-
Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices
Authors:
Saud Khan,
Chandra Thapa,
Salman Durrani,
Seyit Camtepe
Abstract:
Physical-layer authentication is a popular alternative to the conventional key-based authentication for internet of things (IoT) devices due to their limited computational capacity and battery power. However, this approach has limitations due to poor robustness under channel fluctuations, reconciliation overhead, and no clear safeguard distance to ensure the secrecy of the generated authentication…
▽ More
Physical-layer authentication is a popular alternative to the conventional key-based authentication for internet of things (IoT) devices due to their limited computational capacity and battery power. However, this approach has limitations due to poor robustness under channel fluctuations, reconciliation overhead, and no clear safeguard distance to ensure the secrecy of the generated authentication keys. In this regard, we propose a novel, secure, and lightweight continuous authentication scheme for IoT device authentication. Our scheme utilizes the inherent properties of the IoT devices' transmission model as its source for seed generation and device authentication. Specifically, our proposed scheme provides continuous authentication by checking the access time slots and spreading sequences of the IoT devices instead of repeatedly generating and verifying shared keys. Due to this, access to a coherent key is not required in our proposed scheme, resulting in the concealment of the seed information from attackers. Our proposed authentication scheme for IoT devices demonstrates improved performance compared to the benchmark schemes relying on physical channels. Our empirical results find a near threefold decrease in the misdetection rate of illegitimate devices and close to zero false alarm rate in various system settings with varied numbers of active devices up to 200 and signal-to-noise ratio from 0 dB to 25 dB. Our proposed authentication scheme also has a lower computational complexity of at least half the computational cost of the benchmark schemes based on support vector machine and binary hypothesis testing in our studies. This further corroborates the practicality of our scheme for IoT deployments.
△ Less
Submitted 6 November, 2023; v1 submitted 1 March, 2023;
originally announced March 2023.
-
Joint User and Data Detection in Grant-Free NOMA with Attention-based BiLSTM Network
Authors:
Saud Khan,
Salman Durrani,
Muhammad Basit Shahab,
Sarah J. Johnson,
Seyit Camtepe
Abstract:
We consider the multi-user detection (MUD) problem in uplink grant-free non-orthogonal multiple access (NOMA), where the access point has to identify the total number and correct identity of the active Internet of Things (IoT) devices and decode their transmitted data. We assume that IoT devices use complex spreading sequences and transmit information in a random-access manner following the burst-…
▽ More
We consider the multi-user detection (MUD) problem in uplink grant-free non-orthogonal multiple access (NOMA), where the access point has to identify the total number and correct identity of the active Internet of Things (IoT) devices and decode their transmitted data. We assume that IoT devices use complex spreading sequences and transmit information in a random-access manner following the burst-sparsity model, where some IoT devices transmit their data in multiple adjacent time slots with a high probability, while others transmit only once during a frame. Exploiting the temporal correlation, we propose an attention-based bidirectional long short-term memory (BiLSTM) network to solve the MUD problem. The BiLSTM network creates a pattern of the device activation history using forward and reverse pass LSTMs, whereas the attention mechanism provides essential context to the device activation points. By doing so, a hierarchical pathway is followed for detecting active devices in a grant-free scenario. Then, by utilising the complex spreading sequences, blind data detection for the estimated active devices is performed. The proposed framework does not require prior knowledge of device sparsity levels and channels for performing MUD. The results show that the proposed network achieves better performance compared to existing benchmark schemes.
△ Less
Submitted 12 July, 2023; v1 submitted 13 September, 2022;
originally announced September 2022.
-
Federated Learning Cost Disparity for IoT Devices
Authors:
Sheeraz A. Alvi,
Yi Hong,
Salman Durrani
Abstract:
Federated learning (FL) promotes predictive model training at the Internet of things (IoT) devices by evading data collection cost in terms of energy, time, and privacy. We model the learning gain achieved by an IoT device against its participation cost as its utility. Due to the device-heterogeneity, the local model learning cost and its quality, which can be time-varying, differs from device to…
▽ More
Federated learning (FL) promotes predictive model training at the Internet of things (IoT) devices by evading data collection cost in terms of energy, time, and privacy. We model the learning gain achieved by an IoT device against its participation cost as its utility. Due to the device-heterogeneity, the local model learning cost and its quality, which can be time-varying, differs from device to device. We show that this variation results in utility unfairness because the same global model is shared among the devices. By default, the master is unaware of the local model computation and transmission costs of the devices, thus it is unable to address the utility unfairness problem. Also, a device may exploit this lack of knowledge at the master to intentionally reduce its expenditure and thereby enhance its utility. We propose to control the quality of the global model shared with the devices, in each round, based on their contribution and expenditure. This is achieved by employing differential privacy to curtail global model divulgence based on the learning contribution. In addition, we devise adaptive computation and transmission policies for each device to control its expenditure in order to mitigate utility unfairness. Our results show that the proposed scheme reduces the standard deviation of the energy cost of devices by 99% in comparison to the benchmark scheme, while the standard deviation of the training loss of devices varies around 0.103.
△ Less
Submitted 17 April, 2022;
originally announced April 2022.
-
Utility Fairness for the Differentially Private Federated Learning
Authors:
Sheeraz A. Alvi,
Yi Hong,
Salman Durrani
Abstract:
Federated learning (FL) allows predictive model training on the sensed data in a wireless Internet of things (IoT) network evading data collection cost in terms of energy, time, and privacy. In this paper, for a FL setting, we model the learning gain achieved by an IoT device against its participation cost as its utility. The local model quality and the associated cost differs from device to devic…
▽ More
Federated learning (FL) allows predictive model training on the sensed data in a wireless Internet of things (IoT) network evading data collection cost in terms of energy, time, and privacy. In this paper, for a FL setting, we model the learning gain achieved by an IoT device against its participation cost as its utility. The local model quality and the associated cost differs from device to device due to the device-heterogeneity which could be time-varying. We identify that this results in utility unfairness because the same global model is shared among the devices. In the vanilla FL setting, the master is unaware of devices' local model computation and transmission costs, thus it is unable to address the utility unfairness problem. In addition, a device may exploit this lack of knowledge at the master to intentionally reduce its expenditure and thereby boost its utility. We propose to control the quality of the global model shared with the devices, in each round, based on their contribution and expenditure. This is achieved by employing differential privacy to curtail global model divulgence based on the learning contribution. Furthermore, we devise adaptive computation and transmission policies for each device to control its expenditure in order to mitigate utility unfairness. Our results show that the proposed scheme reduces the standard deviation of the energy cost of devices by 99% in comparison to the benchmark scheme, while the standard deviation of the training loss of devices varies around 0.103.
△ Less
Submitted 11 September, 2021;
originally announced September 2021.
-
Transfer learning from High-Resource to Low-Resource Language Improves Speech Affect Recognition Classification Accuracy
Authors:
Sara Durrani,
Umair Arshad
Abstract:
Speech Affect Recognition is a problem of extracting emotional affects from audio data. Low resource languages corpora are rear and affect recognition is a difficult task in cross-corpus settings. We present an approach in which the model is trained on high resource language and fine-tune to recognize affects in low resource language. We train the model in same corpus setting on SAVEE, EMOVO, Urdu…
▽ More
Speech Affect Recognition is a problem of extracting emotional affects from audio data. Low resource languages corpora are rear and affect recognition is a difficult task in cross-corpus settings. We present an approach in which the model is trained on high resource language and fine-tune to recognize affects in low resource language. We train the model in same corpus setting on SAVEE, EMOVO, Urdu, and IEMOCAP by achieving baseline accuracy of 60.45, 68.05, 80.34, and 56.58 percent respectively. For capturing the diversity of affects in languages cross-corpus evaluations are discussed in detail. We find that accuracy improves by adding the domain target data into the training data. Finally, we show that performance is improved for low resource language speech affect recognition by achieving the UAR OF 69.32 and 68.2 for Urdu and Italian speech affects.
△ Less
Submitted 4 March, 2021;
originally announced March 2021.
-
Transfer Learning based Speech Affect Recognition in Urdu
Authors:
Sara Durrani,
Muhammad Umair Arshad
Abstract:
It has been established that Speech Affect Recognition for low resource languages is a difficult task. Here we present a Transfer learning based Speech Affect Recognition approach in which: we pre-train a model for high resource language affect recognition task and fine tune the parameters for low resource language using Deep Residual Network. Here we use standard four data sets to demonstrate tha…
▽ More
It has been established that Speech Affect Recognition for low resource languages is a difficult task. Here we present a Transfer learning based Speech Affect Recognition approach in which: we pre-train a model for high resource language affect recognition task and fine tune the parameters for low resource language using Deep Residual Network. Here we use standard four data sets to demonstrate that transfer learning can solve the problem of data scarcity for Affect Recognition task. We demonstrate that our approach is efficient by achieving 74.7 percent UAR on RAVDESS as source and Urdu data set as a target. Through an ablation study, we have identified that pre-trained model adds most of the features information, improvement in results and solves less data issues. Using this knowledge, we have also experimented on SAVEE and EMO-DB data set by setting Urdu as target language where only 400 utterances of data is available. This approach achieves high Unweighted Average Recall (UAR) when compared with existing algorithms.
△ Less
Submitted 5 March, 2021;
originally announced March 2021.
-
On the Relationship Between Network Topology and Throughput in Mesh Optical Networks
Authors:
Daniel Semrau,
Shahzaib Durrani,
Georgios Zervas,
Robert I. Killey,
Polina Bayvel
Abstract:
The relationship between topology and network throughput of arbitrarily-connected mesh networks is studied. Taking into account nonlinear channel properties, it is shown that throughput decreases logarithmically with physical network size with minor dependence on network ellipticity.
The relationship between topology and network throughput of arbitrarily-connected mesh networks is studied. Taking into account nonlinear channel properties, it is shown that throughput decreases logarithmically with physical network size with minor dependence on network ellipticity.
△ Less
Submitted 15 August, 2020;
originally announced August 2020.
-
Coverage Analysis for 3D Terahertz Communication Systems with Blockage and Directional Antennas
Authors:
Akram Shafie,
Nan Yang,
Zhuo Sun,
Salman Durrani
Abstract:
The scarcity of spectrum resources in current wireless communication systems has sparked enormous research interest in the terahertz (THz) frequency band. This band is characterized by fundamentally different propagation properties resulting in different interference structures from what we have observed so far at lower frequencies. In this paper, we derive a new expression for the coverage probab…
▽ More
The scarcity of spectrum resources in current wireless communication systems has sparked enormous research interest in the terahertz (THz) frequency band. This band is characterized by fundamentally different propagation properties resulting in different interference structures from what we have observed so far at lower frequencies. In this paper, we derive a new expression for the coverage probability of downlink transmission in THz communication systems within a three-dimensional (3D) environment. First, we establish a 3D propagation model which considers the molecular absorption loss, 3D directional antennas at both access points (APs) and user equipments (UEs), interference from nearby APs, and dynamic blockages caused by moving humans. Then, we develop a novel easy-to-use analytical framework based on the dominant interferer analysis to evaluate the coverage probability, the novelty of which lies in the incorporation of the instantaneous interference and the vertical height of THz devices. Our numerical results demonstrate the accuracy of our analysis and reveal that the coverage probability significantly decreases when the transmission distance increases. We also show the increasing blocker density and increasing AP density impose different impacts on the coverage performance when the UE-AP link of interest is in line-of-sight. We further show that the coverage performance improvement brought by increasing the antenna directivity at APs is higher than that brought by increasing the antenna directivity at UEs.
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
A Retrodirective Wireless Power Transfer Scheme for Ambient Backscatter Systems
Authors:
Sahar Idrees,
Xiangyun Zhou,
Salman Durrani,
Dusit Niyato
Abstract:
One of the key challenges of the Internet of Things (IoT) is to sustainably power the large number of IoT devices in real-time. In this paper, we consider a wireless power transfer (WPT) scenario between an energy transmitter (ET) capable of retrodirective WPT and an energy receiver (ER) capable of ambient backscatter in the presence of an ambient source (AS). The ER requests WPT by backscattering…
▽ More
One of the key challenges of the Internet of Things (IoT) is to sustainably power the large number of IoT devices in real-time. In this paper, we consider a wireless power transfer (WPT) scenario between an energy transmitter (ET) capable of retrodirective WPT and an energy receiver (ER) capable of ambient backscatter in the presence of an ambient source (AS). The ER requests WPT by backscattering signals from an AS towards the ET, which then retrodirectively beamforms an energy signal towards the ER. To remove the inherent direct-link ambient interference, we propose a scheme of ambient backscatter training. Specifically, the ER varies the reflection coefficient multiple times while backscattering each ambient symbol according to a certain pattern called the training sequence, whose design criterion we also present. To evaluate the system performance, we derive an analytical expression for the average harvested power at the ER. Our numerical results show that with the proposed scheme, the ER harvests tens of $μ$W of power, without any CSI estimation or active transmission from the ER, which is a significant improvement for low-power and low-cost ambient backscatter devices.
△ Less
Submitted 13 February, 2020;
originally announced February 2020.
-
SWIPT with Practical Modulation and RF Energy Harvesting Sensitivity
Authors:
Wanchun Liu,
Xiangyun Zhou,
Salman Durrani,
Petar Popovski
Abstract:
In this paper, we investigate the performance of simultaneous wireless information and power transfer (SWIPT) in a point-to-point system, adopting practical $M$-ary modulation. We take into account the fact that the receiver's radio-frequency (RF) energy harvesting circuit can only harvest energy when the received signal power is greater than a certain sensitivity level. For both power-splitting (…
▽ More
In this paper, we investigate the performance of simultaneous wireless information and power transfer (SWIPT) in a point-to-point system, adopting practical $M$-ary modulation. We take into account the fact that the receiver's radio-frequency (RF) energy harvesting circuit can only harvest energy when the received signal power is greater than a certain sensitivity level. For both power-splitting (PS) and time-switching (TS) schemes, we derive the energy harvesting performance as well as the information decoding performance for the Nakagami-$m$ fading channel. We also analyze the performance tradeoff between energy harvesting and information decoding by studying an optimization problem, which maximizes the information decoding performance and satisfies a constraint on the minimum harvested energy. Our analysis shows that (i) for the PS scheme, modulations with high peak-to-average power ratio achieve better energy harvesting performance, (ii) for the TS scheme, it is desirable to concentrate the power for wireless power transfer in order to minimize the non-harvested energy caused by the RF energy harvesting sensitivity level, and (iii) channel fading is beneficial for energy harvesting in both PS and TS schemes.
△ Less
Submitted 3 December, 2019;
originally announced December 2019.
-
Uplink NOMA for Cellular-Connected UAV: Impact of UAV Trajectories and Altitude
Authors:
Nilupuli Senadhira,
Salman Durrani,
Xiangyun Zhou,
Nan Yang,
Ming Ding
Abstract:
This paper considers an emerging cellular-connected unmanned aerial vehicle (UAV) architecture for surveillance or monitoring applications. We consider a scenario where a cellular-connected aerial user equipment (AUE) periodically transmits in uplink, with a given data rate requirement, while moving along a given trajectory. For efficient spectrum usage, we enable the concurrent uplink transmissio…
▽ More
This paper considers an emerging cellular-connected unmanned aerial vehicle (UAV) architecture for surveillance or monitoring applications. We consider a scenario where a cellular-connected aerial user equipment (AUE) periodically transmits in uplink, with a given data rate requirement, while moving along a given trajectory. For efficient spectrum usage, we enable the concurrent uplink transmission of the AUE and a terrestrial user equipment (TUE) by employing power-domain aerial-terrestrial non-orthogonal multiple access (NOMA), while accounting for the AUE's known trajectory. To characterize the system performance, we develop an analytical framework to compute the rate coverage probability, i.e., the probability that the achievable data rate of both the AUE and TUE exceeds the respective target rates. We use our analytical results to numerically determine the minimum height that the AUE needs to fly, at each transmission point along a given trajectory, in order to satisfy a certain quality of service (QoS) constraint for various AUE target data rates and different built-up environments. Specifically, the results show that the minimum height of the AUE depends on its distance from the BS as the AUE moves along the given trajectory. Our results highlight the importance of modeling AUE trajectory in cellular-connected UAV systems.
△ Less
Submitted 29 October, 2019;
originally announced October 2019.
-
Design of Ambient Backscatter Training for Wireless Power Transfer
Authors:
Sahar Idrees,
Xiangyun Zhou,
Salman Durrani,
Dusit Niyato
Abstract:
Wireless power transfer (WPT) using energy beamforming is a promising solution for low power Internet of Things (IoT) devices. In this work, we consider WPT from an energy transmitter (ET) employing retrodirective WPT using a large phased antenna array to an energy receiver (ER) capable of ambient backscatter. The advantage of retrodirective WPT is that no explicit channel estimation is needed at…
▽ More
Wireless power transfer (WPT) using energy beamforming is a promising solution for low power Internet of Things (IoT) devices. In this work, we consider WPT from an energy transmitter (ET) employing retrodirective WPT using a large phased antenna array to an energy receiver (ER) capable of ambient backscatter. The advantage of retrodirective WPT is that no explicit channel estimation is needed at the ET and the use of ambient backscattering eliminates the need for active transmission at the ER. We propose a training sequence design, i.e., pattern of varying the reflection coefficient at the ER, to eliminate the direct-link interference from the ambient source. We show that when the ambient symbol duration is known, the ambient interference is fully cancelled by the proposed design. We analytically model the system and find the average harvested power at the ER considering Nakagami-$m$ fading channels and non-linear energy harvesting model. Our results clearly show that the proposed solution is robust to a small timing offset mismatch at the correlator. When interference from undesired neighbouring sources in the ambient environment is not significant, the ER can successfully harvest tens to hundreds of $μ$W of power, which is an important improvement for low-power IoT devices.
△ Less
Submitted 11 August, 2020; v1 submitted 2 September, 2019;
originally announced September 2019.
-
Sequencing and Scheduling for Multi-User Machine-Type Communication
Authors:
Sheeraz A. Alvi,
Xiangyun Zhou,
Salman Durrani,
Duy T. Ngo
Abstract:
In this paper, we propose joint sequencing and scheduling optimization for uplink machine-type communication (MTC). We consider multiple energy-constrained MTC devices that transmit data to a base station following the time division multiple access (TDMA) protocol. Conventionally, the energy efficiency performance in TDMA is optimized through multi-user scheduling, i.e., changing the transmission…
▽ More
In this paper, we propose joint sequencing and scheduling optimization for uplink machine-type communication (MTC). We consider multiple energy-constrained MTC devices that transmit data to a base station following the time division multiple access (TDMA) protocol. Conventionally, the energy efficiency performance in TDMA is optimized through multi-user scheduling, i.e., changing the transmission block length allocated to different devices. In such a system, the sequence of devices for transmission, i.e., who transmits first and who transmits second, etc., has not been considered as it does not have any impact on the energy efficiency. In this work, we consider that data compression is performed before transmission and show that the multi-user sequencing is indeed important. We apply three popular energy-minimization system objectives, which differ in terms of the overall system performance and fairness among the devices. We jointly optimize both multi-user sequencing and scheduling along with the compression and transmission rate control. Our results show that multi-user sequence optimization significantly improves the energy efficiency performance of the system. Notably, it makes the TDMA-based multi-user transmissions more likely to be feasible in the lower latency regime, and the performance gain is larger when the delay bound is stringent.
△ Less
Submitted 4 September, 2019; v1 submitted 2 April, 2019;
originally announced April 2019.
-
Distance Distribution Between Two Random Nodes in Arbitrary Polygons
Authors:
Ross Pure,
Salman Durrani,
Fei Tong,
Jian** Pan
Abstract:
Distance distributions are a key building block in stochastic geometry modelling of wireless networks and in many other fields in mathematics and science. In this paper, we propose a novel framework for analytically computing the closed form probability density function (PDF) of the distance between two random nodes each uniformly randomly distributed in respective arbitrary (convex or concave) po…
▽ More
Distance distributions are a key building block in stochastic geometry modelling of wireless networks and in many other fields in mathematics and science. In this paper, we propose a novel framework for analytically computing the closed form probability density function (PDF) of the distance between two random nodes each uniformly randomly distributed in respective arbitrary (convex or concave) polygon regions (which may be disjoint or overlap or coincide). The proposed framework is based on measure theory and uses polar decomposition for simplifying and calculating the integrals to obtain closed form results. We validate our proposed framework by comparison with simulations and published closed form results in the literature for simple cases. We illustrate the versatility and advantage of the proposed framework by deriving closed form results for a case not yet reported in the literature. Finally, we also develop a Mathematica implementation of the proposed framework which allows a user to define any two arbitrary polygons and conveniently determine the distance distribution numerically.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
Dynamic Space-Time Scheduling for GPU Inference
Authors:
Paras Jain,
Xiangxi Mo,
Ajay Jain,
Harikaran Subbaraj,
Rehan Sohail Durrani,
Alexey Tumanov,
Joseph Gonzalez,
Ion Stoica
Abstract:
Serving deep neural networks in latency critical interactive settings often requires GPU acceleration. However, the small batch sizes typical in online inference results in poor GPU utilization, a potential performance gap which GPU resource sharing can address. In this paper, we explore several techniques to leverage both temporal and spatial multiplexing to improve GPU utilization for deep learn…
▽ More
Serving deep neural networks in latency critical interactive settings often requires GPU acceleration. However, the small batch sizes typical in online inference results in poor GPU utilization, a potential performance gap which GPU resource sharing can address. In this paper, we explore several techniques to leverage both temporal and spatial multiplexing to improve GPU utilization for deep learning inference workloads. We evaluate the performance trade-offs of each approach with respect to resource-efficiency, latency predictability, and isolation when compared with conventional batched inference. Our experimental analysis suggests up to a 5x potential for improved utilization through the exploration of more advanced spatial and temporal multiplexing strategies. Our preliminary prototype of a dynamic space-time scheduler demonstrates a 3.23x floating-point throughput increase over space-only multiplexing and a 7.73x increase over time-only multiplexing for convolutions, while also providing better isolation and latency predictability.
△ Less
Submitted 31 December, 2018;
originally announced January 2019.
-
Underlay Drone Cell for Temporary Events: Impact of Drone Height and Aerial Channel Environments
Authors:
Xiaohui Zhou,
Salman Durrani,
**g Guo,
Halim Yanikomeroglu
Abstract:
Providing seamless connection to a large number of devices is one of the biggest challenges for the Internet of Things (IoT) networks. Using a drone as an aerial base station (ABS) to provide coverage to devices or users on ground is envisaged as a promising solution for IoT networks. In this paper, we consider a communication network with an underlay ABS to provide coverage for a temporary event,…
▽ More
Providing seamless connection to a large number of devices is one of the biggest challenges for the Internet of Things (IoT) networks. Using a drone as an aerial base station (ABS) to provide coverage to devices or users on ground is envisaged as a promising solution for IoT networks. In this paper, we consider a communication network with an underlay ABS to provide coverage for a temporary event, such as a sporting event or a concert in a stadium. Using stochastic geometry, we propose a general analytical framework to compute the uplink and downlink coverage probabilities for both the aerial and the terrestrial cellular system. Our framework is valid for any aerial channel model for which the probabilistic functions of line-of-sight (LOS) and non-line-of-sight (NLOS) links are specified. The accuracy of the analytical results is verified by Monte Carlo simulations considering two commonly adopted aerial channel models. Our results show the non-trivial impact of the different aerial channel environments (i.e., suburban, urban, dense urban and high-rise urban) on the uplink and downlink coverage probabilities and provide design guidelines for best ABS deployment height.
△ Less
Submitted 8 October, 2018; v1 submitted 17 September, 2018;
originally announced September 2018.
-
Infrared and Visible Image Fusion with ResNet and zero-phase component analysis
Authors:
Hui Li,
Xiao-Jun Wu,
Tariq S. Durrani
Abstract:
Feature extraction and processing tasks play a key role in Image Fusion, and the fusion performance is directly affected by the different features and processing methods undertaken. By contrast, most of deep learning-based methods use deep features directly without feature extraction or processing. This leads to the fusion performance degradation in some cases. To solve these drawbacks, we propose…
▽ More
Feature extraction and processing tasks play a key role in Image Fusion, and the fusion performance is directly affected by the different features and processing methods undertaken. By contrast, most of deep learning-based methods use deep features directly without feature extraction or processing. This leads to the fusion performance degradation in some cases. To solve these drawbacks, we propose a deep features and zero-phase component analysis (ZCA) based novel fusion framework is this paper. Firstly, the residual network (ResNet) is used to extract deep features from source images. Then ZCA is utilized to normalize the deep features and obtain initial weight maps. The final weight maps are obtained by employing a soft-max operation in association with the initial weight maps. Finally, the fused image is reconstructed using a weighted-averaging strategy. Compared with the existing fusion methods, experimental results demonstrate that the proposed framework achieves better performance in both objective assessment and visual quality. The code of our fusion algorithm is available at https://github.com/hli1221/imagefusion_resnet50
△ Less
Submitted 20 September, 2019; v1 submitted 19 June, 2018;
originally announced June 2018.
-
Optimal Compression and Transmission Rate Control for Node-Lifetime Maximization
Authors:
Sheeraz A. Alvi,
Xiangyun Zhou,
Salman Durrani
Abstract:
We consider a system that is composed of an energy constrained sensor node and a sink node, and devise optimal data compression and transmission policies with an objective to prolong the lifetime of the sensor node. While applying compression before transmission reduces the energy consumption of transmitting the sensed data, blindly applying too much compression may even exceed the cost of transmi…
▽ More
We consider a system that is composed of an energy constrained sensor node and a sink node, and devise optimal data compression and transmission policies with an objective to prolong the lifetime of the sensor node. While applying compression before transmission reduces the energy consumption of transmitting the sensed data, blindly applying too much compression may even exceed the cost of transmitting raw data, thereby losing its purpose. Hence, it is important to investigate the trade-off between data compression and transmission energy costs. In this paper, we study the joint optimal compression-transmission design in three scenarios which differ in terms of the available channel information at the sensor node, and cover a wide range of practical situations. We formulate and solve joint optimization problems aiming to maximize the lifetime of the sensor node whilst satisfying specific delay and bit error rate (BER) constraints. Our results show that a jointly optimized compression-transmission policy achieves significantly longer lifetime (90% to 2000%) as compared to optimizing transmission only without compression. Importantly, this performance advantage is most profound when the delay constraint is stringent, which demonstrates its suitability for low latency communication in future wireless networks.
△ Less
Submitted 13 September, 2018; v1 submitted 23 March, 2018;
originally announced March 2018.
-
Uplink Coverage Performance of an Underlay Drone Cell for Temporary Events
Authors:
Xiaohui Zhou,
**g Guo,
Salman Durrani,
Halim Yanikomeroglu
Abstract:
Using a drone as an aerial base station (ABS) to provide coverage to users on the ground is envisaged as a promising solution for beyond fifth generation (beyond-5G) wireless networks. While the literature to date has examined downlink cellular networks with ABSs, we consider an uplink cellular network with an ABS. Specifically, we analyze the use of an underlay ABS to provide coverage for a tempo…
▽ More
Using a drone as an aerial base station (ABS) to provide coverage to users on the ground is envisaged as a promising solution for beyond fifth generation (beyond-5G) wireless networks. While the literature to date has examined downlink cellular networks with ABSs, we consider an uplink cellular network with an ABS. Specifically, we analyze the use of an underlay ABS to provide coverage for a temporary event, such as a sporting event or a concert in a stadium. Using stochastic geometry, we derive the analytical expressions for the uplink coverage probability of the terrestrial base station (TBS) and the ABS. The results are expressed in terms of (i) the Laplace transforms of the interference power distribution at the TBS and the ABS and (ii) the distance distribution between the ABS and an independently and uniformly distributed (i.u.d.) ABS-supported user equipment and between the ABS and an i.u.d. TBS-supported user equipment. The accuracy of the analytical results is verified by Monte Carlo simulations. Our results show that varying the ABS height leads to a trade-off between the uplink coverage probability of the TBS and the ABS. In addition, assuming a quality of service of 90% at the TBS, an uplink coverage probability of the ABS of over 85% can be achieved, with the ABS deployed at or below its optimal height of typically between 250-500 m for the considered setup.
△ Less
Submitted 20 May, 2018; v1 submitted 18 January, 2018;
originally announced January 2018.
-
Design of Non-orthogonal Multiple Access Enhanced Backscatter Communication
Authors:
**g Guo,
Xiangyun Zhou,
Salman Durrani,
Halim Yanikomeroglu
Abstract:
Backscatter communication (BackCom), which allows a backscatter node (BN) to communicate with the reader by modulating and reflecting the incident continuous wave from the reader, is considered as a promising solution to power the future Internet-of-Things. In this paper, we consider a single BackCom system, where multiple BNs are served by a reader. We propose to use the power-domain non-orthogon…
▽ More
Backscatter communication (BackCom), which allows a backscatter node (BN) to communicate with the reader by modulating and reflecting the incident continuous wave from the reader, is considered as a promising solution to power the future Internet-of-Things. In this paper, we consider a single BackCom system, where multiple BNs are served by a reader. We propose to use the power-domain non-orthogonal multiple access (NOMA), i.e., multiplexing the BNs in different regions or with different backscattered power levels, to enhance the spectrum efficiency of the BackCom system. To better exploit power-domain NOMA, we propose to set the reflection coefficients for multiplexed BNs to be different. Based on this considered model, we develop the reflection coefficient selection criteria. To illustrate the enhanced system with the proposed criteria, we analyze the performance of BackCom system in terms of the average number of bits that can be successfully decoded by the reader for two-node pairing case and the average number of successful BNs for the general multiplexing case. Our results shows that NOMA achieves much better performance gain in the BackCom system as compared to its performance gain in the conventional system, which highlights the importance of applying NOMA to the BackCom system.
△ Less
Submitted 29 November, 2017;
originally announced November 2017.
-
Joint Optimization of User Association, Data Delivery Rate and Precoding for Cache-Enabled F-RANs
Authors:
Tung T. Vu,
Duy T. Ngo,
Lawrence Ong,
Salman Durrani,
Richard H. Middleton
Abstract:
This paper considers the downlink of a cache-enabled fog radio access network (F-RAN) with limited fronthaul capacity, where user association (UA), data delivery rate (DDR) and signal precoding are jointly optimized. We formulate a mixed-integer nonlinear programming problem in which the weighted difference of network throughput and total power consumption is maximized, subject to the predefined D…
▽ More
This paper considers the downlink of a cache-enabled fog radio access network (F-RAN) with limited fronthaul capacity, where user association (UA), data delivery rate (DDR) and signal precoding are jointly optimized. We formulate a mixed-integer nonlinear programming problem in which the weighted difference of network throughput and total power consumption is maximized, subject to the predefined DDR requirements and the maximum transmit power at each eRRH. To address this challenging problem, we first apply the l0-norm approximation and l1-norm minimization techniques to deal with the UA. After this key step, we arrive at an approximated problem that only involves the joint optimization of DDR and precoding. By using the alternating descent method, we further decompose this problem into a convex subproblem for DDR allocation and a nonconvex subproblem for precoding design. While the former is globally solved by the interior-point method, the latter is solved by a specifically tailored successive convex quadratic programming method. Finally, we propose an iterative algorithm for the original joint optimization that is guaranteed to converge. Importantly, each iteration of the developed algorithm only involves solving simple convex problems. Numerical examples demonstrate that the proposed design significantly improves both throughput and power performances, especially in practical F-RANs with limited fronthaul capacity. Compared to the sole precoder design for a given cache placement, our joint design is shown to improve the throughput by 50% while saving at least half of the total power consumption in the considered examples.
△ Less
Submitted 30 June, 2017;
originally announced June 2017.
-
A Novel Receiver Design with Joint Coherent and Non-Coherent Processing
Authors:
Wanchun Liu,
Xiangyun Zhou,
Salman Durrani,
Petar Popovski
Abstract:
In this paper, we propose a novel splitting receiver, which involves joint processing of coherently and non-coherently received signals. Using a passive RF power splitter, the received signal at each receiver antenna is split into two streams which are then processed by a conventional coherent detection (CD) circuit and a power-detection (PD) circuit, respectively. The streams of the signals from…
▽ More
In this paper, we propose a novel splitting receiver, which involves joint processing of coherently and non-coherently received signals. Using a passive RF power splitter, the received signal at each receiver antenna is split into two streams which are then processed by a conventional coherent detection (CD) circuit and a power-detection (PD) circuit, respectively. The streams of the signals from all the receiver antennas are then jointly used for information detection. We show that the splitting receiver creates a three-dimensional received signal space, due to the joint coherent and non-coherent processing. We analyze the achievable rate of a splitting receiver, which shows that the splitting receiver provides a rate gain of $3/2$ compared to either the conventional (CD-based) coherent receiver or the PD-based non-coherent receiver in the high SNR regime. We also analyze the symbol error rate (SER) for practical modulation schemes, which shows that the splitting receiver achieves asymptotic SER reduction by a factor of at least $\sqrt{M}-1$ for $M$-QAM compared to either the conventional (CD-based) coherent receiver or the PD-based non-coherent receiver.
△ Less
Submitted 19 April, 2017;
originally announced April 2017.
-
Power Beacon-Assisted Millimeter Wave Ad Hoc Networks
Authors:
Xiaohui Zhou,
**g Guo,
Salman Durrani,
Marco Di Renzo
Abstract:
Deployment of low cost power beacons (PBs) is a promising solution for dedicated wireless power transfer (WPT) in future wireless networks. In this paper, we present a tractable model for PB-assisted millimeter wave (mmWave) wireless ad hoc networks, where each transmitter (TX) harvests energy from all PBs and then uses the harvested energy to transmit information to its desired receiver. Our mode…
▽ More
Deployment of low cost power beacons (PBs) is a promising solution for dedicated wireless power transfer (WPT) in future wireless networks. In this paper, we present a tractable model for PB-assisted millimeter wave (mmWave) wireless ad hoc networks, where each transmitter (TX) harvests energy from all PBs and then uses the harvested energy to transmit information to its desired receiver. Our model accounts for realistic aspects of WPT and mmWave transmissions, such as power circuit activation threshold, allowed maximum harvested power, maximum transmit power, beamforming and blockage. Using stochastic geometry, we obtain the Laplace transform of the aggregate received power at the TX to calculate the power coverage probability. We approximate and discretize the transmit power of each TX into a finite number of discrete power levels in log scale to compute the channel and total coverage probability. We compare our analytical predictions to simulations and observe good accuracy. The proposed model allows insights into effect of system parameters, such as transmit power of PBs, PB density, main lobe beam-width and power circuit activation threshold on the overall coverage probability. The results confirm that it is feasible and safe to power TXs in a mmWave ad hoc network using PBs.
△ Less
Submitted 5 September, 2017; v1 submitted 20 March, 2017;
originally announced March 2017.
-
Next Generation Backscatter Communication: Systems, Techniques and Applications
Authors:
Wanchun Liu,
Kaibin Huang,
Xiangyun Zhou,
Salman Durrani
Abstract:
The rapid growth of IoT driven by recent advancements in consumer electronics, 5G communication technologies, and cloud-computing enabled big-data analytics, has recently attracted tremendous attention from both the industry and academia. One of the major open challenges for IoT is the limited network lifetime due to massive IoT devices being powered by batteries with finite capacities. The low-po…
▽ More
The rapid growth of IoT driven by recent advancements in consumer electronics, 5G communication technologies, and cloud-computing enabled big-data analytics, has recently attracted tremendous attention from both the industry and academia. One of the major open challenges for IoT is the limited network lifetime due to massive IoT devices being powered by batteries with finite capacities. The low-power and low-complexity backscatter communications (BackCom), which simply relies on passive reflection and modulation of an incident radio-frequency (RF) wave, has emerged to be a promising technology for tackling this challenge. However, the contemporary BackCom has several major limitations, such as short transmission range, low data rate, and uni-directional information transmission. The article aims at introducing the recent advances in the active area of BackCom. Specifically, we provide a systematic introduction of the next generation BackCom covering basic principles, systems, techniques besides IoT applications. Lastly, we describe the IoT application scenarios with the next generation BackCom.
△ Less
Submitted 26 March, 2019; v1 submitted 26 January, 2017;
originally announced January 2017.
-
Massive Machine Type Communication with Data Aggregation and Resource Scheduling
Authors:
**g Guo,
Salman Durrani,
Xiangyun Zhou,
Halim Yanikomeroglu
Abstract:
To enable massive machine type communication (mMTC), data aggregation is a promising approach to reduce the congestion caused by a massive number of machine type devices (MTDs). In this work, we consider a two-phase cellular-based mMTC network where MTDs transmit to aggregators (i.e., aggregation phase) and the aggregated data is then relayed to base stations (i.e., relaying phase). Due to the lim…
▽ More
To enable massive machine type communication (mMTC), data aggregation is a promising approach to reduce the congestion caused by a massive number of machine type devices (MTDs). In this work, we consider a two-phase cellular-based mMTC network where MTDs transmit to aggregators (i.e., aggregation phase) and the aggregated data is then relayed to base stations (i.e., relaying phase). Due to the limited resources, the aggregators not only aggregate data, but also schedule resources among MTDs. We consider two scheduling schemes: random resource scheduling (RRS) and channel-aware resource scheduling (CRS). By leveraging the stochastic geometry, we present a tractable analytical framework to investigate the signal-to-interference ratio (SIR) for each phase, thereby computing the MTD success probability, the average number of successful MTDs and probability of successful channel utilization, which are the key metrics characterizing the overall mMTC performance. Our numerical results show that, although the CRS outperforms the RRS in terms of SIR at the aggregation phase, the simpler RRS has almost the same performance as the CRS for most cases with regards to the overall mMTC performance. Furthermore, the provision of more resources at the aggregation phase is not always beneficial to the mMTC performance.
△ Less
Submitted 13 April, 2017; v1 submitted 9 November, 2016;
originally announced November 2016.
-
Full-Duplex Backscatter Interference Networks Based on Time-Hop** Spread Spectrum
Authors:
Wanchun Liu,
Kaibin Huang,
Xiangyun Zhou,
Salman Durrani
Abstract:
Future Internet-of-Things (IoT) is expected to wirelessly connect billions of low-complexity devices. For wireless information transfer (WIT) in IoT, high density of IoT devices and their ad hoc communication result in strong interference which acts as a bottleneck on WIT. Furthermore, battery replacement for the massive number of IoT devices is difficult if not infeasible, making wireless energy…
▽ More
Future Internet-of-Things (IoT) is expected to wirelessly connect billions of low-complexity devices. For wireless information transfer (WIT) in IoT, high density of IoT devices and their ad hoc communication result in strong interference which acts as a bottleneck on WIT. Furthermore, battery replacement for the massive number of IoT devices is difficult if not infeasible, making wireless energy transfer (WET) desirable. This motivates: (i) the design of full-duplex WIT to reduce latency and enable efficient spectrum utilization, and (ii) the implementation of passive IoT devices using backscatter antennas that enable WET from one device (reader) to another (tag). However, the resultant increase in the density of simultaneous links exacerbates the interference issue. This issue is addressed in this paper by proposing the design of full-duplex backscatter communication (BackCom) networks, where a novel multiple-access scheme based on time-hop** spread-spectrum (TH-SS) is designed to enable both one-way WET and two-way WIT in coexisting backscatter reader-tag links. Comprehensive performance analysis of BackCom networks is presented in this paper, including forward/backward bit-error rates and WET efficiency and outage probabilities, which accounts for energy harvesting at tags, non-coherent and coherent detection at tags and readers, respectively, and the effects of asynchronous transmissions.
△ Less
Submitted 19 April, 2017; v1 submitted 31 August, 2016;
originally announced September 2016.
-
Path-Following Algorithms for Beamforming and Signal Splitting in RF Energy Harvesting Networks
Authors:
Ali A. Nasir,
Hoang D. Tuan,
Duy T. Ngo,
Salman Durrani,
Dong In Kim
Abstract:
We consider the joint design of transmit beamforming and receive signal-splitting ratios in the downlink of a wireless network with simultaneous radio-frequency (RF) information and energy transfer. Under constraints on the signal-to-interference-plus-noise ratio (SINR) at each user and the total transmit power at the base station, the design objective is to maximize either the sum harvested energ…
▽ More
We consider the joint design of transmit beamforming and receive signal-splitting ratios in the downlink of a wireless network with simultaneous radio-frequency (RF) information and energy transfer. Under constraints on the signal-to-interference-plus-noise ratio (SINR) at each user and the total transmit power at the base station, the design objective is to maximize either the sum harvested energy or the minimum harvested energy. We develop a computationally efficient path-following method to solve these challenging nonconvex optimization problems. We mathematically show that the proposed algorithms iteratively progress and converge to locally optimal solutions. Simulation results further show that these locally optimal solutions are the same as the globally optimal solutions for the considered practical network settings.
△ Less
Submitted 13 June, 2016;
originally announced June 2016.
-
Superimposed Signaling Inspired Channel Estimation in Full-Duplex Systems
Authors:
Abbas Koohian,
Hani Mehrpouyan,
Ali A. Nasir,
Salman Durrani,
Mohammad Azarbad,
Steven D. Blostein
Abstract:
Residual self-interference (SI) cancellation in the digital baseband is an important problem in full-duplex (FD) communication systems. In this paper, we propose a new technique for estimating the SI and communication channels in a FD communication system, which is inspired from superimposed signalling. In our proposed technique, we add a constant real number to each constellation point of a conve…
▽ More
Residual self-interference (SI) cancellation in the digital baseband is an important problem in full-duplex (FD) communication systems. In this paper, we propose a new technique for estimating the SI and communication channels in a FD communication system, which is inspired from superimposed signalling. In our proposed technique, we add a constant real number to each constellation point of a conventional modulation constellation to yield asymmetric shifted modulation constellations with respect to the origin. We show mathematically that such constellations can be used for bandwidth efficient channel estimation without ambiguity. We propose an expectation maximization (EM) estimator for use with the asymmetric shifted modulation constellations. We derive a closed-form lower bound for the mean square error (MSE) of the channel estimation error, which allows us to find the minimum shift energy needed for accurate channel estimation in a given FD communication system. The simulation results show that the proposed technique outperforms the data-aided channel estimation method, under the condition that the pilots use the same extra energy as the shift, both in terms of MSE of channel estimation error and bit error rate. The proposed technique is also robust to an increasing power of the SI signal.
△ Less
Submitted 27 December, 2016; v1 submitted 15 November, 2015;
originally announced November 2015.
-
Device-to-Device Communication Underlaying a Finite Cellular Network Region
Authors:
**g Guo,
Salman Durrani,
Xiangyun Zhou,
Halim Yanikomeroglu
Abstract:
Underlay in-band device-to-device (D2D) communication can improve the spectrum efficiency of cellular networks. However, the coexistence of D2D and cellular users causes inter-cell and intra-cell interference. The former can be effectively managed through inter-cell interference coordination and, therefore, is not considered in this work. Instead, we focus on the intra-cell interference and propos…
▽ More
Underlay in-band device-to-device (D2D) communication can improve the spectrum efficiency of cellular networks. However, the coexistence of D2D and cellular users causes inter-cell and intra-cell interference. The former can be effectively managed through inter-cell interference coordination and, therefore, is not considered in this work. Instead, we focus on the intra-cell interference and propose a D2D mode selection scheme to manage it inside a finite cellular network region. The potential D2D users are controlled by the base station (BS) to operate in D2D mode based on the average interference generated to the BS. Using stochastic geometry, we study the outage probability experienced at the BS and a D2D receiver, and spectrum reuse ratio, which quantifies the average fraction of successfully transmitting D2D users. The analysis shows that the outage probability at the D2D receiver varies for different locations. Additionally, without impairing the performance at the BS, if the path-loss exponent on the cellular link is slightly lower than that on the D2D link, the spectrum reuse ratio can have negligible decrease while the D2D users' average number of successful transmissions increases with increasing D2D node density. This indicates that an increasing level of D2D communication can be beneficial in future networks..
△ Less
Submitted 27 October, 2016; v1 submitted 12 October, 2015;
originally announced October 2015.
-
Energy Harvesting Wireless Sensor Networks: Delay Analysis Considering Energy Costs of Sensing and Transmission
Authors:
Wanchun Liu,
Xiangyun Zhou,
Salman Durrani,
Hani Mehrpouyan,
Steven D. Blostein
Abstract:
Energy harvesting (EH) provides a means of greatly enhancing the lifetime of wireless sensor nodes. However, the randomness inherent in the EH process may cause significant delay for performing sensing operation and transmitting the sensed information to the sink. Unlike most existing studies on the delay performance of EH sensor networks, where only the energy consumption of transmission is consi…
▽ More
Energy harvesting (EH) provides a means of greatly enhancing the lifetime of wireless sensor nodes. However, the randomness inherent in the EH process may cause significant delay for performing sensing operation and transmitting the sensed information to the sink. Unlike most existing studies on the delay performance of EH sensor networks, where only the energy consumption of transmission is considered, we consider the energy costs of both sensing and transmission. Specifically, we consider an EH sensor that monitors some status environmental property and adopts a harvest-then-use protocol to perform sensing and transmission. To comprehensively study the delay performance, we consider two complementary metrics and analytically derive their statistics: (i) update age - measuring the time taken from when information is obtained by the sensor to when the sensed information is successfully transmitted to the sink, i.e., how timely the updated information at the sink is, and (ii) update cycle - measuring the time duration between two consecutive successful transmissions, i.e., how frequently the information at the sink is updated. Our results show that the consideration of sensing energy cost leads to an important tradeoff between the two metrics: more frequent updates result in less timely information available at the sink.
△ Less
Submitted 14 March, 2016; v1 submitted 20 September, 2015;
originally announced September 2015.
-
Mode Selection, Resource Allocation and Power Control for D2D-Enabled Two-Tier Cellular Network
Authors:
Yifei Huang,
Ali A. Nasir,
Salman Durrani,
Xiangyun Zhou
Abstract:
This paper proposes a centralized decision making framework at the macro base station (MBS) for device to device (D2D) communication underlaying a two-tier cellular network. We consider a D2D pair in the presence of an MBS and a femto access point, each serving a user, with quality of service constraints for all users. Our proposed solution encompasses mode selection (choosing between cellular or…
▽ More
This paper proposes a centralized decision making framework at the macro base station (MBS) for device to device (D2D) communication underlaying a two-tier cellular network. We consider a D2D pair in the presence of an MBS and a femto access point, each serving a user, with quality of service constraints for all users. Our proposed solution encompasses mode selection (choosing between cellular or reuse or dedicated mode), resource allocation (in cellular and dedicated mode) and power control (in reuse mode) within a single framework. The framework prioritizes D2D dedicated mode if the D2D pair are close to each other and orthogonal resources are available. Otherwise, it allows D2D reuse mode if the D2D satisfies both the maximum distance and an additional interference criteria. For reuse mode, we present a geometric vertex search approach to solve the power allocation problem. We analytically prove the validity of this approach and show that it achieves near optimal performance. For cellular and dedicated modes, we show that frequency sharing maximizes sum rate and solve the resource allocation problem in closed form. Our simulations demonstrate the advantages of the proposed framework in terms of the performance gains achieved in D2D mode.
△ Less
Submitted 7 April, 2016; v1 submitted 31 August, 2015;
originally announced September 2015.
-
Gauss-Legendre Sampling on the Rotation Group
Authors:
Zubair Khalid,
Salman Durrani,
Rodney A. Kennedy,
Yves Wiaux,
Jason D. McEwen
Abstract:
We propose a Gauss-Legendre quadrature based sampling on the rotation group for the representation of a band-limited signal such that the Fourier transform (FT) of a signal can be exactly computed from its samples. Our figure of merit is the sampling efficiency, which is defined as a ratio of the degrees of freedom required to represent a band-limited signal in harmonic domain to the number of sam…
▽ More
We propose a Gauss-Legendre quadrature based sampling on the rotation group for the representation of a band-limited signal such that the Fourier transform (FT) of a signal can be exactly computed from its samples. Our figure of merit is the sampling efficiency, which is defined as a ratio of the degrees of freedom required to represent a band-limited signal in harmonic domain to the number of samples required to accurately compute the FT. The proposed sampling scheme is asymptotically as efficient as the most efficient scheme developed very recently. For the computation of FT and inverse FT, we also develop fast algorithms of complexity similar to the complexity attained by the fast algorithms for the existing sampling schemes. The developed algorithms are stable, accurate and do not have any pre-computation requirements. We also analyse the computation time and numerical accuracy of the proposed algorithms and show, through numerical experiments, that the proposed Fourier transforms are accurate with errors on the order of numerical precision.
△ Less
Submitted 13 January, 2017; v1 submitted 13 August, 2015;
originally announced August 2015.
-
Timing and Carrier Synchronization in Wireless Communication Systems: A Survey and Classification of Research in the Last Five Years
Authors:
A. A. Nasir,
S. Durrani,
H. Mehrpouyan,
S. D. Blostein,
R. A. Kennedy
Abstract:
Timing and carrier synchronization is a fundamental requirement for any wireless communication system to work properly. Timing synchronization is the process by which a receiver node determines the correct instants of time at which to sample the incoming signal. Carrier synchronization is the process by which a receiver adapts the frequency and phase of its local carrier oscillator with those of t…
▽ More
Timing and carrier synchronization is a fundamental requirement for any wireless communication system to work properly. Timing synchronization is the process by which a receiver node determines the correct instants of time at which to sample the incoming signal. Carrier synchronization is the process by which a receiver adapts the frequency and phase of its local carrier oscillator with those of the received signal. In this paper, we survey the literature over the last five years (2010-2014) and present a comprehensive literature review and classification of the recent research progress in achieving timing and carrier synchronization in single-input-single-output (SISO), multiple-input-multiple-output (MIMO), cooperative relaying, and multiuser/multicell interference networks. Considering both single-carrier and multi-carrier communication systems, we survey and categorise the timing and carrier synchronization techniques proposed for the different communication systems focusing on the system model assumptions for synchronization, the synchronization challenges, and the state-of-the-art synchronization solutions and their limitations. Finally, we envision some future research directions.
△ Less
Submitted 8 July, 2015;
originally announced July 2015.
-
Secure Communication with a Wireless-Powered Friendly Jammer
Authors:
Wanchun Liu,
Xiangyun Zhou,
Salman Durrani,
Petar Popovski
Abstract:
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission. In the first phase, wireless power transfer is conducted from the source to the jammer. In the second phase, the source transmits the informatio…
▽ More
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission. In the first phase, wireless power transfer is conducted from the source to the jammer. In the second phase, the source transmits the information-bearing signal under the protection of a jamming signal sent by the jammer using the harvested energy in the first phase. We analytically characterize the long-time behavior of the proposed protocol and derive a closed-form expression for the throughput. We further optimize the rate parameters for maximizing the throughput subject to a secrecy outage probability constraint. Our analytical results show that the throughput performance differs significantly between the single-antenna jammer case and the multi-antenna jammer case. For instance, as the source transmit power increases, the throughput quickly reaches an upper bound with single-antenna jammer, while the throughput grows unbounded with multi-antenna jammer. Our numerical results also validate the derived analytical results.
△ Less
Submitted 26 August, 2015; v1 submitted 1 December, 2014;
originally announced December 2014.
-
Joint Resource Optimization for Multicell Networks with Wireless Energy Harvesting Relays
Authors:
Ali A. Nasir,
Duy T. Ngo,
Xiangyun Zhou,
Rodney A. Kennedy,
Salman Durrani
Abstract:
This paper first considers a multicell network deployment where the base station (BS) of each cell communicates with its cell-edge user with the assistance of an amplify-and-forward (AF) relay node. Equipped with a power splitter and a wireless energy harvester, the self-sustaining relay scavenges radio frequency (RF) energy from the received signals to process and forward the information. Our aim…
▽ More
This paper first considers a multicell network deployment where the base station (BS) of each cell communicates with its cell-edge user with the assistance of an amplify-and-forward (AF) relay node. Equipped with a power splitter and a wireless energy harvester, the self-sustaining relay scavenges radio frequency (RF) energy from the received signals to process and forward the information. Our aim is to develop a resource allocation scheme that jointly optimizes (i) BS transmit powers, (ii) received power splitting factors for energy harvesting and information processing at the relays, and (iii) relay transmit powers. In the face of strong intercell interference and limited radio resources, we formulate three highly-nonconvex problems with the objectives of sum-rate maximization, max-min throughput fairness and sum-power minimization. To solve such challenging problems, we propose to apply the successive convex approximation (SCA) approach and devise iterative algorithms based on geometric programming and difference-of-convex-functions programming. The proposed algorithms transform the nonconvex problems into a sequence of convex problems, each of which is solved very efficiently by the interior-point method. We prove that our algorithms converge to the locally optimal solutions that satisfy the Karush-Kuhn-Tucker conditions of the original nonconvex problems. We then extend our results to the case of decode-and-forward (DF) relaying with variable timeslot durations. We show that our resource allocation solutions in this case offer better throughput than that of the AF counterpart with equal timeslot durations, albeit at a higher computational complexity. Numerical results confirm that the proposed joint optimization solutions substantially improve the network performance, compared with cases where the radio resource parameters are individually optimized.
△ Less
Submitted 24 March, 2015; v1 submitted 19 August, 2014;
originally announced August 2014.
-
Performance Analysis of Arbitrarily-Shaped Underlay Cognitive Networks: Effects of Secondary User Activity Protocols
Authors:
**g Guo,
Salman Durrani,
Xiangyun Zhou
Abstract:
This paper analyzes the performance of the primary and secondary users (SUs) in an arbitrarily-shaped underlay cognitive network. In order to meet the interference threshold requirement for a primary receiver (PU-Rx) at an arbitrary location, we consider different SU activity protocols which limit the number of active SUs. We propose a framework, based on the moment generating function (MGF) of th…
▽ More
This paper analyzes the performance of the primary and secondary users (SUs) in an arbitrarily-shaped underlay cognitive network. In order to meet the interference threshold requirement for a primary receiver (PU-Rx) at an arbitrary location, we consider different SU activity protocols which limit the number of active SUs. We propose a framework, based on the moment generating function (MGF) of the interference due to a random SU, to analytically compute the outage probability in the primary network, as well as the average number of active SUs in the secondary network. We also propose a cooperation-based SU activity protocol in the underlay cognitive network which includes the existing threshold-based protocol as a special case. We study the average number of active SUs for the different SU activity protocols, subject to a given outage probability constraint at the PU and we employ it as an analytical approach to compare the effect of different SU activity protocols on the performance of the primary and secondary networks.
△ Less
Submitted 7 November, 2014; v1 submitted 18 March, 2014;
originally announced March 2014.
-
A Novel User Pairing Scheme for Functional Decode-and-Forward Multi-way Relay Network
Authors:
Shama N. Islam,
Salman Durrani,
Parastoo Sadeghi
Abstract:
In this paper, we consider a functional decode and forward (FDF) multi-way relay network (MWRN) where a common user facilitates each user in the network to obtain messages from all other users. We propose a novel user pairing scheme, which is based on the principle of selecting a common user with the best average channel gain. This allows the user with the best channel conditions to contribute to…
▽ More
In this paper, we consider a functional decode and forward (FDF) multi-way relay network (MWRN) where a common user facilitates each user in the network to obtain messages from all other users. We propose a novel user pairing scheme, which is based on the principle of selecting a common user with the best average channel gain. This allows the user with the best channel conditions to contribute to the overall system performance. Assuming lattice code based transmissions, we derive upper bounds on the average common rate and the average sum rate with the proposed pairing scheme. Considering M-ary quadrature amplitude modulation with square constellation as a special case of lattice code transmission, we derive asymptotic average symbol error rate (SER) of the MWRN. We show that in terms of the achievable rates, the proposed pairing scheme outperforms the existing pairing schemes under a wide range of channel scenarios. The proposed pairing scheme also has lower average SER compared to existing schemes. We show that overall, the MWRN performance with the proposed pairing scheme is more robust, compared to existing pairing schemes, especially under worst case channel conditions when majority of users have poor average channel gains.
△ Less
Submitted 23 September, 2014; v1 submitted 26 February, 2014;
originally announced February 2014.
-
Channel, Phase Noise, and Frequency Offset in OFDM Systems: Joint Estimation, Data Detection, and Hybrid Cramer-Rao Lower Bound
Authors:
Omar H. Salim,
Ali A. Nasir,
Hani Mehrpouyan,
Wei Xiang,
Salman Durrani,
Rodney A. Kennedy
Abstract:
Oscillator phase noise (PHN) and carrier frequency offset (CFO) can adversely impact the performance of orthogonal frequency division multiplexing (OFDM) systems, since they can result in inter carrier interference and rotation of the signal constellation. In this paper, we propose an expectation conditional maximization (ECM) based algorithm for joint estimation of channel, PHN, and CFO in OFDM s…
▽ More
Oscillator phase noise (PHN) and carrier frequency offset (CFO) can adversely impact the performance of orthogonal frequency division multiplexing (OFDM) systems, since they can result in inter carrier interference and rotation of the signal constellation. In this paper, we propose an expectation conditional maximization (ECM) based algorithm for joint estimation of channel, PHN, and CFO in OFDM systems. We present the signal model for the estimation problem and derive the hybrid Cramer-Rao lower bound (HCRB) for the joint estimation problem. Next, we propose an iterative receiver based on an extended Kalman filter for joint data detection and PHN tracking. Numerical results show that, compared to existing algorithms, the performance of the proposed ECM-based estimator is closer to the derived HCRB and outperforms the existing estimation algorithms at moderate-to-high signal-to-noise ratio (SNR). In addition, the combined estimation algorithm and iterative receiver are more computationally efficient than existing algorithms and result in improved average uncoded and coded bit error rate (BER) performance.
△ Less
Submitted 30 May, 2014; v1 submitted 26 November, 2013;
originally announced November 2013.
-
Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis
Authors:
Ali Arshad Nasir,
Xiangyun Zhou,
Salman Durrani,
Rodney A. Kennedy
Abstract:
We consider wireless-powered amplify-and-forward and decode-and-forward relaying in cooperative communications, where an energy constrained relay node first harvests energy through the received radio-frequency signal from the source and then uses the harvested energy to forward the source information to the destination node. We propose time-switching based energy harvesting (EH) and information tr…
▽ More
We consider wireless-powered amplify-and-forward and decode-and-forward relaying in cooperative communications, where an energy constrained relay node first harvests energy through the received radio-frequency signal from the source and then uses the harvested energy to forward the source information to the destination node. We propose time-switching based energy harvesting (EH) and information transmission (IT) protocols with two modes of EH at the relay. For continuous time EH, the EH time can be any percentage of the total transmission block time. For discrete time EH, the whole transmission block is either used for EH or IT. The proposed protocols are attractive because they do not require channel state information at the transmitter side and enable relay transmission with preset fixed transmission power. We derive analytical expressions of the achievable throughput for the proposed protocols. The derived expressions are verified by comparison with simulations and allow the system performance to be determined as a function of the system parameters. Finally, we show that the proposed protocols outperform the existing fixed time duration EH protocols in the literature, since they intelligently track the level of the harvested energy to switch between EH and IT in an online fashion, allowing efficient use of resources.
△ Less
Submitted 17 March, 2015; v1 submitted 28 October, 2013;
originally announced October 2013.
-
Training-Based Synchronization and Channel Estimation in AF Two-Way Relaying Networks
Authors:
Ali Arshad Nasir,
Hani Mehrpouyan,
Salman Durrani,
Steven D. Blostein,
Rodney A. Kennedy
Abstract:
Two-way relaying networks (TWRNs) allow for more bandwidth efficient use of the available spectrum since they allow for simultaneous information exchange between two users with the assistance of an intermediate relay node. However, due to superposition of signals at the relay node, the received signal at the user terminals is affected by \emph{multiple impairments}, i.e., channel gains, timing off…
▽ More
Two-way relaying networks (TWRNs) allow for more bandwidth efficient use of the available spectrum since they allow for simultaneous information exchange between two users with the assistance of an intermediate relay node. However, due to superposition of signals at the relay node, the received signal at the user terminals is affected by \emph{multiple impairments}, i.e., channel gains, timing offsets, and carrier frequency offsets, that need to be jointly estimated and compensated. This paper presents a training-based system model for amplify-and-forward (AF) TWRNs in the presence of multiple impairments and proposes maximum likelihood and differential evolution based algorithms for joint estimation of these impairments. The Cramer-Rao lower bounds (CRLBs) for the joint estimation of multiple impairments are derived. A minimum mean-square error based receiver is then proposed to compensate the effect of multiple impairments and decode each user's signal. Simulation results show that the performance of the proposed estimators is very close to the derived CRLBs at moderate-to-high signal-to-noise-ratios. It is also shown that the bit-error rate performance of the overall AF TWRN is close to a TWRN that is based on assumption of perfect knowledge of the synchronization parameters.
△ Less
Submitted 19 March, 2014; v1 submitted 25 September, 2013;
originally announced September 2013.
-
Spatio-spectral Formulation and Design of Spatially-Varying Filters for Signal Estimation on the 2-Sphere
Authors:
Zubair Khalid,
Rodney A. Kennedy,
Parastoo Sadeghi,
Salman Durrani
Abstract:
In this paper, we present an optimal filter for the enhancement or estimation of signals on the 2-sphere corrupted by noise, when both the signal and noise are realizations of anisotropic processes on the 2-sphere. The estimation of such a signal in the spatial or spectral domain separately can be shown to be inadequate. Therefore, we develop an optimal filter in the joint spatio-spectral domain b…
▽ More
In this paper, we present an optimal filter for the enhancement or estimation of signals on the 2-sphere corrupted by noise, when both the signal and noise are realizations of anisotropic processes on the 2-sphere. The estimation of such a signal in the spatial or spectral domain separately can be shown to be inadequate. Therefore, we develop an optimal filter in the joint spatio-spectral domain by using a framework recently presented in the literature --- the spatially localized spherical harmonic transform --- enabling such processing. Filtering of a signal in the spatio-spectral domain facilitates taking into account anisotropic properties of both the signal and noise processes. The proposed spatio-spectral filtering is optimal under the mean-square error criterion. The capability of the proposed filtering framework is demonstrated with by an example to estimate a signal corrupted by an anisotropic noise process.
△ Less
Submitted 30 August, 2013;
originally announced August 2013.
-
Error Performance Analysis of DF and AF Multi-way Relay Networks with BPSK Modulation
Authors:
Shama N. Islam,
Parastoo Sadeghi,
Salman Durrani
Abstract:
In this paper, we analyze the error performance of decode and forward (DF) and amplify and forward (AF) multi-way relay networks (MWRN). We consider a MWRN with pair-wise data exchange protocol using binary phase shift keying (BPSK) modulation in both additive white Gaussian noise (AWGN) and Rayleigh fading channels. We quantify the possible error events in an $L$-user DF or AF MWRN and derive acc…
▽ More
In this paper, we analyze the error performance of decode and forward (DF) and amplify and forward (AF) multi-way relay networks (MWRN). We consider a MWRN with pair-wise data exchange protocol using binary phase shift keying (BPSK) modulation in both additive white Gaussian noise (AWGN) and Rayleigh fading channels. We quantify the possible error events in an $L$-user DF or AF MWRN and derive accurate asymptotic bounds on the probability for the general case that a user incorrectly decodes the messages of exactly $k$ ($k\in[1,L-1]$) users. We show that at high signal-to-noise ratio (SNR), the higher order error events ($k\geq 3$) are less probable in AF MWRN, but all error events are equally probable in a DF MWRN. We derive the average BER of a user in a DF or AF MWRN in both AWGN and Rayleigh fading channels under high SNR conditions. Simulation results validate the correctness of the derived expressions. Our results show that at medium to high SNR, DF MWRN provides better error performance than AF MWRN in AWGN channels even with a large number of users (for example, L=100). Whereas, AF MWRN outperforms DF MWRN in Rayleigh fading channels even for much smaller number of users (for example, $L > 10$).
△ Less
Submitted 9 August, 2013;
originally announced August 2013.
-
Outage Probability in Arbitrarily-Shaped Finite Wireless Networks
Authors:
**g Guo,
Salman Durrani,
Xiangyun Zhou
Abstract:
This paper analyzes the outage performance in finite wireless networks. Unlike most prior works, which either assumed a specific network shape or considered a special location of the reference receiver, we propose two general frameworks for analytically computing the outage probability at any arbitrary location of an arbitrarily-shaped finite wireless network: (i) a moment generating function-base…
▽ More
This paper analyzes the outage performance in finite wireless networks. Unlike most prior works, which either assumed a specific network shape or considered a special location of the reference receiver, we propose two general frameworks for analytically computing the outage probability at any arbitrary location of an arbitrarily-shaped finite wireless network: (i) a moment generating function-based framework which is based on the numerical inversion of the Laplace transform of a cumulative distribution and (ii) a reference link power gain-based framework which exploits the distribution of the fading power gain between the reference transmitter and receiver. The outage probability is spatially averaged over both the fading distribution and the possible locations of the interferers. The boundary effects are accurately accounted for using the probability distribution function of the distance of a random node from the reference receiver. For the case of the node locations modeled by a Binomial point process and Nakagami-$m$ fading channel, we demonstrate the use of the proposed frameworks to evaluate the outage probability at any location inside either a disk or polygon region. The analysis illustrates the location dependent performance in finite wireless networks and highlights the importance of accurately modeling the boundary effects.
△ Less
Submitted 20 December, 2013; v1 submitted 23 April, 2013;
originally announced April 2013.
-
Relaying Protocols for Wireless Energy Harvesting and Information Processing
Authors:
A. A. Nasir,
X. Zhou,
S. Durrani,
R. A. Kennedy
Abstract:
An emerging solution for prolonging the lifetime of energy constrained relay nodes in wireless networks is to avail the ambient radio-frequency (RF) signal and to simultaneously harvest energy and process information. In this paper, an amplify-and-forward (AF) relaying network is considered, where an energy constrained relay node harvests energy from the received RF signal and uses that harvested…
▽ More
An emerging solution for prolonging the lifetime of energy constrained relay nodes in wireless networks is to avail the ambient radio-frequency (RF) signal and to simultaneously harvest energy and process information. In this paper, an amplify-and-forward (AF) relaying network is considered, where an energy constrained relay node harvests energy from the received RF signal and uses that harvested energy to forward the source information to the destination. Based on the time switching and power splitting receiver architectures, two relaying protocols, namely, i) time switching-based relaying (TSR) protocol and ii) power splitting-based relaying (PSR) protocol are proposed to enable energy harvesting and information processing at the relay. In order to determine the throughput, analytical expressions for the outage probability and the ergodic capacity are derived for delay-limited and delay-tolerant transmission modes, respectively. The numerical analysis provides practical insights into the effect of various system parameters, such as energy harvesting time, power splitting ratio, source transmission rate, source to relay distance, noise power, and energy harvesting efficiency, on the performance of wireless energy harvesting and information processing using AF relay nodes. In particular, the TSR protocol outperforms the PSR protocol in terms of throughput at relatively low signal-to-noise-ratios and high transmission rate.
△ Less
Submitted 25 June, 2013; v1 submitted 21 December, 2012;
originally announced December 2012.
-
A Tractable Framework for Exact Probability of Node Isolation and Minimum Node Degree Distribution in Finite Multi-hop Networks
Authors:
Zubair Khalid,
Salman Durrani,
**g Guo
Abstract:
This paper presents a tractable analytical framework for the exact calculation of probability of node isolation and minimum node degree distribution when $N$ sensor nodes are independently and uniformly distributed inside a finite square region. The proposed framework can accurately account for the boundary effects by partitioning the square into subregions, based on the transmission range and the…
▽ More
This paper presents a tractable analytical framework for the exact calculation of probability of node isolation and minimum node degree distribution when $N$ sensor nodes are independently and uniformly distributed inside a finite square region. The proposed framework can accurately account for the boundary effects by partitioning the square into subregions, based on the transmission range and the node location. We show that for each subregion, the probability that a random node falls inside a disk centered at an arbitrary node located in that subregion can be expressed analytically in closed-form. Using the results for the different subregions, we obtain the exact probability of node isolation and minimum node degree distribution that serves as an upper bound for the probability of $k$-connectivity. Our theoretical framework is validated by comparison with the simulation results and shows that the minimum node degree distribution serves as a tight upper bound for the probability of $k$-connectivity. The proposed framework provides a very useful tool to accurately account for the boundary effects in the design of finite wireless networks.
△ Less
Submitted 29 November, 2013; v1 submitted 6 December, 2012;
originally announced December 2012.
-
Distance Distributions in Regular Polygons
Authors:
Zubair Khalid,
Salman Durrani
Abstract:
This paper derives the exact cumulative density function of the distance between a randomly located node and any arbitrary reference point inside a regular $\el$-sided polygon. Using this result, we obtain the closed-form probability density function (PDF) of the Euclidean distance between any arbitrary reference point and its $n$-th neighbour node, when $N$ nodes are uniformly and independently d…
▽ More
This paper derives the exact cumulative density function of the distance between a randomly located node and any arbitrary reference point inside a regular $\el$-sided polygon. Using this result, we obtain the closed-form probability density function (PDF) of the Euclidean distance between any arbitrary reference point and its $n$-th neighbour node, when $N$ nodes are uniformly and independently distributed inside a regular $\ell$-sided polygon. First, we exploit the rotational symmetry of the regular polygons and quantify the effect of polygon sides and vertices on the distance distributions. Then we propose an algorithm to determine the distance distributions given any arbitrary location of the reference point inside the polygon. For the special case when the arbitrary reference point is located at the center of the polygon, our framework reproduces the existing result in the literature.
△ Less
Submitted 25 June, 2013; v1 submitted 24 July, 2012;
originally announced July 2012.
-
Fast directional spatially localized spherical harmonic transform
Authors:
Z. Khalid,
R. A. Kennedy,
S. Durrani,
P. Sadeghi,
Y. Wiaux,
J. D. McEwen
Abstract:
We propose a transform for signals defined on the sphere that reveals their localized directional content in the spatio-spectral domain when used in conjunction with an asymmetric window function. We call this transform the directional spatially localized spherical harmonic transform (directional SLSHT) which extends the SLSHT from the literature whose usefulness is limited to symmetric windows. W…
▽ More
We propose a transform for signals defined on the sphere that reveals their localized directional content in the spatio-spectral domain when used in conjunction with an asymmetric window function. We call this transform the directional spatially localized spherical harmonic transform (directional SLSHT) which extends the SLSHT from the literature whose usefulness is limited to symmetric windows. We present an inversion relation to synthesize the original signal from its directional-SLSHT distribution for an arbitrary window function. As an example of an asymmetric window, the most concentrated band-limited eigenfunction in an elliptical region on the sphere is proposed for directional spatio-spectral analysis and its effectiveness is illustrated on the synthetic and Mars topographic data-sets. Finally, since such typical data-sets on the sphere are of considerable size and the directional SLSHT is intrinsically computationally demanding depending on the band-limits of the signal and window, a fast algorithm for the efficient computation of the transform is developed. The floating point precision numerical accuracy of the fast algorithm is demonstrated and a full numerical complexity analysis is presented.
△ Less
Submitted 20 April, 2013; v1 submitted 23 July, 2012;
originally announced July 2012.
-
Hadamard Upper Bound (HUB) on Optimum Joint Decoding Capacity of Wyner Gaussian Cellular MAC
Authors:
M. Zeeshan Shakir,
Tariq S. Durrani,
Mohamed-Slim Alouini
Abstract:
This paper has been withdrawn by the authors.
This paper has been withdrawn by the authors.
△ Less
Submitted 28 February, 2011; v1 submitted 16 October, 2010;
originally announced October 2010.
-
MIMO Identical Eigenmode Transmission System (IETS) - A Channel Decomposition Perspective
Authors:
M. Zeeshan Shakir,
Tariq S. Durrani
Abstract:
In the past few years considerable attention has been given to the design of Multiple-Input Multiple-Output (MIMO) Eigenmode Transmission Systems (EMTS). This paper presents an in-depth analysis of a new MIMO eigenmode transmission strategy. The non-linear decomposition technique called Geometric Mean Decomposition (GMD) is employed for the formation of eigenmodes over MIMO flatfading channel. Exp…
▽ More
In the past few years considerable attention has been given to the design of Multiple-Input Multiple-Output (MIMO) Eigenmode Transmission Systems (EMTS). This paper presents an in-depth analysis of a new MIMO eigenmode transmission strategy. The non-linear decomposition technique called Geometric Mean Decomposition (GMD) is employed for the formation of eigenmodes over MIMO flatfading channel. Exploiting GMD technique, identical, parallel and independent transmission pipes are created for data transmission at higher rate. The system based on such decomposition technique is referred to as MIMO Identical Eigenmode Transmission System (IETS). The comparative analysis of the MIMO transceiver design exploiting nonlinear and linear decomposition techniques for variable constellation is presented in this paper. The new transmission strategy is tested in combination with the Vertical Bell Labs Layered Space Time (V-BLAST) decoding scheme using different number of antennas on both sides of the communication link. The analysis is supported by various simulation results.
△ Less
Submitted 19 September, 2010;
originally announced September 2010.
-
Design Guidelines for Training-based MIMO Systems with Feedback
Authors:
Xiangyun Zhou,
Parastoo Sadeghi,
Tharaka A. Lamahewa,
Salman Durrani
Abstract:
In this paper, we study the optimal training and data transmission strategies for block fading multiple-input multiple-output (MIMO) systems with feedback. We consider both the channel gain feedback (CGF) system and the channel covariance feedback (CCF) system. Using an accurate capacity lower bound as a figure of merit, we investigate the optimization problems on the temporal power allocation t…
▽ More
In this paper, we study the optimal training and data transmission strategies for block fading multiple-input multiple-output (MIMO) systems with feedback. We consider both the channel gain feedback (CGF) system and the channel covariance feedback (CCF) system. Using an accurate capacity lower bound as a figure of merit, we investigate the optimization problems on the temporal power allocation to training and data transmission as well as the training length. For CGF systems without feedback delay, we prove that the optimal solutions coincide with those for non-feedback systems. Moreover, we show that these solutions stay nearly optimal even in the presence of feedback delay. This finding is important for practical MIMO training design. For CCF systems, the optimal training length can be less than the number of transmit antennas, which is verified through numerical analysis. Taking this fact into account, we propose a simple yet near optimal transmission strategy for CCF systems, and derive the optimal temporal power allocation over pilot and data transmission.
△ Less
Submitted 2 March, 2009;
originally announced March 2009.