-
Non-iterative Optimization of Trajectory and Radio Resource for Aerial Network
Authors:
Hyeonsu Lyu,
Jonggyu Jang,
Harim Lee,
Hyun Jong Yang
Abstract:
We address a joint trajectory planning, user association, resource allocation, and power control problem to maximize proportional fairness in the aerial IoT network, considering practical end-to-end quality-of-service (QoS) and communication schedules. Though the problem is rather ancient, apart from the fact that the previous approaches have never considered user- and time-specific QoS, we point…
▽ More
We address a joint trajectory planning, user association, resource allocation, and power control problem to maximize proportional fairness in the aerial IoT network, considering practical end-to-end quality-of-service (QoS) and communication schedules. Though the problem is rather ancient, apart from the fact that the previous approaches have never considered user- and time-specific QoS, we point out a prevalent mistake in coordinate optimization approaches adopted by the majority of the literature. Coordinate optimization approaches, which repetitively optimize radio resources for a fixed trajectory and vice versa, generally converge to local optima when all variables are differentiable. However, these methods often stagnate at a non-stationary point, significantly degrading the network utility in mixed-integer problems such as joint trajectory and radio resource optimization. We detour this problem by converting the formulated problem into the Markov decision process (MDP). Exploiting the beneficial characteristics of the MDP, we design a non-iterative framework that cooperatively optimizes trajectory and radio resources without initial trajectory choice. The proposed framework can incorporate various trajectory planning algorithms such as the genetic algorithm, tree search, and reinforcement learning. Extensive comparisons with diverse baselines verify that the proposed framework significantly outperforms the state-of-the-art method, nearly achieving the global optimum. Our implementation code is available at https://github.com/hslyu/dbspf.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Noise Variance Optimization in Differential Privacy: A Game-Theoretic Approach Through Per-Instance Differential Privacy
Authors:
Sehyun Ryu,
Jonggyu Jang,
Hyun Jong Yang
Abstract:
The concept of differential privacy (DP) can quantitatively measure privacy loss by observing the changes in the distribution caused by the inclusion of individuals in the target dataset. The DP, which is generally used as a constraint, has been prominent in safeguarding datasets in machine learning in industry giants like Apple and Google. A common methodology for guaranteeing DP is incorporating…
▽ More
The concept of differential privacy (DP) can quantitatively measure privacy loss by observing the changes in the distribution caused by the inclusion of individuals in the target dataset. The DP, which is generally used as a constraint, has been prominent in safeguarding datasets in machine learning in industry giants like Apple and Google. A common methodology for guaranteeing DP is incorporating appropriate noise into query outputs, thereby establishing statistical defense systems against privacy attacks such as membership inference and linkage attacks. However, especially for small datasets, existing DP mechanisms occasionally add excessive amount of noise to query output, thereby discarding data utility. This is because the traditional DP computes privacy loss based on the worst-case scenario, i.e., statistical outliers. In this work, to tackle this challenge, we utilize per-instance DP (pDP) as a constraint, measuring privacy loss for each data instance and optimizing noise tailored to individual instances. In a nutshell, we propose a per-instance noise variance optimization (NVO) game, framed as a common interest sequential game, and show that the Nash equilibrium (NE) points of it inherently guarantee pDP for all data instances. Through extensive experiments, our proposed pDP algorithm demonstrated an average performance improvement of up to 99.53% compared to the conventional DP algorithm in terms of KL divergence.
△ Less
Submitted 27 April, 2024; v1 submitted 24 April, 2024;
originally announced April 2024.
-
Joint Optimization on Uplink OFDMA and MU-MIMO for IEEE 802.11ax: Deep Hierarchical Reinforcement Learning Approach
Authors:
Hyeonho Noh,
Harim Lee,
Hyun Jong Yang
Abstract:
This letter tackles a joint user scheduling, frequency resource allocation (USRA), multi-input-multi-output mode selection (MIMO MS) between single-user MIMO and multi-user (MU) MIMO, and MU-MIMO user selection problem, integrating uplink orthogonal frequency division multiple access (OFDMA) in IEEE 802.11ax. Specifically, we focus on \textit{unsaturated traffic conditions} where users' data deman…
▽ More
This letter tackles a joint user scheduling, frequency resource allocation (USRA), multi-input-multi-output mode selection (MIMO MS) between single-user MIMO and multi-user (MU) MIMO, and MU-MIMO user selection problem, integrating uplink orthogonal frequency division multiple access (OFDMA) in IEEE 802.11ax. Specifically, we focus on \textit{unsaturated traffic conditions} where users' data demands fluctuate. In unsaturated traffic conditions, considering packet volumes per user introduces a combinatorial problem, requiring the simultaneous optimization of MU-MIMO user selection and RA along the time-frequency-space axis. Consequently, dealing with the combinatorial nature of this problem, characterized by a large cardinality of unknown variables, poses a challenge that conventional optimization methods find nearly impossible to address. In response, this letter proposes an approach with deep hierarchical reinforcement learning (DHRL) to solve the joint problem. Rather than simply adopting off-the-shelf DHRL, we \textit{tailor} the DHRL to the joint USRA and MS problem, thereby significantly improving the convergence speed and throughput. Extensive simulation results show that the proposed algorithm achieves significantly improved throughput compared to the existing schemes under various unsaturated traffic conditions.
△ Less
Submitted 15 April, 2024; v1 submitted 3 April, 2024;
originally announced April 2024.
-
Enhancing Sum-Rate Performance in Constrained Multicell Networks: A Low-Information Exchange Approach
Authors:
You** Kim,
Jonggyu Jang,
Hyun Jong Yang
Abstract:
Despite the extensive research on massive MIMO systems for 5G telecommunications and beyond, the reality is that many deployed base stations are equipped with a limited number of antennas rather than supporting massive MIMO configurations. Furthermore, while the cell-less network concept, which eliminates cell boundaries, is under investigation, practical deployments often grapple with significant…
▽ More
Despite the extensive research on massive MIMO systems for 5G telecommunications and beyond, the reality is that many deployed base stations are equipped with a limited number of antennas rather than supporting massive MIMO configurations. Furthermore, while the cell-less network concept, which eliminates cell boundaries, is under investigation, practical deployments often grapple with significantly limited backhaul connection capacities between base stations. This letter explores techniques to maximize the sum-rate performance within the constraints of these more realistically equipped multicell networks. We propose an innovative approach that dramatically reduces the need for information exchange between base stations to a mere few bits, in stark contrast to conventional methods that require the exchange of hundreds of bits. Our proposed method not only addresses the limitations imposed by current network infrastructure but also showcases significantly improved performance under these constrained conditions.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
Patch-MI: Enhancing Model Inversion Attacks via Patch-Based Reconstruction
Authors:
Jonggyu Jang,
Hyeonsu Lyu,
Hyun Jong Yang
Abstract:
Model inversion (MI) attacks aim to reveal sensitive information in training datasets by solely accessing model weights. Generative MI attacks, a prominent strand in this field, utilize auxiliary datasets to recreate target data attributes, restricting the images to remain photo-realistic, but their success often depends on the similarity between auxiliary and target datasets. If the distributions…
▽ More
Model inversion (MI) attacks aim to reveal sensitive information in training datasets by solely accessing model weights. Generative MI attacks, a prominent strand in this field, utilize auxiliary datasets to recreate target data attributes, restricting the images to remain photo-realistic, but their success often depends on the similarity between auxiliary and target datasets. If the distributions are dissimilar, existing MI attack attempts frequently fail, yielding unrealistic or target-unrelated results. In response to these challenges, we introduce a groundbreaking approach named Patch-MI, inspired by jigsaw puzzle assembly. To this end, we build upon a new probabilistic interpretation of MI attacks, employing a generative adversarial network (GAN)-like framework with a patch-based discriminator. This approach allows the synthesis of images that are similar to the target dataset distribution, even in cases of dissimilar auxiliary dataset distribution. Moreover, we artfully employ a random transformation block, a sophisticated maneuver that crafts generalized images, thus enhancing the efficacy of the target classifier. Our numerical and graphical findings demonstrate that Patch-MI surpasses existing generative MI methods in terms of accuracy, marking significant advancements while preserving comparable statistical dataset quality. For reproducibility of our results, we make our source code publicly available in https://github.com/jonggyujang0123/Patch-Attack.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
Deeper Understanding of Black-box Predictions via Generalized Influence Functions
Authors:
Hyeonsu Lyu,
Jonggyu Jang,
Sehyun Ryu,
Hyun Jong Yang
Abstract:
Influence functions (IFs) elucidate how training data changes model behavior. However, the increasing size and non-convexity in large-scale models make IFs inaccurate. We suspect that the fragility comes from the first-order approximation which may cause nuisance changes in parameters irrelevant to the examined data. However, simply computing influence from the chosen parameters can be misleading,…
▽ More
Influence functions (IFs) elucidate how training data changes model behavior. However, the increasing size and non-convexity in large-scale models make IFs inaccurate. We suspect that the fragility comes from the first-order approximation which may cause nuisance changes in parameters irrelevant to the examined data. However, simply computing influence from the chosen parameters can be misleading, as it fails to nullify the hidden effects of unselected parameters on the analyzed data. Thus, our approach introduces generalized IFs, precisely estimating target parameters' influence while nullifying nuisance gradient changes on fixed parameters. We identify target update parameters closely associated with the input data by the output- and gradient-based parameter selection methods. We verify the generalized IFs with various alternatives of IFs on the class removal and label change tasks. The experiments align with the "less is more" philosophy, demonstrating that updating only 5\% of the model produces more accurate results than other influence functions across all tasks. We believe our proposal works as a foundational tool for optimizing models, conducting data analysis, and enhancing AI interpretability beyond the limitation of IFs. Codes are available at https://github.com/hslyu/GIF.
△ Less
Submitted 6 May, 2024; v1 submitted 9 December, 2023;
originally announced December 2023.
-
Recurrent convolutional neural network for the surrogate modeling of subsurface flow simulation
Authors:
Hyung Jun Yang,
Timothy Yeo,
Jaewoo An
Abstract:
The quantification of uncertainty on fluid flow in porous media is often hampered by multi-scale heterogeneity and insufficient site characterization. Monte-Carlo simulation (MCS), which runs numerical simulations for a large number of realization of input parameters , becomes infeasible when simulation cost is expensive or the degree of uncertainty is large. Many deep-neural-network-based methods…
▽ More
The quantification of uncertainty on fluid flow in porous media is often hampered by multi-scale heterogeneity and insufficient site characterization. Monte-Carlo simulation (MCS), which runs numerical simulations for a large number of realization of input parameters , becomes infeasible when simulation cost is expensive or the degree of uncertainty is large. Many deep-neural-network-based methods are developed in order to replace the numerical flow simulation, but previous studies focused only on generating several snapshots of outputs at the fixed time steps, and lack to reflect the time dependent property of simulation data. Recently, the convolutional long short term memory (ConvLSTM) is utilized to deal with time series image data. Here, we propose to combine SegNet with ConvLSTM layers for the surrogate modeling of numerical flow simulation. The results show that the proposed method improves the performance of SegNet based surrogate model remarkably when the output of the simulation is time series data.
△ Less
Submitted 8 October, 2020;
originally announced October 2020.
-
Privacy-Protection Drone Patrol System based on Face Anonymization
Authors:
Harim Lee,
Myeung Un Kim,
Yeongjun Kim,
Hyeonsu Lyu,
Hyun Jong Yang
Abstract:
The robot market has been growing significantly and is expected to become 1.5 times larger in 2024 than what it was in 2019. Robots have attracted attention of security companies thanks to their mobility. These days, for security robots, unmanned aerial vehicles (UAVs) have quickly emerged by highlighting their advantage: they can even go to any hazardous place that humans cannot access. For UAVs,…
▽ More
The robot market has been growing significantly and is expected to become 1.5 times larger in 2024 than what it was in 2019. Robots have attracted attention of security companies thanks to their mobility. These days, for security robots, unmanned aerial vehicles (UAVs) have quickly emerged by highlighting their advantage: they can even go to any hazardous place that humans cannot access. For UAVs, Drone has been a representative model and has several merits to consist of various sensors such as high-resolution cameras. Therefore, Drone is the most suitable as a mobile surveillance robot. These attractive advantages such as high-resolution cameras and mobility can be a double-edged sword, i.e., privacy infringement. Surveillance drones take videos with high-resolution to fulfill their role, however, those contain a lot of privacy sensitive information. The indiscriminate shooting is a critical issue for those who are very reluctant to be exposed. To tackle the privacy infringement, this work proposes face-anonymizing drone patrol system. In this system, one person's face in a video is transformed into a different face with facial components maintained. To construct our privacy-preserving system, we have adopted the latest generative adversarial networks frameworks and have some modifications on losses of those frameworks. Our face-anonymzing approach is evaluated with various public face-image and video dataset. Moreover, our system is evaluated with a customized drone consisting of a high-resolution camera, a companion computer, and a drone control computer. Finally, we confirm that our system can protect privacy sensitive information with our face-anonymzing algorithm while preserving the performance of robot perception, i.e., simultaneous localization and map**.
△ Less
Submitted 29 May, 2020;
originally announced May 2020.
-
Sum-Rate Maximization of Multicell MISO Networks with Limited Information Exchange
Authors:
You** Kim,
Hyun Jong Yang
Abstract:
Although there have been extensive studies on transmit beamforming in multi-input single-output (MISO) multicell networks, achieving optimal sum-rate with limited channel state information (CSI) is still a challenge even with a single user per cell. A novel cooperative downlink multicell MISO beamforming scheme is proposed with highly limited information exchange among the base stations (BSs) to m…
▽ More
Although there have been extensive studies on transmit beamforming in multi-input single-output (MISO) multicell networks, achieving optimal sum-rate with limited channel state information (CSI) is still a challenge even with a single user per cell. A novel cooperative downlink multicell MISO beamforming scheme is proposed with highly limited information exchange among the base stations (BSs) to maximize the sum-rate. In the proposed scheme, each BS can design its beamforming vector with only local CSI based on limited information exchange on CSI. Unlike previous studies, the proposed beamforming design is non-iterative and does not require any vector or matrix feedback but requires only quantized scalar information. The proposed scheme closely achieves the optimal sum-rate bound in almost all signal-to-noise ratio regime based on non-iterative optimization with lower amount of information exchange than existing schemes, which is justified by numerical simulations.
△ Less
Submitted 10 April, 2019;
originally announced April 2019.
-
Resource Allocation and Power Control in Cooperative Small Cell Networks in Frequency Selective Channels with Backhaul Constraint
Authors:
Jonggyu Jang,
Hyun Jong Yang,
Hyekyung Jwa
Abstract:
A joint resource allocation (RA), user association (UA), and power control (PC) problem is addressed for proportional fairness maximization in a cooperative multiuser downlink small cell network with limited backhaul capacity, based on orthogonal frequency division multiplexing. Previous studies have relaxed the per-resource-block (RB) RA and UA problem to a continuous optimisation problem based o…
▽ More
A joint resource allocation (RA), user association (UA), and power control (PC) problem is addressed for proportional fairness maximization in a cooperative multiuser downlink small cell network with limited backhaul capacity, based on orthogonal frequency division multiplexing. Previous studies have relaxed the per-resource-block (RB) RA and UA problem to a continuous optimisation problem based on long-term signal-to-noise-ratio, because the original problem is known as a combinatorial NP-hard problem. We tackle the original per-RB RA and UA problem to obtain a near-optimal solution with feasible complexity. We show that the conventional dual problem approach for RA cannot find the solution satisfying the conventional KKT conditions. Inspired by the dual problem approach, however, we derive the first order optimality conditions for the considered RA, UA, and PC problem, and propose a sequential optimization method for finding the solution. The overall proposed scheme can be implemented with feasible complexity even with a large number of system parameters. Numerical results show that the proposed scheme achieves the proportional fairness close to its outer bound with unlimited backhaul capacity in the low backhaul capacity regime and to that of a carefully-designed genetic algorithm with excessive generations but without backhaul constraint in the high backhaul capacity regime.
△ Less
Submitted 12 August, 2018; v1 submitted 9 January, 2018;
originally announced January 2018.
-
Extreme Low Resolution Activity Recognition with Multi-Siamese Embedding Learning
Authors:
Michael S. Ryoo,
Kiyoon Kim,
Hyun Jong Yang
Abstract:
This paper presents an approach for recognizing human activities from extreme low resolution (e.g., 16x12) videos. Extreme low resolution recognition is not only necessary for analyzing actions at a distance but also is crucial for enabling privacy-preserving recognition of human activities. We design a new two-stream multi-Siamese convolutional neural network. The idea is to explicitly capture th…
▽ More
This paper presents an approach for recognizing human activities from extreme low resolution (e.g., 16x12) videos. Extreme low resolution recognition is not only necessary for analyzing actions at a distance but also is crucial for enabling privacy-preserving recognition of human activities. We design a new two-stream multi-Siamese convolutional neural network. The idea is to explicitly capture the inherent property of low resolution (LR) videos that two images originated from the exact same scene often have totally different pixel values depending on their LR transformations. Our approach learns the shared embedding space that maps LR videos with the same content to the same location regardless of their transformations. We experimentally confirm that our approach of jointly learning such transform robust LR video representation and the classifier outperforms the previous state-of-the-art low resolution recognition approaches on two public standard datasets by a meaningful margin.
△ Less
Submitted 3 February, 2018; v1 submitted 3 August, 2017;
originally announced August 2017.
-
Opportunistic Downlink Interference Alignment for Multi-Cell MIMO Networks
Authors:
Hyun Jong Yang,
Won-Yong Shin,
Bang Chul Jung,
Changho Suh,
Arogyaswami Paulraj
Abstract:
In this paper, we propose an opportunistic downlink interference alignment (ODIA) for interference-limited cellular downlink, which intelligently combines user scheduling and downlink IA techniques. The proposed ODIA not only efficiently reduces the effect of inter-cell interference from other-cell base stations (BSs) but also eliminates intra-cell interference among spatial streams in the same ce…
▽ More
In this paper, we propose an opportunistic downlink interference alignment (ODIA) for interference-limited cellular downlink, which intelligently combines user scheduling and downlink IA techniques. The proposed ODIA not only efficiently reduces the effect of inter-cell interference from other-cell base stations (BSs) but also eliminates intra-cell interference among spatial streams in the same cell. We show that the minimum number of users required to achieve a target degrees-of-freedom (DoF) can be fundamentally reduced, i.e., the fundamental user scaling law can be improved by using the ODIA, compared with the existing downlink IA schemes. In addition, we adopt a limited feedback strategy in the ODIA framework, and then analyze the number of feedback bits required for the system with limited feedback to achieve the same user scaling law of the ODIA as the system with perfect CSI. We also modify the original ODIA in order to further improve sum-rate, which achieves the optimal multiuser diversity gain, i.e., $\log\log N$, per spatial stream even in the presence of downlink inter-cell interference, where $N$ denotes the number of users in a cell. Simulation results show that the ODIA significantly outperforms existing interference management techniques in terms of sum-rate in realistic cellular environments. Note that the ODIA operates in a non-collaborative and decoupled manner, i.e., it requires no information exchange among BSs and no iterative beamformer optimization between BSs and users, thus leading to an easier implementation.
△ Less
Submitted 6 January, 2017;
originally announced January 2017.
-
Performance Analysis of License Assisted Access LTE with Asymmetric Hidden Terminals
Authors:
H. R. Lee,
H. Kim,
H. J. Yang,
J. T. Kim,
S. K. Baek
Abstract:
License Assisted Access (LAA) LTE (LTE-LAA) is a new type of LTE that aggregates the licensed LTE bands with the unlicensed bands via carrier aggregation. To operate in unlicensed bands, LTE-LAA adopts the listen-before-talk policy and designs its channel access mechanism similar to WLAN's DCF. In this paper, we consider an LAA network consisting of an LTE-LAA eNB coexisting with a Wi-Fi STA, and…
▽ More
License Assisted Access (LAA) LTE (LTE-LAA) is a new type of LTE that aggregates the licensed LTE bands with the unlicensed bands via carrier aggregation. To operate in unlicensed bands, LTE-LAA adopts the listen-before-talk policy and designs its channel access mechanism similar to WLAN's DCF. In this paper, we consider an LAA network consisting of an LTE-LAA eNB coexisting with a Wi-Fi STA, and capture the {\em asymmetric hidden terminal problem} where the eNB recognizes the STA while the opposite is not true, which is caused by the asymmetric CCA thresholds between them. We model the network as a joint Markov chain (MC) consisting of two individual MCs, and derive its steady-state probabilities, throughput, and channel access delay along with other key metrics like transmit, busy, collision, and doubling probabilities. Through extensive evaluation, we confirm that the proposed model well predicts the dynamics of the LAA network, and identify important design guidelines for fair coexistence between LTE-LAA and WLAN as follows. First, LTE-LAA should design its contention window (CW) doubling policy by considering Wi-Fi's packet duration and subframe-dependent collision probabilities. Second, there exists a tradeoff between throughput and channel access delay, according to which the CW doubling policy should be adapted.
△ Less
Submitted 13 December, 2016;
originally announced December 2016.
-
Opportunistic Network Decoupling With Virtual Full-Duplex Operation in Multi-Source Interfering Relay Networks
Authors:
Won-Yong Shin,
Vien V. Mai,
Bang Chul Jung,
Hyun Jong Yang
Abstract:
We introduce a new achievability scheme, termed opportunistic network decoupling (OND), operating in virtual full-duplex mode. In the scheme, a novel relay scheduling strategy is utilized in the $K\times N\times K$ channel with interfering relays, consisting of $K$ source--destination pairs and $N$ half-duplex relays in-between them. A subset of relays using alternate relaying is opportunistically…
▽ More
We introduce a new achievability scheme, termed opportunistic network decoupling (OND), operating in virtual full-duplex mode. In the scheme, a novel relay scheduling strategy is utilized in the $K\times N\times K$ channel with interfering relays, consisting of $K$ source--destination pairs and $N$ half-duplex relays in-between them. A subset of relays using alternate relaying is opportunistically selected in terms of producing the minimum total interference level, thereby resulting in network decoupling. As our main result, it is shown that under a certain relay scaling condition, the OND protocol achieves $K$ degrees of freedom even in the presence of interfering links among relays. Numerical evaluation is also shown to validate the performance of the proposed OND. Our protocol basically operates in a fully distributed fashion along with local channel state information, thereby resulting in a relatively easy implementation.
△ Less
Submitted 24 September, 2016;
originally announced September 2016.
-
Privacy-Preserving Human Activity Recognition from Extreme Low Resolution
Authors:
Michael S. Ryoo,
Brandon Rothrock,
Charles Fleming,
Hyun Jong Yang
Abstract:
Privacy protection from surreptitious video recordings is an important societal challenge. We desire a computer vision system (e.g., a robot) that can recognize human activities and assist our daily life, yet ensure that it is not recording video that may invade our privacy. This paper presents a fundamental approach to address such contradicting objectives: human activity recognition while only u…
▽ More
Privacy protection from surreptitious video recordings is an important societal challenge. We desire a computer vision system (e.g., a robot) that can recognize human activities and assist our daily life, yet ensure that it is not recording video that may invade our privacy. This paper presents a fundamental approach to address such contradicting objectives: human activity recognition while only using extreme low-resolution (e.g., 16x12) anonymized videos. We introduce the paradigm of inverse super resolution (ISR), the concept of learning the optimal set of image transformations to generate multiple low-resolution (LR) training videos from a single video. Our ISR learns different types of sub-pixel transformations optimized for the activity classification, allowing the classifier to best take advantage of existing high-resolution videos (e.g., YouTube videos) by creating multiple LR training videos tailored for the problem. We experimentally confirm that the paradigm of inverse super resolution is able to benefit activity recognition from extreme low-resolution videos.
△ Less
Submitted 26 December, 2016; v1 submitted 11 April, 2016;
originally announced April 2016.
-
On the Degrees-of-Freedom of the Large-Scale Interfering Two-Way Relay Network
Authors:
Hyun Jong Yang,
Won-Yong Shin,
Bang Chul Jung
Abstract:
Achievable degrees-of-freedom (DoF) of the large-scale interfering two-way relay network is investigated. The network consists of $K$ pairs of communication nodes (CNs) and $N$ relay nodes (RNs). It is assumed that $K\ll N$ and each pair of CNs communicates with each other through one of the $N$ relay nodes without a direct link between them. Interference among RNs is also considered. Assuming loc…
▽ More
Achievable degrees-of-freedom (DoF) of the large-scale interfering two-way relay network is investigated. The network consists of $K$ pairs of communication nodes (CNs) and $N$ relay nodes (RNs). It is assumed that $K\ll N$ and each pair of CNs communicates with each other through one of the $N$ relay nodes without a direct link between them. Interference among RNs is also considered. Assuming local channel state information (CSI) at each RN, a distributed and opportunistic RN selection technique is proposed for the following three promising relaying protocols: amplify--forward, decode--forward, and compute--forward. As a main result, the asymptotically achievable DoF is characterized as $N$ increases for the three relaying protocols. In particular, a sufficient condition on $N$ required to achieve the certain DoF of the network is analyzed. Through extensive simulations, it is shown that the proposed RN selection techniques outperform conventional schemes in terms of achievable rate even in practical communication scenarios. Note that the proposed technique operates with a distributed manner and requires only local CSI, leading to easy implementation for practical wireless systems.
△ Less
Submitted 7 February, 2016;
originally announced February 2016.
-
Opportunistic Downlink Interference Alignment
Authors:
Hyun Jong Yang,
Won-Yong Shin,
Bang Chul Jung,
Changho Suh,
Arogyaswami Paulraj
Abstract:
In this paper, we propose an opportunistic downlink interference alignment (ODIA) for interference-limited cellular downlink, which intelligently combines user scheduling and downlink IA techniques. The proposed ODIA not only efficiently reduces the effect of inter-cell interference from other-cell base stations (BSs) but also eliminates intra-cell interference among spatial streams in the same ce…
▽ More
In this paper, we propose an opportunistic downlink interference alignment (ODIA) for interference-limited cellular downlink, which intelligently combines user scheduling and downlink IA techniques. The proposed ODIA not only efficiently reduces the effect of inter-cell interference from other-cell base stations (BSs) but also eliminates intra-cell interference among spatial streams in the same cell. We show that the minimum number of users required to achieve a target degrees-of-freedom (DoF) can be fundamentally reduced, i.e., the fundamental user scaling law can be improved by using the ODIA, compared with the existing downlink IA schemes. In addition, we adopt a limited feedback strategy in the ODIA framework, and then analyze the required number of feedback bits leading to the same performance as that of the ODIA assuming perfect feedback. We also modify the original ODIA in order to further improve sum-rate, which achieves the optimal multiuser diversity gain, i.e., $\log \log N$, per spatial stream even in the presence of downlink inter-cell interference, where $N$ denotes the number of users in a cell. Simulation results show that the ODIA significantly outperforms existing interference management techniques in terms of sum-rate in realistic cellular environments. Note that the ODIA operates in a distributed and decoupled manner, while requiring no information exchange among BSs and no iterative beamformer optimization between BSs and users, thus leading to an easier implementation.
△ Less
Submitted 18 April, 2014; v1 submitted 27 December, 2013;
originally announced December 2013.
-
Codebook-Based Opportunistic Interference Alignment
Authors:
Hyun Jong Yang,
Bang Chul Jung,
Won-Yong Shin,
Arogyaswami Paulraj
Abstract:
Opportunistic interference alignment (OIA) asymptotically achieves the optimal degrees-of-freedom (DoF) in interfering multiple-access channels (IMACs) in a distributed fashion, as a certain user scaling condition is satisfied. For the multiple-input multiple-output IMAC, it was shown that the singular value decomposition (SVD)-based beamforming at the users fundamentally reduces the user scaling…
▽ More
Opportunistic interference alignment (OIA) asymptotically achieves the optimal degrees-of-freedom (DoF) in interfering multiple-access channels (IMACs) in a distributed fashion, as a certain user scaling condition is satisfied. For the multiple-input multiple-output IMAC, it was shown that the singular value decomposition (SVD)-based beamforming at the users fundamentally reduces the user scaling condition required to achieve any target DoF compared to that for the single-inputmultiple-output IMAC. In this paper, we tackle two practical challenges of the existing SVD-based OIA: 1) the need of full feedforward of the selected users' beamforming weight vectors and 2) a low rate achieved based on the exiting zero-forcing (ZF) receiver. We first propose a codebook-based OIA, in which the weight vectors are chosen from a pre-defined codebook with a finite size so that information of the weight vectors can be sent to the belonging BS with limited feedforward. We derive the codebook size required to achieve the same user scaling condition as the SVD-based OIA case for both Grassmannian and random codebooks. Surprisingly, it is shown that the derived codebook size is the same for the two considered codebook approaches. Second, we take into account an enhanced receiver at the base stations (BSs) in pursuit of improving the achievable rate based on the ZF receiver. Assuming no collaboration between the BSs, the interfering links between a BS and the selected users in neighboring cells are difficult to be acquired at the belonging BS. We propose the use of a simple minimum Euclidean distance receiver operating with no information of the interfering links. With the help of the OIA, we show that this new receiver asymptotically achieves the channel capacity as the number of users increases.
△ Less
Submitted 8 October, 2013;
originally announced October 2013.
-
Opportunistic Interference Alignment for MIMO Interfering Multiple-Access Channels
Authors:
Hyun Jong Yang,
Won-Yong Shin,
Bang Chul Jung,
Arogyaswami Paulraj
Abstract:
We consider the $K$-cell multiple-input multiple-output (MIMO) interfering multiple-access channel (IMAC) with time-invariant channel coefficients, where each cell consists of a base station (BS) with $M$ antennas and $N$ users having $L$ antennas each. In this paper, we propose two opportunistic interference alignment (OIA) techniques utilizing multiple transmit antennas at each user: antenna sel…
▽ More
We consider the $K$-cell multiple-input multiple-output (MIMO) interfering multiple-access channel (IMAC) with time-invariant channel coefficients, where each cell consists of a base station (BS) with $M$ antennas and $N$ users having $L$ antennas each. In this paper, we propose two opportunistic interference alignment (OIA) techniques utilizing multiple transmit antennas at each user: antenna selection-based OIA and singular value decomposition (SVD)-based OIA. Their performance is analyzed in terms of \textit{user scaling law} required to achieve $KS$ degrees-of-freedom (DoF), where $S(\le M)$ denotes the number of simultaneously transmitting users per cell. We assume that each selected user transmits a single data stream at each time-slot. It is shown that the antenna selection-based OIA does not fundamentally change the user scaling condition if $L$ is fixed, compared with the single-input multiple-output (SIMO) IMAC case, which is given by $\text{SNR}^{(K 1)S}$, where SNR denotes the signal-to-noise ratio. In addition, we show that the SVD-based OIA can greatly reduce the user scaling condition to $\text{SNR}^{(K-1)S-L+1}$ through optimizing a weight vector at each user. Simulation results validate the derived scaling laws of the proposed OIA techniques. The sum-rate performance of the proposed OIA techniques is compared with the conventional techniques in MIMO IMAC channels and it is shown that the proposed OIA techniques outperform the conventional techniques.
△ Less
Submitted 27 June, 2013; v1 submitted 21 February, 2013;
originally announced February 2013.