this relation is satisfied in the entire temperature range, except in a narrow range around the transition. The Wiedemann-Franz law seems to work outside the critical region as well. Below the transition and persisting below the two-phase regime we find strong resemblance between the resistivity anomaly and the specific heat, which may point to a secondary electronic order parameter that emerges continuously below the transition.
△ Less
Submitted 27 December, 2023;
originally announced December 2023.
-
Joint State and Input Estimation for Linear Dynamical Systems with Sparse Control
Authors:
Rupam Kalyan Chakraborty,
Geethu Joseph,
Chandra R. Murthy
Abstract:
Sparsity constraints on the control inputs of a linear dynamical system naturally arise in several practical applications such as networked control, computer vision, seismic signal processing, and cyber-physical systems. In this work, we consider the problem of jointly estimating the states and sparse inputs of such systems from low-dimensional (compressive) measurements. Due to the low-dimensiona…
▽ More
Sparsity constraints on the control inputs of a linear dynamical system naturally arise in several practical applications such as networked control, computer vision, seismic signal processing, and cyber-physical systems. In this work, we consider the problem of jointly estimating the states and sparse inputs of such systems from low-dimensional (compressive) measurements. Due to the low-dimensional measurements, conventional Kalman filtering and smoothing algorithms fail to accurately estimate the states and inputs. We present a Bayesian approach that exploits the input sparsity to significantly improve estimation accuracy. Sparsity in the input estimates is promoted by using different prior distributions on the input. We investigate two main approaches: regularizer-based MAP, and {Bayesian learning-based estimation}. We also extend the approaches to handle control inputs with common support and analyze the time and memory complexities of the presented algorithms. Finally, using numerical simulations, we show that our algorithms outperform the state-of-the-art methods in terms of accuracy and time/memory complexities, especially in the low-dimensional measurement regime.
△ Less
Submitted 4 December, 2023;
originally announced December 2023.
-
Tradeoff of age-of-information and power under reliability constraint for short-packet communication with block-length adaptation
Authors:
Sudarsanan A. K.,
Vineeth B. S.,
Chandra R. Murthy
Abstract:
In applications such as remote estimation and monitoring, update packets are transmitted by power-constrained devices using short-packet codes over wireless networks. Therefore, networks need to be end-to-end optimized using information freshness metrics such as age of information under transmit power and reliability constraints to ensure support for such applications. For short-packet coding, mod…
▽ More
In applications such as remote estimation and monitoring, update packets are transmitted by power-constrained devices using short-packet codes over wireless networks. Therefore, networks need to be end-to-end optimized using information freshness metrics such as age of information under transmit power and reliability constraints to ensure support for such applications. For short-packet coding, modelling and understanding the effect of block codeword length on transmit power and other performance metrics is important. To understand the above optimization for short-packet coding, we consider the optimal tradeoff problem between age of information and transmit power under reliability constraints for short packet point-to-point communication model with an exogenous packet generation process. In contrast to prior work, we consider scheduling policies that can possibly adapt the block-length or transmission time of short packet codes in order to achieve the optimal tradeoff. We characterize the tradeoff using a semi-Markov decision process formulation. We also obtain analytical upper bounds as well as numerical, analytical, and asymptotic lower bounds on the optimal tradeoff. We show that in certain regimes, such as high reliability and high packet generation rate, non-adaptive scheduling policies (fixed transmission time policies) are close-to-optimal. Furthermore, in a high-power or in a low-power regime, non-adaptive as well as state-independent randomized scheduling policies are order-optimal. These results are corroborated by numerical and simulation experiments. The tradeoff is then characterized for a wireless point-to-point channel with block fading as well as for other packet generation models (including an age-dependent packet generation model).
△ Less
Submitted 3 December, 2023;
originally announced December 2023.
-
Half-Duplex APs with Dynamic TDD vs. Full-Duplex APs in Cell-Free Systems
Authors:
Anubhab Chowdhury,
Chandra R. Murthy
Abstract:
In this paper, we present a comparative study of half-duplex (HD) access points (APs) with dynamic time-division duplex (DTDD) and full-duplex (FD) APs in cell-free (CF) systems. Although both DTDD and FD CF systems support concurrent downlink (DL) transmission and uplink (UL) reception capability, the sum spectral efficiency (SE) is limited by various cross-link interferences. We first present a…
▽ More
In this paper, we present a comparative study of half-duplex (HD) access points (APs) with dynamic time-division duplex (DTDD) and full-duplex (FD) APs in cell-free (CF) systems. Although both DTDD and FD CF systems support concurrent downlink (DL) transmission and uplink (UL) reception capability, the sum spectral efficiency (SE) is limited by various cross-link interferences. We first present a novel pilot allocation scheme that minimizes the pilot length required to ensure no pilot contamination among the user equipments (UEs) served by at least one common AP. Then, we derive the sum SE in closed form, considering zero-forcing combining and precoding along with the signal-to-interference plus noise ratio optimal weighting at the central processing unit. We also present a provably convergent algorithm for joint UL-DL power allocation and UL/DL mode scheduling of the APs (for DTDD) to maximize the sum SE. Further, the proposed algorithms are precoder and combiner agnostic and come with closed-form update equations for the UL and DL power control coefficients. Our numerical results illustrate the superiority of the proposed pilot allocation and power control algorithms over several benchmark schemes and show that the sum SE with DTDD can outperform an FD CF system with similar antenna density. Thus, DTDD combined with CF is a promising alternative to FD that attains the same performance using HD APs, while obviating the burden of intra-AP interference cancellation.
△ Less
Submitted 31 January, 2024; v1 submitted 4 September, 2023;
originally announced September 2023.
-
On the Impact of an IRS on the Out-of-Band Performance in Sub-6 GHz & mmWave Frequencies
Authors:
L. Yashvanth,
Chandra R. Murthy
Abstract:
Intelligent reflecting surfaces (IRSs) were introduced to enhance the performance of wireless communication systems. However, from a service provider's viewpoint, a concern with the use of an IRS is its effect on out-of-band (OOB) quality of service. Specifically, if two operators, say X and Y, provide services in a given geographical area using non-overlap** frequency bands, and if operator X u…
▽ More
Intelligent reflecting surfaces (IRSs) were introduced to enhance the performance of wireless communication systems. However, from a service provider's viewpoint, a concern with the use of an IRS is its effect on out-of-band (OOB) quality of service. Specifically, if two operators, say X and Y, provide services in a given geographical area using non-overlap** frequency bands, and if operator X uses an IRS to enhance the spectral efficiency (SE) of its users (UEs), does it degrade the performance of UEs served by operator Y? We answer this by analyzing the average and instantaneous performances of the OOB operator considering both sub-6 GHz and mmWave bands. Specifically, we derive the ergodic sum SE achieved by the operators under round-robin scheduling. We also derive the outage probability and analyze the change in the SNR caused by the IRS at an OOB UE using stochastic dominance theory. Surprisingly, even though the IRS is randomly configured from operator Y's point of view, the OOB operator still benefits from the presence of the IRS, witnessing a performance enhancement for free in both sub-6 GHz and mmWave bands. This is because the IRS introduces additional paths between the transmitter and receiver, increasing the overall signal power arriving at the UE and providing diversity benefits. Finally, we show that the use of opportunistic scheduling schemes can further enhance the benefit of the uncontrolled IRS at OOB UEs. We numerically illustrate our findings and conclude that an IRS is always beneficial to every operator, even when the IRS is deployed & controlled by only one operator.
△ Less
Submitted 10 June, 2024; v1 submitted 27 August, 2023;
originally announced August 2023.
-
Does an IRS Degrade Out-of-Band Performance?
Authors:
L. Yashvanth,
Chandra R. Murthy
Abstract:
Intelligent reflecting surfaces (IRSs) were introduced to enhance the performance of wireless systems. However, from a cellular service provider's view, a concern with the use of an IRS is its effect on out-of-band (OOB) quality of service. Specifically, given two operators, say X and Y, providing services in a geographical area using non-overlap** frequency bands, if operator-X uses an IRS to o…
▽ More
Intelligent reflecting surfaces (IRSs) were introduced to enhance the performance of wireless systems. However, from a cellular service provider's view, a concern with the use of an IRS is its effect on out-of-band (OOB) quality of service. Specifically, given two operators, say X and Y, providing services in a geographical area using non-overlap** frequency bands, if operator-X uses an IRS to optimally enhance the throughput of its users, does the IRS degrade the performance of operator-Y? We answer this by deriving the ergodic sum spectral efficiency (SE) of both operators under round-robin scheduling. We also derive the complementary cumulative distribution function of the change in effective channel at an OOB user with and without the IRS, which provides deeper insights into OOB performance. Surprisingly, we find that even though the IRS is randomly configured from operator-Y's view, the OOB operator still benefits from the IRS, witnessing a performance enhancement for free. This happens because the IRS introduces additional paths between the nodes, increasing the signal power at the receiver and providing diversity benefits. We verify our findings numerically and conclude that an IRS is beneficial to every operator, even when the IRS is deployed to optimally serve only one operator.
△ Less
Submitted 30 June, 2023; v1 submitted 24 February, 2023;
originally announced February 2023.
-
Channel State Information Based User Censoring in Irregular Repetition Slotted Aloha
Authors:
Chirag Ramesh Srivatsa,
Chandra R. Murthy
Abstract:
Irregular repetition slotted aloha (IRSA) is a massive random access protocol which can be used to serve a large number of users while achieving a packet loss rate (PLR) close to zero. However, if the number of users is too high, then the system is interference limited and the PLR is close to one. In this paper, we propose a variant of IRSA in the interference limited regime, namely Censored-IRSA…
▽ More
Irregular repetition slotted aloha (IRSA) is a massive random access protocol which can be used to serve a large number of users while achieving a packet loss rate (PLR) close to zero. However, if the number of users is too high, then the system is interference limited and the PLR is close to one. In this paper, we propose a variant of IRSA in the interference limited regime, namely Censored-IRSA (C-IRSA), wherein users with poor channel states censor themselves from transmitting their packets. We theoretically analyze the throughput performance of C-IRSA via density evolution. Using this, we derive closed-form expressions for the optimal choice of the censor threshold which maximizes the throughput while achieving zero PLR among uncensored users. Through extensive numerical simulations, we show that C-IRSA can achieve a 4$\times$ improvement in the peak throughput compared to conventional IRSA.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
Multi-Carrier Wideband OCDM-Based THz Automotive Radar
Authors:
Sangeeta Bhattacharjee,
Kumar Vijay Mishra,
Ramesh Annavajjala,
Chandra R. Murthy
Abstract:
Automotive radars at the Terahertz (THz) frequency band have the potential to be compact and lightweight while providing high (nearly-optical) angular resolution. In this paper, we propose a bistatic THz automotive radar that employs the recently proposed orthogonal chirp division multiplexing (OCDM) multi-carrier waveform. As a stand-alone communications waveform, OCDM has been investigated for r…
▽ More
Automotive radars at the Terahertz (THz) frequency band have the potential to be compact and lightweight while providing high (nearly-optical) angular resolution. In this paper, we propose a bistatic THz automotive radar that employs the recently proposed orthogonal chirp division multiplexing (OCDM) multi-carrier waveform. As a stand-alone communications waveform, OCDM has been investigated for robustness against interference in time-frequency selective channels. The THz-band path loss, and, hence, radar signal bandwidth, are range-dependent. We address this unique feature through a multi-carrier wideband OCDM sensing transceiver that exploits the coherence bandwidth of the THz channel. We develop an optimal scheme to combine the returns at different range/bandwidths by assigning weights based on the Cramer-Rao lower bound on the range and velocity estimates. Numerical experiments demonstrate improved target estimates using our proposed combined estimation from multiple varied-attenuation THz frequencies.
△ Less
Submitted 1 February, 2023;
originally announced February 2023.
-
Impact of Mobility on Downlink Cell-Free Massive MIMO Systems
Authors:
Abhinav Anand,
Chandra R. Murthy,
Ribhu Chopra
Abstract:
In this paper, we analyze the achievable downlink spectral efficiency of cell-free massive multiple input multiple output (CF-mMIMO) systems, accounting for the effects of channel aging (caused by user mobility) and pilot contamination. We consider two cases, one where user equipments (UEs) rely on downlink pilots beamformed by the access points (APs) to estimate downlink channel, and another wher…
▽ More
In this paper, we analyze the achievable downlink spectral efficiency of cell-free massive multiple input multiple output (CF-mMIMO) systems, accounting for the effects of channel aging (caused by user mobility) and pilot contamination. We consider two cases, one where user equipments (UEs) rely on downlink pilots beamformed by the access points (APs) to estimate downlink channel, and another where UEs utilize statistical channel state information (CSI) for data decoding. For comparison, we also consider cellular mMIMO and derive its achievable spectral efficiency with channel aging and pilot contamination in the above two cases. Our results show that, in CF-mMIMO, downlink training is preferable over statistical CSI when the length of the data sequence is chosen optimally to maximize the spectral efficiency. In cellular mMIMO, however, either one of the two schemes may be better depending on whether user fairness or sum spectral efficiency is prioritized. Furthermore, the CF-mMIMO system generally outperforms cellular mMIMO even after accounting for the effects of channel aging and pilot contamination. Through numerical results, we illustrate the effect of various system parameters such as the maximum user velocity, uplink/downlink pilot lengths, data duration, network densification, and provide interesting insights into the key differences between cell-free and cellular mMIMO systems.
△ Less
Submitted 6 September, 2022;
originally announced September 2022.
-
Performance Analysis of Irregular Repetition Slotted Aloha with Multi-Cell Interference
Authors:
Chirag Ramesh Srivatsa,
Chandra R. Murthy
Abstract:
Irregular repetition slotted aloha (IRSA) is a massive random access protocol in which users transmit several replicas of their packet over a frame to a base station. Existing studies have analyzed IRSA in the single-cell (SC) setup, which does not extend to the more practically relevant multi-cell (MC) setup due to the inter-cell interference. In this work, we analyze MC IRSA, accounting for pilo…
▽ More
Irregular repetition slotted aloha (IRSA) is a massive random access protocol in which users transmit several replicas of their packet over a frame to a base station. Existing studies have analyzed IRSA in the single-cell (SC) setup, which does not extend to the more practically relevant multi-cell (MC) setup due to the inter-cell interference. In this work, we analyze MC IRSA, accounting for pilot contamination and multiuser interference. Via numerical simulations, we illustrate that, in practical settings, MC IRSA can have a drastic loss of throughput, up to $70\%$, compared to SC IRSA. Further, MC IRSA requires a significantly higher training length (about 4-5x compared to SC IRSA), in order to support the same user density and achieve the same throughput. We also provide insights into the impact of the pilot length, number of antennas, and signal to noise ratio on the performance of MC IRSA.
△ Less
Submitted 28 May, 2022; v1 submitted 14 May, 2022;
originally announced May 2022.
-
Performance Analysis of Intelligent Reflecting Surface Assisted Opportunistic Communications
Authors:
L. Yashvanth,
Chandra R. Murthy
Abstract:
Intelligent reflecting surfaces (IRSs) are a promising technology for enhancing coverage and spectral efficiency, both in the sub-6 GHz and the millimeter wave (mmWave) bands. Existing approaches to leverage the benefits of IRS involve the use of a resource-intensive channel estimation step followed by a computationally expensive algorithm to optimize the reflection coefficients at the IRS. In thi…
▽ More
Intelligent reflecting surfaces (IRSs) are a promising technology for enhancing coverage and spectral efficiency, both in the sub-6 GHz and the millimeter wave (mmWave) bands. Existing approaches to leverage the benefits of IRS involve the use of a resource-intensive channel estimation step followed by a computationally expensive algorithm to optimize the reflection coefficients at the IRS. In this work, focusing on the sub-6 GHz band of communications, we present and analyze several alternative schemes, where the phase configuration of the IRS is randomized and multi-user diversity is exploited to opportunistically select the best user at each point in time for data transmission. We show that the throughput of an IRS assisted opportunistic communication (OC) system asymptotically converges to the optimal beamforming-based throughput under fair allocation of resources, as the number of users gets large. We also introduce schemes that enhance the rate of convergence of the OC rate to the beamforming rate with the number of users. For all the proposed schemes, we derive the scaling law of the throughput in terms of the system parameters, as the number of users gets large. Following this, we extend the setup to wideband channels via an orthogonal frequency division multiplexing (OFDM) system and discuss two OC schemes in an IRS assisted setting that clearly elucidate the superior performance that IRS aided OC systems can offer over conventional systems, at very low implementation cost and complexity.
△ Less
Submitted 24 October, 2022; v1 submitted 11 March, 2022;
originally announced March 2022.
-
On the Impact of Channel Estimation on the Design and Analysis of IRSA based Systems
Authors:
Chirag Ramesh Srivatsa,
Chandra R. Murthy
Abstract:
Irregular repetition slotted aloha (IRSA) is a distributed grant-free random access protocol where users transmit multiple replicas of their packets to a base station (BS). The BS recovers the packets using successive interference cancellation. In this paper, we first derive channel estimates for IRSA, exploiting the sparsity structure of IRSA transmissions, when non-orthogonal pilots are employed…
▽ More
Irregular repetition slotted aloha (IRSA) is a distributed grant-free random access protocol where users transmit multiple replicas of their packets to a base station (BS). The BS recovers the packets using successive interference cancellation. In this paper, we first derive channel estimates for IRSA, exploiting the sparsity structure of IRSA transmissions, when non-orthogonal pilots are employed across users to facilitate channel estimation at the BS. Allowing for the use of non-orthogonal pilots is important, as the length of orthogonal pilots scales linearly with the total number of devices, leading to prohibitive overhead as the number of devices increases. Next, we present a novel analysis of the throughput of IRSA under practical channel estimation errors, with the use of multiple antennas at the BS. Finally, we theoretically characterize the asymptotic throughput performance of IRSA using a density evolution based analysis. Simulation results underline the importance of accounting for channel estimation errors in analyzing IRSA, which can even lead to 70% loss in performance in severely interference-limited regimes. We also provide novel insights on the effect of parameters such as pilot length, SNR, number of antennas at the BS, etc, on the system throughput.
△ Less
Submitted 23 June, 2022; v1 submitted 14 December, 2021;
originally announced December 2021.
-
Orthogonal Delay Scale Space Modulation: A New Technique for Wideband Time-Varying Channels
Authors:
Arunkumar K. P.,
Chandra R. Murthy
Abstract:
Orthogonal Time Frequency Space (OTFS) modulation is a recently proposed scheme for time-varying narrowband channels in terrestrial radio-frequency communications. Underwater acoustic (UWA) and ultra-wideband (UWB) communication systems, on the other hand, confront wideband time-varying channels. Unlike narrowband channels, for which time contractions or dilations due to Doppler effect can be appr…
▽ More
Orthogonal Time Frequency Space (OTFS) modulation is a recently proposed scheme for time-varying narrowband channels in terrestrial radio-frequency communications. Underwater acoustic (UWA) and ultra-wideband (UWB) communication systems, on the other hand, confront wideband time-varying channels. Unlike narrowband channels, for which time contractions or dilations due to Doppler effect can be approximated by frequency-shifts, the Doppler effect in wideband channels results in frequency-dependent non-uniform shift of signal frequencies across the band. In this paper, we develop an OTFS-like modulation scheme -- Orthogonal Delay Scale Space (ODSS) modulation -- for handling wideband time-varying channels. We derive the ODSS transmission and reception schemes from first principles. In the process, we introduce the notion of $ω$-convolution in the delay-scale space that parallels the twisted convolution used in the time-frequency space. The preprocessing 2D transformation from the Fourier-Mellin domain to the delay-scale space in ODSS, which plays the role of inverse symplectic Fourier transform (ISFFT) in OTFS, improves the bit error rate performance compared to OTFS and Orthogonal Frequency Division Multiplexing (OFDM) in wideband time-varying channels. Furthermore, since the channel matrix is rendered near-diagonal, ODSS retains the advantage of OFDM in terms of its low-complexity receiver structure.
△ Less
Submitted 8 May, 2022; v1 submitted 21 November, 2021;
originally announced November 2021.
-
User Activity Detection for Irregular Repetition Slotted Aloha based MMTC
Authors:
Chirag Ramesh Srivatsa,
Chandra R. Murthy
Abstract:
Irregular repetition slotted aloha (IRSA) is a grant-free random access protocol for massive machine-type communications, where a large number of users sporadically send their data packets to a base station (BS). IRSA is a completely distributed multiple access protocol: in any given frame, a small subset of the users, i.e., the active users, transmit replicas of their packet in randomly selected…
▽ More
Irregular repetition slotted aloha (IRSA) is a grant-free random access protocol for massive machine-type communications, where a large number of users sporadically send their data packets to a base station (BS). IRSA is a completely distributed multiple access protocol: in any given frame, a small subset of the users, i.e., the active users, transmit replicas of their packet in randomly selected resource elements (REs). The first step in the decoding process at the BS is to detect which users are active in each frame. To this end, a novel Bayesian user activity detection (UAD) algorithm is developed, which exploits both the sparsity in user activity as well as the underlying structure of IRSA-based transmissions. Next, the Cramer-Rao bound (CRB) on the mean squared error in channel estimation is derived. It is empirically shown that the channel estimates obtained as a by-product of the proposed UAD algorithm achieves the CRB. Then, the signal to interference plus noise ratio achieved by the users is analyzed, accounting for UAD, channel estimation errors, and pilot contamination. The impact of these non-idealities on the throughput of IRSA is illustrated via Monte Carlo simulations. For example, in a system with 1500 users and 10% of the users being active per frame, a pilot length of as low as 20 symbols is sufficient for accurate user activity detection. In contrast, using classical compressed sensing approaches for UAD would require a pilot length of about 346 symbols. The results also reveal crucial insights into dependence of UAD errors and throughput on parameters such as the length of the pilot sequence, the number of antennas at the BS, the number of users, and the signal to noise ratio.
△ Less
Submitted 23 June, 2022; v1 submitted 11 November, 2021;
originally announced November 2021.
-
Evaluation Of Orthogonal Chirp Division Multiplexing For Automotive Integrated Sensing And Communications
Authors:
Sangeeta Bhattacharjee,
Kumar Vijay Mishra,
Ramesh Annavajjala,
Chandra R. Murthy
Abstract:
We consider a bistatic vehicular integrated sensing and communications (ISAC) system that employs the recently proposed orthogonal chirp division multiplexing (OCDM) multicarrier waveform. As a stand-alone communications waveform, OCDM has been shown to be robust against the interference in time-frequency selective channels. In a bistatic ISAC, we exploit this property to develop efficient receive…
▽ More
We consider a bistatic vehicular integrated sensing and communications (ISAC) system that employs the recently proposed orthogonal chirp division multiplexing (OCDM) multicarrier waveform. As a stand-alone communications waveform, OCDM has been shown to be robust against the interference in time-frequency selective channels. In a bistatic ISAC, we exploit this property to develop efficient receive processing algorithms that achieve high target resolution as well as high communications rate. We derive statistical bounds for our proposed Sequential symbol decoding and radar parameter estimation (SUNDAE) algorithm and compare its competitive performance with other multicarrier waveforms through numerical experiments.
△ Less
Submitted 9 November, 2021;
originally announced November 2021.
-
Can Dynamic TDD Enabled Half-Duplex Cell-Free Massive MIMO Outperform Full-Duplex Cellular Massive MIMO?
Authors:
Anubhab Chowdhury,
Ribhu Chopra,
Chandra R. Murthy
Abstract:
We consider a dynamic time division duplex (DTDD) enabled cell-free massive multiple-input multiple-output (CF-mMIMO) system, where each half-duplex (HD) access point (AP) is scheduled to operate in the uplink (UL) or downlink (DL) mode based on the data demands of the user equipments (UEs), with the goal of maximizing the sum UL-DL spectral efficiency (SE). We develop a new, low complexity, greed…
▽ More
We consider a dynamic time division duplex (DTDD) enabled cell-free massive multiple-input multiple-output (CF-mMIMO) system, where each half-duplex (HD) access point (AP) is scheduled to operate in the uplink (UL) or downlink (DL) mode based on the data demands of the user equipments (UEs), with the goal of maximizing the sum UL-DL spectral efficiency (SE). We develop a new, low complexity, greedy algorithm for the combinatorial AP scheduling problem, with an optimality guarantee theoretically established via showing that a lower bound of the sum UL-DL SE is sub-modular. We also consider pilot sequence reuse among the UEs to limit the channel estimation overhead. In CF systems, all the APs estimate the channel from every UE, making pilot allocation problem different from the cellular case. We develop a novel algorithm that iteratively minimizes the maximum pilot contamination across the UEs. We compare the performance of our solutions, both theoretically and via simulations, against a full duplex (FD) multi-cell mMIMO system. Our results show that, due to the joint processing of the signals at the central processing unit, CF-mMIMO with dynamic HD AP-scheduling significantly outperforms cellular FD-mMIMO in terms of the sum SE and 90% likely SE. Thus, DTDD enabled HD CF-mMIMO is a promising alternative to cellular FD-mMIMO, without the cost of hardware for self-interference suppression.
△ Less
Submitted 21 May, 2022; v1 submitted 19 October, 2021;
originally announced October 2021.
-
Impact of Subcarrier Allocation and User Mobility on the Uplink Performance of Multi-User Massive MIMO-OFDM Systems
Authors:
Abhinav Anand,
Chandra R. Murthy
Abstract:
This paper considers the uplink performance of a multi-user massive multiple-input multiple-output orthogonal frequency-division multiplexing (MIMO-OFDM) system with mobile users. Mobility brings two major problems to a MIMO-OFDM system: inter carrier interference (ICI) and channel aging. In practice, it is common to allot multiple contiguous subcarriers to a user as well as schedule multiple user…
▽ More
This paper considers the uplink performance of a multi-user massive multiple-input multiple-output orthogonal frequency-division multiplexing (MIMO-OFDM) system with mobile users. Mobility brings two major problems to a MIMO-OFDM system: inter carrier interference (ICI) and channel aging. In practice, it is common to allot multiple contiguous subcarriers to a user as well as schedule multiple users on each subcarrier. Motivated by this, we consider a general subcarrier allocation scheme and derive expressions for the ICI power, uplink signal to interference plus noise ratio and the achievable uplink sum-rate, taking into account the ICI and the multi-user interference due to channel aging. We show that the system incurs a near-constant ICI power that depends linearly on the ratio of the number of users per subcarrier to the number of subcarriers per user, nearly independently of how the UEs distribute their power across the subcarriers. Further, we exploit the coherence bandwidth of the channel to reduce the length of the pilot sequences required for uplink channel estimation. We consider both zero-forcing and maximal-ratio combining at the receiver and compare the respective sum-rate performances. In either case, the proposed subcarrier allocation scheme leads to significantly higher sum-rates compared to previous work, owing to the near-constant ICI property as well as the reduced pilot overhead.
△ Less
Submitted 25 August, 2022; v1 submitted 11 August, 2021;
originally announced August 2021.
-
Multiple Support Recovery Using Very Few Measurements Per Sample
Authors:
Lekshmi Ramesh,
Chandra R. Murthy,
Himanshu Tyagi
Abstract:
In the problem of multiple support recovery, we are given access to linear measurements of multiple sparse samples in $\mathbb{R}^{d}$. These samples can be partitioned into $\ell$ groups, with samples having the same support belonging to the same group. For a given budget of $m$ measurements per sample, the goal is to recover the $\ell$ underlying supports, in the absence of the knowledge of grou…
▽ More
In the problem of multiple support recovery, we are given access to linear measurements of multiple sparse samples in $\mathbb{R}^{d}$. These samples can be partitioned into $\ell$ groups, with samples having the same support belonging to the same group. For a given budget of $m$ measurements per sample, the goal is to recover the $\ell$ underlying supports, in the absence of the knowledge of group labels. We study this problem with a focus on the measurement-constrained regime where $m$ is smaller than the support size $k$ of each sample. We design a two-step procedure that estimates the union of the underlying supports first, and then uses a spectral algorithm to estimate the individual supports. Our proposed estimator can recover the supports with $m<k$ measurements per sample, from $\tilde{O}(k^{4}\ell^{4}/m^{4})$ samples. Our guarantees hold for a general, generative model assumption on the samples and measurement matrices. We also provide results from experiments conducted on synthetic data and on the MNIST dataset.
△ Less
Submitted 20 May, 2021;
originally announced May 2021.
-
Uplink Performance Analysis of Cell-Free mMIMO Systems under Channel Aging
Authors:
Ribhu Chopra,
Chandra R. Murthy,
Anastasios K. Papazafeiropoulos
Abstract:
In this paper, we investigate the impact of channel aging on the uplink performance of a cell-free~(CF) massive multiple-input multiple-output (mMIMO) system with a minimum mean squared error (MMSE) receiver. To this end, we present a new model for the temporal evolution of the channel, which allows the channel to age at different rates at different access points (APs). Under this setting, we deri…
▽ More
In this paper, we investigate the impact of channel aging on the uplink performance of a cell-free~(CF) massive multiple-input multiple-output (mMIMO) system with a minimum mean squared error (MMSE) receiver. To this end, we present a new model for the temporal evolution of the channel, which allows the channel to age at different rates at different access points (APs). Under this setting, we derive the deterministic equivalent of the per-user achievable signal-to-interference-plus-noise ratio (SINR). In addition to validating the theoretical expressions, our simulation results reveal that, {at low user mobilities,} the SINR of CF-mMIMO is nearly 5 dB higher than its cellular counterpart with the same number of antennas, and about 8 dB higher than that of an equivalent small-cell network with the same number of APs. {On the other hand, at very high user velocities, and when the channel between the UEs the different APs age at same rate, the relative impact of aging is higher for CF-mMIMO compared to cellular mMIMO. However, when the channel ages at the different APs with different rates, the effect of aging on CF-mMIMO is marginally mitigated, especially for larger frame durations.
△ Less
Submitted 21 April, 2021;
originally announced April 2021.
-
Phase Transitions for Support Recovery from Gaussian Linear Measurements
Authors:
Lekshmi Ramesh,
Chandra R. Murthy,
Himanshu Tyagi
Abstract:
We study the problem of recovering the common $k$-sized support of a set of $n$ samples of dimension $d$, using $m$ noisy linear measurements per sample. Most prior work has focused on the case when $m$ exceeds $k$, in which case $n$ of the order $(k/m)\log(d/k)$ is both necessary and sufficient. Thus, in this regime, only the total number of measurements across the samples matter, and there is no…
▽ More
We study the problem of recovering the common $k$-sized support of a set of $n$ samples of dimension $d$, using $m$ noisy linear measurements per sample. Most prior work has focused on the case when $m$ exceeds $k$, in which case $n$ of the order $(k/m)\log(d/k)$ is both necessary and sufficient. Thus, in this regime, only the total number of measurements across the samples matter, and there is not much benefit in getting more than $k$ measurements per sample. In the measurement-constrained regime where we have access to fewer than $k$ measurements per sample, we show an upper bound of $O((k^{2}/m^{2})\log d)$ on the sample complexity for successful support recovery when $m\ge 2\log d$. Along with the lower bound from our previous work, this shows a phase transition for the sample complexity of this problem around $k/m=1$. In fact, our proposed algorithm is sample-optimal in both the regimes. It follows that, in the $m\ll k$ regime, multiple measurements from the same sample are more valuable than measurements from different samples.
△ Less
Submitted 12 May, 2021; v1 submitted 30 January, 2021;
originally announced February 2021.
-
Controllability of Linear Dynamical Systems Under Input Sparsity Constraints
Authors:
Geethu Joseph,
Chandra R. Murthy
Abstract:
In this work, we consider the controllability of a discrete-time linear dynamical system with sparse control inputs. Sparsity constraints on the input arises naturally in networked systems, where activating each input variable adds to the cost of control. We derive algebraic necessary and sufficient conditions for ensuring controllability of a system with an arbitrary transfer matrix. The derived…
▽ More
In this work, we consider the controllability of a discrete-time linear dynamical system with sparse control inputs. Sparsity constraints on the input arises naturally in networked systems, where activating each input variable adds to the cost of control. We derive algebraic necessary and sufficient conditions for ensuring controllability of a system with an arbitrary transfer matrix. The derived conditions can be verified in polynomial time complexity, unlike the more traditional Kalman-type rank tests. Further, we characterize the minimum number of input vectors required to satisfy the derived conditions for controllability. Finally, we present a generalized Kalman decomposition-like procedure that separates the state-space into subspaces corresponding to sparse-controllable and sparse-uncontrollable parts. These results form a theoretical basis for designing networked linear control systems with sparse inputs.
△ Less
Submitted 27 December, 2019;
originally announced December 2019.
-
Sample-Measurement Tradeoff in Support Recovery under a Subgaussian Prior
Authors:
Lekshmi Ramesh,
Chandra R Murthy,
Himanshu Tyagi
Abstract:
Data samples from $\mathbb{R}^{d}$ with a common support of size $k$ are accessed through $m$ random linear projections (measurements) per sample. It is well-known that roughly $k$ measurements from a single sample are sufficient to recover the support. In the multiple sample setting, do $k$ overall measurements still suffice when only $m$ measurements per sample are allowed, with $m<k$? We answer…
▽ More
Data samples from $\mathbb{R}^{d}$ with a common support of size $k$ are accessed through $m$ random linear projections (measurements) per sample. It is well-known that roughly $k$ measurements from a single sample are sufficient to recover the support. In the multiple sample setting, do $k$ overall measurements still suffice when only $m$ measurements per sample are allowed, with $m<k$? We answer this question in the negative by considering a generative model setting with independent samples drawn from a subgaussian prior. We show that $n=Θ((k^2/m^2)\cdot\log k(d-k))$ samples are necessary and sufficient to recover the support exactly. In turn, this shows that when $m<k$, $k$ overall measurements are insufficient for support recovery; instead we need about $m$ measurements each from $k^{2}/m^2$ samples, i.e., $k^{2}/m$ overall measurements are necessary.
△ Less
Submitted 19 September, 2020; v1 submitted 24 December, 2019;
originally announced December 2019.
-
Learned-SBL: A Deep Learning Architecture for Sparse Signal Recovery
Authors:
Rubin Jose Peter,
Chandra R. Murthy
Abstract:
In this paper, we present a computationally efficient sparse signal recovery scheme using Deep Neural Networks (DNN). The architecture of the introduced neural network is inspired from sparse Bayesian learning (SBL) and named as Learned-SBL (L-SBL). We design a common architecture to recover sparse as well as block sparse vectors from single measurement vector (SMV) or multiple measurement vectors…
▽ More
In this paper, we present a computationally efficient sparse signal recovery scheme using Deep Neural Networks (DNN). The architecture of the introduced neural network is inspired from sparse Bayesian learning (SBL) and named as Learned-SBL (L-SBL). We design a common architecture to recover sparse as well as block sparse vectors from single measurement vector (SMV) or multiple measurement vectors (MMV) depending on the nature of the training data. In the MMV model, the L-SBL network can be trained to learn any underlying sparsity pattern among the vectors including joint sparsity, block sparsity, etc. In particular, for block sparse recovery, learned-SBL does not require any prior knowledge of block boundaries. In each layer of the L-SBL, an estimate of the signal covariance matrix is obtained as the output of a neural network. Then a maximum a posteriori (MAP) estimator of the unknown sparse vector is implemented with non-trainable parameters. In many applications, the measurement matrix may be time-varying. The existing DNN based sparse signal recovery schemes demand the retraining of the neural network using current measurement matrix. The architecture of L-SBL allows it to accept the measurement matrix as an input to the network, and thereby avoids the need for retraining. We also evaluate the performance of Learned-SBL in the detection of an extended target using a multiple-input multiple-output (MIMO) radar. Simulation results illustrate that the proposed approach offers superior sparse recovery performance compared to the state-of-the-art methods.
△ Less
Submitted 17 September, 2019;
originally announced September 2019.
-
Fundamental Limitations in Biomarker Based Early Disease Diagnosis
Authors:
Tuhin Chakrabortty,
Chandra R. Murthy,
Manoj Varma
Abstract:
Clinical biosensors with low detection limit hold significant promise in the early diagnosis of debilitating diseases. Recent progress in sensor development has led to the demonstration of detection capable of detecting target molecules even down to single-molecule level. One crucial performance parameter which is not adequately discussed is the issue of measurement fidelity in such sensors. We de…
▽ More
Clinical biosensors with low detection limit hold significant promise in the early diagnosis of debilitating diseases. Recent progress in sensor development has led to the demonstration of detection capable of detecting target molecules even down to single-molecule level. One crucial performance parameter which is not adequately discussed is the issue of measurement fidelity in such sensors. We define measurement fidelity based on the false positive rate of the system as we expect systems with higher sensitivity to concomitantly respond more to interfering molecules thus increasing the false-positive rates. We present a model which allows us to estimate the limit of detection of a biosensor system constrained by a specified false-positive rate. Two major results emerging from our model is that a) there is a lower bound to the detection limit for a target molecule determined by the variation in the concentration of background molecules interfering with the molecular recognition process and b) systems which use a secondary label, such as a fluorophore, can achieve lower detection limits for a given false positive rate. We also present data collected from literature to support our model. The insights from our model will be useful in the systematic design of future clinical biosensors to achieve relevant detection limits with assured fidelity.
△ Less
Submitted 4 December, 2019; v1 submitted 11 July, 2019;
originally announced July 2019.
-
Energy Harvesting Communications Using Dual Alternating Batteries
Authors:
Rajshekhar Vishweshwar Bhat,
Mehul Motani,
Chandra R Murthy,
Rahul Vaze
Abstract:
Practical energy harvesting (EH) based communication systems typically use a battery to temporarily store the harvested energy prior to its use for communication. The batteries can be damaged when they are repeatedly charged (discharged) after being partially discharged (charged), overcharged or deeply discharged. This motivates the cycle constraint which says that a battery must be charged (disch…
▽ More
Practical energy harvesting (EH) based communication systems typically use a battery to temporarily store the harvested energy prior to its use for communication. The batteries can be damaged when they are repeatedly charged (discharged) after being partially discharged (charged), overcharged or deeply discharged. This motivates the cycle constraint which says that a battery must be charged (discharged) only after it is sufficiently discharged (charged). We also assume Bernoulli energy arrivals, and a half-duplex constraint due to which the batteries are not charged and discharged simultaneously. In this context, we study EH communication systems with: (a) a single-battery with capacity 2B units and (b) dual-batteries, each having capacity of B units. The aim is to obtain the best possible long-term average throughputs and throughput regions in point-to-point (P2P) channels and multiple access channels (MAC), respectively. For the P2P channel, we obtain an analytical optimal solution in the single-battery case, and propose optimal and sub-optimal power allocation policies for the dual-battery case. We extend these policies to obtain achievable throughput regions in MACs by jointly allocating rates and powers. From numerical simulations, we find that the optimal throughput in the dual-battery case is significantly higher than that in the single-battery case, although the total storage capacity in both cases is 2B units. Further, in the proposed policies, the largest throughput region in the single-battery case is contained within that of the dual-battery case.
△ Less
Submitted 18 December, 2018; v1 submitted 11 January, 2018;
originally announced January 2018.
-
On the Restricted Isometry of the Columnwise Khatri-Rao Product
Authors:
Saurabh Khanna,
Chandra R Murthy
Abstract:
The columnwise Khatri-Rao product of two matrices is an important matrix type, reprising its role as a structured sensing matrix in many fundamental linear inverse problems. Robust signal recovery in such inverse problems is often contingent on proving the restricted isometry property (RIP) of a certain system matrix expressible as a Khatri-Rao product of two matrices. In this work, we analyze the…
▽ More
The columnwise Khatri-Rao product of two matrices is an important matrix type, reprising its role as a structured sensing matrix in many fundamental linear inverse problems. Robust signal recovery in such inverse problems is often contingent on proving the restricted isometry property (RIP) of a certain system matrix expressible as a Khatri-Rao product of two matrices. In this work, we analyze the RIP of a generic columnwise Khatri-Rao product matrix by deriving two upper bounds for its $k^{\text{th}}$ order Restricted Isometry Constant ($k$-RIC) for different values of $k$. The first RIC bound is computed in terms of the individual RICs of the input matrices participating in the Khatri-Rao product. The second RIC bound is probabilistic, and is specified in terms of the input matrix dimensions. We show that the Khatri-Rao product of a pair of $m \times n$ sized random matrices comprising independent and identically distributed subgaussian entries satisfies $k$-RIP with arbitrarily high probability, provided $m$ exceeds $O(k \log n)$. Our RIC bounds confirm that the Khatri-Rao product exhibits stronger restricted isometry compared to its constituent matrices for the same RIP order. The proposed RIC bounds are potentially useful in the sample complexity analysis of several sparse recovery problems.
△ Less
Submitted 23 July, 2018; v1 submitted 18 September, 2017;
originally announced September 2017.
-
On Distributed Power Control for Uncoordinated Dual Energy Harvesting Links: Performance Bounds and Near-Optimal Policies
Authors:
Mohit K. Sharma,
Chandra R. Murthy,
Rahul Vaze
Abstract:
In this paper, we consider a point-to-point link between an energy harvesting transmitter and receiver, where neither node has the information about the battery state or energy availability at the other node. We consider a model where data is successfully delivered only in slots where both nodes are active. Energy loss occurs whenever one node turns on while the other node is in sleep mode. In eac…
▽ More
In this paper, we consider a point-to-point link between an energy harvesting transmitter and receiver, where neither node has the information about the battery state or energy availability at the other node. We consider a model where data is successfully delivered only in slots where both nodes are active. Energy loss occurs whenever one node turns on while the other node is in sleep mode. In each slot, based on their own energy availability, the transmitter and receiver need to independently decide whether or not to turn on, with the aim of maximizing the long-term time-average throughput. We present an upper bound on the throughput achievable by analyzing a genie-aided system that has noncausal knowledge of the energy arrivals at both the nodes. Next, we propose an online policy requiring an occasional one-bit feedback whose throughput is within one bit of the upper bound, asymptotically in the battery size. In order to further reduce the feedback required, we propose a time-dilated version of the online policy. As the time dilation gets large, this policy does not require any feedback and achieves the upper bound asymptotically in the battery size. Inspired by this, we also propose a near-optimal fully uncoordinated policy. We use Monte Carlo simulations to validate our theoretical results and illustrate the performance of the proposed policies.
△ Less
Submitted 14 June, 2017;
originally announced June 2017.
-
On the Support Recovery of Jointly Sparse Gaussian Sources using Sparse Bayesian Learning
Authors:
Saurabh Khanna,
Chandra R. Murthy
Abstract:
In this work, we provide non-asymptotic, probabilistic guarantees for successful recovery of the common nonzero support of jointly sparse Gaussian sources in the multiple measurement vector (MMV) problem. The support recovery problem is formulated as the marginalized maximum likelihood (or type-II ML) estimation of the variance hyperparameters of a joint sparsity inducing Gaussian prior on the sou…
▽ More
In this work, we provide non-asymptotic, probabilistic guarantees for successful recovery of the common nonzero support of jointly sparse Gaussian sources in the multiple measurement vector (MMV) problem. The support recovery problem is formulated as the marginalized maximum likelihood (or type-II ML) estimation of the variance hyperparameters of a joint sparsity inducing Gaussian prior on the source signals. We derive conditions under which the resulting nonconvex constrained optimization perfectly recovers the nonzero support of a joint-sparse Gaussian source ensemble with arbitrarily high probability. The support error probability decays exponentially with the number of MMVs at a rate that depends on the smallest restricted singular value and the nonnegative null space property of the self Khatri-Rao product of the sensing matrix. Our analysis confirms that nonzero supports of size as high as O($m^2$) are recoverable from $m$ measurements per sparse vector. Our derived sufficient conditions for support consistency of the proposed constrained type-II ML solution also guarantee the support consistency of any global solution of the multiple sparse Bayesian learning (M-SBL) optimization whose nonzero coefficients lie inside a bounded interval. For the case of noiseless measurements, we further show that a single MMV is sufficient for perfect recovery of the $k$-sparse support by M-SBL, provided all subsets of $k + 1$ columns of the sensing matrix are linearly independent.
△ Less
Submitted 26 July, 2021; v1 submitted 15 March, 2017;
originally announced March 2017.
-
Outer Bounds on the Secrecy Capacity Region of the 2-user Z Interference Channel With Unidirectional Transmitter Cooperation
Authors:
Parthajit Mohapatra,
Chandra R. Murthy,
Jemin Lee
Abstract:
This paper derives outer bounds on the secrecy capacity region of the 2-user Z interference channel (Z-IC) with rate-limited unidirectional cooperation between the transmitters. First, the model is studied under the linear deterministic setting. The derivation of the outer bounds on the secrecy capacity region involves careful selection of the side information to be provided to the receivers and u…
▽ More
This paper derives outer bounds on the secrecy capacity region of the 2-user Z interference channel (Z-IC) with rate-limited unidirectional cooperation between the transmitters. First, the model is studied under the linear deterministic setting. The derivation of the outer bounds on the secrecy capacity region involves careful selection of the side information to be provided to the receivers and using the secrecy constraints at the receivers in a judicious manner. To this end, a novel partitioning of the encoded messages and outputs is proposed for the deterministic model based on the strength of interference and signal. The obtained outer bounds are shown to be tight using the achievable scheme derived by the authors in a previous work. Using the insight obtained from the deterministic model, outer bounds on the secrecy capacity region of the 2-user Gaussian Z-IC are obtained. The equivalence between the outer bounds for both the models is also established. It is also shown that secrecy constraint at the receiver does not hurt the capacity region of the 2-user Z-IC for the deterministic model in the weak/moderate interference regime. On the other hand, the outer bounds developed for the Gaussian case shows that secrecy constraint at the receiver can reduce the capacity region for the weak/moderate interference regime. The study of the relative performance of these bounds reveals insight into the fundamental limits of the 2-user Z-IC with limited rate transmitter cooperation.
△ Less
Submitted 8 April, 2016;
originally announced April 2016.
-
On the Secrecy Capacity Region of the 2-user Z Interference Channel with Unidirectional Transmitter Cooperation
Authors:
Parthajit Mohapatra,
Chandra R. Murthy,
Jemin Lee
Abstract:
In this work, the role of unidirectional limited rate transmitter cooperation is studied in the case of the 2-user Z interference channel (Z-IC) with secrecy constraints at the receivers, on achieving two conflicting goals simultaneously: mitigating interference and ensuring secrecy. First, the problem is studied under the linear deterministic model. The achievable schemes for the deterministic mo…
▽ More
In this work, the role of unidirectional limited rate transmitter cooperation is studied in the case of the 2-user Z interference channel (Z-IC) with secrecy constraints at the receivers, on achieving two conflicting goals simultaneously: mitigating interference and ensuring secrecy. First, the problem is studied under the linear deterministic model. The achievable schemes for the deterministic model use a fusion of cooperative precoding and transmission of a jamming signal. The optimality of the proposed scheme is established for the deterministic model for all possible parameter settings using the outer bounds derived by the authors in a previous work. Using the insights obtained from the deterministic model, a lower bound on the secrecy capacity region of the 2-user Gaussian Z-IC are obtained. The achievable scheme in this case uses stochastic encoding in addition to cooperative precoding and transmission of a jamming signal. The secure sum generalized degrees of freedom (GDOF) is characterized and shown to be optimal for the weak/moderate interference regime. It is also shown that the secure sum capacity lies within 2 bits/s/Hz of the outer bound for the weak/moderate interference regime for all values of the capacity of the cooperative link. Interestingly, in case of the deterministic model, it is found that there is no penalty on the capacity region of the Z-IC due to the secrecy constraints at the receivers in the weak/moderate interference regimes. Similarly, it is found that there is no loss in the secure sum GDOF for the Gaussian case due to the secrecy constraint at the receiver, in the weak/moderate interference regimes. The results highlight the importance of cooperation in facilitating secure communication over the Z-IC.
△ Less
Submitted 8 April, 2016;
originally announced April 2016.
-
Decentralized Joint-Sparse Signal Recovery: A Sparse Bayesian Learning Approach
Authors:
Saurabh Khanna,
Chandra R. Murthy
Abstract:
This work proposes a decentralized, iterative, Bayesian algorithm called CB-DSBL for in-network estimation of multiple jointly sparse vectors by a network of nodes, using noisy and underdetermined linear measurements. The proposed algorithm exploits the network wide joint sparsity of the un- known sparse vectors to recover them from significantly fewer number of local measurements compared to stan…
▽ More
This work proposes a decentralized, iterative, Bayesian algorithm called CB-DSBL for in-network estimation of multiple jointly sparse vectors by a network of nodes, using noisy and underdetermined linear measurements. The proposed algorithm exploits the network wide joint sparsity of the un- known sparse vectors to recover them from significantly fewer number of local measurements compared to standalone sparse signal recovery schemes. To reduce the amount of inter-node communication and the associated overheads, the nodes exchange messages with only a small subset of their single hop neighbors. Under this communication scheme, we separately analyze the convergence of the underlying Alternating Directions Method of Multipliers (ADMM) iterations used in our proposed algorithm and establish its linear convergence rate. The findings from the convergence analysis of decentralized ADMM are used to accelerate the convergence of the proposed CB-DSBL algorithm. Using Monte Carlo simulations, we demonstrate the superior signal reconstruction as well as support recovery performance of our proposed algorithm compared to existing decentralized algorithms: DRL-1, DCOMP and DCSP.
△ Less
Submitted 18 December, 2015; v1 submitted 9 July, 2015;
originally announced July 2015.
-
Computationally Tractable Algorithms for Finding a Subset of Non-defective Items from a Large Population
Authors:
Abhay Sharma,
Chandra R. Murthy
Abstract:
In the classical non-adaptive group testing setup, pools of items are tested together, and the main goal of a recovery algorithm is to identify the "complete defective set" given the outcomes of different group tests. In contrast, the main goal of a "non-defective subset recovery" algorithm is to identify a "subset" of non-defective items given the test outcomes. In this paper, we present a suite…
▽ More
In the classical non-adaptive group testing setup, pools of items are tested together, and the main goal of a recovery algorithm is to identify the "complete defective set" given the outcomes of different group tests. In contrast, the main goal of a "non-defective subset recovery" algorithm is to identify a "subset" of non-defective items given the test outcomes. In this paper, we present a suite of computationally efficient and analytically tractable non-defective subset recovery algorithms. By analyzing the probability of error of the algorithms, we obtain bounds on the number of tests required for non-defective subset recovery with arbitrarily small probability of error. Our analysis accounts for the impact of both the additive noise (false positives) and dilution noise (false negatives). By comparing with the information theoretic lower bounds, we show that the upper bounds on the number of tests are order-wise tight up to a $\log^2K$ factor, where $K$ is the number of defective items. We also provide simulation results that compare the relative performance of the different algorithms and provide further insights into their practical utility. The proposed algorithms significantly outperform the straightforward approaches of testing items one-by-one, and of first identifying the defective set and then choosing the non-defective items from the complement set, in terms of the number of measurements required to ensure a given success rate.
△ Less
Submitted 28 February, 2016; v1 submitted 14 February, 2015;
originally announced February 2015.
-
On the Capacity of the 2-User Interference Channel with Transmitter Cooperation and Secrecy Constraints
Authors:
Parthajit Mohapatra,
Chandra R. Murthy
Abstract:
This paper studies the value of limited rate cooperation between the transmitters for managing interference and simultaneously ensuring secrecy, in the 2-user Gaussian symmetric interference channel (GSIC). First, the problem is studied in the symmetric linear deterministic IC (SLDIC) setting, and achievable schemes are proposed, based on interference cancelation, relaying of the other user's data…
▽ More
This paper studies the value of limited rate cooperation between the transmitters for managing interference and simultaneously ensuring secrecy, in the 2-user Gaussian symmetric interference channel (GSIC). First, the problem is studied in the symmetric linear deterministic IC (SLDIC) setting, and achievable schemes are proposed, based on interference cancelation, relaying of the other user's data bits, and transmission of random bits. In the proposed achievable scheme, the limited rate cooperative link is used to share a combination of data bits and random bits depending on the model parameters. Outer bounds on the secrecy rate are also derived, using a novel partitioning of the encoded messages and outputs depending on the relative strength of the signal and the interference. The inner and outer bounds are derived under all possible parameter settings. It is found that, for some parameter settings, the inner and outer bounds match, yielding the capacity of the SLDIC under transmitter cooperation and secrecy constraints. In some other scenarios, the achievable rate matches with the capacity region of the 2-user SLDIC without secrecy constraints derived by Wang and Tse [1]; thus, the proposed scheme offers secrecy for free, in these cases. Inspired by the achievable schemes and outer bounds in the deterministic case, achievable schemes and outer bounds are derived in the Gaussian case. The proposed achievable scheme for the Gaussian case is based on Marton's coding scheme and stochastic encoding along with dummy message transmission. One of the key techniques used in the achievable scheme for both the models is interference cancelation, which simultaneously offers two seemingly conflicting benefits: it cancels interference and ensures secrecy. Many of the results derived in this paper extend to the asymmetric case also.
△ Less
Submitted 13 June, 2016; v1 submitted 21 February, 2014;
originally announced February 2014.
-
On Finding a Subset of Healthy Individuals from a Large Population
Authors:
Abhay Sharma,
Chandra R. Murthy
Abstract:
In this paper, we derive mutual information based upper and lower bounds on the number of nonadaptive group tests required to identify a given number of "non defective" items from a large population containing a small number of "defective" items. We show that a reduction in the number of tests is achievable compared to the approach of first identifying all the defective items and then picking the…
▽ More
In this paper, we derive mutual information based upper and lower bounds on the number of nonadaptive group tests required to identify a given number of "non defective" items from a large population containing a small number of "defective" items. We show that a reduction in the number of tests is achievable compared to the approach of first identifying all the defective items and then picking the required number of non-defective items from the complement set. In the asymptotic regime with the population size $N \rightarrow \infty$, to identify $L$ non-defective items out of a population containing $K$ defective items, when the tests are reliable, our results show that $\frac{C_s K}{1-o(1)} (Φ(α_0, β_0) + o(1))$ measurements are sufficient, where $C_s$ is a constant independent of $N, K$ and $L$, and $Φ(α_0, β_0)$ is a bounded function of $α_0 \triangleq \lim_{N\rightarrow \infty} \frac{L}{N-K}$ and $β_0 \triangleq \lim_{N\rightarrow \infty} \frac{K} {N-K}$. Further, in the nonadaptive group testing setup, we obtain rigorous upper and lower bounds on the number of tests under both dilution and additive noise models. Our results are derived using a general sparse signal model, by virtue of which, they are also applicable to other important sparse signal based applications such as compressive sensing.
△ Less
Submitted 28 February, 2016; v1 submitted 31 July, 2013;
originally announced July 2013.
-
Secrecy in the 2-User Symmetric Deterministic Interference Channel with Transmitter Cooperation
Authors:
Parthajit Mohapatra,
Chandra R. Murthy
Abstract:
This work presents novel achievable schemes for the 2-user symmetric linear deterministic interference channel with limited-rate transmitter cooperation and perfect secrecy constraints at the receivers. The proposed achievable scheme consists of a combination of interference cancelation, relaying of the other user's data bits, time sharing, and transmission of random bits, depending on the rate of…
▽ More
This work presents novel achievable schemes for the 2-user symmetric linear deterministic interference channel with limited-rate transmitter cooperation and perfect secrecy constraints at the receivers. The proposed achievable scheme consists of a combination of interference cancelation, relaying of the other user's data bits, time sharing, and transmission of random bits, depending on the rate of the cooperative link and the relative strengths of the signal and the interference. The results show, for example, that the proposed scheme achieves the same rate as the capacity without the secrecy constraints, in the initial part of the weak interference regime. Also, sharing random bits through the cooperative link can achieve a higher secrecy rate compared to sharing data bits, in the very high interference regime. The results highlight the importance of limited transmitter cooperation in facilitating secure communications over 2-user interference channels.
△ Less
Submitted 3 April, 2013; v1 submitted 28 January, 2013;
originally announced January 2013.
-
Throughput Analysis of Primary and Secondary Networks in a Shared IEEE 802.11 System
Authors:
Santhosh Kumar,
Nirmal Shende,
Chandra R. Murthy,
Arun Ayyagari
Abstract:
In this paper, we analyze the coexistence of a primary and a secondary (cognitive) network when both networks use the IEEE 802.11 based distributed coordination function for medium access control. Specifically, we consider the problem of channel capture by a secondary network that uses spectrum sensing to determine the availability of the channel, and its impact on the primary throughput. We integ…
▽ More
In this paper, we analyze the coexistence of a primary and a secondary (cognitive) network when both networks use the IEEE 802.11 based distributed coordination function for medium access control. Specifically, we consider the problem of channel capture by a secondary network that uses spectrum sensing to determine the availability of the channel, and its impact on the primary throughput. We integrate the notion of transmission slots in Bianchi's Markov model with the physical time slots, to derive the transmission probability of the secondary network as a function of its scan duration. This is used to obtain analytical expressions for the throughput achievable by the primary and secondary networks. Our analysis considers both saturated and unsaturated networks. By performing a numerical search, the secondary network parameters are selected to maximize its throughput for a given level of protection of the primary network throughput. The theoretical expressions are validated using extensive simulations carried out in the Network Simulator 2. Our results provide critical insights into the performance and robustness of different schemes for medium access by the secondary network. In particular, we find that the channel captures by the secondary network does not significantly impact the primary throughput, and that simply increasing the secondary contention window size is only marginally inferior to silent-period based methods in terms of its throughput performance.
△ Less
Submitted 5 December, 2012;
originally announced December 2012.
-
On Whitespace Identification Using Randomly Deployed Sensors
Authors:
Rahul Vaze,
Chandra R. Murthy
Abstract:
This work considers the identification of the available whitespace, i.e., the regions that are not covered by any of the existing transmitters, within a given geographical area. To this end, $n$ sensors are deployed at random locations within the area. These sensors detect for the presence of a transmitter within their radio range $r_s$, and their individual decisions are combined to estimate the…
▽ More
This work considers the identification of the available whitespace, i.e., the regions that are not covered by any of the existing transmitters, within a given geographical area. To this end, $n$ sensors are deployed at random locations within the area. These sensors detect for the presence of a transmitter within their radio range $r_s$, and their individual decisions are combined to estimate the available whitespace. The limiting behavior of the recovered whitespace as a function of $n$ and $r_s$ is analyzed. It is shown that both the fraction of the available whitespace that the nodes fail to recover as well as their radio range both optimally scale as $\log(n)/n$ as $n$ gets large. The analysis is extended to the case of unreliable sensors, and it is shown that, surprisingly, the optimal scaling is still $\log(n)/n$ even in this case. A related problem of estimating the number of transmitters and their locations is also analyzed, with the sum absolute error in localization as performance metric. The optimal scaling of the radio range and the necessary minimum transmitter separation is determined, that ensure that the sum absolute error in transmitter localization is minimized, with high probability, as $n$ gets large. Finally, the optimal distribution of sensor deployment is determined, given the distribution of the transmitters, and the resulting performance benefit is characterized.
△ Less
Submitted 20 November, 2012;
originally announced November 2012.
-
Cramer Rao-Type Bounds for Sparse Bayesian Learning
Authors:
Ranjitha Prasad,
Chandra R. Murthy
Abstract:
In this paper, we derive Hybrid, Bayesian and Marginalized Cramér-Rao lower bounds (HCRB, BCRB and MCRB) for the single and multiple measurement vector Sparse Bayesian Learning (SBL) problem of estimating compressible vectors and their prior distribution parameters. We assume the unknown vector to be drawn from a compressible Student-t prior distribution. We derive CRBs that encompass the determin…
▽ More
In this paper, we derive Hybrid, Bayesian and Marginalized Cramér-Rao lower bounds (HCRB, BCRB and MCRB) for the single and multiple measurement vector Sparse Bayesian Learning (SBL) problem of estimating compressible vectors and their prior distribution parameters. We assume the unknown vector to be drawn from a compressible Student-t prior distribution. We derive CRBs that encompass the deterministic or random nature of the unknown parameters of the prior distribution and the regression noise variance. We extend the MCRB to the case where the compressible vector is distributed according to a general compressible prior distribution, of which the generalized Pareto distribution is a special case. We use the derived bounds to uncover the relationship between the compressibility and Mean Square Error (MSE) in the estimates. Further, we illustrate the tightness and utility of the bounds through simulations, by comparing them with the MSE performance of two popular SBL-based estimators. It is found that the MCRB is generally the tightest among the bounds derived and that the MSE performance of the Expectation-Maximization (EM) algorithm coincides with the MCRB for the compressible vector. Through simulations, we demonstrate the dependence of the MSE performance of SBL based estimators on the compressibility of the vector for several values of the number of observations and at different signal powers.
△ Less
Submitted 18 October, 2012; v1 submitted 6 February, 2012;
originally announced February 2012.
-
Capacity Bounds for State-Dependent Broadcast Channels
Authors:
K. G. Nagananda,
Chandra R. Murthy,
Shalinee Kishore
Abstract:
In this paper, we derive information-theoretic performance limits for three classes of two-user state-dependent discrete memoryless broadcast channels, with noncausal side-information at the encoder. The first class of channels comprises a sender broadcasting two independent messages to two non-cooperating receivers; for channels of the second class, each receiver is given the message it need not…
▽ More
In this paper, we derive information-theoretic performance limits for three classes of two-user state-dependent discrete memoryless broadcast channels, with noncausal side-information at the encoder. The first class of channels comprises a sender broadcasting two independent messages to two non-cooperating receivers; for channels of the second class, each receiver is given the message it need not decode; and the third class comprises channels where the sender is constrained to keep each message confidential from the unintended receiver. We derive inner bounds for all the three classes of channels. For the first and second class of channels, we discuss the rate penalty on the achievable region for having to deal with side-information. For channels of third class, we characterize the rate penalties for having to deal not only with side-information, but also to satisfy confidentiality constraints. We then derive outer bounds, where we present an explicit characterization of sum-rate bounds for the first and third class of channels. For channels of the second class, we show that our outer bounds are within a fixed gap away from the achievable rate region, where the gap is independent of the distribution characterizing this class of channels. The channel models presented in this paper are useful variants of the classical broadcast channel, and provide fundamental building blocks for cellular downlink communications with side-information, such as fading in the wireless medium, interference caused by neighboring nodes in the network, {\etc}. at the encoder; two-way relay communications; and secure wireless broadcasting.
△ Less
Submitted 16 July, 2012; v1 submitted 1 October, 2011;
originally announced October 2011.
-
Two Classes of Broadcast Channels With Side-Information: Capacity Outer Bounds
Authors:
K. G. Nagananda,
Chandra R Murthy,
Shalinee Kishore
Abstract:
In this paper, we derive outer bounds on the capacity region of two classes of the general two-user discrete memoryless broadcast channels with side-information at the transmitter. The first class comprises the classical broadcast channel where a sender transmits two independent messages to two receivers. A constraint that each message must be kept confidential from the unintended receiver constit…
▽ More
In this paper, we derive outer bounds on the capacity region of two classes of the general two-user discrete memoryless broadcast channels with side-information at the transmitter. The first class comprises the classical broadcast channel where a sender transmits two independent messages to two receivers. A constraint that each message must be kept confidential from the unintended receiver constitutes the second class. For both classes, the conditional distribution characterizing the channel depends on a state process and the encoder has side-information provided to it in a noncausal manner. For the first class of channels, an outer bound is derived employing techniques used to prove the converse theorem for the Gel'fand-Pinsker's channel with random parameters; the bounds are tight for individual rate constraints, but can be improved upon for the sum rate. The technique for deriving outer bounds for the second class of channels hinges on the confidentiality requirements; we also derive a genie-aided outer bound, where a hypothetical genie gives the unintended message to a receiver which treats it as side-information during equivocation computation. For both classes of channels, Csiszár's sum identity plays a central role in establishing the capacity outer bounds.
△ Less
Submitted 8 October, 2011; v1 submitted 13 September, 2011;
originally announced September 2011.
-
Secure Broadcasting With Side-Information
Authors:
K. G. Nagananda,
Chandra R Murthy,
Shalinee Kishore
Abstract:
In this paper, we derive information-theoretic performance limits for secure and reliable communications over the general two-user discrete memoryless broadcast channel with side-information at the transmitter. The sender wishes to broadcast two independent messages to two receivers, under the constraint that each message should be kept confidential from the unintended receiver. Furthermore, the e…
▽ More
In this paper, we derive information-theoretic performance limits for secure and reliable communications over the general two-user discrete memoryless broadcast channel with side-information at the transmitter. The sender wishes to broadcast two independent messages to two receivers, under the constraint that each message should be kept confidential from the unintended receiver. Furthermore, the encoder has side-information - for example, fading in the wireless medium, interference caused by neighboring nodes in the network, etc. - provided to it in a noncausal manner, i.e., before the process of transmission. We derive an inner bound on the capacity region of this channel, by employing an extension of Marton's coding technique used for the classical two-user broadcast channel, in conjunction with a stochastic encoder to satisfy confidentiality constraints. Based on previously known results, we discuss a procedure to present a schematic of the achievable rate region. The rate-penalties for dealing with side-information and confidentiality constraints make the achievable region for this channel strictly smaller than the rate regions of those channels where one or both of these constraints are relaxed.
△ Less
Submitted 25 September, 2011; v1 submitted 13 September, 2011;
originally announced September 2011.
-
On the Generalized Degrees of Freedom of the K-user Symmetric MIMO Gaussian Interference Channel
Authors:
Parthajit Mohapatra,
Chandra R. Murthy
Abstract:
The K-user symmetric multiple input multiple output (MIMO) Gaussian interference channel (IC) where each transmitter has M antennas and each receiver has N antennas is studied from a generalized degrees of freedom (GDOF) perspective. An inner bound on the GDOF is derived using a combination of techniques such as treating interference as noise, zero forcing (ZF) at the receivers, interference align…
▽ More
The K-user symmetric multiple input multiple output (MIMO) Gaussian interference channel (IC) where each transmitter has M antennas and each receiver has N antennas is studied from a generalized degrees of freedom (GDOF) perspective. An inner bound on the GDOF is derived using a combination of techniques such as treating interference as noise, zero forcing (ZF) at the receivers, interference alignment (IA), and extending the Han-Kobayashi (HK) scheme to K users, as a function of the number of antennas and the log (INR) / log (SNR) level. Three outer bounds are derived, under different assumptions of cooperation and providing side information to receivers. The novelty in the derivation lies in the careful selection of side information, which results in the cancellation of the negative differential entropy terms containing signal components, leading to a tractable outer bound. The overall outer bound is obtained by taking the minimum of the three outer bounds. The derived bounds are simplified for the MIMO Gaussian symmetric IC to obtain outer bounds on the generalized degrees of freedom (GDOF). Several interesting conclusions are drawn from the derived bounds. For example, when K > N/M + 1, a combination of the HK and IA schemes performs the best among the schemes considered. When N/M < K <= N/M + 1, the HK-scheme outperforms other schemes and is shown to be GDOF optimal. In addition, when the SNR and INR are at the same level, ZF-receiving and the HK-scheme have the same GDOF performance. It is also shown that many of the existing results on the GDOF of the Gaussian IC can be obtained as special cases of the bounds, e.g., by setting K=2 or the number of antennas at each user to 1.
△ Less
Submitted 9 August, 2012; v1 submitted 26 May, 2011;
originally announced May 2011.
-
On the DMT of TDD-SIMO Systems with Channel-Dependent Reverse Channel Training
Authors:
B. N. Bharath,
Chandra R. Murthy
Abstract:
This paper investigates the Diversity-Multiplexing gain Trade-off (DMT) of a training based reciprocal Single Input Multiple Output (SIMO) system, with (i) perfect Channel State Information (CSI) at the Receiver (CSIR) and noisy CSI at the Transmitter (CSIT), and (ii) noisy CSIR and noisy CSIT. In both the cases, the CSIT is acquired through Reverse Channel Training (RCT), i.e., by sending a train…
▽ More
This paper investigates the Diversity-Multiplexing gain Trade-off (DMT) of a training based reciprocal Single Input Multiple Output (SIMO) system, with (i) perfect Channel State Information (CSI) at the Receiver (CSIR) and noisy CSI at the Transmitter (CSIT), and (ii) noisy CSIR and noisy CSIT. In both the cases, the CSIT is acquired through Reverse Channel Training (RCT), i.e., by sending a training sequence from the receiver to the transmitter. A channel-dependent fixed-power training scheme is proposed for acquiring CSIT, along with a forward-link data transmit power control scheme. With perfect CSIR, the proposed scheme is shown to achieve a diversity order that is quadratically increasing with the number of receive antennas. This is in contrast with conventional orthogonal RCT schemes, where the diversity order is known to saturate as the number of receive antennas is increased, for a given channel coherence time. Moreover, the proposed scheme can achieve a larger DMT compared to the orthogonal training scheme. With noisy CSIR and noisy CSIT, a three-way training scheme is proposed and its DMT performance is analyzed. It is shown that nearly the same diversity order is achievable as in the perfect CSIR case. The time-overhead in the training schemes is explicitly accounted for in this work, and the results show that the proposed channel-dependent RCT and data power control schemes offer a significant improvement in terms of the DMT, compared to channel-agnostic orthogonal RCT schemes. The outage performance of the proposed scheme is illustrated through Monte-Carlo simulations.
△ Less
Submitted 2 November, 2012; v1 submitted 12 May, 2011;
originally announced May 2011.
-
Multiuser Cognitive Radio Networks: An Information Theoretic Perspective
Authors:
K. G. Nagananda,
Parthajit Mohapatra,
Chandra R. Murthy,
Shalinee Kishore
Abstract:
Achievable rate regions and outer bounds are derived for three-user interference channels where the transmitters cooperate in a unidirectional manner via a noncausal message-sharing mechanism. The three-user channel facilitates different ways of message-sharing between the primary and secondary (or cognitive) transmitters. Three natural extensions of unidirectional message-sharing from two users t…
▽ More
Achievable rate regions and outer bounds are derived for three-user interference channels where the transmitters cooperate in a unidirectional manner via a noncausal message-sharing mechanism. The three-user channel facilitates different ways of message-sharing between the primary and secondary (or cognitive) transmitters. Three natural extensions of unidirectional message-sharing from two users to three users are introduced: (i) Cumulative message sharing; (ii) primary-only message sharing; and (iii) cognitive-only message sharing. To emphasize the notion of interference management, channels are classified based on different rate-splitting strategies at the transmitters. Standard techniques, superposition coding and Gel'fand-Pinsker's binning principle, are employed to derive an achievable rate region for each of the cognitive interference channels. Simulation results for the Gaussian channel case are presented; they enable visual comparison of the achievable rate regions for different message-sharing schemes along with the outer bounds. These results also provide useful insights into the effect of rate-splitting at the transmitters, which aids in better interference management at the receivers.
△ Less
Submitted 22 February, 2011; v1 submitted 20 February, 2011;
originally announced February 2011.
-
Cooperative Sequential Spectrum Sensing Algorithms for OFDM
Authors:
ArunKumar Jayaprakasam,
Vinod Sharma,
Chandra R. Murthy,
Prashant Narayanan
Abstract:
This paper considers the problem of spectrum sensing in cognitive radio networks when the primary user employs Orthogonal Frequency Division Multiplexing (OFDM). We develop cooperative sequential detection algorithms based on energy detectors and the autocorrelation property of cyclic prefix (CP) used in OFDM systems and compare their performances. We show that sequential detection provides much b…
▽ More
This paper considers the problem of spectrum sensing in cognitive radio networks when the primary user employs Orthogonal Frequency Division Multiplexing (OFDM). We develop cooperative sequential detection algorithms based on energy detectors and the autocorrelation property of cyclic prefix (CP) used in OFDM systems and compare their performances. We show that sequential detection provides much better performance than the traditional fixed sample size (snapshot) based detectors. We also study the effect of model uncertainties such as timing and frequency offset, IQ-imbalance and uncertainty in noise and transmit power on the performance of the detectors. We modify the detectors to mitigate the effects of these impairments. The performance of the proposed algorithms are studied via simulations. It is shown that energy detector performs significantly better than the CP-based detector, except in case of a snapshot detector with noise power uncertainty. Also, unlike for the CP-based detector, most of the above mentioned impairments have no effect on the energy detector.
△ Less
Submitted 9 May, 2010;
originally announced May 2010.
-
Asymmetric Transmitter Cooperation in Multiuser Wireless Networks: Achievable Rate Regions
Authors:
K. G. Nagananda,
Chandra R. Murthy
Abstract:
In this work, we derive achievable rate regions for the three-user interference channels with asymmetric transmitter cooperation and various decoding capabilities at the receivers. The three-user channel facilitates different ways of message sharing between the transmitters. We introduce two natural ways of extending the concept of unidirectional message sharing from two users to three users - (…
▽ More
In this work, we derive achievable rate regions for the three-user interference channels with asymmetric transmitter cooperation and various decoding capabilities at the receivers. The three-user channel facilitates different ways of message sharing between the transmitters. We introduce two natural ways of extending the concept of unidirectional message sharing from two users to three users - (i) cumulative message sharing and (ii) primary-only message sharing. In addition, we define several cognitive interference channels based on the decoding capability of the receivers. We employ a coding technique, which is a combination of superposition and Gel'fand-Pinsker coding techniques, to derive an achievable rate region for each of the cognitive interference channels. Simulation results, by considering the Gaussian channel case, enables a visual comparison of the two message-sharing schemes considered in this paper. It also provides useful insights into the effect of message-splitting at the transmitters and the decoding capability of the receivers on the achievable rates.
△ Less
Submitted 21 February, 2011; v1 submitted 11 August, 2009;
originally announced August 2009.