-
Correlating Nanoscale Structure with Electrochemical Property of Solid Electrolyte Interphases in Solid-State Battery Electrodes
Authors:
Jimin Oh,
Gun Park,
Hongjun Kim,
Sujung Kim,
Dong Ok Shin,
Kwang Man Kim,
Hye Ryung Byon,
Young-Gi Lee,
Seungbum Hong
Abstract:
Here, we correlate the nanoscale morphology and chemical composition of solid electrolyte interphases (SEI) with the electrochemical property of graphite-based composite electrodes. Using electrochemical strain microscopy (ESM) and X-ray photoelectron spectroscopy (XPS), changes of chemical composition and morphology (Li and F distribution) in SEI layers on the electrodes as a function of solid el…
▽ More
Here, we correlate the nanoscale morphology and chemical composition of solid electrolyte interphases (SEI) with the electrochemical property of graphite-based composite electrodes. Using electrochemical strain microscopy (ESM) and X-ray photoelectron spectroscopy (XPS), changes of chemical composition and morphology (Li and F distribution) in SEI layers on the electrodes as a function of solid electrolyte contents are analyzed. As a result, we find a strong correlation between morphological variations on the electrode, Li and F distribution in SEI layer, and Coulomb efficiency. This correlation determines the optimum composition of the composite electrode surface that can maximize the physical and chemical uniformity of the solid electrolyte on the electrode, which is a key parameter to increase electrochemical performance in solid-state batteries.
△ Less
Submitted 8 September, 2022;
originally announced September 2022.
-
Joint UAV Placement and IRS Phase Shift Optimization in Downlink Networks
Authors:
Hung Nguyen-Kha,
Hieu V. Nguyen,
Mai T. P. Le,
Oh-Soon Shin
Abstract:
This study investigates the integration of an intelligent reflecting surface (IRS) into an unmanned aerial vehicle (UAV) platform to utilize the advantages of these leading technologies for sixth-generation communications, e.g., improved spectral and energy efficiency, extended network coverage, and flexible deployment. In particular, we investigate a downlink IRS-UAV system, wherein single-antenn…
▽ More
This study investigates the integration of an intelligent reflecting surface (IRS) into an unmanned aerial vehicle (UAV) platform to utilize the advantages of these leading technologies for sixth-generation communications, e.g., improved spectral and energy efficiency, extended network coverage, and flexible deployment. In particular, we investigate a downlink IRS-UAV system, wherein single-antenna ground users (UEs) are served by a multi-antenna base station (BS). To assist the communication between UEs and the BS, an IRS mounted on a UAV is deployed, in which the direct links are obstructed owing to the complex urban channel characteristics. The beamforming at the BS, phase shift at the IRS, and the 3D placement of the UAV are jointly optimized to maximize the sum rate. Because the optimization variables, particularly the beamforming and IRS phase shift, are highly coupled with each other, the optimization problem is naturally non-convex. To effectively solve the formulated problem, we propose an iterative algorithm that employs block coordinate descent and inner approximation methods. Numerical results demonstrate the effectiveness of our proposed approach for a UAV-mounted IRS system on the sum rate performance over the state-of-the-art technology using the terrestrial counterpart.
△ Less
Submitted 2 February, 2023; v1 submitted 14 July, 2022;
originally announced July 2022.
-
A Novel Heap-based Pilot Assignment for Full Duplex Cell-Free Massive MIMO with Zero-Forcing
Authors:
Hieu V. Nguyen,
Van-Dinh Nguyen,
Octavia A. Dobre,
Shree Krishna Sharma,
Symeon Chatzinotas,
Björn Ottersten,
Oh-Soon Shin
Abstract:
This paper investigates the combined benefits of full-duplex (FD) and cell-free massive multiple-input multipleoutput (CF-mMIMO), where a large number of distributed access points (APs) having FD capability simultaneously serve numerous uplink and downlink user equipments (UEs) on the same time-frequency resources. To enable the incorporation of FD technology in CF-mMIMO systems, we propose a nove…
▽ More
This paper investigates the combined benefits of full-duplex (FD) and cell-free massive multiple-input multipleoutput (CF-mMIMO), where a large number of distributed access points (APs) having FD capability simultaneously serve numerous uplink and downlink user equipments (UEs) on the same time-frequency resources. To enable the incorporation of FD technology in CF-mMIMO systems, we propose a novel heapbased pilot assignment algorithm, which not only can mitigate the effects of pilot contamination but also reduce the involved computational complexity. Then, we formulate a robust design problem for spectral efficiency (SE) maximization in which the power control and AP-UE association are jointly optimized, resulting in a difficult mixed-integer nonconvex programming. To solve this problem, we derive a more tractable problem before develo** a very simple iterative algorithm based on inner approximation method with polynomial computational complexity. Numerical results show that our proposed methods with realistic parameters significantly outperform the existing approaches in terms of the quality of channel estimate and SE.
△ Less
Submitted 8 July, 2020;
originally announced July 2020.
-
Dynamic User Pairing for Non-Orthogonal Multiple Access in Downlink Networks
Authors:
Kha-Hung Nguyen,
Hieu V. Nguyen,
Van-Phuc Bui,
Oh-Soon Shin
Abstract:
This paper considers a downlink (DL) system where non-orthogonal multiple access (NOMA) beamforming and dynamic user pairing are jointly optimized to maximize the minimum throughput of all DL users. The resulting problem belongs to a class of mixed-integer non-convex optimization. To solve the problem, we first relax the binary variables to continuous ones, and then devise an iterative algorithm b…
▽ More
This paper considers a downlink (DL) system where non-orthogonal multiple access (NOMA) beamforming and dynamic user pairing are jointly optimized to maximize the minimum throughput of all DL users. The resulting problem belongs to a class of mixed-integer non-convex optimization. To solve the problem, we first relax the binary variables to continuous ones, and then devise an iterative algorithm based on the inner approximation method which provides at least a local optimal solution. Numerical results verify that the proposed algorithm outperforms other ones, such as conventional beamforming, NOMA with random-pairing and heuristic-search strategies.
△ Less
Submitted 25 June, 2020;
originally announced June 2020.
-
UAV-Assisted Secure Communications in Terrestrial Cognitive Radio Networks: Joint Power Control and 3D Trajectory Optimization
Authors:
Phu X. Nguyen,
Van-Dinh Nguyen,
Hieu V. Nguyen,
Oh-Soon Shin
Abstract:
This paper considers secure communications for an underlay cognitive radio network (CRN) in the presence of an external eavesdropper (Eve). The secrecy performance of CRNs is usually limited by the primary receiver's interference power constraint. To overcome this issue, we propose to use an unmanned aerial vehicle (UAV) as a friendly jammer to interfere with Eve in decoding the confidential messa…
▽ More
This paper considers secure communications for an underlay cognitive radio network (CRN) in the presence of an external eavesdropper (Eve). The secrecy performance of CRNs is usually limited by the primary receiver's interference power constraint. To overcome this issue, we propose to use an unmanned aerial vehicle (UAV) as a friendly jammer to interfere with Eve in decoding the confidential message from the secondary transmitter (ST). Our goal is to jointly optimize the transmit power and UAV's trajectory in the three-dimensional (3D) space to maximize the average achievable secrecy rate of the secondary system. The formulated optimization problem is nonconvex due to the nonconvexity of the objective and nonconvexity of constraints, which is very challenging to solve. To obtain a suboptimal but efficient solution to the problem, we first transform the original problem into a more tractable form and develop an iterative algorithm for its solution by leveraging the inner approximation framework. We further extend the proposed algorithm to the case of imperfect location information of Eve, where the average worst-case secrecy rate is considered as the objective function. Extensive numerical results are provided to demonstrate the merits of the proposed algorithms over existing approaches.
△ Less
Submitted 25 March, 2020; v1 submitted 21 March, 2020;
originally announced March 2020.
-
Optimization of Rate Fairness in Multi-Pair Wireless-Powered Relaying Systems
Authors:
Van-Phuc Bui,
Van-Dinh Nguyen,
Hieu V. Nguyen,
Octavia A. Dobre,
Oh-Soon Shin
Abstract:
This letter considers a multi-pair decode-and-forward relay network where a power-splitting (PS) protocol is adopted at the energy-constrained relay to provide simultaneous wireless information and energy harvesting (EH). To achieve higher efficiency of EH, we propose a new PS-based EH architecture at the relay by incorporating an alternating current (AC) computing logic, which is employed to dire…
▽ More
This letter considers a multi-pair decode-and-forward relay network where a power-splitting (PS) protocol is adopted at the energy-constrained relay to provide simultaneous wireless information and energy harvesting (EH). To achieve higher efficiency of EH, we propose a new PS-based EH architecture at the relay by incorporating an alternating current (AC) computing logic, which is employed to directly use the wirelessly harvested AC energy for computational blocks. Under a nonlinear EH circuit, our goal is to maximize the fairness of end-to-end rate among user pairs subject to power constraints, resulting in a nonconvex problem. We propose an iterative algorithm to achieve a suboptimal and efficient solution to this challenging problem by leveraging the inner approximation framework. Numerical results demonstrate that the proposed algorithm outperforms the traditional direct current computing and other baseline schemes.
△ Less
Submitted 18 March, 2020;
originally announced March 2020.
-
On the Spectral and Energy Efficiencies of Full-Duplex Cell-Free Massive MIMO
Authors:
Hieu V. Nguyen,
Van-Dinh Nguyen,
Octavia A. Dobre,
Shree Krishna Sharma,
Symeon Chatzinotas,
Björn Ottersten,
Oh-Soon Shin
Abstract:
In-band full-duplex (FD) operation is practically more suited for short-range communications such as WiFi and small-cell networks, due to its current practical limitations on the self-interference cancellation. In addition, cell-free massive multiple-input multiple-output (CF-mMIMO) is a new and scalable version of MIMO networks, which is designed to bring service antennas closer to end user equip…
▽ More
In-band full-duplex (FD) operation is practically more suited for short-range communications such as WiFi and small-cell networks, due to its current practical limitations on the self-interference cancellation. In addition, cell-free massive multiple-input multiple-output (CF-mMIMO) is a new and scalable version of MIMO networks, which is designed to bring service antennas closer to end user equipments (UEs). To achieve higher spectral and energy efficiencies (SE-EE) of a wireless network, it is of practical interest to incorporate FD capability into CF-mMIMO systems to utilize their combined benefits. We formulate a novel and comprehensive optimization problem for the maximization of SE and EE in which power control, access point-UE (AP-UE) association and AP selection are jointly optimized under a realistic power consumption model, resulting in a difficult class of mixed-integer nonconvex programming. To tackle the binary nature of the formulated problem, we propose an efficient approach by exploiting a strong coupling between binary and continuous variables, leading to a more tractable problem. In this regard, two low-complexity transmission designs based on zero-forcing (ZF) are proposed. Combining tools from inner approximation framework and Dinkelbach method, we develop simple iterative algorithms with polynomial computational complexity in each iteration and strong theoretical performance guaranteed. Furthermore, towards a robust design for FD CF-mMIMO, a novel heap-based pilot assignment algorithm is proposed to mitigate effects of pilot contamination. Numerical results show that our proposed designs with realistic parameters significantly outperform the well-known approaches (i.e., small-cell and collocated mMIMO) in terms of the SE and EE. Notably, the proposed ZF designs require much less execution time than the simple maximum ratio transmission/combining.
△ Less
Submitted 18 January, 2020; v1 submitted 2 October, 2019;
originally announced October 2019.
-
Joint Power Control and User Association for NOMA-Based Full-Duplex Systems
Authors:
Hieu V. Nguyen,
Van-Dinh Nguyen,
Octavia A. Dobre,
Diep N. Nguyen,
Eryk Dutkiewicz,
Oh-Soon Shin
Abstract:
This paper investigates the coexistence of non-orthogonal multiple access (NOMA) and full-duplex (FD) to improve both spectral efficiency (SE) and user fairness. In such a scenario, NOMA based on the successive interference cancellation technique is simultaneously applied to both uplink (UL) and downlink (DL) transmissions in an FD system. We consider the problem of jointly optimizing user associa…
▽ More
This paper investigates the coexistence of non-orthogonal multiple access (NOMA) and full-duplex (FD) to improve both spectral efficiency (SE) and user fairness. In such a scenario, NOMA based on the successive interference cancellation technique is simultaneously applied to both uplink (UL) and downlink (DL) transmissions in an FD system. We consider the problem of jointly optimizing user association (UA) and power control to maximize the overall SE, subject to user-specific quality-of-service and total transmit power constraints. To be spectrally-efficient, we introduce the tensor model to optimize UL users' decoding order and DL users' clustering, which results in a mixed-integer non-convex problem. For practically appealing applications, we first relax the binary variables and then propose two low-complexity designs. In the first design, the continuous relaxation problem is solved using the inner convex approximation framework. Next, we additionally introduce the penalty method to further accelerate the performance of the former design. For a benchmark, we develop an optimal solution based on brute-force search (BFS) over all possible cases of UAs. It is demonstrated in numerical results that the proposed algorithms outperform the conventional FD-based schemes and its half-duplex counterpart, as well as yield data rates close to those obtained by BFS-based algorithm.
△ Less
Submitted 2 August, 2019;
originally announced August 2019.
-
Joint Antenna Array Mode Selection and User Assignment for Full-Duplex MU-MISO Systems
Authors:
Hieu V. Nguyen,
Van-Dinh Nguyen,
Octavia A. Dobre,
Yongpeng Wu,
Oh-Soon Shin
Abstract:
This paper considers a full-duplex (FD) multiuser multiple-input single-output system where a base station simultaneously serves both uplink (UL) and downlink (DL) users on the same time-frequency resource. The crucial barriers in implementing FD systems reside in the residual self-interference and co-channel interference. To accelerate the use of FD radio in future wireless networks, we aim at ma…
▽ More
This paper considers a full-duplex (FD) multiuser multiple-input single-output system where a base station simultaneously serves both uplink (UL) and downlink (DL) users on the same time-frequency resource. The crucial barriers in implementing FD systems reside in the residual self-interference and co-channel interference. To accelerate the use of FD radio in future wireless networks, we aim at managing the network interference more effectively by jointly designing the selection of half-array antenna modes (in the transmit or receive mode) at the BS with time phases and user assignments. The first problem of interest is to maximize the overall sum rate subject to quality-of-service requirements, which is formulated as a highly non-concave utility function followed by non-convex constraints. To address the design problem, we propose an iterative low-complexity algorithm by develo** new inner approximations, and its convergence to a stationary point is guaranteed. To provide more insights into the solution of the proposed design, a general max-min rate optimization is further considered to maximize the minimum per-user rate while satisfying a given ratio between UL and DL rates. Furthermore, a robust algorithm is devised to verify that the proposed scheme works well under channel uncertainty. Simulation results demonstrate that the proposed algorithms exhibit fast convergence and substantially outperform existing schemes.
△ Less
Submitted 15 March, 2019;
originally announced March 2019.
-
Optimal User Pairing for Achieving Rate Fairness in Downlink NOMA Networks
Authors:
Van-Phuc Bui,
Phu X. Nguyen,
Hieu V. Nguyen,
Van-Dinh Nguyen,
Oh-Soon Shin
Abstract:
In this paper, a downlink non-orthogonal multiple access (NOMA) network is studied. We investigate the problem of jointly optimizing user pairing and beamforming design to maximize the minimum rate among all users. The considered problem belongs to a difficult class of mixed-integer nonconvex optimization programming. We first relax the binary constraints and adopt sequential convex approximation…
▽ More
In this paper, a downlink non-orthogonal multiple access (NOMA) network is studied. We investigate the problem of jointly optimizing user pairing and beamforming design to maximize the minimum rate among all users. The considered problem belongs to a difficult class of mixed-integer nonconvex optimization programming. We first relax the binary constraints and adopt sequential convex approximation method to solve the relaxed problem, which is guaranteed to converge at least to a locally optimal solution. Numerical results show that the proposed method attains higher rate fairness among users, compared with traditional beamforming solutions, i.e., random pairing NOMA and beamforming systems.
△ Less
Submitted 30 December, 2018;
originally announced December 2018.
-
A New Design Paradigm for Secure Full-Duplex Multiuser Systems
Authors:
Van-Dinh Nguyen,
Hieu V. Nguyen,
Octavia A. Dobre,
Oh-Soon Shin
Abstract:
We consider a full-duplex (FD) multiuser system where an FD base station (BS) is designed to simultaneously serve both downlink (DL) and uplink (UL) users in the presence of half-duplex eavesdroppers (Eves). The problem is to maximize the minimum (max-min) secrecy rate (SR) among all legitimate users, where the information signals at the FD-BS are accompanied with artificial noise to debilitate th…
▽ More
We consider a full-duplex (FD) multiuser system where an FD base station (BS) is designed to simultaneously serve both downlink (DL) and uplink (UL) users in the presence of half-duplex eavesdroppers (Eves). The problem is to maximize the minimum (max-min) secrecy rate (SR) among all legitimate users, where the information signals at the FD-BS are accompanied with artificial noise to debilitate the Eves' channels. To enhance the max-min SR, a major part of the power budget should be allocated to serve the users with poor channel qualities, such as those far from the FD-BS, undermining the SR for other users, and thus compromising the SR per-user. In addition, the main obstacle in designing an FD system is due to the self-interference (SI) and co-channel interference (CCI) among users. We therefore propose an alternative solution, where the FD-BS uses a fraction of the time block to serve near DL users and far UL users, and the remaining fractional time to serve other users. The proposed scheme mitigates the harmful effects of SI, CCI and multiuser interference, and provides system robustness. The SR optimization problem has a highly nonconcave and nonsmooth objective, subject to nonconvex constraints. For the case of perfect channel state information (CSI), we develop a low-complexity path-following algorithm, which involves only a simple convex program of moderate dimension at each iteration. We show that our path-following algorithm guarantees convergence at least to a local optimum. Then, we extend the path-following algorithm to the cases of partially known Eves' CSI, where only statistics of CSI for the Eves are known, and worst-case scenario in which Eves can employ a more advanced linear decoder. The merit of our proposed approach is further demonstrated by extensive numerical results.
△ Less
Submitted 15 April, 2018; v1 submitted 3 January, 2018;
originally announced January 2018.
-
An Efficient Spectral Leakage Filtering for IEEE 802.11af in TV White Space
Authors:
Phu Xuan Nguyen,
Thinh Hung Pham,
Trang Hoang,
Oh-Soon Shin
Abstract:
Orthogonal frequency division multiplexing (OFDM) has been widely adopted for modern wireless standards and become a key enabling technology for cognitive radios. However, one of its main drawbacks is significant spectral leakage due to the accumulation of multiple sinc-shaped subcarriers. In this paper, we present a novel pulse sha** scheme for efficient spectral leakage suppression in OFDM bas…
▽ More
Orthogonal frequency division multiplexing (OFDM) has been widely adopted for modern wireless standards and become a key enabling technology for cognitive radios. However, one of its main drawbacks is significant spectral leakage due to the accumulation of multiple sinc-shaped subcarriers. In this paper, we present a novel pulse sha** scheme for efficient spectral leakage suppression in OFDM based physical layer of IEEE 802.11af standard. With conventional pulse sha** filters such as a raised-cosine filter, vestigial symmetry can be used to reduce spectral leakage very effectively. However, these pulse sha** filters require long guard interval, i.e., cyclic prefix in an OFDM system, to avoid inter-symbol interference (ISI), resulting in a loss of spectral efficiency. The proposed pulse sha** method based on asymmetric pulse sha** achieves better spectral leakage suppression and decreases ISI caused by filtering as compared to conventional pulse sha** filters.
△ Less
Submitted 22 December, 2017;
originally announced December 2017.
-
Cooperative Prediction-and-Sensing Based Spectrum Sharing in Cognitive Radio Networks
Authors:
Van-Dinh Nguyen,
Oh-Soon Shin
Abstract:
This paper proposes prediction-and-sensing based spectrum sharing, a new spectrum-sharing model for cognitive radio networks, with a time structure for each resource block divided into a spectrum prediction-and-sensing phase and a data transmission phase. Cooperative spectrum prediction is incorporated as a sub-phase of spectrum sensing in the first phase. We investigate a joint design of transmit…
▽ More
This paper proposes prediction-and-sensing based spectrum sharing, a new spectrum-sharing model for cognitive radio networks, with a time structure for each resource block divided into a spectrum prediction-and-sensing phase and a data transmission phase. Cooperative spectrum prediction is incorporated as a sub-phase of spectrum sensing in the first phase. We investigate a joint design of transmit beamforming at the secondary base station (BS) and sensing time. The primary design goal is to maximize the sum rate of all secondary users (SUs) subject to the minimum rate requirement for all SUs, the transmit power constraint at the secondary BS, and the interference power constraints at all primary users. The original problem is difficult to solve since it is highly nonconvex. We first convert the problem into a more tractable form, then arrive at a convex program based on an inner approximation framework, and finally propose a new algorithm to successively solve this convex program. We prove that the proposed algorithm iteratively improves the objective while guaranteeing convergence at least to local optima. Simulation results demonstrate that the proposed algorithm reaches a stationary point after only a few iterations with a substantial performance improvement over existing approaches.
△ Less
Submitted 24 July, 2017;
originally announced July 2017.
-
On the Design of Secure Full-Duplex Multiuser Systems under User Grou** Method
Authors:
Van-Dinh Nguyen,
Hieu V. Nguyen,
Octavia A. Dobre,
Oh-Soon Shin
Abstract:
Consider a full-duplex (FD) multiuser system where an FD base station (BS) is designed to simultaneously serve both downlink users and uplink users in the presence of half-duplex eavesdroppers (Eves). Our problem is to maximize the minimum secrecy rate (SR) among all legitimate users by proposing a novel user grou** method, where information signals at the FD-BS are accompanied with artificial n…
▽ More
Consider a full-duplex (FD) multiuser system where an FD base station (BS) is designed to simultaneously serve both downlink users and uplink users in the presence of half-duplex eavesdroppers (Eves). Our problem is to maximize the minimum secrecy rate (SR) among all legitimate users by proposing a novel user grou** method, where information signals at the FD-BS are accompanied with artificial noise to degrade the Eves' channel. The SR problem has a highly nonconcave and nonsmooth objective, subject to nonconvex constraints due to coupling between the optimization variables. Nevertheless, we develop a path-following low-complexity algorithm, which invokes only a simple convex program of moderate dimensions at each iteration. We show that our path-following algorithm guarantees convergence at least to a local optima. The numerical results demonstrate the merit of our proposed approach compared to existing well-known ones, i.e., conventional FD and nonorthogonal multiple access.
△ Less
Submitted 28 October, 2017; v1 submitted 20 July, 2017;
originally announced July 2017.
-
Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications
Authors:
Van-Dinh Nguyen,
Trung Q. Duong,
Oh-Soon Shin,
Arumugam Nallanathan,
George K. Karagiannidis
Abstract:
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselve…
▽ More
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselves from eavesdrop**. The main objective of this work is to maximize the secrecy rate of the secondary system, while adhering to all individual primary users' secrecy rate constraints. In the case of active eavesdroppers and perfect channel state information (CSI) at the transceivers, the utility function of interest is nonconcave and the involved constraints are nonconvex, and thus, the optimal solutions are troublesome. To solve this problem, we propose an iterative algorithm to arrive at least to a local optimum of the original nonconvex problem. This algorithm is guaranteed to achieve a Karush-Kuhn-Tucker solution. Then, we extend the optimization approach to the case of passive eavesdroppers and imperfect CSI knowledge at the transceivers, where the constraints are transformed into a linear matrix inequality and convex constraints, in order to facilitate the optimal solution.
△ Less
Submitted 7 July, 2017;
originally announced July 2017.
-
Joint Fractional Time Allocation and Beamforming for Downlink Multiuser MISO Systems
Authors:
Van-Dinh Nguyen,
Hoang Duong Tuan,
Trung Q. Duong,
Oh-Soon Shin,
H. Vincent Poor
Abstract:
It is well-known that the traditional transmit beamforming at a base station (BS) to manage interference in serving multiple users is effective only when the number of users is less than the number of transmit antennas at the BS. Non-orthogonal multiple access (NOMA) can improve the throughput of users with poorer channel conditions by compromising their own privacy because other users with better…
▽ More
It is well-known that the traditional transmit beamforming at a base station (BS) to manage interference in serving multiple users is effective only when the number of users is less than the number of transmit antennas at the BS. Non-orthogonal multiple access (NOMA) can improve the throughput of users with poorer channel conditions by compromising their own privacy because other users with better channel conditions can decode the information of users in poorer channel state. NOMA still prefers that the number of users is less than the number of antennas at the BS transmitter. This paper resolves such issues by allocating separate fractional time slots for serving the users with similar channel conditions. This enables the BS to serve more users within the time unit while the privacy of each user is preserved. The fractional times and beamforming vectors are jointly optimized to maximize the system's throughput. An efficient path-following algorithm, which invokes a simple convex quadratic program at each iteration, is proposed for the solution of this challenging optimization problem. Numerical results confirm its versatility.
△ Less
Submitted 27 August, 2017; v1 submitted 6 June, 2017;
originally announced June 2017.
-
Precoder Design for Signal Superposition in MIMO-NOMA Multicell Networks
Authors:
Van-Dinh Nguyen,
Hoang Duong Tuan,
Trung Q. Duong,
H. Vincent Poor,
and Oh-Soon Shin
Abstract:
The throughput of users with poor channel conditions, such as those at a cell edge, is a bottleneck in wireless systems. A major part of the power budget must be allocated to serve these users in guaranteeing their quality-of-service (QoS) requirement, hampering QoS for other users and thus compromising the system reliability. In nonorthogonal multiple access (NOMA), the message intended for a use…
▽ More
The throughput of users with poor channel conditions, such as those at a cell edge, is a bottleneck in wireless systems. A major part of the power budget must be allocated to serve these users in guaranteeing their quality-of-service (QoS) requirement, hampering QoS for other users and thus compromising the system reliability. In nonorthogonal multiple access (NOMA), the message intended for a user with a poor channel condition is decoded by itself and by another user with a better channel condition. The message intended for the latter is then successively decoded by itself after canceling the interference of the former. The overall information throughput is thus improved by this particular successive decoding and interference cancellation. This paper aims to design linear precoders/beamformers for signal superposition at the base stations of NOMA multi-input multi-output multi-cellular systems to maximize the overall sum throughput subject to the users' QoS requirements, which are imposed independently on the users' channel condition. This design problem is formulated as the maximization of a highly nonlinear and nonsmooth function subject to nonconvex constraints, which is very computationally challenging. Path-following algorithms for its solution, which invoke only a simple convex problem of moderate dimension at each iteration are developed. Generating a sequence of improved points, these algorithms converge at least to a local optimum. Extensive numerical simulations are then provided to demonstrate their merit.
△ Less
Submitted 6 June, 2017;
originally announced June 2017.
-
Robust Beamforming for Secrecy Rate in Cooperative Cognitive Radio Multicast Communications
Authors:
Van-Dinh Nguyen,
Trung Q. Duong,
Oh-Soon Shin,
Arumugam Nallanathan,
George K. Karagiannidis
Abstract:
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselve…
▽ More
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselves from eavesdrop**. The main objective of this work is to maximize the secrecy rate of the secondary system, while adhering to all individual primary users' secrecy rate constraints. In the case of passive eavesdroppers and imperfect channel state information knowledge at the transceivers, the utility function of interest is nonconcave and involved constraints are nonconvex, and thus, the optimal solutions are troublesome. To address this problem, we propose an iterative algorithm to arrive at a local optimum of the considered problem. The proposed iterative algorithm is guaranteed to achieve a Karush-Kuhn-Tucker solution.
△ Less
Submitted 1 March, 2017;
originally announced March 2017.
-
Joint Beamforming and Antenna Selection for Sum Rate Maximization in Cognitive Radio Networks
Authors:
Van-Dinh Nguyen,
Chuyen T. Nguyen,
Hieu V. Nguyen,
Oh-Soon Shin
Abstract:
This letter studies joint transmit beamforming and antenna selection at a secondary base station (BS) with multiple primary users (PUs) in an underlay cognitive radio multiple-input single-output broadcast channel. The objective is to maximize the sum rate subject to the secondary BS transmit power, minimum required rates for secondary users, and PUs' interference power constraints. The utility fu…
▽ More
This letter studies joint transmit beamforming and antenna selection at a secondary base station (BS) with multiple primary users (PUs) in an underlay cognitive radio multiple-input single-output broadcast channel. The objective is to maximize the sum rate subject to the secondary BS transmit power, minimum required rates for secondary users, and PUs' interference power constraints. The utility function of interest is nonconcave and the involved constraints are nonconvex, so this problem is hard to solve. Nevertheless, we propose a new iterative algorithm that finds local optima at the least. We use an inner approximation method to construct and solve a simple convex quadratic program of moderate dimension at each iteration of the proposed algorithm. Simulation results indicate that the proposed algorithm converges quickly and outperforms existing approaches.
△ Less
Submitted 28 February, 2017;
originally announced March 2017.
-
Spectral Efficiency of Full-Duplex Multiuser System: Beamforming Design, User Grou**, and Time Allocation
Authors:
Van-Dinh Nguyen,
Hieu V. Nguyen,
Chuyen T. Nguyen,
Oh-Soon Shin
Abstract:
Full-duplex (FD) systems have emerged as an es- sential enabling technology to further increase the data rate of wireless communication systems. The key idea of FD is to serve multiple users over the same bandwidth with a base station (BS) that can simultaneously transmit and receive the signals. The most challenging issue in designing an FD system is to address both the harmful effects of residua…
▽ More
Full-duplex (FD) systems have emerged as an es- sential enabling technology to further increase the data rate of wireless communication systems. The key idea of FD is to serve multiple users over the same bandwidth with a base station (BS) that can simultaneously transmit and receive the signals. The most challenging issue in designing an FD system is to address both the harmful effects of residual self-interference caused by the transmit-to-receive antennas at the BS as well as the co- channel interference from an uplink user (ULU) to a downlink user (DLU). An efficient solution to these problems is to assign the ULUs/DLUs in different groups/slots, with each user served in multiple groups. Hence, this paper studies the joint design of transmit beamformers, ULUs/DLUs group assignment, and time allocation for each group. The specific aim is to maximize the sum rate under the ULU/DLU minimum throughput constraints. The utility function of interest is a difficult nonconcave problem, and the involved constraints are also nonconvex, and so this is a computationally troublesome problem. To solve this optimization problem, we propose a new path-following algorithm for compu- tational solutions to arrive at least the local optima. Each iteration involves only a simple convex quadratic program. We prove that the proposed algorithm iteratively improves the objective while guaranteeing convergence. Simulation results confirm the fast convergence of the proposed algorithm with substantial performance improvements over existing approaches.
△ Less
Submitted 3 February, 2017;
originally announced February 2017.
-
An Efficient Precoder Design for Multiuser MIMO Cognitive Radio Networks with Interference Constraints
Authors:
Van-Dinh Nguyen,
Le-Nam Tran,
Trung Q. Duong,
Oh-Soon Shin,
Ronan Farrell
Abstract:
We consider a linear precoder design for an underlay cognitive radio multiple-input multiple-output broadcast channel, where the secondary system consisting of a secondary base-station (BS) and a group of secondary users (SUs) is allowed to share the same spectrum with the primary system. All the transceivers are equipped with multiple antennas, each of which has its own maximum power constraint.…
▽ More
We consider a linear precoder design for an underlay cognitive radio multiple-input multiple-output broadcast channel, where the secondary system consisting of a secondary base-station (BS) and a group of secondary users (SUs) is allowed to share the same spectrum with the primary system. All the transceivers are equipped with multiple antennas, each of which has its own maximum power constraint. Assuming zero-forcing method to eliminate the multiuser interference, we study the sum rate maximization problem for the secondary system subject to both per-antenna power constraints at the secondary BS and the interference power constraints at the primary users. The problem of interest differs from the ones studied previously that often assumed a sum power constraint and/or single antenna employed at either both the primary and secondary receivers or the primary receivers. To develop an efficient numerical algorithm, we first invoke the rank relaxation method to transform the considered problem into a convex-concave problem based on a downlink-uplink result. We then propose a barrier interior-point method to solve the resulting saddle point problem. In particular, in each iteration of the proposed method we find the Newton step by solving a system of discrete-time Sylvester equations, which help reduce the complexity significantly, compared to the conventional method. Simulation results are provided to demonstrate fast convergence and effectiveness of the proposed algorithm.
△ Less
Submitted 15 August, 2016;
originally announced August 2016.
-
Performance Analysis of ZF Receivers with Imperfect CSI for Uplink Massive MIMO Systems
Authors:
Van-Dinh Nguyen,
Oh-Soon Shin
Abstract:
We consider the uplink of massive multipleinput multiple-output systems in a multicell environment. Since the base station (BS) estimates the channel state information (CSI) using the pilot signals transmitted from the users, each BS will have imperfect CSI in practice. Assuming zero-forcing method to eliminate the multi-user interference, we derive the exact analytical expressions for the probabi…
▽ More
We consider the uplink of massive multipleinput multiple-output systems in a multicell environment. Since the base station (BS) estimates the channel state information (CSI) using the pilot signals transmitted from the users, each BS will have imperfect CSI in practice. Assuming zero-forcing method to eliminate the multi-user interference, we derive the exact analytical expressions for the probability density function (PDF) of the signal-to-interference-plus-noise ratio (SINR), the corresponding achievable rate, the outage probability, and the symbol error rate (SER) when the BS has imperfect CSI. An upper bound of the SER is also derived for an arbitrary number of antennas at the BS. Moreover, we derive the upper bound of the achievable rate for the case where the number of antennas at the BS goes to infinity, and the analysis is verified by presenting numerical results.
△ Less
Submitted 9 June, 2016;
originally announced June 2016.
-
Full-Duplex Relay based on Zero-Forcing Beamforming
Authors:
Jong-Ho Lee,
Oh-Soon Shin
Abstract:
In this paper, we propose a full-duplex relay (FDR) based on a zero-forcing beamforming (ZFBF) for a multiuser MIMO relay system. The ZFBF is employed at the base station to suppress both the self-interference of the relay and the multiuser interference at the same time. Numerical results show that the proposed FDR can enhance the sum rate performance as compared to the half-duplex relay (HDR), if…
▽ More
In this paper, we propose a full-duplex relay (FDR) based on a zero-forcing beamforming (ZFBF) for a multiuser MIMO relay system. The ZFBF is employed at the base station to suppress both the self-interference of the relay and the multiuser interference at the same time. Numerical results show that the proposed FDR can enhance the sum rate performance as compared to the half-duplex relay (HDR), if sufficient isolation between the transmit and receive antennas is ensured at the relay.
△ Less
Submitted 8 June, 2010;
originally announced June 2010.