Non-orthogonal Multiple Access in Large-Scale. Underlay Cognitive Radio Networks
|
|
- Corey Robbins
- 6 years ago
- Views:
Transcription
1 Non-orthogonal Multile Access in Large-Scale 1 Underlay Cognitive Radio Networks Yuanwei Liu, Zhiguo Ding, Maged Elkashlan, and Jinhong Yuan Abstract In this aer, non-orthogonal multile access (NOMA is alied to large-scale underlay cognitive radio (CR networks with randomly deloyed users. In order to characterize the erformance of the considered network, arxiv: v1 [cs.it] 14 Jan 216 new closed-form exressions of the outage robability are derived using stochastic-geometry. More imortantly, by carrying out the diversity analysis, new insights are obtained under the two scenarios with different ower constraints: 1 fixed transmit ower of the rimary transmitters (PTs, and 2 transmit ower of the PTs being roortional to that of the secondary base station. For the first scenario, a diversity order of m is exerienced at the m-th ordered NOMA user. For the second scenario, there is an asymtotic error floor for the outage robability. Simulation results are rovided to verify the accuracy of the derived results. A ivotal conclusion is reached that by carefully designing target data rates and ower allocation coefficients of users, NOMA can outerform conventional orthogonal multile access in underlay CR networks. Index Terms Cognitive radio, large-scale network, non-orthogonal multile access, stochastic geometry I. INTRODUCTION Sectrum efficiency is of significant imortance and becomes one of the main design targets for future fifth generation networks. Non-orthogonal multile access (NOMA has received considerable attention because of its otential to achieve suerior sectral efficiency [1]. Particularly, different from conventional multile access (MA techniques, NOMA uses the ower domain to serve multile users at different ower levels in order to use sectrum more efficiently. A downlink NOMA and an ulink NOMA are considered in [2] and [3], resectively. The alication of multile-inut multile-outut (MIMO techniques to NOMA has been considered in [4] by using zero-forcing detection matrices. The authors in [5] investigated an ergodic caacity maximization roblem for MIMO NOMA systems. Y. Liu and M. Elkashlan are with Queen Mary University of London, London, UK ( yuanwei.liu, maged.elkashlan}@qmul.ac.uk. Z. Ding is with Lancaster University, Lancaster, UK ( z.ding@lancaster.ac.uk. J. Yuan is with the University of New South Wales, Sydney, Australia ( j.yuan@unsw.edu.au.
2 2 Another aroach to imrove sectrum efficiency is the aradigm of underlay cognitive radio (CR networks, which was roosed in [6] and has rekindled increasing interest in using sectrum more efficiently. The key idea of underlay CR networks is that each secondary user (SU is allowed to access the sectrum of the rimary users (PUs as long as the SU meets a certain interference threshold in the rimary network (PN. In [7], an underlay CR network taking into account the satial distribution of the SU relays and PUs was considered and its erformance was evaluated by using stochastic geometry tools. In [8], a new CR insired NOMA scheme has been roosed and the imact of user airing has been examined, by focusing on a simle scenario with only one rimary transmitter (PT. By introducing the aforementioned two concets, it is natural to consider the alication of NOMA in underlay CR networks using additional ower control at the secondary base station (BS to imrove the sectral efficiency. Stochastic geometry is used to model a large-scale CR network with a large number of randomly deloyed PTs and rimary receivers (PRs. We consider a ractical system design as follows: 1 All the SUs, PTs, and PRs are randomly deloyed based on the considered stochastic geometry model; 2 Each SU suffers interference from other NOMA SUs as well as the PTs; and 3 The secondary BS must satisfy a redefined ower constraint threshold to avoid interference at the PRs. New closed-form exressions of the outage robability of the NOMA users are derived to evaluate the erformance of the considered CR NOMA network. Moreover, considering two different ower constraints at the PTs, diversity order 1 analysis is carried out with roviding imortant insights: 1 When the transmit ower of the PTs is fixed, the m-th user among all ordered NOMA user exeriences a diversity order of m; and 2 When the the transmit ower of the PTs is roortional to that of the secondary BS, an asymtotic error floor exists for the outage robability. II. NETWORK MODEL We consider a large-scale underlay sectrum sharing scenario consisting of the PN and the secondary network (SN. In the SN, we consider that a secondary BS is located at the origin of a disc, denoted by D with radius R D as its coverage. The M randomly deloyed secondary users are uniformly distributed 1 Diversity order is defined as the sloe for the outage rovability curve decreasing with the signal-to-noise-ratio (SNR. It measures the number of indeendent fading aths over which the data is received. In NOMA networks, since users channels are ordered and SIC is alied at each receiver, it is of imortance to investigate the diversity order.
3 3 within the disc which is the user zone for NOMA. The secondary BS communicates with all SUs within the disc by alying the NOMA transmission rotocol. It is worthy ointing out that the ower of the secondary transmitter is constrained in order to limit the interference at the PRs. In the PN, we consider a random number of PTs and PRs distributed in an infinite two dimensional lane. The satial toology of all the PTs and PRs are modeled using homogeneous oisson oint rocesses (PPPs, denoted by Φ b and Φ l with density λ b and λ l, resectively. All channels are assumed to be quasi-static Rayleigh fading where the channel coefficients are constant for each transmission block but vary indeendently between different blocks. According to underlay CR, the transmit ower P t at the secondary BS is constrained as follows: I P t = min max g l 2,P s, (1 l Φ l where I is the maximum ermissible interference ower at the PRs, P s is maximum transmission ower at the secondary BS, g l 2 = ĝ l 2 L(d l is the overall channel gain from the secondary BS to PRs l. Here, ĝ l is small-scale fading with ĝ l CN(,1, L(d l = 1 1+d α l is large-scale ath loss, d l is the distance between the secondary BS and the PRs, and α is the ath loss exonent. A bounded ath loss model is used to ensure the ath loss is always larger than one even for small distances [2, 9]. According to NOMA, the BS sends a combination of messages to all NOMA users, and the observation at the m-th secondary user is given by M y m = h m an P t x n +n m, (2 n=1 where n m is the additive white Gaussian noise (AWGN at the m-th user with variance σ 2, a n is the ower allocation coefficient for the n-th SU with M n=1 a n = 1, x n is the information for the n-th user, and h m is the channel coefficient between the m-th user and the secondary BS. For the SUs, they also observe the interferences of the randomly deloyed PTs in the PN. Usually, when the PTs are close to the secondary NOMA users, they will cause significant interference. To overcome this issue, we introduce an interference guard zone D to each secondary NOMA user with radius of d, which means that there is no interference from PTs allowed inside this zone [1]. We assume d 1 in
4 4 this aer. The interference links from the PTs to the SUs are dominated by the ath loss and is given by I B = b Φ b L(d b, (3 where L(d b = 1/(1+d α b is the large-scale ath loss and d b is the distance from the PTs to the SUs. Without loss of generality, all the channels of SUs are assumed to follow the order as h 1 2 h 2 2 h M 2. The ower allocation coefficients are assumed to follow the order as a 1 a 2 a M. According to the NOMA rincile, successive interference cancelation (SIC is carried out at the receivers [11]. It is assumed that 1 j m < i. In this case, the m-th user can decode the message of the j-th user and treats the message for the i-th user as interference. Secifically, the m-th user first decodes the messages of all the (m users, and then successively subtracts these messages to obtain its own information. Therefore, the received signal-to-interference-lus-noise ratio (SINR for the m-th user to decode the information of the j-th user is given by } h m 2 γ t a j γ m,j =, (4 M h m 2 γ t a i +ρ b I B +1 i=j+1 ρ where γ t = min,ρ max g l 2 s, ρ = I,ρ σ 2 s = Ps,ρ σ 2 b = P B σ 2, and P B is the transmit ower of the PTs, h m 2 l Φ l is the overall ordered channel gain from the secondary BS to the m-th SU. For the case m = j, it indicates the m-th user decodes the message of itself. Note that the SINR for the M-th SU is γ M,M = h M 2 γ ta M ρ b I B +1. III. OUTAGE PROBABILITY In this section, we rovide exact analysis of the considered networks in terms of outage robability. In NOMA, an outage occurs if the m-th user can not detect any of the j-th user s message, where j m due to the SIC. Denote X m = hm 2 γ t ρ b I B +1. Based on (4, the cumulative distribution function (CDF of X m is given by } h m 2 γ t F Xm (ε = Pr ρ b I B +1 < ε. (5 ( We denote ε j = τ j / a j τ M j i=j+1 a i for j < M, τ j = 2 R j 1, R j is the target data rate for the j-th user, ε M = τ M /a M, and ε max m exressed as follows: = maxε 1,ε 2,...,ε m }. The outage robability at the m-th user can be P m = PrX m < ε max m } = F Xm (ε max m, (6
5 5 where the condition a j τ j M i=j+1 a i > should be satisfied due to alying NOMA, otherwise the outage robability will always be one [2]. We need calculate the CDF of X m conditioned on I B and γ t. Rewrite (5 as follows: F Xm I B,γ t (ε = F hm 2 ( (ρb I B +1ε γ t, (7 where F hm 2 is the CDF of h m. Based on order statistics [12] and alying binomial exansion, the CDF of the ordered channels has a relationshi with the unordered channels as follows: M m F 2(y = ψ ( M m ( ( m+ hm m F m+ h 2 (y, (8 = where y = (ρ bi B +1ε M! γ t, ψ m =, and (M m!(m! h 2 = arbitrary SU. Here, ĥ 2 L(d is the unordered channel gain of an ĥ is the small-scale fading coefficient with ĥ CN(,1, L(d = 1 1+d α is the largescale ath loss, and d is a random variable reresenting the distance from the secondary BS to an arbitrary SU. Then using the assumtion of homogenous PPP and alying the olar coordinates, we exress F h 2(y as follows: F 2(y = 2 RD ( 1 e (1+r α y rdr. (9 h RD 2 Note that it is challenging to obtain an insightful exression for the unordered CDF. As such, we aly the Gaussian-Chebyshev quadrature [13] to find an aroximation for (9 as F 2(y N b h n e cny, (1 n= where N is a comlexity-accuracy tradeoff arameter, b n = ω N 1 φ 2 n (φ n +1, b = N b n, c n = 1+ ( R D2 (φ n +1 α, ωn = π N, and φ n = cos ( 2n 2N π. Substituting (1 into (8 and alying the multinomial theorem, we obtain M m F hm 2 (y = ψ ( M m ( ( ( m+ N m m+ q + +q N = q + +q N =m+ n= b qn n e n=1 n=y. (11
6 6 where ( m+ q + +q N = (m+! F Xm (ε j =. Based on (11, the CDF of X q! q N! m can be exressed as follows: f IB (xf γt (zdxdz M m =ψ m = ( (ρb x+1ε j F hm 2 z ( M m ( e εj z m+ q + +q N =m+ q nc n n= e xρbεj z ( m+ q + +q N ( N n= nc n n=q f IB (xdxf γt (zdz, (12 }} } } Q 1 where f γt is the PDF of γ t. We exress Q 2 in (12 as follows: Q 2 = e xρbεj z n= Q 2 f IB (xdx = E Φb e xρ b ε j z } n= = L IB ( xρ b ε j z b qn n q n c n. (13 In this case, the Lalace transformation of the interferences from the PT can be exressed as [1] where δ = 2 α ( L IB (s = ex λ b π = ex λ ( bπ [(e sd α d 2 +sδ γ ( ] 1 δ,sd α e sd α sd α d 2 +s δ and γ( is the lower incomlete Gamma function. } } Θ n= t δ e t dt, (14 To obtain an insightful exression, we use Gaussian-Chebyshev quadrature to aroximate the lower incomlete Gamma function in (14, Θ can be exressed as follows: Θ s 1 δ L l=1 β l e t lsd α, (15 where L is a comlexity-accuracy tradeoff arameter, β l = 1 2 d2 α ω L 1 θ 2 l t l δ, t l = 1 2 (θ l +1, ω L = π L, and θ l = cos ( 2l π. Substituting (15 into (14, we aroximate the Lalace transformation as follows: 2L L IB (s e λ bπ Substituting (16 into (12, Q 2 is given by Q 2 = e λ b π e ρbεjd α z n= The following theorem rovides the PDF of γ t. ( ( e sd α d 2 +s L β l e t l sd α l=1 d 2 +ρ b ε j z L n= l=1 t l ρ b ε j zd β l e α. (16 n=. (17
7 7 Theorem 1: Consider the use of the comosite channel model with Rayleigh fading and ath loss, the PDF of the effective ower of the secondary BS is given by f γt (x = e a lρ δ se ρ x Dirac(x ρ s + ( ρ x +δ a l x δ e a lx δ e ρ x ρ x U (ρs x, (18 where a l = δπλ lγ(δ, U ( is the unit ste function, and Dirac( is the imulse function. ρ δ Proof: See Aendix A. Substituting (18 and (17 into (12, we exress Q 1 as follows: ε j a l ρ δ s e ρ ρs n= ρs Q 1 =e ρs ρ b ε j ρsd λ b π e α n= d 2 +ρ b ε j ρs L n= l=1 t l ρ b ε j ρsd β l e α n= ( ρ ρ+ε + a l z +δ z δ e a lz δ e ρ j z n= z Q 2 dz. (19 }} Ψ We notice that it is very challenging to solve the integral Ψ in (19, therefore, we aly the Gaussian- Chebyshev quadrature to aroximate the integral as follows: Ψ K k=1 η k e ρ+ε j ρ b ε j n= ρss λ ρss b π e k d α n= k d 2 + ρ b ε j ρss k L n= l=1 t l ρ b ε j ρss β l e k d α n=, (2 where K is a comlexity-accuracy tradeoff arameter, ω K = π, ϕ K k = cos ( 2k π, s 2K k = 1 (ϕ 2 k +1, and ( ρ η k = ω K 2 1 ϕ 2 ρ k ρ ss k +δ a l ρ δ s sδ k e a lρ δ ss δ k e ρss k. Substituting (19 and (2 into (12 and alying ε max ε j, based on (6, we obtain the closed-form exression of the outage robability at the m-th user as follows: M m ( M m ( ( ( m+ N P m = ψ m m+ q = q + +q N =m+ + +q N n= e + K k=1 a l ρ δ s e ρ ρs η k e εmax n= ρ b εmax ρsd λ ρs b π e α n= ρ+εmax n= ρ b εmax ρss λ ρss b π e k d α n= k d 2 +ρ b εmax ρs d 2 +ρ b εmax ρss k b qn n L n= l=1 L n= l=1 t l ρ b εmax ρsd β l e α t l ρ b εmax ρss β l e k d α n= n=. (21
8 8 IV. DIVERSITY ANALYSIS Based on the analytical results for the outage robability in (21, we aim to rovide asymtotic diversity analysis for the ordered NOMA users. The diversity order of the user s outage robability is defined as logp m (ρ s d = lim. (22 ρ s logρ s A. Fixed Transmit Power at Primary Transmitters In this case, we examine the diversity with the fixed transmit SNR at the PTs (ρ b, while the transmit SNR of secondary BS (ρ s and the maximum ermissible interference constraint at the PRs (ρ go to the infinity. Particularly, we assume ρ is roortional to ρ s, i.e. ρ = κρ s, where κ is a ositive scaling factor. This assumtion alies to the scenario where the PRs can tolerate a large amount of interference from the } secondary BS and the target data rate is relatively small in the PN. Denote γ t = γt ρ s = min κ,1 max g l 2 l Φ l similar to (8, the ordered CDF has the relationshi with unordered CDF as M m ( M m ( ( m+ FX m I B,γ t (y = ψ m F m+ h 2 (y, (23 = where y = (ρ bi B +1ε j ρ sγ t. When ρ s, we observe that y. In order to investigate an insightful exression to obtain the diversity order, we use Gaussian-Chebyshev quadrature and 1 e y y to aroximate (9 as F h 2 (y χ n y, (24 where χ n = ω N 1 φ 2 n (φ n +1c n. Substituting (24 into (23, since y, we obtain ( m (( m F (ε (ρb I B +1ε j (ρb I B +1ε j Xm I B,γ t j = ξ +o, (25 ρ s γ t ρ s γ t where ξ = ( m ψ m χ n n=1 m n=1. Based on (6, (11, and (25, the asymtotic outage robability is given by Pm F 1 ( m (ρb x+1ε max ξ f ρ m IB s z (xf γt (zdxdz, (26 } } C where f γt the PDF of γ t. Since C is a constant indeendent of ρ s, (26 can be exressed as follows: P m F = 1 ρ m s C +o ( ρ s m, (27,
9 9 Substituting (27 into (22, we obtain the diversity order of this case is m. This can be exlained as follows. Note that SIC is alied at the ordered SUs. For the first user with the oorest channel gain, no interference cancelation is oerated at the receiver, therefore its diversity gain is one. While for the m-th user, since the interferences from all the other (m users are canceled, it obtains a diversity of m. B. Transmit Power of Primary Transmitters Proortional to that of Secondary Ones In this case, we examine the diversity with the transmit SNR at the PTs (ρ b is roortional to the transmit SNR of secondary BS (ρ s. Particularly, we assume ρ b = νρ s, where ν is a ositive scaling factor. We still assume ρ is roortional to ρ s. Alying ρ s, ρ = κρ s and ρ b = νρ s to (21, we obtain the asymtotic outage robability of the m-th user in this case as follows: M m ( M m ( ( ( N Pm m+ P ψ m b qn n m+ q = q + +q N =m+ + +q N n= e + K k=1 a νεmax l e κ d λ b π e α n= κ ηk e νεmax s λ s b π e k d α n= k d 2 +νεmax d 2 +νεmax s k L n= l=1 L n= l=1 where a l = δπλ lγ(δ and η κ δ k = ( ω K 2 1 ϕ 2 κ k s k +δ a κ l sδ k e a l sδ k e sk. t l νεmax d β l e α t l νεmax s β l e k d α n= n=. (28 It is observed that P m P is a constant indeendent of ρ s. Substituting (28 into (22, we find that asymtotically there is an error floor for the outage robability of SUs. V. NUMERICAL RESULTS In this section, numerical results are resented to verify the accuracy of the analysis as well as to obtain more imortant insights for NOMA in large-scale CR networks. In the considered network, the radius of the guard zone is assumed to be d = 2 m. The Gaussian-Chebyshev arameters are chosen with N = 5, K = 1, and L = 1. Monte Carlo simulation results are marked as to verify our derivation. Fig. 1 lots the outage robability of the m-th user for the first scenario when ρ b is fixed and ρ is roortional to ρ s. In Fig. 1(a, the ower allocation coefficients are a 1 =.5, a 2 =.4 and a 3 =.1. The target data rate for each user is assumed to be all the same as R 1 = R 2 = R 3 =.1 bit er channel use (BPCU. The dashed and solid curves are obtained from the analytical results derived in (21. Several
10 1 1 1 Outage robability Analytical RD=1 m Analytical RD=12 m Simulation m=1 m=2 m=3 Outage robability NOMA m=1 NOMA m=2 OMA m=1 OMA m=2 α=3 α= SNR (db SNR (db (a For different user zone, with λ b = 1 3, λ l = 1 3, κ = 1, α = 4, ρ b = 2 db, and M = 3. (b For different α, with λ b = 1 3, λ l = 1 3, κ = 1, R D = 5 m, ρ b = 2 db, and M = 2. Fig. 1: Outage robability of the m-th user versus ρ s of the first scenario. Outage robability OMA m=1 OMA m=2 NOMA m=1 NOMA m=2 Simulation Analytical error floor λb=λι=1 3 λb=λι= SNR (db Outage robability ν =1.,.5,.1 m=1 m=2 Analytical error floor ν =1.,.5, SNR (db (a For different density of PTs and PRs, with α = 4, κ = 1, ν = 1, R D = 1 m, ρ b = νρ s, and M = 2. (b For different ν, with α = 4, λ b = 1 4, λ l = 1 4, κ =.5, R D = 1 m, ρ b = νρ s, and M = 2. Fig. 2: Outage robability of the m-th user versus ρ s of the second scenario. observations can be drawn as follows: 1 Reducing the coverage of the secondary users zone D can achieve a lower outage robability because of a smaller ath loss. 2 The ordered users with different channel conditions have different decreasing sloe because of different diversity orders, which verifies the derivation of (26. In Fig. 1(b, the ower allocation coefficients are a 1 =.8 and a 2 =.2. The target rate is R 1 = 1 and R 2 = 3 BPCU. The erformance of a conventional OMA is also shown in the figure as a benchmark for comarison. It can be observed that for different values of the ath loss, NOMA can
11 11 achieve a lower outage robability than the conventional OMA. Fig. 2 lots the outage robability of the m-th user for the second scenario when both ρ b and ρ are roortional to ρ s. The ower allocation coefficients are a 1 =.8 and a 2 =.2. The target rates are R 1 = R 2 =.1 BPCU. The dashed and solid curves are obtained from the analytical results derived in (21. One observation is that error floors exist in both Figs. 2(a and 2(b, which verifies the asymtotic results in (28. Another observation is that user two (m = 2 outerforms user one (m = 1. The reason is that for user two, by alying SIC, the interference from user one is canceled. While for user one, the interference from user two still exists. In Fig. 2(a, it is shown that the error floor become smaller when λ b and λ l decrease, which is due to less interference from PTs and the relaxed interference ower constraint at the PRs. It is also worth noting that with these system arameters, NOMA outerforms OMA for user one while OMA outerforms NOMA for user two, which indicates the imortance of selecting aroriate ower allocation coefficients and target data rates for NOMA. In Fig. 2(b, it is observed that the error floors become smaller as ν decreases. This is due to the fact that smaller ν means a lower transmit ower of PTs, which in turn reduces the interference at SUs. VI. CONCLUSIONS In this aer, we have studied non-orthogonal multile access (NOMA in large-scale underlay cognitive radio networks with randomly deloyed users. Stochastic geometry tools were used to evaluate the outage erformance of the considered network. New closed-form exressions were derived for the outage robability. Diversity order of NOMA users has been analyzed in two situations based on the derived outage robability. An imortant future direction is to otimize the ower allocation coefficients to further imrove the erformance ga between NOMA and conventional MA in CR networks. APPENDIX A: PROOF OF THEOREM 1 The CDF of γ t is given by F γt (x = Pr min ρ max g l 2,ρ s x l Φ l = Pr max g l 2 ρ max l Φ l x, ρ }} +Pr max g l 2 ρ },ρ s x ρ s l Φ l ρ s = 1 U (ρ s xpr max g l 2 ρ }. (A.1 l Φ l x }} Ω
12 12 Denote Ω = 1 Ω, we exress Ω as follows: Ω = Pr max g l 2 ρ } = E Φl Pr ĝ l 2 (1+dα l ρ } } l Φ l x x l Φ l ( } (1+d α = E l ρ Φl. (A.2 x l Φ l F ĝl 2 Alying the generating function, we rewrite (A.2 as follows: Ω =ex λ l (1 F ĝl 2((1+dαl µ rdr = ex [ 2πλ l e µ Alying [14, Eq. ( ], we obtain R 2 ] re µrα dr. (A.3 Ω = 1 Ω µ δπλl = 1 e e Γ(δ µ δ, (A.4 where Γ( is Gamma function. Substituting (A.4 into (A.1, and taking the derivative, we obtain the PDF of γ t in (18. The roof is comleted. REFERENCES [1] Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, System-level erformance evaluation of downlink non-orthogonal multile access (NOMA, in Proc. IEEE Annual Symosium on Personal, Indoor and Mobile Radio Communications (PIMRC, Set [2] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, On the erformance of non-orthogonal multile access in 5G systems with randomly deloyed users, IEEE Signal Process. Lett., vol. 21, no. 12, , 214. [3] M. Al-Imari, P. Xiao, M. A. Imran, and R. Tafazolli, Ulink non-orthogonal multile access for 5G wireless networks, in Proc. of the 11th International Symosium on Wireless Communications Systems (ISWCS, Barcelona, Sain, Aug 214, [4] Z. Ding, F. Adachi, and H. V. Poor, The alication of MIMO to non-orthogonal multile access, IEEE Trans. Wireless Commun., 216. [5] Q. Sun, S. Han, C.-L. I, and Z. Pan, On the ergodic caacity of MIMO NOMA systems, IEEE Wireless Commun. Lett., 215. [6] A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, Breaking sectrum gridlock with cognitive radios: An information theoretic ersective, Proceedings of the IEEE, vol. 97, no. 5, , 29. [7] Y. Dhungana and C. Tellambura, Outage robability of underlay cognitive relay networks with satially random nodes, in Global Commun. Conf. (GLOBECOM, Dec 214, [8] Z. Ding, P. Fan, and H. V. Poor, Imact of user airing on 5G non-orthogonal multile access, IEEE Trans. Veh. Technol., 216. [9] M. Haenggi, Stochastic Geometry for Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, 212. [1] J. Venkataraman, M. Haenggi, and O. Collins, Shot noise models for outage and throughut analyses in wireless ad hoc networks, in Military Commun. Conf. (MILCOM, 26, [11] T. M. Cover and J. A. Thomas, Elements of information theory 2nd edition, 26. [12] H. A. David and N. Nagaraja, Order Statistics, 3rd ed. John Wiley, 23. [13] E. Hildebrand, Introduction to numerical analysis, NewYork, NY, USA: Dover,, [14] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 6th ed. New York, NY, USA: Academic Press, 2.
Non-orthogonal Multiple Access in Large-Scale Underlay Cognitive Radio Networks
1 Non-orthogonal Multiple Access in Large-Scale Underlay Cognitive Radio Networks Yuanwei Liu, Student Member, IEEE, Zhiguo Ding, Senior Member, IEEE, Maged Elkashlan, Member, IEEE, and Jinhong Yuan Fellow,
More informationNOMA: An Information Theoretic Perspective
NOMA: An Information Theoretic Perspective Peng Xu, Zhiguo Ding, Member, IEEE, Xuchu Dai and H. Vincent Poor, Fellow, IEEE arxiv:54.775v2 cs.it] 2 May 25 Abstract In this letter, the performance of non-orthogonal
More informationCooperative Non-Orthogonal Multiple Access with Simultaneous Wireless Information and Power Transfer
1 Cooperative Non-Orthogonal Multiple Access with Simultaneous Wireless Information and Power Transfer Yuanwei Liu, Zhiguo Ding, Maged Elkashlan, and H Vincent Poor Abstract In this paper, the application
More informationShort-Packet Communications in Non-Orthogonal Multiple Access Systems
Short-Packet Communications in Non-Orthogonal Multiple Access Systems Xiaofang Sun, Shihao Yan, Nan Yang, Zhiguo Ding, Chao Shen, and Zhangdui Zhong State Key Lab of Rail Traffic Control and Safety, Beijing
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationOn the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting
On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,
More informationTraining sequence optimization for frequency selective channels with MAP equalization
532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038
More informationSpatial Outage Capacity of Poisson Bipolar Networks
Satial Outage Caacity of Poisson Biolar Networks Sanket S. Kalamkar and Martin Haenggi Deartment of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA E-mail: skalamka@nd.edu,
More informationAmin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)
KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationAnalysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks
Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their
More informationAnalyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems
Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität
More informationA Mathematical Proof of the Superiority of NOMA Compared to Conventional OMA
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. XX, NO. X, OCT. 2016 1 A Mathematical Proof of the Superiority of NOMA Compared to Conventional OMA Zhiyong Chen, Zhiguo Ding, Senior Member, IEEE, Xuchu Dai,
More informationOptimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI
Otimal Power Control over Fading Cognitive Radio Channels by Exloiting Primary User CSI Rui Zhang Abstract arxiv:0804.67v2 [cs.it] 7 Feb 2009 This aer is concerned with sectrum sharing cognitive radio
More informationNon-Orthogonal Multiple Access Schemes with Partial Relay Selection
Non-Orthogonal Multiple Access Schemes with Partial Relay Selection Lee, S., da Costa, D. B., Vien, Q-T., Duong, T. Q., & de Sousa Jr, R. T. 206. Non-Orthogonal Multiple Access Schemes with Partial Relay
More informationBeamspace MIMO-NOMA for Millimeter-Wave Communications Using Lens Antenna Arrays
Beamsace MIMO-NOMA for Millimeter-Wave Communications Using Lens Antenna Arrays Bichai Wang 1, Linglong Dai 1,XiqiGao, and Lajos anzo 3 1 Tsinghua National Laboratory for Information Science and Technology
More informations v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4
Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work
More informationNOMA: Principles and Recent Results
NOMA: Principles and Recent Results Jinho Choi School of EECS, GIST Email: jchoi114@gist.ac.kr Invited Paper arxiv:176.885v1 [cs.it] 27 Jun 217 Abstract Although non-orthogonal multiple access NOMA is
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationNOMA: Principles and Recent Results
NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve
More informationQuality of Service Based NOMA Group D2D Communications
future internet Article Quality of Service Based NOMA Group D2D Communications Asim Anwar ID, Boon-Chong Seet *, ID and Xue Jun Li ID Department of Electrical and Electronic Engineering, Auckland University
More informationECE 534 Information Theory - Midterm 2
ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,
More informationSimple Semi-Grant-Free Transmission Strategies Assisted by Non-Orthogonal Multiple Access
1 Simple Semi-Grant-Free Transmission Strategies Assisted by Non-Orthogonal Multiple Access Zhiguo Ding, Senior Member, IEEE, Robert Schober, Fellow, IEEE, Pingzhi Fan, Fellow, IEEE, and H. Vincent Poor,
More informationUnsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA)
Unsuervised Hyersectral Image Analysis Using Indeendent Comonent Analysis (ICA) Shao-Shan Chiang Chein-I Chang Irving W. Ginsberg Remote Sensing Signal and Image Processing Laboratory Deartment of Comuter
More informationVision Graph Construction in Wireless Multimedia Sensor Networks
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia
More informationA Two-Phase Power Allocation Scheme for CRNs Employing NOMA
A Two-Phase Power Allocation Scheme for CRNs Employing NOMA Ming Zeng, Georgios I. Tsiropoulos, Animesh Yadav, Octavia A. Dobre, and Mohamed H. Ahmed Faculty of Engineering and Applied Science, Memorial
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More informationCapacity Comparison between MIMO-NOMA and MIMO-OMA with Multiple Users in a Cluster
1 Capacity Comparison between MIMO-NOMA and MIMO-OMA with Multiple Users in a Cluster Ming Zeng, Animesh Yadav, Octavia A. Dobre, Georgios I. Tsiropoulos arxiv:1706.0731v1 [cs.it] 8 Jun 017 and H. Vincent
More informationHomework Set #3 Rates definitions, Channel Coding, Source-Channel coding
Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits
More informationMulti-Channel MAC Protocol for Full-Duplex Cognitive Radio Networks with Optimized Access Control and Load Balancing
Multi-Channel MAC Protocol for Full-Dulex Cognitive Radio etworks with Otimized Access Control and Load Balancing Le Thanh Tan and Long Bao Le arxiv:.3v [cs.it] Feb Abstract In this aer, we roose a multi-channel
More informationMultiple Antenna Aided NOMA in UAV Networks: A Stochastic Geometry Approach
1 Multiple Antenna Aided NOMA in UAV Networks: A Stochastic Geometry Approach Tianwei Hou, Student Member, IEEE, Yuanwei Liu, Member, IEEE, Zhengyu Song, Xin Sun, and Yue Chen, Senior Member, IEEE, arxiv:1805.04985v1
More informationOptimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio
More informationOn Code Design for Simultaneous Energy and Information Transfer
On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter
More informationUsing the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process
Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process P. Mantalos a1, K. Mattheou b, A. Karagrigoriou b a.deartment of Statistics University of Lund
More informationDelay characterization of multi-hop transmission in a Poisson field of interference
1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission
More informationAnytime communication over the Gilbert-Eliot channel with noiseless feedback
Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California
More informationUser Selection and Power Allocation for MmWave-NOMA Networks
User Selection and Power Allocation for MmWave-NOMA Networks Jingjing Cui, Yuanwei Liu, Zhiguo Ding, Pingzhi Fan and Arumugam Nallanathan Southwest Jiaotong University, Chengdu, P. R. China Queen Mary
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationAverage Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations
Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Rui Wang, Jun Zhang, S.H. Song and K. B. Letaief, Fellow, IEEE Dept. of ECE, The Hong Kong University of Science
More informationLower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data
Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment
More informationCoding Along Hermite Polynomials for Gaussian Noise Channels
Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract
More informationApplications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012
Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications
More informationAsymptotically Optimal Simulation Allocation under Dependent Sampling
Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee
More informationarxiv: v1 [physics.data-an] 26 Oct 2012
Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch
More informationELEC546 Review of Information Theory
ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random
More informationCybernetic Interpretation of the Riemann Zeta Function
Cybernetic Interretation of the Riemann Zeta Function Petr Klán, Det. of System Analysis, University of Economics in Prague, Czech Reublic, etr.klan@vse.cz arxiv:602.05507v [cs.sy] 2 Feb 206 Abstract:
More informationChannel inversion in MIMO systems over Rician fading
This full tet aer was eer reviewed at the direction of IEEE Communications Society subject matter eerts for ublication in the IEEE Globecom roceedings Channel inversion in MIMO systems over Rician fading
More informationMODELING INTERFERENCE IN FINITE UNIFORMLY RANDOM NETWORKS
MODELING INTERFERENCE IN FINITE UNIFORMLY RANDOM NETWORKS Sunil Srinivasa Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA ssriniv1@nd.edu Martin Haenggi Department
More informationDeriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.
Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &
More informationCharacterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations
Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of
More informationThe decision-feedback equalizer optimization for Gaussian noise
Journal of Theoretical and Alied Comuter Science Vol. 8 No. 4 4. 5- ISSN 99-634 (rinted 3-5653 (online htt://www.jtacs.org The decision-feedback eualizer otimization for Gaussian noise Arkadiusz Grzbowski
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationOpportunistic Spectrum Access in Multiple Primary User Environments Under the Packet Collision Constraint
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. Y, 1 Oortunistic Sectrum Access in Multile Primary User Environments Under the Packet Collision Constraint Eric Jung, Student Member, IEEE, and Xin Liu,
More information2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.
-D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear
More informationOn split sample and randomized confidence intervals for binomial proportions
On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have
More informationAn Investigation on the Numerical Ill-conditioning of Hybrid State Estimators
An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationTowards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK
Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationAn Analysis of Uplink Asynchronous Non-Orthogonal Multiple Access Systems
1 An Analysis of Uplink Asynchronous Non-Orthogonal Multiple Access Systems Xun Zou, Student Member, IEEE, Biao He, Member, IEEE, and Hamid Jafarkhani, Fellow, IEEE arxiv:18694v1 [csit] 3 Jun 18 Abstract
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationOn Power Minimization for Non-orthogonal Multiple Access (NOMA)
On Power Minimization for Non-orthogonal Multiple Access (NOMA) Lei Lei, Di Yuan and Peter Värbrand Journal Article N.B.: When citing this work, cite the original article. 2016 IEEE. Personal use of this
More informationLDPC codes for the Cascaded BSC-BAWGN channel
LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 email:aravind,siegel,jwolf@ucsd.edu
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationTwo-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems
Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Behrouz Khoshnevis and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario,
More informationVehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications
Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt
More informationSpectrum Sharing in RF-Powered Cognitive Radio Networks using Game Theory
Spectrum Sharing in RF-owered Cognitive Radio Networks using Theory Yuanye Ma, He Henry Chen, Zihuai Lin, Branka Vucetic, Xu Li The University of Sydney, Sydney, Australia, Email: yuanye.ma, he.chen, zihuai.lin,
More informationOutage Performance of Cognitive AF Relaying Networks over generalized η µ Fading Channels
Outage Performance of Cognitive AF Relaying Networks over generalized η µ Fading Channels Jing Yang, Lei Chen, Chunxiao Li Yangzhou University School of Information Engineering 88 South University Ave.,
More informationSampling and Distortion Tradeoffs for Bandlimited Periodic Signals
Samling and Distortion radeoffs for Bandlimited Periodic Signals Elaheh ohammadi and Farokh arvasti Advanced Communications Research Institute ACRI Deartment of Electrical Engineering Sharif University
More informationMinimax Design of Nonnegative Finite Impulse Response Filters
Minimax Design of Nonnegative Finite Imulse Resonse Filters Xiaoing Lai, Anke Xue Institute of Information and Control Hangzhou Dianzi University Hangzhou, 3118 China e-mail: laix@hdu.edu.cn; akxue@hdu.edu.cn
More informationPerformance Analysis of Spread Spectrum CDMA systems
1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department
More informationFinite Mixture EFA in Mplus
Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered
More informationA PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS
The Seventh Asia-Pacific Conference on Wind Engineering, November 8-1, 009, Taiei, Taiwan A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS M.F. Huang 1,
More informationSecrecy Outage Performance of Cooperative Relay Network With Diversity Combining
Secrecy Outage erformance of Cooperative Relay Network With Diversity Combining Khyati Chopra Dept. of lectrical ngineering Indian Institute of Technology, Delhi New Delhi-110016, India mail: eez148071@ee.iitd.ac.in
More informationPerformance Analysis of Interweave Cognitive Radio Systems with Imperfect Channel Knowledge over Nakagami Fading Channels
Performance Analysis of Interweave Cognitive Radio Systems with Imperfect Channel Knowledge over Nakagami Fading Channels Ankit Kaushik, Shree Krishna Sharma, Symeon Chatzinotas, Björn Ottersten, Friedrich
More informationAdaptive Successive Transmission in Virtual Full-Duplex Cooperative NOMA
Adaptive Successive Transmission in Virtual Full-Duplex Cooperative NOMA Young-bin Kim Future Access Network Division KDDI Research, Inc Fujimino-shi, Japan yo-kim@kddi-researchjp Kosuke Yamazaki Future
More informationInteractive Hypothesis Testing Against Independence
013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,
More informationDamage Identification from Power Spectrum Density Transmissibility
6th Euroean Worksho on Structural Health Monitoring - h.3.d.3 More info about this article: htt://www.ndt.net/?id=14083 Damage Identification from Power Sectrum Density ransmissibility Y. ZHOU, R. PERERA
More informationUSING multiple antennas has been shown to increase the
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 1, JANUARY 2007 11 A Comparison of Time-Sharing, DPC, and Beamforming for MIMO Broadcast Channels With Many Users Masoud Sharif, Member, IEEE, and Babak
More informationSecure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel
Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu
More informationA Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression
Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi
More informationThe Optimality of Beamforming: A Unified View
The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,
More informationAnalysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel
Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict
More informationSpectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy
Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012
More informationFig. 21: Architecture of PeerSim [44]
Sulementary Aendix A: Modeling HPP with PeerSim Fig. : Architecture of PeerSim [] In PeerSim, every comonent can be relaced by another comonent imlementing the same interface, and the general simulation
More informationFactors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier
Australian Journal of Basic and Alied Sciences, 5(12): 2010-2020, 2011 ISSN 1991-8178 Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doed Fiber Amlifier
More informationWIRELESS energy transfer (WET), where receivers harvest
6898 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 10, OCTOBER 2016 User-Centric Energy Efficiency Maximization for Wireless Powered Communications Qingqing Wu, Student Member, IEEE, Wen Chen,
More informationA Novel Network NOMA Scheme for. Downlink Coordinated Three-Point Systems
1 A Novel Network NOMA Scheme for Downlink Coordinated Three-Point Systems Yanshi Sun, Zhiguo Ding, Senior Member, IEEE, Xuchu Dai, and George K. arxiv:1708.06498v [cs.it] 13 Dec 017 Karagiannidis, Fellow,
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationWeibull-Gamma composite distribution: An alternative multipath/shadowing fading model
Weibull-Gamma composite distribution: An alternative multipath/shadowing fading model Petros S. Bithas Institute for Space Applications and Remote Sensing, National Observatory of Athens, Metaxa & Vas.
More informationHetNets: what tools for analysis?
HetNets: what tools for analysis? Daniela Tuninetti (Ph.D.) Email: danielat@uic.edu Motivation Seven Ways that HetNets are a Cellular Paradigm Shift, by J. Andrews, IEEE Communications Magazine, March
More informationUpper Bounds for the Average Error Probability of a Time-Hopping Wideband System
Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System Aravind Kailas UMTS Systems Performance Team QUALCOMM Inc San Diego, CA 911 Email: akailas@qualcommcom John A Gubner Department
More informationSupplementary Materials for Robust Estimation of the False Discovery Rate
Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides
More informationIEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) 1. Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio
IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio Yulong Zou, Member, IEEE, Yu-Dong Yao, Fellow, IEEE, and Baoyu Zheng,
More informationq-ary Symmetric Channel for Large q
List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu
More informationVIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES
Journal of Sound and Vibration (998) 22(5), 78 85 VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES Acoustics and Dynamics Laboratory, Deartment of Mechanical Engineering, The
More informationActual exergy intake to perform the same task
CHAPER : PRINCIPLES OF ENERGY CONSERVAION INRODUCION Energy conservation rinciles are based on thermodynamics If we look into the simle and most direct statement of the first law of thermodynamics, we
More informationTransmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback
IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of
More information