Non-orthogonal Multiple Access in Large-Scale. Underlay Cognitive Radio Networks

Size: px
Start display at page:

Download "Non-orthogonal Multiple Access in Large-Scale. Underlay Cognitive Radio Networks"

Transcription

1 Non-orthogonal Multile Access in Large-Scale 1 Underlay Cognitive Radio Networks Yuanwei Liu, Zhiguo Ding, Maged Elkashlan, and Jinhong Yuan Abstract In this aer, non-orthogonal multile access (NOMA is alied to large-scale underlay cognitive radio (CR networks with randomly deloyed users. In order to characterize the erformance of the considered network, arxiv: v1 [cs.it] 14 Jan 216 new closed-form exressions of the outage robability are derived using stochastic-geometry. More imortantly, by carrying out the diversity analysis, new insights are obtained under the two scenarios with different ower constraints: 1 fixed transmit ower of the rimary transmitters (PTs, and 2 transmit ower of the PTs being roortional to that of the secondary base station. For the first scenario, a diversity order of m is exerienced at the m-th ordered NOMA user. For the second scenario, there is an asymtotic error floor for the outage robability. Simulation results are rovided to verify the accuracy of the derived results. A ivotal conclusion is reached that by carefully designing target data rates and ower allocation coefficients of users, NOMA can outerform conventional orthogonal multile access in underlay CR networks. Index Terms Cognitive radio, large-scale network, non-orthogonal multile access, stochastic geometry I. INTRODUCTION Sectrum efficiency is of significant imortance and becomes one of the main design targets for future fifth generation networks. Non-orthogonal multile access (NOMA has received considerable attention because of its otential to achieve suerior sectral efficiency [1]. Particularly, different from conventional multile access (MA techniques, NOMA uses the ower domain to serve multile users at different ower levels in order to use sectrum more efficiently. A downlink NOMA and an ulink NOMA are considered in [2] and [3], resectively. The alication of multile-inut multile-outut (MIMO techniques to NOMA has been considered in [4] by using zero-forcing detection matrices. The authors in [5] investigated an ergodic caacity maximization roblem for MIMO NOMA systems. Y. Liu and M. Elkashlan are with Queen Mary University of London, London, UK ( yuanwei.liu, maged.elkashlan}@qmul.ac.uk. Z. Ding is with Lancaster University, Lancaster, UK ( z.ding@lancaster.ac.uk. J. Yuan is with the University of New South Wales, Sydney, Australia ( j.yuan@unsw.edu.au.

2 2 Another aroach to imrove sectrum efficiency is the aradigm of underlay cognitive radio (CR networks, which was roosed in [6] and has rekindled increasing interest in using sectrum more efficiently. The key idea of underlay CR networks is that each secondary user (SU is allowed to access the sectrum of the rimary users (PUs as long as the SU meets a certain interference threshold in the rimary network (PN. In [7], an underlay CR network taking into account the satial distribution of the SU relays and PUs was considered and its erformance was evaluated by using stochastic geometry tools. In [8], a new CR insired NOMA scheme has been roosed and the imact of user airing has been examined, by focusing on a simle scenario with only one rimary transmitter (PT. By introducing the aforementioned two concets, it is natural to consider the alication of NOMA in underlay CR networks using additional ower control at the secondary base station (BS to imrove the sectral efficiency. Stochastic geometry is used to model a large-scale CR network with a large number of randomly deloyed PTs and rimary receivers (PRs. We consider a ractical system design as follows: 1 All the SUs, PTs, and PRs are randomly deloyed based on the considered stochastic geometry model; 2 Each SU suffers interference from other NOMA SUs as well as the PTs; and 3 The secondary BS must satisfy a redefined ower constraint threshold to avoid interference at the PRs. New closed-form exressions of the outage robability of the NOMA users are derived to evaluate the erformance of the considered CR NOMA network. Moreover, considering two different ower constraints at the PTs, diversity order 1 analysis is carried out with roviding imortant insights: 1 When the transmit ower of the PTs is fixed, the m-th user among all ordered NOMA user exeriences a diversity order of m; and 2 When the the transmit ower of the PTs is roortional to that of the secondary BS, an asymtotic error floor exists for the outage robability. II. NETWORK MODEL We consider a large-scale underlay sectrum sharing scenario consisting of the PN and the secondary network (SN. In the SN, we consider that a secondary BS is located at the origin of a disc, denoted by D with radius R D as its coverage. The M randomly deloyed secondary users are uniformly distributed 1 Diversity order is defined as the sloe for the outage rovability curve decreasing with the signal-to-noise-ratio (SNR. It measures the number of indeendent fading aths over which the data is received. In NOMA networks, since users channels are ordered and SIC is alied at each receiver, it is of imortance to investigate the diversity order.

3 3 within the disc which is the user zone for NOMA. The secondary BS communicates with all SUs within the disc by alying the NOMA transmission rotocol. It is worthy ointing out that the ower of the secondary transmitter is constrained in order to limit the interference at the PRs. In the PN, we consider a random number of PTs and PRs distributed in an infinite two dimensional lane. The satial toology of all the PTs and PRs are modeled using homogeneous oisson oint rocesses (PPPs, denoted by Φ b and Φ l with density λ b and λ l, resectively. All channels are assumed to be quasi-static Rayleigh fading where the channel coefficients are constant for each transmission block but vary indeendently between different blocks. According to underlay CR, the transmit ower P t at the secondary BS is constrained as follows: I P t = min max g l 2,P s, (1 l Φ l where I is the maximum ermissible interference ower at the PRs, P s is maximum transmission ower at the secondary BS, g l 2 = ĝ l 2 L(d l is the overall channel gain from the secondary BS to PRs l. Here, ĝ l is small-scale fading with ĝ l CN(,1, L(d l = 1 1+d α l is large-scale ath loss, d l is the distance between the secondary BS and the PRs, and α is the ath loss exonent. A bounded ath loss model is used to ensure the ath loss is always larger than one even for small distances [2, 9]. According to NOMA, the BS sends a combination of messages to all NOMA users, and the observation at the m-th secondary user is given by M y m = h m an P t x n +n m, (2 n=1 where n m is the additive white Gaussian noise (AWGN at the m-th user with variance σ 2, a n is the ower allocation coefficient for the n-th SU with M n=1 a n = 1, x n is the information for the n-th user, and h m is the channel coefficient between the m-th user and the secondary BS. For the SUs, they also observe the interferences of the randomly deloyed PTs in the PN. Usually, when the PTs are close to the secondary NOMA users, they will cause significant interference. To overcome this issue, we introduce an interference guard zone D to each secondary NOMA user with radius of d, which means that there is no interference from PTs allowed inside this zone [1]. We assume d 1 in

4 4 this aer. The interference links from the PTs to the SUs are dominated by the ath loss and is given by I B = b Φ b L(d b, (3 where L(d b = 1/(1+d α b is the large-scale ath loss and d b is the distance from the PTs to the SUs. Without loss of generality, all the channels of SUs are assumed to follow the order as h 1 2 h 2 2 h M 2. The ower allocation coefficients are assumed to follow the order as a 1 a 2 a M. According to the NOMA rincile, successive interference cancelation (SIC is carried out at the receivers [11]. It is assumed that 1 j m < i. In this case, the m-th user can decode the message of the j-th user and treats the message for the i-th user as interference. Secifically, the m-th user first decodes the messages of all the (m users, and then successively subtracts these messages to obtain its own information. Therefore, the received signal-to-interference-lus-noise ratio (SINR for the m-th user to decode the information of the j-th user is given by } h m 2 γ t a j γ m,j =, (4 M h m 2 γ t a i +ρ b I B +1 i=j+1 ρ where γ t = min,ρ max g l 2 s, ρ = I,ρ σ 2 s = Ps,ρ σ 2 b = P B σ 2, and P B is the transmit ower of the PTs, h m 2 l Φ l is the overall ordered channel gain from the secondary BS to the m-th SU. For the case m = j, it indicates the m-th user decodes the message of itself. Note that the SINR for the M-th SU is γ M,M = h M 2 γ ta M ρ b I B +1. III. OUTAGE PROBABILITY In this section, we rovide exact analysis of the considered networks in terms of outage robability. In NOMA, an outage occurs if the m-th user can not detect any of the j-th user s message, where j m due to the SIC. Denote X m = hm 2 γ t ρ b I B +1. Based on (4, the cumulative distribution function (CDF of X m is given by } h m 2 γ t F Xm (ε = Pr ρ b I B +1 < ε. (5 ( We denote ε j = τ j / a j τ M j i=j+1 a i for j < M, τ j = 2 R j 1, R j is the target data rate for the j-th user, ε M = τ M /a M, and ε max m exressed as follows: = maxε 1,ε 2,...,ε m }. The outage robability at the m-th user can be P m = PrX m < ε max m } = F Xm (ε max m, (6

5 5 where the condition a j τ j M i=j+1 a i > should be satisfied due to alying NOMA, otherwise the outage robability will always be one [2]. We need calculate the CDF of X m conditioned on I B and γ t. Rewrite (5 as follows: F Xm I B,γ t (ε = F hm 2 ( (ρb I B +1ε γ t, (7 where F hm 2 is the CDF of h m. Based on order statistics [12] and alying binomial exansion, the CDF of the ordered channels has a relationshi with the unordered channels as follows: M m F 2(y = ψ ( M m ( ( m+ hm m F m+ h 2 (y, (8 = where y = (ρ bi B +1ε M! γ t, ψ m =, and (M m!(m! h 2 = arbitrary SU. Here, ĥ 2 L(d is the unordered channel gain of an ĥ is the small-scale fading coefficient with ĥ CN(,1, L(d = 1 1+d α is the largescale ath loss, and d is a random variable reresenting the distance from the secondary BS to an arbitrary SU. Then using the assumtion of homogenous PPP and alying the olar coordinates, we exress F h 2(y as follows: F 2(y = 2 RD ( 1 e (1+r α y rdr. (9 h RD 2 Note that it is challenging to obtain an insightful exression for the unordered CDF. As such, we aly the Gaussian-Chebyshev quadrature [13] to find an aroximation for (9 as F 2(y N b h n e cny, (1 n= where N is a comlexity-accuracy tradeoff arameter, b n = ω N 1 φ 2 n (φ n +1, b = N b n, c n = 1+ ( R D2 (φ n +1 α, ωn = π N, and φ n = cos ( 2n 2N π. Substituting (1 into (8 and alying the multinomial theorem, we obtain M m F hm 2 (y = ψ ( M m ( ( ( m+ N m m+ q + +q N = q + +q N =m+ n= b qn n e n=1 n=y. (11

6 6 where ( m+ q + +q N = (m+! F Xm (ε j =. Based on (11, the CDF of X q! q N! m can be exressed as follows: f IB (xf γt (zdxdz M m =ψ m = ( (ρb x+1ε j F hm 2 z ( M m ( e εj z m+ q + +q N =m+ q nc n n= e xρbεj z ( m+ q + +q N ( N n= nc n n=q f IB (xdxf γt (zdz, (12 }} } } Q 1 where f γt is the PDF of γ t. We exress Q 2 in (12 as follows: Q 2 = e xρbεj z n= Q 2 f IB (xdx = E Φb e xρ b ε j z } n= = L IB ( xρ b ε j z b qn n q n c n. (13 In this case, the Lalace transformation of the interferences from the PT can be exressed as [1] where δ = 2 α ( L IB (s = ex λ b π = ex λ ( bπ [(e sd α d 2 +sδ γ ( ] 1 δ,sd α e sd α sd α d 2 +s δ and γ( is the lower incomlete Gamma function. } } Θ n= t δ e t dt, (14 To obtain an insightful exression, we use Gaussian-Chebyshev quadrature to aroximate the lower incomlete Gamma function in (14, Θ can be exressed as follows: Θ s 1 δ L l=1 β l e t lsd α, (15 where L is a comlexity-accuracy tradeoff arameter, β l = 1 2 d2 α ω L 1 θ 2 l t l δ, t l = 1 2 (θ l +1, ω L = π L, and θ l = cos ( 2l π. Substituting (15 into (14, we aroximate the Lalace transformation as follows: 2L L IB (s e λ bπ Substituting (16 into (12, Q 2 is given by Q 2 = e λ b π e ρbεjd α z n= The following theorem rovides the PDF of γ t. ( ( e sd α d 2 +s L β l e t l sd α l=1 d 2 +ρ b ε j z L n= l=1 t l ρ b ε j zd β l e α. (16 n=. (17

7 7 Theorem 1: Consider the use of the comosite channel model with Rayleigh fading and ath loss, the PDF of the effective ower of the secondary BS is given by f γt (x = e a lρ δ se ρ x Dirac(x ρ s + ( ρ x +δ a l x δ e a lx δ e ρ x ρ x U (ρs x, (18 where a l = δπλ lγ(δ, U ( is the unit ste function, and Dirac( is the imulse function. ρ δ Proof: See Aendix A. Substituting (18 and (17 into (12, we exress Q 1 as follows: ε j a l ρ δ s e ρ ρs n= ρs Q 1 =e ρs ρ b ε j ρsd λ b π e α n= d 2 +ρ b ε j ρs L n= l=1 t l ρ b ε j ρsd β l e α n= ( ρ ρ+ε + a l z +δ z δ e a lz δ e ρ j z n= z Q 2 dz. (19 }} Ψ We notice that it is very challenging to solve the integral Ψ in (19, therefore, we aly the Gaussian- Chebyshev quadrature to aroximate the integral as follows: Ψ K k=1 η k e ρ+ε j ρ b ε j n= ρss λ ρss b π e k d α n= k d 2 + ρ b ε j ρss k L n= l=1 t l ρ b ε j ρss β l e k d α n=, (2 where K is a comlexity-accuracy tradeoff arameter, ω K = π, ϕ K k = cos ( 2k π, s 2K k = 1 (ϕ 2 k +1, and ( ρ η k = ω K 2 1 ϕ 2 ρ k ρ ss k +δ a l ρ δ s sδ k e a lρ δ ss δ k e ρss k. Substituting (19 and (2 into (12 and alying ε max ε j, based on (6, we obtain the closed-form exression of the outage robability at the m-th user as follows: M m ( M m ( ( ( m+ N P m = ψ m m+ q = q + +q N =m+ + +q N n= e + K k=1 a l ρ δ s e ρ ρs η k e εmax n= ρ b εmax ρsd λ ρs b π e α n= ρ+εmax n= ρ b εmax ρss λ ρss b π e k d α n= k d 2 +ρ b εmax ρs d 2 +ρ b εmax ρss k b qn n L n= l=1 L n= l=1 t l ρ b εmax ρsd β l e α t l ρ b εmax ρss β l e k d α n= n=. (21

8 8 IV. DIVERSITY ANALYSIS Based on the analytical results for the outage robability in (21, we aim to rovide asymtotic diversity analysis for the ordered NOMA users. The diversity order of the user s outage robability is defined as logp m (ρ s d = lim. (22 ρ s logρ s A. Fixed Transmit Power at Primary Transmitters In this case, we examine the diversity with the fixed transmit SNR at the PTs (ρ b, while the transmit SNR of secondary BS (ρ s and the maximum ermissible interference constraint at the PRs (ρ go to the infinity. Particularly, we assume ρ is roortional to ρ s, i.e. ρ = κρ s, where κ is a ositive scaling factor. This assumtion alies to the scenario where the PRs can tolerate a large amount of interference from the } secondary BS and the target data rate is relatively small in the PN. Denote γ t = γt ρ s = min κ,1 max g l 2 l Φ l similar to (8, the ordered CDF has the relationshi with unordered CDF as M m ( M m ( ( m+ FX m I B,γ t (y = ψ m F m+ h 2 (y, (23 = where y = (ρ bi B +1ε j ρ sγ t. When ρ s, we observe that y. In order to investigate an insightful exression to obtain the diversity order, we use Gaussian-Chebyshev quadrature and 1 e y y to aroximate (9 as F h 2 (y χ n y, (24 where χ n = ω N 1 φ 2 n (φ n +1c n. Substituting (24 into (23, since y, we obtain ( m (( m F (ε (ρb I B +1ε j (ρb I B +1ε j Xm I B,γ t j = ξ +o, (25 ρ s γ t ρ s γ t where ξ = ( m ψ m χ n n=1 m n=1. Based on (6, (11, and (25, the asymtotic outage robability is given by Pm F 1 ( m (ρb x+1ε max ξ f ρ m IB s z (xf γt (zdxdz, (26 } } C where f γt the PDF of γ t. Since C is a constant indeendent of ρ s, (26 can be exressed as follows: P m F = 1 ρ m s C +o ( ρ s m, (27,

9 9 Substituting (27 into (22, we obtain the diversity order of this case is m. This can be exlained as follows. Note that SIC is alied at the ordered SUs. For the first user with the oorest channel gain, no interference cancelation is oerated at the receiver, therefore its diversity gain is one. While for the m-th user, since the interferences from all the other (m users are canceled, it obtains a diversity of m. B. Transmit Power of Primary Transmitters Proortional to that of Secondary Ones In this case, we examine the diversity with the transmit SNR at the PTs (ρ b is roortional to the transmit SNR of secondary BS (ρ s. Particularly, we assume ρ b = νρ s, where ν is a ositive scaling factor. We still assume ρ is roortional to ρ s. Alying ρ s, ρ = κρ s and ρ b = νρ s to (21, we obtain the asymtotic outage robability of the m-th user in this case as follows: M m ( M m ( ( ( N Pm m+ P ψ m b qn n m+ q = q + +q N =m+ + +q N n= e + K k=1 a νεmax l e κ d λ b π e α n= κ ηk e νεmax s λ s b π e k d α n= k d 2 +νεmax d 2 +νεmax s k L n= l=1 L n= l=1 where a l = δπλ lγ(δ and η κ δ k = ( ω K 2 1 ϕ 2 κ k s k +δ a κ l sδ k e a l sδ k e sk. t l νεmax d β l e α t l νεmax s β l e k d α n= n=. (28 It is observed that P m P is a constant indeendent of ρ s. Substituting (28 into (22, we find that asymtotically there is an error floor for the outage robability of SUs. V. NUMERICAL RESULTS In this section, numerical results are resented to verify the accuracy of the analysis as well as to obtain more imortant insights for NOMA in large-scale CR networks. In the considered network, the radius of the guard zone is assumed to be d = 2 m. The Gaussian-Chebyshev arameters are chosen with N = 5, K = 1, and L = 1. Monte Carlo simulation results are marked as to verify our derivation. Fig. 1 lots the outage robability of the m-th user for the first scenario when ρ b is fixed and ρ is roortional to ρ s. In Fig. 1(a, the ower allocation coefficients are a 1 =.5, a 2 =.4 and a 3 =.1. The target data rate for each user is assumed to be all the same as R 1 = R 2 = R 3 =.1 bit er channel use (BPCU. The dashed and solid curves are obtained from the analytical results derived in (21. Several

10 1 1 1 Outage robability Analytical RD=1 m Analytical RD=12 m Simulation m=1 m=2 m=3 Outage robability NOMA m=1 NOMA m=2 OMA m=1 OMA m=2 α=3 α= SNR (db SNR (db (a For different user zone, with λ b = 1 3, λ l = 1 3, κ = 1, α = 4, ρ b = 2 db, and M = 3. (b For different α, with λ b = 1 3, λ l = 1 3, κ = 1, R D = 5 m, ρ b = 2 db, and M = 2. Fig. 1: Outage robability of the m-th user versus ρ s of the first scenario. Outage robability OMA m=1 OMA m=2 NOMA m=1 NOMA m=2 Simulation Analytical error floor λb=λι=1 3 λb=λι= SNR (db Outage robability ν =1.,.5,.1 m=1 m=2 Analytical error floor ν =1.,.5, SNR (db (a For different density of PTs and PRs, with α = 4, κ = 1, ν = 1, R D = 1 m, ρ b = νρ s, and M = 2. (b For different ν, with α = 4, λ b = 1 4, λ l = 1 4, κ =.5, R D = 1 m, ρ b = νρ s, and M = 2. Fig. 2: Outage robability of the m-th user versus ρ s of the second scenario. observations can be drawn as follows: 1 Reducing the coverage of the secondary users zone D can achieve a lower outage robability because of a smaller ath loss. 2 The ordered users with different channel conditions have different decreasing sloe because of different diversity orders, which verifies the derivation of (26. In Fig. 1(b, the ower allocation coefficients are a 1 =.8 and a 2 =.2. The target rate is R 1 = 1 and R 2 = 3 BPCU. The erformance of a conventional OMA is also shown in the figure as a benchmark for comarison. It can be observed that for different values of the ath loss, NOMA can

11 11 achieve a lower outage robability than the conventional OMA. Fig. 2 lots the outage robability of the m-th user for the second scenario when both ρ b and ρ are roortional to ρ s. The ower allocation coefficients are a 1 =.8 and a 2 =.2. The target rates are R 1 = R 2 =.1 BPCU. The dashed and solid curves are obtained from the analytical results derived in (21. One observation is that error floors exist in both Figs. 2(a and 2(b, which verifies the asymtotic results in (28. Another observation is that user two (m = 2 outerforms user one (m = 1. The reason is that for user two, by alying SIC, the interference from user one is canceled. While for user one, the interference from user two still exists. In Fig. 2(a, it is shown that the error floor become smaller when λ b and λ l decrease, which is due to less interference from PTs and the relaxed interference ower constraint at the PRs. It is also worth noting that with these system arameters, NOMA outerforms OMA for user one while OMA outerforms NOMA for user two, which indicates the imortance of selecting aroriate ower allocation coefficients and target data rates for NOMA. In Fig. 2(b, it is observed that the error floors become smaller as ν decreases. This is due to the fact that smaller ν means a lower transmit ower of PTs, which in turn reduces the interference at SUs. VI. CONCLUSIONS In this aer, we have studied non-orthogonal multile access (NOMA in large-scale underlay cognitive radio networks with randomly deloyed users. Stochastic geometry tools were used to evaluate the outage erformance of the considered network. New closed-form exressions were derived for the outage robability. Diversity order of NOMA users has been analyzed in two situations based on the derived outage robability. An imortant future direction is to otimize the ower allocation coefficients to further imrove the erformance ga between NOMA and conventional MA in CR networks. APPENDIX A: PROOF OF THEOREM 1 The CDF of γ t is given by F γt (x = Pr min ρ max g l 2,ρ s x l Φ l = Pr max g l 2 ρ max l Φ l x, ρ }} +Pr max g l 2 ρ },ρ s x ρ s l Φ l ρ s = 1 U (ρ s xpr max g l 2 ρ }. (A.1 l Φ l x }} Ω

12 12 Denote Ω = 1 Ω, we exress Ω as follows: Ω = Pr max g l 2 ρ } = E Φl Pr ĝ l 2 (1+dα l ρ } } l Φ l x x l Φ l ( } (1+d α = E l ρ Φl. (A.2 x l Φ l F ĝl 2 Alying the generating function, we rewrite (A.2 as follows: Ω =ex λ l (1 F ĝl 2((1+dαl µ rdr = ex [ 2πλ l e µ Alying [14, Eq. ( ], we obtain R 2 ] re µrα dr. (A.3 Ω = 1 Ω µ δπλl = 1 e e Γ(δ µ δ, (A.4 where Γ( is Gamma function. Substituting (A.4 into (A.1, and taking the derivative, we obtain the PDF of γ t in (18. The roof is comleted. REFERENCES [1] Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, System-level erformance evaluation of downlink non-orthogonal multile access (NOMA, in Proc. IEEE Annual Symosium on Personal, Indoor and Mobile Radio Communications (PIMRC, Set [2] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, On the erformance of non-orthogonal multile access in 5G systems with randomly deloyed users, IEEE Signal Process. Lett., vol. 21, no. 12, , 214. [3] M. Al-Imari, P. Xiao, M. A. Imran, and R. Tafazolli, Ulink non-orthogonal multile access for 5G wireless networks, in Proc. of the 11th International Symosium on Wireless Communications Systems (ISWCS, Barcelona, Sain, Aug 214, [4] Z. Ding, F. Adachi, and H. V. Poor, The alication of MIMO to non-orthogonal multile access, IEEE Trans. Wireless Commun., 216. [5] Q. Sun, S. Han, C.-L. I, and Z. Pan, On the ergodic caacity of MIMO NOMA systems, IEEE Wireless Commun. Lett., 215. [6] A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, Breaking sectrum gridlock with cognitive radios: An information theoretic ersective, Proceedings of the IEEE, vol. 97, no. 5, , 29. [7] Y. Dhungana and C. Tellambura, Outage robability of underlay cognitive relay networks with satially random nodes, in Global Commun. Conf. (GLOBECOM, Dec 214, [8] Z. Ding, P. Fan, and H. V. Poor, Imact of user airing on 5G non-orthogonal multile access, IEEE Trans. Veh. Technol., 216. [9] M. Haenggi, Stochastic Geometry for Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, 212. [1] J. Venkataraman, M. Haenggi, and O. Collins, Shot noise models for outage and throughut analyses in wireless ad hoc networks, in Military Commun. Conf. (MILCOM, 26, [11] T. M. Cover and J. A. Thomas, Elements of information theory 2nd edition, 26. [12] H. A. David and N. Nagaraja, Order Statistics, 3rd ed. John Wiley, 23. [13] E. Hildebrand, Introduction to numerical analysis, NewYork, NY, USA: Dover,, [14] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 6th ed. New York, NY, USA: Academic Press, 2.

Non-orthogonal Multiple Access in Large-Scale Underlay Cognitive Radio Networks

Non-orthogonal Multiple Access in Large-Scale Underlay Cognitive Radio Networks 1 Non-orthogonal Multiple Access in Large-Scale Underlay Cognitive Radio Networks Yuanwei Liu, Student Member, IEEE, Zhiguo Ding, Senior Member, IEEE, Maged Elkashlan, Member, IEEE, and Jinhong Yuan Fellow,

More information

NOMA: An Information Theoretic Perspective

NOMA: An Information Theoretic Perspective NOMA: An Information Theoretic Perspective Peng Xu, Zhiguo Ding, Member, IEEE, Xuchu Dai and H. Vincent Poor, Fellow, IEEE arxiv:54.775v2 cs.it] 2 May 25 Abstract In this letter, the performance of non-orthogonal

More information

Cooperative Non-Orthogonal Multiple Access with Simultaneous Wireless Information and Power Transfer

Cooperative Non-Orthogonal Multiple Access with Simultaneous Wireless Information and Power Transfer 1 Cooperative Non-Orthogonal Multiple Access with Simultaneous Wireless Information and Power Transfer Yuanwei Liu, Zhiguo Ding, Maged Elkashlan, and H Vincent Poor Abstract In this paper, the application

More information

Short-Packet Communications in Non-Orthogonal Multiple Access Systems

Short-Packet Communications in Non-Orthogonal Multiple Access Systems Short-Packet Communications in Non-Orthogonal Multiple Access Systems Xiaofang Sun, Shihao Yan, Nan Yang, Zhiguo Ding, Chao Shen, and Zhangdui Zhong State Key Lab of Rail Traffic Control and Safety, Beijing

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

Training sequence optimization for frequency selective channels with MAP equalization

Training sequence optimization for frequency selective channels with MAP equalization 532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038

More information

Spatial Outage Capacity of Poisson Bipolar Networks

Spatial Outage Capacity of Poisson Bipolar Networks Satial Outage Caacity of Poisson Biolar Networks Sanket S. Kalamkar and Martin Haenggi Deartment of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA E-mail: skalamka@nd.edu,

More information

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE) KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität

More information

A Mathematical Proof of the Superiority of NOMA Compared to Conventional OMA

A Mathematical Proof of the Superiority of NOMA Compared to Conventional OMA IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. XX, NO. X, OCT. 2016 1 A Mathematical Proof of the Superiority of NOMA Compared to Conventional OMA Zhiyong Chen, Zhiguo Ding, Senior Member, IEEE, Xuchu Dai,

More information

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI Otimal Power Control over Fading Cognitive Radio Channels by Exloiting Primary User CSI Rui Zhang Abstract arxiv:0804.67v2 [cs.it] 7 Feb 2009 This aer is concerned with sectrum sharing cognitive radio

More information

Non-Orthogonal Multiple Access Schemes with Partial Relay Selection

Non-Orthogonal Multiple Access Schemes with Partial Relay Selection Non-Orthogonal Multiple Access Schemes with Partial Relay Selection Lee, S., da Costa, D. B., Vien, Q-T., Duong, T. Q., & de Sousa Jr, R. T. 206. Non-Orthogonal Multiple Access Schemes with Partial Relay

More information

Beamspace MIMO-NOMA for Millimeter-Wave Communications Using Lens Antenna Arrays

Beamspace MIMO-NOMA for Millimeter-Wave Communications Using Lens Antenna Arrays Beamsace MIMO-NOMA for Millimeter-Wave Communications Using Lens Antenna Arrays Bichai Wang 1, Linglong Dai 1,XiqiGao, and Lajos anzo 3 1 Tsinghua National Laboratory for Information Science and Technology

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS, GIST Email: jchoi114@gist.ac.kr Invited Paper arxiv:176.885v1 [cs.it] 27 Jun 217 Abstract Although non-orthogonal multiple access NOMA is

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

Quality of Service Based NOMA Group D2D Communications

Quality of Service Based NOMA Group D2D Communications future internet Article Quality of Service Based NOMA Group D2D Communications Asim Anwar ID, Boon-Chong Seet *, ID and Xue Jun Li ID Department of Electrical and Electronic Engineering, Auckland University

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,

More information

Simple Semi-Grant-Free Transmission Strategies Assisted by Non-Orthogonal Multiple Access

Simple Semi-Grant-Free Transmission Strategies Assisted by Non-Orthogonal Multiple Access 1 Simple Semi-Grant-Free Transmission Strategies Assisted by Non-Orthogonal Multiple Access Zhiguo Ding, Senior Member, IEEE, Robert Schober, Fellow, IEEE, Pingzhi Fan, Fellow, IEEE, and H. Vincent Poor,

More information

Unsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA)

Unsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA) Unsuervised Hyersectral Image Analysis Using Indeendent Comonent Analysis (ICA) Shao-Shan Chiang Chein-I Chang Irving W. Ginsberg Remote Sensing Signal and Image Processing Laboratory Deartment of Comuter

More information

Vision Graph Construction in Wireless Multimedia Sensor Networks

Vision Graph Construction in Wireless Multimedia Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia

More information

A Two-Phase Power Allocation Scheme for CRNs Employing NOMA

A Two-Phase Power Allocation Scheme for CRNs Employing NOMA A Two-Phase Power Allocation Scheme for CRNs Employing NOMA Ming Zeng, Georgios I. Tsiropoulos, Animesh Yadav, Octavia A. Dobre, and Mohamed H. Ahmed Faculty of Engineering and Applied Science, Memorial

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Capacity Comparison between MIMO-NOMA and MIMO-OMA with Multiple Users in a Cluster

Capacity Comparison between MIMO-NOMA and MIMO-OMA with Multiple Users in a Cluster 1 Capacity Comparison between MIMO-NOMA and MIMO-OMA with Multiple Users in a Cluster Ming Zeng, Animesh Yadav, Octavia A. Dobre, Georgios I. Tsiropoulos arxiv:1706.0731v1 [cs.it] 8 Jun 017 and H. Vincent

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

Multi-Channel MAC Protocol for Full-Duplex Cognitive Radio Networks with Optimized Access Control and Load Balancing

Multi-Channel MAC Protocol for Full-Duplex Cognitive Radio Networks with Optimized Access Control and Load Balancing Multi-Channel MAC Protocol for Full-Dulex Cognitive Radio etworks with Otimized Access Control and Load Balancing Le Thanh Tan and Long Bao Le arxiv:.3v [cs.it] Feb Abstract In this aer, we roose a multi-channel

More information

Multiple Antenna Aided NOMA in UAV Networks: A Stochastic Geometry Approach

Multiple Antenna Aided NOMA in UAV Networks: A Stochastic Geometry Approach 1 Multiple Antenna Aided NOMA in UAV Networks: A Stochastic Geometry Approach Tianwei Hou, Student Member, IEEE, Yuanwei Liu, Member, IEEE, Zhengyu Song, Xin Sun, and Yue Chen, Senior Member, IEEE, arxiv:1805.04985v1

More information

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process

Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process P. Mantalos a1, K. Mattheou b, A. Karagrigoriou b a.deartment of Statistics University of Lund

More information

Delay characterization of multi-hop transmission in a Poisson field of interference

Delay characterization of multi-hop transmission in a Poisson field of interference 1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission

More information

Anytime communication over the Gilbert-Eliot channel with noiseless feedback

Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California

More information

User Selection and Power Allocation for MmWave-NOMA Networks

User Selection and Power Allocation for MmWave-NOMA Networks User Selection and Power Allocation for MmWave-NOMA Networks Jingjing Cui, Yuanwei Liu, Zhiguo Ding, Pingzhi Fan and Arumugam Nallanathan Southwest Jiaotong University, Chengdu, P. R. China Queen Mary

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Rui Wang, Jun Zhang, S.H. Song and K. B. Letaief, Fellow, IEEE Dept. of ECE, The Hong Kong University of Science

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

Coding Along Hermite Polynomials for Gaussian Noise Channels

Coding Along Hermite Polynomials for Gaussian Noise Channels Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract

More information

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012 Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

ELEC546 Review of Information Theory

ELEC546 Review of Information Theory ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random

More information

Cybernetic Interpretation of the Riemann Zeta Function

Cybernetic Interpretation of the Riemann Zeta Function Cybernetic Interretation of the Riemann Zeta Function Petr Klán, Det. of System Analysis, University of Economics in Prague, Czech Reublic, etr.klan@vse.cz arxiv:602.05507v [cs.sy] 2 Feb 206 Abstract:

More information

Channel inversion in MIMO systems over Rician fading

Channel inversion in MIMO systems over Rician fading This full tet aer was eer reviewed at the direction of IEEE Communications Society subject matter eerts for ublication in the IEEE Globecom roceedings Channel inversion in MIMO systems over Rician fading

More information

MODELING INTERFERENCE IN FINITE UNIFORMLY RANDOM NETWORKS

MODELING INTERFERENCE IN FINITE UNIFORMLY RANDOM NETWORKS MODELING INTERFERENCE IN FINITE UNIFORMLY RANDOM NETWORKS Sunil Srinivasa Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA ssriniv1@nd.edu Martin Haenggi Department

More information

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

The decision-feedback equalizer optimization for Gaussian noise

The decision-feedback equalizer optimization for Gaussian noise Journal of Theoretical and Alied Comuter Science Vol. 8 No. 4 4. 5- ISSN 99-634 (rinted 3-5653 (online htt://www.jtacs.org The decision-feedback eualizer otimization for Gaussian noise Arkadiusz Grzbowski

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Opportunistic Spectrum Access in Multiple Primary User Environments Under the Packet Collision Constraint

Opportunistic Spectrum Access in Multiple Primary User Environments Under the Packet Collision Constraint IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. Y, 1 Oortunistic Sectrum Access in Multile Primary User Environments Under the Packet Collision Constraint Eric Jung, Student Member, IEEE, and Xin Liu,

More information

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S. -D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

An Analysis of Uplink Asynchronous Non-Orthogonal Multiple Access Systems

An Analysis of Uplink Asynchronous Non-Orthogonal Multiple Access Systems 1 An Analysis of Uplink Asynchronous Non-Orthogonal Multiple Access Systems Xun Zou, Student Member, IEEE, Biao He, Member, IEEE, and Hamid Jafarkhani, Fellow, IEEE arxiv:18694v1 [csit] 3 Jun 18 Abstract

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

On Power Minimization for Non-orthogonal Multiple Access (NOMA)

On Power Minimization for Non-orthogonal Multiple Access (NOMA) On Power Minimization for Non-orthogonal Multiple Access (NOMA) Lei Lei, Di Yuan and Peter Värbrand Journal Article N.B.: When citing this work, cite the original article. 2016 IEEE. Personal use of this

More information

LDPC codes for the Cascaded BSC-BAWGN channel

LDPC codes for the Cascaded BSC-BAWGN channel LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 email:aravind,siegel,jwolf@ucsd.edu

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Behrouz Khoshnevis and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario,

More information

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt

More information

Spectrum Sharing in RF-Powered Cognitive Radio Networks using Game Theory

Spectrum Sharing in RF-Powered Cognitive Radio Networks using Game Theory Spectrum Sharing in RF-owered Cognitive Radio Networks using Theory Yuanye Ma, He Henry Chen, Zihuai Lin, Branka Vucetic, Xu Li The University of Sydney, Sydney, Australia, Email: yuanye.ma, he.chen, zihuai.lin,

More information

Outage Performance of Cognitive AF Relaying Networks over generalized η µ Fading Channels

Outage Performance of Cognitive AF Relaying Networks over generalized η µ Fading Channels Outage Performance of Cognitive AF Relaying Networks over generalized η µ Fading Channels Jing Yang, Lei Chen, Chunxiao Li Yangzhou University School of Information Engineering 88 South University Ave.,

More information

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals Samling and Distortion radeoffs for Bandlimited Periodic Signals Elaheh ohammadi and Farokh arvasti Advanced Communications Research Institute ACRI Deartment of Electrical Engineering Sharif University

More information

Minimax Design of Nonnegative Finite Impulse Response Filters

Minimax Design of Nonnegative Finite Impulse Response Filters Minimax Design of Nonnegative Finite Imulse Resonse Filters Xiaoing Lai, Anke Xue Institute of Information and Control Hangzhou Dianzi University Hangzhou, 3118 China e-mail: laix@hdu.edu.cn; akxue@hdu.edu.cn

More information

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

Finite Mixture EFA in Mplus

Finite Mixture EFA in Mplus Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered

More information

A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS

A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS The Seventh Asia-Pacific Conference on Wind Engineering, November 8-1, 009, Taiei, Taiwan A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS M.F. Huang 1,

More information

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining Secrecy Outage erformance of Cooperative Relay Network With Diversity Combining Khyati Chopra Dept. of lectrical ngineering Indian Institute of Technology, Delhi New Delhi-110016, India mail: eez148071@ee.iitd.ac.in

More information

Performance Analysis of Interweave Cognitive Radio Systems with Imperfect Channel Knowledge over Nakagami Fading Channels

Performance Analysis of Interweave Cognitive Radio Systems with Imperfect Channel Knowledge over Nakagami Fading Channels Performance Analysis of Interweave Cognitive Radio Systems with Imperfect Channel Knowledge over Nakagami Fading Channels Ankit Kaushik, Shree Krishna Sharma, Symeon Chatzinotas, Björn Ottersten, Friedrich

More information

Adaptive Successive Transmission in Virtual Full-Duplex Cooperative NOMA

Adaptive Successive Transmission in Virtual Full-Duplex Cooperative NOMA Adaptive Successive Transmission in Virtual Full-Duplex Cooperative NOMA Young-bin Kim Future Access Network Division KDDI Research, Inc Fujimino-shi, Japan yo-kim@kddi-researchjp Kosuke Yamazaki Future

More information

Interactive Hypothesis Testing Against Independence

Interactive Hypothesis Testing Against Independence 013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,

More information

Damage Identification from Power Spectrum Density Transmissibility

Damage Identification from Power Spectrum Density Transmissibility 6th Euroean Worksho on Structural Health Monitoring - h.3.d.3 More info about this article: htt://www.ndt.net/?id=14083 Damage Identification from Power Sectrum Density ransmissibility Y. ZHOU, R. PERERA

More information

USING multiple antennas has been shown to increase the

USING multiple antennas has been shown to increase the IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 1, JANUARY 2007 11 A Comparison of Time-Sharing, DPC, and Beamforming for MIMO Broadcast Channels With Many Users Masoud Sharif, Member, IEEE, and Babak

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

The Optimality of Beamforming: A Unified View

The Optimality of Beamforming: A Unified View The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012

More information

Fig. 21: Architecture of PeerSim [44]

Fig. 21: Architecture of PeerSim [44] Sulementary Aendix A: Modeling HPP with PeerSim Fig. : Architecture of PeerSim [] In PeerSim, every comonent can be relaced by another comonent imlementing the same interface, and the general simulation

More information

Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier

Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier Australian Journal of Basic and Alied Sciences, 5(12): 2010-2020, 2011 ISSN 1991-8178 Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doed Fiber Amlifier

More information

WIRELESS energy transfer (WET), where receivers harvest

WIRELESS energy transfer (WET), where receivers harvest 6898 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 10, OCTOBER 2016 User-Centric Energy Efficiency Maximization for Wireless Powered Communications Qingqing Wu, Student Member, IEEE, Wen Chen,

More information

A Novel Network NOMA Scheme for. Downlink Coordinated Three-Point Systems

A Novel Network NOMA Scheme for. Downlink Coordinated Three-Point Systems 1 A Novel Network NOMA Scheme for Downlink Coordinated Three-Point Systems Yanshi Sun, Zhiguo Ding, Senior Member, IEEE, Xuchu Dai, and George K. arxiv:1708.06498v [cs.it] 13 Dec 017 Karagiannidis, Fellow,

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Weibull-Gamma composite distribution: An alternative multipath/shadowing fading model

Weibull-Gamma composite distribution: An alternative multipath/shadowing fading model Weibull-Gamma composite distribution: An alternative multipath/shadowing fading model Petros S. Bithas Institute for Space Applications and Remote Sensing, National Observatory of Athens, Metaxa & Vas.

More information

HetNets: what tools for analysis?

HetNets: what tools for analysis? HetNets: what tools for analysis? Daniela Tuninetti (Ph.D.) Email: danielat@uic.edu Motivation Seven Ways that HetNets are a Cellular Paradigm Shift, by J. Andrews, IEEE Communications Magazine, March

More information

Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System

Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System Aravind Kailas UMTS Systems Performance Team QUALCOMM Inc San Diego, CA 911 Email: akailas@qualcommcom John A Gubner Department

More information

Supplementary Materials for Robust Estimation of the False Discovery Rate

Supplementary Materials for Robust Estimation of the False Discovery Rate Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides

More information

IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) 1. Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio

IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) 1. Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio IEEE TRANSACTIONS ON COMMUNICATIONS (ACCEPTED TO APPEAR) Diversity-Multiplexing Tradeoff in Selective Cooperation for Cognitive Radio Yulong Zou, Member, IEEE, Yu-Dong Yao, Fellow, IEEE, and Baoyu Zheng,

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES

VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES Journal of Sound and Vibration (998) 22(5), 78 85 VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES Acoustics and Dynamics Laboratory, Deartment of Mechanical Engineering, The

More information

Actual exergy intake to perform the same task

Actual exergy intake to perform the same task CHAPER : PRINCIPLES OF ENERGY CONSERVAION INRODUCION Energy conservation rinciles are based on thermodynamics If we look into the simle and most direct statement of the first law of thermodynamics, we

More information

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of

More information