Revisiting Degrees of Freedom of Full-Duplex Systems with Opportunistic Transmission: An Improved User Scaling Law
|
|
- Marvin Miles
- 6 years ago
- Views:
Transcription
1 entropy Artcle Revstng Degrees of Freedom of Full-Duplex Systems wth Opportunstc Transmsson: An Improved User Scalng Law Haksoo Km 1, Juyeop Km, Sang Won Cho 3 and Won-Yong Shn 4, * ID 1 Afflated Insttute of ETRI, Daejeon , Korea; haksookm@nsr.re.kr Department of Electroncs Engneerng, Sookmyung Women s Unversty, Seoul 04310, Korea; jykm@sookmyung.ac.kr or jykm00@krr.re.kr 3 ICT Convergence Research Team, Korea Ralroad Research Insttute, Ewang , Korea; swcho@krr.re.kr 4 Department of Computer Scence and Engneerng, Dankook Unversty, Yongn 16890, Korea * Correspondence: wyshn@dankook.ac.kr; Tel.: Receved: 5 January 018; Accepted: 1 arch 018; Publshed: arch 018 Abstract: It was recently studed how to acheve the optmal degrees of freedom DoF) n a mult-antenna full-duplex system wth partal channel state nformaton CSI). In ths paper, we revst the DoF of a multple-antenna full-duplex system usng opportunstc transmsson under the partal CSI, n whch a full-duplex base staton havng transmt antennas and receve antennas supports a set of half-duplex moble statons Ss) havng a sngle antenna each. Assumng no self-nterference, we present a new hybrd opportunstc schedulng method that acheves the optmal sum DoF under an mproved user scalng law. Unlke the state-of-the-art schedulng method, our method s desgned n the sense that the schedulng role between downlnk Ss and uplnk Ss s well-balanced. It s shown that the optmal sum DoF of s asymptotcally achevable provded that the number of Ss scales faster than SNR, where SNR denotes the sgnal-to-nose rato. Ths result reveals that, n our full-duplex system, better performance on the user scalng law can be obtaned wthout extra CSI, compared to the pror work that showed the requred user scalng condton.e., the mnmum number of Ss for guaranteeng the optmal DoF) of SNR 1. oreover, the average nterference decayng rate s analyzed. Numercal evaluaton s performed to not only valdate our analyss but also show superorty of the proposed method over the state-of-the-art method. Keywords: degrees of freedom DoF); full-duplex systems; hybrd opportunstc schedulng; partal channel state nformaton CSI); user scalng law 1. Introducton 1.1. Prevous Work Wth the ncreasng demands for hgh-speed communcatons, full-duplex technologes have been taken nto account as a promsng soluton for boostng the spectral effcency n multuser wreless communcatons systems [1]. However, the potental advantage of full-duplex systems may be lmted by a new challenge the nter-termnal nterference that does not appear n half-duplex systems. The problem of nter-termnal nterference n full-duplex systems has recently been studed n the lterature n terms of degrees of freedom DoF) known as the pre-log of the sum-rate capacty n the hgh sgnal-to-nose SNR) regme) [,3]. In partcular, f channels follow the ergodc phase fadng model and full channel state nformaton at the transmtter CSIT) s avalable, then t was shown n [] that the DoF of full-duplex systems can be deally twce as large as that of half-duplex systems. Entropy 018, 0, 160; do: /e
2 Entropy 018, 0, 160 of 15 Several nter-termnal nterference cancellaton schemes for a three-termnal full-duplex system were presented n [3]. In addton, the DoF of mult-antenna full-duplex systems was recently studed n [4,5]. However, there are some practcal challenges as follows. Frst, the computatonal burden of such schemes wll ncrease steeply as the system dmensons ncrease. Second, the node cooperaton and a massve number of CSI feedback bts are requred. On the other hand, n multuser wreless communcatons systems, opportunstc transmsson technques that explot the usefulness of fadng have been wdely studed n the lterature, where one can obtan a multuser dversty gan as the number of users s suffcently large. Specfcally, opportunstc schedulng [6], opportunstc beamformng [7], and random beamformng [8] were ntroduced n sngle-cell broadcast channels. In partcular, t was ponted that the same sum-rate scalng law as the optmal drty-paper codng can be acheved for such broadcast channels va random beamformng wth far less CSI feedback [8]. oreover, scenaros explotng the multuser dversty gan were studed n cooperatve networks by applyng an opportunstc two-hop relayng protocol [9], a parallel opportunstc routng protocol [10], and an opportunstc network decouplng protocol [11] as well as n cogntve rado networks wth opportunstc schedulng [1 14]. Usng opportunstc communcatons, a certan user scalng law for achevng one DoF per user was also examned for n, K)-nterference channels [15]. In addton, such opportunsm was utlzed n mult-cell broadcast channels or, equvalently, nterferng broadcast channels) by usng mult-cell random beamformng [16,17] and opportunstc nterference algnment [18]. As a more challengng problem than the downlnk case, the optmal DoF n mult-cell multple access channels or, equvalently, nterferng multple access channels) was analyzed by presentng opportunstc nterference algnment strateges [19 ] and dstrbuted schedulng protocols [3,4]. In [16,18 1], the mnmum number of users requred to acheve the optmal DoF was nvestgated.e., the user scalng law). It s worth notng that, for achevng these DoFs, the transmtters do not requre the knowledge of the nstantaneous channel realzatons. Recently, n a full-duplex system composed of a -antenna full-duplex base statons BSs) and a large number of sngle-antenna half-duplex moble statons Ss), opportunstc beamformng and schedulng methods were proposed n [5,6]. In [5], a jont uplnk downlnk opportunstc beamformng method was employed so that uplnk and downlnk sum capactes can be acheved under a certan user scalng condton. Unlke the beamformng method n [5], the scheme n [6] took advantage of the zero-forcng ZF) recever for uplnk to acheve the full DoF snce ZF flterng at the BS s suffcent to guarantee DoF for uplnk, whch results n nfntely large sum-rates wth ncreasng SNR. In partcular, t was shown n [6] that the requred user scalng law to acheve the optmal DoF s gven by SNR 1. However, the result n [6] s pessmstc n practce n the sense that too many Ss n a cell are necessary to guarantee the DoF optmalty even f the optmal DoF under a certan user scalng law was orgnally characterzed n the full-duplex system wth partal CSIT [6]. Such a hgh user scalng law n [6] stems from the schedulng role mbalance between downlnk Ss and uplnk Ss snce a set of downlnk Ss s selected wth strong responsblty to elmnate both the downlnk nterference and S-to-S nterference, whereas a set of uplnk Ss s arbtrarly chosen. It remans an open challenge how to sgnfcantly reduce the user scalng law wthout extra CSIT n the full-duplex system usng opportunstc transmsson. oreover, there have been extensve studes on schedulng and resource optmzaton n a varety of network scenaros ncludng wreless networks wth energy harvestng [7 9] and cogntve networks [30]. 1.. an Contrbutons In ths paper, we ntroduce a new hybrd opportunstc schedulng method that acheves the optmal sum DoF of the full-duplex system addressed n Secton 1.1,.e., the full-duplex system consstng of a -antenna full-duplex BSs and N sngle-antenna half-duplex Ss, under an mproved user scalng law. We consder a practcal scenaro that the system operates n the tme-dvson
3 Entropy 018, 0, of 15 duplexng TDD) mode and the effectve channel gan nformaton s only avalable at the transmtter va offlne plot sgnalng sent durng the schedulng perod. In such a partal CSIT scenaro, how to acheve the optmal DoF s a challengng task, especally for full-duplex systems snce, wth the exstng opportunstc schedulng methods, t s not straghtforward to effectvely manage the nter-termnal nterference that does not appear n half-duplex systems. Under the partal CSIT assumpton, our method combnes the followng beamformng and schedulng strateges: ) downlnk random beamformng at the BS, ) opportunstc schedulng at both the downlnk Ss and uplnk Ss, and ) uplnk ZF beamformng at the BS. ore precsely, a set of downlnk Ss s selected n the sense that the downlnk nterference s mnmzed, and a set of uplnk Ss s selected n the sense that the S-to-S nterference s mnmzed by vrtue of utlzng the channel recprocty of the TDD system, whch s the most dstngushable feature compared to the schedulng method n [6]. We remark that our method only requres each S to feed back real values along wth the correspondng beamformng vector ndces, whch s sgnfcantly less than the full CSIT case. As our man result, when uplnk and downlnk Ss are served through our full-duplex system wth hybrd opportunstc schedulng, t s shown that the sum DoF of s achevable provded that the number of Ss, N, scales faster than SNR. That s, the full DoF s guaranteed under an mproved user scalng law wthout any extra CSI as t was shown n [6] that N need to scale faster than SNR 1 to guarantee the DoF optmalty. The nterference decayng rate, defned as the average decayng rate of the total amount of receved nterference and/or generatng nterference wth respect to the number of Ss, s also analyzed asymptotcally. In addton, numercal results are provded to valdate our analyss. It was examned that the proposed hybrd opportunstc schedulng outperforms the state-of-the-art method n [6] n terms of achevable sum-rates. Our man contrbutons are four-fold and summarzed as follows: A new hybrd opportunstc schedulng method s presented n the sense that the schedulng role between downlnk Ss and uplnk Ss s well-balanced. The DoF and user scalng law are newly derved by analyzng the dstrbutons of our schedulng metrcs. The average nterference decayng rate s also analyzed. Numercal examples are provded to not only valdate our analyss but also show superorty of the proposed method over the state-of-the-art method Organzaton The rest of ths paper s organzed as follows. Secton descrbes the system model and a performance metrc. The proposed hybrd opportunstc schedulng method s presented n Secton 3. Its DoF and user scalng laws are derved n Secton 4. Numercal evaluaton s shown va computer smulatons n Secton 5. Fnally, we conclude the paper n Secton 6.. System odel and Performance etrc In ths secton, we frst descrbe the system and channel models and then defne a performance metrc used n ths paper..1. System odel As llustrated n Fgure 1, we consder a sngle-cell mult-antenna full-duplex TDD system consstng of a full-duplex BS havng transmt antennas and receve antennas and a set of N half-duplex Ss wth a sngle antenna each, where N. Snce full-duplex operaton at the BS s assumed, uplnk and downlnk data transmsson can take place smultaneously at the BS. On the other hand, each half-duplex S can be supported by ether uplnk or downlnk, but not smultaneously,.e., S d) S u) =, where S d) and S u) denote the sets of downlnk and uplnk Ss at a gven tme, and s the empty set. oreover, we assume that S d) and S u) have the same cardnalty of,
4 Entropy 018, 0, of 15.e., S d) S = u) =. We assume that there s no self-nterference due to the full-duplex operaton at the BS,.e., self-nterference due to the full-duplex operaton at the BS s perfectly suppressed. Throughout ths paper, the operators C, E[ ], Pr{ }, and ) ndcate the feld of complex numbers, the statstcal expectaton, the probablty, and the transpose conjugate, respectvely. Unless otherwse stated, all logarthms are assumed to be to the base. We use the followng asymptotc notaton: ) f x) = Ogx)) means that there exst constants C and c such that f x) Cgx) for all gx) x > c, ) f x) = Ωgx)) f gx) = O f x)), ) f x) = ωgx)) means that lm x f x) = 0, and v) f x) = Θgx)) f f x) = Ogx)) and f x) = Ωgx)) [31]... Channel odel Fgure 1. The mult-antenna full-duplex system when = and N = 15. Now, let us turn to channel modelng. The receved sgnal for downlnk transmsson at S and the receved sgnal vector for uplnk transmsson at the BS, denoted by y d) C and y u) C 1, can be wrtten as = β d) h d) s d) + β ) j h j s u) j + n d), 1) j S u) y d) y u) = β u) h u) s u) + n u), ) S u) respectvely, where β d) h d) C 1, β u) h u) C 1, and β ) j h j C denote the channel vectors from the BS to S, from S to the BS, and channels from S j to S, respectvely. Here, the channel coeffcents β d) h d), β u) βh u), and β ) j h j consst of the large-scale path-loss component, whch s ndependent of SNR, and the small-scale complex fadng component. ore specfcally, β d), β u), and β ) j represent the nonnegatve path-loss attenuaton factor between the BS and S for downlnk, between S and the BS for uplnk, and between two Ss and j, respectvely. We assume that each element of small-scale fadng channels s ndependent and dentcally dstrbuted..d.) accordng to CN 0, 1), where the notaton CN µ, Σ) ndcates the complex Gaussan dstrbuton wth a mean vector µ and a covarance matrx Σ. The downlnk transmt sgnal vector at the BS and the uplnk sgnal at S j, denoted by s d) C 1 and s u) j C, respectvely, satsfy the average power constrants [ s E d) ] [ s u) = 1 and E j ] = 1. The addtve nose at S, denoted by n d), and each element of
5 Entropy 018, 0, of 15 the addtve nose vector at the BS, denoted by n u), are..d. complex Gaussan wth zero mean and varance of N 0, respectvely. We assume the block fadng channel model,.e., channel coeffcents are constant durng one codng or communcaton block and changes to a new ndependent value for every transmsson block. We further assume that full CSI s avalable at the recever sde, but only partal CSI effectve channel gan nformaton) s avalable at the transmtter sde, whch wll be specfed later on..3. Performance etrc As a performance metrc, we use the sum DoF, whch s defned by DoF = R u) + R d) lm SNR log SNR, 3) where R u) and R d) denote the achevable sum-rates for uplnk and downlnk, respectvely. Note that ths DoF s the pre-log of the sum-rate capacty n the hgh SNR regme. In the next secton, we descrbe our new hybrd opportunstc schedulng method for the cellular mult-antenna system wth one full-duplex BS and multple half-duplex Ss. We then show that t leads to an mproved user scalng law.e., the reduced number of Ss) for guaranteeng the optmal DoF, compared to the pror work n [6]. 3. New Hybrd Opportunstc Schedulng In the full-duplex system wth one mult-antenna BS, an opportunstc schedulng method was ntroduced n [6] by employng uplnk ZF beamformng at the BS and downlnk random beamformng at the BS. In the schedulng procedure, downlnk Ss were opportunstcally selected n the sense of mnmzng the total nterference level ncludng both downlnk nterference and S-to-S nterference, whereas uplnk Ss were arbtrarly chosen. For ths reason, the method n [6] requres plenty of Ss so that downlnk Ss who have a suffcently small amount of the schedulng metrc shown later n ths secton) are fnally selected whle achevng DoF for downlnk. That s, a strngent user scalng condton s necessary under the method n [6] due to the schedulng role mbalance between downlnk Ss and uplnk Ss. In ths secton, we propose another type of hybrd opportunstc schedulng such that both uplnk and downlnk Ss are opportunstcally selected, thereby resultng n the reduced number of Ss requred to acheve the full DoF. The overall procedure of our schedulng method s descrbed accordng to the followng steps: 1. Downlnk Random Beamformng at the BS: The BS generates orthonormal random vectors { v C 1} =1, where {v } =1 are generated accordng to the sotropc dstrbuton over the -dmensonal unt sphere. Then, the BS broadcasts ts generated beamformng vectors V = [v 1,, v ] to all Ss over the system.. Downlnk Schedulng etrc Calculaton and Feedback: We frst focus on the downlnk user schedulng process. In our proposed method, we defne the downlnk schedulng metrc of each S {1,, N} as the downlnk nterference. Let us suppose that S s served by downlnk beamformng vector v m. Then, the mth downlnk schedulng metrc of S, denoted by L,m, s expressed as L,m = k=1,k =m β d) ) h d) vk. 4) Here, S calculates the set of ts downlnk schedulng metrcs {L,1,, L, } and then feeds those values as well as ts own user ID back to the BS.
6 Entropy 018, 0, of Downlnk User Selecton: Upon recevng the sets of the downlnk schedulng metrcs from the all Ss, the BS selects π m = arg mn ) L,m, 5) {1,,N}\ {π l } m 1 l=1 whch eventually results n the set of selected downlnk Ss S d) = {π 1,, π }. Then, the BS broadcasts a short sgnalng message representng the set of selected downlnk Ss. The BS s ready for transmttng ts downlnk packets to S π m usng the beamformg vector v m, where m {1,, }. 4. Uplnk User Schedulng etrc Calculaton and Feedback: We now turn to the uplnk user schedulng process by utlzng the channel recprocty of our TDD system. The frst step of uplnk user schedulng s to defne the uplnk schedulng metrc of each S j {1,, N} \ S d) as the S-to-S nterference.e., the sum of the nterference leakage power from tself to all Ss n S d) ). Then, the uplnk schedulng metrc of S j, denoted by γ j, s represented as follows: γ j = S d) β ) j ) hj. 6) From both the feedback sgnals from the selected downlnk Ss and the short sgnalng message from the BS, each uplnk S s capable of computng the metrc n Equaton 6). Thus, S j {1,, N} \ S d) calculates ts uplnk schedulng metrc γ j and feeds ts value as well as ts own user ID back to the BS. 5. Uplnk User Selecton: Upon recevng N uplnk schedulng metrcs except for the selected downlnk Ss n S d), the BS selects uplnk Ss havng the smallest uplnk schedulng metrcs. That s, for m {1,, }, the BS selects φ m = arg mn j {1,,N}\ S d) {φ l } m 1 l=1 ) γ j, 7) whch eventually results n the set of selected uplnk Ss S u) = {φ 1,, φ }. Then, each S n S u) s ready for transmttng ts uplnk packets. 6. Uplnk ZF Beamformng at the BS: To decode uplnk packets, the BS apples ZF receve flterng by nullng out the uplnk nterference wthout CSI at the transmtter. For the proposed opportunstc schedulng method, we assume that each S j {1,, N} \ S d) can estmate the S-to-S nterference γ j by overhearng feedback sgnals sent from the downlnk Ss to report ther schedulng metrcs to the BS. oreover, t s worthwhle to address the fundamental dfferences between our approach and two dfferent types of schedulng methods for full-duplex systems as follows. Remark 1. In [5], nstead of ZF beamformng, random receve beamformng for decodng uplnk packets s employed at the BS. In [6], a set of downlnk Ss s selected to elmnate both the downlnk nterference and S-to-S nterference, whereas a set of uplnk Ss s arbtrarly chosen. 4. Analyss of DoF and User Scalng In ths secton, we frst analyze the DoF achevablty of our new hybrd opportunstc schedulng method along wth the correspondng user scalng law. We then analyze the nterference decayng rate wth respect to the number of Ss.
7 Entropy 018, 0, of User Scalng Law For uplnk transmsson, t s obvous that the sum DoF of s achevable by usng the ZF recever at the BS. Thus, we focus on analyzng how to acheve the sum DoF of for downlnk transmsson. When the sets of the selected downlnk and uplnk Ss, denoted by S d) = {π 1,, π } and S u) = {φ 1,, φ }, respectvely, are determned, the receved sgnal at S π for downlnk transmsson s rewrtten as y d) π = β d) π h d) π s d) + = β d) π h d) β ) j S u) d) π v x d) + k=1,k = π j h π js u) j β d) π h d) + n d) π d) π k v k x d) k + β ) π j h π js u) j + n d). 8) j S u) Thus, from Equaton 8), the receved sgnal-to-nterference-plus-nose rato SINR) at S π s gven by SINR d) π = SNR k=1,k = = SNR β d) π ) h d) π v I d) π +I u) π +1 SNR β d) π ) h d) π v β d) ) π h d) π vk +SNR j S u) where I d) π = SNR k=1,k = β d) π ) h d) π vk and I u) π, β ) π j = SNR j S u) ) hπ j +1 β ) π j 9) ) hπ j denote the nterference caused by other generated beams.e., the downlnk nterference) and the nterference from the selected uplnk Ss to S π.e., the S-to-S nterference), respectvely. Then, usng the receved SINR n Equaton 9), the achevable sum-rate for downlnk s gven by R d) = log 1 + SINR d) ) π. 10) =1 Now, the followng theorem establshes the DoF achevablty of the proposed hybrd opportunstc schedulng method presented n Secton 3. Theorem 1. For the mult-antenna full-duplex system n Secton, the optmal DoF of s achevable wth hgh probablty f N = ω SNR ). 11) Proof. For uplnk transmsson, t s obvous that the sum DoF of s achevable by usng the ZF recever at the BS. Thus, we focus on the achevable DoF for downlnk. Let us defne P d and P u by the probabltes that the downlnk nterference and the S-to-S nterference at all the selected downlnk Ss are less than or equal to ɛ 1 > 0 and ɛ > 0, respectvely, where ɛ 1 and ɛ are small constants ndependent of SNR. Then, P d and P u can be expressed as P d = lm Pr SNR { SNR k=1,k = β d) ) } π h d) π vk ɛ 1, {1,, } 1) and P u = lm Pr SNR SNR j S u) β ) π j ) h π j ɛ, {1,, }, 13)
8 Entropy 018, 0, of 15 respectvely. Then, the sum DoF for downlnk transmsson, denoted by DoF d, s lower-bounded by DoF d P d P u. 14) Now, let us characterze two probabltes P d and P u. Frst, P d can be rewrtten as P d { = lm SNR Pr SNR k=1,k = = lm SNR Pr { k=1,k = hd) hd) π vk ɛ 1, {1,, } π vk ɛ 1 SNR 1, {1,, } } }, 15) where ɛ 1 = ɛ 1 β d) π 1 ) 1, whch s ndependent of SNR. Here, the term k=1,k = h d) π vk corresponds to the downlnk schedulng metrc of selected S π wth no path-loss component and follows the ch-square dstrbuton wth degrees of freedom for {1,, } snce the -dmensonal downlnk channel vector h d) π s sotropcally dstrbuted. Note that the rght-hand sde of Equaton 15) ndcates the probablty that there exst at least Ss that fulflls the nequalty k=1,k = π vk ɛ 1 SNR 1. Thus, by denotng Fx) by the cumulatve densty functon CDF) of a ch-square random varable wth degrees of freedom, t follows that P d = 1 lm SNR 1 =0 N ɛ )F 1 SNR 1) 1 F ɛ 1 SNR 1)) N = 1 lm SNR 1 =0 a) b) 1 lm SNR 1 =0 1 lm SNR 1 =0 F N!!N )! N F 1 F ɛ 1 SNR 1)) N 1 F ɛ 1 SNR 1)) ɛ 1 SNR 1) 1 F ɛ 1 SNR 1)) N 1 F ɛ 1 SNR 1)) ɛ 1 SNR 1)) 1 C d,1 SNR ) N NC d, SNR ) 1 C d, SNR ), hd) 16) where and C d,1 = e 1 Γ) ɛ 1 17) C d, = 1) Γ) ɛ 1. 18) Here, Γ) = 0 t 1 e t dt s the Gamma functon; a) holds from the fact that N!!N )! N ; and b) holds from the fact that see Lemma 1 n [0]) e 1 Γ) x Fx) 1) Γ) x. 19)
9 Entropy 018, 0, of 15 Next, let us turn to characterzng P u as follows: P u lm SNR SNR lm SNR SNR lm SNR Pr { =1 j S u) j S u) =1 hπ j h π j ɛ, {1,, } hπ j ɛ } ɛ SNR 1, j Su), 0) 1, where ɛ = ɛ max{β ) π φ 1,, β ) π φ }) whch s ndependent of SNR. Snce the term hπ =1 j corresponds to the uplnk schedulng metrc γ j wth no path-loss component and s the ch-square random varable wth degrees of freedom for j S u), Equaton 1) can further be lower-bounded by P u 1 lm SNR 1 =0 N )F ) ɛ SNR 1 1 F ) ) N ɛ SNR 1 = 1 lm SNR 1 =0 1 lm SNR 1 =0 1 lm SNR 1 =0 F N )!!N )! { { N ) F ɛ SNR 1 ) ɛ 1 F SNR 1 )) N ɛ 1 F SNR 1 )) ɛ SNR 1 )} ɛ 1 F SNR 1 )) N ɛ 1 F SNR 1 )) 1 C u,1 SNR ) N N )C u, SNR } 1 C u, SNR ), 1) where C u,1 = e 1 Γ) ɛ ), ) and C u, = 1) Γ) ɛ ). 3) It s not dffcult to show that f N = ω SNR ), then two terms 1 C d,1 SNR ) N and 1 C u,1 SNR ) N decrease exponentally wth respect to SNR, whereas other two terms NC d, SNR ) { and N ) C u, SNR } ncrease polymonally for any > 0. In consequence, as SNR goes to nfnty, both P d and P u tend to one. Hence, from Equaton 14), DoF d f N = ω SNR ), whch completes the proof of ths theorem. Our man result s now compared wth the achevablty result n [6] wth respect to the user scalng law. Remark. In the mult-antenna full-duplex system consstng of a full-duplex BS havng antennas transmt and receve antennas each) and a set of N half-duplex Ss wth a sngle antenna each, t was shown
10 Entropy 018, 0, of 15 n [6] that the optmal DoF s achevable by usng opportunstc schedulng at the downlnk Ss and random selecton of the uplnk Ss, provded that N scales faster than SNR 1. In ths work, we have proposed the hybrd opportunstc schedulng method such that both the uplnk and downlnk Ss are opportunstcally selected, thereby resulng n the reduced number of Ss requred to acheve the optmal sum DoF.e., DoF). Note that our schedulng method does not utlze any further CSI at the transmtters, compared to that of [6]. 4.. Interference Decayng Rate Next, we analyze the average nterference decayng rate defned as the average decayng rate of the total amount of receved nterference and/or generatng nterference wth respect to the number of Ss, N. Ths s meanngful snce the desred user scalng law s closely related to the nterference decayng rate wth ncreasng N for gven SNR. Let I d) mn, denote the maxmum value.e., the th smallest value) among the downlnk nterference levels that selected downlnk Ss compute, whch s gven by I d) mn, = max L πm, 4) π m S d) where L πm represents the downlnk schedulng metrc of selected S π m and S d) s the set of selected downlnk Ss. In addton, let I u) mn, denote the maxmum value among the S-to-S nterference levels that selected uplnk Ss compute, whch s gven by I u) mn, = max φ j S u) γ φj, 5) where γ φj s the uplnk schedulng metrc of selected S φ j as shown n Equaton 6) and S u) s the set of selected uplnk Ss. Snce the performance of our hybrd opportunstc schedulng method s lmted manly by 1) such a selected downlnk S that receves the maxmum amount of nterference from other beams generated by the BS or ) such a selected uplnk S that generates the maxmum amount of nterference to selected downlnk Ss, t s certanly worth analyzng an asymptotc behavor of I mn, max{i d) mn,, Iu) mn, } wth respect to N. Now, we are ready to establsh [ our ] second man result, whch shows a lower bound on the average 1 nterference decayng rate E I wth respect to N. mn, Theorem. For the mult-antenna full-duplex system n Secton, the average nterference decayng rate s lower-bounded by [ ] 1 E Θ N 1/). 6) I mn, Proof. The proof essentally follows the same steps as those n Secton III-B n [3]) and Remark 1 n [6]), and thus a bref sketch of the proof s provded here. From the proof of Theorem 1 and the arkov s nequalty, t follows that { 1 Pr I mn, ɛ } SNR SNR ɛ [ E [ max{i d) = { SNR E max ɛ ) SNR = Θ N 1/ mn,, Iu) mn, } ] max π m S d) L πm, max φ j S u) γ πj for small ɛ > 0, whch tends to zero f N = ω SNR ). Here, the frst equalty holds due to Equatons 4) and 5). Ths completes the proof of Theorem. }] 7)
11 Entropy 018, 0, of 15 From the above theorem, we obtan the same scalng law as n Theorem 1. Ths mples that the faster nterference decayng rate wth respect to N, the smaller SNR exponent n the user scalng law. 5. Numercal Evaluaton In ths secton, we perform computer smulatons to valdate our analyss n Secton 4. Numercal examples are also provded to evaluate the sum-rate performance of the proposed hybrd opportunstc schedulng method for fnte parameters N and SNR. In our smulatons, each channel coeffcent n Equatons 1) and ) s generated 10 4 tmes for each system parameter. Unless otherwse stated, t s assumed that the large-scale path-loss component.e., β d), β u), and β ) j for all and j) s gven by 1 n our smulatons. The average nterference decayng rate s frst evaluated numercally accordng to the total number of Ss, N. Even f t seems unrealstc to have a large number of Ss n a cell, the range of parameter N s taken nto account to precsely see some trends of curves varyng wth N. In Fgure, the log log plot of the average nterference decayng rate versus N s shown as N ncreases for system parameter {, 3}, ndcatng the number of transmt or receve antennas at the BS. Ths numercal result reveals that the nterference decayng rate tends to decrease almost lnearly wth N, but the slopes of the curves vary accordng to. The dotted lnes are obtaned from Theorem theoretcal results) wth proper bases, and, thus, only the slopes of the dotted lnes are relevant. It s shown that the bound n Theorem s ndeed tght snce the average nterference decayng rates shown n Fgure are consstent wth the user scalng law derved n Theorem 1. oreover, t s shown that the average nterference decayng rate gets ncreased as ncreases snce the user scalng law n Theorems 1 and s expressed as an ncreasng functon of Smulaton Asymptotc analyss Interference decayng rate = = N Fgure. The average nterference decayng rate versus N when {, 3}. As shown n Fgure 3, when {, 3}, the achevable sum-rates of the proposed hybrd opportunstc schedulng method are now evaluated accordng to the receved SNR n db scale) and are compared wth the conventonal schedulng method n [6] where downlnk Ss are opportunstcally selected whle uplnk Ss are arbtrarly selected. Note that N s set to a dfferent scalable value
12 Entropy 018, 0, of 15 accordng to SNR,.e., N = SNR, to see whether the slope of a curve follows the DoF n Theorems 1. It s obvous to see that the proposed method outperforms the conventonal one n terms of sum-rates for all SNR regmes. Ths s because the DoF acheved by the method n [6] s surely lower than = 4 due to the fact that ts user scalng law N = ωsnr 1 ) s not fulflled and thus there exsts more resdual nterference at each recever sde. It ndcates that the performance gap between the two methods becomes large n the hgh SNR regme Proposed [3] Sum rates [bts/s/hz] SNR [db] a) Proposed [3] Sum rates [bts/s/hz] SNR [db] b) Fgure 3. The achevable sum-rates versus SNR. a) = ; b) = 3. In addton, the effect of the path-loss attenuaton factor on the sum-rates s examned. For convenence of an llustraton, suppose that β β d) = β u) and β ) j = 1. That s, we consder the case where both downlnk and uplnk channels experence the same degree of path-loss attenuaton.
13 Entropy 018, 0, of 15 Here, 0 < β < 1 corresponds to the case where an S and the BS are relatvely far away from each other whle most Ss are co-located. On the other hand, β > 1 corresponds to the case where the dstance between an S and the BS s relatvely close and Ss are separated by an obstacle e.g., a wall). In Fgure 4, the achevable sum-rates of the proposed hybrd opportunstc schedulng method versus the receved SNR n db scale) are evaluated for = and β {0., 0.5, 0.8, 1., 1.5}. As β decreases, both the desred sgnal power at S π and the downlnk nterference power at S π get reduced due to a more severe path-loss attenuaton between an S and the BS. From the fgure, t s shown that the sum-rates are degraded wth decreasng β, whch reveals that reducton on the desred sgnal power s more sgnfcant n determnng the sum-rate performance. Sum rates [bts/s/hz] β=0. β=0.5 β=0.8 β=1. β= SNR [db] Fgure 4. The achevable sum-rates versus SNR when = and β {0., 0.5, 0.8, 1., 1.5}. 6. Conclusons A new hybrd opportunstc schedulng method was presented n mult-antenna full-duplex systems wth partal CSIT where the effectve channel gan nformaton s only avalable at the transmtter. Unlke the pror work n [6], both the downlnk and uplnk Ss were opportunstcally selected n the proposed method, whch leads to an mproved user scalng law.e., the reduced number of Ss). It was analyzed that the proposed method asymptotcally acheves the DoF of provded that the number of Ss, N, scales faster than SNR. That s, t was shown that the full DoF s guaranteed under the mproved user scalng law wthout any extra CSIT compared to the state-of-the-art schedulng method n [6] that requres the user scalng condton of N = ωsnr 1 ). Numercal evaluaton was also shown to verfy that our method outperforms the conventonal one under realstc network condtons e.g., fnte N and SNR) wth respect to achevable sum-rates. Further nvestgaton of the numercal evaluaton n a more general setup, whch ncludes dfferent large-scale path-loss components for each lnk by consderng the spatal locaton of Ss, remans for future work. Suggestons for further research n ths area also nclude examnng the effects of S moblty on the performance va extensve computer smulatons.
14 Entropy 018, 0, of 15 Acknowledgments: Ths research was supported by the Basc Scence Research Program through the Natonal Research Foundaton of Korea NRF) funded by the nstry of Educaton 017R1D1A1A ) and by the Insttute for Informaton & communcatons Technology Promoton IITP) grant funded by the Korea government SIT) , Development of PS-LTE System and Termnal for Natonal Publc Safety Servce). Author Contrbutons: Haksoo Km wrote the smulaton code and performed experments; Juyeop Km n part desgned the system model; Sang Won Cho n part desgned the protocol; and Won-Yong Shn conceved and desgned the overall protocol, and derved the man theorem. Conflcts of Interest: The authors declare no conflct of nterest. References 1. Aryafar, E.; Khojastepour,.; Sundaresan, K.; Rangarajan, S.; Chang,. IDU: Enablng IO full-duplex. In Proceedngs of the AC Annual Internatonal Conference on oble Computng and Networkng obcom), Istanbul, Turkey, 6 August 01; pp Saha, A.; Dggav, S.N.; Sabharwal, A. On degrees-of-freedom of full-duplex uplnk/downlnk channel. In Proceedngs of the IEEE Informaton Theory Workshop ITW), Sevlla, Span, 9 13 September 013; pp Ba, J.; Sabharwal, A. Dstrbuted full-duplex va wreless sde channels: Bounds and protocols. IEEE Trans. Wrel. Commun. 013, 1, Elmahdy, A..; El-Key, A.; ohasseb, Y.; ElBatt, T.; Nafe,.; Seddk, K.G.; Khattab, T. Degrees of freedom of the full-duplex asymmetrc IO three-way channel wth uncast and broadcast messages. IEEE Trans. Commun. 017, 65, Chae, S.H.; Lm, S.H.; Jeon, S.-W. Degrees of freedom of full-duplex multantenna cellular networks. IEEE Trans. Wrel. Commun. 018, 17, Knopp, R.; Humblet, P. Informaton capacty and power control n sngle cell multuser communcatons. In Proceedngs of the IEEE Internatonal Conference on Communcatons ICC), Seattle, WA, USA, 18 June 1995; pp Vswanath, P.; Tse, D.N.C.; Laroa, R. Opportunstc beamformng usng dumb antennas. IEEE Trans. Inf. Theory 00, 48, Sharf,.; Hassb, B. On the capacty of IO broadcast channels wth partal sde nformaton. IEEE Trans. Inf. Theory 005, 51, Cu, S.; Hamovch, A..; Somekh, O.; Poor, H.V. Opportunstc relayng n wreless networks. IEEE Trans. Inf. Theory 009, 55, Shn, W.-Y.; Chung, S.-Y.; Lee, Y.H. Parallel opportunstc routng n wreless networks. IEEE Trans. Inf. Theory 013, 59, Shn, W.-Y.; a, V.V.; Jung, B.C.; Yang, H.J. Opportunstc network decouplng wth vrtual full-duplex operaton n mult-source nterferng relay networks. IEEE Trans. oble Comput. 017, 16, Ban, T.W.; Cho, W.; Jung, B.C.; Sung, D.K. ult-user dversty n a spectrum sharng system. IEEE Trans. Wrel. Commun. 009, 8, Tajer, A.; Wang, X. ultuser dversty gan n cogntve networks. IEEE/AC Trans. Netw. 010, 18, Shen, C.; Ftz,.P. Opportunstc spatal orthogonalzaton and ts applcaton n fadng cogntve rado networks. IEEE J. Sel. Top. Sgnal Process. 011, 5, Tajer, A.; Wang, X. n, k)-user nterference channels: Degrees of freedom. IEEE Trans. Inf. Theory 008, 58, Shn, W.-Y.; Jung, B.C. Network coordnated opportunstc beamformng n downlnk cellular networks. IEICE Trans. Commun. 01, E95-B, Nguyen, H.D.; Zhang, R.; Hu, H.T. ult-cell random beamformng: Achevable rate and degrees of freedom regon. IEEE Trans. Sgnal Process. 013, 14, Yang, H.J.; Shn, W.-Y.; Jung, B.C.; Suh, C.; Paulraj, A. Opportunstc downlnk nterference algnment for mult-cell IO networks. IEEE Trans. Wrel. Commun. 017, 16, Jung, B.C.; Shn, W.-Y. Opportunstc nterference algnment for nterference-lmted cellular TDD uplnk. IEEE Commun. Lett. 011, 15, Jung, B.C.; Park, D.; Shn, W.-Y. Opportunstc nterference mtgaton acheves optmal degrees-of-freedom n wreless mult-cell uplnk networks. IEEE Trans. Commun. 01, 60,
15 Entropy 018, 0, of Yang, H.J.; Shn, W.-Y.; Jung, B.C.; Paulraj, A. Opportunstc nterference algnment for IO nterferng multple-access channels. IEEE Trans. Wrel. Commun. 013, 1, Yang, H.J.; Jung, B.C.; Shn, W.-Y.; Paulraj, A. Codebook-based opportunstc nterference algnment. IEEE Trans. Sgnal Process. 014, 6, Shn, W.-Y.; Park, D.; Jung, B.C. Can one acheve multuser dversty n uplnk mult-cell networks? IEEE Trans. Commun. 01, 60, Jung, B.C.; Km, S..; Shn, W.-Y.; Yang, H.J. Optmal multuser dversty n mult-cell IO uplnk networks: User scalng law and beamformng desgn. Entropy 017, 16, Karakus, C.; Dggav, S.N. Opportunstc schedulng for full-duplex uplnk-downlnk networks. In Proceedngs of the IEEE Internatonal Conference on Informaton Theory ISIT), Hong Kong, Chna, June 015; pp a, V.V.; Km, J.; Jeon, S.-W.; Cho, S.W.; Seo, B.; Shn, W.-Y. Degrees of freedom of mllmeter wave full-duplex systems wth partal CSIT. IEEE Commun. Lett. 016, 0, Zhang, H.; Huang, S.; Jang, C.; Long, K.; Leung, V.C..; Poor, H.V. Energy effcent user assocaton and power allocaton n mllmeter-wave-based ultra dense networks wth energy harvestng base statons. IEEE J. Sel. Areas Commun. 017, 35, Zhang, H.; Du, J.; Cheng, J.; Long, K.; Leung, V.C.. Incomplete CSI based resource optmzaton n SWIPT enabled heterogeneous networks: A non-cooperatve game theoretc approach. IEEE Trans. Wrel. Commun. 017, do: /twc a, V.V.; Shn, W.-Y.; Ishbash, K. Wreless power transfer for dstrbuted estmaton n sensor networks. IEEE J. Sel. Top. Sgnal Process. 017, 11, Zhang, H.; Ne, Y.; Cheng, J.; Leung, V.C..; Nallanathan, A. Sensng tme optmzaton and power control for energy effcent cogntve small cell wth mperfect hybrd spectrum sensng. IEEE Trans. Wrel. Commun. 017, 16, Knuth, D.E. Bg Omcron and bg Omega and bg Theta. AC SIGACT News 1976, 8, Jose, J.; Subramanan, S.; Wu, X.; L, J. Opportunstc nterference algnment n cellular downlnk. In Proceedngs of the 50th Annual Allerton Conference on Communcaton, Control and Conputng, Urbana-Champagn, IL, USA, 1 5 October 01; pp c 018 by the authors. Lcensee DPI, Basel, Swtzerland. Ths artcle s an open access artcle dstrbuted under the terms and condtons of the Creatve Commons Attrbuton CC BY) lcense
ECE559VV Project Report
ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationEURASIP Journal on Wireless Communications and Networking
EURASIP Journal on Wreless Communcatons and Networkng Ths Provsonal PDF corresponds to the artcle as t appeared upon acceptance. Fully formatted PDF and full text (TM) versons wll be made avalable soon.
More informationA Feedback Reduction Technique for MIMO Broadcast Channels
A Feedback Reducton Technque for MIMO Broadcast Channels Nhar Jndal Department of Electrcal and Computer Engneerng Unversty of Mnnesota Mnneapols, MN 55455, USA Emal: nhar@umn.edu Abstract A multple antenna
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationError Probability for M Signals
Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal
More informationx = x 1 + :::+ x K and the nput covarance matrces are of the form ± = E[x x y ]. 3.2 Dualty Next, we ntroduce the concept of dualty wth the followng t
Sum Power Iteratve Water-fllng for Mult-Antenna Gaussan Broadcast Channels N. Jndal, S. Jafar, S. Vshwanath and A. Goldsmth Dept. of Electrcal Engg. Stanford Unversty, CA, 94305 emal: njndal,syed,srram,andrea@wsl.stanford.edu
More informationChapter 7 Channel Capacity and Coding
Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models
More informationPower Allocation for Distributed BLUE Estimation with Full and Limited Feedback of CSI
Power Allocaton for Dstrbuted BLUE Estmaton wth Full and Lmted Feedback of CSI Mohammad Fanae, Matthew C. Valent, and Natala A. Schmd Lane Department of Computer Scence and Electrcal Engneerng West Vrgna
More information2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification
E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationAntenna Combining for the MIMO Downlink Channel
Antenna Combnng for the IO Downlnk Channel arxv:0704.308v [cs.it] 0 Apr 2007 Nhar Jndal Department of Electrcal and Computer Engneerng Unversty of nnesota nneapols, N 55455, USA Emal: nhar@umn.edu Abstract
More informationA Note on Bound for Jensen-Shannon Divergence by Jeffreys
OPEN ACCESS Conference Proceedngs Paper Entropy www.scforum.net/conference/ecea- A Note on Bound for Jensen-Shannon Dvergence by Jeffreys Takuya Yamano, * Department of Mathematcs and Physcs, Faculty of
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More informationANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)
Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of
More informationA Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control
A ower Bound on SIR Threshold for Call Admsson Control n Multple-Class CDMA Systems w Imperfect ower-control Mohamed H. Ahmed Faculty of Engneerng and Appled Scence Memoral Unversty of ewfoundland St.
More informationAn Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control
An Upper Bound on SINR Threshold for Call Admsson Control n Multple-Class CDMA Systems wth Imperfect ower-control Mahmoud El-Sayes MacDonald, Dettwler and Assocates td. (MDA) Toronto, Canada melsayes@hotmal.com
More informationCOGNITIVE RADIO NETWORKS BASED ON OPPORTUNISTIC BEAMFORMING WITH QUANTIZED FEEDBACK
COGNITIVE RADIO NETWORKS BASED ON OPPORTUNISTIC BEAMFORMING WITH QUANTIZED FEEDBACK Ayman MASSAOUDI, Noura SELLAMI 2, Mohamed SIALA MEDIATRON Lab., Sup Com Unversty of Carthage 283 El Ghazala Arana, Tunsa
More informationResource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud
Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal
More informationRethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas
Retnng MIMO for Wreless etwors: Lnear Trougput Increases wt Multple Receve Antennas ar Jndal Unversty of Mnnesota Unverstat Pompeu Fabra Jont wor wt Jeff Andrews & Steven Weber MIMO n Pont-to-Pont Cannels
More informationPop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing
Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationJoint Scheduling and Power-Allocation for Interference Management in Wireless Networks
Jont Schedulng and Power-Allocaton for Interference Management n Wreless Networks Xn Lu *, Edwn K. P. Chong, and Ness B. Shroff * * School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette,
More informationComposite Hypotheses testing
Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter
More informationEqual-Optimal Power Allocation and Relay Selection Algorithm Based on Symbol Error Probability in Cooperative Communication
INTERNATIONAL JOURNAL OF COUNICATIONS Volume 1, 18 Equal-Optmal Power Allocaton and Relay Selecton Algorthm Based on Symbol Error Probablty n Cooperatve Communcaton Xn Song, Syang Xu and ngle Zhang Abstract
More informationHigh resolution entropy stable scheme for shallow water equations
Internatonal Symposum on Computers & Informatcs (ISCI 05) Hgh resoluton entropy stable scheme for shallow water equatons Xaohan Cheng,a, Yufeng Ne,b, Department of Appled Mathematcs, Northwestern Polytechncal
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationDistributed Power Control for Interference-Limited Cooperative Relay Networks
Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE ICC 2009 proceedngs Dstrbuted Power Control for Interference-Lmted Cooperatve
More informationPower Allocation/Beamforming for DF MIMO Two-Way Relaying: Relay and Network Optimization
Power Allocaton/Beamformng for DF MIMO Two-Way Relayng: Relay and Network Optmzaton Je Gao, Janshu Zhang, Sergy A. Vorobyov, Ha Jang, and Martn Haardt Dept. of Electrcal & Computer Engneerng, Unversty
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationCognitive Access Algorithms For Multiple Access Channels
203 IEEE 4th Workshop on Sgnal Processng Advances n Wreless Communcatons SPAWC) Cogntve Access Algorthms For Multple Access Channels Ychuan Hu and Alejandro Rbero, Department of Electrcal and Systems Engneerng,
More informationGeneralized Linear Methods
Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set
More informationLecture Notes on Linear Regression
Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationGlobal Sensitivity. Tuesday 20 th February, 2018
Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values
More informationReport on Image warping
Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.
More informationEstimation: Part 2. Chapter GREG estimation
Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the
More informationLecture 3. Ax x i a i. i i
18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest
More informationConsider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder.
PASSBAND DIGITAL MODULATION TECHNIQUES Consder the followng passband dgtal communcaton system model. cos( ω + φ ) c t message source m sgnal encoder s modulator s () t communcaton xt () channel t r a n
More informationAverage Decision Threshold of CA CFAR and excision CFAR Detectors in the Presence of Strong Pulse Jamming 1
Average Decson hreshold of CA CFAR and excson CFAR Detectors n the Presence of Strong Pulse Jammng Ivan G. Garvanov and Chrsto A. Kabachev Insttute of Informaton echnologes Bulgaran Academy of Scences
More informationPower law and dimension of the maximum value for belief distribution with the max Deng entropy
Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng
More informationOptimal Bandwidth and Power Allocation for
Optmal Bandwdth and Power Allocaton for 1 Sum Ergodc Capacty under Fadng Channels n Cogntve Rado Networks arxv:1006.5061v1 [cs.it] 25 Jun 2010 Xaowen Gong, Student Member, IEEE, Sergy A. Vorobyov, Senor
More informationParametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010
Parametrc fractonal mputaton for mssng data analyss Jae Kwang Km Survey Workng Group Semnar March 29, 2010 1 Outlne Introducton Proposed method Fractonal mputaton Approxmaton Varance estmaton Multple mputaton
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationVQ widely used in coding speech, image, and video
at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng
More informationMultigradient for Neural Networks for Equalizers 1
Multgradent for Neural Netorks for Equalzers 1 Chulhee ee, Jnook Go and Heeyoung Km Department of Electrcal and Electronc Engneerng Yonse Unversty 134 Shnchon-Dong, Seodaemun-Ku, Seoul 1-749, Korea ABSTRACT
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More informationOPTIMUM BEAMFORMING USING TRANSMIT ANTENNA ARRAYS. feasible points with monotonically decreasing costs).
OPTIMUM BEAMFORMING USING TRANSMIT ANTENNA ARRAYS Eugene Vsotsky Upamanyu Madhow Abstract - Transmt beamformng s a powerful means of ncreasng capacty n systems n whch the transmtter s eupped wth an antenna
More informationAn Improved multiple fractal algorithm
Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton
More informationOperating conditions of a mine fan under conditions of variable resistance
Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety
More informationSimulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests
Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth
More informationComputing MLE Bias Empirically
Computng MLE Bas Emprcally Kar Wa Lm Australan atonal Unversty January 3, 27 Abstract Ths note studes the bas arses from the MLE estmate of the rate parameter and the mean parameter of an exponental dstrbuton.
More informationOn Spatial Capacity of Wireless Ad Hoc Networks with Threshold Based Scheduling
On Spatal Capacty of Wreless Ad Hoc Networks wth Threshold Based Schedulng Yue Lng Che, Ru Zhang, Y Gong, and Lngje Duan Abstract arxv:49.2592v [cs.it] 9 Sep 24 Ths paper studes spatal capacty n a stochastc
More informationI + HH H N 0 M T H = UΣV H = [U 1 U 2 ] 0 0 E S. X if X 0 0 if X < 0 (X) + = = M T 1 + N 0. r p + 1
Homework 4 Problem Capacty wth CSI only at Recever: C = log det I + E )) s HH H N M T R SS = I) SVD of the Channel Matrx: H = UΣV H = [U 1 U ] [ Σr ] [V 1 V ] H Capacty wth CSI at both transmtter and
More informationLOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin
Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence
More informationSecret Communication using Artificial Noise
Secret Communcaton usng Artfcal Nose Roht Neg, Satashu Goel C Department, Carnege Mellon Unversty, PA 151, USA {neg,satashug}@ece.cmu.edu Abstract The problem of secret communcaton between two nodes over
More informationConvergence of random processes
DS-GA 12 Lecture notes 6 Fall 216 Convergence of random processes 1 Introducton In these notes we study convergence of dscrete random processes. Ths allows to characterze phenomena such as the law of large
More informationDUE: WEDS FEB 21ST 2018
HOMEWORK # 1: FINITE DIFFERENCES IN ONE DIMENSION DUE: WEDS FEB 21ST 2018 1. Theory Beam bendng s a classcal engneerng analyss. The tradtonal soluton technque makes smplfyng assumptons such as a constant
More informationResearch Article Green s Theorem for Sign Data
Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of
More informationDistributed Non-Autonomous Power Control through Distributed Convex Optimization
Dstrbuted Non-Autonomous Power Control through Dstrbuted Convex Optmzaton S. Sundhar Ram and V. V. Veeravall ECE Department and Coordnated Scence Lab Unversty of Illnos at Urbana-Champagn Emal: {ssrnv5,vvv}@llnos.edu
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationSimultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals
Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,
More informationCHANNEL state information (CSI) has a significant impact
Ffty-second Annual Allerton Conference Allerton House, UIUC, Illnos, USA October 1-3, 2014 Ergodc Capacty Under Channel Dstrbuton Uncertanty Sergey Loyka, Charalambos D. Charalambous and Ioanna Ioannou
More informationOn Information Theoretic Games for Interference Networks
On Informaton Theoretc Games for Interference Networks Suvarup Saha and Randall A. Berry Dept. of EECS Northwestern Unversty e-mal: suvarups@u.northwestern.edu rberry@eecs.northwestern.edu Abstract The
More informationCSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography
CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationChapter 7 Channel Capacity and Coding
Chapter 7 Channel Capacty and Codng Contents 7. Channel models and channel capacty 7.. Channel models Bnary symmetrc channel Dscrete memoryless channels Dscrete-nput, contnuous-output channel Waveform
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationSum Capacity of Multiuser MIMO Broadcast Channels with Block Diagonalization
Sum Capacty of Multuser MIMO Broadcast Channels wth Block Dagonalzaton Zukang Shen, Runhua Chen, Jeffrey G. Andrews, Robert W. Heath, Jr., and Bran L. Evans The Unversty of Texas at Austn, Austn, Texas
More informationTwo-Way and Multiple-Access Energy Harvesting Systems with Energy Cooperation
Two-Way and Multple-Access Energy Harvestng Systems wth Energy Cooperaton Berk Gurakan, Omur Ozel, Jng Yang 2, and Sennur Ulukus Department of Electrcal and Computer Engneerng, Unversty of Maryland, College
More informationThe Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction
ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also
More informationThe Geometry of Logit and Probit
The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.
More informationComparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method
Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method
More informationUniversity of Alberta. Library Release Form. Title of Thesis: Joint Bandwidth and Power Allocation in Wireless Communication Networks
Unversty of Alberta Lbrary Release Form Name of Author: Xaowen Gong Ttle of Thess: Jont Bandwdth and Power Allocaton n Wreless Communcaton Networks Degree: Master of Scence Year ths Degree Granted: 2010
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationOn mutual information estimation for mixed-pair random variables
On mutual nformaton estmaton for mxed-par random varables November 3, 218 Aleksandr Beknazaryan, Xn Dang and Haln Sang 1 Department of Mathematcs, The Unversty of Msssspp, Unversty, MS 38677, USA. E-mal:
More informationMarkov Chain Monte Carlo Lecture 6
where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways
More informationMMA and GCMMA two methods for nonlinear optimization
MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons
More informationMatrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD
Matrx Approxmaton va Samplng, Subspace Embeddng Lecturer: Anup Rao Scrbe: Rashth Sharma, Peng Zhang 0/01/016 1 Solvng Lnear Systems Usng SVD Two applcatons of SVD have been covered so far. Today we loo
More informationA PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS
HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,
More informationon the improved Partial Least Squares regression
Internatonal Conference on Manufacturng Scence and Engneerng (ICMSE 05) Identfcaton of the multvarable outlers usng T eclpse chart based on the mproved Partal Least Squares regresson Lu Yunlan,a X Yanhu,b
More informationSystem in Weibull Distribution
Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co
More informationStanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011
Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected
More informationDistributed Transmit Diversity in Relay Networks
Dstrbuted Transmt Dversty n Relay etworks Cemal Akçaba, Patrck Kuppnger and Helmut Bölcske Communcaton Technology Laboratory ETH Zurch, Swtzerland Emal: {cakcaba patrcku boelcske}@nareeethzch Abstract
More informationExact-Regenerating Codes between MBR and MSR Points
Exact-Regeneratng Codes between BR SR Ponts arxv:1304.5357v1 [cs.dc] 19 Apr 2013 Abstract In ths paper we study dstrbuted storage systems wth exact repar. We gve a constructon for regeneratng codes between
More informationJAB Chain. Long-tail claims development. ASTIN - September 2005 B.Verdier A. Klinger
JAB Chan Long-tal clams development ASTIN - September 2005 B.Verder A. Klnger Outlne Chan Ladder : comments A frst soluton: Munch Chan Ladder JAB Chan Chan Ladder: Comments Black lne: average pad to ncurred
More informationThe optimal delay of the second test is therefore approximately 210 hours earlier than =2.
THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple
More informationLinear Regression Analysis: Terminology and Notation
ECON 35* -- Secton : Basc Concepts of Regresson Analyss (Page ) Lnear Regresson Analyss: Termnology and Notaton Consder the generc verson of the smple (two-varable) lnear regresson model. It s represented
More informationNegative Binomial Regression
STATGRAPHICS Rev. 9/16/2013 Negatve Bnomal Regresson Summary... 1 Data Input... 3 Statstcal Model... 3 Analyss Summary... 4 Analyss Optons... 7 Plot of Ftted Model... 8 Observed Versus Predcted... 10 Predctons...
More informationA new construction of 3-separable matrices via an improved decoding of Macula s construction
Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula
More informationMulti-beam multiplexing using multiuser diversity and random beams in wireless systems
Mult-eam multplexng usng multuser dversty and random eams n reless systems Sung-Soo ang Telecommuncaton R&D center Samsung electroncs co.ltd. Suon-cty Korea sungsoo.hang@samsung.com Yong-an Lee School
More informationOn the achievable rates of multiple antenna broadcast channels with feedback-link capacity constraint
Chen et al. EURASI Journal on Wreless Communcatons and Networkng 2, 2:2 http://jwcn.euraspjournals.com/content/2//2 RESEARCH Open Access On the achevable rates of multple antenna broadcast channels wth
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationTemperature. Chapter Heat Engine
Chapter 3 Temperature In prevous chapters of these notes we ntroduced the Prncple of Maxmum ntropy as a technque for estmatng probablty dstrbutons consstent wth constrants. In Chapter 9 we dscussed the
More informationSIO 224. m(r) =(ρ(r),k s (r),µ(r))
SIO 224 1. A bref look at resoluton analyss Here s some background for the Masters and Gubbns resoluton paper. Global Earth models are usually found teratvely by assumng a startng model and fndng small
More informationApproximately achieving Gaussian relay network capacity with lattice codes
Approxmately achevng Gaussan relay network capacty wth lattce codes Ayfer Özgür EFL, Lausanne, Swtzerland ayfer.ozgur@epfl.ch Suhas Dggav UCLA, USA and EFL, Swtzerland suhas@ee.ucla.edu Abstract Recently,
More informationOn an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1
On an Extenson of Stochastc Approxmaton EM Algorthm for Incomplete Data Problems Vahd Tadayon Abstract: The Stochastc Approxmaton EM (SAEM algorthm, a varant stochastc approxmaton of EM, s a versatle tool
More information