INTERFERENCE AVOIDANCE FOR WIRELESS SYSTEMS WITH MULTIPLE RECEIVERS

Size: px
Start display at page:

Download "INTERFERENCE AVOIDANCE FOR WIRELESS SYSTEMS WITH MULTIPLE RECEIVERS"

Transcription

1 INTERFERENCE AVOIDANCE FOR WIRELESS SYSTEMS WITH MULTIPLE RECEIVERS BY OTILIA POPESCU A dissertation submitted to the Graduate School New Brunswick Rutgers, The State University of New Jersey in partial fulfillment of the requirements for the degree of Doctor of Philosophy Graduate Program in Electrical and Computer Engineering Written under the direction of Professor Christopher Rose and approved by New Brunswick, New Jersey May, 2004

2 c 2004 Otilia Popescu ALL RIGHTS RESERVED

3 ABSTRACT OF THE DISSERTATION Interference Avoidance for Wireless Systems with Multiple Receivers by Otilia Popescu Dissertation Director: Professor Christopher Rose Interference avoidance is a class of adaptive modulation techniques in which, with feedback from the receiver, a transmitting radio is instructed to vary its waveform so as to maximize the signalto-interference plus noise-ratio. For an ensemble of users connected to a single receiver interference avoidance methods have been thoroughly analyzed. This thesis provides insight into application of interference avoidance methods to systems with multiple transmitters and receivers, which consist of a collection of base stations and associated users that share the same bandwidth for communication. After a brief review of interference avoidance for single base station systems, we present a codeword adaptation algorithm for collaborative multi-base wireless systems based on greedy interference avoidance. The system is modeled with multiple inputs and multiple outputs and information is transmitted using multicode CDMA. We continue with the collaborative scenario and derive bounds on sum capacity and total squared correlation in the case of flat channels between users and bases. We also investigate structural properties which must be satisfied by user transmit covariance matrices at the optimal sum capacity/tsc point, and show that for multi-base systems maximizing sum capacity and minimizing TSC are in general not equivalent problems. Application of greedy interference avoidance in a non-collaborative scenario is presented next, starting with a simple system consisting of two bases, each base having only one user associated ii

4 with it. Fixed points of the greedy interference avoidance algorithm in this case correspond to a simultaneous water filling solution which is also a Nash equilibrium for the system, and in general is not unique. A detailed analysis of simultaneous water filling for mutually interfering systems, as is the case with non-collaborative multi-base systems, is also included in the thesis. We show that water filling alone does not generally result in optimum resource sharing and in some cases is a poor solution. For weakly interfering systems we show that the simultaneous water filling solution is unique, but this solution is sub-optimal since usually simple separation of users in signal space offers much better performance. We also present a distributed algorithm which iteratively moves users toward separation in the signal space. For strongly interfering systems the simultaneous water filling solution implies a set of fixed points, among which the information theoretic capacities of users vary widely, and in this case we propose a procedure to move the system from a possible sub-optimal point to a better simultaneous water filling fixed point, eventually to the optimal point. iii

5 Acknowledgements When something comes to an end you look back and think of all the people that have been with you and helped you, and you feel indebted to all of them. Same with my doctoral studies at Rutgers University, a wonderful time of my life. First I would like to thank my advisor, Professor Christopher Rose, without whose guidance I could not have written this thesis. He opened my way to a new field, that of wireless communications, and guided my first steps into this new world. I am grateful to him for his confidence in my abilities, for his permanent support, and for all those moments when with a smiling face he encouraged me and never let me down. The other members of my doctoral committee are also gratefully acknowledged: Professors Zoran Gajić, Narayan Mandayam, and Roy Yates, of WINLAB, and Professor Şennur Ulukuş of University of Maryland, who served as the external examiner in the committee. Special thanks are due to Dr. Joseph Wilder, of the Center for Advanced Information Processing (CAIP) for his guidance and support in the early stages of my doctoral program at Rutgers. I owe Chris the honor of making me a part of the WINLAB team, but I would like to thank everybody in this wonderful team for making WINLAB such a great place for research and study. I feel fortunate for having had the chance to learn from the excellent researchers and teachers at WINLAB. I would also like to thank the technical and administrative staff at WINLAB: Ivan Seskar, Kevin Wine, Melissa Gelfman, Noreen DeCarlo, Elaine Connors, and Jeanne Sullivan. Many other people helped me greatly along the way, and I would also like to thank Barbara Klimkiewicz, Lynn Ruggiero and Dianne Coslit, in the ECE Department, and Urmi Otiv in the Center for International Faculty and Student Services at Rutgers. Barbara was especially close to me during difficult times, and I thank her for her warmth and support. Finally, I would like to express my gratitude to my family. I will never find the best words to thank my parents. In all my hard moments I was thinking of my mother, and how she always told iv

6 me that since I was a little girl I dreamed to be a researcher and think of something that nobody else did before. She did everything she could to help me pursue my dream. I am deeply grateful to my father for his constant support throughout the years, for the trust he always had in all my decisions, and for dreaming with me how wonderful the world can be. I will never forget his words when he called me a runner in a long race, telling me to never get discouraged by a small failure, to always stand up and look forward for the next target. From where they are, I know they both look smiling now to me. I have special thanks to my husband and life long best friend Dimitrie, for standing by me all this time. I hope I can help him as much as he helps me. Last, but not least, my thoughts turn to our son, Gabriel. I started my studies at Rutgers in the seventh month of pregnancy, and all these years I shared my time between my son and my studies. He changed our life in a way I never thought before, and I thank him for this. Now, at six years old, he dreams to be an astronaut, a diver, a scientist, a doctor and an inventor, to build machines that nobody else was ever able to build before, reminding me of my own little girl dreams. I thank you all, and hope I made you proud of my accomplishments. This research was supported by the National Science Foundation under grant CCR , and by the New Jersey Commission on Science and Technology under the New Jersey Center for Wireless Technologies grant v

7 Dedication to GABRIEL, wishing him to be lucky to fulfill his dreams vi

8 Table of Contents Abstract ii Acknowledgements iv Dedication vi List of Figures x 1. Introduction Interference Avoidance: A Brief Review of Single Base Results Greedy Interference Avoidance and The Eigen-Algorithm Greedy Interference Avoidance for Multiaccess Vector Channels Thesis Road Map Greedy SINR Maximization in Collaborative Multi-Base Systems Problem Statement Greedy SINR Maximization Through Distributed Codeword Adaptation Fixed Point Properties of the Greedy SINR Maximization Algorithm Making the Connection with Sum Capacity Maximization Numerical Results and Discussion Full Codeword Complement (N CodewordsPerUser) One Codeword Per User Chapter Summary Sum Capacity and TSC Bounds in Collaborative Multi-Base Systems Problem Statement Bounds on Sum Capacity vii

9 3.3. Bounds on GTSC Incorporating Carrier Phase Delays Chapter Summary A. Proof of Theorem A.1. The J = 2 case A.2. The Recursive Extension for J> B. Proof of Theorem Greedy Interference Avoidance in Non-Collaborative Multi-Base Systems The Greedy Interference Avoidance Algorithm Fixed Points and Social Optimum: Nash Equilibrium Chapter Summary Analyzing the Water Filling Distribution for Multiple Bases Simultaneous Water Filling Structures Complete Overlap Between Users Incomplete Overlap Between Users The case of k 1,k 2 <N The case of k 1 = N and k 2 <N No Overlap Between Users The Simultaneous Water Filling Region More Than Two User-Base Pairs Chapter Summary Weakly Interfering Systems: Simultaneous Water Filling Versus Signal Space Partitioning Simultaneous Water Filling: An Inefficient Nash Equilibrium The Social Optimum for a Multiple User/Base System A Distributed Splitting Algorithm Chapter Summary viii

10 7. Improving Performance for Strongly Interfering Systems Strong Interference and Simultaneous Water Filling A Procedure for Performance Improvement The Bouncing Region Chapter Summary Conclusions and Future Work Thesis Summary Future Directions References Vita ix

11 List of Figures 1.1. Multicode CDMA approach for sending frames of information. Each symbol in user l s frame is assigned a distinct signature waveform and the transmitted signal is a superposition of all signatures scaled by their corresponding information symbols A multibase system with B receiving bases and L transmitting locations, each location k using M k signatures. Triangles denote receivers and circles denote transmitters/users A system with two transmitters and two receivers Distribution of Eigenvalues of Covariance Matrices R 1 and R 2 Corresponding to Simultaneous Water Filling for a Two User-Base System with N =6,g 1 =0.2311, g 2 =0.6068, and η 0 = Distribution of Eigenvalues of Covariance Matrices R 1 and R 2 Corresponding to Simultaneous Water Filling for a Two User-Base System with N =6,g 1 =1.7643, g 2 =4.0658, and η 0 = Distribution of Eigenvalues of Covariance Matrices R 1, R 2,andR 3 Corresponding to Simultaneous Water Filling for a Three User-Base System Water Filling Distribution of Power From a Single User Perspective Simultaneous Water Filling Distribution of Power for Two Users Complete overlap between users Incomplete overlap between users Incomplete Overlap Between Users: The Nesting Case Complete separation between users Simultaneous Water Filling Region as a Function of Gain Simultaneous Water Filling Versus User Separation for g 1 g 2 < Simultaneous Water Filling For a System with Three User-Base Pairs x

12 5.10. Simultaneous Water Filling with Three Users Separated in the Signal Space Capacity variations as a function of user subspace width Water-filling and separation collective capacity as a function of gain and noise level for a symmetric system with M = 2 users Water-filling and separation collective capacity as a function of gain and noise level for a symmetric system with M = 5 users Water-filling and separation collective capacity as a function of gain and noise level for a symmetric system with M = 100 users The splitting algorithm for M = 3 users. In step k = 1, users 1, 2 and 3 each retreat from half the signal space which half is arbitrary but shown simply-connected for clarity. In step k = 2, users 1 and 2 then retreat from one third of their current occupancy which in this case is only a portion of that which they share with user 3. User 3 then retreats from the dimensions which overlap users 1 and 2 to fully complete the process The strong interference case. A user is closer to the base to which it produces interference, than to the base to which its transmission is intended The variation of r max in equation (7.6) as a function of number of users and noise level for P = N = 100. Peak value for η 0 =0.5, 1, 5, 10 corresponds to n =2, 4, 20, User 1 s attack for dimension k shared with user User 1 s attack for dimension k occupied by user 2 only Competing for maximum signal space occupancy Capacity variations during the learning game for g =2,P = N = 100, η 0 = Signal space partition for two orthogonal users Comparing the capacity performances between collaborative and non-collaborative scenarios xi

13 1 Chapter 1 Introduction Recent developments in telecommunications, in particular the emergence of software radios [1, 2, 28, 29, 50, 51], and the release of unlicensed spectrum for the Unlicensed National Information Infrastructure (U-NII) [10], have opened new research directions in the area of wireless systems. The versatility of transmitters and receivers implied by software radios, which allow adaptation of modulation and demodulation methods for transmitters and receivers in a wireless system, has generated increased interest in adaptive modulation techniques, in particular in the area of codeword optimization for CDMA systems [12,18,23,25,56 60]. In addition, operation in unlicensed environments where mutually interfering independent systems will have to coexist with no central control or coordination, poses additional challenges from a spectrum management perspective in order to achieve efficient use of the available shared bandwidth. This thesis provides insight into application of interference avoidance methods to systems with multiple transmitters and receivers, which consist of a collection of base stations and associated users that share the same bandwidth for communication. Interference avoidance is a class of adaptive modulation techniques in which, with feedback from the receiver, a transmitting radio is instructed to vary its waveform so as to maximize the signalto-interference plus noise-ratio (SINR). For an ensemble of users connected to a single receiver, which corresponds to the uplink of a single base wireless system, interference avoidance methods have been thoroughly analyzed [31, 38, 45, 46], and it has been shown that they lead to optimized use of the shared medium, which can be reached in a distributed fashion, through individual greedy optimization by each user. From an abstract signal space perspective, the socially optimal solution for single base systems corresponds to a simultaneous water filling distribution of user powers [63, 64], in which each user performs a water filling of its corresponding signal space while regarding all other users in the

14 2 system as noise. A simultaneous water filling solution can be achieved for multiple base systems as well, either by application of interference avoidance, or through alternative methods like iterative water filling [63,64]. The thesis provides an in-depth analysis of simultaneous water filling for multi base systems, and shows that, unlike single base systems, this does not always correspond to a socially optimal solution. 1.1 Interference Avoidance: A Brief Review of Single Base Results Interference avoidance methods allow users in a CDMA system to adapt their codewords, or signature sequences, to achieve better performance. The main criterion used in the codeword adaptation process is maximization of the signal-to-interference plus noise-ratio. Interference avoidance was originally introduced in the context of MMSE receiver filters [55, 56], but we concentrate our attention on greedy interference avoidance which uses matched filter receivers and was introduced in [45, 46] and explored in more detail in [31] Greedy Interference Avoidance and The Eigen-Algorithm In order to review the greedy interference avoidance procedure we consider the uplink of a synchronous CDMA system represented in an arbitrary N-dimensional signal space, in which each user l is assigned a unit norm N-dimensional codeword s l, to convey its information symbol b l. The received signal vector at the base station receiver is L r = b l s l + n = Sb + n (1.1) l=1 where S is the N L codeword matrix having the user codewords s l as columns, b =[b 1...b L ] is the vector containing the information symbols sent by users, and n is the additive noise vector that corrupts the received signal. The covariance matrix of the received signal is R = E[rr ]=SS + W (1.2) Assuming simple matched filters at the receiver for all users, the signal-to-interference plus noise-ratio (SINR) for user l is γ l = 1 s l R ls l (1.3)

15 3 with R l = R s l s l being the covariance matrix of the interference-plus-noise seen by user l. In this framework, greedy interference avoidance is defined by replacement of user l s codeword s l with the minimum eigenvector of R l. This procedure is referred to as greedy interference avoidance since by replacing its current codeword with the minimum eigenvector of the interferenceplus-noise correlation matrix, user l avoids interference by placing its transmitted energy in that region of the signal space with minimum interference-plus-noise energy and greedily maximizes SINR without looking at the potentially negative effects this may have on other users in the system. In addition to maximizing user l s SINR, greedy interference avoidance also monotonically increases sum capacity [31, 34, 38] C s = 1 2 log (det R) 1 log(det W) (1.4) 2 Sequential application by all users of this greedy SINR maximization procedure defines the eigenalgorithm for interference avoidance [38, 46], formally stated below: The Eigen-Algorithm 1. Start with a randomly chosen codeword ensemble specified by the codeword matrix S 2. For each user l =1...L replace user l codeword s l with the minimum eigenvector of the autocorrelation matrix of the corresponding interference-plus-noise process R l 3. Repeat step 2 until a fixed point is reached. Numerically, a fixed point of the eigen-algorithm is defined with respect to a stopping criterion. That is, we say that a fixed point is reached when the difference between two consecutive values of the stopping criterion is within a specified tolerance ɛ. The stopping criterion can be an individual one, like the codeword SINR or the Euclidian distance between codewords and their corresponding replacements, or a global one like sum capacity. We note that in the case of individual stopping criteria all values corresponding to all codewords must be within specified tolerance for the algorithm to stop. Mathematically, convergence of the eigen-algorithm to a fixed point is ensured by the

16 4 fact that the algorithm monotonically increases sum capacity, and that sum capacity is upper bounded. While this does not necessarily imply that the fixed point is unique, and theoretically many fixed points of the eigen-algorithm are possible, empirical evidence [46] has shown that when starting with randomly chosen codewords this fixed point is the optimal point where sum capacity C s is maximized. A thorough theoretical analysis of eigen-algorithm fixed point properties can be found in [45] along with a procedure to escape any suboptimal fixed points. Thus, the eigen-algorithm (with escape modifications) always converges to the optimal fixed point where the resulting codeword ensemble maximizes sum capacity. As a necessary by-product, the aggregate power distribution corresponds to a water filling distribution over those dimensions of the signal space with minimum noise energy. We emphasize that the water filling solution and the implied maximization of sum capacity are emergent properties of greedy interference avoidance, as individual users do not directly attempt to maximize sum capacity through an individual or ensemble water filling scheme, but rather, they greedily maximize the SINR of their own codeword. In fact, individual water filling schemes over the whole signal space are impossible in this framework since each user s transmit covariance matrix X l = s l s l is of rank one and cannot possibly span the N-dimensional signal space. We also note that the aggregate water filling of the signal space implies that all users achieve uniform maximum SINR [46], and that matched filters are optimal linear receivers in this case [58, 59] Greedy Interference Avoidance for Multiaccess Vector Channels Application of greedy interference avoidance can be extended to general multiaccess vector channels for which the received signal at the base station receiver is expressed (see [33, 38, 64]) L r = H l x l + n (1.5) l=1 where x l of dimension N l is the input vector corresponding to user l, l =1,...,L, r of dimension N is the received vector at the common receiver corrupted by additive noise vector n of the same dimension, and H l is the N N l channel matrix corresponding to user l. It is assumed that N N l, l =1,...,L. This is a general approach to a multiuser communication system in which different users reside in different signal subspaces, with possibly different dimensions and potential

17 5 User l symbols (frame) Serial to Parallel ( l ) b1 ( l ) b i x x ( l ) s 1 ( l) s i + x = l ( l ) ( l ) bi s i i Σ ( l) b Ml x ( l) s M l Figure 1.1: Multicode CDMA approach for sending frames of information. Each symbol in user l s frame is assigned a distinct signature waveform and the transmitted signal is a superposition of all signatures scaled by their corresponding information symbols. overlap between them, but all of which are subspaces of the receiver signal space. We note that each user s signal space as well as the receiver signal space are of finite dimension implied by a finite signaling interval T, and finite bandwidths W l for each user l, respectively W for the receiver (which includes all W l s corresponding to all users) [24]. We also note that for memoryless channels the channel matrix H l merely relates the bases of user l signal space and receiver signal space, but a similar model applies to channels with memory in which case the channel matrix H l also incorporates channel attenuation and multipath [34, 44, 64]. In this signal space setting we assume that during the signaling interval of duration T each user l sends a frame of data using a multicode CDMA approach wherein each symbol is transmitted using a distinct signature waveform which spans the frame. This scenario is depicted in Figure 1.1. That is, the sequence of information symbols b l =[b (l) 1...b(l) M l ] is transmitted as a linear superposition of distinct, unit-energy waveforms s (l) m (t) x l (t) = M l b (l) m s(l) m m=1 as if each symbol in the frame corresponded to a distinct virtual user. (t) (1.6) In the N l -dimensional signal space corresponding to user l, each waveform can be represented as an N l -dimensional vector, thus the input vector x l corresponding to user l is equivalent to a

18 6 linear superposition of unit norm codeword column vectors s (l) m scaled by the corresponding b (l) m. That is, each user uses an N l M l codeword matrix S l S l = s (l) 1 s (l) 2 s (l) M l so that (1.7) Therefore, the received signal can be rewritten as r = x l = S l b l (1.8) L H l S l b l + n (1.9) l=1 Note that under the assumption that M l N l,then l N l transmit covariance matrix of user l, X l = E[x l x l ]=S ls l, has full rank and spans user l s signal space. Extension of the greedy interference avoidance procedure to this general multiaccess vector channel setting is presented in [31,33,38]. The procedure starts by separating the interference-plusnoise seen by a given user k and rewriting the received signal in equation (1.9) from the perspective of user k as r = H k S k b k + L H l S l b l + n l=1,l k }{{} z k =interference + noise The covariance matrix of the interference-plus-noise seen by user k Z k = E[z k z k ]= L l=1,l k = H k S k b k + z k (1.10) H l S l S l H l + W (1.11) is then used to define a whitening transformation T k of the interference-plus-noise seen by user k. The equivalent problem in which user k sees white interference-plus-noise is then projected onto the user k signal space using the singular value decomposition (SVD) [53, p. 442] of user k s transformed channel matrix. This reduces the problem to an equivalent one given by an equation identical in form to equation (1.1) which allows straightforward application of greedy interference avoidance. In this case numerous interference avoidance algorithms can be formulated based on repeated application of the greedy interference avoidance procedure presented in the previous section. These

19 7 are defined by the various ways in which user codewords are selected for replacement. For example, one algorithm could be defined by replacement at a given step of one codeword of a given user, followed by replacement of a randomly selected codeword of a randomly selected user. Alternatively, at a given step of the algorithm, one could replace the codeword with the lowest SINR over all codewords and users. Or one could replace the codeword which will yield the maximum increase in sum capacity. We note that, since greedy interference avoidance monotonically increases sum capacity, all these procedures are guaranteed to reach a fixed point. Furthermore, when users have at least as many codewords as signal space dimensions, this fixed point reached by interference avoidance invariably corresponds to a simultaneous water filling solution for all users [31 33, 38] and corresponds to an ensemble of codewords which maximizes sum capacity [63, 64]. We conclude our review of interference avoidance by noting that greedy interference avoidance is a versatile tool for codeword optimization in CDMA systems, and can be applied for various scenarios. Among these we mention codeword optimization in the uplink of a CDMA system with non-ideal (dispersive) channels, multiuser systems with multiple inputs and outputs (MIMO), and asynchronous CDMA systems [34 37]. 1.2 Thesis Road Map For each chapter, a detailed introduction, literature review about the specific problem, and a statement of the problem are presented in the begining in an attempt to make chapters more independently readable. In Chapter 2 we present a codeword adaptation algorithm for collaborative multi-base wireless systems. The system is modeled with multiple inputs and multiple outputs (MIMO) in which information is transmitted using multicode CDMA, and codewords are adapted based on greedy maximization of the SINR. The procedure monotonically increases sum capacity, and repeated iteratively for all codewords in the system converges to a fixed point. Fixed-point properties and a connection with sum capacity maximization, along with a discussion of simulations that corroborate the basic analytic results, are also included in Chapter 2. In Chapter 3 we continue with the collaborative scenario and derive bounds on sum capacity and

20 8 total squared correlation in the case of flat channels between users and bases. We also investigate structural properties which must be satisfied by user transmit covariance matrices at the optimal sum capacity/tsc point, and show that for multi-base systems maximizing sum capacity and minimizing TSC are in general not equivalent problems. A new mathematical result on determinant maximization for a special class of block partitioned matrices is also presented in Chapter 3. Application of greedy interference avoidance in a non-collaborative scenario is presented next in Chapter 4. We start with a very simple system consisting of two bases, each base having only one user associated with it, for which we apply greedy interference to adaptation of user codewords. Fixed points of the greedy interference avoidance algorithm correspond to a simultaneous water filling solution which is also a Nash equilibrium for the system, and in general is not unique. A detailed analysis of simultaneous water filling is presented in Chapter 5 where we seek to analytically understand properties of different fixed points that correspond to a simultaneous water filling distribution. We show that water filling alone does not generally result in optimum resource sharing and in some cases is a poor solution. In Chapter 6 we continue our analysis of a non-collaborative system and focus on the weak mutual interference case for which the simultaneous water filling solution is unique. We show that when users at other bases are treated as Gaussian noise, simple separation of users in signal space usually offers much better performance than simultaneous water filling, and present a distributed algorithm which iteratively moves users toward greater separation in the signal space. In Chapter 7 we follow the analysis of the strong interference case for which the simultaneous water filling solution implies not an unique fixed point but a set of fixed points, among which the information theoretic capacities of users vary widely. We propose a dynamic game to move the system from a possible suboptimal point to a better simultaneous water filling fixed point, eventually to the optimal point. The results in this thesis have been presented in part at previous conferences. The work on interference avoidance and in a collaborative scenario in Chapters 2 and 3 was presented in part at the 39 th Annual Allerton Conference on Communication, Control, and Computing [39, 40]. Maximizing the determinant for a special class of block-partitioned matrices is a new mathematical result that will appear in [42]. The analysis of simultaneous water filling for non-collaborative

21 9 systems in Chapter 5 was presented at the 2003 IEEE Global Telecommunications Conference GLOBECOM 03 [41], and the strong interference case was presented at the 38 th Conference on Information Sciences and Systems CISS 04 [43].

22 10 Chapter 2 Greedy SINR Maximization in Collaborative Multi-Base Systems We consider a wireless communication system with multiple transmitters and receivers geographically distributed over some area as described schematically in Figure 2.1. We assume that the available spectrum is shared by all users and bases, as is the case in unlicensed bands, and make the simplifying assumption that receivers are allowed to share information using a sufficiently high speed backbone. As a specific example, imagine an abstraction of WiFi/ access points which can share information over a high speed landline to do joint decoding. This implies that the system under consideration can be regarded as a system with multiple inputs and multiple outputs (MIMO), unlike the usual cellular scenario in which users are assigned to bases based on a quality of service criterion (like the signal-to-interference-plus-noise-ratio SINR for example). However, unlike most MIMO systems where individual antenna elements are assumed co-located, here they are geographically dispersed and cannot share power budgets. We note that in a usual cellular system, when no cooperation among users/bases is assumed, the problem of decoding one user at its associated base station under interference generated by all the other users in the system is an instance of the interference channel [13, Ch. 14], and is still a mostly open research problem. The collaborative scenario considered here provides upper bounds on various measures of interest as one can do no better than jointly decode, and has been treated by researchers in previous work dealing with systems with multiple transmitters and receivers [17, 20, 54]. While unusual in the context of current multiple base cellular communications systems where, in general, bases do not share information, the availability of relatively low-cost high-speed terrestrial links makes collaboration practicable in future generation wireless systems. We present a codeword adaptation algorithm for collaborative multi-base wireless systems based on greedy SINR maximization. A multicode CDMA approach is used for transmitting information, and the algorithm is based on selfish optimization of individual SINRs. We show that, in addition

23 11 S NxM 1 1 B 2 S NxM L L B 1 NxM 4 S 4 B B S NxM 2 2 NxM 3 S 3 Figure 2.1: A multibase system with B receiving bases and L transmitting locations, each location kusingm k signatures. Triangles denote receivers and circles denote transmitters/users. to maximizing SINRs at each step, the algorithm monotonically increases sum capacity, which is a global criterion. Fixed-point properties of the proposed algorithm are investigated, and the connection with sum capacity maximization is made. We note that the optimal fixed point of the algorithm corresponds to maximum sum capacity and optimal codeword ensembles satisfy a simultaneous water filling solution [64]. However, the algorithm is not a water filling procedure, but a codeword adaptation one, and in the most general scenario replacement of one codeword of one user is followed by replacement of another codeword of a different user. In fact, when the number of codewords assigned to users is such that the transmit covariance matrices do not have full rank, then water filling schemes may not even be applicable, since maximization of sum capacity under trace and rank constraints on user transmit covariance matrices is no longer a convex optimization problem and does not enjoy global convergence properties [61]. We have also performed simulations to corroborate our analytical results. 2.1 Problem Statement The system model is depicted in Figure 2.1 and consists of B base stations that are situated in a given geographical area, and L users transmitting from various locations within the same region. We assume a common signal space representation of dimension N for all users/bases implied by

24 12 finite bandwidth and finite signaling interval constraints [24]. In this signal space setting we assume that during each signaling interval of duration T users transmit frames of data using a multicode CDMA approach in which each symbol in a given user s frame is assigned a distinct signature (codeword), and the transmitted signal is a superposition of all the codewords scaled by their corresponding information symbols, as described schematically in Figure 1.1. Thus, each user l at a given location transmits the signal where x l = M l m=1 S l = s (l) m b (l) m = S l b l, l =1,...,L (2.1) s (l) 1 s (l) m s (l) M l (2.2) is the N M l codeword matrix corresponding to user l, andb l =[b (l) 1...b(l) M l ] is the vector containing the information symbols transmitted by user l that are assumed uncorrelated, with zero mean and unit variance. We note that the model is general and allows coexistence of users with different data rates, since the number of symbols in a frame transmitted during a signaling interval of duration T may not be the same for all users. All signature sequences are assumed to have unit energy, s (l) m =1, m =1,...,M l,l =1,...,L, and user transmit power, which is the same for all symbols in the frame and should appear as a scalar multiplying the codeword matrix, is incorporated in the N N gain matrix G lj which characterizes the vector channel between user l and base station j. In general, this gain matrix incorporates channel attenuation and multipath [64]. The received signal at base station j is L r j = G lj S l b l + w j j =1,...,B (2.3) l=1 where w j is an additive Gaussian noise term with covariance matrix W j. Assuming collaboration, the information received at all base stations is pooled, forming a BN-dimensional received vector r 1 L G l1 w 1. =. S l b l +. (2.4) r B } {{ } r l=1 G lb } {{ } G l w B } {{ } w

25 13 with correlation matrix L R = E[rr ]= R(l)+W (2.5) where matrix R(l) represents user l s contribution to R and is expressed in terms of its codeword and corresponding gain matrices as l=1 R(l) =G l S l S l G l (2.6) and W is the covariance matrix of the resulting noise vector w. Thuswehave L R = G l S l S l G l + W (2.7) l=1 Under Gaussian signaling and noise assumptions, sum capacity for the multi-base system with collaboration in equation (2.4) is given by [20] Csum = 1 2 log R 1 log W (2.8) 2 which is identical to the sum capacity of a MIMO system described by a similar equation [64]. Our objective is to define a codeword adaptation algorithm which iteratively updates codewords of all users in the system until an optimal ensemble of codewords is obtained. While our algorithm is greedy and based on maximization of the SINR for individual codewords, it also monotonically increases sum capacity, and in so doing leads the system toward the socially optimal ensemble corresponding to maximum sum capacity. 2.2 Greedy SINR Maximization Through Distributed Codeword Adaptation For the MIMO system in equation (2.4) we assume linear filtering at the receiver, and would like to adjust codewords in the system, one at a time, so that their SINR is maximized. This is a two-step process, in which we first derive the expression of the linear filter which yields maximum SINR for a given codeword, and then look to replace the codeword with a new one which will increase the SINR. A similar approach was used for a single base system in [56]. However, the algorithm in [56] updates codewords by replacing them with the current maximum SINR filter, as opposed to choosing a codeword and a filter which absolutely maximize the SINR as we are doing here.

26 14 We simplify our notation and express the covariance matrix in equation (2.7) in terms of individual codewords s i, rather than user codeword matrices, as R = M M G i s }{{} i s i G i + W = y i yi + W (2.9) y i i=1 i=1 where M = L l=1 M l is the total number of codewords in the ensemble, and the gain matrix G i will be equal for all the codewords of a given user under the multicode assumption. This is because in the most general scenario one may replace one codeword of a given user followed by replacement of one codeword of a different user. Thus, it is not the user index which is relevant in the update process, but the codeword index in the ensemble. We denote by c i the NB-dimensional linear filter associated with the received vector y i = G i s i which implies that the SINR for codeword s i is γ i = (c i y i) 2 M (c i y k ) 2 + E[(c i n) 2 ] k i = c i c i y iyi c i [ R y i yi ] c i = c i y i y i c i c i R ic i (2.10) where R i = R y i y i. Since R i is positive definite 1 we can consider an eigen-decomposition R i = Φ i Λ i Φ i, and define a new vector z i = Λ 1/2 i Φ i c i, such that c i = ΦΛ 1/2 i z i. This implies that the SINR for codeword s i can be rewritten as γ i = z i Λ 1/2 i Φ i y iyi Φ iλ 1/2 i z i z i z (2.11) i which represents the Rayleigh quotient of a rank one matrix and is maximized when z i = Λ 1/2 i Φ i y i. Thus, the SINR maximizing linear filter c i is which is an MMSE type filter [26] and for which the SINR value is c i = R 1 i y i = R 1 i G i s i (2.12) γ i = yi R 1 i y i = s i G i R 1 i G i s i (2.13) We now note that γ i is maximized when s i is the eigenvector x i corresponding to the maximum eigenvalue (maximum eigenvector for short) of G i R 1 i G i. Thus, replacement of codeword s i by 1 R i contains the noise covariance matrix W which is positive definite; otherwise, the capacity will be infinite.

27 15 x i maximizes the SINR of codeword i which becomes γ i = x i G i R 1 i G i x i γ i (2.14) Applying this procedure iteratively for all codewords in the ensemble defines a codeword adaptation algorithm which is formally stated below: Greedy SINR Maximization Algorithm 1. Initialize codewords {s i } and gain matrices G i 2. For each codeword in the ensemble i =1,...,M do Replace codeword s i with the maximum eigenvector of the matrix G i R 1 i G i 3. Repeat step 2 until a fixed point is reached. Numerically, a fixed point of the algorithm is defined with respect to a stopping criterion. That is, we say that a fixed point is reached when the difference between two consecutive values of the stopping criterion is within a specified tolerance ɛ. The stopping criterion can be an individual one, like the codeword SINR or the Euclidian distance between codewords and their corresponding replacements, or a global one like sum capacity. We note that in the case of individual stopping criteria all values corresponding to all codewords must be within the specified tolerance for the algorithm to stop. Mathematically, convergence of the greedy SINR maximization algorithm to a fixed point is ensured by the fact that the algorithm monotonically increases sum capacity, and that sum capacity is upper bounded. This does not necessarily imply that the fixed point is unique, and theoretically many fixed points of this algorithm are possible. However, extensive simulations have shown that the algorithm has always reached the maximum sum capacity point when starting with randomly selected codewords, though we were not able to prove this result in general. In order to see that the proposed greedy SINR maximization procedure monotonically increases sum capacity, we consider the determinant of R in the sum capacity expression in equation (2.8) which we write in terms of codeword s i as M R = G k s k s k G k + W + G is i s i G i k i = R i + G i s i s i G i (2.15)

28 16 Since R i is invertible it can be factored out [ R = R i I BN + R 1 G i s i s i G i i ] (2.16) which implies that R can also be written as R = R i I BN + R 1 G i s i s i G i i ( ) = R i 1+s i G i R 1 i G i s i (2.17) where the last equality follows from I k + AB = I m + BA, A M k m B M m k (2.18) From equation (2.14) we obtain R = R i (1 + γ i ) (2.19) which shows that each iteration monotonically increases R. This in turn implies a monotonic increase in sum capacity, and because sum capacity is upper bounded, this proves our claim that the greedy SINR maximization algorithm will reach a fixed point. Properties of this fixed point as well as a connection to maximizing sum capacity are presented in the following sections. To conclude, we note that the formal statement of the greedy SINR maximization algorithm does not impose a particular order on codeword adaptation, and in the most general case, replacement of one codeword of one user is followed by replacement of one codeword of a different user. We also note that the proposed SINR maximization algorithm is a greedy interference avoidance algorithm [46] since at each step it greedily maximizes the SINR of an individual codeword without paying attention to the consequences that this action may have on the ensemble of codewords. 2.3 Fixed Point Properties of the Greedy SINR Maximization Algorithm Let {λ i j } be the set of eigenvalues for the matrix G i R 1 i G i in decreasing order, λ i 1 λi 2... λi N, with {x i j } the corresponding eigenvectors. At a fixed point of the greedy SINR maximization algorithm any further change in user codewords brings no improvement in the SINR values, which will be equal to the maximum eigenvalues γ i = λ i 1. The codewords will be the maximum eigenvectors of G i R 1 i G i,thatiss i = x i 1,andwecanwrite G i R 1 i G i s i = λ i 1s i = γ i s i (2.20)

29 17 In addition, any eigenvector of G i R 1 i G i is also an eigenvector of G i R 1 G i.inordertoseethis we start by writing and using the matrix inversion lemma we get R 1 = R 1 i R = R i + G i s i s i G i = R i + G i x i 1(x i 1) G i (2.21) ( ) 1 R 1 i G i x i 1 1+(x i 1 ) G i R 1 i G i x i 1 (x i 1 ) G i R 1 i (2.22) G i R 1 G i x i j = λ i jx i j γ2 i 1+γ i x i 1(x i 1) x i j = where δ ij is the Kronecker delta operator which is 1 for i = j and 0 for i j. ( ) λ i j (λi j )2 1+λ i δ 1j x i j (2.23) j Thus, at a fixed point, the matrices G i R 1 i G i and G i R 1 G i share the same set of eigenvectors. In addition, they have the same eigenvalues with the exception of the one that corresponds to s i, for which we have G i R 1 i G i s i = γ i s i and G i R 1 G i s i = γ i 1+γ i s i (2.24) We now consider all codewords of a given user l, which share the same gain matrix G l. If, at a fixed point of the algorithm, they have different SINRs, then they must be orthogonal since they are eigenvectors of the same matrix G l R 1 G l corresponding to different eigenvalues. More precisely, if s (l) m and s (l) n are two distinct codewords corresponding to user l but with different SINRs γ (l) m γ n (l),thens (l) m s (l) n. Alternatively, when all codewords of a given user have the same SINR at a fixed point, then user l s codeword matrix satisfies G l R 1 G l S l = γ l 1+γ l S l (2.25) and γ l /(1 + γ l ) is the maximum eigenvalue of G l R 1 G l. To conclude this section we note that empirically, we have always observed convergence of the algorithm from random initial points to a fixed point in which all codewords of a given user have the same SINR. 2.4 Making the Connection with Sum Capacity Maximization We have seen in section 2.2 that the greedy SINR maximization algorithm for codeword adaptation monotonically increases sum capacity. We have also noted in section 2.2 that the algorithm is

30 18 a greedy interference avoidance algorithm. Putting this observation together with the fact that previously proposed interference avoidance algorithms converge to a codeword ensemble that maximizes sum capacity [4, 33, 45, 46] makes us suspect that our proposed greedy SINR maximization algorithm for collaborative multibase systems also yields sum capacity maximizing codeword ensembles. Thus, in this section we examine some properties of codeword ensembles which maximize sum capacity and relate them to the fixed point properties of the proposed algorithm. Maximization of sum capacity for a general multiaccess vector channel was solved in [64] as a spectral optimization problem where it has been shown that optimal user transmit covariance matrices X l can be obtained as a solution of the following convex optimization problem max X l Csum subject to Trace [X l ]=const.,l=1,...,l (2.26) If we assume that the noise is stationary with fixed covariance matrix W, then equation (2.8) shows that maximizing sum capacity is equivalent to maximizing R. According to [64] this implies a simultaneous water filling distribution for all users, for which eigenvectors of the interference plus noise covariance matrix seen by a given user l align with those of its transmit covariance matrix X l whose eigenvalues satisfy a water filling distribution [13, p. 253]. We note that optimal transmit covariance matrices may be obtained through an iterative water filling procedure [64], and then subsequently used to construct optimal codeword ensembles that maximize sum capacity using established algorithms [57, 58]. When additional rank constraints are imposed on user transmit covariance matrices, these can no longer be obtained by solving a convex optimization problem and using the iterative water filling procedure. Maximizing sum capacity subject to trace and rank constraints on user transmit covariance matrices is currently an open problem [61]. In our formulation, user transmit covariance matrices are expressed in terms of codeword matrices as X l = S l S l, and when users are assigned at least M l = N codewords for transmission, then S l S l is not rank constrained and may span the entire signal space. In this case, optimal S ls l must satisfy a simultaneous water filling distribution as described in the previous paragraph. When users are assigned M l <N codewords for transmission, then S l S l is rank constrained. However, from the perspective of the simultaneous water filling solution [64] at the maximum sum capacity point, R will be maximized when matrices S l S l satisfy a water filling distribution on a lower dimension eigensubspace containing the smallest eigenvalues of the interference plus noise covariance matrix

c 2002 Dimitrie C. Popescu ALL RIGHTS RESERVED

c 2002 Dimitrie C. Popescu ALL RIGHTS RESERVED c 2002 Dimitrie C. Popescu ALL RIGHTS RESERVED ABSTRACT OF THE DISSERTATION Interference Avoidance for Wireless Systems by Dimitrie C. Popescu Dissertation Director: Professor Christopher Rose The study

More information

ADVANCES IN MULTIUSER DETECTION

ADVANCES IN MULTIUSER DETECTION ADVANCES IN MULTIUSER DETECTION ADVANCES IN MULTIUSER DETECTION Michael L. Honig, Editor A JOHN WILEY & SONS, INC., PUBLICATION Copyright c 2006 by John Wiley & Sons, Inc. All rights reserved. Published

More information

Random Matrices and Wireless Communications

Random Matrices and Wireless Communications Random Matrices and Wireless Communications Jamie Evans Centre for Ultra-Broadband Information Networks (CUBIN) Department of Electrical and Electronic Engineering University of Melbourne 3.5 1 3 0.8 2.5

More information

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Lecture - 19 Multi-User CDMA Uplink and Asynchronous CDMA

More information

ELEC E7210: Communication Theory. Lecture 10: MIMO systems

ELEC E7210: Communication Theory. Lecture 10: MIMO systems ELEC E7210: Communication Theory Lecture 10: MIMO systems Matrix Definitions, Operations, and Properties (1) NxM matrix a rectangular array of elements a A. an 11 1....... a a 1M. NM B D C E ermitian transpose

More information

Game Theoretic Solutions for Precoding Strategies over the Interference Channel

Game Theoretic Solutions for Precoding Strategies over the Interference Channel Game Theoretic Solutions for Precoding Strategies over the Interference Channel Jie Gao, Sergiy A. Vorobyov, and Hai Jiang Department of Electrical & Computer Engineering, University of Alberta, Canada

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2)

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2) IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 361 Uplink Downlink Duality Via Minimax Duality Wei Yu, Member, IEEE Abstract The sum capacity of a Gaussian vector broadcast channel

More information

Shannon meets Wiener II: On MMSE estimation in successive decoding schemes

Shannon meets Wiener II: On MMSE estimation in successive decoding schemes Shannon meets Wiener II: On MMSE estimation in successive decoding schemes G. David Forney, Jr. MIT Cambridge, MA 0239 USA forneyd@comcast.net Abstract We continue to discuss why MMSE estimation arises

More information

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Pramod Viswanath, Venkat Anantharam and David.C. Tse {pvi, ananth, dtse}@eecs.berkeley.edu

More information

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH MIMO : MIMO Theoretical Foundations of Wireless Communications 1 Wednesday, May 25, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication 1 / 20 Overview MIMO

More information

Game Theoretic Approach to Power Control in Cellular CDMA

Game Theoretic Approach to Power Control in Cellular CDMA Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University

More information

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,

More information

Minimum Mean Squared Error Interference Alignment

Minimum Mean Squared Error Interference Alignment Minimum Mean Squared Error Interference Alignment David A. Schmidt, Changxin Shi, Randall A. Berry, Michael L. Honig and Wolfgang Utschick Associate Institute for Signal Processing Technische Universität

More information

12.4 Known Channel (Water-Filling Solution)

12.4 Known Channel (Water-Filling Solution) ECEn 665: Antennas and Propagation for Wireless Communications 54 2.4 Known Channel (Water-Filling Solution) The channel scenarios we have looed at above represent special cases for which the capacity

More information

ACOMMUNICATION situation where a single transmitter

ACOMMUNICATION situation where a single transmitter IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 9, SEPTEMBER 2004 1875 Sum Capacity of Gaussian Vector Broadcast Channels Wei Yu, Member, IEEE, and John M. Cioffi, Fellow, IEEE Abstract This paper

More information

926 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 3, MARCH Monica Nicoli, Member, IEEE, and Umberto Spagnolini, Senior Member, IEEE (1)

926 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 3, MARCH Monica Nicoli, Member, IEEE, and Umberto Spagnolini, Senior Member, IEEE (1) 926 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 3, MARCH 2005 Reduced-Rank Channel Estimation for Time-Slotted Mobile Communication Systems Monica Nicoli, Member, IEEE, and Umberto Spagnolini,

More information

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems 2382 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 59, NO 5, MAY 2011 Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems Holger Boche, Fellow, IEEE,

More information

Optimum Signature Sequence Sets for. Asynchronous CDMA Systems. Abstract

Optimum Signature Sequence Sets for. Asynchronous CDMA Systems. Abstract Optimum Signature Sequence Sets for Asynchronous CDMA Systems Sennur Ulukus AT&T Labs{Research ulukus@research.att.com Abstract Roy D.Yates WINLAB, Rutgers University ryates@winlab.rutgers.edu In this

More information

Wideband Fading Channel Capacity with Training and Partial Feedback

Wideband Fading Channel Capacity with Training and Partial Feedback Wideband Fading Channel Capacity with Training and Partial Feedback Manish Agarwal, Michael L. Honig ECE Department, Northwestern University 145 Sheridan Road, Evanston, IL 6008 USA {m-agarwal,mh}@northwestern.edu

More information

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway

More information

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 6 8, 2005 Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters Alkan

More information

Design of MMSE Multiuser Detectors using Random Matrix Techniques

Design of MMSE Multiuser Detectors using Random Matrix Techniques Design of MMSE Multiuser Detectors using Random Matrix Techniques Linbo Li and Antonia M Tulino and Sergio Verdú Department of Electrical Engineering Princeton University Princeton, New Jersey 08544 Email:

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Novel spectrum sensing schemes for Cognitive Radio Networks

Novel spectrum sensing schemes for Cognitive Radio Networks Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced

More information

LECTURE 18. Lecture outline Gaussian channels: parallel colored noise inter-symbol interference general case: multiple inputs and outputs

LECTURE 18. Lecture outline Gaussian channels: parallel colored noise inter-symbol interference general case: multiple inputs and outputs LECTURE 18 Last time: White Gaussian noise Bandlimited WGN Additive White Gaussian Noise (AWGN) channel Capacity of AWGN channel Application: DS-CDMA systems Spreading Coding theorem Lecture outline Gaussian

More information

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and

More information

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2427 An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel Ersen Ekrem, Student Member, IEEE,

More information

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Pramod Viswanath and Venkat Anantharam {pvi, ananth}@eecs.berkeley.edu EECS Department, U C Berkeley CA 9470 Abstract The sum capacity of

More information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information SUBMIED O IEEE INERNAIONAL SYMPOSIUM ON INFORMAION HEORY, DE. 23 1 Optimal Power Allocation for Parallel Gaussian Broadcast hannels with Independent and ommon Information Nihar Jindal and Andrea Goldsmith

More information

Statistical and Adaptive Signal Processing

Statistical and Adaptive Signal Processing r Statistical and Adaptive Signal Processing Spectral Estimation, Signal Modeling, Adaptive Filtering and Array Processing Dimitris G. Manolakis Massachusetts Institute of Technology Lincoln Laboratory

More information

Power Control in Multi-Carrier CDMA Systems

Power Control in Multi-Carrier CDMA Systems A Game-Theoretic Approach to Energy-Efficient ower Control in Multi-Carrier CDMA Systems Farhad Meshkati, Student Member, IEEE, Mung Chiang, Member, IEEE, H. Vincent oor, Fellow, IEEE, and Stuart C. Schwartz,

More information

SPARSE signal representations have gained popularity in recent

SPARSE signal representations have gained popularity in recent 6958 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 10, OCTOBER 2011 Blind Compressed Sensing Sivan Gleichman and Yonina C. Eldar, Senior Member, IEEE Abstract The fundamental principle underlying

More information

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:

More information

Lecture 7 MIMO Communica2ons

Lecture 7 MIMO Communica2ons Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10

More information

Lecture: Adaptive Filtering

Lecture: Adaptive Filtering ECE 830 Spring 2013 Statistical Signal Processing instructors: K. Jamieson and R. Nowak Lecture: Adaptive Filtering Adaptive filters are commonly used for online filtering of signals. The goal is to estimate

More information

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation Mikael Fallgren Royal Institute of Technology December, 2009 Abstract

More information

Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels

Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels 2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 49, NO 10, OCTOBER 2003 Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels Sriram Vishwanath, Student Member, IEEE, Nihar

More information

Constructing Polar Codes Using Iterative Bit-Channel Upgrading. Arash Ghayoori. B.Sc., Isfahan University of Technology, 2011

Constructing Polar Codes Using Iterative Bit-Channel Upgrading. Arash Ghayoori. B.Sc., Isfahan University of Technology, 2011 Constructing Polar Codes Using Iterative Bit-Channel Upgrading by Arash Ghayoori B.Sc., Isfahan University of Technology, 011 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

Contents. Preface for the Instructor. Preface for the Student. xvii. Acknowledgments. 1 Vector Spaces 1 1.A R n and C n 2

Contents. Preface for the Instructor. Preface for the Student. xvii. Acknowledgments. 1 Vector Spaces 1 1.A R n and C n 2 Contents Preface for the Instructor xi Preface for the Student xv Acknowledgments xvii 1 Vector Spaces 1 1.A R n and C n 2 Complex Numbers 2 Lists 5 F n 6 Digression on Fields 10 Exercises 1.A 11 1.B Definition

More information

CS281 Section 4: Factor Analysis and PCA

CS281 Section 4: Factor Analysis and PCA CS81 Section 4: Factor Analysis and PCA Scott Linderman At this point we have seen a variety of machine learning models, with a particular emphasis on models for supervised learning. In particular, we

More information

Optimal Binary/Quaternary Adaptive Signature Design for Code-Division Multiplexing

Optimal Binary/Quaternary Adaptive Signature Design for Code-Division Multiplexing Globecom 0 - Wireless Communications Symposium Optimal Binary/Quaternary Adaptive Signature Design for Code-Division Multiplexing ili Wei, Member, IEEE and Wen Chen, Senior Member, IEEE Department of Electronic

More information

A Game-Theoretic Framework for Interference Avoidance

A Game-Theoretic Framework for Interference Avoidance IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 57, NO. 4, APRIL 2009 1087 A Game-Theoretic Framework for Interference Avoidance R. Menon, A. B. MacKenzie, Member, IEEE, J. Hicks, Member, IEEE, R. M. Buehrer,

More information

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Marco Moretti, Andrea Abrardo Dipartimento di Ingegneria dell Informazione, University of Pisa, Italy

More information

On the Capacity of the Interference Channel with a Relay

On the Capacity of the Interference Channel with a Relay On the Capacity of the Interference Channel with a Relay Ivana Marić, Ron Dabora and Andrea Goldsmith Stanford University, Stanford, CA {ivanam,ron,andrea}@wsl.stanford.edu Abstract Capacity gains due

More information

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels Mehdi Mohseni Department of Electrical Engineering Stanford University Stanford, CA 94305, USA Email: mmohseni@stanford.edu

More information

Applications of Lattices in Telecommunications

Applications of Lattices in Telecommunications Applications of Lattices in Telecommunications Dept of Electrical and Computer Systems Engineering Monash University amin.sakzad@monash.edu Oct. 2013 1 Sphere Decoder Algorithm Rotated Signal Constellations

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

IN this paper, we show that the scalar Gaussian multiple-access

IN this paper, we show that the scalar Gaussian multiple-access 768 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 5, MAY 2004 On the Duality of Gaussian Multiple-Access and Broadcast Channels Nihar Jindal, Student Member, IEEE, Sriram Vishwanath, and Andrea

More information

Chapter [4] "Operations on a Single Random Variable"

Chapter [4] Operations on a Single Random Variable Chapter [4] "Operations on a Single Random Variable" 4.1 Introduction In our study of random variables we use the probability density function or the cumulative distribution function to provide a complete

More information

A Framework for Training-Based Estimation in Arbitrarily Correlated Rician MIMO Channels with Rician Disturbance

A Framework for Training-Based Estimation in Arbitrarily Correlated Rician MIMO Channels with Rician Disturbance A Framework for Training-Based Estimation in Arbitrarily Correlated Rician MIMO Channels with Rician Disturbance IEEE TRANSACTIONS ON SIGNAL PROCESSING Volume 58, Issue 3, Pages 1807-1820, March 2010.

More information

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control 962 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control Junshan Zhang, Student Member, IEEE, and Edwin

More information

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm HongSun An Student Member IEEE he Graduate School of I & Incheon Korea ahs3179@gmail.com Manar Mohaisen Student Member IEEE

More information

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,

More information

Appendix B Information theory from first principles

Appendix B Information theory from first principles Appendix B Information theory from first principles This appendix discusses the information theory behind the capacity expressions used in the book. Section 8.3.4 is the only part of the book that supposes

More information

Multiuser Receivers, Random Matrices and Free Probability

Multiuser Receivers, Random Matrices and Free Probability Multiuser Receivers, Random Matrices and Free Probability David N.C. Tse Department of Electrical Engineering and Computer Sciences University of California Berkeley, CA 94720, USA dtse@eecs.berkeley.edu

More information

Lecture Notes 1: Vector spaces

Lecture Notes 1: Vector spaces Optimization-based data analysis Fall 2017 Lecture Notes 1: Vector spaces In this chapter we review certain basic concepts of linear algebra, highlighting their application to signal processing. 1 Vector

More information

Cognitive Multiple Access Networks

Cognitive Multiple Access Networks Cognitive Multiple Access Networks Natasha Devroye Email: ndevroye@deas.harvard.edu Patrick Mitran Email: mitran@deas.harvard.edu Vahid Tarokh Email: vahid@deas.harvard.edu Abstract A cognitive radio can

More information

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012 Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications

More information

Information Theory for Wireless Communications, Part II:

Information Theory for Wireless Communications, Part II: Information Theory for Wireless Communications, Part II: Lecture 5: Multiuser Gaussian MIMO Multiple-Access Channel Instructor: Dr Saif K Mohammed Scribe: Johannes Lindblom In this lecture, we give the

More information

Exploiting Sparsity for Wireless Communications

Exploiting Sparsity for Wireless Communications Exploiting Sparsity for Wireless Communications Georgios B. Giannakis Dept. of ECE, Univ. of Minnesota http://spincom.ece.umn.edu Acknowledgements: D. Angelosante, J.-A. Bazerque, H. Zhu; and NSF grants

More information

DOWNLINK transmit beamforming has recently received

DOWNLINK transmit beamforming has recently received 4254 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 8, AUGUST 2010 A Dual Perspective on Separable Semidefinite Programming With Applications to Optimal Downlink Beamforming Yongwei Huang, Member,

More information

CHANNEL FEEDBACK QUANTIZATION METHODS FOR MISO AND MIMO SYSTEMS

CHANNEL FEEDBACK QUANTIZATION METHODS FOR MISO AND MIMO SYSTEMS CHANNEL FEEDBACK QUANTIZATION METHODS FOR MISO AND MIMO SYSTEMS June Chul Roh and Bhaskar D Rao Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA 9293 47,

More information

K User Interference Channel with Backhaul

K User Interference Channel with Backhaul 1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University

More information

Blind Successive Interference Cancellation for DS-CDMA Systems

Blind Successive Interference Cancellation for DS-CDMA Systems 276 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 50, NO 2, FEBRUARY 2002 Blind Successive Interference Cancellation for DS-CDMA Systems Dragan Samardzija, Narayan Mandayam, Senior Member, IEEE, and Ivan Seskar,

More information

5682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER /$ IEEE

5682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER /$ IEEE 5682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER 2009 Hyperplane-Based Vector Quantization for Distributed Estimation in Wireless Sensor Networks Jun Fang, Member, IEEE, and Hongbin

More information

Competition and Cooperation in Multiuser Communication Environments

Competition and Cooperation in Multiuser Communication Environments Competition and Cooperation in Multiuser Communication Environments Wei Yu Electrical Engineering Department Stanford University April, 2002 Wei Yu, Stanford University Introduction A multiuser communication

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

POWER ALLOCATION AND OPTIMAL TX/RX STRUCTURES FOR MIMO SYSTEMS

POWER ALLOCATION AND OPTIMAL TX/RX STRUCTURES FOR MIMO SYSTEMS POWER ALLOCATION AND OPTIMAL TX/RX STRUCTURES FOR MIMO SYSTEMS R. Cendrillon, O. Rousseaux and M. Moonen SCD/ESAT, Katholiee Universiteit Leuven, Belgium {raphael.cendrillon, olivier.rousseaux, marc.moonen}@esat.uleuven.ac.be

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

2318 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 6, JUNE Mai Vu, Student Member, IEEE, and Arogyaswami Paulraj, Fellow, IEEE

2318 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 6, JUNE Mai Vu, Student Member, IEEE, and Arogyaswami Paulraj, Fellow, IEEE 2318 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 6, JUNE 2006 Optimal Linear Precoders for MIMO Wireless Correlated Channels With Nonzero Mean in Space Time Coded Systems Mai Vu, Student Member,

More information

6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011

6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 On the Structure of Real-Time Encoding and Decoding Functions in a Multiterminal Communication System Ashutosh Nayyar, Student

More information

Multiuser Capacity in Block Fading Channel

Multiuser Capacity in Block Fading Channel Multiuser Capacity in Block Fading Channel April 2003 1 Introduction and Model We use a block-fading model, with coherence interval T where M independent users simultaneously transmit to a single receiver

More information

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department

More information

Noncooperative Optimization of Space-Time Signals in Ad hoc Networks

Noncooperative Optimization of Space-Time Signals in Ad hoc Networks Noncooperative Optimization of Space-Time Signals in Ad hoc Networks Ronald A. Iltis and Duong Hoang Dept. of Electrical and Computer Engineering University of California Santa Barbara, CA 93106 {iltis,hoang}@ece.ucsb.edu

More information

An Outer Bound for the Gaussian. Interference channel with a relay.

An Outer Bound for the Gaussian. Interference channel with a relay. An Outer Bound for the Gaussian Interference Channel with a Relay Ivana Marić Stanford University Stanford, CA ivanam@wsl.stanford.edu Ron Dabora Ben-Gurion University Be er-sheva, Israel ron@ee.bgu.ac.il

More information

Multiuser Detection. Ateet Kapur Student Member, IEEE and Mahesh K. Varanasi Senior Member, IEEE

Multiuser Detection. Ateet Kapur Student Member, IEEE and Mahesh K. Varanasi Senior Member, IEEE ACCEPTED FOR PUBLICATIONS IEEE TRANS. INFO. THEORY 1 Multiuser Detection for Overloaded CDMA Systems Ateet Kapur Student Member, IEEE and Mahesh K. Varanasi Senior Member, IEEE Abstract Multiuser detection

More information

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing Lecture 7 Agenda for the lecture M-ary hypothesis testing and the MAP rule Union bound for reducing M-ary to binary hypothesis testing Introduction of the channel coding problem 7.1 M-ary hypothesis testing

More information

When does vectored Multiple Access Channels (MAC) optimal power allocation converge to an FDMA solution?

When does vectored Multiple Access Channels (MAC) optimal power allocation converge to an FDMA solution? When does vectored Multiple Access Channels MAC optimal power allocation converge to an FDMA solution? Vincent Le Nir, Marc Moonen, Jan Verlinden, Mamoun Guenach Abstract Vectored Multiple Access Channels

More information

Transmitter optimization for distributed Gaussian MIMO channels

Transmitter optimization for distributed Gaussian MIMO channels Transmitter optimization for distributed Gaussian MIMO channels Hon-Fah Chong Electrical & Computer Eng Dept National University of Singapore Email: chonghonfah@ieeeorg Mehul Motani Electrical & Computer

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

PHASE RETRIEVAL OF SPARSE SIGNALS FROM MAGNITUDE INFORMATION. A Thesis MELTEM APAYDIN

PHASE RETRIEVAL OF SPARSE SIGNALS FROM MAGNITUDE INFORMATION. A Thesis MELTEM APAYDIN PHASE RETRIEVAL OF SPARSE SIGNALS FROM MAGNITUDE INFORMATION A Thesis by MELTEM APAYDIN Submitted to the Office of Graduate and Professional Studies of Texas A&M University in partial fulfillment of the

More information

On Capacity Under Received-Signal Constraints

On Capacity Under Received-Signal Constraints On Capacity Under Received-Signal Constraints Michael Gastpar Dept. of EECS, University of California, Berkeley, CA 9470-770 gastpar@berkeley.edu Abstract In a world where different systems have to share

More information

Decoupling of CDMA Multiuser Detection via the Replica Method

Decoupling of CDMA Multiuser Detection via the Replica Method Decoupling of CDMA Multiuser Detection via the Replica Method Dongning Guo and Sergio Verdú Dept. of Electrical Engineering Princeton University Princeton, NJ 08544, USA email: {dguo,verdu}@princeton.edu

More information

Cooperative Communication with Feedback via Stochastic Approximation

Cooperative Communication with Feedback via Stochastic Approximation Cooperative Communication with Feedback via Stochastic Approximation Utsaw Kumar J Nicholas Laneman and Vijay Gupta Department of Electrical Engineering University of Notre Dame Email: {ukumar jnl vgupta}@ndedu

More information

Multiple Antennas for MIMO Communications - Basic Theory

Multiple Antennas for MIMO Communications - Basic Theory Multiple Antennas for MIMO Communications - Basic Theory 1 Introduction The multiple-input multiple-output (MIMO) technology (Fig. 1) is a breakthrough in wireless communication system design. It uses

More information

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University

More information

Estimation of Performance Loss Due to Delay in Channel Feedback in MIMO Systems

Estimation of Performance Loss Due to Delay in Channel Feedback in MIMO Systems MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Estimation of Performance Loss Due to Delay in Channel Feedback in MIMO Systems Jianxuan Du Ye Li Daqing Gu Andreas F. Molisch Jinyun Zhang

More information

3. ESTIMATION OF SIGNALS USING A LEAST SQUARES TECHNIQUE

3. ESTIMATION OF SIGNALS USING A LEAST SQUARES TECHNIQUE 3. ESTIMATION OF SIGNALS USING A LEAST SQUARES TECHNIQUE 3.0 INTRODUCTION The purpose of this chapter is to introduce estimators shortly. More elaborated courses on System Identification, which are given

More information

Interactions of Information Theory and Estimation in Single- and Multi-user Communications

Interactions of Information Theory and Estimation in Single- and Multi-user Communications Interactions of Information Theory and Estimation in Single- and Multi-user Communications Dongning Guo Department of Electrical Engineering Princeton University March 8, 2004 p 1 Dongning Guo Communications

More information

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS Shruti Sharma and Demos Teneketzis Department of Electrical Engineering and Computer Science University of

More information

On the Capacity Region of the Gaussian Z-channel

On the Capacity Region of the Gaussian Z-channel On the Capacity Region of the Gaussian Z-channel Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@eng.umd.edu ulukus@eng.umd.edu

More information

Stochastic Processes. Theory for Applications. Robert G. Gallager CAMBRIDGE UNIVERSITY PRESS

Stochastic Processes. Theory for Applications. Robert G. Gallager CAMBRIDGE UNIVERSITY PRESS Stochastic Processes Theory for Applications Robert G. Gallager CAMBRIDGE UNIVERSITY PRESS Contents Preface page xv Swgg&sfzoMj ybr zmjfr%cforj owf fmdy xix Acknowledgements xxi 1 Introduction and review

More information

Discrete Simulation of Power Law Noise

Discrete Simulation of Power Law Noise Discrete Simulation of Power Law Noise Neil Ashby 1,2 1 University of Colorado, Boulder, CO 80309-0390 USA 2 National Institute of Standards and Technology, Boulder, CO 80305 USA ashby@boulder.nist.gov

More information

Degrees-of-Freedom for the 4-User SISO Interference Channel with Improper Signaling

Degrees-of-Freedom for the 4-User SISO Interference Channel with Improper Signaling Degrees-of-Freedom for the -User SISO Interference Channel with Improper Signaling C Lameiro and I Santamaría Dept of Communications Engineering University of Cantabria 9005 Santander Cantabria Spain Email:

More information

computing the jointly optimum powers that is decoupled from the computation of the optimum (MSIR or MSIR-DF) receivers. In particular, a distributed,

computing the jointly optimum powers that is decoupled from the computation of the optimum (MSIR or MSIR-DF) receivers. In particular, a distributed, A Stochastic Algorithm for the Joint Optimization of Power Control and Multiuser Receivers Λ Deepak Das, and Mahesh K. Varanasi Dept. of Electrical and Computer Engineering University of Colorado Boulder,

More information

AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN

AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN A Thesis Presented to The Academic Faculty by Bryan Larish In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy

More information