-
Joint data rate and EMF exposure analysis in user-centric cell-free massive MIMO networks
Authors:
Charles Wiame,
Claude Oestges,
Luc Vandendorpe
Abstract:
The objective of this study is to analyze the statistics of the data rate and of the incident power density (IPD) in user-centric cell-free networks (UCCFNs). To this purpose, our analysis proposes a number of performance metrics derived using stochastic geometry (SG). On the one hand, the first moments and the marginal distribution of the IPD are calculated. On the other hand, bounds on the joint…
▽ More
The objective of this study is to analyze the statistics of the data rate and of the incident power density (IPD) in user-centric cell-free networks (UCCFNs). To this purpose, our analysis proposes a number of performance metrics derived using stochastic geometry (SG). On the one hand, the first moments and the marginal distribution of the IPD are calculated. On the other hand, bounds on the joint distributions of rate and IPD are provided for two scenarios: when it is relevant to obtain IPD values above a given threshold (for energy harvesting purposes), and when these values should instead remain below the threshold (for public health reasons). In addition to deriving these metrics, this work incorporates features related to UCCFNs which are new in SG models: a power allocation based on collective channel statistics, as well as the presence of potential overlaps between adjacent clusters. Our numerical results illustrate the achievable trade-offs between the rate and IPD performance. For the considered system, these results also highlight the existence of an optimal node density maximizing the joint distributions.
(This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible.)
△ Less
Submitted 26 January, 2023;
originally announced January 2023.
-
Real-Time CRLB based Antenna Selection in Planar Antenna Arrays
Authors:
Masoud Arash,
Ivan Stupia,
Luc Vandendorpe
Abstract:
Estimation of User Terminals' (UTs') Angle of Arrival (AoA) plays a significant role in the next generation of wireless systems. Due to high demands, energy efficiency concerns, and scarcity of available resources, it is pivotal how these resources are used. Installed antennas and their corresponding hardware at the Base Station (BS) are of these resources. In this paper, we address the problem of…
▽ More
Estimation of User Terminals' (UTs') Angle of Arrival (AoA) plays a significant role in the next generation of wireless systems. Due to high demands, energy efficiency concerns, and scarcity of available resources, it is pivotal how these resources are used. Installed antennas and their corresponding hardware at the Base Station (BS) are of these resources. In this paper, we address the problem of antenna selection to minimize Cramer-Rao Lower Bound (CRLB) of a planar antenna array when fewer antennas than total available antennas have to be used for a UT. First, the optimal antenna selection strategy to minimize the expected CRLB is proposed. Then, using this strategy as a preliminary step, we present a two-stage greedy antenna selection method whose goal is to minimize the instantaneous CRLB. The optimal start point of the greedy algorithm is presented alongside some methods to reduce the algorithm's computational complexity. Numerical results confirm the accuracy of proposed solutions. They demonstrate that the proposed antenna selection method only requires a small proportion of the total available antennas to accomplish a significant amount of the total performance, enhancing hardware utilization efficiency. Also, it is shown that the presented algorithm has a high error tolerance.
△ Less
Submitted 15 August, 2022; v1 submitted 29 November, 2021;
originally announced November 2021.
-
Sharing is Caring: A Mobile Edge Computing Perspective
Authors:
Nilanjan Biswas,
Hamed Mirghasemi,
Luc Vandendorpe
Abstract:
In this paper, we consider a system model in conjunction with two major technologies in 5G communications, i.e., mobile edge computing and spectrum sharing. An IoT network, which does not have access to any licensed spectrum, carries its computational task offloading activities with help of spectrum sharing. The IoT network cooperates with a licensed spectrum holding network by relaying its data a…
▽ More
In this paper, we consider a system model in conjunction with two major technologies in 5G communications, i.e., mobile edge computing and spectrum sharing. An IoT network, which does not have access to any licensed spectrum, carries its computational task offloading activities with help of spectrum sharing. The IoT network cooperates with a licensed spectrum holding network by relaying its data and in return gets access to the licensed spectrum. The licensed spectrum holding network focuses on throughput maximization, whereas, the IoT network tries to maximize task computation rate. We formulate an optimization problem giving importance to both networks' interests. Typical IoT nodes may be energy-constrained, which is considered along with task computation time constraints. Parallel computation is considered while computing IoT nodes' computational tasks at the mobile edge computing server, where the processor is allocated based on IoT nodes' offloading capabilities. The advantage of such processor allocation is shown in the result section. Moreover, we also show how both IoT and licensed spectrum holding networks benefit from the spectrum sharing by caring for each other requirements, which echoes the fact, i.e., Sharing is Caring.
△ Less
Submitted 11 July, 2021;
originally announced July 2021.
-
Stochastic geometry analysis of a distance-based JT scheme in C-RAN
Authors:
Charles Wiame,
Luc Vandendorpe,
Claude Oestges
Abstract:
This paper considers a joint transmission scheme (JT) developed for cloud radio access networks (C-RANs). This proposed scheme features cooperative sets of remote radio heads (RRH) defined in a disk around each user location. The nodes belonging to each of these sets perform a weighted maximum ratio transmission to jointly serve the user. The powers allocated to the beamformers are computed at the…
▽ More
This paper considers a joint transmission scheme (JT) developed for cloud radio access networks (C-RANs). This proposed scheme features cooperative sets of remote radio heads (RRH) defined in a disk around each user location. The nodes belonging to each of these sets perform a weighted maximum ratio transmission to jointly serve the user. The powers allocated to the beamformers are computed at the network baseband unit, taking into account channel gains, as well an equity criterion between the users. In comparison with the existing literature, our model includes a saturation assumption, with all transmissions taking place over the same resource block. A RRH belonging to multiple sets can hence transmit to several users simultaneously. The distributions of the network coverage and spectral efficiency are calculated by means of stochastic geometry (SG), and compared with Monte Carlo simulations. The derived expressions take into account the power allocation, the user and RRH densities, as well as the statistical correlation resulting from the set overlaps.
△ Less
Submitted 14 April, 2021;
originally announced April 2021.
-
One Bit to Rule Them All : Binarizing the Reconstruction in 1-bit Compressive Sensing
Authors:
Thomas Feuillen,
Mike Davies,
Luc Vandendorpe,
Laurent Jacques
Abstract:
This work focuses on the reconstruction of sparse signals from their 1-bit measurements. The context is the one of 1-bit compressive sensing where the measurements amount to quantizing (dithered) random projections. Our main contribution shows that, in addition to the measurement process, we can additionally reconstruct the signal with a binarization of the sensing matrix. This binary representati…
▽ More
This work focuses on the reconstruction of sparse signals from their 1-bit measurements. The context is the one of 1-bit compressive sensing where the measurements amount to quantizing (dithered) random projections. Our main contribution shows that, in addition to the measurement process, we can additionally reconstruct the signal with a binarization of the sensing matrix. This binary representation of both the measurements and sensing matrix can dramatically simplify the hardware architecture on embedded systems, enabling cheaper and more power efficient alternatives. Within this framework, given a sensing matrix respecting the restricted isometry property (RIP), we prove that for any sparse signal the quantized projected back-projection (QPBP) algorithm achieves a reconstruction error decaying like O(m-1/2)when the number of measurements m increases. Simulations highlight the practicality of the developed scheme for different sensing scenarios, including random partial Fourier sensing.
△ Less
Submitted 24 August, 2020; v1 submitted 17 August, 2020;
originally announced August 2020.
-
Clustering and Power Optimization for NOMA Multi-Objective Problems
Authors:
Zijian Wang,
Mylene Pischella,
Luc Vandendorpe
Abstract:
This paper considers uplink multiple access (MA) transmissions, where the MA technique is adaptively selected between Non Orthogonal Multiple Access (NOMA) and Orthogonal Multiple Access (OMA). Two types of users, namely Internet of Things (IoT) and enhanced mobile broadband (eMBB) coexist with different metrics to be optimized, energy efficiency (EE) for IoT and spectral efficiency (SE) for eMBB.…
▽ More
This paper considers uplink multiple access (MA) transmissions, where the MA technique is adaptively selected between Non Orthogonal Multiple Access (NOMA) and Orthogonal Multiple Access (OMA). Two types of users, namely Internet of Things (IoT) and enhanced mobile broadband (eMBB) coexist with different metrics to be optimized, energy efficiency (EE) for IoT and spectral efficiency (SE) for eMBB. The corresponding multi-objective power allocation problems aiming at maximizing a weighted sum of EE and SE are solved for both NOMA and OMA. Based on the identification of the best MA strategy, a clustering algorithm is then proposed to maximize the multi-objective metric per cluster as well as NOMA use. The proposed clustering, power allocation and MA selection algorithm is shown to outperform other clustering solutions and non-adaptive MA techniques.
△ Less
Submitted 26 June, 2020; v1 submitted 24 June, 2020;
originally announced June 2020.
-
Performance Analysis of Uplink Adaptive NOMA Depending on Channel Knowledge
Authors:
Mylene Pischella,
Ivan Stupia,
Luc Vandendorpe
Abstract:
Non Orthogonal Multiple Access (NOMA) is a key technique to satisfy large users densities in future wireless networks. However, NOMA may provide poor performance compared to Orthogonal Multiple Access (OMA) due to inter-user interference. In this paper, we obtain closed-form expressions of the uplink NOMA and OMA throughputs when no Channel State Information at Transmitter (CSIT) is available, and…
▽ More
Non Orthogonal Multiple Access (NOMA) is a key technique to satisfy large users densities in future wireless networks. However, NOMA may provide poor performance compared to Orthogonal Multiple Access (OMA) due to inter-user interference. In this paper, we obtain closed-form expressions of the uplink NOMA and OMA throughputs when no Channel State Information at Transmitter (CSIT) is available, and of the average data rates assuming that instantaneous rates should be larger than a minimum threshold when full CSIT is available. Analytical comparisons of OMA and NOMA prove that there is no global dominant strategy valid in all situations. Based on this conclusion, we propose a new multiple-access (MA) strategy called NOMA-Adaptive (NOMA-A) that selects the best MA technique between OMA and NOMA. NOMA-A aims at maximizing the sum throughput in the no CSIT case, and the probability that both users are active in the full CSIT case. NOMA-A is shown to outperform the other strategies in terms of sum throughput and rate.
△ Less
Submitted 6 April, 2020;
originally announced April 2020.
-
Leveraging User-Diversity in Energy-Efficient Edge-Facilitated Collaborative Fog Computing
Authors:
Antoine Paris,
Hamed Mirghasemi,
Ivan Stupia,
Luc Vandendorpe
Abstract:
Motivated by applications such as on-device collaborative neural network inference, this work investigates edge-facilitated collaborative fog computing - in which edge-devices collaborate with each other and with the edge of the network to complete a processing task - to augment the computing capabilities of individual edge-devices while optimizing the collaboration for energy-efficiency. Collabor…
▽ More
Motivated by applications such as on-device collaborative neural network inference, this work investigates edge-facilitated collaborative fog computing - in which edge-devices collaborate with each other and with the edge of the network to complete a processing task - to augment the computing capabilities of individual edge-devices while optimizing the collaboration for energy-efficiency. Collaborative computing is modeled using the Map-Reduce distributed computing framework, consisting in two rounds of computations separated by a communication phase. The computing load is optimally distributed among the edge-devices, taking into account their diversity in term of computing and communications capabilities. In addition, edge-devices local parameters such as CPU clock frequency and RF transmit power are also optimized for energy-efficiency. The corresponding optimization problem can be shown to be convex and optimality conditions can be obtained through Lagrange duality theory. A waterfilling-like interpretation for the size of the computing load assigned to each edge-device is given. Numerical experiments demonstrate the benefits of the proposed optimal collaborative-computing scheme over various other schemes in several respects. Most notably, the proposed scheme exhibits increased probability of successfully dealing with heavier computations and/or smaller latency along with energy-efficiency gains of up to two orders of magnitude. Both improvements come from the scheme ability to optimally leverage edge-devices diversity.
△ Less
Submitted 21 October, 2020; v1 submitted 31 March, 2020;
originally announced April 2020.
-
Localization Efficiency in Massive MIMO Systems
Authors:
Masoud Arash,
Hamed Mirghasemi,
Ivan Stupia,
Luc Vandendorpe
Abstract:
In the next generation of wireless systems, Massive MIMO offers high angular resolution for localization. By virtue of large number of antennas, the Angle of Arrival (AoA) of User Terminals (UTs) can be estimated with high accuracy. According to Dense Multipath Component (DMC) channel model, local scatters around UTs can create different multipath signals for each antenna at the Base Station (BS).…
▽ More
In the next generation of wireless systems, Massive MIMO offers high angular resolution for localization. By virtue of large number of antennas, the Angle of Arrival (AoA) of User Terminals (UTs) can be estimated with high accuracy. According to Dense Multipath Component (DMC) channel model, local scatters around UTs can create different multipath signals for each antenna at the Base Station (BS). We obtain a deterministic form for the Cramer-Rao Lower Bound (CRLB) in a multi-user scenario when the contribution of the multipath signals is considered. We do this when the multipath signals are independent and identically distributed (i.i.d) with arbitrary distribution. Then, we redefine a localization efficiency function for a multi-user scenario and numerically optimize it with respect to (w.r.t) the number of antennas. We prove when only a subset of the available antennas is used, CRLB can be minimized w.r.t which set of antennas is used. Then, an antenna selection strategy that minimizes CRLB is proposed. As a benchmark, we apply the proposed antenna selection scheme to the MUltiple SIgnal Classification (MUSIC) algorithm and study its efficiency. Numerical results validate the accuracy of our analysis and show significant improvement in efficiency when the proposed antenna selection strategy is employed.
△ Less
Submitted 9 March, 2021; v1 submitted 17 March, 2020;
originally announced March 2020.
-
(l1,l2)-RIP and Projected Back-Projection Reconstruction for Phase-Only Measurements
Authors:
Thomas Feuillen,
Mike E. Davies,
Luc Vandendorpe,
Laurent Jacques
Abstract:
This letter analyzes the performances of a simple reconstruction method, namely the Projected Back-Projection (PBP), for estimating the direction of a sparse signal from its phase-only (or amplitude-less) complex Gaussian random measurements, i.e., an extension of one-bit compressive sensing to the complex field. To study the performances of this algorithm, we show that complex Gaussian random mat…
▽ More
This letter analyzes the performances of a simple reconstruction method, namely the Projected Back-Projection (PBP), for estimating the direction of a sparse signal from its phase-only (or amplitude-less) complex Gaussian random measurements, i.e., an extension of one-bit compressive sensing to the complex field. To study the performances of this algorithm, we show that complex Gaussian random matrices respect, with high probability, a variant of the Restricted Isometry Property (RIP) relating to the l1 -norm of the sparse signal measurements to their l2 -norm. This property allows us to upper-bound the reconstruction error of PBP in the presence of phase noise. Monte Carlo simulations are performed to highlight the performance of our approach in this phase-only acquisition model when compared to error achieved by PBP in classical compressive sensing.
△ Less
Submitted 5 December, 2019;
originally announced December 2019.
-
Online Power Allocation at Energy Harvesting Transmitter for Multiple Receivers with and without Individual Rate Constraints for OMA and NOMA Transmissions
Authors:
Mateen Ashraf,
Zijian Wang,
Luc Vandendorpe
Abstract:
In this paper, we propose an online power allocation scheme to maximize the time averaged sum rate for multiple downlink receivers with energy harvesting transmitter. The transmitter employs non-orthogonal multiple access (NOMA) and/or orthogonal multiple access (OMA) to transmit data to multiple users. Additionally, we consider the scenario where each individual user has a quality of service cons…
▽ More
In this paper, we propose an online power allocation scheme to maximize the time averaged sum rate for multiple downlink receivers with energy harvesting transmitter. The transmitter employs non-orthogonal multiple access (NOMA) and/or orthogonal multiple access (OMA) to transmit data to multiple users. Additionally, we consider the scenario where each individual user has a quality of service constraint on its required instantaneous rate. The decisions of total transmit power and power allocation for different users in a given time slot are obtained with the help of Lyapunov optimization technique. The proposed schemes do not require any statistical information of the channel states and the harvested energy. The proposed power allocation schemes entail in small complexity based power allocation decisions. Therefore, the proposed schemes can provide solutions in real time and are more suited for online power allocation problems where the system state parameters (e.g. channel state, harvested energy etc) change quickly. The performances of the proposed schemes are demonstrated with the help of simulation results.
△ Less
Submitted 20 November, 2019;
originally announced November 2019.
-
Minimization of Sum Inverse Energy Efficiency for Multiple Base Station Systems
Authors:
Zijian Wang,
Luc Vandendorpe,
Mateen Ashraf,
Yuting Mou,
Nafiseh Janatian
Abstract:
A sum inverse energy efficiency (SIEE) minimization problem is solved. Compared with conventional sum energy efficiency (EE) maximization problems, minimizing SIEE achieves a better fairness. The paper begins by proposing a framework for solving sum-fraction minimization (SFMin) problems, then uses a novel transform to solve the SIEE minimization problem in a multiple base station (BS) system. Aft…
▽ More
A sum inverse energy efficiency (SIEE) minimization problem is solved. Compared with conventional sum energy efficiency (EE) maximization problems, minimizing SIEE achieves a better fairness. The paper begins by proposing a framework for solving sum-fraction minimization (SFMin) problems, then uses a novel transform to solve the SIEE minimization problem in a multiple base station (BS) system. After the reformulation into a multi-convex problem, the alternating direction method of multipliers (ADMM) is used to further simplify the problem. Numerical results confirm the efficiency of the transform and the fairness improvement of the SIEE minimization. Simulation results show that the algorithm convergences fast and the ADMM method is efficient.
△ Less
Submitted 10 September, 2019;
originally announced September 2019.
-
Weighted Spectral Efficiency Optimization for Hybrid Beamforming in Multiuser Massive MIMO-OFDM Systems
Authors:
**gbo Du,
Wei Xu,
Chunming Zhao,
Luc Vandendorpe
Abstract:
In this paper, we consider hybrid beamforming designs for multiuser massive multiple-input multiple-output (MIMO)-orthogonal frequency division multiplexing (OFDM) systems. Aiming at maximizing the weighted spectral efficiency, we propose one alternating maximization framework where the analog precoding is optimized by Riemannian manifold optimization. If the digital precoding is optimized by a lo…
▽ More
In this paper, we consider hybrid beamforming designs for multiuser massive multiple-input multiple-output (MIMO)-orthogonal frequency division multiplexing (OFDM) systems. Aiming at maximizing the weighted spectral efficiency, we propose one alternating maximization framework where the analog precoding is optimized by Riemannian manifold optimization. If the digital precoding is optimized by a locally optimal algorithm, we obtain a locally optimal alternating maximization algorithm. In contrast, if we use a weighted minimum mean square error (MMSE)-based iterative algorithm for digital precoding, we obtain a suboptimal alternating maximization algorithm with reduced complexity in each iteration. By characterizing the upper bound of the weighted arithmetic and geometric means of mean square errors (MSEs), it is shown that the two alternating maximization algorithms have similar performance when the user specific weights do not have big differences. Verified by numerical results, the performance gap between the two alternating maximization algorithms becomes large when the ratio of the maximal and minimal weights among users is very large. Moreover, we also propose a low-complexity closed-form method without iterations. It employs matrix decomposition for the analog beamforming and weighted MMSE for the digital beamforming. Although it is not supposed to maximize the weighted spectral efficiency, it exhibits small performance deterioration compared to the two iterative alternating maximization algorithms and it qualifies as a good initialization for iterative algorithms, saving thereby iterations.
△ Less
Submitted 29 July, 2019;
originally announced July 2019.
-
Energy-Efficient Edge-Facilitated Wireless Collaborative Computing using Map-Reduce
Authors:
Antoine Paris,
Hamed Mirghasemi,
Ivan Stupia,
Luc Vandendorpe
Abstract:
In this work, a heterogeneous set of wireless devices sharing a common access point collaborates to perform a set of tasks. Using the Map-Reduce distributed computing framework, the tasks are optimally distributed amongst the nodes with the objective of minimizing the total energy consumption of the nodes while satisfying a latency constraint. The derived optimal collaborative-computing scheme tak…
▽ More
In this work, a heterogeneous set of wireless devices sharing a common access point collaborates to perform a set of tasks. Using the Map-Reduce distributed computing framework, the tasks are optimally distributed amongst the nodes with the objective of minimizing the total energy consumption of the nodes while satisfying a latency constraint. The derived optimal collaborative-computing scheme takes into account both the computing capabilities of the nodes and the strength of their communication links. Numerical simulations illustrate the benefits of the proposed optimal collaborative-computing scheme over a blind collaborative-computing scheme and the non-collaborative scenario, both in term of energy savings and achievable latency. The proposed optimal scheme also exhibits the interesting feature of allowing to trade energy for latency, and vice versa.
△ Less
Submitted 6 March, 2019;
originally announced March 2019.
-
SWIPT-based Real-Time Mobile Computing Systems: A Stochastic Geometry Perspective
Authors:
Ayse Ipek Akin,
Nafiseh Janatian,
Ivan Stupia,
Luc Vandendorpe
Abstract:
Driven by the Internet of Things vision, recent years have seen the rise of new horizons for the wireless ecosystem in which a very large number of mobile low power devices interact to run sophisticated applications. The main hindrance to the massive deployment of low power nodes is most probably the prohibitive maintenance cost of battery replacement and the ecotoxicity of the battery production/…
▽ More
Driven by the Internet of Things vision, recent years have seen the rise of new horizons for the wireless ecosystem in which a very large number of mobile low power devices interact to run sophisticated applications. The main hindrance to the massive deployment of low power nodes is most probably the prohibitive maintenance cost of battery replacement and the ecotoxicity of the battery production/end-of-life. An emerging research direction to avoid battery replacement is the combination of radio frequency energy harvesting and mobile computing (MC). In this paper, we propose the use of simultaneous information and power transfer (SWIPT) to control the distributed computation process while delivering power to perform the computation tasks requested. A real-time MC system is considered, meaning that the trade-off between the information rate and the energy harvested must be carefully chosen to guarantee that the CPU may perform tasks of given complexity before receiving a new control signal. In order to provide a system-level perspective on the performance of SWIPT-MC networks, we propose a mathematical framework based on stochastic geometry to characterise the rate-energy trade-off of the system. The resulting achievable performance region is then put in relation with the CPU energy consumption to investigate the operating conditions of real-time computing systems. Finally, numerical results illustrate the joint effect of the network densification and the propagation environment on the optimisation of the CPU usage.
△ Less
Submitted 9 July, 2018;
originally announced July 2018.
-
On the effect of blockage objects in dense MIMO SWIPT networks
Authors:
Ayse Ipek Akin,
Ivan Stupia,
Luc Vandendorpe
Abstract:
Simultaneous information and power transfer (SWIPT) is characterised by the ambiguous role of multi-user interference. In short, the beneficial effect of multi-user interference on RF energy harvesting is obtained at the price of a reduced link capacity, thus originating nontrivial trade-offs between the achievable information rate and the harvestable energy. Arguably, in indoor environments, this…
▽ More
Simultaneous information and power transfer (SWIPT) is characterised by the ambiguous role of multi-user interference. In short, the beneficial effect of multi-user interference on RF energy harvesting is obtained at the price of a reduced link capacity, thus originating nontrivial trade-offs between the achievable information rate and the harvestable energy. Arguably, in indoor environments, this trade-off might be affected by the propagation loss due to blockage objects like walls. Hence, a couple of fundamental questions arise. How much must the network elements be densified to counteract the blockage attenuation? Is blockage always detrimental on the achievable rate-energy trade-off? In this paper, we analyse the performance of an indoor multiple-input multiple-output (MIMO) SWIPT-enabled network in the attempt to shed a light of those questions. The effects of the obstacles are examined with the help of a stochastic approach in which energy transmitters (also referred to as power heads) are located by using a Poisson Point Process and walls are generated through a Manhattan Poisson Line Process. The stochastic behaviour of the signal attenuation and the multi-user interference is studied to obtain the Joint Complementary Cumulative Distribution Function (J-CCDF) of information rate and harvested power. Theoretical results are validated through Monte Carlo simulations. Eventually, the rate-energy trade-off is presented as a function of the frequency of walls to emphasise the cross-dependences between the deployment of the network elements and the topology of the venue.
△ Less
Submitted 14 January, 2018;
originally announced January 2018.
-
Pilot Contamination for Wideband Massive MMO: Number of cells Vs Multipath
Authors:
Tadilo Endeshaw Bogale,
Long Bao Le,
Xianbin Wang,
Luc Vandendorpe
Abstract:
This paper proposes a novel joint channel estimation and beamforming approach for multicell wideband massive multiple input multiple output (MIMO) systems. With the proposed channel estimation and beamforming approach, we determine the number of cells $N_c$ that can utilize the same time and frequency resource while mitigating the effect of pilot contamination. The proposed approach exploits the m…
▽ More
This paper proposes a novel joint channel estimation and beamforming approach for multicell wideband massive multiple input multiple output (MIMO) systems. With the proposed channel estimation and beamforming approach, we determine the number of cells $N_c$ that can utilize the same time and frequency resource while mitigating the effect of pilot contamination. The proposed approach exploits the multipath characteristics of wideband channels. Specifically, when the channel has a maximum of $L$ multipath taps, \textcolor{red}{it is shown that $N_c\leq L$ cells can estimate the channels of their user equipments (UEs) and perform beamforming while mitigating the effect of pilot contamination.} In a typical long term evolution (LTE) channel environment having delay spread $T_d=4.69μ$ second and channel bandwidth $B=2.5$MHz, we have found that $L=18$ cells can use this band. In practice, $T_d$ is constant for a particular environment and carrier frequency, and hence $L$ increases as the bandwidth increases. All the analytical expressions have been validated, and the superiority of the proposed design over the existing ones is demonstrated using extensive numerical simulations both for correlated and uncorrelated channels. The proposed channel estimation and beamforming design is linear and simple to implement.
△ Less
Submitted 14 August, 2017;
originally announced August 2017.
-
Multipath Multiplexing for Capacity Enhancement in SIMO Wireless Systems
Authors:
Tadilo Endeshaw Bogale,
Long Bao Le,
Xianbin Wang,
Luc Vandendorpe
Abstract:
This paper proposes a novel and simple orthogonal faster than Nyquist (OFTN) data transmission and detection approach for a single input multiple output (SIMO) system. It is assumed that the signal having a bandwidth $B$ is transmitted through a wireless channel with $L$ multipath components. Under this assumption, the current paper provides a novel and simple OFTN transmission and symbol-by-symbo…
▽ More
This paper proposes a novel and simple orthogonal faster than Nyquist (OFTN) data transmission and detection approach for a single input multiple output (SIMO) system. It is assumed that the signal having a bandwidth $B$ is transmitted through a wireless channel with $L$ multipath components. Under this assumption, the current paper provides a novel and simple OFTN transmission and symbol-by-symbol detection approach that exploits the multiplexing gain obtained by the multipath characteristic of wideband wireless channels. It is shown that the proposed design can achieve a higher transmission rate than the existing one (i.e., orthogonal frequency division multiplexing (OFDM)). Furthermore, the achievable rate gap between the proposed approach and that of the OFDM increases as the number of receiver antennas increases for a fixed value of $L$. This implies that the performance gain of the proposed approach can be very significant for a large-scale multi-antenna wireless system. The superiority of the proposed approach is shown theoretically and confirmed via numerical simulations. {Specifically, we have found {upper-bound average} rates of 15 bps/Hz and 28 bps/Hz with the OFDM and proposed approaches, respectively, in a Rayleigh fading channel with 32 receive antennas and signal to noise ratio (SNR) of 15.3 dB. The extension of the proposed approach for different system setups and associated research problems is also discussed.
△ Less
Submitted 21 July, 2017;
originally announced July 2017.
-
Joint MOO of Transmit Precoding and Receiver Design in a Downlink Time Switching MISO SWIPT System
Authors:
Nafiseh Janatian,
Ivan Stupia,
Luc Vandendorpe
Abstract:
In this paper, we consider a time-switching (TS) co-located simultaneous wireless information and power transfer (SWIPT) system consisting of multiple multi-antenna access points which serve multiple single antenna users. In this scenario, we propose a multi-objective optimization (MOO) framework to design jointly the Pareto optimal beamforming vector and the TS ratio for each receiver. The object…
▽ More
In this paper, we consider a time-switching (TS) co-located simultaneous wireless information and power transfer (SWIPT) system consisting of multiple multi-antenna access points which serve multiple single antenna users. In this scenario, we propose a multi-objective optimization (MOO) framework to design jointly the Pareto optimal beamforming vector and the TS ratio for each receiver. The objective is to maximize the utility vector including the achieved data rates and the harvested energies of all users simultaneously. This problem is a non-convex rank-constrained MOO problem which is relaxed and transformed into a non-convex semidefinite program (SDP) based on the weighted Chebycheff method. The majorization-minimization algorithm is utilized to solve the nonconvex SDP and the optimal solution is proved to satisfy the rank constraint. We also study the problem of optimizing the beamforming vectors in a fixed TS ratio scenario with the same approach. Numerical results are provided for two coordinated access points with MISO configuration. The results illustrate the trade-off between harvested energy and information data rate objectives and show the effect of optimizing the precoding strategy and TS ratio on this trade-off.
△ Less
Submitted 26 October, 2016;
originally announced October 2016.
-
Pilot Contamination Mitigation for Wideband Massive MMO: Number of Cells Vs Multipath
Authors:
Tadilo Endeshaw Bogale,
Long Bao Le,
Xianbin Wang,
Luc Vandendorpe
Abstract:
This paper proposes novel joint channel estimation and beamforming approach for multicell wideband massive multiple input multiple output (MIMO) systems. Using our channel estimation and beamforming approach, we determine the number of cells $N_c$ that can utilize the same time and frequency resource while mitigating the effect of pilot contamination. The proposed approach exploits the multipath c…
▽ More
This paper proposes novel joint channel estimation and beamforming approach for multicell wideband massive multiple input multiple output (MIMO) systems. Using our channel estimation and beamforming approach, we determine the number of cells $N_c$ that can utilize the same time and frequency resource while mitigating the effect of pilot contamination. The proposed approach exploits the multipath characteristics of wideband channels. Specifically, when the channel has $L$ multipath taps, it is shown that $N_c\leq L$ cells can reliably estimate the channels of their user equipments (UEs) and perform beamforming while mitigating the effect of pilot contamination. For example, in a long term evolution (LTE) channel environment having delay spread $T_d=4.69μ$ second and channel bandwidth $B=2.5$MHz, we have found that $L=18$ cells can use this band. In practice, $T_d$ is constant for a particular environment and carrier frequency, and hence $L$ increases as the bandwidth increases. The proposed channel estimation and beamforming design is linear, simple to implement and significantly outperforms the existing designs, and is validated by extensive simulations.
△ Less
Submitted 16 September, 2015;
originally announced September 2015.
-
Energy Efficient Precoder Design for MIMO-OFDM with Rate-dependent Circuit Power
Authors:
Zijian Wang,
Ivan Stupia,
Luc Vandendorpe
Abstract:
This paper studies an energy efficient design of precoders for point-to-point multiple-input-multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) systems. Differently from traditional approaches, the optimal power allocation strategy is studied by modelling the circuit power as a rate-dependent function. We show that if the circuit power is a constant plus an increasing and con…
▽ More
This paper studies an energy efficient design of precoders for point-to-point multiple-input-multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) systems. Differently from traditional approaches, the optimal power allocation strategy is studied by modelling the circuit power as a rate-dependent function. We show that if the circuit power is a constant plus an increasing and convex function of the transmission rate, the problem of minimizing the consumed energy per bit received can be reformulated as a convex fractional program and solved by means of a bisection algorithm. The impact of the some system parameters is investigated either analytically or by means of computational results.
△ Less
Submitted 17 March, 2015;
originally announced March 2015.
-
On the Number of RF Chains and Phase Shifters, and Scheduling Design with Hybrid Analog-Digital Beamforming
Authors:
Tadilo Endeshaw Bogale,
Long Bao Le,
Afshin Haghighat,
Luc Vandendorpe
Abstract:
This paper considers hybrid beamforming (HB) for downlink multiuser massive multiple input multiple output (MIMO) systems with frequency selective channels. For this system, first we determine the required number of radio frequency (RF) chains and phase shifters (PSs) such that the proposed HB achieves the same performance as that of the digital beamforming (DB) which utilizes $N$ (number of trans…
▽ More
This paper considers hybrid beamforming (HB) for downlink multiuser massive multiple input multiple output (MIMO) systems with frequency selective channels. For this system, first we determine the required number of radio frequency (RF) chains and phase shifters (PSs) such that the proposed HB achieves the same performance as that of the digital beamforming (DB) which utilizes $N$ (number of transmitter antennas) RF chains. We show that the performance of the DB can be achieved with our HB just by utilizing $r_t$ RF chains and $2r_t(N-r_t + 1)$ PSs, where $r_t \leq N$ is the rank of the combined digital precoder matrices of all sub-carriers. Second, we provide a simple and novel approach to reduce the number of PSs with only a negligible performance degradation. Numerical results reveal that only $20-40$ PSs per RF chain are sufficient for practically relevant parameter settings. Finally, for the scenario where the deployed number of RF chains $(N_a)$ is less than $r_t$, we propose a simple user scheduling algorithm to select the best set of users in each sub-carrier. Simulation results validate theoretical expressions, and demonstrate the superiority of the proposed HB design over the existing HB designs in both flat fading and frequency selective channels.
△ Less
Submitted 24 July, 2016; v1 submitted 10 September, 2014;
originally announced October 2014.
-
Wideband Sensing and Optimization for Cognitive Radio Networks with Noise Variance Uncertainty
Authors:
Tadilo Endeshaw Bogale,
Luc Vandendorpe,
Long Bao Le
Abstract:
This paper considers wide-band spectrum sensing and optimization for cognitive radio (CR) networks with noise variance uncertainty. It is assumed that the considered wide-band contains one or more white sub-bands. Under this assumption, we consider throughput maximization of the CR network while appropriately protecting the primary network. We address this problem as follows. First, we propose nov…
▽ More
This paper considers wide-band spectrum sensing and optimization for cognitive radio (CR) networks with noise variance uncertainty. It is assumed that the considered wide-band contains one or more white sub-bands. Under this assumption, we consider throughput maximization of the CR network while appropriately protecting the primary network. We address this problem as follows. First, we propose novel ratio based test statistics for detecting the edges of each sub-band. Second, we employ simple energy comparison approach to choose one reference white sub-band. Third, we propose novel generalized energy detector (GED) for examining each of the remaining sub-bands by exploiting the noise information of the reference white sub-band. Finally, we optimize the sensing time ($T_o$) to maximize the CR network throughput using the detection and false alarm probabilities of the GED. The proposed GED does not suffer from signal to noise ratio (SNR) wall and outperforms the existing signal detectors. Moreover, the relationship between the proposed GED and conventional energy detector (CED) is quantified analytically. We show that the optimal $T_o$ depends on the noise variance information. In particular, with $10$TV bands, SNR=$-20$dB and $2$s frame duration, we found that the optimal $T_o$ is $28.5$ms ($50.6$ms) with perfect (imperfect) noise variance scenario.
△ Less
Submitted 10 September, 2014;
originally announced September 2014.
-
Compute-and-Forward on a Multi-User Multi-Relay Channel
Authors:
Mohieddine El Soussi,
Abdellatif Zaidi,
Luc Vandendorpe
Abstract:
In this paper, we consider a system in which multiple users communicate with a destination with the help of multiple half-duplex relays. Based on the compute-and-forward scheme, each relay, instead of decoding the users' messages, decodes an integer-valued linear combination that relates the transmitted messages. Then, it forwards the linear combination towards the destination. Given these linear…
▽ More
In this paper, we consider a system in which multiple users communicate with a destination with the help of multiple half-duplex relays. Based on the compute-and-forward scheme, each relay, instead of decoding the users' messages, decodes an integer-valued linear combination that relates the transmitted messages. Then, it forwards the linear combination towards the destination. Given these linear combinations, the destination may or may not recover the transmitted messages since the linear combinations are not always full rank. Therefore, we propose an algorithm where we optimize the precoding factor at the users such that the probability that the equations are full rank is increased and that the transmission rate is maximized. We show, through some numerical examples, the effectiveness of our algorithm and the advantage of performing precoding allocation at the users. Also, we show that this scheme can outperform standard relaying techniques in certain regimes.
△ Less
Submitted 17 October, 2014; v1 submitted 4 September, 2014;
originally announced September 2014.
-
Statistics of the MLE and Approximate Upper and Lower Bounds - Part 2: Threshold Computation and Optimal Signal Design
Authors:
Achraf Mallat,
Sinan Gezici,
Davide Dardari,
Luc Vandendorpe
Abstract:
Threshold and ambiguity phenomena are studied in Part 1 of this work where approximations for the mean-squared-error (MSE) of the maximum likelihood estimator are proposed using the method of interval estimation (MIE), and where approximate upper and lower bounds are derived. In this part we consider time-of-arrival estimation and we employ the MIE to derive closed-form expressions of the begin-am…
▽ More
Threshold and ambiguity phenomena are studied in Part 1 of this work where approximations for the mean-squared-error (MSE) of the maximum likelihood estimator are proposed using the method of interval estimation (MIE), and where approximate upper and lower bounds are derived. In this part we consider time-of-arrival estimation and we employ the MIE to derive closed-form expressions of the begin-ambiguity, end-ambiguity and asymptotic signal-to-noise ratio (SNR) thresholds with respect to some features of the transmitted signal. Both baseband and passband pulses are considered. We prove that the begin-ambiguity threshold depends only on the shape of the envelope of the ACR, whereas the end-ambiguity and asymptotic thresholds only on the shape of the ACR. We exploit the results on the begin-ambiguity and asymptotic thresholds to optimize, with respect to the available SNR, the pulse that achieves the minimum attainable MSE. The results of this paper are valid for various estimation problems.
△ Less
Submitted 19 May, 2014;
originally announced May 2014.
-
On the Optimum Energy Efficiency for Flat-fading Channels with Rate-dependent Circuit Power
Authors:
Tao Wang,
Luc Vandendorpe
Abstract:
This paper investigates the optimum energy efficiency (EE) and the corresponding spectral efficiency (SE) for a communication link operating over a flat-fading channel. The EE is evaluated by the total energy consumption for transmitting per message bit. Three channel cases are considered, namely static channel with channel state information available at transmitter (CSIT), fast-varying (FV) chann…
▽ More
This paper investigates the optimum energy efficiency (EE) and the corresponding spectral efficiency (SE) for a communication link operating over a flat-fading channel. The EE is evaluated by the total energy consumption for transmitting per message bit. Three channel cases are considered, namely static channel with channel state information available at transmitter (CSIT), fast-varying (FV) channel with channel distribution information available at transmitter (CDIT), and FV channel with CSIT. A general circuit power model is considered. For all the three channel cases, the tradeoff between the EE and SE is studied. It is shown that the EE improves strictly as the SE increases from 0 to the optimum SE, and then strictly degrades as the SE increases beyond the optimum SE. The impact of κ, ρ and other system parameters on the optimum EE and corresponding SE is investigated to obtain insight.Some of the important and interesting results for all the channel cases include: (1) when κ increases the SE corresponding to the optimum EE should keep unchanged if φ(R) = R, but reduced if φ(R) is strictly convex of R; (2) when the rate-independent circuit power ρ increases, the SE corresponding to the optimum EE has to be increased. A polynomial-complexity algorithm is developed with the bisection method to find the optimum SE. The insight is corroborated and the optimum EE for the three cases are compared by simulation results.
△ Less
Submitted 30 October, 2013;
originally announced October 2013.
-
Secure Degrees of Freedom of MIMO X-Channels with Output Feedback and Delayed CSIT
Authors:
Abdellatif Zaidi,
Zohaib Hassan Awan,
Shlomo Shamai,
Luc Vandendorpe
Abstract:
We investigate the problem of secure transmission over a two-user multi-input multi-output (MIMO) X-channel in which channel state information is provided with one-unit delay to both transmitters (CSIT), and each receiver feeds back its channel output to a different transmitter. We refer to this model as MIMO X-channel with asymmetric output feedback and delayed CSIT. The transmitters are equipped…
▽ More
We investigate the problem of secure transmission over a two-user multi-input multi-output (MIMO) X-channel in which channel state information is provided with one-unit delay to both transmitters (CSIT), and each receiver feeds back its channel output to a different transmitter. We refer to this model as MIMO X-channel with asymmetric output feedback and delayed CSIT. The transmitters are equipped with M-antennas each, and the receivers are equipped with N-antennas each. For this model, accounting for both messages at each receiver, we characterize the optimal sum secure degrees of freedom (SDoF) region. We show that, in presence of asymmetric output feedback and delayed CSIT, the sum SDoF region of the MIMO X-channel is same as the SDoF region of a two-user MIMO BC with 2M-antennas at the transmitter, N-antennas at each receiver and delayed CSIT. This result shows that, upon availability of asymmetric output feedback and delayed CSIT, there is no performance loss in terms of sum SDoF due to the distributed nature of the transmitters. Next, we show that this result also holds if only output feedback is conveyed to the transmitters, but in a symmetric manner, i.e., each receiver feeds back its output to both transmitters and no CSIT. We also study the case in which only asymmetric output feedback is provided to the transmitters, i.e., without CSIT, and derive a lower bound on the sum SDoF for this model. Furthermore, we specialize our results to the case in which there are no security constraints. In particular, similar to the setting with security constraints, we show that the optimal sum DoF region of the (M,M,N,N)--MIMO X-channel with asymmetric output feedback and delayed CSIT is same as the DoF region of a two-user MIMO BC with 2M-antennas at the transmitter, N-antennas at each receiver, and delayed CSIT. We illustrate our results with some numerical examples.
△ Less
Submitted 16 September, 2013;
originally announced September 2013.
-
Power Control in Networks With Heterogeneous Users: A Quasi-Variational Inequality Approach
Authors:
Ivan Stupia,
Luca Sanguinetti,
Giacomo Bacci,
Luc Vandendorpe
Abstract:
This work deals with the power allocation problem in a multipoint-to-multipoint network, which is heterogenous in the sense that each transmit and receiver pair can arbitrarily choose whether to selfishly maximize its own rate or energy efficiency. This is achieved by modeling the transmit and receiver pairs as rational players that engage in a non-cooperative game in which the utility function ch…
▽ More
This work deals with the power allocation problem in a multipoint-to-multipoint network, which is heterogenous in the sense that each transmit and receiver pair can arbitrarily choose whether to selfishly maximize its own rate or energy efficiency. This is achieved by modeling the transmit and receiver pairs as rational players that engage in a non-cooperative game in which the utility function changes according to each player's nature. The underlying game is reformulated as a quasi variational inequality (QVI) problem using convex fractional program theory. The equivalence between the QVI and the non-cooperative game provides us with all the mathematical tools to study the uniqueness of its Nash equilibrium (NE) points and to derive novel algorithms that allow the network to converge to these points in an iterative manner both with and without the need for a centralized processing. A small-cell network is considered as a possible case study of this heterogeneous scenario. Numerical results are used to validate the proposed solutions in different operating conditions.
△ Less
Submitted 7 May, 2015; v1 submitted 22 August, 2013;
originally announced August 2013.
-
Power minimization for OFDM Transmission with Subcarrier-pair based Opportunistic DF Relaying
Authors:
Tao Wang,
Yong Fang,
Luc Vandendorpe
Abstract:
This paper develops a sum-power minimized resource allocation (RA) algorithm subject to a sum-rate constraint for cooperative orthogonal frequency division modulation (OFDM) transmission with subcarrier-pair based opportunistic decode-and-forward (DF) relaying. The improved DF protocol first proposed in [1] is used with optimized subcarrier pairing. Instrumental to the RA algorithm design is appro…
▽ More
This paper develops a sum-power minimized resource allocation (RA) algorithm subject to a sum-rate constraint for cooperative orthogonal frequency division modulation (OFDM) transmission with subcarrier-pair based opportunistic decode-and-forward (DF) relaying. The improved DF protocol first proposed in [1] is used with optimized subcarrier pairing. Instrumental to the RA algorithm design is appropriate definition of variables to represent source/relay power allocation, subcarrier pairing and transmission-mode selection elegantly, so that after continuous relaxation, the dual method and the Hungarian algorithm can be used to find an (at least approximately) optimum RA with polynomial complexity. Moreover, the bisection method is used to speed up the search of the optimum Lagrange multiplier for the dual method. Numerical results are shown to illustrate the power-reduction benefit of the improved DF protocol with optimized subcarrier pairing.
△ Less
Submitted 14 January, 2013;
originally announced January 2013.
-
Novel Subcarrier-pair based Opportunistic DF Protocol for Cooperative Downlink OFDMA
Authors:
Tao Wang,
Yong Fang,
Luc Vandendorpe
Abstract:
A novel subcarrier-pair based opportunistic DF protocol is proposed for cooperative downlink OFDMA transmission aided by a decode-and-forward (DF) relay. Specifically, user message bits are transmitted in two consecutive equal-duration time slots. A subcarrier in the first slot can be paired with a subcarrier in the second slot for the DF relay-aided transmission to a user. In particular, the sour…
▽ More
A novel subcarrier-pair based opportunistic DF protocol is proposed for cooperative downlink OFDMA transmission aided by a decode-and-forward (DF) relay. Specifically, user message bits are transmitted in two consecutive equal-duration time slots. A subcarrier in the first slot can be paired with a subcarrier in the second slot for the DF relay-aided transmission to a user. In particular, the source and the relay can transmit simultaneously to implement beamforming at the subcarrier in the second slot for the relay-aided transmission. Each unpaired subcarrier in either the first or second slot is used by the source for direct transmission to a user without the relay's assistance. The sum rate maximized resource allocation (RA) problem is addressed for this protocol under a total power constraint. It is shown that the novel protocol leads to a maximum sum rate greater than or equal to that for a benchmark one, which does not allow the source to implement beamforming at the subcarrier in the second slot for the relay-aided transmission. Then, a polynomial-complexity RA algorithm is developed to find an (at least approximately) optimum resource allocation (i.e., source/relay power, subcarrier pairing and assignment to users) for either the proposed or benchmark protocol. Numerical experiments illustrate that the novel protocol can lead to a much greater sum rate than the benchmark one.
△ Less
Submitted 14 January, 2013;
originally announced January 2013.
-
On the SCALE Algorithm for Multiuser Multicarrier Power Spectrum Management
Authors:
Tao Wang,
Luc Vandendorpe
Abstract:
This paper studies the successive convex approximation for low complexity (SCALE) algorithm, which was proposed to address the weighted sum rate (WSR) maximized dynamic power spectrum management (DSM) problem for multiuser multicarrier systems. To this end, we first revisit the algorithm, and then present geometric interpretation and properties of the algorithm. A geometric programming (GP) implem…
▽ More
This paper studies the successive convex approximation for low complexity (SCALE) algorithm, which was proposed to address the weighted sum rate (WSR) maximized dynamic power spectrum management (DSM) problem for multiuser multicarrier systems. To this end, we first revisit the algorithm, and then present geometric interpretation and properties of the algorithm. A geometric programming (GP) implementation approach is proposed and compared with the low-complexity approach proposed previously. In particular, an analytical method is proposed to set up the default lower-bound constraints added by a GP solver. Finally, numerical experiments are used to illustrate the analysis and compare the two implementation approaches.
△ Less
Submitted 3 October, 2012;
originally announced October 2012.
-
Compute-and-Forward on a Multiaccess Relay Channel: Coding and Symmetric-Rate Optimization
Authors:
Mohieddine El Soussi,
Abdellatif Zaidi,
Luc Vandendorpe
Abstract:
We consider a system in which two users communicate with a destination with the help of a half-duplex relay. Based on the compute-and-forward scheme, we develop and evaluate the performance of coding strategies that are of network coding spirit. In this framework, instead of decoding the users' information messages, the destination decodes two integer-valued linear combinations that relate the tra…
▽ More
We consider a system in which two users communicate with a destination with the help of a half-duplex relay. Based on the compute-and-forward scheme, we develop and evaluate the performance of coding strategies that are of network coding spirit. In this framework, instead of decoding the users' information messages, the destination decodes two integer-valued linear combinations that relate the transmitted codewords. Two decoding schemes are considered. In the first one, the relay computes one of the linear combinations and then forwards it to the destination. The destination computes the other linear combination based on the direct transmissions. In the second one, accounting for the side information available at the destination through the direct links, the relay compresses what it gets using Wyner-Ziv compression and conveys it to the destination. The destination then computes the two linear combinations, locally. For both coding schemes, we discuss the design criteria, and derive the allowed symmetric-rate. Next, we address the power allocation and the selection of the integer-valued coefficients to maximize the offered symmetric-rate; an iterative coordinate descent method is proposed. The analysis shows that the first scheme can outperform standard relaying techniques in certain regimes, and the second scheme, while relying on feasible structured lattice codes, can at best achieve the same performance as regular compress-and-forward for the multiaccess relay network model that we study. The results are illustrated through some numerical examples.
△ Less
Submitted 8 June, 2013; v1 submitted 20 September, 2012;
originally announced September 2012.
-
Multiaccess Channel with Partially Cooperating Encoders and Security Constraints
Authors:
Zohaib Hassan Awan,
Abdellatif Zaidi,
Luc Vandendorpe
Abstract:
We study a special case of Willems's two-user multi-access channel with partially cooperating encoders from a security perspective. This model differs from Willems's setup in that only one encoder, Encoder 1, is allowed to conference; Encoder 2 does not transmit any message, and there is an additional passive eavesdropper from whom the communication should be kept secret. For the discrete memoryle…
▽ More
We study a special case of Willems's two-user multi-access channel with partially cooperating encoders from a security perspective. This model differs from Willems's setup in that only one encoder, Encoder 1, is allowed to conference; Encoder 2 does not transmit any message, and there is an additional passive eavesdropper from whom the communication should be kept secret. For the discrete memoryless (DM) case, we establish inner and outer bounds on the capacity-equivocation region. The inner bound is based on a combination of Willems's coding scheme, noise injection and additional binning that provides randomization for security. For the memoryless Gaussian model, we establish lower and upper bounds on the secrecy capacity. We also show that, under certain conditions, these bounds agree in some extreme cases of cooperation between the encoders. We illustrate our results through some numerical examples.
△ Less
Submitted 12 June, 2013; v1 submitted 30 May, 2012;
originally announced May 2012.
-
WSR Maximized Resource Allocation in Multiple DF Relays Aided OFDMA Downlink Transmission
Authors:
Tao Wang,
Luc Vandendorpe
Abstract:
This paper considers the weighted sum rate (WSR) maximized resource allocation (RA) constrained by a system sum power in an orthogonal frequency division multiple access (OFDMA) downlink transmission system assisted by multiple decode-and-forward (DF) relays. In particular, multiple relays may cooperate with the source for every relay-aided transmission. A two-step algorithm is proposed to find th…
▽ More
This paper considers the weighted sum rate (WSR) maximized resource allocation (RA) constrained by a system sum power in an orthogonal frequency division multiple access (OFDMA) downlink transmission system assisted by multiple decode-and-forward (DF) relays. In particular, multiple relays may cooperate with the source for every relay-aided transmission. A two-step algorithm is proposed to find the globally optimum RA. In the first step, the optimum source/relay power and assisting relays that maximize the rate is found for every combination of subcarrier and destination, assuming a sum power is allocated to the transmission at that subcarrier to that destination in the relay-aided transmission mode and the direct mode, respectively. In the second step, a convex-optimization based algorithm is designed to find the globally optimum assignment of destination, transmission mode, and sum power for each subcarrier to maximize the WSR. Combining the RAs found in the two steps, the globally optimum RA can be found. In addition, we show that the optimum RA in the second step can readily be derived when the system sum power is very high. The effectiveness of the proposed algorithm is illustrated by numerical experiments.
△ Less
Submitted 4 May, 2011; v1 submitted 2 May, 2011;
originally announced May 2011.
-
Sum Rate Maximized Resource Allocation in Multiple DF Relays Aided OFDM Transmission
Authors:
Tao Wang,
Luc Vandendorpe
Abstract:
In relay-aided wireless transmission systems, one of the key issues is how to decide assisting relays and manage the energy resource at the source and each individual relay, to maximize a certain objective related to system performance. This paper addresses the sum rate maximized resource allocation (RA) problem in a point to point orthogonal frequency division modulation (OFDM) transmission syste…
▽ More
In relay-aided wireless transmission systems, one of the key issues is how to decide assisting relays and manage the energy resource at the source and each individual relay, to maximize a certain objective related to system performance. This paper addresses the sum rate maximized resource allocation (RA) problem in a point to point orthogonal frequency division modulation (OFDM) transmission system assisted by multiple decode-and-forward (DF) relays, subject to the individual sum power constraints of the source and the relays. In particular, the transmission at each subcarrier can be in either the direct mode without any relay assisting, or the relay-aided mode with one or several relays assisting. We propose two RA algorithms which optimize the assignment of transmission mode and source power for every subcarrier, as well as the assisting relays and the power allocation to them for every {relay-aided} subcarrier. First, it is shown that the considered RA problem has zero Lagrangian duality gap when there is a big number of subcarriers. In this case, a duality based algorithm that finds a globally optimum RA is developed. Second, a coordinate-ascent based iterative algorithm, which finds a suboptimum RA but is always applicable regardless of the duality gap of the RA problem, is developed. The effectiveness of these algorithms has been illustrated by numerical experiments.
△ Less
Submitted 30 April, 2011; v1 submitted 25 April, 2011;
originally announced April 2011.
-
Bounds on the Capacity of the Relay Channel with Noncausal State at Source
Authors:
Abdellatif Zaidi,
Shlomo Shamai,
Pablo Piantanida,
Luc Vandendorpe
Abstract:
We consider a three-terminal state-dependent relay channel with the channel state available non-causally at only the source. Such a model may be of interest for node cooperation in the framework of cognition, i.e., collaborative signal transmission involving cognitive and non-cognitive radios. We study the capacity of this communication model. One principal problem is caused by the relay's not kno…
▽ More
We consider a three-terminal state-dependent relay channel with the channel state available non-causally at only the source. Such a model may be of interest for node cooperation in the framework of cognition, i.e., collaborative signal transmission involving cognitive and non-cognitive radios. We study the capacity of this communication model. One principal problem is caused by the relay's not knowing the channel state. For the discrete memoryless (DM) model, we establish two lower bounds and an upper bound on channel capacity. The first lower bound is obtained by a coding scheme in which the source describes the state of the channel to the relay and destination, which then exploit the gained description for a better communication of the source's information message. The coding scheme for the second lower bound remedies the relay's not knowing the states of the channel by first computing, at the source, the appropriate input that the relay would send had the relay known the states of the channel, and then transmitting this appropriate input to the relay. The relay simply guesses the sent input and sends it in the next block. The upper bound is non trivial and it accounts for not knowing the state at the relay and destination. For the general Gaussian model, we derive lower bounds on the channel capacity by exploiting ideas in the spirit of those we use for the DM model; and we show that these bounds are optimal for small and large noise at the relay irrespective to the strength of the interference. Furthermore, we also consider a special case model in which the source input has two components one of which is independent of the state. We establish a better upper bound for both DM and Gaussian cases and we also characterize the capacity in a number of special cases.
△ Less
Submitted 6 April, 2011;
originally announced April 2011.
-
Secure Communication over Parallel Relay Channel
Authors:
Zohaib Hassan Awan,
Abdellatif Zaidi,
Luc Vandendorpe
Abstract:
We investigate the problem of secure communication over parallel relay channel in the presence of a passive eavesdropper. We consider a four terminal relay-eavesdropper channel which consists of multiple relay-eavesdropper channels as subchannels. For the discrete memoryless model, we establish outer and inner bounds on the rate-equivocation region. The inner bound allows mode selection at the rel…
▽ More
We investigate the problem of secure communication over parallel relay channel in the presence of a passive eavesdropper. We consider a four terminal relay-eavesdropper channel which consists of multiple relay-eavesdropper channels as subchannels. For the discrete memoryless model, we establish outer and inner bounds on the rate-equivocation region. The inner bound allows mode selection at the relay. For each subchannel, secure transmission is obtained through one of two coding schemes at the relay: decoding-and-forwarding the source message or confusing the eavesdropper through noise injection. For the Gaussian memoryless channel, we establish lower and upper bounds on the perfect secrecy rate. Furthermore, we study a special case in which the relay does not hear the source and show that under certain conditions the lower and upper bounds coincide. The results established for the parallel Gaussian relay-eavesdropper channel are then applied to study the fading relay-eavesdropper channel. Analytical results are illustrated through some numerical examples.
△ Less
Submitted 23 January, 2012; v1 submitted 9 November, 2010;
originally announced November 2010.
-
On Secure Transmission over Parallel Relay Eavesdropper Channel
Authors:
Zohaib Hassan Awan,
Abdellatif Zaidi,
Luc Vandendorpe
Abstract:
We study a four terminal parallel relay-eavesdropper channel which consists of multiple independent relay-eavesdropper channels as subchannels. For the discrete memoryless case, we establish inner and outer bounds on the rate-equivocation region. For each subchannel, secure transmission is obtained through one of the two coding schemes at the relay: decoding-and-forwarding the source message or co…
▽ More
We study a four terminal parallel relay-eavesdropper channel which consists of multiple independent relay-eavesdropper channels as subchannels. For the discrete memoryless case, we establish inner and outer bounds on the rate-equivocation region. For each subchannel, secure transmission is obtained through one of the two coding schemes at the relay: decoding-and-forwarding the source message or confusing the eavesdropper through noise injection. The inner bound allows relay mode selection. For the Gaussian model we establish lower and upper bounds on the perfect secrecy rate. We show that the bounds meet in some special cases, including when the relay does not hear the source. We illustrate the analytical results through some numerical examples.
△ Less
Submitted 9 November, 2010;
originally announced November 2010.
-
Bounds on the Capacity of the Relay Channel with Noncausal State Information at Source
Authors:
Abdellatif Zaidi,
Shlomo Shamai,
Pablo Piantanida,
Luc Vandendorpe
Abstract:
We consider a three-terminal state-dependent relay channel with the channel state available non-causally at only the source. Such a model may be of interest for node cooperation in the framework of cognition, i.e., collaborative signal transmission involving cognitive and non-cognitive radios. We study the capacity of this communication model. One principal problem in this setup is caused by the…
▽ More
We consider a three-terminal state-dependent relay channel with the channel state available non-causally at only the source. Such a model may be of interest for node cooperation in the framework of cognition, i.e., collaborative signal transmission involving cognitive and non-cognitive radios. We study the capacity of this communication model. One principal problem in this setup is caused by the relay's not knowing the channel state. In the discrete memoryless (DM) case, we establish lower bounds on channel capacity. For the Gaussian case, we derive lower and upper bounds on the channel capacity. The upper bound is strictly better than the cut-set upper bound. We show that one of the developed lower bounds comes close to the upper bound, asymptotically, for certain ranges of rates.
△ Less
Submitted 13 January, 2010;
originally announced January 2010.
-
Cooperative Relaying with State Available Non-Causally at the Relay
Authors:
Abdellatif Zaidi,
Shiva Prasad Kotagiri,
J. Nicholas Laneman,
Luc Vandendorpe
Abstract:
We consider a three-terminal state-dependent relay channel with the channel state noncausally available at only the relay. Such a model may be useful for designing cooperative wireless networks with some terminals equipped with cognition capabilities, i.e., the relay in our setup. In the discrete memoryless (DM) case, we establish lower and upper bounds on channel capacity. The lower bound is ob…
▽ More
We consider a three-terminal state-dependent relay channel with the channel state noncausally available at only the relay. Such a model may be useful for designing cooperative wireless networks with some terminals equipped with cognition capabilities, i.e., the relay in our setup. In the discrete memoryless (DM) case, we establish lower and upper bounds on channel capacity. The lower bound is obtained by a coding scheme at the relay that uses a combination of codeword splitting, Gel'fand-Pinsker binning, and decode-and-forward relaying. The upper bound improves upon that obtained by assuming that the channel state is available at the source, the relay, and the destination. For the Gaussian case, we also derive lower and upper bounds on the capacity. The lower bound is obtained by a coding scheme at the relay that uses a combination of codeword splitting, generalized dirty paper coding, and decode-and-forward relaying; the upper bound is also better than that obtained by assuming that the channel state is available at the source, the relay, and the destination. In the case of degraded Gaussian channels, the lower bound meets with the upper bound for some special cases, and, so, the capacity is obtained for these cases. Furthermore, in the Gaussian case, we also extend the results to the case in which the relay operates in a half-duplex mode.
△ Less
Submitted 24 November, 2009;
originally announced November 2009.
-
Multiaccess Channels with State Known to One Encoder: Another Case of Degraded Message Sets
Authors:
Abdellatif Zaidi,
Shiva Prasad Kotagiri,
J. Nicholas Laneman,
Luc Vandendorpe
Abstract:
We consider a two-user state-dependent multiaccess channel in which only one of the encoders is informed, non-causally, of the channel states. Two independent messages are transmitted: a common message transmitted by both the informed and uninformed encoders, and an individual message transmitted by only the uninformed encoder. We derive inner and outer bounds on the capacity region of this mode…
▽ More
We consider a two-user state-dependent multiaccess channel in which only one of the encoders is informed, non-causally, of the channel states. Two independent messages are transmitted: a common message transmitted by both the informed and uninformed encoders, and an individual message transmitted by only the uninformed encoder. We derive inner and outer bounds on the capacity region of this model in the discrete memoryless case as well as the Gaussian case. Further, we show that the bounds for the Gaussian case are tight in some special cases.
△ Less
Submitted 8 June, 2009;
originally announced June 2009.
-
Bounds on the Capacity of the Relay Channel with States at the Source
Authors:
Abdellatif Zaidi,
Luc Vandendorpe
Abstract:
This paper has been withdrawn by the authors
This paper has been withdrawn by the authors
△ Less
Submitted 3 June, 2009; v1 submitted 8 September, 2008;
originally announced September 2008.
-
Cooperative Relaying with State Available at the Relay
Authors:
Abdellatif Zaidi,
Shivaprasad Kotagiri,
J. Nicholas Laneman,
Luc Vandendorpe
Abstract:
We consider a state-dependent full-duplex relay channel with the state of the channel non-causally available at only the relay. In the framework of cooperative wireless networks, some specific terminals can be equipped with cognition capabilities, i.e, the relay in our model. In the discrete memoryless (DM) case, we derive lower and upper bounds on channel capacity. The lower bound is obtained b…
▽ More
We consider a state-dependent full-duplex relay channel with the state of the channel non-causally available at only the relay. In the framework of cooperative wireless networks, some specific terminals can be equipped with cognition capabilities, i.e, the relay in our model. In the discrete memoryless (DM) case, we derive lower and upper bounds on channel capacity. The lower bound is obtained by a coding scheme at the relay that consists in a combination of codeword splitting, Gel'fand-Pinsker binning, and a decode-and-forward scheme. The upper bound is better than that obtained by assuming that the channel state is available at the source and the destination as well. For the Gaussian case, we also derive lower and upper bounds on channel capacity. The lower bound is obtained by a coding scheme which is based on a combination of codeword splitting and Generalized dirty paper coding. The upper bound is also better than that obtained by assuming that the channel state is available at the source, the relay, and the destination. The two bounds meet, and so give the capacity, in some special cases for the degraded Gaussian case.
△ Less
Submitted 8 September, 2008; v1 submitted 29 November, 2007;
originally announced November 2007.
-
Rate Regions for the Partially-Cooperative Relay Broadcast Channel with Non-causal Side Information
Authors:
A. Zaidi,
L. Vandendorpe
Abstract:
In this work, we consider a partially cooperative relay broadcast channel (PC-RBC) controlled by random parameters. We provide rate regions for two different situations: 1) when side information (SI) S^n on the random parameters is non-causally known at both the source and the relay and, 2) when side information S^n is non-causally known at the source only. These achievable regions are derived f…
▽ More
In this work, we consider a partially cooperative relay broadcast channel (PC-RBC) controlled by random parameters. We provide rate regions for two different situations: 1) when side information (SI) S^n on the random parameters is non-causally known at both the source and the relay and, 2) when side information S^n is non-causally known at the source only. These achievable regions are derived for the general discrete memoryless case first and then extended to the case when the channel is degraded Gaussian and the SI is additive i.i.d. Gaussian. In this case, the source uses generalized dirty paper coding (GDPC), i.e., DPC combined with partial state cancellation, when only the source is informed, and DPC alone when both the source and the relay are informed. It appears that, even though it can not completely eliminate the effect of the SI (in contrast to the case of source and relay being informed), GDPC is particularly useful when only the source is informed.
△ Less
Submitted 4 September, 2007;
originally announced September 2007.