Robust Beamforming in Cache-Enabled Cloud Radio Access Networks

Size: px
Start display at page:

Download "Robust Beamforming in Cache-Enabled Cloud Radio Access Networks"

Transcription

1 1 Roust Beaforing in Cache-Enaled Cloud Radio Access Networks Oussaa Dhifallah, Student Meer, IEEE, ayssa Dahrouj, Senior Meer, IEEE, Tareq Y. Al-Naffouri, Meer, IEEE, Mohaed-Sli Alouini, Fellow, IEEE arxiv: v2 [cs.it] 31 May 2016 Astract Popular content caching is expected to play a ajor role in efficiently reducing ackhaul congestion and achieving user satisfaction in next generation oile radio systes. Consider the downlink of a cache-enaled cloud radio access network CRAN), where each cache-enaled ase-station BS) is equipped with liited-size local cache storage. The central coputing unit cloud) is connected to the BSs via a liited capacity ackhaul link and serves a set of single-antenna oile users MUs). This paper assues that only iperfect channel state inforation CSI) is availale at the cloud. It focuses on the prole of iniizing the total network power and ackhaul cost so as to deterine the eaforing vector of each user across the network, the quantization noise covariance atrix, and the BS clustering suject to iperfect channel state inforation and fixed cache placeent assuptions. The paper suggests solving such a difficult, non-convex optiization prole using the sei-definite relaxation SDR). The paper then uses the l 0-nor approxiation to provide a feasile, su-optial solution using the ajorizationiniization MM) approach. Siulation results particularly show how the cache-enaled network significantly iproves the ackhaul cost especially at high signal-to-interference-plus-noise ratio SINR) values as copared to conventional cache-less CRANs. I. INTRODUCTION Cloud radio access network CRAN) is recognized as a proising network architecture to eet the treendous increase in data traffic for future wireless networks [1] [3]. In CRANs, a central coputing unit cloud) is connected to several BSs through ackhaul links which allow joint signal processing of user signals. This allows for effective interference anageent and significant energy consuption reduction. Further, to eet the increasing deands in oile data traffic, an increase in the network density is expected, which adds stringent constraints on the ackhaul load. This paper considers the strategy of proactively caching the popular users content in the local eory of the BSs during the off-peak tie. Such strategy is shown to significantly alleviate ackhaul congestion and satisfy users deand [4]. Consider the downlink of a cache-enaled CRAN, where each BS is equipped with a local eory with liited-size. Each cache-enaled BS is connected to the cloud via liitedcapacity ackhaul link. The central coputing unit serves a set of pre-known single-antenna MUs. The paper assues that only iperfect CSI is availale at the cloud. The paper further considers the quantization noise induced y the eployed copression schees due to the capacity-liited ackhaul links. The perforance of the syste ecoes, therefore, a function of the copression schee, as well as the eaforing vector of each user across the network. The prole considered in this paper is related to the recent state-of-art on CRANs. For instance, references [5] [9] consider a CRAN scenario and allow all BSs across the network to fetch the requested data fro the cloud. In dense data networks, however, such assuption ay no longer e feasile ecause of the high-cost of, and the difficulties in, deploying proliferated high-capacity ackhaul networks. As a result, the ackhaul congestion is expected to ecoe a liiting factor in futuristic dense networks perforance. To truly access the advantages harvested y CRAN, this paper considers the ore practical scenario of a cache-enaled CRAN where each BS is equipped with a local eory and connected to the cloud via capacityliited ackhaul links. Such a scenario is particularly related to reference [10], which addresses a ulticast cache-enaled CRAN and forulates the total network cost iniization prole in order to find the eaforing vectors and BS clustering. owever, reference [10] assues perfect CSI availale at the cloud and neglects the effect of the eployed copression schees. The optiization prole forulated in the current paper is also related to the works in [7] [9]. Reference [7] assues a conventional cache-less) CRAN and focuses on solving the total network power iniization prole for oth the data-sharing strategy and copression strategy. Reference [8] focuses on solving the utility axiization prole for oth the dynaic and static BS clustering. Reference [9] assues hyrid connections etween the cloud and the BSs and focuses on iniizing the total network power iniization to jointly design the eaforing vector of each user across the network, the quantization noise covariance atrix of the wireline ackhaul links, and the transit power of the wireless ackhaul links. The works in [7], [8] and [9], however assue a conventional CRAN where all the BSs fetch the requested data fro the cloud, and that perfect CSI is availale at the cloud, unlike the current paper. This paper considers a cache-enaled CRAN where the popular content is cached in the local storage of the BSs. If the content requested y a MU is availale in the local cache, it is directly transitted fro the cache to the user with no need for ackhauling and copression. owever, if the data is not availale in the local cache, the BS fetches the data fro the cloud which perfors joint precoding and copression. Such pre-processing of the data introduces quantization noise, which degrades the syste perforance. The paper forulates the prole of iniizing the total network power and ackhaul cost suject to per-bs power constraint, quality of service constraints, total ackhaul capacity constraint, and iperfect CSI constraints. The paper highlight is that it proposes solving such a non-convex optiization prole using the sei-definite relaxation SDR) [11], and the S-Procedure ethod [12]. The proposed heuristic algorith uses the l 0 -nor approxiation to provide a feasile solution using the ajorization-iniization MM) approach [13]. Siulation results particularly show how the cache-enaled network significantly iproves the ackhaul cost especially at high SINR values as copared to conventional cache-less CRANs. II. SYSTEM MODEL AND PROBLEM A. Syste Model Consider the downlink of a cache-enaled CRAN, where the cloud is connected to B BSs through capacity-liited ackhaul links. Each BS serves U single-antenna MUs. Further, we assue that each BS is equipped with a local cache with liited storage. For the siplicity of analysis, we assue that each BS

2 2 is equipped with single-antenna, all the files have the sae size, and that the knowledge of cache and request status are known for the cloud. Figure 1 illustrates an exaple of the considered network with six cache-enaled BSs and nine MUs. Figure 1. Cloud Base Station Moile User Liited Capacity Backhaul Link Cache The considered CRAN architecture. Let B = {1,..,B} e the set of BSs connected to the cloud, andu = {1,..,U} e the set of users across the network. Let the eaforing vector fro all the BSs to user u U e w u = [w 1u, w 2u,.., w Bu ] T C B and let the channel vector fro all the BSs to user u e h u = [h 1u, h 2u,.., h Bu ] T C B. Further, let the quantization noise vector ev= [v 1, v 2,, v B ] C B, where v is non-unifor white Gaussian with diagonal covariance atrixq C B B of diagonal entriesq q 0, B). The syste odel considers that each cache-enaled BS has a local storage with size F. The cache placeent is descried through the cache placeent atrix P R B F, where p f = 1 when the content f is cached at, BS and p f = 0 otherwise, i.e. F f=1 p f < F, B. The atrix P is fixed throughout the paper. Considering it in the overall optiization increases the coplexity of our original prole, and is left for future work. The received signal y u C at user u can e written as follows: y u = h u w us u + h u w u s u + α h u v +n u, 1) u U u B where U u = U\{u}, s u denotes the transitted data syol for user u, n u CN0,σu 2 ) denotes the additive white Gaussian noise which is independent fro the transitted data syols s u and the quantization noise v, and where α = 0 when the contents requested is cached at BS, and 1 otherwise, since if the content f u requested y user u fro BS is availale in the local cache of BS, the BS transits the data directly without ackhauling and copression. owever, when the content f u is not in the cache of BS, it needs to e retrieved fro the cloud. B. Backhaul Cost and Power Model This paper considers the prole of iniizing the total network cost, which consists of the ackhaul cost and network power consuption. Firstly, the ackhaul cost is proportional to the transission rate of user u y eans of ackhauling. The ackhaul cost associated with BS serving user u can therefore e expressed as follows: { log2 1+δ u ) if p fu = 0 and w u 2 > 0 B u = 0 if p fu = 1 and w u 2 = 0. 2) where δ u denotes the target SINR to e achieved y user u. Secondly, the power consuption of BS can e odeled y: { 1 ν P = P,t +P,a +p P,c +U p )P,cl if P,t > 0 P,s if P,t = 0, 3) where P,t = w ) u 2 +α q denotes the total transit power consuption, ν denotes the power aplifier efficiency, and p = p f u is the total nuer of files requested, yet availale at BS s local cache. Further, P,a denotes the power consued y BS in the active ode, P,s denotes the power consued y BS in the sleep ode,p,c denotes the axiu power needed y BS to retrieve the requested data fro its local cache and P,cl denotes the axiu power needed y BS to retrieve the requested data fro the cloud. Therefore, the total power consuption can e rewritten as follows: P t = { } 1 w u 2 0 +α q )+ P,t P r +P,s, ν B 4) where P r = P,a +p P,c +U p )P,cl P,s denotes the relative power consuption. C. Prole Forulation The paper focuses on iniizing the total network cost suject to per-bs power consuption and total ackhaul capacity constraint, quality of service constraints, and CSI error constraints. This paper assues that the channel errors are ounded y an elliptical region. The true channel vector h u of user u can therefore e written as follows: h u = h u +e u, u U, 5) where e u denotes the CSI error vector of user u and it satisfies the following elliptical constraints e u E u e u < 1, 6) where h u denotes the estiated channel vector, and E u is a known positive definite atrix specifying the accuracy of the CSI. We assue that the user syols have unit power, i.e. E s u 2 ) = 1, u U, and independent fro each other, fro the quantization noise, and fro the additive noise. The SINR of user u can then e written as follows: h Γ u = u w u 2 h u w u 2 +. α h u 2 q +σ 2 7) u u U u B One of the constraints studied in this paper is the per-bs power constraint which is given y: w u 2 +α q P, B. 8) If the requested data fro a MU is not availale in the local cache of the BS, the data is fetched fro the cloud through the liited-capacity ackhaul link y eans of copression, which is assued to e independent aong users for the sake of siplicity. If the requested data is availale at the BS local cache, no copression is needed. Therefore, the eaforing vector associated with user u, the quantization noise level q, and the total ackhaul capacity C are related as follows: w u 2 +α q R C. 9) B 0 where R is given y: 1 p fu ) w u R = log ). 10) q

3 3 This paper iniizes the total network cost which consists of the total power consuption 4) and the ackhaul cost 2), i.e. C N = { 1 w u 2 +α q )+ w u 2 +α q r ν B 0P + } w u 2 0 R u 1 p fu ) 11) where R u = log 2 1+δ u ) denotes the service requireent rate target rate). The optiization prole studied in this paper can therefore e forulated as follows: in w,q C N 12) s.t. Constraints 5),6), 8), and 9) h Γ u = u w u 2 h u w u 2 +h u Qh δ u, u U. u +σu 2 u U u where the optiization is over the eaforing vectors w and the quantization noise vector q. The optiization prole 12) is difficult to handle due to the non-convexity of the cost function, the non-convexity of the total ackhaul capacity constraint 9), and the infinite set of possile CSI errors. This paper proposes a heuristic algorith instead, so as to solve 12) ased on the l 0 -nor approxiation using the MM approach. Siulation results suggest that such approach provides an appreciale perforance iproveent as copared to cacheless networks. Reark 1. If the contents requested fro BS y all the users across the network are availale in the local cache of BS, the corresponding quantization noise q is only in the SINR expression of the optiization prole 12). Thus, it is set to zero to increase the SINR value and satisfy the SINR constraints. The SINR expressions Γ u in 12) are, therefore, equivalent to the expressions in 7). III. A. Prole Relaxation PROPOSED SOLUTION To solve the difficult optiization prole 12), this section first relaxes the total ackhaul capacity constraint 9) to reduce the coplexity, y eans of a well-chosen l 0 -nor approxiation: 1+ǫ 1 x ) x 0 = Ix > 0) = li log1+ǫ 1, x 0. 13) ) The ackhaul capacity constraint 9) can then e approxiated as: { }) λ ǫ log 1+ǫ 1 w u 2 +α q R C, 14) B 1 where λ ǫ = log1+ǫ 1 ), and ǫ > 0 is a sall constant. As the approxiated constraint 14) is still non-convex, the paper next replaces the left hand side of 14) y an upper ound that helps reforulating 12) using the SDR afterwards. ǫ 0 log Theore 1. An upper-ound of the function on the left-hand side of the constraint 14) is given y: CM = λ w u 2 +α q ǫ R B wu 2 +α q +ǫ +a, 15) where a = log1 + ǫ 1 { w u 2 + α q }) { w u 2 +α q }/{ w u 2 +α q +ǫ}, and where wu and q denote the eaforing vector fro BS to user u and the quantization noise of BS of the previous iteration, respectively. Proof: Please Refer to Appendix A for details. After replacing the left-hand side of the constraint 14) y 15), the constraint 14) reains non-convex due to the presence of R. This paper, however, uses the trick of fixing R at each iteration +1 to R using the results fro the previous iteration, so as to convexify 14) at each iteration. Specifically, at iteration + 1, we solve the following optiization prole: in w,q C N 16) s.t. Constraints 5),6) and 8) ) λ ǫ γ R w u 2 +α q + a γ C B h Γ u = u w u 2 h u w u 2 +h u Qh δ u, u U u +σu 2 u U u γ 1 = B. wu 2 +α q +ǫ, Prole 16) reains a difficult, non-convex optiization prole despite convexifying constraint 9). In the next susection, the paper proposes solving the prole y intelligently approxiating it, and then solving it using the MM algorith to guarantee a stationary solution to the prole. B. SDP Reforulation First, define the rank-one atrix W u as W u = w u wu, u U. We now use the S-Procedure [12] and the rankone SDR approach [11] to facilitate the steps of our proposed algorith. Based on the introduced quadratic variales W u and after dropping the non-convex rank-one constraints, the relaxed iniization prole 16) can e reforulated as follows: in Ĉ N 17) s.t. B TrA W u )+α TrA Q) P ˆR ) TrA W u )+α TrA Q)+â C u 0, λ u 0, u U W u 0,Q 0,Q is diagonal, u U, where ĈN is given in 18), ˆR = γ R, â = a γ, A denotes the diagonal atrix with 1 at the ain diagonal entry and zeros otherwise, and where the optiization is over the eaforing atrices W u, the quantization noise covariance atrixq, and the introduced varialesλ u, and where the atrix u is denoted [ y: ] Gu +λ u = u E u G u hu h u G u h u G u hu σu 2, 19) λ u and where G u = 1 W u W u Q. 20) δ u u U u While the feasiility set of the optiization prole 17) is convex, the cost function 18) is still not convex. The paper, therefore, proposes deterining an approxiate solution to the relaxed optiization prole 17) y approxiating the l 0 - nor and, then, y using the MM algorith.

4 Ĉ N = { ) 1 TrA W u )+TrA Q) + TrA W u )+TrA Q) P r ν B 0 + } TrA W u ) R u 1 p fu ). 18) 0 4 C. Majorization-Miniization Approach To approxiate the l 0 -nor, use approxiation 13) for a sufficiently sall fixed ǫ. The cost function in the optiization prole 17), i.e., 18), can then e approxiated as follows: C N = { ) 1 TrA W u )+TrA Q) ν B }) +λ ǫ log 1+ǫ 1 { TrA W u )+TrA Q) P r +λ ǫ log 1+ǫ 1 TrA W u ) ) } R u 1 p fu ), 21) The aove cost function is not convex, and so the MM algorith is now used to find a stationary point to the otained optiization prole. The MM approach consists of first finding a surrogate function that ajorizes the cost function. Then, it iteratively iniizes the otained function until a local optial solution of the optiization prole with cost function 21) is reached. Theore 2. The surrogate function that ajorizes the function 21) at iteration +1 is given y: CN W u,q) = ) Bη TrA W u )+TrA Q) + βutra W u )+cwu,q ). 23) B where η, β u are given in 22) and cw u,q ) is a constant depending only on the eaforing atrices Wu and the quantization noise covariance atrix Q of the previous iteration. Proof: Please Refer to Appendix B for details. Using the aove theore, the MM approach solves the following optiization prole at the iteration + 1: in CNW u,q) 24) s.t. B TrA W u )+α TrA Q) P, B ˆR ) TrA W u )+α TrA Q)+â C u 0, λ u 0, u U W u 0,Q 0,Q is diagonal, u U, The aove optiization prole is a sei-definite prograing SDP). Therefore, it can e solved using efficient nuerical algoriths [12]. D. Proposed Iterative Algorith To solve the optiization prole, one can use a two loop algorith where the outer loop is responsile of updating ˆR and â, and the inner loop is responsile of solving the SDP prole 24) and then updating η and β. Such approach is nevertheless coputationally coplex in nature. The paper instead proposes an iterative algorith that coines the two loops and iterates etween two levels. At the first level, it solves +1 the optiization prole 24). Then, it updates R, γ +1, η +1 and β +1. We suarize the proposed relaxed MM algorith to find an approxiate solution to 12) in Tale 1. Algorith 1 The Iterative Relaxed MM Algorith Initialization : Initialize R 0, â0, η0 and β0 and the iteration index to = 0. Repeat : 1: Solve the optiization prole 24). If it is infeasile, go to End; +1 2: Update ˆR, â +1, η +1 and β +1 ; 3: Update the iteration index = +1; Until : Desired level of convergence. 4: Find the optial eaforing vectors wu, u U and the optial quantization noise covariance atrix Q. End Such algorith is further guaranteed to converge as shown in the following theore. Theore 3. The proposed iterative algorith is guaranteed to converge to a feasile, yet su-optial, solution of the original optiization prole 12) as ǫ tends to 0. Proof: Please Refer to Appendix C for details. The proposed algorith does not always lead to a rank-one solution. owever, a rank-one solution can always e guaranteed using the randoization techniques [12]. Siulation results in the next section show that the proposed iterative algorith leads to a rank-one solution in ost of the cases. E. Coputational Coplexity Analysis The ipleentation of the proposed iterative algorith requires to solve the SDP prole 24) with c = B +3U +3) SDP constraints and v = 2U + 1) SDP variales at each iteration. Further, the second step of the proposed algorith +1 consists of updating ˆR, â +1, η +1 and β +1. Therefore, the coputational coplexity of the proposed algorith coes ainly fro solving the SDP prole. If the otained solution does not satisfy the relaxed rank-one constraints, Gaussian randoization techniques [12] can e applied to estiate a rank-one solution. The coputational coplexity of the overall algorith then increases since, to guarantee a good solution, the randoization techniques need to e ran for a large nuer of saples. To solve the SDP proles generated at each iteration of the proposed algorith, one ay use the interior point ethod which is ipleented in ost advanced solvers, e.g. SDPT3 and SeDuMi. In large-scale network i.e., B and U are large), the coputational coplexity of the proposed algorith using the interior point ethod can e huge due to solving a largescale SDP prole at each iteration. To reduce coplexity, the splitting conic solver SCS) [14], which is ased on the ADMM algorith [15], can e applied to solve the large-scale SDP prole 24). The SCS solves the large-scale SDP prole

5 5 η = 1 λ ǫ P r + ν ǫ+ TrA Wu )+TrA Q ), β u = R u1 p fu )λ ǫ ǫ+tra W 22) u ). y perforing parallel cone projection and suspace projection which significantly reduces the coputational coplexity as copared to the interior point ased solvers. IV. SIMULATION RESULTS This section provides siulation exaples to illustrate the perforance of the proposed iterative algorith. It considers a cache-enaled CRAN scenario fored y B = 15 singleantenna cache-enaled BSs, where each BS is connected to U = 6 single-antenna MUs. The BSs and MUs are uniforily and independently distriuted in the square region[0 1000] [0 1000] eters. Further, the estiated channel vectors are generated using Rayleigh fading coponent and a distance-dependent path loss, odeled as Ld u ) = log 10 d u ), where d u denotes the distance etween BS and user u in kiloeters. Each user across the network randoly requests one content fro the BSs according to the content popularity, odeled as Zipf distriution with skewness paraeter 1. The noise power spectral density is set to σu 2 = 98 db u. We set the axiu transit power of BS to P = 1 Watt, the total ackhaul capacity liit to C = 560 Mps, the relative power consuption to P r = 38 Watts, ν = 2.5 and the accuracy atrix E u = 1 a I B where a > 0. Additionally, R0, â 0, η0 and β 0 B are initially all set to 1. The Cost Function 21) Figure Nuer of Iteration Convergence ehavior of the Iterative Relaxed MM Algorith. First, the SINR target is set to δ u = 10dB u U, the positive constant a to 0.01 and ǫ = Figure 2 shows the convergence ehavior of the proposed iterative algorith for different channel realizations. It can e noticed that the proposed algorith converges for all the considered channel realizations. Figure 2 further shows that the proposed algorith has a reasonale convergence speed around 20 iterations) for the considered channel realizations. It is especially rearkale that the cost function, i.e., function 21), is always driven downhill. This results validates the stateent in theore 3. Then, we assue that users across the network request different contents and the network is fored y B = 16 BSs and U = 8 MUs, where half of the scheduled users request a coon content, and the other half randoly request one content. Figure 3 shows the total ackhaul cost versus the target SINR. It can e noticed that the cache-enaled network significantly reduces the ackhaul cost especially at high SINR values as copared to the network without cache. It is especially Total Backhaul Cost Figure Popularity-Aware Cache, Size=6 Popularity-Aware Cache, Size=3 No-Cache SINR db) The total ackhaul cost as function of the target SINR. rearkale that increasing the cache size significantly reduces the total ackhaul cost. Tale I. PROBABILITY TAT TE OPTIMAL SOLUTION IS RANK-ONE. a = 0.8 a = 0.5 a = 0.1 a = 0.01 a = δ u = 5 db δ u = 10 db Finally, we assue that the network is fored y B = 10 BSs and U = 4 MUs. Tale I presents the proaility that the optial solution found using the proposed algorith is rankone for 500 channel realizations and various SINR targets and scalars a. It can e noticed that the solution found using the proposed algorith is rank-one with high proaility. Therefore, the Gaussian randoization technique is not used in ost of the cases, which reduces the coputational coplexity of the proposed iterative algorith. V. CONCLUSION Proactively caching popular content is expected to play a ajor role in alleviating ackhaul congestion proles. This paper considers the downlink of a cache-enaled CRAN, where each cache-enaled single-antenna BS serves a pre-known set of single-antenna MU. The paper assues that only iperfect CSI is availale at the cloud, and each BS is connected to the cloud through liited-capacity ackhaul link. The paper provides an iterative algorith to solve the total network power and ackhaul cost iniization prole. Siulation results show that the cache-enaled network significantly reduces the ackhaul cost especially at high SINR values as copared to networks without cache. APPENDIX A PROOF OF TEOREM 1 In this appendix, we will present a detailed proof of Theore 1. For ǫ > 0, the function x log1 + ǫ 1 x) is a concave function on the interval [0 + [. Based on the first order propriety of concave functions, the following inequality holds for any x 0 and x 0 log1+ǫ 1 x x) ǫ+x + log1+ǫ 1 x ) x ǫ+x. 25) Let wu and q denote the eaforing vector fro BS to user u and quantization noise of BS of the previous iteration

6 6 of the MM algorith and let x = w u 2 + α q and x = w u 2 +α q. Sustituting x and x in 25), the right hand side of 25) can e rewritten as follows w u 2 +α q T = ǫ+ wu 2 +α q wu 2 +α q ǫ+ wu 2 +α q + log1+ǫ 1 { wu 2 +α q }) w u 2 +α q = ǫ+ +a wu 2 +α q. 26) The following inequality{ holds for any w u }) and q 0 λ ǫ log 1+ǫ 1 w u 2 +α q R B w u 2 +α q 27) λ ǫ B ǫ+ +a wu 2 +α q R. Further, we can readily see that the aove inequality is achieved with equality when w u = wu and q = q, B, u U. An upper-ound of the function in the left hand side of the constraint 9) is the right hand side of the inequality 27). This copletes the proof of theore 1. APPENDIX B PROOF OF TEOREM 2 In this appendix, we will present a detailed proof of Theore 2. To this end, let Wu and Q denote the eaforing atrix associated with user u and the quantization noise covariance atrix of the previous iteration of the MM algorith, respectively. Based on the fact that the function x log1 + ǫ 1 x) is a concave function on the interval [0 + [, for ǫ > 0, we have }) and log 1+ǫ 1 { TrA W u )+TrA Q) TrA W u )+TrA Q) ǫ+ TrA Wu )+TrA Q ) +c 1Wu,Q ), 28) log 1+ǫ 1 TrA W u ) ) TrA W u ) ǫ+tra Wu ) +c u2wu ), 29) where c 1 Wu,Q ) and c u2 Wu ) are constants depending only on the eaforing atrices Wu and the quantization noise covariance atrix Q of the previous iteration. Based on 28) and 29), we have C N CNW u,q), 30) where cwu,q ) = λ ǫ c 1 Wu,Q )P r B +λ ǫ c u2 Wu )R u 1 p fu ). 31) B This copletes the proof of theore 2. APPENDIX C PROOF OF TEOREM 3 In this appendix, we will present a detailed proof of Theore 3. We start y proving that the Iterative Relaxed MM Algorith is guaranteed to converge. Specifically, we will first prove that the ojective function 21) is driven downhill, i.e. C N Wu +1,Q +1 ) C N Wu,Q ), 32) where denotes the iteration index. To this end, let Wu, Q, and Q +1 denote the optial solution of optiization prole at iteration and +1, respectively. We consider two particular cases in ters of whether Wu and Q are feasile for the optiization prole 24) at the iteration +1. Case one: when Wu and Q are feasile for the optiization prole 24) at the iteration +1. In this case, we have Wu +1 C N W +1 u,q +1 ) CN W+1 u,q +1 ) 33) = in CN W u,q) 34) s.t. Constraints in 24). CNW u,q ) 35) = C N Wu,Q ), 36) where 31) follows ecause Wu and Q are feasile for the optiization prole 24) at the iteration + 1. Case two: when Wu and Q are not feasile for the optiization prole 24) at the iteration +1. In this case, Wu and Q only violate the following constraint ) TrA W u )+α TrA Q)+â C. 37) B ˆR Given the optiization prole considered in this paper, the per-bs power constraints and the aove constraint 37) are only feasiility constraints and the SINR constraints are oth feasiility and optiality constraints. This eans that the SINR constraints are the only constraints that deterine the optial solution of the optiization prole 24). We know that Wu and Q verifies the SINR constraints and the per-bs power constraints of the optiization prole 24) ecause Wu and Q are the optial solution of 24) at the iteration. Further, we know that Wu +1 and Q +1 are the optial solution of 24) at the iteration +1. Since violating the constraints 37) does not influence the optiality of 24), we have CNW u +1,Q +1 ) = in C NW u,q) s.t. Constraints in 24) C NW u,q ). 38) This proves that the ojective function 21) is driven downhill. Thus, the Iterative Relaxed MM Algorith is guaranteed to converge. The relaxed constraint 37) is an upper ound of the approxiated total ackhaul capacity constraint 14). Thus, the solution of the Iterative Relaxed MM Algorith is a feasile solution of the original optiization prole as ǫ tends to 0. This copletes the proof of theore 3. REFERENCES [1] J. Andrews, S. Buzzi, W. Choi, S. anly, A. Lozano, A. Soong, and J. Zhang, What will 5G e? IEEE Journal on Selected Areas in Counications, vol. 32, no. 6, pp , June [2] Y. Shi, J. Zhang, and K. Letaief, Group sparse eaforing for green cloud-ran, IEEE Transactions on Wireless Counications, vol. 13, no. 5, pp , May [3]. Dahrouj, A. Douik, O. Dhifallah, T. Y. Al-Naffouri, and M.-S. Alouini, Resource allocation in heterogeneous cloud radio access networks: advances and challenges, IEEE, Wireless Counications, vol. 22, no. 3, pp , June 2015.

7 [4] X. Peng, J. C. Shen, J. Zhang, and K. B. Letaief, Joint data assignent and eaforing for ackhaul liited caching networks, in 2014 IEEE 25th Annual International Syposiu on Personal, Indoor, and Moile Radio Counication PIMRC), Sept 2014, pp [5] O. Dhifallah,. Dahrouj, T. Y. Al-Naffouri, and M.-S. Alouini, Decentralized group sparse eaforing for ulti-cloud radio access networks, in Proc. of IEEE Gloeco, San Diego, USA, Dec [6], Distriuted roust power iniization for the downlink of ulticloud radio access networks, suitted to IEEE Gloeco [7] B. Dai and W. Yu, Energy efficiency of downlink transission strategies for cloud radio access networks, IEEE Journal on Selected Areas in Counications, vol. PP, no. 99, pp. 1 1, [8], Sparse eaforing and user-centric clustering for downlink cloud radio access network, IEEE Access, vol. 2, pp , [9] O. Dhifallah,. Dahrouj, T. Y. Al-Naffouri, and M. Alouini, Joint hyrid ackhaul and access links design in cloud-radio access networks, in IEEE 82nd Vehicular Technology Conference, VTC Fall 2015, Boston, MA, USA, Septeer 6-9, 2015, 2015, pp [10]. Zhou, M. Tao, E. Chen, and W. Yu, Content-centric ulticast eaforing in cache-enaled cloud radio access networks, in 2015 IEEE Gloal Counications Conference GLOBECOM), Dec 2015, pp [11] G. Zheng, K. kit Wong, and T. sang Ng, Roust linear MIMO in the downlink: A worst-case optiization with ellipsoidal uncertainty regions, EURASIP J. Adv. Signal Process., June [12] S. Boyd and L. Vandenerghe, Convex Optiization. Caridge University Press, [13] D. R. unter and K. Lange, A tutorial on MM algoriths, Aer.Statistician, pp , [14] B. O Donoghue, E. Chu, N. Parikh, and S. Boyd, Conic optiization via operator splitting and hoogeneous self-dual eedding, Journal of Optiization Theory and Applications, pp. 1 27, [15] S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, Distriuted optiization and statistical learning via the alternating direction ethod of ultipliers, Found. Trends Mach. Learn., vol. 3, no. 1, pp , Jan

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc 3rd International Conference on Machinery, Materials and Inforation echnology Applications (ICMMIA 015) Sparse beaforing in peer-to-peer relay networs Yunshan ou a, Zhijuan Qi b, Jianhua Chenc College

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

On the Design of MIMO-NOMA Downlink and Uplink Transmission

On the Design of MIMO-NOMA Downlink and Uplink Transmission On the Design of MIMO-NOMA Downlink and Uplink Transission Zhiguo Ding, Meber, IEEE, Robert Schober, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract In this paper, a novel MIMO-NOMA fraework for

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services Energy Efficient Predictive Resource Allocation for VoD and Real-tie Services Changyang She and Chenyang Yang 1 arxiv:1707.01673v1 [cs.it] 6 Jul 2017 Abstract This paper studies how to exploit the predicted

More information

4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015

4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015 4920 IEEE TRASACTIOS O COMMUICATIOS, VOL. 63, O. 12, DECEMBER 2015 Energy Efficient Coordinated Beaforing for Multicell Syste: Duality-Based Algorith Design and Massive MIMO Transition Shiwen He, Meber,

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

Convex Programming for Scheduling Unrelated Parallel Machines

Convex Programming for Scheduling Unrelated Parallel Machines Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network 565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

EQUIVALENT CIRCUIT MODEL OF SEMICONDUCTOR LASERS TAKING ACCOUNT OF GAIN SUPPRESSION

EQUIVALENT CIRCUIT MODEL OF SEMICONDUCTOR LASERS TAKING ACCOUNT OF GAIN SUPPRESSION EQUIVALENT CIRCUIT MODEL OF SEMICONDUCTOR LASERS TAKING ACCOUNT OF GAIN SUPPRESSION Kaiz Aedi and Mohsen Khanzadeh Departent of Electrical Engineering, Faculty of Electrical and Coputer Engineering, Shahid

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Green Inter-Cluster Interference Management in Uplink of Multi-Cell Processing Systems

Green Inter-Cluster Interference Management in Uplink of Multi-Cell Processing Systems IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Green Inter-Cluster Interference Manageent in Uplink of Multi-Cell Processing Systes Efstathios Katranaras, Meber, IEEE, Muhaad Ali Iran, Senior Meber, IEEE,

More information

OPTIMIZATION in multi-agent networks has attracted

OPTIMIZATION in multi-agent networks has attracted Distributed constrained optiization and consensus in uncertain networks via proxial iniization Kostas Margellos, Alessandro Falsone, Sione Garatti and Maria Prandini arxiv:603.039v3 [ath.oc] 3 May 07 Abstract

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

THE Internet of Things (IoT) has been widely developed

THE Internet of Things (IoT) has been widely developed Coputation Rate Maxiization in UAV-Enabled Wireless Powered Mobile-Edge Coputing Systes Fuhui Zhou, Meber, IEEE, Yongpeng Wu, Senior Meber, IEEE, Rose Qingyang Hu, Senior Meber, IEEE, and Yi Qian, Senior

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Device-to-Device Collaboration through Distributed Storage

Device-to-Device Collaboration through Distributed Storage Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

An improved self-adaptive harmony search algorithm for joint replenishment problems

An improved self-adaptive harmony search algorithm for joint replenishment problems An iproved self-adaptive harony search algorith for joint replenishent probles Lin Wang School of Manageent, Huazhong University of Science & Technology zhoulearner@gail.co Xiaojian Zhou School of Manageent,

More information

Bit Error Probability of M-ary Phase Shift Keying with MRC Receive Diversity over Nakagami-m Fading Channel

Bit Error Probability of M-ary Phase Shift Keying with MRC Receive Diversity over Nakagami-m Fading Channel 7th nternational Syposiu on age and and Analysis (SPA ) Septeer 4-6,, Durovnik, Croatia Bit Error Proaility of M-ary Phase Shift Keying with MRC Receive Diversity over Nakagai- Fading Channel Vepati Srinivasa

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS Pratik Patil, Binbin Dai, and Wei Yu Department of Electrical and Computer Engineering University of Toronto,

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

MR Image Segmentation based on Local Information Entropy Geodesic Active Contour Model

MR Image Segmentation based on Local Information Entropy Geodesic Active Contour Model Vol.9, No.4 (014), pp.17-136 http://dx.doi.org/10.1457/ijue.014.9.4.14 MR Iage Segentation ased on Local Inforation Entropy Geodesic Active Contour Model Jianwei Zhang 1, Xiang Ma 1, Yunjie Chen 1, Lin

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

Asynchronous Gossip Algorithms for Stochastic Optimization

Asynchronous Gossip Algorithms for Stochastic Optimization Asynchronous Gossip Algoriths for Stochastic Optiization S. Sundhar Ra ECE Dept. University of Illinois Urbana, IL 680 ssrini@illinois.edu A. Nedić IESE Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu

More information

Detection and Estimation Theory

Detection and Estimation Theory ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer

More information

The proofs of Theorem 1-3 are along the lines of Wied and Galeano (2013).

The proofs of Theorem 1-3 are along the lines of Wied and Galeano (2013). A Appendix: Proofs The proofs of Theore 1-3 are along the lines of Wied and Galeano (2013) Proof of Theore 1 Let D[d 1, d 2 ] be the space of càdlàg functions on the interval [d 1, d 2 ] equipped with

More information

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup)

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup) Recovering Data fro Underdeterined Quadratic Measureents (CS 229a Project: Final Writeup) Mahdi Soltanolkotabi Deceber 16, 2011 1 Introduction Data that arises fro engineering applications often contains

More information

Stochastic Subgradient Methods

Stochastic Subgradient Methods Stochastic Subgradient Methods Lingjie Weng Yutian Chen Bren School of Inforation and Coputer Science University of California, Irvine {wengl, yutianc}@ics.uci.edu Abstract Stochastic subgradient ethods

More information

System Performance of Interference Alignment under TDD Mode with Limited Backhaul Capacity

System Performance of Interference Alignment under TDD Mode with Limited Backhaul Capacity Syste Perforance of Interference Alignent under TDD Mode with Liited Bachaul Capacity Matha Deghel, Mohaad Assaad and Mérouane Debbah Departent of Telecounications SUPELEC, Gif-sur-Yvette, France Matheatical

More information

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ

More information

Distributed Power Control in Full Duplex Wireless Networks

Distributed Power Control in Full Duplex Wireless Networks Distributed Power Control in Full Duplex Wireless Networks Yu Wang and Shiwen Mao Departent of Electrical and Coputer Engineering, Auburn University, Auburn, AL 36849-5201 Eail: yzw0049@tigerail.auburn.edu,

More information

SINR Estimation in Limited Feedback Coordinated Multi-point Systems

SINR Estimation in Limited Feedback Coordinated Multi-point Systems SINR Estiation in Liited Feedback Coordinated Multi-point Systes Di Su, Chenyang Yang, Gang Wang, and Ming Lei Abstract Coordinated ulti-point (CoMP) transission can provide high spectral efficiency for

More information

Content Caching and Delivery in Wireless Radio Access Networks

Content Caching and Delivery in Wireless Radio Access Networks Content Caching and Delivery in Wireless Radio Access Networks Meixia Tao, Deniz Gündüz, Fan Xu, and Joan S. Pujol Roig Abstract arxiv:904.07599v [cs.it] 6 Apr 209 Today s obile data traffic is doinated

More information

Minimum Rates Scheduling for MIMO OFDM Broadcast Channels

Minimum Rates Scheduling for MIMO OFDM Broadcast Channels IEEE Ninth International Syposiu on Spread Spectru Techniques and Applications Miniu Rates Scheduling for MIMO OFDM Broadcast Channels Gerhard Wunder and Thoas Michel Fraunhofer Geran-Sino Mobile Counications

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Level Crossing Rate in Terms of the Characteristic Function: A New Approach for Calculating the Fading Rate in Diversity Systems

Level Crossing Rate in Terms of the Characteristic Function: A New Approach for Calculating the Fading Rate in Diversity Systems Level Crossing Rate in ers of e Characteristic Function: A New Approach for Calculating e Fading Rate in Diversity Systes Ali Adi Meer IEEE and Mostafa Kaveh Fellow IEEE Dept. of Elec. and Cop. Eng. New

More information

A method to determine relative stroke detection efficiencies from multiplicity distributions

A method to determine relative stroke detection efficiencies from multiplicity distributions A ethod to deterine relative stroke detection eiciencies ro ultiplicity distributions Schulz W. and Cuins K. 2. Austrian Lightning Detection and Inoration Syste (ALDIS), Kahlenberger Str.2A, 90 Vienna,

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

Data-Driven Imaging in Anisotropic Media

Data-Driven Imaging in Anisotropic Media 18 th World Conference on Non destructive Testing, 16- April 1, Durban, South Africa Data-Driven Iaging in Anisotropic Media Arno VOLKER 1 and Alan HUNTER 1 TNO Stieltjesweg 1, 6 AD, Delft, The Netherlands

More information

Research Article Data Reduction with Quantization Constraints for Decentralized Estimation in Wireless Sensor Networks

Research Article Data Reduction with Quantization Constraints for Decentralized Estimation in Wireless Sensor Networks Matheatical Probles in Engineering Volue 014, Article ID 93358, 8 pages http://dxdoiorg/101155/014/93358 Research Article Data Reduction with Quantization Constraints for Decentralized Estiation in Wireless

More information

Rateless Codes for MIMO Channels

Rateless Codes for MIMO Channels Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT

More information

Construction of One-Bit Transmit-Signal Vectors for Downlink MU-MISO Systems with PSK Signaling

Construction of One-Bit Transmit-Signal Vectors for Downlink MU-MISO Systems with PSK Signaling 1 Construction of One-Bit Transit-Signal Vectors for Downlink MU-MISO Systes with PSK Signaling Gyu-Jeong Park and Song-Na Hong Ajou University, Suwon, Korea, eail: {net2616, snhong}@ajou.ac.kr and quantized

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

Selfish Traffic Allocation for Server Farms

Selfish Traffic Allocation for Server Farms Selfish Traffic Allocation for Server Fars Artur Czua Departent of Coputer Science New Jersey Institute of Technology czua@cis.nit.edu Piotr Krysta Max-Planck-Institut für Inforatik Saarrücken, Gerany

More information

Content-aware Cooperative Transmission in HetNets with Consideration of Base Station Height

Content-aware Cooperative Transmission in HetNets with Consideration of Base Station Height This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content ay change prior to final publication. Citation inforation: DOI.9/TVT.8.8966, IEEE

More information

Matrix Inversion-Less Signal Detection Using SOR Method for Uplink Large-Scale MIMO Systems

Matrix Inversion-Less Signal Detection Using SOR Method for Uplink Large-Scale MIMO Systems Matrix Inversion-Less Signal Detection Using SOR Method for Uplin Large-Scale MIMO Systes Xinyu Gao, Linglong Dai, Yuting Hu, Zhongxu Wang, and Zhaocheng Wang Tsinghua National Laboratory for Inforation

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

An Adaptive UKF Algorithm for the State and Parameter Estimations of a Mobile Robot

An Adaptive UKF Algorithm for the State and Parameter Estimations of a Mobile Robot Vol. 34, No. 1 ACTA AUTOMATICA SINICA January, 2008 An Adaptive UKF Algorith for the State and Paraeter Estiations of a Mobile Robot SONG Qi 1, 2 HAN Jian-Da 1 Abstract For iproving the estiation accuracy

More information

Rate of Channel Hardening of Antenna Selection Diversity Schemes and Its Implication on Scheduling

Rate of Channel Hardening of Antenna Selection Diversity Schemes and Its Implication on Scheduling SUBMITTED TO THE IEEE TRANSACTIONS ON INFORMATION THEORY Rate of Channel Hardening of Antenna Selection Diversity Schees and Its Iplication on Scheduling arxiv:cs/0703022v [cs.it] 5 Mar 2007 Dongwoon Bai,

More information

Effective joint probabilistic data association using maximum a posteriori estimates of target states

Effective joint probabilistic data association using maximum a posteriori estimates of target states Effective joint probabilistic data association using axiu a posteriori estiates of target states 1 Viji Paul Panakkal, 2 Rajbabu Velurugan 1 Central Research Laboratory, Bharat Electronics Ltd., Bangalore,

More information

Finite Horizon Throughput Maximization and Sensing Optimization in Wireless Powered Devices over Fading Channels

Finite Horizon Throughput Maximization and Sensing Optimization in Wireless Powered Devices over Fading Channels Finite Horizon Throughput Maxiization and Sensing Optiization in Wireless Powered Devices over Fading Channels Mehdi Salehi Heydar Abad, Ozgur Ercetin arxiv:1804.01834v2 [cs.it] 9 Sep 2018 Abstract Wireless

More information

Motion Analysis of Euler s Disk

Motion Analysis of Euler s Disk Motion Analysis of Euler s Disk Katsuhiko Yaada Osaka University) Euler s Disk is a nae of a scientific toy and its otion is the sae as a spinning coin. In this study, a siple atheatical odel is proposed

More information

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. IX Uncertainty Models For Robustness Analysis - A. Garulli, A. Tesi and A. Vicino

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. IX Uncertainty Models For Robustness Analysis - A. Garulli, A. Tesi and A. Vicino UNCERTAINTY MODELS FOR ROBUSTNESS ANALYSIS A. Garulli Dipartiento di Ingegneria dell Inforazione, Università di Siena, Italy A. Tesi Dipartiento di Sistei e Inforatica, Università di Firenze, Italy A.

More information

Bayes Decision Rule and Naïve Bayes Classifier

Bayes Decision Rule and Naïve Bayes Classifier Bayes Decision Rule and Naïve Bayes Classifier Le Song Machine Learning I CSE 6740, Fall 2013 Gaussian Mixture odel A density odel p(x) ay be ulti-odal: odel it as a ixture of uni-odal distributions (e.g.

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

Lecture 20 November 7, 2013

Lecture 20 November 7, 2013 CS 229r: Algoriths for Big Data Fall 2013 Prof. Jelani Nelson Lecture 20 Noveber 7, 2013 Scribe: Yun Willia Yu 1 Introduction Today we re going to go through the analysis of atrix copletion. First though,

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

Gary J. Balas Aerospace Engineering and Mechanics, University of Minnesota, Minneapolis, MN USA

Gary J. Balas Aerospace Engineering and Mechanics, University of Minnesota, Minneapolis, MN USA μ-synthesis Gary J. Balas Aerospace Engineering and Mechanics, University of Minnesota, Minneapolis, MN 55455 USA Keywords: Robust control, ultivariable control, linear fractional transforation (LFT),

More information

Deflation of the I-O Series Some Technical Aspects. Giorgio Rampa University of Genoa April 2007

Deflation of the I-O Series Some Technical Aspects. Giorgio Rampa University of Genoa April 2007 Deflation of the I-O Series 1959-2. Soe Technical Aspects Giorgio Rapa University of Genoa g.rapa@unige.it April 27 1. Introduction The nuber of sectors is 42 for the period 1965-2 and 38 for the initial

More information

Identical Maximum Likelihood State Estimation Based on Incremental Finite Mixture Model in PHD Filter

Identical Maximum Likelihood State Estimation Based on Incremental Finite Mixture Model in PHD Filter Identical Maxiu Lielihood State Estiation Based on Increental Finite Mixture Model in PHD Filter Gang Wu Eail: xjtuwugang@gail.co Jing Liu Eail: elelj20080730@ail.xjtu.edu.cn Chongzhao Han Eail: czhan@ail.xjtu.edu.cn

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Weighted- 1 minimization with multiple weighting sets

Weighted- 1 minimization with multiple weighting sets Weighted- 1 iniization with ultiple weighting sets Hassan Mansour a,b and Özgür Yılaza a Matheatics Departent, University of British Colubia, Vancouver - BC, Canada; b Coputer Science Departent, University

More information

Nuclear Instruments and Methods in Physics Research B 262 (2007)

Nuclear Instruments and Methods in Physics Research B 262 (2007) Nuclear Instruents and Methods in Physics Research B 262 (27) 33 322 NIM B Bea Interactions with Materials & Atos www.elsevier.co/locate/ni Peak shape ethods for general order theroluinescence glow-peaks:

More information

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,

More information

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS BIT Nuerical Matheatics 43: 459 466, 2003. 2003 Kluwer Acadeic Publishers. Printed in The Netherlands 459 RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS V. SIMONCINI Dipartiento di

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

Asymptotically-Exact Performance Bounds of AF Multi-Hop Relaying over Nakagami Fading

Asymptotically-Exact Performance Bounds of AF Multi-Hop Relaying over Nakagami Fading 96 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 4, APRIL 0 Asyptotically-Exact Perforance Bounds of AF Multi-Hop Relaying over Nakagai Fading Gayan Aarasuriya, Student Meer, IEEE, Chintha Tellaura,

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

Correlated Bayesian Model Fusion: Efficient Performance Modeling of Large-Scale Tunable Analog/RF Integrated Circuits

Correlated Bayesian Model Fusion: Efficient Performance Modeling of Large-Scale Tunable Analog/RF Integrated Circuits Correlated Bayesian odel Fusion: Efficient Perforance odeling of Large-Scale unable Analog/RF Integrated Circuits Fa Wang and Xin Li ECE Departent, Carnegie ellon University, Pittsburgh, PA 53 {fwang,

More information

Compressive Sensing Over Networks

Compressive Sensing Over Networks Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA Septeber 29 - October, 200 Copressive Sensing Over Networks Soheil Feizi MIT Eail: sfeizi@it.edu Muriel Médard MIT Eail: edard@it.edu

More information

The Methods of Solution for Constrained Nonlinear Programming

The Methods of Solution for Constrained Nonlinear Programming Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 01-06 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.co The Methods of Solution for Constrained

More information

Linear Precoding for Large MIMO Configurations and QAM Constellations

Linear Precoding for Large MIMO Configurations and QAM Constellations 1 Linear Precoding for Large MIMO Configurations and QAM Constellations Abstract In this paper, the proble of designing a linear precoder for Multiple-Input Multiple-Output (MIMO systes in conjunction

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters Coplexity reduction in low-delay Farrowstructure-based variable fractional delay FIR filters utilizing linear-phase subfilters Air Eghbali and Håkan Johansson Linköping University Post Print N.B.: When

More information

Optimum Value of Poverty Measure Using Inverse Optimization Programming Problem

Optimum Value of Poverty Measure Using Inverse Optimization Programming Problem International Journal of Conteporary Matheatical Sciences Vol. 14, 2019, no. 1, 31-42 HIKARI Ltd, www.-hikari.co https://doi.org/10.12988/ijcs.2019.914 Optiu Value of Poverty Measure Using Inverse Optiization

More information

Support recovery in compressed sensing: An estimation theoretic approach

Support recovery in compressed sensing: An estimation theoretic approach Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de

More information

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations Randoized Accuracy-Aware Progra Transforations For Efficient Approxiate Coputations Zeyuan Allen Zhu Sasa Misailovic Jonathan A. Kelner Martin Rinard MIT CSAIL zeyuan@csail.it.edu isailo@it.edu kelner@it.edu

More information

Adaptation to the Primary User CSI in Cognitive Radio Sensing and Access

Adaptation to the Primary User CSI in Cognitive Radio Sensing and Access Adaptation to e Priary User CSI in Cognitive Radio Sensing and Access Yuan Lu, Alexandra Duel-Hallen Departent of Electrical and Coputer Engineering Nor Carolina State University Raleigh, NC, 2766 {ylu8,

More information