arxiv: v1 [cs.it] 19 Sep 2017

Size: px
Start display at page:

Download "arxiv: v1 [cs.it] 19 Sep 2017"

Transcription

1 1 Secure Bemforming in Full-Duplex SWIPT Systems Ynjie Dong, Ahmed El Shfie, Md. Jhngir Hossin, Julin Cheng, Nofl Al-Dhhir, nd Victor C. M. Leung rxiv: v1 [cs.it] 19 Sep 2017 Abstrct Physicl lyer security is ey issue in the full duplex FD communiction systems due to the brodcst nture of wireless chnnels. In this pper, the joint design of informtion nd rtificil noise bemforming vectors is proposed for the FD simultneous wireless informtion nd power trnsferring FD-SWIPT systems. To gurntee high security nd energy hrvesting performnce of the FD-SWIPT system, the proposed design is formulted s sum informtion trnsmission rte SITR mximiztion problem under informtion-lege nd energy constrints. In ddition, we consider the firness issue between the uplin nd downlin informtion trnsmission rtes by formulting firness-wre SITR-mximiztion problem. Although the formulted SITR-mximiztion nd firness-wre SITR-mximiztion problems re non-convex, we solve them vi semidefinite relxtion nd one-dimensionl serch. The optimlity of our proposed lgorithms is theoreticlly proved, nd the computtion complexities re estblished. Moreover, we propose two suboptiml solutions to the formulted optimiztion problems. In terms of the SITR-mximiztion problem, numericl results show tht the performnce chieved by one of the two suboptiml lgorithms is close to the performnce of the optiml lgorithm with incresing mximum trnsmission power of the FD-BST. Index Terms Bemforming, coordinted jmming, full-duplex communictions, physicl lyer security, SWIPT. Ynjie Dong nd Victor C. M. Leung re with the Deprtment of Electricl nd Computer Engineering, The University of British Columbi, Vncouver, BC V6T 1Z4, Cnd emil:{ydong16, vleung}@ece.ubc.c. Ahmed El Shfie nd Nofl Al-Dhhir re with the Electricl Engineering Deprtment, The University of Texs t Dlls, Dlls, TX 75080, USA e-mil: {hmed.elshfie, ldhhir}@utdlls.edu. Md. Jhngir Hossin nd Julin Cheng re with the School of Engineering, The University of British Columbi, Kelown, BC V1V 1V7, Cnd emil:{jhngir.hossin, julin.cheng}@ubc.c.

2 2 I. INTRODUCTION The upsurging wireless dt volume drives the industril nd cdemic communities to serch for efficient wys to boost the usge of the lredy scrce rdio-frequency RF spectrum in the fifth genertion 5G wireless communiction systems [1]. Full-duplex FD technology is considered s one of the promising solutions to improve the RF spectrum utiliztion due to its bility to double the spectrum efficiency. Moreover, energy efficiency is enhnced given the unchnged power consumption nd improved spectrum efficency [1], [2]. However, FD nodes suffer from strong loopbc self-interference LSI due to the short distnce between the trnsmitter nd receiver sides on n FD node. Severl LSI cncelltion techniques re proposed in the FD literture, e.g., nturl isoltion [3], digitl-nlog domin cncelltion [4], nd sptil suppression [5] [7]. By plcing the bsorptive shielding in the LSI chnnel, the nturl isoltion is ttrctive due to its implementtion simplicity. However, the effectiveness of the nturl isoltion is limited by the form-fctor of the wireless devices i.e., the smller the device, the less room to implement the isoltor. It is even the cse tht using high-end duplexer my not be sufficient for communiction [5]. An lterntive scheme to cncel the LSI is by using the digitl nd/or nlog domin cncelltion techniques. However, the dynmic rnge of the reception circuits is bottlenec to cncel the strong LSI [2], [8]. As result, sptil suppression, which is bsed on the sptil diversity to suppress the LSI, is required before further processing of the received signls [5] [7]. Simultneous wireless informtion nd power trnsferring SWIPT systems re receiving incresed ttention [9] [11]. Bsed on the energy crried by the RF signls, SWIPT systems cn deliver informtion signl to the user equipments UEs nd energy signl to the low energy-consumption energy receivers ERs [12]. Hence, the integrtion of FD technology into the SWIPT systems is promising due to the simultneous support of UEs nd ERs nd the improvement of the spectrum efficiency nd the energy efficiency [13]. To void the ttenution of the energy signl nd meet energy hrvesting demnds, the ERs re usully deployed ner the trnsmitters [14], [15]. However, the strong received signl strength t the ERs cn lso benefit evesdropping when the ERs re mlicious users. Therefore, there exists criticl trdeoff between the security issue nd the energy requirements t the ERs in FD-SWIPT systems. It hs been demonstrted in [16] tht using prt of the trnsmission power to rtificilly generte the

3 3 noise, the informtion lege to the evesdroppers is degrded. Hence, the security in wireless communictions is improved vi brodcsting the rtificil noise AN [16] [19]. Motivted by this fct, we ssume tht informtion bemforming nd AN vectors re jointly generted by the FD bse sttion FD-BST nd FD user equipment FD-UE to suppress the informtion lege to the ERs. Another benefit of this setup is tht the FD-BST nd the FD-UE cn coordintely perform AN bemforming, which improves the suppression efficiency of the informtion lege [17], [20] [22]. A. Relted Wor nd Motivtions Resource lloction is one of the ey mechnisms to ensure the communiction security in wireless communiction systems, such s FD communiction systems nd the SWIPT systems. On the one hnd, secure resource lloction in FD communiction systems hs been widely investigted for vrious topologies, e.g., point-to-point PtP topology [17], [18], [20], [23], point-to-multipoint PtMP topology [21], multipoint-to-multipoint MPtMP topology [24], nd wireless relying topology [7], [8], [17], [22]. Two mjor optimiztion problems re considered in secure FD communiction systems, nmely, secrecy-cpcity mximiztion [17], [18], [22], [23] nd trnsmission-power minimiztion [21]. For exmple, using jmming signls by the legitimte receiver, the uthors in [17] studied secrecy-cpcity mximiztion in FD communiction systems with PtP topology. With the sme topology s [17], source nd destintion perform coordinted jmming in [18]. Using the secrecy-cpcity region in [25], [26], the uthors in [23] proposed n lternting optimiztion lgorithm to obtin the loclly optiml solution to mximize the secrecy cpcity of the secure FD communiction systems with PtP topology. On the other hnd, secure resource lloction in the SWIPT systems ws investigted in [13] [15], [27] [32]. To gurntee system security, different performnce metrics re optimized, such s secrecy-cpcity mximiztion [13], [14], [28], [31], security-outge-probbility minimiztion [15], nd trnsmission-power minimiztion [27], [32]. In SWIPT with single legitimte UE, the uthors in [14] nd [28] investigted secrecy-cpcity mximiztion for multiple single-ntenn evesdroppers nd one single multiple-ntenn evesdropper, respectively. The uthors in [32] investigted the power-minimiztion problem in SWIPT systems with multiple ERs nd multiple multi-ntenn evesdroppers under the imperfect chnnel stte informtion CSI. In ddition, the uthors in [29] nlyzed the secrecy cpcity in SWIPT systems with single legitimte UE

4 4 nd multiple evesdroppers, nd they obtined closed-form expressions for the security outge probbility nd the ergodic security cpcity. The uthors in [13] studied weighted-cpcity mximiztion in the wireless relying system, where the BST opertes in the FD mode nd single ER cn envisge energy nd evesdrop informtion from the received signls. Despite the plethor of reserch wors on the security of wireless communiction systems [13] [15], [17] [20], [23], [27] [32], they re minly bsed on the ssumption tht ech evesdropper cn cquire informtion from one legitimte UE. Hence, the reported secrecy rtes re, generlly, not chievble when the ER cn evesdrop informtion from the simultneous UE nd BS trnsmissions [25], [26]. B. Contributions Motivted by the pioneering wor on the cpcity-region of FD two-wy communiction systems [25], [26], we consider more generl scenrio, where there re multiple ERs in the FD-SWIPT system. In the FD-SWIPT system, the bidirectionl communictions between FD-BST nd FD-UE plce requirements on communiction security nd hrvested energy t the multiple ERs. To the uthors best nowledge, the joint design of the informtion bemforming nd AN vectors in the FD-SWIPT system with multiple ERs hs not been reported in the current literture. Our objective is to mximize the sum rtes for informtion trnsmissions of the FD- BST nd FD-UE s well s confine the informtion lege to the multiple ERs. Our min contributions re summrized s follows To void the sturtion of the digitl nd nlog circuits, we jointly design the informtion nd AN vectors to suppress the LSI such tht certin informtion trnsmission rte is chieved. We investigte the mximiztion of the sum informtion trnsmission rtes SITR in FD-SWIPT systems. Motivted by [14], we leverge the semidefinite relxtion SDR technique to develop n optiml solution to the SITR-mximiztion problem. We investigte the firness-wre FA SITR-mximiztion problem, where the informtion trnsmission rtes of the FD-BST nd the FD-UE stisfy predefined rtio. We perform convex relxtion to the proportionl rte constrint nd propose the FA-SITR lgorithm to solve the relxed optimiztion problem. We prove tht the proposed FA-SITR lgorithm converges to the optiml solution of the FA-SITR-mximiztion problem.

5 5 In ddition, we develop two suboptiml solutions with low complexity to ech of the formulted problems: SITR-mximiztion nd FA-SITR-mximiztion problems. For the SITR-mximiztion problem, we numericlly show tht the secrecy rte obtined by one of the proposed suboptiml lgorithms converges to tht of the optiml lgorithm with n incresing mximum trnsmission power of the FD-BST. Numericl results re used to verify the performnce of the proposed lgorithms. Specificlly, we show tht the optiml secrecy rte cn be chieved by performing two-dimensionl serch. The reminder of this pper is orgnized s follows. In Section II, we describe the system model nd problem formultion in FD-SWIPT systems. In Section III nd Section IV, we respectively derive the optiml lgorithms to the SITR-mximiztion nd FA-SITR-mximiztion problems in FD-SWIPT systems. In Section V, we propose two suboptiml lgorithms to ech of the formulted problems nd compre the computtion complexities of the proposed optiml nd suboptiml lgorithms. Numericl results re presented in Section VI nd the pper is concluded in Section VII. Nottions: Vectors nd mtrices re shown in bold lowercse letters nd bold uppercse letters, respectively. C denotes the set of complex numbers. F nd p refer to the Frobenius norm nd l p -norm, respectively. stnds for distributed s. I denotes identity mtrix, nd 0 N M denotes zero mtrix with N rows nd M columns. The expecttion of rndom vrible is denoted s E [ ]. The opertor w + is defined s w + mx w, 0. vec [ ] converts n M N mtrix into column vector of size MN 1. {w n } n N represents the set composed of w n, n N. For squre mtrix W, W H nd Tr W denote its conjugte trnspose nd trce, respectively. W 0 nd W 0 imply tht W is positive semidefinite nd positive definite mtrix, respectively. II. SYSTEM MODEL AND PROBLEM FORMULATION A. System Model nd Assumptions We consider n FD-SWIPT system which consists of n FD-BST, legitimte FD-UE, nd K ERs. Let K = {1, 2,..., K} be the set of ERs, where ech ER cn lso be the potentil evesdroppers. The FD-BST is equipped with N > 1 trnsmit ntenns nd single receive ntenn for simultneous trnsmission nd reception over the sme frequency bnd. Similrly, the legitimte FD-UE is equipped with N b > 1 trnsmit ntenns nd single receive ntenn.

6 6 Thus, the FD-BST nd the FD-UE operte in FD mode. The -th ER is equipped with single receive ntenn. We consider frme-bsed communiction over frequency-nonselective fding chnnels with unit durtion for ech frme. Therefore, the terms power nd energy cn be used interchngebly. We ssume tht the FD-BST nd the FD-UE cn perfectly estimte the CSI [7]. This ssumption is resonble since the ERs nd the FD-UE re ssumed to be non-hostile legitimte nodes in the FD-SWIPT system. However, the ERs re curious to decode the informtion signls trnsmitted by the FD-BST nd the FD-UE. Therefore, the ERs re ssumed to be the potentil evesdroppers. At the beginning of ech frme, ech node sends pilot signl to the FD-BST. All nodes listen to the pilot signls nd estimte the chnnels ssocited with the node sending the pilot signl. After tht, the FD-BST sends nother pilot signl such tht ech node estimtes the chnnel connected to the FD-BST. Then, the FD-UE feeds bc the estimted CSI to the FD-BST. Finlly, the FD-BST nd the FD-UE use the bemforming vectors for informtion trnsmission nd the AN signls for coordinted jmming. The trnsmission signls of the FD-BST nd FD-UE re, respectively, given by x,b = w,b s b + v 1 nd x b, = w b, s + v b 2 where s CN 0, 1 nd s b CN 0, 1 denote, respectively, the informtion-bering signls for the FD-BST nd the FD-UE, nd s nd s b re independent from ech other. The vectors w,b C N 1 nd v C N 1 w b, C Nb 1 nd v b C Nb 1 re, respectively, the informtion bemforming vector nd the AN vector of the FD-BST FD-UE. In prticulr, the AN vector v v b is modeled s circulrly symmetric complex Gussin vector with men zero nd covrince V, 0 V b,b 0. Therefore, the received signl t the -th ER is given by y e = h H,e w,b s b + h H b,e w b, s + h H e v + z e 3 where h e vec [h,e, h b,e ] with the chnnel coefficient vectors from the FD-BST nd the FD-UE to the -th ER denoted by h,e C N 1 nd h b,e C Nb 1, respectively. The term z e CN 0, σe 2 denotes the dditive white Gussin noise AWGN t the -th ER with zero

7 7 men nd vrince σ 2 e ; v vec [v, v b ] is the compct form of the coordinted AN vector 1. Here, the AN vector v is modeled s circulrly symmetric Gussin vector with zero men nd covrince mtrix V. The AN covrince mtrix V is given by V = V, V b, V,b V b,b where the mtrices V,b nd V b, re defined s V,b = E [ v v H b respectively. 4 ] nd Vb, = E [ ] v b v H, The chievble sum dt rte of the -th ER is given by C e W,b, W b,, V = log 1 + Tr H,e W,b + Tr H b,e W b,. 5 Tr H e V + σe 2 In ddition, the following two chievble dt rtes of the -th ER re given by Tr H b,e W b, C,e W,b, W b,, V = log 1 +, 6 Tr H,e W,b + Tr H e V + σe 2 nd C b,e W,b, W b,, V = log 1 + Tr H,e W,b Tr H b,e W b, + Tr H e V + σ 2 e, 7 where W,b w,b w H,b, W b, w b, w H b,, H,e h,e h H,e, H b,e h b,e h H b,e nd H e h e h H e. The rns of bemforming mtrices W,b nd W b, re upper-bounded s Rn W,b 1 nd Rn W b, 1. 8 The mount of hrvested energy t the -th ER is given by E = η Tr H e V + Tr H,e W,b + Tr H b,e W b, + σ 2 e 9 where 0 η 1 is the efficiency of the energy hrvester. In ddition, the received signls t the FD-BST nd the FD-UE re, respectively, given by y = h H b,w b, s + h H,w,b s b + h H v + z 10 1 Using the chnnel mtrices between the legitimte nodes, the AN symbols re generted from pseudo-rndom signl which is perfectly nown t the legitimte nodes but not t the evesdroppers. This is relized by using short secret ey s seed informtion for the Gussin pseudo-rndom sequence genertor. The legitimte nodes regulrly chnge the secret ey seeds to mintin the AN sequence secured from the evesdropper. A similr ssumption cn be found in, e.g., [20], [33] nd the references therein.

8 8 nd y b = h H,bw,b s b + h H b,bw b, s + h H b v + z b 11 where z CN 0, σ 2 nd z b CN 0, σb 2 denote, respectively, the AWGN t the FD-BST nd FD-UE; h vec [h,, h b, ] nd h b vec [h,b, h b,b ] denote the compct form of the chnnel coefficient vectors for the FD-BST nd the FD-UE, respectively. Without loss of generlity, we ssume tht the chnnel coefficient vectors h, h b nd h e re sttisticlly independent. With the rn constrints in 8, the informtion trnsmission rte of the FD-UE nd the FD-BST re, respectively, given by nd C W,b, W b,, V = log 1 + C b W,b, W b,, V = log 1 + Tr H b, W b, Tr H, W,b + Tr H V + σ 2 Tr H,b W,b Tr H b,b W b, + Tr H b V + σ 2 b where H h h H H, h, h H,, H,b h,b h H,b, H b h b h H b, H b,b h b,b h H b,b, nd H b, h b, h H b,. Note tht the signls received by the FD-BST nd FD-UE contin the confidentil informtion nd the uxiliry informtion [26]. Bsed on Lemm 1 in [26], the confidentil informtion leed to the ERs is zero if the following inequlities re stisfied where C LEAK nd C LEAK b nd FD-UE; C LEAK C,e W,b, W b,, V C LEAK, 14 C b,e W,b, W b,, V C LEAK b, 15 C e W,b, W b,, V C LEAK, 16 re, respectively, the informtion-lege rte thresholds of the FD-BST denotes the threshold for the sum informtion-lege rte of the FD-BST nd FD-UE. Bsed on the Corollry 1 in [26], the secrecy rte of the FD-SWIPT system is obtined s C W,b, W b,, V + C b W,b, W b,, V mx {C LEAK + C LEAK b, C LEAK }. 17 Remr 1: From 17, we observe tht the secrecy rte is relted to the informtion trnsmission rtes C W,b, W b,, V nd C b W,b, W b,, V s well s the informtion lege rtes C e W,b, W b,, V, C,e W,b, W b,, V nd C b,e W,b, W b,, V. Moreover, the chievble

9 9 rtes t ll nodes nd the hrvested energy t the ERs re controlled by the selection of the informtion nd AN bemforming vectors. With the pproprite design of the bemforming nd the AN vectors, the secrecy rte cn be mximized when the summtion of the informtion trnsmission rte is mximized with confined informtion lege to the ERs. In this wor, we investigte the sum informtion trnsmission rte SITR mximiztion subjected to the informtion lege constrints nd energy hrvesting constrints. B. Problem Formultion Our objective is to mximize the summtion of informtion trnsmission rte of the FD-SWIPT system subjected to the informtion-lege constrints, the mximum trnsmission power constrints nd the required hrvested energy of ech ER. Therefore, the SITR-mximiztion problem cn be formulted s mx C W,b, W b,, V + C b W,b, W b,, V W,b,W b,,v 18 s.t. C,e W,b, W b,, V C LEAK, 18b C b,e W,b, W b,, V C LEAK b, 18c C e W,b, W b,, V C LEAK, Tr B V + Tr W,b P mx 18d 18e Tr B b V + Tr W b, P mx b 18f Tr H e V + Tr H,e W,b + Tr H b,e W b, + σe 2 P REQ, 18g η W,b 0, W b, 0, V 0 18h Rn W,b 1 nd Rn W b, 1 18i where P mx respectively. P req nd P mx b re mximum trnsmission power for the FD-BST nd the FD-UE, denotes the required mount of hrvested energy by the -th ER. Here, the mtrices B nd B b re, respectively, defined s I 0 B = N Nb 19 0 Nb N 0 Nb N b

10 10 nd 0 N N b B b = 0 N N 0 Nb N I. 20 Since the firness issue between the FD-BST nd FD-UE is importnt, we lso investigte the SITR-mximiztion problem with firness constrint. The FA-SITR-mximiztion problem is formulted s mx C W,b, W b,, V + C b W,b, W b,, V W,b,W b,,v 21 s.t. 18b 18i C W,b, W b,, V C b W,b, W b,, V = φ φ b 21b 21c where φ 0 nd φ b 0 re the frctions of the informtion trnsmission rte of the FD-UE nd the FD-BST with φ + φ b = 1. As the rtio φ /φ b increses decreses, more emphsize is on the informtion trnsmission rte of the FD-UE FD-BST. By controlling this rtio, we cn chieve ny required firness between the two informtion rtes. A. Fesibility Anlysis III. SITR MAXIMIZATION The SITR-mximiztion problem 18 cn be infesible under certin chnnel conditions when the vlues of P mx nd P mx b re too low nd/or the vlue of P req is too high, K. By setting the objective vlue of 18 equl to zero, the FD-BST nd the FD-UE do not need to trnsmit informtion. Therefore, the bemforming mtrices W,b nd W b, re the zero mtrices. The FD-BST nd the FD-UE only need to trnsmit the AN vectors to stisfy the energy requirements. When the trnsmission power of the FD-BST nd the FD-UE cnnot stisfy the energy requirements of the ERs, the SITR-mximiztion problem 18 is infesible. Hence, the fesibility of the optimiztion problem 18 cn be checed by solving the following problem Find V 0 s.t. Tr B V P mx Tr B b V P mx b Tr H e V + σe 2 P REQ η,. 22

11 11 The fesible region of 22 is convex; therefore, we cn perform the fesibility chec vi CVX [34]. If the mtrix V is obtined vi solving 22, we hve W,b = 0, W b, = 0, V is fesible solution to the SITR-mximiztion problem 18. Without loss of generlity, we ssume the SITR-mximiztion problem 18 is fesible hereinfter. B. Optiml Joint Bemforming nd AN Vectors to SITR-Mximiztion Problem Since the SITR-mximiztion problem 18 is non-convex due to the rn-one constrints in 18i nd the non-convex objective function, we develop develop two-stge lgorithm bsed on the semidefinite relxtion SDR technique nd one-dimensionl serch in this subsection. Introducing prmeter β, we recst the optimiztion problem 18 s mx W,b,W b,,v Tr H b, W b, Tr H, W,b + Tr H V + σ 2 23 s.t. Tr H b,e W b, exp C LEAK 1 Tr H,e W,b + Tr H e V + σe 2, 23b Tr H,e W,b exp Cb LEAK 1 Tr H b,e W b, + Tr H e V + σe 2, 23c Tr H,e W,b + Tr H b,e W b, TrH exp C LEAK e V + σe 2 1, 23d where β [ 0, log 1 + P mx 18e 18i Tr H,b /σ 2 b ]. Thus, the objective vlue of the SITR-mximiztion problem 18 is obtined s 23e mx β log 1 + OBJ SITR β + β [ s.t. β 0, log 1 + P mx Tr H,b /σ 2 b ] 24 where OBJ SITR β is the objective vlue of 23. Hence, the procedures to obtin the optiml vlue of the optimiztion problem 18 re summrized s: 1 solving the optimiztion problem 23 given fixed vlue for β; then 2 performing golden-section serch for the optiml vlue [ ] of β 0, log 1 + P mx Tr H,b /σb 2. Moreover, the system secrecy rte is obtined s log 1 + OBJ SITR β + β mx {C LEAK + C LEAK b, C LEAK }. We observe tht the optimiztion problem 23 is still non-convex due to the liner frctionl objective function nd the rn-one constrints. An intuitive method to del with the frctionl objective function is by leverging the Dinelbch trnsformtion nd itertively solving series

12 12 of convex-optimiztion problems [35], [36]. However, the Dinelbch trnsformtion generlly requires severl itertions nd lrge mount of computtion resources. Hence, we re motivted to use the Chrnes-Cooper trnsformtion such tht the optiml solution is obtined without the itertions introduced by the Dinelbch trnsformtion [14], [37]. Introducing n uxiliry vrible γ 0 nd dropping the rn-one constrints in 18i, we obtin the SDR version of the optimiztion problem 23 s min Tr H b,w b, 25 W,b,W b,,v,γ s.t. Tr H, W,b + Tr H V + γσ 2 = 1 25b Tr H b,e W b, exp C LEAK 1 Tr H,e W,b + Tr H e V + γσe 2, 25c Tr H,e W,b exp Cb LEAK 1 Tr H b,e W b, + Tr H e V + γσe 2, 25d Tr H,e W,b + Tr H b,e W b, TrH exp C LEAK e V + γσe 2 1, 25e Tr H,b W,b exp β 1 Tr H b,bw b, + Tr H b V + γσb 2 25f Tr B V + Tr W,b γp mx 25g Tr B b V + Tr W b, γp mx b Tr H,e W,b + Tr H b,e W b, + Tr H e V γ W,b 0, W b, 0, V 0, γ 0. P REQ η 25h σe 2, 25i 25j If n optiml solution to 25 stisfies the rn-one constrints, the optiml solution to 25 is lso n optiml solution to 23, which is verified in Appendix A. Since the inequlity constrints in the optimiztion problem 25 re ffine, the Slter s condition holds when the optimiztion problem 25 is fesible [38]. In ddition, the optimiztion problem hs n ffine objective function; therefore, the dulity gp of the optimiztion problem 25 is zero. Proposition 1: Assuming tht the optimiztion problem 25 is fesible, there exists n optiml solution W,b, W b,, V, γ to 25 tht stisfies the rn-one constrints for W,b nd W b,, i.e., Rn W,b 1 nd Rn W b, 1. Proof: See Appendix B. The proof of Proposition 1 shows tht the optiml objective vlue of 23 cn be obtined

13 13 vi solving the optimiztion problem 25 nd performing the rn-one recovery procedures in Bsed on the golden-section serch for β, we summrize the procedure for solving the SITR-mximiztion problem 18 in Algorithm 1. Algorithm 1 SITR Algorithm 1: FD-BST sets the itertion index τ = 0 nd the stop threshold ɛ 2: FD-BST obtins β min = 0 nd β mx = log 1 + P Tr mx H,b /σ 2b. 3: repet 4: FD-BST obtins β 1 = β min β mx β min nd β 2 = β mx β mx β min 5: FD-BST obtins the objective vlues OBJ SITR β 1 nd OBJ SITR β 2 vi solving 25 6: if OBJ SITR β 1 OBJ SITR β 2 τ then 7: β mx β 2 8: else 9: β min β 1 10: end if 11: until β mx β min ɛ 12: FD-BST obtins the minimum vlue of 18 nd the bemforming mtrices W,b, W b,, V 13: if Rn W,b > 1 nd/or Rn Wb, > 1 then 14: FD-BST recovers the rn-one constrints vi nd obtins W,b, W b, nd Ṽ. 15: end if 16: FD-BST performs the eigenvlue decomposition for mtrices W,b, W b, nd Ṽ in order to obtin the informtion bemforming vectors w,b nd w b, nd the AN vectors v nd v b. 17: FD-BST notifies the FD-UE the informtion bemforming vector w b, nd AN vector v b Complexity Anlysis of the SITR Algorithm: We observe tht the mjor complexity of the SITR lgorithm lies in the itertion loop between lines Hence, we use the complexity of the itertion loop to evlute the complexity of the SITR lgorithm. In ech itertion, the optimiztion problem 25 is solved twice. Moreover, the optimiztion problem 25 contins three mtrix vribles, one nonnonnegtive vrible, 4 + 4K liner constrints nd three semidefinite constrints. To solve the optimiztion problem 25 with the required ccurcy ι, the interior point method requires O log ι 1 2N + 2N b + 1 itertions, nd the number of rithmetic opertions is O N 6 + N 6 b + N + N b 6 + 8K + 7 N 2 + 8K + 6 N 2 b + 8K + 8 N N b + 4K + 4 in ech itertion. Here, the opertor O is the worst cse computtion bound [39]. Dropping the lower order terms, we obtin the computtion complexity of the SITR lgorithm s O 2 log ɛ log ι 2N + 2N b + 1 N 6 + Nb 6 + N + N b 6 26 where ɛ is the required ccurcy of the golden-section serch in ech itertion.

14 14 IV. FA-SITR MAXIMIZATION Since the FA-SITR-mximiztion problem 21 shres the sme fesible region with the SITRmximiztion problem 18 when W,b = W b, = 0, the FA-SITR-mximiztion problem 21 is fesible if nd only if the SITR-mximiztion problem 18 is fesible. Therefore, we cn perform the fesibility chec of the FA-SITR-mximiztion problem 21 vi solving 22. The following nlysis is bsed on the ssumption tht the optimiztion problem 21 is fesible. Since the FA-SITR-mximiztion problem 21 is difficult to solve due to the non-convex objective function 21 nd the non-convex proportionl firness constrint in 21c. In order to del with the non-convex proportionl firness constrint in 21c, we relx the equlity of 21c s C W,b, W b,, V φ λ 27 C b W,b, W b,, V φ b λ 28 where λ is prmeter tht stisfies λ > 0. Note tht the lower bounds of the informtion trnsmission rtes C W,b, W b,, V nd C b W,b, W b,, V stisfy the proportionl constrint. If the constrints in 27 nd 28 re ctive 2, the proportionl firness constrint for the informtion trnsmission rtes of the FD-UE C W,b, W b,, V nd the FD-BST C b W,b, W b,, V is stisfied. In order to prove the ctiveness of the constrints in 27 nd 28, we recst the FA-SITRmximiztion problem 21 s follows mx λ W,b,W b,,v s.t. 18b 18i C W,b, W b,, V φ λ 29 29b 29c where λ [ { 1 0, mx φ b log 1 + P mx C b W,b, W b,, V φ b λ, 1 φ log 1 + P b mx TrH,b Proposition 2: Given λ, there exists solution 29c nd 29d re ctive. σ 2 b TrHb, σ 2 }]. 29d Ŵ,b, Ŵ b,, V such tht the constrints in 2 The term ctive indictes tht constrint is held with equlity.

15 15 Proof: See Appendix C. From Proposition 2, we conclude tht the proportionl firness constrint in 21c cn be stisfied. As result, the objective vlue of the FA-SITR-mximiztion problem 21 is obtined vi one-dimensionl serch for the optiml λ nd finding fesible solution of 29 given λ. In ddition, the system secrecy rte is obtined s λ mx {C LEAK + C LEAK b, C LEAK }. Dropping the rn-one constrints, we obtin the SDR version of the optimiztion problem 29 s mx λ W,b,W b,,v 30 s.t. Tr H b,e W b, exp C LEAK 1 Tr H,e W,b + Tr H e V + σe 2, 30b Tr H,e W,b exp Cb LEAK 1 Tr H b,e W b, + Tr H e V + σe 2, 30c Tr H,e W,b + Tr H b,e W b, Tr H exp C LEAK e V + σe 2 1, 30d Tr H b, W b, expφ λ 1 Tr H,W,b + Tr H V + σ 2 30e Tr H,b W,b expφ b λ 1 Tr H b,bw b, + Tr H b V + σ 2 b Tr B V + Tr W,b P mx Tr B b V + Tr W b, P mx b 30f 30g 30h Tr H,e W,b + Tr H b,e W b, + Tr H e V + σe 2 P REQ, 30i η W,b 0, W b, 0, V 0. Proposition 3: Given λ, the solution W,b, W b,, V to 30 stisfies the rn-one constrints for W,b nd W b,, i.e., Rn W,b 1 nd Rn W b, 1. 30j Proof: The proof follows similr rguments to those of Proposition 1, nd we omit to void repetition. Bsed on Proposition 3, the optiml vlue of the optimiztion problem 21 cn be obtined vi: 1 solving the optimiztion problem 30; then 2 performing one-dimensionl serch for the optiml λ. We summrize the detiled procedure for solving the optimiztion problem 21 in Algorithm 2.

16 16 Algorithm 2 FA-SITR Algorithm 1: FD-BST sets the itertion index τ = 0 nd the stop threshold ɛ { 2: FD-BST obtins λ min = 0 nd λ mx = mx 1 log 1 + P φ mx b Tr H,b /σ 2b 3: repet 4: FD-BST obtins λ = λmin +λ mx 2 5: FD-BST finds fesible solution to the optimiztion problem 30 6: if The optimiztion problem 30 is fesible given λ then 7: λ mx λ 8: else 9: λ min λ 10: end if, 1 log φ 11: until λ mx λ min ɛ 12: if Rn W,b > 1 nd/or Rn Wb, > 1 then 13: FD-BST recovers the rn-one constrints vi 60-62, nd obtins W,b, W b, nd Ṽ. 14: end if 15: if The either 29c or 29d re inctive then 16: FD-BST recovers the ctiveness vi 66-68, nd obtins Ŵ,b, Ŵ,b, nd V 17: end if 1 + P mx b Tr H b, /σ 2 } 18: FD-BST performs the eigenvlue decomposition for mtrices Ŵ,b, Ŵ b, nd V in order to obtin the bemforming vectors w,b nd w b, nd the AN vectors v nd v b. 19: FD-BST notifies the FD-UE the bemforming vector w b, nd AN vector v b Complexity Anlysis of the FA-SITR Algorithm: Following similr rguments s in the complexity nlysis of the SITR lgorithm, we evlute the computtion complexity of the FA- SITR lgorithm bsed on the complexity of the itertion loop from lines In order to solve the optimiztion problem 30 vi the interior point method, the number of itertions nd the number of rithmetic opertions re, respectively, counted s O log ι 1 2N + 2N b nd O N 6 + N 6 b + N + N b 6 + 8K + 7 N 2 + N 2 b + 8K + 8 N N b. Dropping the lower order terms, we obtin the computtion complexity of the FA-SITR lgorithm s O log ɛ log ι 2N + 2N b N 6 + Nb 6 + N + N b V. SUBOPTIMAL ALGORITHMS AND COMPLEXITY COMPARISON In this subsection, we propose two suboptiml solutions to ech of the formulted problems: SITR-mximiztion nd FA-SITR-mximiztion problems. In ddition, we nlyze the computtion complexity of the proposed two suboptiml lgorithms, nd show tht they enjoy lower complexity compred with the optiml lgorithms in SITR Algorithm nd FA-SITR Algorithm.

17 17 Our proposed two suboptiml lgorithms re bsed on the setting tht the covrince mtrix V is in the null spce of the mtrix [h, h b ] H. Performing the singulr vlue decomposition on the mtrix [h, h b ] H, we hve [h, h b ] H = UΣY H = UΣ[Ỹ, Y ]H where U C 2 2 nd Y C N+N b N +N b re unitry mtrices with U H U = UU H = I nd Y H Y = Y Y H = I. The mtrix Σ C 2 N+Nb is rectngulr digonl mtrix. Here, the mtrices Ỹ CN+N b 2 nd Y C N+N b N +N b 2 re, respectively, the first two columns nd the lst N + N b 2 columns of the mtrix Y. Hence, the AN vectors cn be obtined s v n = Y v n, n = 1,..., N + N b 2 32 where v n C N+Nb 2 1 nd v n 2 = 1. A. LSI Nulling Algorithm To remove the LSI from the trnsmission of the FD-BST nd the FD-UE, the informtion bemforming vectors of the FD-BST nd the FD-UE re selected s h H,w,b = 0 nd h H b,b w b, = 0. Performing the singulr vlue decomposition on h H,, we obtin h H, = Σ, [ X,b, X,b ] H, where Σ, C 1 N, X,b C N 1 nd X,b C N N 1 with [ X,b, X,b ][ X,b, X,b ] H = [ X,b, X,b ] H [ X,b, X,b ] = I. Hence, the informtion bemforming vector of the FD-BST is obtined s w,b = X,b w,b 33 where w,b C N 1 1 nd w,b 2 = 1. Similrly, we obtin the informtion bemforming vector of the FD-UE s w b, = X b, w b, 34 where w b, C N b 1 1 nd w b, 2 = 1. Here, the mtrix X b, is obtined vi the singulr vlue decomposition on h H b,b = Σ b,b[ X b,, X b, ] H with X b, C N b N b 1 nd X H b, X b, = I. Applying the AN vectors 32 nd the LSI null informtion bemforming vectors 33 nd

18 18 34, the SITR-mximiztion problem 18 reduces to mx log W,b,W b,,v s.t. 1 + Tr H b, W b, σ 2 + log 1 + Tr H,b W,b σ 2 b 35 Tr H b,e W b, exp C LEAK 1 Tr H,e W,b + Tr He V + σe 2, 35b Tr H,e W,b exp Cb LEAK 1 Tr H b,e W b, + Tr He V + σe 2, 35c Tr H,e W,b + Tr Hb,e W b, Tr H exp C LEAK e V + σe 2 1, 35d Tr B V + Tr W,b P mx Tr B b V + Tr W b, P mx b 35e 35f Tr H e V + Tr H,e W,b + Tr Hb,e W b, + σ 2 e P REQ, 35g η W,b 0, W b, 0, V 0 Rn W,b 1 nd Rn W b, 1 35h 35i where H,b X H,b H,bX,b, H b, X H b, H b,x b,, H,e X H,b H,e X,b, H b,e X H b, H b,e X b,, H e Y H H e Y, B = Y H B Y nd B b = Y H B b Y. Here, the mtrix V = N +N b 2 n=1 v n v H n. Using the SDR technique, the rn-one constrints in 35i re recovered vi similr procedures s in Proposition 1. On the other hnd, we observe tht the optimiztion problem in 35 contins three semidefinite mtrix vribles, 2 + 4K liner constrints nd three positive semidefinite constrints. Therefore, the itertions required to solve 35 re O log ι 1 2N + 2N b 4, nd the rithmetic opertions in ech itertion re ON N b N + N b K + 1 N K + 1 N b K + 2 N + N b 2 2. Dropping the lower order terms, we obtin the computtion complexity of the LSI nulling LSIN lgorithm s O log ι 1 2N + 2N b 4 N N b N + N b Similrly, pplying the AN vectors 32 nd the LSI nulling informtion bemforming vectors 33 nd 34 to the FA-SITR mximiztion problem 21, we obtin the computtion complexity of the firness-wre LSIN FA-LSIN lgorithm s O log ɛ log ι 2N + 2N b 4 N N b N + N b B. LSI Nulling With Mximl Rtio Trnsmission Algorithm In order to reduce the computtion complexity the LSI nulling lgorithm, we ssume tht the informtion bemforming vectors re ligned to the chnnel coefficient vectors h,b nd h b,,

19 19 i.e., mximl rtio trnsmission MRT. In this cse, the informtion bemforming vectors of the FD-BST nd the FD-UE re, respectively, obtined s nd w,b = X,b X,b H p h,b,b X H,b h,b 2 w b, = X b, Xb, H p h b, b, Xb, H h 39 b, 2 where p,b nd p b, re, respectively, the trnsmission power the FD-BST nd the FD-UE. Applying the AN vectors 32 nd the informtion bemforming vectors 38 nd 39, the SITR-mximiztion problem 18 reduces to mx p,b,p b,,v log 1 + p b, X H b,h b, 2 2 σ 2 + log 1 + p,b X H,bh,b 2 2 σ 2 b h H b,e X b, Xb,h H b, 2 s.t. p b, Xb, H h p h H,e X,b X,bh H 2,b,b + Tr H e V + σe 2 b, exp C LEAK 1 X,b H h, 40b,b 2 2 h H,e X,b X,bh H,b 2 p,b X,b H h p h H b,e X b, Xb,h H 2 b, b, + Tr H e V + σe 2,b exp Cb LEAK 1 Xb, H h, 40c b, 2 2 h H,e X,b X,bh H,b 2 h H b,e X b, Xb,h H b, 2 p,b + p b, + Tr H e V + σe 2 X,b H h,b exp C LEAK 1 Xb, H h, 40d b, exp C LEAK Tr B V + p,b P mx 40e Tr B b V + p b, P mx b Tr H e V h H,e X,b X,bh H,b 2 h H b,e X b, Xb,h H b, 2 + p,b + p b, X,b H h,b Xb, H h b, f + σe 2 P REQ, 40g η p,b 0, p b, 0, V 0. 40h We observe tht the optimiztion problem 40 contins two sclr vribles, one mtrix vrible, 4K + 2 liner constrints nd one semidefinite constrint. Hence, O log ι 1 N + N b itertions nd O N + N b K K + 2 N + N b 2 2 rithmetic opertions in ech itertion re required to solve the optimiztion problem 40. Hence, the computtion complexity of the LSI nulling with MRT LSIN-MRT lgorithm for the SITR-mximiztion problem is given by O log ι 1 N + N b N + N b Similrly, the computtion complexity of the firness-wre LSIN-MRT FA-LSIN-MRT lgorithm for the FA-SITR mximiztion problem is obtined s O log ɛ log ι N + N b N + N b

20 20 Compring the computtion complexities of the proposed SITR lgorithm in 26 nd the two suboptiml lgorithms LSIN lgorithm in 36 nd LSIN-MRT lgorithm in 41, we observe tht O 2 log ɛ log ι 2N + 2N b + 1 N 6 + N 6b + N + N b 6 }{{} Complexity of SITR Algorithm O log ι 1 2N + 2N b 4 N N b N + N b 2 6 } {{ } Complexity of LSIN Algorithm log ι 1 N + N b N + N b 2 6 O } {{ } Complexity of LSIN-MRT Algorithm where the two proposed suboptiml lgorithms LSIN lgorithm nd LSIN-MRT lgorithm hve lower complexity thn the SITR lgorithm. Compring the computtion complexities of the proposed FA-SITR lgorithm in 31 nd the two suboptiml lgorithms FA-LSIN lgorithm in 37 nd FA-LSIN-MRT lgorithm in 42, we conclude tht the proposed two suboptiml lgorithm FA-LSIN lgorithm nd FA-LSIN-MRT lgorithm hve lower complexity thn the FA-SITR lgorithm. 43 VI. NUMERICAL RESULTS In this section, we present numericl results to demonstrte the effectiveness of the proposed SITR nd FA-SITR lgorithms. Unless otherwise specified, the simultion prmeters re set ccording to Tble I. First, we illustrte tht the optiml vlues of the informtion lege rte of the FD-BST nd the FD-UE, nd the totl informtion lege rte cn be obtined vi two-dimensionl serch. This is due to the fct tht the system secrecy rte is defined s the difference of the sum informtion trnsmission rte nd the term mx {C LEAK mx {C LEAK + Cb LEAK, C LEAK }, i.e., C + C b + Cb LEAK, C LEAK }. As shown in Fig. 1 nd Fig. 2, the first serch dimension is the vlue of the totl informtion lege C LEAK, nd the second serch dimension is the rtio CLEAK Moreover, C LEAK C LEAK concve in C LEAK + CLEAK b C LEAK C LEAK. = 1. From Fig. 1, we observe tht the system secrecy rte is jointly nd CLEAK. Hence, we conclude tht the optiml system secrecy rte cn be C LEAK obtined vi the proposed SITR lgorithm nd two-dimensionl serch method. A similr

21 21 Prmeters TABLE I SIMULATION PARAMETERS SETTING Number of ERs, K 4 Number of Antenn t FD-BST, N 3 Number of Antenn t FD-UE, N b 3 Gussin noise power BST-to-UE chnnel, Ryleigh fding BST-to-ER chnnel, Ryleigh fding UE-to-ER chnnel, Ryleigh fding Self-interference chnnel, Ryleigh fding Informtion lege rte Mximum TX power of FD-BST, P mx Vlues 30 dbm 35 db 20 db 20 db 20 db Mximum TX power of FD-UE, Pb mx 20 dbm Minimum required input power, P req 2 dbm Energy hrvester efficiency, η 0.5 C LEAK = 0.6 nts/sec/hz C LEAK = 0.3 nts/sec/hz Cb LEAK = 0.3 nts/sec/hz 20 dbm Secrecy Rte wo Firness Constrint nts/sec/hz C LEAK /C LEAK C LEAK nts/sec/hz Security Rte With Firness Constrint nts/sec/hz C LEAK /C LEAK C LEAK nts/sec/hz Fig. 1. An illustrtion of the two-dimensionl serch for the optiml system secrecy rte without the firness constrint. Fig. 2. An illustrtion of the two-dimensionl serch for the optiml system secrecy rte with the firness constrint. observtion cn be mde from Fig. 2 tht the firness-wre optiml system secrecy rte cn be obtined vi the proposed FA-SITR lgorithm nd two-dimensionl serch method. Figure 3 shows the vrition of the system secrecy rte with the required hrvested energy of the ERs. We observe tht the proposed SITR lgorithm outperforms the two proposed suboptiml lgorithms in the system secrecy rte. The SITR lgorithm cn improve the system secrecy rte

22 22 Secrecy rte wo Firness Constrint nts/sec/hz SITR LSIN LSIN MRT Required Hrvested Energy dbm Secrecy rte With Firness Constrint nts/sec/hz FA SITR FA LSIN FA LSIN MRT Required Hrvested Energy dbm Fig. 3. The system secrecy rte versus the required hrvested power without firness constrint. Secrecy rte wo Firness Constrint nts/sec/hz SITR LSIN LSIN MRT Mximum Trnsmission Power of the FD BST dbm Fig. 4. The system secrecy rte versus the required hrvested power with firness constrint. Secrecy rte With Firness Constrint nts/sec/hz FA SITR FA LSIN FA LSIN MRT Mximum Trnsmission Power of the FD BST dbm Fig. 5. The system secrecy rte versus mximum trnsmission power of the FD-BST without firness constrint. Fig. 6. The system secrecy rte versus mximum trnsmission power of the FD-BST with firness constrint. over the LSIN lgorithm by t most 1.78 nts/sec/hz, nd over the LSIN-MRT lgorithm by t most 1.87 nts/sec/hz. In ddition, we observe tht the system secrecy rte decreses with the required hrvested energy. This is due to the fct tht s more energy is consumed on the energy trnsmission t the FD-BST nd the FD-UE, less energy is vilble for informtion trnsmission. When the firness constrint in 21c is considered, the proposed FA-SITR lgorithm outperforms the two proposed suboptiml lgorithms LSIN lgorithm nd LSIN-MRT lgorithm s shown in Fig. 4. However, we lso observe tht the performnce improvement

23 23 of the proposed FA-SITR lgorithm over FA-LSIN lgorithm is not lrge. This observtion cn be explined s follows. The firness constrint requires scrifice in the system informtion trnsmission rte of the proposed FA-SITR lgorithm, FA-LSIN lgorithm nd FA-LSIN-MRT lgorithm. For the FA-LSIN nd FA-LSIN-MRT lgorithms, the FD-BST nd the FD-UE do not interfere with ech other. Therefore, the firness constrint cn be chieved without much informtion trnsmission rte for the FA-LSIN nd FA-LSIN-MRT lgorithms. Figures 5 nd 6 illustrte tht the system secrecy rte vries with the mximum trnsmission power of the FD-BST. We observe tht the system secrecy rte increses with the mximum trnsmission power of the FD-BST. Figure 5 shows tht the performnce gp between the proposed SITR lgorithm nd the proposed LSIN lgorithm converges to zero s the mximum trnsmission power of the FD-BST increses. This is due to the fct tht the lrge trnsmission power of the FD-BST cn compenste for the loss of the degrees of the freedom of the multipleinput-multiple-output chnnels. From Fig. 5, we observe tht the proposed LSIN-MRT lgorithm chieves ner optiml secrecy rte when the trnsmission power of the FD-BST becomes lrge > 28 dbm. Since the computtion complexity of the proposed LSIN-MRT lgorithm is significntly lower thn tht of the SITR lgorithm, the LSIN-MRT lgorithm is preferred when the trnsmission power of the FD-BST is lrge. When the firness constrint is considered, the FS-SITR lgorithm improves the system secrecy rte over the FA-LSIN lgorithm nd FA-LSIN-MRT lgorithm by t most 7.6% nd 13.1%, respectively. VII. CONCLUSIONS We investigted the SITR mximiztion nd the FA-SITR mximiztion problems under constrints on the required hrvested energy nd the informtion lege in FD-SWIPT systems. Informtion bemforming nd AN vectors re designed jointly to solve the SITR nd the FA-SITR mximiztion problems in FD-SWIPT systems. Combining one-dimensionl serch method with the SDR technique, two optiml lgorithms re developed for the SITR nd the FA-SITR mximiztion problems. The optimlity of the derived solutions is nlyticlly proved. Numericl results lso showed tht the optiml system secrecy rte i.e., secrecy cpcity cn be obtined by introducing nother two-dimensionl serch for the SITR nd the FA-SITR lgorithms. Finlly, we proposed two suboptiml lgorithms nd showed numericlly tht one of them chieves ner-optiml secrecy rte to the SITR-mximiztion problem with n incresing

24 24 mximum trnsmission power of the FD-BST. APPENDIX A PROOF OF EQUIVALENCE BETWEEN 23 AND 25 Assuming tht W,b, W b,, V is solution to the optimiztion problem 23, we cn construct solution to the optimiztion problem 25 s follows γ = V = 1 Tr H,b W,b + h H V h + σ 2 44 V Tr H, W,b + h H V h + σ 2 45 W,b = W,b Tr H, W,b + h H V h + σ 2 46 W b, = W b,. 47 Tr H, W,b + h H V h + σ 2 Substituting into the optimiztion problem 25, we cn verify tht the constrints in 25b-25j re stisfied. Moreover, the objective vlue of the optimiztion problem 23 is equl to tht of the optimiztion problem 25. On the other hnd, if W,b, W b,, V, γ is solution W to the optimiztion problem 25,,b, W b,, V is solution to the optimiztion problem γ γ γ 23. APPENDIX B PROOF OF PROPOSITION 1 Introducing the dul vribles µ, ν 0, ρ 0, τ 0 nd {θ 0, ϖ 0, ϱ 0, ψ 0} K, the Lgrngin of the optimiztion problem 25 is given by where C = νh b,b + τi + L W,b, W b,, V, µ, ν, ρ, τ, {θ, ϖ, ϱ, ψ } K = µ+tr CW b, +Tr DW,b +Tr EV +εγ K =1 θ E = µh + νh b + ρb + τb b exp C LEAK 1 + ϱ exp C LEAK 1 ϖ ψ 48 H b,e H b, 49 K θ + ϖ + ϱ + ψ H e 50 =1

25 D = µh, + ρi + K ϖ H,e exp C LEAK =1 b 1 + ϱ exp C LEAK 1 θ ψ ν exp β 1 H,b 51 ε = µσ 2 + νσ 2 b ρp mx τp mx b K θ + ϖ + ϱ σe 2 + =1 K =1 P REQ ψ η 25 σ 2 e. 52 To gurntee the existence of the dul function, the Lgrngin 48 needs to be bounded below. Therefore, we hve C 0, D 0, E 0 nd ε 0 given the optiml vlue of dul vribles µ, ν, ρ, τ nd {θ, ϖ, ϱ, ψ } K. Hence, the dul problem of 25 is given by min W,b,W b,,v mx µ + Tr CW µ,ν,ρ,τ b, + Tr DW,b + Tr EV + εγ {θ,ϖ,ϱ,ψ } K s.t. C 0, D 0, E 0, ε 0. Moreover, the Krush-Khun-Tucer KKT conditions relted to the mtrices W,b, W b, nd V re, respectively, given by hve Let Ω = µ H, + ρ I + K =1 ϖ expc LEAK + ϱ b 1 expc LEAK 1 θ ψ 53 D W,b = 0, C Wb, = 0 nd E V = H,e + H,b, we D = Ω ν 1 + H,b. 55 exp β 1 To nlyze the structure of the optiml mtrix W,b, we consider two cses for the mtrix Ω. Cse 1: Assuming tht the mtrix Ω is full rn, tht is, Rn Ω = N. Bsed on the KKT condition in 54 nd 55 nd the fct tht 1 + Rn W,b = Rn Ω W,b = Rn 1 + On the other hnd, the optiml W,b ν expβ 1 ν exp β 1 > 0, we obtin Rn H,b = 1. H,b W,b 56 cnnot be the zero mtrix since the minimum secure rte requirement C req b is positive. We conclude tht Rn W,b = 1. Cse 2: Assuming tht the mtrix Ω is rn deficient, tht is, Rn Ω = r < N. Let Π = [π 1,..., π N r ] C N N r denote the orthogonl bsis mtrix for the null spce

26 26 of the mtrix Ω. Therefore, we hve π H D π = π H [ Ω = ν exp β 1 ν exp β 1 H,b ] π π H H,b π 0 where π is the -th column of the mtrix Π. Since H,b 0 nd 1 + ν expβ 1 57 > 0, we conclude tht π H H,bπ = 0, = 1,..., N r. Hence, π H D π = 0 nd Rn D N N r = r. From 55, we obtin r 1 Rn D r. If Rn D = r, the mtrices Ω nd D shre the sme orthogonl bsis of the null spce. As result, the optiml W,b = N r =1 ζ π π H with ζ 0. Moreover, Tr W,b H,b = 0 due to the fct tht π H,b π H = 0. In this cse, no informtion cn be trnsmitted to the FD-UE. As result, Rn D = r 1, nd the orthogonl bsis of the null spce of the mtrix D is given by [Π, π 0 ] with π 0 2 = 1 nd π0 H π = 0, = 1,..., N r. In ddition, π0 H Ξ π 0 = 1 + ν π H expβ 1 0 H,b π 0 > 0 since 1 + ν > 0 nd π expβ 1 0 does not lie in the null spce of Ξ. We cn rewrite the optiml mtrix W,b s W,b = ζ 0 π 0 π H 0 + N r =1 ζ π π H, where ζ With 58, the FD-BST is ble to trnsmit informtion to the FD-UE. If the mtrix ν H b,b + τ I + K θ =1 + ϱ expc LEAK 1 expc LEAK 1 ϖ ψ H b,e the optiml mtrix W b, is rn one. Otherwise, the optiml mtrix W b, =1 is given by is full rn, N b r b Wb, = ς 0 ξ 0 ξ0 H + ς ξ ξ H 59 where ς 0, = 0, 1,..., N b r b ; the sclr r b nd the mtrix [ξ 0, ξ 1,..., ξ Nb r b ] C N b N b r b +1 denote, respectively, the rn nd the orthogonl bsis of the null spce of the mtrix ν H b,b + τ I + K θ =1 + ϱ expc LEAK 1 expc LEAK 1 ϖ ψ H b,e. If Rn W,b > 1 nd/or Rn W b, > 1, we cn construct new solution s W,b = W,b N r =1 =1 ζ π π H 60 N b r b W b, = Wb, ς ξ ξ H 61

27 27 Ṽ = V + N r =1 N r =1 N b r b j=1 ζ π π H ζj ς ξ π H j N r =1 N b r b j=1 N b r b =1 ζj ς π j ξ H ς ξ ξ H 62 γ = γ where Rn W,b 1 nd W,b 1. We cn verify the optimlity of the constructed solution 63 W,b, W b,, Ṽ, γ vi the following procedures. Substituting into 25b-25h, we hve Tr H b, W b, = Tr [ ] H b, Wb, 64 Tr H, W,b + h H Ṽ h + γ σ 2 = Tr H, W,b + h H V h + γ σ 2 = 1 64b mx Tr H,e W,b 1 exp C LEAK Tr H,e W,b + Tr Tr H,b W,b P REQ γ η Tr H, b,e W b, 1 exp Cb LEAK, H b,e W exp β 1 Tr B Ṽ + Tr W,b γ P mx Tr B b Ṽ + Tr W b, γ Pb mx σe 2 Tr H,e W,b Tr H,e W,b + Tr H b,e W 1 exp C LEAK b, + Tr H e Ṽ + σe 2 b, 64c Tr H b,b Wb, + Tr H b Ṽ + γσ b 2 64d W,b, W b,, Ṽ, γ 64e 64f + Tr H b,e W b, + h H e Ṽ h e. 64g Note tht 64 chieves tht the obtins the sme objective vlue s W,b, Wb,, V, γ. In ddition, Eq. 64b-64g indicte tht W,b, W b,, Ṽ, γ is lso fesible solution to the optimiztion problem 25. With Rn W,b 1 nd Rn W b, 1, we conclude tht W,b, W b,, Ṽ, γ is n optiml solution to the optimiztion problem 23. APPENDIX C PROOF OF PROPOSITION 2 If the constrints in 29c nd 29d re inctive, we cn find nother λ = min { C W,b, W b,, V, C b W,b, W b,, V } > λ 65

28 28 with OBJ PF λ = OBJ PF λ. As result, the objective in 29 is incresed. Next, ssume tht either 29c or 29d is inctive. Let the constrint in 29c be inctive nd the constrint in 29d be ctive with the optiml solution W,b, W b,, V to 29. We construct the solution Ŵ,b, Ŵ,b, V by the following procedures. There exists W b, 0 such tht such tht Ŵ,b = W,b 0 66 Ŵb, = Wb, W b, N N b V = V + 0 N N b Nb N W b, Tr H b, Ŵ b, exp φ λ Tr H,b Ŵ,b exp φ λ Substituting into 18b-18g, we hve Tr H,e Ŵ,b Tr H mx 1 exp C LEAK, b,e Ŵb, Tr 1 exp Cb LEAK, Tr H,e Ŵ,b + Tr H b,e Ŵb, + Tr H e V Tr B V + Tr Ŵ,b P mx Tr B b V + Tr Ŵ b, Pb mx Tr H,e Ŵ,b + Tr H b,e Ŵ b, = Tr H, Ŵ,b + Tr H V + σ 2 69 = Tr H b,b Ŵ b, + Tr H b V + σb H,e Ŵ,b + Tr H b,e Ŵb, 1 exp C LEAK + σe 2 + Tr H e V + σ 2e P REQ Bsed on 69, 70 nd 71-71d, we conclude tht the solution 71 71b 71c η. 71d Ŵ,b, Ŵ b,, V is lso solution to the optimiztion problem 29 tht stisfy the proportionl rte constrints. REFERENCES [1] C. L. I, C. Rowell, S. Hn, Z. Xu, G. Li, nd Z. Pn, Towrd green nd soft: A 5G perspective, IEEE Commun. Mg., vol. 52, no. 2, pp , Feb [2] G. Liu, F. R. Yu, H. Ji, V. C. M. Leung, nd X. Li, In-bnd full-duplex relying: A survey, reserch issues nd chllenges, IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp , Second qurter 2015.

29 29 [3] E. Everett, A. Shi, nd A. Sbhrwl, Pssive self-interference suppression for full-duplex infrstructure nodes, IEEE Trns. Wireless Commun., vol. 13, no. 2, pp , Feb [4] M. Durte, A. Sbhrwl, V. Aggrwl, R. Jn, K. K. Rmrishnn, C. W. Rice, nd N. K. Shnrnrynn, Design nd chrcteriztion of full-duplex multintenn system for WiFi networs, IEEE Trns. Veh. Technol., vol. 63, no. 3, pp , Mr [5] T. Riihonen, S. Werner, nd R. Wichmn, Mitigtion of loopbc self-interference in full-duplex MIMO relys, IEEE Trns. Signl Process., vol. 59, no. 12, pp , Dec [6] D. Senrtne nd C. Tellmbur, Bemforming for spce division duplexing, in Proc. of IEEE ICC, June 2011, pp [7] F. Zhu, F. Go, T. Zhng, K. Sun, nd M. Yo, Physicl-lyer security for full duplex communictions with self-interference mitigtion, IEEE Trns. Wireless Commun., vol. 15, no. 1, pp , Jn [8] A. E. Shfie, A. Sultn, I. Kriidis, nd N. Al-Dhhir, Mutul informtion of buffer-ided full-duplex rely chnnels. [Online]. Avilble: [9] X. Zhou, R. Zhng, nd C. K. Ho, Wireless informtion nd power trnsfer: Architecture design nd rte-energy trdeoff, IEEE Trns. Commun., vol. 61, no. 11, pp , Nov [10] Q. Shi, L. Liu, W. Xu, nd R. Zhng, Joint trnsmit bemforming nd receive power splitting for MISO SWIPT systems, IEEE Trns. Wireless Commun., vol. 13, no. 6, pp , June [11] Y. Dong, X. Ge, J. Hossin, J. Cheng, nd V. C. M. Leung, Proportionl firness-bsed bemforming nd signl splitting for MISO-SWIPT systems, IEEE Commun. Lett., vol. 21, no. 5, pp , My [12] B. Kellogg, V. Tll, J. R. Smith, nd S. Gollot, PASSIVE WI-FI: Bringing low power to Wi-Fi trnsmissions, GetMobile: Mobile Comput. nd Commun., vol. 20, no. 3, pp , Jn [13] Y. Wng, R. Sun, nd X. Wng, Trnsceiver design to mximize the weighted sum secrecy rte in full-duplex SWIPT systems, IEEE Signl Process. Lett., vol. 23, no. 6, pp , June [14] L. Liu, R. Zhng, nd K. C. Chu, Secrecy wireless informtion nd power trnsfer with MISO bemforming, IEEE Trns. Signl Process., vol. 62, no. 7, pp , Apr [15] H. Xing, L. Liu, nd R. Zhng, Secrecy wireless informtion nd power trnsfer in fding wiretp chnnel, IEEE Trns. Veh. Technol., vol. 65, no. 1, pp , Jn [16] S. Goel nd R. Negi, Gurnteeing secrecy using rtificil noise, IEEE Trns. Wireless Commun., vol. 7, no. 6, pp , June [17] G. Zheng, I. Kriidis, J. Li, A. P. Petropulu, nd B. Ottersten, Improving physicl lyer secrecy using full-duplex jmming receivers, IEEE Trns. Signl Process., vol. 61, no. 20, pp , Oct [18] Y. Zhou, Z. Z. Xing, Y. Zhu, nd Z. Xue, Appliction of full-duplex wireless technique into secure MIMO communiction: Achievble secrecy rte bsed optimiztion, IEEE Signl Process. Lett., vol. 21, no. 7, pp , July [19] A. E. Shfie, D. Niyto, nd N. Al-Dhhir, Security of n ordered-bsed distributive jmming scheme, IEEE Commun. Lett., vol. 21, no. 1, pp , Jn [20] A. E. Shfie, T. Q. Duong, nd N. Al-Dhhir, QoS-wre enhnced-security for TDMA trnsmissions from buffered source nodes, IEEE Trns. Wireless Commun., vol. 16, no. 2, pp , Feb [21] Y. Sun, D. W. K. Ng, J. Zhu, nd R. Schober, Multi-objective optimiztion for robust power efficient nd secure full-duplex wireless communiction systems, IEEE Trns. Wireless Commun., vol. 15, no. 8, pp , Aug [22] F. Zhu, F. Go, M. Yo, nd H. Zou, Joint informtion- nd jmming-bemforming for physicl lyer security with full duplex bse sttion, IEEE Trns. Signl Process., vol. 62, no. 24, pp , Dec

Hybrid Digital-Analog Coding for Interference Broadcast Channels

Hybrid Digital-Analog Coding for Interference Broadcast Channels Hybrid Digitl-Anlog Coding for Interference Brodcst Chnnels Ahmd Abou Sleh, Fdy Aljji, nd Wi-Yip Chn Queen s University, ingston, O, 7L 36 Emil: hmd.bou.sleh@queensu.c, fdy@mst.queensu.c, chn@queensu.c

More information

Generalized Fano and non-fano networks

Generalized Fano and non-fano networks Generlized Fno nd non-fno networks Nildri Ds nd Brijesh Kumr Ri Deprtment of Electronics nd Electricl Engineering Indin Institute of Technology Guwhti, Guwhti, Assm, Indi Emil: {d.nildri, bkri}@iitg.ernet.in

More information

Theoretical foundations of Gaussian quadrature

Theoretical foundations of Gaussian quadrature Theoreticl foundtions of Gussin qudrture 1 Inner product vector spce Definition 1. A vector spce (or liner spce) is set V = {u, v, w,...} in which the following two opertions re defined: (A) Addition of

More information

Introduction to Hybrid Beamforming Techniques

Introduction to Hybrid Beamforming Techniques Introduction to ybrid Bemforming Techniques Jmes Chen Advisor : Andy Wu Grdute Institute of Electronics Engineering Ntionl Tiwn University Tipei, Tiwn Mr 3, 205 2 Outline Introduction of Precoding Why

More information

Matrices. Elementary Matrix Theory. Definition of a Matrix. Matrix Elements:

Matrices. Elementary Matrix Theory. Definition of a Matrix. Matrix Elements: Mtrices Elementry Mtrix Theory It is often desirble to use mtrix nottion to simplify complex mthemticl expressions. The simplifying mtrix nottion usully mkes the equtions much esier to hndle nd mnipulte.

More information

Sufficient condition on noise correlations for scalable quantum computing

Sufficient condition on noise correlations for scalable quantum computing Sufficient condition on noise correltions for sclble quntum computing John Presill, 2 Februry 202 Is quntum computing sclble? The ccurcy threshold theorem for quntum computtion estblishes tht sclbility

More information

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system.

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system. Section 24 Nonsingulr Liner Systems Here we study squre liner systems nd properties of their coefficient mtrices s they relte to the solution set of the liner system Let A be n n Then we know from previous

More information

Data Assimilation. Alan O Neill Data Assimilation Research Centre University of Reading

Data Assimilation. Alan O Neill Data Assimilation Research Centre University of Reading Dt Assimiltion Aln O Neill Dt Assimiltion Reserch Centre University of Reding Contents Motivtion Univrite sclr dt ssimiltion Multivrite vector dt ssimiltion Optiml Interpoltion BLUE 3d-Vritionl Method

More information

New Expansion and Infinite Series

New Expansion and Infinite Series Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University

More information

Binary Rate Distortion With Side Information: The Asymmetric Correlation Channel Case

Binary Rate Distortion With Side Information: The Asymmetric Correlation Channel Case Binry Rte Dtortion With Side Informtion: The Asymmetric Correltion Chnnel Cse Andrei Sechele, Smuel Cheng, Adrin Muntenu, nd Nikos Deliginn Deprtment of Electronics nd Informtics, Vrije Universiteit Brussel,

More information

REGULARITY OF NONLOCAL MINIMAL CONES IN DIMENSION 2

REGULARITY OF NONLOCAL MINIMAL CONES IN DIMENSION 2 EGULAITY OF NONLOCAL MINIMAL CONES IN DIMENSION 2 OVIDIU SAVIN AND ENICO VALDINOCI Abstrct. We show tht the only nonlocl s-miniml cones in 2 re the trivil ones for ll s 0, 1). As consequence we obtin tht

More information

Tutorial 4. b a. h(f) = a b a ln 1. b a dx = ln(b a) nats = log(b a) bits. = ln λ + 1 nats. = log e λ bits. = ln 1 2 ln λ + 1. nats. = ln 2e. bits.

Tutorial 4. b a. h(f) = a b a ln 1. b a dx = ln(b a) nats = log(b a) bits. = ln λ + 1 nats. = log e λ bits. = ln 1 2 ln λ + 1. nats. = ln 2e. bits. Tutoril 4 Exercises on Differentil Entropy. Evlute the differentil entropy h(x) f ln f for the following: () The uniform distribution, f(x) b. (b) The exponentil density, f(x) λe λx, x 0. (c) The Lplce

More information

Lecture 14: Quadrature

Lecture 14: Quadrature Lecture 14: Qudrture This lecture is concerned with the evlution of integrls fx)dx 1) over finite intervl [, b] The integrnd fx) is ssumed to be rel-vlues nd smooth The pproximtion of n integrl by numericl

More information

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information

Chapter 3. Vector Spaces

Chapter 3. Vector Spaces 3.4 Liner Trnsformtions 1 Chpter 3. Vector Spces 3.4 Liner Trnsformtions Note. We hve lredy studied liner trnsformtions from R n into R m. Now we look t liner trnsformtions from one generl vector spce

More information

Probabilistic Investigation of Sensitivities of Advanced Test- Analysis Model Correlation Methods

Probabilistic Investigation of Sensitivities of Advanced Test- Analysis Model Correlation Methods Probbilistic Investigtion of Sensitivities of Advnced Test- Anlysis Model Correltion Methods Liz Bergmn, Mtthew S. Allen, nd Dniel C. Kmmer Dept. of Engineering Physics University of Wisconsin-Mdison Rndll

More information

Numerical integration

Numerical integration 2 Numericl integrtion This is pge i Printer: Opque this 2. Introduction Numericl integrtion is problem tht is prt of mny problems in the economics nd econometrics literture. The orgniztion of this chpter

More information

Credibility Hypothesis Testing of Fuzzy Triangular Distributions

Credibility Hypothesis Testing of Fuzzy Triangular Distributions 666663 Journl of Uncertin Systems Vol.9, No., pp.6-74, 5 Online t: www.jus.org.uk Credibility Hypothesis Testing of Fuzzy Tringulr Distributions S. Smpth, B. Rmy Received April 3; Revised 4 April 4 Abstrct

More information

New data structures to reduce data size and search time

New data structures to reduce data size and search time New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute

More information

Multivariate problems and matrix algebra

Multivariate problems and matrix algebra University of Ferrr Stefno Bonnini Multivrite problems nd mtrix lgebr Multivrite problems Multivrite sttisticl nlysis dels with dt contining observtions on two or more chrcteristics (vribles) ech mesured

More information

Review of Calculus, cont d

Review of Calculus, cont d Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some

More information

Pre-Session Review. Part 1: Basic Algebra; Linear Functions and Graphs

Pre-Session Review. Part 1: Basic Algebra; Linear Functions and Graphs Pre-Session Review Prt 1: Bsic Algebr; Liner Functions nd Grphs A. Generl Review nd Introduction to Algebr Hierrchy of Arithmetic Opertions Opertions in ny expression re performed in the following order:

More information

S. S. Dragomir. 2, we have the inequality. b a

S. S. Dragomir. 2, we have the inequality. b a Bull Koren Mth Soc 005 No pp 3 30 SOME COMPANIONS OF OSTROWSKI S INEQUALITY FOR ABSOLUTELY CONTINUOUS FUNCTIONS AND APPLICATIONS S S Drgomir Abstrct Compnions of Ostrowski s integrl ineulity for bsolutely

More information

Frobenius numbers of generalized Fibonacci semigroups

Frobenius numbers of generalized Fibonacci semigroups Frobenius numbers of generlized Fiboncci semigroups Gretchen L. Mtthews 1 Deprtment of Mthemticl Sciences, Clemson University, Clemson, SC 29634-0975, USA gmtthe@clemson.edu Received:, Accepted:, Published:

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

Numerical Linear Algebra Assignment 008

Numerical Linear Algebra Assignment 008 Numericl Liner Algebr Assignment 008 Nguyen Qun B Hong Students t Fculty of Mth nd Computer Science, Ho Chi Minh University of Science, Vietnm emil. nguyenqunbhong@gmil.com blog. http://hongnguyenqunb.wordpress.com

More information

Online Supplements to Performance-Based Contracts for Outpatient Medical Services

Online Supplements to Performance-Based Contracts for Outpatient Medical Services Jing, Png nd Svin: Performnce-bsed Contrcts Article submitted to Mnufcturing & Service Opertions Mngement; mnuscript no. MSOM-11-270.R2 1 Online Supplements to Performnce-Bsed Contrcts for Outptient Medicl

More information

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

Quantum Physics II (8.05) Fall 2013 Assignment 2

Quantum Physics II (8.05) Fall 2013 Assignment 2 Quntum Physics II (8.05) Fll 2013 Assignment 2 Msschusetts Institute of Technology Physics Deprtment Due Fridy September 20, 2013 September 13, 2013 3:00 pm Suggested Reding Continued from lst week: 1.

More information

Chapter 3 MATRIX. In this chapter: 3.1 MATRIX NOTATION AND TERMINOLOGY

Chapter 3 MATRIX. In this chapter: 3.1 MATRIX NOTATION AND TERMINOLOGY Chpter 3 MTRIX In this chpter: Definition nd terms Specil Mtrices Mtrix Opertion: Trnspose, Equlity, Sum, Difference, Sclr Multipliction, Mtrix Multipliction, Determinnt, Inverse ppliction of Mtrix in

More information

8 Laplace s Method and Local Limit Theorems

8 Laplace s Method and Local Limit Theorems 8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved

More information

Math 270A: Numerical Linear Algebra

Math 270A: Numerical Linear Algebra Mth 70A: Numericl Liner Algebr Instructor: Michel Holst Fll Qurter 014 Homework Assignment #3 Due Give to TA t lest few dys before finl if you wnt feedbck. Exercise 3.1. (The Bsic Liner Method for Liner

More information

Tests for the Ratio of Two Poisson Rates

Tests for the Ratio of Two Poisson Rates Chpter 437 Tests for the Rtio of Two Poisson Rtes Introduction The Poisson probbility lw gives the probbility distribution of the number of events occurring in specified intervl of time or spce. The Poisson

More information

Student Activity 3: Single Factor ANOVA

Student Activity 3: Single Factor ANOVA MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether

More information

Continuous Random Variables

Continuous Random Variables STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 217 Néhémy Lim Continuous Rndom Vribles Nottion. The indictor function of set S is rel-vlued function defined by : { 1 if x S 1 S (x) if x S Suppose tht

More information

Power Optimal Routing in Wireless Networks

Power Optimal Routing in Wireless Networks Power Optiml Routing in Wireless Networks Rjit Mnohr nd Ann Scglione ECE, Cornell University Abstrct Reducing power consumption nd incresing bttery life of nodes in n d-hoc network requires n integrted

More information

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by. NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with

More information

N 0 completions on partial matrices

N 0 completions on partial matrices N 0 completions on prtil mtrices C. Jordán C. Mendes Arújo Jun R. Torregros Instituto de Mtemátic Multidisciplinr / Centro de Mtemátic Universidd Politécnic de Vlenci / Universidde do Minho Cmino de Ver

More information

Math 61CM - Solutions to homework 9

Math 61CM - Solutions to homework 9 Mth 61CM - Solutions to homework 9 Cédric De Groote November 30 th, 2018 Problem 1: Recll tht the left limit of function f t point c is defined s follows: lim f(x) = l x c if for ny > 0 there exists δ

More information

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response

More information

The Algebra (al-jabr) of Matrices

The Algebra (al-jabr) of Matrices Section : Mtri lgebr nd Clculus Wshkewicz College of Engineering he lgebr (l-jbr) of Mtrices lgebr s brnch of mthemtics is much broder thn elementry lgebr ll of us studied in our high school dys. In sense

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

X Z Y Table 1: Possibles values for Y = XZ. 1, p

X Z Y Table 1: Possibles values for Y = XZ. 1, p ECE 534: Elements of Informtion Theory, Fll 00 Homework 7 Solutions ll by Kenneth Plcio Bus October 4, 00. Problem 7.3. Binry multiplier chnnel () Consider the chnnel Y = XZ, where X nd Z re independent

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz

More information

Fundamental bounds on MIMO antennas

Fundamental bounds on MIMO antennas 1 Fundmentl bounds on MIMO ntenns Csimir Ehrenborg, Student member, IEEE, nd Mts Gustfsson, Member, IEEE rxiv:1704.06600v3 [physics.clss-ph] 1 Aug 17 Abstrct Antenn current optimiztion is often used to

More information

Distributed Bargaining Mechanisms for Multi-antenna Dynamic Spectrum Access Systems

Distributed Bargaining Mechanisms for Multi-antenna Dynamic Spectrum Access Systems Distributed Brgining Mechnisms for Multi-ntenn Dynmic Spectrum Access Systems Diep N. Nguyen nd Mrwn Krunz Deprtment of Electricl nd Computer Engineering, University of Arizon E-mil:{dnnguyen, runz}@emil.rizon.edu

More information

SUMMER KNOWHOW STUDY AND LEARNING CENTRE

SUMMER KNOWHOW STUDY AND LEARNING CENTRE SUMMER KNOWHOW STUDY AND LEARNING CENTRE Indices & Logrithms 2 Contents Indices.2 Frctionl Indices.4 Logrithms 6 Exponentil equtions. Simplifying Surds 13 Opertions on Surds..16 Scientific Nottion..18

More information

Natural examples of rings are the ring of integers, a ring of polynomials in one variable, the ring

Natural examples of rings are the ring of integers, a ring of polynomials in one variable, the ring More generlly, we define ring to be non-empty set R hving two binry opertions (we ll think of these s ddition nd multipliction) which is n Abelin group under + (we ll denote the dditive identity by 0),

More information

ADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS

ADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS ADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS F. Tkeo 1 nd M. Sk 1 Hchinohe Ntionl College of Technology, Hchinohe, Jpn; Tohoku University, Sendi, Jpn Abstrct:

More information

CBE 291b - Computation And Optimization For Engineers

CBE 291b - Computation And Optimization For Engineers The University of Western Ontrio Fculty of Engineering Science Deprtment of Chemicl nd Biochemicl Engineering CBE 9b - Computtion And Optimiztion For Engineers Mtlb Project Introduction Prof. A. Jutn Jn

More information

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics SCHOOL OF ENGINEERING & BUIL ENVIRONMEN Mthemtics An Introduction to Mtrices Definition of Mtri Size of Mtri Rows nd Columns of Mtri Mtri Addition Sclr Multipliction of Mtri Mtri Multipliction 7 rnspose

More information

Numerical Integration

Numerical Integration Chpter 5 Numericl Integrtion Numericl integrtion is the study of how the numericl vlue of n integrl cn be found. Methods of function pproximtion discussed in Chpter??, i.e., function pproximtion vi the

More information

MATRICES AND VECTORS SPACE

MATRICES AND VECTORS SPACE MATRICES AND VECTORS SPACE MATRICES AND MATRIX OPERATIONS SYSTEM OF LINEAR EQUATIONS DETERMINANTS VECTORS IN -SPACE AND -SPACE GENERAL VECTOR SPACES INNER PRODUCT SPACES EIGENVALUES, EIGENVECTORS LINEAR

More information

Elements of Matrix Algebra

Elements of Matrix Algebra Elements of Mtrix Algebr Klus Neusser Kurt Schmidheiny September 30, 2015 Contents 1 Definitions 2 2 Mtrix opertions 3 3 Rnk of Mtrix 5 4 Specil Functions of Qudrtic Mtrices 6 4.1 Trce of Mtrix.........................

More information

Non-Linear & Logistic Regression

Non-Linear & Logistic Regression Non-Liner & Logistic Regression If the sttistics re boring, then you've got the wrong numbers. Edwrd R. Tufte (Sttistics Professor, Yle University) Regression Anlyses When do we use these? PART 1: find

More information

Matrix Algebra. Matrix Addition, Scalar Multiplication and Transposition. Linear Algebra I 24

Matrix Algebra. Matrix Addition, Scalar Multiplication and Transposition. Linear Algebra I 24 Mtrix lger Mtrix ddition, Sclr Multipliction nd rnsposition Mtrix lger Section.. Mtrix ddition, Sclr Multipliction nd rnsposition rectngulr rry of numers is clled mtrix ( the plurl is mtrices ) nd the

More information

Quadratic Forms. Quadratic Forms

Quadratic Forms. Quadratic Forms Qudrtic Forms Recll the Simon & Blume excerpt from n erlier lecture which sid tht the min tsk of clculus is to pproximte nonliner functions with liner functions. It s ctully more ccurte to sy tht we pproximte

More information

Reliable Optimal Production Control with Cobb-Douglas Model

Reliable Optimal Production Control with Cobb-Douglas Model Relible Computing 4: 63 69, 998. 63 c 998 Kluwer Acdemic Publishers. Printed in the Netherlnds. Relible Optiml Production Control with Cobb-Dougls Model ZHIHUI HUEY HU Texs A&M University, College Sttion,

More information

1 The fundamental theorems of calculus.

1 The fundamental theorems of calculus. The fundmentl theorems of clculus. The fundmentl theorems of clculus. Evluting definite integrls. The indefinite integrl- new nme for nti-derivtive. Differentiting integrls. Tody we provide the connection

More information

Applied Partial Differential Equations with Fourier Series and Boundary Value Problems 5th Edition Richard Haberman

Applied Partial Differential Equations with Fourier Series and Boundary Value Problems 5th Edition Richard Haberman Applied Prtil Differentil Equtions with Fourier Series nd Boundry Vlue Problems 5th Edition Richrd Hbermn Person Eduction Limited Edinburgh Gte Hrlow Essex CM20 2JE Englnd nd Associted Compnies throughout

More information

The Velocity Factor of an Insulated Two-Wire Transmission Line

The Velocity Factor of an Insulated Two-Wire Transmission Line The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the

More information

Time Optimal Control of the Brockett Integrator

Time Optimal Control of the Brockett Integrator Milno (Itly) August 8 - September, 011 Time Optiml Control of the Brockett Integrtor S. Sinh Deprtment of Mthemtics, IIT Bomby, Mumbi, Indi (emil : sunnysphs4891@gmil.com) Abstrct: The Brockett integrtor

More information

Math 520 Final Exam Topic Outline Sections 1 3 (Xiao/Dumas/Liaw) Spring 2008

Math 520 Final Exam Topic Outline Sections 1 3 (Xiao/Dumas/Liaw) Spring 2008 Mth 520 Finl Exm Topic Outline Sections 1 3 (Xio/Dums/Liw) Spring 2008 The finl exm will be held on Tuesdy, My 13, 2-5pm in 117 McMilln Wht will be covered The finl exm will cover the mteril from ll of

More information

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior Reversls of Signl-Posterior Monotonicity for Any Bounded Prior Christopher P. Chmbers Pul J. Hely Abstrct Pul Milgrom (The Bell Journl of Economics, 12(2): 380 391) showed tht if the strict monotone likelihood

More information

Chapter 3 Polynomials

Chapter 3 Polynomials Dr M DRAIEF As described in the introduction of Chpter 1, pplictions of solving liner equtions rise in number of different settings In prticulr, we will in this chpter focus on the problem of modelling

More information

The steps of the hypothesis test

The steps of the hypothesis test ttisticl Methods I (EXT 7005) Pge 78 Mosquito species Time of dy A B C Mid morning 0.0088 5.4900 5.5000 Mid Afternoon.3400 0.0300 0.8700 Dusk 0.600 5.400 3.000 The Chi squre test sttistic is the sum of

More information

Can the Phase I problem be unfeasible or unbounded? -No

Can the Phase I problem be unfeasible or unbounded? -No Cn the Phse I problem be unfesible or unbounded? -No Phse I: min 1X AX + IX = b with b 0 X 1, X 0 By mnipulting constrints nd dding/subtrcting slck/surplus vribles, we cn get b 0 A fesible solution with

More information

Deteriorating Inventory Model for Waiting. Time Partial Backlogging

Deteriorating Inventory Model for Waiting. Time Partial Backlogging Applied Mthemticl Sciences, Vol. 3, 2009, no. 9, 42-428 Deteriorting Inventory Model for Witing Time Prtil Bcklogging Nit H. Shh nd 2 Kunl T. Shukl Deprtment of Mthemtics, Gujrt university, Ahmedbd. 2

More information

Acceptance Sampling by Attributes

Acceptance Sampling by Attributes Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire

More information

Lecture 19: Continuous Least Squares Approximation

Lecture 19: Continuous Least Squares Approximation Lecture 19: Continuous Lest Squres Approximtion 33 Continuous lest squres pproximtion We begn 31 with the problem of pproximting some f C[, b] with polynomil p P n t the discrete points x, x 1,, x m for

More information

Contents. Outline. Structured Rank Matrices Lecture 2: The theorem Proofs Examples related to structured ranks References. Structure Transport

Contents. Outline. Structured Rank Matrices Lecture 2: The theorem Proofs Examples related to structured ranks References. Structure Transport Contents Structured Rnk Mtrices Lecture 2: Mrc Vn Brel nd Rf Vndebril Dept. of Computer Science, K.U.Leuven, Belgium Chemnitz, Germny, 26-30 September 2011 1 Exmples relted to structured rnks 2 2 / 26

More information

MATH34032: Green s Functions, Integral Equations and the Calculus of Variations 1

MATH34032: Green s Functions, Integral Equations and the Calculus of Variations 1 MATH34032: Green s Functions, Integrl Equtions nd the Clculus of Vritions 1 Section 1 Function spces nd opertors Here we gives some brief detils nd definitions, prticulrly relting to opertors. For further

More information

DIRECT CURRENT CIRCUITS

DIRECT CURRENT CIRCUITS DRECT CURRENT CUTS ELECTRC POWER Consider the circuit shown in the Figure where bttery is connected to resistor R. A positive chrge dq will gin potentil energy s it moves from point to point b through

More information

13: Diffusion in 2 Energy Groups

13: Diffusion in 2 Energy Groups 3: Diffusion in Energy Groups B. Rouben McMster University Course EP 4D3/6D3 Nucler Rector Anlysis (Rector Physics) 5 Sept.-Dec. 5 September Contents We study the diffusion eqution in two energy groups

More information

Review of basic calculus

Review of basic calculus Review of bsic clculus This brief review reclls some of the most importnt concepts, definitions, nd theorems from bsic clculus. It is not intended to tech bsic clculus from scrtch. If ny of the items below

More information

Matrices, Moments and Quadrature, cont d

Matrices, Moments and Quadrature, cont d Jim Lmbers MAT 285 Summer Session 2015-16 Lecture 2 Notes Mtrices, Moments nd Qudrture, cont d We hve described how Jcobi mtrices cn be used to compute nodes nd weights for Gussin qudrture rules for generl

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

2D1431 Machine Learning Lab 3: Reinforcement Learning

2D1431 Machine Learning Lab 3: Reinforcement Learning 2D1431 Mchine Lerning Lb 3: Reinforcement Lerning Frnk Hoffmnn modified by Örjn Ekeberg December 7, 2004 1 Introduction In this lb you will lern bout dynmic progrmming nd reinforcement lerning. It is ssumed

More information

7.2 The Definite Integral

7.2 The Definite Integral 7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where

More information

Monte Carlo method in solving numerical integration and differential equation

Monte Carlo method in solving numerical integration and differential equation Monte Crlo method in solving numericl integrtion nd differentil eqution Ye Jin Chemistry Deprtment Duke University yj66@duke.edu Abstrct: Monte Crlo method is commonly used in rel physics problem. The

More information

Quantum Mechanics Qualifying Exam - August 2016 Notes and Instructions

Quantum Mechanics Qualifying Exam - August 2016 Notes and Instructions Quntum Mechnics Qulifying Exm - August 016 Notes nd Instructions There re 6 problems. Attempt them ll s prtil credit will be given. Write on only one side of the pper for your solutions. Write your lis

More information

A Signal-Level Fusion Model for Image-Based Change Detection in DARPA's Dynamic Database System

A Signal-Level Fusion Model for Image-Based Change Detection in DARPA's Dynamic Database System SPIE Aerosense 001 Conference on Signl Processing, Sensor Fusion, nd Trget Recognition X, April 16-0, Orlndo FL. (Minor errors in published version corrected.) A Signl-Level Fusion Model for Imge-Bsed

More information

20 MATHEMATICS POLYNOMIALS

20 MATHEMATICS POLYNOMIALS 0 MATHEMATICS POLYNOMIALS.1 Introduction In Clss IX, you hve studied polynomils in one vrible nd their degrees. Recll tht if p(x) is polynomil in x, the highest power of x in p(x) is clled the degree of

More information

Exercise 5.5: Large-scale log-normal fading

Exercise 5.5: Large-scale log-normal fading Exercise 5.5: Lrge-scle log-norml fding Since the system is designed to hndle propgtion loss of 135 db, outge will hppen when the propgtion loss is 8 db higher thn the deterministic loss of 17 db 135 17

More information

LECTURE NOTE #12 PROF. ALAN YUILLE

LECTURE NOTE #12 PROF. ALAN YUILLE LECTURE NOTE #12 PROF. ALAN YUILLE 1. Clustering, K-mens, nd EM Tsk: set of unlbeled dt D = {x 1,..., x n } Decompose into clsses w 1,..., w M where M is unknown. Lern clss models p(x w)) Discovery of

More information

WHEN IS A FUNCTION NOT FLAT? 1. Introduction. {e 1 0, x = 0. f(x) =

WHEN IS A FUNCTION NOT FLAT? 1. Introduction. {e 1 0, x = 0. f(x) = WHEN IS A FUNCTION NOT FLAT? YIFEI PAN AND MEI WANG Abstrct. In this pper we prove unique continution property for vector vlued functions of one vrible stisfying certin differentil inequlity. Key words:

More information

Genetic Programming. Outline. Evolutionary Strategies. Evolutionary strategies Genetic programming Summary

Genetic Programming. Outline. Evolutionary Strategies. Evolutionary strategies Genetic programming Summary Outline Genetic Progrmming Evolutionry strtegies Genetic progrmming Summry Bsed on the mteril provided y Professor Michel Negnevitsky Evolutionry Strtegies An pproch simulting nturl evolution ws proposed

More information

f(x)dx . Show that there 1, 0 < x 1 does not exist a differentiable function g : [ 1, 1] R such that g (x) = f(x) for all

f(x)dx . Show that there 1, 0 < x 1 does not exist a differentiable function g : [ 1, 1] R such that g (x) = f(x) for all 3 Definite Integrl 3.1 Introduction In school one comes cross the definition of the integrl of rel vlued function defined on closed nd bounded intervl [, b] between the limits nd b, i.e., f(x)dx s the

More information

A Subspace-based Robust Adaptive Capon Beamforming

A Subspace-based Robust Adaptive Capon Beamforming 374 Progress In Electromgnetics Reserch Symposium 2006, Cmbridge, USA, Mrch 26-29 A Subspce-bsed Robust Adptive Cpon Bemforg G. S. Lio, H. Q. Liu, nd J. Li Xidin University, Chin Abstrct Adptive bemforg

More information

Power Constrained DTNs: Risk MDP-LP Approach

Power Constrained DTNs: Risk MDP-LP Approach Power Constrined DTNs: Risk MDP-LP Approch Atul Kumr tulkr.in@gmil.com IEOR, IIT Bomby, Indi Veerrun Kvith vkvith@iitb.c.in, IEOR, IIT Bomby, Indi N Hemchndr nh@iitb.c.in, IEOR, IIT Bomby, Indi. Abstrct

More information

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying Vitli covers 1 Definition. A Vitli cover of set E R is set V of closed intervls with positive length so tht, for every δ > 0 nd every x E, there is some I V with λ(i ) < δ nd x I. 2 Lemm (Vitli covering)

More information

Research Article Moment Inequalities and Complete Moment Convergence

Research Article Moment Inequalities and Complete Moment Convergence Hindwi Publishing Corportion Journl of Inequlities nd Applictions Volume 2009, Article ID 271265, 14 pges doi:10.1155/2009/271265 Reserch Article Moment Inequlities nd Complete Moment Convergence Soo Hk

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

Studies on Nuclear Fuel Rod Thermal Performance

Studies on Nuclear Fuel Rod Thermal Performance Avilble online t www.sciencedirect.com Energy Procedi 1 (1) 1 17 Studies on Nucler Fuel od herml Performnce Eskndri, M.1; Bvndi, A ; Mihndoost, A3* 1 Deprtment of Physics, Islmic Azd University, Shirz

More information

CHAPTER 1 PROGRAM OF MATRICES

CHAPTER 1 PROGRAM OF MATRICES CHPTER PROGRM OF MTRICES -- INTRODUCTION definition of engineering is the science y which the properties of mtter nd sources of energy in nture re mde useful to mn. Thus n engineer will hve to study the

More information

Module 6: LINEAR TRANSFORMATIONS

Module 6: LINEAR TRANSFORMATIONS Module 6: LINEAR TRANSFORMATIONS. Trnsformtions nd mtrices Trnsformtions re generliztions of functions. A vector x in some set S n is mpped into m nother vector y T( x). A trnsformtion is liner if, for

More information

QUADRATURE is an old-fashioned word that refers to

QUADRATURE is an old-fashioned word that refers to World Acdemy of Science Engineering nd Technology Interntionl Journl of Mthemticl nd Computtionl Sciences Vol:5 No:7 011 A New Qudrture Rule Derived from Spline Interpoltion with Error Anlysis Hdi Tghvfrd

More information

Estimation of the particle concentration in hydraulic liquid by the in-line automatic particle counter based on the CMOS image sensor

Estimation of the particle concentration in hydraulic liquid by the in-line automatic particle counter based on the CMOS image sensor Glyndŵr University Reserch Online Conference Presenttion Estimtion of the prticle concentrtion in hydrulic liquid by the in-line utomtic prticle counter bsed on the CMOS imge sensor Kornilin, D.V., Kudryvtsev,

More information

Extended nonlocal games from quantum-classical games

Extended nonlocal games from quantum-classical games Extended nonlocl gmes from quntum-clssicl gmes Theory Seminr incent Russo niversity of Wterloo October 17, 2016 Outline Extended nonlocl gmes nd quntum-clssicl gmes Entngled vlues nd the dimension of entnglement

More information