Stability Analysis in a Cognitive Radio System with Cooperative Beamforming
|
|
- Lucas Charles
- 5 years ago
- Views:
Transcription
1 Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST
2 Agenda 1 Motivation and Related Work 2 System and Data Models 3 Problem Insights and Formulation 4 Queue Service Rates 5 Stability analysis using dominant systems
3 Motivation and Related Work Queuing analysis in CRNs to study the stability of the primary and secondary networks Shortcomings of such models: no time-frequency sharing between primary and secondary networks Cooperative beamforming to increase the available spectrum opportunities for the secondary networks No queuing analysis to characterize the stability regions of such systems Our goal: study a CR scenario in which cooperative beamforming is enabled for the secondary network, and obtain the stability region of the system for the primary and secondary network
4 System and Data Models PU - Tx H p PU - Rx Primary Network: H ps H sp1 H sp2 H spk Single link (Tx-Rx pair) R 1 H s1 Primary transmit power P p Infinite buffer Q p - Bernoulli arrival R.P with mean λ SU - Tx R 2 H s2 H sk SU - Rx Noise at the receivers CN (0, 1) R K K Relaying Nodes Figure: System Model
5 System and Data Models Secondary Network: Single link (Tx-Rx pair) Relay-assisted transmission (K relays) operating in a decode-and-forward fashion Relays are close to the secondary source Power control on total transmitted power by all relays (P s P max Infinite buffer Q s - Bernoulli arrival R.P with mean λ s Noise at the receivers CN (0, 1) PU - Tx SU - Tx H p H ps R 1 R 2 R K H sp1 H s1 PU - Rx H sp2 H spk H s2 H sk K Relaying Nodes Figure: System Model SU - Rx
6 System and Data Models Channel Conditions: PU - Tx H p PU - Rx Small pathloss between secondary source and relays (error free communications) Imperfect sensing of primary transmission SU - Tx H ps R 1 R 2 H sp1 H sp2 H spk H s1 H s2 H sk SU - Rx Channel between relays and receivers are CN (0, 1) Slow fading (channel constant over many time slots) R K K Relaying Nodes Figure: System Model
7 System and Data Models PU - Tx H p PU - Rx System Operation: Perfect channel estimation at relays based on transmitted ARQs H ps R 1 H sp1 H sp2 H spk H s1 Channel estimations are reported to secondary transmitter (negligible time) SU - Tx R 2 H s2 H sk SU - Rx PU packets are sensed by secondary transmitter - imperfect sensing (p md and p fa R K K Relaying Nodes Figure: System Model
8 System and Data Models PU - Tx H p PU - Rx Secondary transmitter computes required beamforming weights H ps R 1 H sp1 H sp2 H spk H s1 Secondary data packet is sent to relays which decode perfectly (beamforming vector included in the header) SU - Tx R 2 H s2 H sk SU - Rx Time required for relay reception and decoding is negligible R K K Relaying Nodes Figure: System Model
9 System and Data Models PU - Tx H p PU - Rx If PU is detected w p = (I Φ)H s P s H H s (I Φ) H s SU - Tx H ps R 1 R 2 H sp1 H sp2 H spk H s1 H s2 SU - Rx If PU is not detected H sk H s w a = P s H. s R K K Relaying Nodes Figure: System Model
10 Problem Insights and Formulation If sensing was pefect: PU will not be aware of the secondary transmitter. What would only limit its achievable service rate (µ p ) is the channel conditions between PU Tx-Rx If sensing is not perfect: SU can unintentionally interfere with PU transmission, reducing achievable service rate of primary user For the SU: Two factors govern its achievable service rate (µ p ): 1 Channel conditions between relays and secondary destination 2 The rate at which PU uses the channel (i.e., λ p and µ p )
11 Problem Insights and Formulation Problem Formulation Stability for a queue is achieved iff λ < µ We try to find the stability region of the system (the regions of λ p and λ s for which the two queues are stable), i.e.: λ p < µ p λ s < µ s
12 Queue Service Rates Primary Queue: If secondary queue is empty OR secondary queue is not empty and PU is detected: p out,p = Pr{P p H p 2 < β p } = 1 exp( β p P p ) If secondary queue is not empty and PU is misdetected: { pout,p md Pp H p 2 } = Pr Hspw H a < β p Service rate: ( ) µ p = (1 p out,p ) Pr{Q s = 0} + (1 p md )Pr{Q s 0} + (1 p md out,p)p md Pr{Q s 0}
13 Queue Service Rates Secondary Queue: PU queue is empty AND not detected: p out,s = Pr{P s H s 2 < β s } PU queue is empty AND detected (false alarm): p fa out,s = Pr{ H H s w p 2 < β s } PU queue is not empty AND detected: PU queue is not empty AND misdetected: { p (d) H H out,s = Pr s w p 2 } { P p H ps < β s pout,s md Ps H s 2 } = Pr P p H ps < β s ( µ s = p out,s (1 p fa ) + pout,s fa p fa )Pr{Q p = 0} ( + p (d) out,s (1 p md) + pout,s md p md )Pr{Q p 0}
14 Stability analysis using dominant systems Continuing analysis is hard to interacting queues We use the concept of dominance : We assume two auxiliary systems 1 Primary queue is dominant (sends dummy packets when queue is empty) 2 Secondary queue is dominant (sends dummy packets when queue is empty) It is proven that the union of the stability regions of both systems is exactly the stability region of the original system
15 Stability analysis using dominant systems Primary dominant queue: Pr{Q p = 0} = 0 µ pd s = ( p (d) out,s (1 p md) + p md out,s p md ) Secondary queue does not depend on the state of primary queue (channel ( stationarity is guaranteed). ) We apply Little s theorem Pr{Q s = 0} = 1 λs µ pd s ) µ pd p = (1 p out,p ) λs p md (p out,p md p out,p µ pd s
16 Stability analysis using dominant systems Effect of changing P s : On secondary rate: Increasing P s increases µ pd s On primary rate: Increasing P s increases interference on the primary receiver when misdetection occurs Increasing P s helps SU empty its queue faster and evacuates the channel The impact of both effects depend on λ s and µ pd p Optimization problem over P s to maximize µ pd p max. P s λ p = µ pd p s.t. λ s < µ pd s, P s P max
17 Stability analysis using dominant systems Primary dominant queue: 1 1st Dominant System pd µ s P s range for Q s stability (λ s = 0.35) P s Figure: P p = 1, K = 4, p md = 0.1, p fa = 0.01, β p = β s = 1 and P max = 2.
18 Stability analysis using dominant systems Primary dominant queue: st Dominant System pd µ p λ s = 0 λ s = 0.1 λ s = P s Figure: P p = 1, K = 4, p md = 0.1, p fa = 0.01, β p = β s = 1 and P max = 2.
19 Stability analysis using dominant systems Secondary dominant queue: Pr{Q s = 0} = 0 µ sd p = (1 p out,p ) (1 p md ) + (1 pout,p)p md md Primary queue does not depend on the state of secondary queue (channel ( stationarity is guaranteed). ) We apply Little s theorem Pr{Q p = 0} = 1 λp µ sd p µ sd s = λ ( p µ sd p (d) out,s (1 p md) + p md p p fa out,s p fa ) + out,s p md p out,s (1 p fa ) ( p out,s (1 p fa ) + p fa out,s p fa )
20 Stability analysis using dominant systems Effect of changing P s : On primary rate: Increasing P s decreases µ sd p On secondary rate: Increasing P s enhances SINR of secondary transmission and increase µ sd s Increasing P s interferes with primary transmission - PU will occupy the channel for longer times which decreases µ sd s The impact of both effects depend on λ p and µ sd s Optimization problem over P s to maximize µ sd s max. P s λ s = µ pd s s.t. λ p < µ pd p, P s P max
21 Stability analysis using dominant systems Secondary dominant queue: nd Dominant System sd µ p P s range for Q p stability (λ p = 0.35) P s Figure: P p = 1, K = 4, p md = 0.1, p fa = 0.01, β p = β s = 1 and P max = 2.
22 Stability analysis using dominant systems Secondary dominant queue: 1 2nd Dominant System sd µ s 0.5 λ p = 0 λ = 0.1 p λ p = 0.35 λ p = P s Figure: P p = 1, K = 4, p md = 0.1, p fa = 0.01, β p = β s = 1 and P max = 2.
23 Stability analysis using dominant systems Stability region of the original system: 1 Stability region of the 2nd dominant system Stability region of the 1st dominant system λ p λ s 1 λ p 0.5 Stability region of the system with two interacting queues λ s Figure: K = 4, p md = 0.1, p fa = 0.01, β p = β s = 1 and P max = 2.
24 Stability analysis using dominant systems Stability region of the original system: Stability region of the system with two interacting queues (P p = 10) Stability region of the system with two interacting queues (P p = 1) λ 0.5 p λ s Figure: P p = 1, 10, K = 4, p md = 0.1, p fa = 0.01, β p = β s = 1 and P max = 2.
25 Thank you For any questions, feel free to contact the author at m h karmoose@alexu.edu.eg
A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation
A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New
More informationIEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) 1. Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio
IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio Yulong Zou, Member, IEEE, Yu-Dong Yao, Fellow, IEEE, and Baoyu Zheng,
More informationABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013
ABSTRACT Title of dissertation: CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS Anthony A. Fanous, Doctor of Philosophy, 2013 Dissertation directed by: Professor Anthony Ephremides Department of Electrical
More informationWIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationStability analysis of a cognitive multiple access channel with primary QoS constraints
tability analysis of a cognitive multiple access channel with primary o constraints J. Gambini 1,2,O.imeone 1, U. pagnolini 2,.Bar-Ness 1 andungsooim 3 1 CWCR, NJIT, Newark, New Jersey 07102-1982, UA 2
More informationTrust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems
Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and
More informationSpectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy
Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012
More informationNovel spectrum sensing schemes for Cognitive Radio Networks
Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced
More informationTransmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback
IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of
More informationEnergy-Aware Cooperative Wireless Networks with Multiple Cognitive Users
1 Energy-Aware Cooperative Wireless Networks with Multiple Cognitive Users Mahmoud Ashour, Member, IEEE, M.Majid Butt, Senior Member, IEEE, Amr Mohamed, Senior Member, IEEE, Tamer ElBatt, Senior Member,
More informationJob Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley)
Job Scheduling and Multiple Access Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) 1 Multiple Access Setting Characteristics of Multiple Access: Bursty Arrivals Uncoordinated Transmitters Interference
More informationCensoring for Improved Sensing Performance in Infrastructure-less Cognitive Radio Networks
Censoring for Improved Sensing Performance in Infrastructure-less Cognitive Radio Networks Mohamed Seif 1 Mohammed Karmoose 2 Moustafa Youssef 3 1 Wireless Intelligent Networks Center (WINC),, Egypt 2
More informationTRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS
The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,
More informationPerformance Evaluation of Censoring-Enabled Systems for Sequential Detection in Large Wireless Sensor Networks
Performance Evaluation of Censoring-Enabled Systems for Sequential Detection in Large Wireless Sensor Networks Mohammed Karmoose Karim Seddik 2 Ahmed Sultan Electrical Engineering Dept, Alexandria University
More informationOptimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio
More informationCooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks
Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks by Nagwa Shaghluf B.S., Tripoli University, Tripoli, Libya, 2009 A Thesis Submitted in Partial Fulfillment of the Requirements
More informationSecrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View
Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View P. Mohapatra 9 th March 2013 Outline Motivation Problem statement Achievable scheme 1 Weak interference
More informationMultiaccess Communication
Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,
More informationSami Akin and Mustafa Cenk Gursoy. Abstract
Performance Analysis of Cognitive Radio Systems 1 under QoS Constraints and Channel Uncertainty Sami Akin and Mustafa Cenk Gursoy arxiv:1005.0375v2 [cs.it] 2 Nov 2010 Abstract In this paper, performance
More informationModeling and Simulation NETW 707
Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides
More informationDelay QoS Provisioning and Optimal Resource Allocation for Wireless Networks
Syracuse University SURFACE Dissertations - ALL SURFACE June 2017 Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Yi Li Syracuse University Follow this and additional works
More informationInteractive Interference Alignment
Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,
More informationII. THE TWO-WAY TWO-RELAY CHANNEL
An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable
More informationSTABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS
The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung
More informationANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT
ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT Chin Keong Ho Eindhoven University of Technology Eindhoven, The Netherlands Jean-Paul M. G. Linnartz Philips Research Laboratories Eindhoven,
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014
More informationThe Capacity Region of the Gaussian Cognitive Radio Channels at High SNR
The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract
More informationEnergy Harvesting Multiple Access Channel with Peak Temperature Constraints
Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,
More informationStability Analysis of Slotted Aloha with Opportunistic RF Energy Harvesting
1 Stability Analysis of Slotted Aloha with Opportunistic RF Energy Harvesting Abdelrahman M.Ibrahim, Ozgur Ercetin, and Tamer ElBatt arxiv:151.6954v2 [cs.ni] 27 Jul 215 Abstract Energy harvesting (EH)
More informationPractical Interference Alignment and Cancellation for MIMO Underlay Cognitive Radio Networks with Multiple Secondary Users
Practical Interference Alignment and Cancellation for MIMO Underlay Cognitive Radio Networks with Multiple Secondary Users Tianyi Xu Dept. Electrical & Computer Engineering University of Delaware Newark,
More informationHalf-Duplex Gaussian Relay Networks with Interference Processing Relays
Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras
More informationApplications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012
Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications
More informationABSTRACT ENERGY HARVESTING COMMUNICATION NETWORKS WITH SYSTEM COSTS. Title of dissertation: Ahmed Arafa, Doctor of Philosophy, 2017
ABSTRACT Title of dissertation: ENERGY HARVESTING COMMUNICATION NETWORKS WITH SYSTEM COSTS Ahmed Arafa, Doctor of Philosophy, 2017 Dissertation directed by: Professor Şennur Ulukuş Department of Electrical
More informationRenewal-Theoretical Dynamic Spectrum Access in Cognitive Radio Networks with Unknown Primary Behavior
1 -Theoretical Dynamic Spectrum Access in Cognitive Radio Networks with Unknown Primary Behavior arxiv:1111.4969v1 [cs.ni] 21 Nov 2011 Chunxiao Jiang, Yan Chen, K. J. Ray Liu, and Yong Ren Department of
More informationCognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information
Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information Fabio E. Lapiccirella, Zhi Ding and Xin Liu Electrical and Computer Engineering University of California, Davis, California
More informationIntroduction to Markov Chains, Queuing Theory, and Network Performance
Introduction to Markov Chains, Queuing Theory, and Network Performance Marceau Coupechoux Telecom ParisTech, departement Informatique et Réseaux marceau.coupechoux@telecom-paristech.fr IT.2403 Modélisation
More informationNash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels
Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,
More informationApproximately achieving the feedback interference channel capacity with point-to-point codes
Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used
More informationUsing Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing
Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Mihir Laghate and Danijela Cabric Department of Electrical Engineering, University of California, Los Angeles Emails:
More informationChannel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting
1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University
More informationComputer Networks More general queuing systems
Computer Networks More general queuing systems Saad Mneimneh Computer Science Hunter College of CUNY New York M/G/ Introduction We now consider a queuing system where the customer service times have a
More informationCapacity of a Two-way Function Multicast Channel
Capacity of a Two-way Function Multicast Channel 1 Seiyun Shin, Student Member, IEEE and Changho Suh, Member, IEEE Abstract We explore the role of interaction for the problem of reliable computation over
More informationOutline Network structure and objectives Routing Routing protocol protocol System analysis Results Conclusion Slide 2
2007 Radio and Wireless Symposium 9 11 January 2007, Long Beach, CA. Lifetime-Aware Hierarchical Wireless Sensor Network Architecture with Mobile Overlays Maryam Soltan, Morteza Maleki, and Massoud Pedram
More informationStochastic Optimization for Undergraduate Computer Science Students
Stochastic Optimization for Undergraduate Computer Science Students Professor Joongheon Kim School of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea 1 Reference 2 Outline
More informationAn Energy Efficient Cognitive Radio System with Quantized Soft Sensing and Duration Analysis
An Energy Efficient Cognitive Radio System with Quantized Soft Sensing and Duration Analysis AbdulRahman Alabbasi and Basem Shihada Computer Electrical and Mathematical Science and Engineering CEMSE) Division
More informationOptimal Harvest-or-Transmit Strategy for Energy Harvesting Underlay Cognitive Radio Network
Optimal Harvest-or-Transmit Strategy for Energy Harvesting Underlay Cognitive Radio Network Kalpant Pathak and Adrish Banerjee Department of Electrical Engineering, Indian Institute of Technology Kanpur,
More informationPerformance Analysis of Physical Layer Network Coding
Performance Analysis of Physical Layer Network Coding by Jinho Kim A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy Electrical Engineering: Systems)
More informationClean relaying aided cognitive radio under the coexistence constraint
Clean relaying aided cognitive radio under the coexistence constraint Pin-Hsun Lin, Shih-Chun Lin, Hsuan-Jung Su and Y.-W. Peter Hong Abstract arxiv:04.3497v [cs.it] 8 Apr 0 We consider the interference-mitigation
More informationOptimal Sensing-Transmission Structure for Dynamic Spectrum Access
Optimal Sensing-Transmission Structure for Dynamic Spectrum Access Senhua Huang, Xin Liu, and Zhi Ding University of California, Davis, CA 9566, USA Abstract In cognitive wireless networks where secondary
More informationELEC546 Review of Information Theory
ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random
More informationApproximate Queueing Model for Multi-rate Multi-user MIMO systems.
An Approximate Queueing Model for Multi-rate Multi-user MIMO systems Boris Bellalta,Vanesa Daza, Miquel Oliver Abstract A queueing model for Multi-rate Multi-user MIMO systems is presented. The model is
More information1646 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 4, APRIL 2016
646 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 4, APRIL 6 On the Throughput Capacity Study for Aloha Mobile Ad Hoc Networks Yin Chen, Member, IEEE, Yulong Shen, Member, IEEE, Jinxiao Zhu, Xiaohong
More informationNOMA: Principles and Recent Results
NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve
More informationIncremental Coding over MIMO Channels
Model Rateless SISO MIMO Applications Summary Incremental Coding over MIMO Channels Anatoly Khina, Tel Aviv University Joint work with: Yuval Kochman, MIT Uri Erez, Tel Aviv University Gregory W. Wornell,
More informationOptimal Power Allocation for Energy Recycling Assisted Cooperative Communications
Optimal Power llocation for Energy Recycling ssisted Cooperative Communications George. Ropokis, M. Majid Butt, Nicola Marchetti and Luiz. DaSilva CONNECT Centre, Trinity College, University of Dublin,
More informationPower Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,
More informationA Comparison of Cooperative Transmission Schemes for the Multiple Access Relay Channel
A Comparison of Cooperative Transmission Schemes for the ultiple Access elay Channel André Angierski andre.angierski@uni-rostock.de 0/03/7 UNIVESITY OF OSTOCK FACULTY OF COPUTE SCIENCE AND ELECTICAL ENGINEEING
More informationCooperative Cognitive Radio Networks: Spectrum Acquisition and Co-Channel Interference Effect
Cooperative Cognitive Radio Networks: Spectrum Acquisition and Co-Channel Interference Effect by Ala Abu Alkheir A thesis submitted to the Department of Electrical and Computer Engineering in conformity
More informationOn the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels
On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742
More informationWireless Transmission with Energy Harvesting and Storage. Fatemeh Amirnavaei
Wireless Transmission with Energy Harvesting and Storage by Fatemeh Amirnavaei A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in The Faculty of Engineering
More informationDegrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel
/33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,
More informationEfficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers
Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers Johannes Lindblom, Eleftherios Karipidis and Erik G. Larsson Linköping
More informationOn the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels
On the Optimality of Myopic Sensing 1 in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels Kehao Wang, Lin Chen arxiv:1103.1784v1 [cs.it] 9 Mar 2011 Abstract Recent works ([1],
More informationCapacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming
Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming Authors: Christian Lameiro, Alfredo Nazábal, Fouad Gholam, Javier Vía and Ignacio Santamaría University of Cantabria,
More informationOnline Scheduling for Energy Harvesting Broadcast Channels with Finite Battery
Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,
More informationThroughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting
Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210
More informationMaximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks
Maximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks Shuang Li, Student Member, IEEE, Zizhan Zheng, Member, IEEE, Eylem Ekici, Senior Member, IEEE, and Ness Shroff, Fellow, IEEE
More informationQueue length analysis for multicast: Limits of performance and achievable queue length with random linear coding
Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits
More informationMulti-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems
Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User
More informationCognitive Networks Achieve Throughput Scaling of a Homogeneous Network
Cognitive Networks Achieve Throughput Scaling of a Homogeneous Network Sang-Woon Jeon, Student Member, IEEE, Natasha Devroye, Mai vu, Member, IEEE Sae-Young Chung, Senior Member, IEEE, and Vahid Tarokh
More informationMulti-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems
Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User
More informationMapper & De-Mapper System Document
Mapper & De-Mapper System Document Mapper / De-Mapper Table of Contents. High Level System and Function Block. Mapper description 2. Demodulator Function block 2. Decoder block 2.. De-Mapper 2..2 Implementation
More informationA Systematic Approach for Interference Alignment in CSIT-less Relay-Aided X-Networks
A Systematic Approach for Interference Alignment in CSIT-less Relay-Aided X-Networks Daniel Frank, Karlheinz Ochs, Aydin Sezgin Chair of Communication Systems RUB, Germany Email: {danielfrank, karlheinzochs,
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,
More informationLimited Feedback in Wireless Communication Systems
Limited Feedback in Wireless Communication Systems - Summary of An Overview of Limited Feedback in Wireless Communication Systems Gwanmo Ku May 14, 17, and 21, 2013 Outline Transmitter Ant. 1 Channel N
More informationInterference Channels with Source Cooperation
Interference Channels with Source Cooperation arxiv:95.319v1 [cs.it] 19 May 29 Vinod Prabhakaran and Pramod Viswanath Coordinated Science Laboratory University of Illinois, Urbana-Champaign Urbana, IL
More informationrequests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1
Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet
More informationSecure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel
Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu
More informationOn the Capacity of the Two-Hop Half-Duplex Relay Channel
On the Capacity of the Two-Hop Half-Duplex Relay Channel Nikola Zlatanov, Vahid Jamali, and Robert Schober University of British Columbia, Vancouver, Canada, and Friedrich-Alexander-University Erlangen-Nürnberg,
More informationThe Robustness of Dirty Paper Coding and The Binary Dirty Multiple Access Channel with Common Interference
The and The Binary Dirty Multiple Access Channel with Common Interference Dept. EE - Systems, Tel Aviv University, Tel Aviv, Israel April 25th, 2010 M.Sc. Presentation The B/G Model Compound CSI Smart
More informationEnergy Efficient Multiuser Scheduling: Statistical Guarantees on Bursty Packet Loss
Energy Efficient Multiuser Scheduling: Statistical Guarantees on Bursty Packet Loss M. Majid Butt, Eduard A. Jorswieck and Amr Mohamed Department of Computer Science and Engineering, Qatar University,
More informationApproximate Capacity of Fast Fading Interference Channels with no CSIT
Approximate Capacity of Fast Fading Interference Channels with no CSIT Joyson Sebastian, Can Karakus, Suhas Diggavi Abstract We develop a characterization of fading models, which assigns a number called
More informationSequential Opportunistic Spectrum Access with Imperfect Channel Sensing
Sequential Opportunistic Spectrum Access with Imperfect Channel Sensing Tao Shu and Marwan Krunz Department of Computer Science and Engineering Oakland University, Rochester, MI Department of Electrical
More informationOn the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation
On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation Mikael Fallgren Royal Institute of Technology December, 2009 Abstract
More informationElectrical Engineering Written PhD Qualifier Exam Spring 2014
Electrical Engineering Written PhD Qualifier Exam Spring 2014 Friday, February 7 th 2014 Please do not write your name on this page or any other page you submit with your work. Instead use the student
More informationHierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks
Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Ayfer Özgür, Olivier Lévêque Faculté Informatique et Communications Ecole Polytechnique Fédérale de Lausanne 05 Lausanne, Switzerland
More informationCooperative and Cognitive Communication Techniques for Wireless Networks. Christos Tsinos
Cooperative and Cognitive Communication Techniques for Wireless Networks by Christos Tsinos Submitted to the Department of Computer Engineering and Informatics in fulfillment of the requirements for the
More informationFundamental Limits of Invisible Flow Fingerprinting
Fundamental Limits of Invisible Flow Fingerprinting Ramin Soltani, Dennis Goeckel, Don Towsley, and Amir Houmansadr Electrical and Computer Engineering Department, University of Massachusetts, Amherst,
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationGiuseppe Bianchi, Ilenia Tinnirello
Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop
More informationDEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE
DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE Daohua Zhu, A. Lee Swindlehurst, S. Ali A. Fakoorian, Wei Xu, Chunming Zhao National Mobile Communications Research Lab, Southeast
More informationDecentralized Cognitive Radio Control based on Inference from Primary Link Control Information
Decentralized Cognitive Radio Control based on Inference from Primary Link Control Information 1 Senhua Huang, Xin Liu, and Zhi Ding University of California, Davis Davis, CA 95616, USA Abstract This work
More informationABSTRACT WIRELESS COMMUNICATIONS. criterion. Therefore, it is imperative to design advanced transmission schemes to
ABSTRACT Title of dissertation: DELAY MINIMIZATION IN ENERGY CONSTRAINED WIRELESS COMMUNICATIONS Jing Yang, Doctor of Philosophy, 2010 Dissertation directed by: Professor Şennur Ulukuş Department of Electrical
More informationPerformance Analysis of Spectrum Sensing Techniques for Future Wireless Networks
This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions
More informationOpportunistic Cooperation in Cognitive Femtocell Networks
1 Opportunistic Cooperation in Cognitive Femtocell Networks Rahul Urgaonkar, Member, IEEE, and Michael J. Neely, Senior Member, IEEE Abstract We investigate opportunistic cooperation between secondary
More informationSingle-User MIMO systems: Introduction, capacity results, and MIMO beamforming
Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming Master Universitario en Ingeniería de Telecomunicación I. Santamaría Universidad de Cantabria Contents Introduction Multiplexing,
More informationThe Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference
The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference Soheyl Gherekhloo, Anas Chaaban, and Aydin Sezgin Chair of Communication Systems RUB, Germany Email: {soheyl.gherekhloo,
More informationRadio Relay Networks
Dynamic Decentralized Algorithms for Cognitive Radio Relay Networks Siavash Bayat, Raymond H. Y. Louie, Branka Vucetic, Yonghui Li Centre of Excellence in Telecommunications, School of Electrical and Information
More informationCognitive Radio Networking with Cooperative and Energy Harvesting
Cognitive Radio Networing with Cooperative and Energy Harvesting Ala eddin Masadeh, Ahmed E. Kamal, Zhengdao Wang Iowa State University (ISU), Ames, IA 50011, USA, emails: amasadeh,amal,zhengdao}@iastate.edu
More information