Robust Multicast Beamforming for Spectrum Sharing-based Cognitive Radios

Size: px
Start display at page:

Download "Robust Multicast Beamforming for Spectrum Sharing-based Cognitive Radios"

Transcription

1 1 Robust Multicast Beamforg for Spectrum Sharing-based Cognitive Radios Yongei Huang, Qiang Li, Wing-Kin Ma, Shuzhong Zhang Abstract We consider a robust donlink beamforg optimization problem for secondary multicast transmission in a multiple-input multiple-output (MIMO) spectrum sharing cognitive radio (CR) netork. The imization of transmit poer is formulated both qualityof-service (QoS) constraints on the secondary receivers and interference temperature constraints on the primary users, under the assumption of imperfect channel state information (CSI). The problem is a nonconvex quadratically constrained quadratic program (QCQP), and in general it is hard to achieve the global optimality. As a compromise, e present to randomized approximation algorithms for the problem via convex optimization techniques. Apart from the general setting of the robust beamforg problem, e identify one interesting special case, the robust problem of hich can be solved efficiently. Simulation results are presented to demonstrate the performance gains of the proposed algorithms over an existing robust design. Index Terms Robust multicast beamforg, MIMO cognitive radio netorks, spectrum sharing, semidefinite programg relaxation, imperfect channel state information. I. INTRODUCTION In cognitive radio (CR) netorks, the idea of spectrum sharing using multiple transmit antennas has dran much research interest recently. Spectrum sharing allos secondary and primary users to access the same channel simultaneously, by using the spatial degree of freedom at the secondary transmitter to avoid excessive interference to the primary users. For a comprehensive coverage of the recent advances, readers are referred to the magazine paper [1]; also [2], [3] for some recent specific orks on CR transmit beamforg. In this ork e are interested in a robust multicast 1 transmit beamforg problem in the setting of a multiple-input multiple-output (MIMO) CR netork, under the assumption of imperfect channel state information (CSI). A basic and meaningful problem formulation is to transmit poer quality-of-service (QoS) constraints on the secondary receivers and interference temperature constraints (or termed as CR interference limiting constraints) on the primary receivers. To proceed, let us first discuss some related orks. The primal multicast transmit beamforg frameork, i.e., that ithout CR and ith perfect CSI, as originally developed in [4]; see also the survey paper [5]. In particular, that paper advocated to use semidefinite programg (SDP) relaxation to handle the multicast transmit optimization problems, an idea that has received groing This ork is supported by a General Research Fund aarded by Research Grant Council, Hong Kong (Project No. CUHK415908) and by a Direct Grant aarded by the Chinese University of Hong Kong (Project Code ). Part of this ork as presented at the Thirty-Sixth International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Prague, Czech Republic, May 22-27, Y. Huang is ith the Department of Systems Engineering and Engineering Management, the Chinese University of Hong Kong, Shatin, Hong Kong ( yhuang@se.cuhk.edu.hk). Q. Li and W.-K. Ma are ith the Department of Electronic Engineering, the Chinese University of Hong Kong, Shatin, Hong Kong ( qli@ee.cuhk.edu.hk, kma@ieee.org). S. Zhang is ith the Program in Industrial and Systems Engineering, the University of Minnesota, Minneapolis, MN USA ( zhangs@umn.edu). 1 Here multicast, in a physical layer sense, refers to common information broadcast to a multitude of intended receivers. attention recently. Its robust version under imperfect CSI as later studied in [6], here an interesting connection beteen non-robust and robust beamforg problems is revealed. More recently, the frameork is extended to the CR scenario [3]. There, the robust CR multicast beamforg problem (our problem of interest) is also considered; the idea is to apply a conservative bound on both the QoS constraints and the interference suppressing constraints, thereby obtaining a quadratically constrained quadratic program (QCQP) formulation hich is subsequently approximated by SDP relaxation. In this paper, e propose to randomized approximation algorithms for the robust CR multicast donlink beamforg problem that can provide better approximation accuracies than the previous method [3]. Specifically, in one algorithm, e take into account an equivalent QCQP reformulation of the robust problem, of hich e obtain a parameterized SDP relaxation problem. The parameterized SDP can be solved by searching a one-dimensional parameter over an interval, and a feasibility checking routine using SDP; a Gaussian randomization procedure is presented to give approximate solutions of the robust problem in a neat ay, based on the solution of the parameterized SDP. In contrast, e herein improve both the problem reformulation (17) in [3] and the randomization procedure (cf. (30) in [3]), leading to better robust performance. In the other algorithm, e consider a convex (SDP) relaxation of the robust optimal beamforg problem resorting to S-lemma; e should note that S-lemma has been used in some other transmit beamforg contexts, e.g., [8], [9]. It turns out that the resulting SDP relaxation is looser than the previous parameterized SDP, giving rise to the possibility of returning loer transmit poer at a small cost of feasibility rate. In addition, e identify one particular, interesting, scenario, in hich the global optimum of the robust beamforg problem can be found efficiently. The particular case is hen there are not too many primary and secondary receivers involved, in hich e sho that the parameterized SDP relaxation is tight. The numerical simulation results sho the outperformance of the proposed beamformers over the robust design in [3]. The paper is organized as follos. In Section II, e introduce the system model and formulate the robust optimal beamforg problem. In Section III, e propose the randomized approximation algorithms, and point out one solvable scenario of the robust beamforg problem. In Section IV, e present numerical examples shoing the performance of three different algorithms. Finally, the paper is concluded in Section V. II. SYSTEM MODEL AND PROBLEM FORMULATION Consider a CR netork that has a secondary transmitter using N antennas to transmit common information to M secondary receivers, and that there are K primary users operating in the same spectrum. Let H m C N Nm be the MIMO channel from the secondary transmitter to the mth secondary receiver, here the number of receive antennas is denoted by N m. Similarly, let G k C N N k be the MIMO channel from the secondary transmitter to the kth primary user, here the number of receive antennas is denoted byn k. The signal received by secondary receiver m is given by x m(t) =

2 2 H H my(t)+n m(t), here y(t) C N is the secondary transmit signal vector, and n m(t) C Nm is Gaussian noise vector, assumed to have zero mean and covariance σmi. 2 2 The secondary transmitter employs the multicast transmit beamforg scheme, in hich e have y(t) = s(t) here C N is the beamformer eight and s(t) C is the information signal. We assume s(t) to be ith zero mean and unit variance, ithout loss of generality. Moreover, assug maximum ratio combining (MRC) receive beamforg for all the secondary receivers, the received SNR of secondary user m is SNR m = HH m 2, here denotes the Euclidean norm or σm 2 the Frobenius norm throughout the paper. The multicast beamformer design may be formulated as (cf. [3], [5]): H H H m 2 σ 2 mτ m, m = 1,...,M, G H k 2 η k, k = 1,...,K, here τ m specifies the imal QoS of the secondary user m, in terms of SNR, and η k specifies the maximal alloable interference level from the secondary transmitter to primary user k. Problem (1) has been considered in [3], here an effective approximation method called SDP relaxation has been applied. Herein e consider the imperfect CSI case. In practice, one may not have perfect knoledge of the CSI especially for the links of primary users. The CSI errors may be caused by inaccurate channel estimation, quantization in channel feedback, and outdated CSI effects. Let Δ m C N Nm and Δ k C N N k denote the CSI errors associated ith H m and G k, respectively. By assug that the errors Δ m and Δ k are deteristic norm-bounded, a orst-case robust version of (1) is given by (cf. problem (8) of [3]): s.t. H (1) (2a) (H m +Δ m) H 2 σmτ 2 m, m,(2b) Δ m ε m max Δ k ε k (G k +Δ k) H 2 η k, k, (2c) here ε m and ε k specify the bounds, or the orst-case magnitudes, of the CSI errors Δ m and Δ k, respectively. The robust beamforg problem (2) guarantees that for all admissible channel errors, all the secondary users must be served ith QoSs no less than the specification {τ m}, and the interferences to all the primary users must be kept belo {η k }. III. EFFICIENT ALGORITHMS FOR ROBUST BEAMFORMING PROBLEM Robust beamforg problem (2) is hard to solve in general, due to its nature of non-convexity. In this section, e ill propose to approximate solution schemes for the robust beamforg problem, and identify one interesting subclass of problem (2) that has a tight SDP relaxation. Thus that subclass of problem (2) can be solved in polynomial time, meaning that they are hidden convex programs. Let us start ith an equivalent non-convex QCQP reformulation of (2). 2 There are cases here interference from primary users to the secondary users contributes part of the noise terms n m(t). While e may not physically model n m(t) as being hite in those cases (except for N m = 1), e can transform the received model to an equivalent noise-hite model by prehitening. To describe it, suppose that the noise n m(t) has a positive definite, non-hite, covariance C m. Let x m(t) = C 1/2 m x m(t). We have x m(t) = H H my(t) + n m(t), here H m = H mc 1/2 m is the transformed channel and n m(t) = C 1/2 m n m(t) is hite. Note that in this setup, the secondary receivers can simply send back the transformed channel state information H m to the primary transmitter, rather than H m,c m hich incur a higher feedback overhead. A. An equivalent QCQP reformulation of robust optimal beamforg problem (2) Consider the first robust QoS constraint of (2b) in a slightly more general form, and set f 1() = E 1/2 1 Δ 1 ε 1 (H 1 +Δ 1) H 2, here E 1 0 governs the ellipsoid shape of the error set (or termed as the perturbation set in some robust optimization literature, e.g., [10]) and = 0. We claim that f 1() has a closed-form expression as stated in the folloing lemma (see related results in [11], [12], [13]). Lemma 3.1: It holds that f 1() = ( max { H H 1 ε 1 E 1/2 1,0}) 2. (3) Proof: See Appendix A. We remark that the optimal value f 1() remains unchanged if E 1/2 1 Δ 1 is changed to the spectral norm (the maximal singular value) from the Frobenius norm. Like the proof in Lemma 3.1, the maximization problem in the first interference limiting constraint of (2c) has the optimal value ( G H 1 +ε 1 ) 2. It thus follos that the robust beamforg problem (2) can be recast into s.t. H (4a) H H m σ m τm +ε m, m = 1,...,M, (4b) G H k η k ε k, k = 1,...,K. (4c) While problem (4) exhibits a similar form as (17) in [3], e ould point out that problem (4) admits a larger feasible region (and thus gives loer transmission poer) than (17) in [3]. To see this, e use the same configuration in [3], namely, setting H m = h m and G k = g k (i.e. N m = N k = 1, m,k). Hence, (4b) reduces to ( h H m ε m ) 2 σmτ 2 m, m. Observe that (17b) in [3] is given by H Hm := H ( h mh H m +ε m (ε m 2 h Hmh m ) ) I σmτ 2 m, m. It is straightforard to check that ( h H m ε m ) 2 H Hm, m. This implies that any fulfilling (17b) in [3] satisfies (4b). Similarly, one can sho that any satisfying (17c) in [3] fulfills (4c). It is knon that problem (4) is NP-hard [4] (in fact, problem (4) has been proved NP-hard, hen ε m = 0, m, and G k = 0, ε k = 0, k). Instead, one may resort to efficiently finding a suboptimal (or approximate) solution (e.g., see [3], [6], [4]). In the folloing, e ill propose randomized, SDP-based, methods for generating an approximate solution of the robust beamforg problem (2), as ell as presenting some efficiently solvable scenario of problem (2). B. A randomized approximation algorithm for the robust beamforg problem ith ball perturbation Problem (4) is tantamount to the folloing QCQP problem, t t 2 H H m σ m τm +ε mt, m = 1,...,M, G H k η k ε kt, k = 1,...,K, = t. (5) Note that any feasible point (,t) of (5) must satisfy λ max(h mh H m) HH m σm τm +ε m, m (6) t

3 3 and λ (G k G H k ) GH k ηk ε t k, k. (7) In fact, the first inequality in (6) follos from the basic property 2 λ (A) H A 2 λ max(a) for a Hermitian matrix A, and the second inequality in (6) is due to the feasibility in (5). λ max(h mh H m) ε m > 0 Likeise, (7) is derived. Suppose that for all m (otherise problem (5) ould be infeasible). It follos that a necessary condition for t to be feasible for (5) is t 0 t t 1, (8) here the loer bound t 0 and the upper bound t 1 are respectively given by σ m τm t 0 = max (9) 1 m M λ max(h mh H m) ε m and t 1 = 1 k K ηk λ (G k G H k )+ε. (10) k Then problem (5) indeed amounts to the folloing problem W, t t (11a) s.t. H mh H m W (σ m τm +ε mt) 2, m = 1,...,M, (11b) G k G H k W ( η k ε kt) 2, k = 1,...,K, I W = t 2, W ર 0, Rank(W) = 1, t 0 t t 1, (11c) (11d) (11e) here A B = tr(ab H ). Dropping the rank-one constraint yields the relaxation problem W, t t (11b), (11c), (11d) satisfied, W ર 0, t 0 t t 1. (12) Fixing t, problem (12) is an SDP feasibility problem. No, let g(t) be the optimal value of such a feasibility problem. In other ords, e have g(t) = t if (12) is feasible for a given t (any feasible W is thus optimal), and g(t) = + if it is infeasible at point t. Therefore, (12) amounts to the one-dimensional optimization problem: g(t) t t 0 t t 1. (13) In other ords, (12) can be solved by solving (13): fixing t, solving the SDP feasibility problem (obtaining g(t)), and reducing t iteratively. In the optimization literature there are some derivative-free methods for solving the one-dimensional optimization problem (13). One of these methods is called compass or coordinate search (cf. [14, Algorithm 3.1 and Section 8.1], [15, Algorithm 7.1]). In practice, e adopt either the uniform sampling or the Matlab function fbnd, in order to output a satisfactory solution. Once such a solution (W,t ) of (12) is obtained, e retrieve a rank-one approximate solution of (12) by making use of W. Particularly, a randomization procedure is proposed as follos: Take random vectors i, i = 1,...,I, from the complex normal distribution N C (0,W ), and compute { H H m i σ m τm ηk G H k i λ( i) =,, ε m ε k m = 1,...,M, k = 1,...,K}.(14) Clearly, if i λ( i), then ( i, i ) is feasible for (5). Summarizing, a randomized approximate solution of problem (4) (or equivalently (5)) can be generated by Algorithm 1. Algorithm 1 Gaussian randomization procedure for robust beamforg problem (4) Input: H m, G k, σ m, τ m, ε m, η k, ε k, I; Output: a randomized approximate solution of (4); 1: solve (13), and find an optimal solution (W,t ); 2: if Rank(W ) = 1, then output ith H = W and terate; 3: dra random vectors i N C (0,W ), i = 1,...,I, and compute λ( i) by (14); 4: pick up i0 such that i 0 = arg{ i : i λ( i),i = 1,...,I}. C. A convex relaxation for robust beamforg problem (2) by Slemma In this subsection, e study an SDP relaxation of the robust beamforg problem (2), resorting to S-lemma (e.g., see [10, Appendix B.2]). Let δ m = vec(δ m), h m = vec(h m), and g k and δ k are defined similarly. Problem (2) can be reformulated equivalently into the folloing problem s.t. I W δ H m(i W)δ m +2R(h H m(i W)δ m)+h H m(i W)h m σ 2 mτ m, δ m 2 ε 2 m, m, (δ k) H (I W)(δ k)+2r(g H k (I W)δ k)+ g H k (I W)g k η k, δ k 2 (ε k) 2, k, W = H. (15) Here e use the fact that tr(a H BC) = vec(a) H (I B)vec(C), and ignore the dimension of each I since the dimension is clear in the context. The so-called S-lemma (e.g., see [10]) says that the condition x H Bx+2R(b H x)+β 0, x H Ax+α 0 is equivalent to the linear matrix inequality (LMI): [ ] B λa b λ 0 : b H ર 0, β λα provided that some Slater condition holds. By applying S-lemma to the constraints of (15) (e.g., for the first constraint of (15), setting B = (I W), b H = h H 1 (I W), β = h H 1 (I W)h 1 σ 2 1τ 1, A = I, α = ε 2 1), e can reexpress the constraints respectively into LMI constraints; therefore, (15) is reformulated to the relaxed problem (removing the rank-one constraint on W ): I W,{μ m},{λ k } (16a) [ I W +μmi (I W)h m h H m(i W) h H m(i W)h m σmτ 2 m μ mε 2 m [ I W +λk I ર 0,m = 1,...,M, (16b) (I W)g k ] g H k (I W) gh k (I W)g k η k λ k (ε k) 2 W ર 0, μ m 0, m, λ k 0, k. 0,k = 1,...,K, (16c) (16d) Note that (16) is a convex relaxation of (2), hile problem (12) is a non-convex relaxation of problem (4) (or equivalently, (2)). We have shon in the last subsection that even though (12) is not a convex ]

4 4 optimization problem, the global optimality of it may be achieved by solving a one-dimensional optimization problem over an interval. To discuss some relations beteen the to relaxations, e have the folloing observations. Proposition 3.2: It holds that 1) if (W, I W) is feasible for (12), then W, together ith some μ m 0 and λ k 0, is feasible for (16); 2) if ( H,{μ m},{λ k }) is feasible for (16), then ( H, ) is feasible for (12). Proof: See Appendix B. The proposition indicates that the convex relaxation (16) is not as tight as the non-convex relaxation (12) in general (namely, (16) alays gives a loer bound of (12)). As to the second argument of the proposition, e provide an alternative proof ithout using Lemma 3.1 and S-lemma, notithstanding the fact that if (16) has an optimal rank-one solution H, then problems (16) and (2) are equivalent due to S-lemma, and problems (2) and (12) are equivalent due to Lemma 3.1. Comparing to (12), SDP problem (16) is solved in a single step (unlike (12) resorting to solving one-dimension optimization problem (13)), and e take advantage of it to solve the robust beamforg problem (2). Precisely, the advantages of the relaxation (16) are threefold: (i) if e get a rank-one optimal solution H (16), then there is no gap beteen (2) and (16), and thus e do not have to iteratively solve (13); (ii) in case of getting a solution W of rank to or higher for (16), the optimal value of (16) can serve as a ne t 0 for solving (13); namely, update t 0 := max{t 0, I W }; (iii) it is possible to use W as a covariance in order to get an approximate solution for (4), according to (14). We point out that the observation in the third point is interesting. In fact, it is not obvious ho to generate, from W, a beamforg vector so that H satisfies the SDP constraints (16b), (16c). Nevertheless, according to (14), the generated beamforg vector from W fulfills (4b), (4c), thus satisfies (2b), (2c), hich in turn implies that H is feasible for (16b), (16c). As a consequence, e conclude that the randomized approximation algorithm for (4) via the SDP relaxation (16) consists of solving the SDP (16) (obtaining an optimal solution (W,{μ m},{λ k})), and steps 2-4 of Algorithm 1. Note that the complexities of to approximation algorithms are doated by solving the respective SDP relaxation problems. In Algorithm 1, the cost of outputting a solution by t-search is about 20 times empirically of solving an SDP feasibility problem, hich has orst-case complexity of O((max{M+K,N}) 4 N 0.5 log(1/ζ)) for a given accuracy ζ (see [7]); in the algorithm via (16), the computational cost is higher since the sizes of the involved SDP cones are quite large; for instance, in the particular case of N m = N k = 1 m,k, the complexity is up to of O(N 6.5 log(1/ζ)) for a small (M +K) (see [16]). D. Solvable subclass of robust beamforg problem via SDP relaxation In this subsection, e shall elaborate that robust beamforg problem (2) can be solved efficiently ith parameters such that M +K = 3 and N 3 (i.e., the number of primary and secondary receivers equals three and the number of the transmit antennas is not less than three), or ith parameter condition M +K = 2. Let t be a numerical r for g(t) over the interval [t 0,t 1] as in problem (13), and W be a corresponding feasible solution, namely, (W,t ) complies ith the constraints of (12). To proceed, let us assume M = 2 and K = 1 ithout loss of generality. Then, it follos that H mh H m W (δ m τm +ε mt ) 2, m = 1,2, G 1G H 1 W (η 1 ε 1t ) 2, I W = (t ) 2. It is verified immediately that the conditions of the specific rank-one matrix decomposition theorem 2.3 of [17] are satisfied, and thus one is able to polynomially construct a matrix H according to the rank-one decomposition theorem, such that H H mh H m = H mh H m W, m = 1,2, H G 1G H 1 = G 1G H 1 W, 2 = I W. This implies that ( H,t ) is feasible for (12); thus (,t ) is feasible for (5). Therefore, e conclude that is optimal for (5) since the problem shares the same optimal value t ith its relaxation problem (12). For the scenario ith parameters fulfilling M +K = 2, it follos from the specific rank-one theorem of [18] that a rank-one matrix H can be discovered efficiently so that (H 1H H 1 (δ1 τ1 +ε 1t ) 2 (t ) 2 I) H = 0, (G 1G H 1 (η1 ε 1t ) 2 (t ) 2 I) H = 0. Then, it is seen that = t is feasible for (5), and the objective function value is the same as the optimal value of its relaxation problem (12), hence is optimal. IV. SIMULATION RESULTS We consider a CR netork ith a three-antenna secondary transmitter, five single-antenna secondary receivers and to single-antenna primary receivers (i.e., N = 3, M = 5, K = 2, and N m = N k = 1, m, k). The elements of the channels (from the secondary transmitter to either the primary or the secondary users) are assumed to be i.i.d. complex Gaussian distributed ith mean 0 and variance 1. We fix the secondary receivers noise variance σ 2 m = 1 m. Fig. 1 (a) exaes ho the average transmit poer is affected by the radius of the channel perturbation set. In the simulation, e set τ m = 10 db m and η k = 0 db k. The same channel perturbation level is assumed for all primary and secondary channels, i.e., ε m = ε k = ε, m,k. A total of 3000 channel realizations (each ith10000 Gaussian randomizations) are tested. We compare our to proposed robust beamforg designs, namely t-search (problem (5)) and S-lemma (problem (16)) designs, ith an existing robust design provided by problem (17) of [3]. Moreover, as the robust poer imization problem ith QoS constraints could be intrinsically infeasible, the average transmit poer in Fig. 1 (a) is obtained by averaging only those channel realizations for hich all the three robust designs are feasible, i.e., at least one feasible beamforg solution can be found for each design after randomization procedure. In the legend, the beamformer stands for the result after randomization, hile SDP relaxation value means the optimal value of the SDP relaxations corresponding to the three robust designs. A practically logical result e see from Fig. 1 (a) is that higher transmit poer is required to assure larger radius of the channel error set (i.e., provide more robust beamformer). Fig. 1 (a) also shos that the average transmit poers by our proposed robust beamformers are loer than that by (17) of [3] in general. This means that the former methods are less conservative than the latter. Let us compare the performance of our to robust proposed designs. In Fig. 1 (a), for the SDP relaxation values, e note that S-lemma yields a slightly loer value than t-search, hich is consistent ith our claim in Prop. 3.2, i.e., the relaxation (16) (S-lemma) is looser than (12) (t-search). For the beamformer s poer, e see that S-lemma leads to slightly better performance than t-search. As observed, the performance gap of our to algorithms hoever is not big. This phenomenon may be caused

5 5 by the precision of the relaxed solution, the approximation procedure employed and the simulation settings. To get a better understanding of the conservativeness, Fig. 1 (b) plots the feasibility rate of the three designs ith the same setup as Fig. 1 (a). Here the feasibility rate is denoted as the ratio of the number of channel realizations, for hich e can generate a feasible beamformer via randomization, over the total 3000 channel trials. It can be seen from Fig. 1 (b) that the proposed to robust designs have much higher feasible rates than that of [3] over the hole perturbation radii tested. In Fig. 1 (b), e also observe that t-search method yields slightly higher feasibility rate than S-lemma. In contrast, as Fig. 1 (a) shos, S-lemma design has superior performance in terms of the SDP relaxation values and the transmit poer of beamformers. In other ords, there is a tradeoff beteen the to proposed robust designs. Fig. 2 investigates ho the average transmit poer changes ith the QoS of the secondary users and the interference level requirement of the primary users. We fix ε m = ε k = 0.04, k,m, τ m = 10dB, m, and η k = 0dB k, if not mentioned. Fig. 2 (a) plots the average transmit poer versus the QoS of the secondary users of the to proposed robust designs. To provide a reference for the transmit poer loer bound, e also plot the result of perfect CSI (i.e., ε m = ε k = 0, k,m). It can be seen that as τ increase, e need to use more transmit poer to support higher secondary users QoS requirements. Also there is marginal performance difference beteen the t-search and the S-lemma based robust designs. Fig. 2 (b) shos the average transmit poer versus the primary users interference level requirement. As expected, a loose interference temperature requirement leads to lo average transmit poer, and vice versa. Transmit poer (db) Feasibility rate beamformer by t search beamformer by (17) of [3] beamformer by S lemma SDP relaxation value of t search SDP relaxation value of (17) of [3] SDP relaxation value of S lemma ε (a) beamfomer by t search beamfomer by S lemma beamfomer by (17) of [3] 0.2 V. CONCLUSION We have considered a robust secondary multicast beamformer design problem for spectrum sharing in a MIMO CR netork. To efficient algorithms for the robust problem have been proposed: one algorithm includes solving a one-dimensional optimization problem, checking the feasibility of SDPs, and a Gaussian randomized procedure; the other algorithm resorts to S-lemma leading to an SDP relaxation problem and a randomization procedure. In the special case of not too many primary and secondary receivers (cf. Sec. III-D), e have also proved that the robust optimal beamforg problem can be solved efficiently. The performance of the proposed beamforg designs has been demonstrated by simulations. Future research topics may include efficiently robust design of multi-group and multicast beamformer for a CR netork. A. Proof of Lemma 3.1 APPENDIX Proof: When H H 1 ε 1 E 1/2 1, e select Δ 1 = E 1 E 1/2 1 1 H H 1. It is easily verified that E1/2 2 1 Δ 1 = H H 1 / E 1/2 1 ε 1 and (H 1 +Δ 1) H = 0. Suppose H H 1 > ε 1 E 1/2 1. It then follos that (H 1 +Δ 1) H H H 1 (E 1/2 1 Δ 1) H E 1/2 1 H H 1 E 1/2 1 Δ 1 E 1/2 1 H H 1 ε 1 E 1/2 1 > 0, and the inequality chain become equality chain hen Δ 1 = ε 1E 1 1 H H 1/( H H 1 E 1/2 1 ) (it is seen that E 1/2 Δ 1 = ε 1) ε (b) Fig. 1. (a) Average transmit poer versus the radius of channel perturbation set. (b) Feasibility rate versus perturbation radius ε. B. Proof of Proposition 3.2 Proof: (1) Since (W, I W) is feasible for (12), hence H mh H m W (σ m τm+ε m I W) 2, m, hich means that W 1/2 H m ε m W 1/2 σ m τm, m. (17) Likeise e have W 1/2 G k + ε k W 1/2 η k, k. Observe that W 1/2 (H m + Δ m) W 1/2 H m W 1/2 Δ m W 1/2 H m ε m W 1/2, for Δ m : Δ m ε m. Therefore, it follos from (17) that σmτ 2 m Δ m ε m tr((h m + Δ m) H W(H m + Δ m)). Similarly, it has η k max Δ tr(g k +Δ k) H W(G k +Δ k). k ε k By S-lemma, e conclude that (W,{μ m},{λ k }) is feasible for (16) for some μ m 0 and some λ k 0, m = 1,...,M and k = 1,...,K. (2) Let us re-denote δ m = vec(δ m), h m = vec(h m); δ k and g k are defined analogously. Suppose that ( H,{μ m},{λ k }) is feasible for (16). Let us look into the first constraint. Suppose that μ 1 > 0. It follos from the first constraint of (16) and Schur complement lemma that h H 1 (I H )h 1 σ 2 1τ 1 μ 1ε 2 1 h H 1 (I H )(I H +μ 1I) 1 (I H )h 1. (18) It is straightforard to verify that (I H +μ 1I) 1 = 1 μ 1 (I I H μ ) by noting that (I H )(I H ) = 2 (I

6 6 Transmit poer (db) Transmit poer (db) beamformer by t search beamformer by S lemma beamformer ith perfect CSI τ (db) (a) beamformer by t search beamformer by S lemma beamformer ith perfect CSI η (db) (b) Fig. 2. (a) Average transmit poer versus the QoS of the secondary users. (b) Average transmit poer versus the interference level requirement of the primary users. H ), and to check that the right-hand side of (18) is equal to 2 μ (I H )h 1 2. It follos from (18) that (I H )h 1 2 (1+ 2 μ 1 )(σ 2 1τ 1 +μ 1ε 2 1) = ε σ 2 1τ σ 2 1τ 1 μ 1 +μ 1ε 2 1 ε σ 2 1τ 1 +2 σ 1ε 1 τ1, hich is equivalent toh 1H H 1 H (σ 1 τ1+ε 1 I H ) 2. In ords, for any μ 1 > 0, e have { [ ] I H +μ 1I (I H )h 1 : h H 1 (I H ) h H 1 (I H )h 1 σ1τ 2 1 μ 1ε 2 1 ર 0} { : H 1H H 1 H (σ 1 τ1 +ε 1 I H ) 2 }. By a limiting argument, the inclusion relation still holds for μ 1 = 0. This means that H fulfills the first constraint of (12). Similarly, e can sho that H also fulfills the second to the M-th constraints. No let us deal ith the (M+1)-th constraints of (16). Due to the feasibility of( H,{μ m},{λ k }), e see thati H +λ 1I 0, hich means H +λ 1I 0, hich in turn implies λ 1 2. In a similar ay, e can sho that H satisfies the second set of constraints of (12). REFERENCES [1] R. Zhang, Y.-C. Liang, and S. Cui, Dynamic resouce allocation in cognitive radio netorks, IEEE Signal Processing Magazine, vol. 27, no. 3, pp , May [2] Y. J. Zhang and A. M.-C. So, Optimal spectrum sharing in MIMO cognitive radio netorks via semidefinite programg, IEEE Journal on Selected Areas in Communications, vol. 29, no. 2, pp , February [3] K. T. Phan, S. A. Vorobyov, N. D. Sidiropoulos, and C. Tellambura, Spectrum sharing in ireless netorks via QoS-aare secondary multicast beamforg, IEEE Transactions on Signal Processing, vol. 57, no. 6, pp , June [4] N. Sidiropoulos, T. D. Davidson, and Z.-Q. Luo, Transmit beamforg for physical-layer multicasting, IEEE Transactions on Signal Processing, Vol. 54, No. 6, pp , June [5] A. B. Gershman, N. D. Sidiropoulos, S. Shahbazpanahi, M. Bengtsson, and B. Ottersten, Convex optimization-based beamforg: From receive to transmit and netork designs, IEEE Signal Processing Magazine, vol. 27, no. 3, pp , May [6] E. Karipidis, N.D. Sidiropoulos, and Z.-Q. Luo, Convex transmit beamforg for donlink multicasting to multiple co-channel groups, Proceedings of IEEE ICASSP, pp , [7] Z.-Q. Luo, W.-K. Ma, A. M.-C. So, Y. Ye, and S. Zhang, Semidefinite relaxation of quadratic optimization problems: From its practical deployments and scope of applicability to key theoretical results, IEEE Signal Processing Magazine, vol. 27, no. 3, pp , May [8] G. Zheng, K.-K. Wong, and B. Ottersten, Robust cognitive beamforg ith bounded channel uncertainties, IEEE Transactions on Signal Processing, vol. 57, no. 12, pp , December [9] G. Zheng, K.-K. Wong, and T.-S. Ng, Robust Linear MIMO in the Donlink: A Worst-Case Optimization ith Ellipsoidal Uncertainty Regions, EURASIP Journal on Advances in Signal Processing, vol. 2008, Article ID , 15 pages, [10] A. Ben-Tal, L. E. Ghaoui and A. Nemirovski, Robust Optimization, Princeton University Press, Princeton, Ne Jersey, [11] S.A. Vorobyov, A.B. Gershman, and Z.-Q. Luo, Robust adaptive beamforg using orst-case performance optimization: a solution to the signal mismatch problem, IEEE Transactions on Signal Processing, vol. 51, no. 2, pp , February [12] R. G. Lorenz and S. P. Boyd, Robust imum variance beamforg, IEEE Transactions on Signal Processing, vol. 53, no. 5, pp , May [13] S.A. Vorobyov, A.B. Gershman, Z.-Q. Luo, and N. Ma, Adaptive beamforg ith joint robustness against mismatched signal steering vector and interference nonstationarity, IEEE Signal Processing Letters, vol. 11, no. 2, pp , [14] T. G. Kolda, R. M. Leis, and V. Torczon, Optimization by direct search: ne perspectives on some classical and modern methods, SIAM Revie, vol. 45, no. 3, pp , [15] A. R. Conn, K. Scheinberg, and L. N. Vicente, Introduction to Derivative-Free Optimization, MPS-SIAM Series on Optimization, Philadelphia, [16] A. Nemirovski, Lectures on Modern Convex Optimization, Class Notes, Georgia Institute of Technology, Fall [Online]. Available nemirovs/lect ModConvOpt.pdf [17] W. Ai, Y. Huang, and S. Zhang, Ne results on Hermitian matrix rankone decomposition, Mathematical Programg: Series A, vol. 128, no. 1-2, pp , June [18] Y. Huang and S. Zhang, Complex matrix decomposition and quadratic programg, Mathematics of Operations Research, vol. 32, no. 3, pp , 2007.

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012 Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications

More information

SPECTRUM SHARING IN WIRELESS NETWORKS: A QOS-AWARE SECONDARY MULTICAST APPROACH WITH WORST USER PERFORMANCE OPTIMIZATION

SPECTRUM SHARING IN WIRELESS NETWORKS: A QOS-AWARE SECONDARY MULTICAST APPROACH WITH WORST USER PERFORMANCE OPTIMIZATION SPECTRUM SHARING IN WIRELESS NETWORKS: A QOS-AWARE SECONDARY MULTICAST APPROACH WITH WORST USER PERFORMANCE OPTIMIZATION Khoa T. Phan, Sergiy A. Vorobyov, Nicholas D. Sidiropoulos, and Chintha Tellambura

More information

A SEMIDEFINITE RELAXATION BASED CONSERVATIVE APPROACH TO ROBUST TRANSMIT BEAMFORMING WITH PROBABILISTIC SINR CONSTRAINTS

A SEMIDEFINITE RELAXATION BASED CONSERVATIVE APPROACH TO ROBUST TRANSMIT BEAMFORMING WITH PROBABILISTIC SINR CONSTRAINTS th European Signal Processing Conference EUSIPCO-1 Aalborg, Denmark, August 3-7, 1 A SEMIDEFINITE RELAXATION BASED CONSERVATIVE APPROACH TO ROBUST TRANSMIT BEAMFORMING WITH PROBABILISTIC SINR CONSTRAINTS

More information

New Rank-One Matrix Decomposition Techniques and Applications to Signal Processing

New Rank-One Matrix Decomposition Techniques and Applications to Signal Processing New Rank-One Matrix Decomposition Techniques and Applications to Signal Processing Yongwei Huang Hong Kong Baptist University SPOC 2012 Hefei China July 1, 2012 Outline Trust-region subproblems in nonlinear

More information

DOWNLINK transmit beamforming has recently received

DOWNLINK transmit beamforming has recently received 4254 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 8, AUGUST 2010 A Dual Perspective on Separable Semidefinite Programming With Applications to Optimal Downlink Beamforming Yongwei Huang, Member,

More information

Multiuser Downlink Beamforming: Rank-Constrained SDP

Multiuser Downlink Beamforming: Rank-Constrained SDP Multiuser Downlink Beamforming: Rank-Constrained SDP Daniel P. Palomar Hong Kong University of Science and Technology (HKUST) ELEC5470 - Convex Optimization Fall 2018-19, HKUST, Hong Kong Outline of Lecture

More information

A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT

A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Progress In Electromagnetics Research Letters, Vol. 16, 53 60, 2010 A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Y. P. Liu and Q. Wan School of Electronic Engineering University of Electronic

More information

A Novel Beamformer Robust to Steering Vector Mismatch

A Novel Beamformer Robust to Steering Vector Mismatch A Novel Beamformer Robust to Steering Vector Mismatch Chun-Yang Chen and P. P. Vaidyanathan Dept. of Electrical Engineering, MC 136-93 California Institute of Technology, Pasadena, CA 9115, USA E-mail:

More information

GRAB-N-PULL: AN OPTIMIZATION FRAMEWORK FOR FAIRNESS-ACHIEVING NETWORKS

GRAB-N-PULL: AN OPTIMIZATION FRAMEWORK FOR FAIRNESS-ACHIEVING NETWORKS GRAB-N-PULL: AN OPTIMIZATION FRAMEWORK FOR FAIRNESS-ACHIEVING NETWORKS Mojtaba Soltanalian +, Ahmad Gharanjik, M. R. Bhavani Shankar and Björn Ottersten + Dept. of Electrical and Computer Engineering,

More information

Robust Adaptive Beamforming via Estimating Steering Vector Based on Semidefinite Relaxation

Robust Adaptive Beamforming via Estimating Steering Vector Based on Semidefinite Relaxation Robust Adaptive Beamforg via Estimating Steering Vector Based on Semidefinite Relaxation Arash Khabbazibasmenj, Sergiy A. Vorobyov, and Aboulnasr Hassanien Dept. of Electrical and Computer Engineering

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is donloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Amplify-and-forard based to-ay relay ARQ system ith relay combination Author(s) Luo, Sheng; Teh, Kah Chan

More information

MULTI-INPUT multi-output (MIMO) channels, usually

MULTI-INPUT multi-output (MIMO) channels, usually 3086 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 57, NO. 8, AUGUST 2009 Worst-Case Robust MIMO Transmission With Imperfect Channel Knowledge Jiaheng Wang, Student Member, IEEE, and Daniel P. Palomar,

More information

Optimization in Wireless Communication

Optimization in Wireless Communication Zhi-Quan (Tom) Luo Department of Electrical and Computer Engineering University of Minnesota 200 Union Street SE Minneapolis, MN 55455 2007 NSF Workshop Challenges Optimization problems from wireless applications

More information

Randomized Algorithms for Optimal Solutions of Double-Sided QCQP With Applications in Signal Processing

Randomized Algorithms for Optimal Solutions of Double-Sided QCQP With Applications in Signal Processing IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 62, NO. 5, MARCH 1, 2014 1093 Randomized Algorithms for Optimal Solutions of Double-Sided QCQP With Applications in Signal Processing Yongwei Huang, Member,

More information

Acyclic Semidefinite Approximations of Quadratically Constrained Quadratic Programs

Acyclic Semidefinite Approximations of Quadratically Constrained Quadratic Programs 2015 American Control Conference Palmer House Hilton July 1-3, 2015. Chicago, IL, USA Acyclic Semidefinite Approximations of Quadratically Constrained Quadratic Programs Raphael Louca and Eilyan Bitar

More information

Handout 8: Dealing with Data Uncertainty

Handout 8: Dealing with Data Uncertainty MFE 5100: Optimization 2015 16 First Term Handout 8: Dealing with Data Uncertainty Instructor: Anthony Man Cho So December 1, 2015 1 Introduction Conic linear programming CLP, and in particular, semidefinite

More information

Max-Margin Ratio Machine

Max-Margin Ratio Machine JMLR: Workshop and Conference Proceedings 25:1 13, 2012 Asian Conference on Machine Learning Max-Margin Ratio Machine Suicheng Gu and Yuhong Guo Department of Computer and Information Sciences Temple University,

More information

Robust Transceiver Design for MISO Interference Channel with Energy Harvesting

Robust Transceiver Design for MISO Interference Channel with Energy Harvesting Robust Transceiver Design for MISO Interference Channel with Energy Harvesting Ming-Min Zhao # Yunlong Cai #2 Qingjiang Shi 3 Benoit Champagne &4 and Min-Jian Zhao #5 # College of Information Science and

More information

GENERALIZED QUADRATICALLY CONSTRAINED QUADRATIC PROGRAMMING FOR SIGNAL PROCESSING

GENERALIZED QUADRATICALLY CONSTRAINED QUADRATIC PROGRAMMING FOR SIGNAL PROCESSING 2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) GENERALIZED QUADRATICALLY CONSTRAINED QUADRATIC PROGRAMMING FOR SIGNAL PROCESSING Arash Khabbazibasmenj and Sergiy

More information

COM Optimization for Communications 8. Semidefinite Programming

COM Optimization for Communications 8. Semidefinite Programming COM524500 Optimization for Communications 8. Semidefinite Programming Institute Comm. Eng. & Dept. Elect. Eng., National Tsing Hua University 1 Semidefinite Programming () Inequality form: min c T x s.t.

More information

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems 2382 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 59, NO 5, MAY 2011 Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems Holger Boche, Fellow, IEEE,

More information

664 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 2, FEBRUARY 2010

664 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 2, FEBRUARY 2010 664 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 2, FEBRUARY 2010 Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming Yongwei Huang, Member, IEEE, Daniel

More information

MMSE Equalizer Design

MMSE Equalizer Design MMSE Equalizer Design Phil Schniter March 6, 2008 [k] a[m] P a [k] g[k] m[k] h[k] + ṽ[k] q[k] y [k] P y[m] For a trivial channel (i.e., h[k] = δ[k]), e kno that the use of square-root raisedcosine (SRRC)

More information

Minimax MMSE Estimator for Sparse System

Minimax MMSE Estimator for Sparse System Proceedings of the World Congress on Engineering and Computer Science 22 Vol I WCE 22, October 24-26, 22, San Francisco, USA Minimax MMSE Estimator for Sparse System Hongqing Liu, Mandar Chitre Abstract

More information

2 Since these problems are restrictions of the original problem, the transmission /$ IEEE

2 Since these problems are restrictions of the original problem, the transmission /$ IEEE 714 IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 1, NO. 4, DECEMBER 2007 Convex Conic Formulations of Robust Downlink Precoder Designs With Quality of Service Constraints Michael Botros Shenouda,

More information

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment Enhancing Generalization Capability of SVM Classifiers ith Feature Weight Adjustment Xizhao Wang and Qiang He College of Mathematics and Computer Science, Hebei University, Baoding 07002, Hebei, China

More information

QoS Constrained Robust MIMO Transceiver Design Under Unknown Interference

QoS Constrained Robust MIMO Transceiver Design Under Unknown Interference 2012 7th International ICST Conference on Communications and Networking in China CHINACOM) 1 os Constrained Robust MIMO Transceiver Design Under Unknown Interference Xin He, Jianwu Chen, and Yik-Chung

More information

Handout 6: Some Applications of Conic Linear Programming

Handout 6: Some Applications of Conic Linear Programming ENGG 550: Foundations of Optimization 08 9 First Term Handout 6: Some Applications of Conic Linear Programming Instructor: Anthony Man Cho So November, 08 Introduction Conic linear programming CLP, and

More information

ROBUST LINEAR DISCRIMINANT ANALYSIS WITH A LAPLACIAN ASSUMPTION ON PROJECTION DISTRIBUTION

ROBUST LINEAR DISCRIMINANT ANALYSIS WITH A LAPLACIAN ASSUMPTION ON PROJECTION DISTRIBUTION ROBUST LINEAR DISCRIMINANT ANALYSIS WITH A LAPLACIAN ASSUMPTION ON PROJECTION DISTRIBUTION Shujian Yu, Zheng Cao, Xiubao Jiang Department of Electrical and Computer Engineering, University of Florida 0

More information

Frequency-Weighted Model Reduction with Applications to Structured Models

Frequency-Weighted Model Reduction with Applications to Structured Models 27 American Control Conference http://.cds.caltech.edu/~murray/papers/sm7-acc.html Frequency-Weighted Model Reduction ith Applications to Structured Models Henrik Sandberg and Richard M. Murray Abstract

More information

Per-Antenna Power Constrained MIMO Transceivers Optimized for BER

Per-Antenna Power Constrained MIMO Transceivers Optimized for BER Per-Antenna Power Constrained MIMO Transceivers Optimized for BER Ching-Chih Weng and P. P. Vaidyanathan Dept. of Electrical Engineering, MC 136-93 California Institute of Technology, Pasadena, CA 91125,

More information

Near Optimal Adaptive Robust Beamforming

Near Optimal Adaptive Robust Beamforming Near Optimal Adaptive Robust Beamforming The performance degradation in traditional adaptive beamformers can be attributed to the imprecise knowledge of the array steering vector and inaccurate estimation

More information

Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding

Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding RadioVetenskap och Kommunikation (RVK 08) Proceedings of the twentieth Nordic Conference on Radio

More information

On the Energy-Delay Trade-off of a Two-Way Relay Network

On the Energy-Delay Trade-off of a Two-Way Relay Network On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University

More information

RADAR CODE DESIGN WITH A PEAK TO AVERAGE POWER RATIO CONSTRAINT: A RANDOMIZED APPROXIMATE APPROACH

RADAR CODE DESIGN WITH A PEAK TO AVERAGE POWER RATIO CONSTRAINT: A RANDOMIZED APPROXIMATE APPROACH RADAR CODE DESIGN WITH A PEAK TO AVERAGE POWER RATIO CONSTRAINT: A RANDOMIZED APPROXIMATE APPROACH A. De Maio, Y. Huang, M. Piezzo, S. Zhang, and A. Farina Università degli Studi di Napoli Federico II,

More information

SINR Balancing in the Downlink of Cognitive Radio Networks with Imperfect Channel Knowledge

SINR Balancing in the Downlink of Cognitive Radio Networks with Imperfect Channel Knowledge SINR Balancing in the Downlink of Cognitive Radio Networks with Imperfect Channel Knowledge Muhammad Fainan Hanif, Peter J. Smith and Mohamed-Slim Alouini Department of Electrical and Computer Engineering,

More information

Relaxations and Randomized Methods for Nonconvex QCQPs

Relaxations and Randomized Methods for Nonconvex QCQPs Relaxations and Randomized Methods for Nonconvex QCQPs Alexandre d Aspremont, Stephen Boyd EE392o, Stanford University Autumn, 2003 Introduction While some special classes of nonconvex problems can be

More information

Optimum Relay Position for Differential Amplify-and-Forward Cooperative Communications

Optimum Relay Position for Differential Amplify-and-Forward Cooperative Communications Optimum Relay Position for Differential Amplify-and-Forard Cooperative Communications Kazunori Hayashi #1, Kengo Shirai #, Thanongsak Himsoon 1, W Pam Siriongpairat, Ahmed K Sadek 3,KJRayLiu 4, and Hideaki

More information

A Low-Complexity Algorithm for Worst-Case Utility Maximization in Multiuser MISO Downlink

A Low-Complexity Algorithm for Worst-Case Utility Maximization in Multiuser MISO Downlink A Low-Complexity Algorithm for Worst-Case Utility Maximization in Multiuser MISO Downlin Kun-Yu Wang, Haining Wang, Zhi Ding, and Chong-Yung Chi Institute of Communications Engineering Department of Electrical

More information

Lecture: Examples of LP, SOCP and SDP

Lecture: Examples of LP, SOCP and SDP 1/34 Lecture: Examples of LP, SOCP and SDP Zaiwen Wen Beijing International Center For Mathematical Research Peking University http://bicmr.pku.edu.cn/~wenzw/bigdata2018.html wenzw@pku.edu.cn Acknowledgement:

More information

Minimum Mean Squared Error Interference Alignment

Minimum Mean Squared Error Interference Alignment Minimum Mean Squared Error Interference Alignment David A. Schmidt, Changxin Shi, Randall A. Berry, Michael L. Honig and Wolfgang Utschick Associate Institute for Signal Processing Technische Universität

More information

Adaptive beamforming for uniform linear arrays with unknown mutual coupling. IEEE Antennas and Wireless Propagation Letters.

Adaptive beamforming for uniform linear arrays with unknown mutual coupling. IEEE Antennas and Wireless Propagation Letters. Title Adaptive beamforming for uniform linear arrays with unknown mutual coupling Author(s) Liao, B; Chan, SC Citation IEEE Antennas And Wireless Propagation Letters, 2012, v. 11, p. 464-467 Issued Date

More information

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications Professor M. Chiang Electrical Engineering Department, Princeton University March

More information

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction

More information

Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming

Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming Authors: Christian Lameiro, Alfredo Nazábal, Fouad Gholam, Javier Vía and Ignacio Santamaría University of Cantabria,

More information

Introduction to Convex Optimization

Introduction to Convex Optimization Introduction to Convex Optimization Daniel P. Palomar Hong Kong University of Science and Technology (HKUST) ELEC5470 - Convex Optimization Fall 2018-19, HKUST, Hong Kong Outline of Lecture Optimization

More information

Research Article Analytical Computation of Information Rate for MIMO Channels

Research Article Analytical Computation of Information Rate for MIMO Channels Hindai Computer etorks and Communications Volume 7, Article ID 6958, 6 pages https://doi.org/.55/7/6958 Research Article Analytical Computation of Information Rate for MIMO Channels Jinbao Zhang, Zhenhui

More information

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 In the previous lecture, e ere introduced to the SVM algorithm and its basic motivation

More information

Lecture 3a: The Origin of Variational Bayes

Lecture 3a: The Origin of Variational Bayes CSC535: 013 Advanced Machine Learning Lecture 3a: The Origin of Variational Bayes Geoffrey Hinton The origin of variational Bayes In variational Bayes, e approximate the true posterior across parameters

More information

Multi-antenna Relay Network Beamforming Design for Multiuser Peer-to-Peer Communications

Multi-antenna Relay Network Beamforming Design for Multiuser Peer-to-Peer Communications 14 IEEE International Conference on Acoustic, Speech and Signal Processing ICASSP Multi-antenna Relay Networ Beamforming Design for Multiuser Peer-to-Peer Communications Jiangwei Chen and Min Dong Department

More information

arxiv: v1 [cs.it] 14 Mar 2018

arxiv: v1 [cs.it] 14 Mar 2018 SYMBOL-LEVEL PRECODING IS SYMBOL-PERTURBED ZF WHEN ENERGY EFFICIENCY IS SOUGHT Yatao Liu and Wing-Kin Ma Department of Electronic Engineering, The Chinese University of Hong Kong, Hong Kong SAR, China

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2)

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2) IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 361 Uplink Downlink Duality Via Minimax Duality Wei Yu, Member, IEEE Abstract The sum capacity of a Gaussian vector broadcast channel

More information

Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems. Ali Ramezani-Kebrya

Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems. Ali Ramezani-Kebrya Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems by Ali Ramezani-Kebrya A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy

More information

CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS

CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS INTRODUCTION David D. Bennink, Center for NDE Anna L. Pate, Engineering Science and Mechanics Ioa State University Ames, Ioa 50011 In any ultrasonic

More information

Linear Regression Linear Regression with Shrinkage

Linear Regression Linear Regression with Shrinkage Linear Regression Linear Regression ith Shrinkage Introduction Regression means predicting a continuous (usually scalar) output y from a vector of continuous inputs (features) x. Example: Predicting vehicle

More information

A Hierarchy of Suboptimal Policies for the Multi-period, Multi-echelon, Robust Inventory Problem

A Hierarchy of Suboptimal Policies for the Multi-period, Multi-echelon, Robust Inventory Problem A Hierarchy of Suboptimal Policies for the Multi-period, Multi-echelon, Robust Inventory Problem Dimitris J. Bertsimas Dan A. Iancu Pablo A. Parrilo Sloan School of Management and Operations Research Center,

More information

COS 424: Interacting with Data. Lecturer: Rob Schapire Lecture #15 Scribe: Haipeng Zheng April 5, 2007

COS 424: Interacting with Data. Lecturer: Rob Schapire Lecture #15 Scribe: Haipeng Zheng April 5, 2007 COS 424: Interacting ith Data Lecturer: Rob Schapire Lecture #15 Scribe: Haipeng Zheng April 5, 2007 Recapitulation of Last Lecture In linear regression, e need to avoid adding too much richness to the

More information

Matrix Rank-One Decomposition. and Applications

Matrix Rank-One Decomposition. and Applications Matrix rank-one decomposition and applications 1 Matrix Rank-One Decomposition and Applications Shuzhong Zhang Department of Systems Engineering and Engineering Management The Chinese University of Hong

More information

WE consider an array of sensors. We suppose that a narrowband

WE consider an array of sensors. We suppose that a narrowband IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 56, NO. 4, APRIL 2008 1539 Robust Beamforming via Worst-Case SINR Maximization Seung-Jean Kim, Member, IEEE, Alessandro Magnani, Almir Mutapcic, Student Member,

More information

HEURISTIC METHODS FOR DESIGNING UNIMODULAR CODE SEQUENCES WITH PERFORMANCE GUARANTEES

HEURISTIC METHODS FOR DESIGNING UNIMODULAR CODE SEQUENCES WITH PERFORMANCE GUARANTEES HEURISTIC METHODS FOR DESIGNING UNIMODULAR CODE SEQUENCES WITH PERFORMANCE GUARANTEES Shankarachary Ragi Edwin K. P. Chong Hans D. Mittelmann School of Mathematical and Statistical Sciences Arizona State

More information

A NONCONVEX ADMM ALGORITHM FOR GROUP SPARSITY WITH SPARSE GROUPS. Rick Chartrand and Brendt Wohlberg

A NONCONVEX ADMM ALGORITHM FOR GROUP SPARSITY WITH SPARSE GROUPS. Rick Chartrand and Brendt Wohlberg A NONCONVEX ADMM ALGORITHM FOR GROUP SPARSITY WITH SPARSE GROUPS Rick Chartrand and Brendt Wohlberg Los Alamos National Laboratory Los Alamos, NM 87545, USA ABSTRACT We present an efficient algorithm for

More information

A Customized ADMM for Rank-Constrained Optimization Problems with Approximate Formulations

A Customized ADMM for Rank-Constrained Optimization Problems with Approximate Formulations A Customized ADMM for Rank-Constrained Optimization Problems with Approximate Formulations Chuangchuang Sun and Ran Dai Abstract This paper proposes a customized Alternating Direction Method of Multipliers

More information

Robust Beamforming via Matrix Completion

Robust Beamforming via Matrix Completion Robust Beamforming via Matrix Comletion Shunqiao Sun and Athina P. Petroulu Deartment of Electrical and Comuter Engineering Rutgers, the State University of Ne Jersey Piscataay, Ne Jersey 8854-858 Email:

More information

2318 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 6, JUNE Mai Vu, Student Member, IEEE, and Arogyaswami Paulraj, Fellow, IEEE

2318 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 6, JUNE Mai Vu, Student Member, IEEE, and Arogyaswami Paulraj, Fellow, IEEE 2318 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 6, JUNE 2006 Optimal Linear Precoders for MIMO Wireless Correlated Channels With Nonzero Mean in Space Time Coded Systems Mai Vu, Student Member,

More information

Operations Research Letters

Operations Research Letters Operations Research Letters 37 (2009) 1 6 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Duality in robust optimization: Primal worst

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

Linear Regression Linear Regression with Shrinkage

Linear Regression Linear Regression with Shrinkage Linear Regression Linear Regression ith Shrinkage Introduction Regression means predicting a continuous (usually scalar) output y from a vector of continuous inputs (features) x. Example: Predicting vehicle

More information

The Optimality of Beamforming: A Unified View

The Optimality of Beamforming: A Unified View The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,

More information

A New SLNR-based Linear Precoding for. Downlink Multi-User Multi-Stream MIMO Systems

A New SLNR-based Linear Precoding for. Downlink Multi-User Multi-Stream MIMO Systems A New SLNR-based Linear Precoding for 1 Downlin Multi-User Multi-Stream MIMO Systems arxiv:1008.0730v1 [cs.it] 4 Aug 2010 Peng Cheng, Meixia Tao and Wenjun Zhang Abstract Signal-to-leaage-and-noise ratio

More information

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of

More information

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints Upper Bounds on IO Channel Capacity with Channel Frobenius Norm Constraints Zukang Shen, Jeffrey G. Andrews, Brian L. Evans Wireless Networking Communications Group Department of Electrical Computer Engineering

More information

The Trust Region Subproblem with Non-Intersecting Linear Constraints

The Trust Region Subproblem with Non-Intersecting Linear Constraints The Trust Region Subproblem with Non-Intersecting Linear Constraints Samuel Burer Boshi Yang February 21, 2013 Abstract This paper studies an extended trust region subproblem (etrs in which the trust region

More information

Lagrange Duality. Daniel P. Palomar. Hong Kong University of Science and Technology (HKUST)

Lagrange Duality. Daniel P. Palomar. Hong Kong University of Science and Technology (HKUST) Lagrange Duality Daniel P. Palomar Hong Kong University of Science and Technology (HKUST) ELEC5470 - Convex Optimization Fall 2017-18, HKUST, Hong Kong Outline of Lecture Lagrangian Dual function Dual

More information

K User Interference Channel with Backhaul

K User Interference Channel with Backhaul 1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University

More information

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS Pratik Patil, Binbin Dai, and Wei Yu Department of Electrical and Computer Engineering University of Toronto,

More information

A Modified ν-sv Method For Simplified Regression A. Shilton M. Palaniswami

A Modified ν-sv Method For Simplified Regression A. Shilton M. Palaniswami A Modified ν-sv Method For Simplified Regression A Shilton apsh@eemuozau), M Palanisami sami@eemuozau) Department of Electrical and Electronic Engineering, University of Melbourne, Victoria - 3 Australia

More information

ITERATIVE OPTIMIZATION FOR MAX-MIN SINR IN DENSE SMALL-CELL MULTIUSER MISO SWIPT SYSTEM

ITERATIVE OPTIMIZATION FOR MAX-MIN SINR IN DENSE SMALL-CELL MULTIUSER MISO SWIPT SYSTEM ITERATIVE OPTIMIZATION FOR MAX-MIN SINR IN DENSE SMALL-CELL MULTIUSER MISO SWIPT SYSTEM Ali Arshad Nasir, Duy Trong Ngo, Hoang Duong Tuan and Salman Durrani Research School of Engineering, Australian National

More information

Under sum power constraint, the capacity of MIMO channels

Under sum power constraint, the capacity of MIMO channels IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 6, NO 9, SEPTEMBER 22 242 Iterative Mode-Dropping for the Sum Capacity of MIMO-MAC with Per-Antenna Power Constraint Yang Zhu and Mai Vu Abstract We propose an

More information

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong Multi-User Gain Maximum Eigenmode Beamforming, and IDMA Peng Wang and Li Ping City University of Hong Kong 1 Contents Introduction Multi-user gain (MUG) Maximum eigenmode beamforming (MEB) MEB performance

More information

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,

More information

Energy Minimization via a Primal-Dual Algorithm for a Convex Program

Energy Minimization via a Primal-Dual Algorithm for a Convex Program Energy Minimization via a Primal-Dual Algorithm for a Convex Program Evripidis Bampis 1,,, Vincent Chau 2,, Dimitrios Letsios 1,2,, Giorgio Lucarelli 1,2,,, and Ioannis Milis 3, 1 LIP6, Université Pierre

More information

A semidefinite relaxation scheme for quadratically constrained quadratic problems with an additional linear constraint

A semidefinite relaxation scheme for quadratically constrained quadratic problems with an additional linear constraint Iranian Journal of Operations Research Vol. 2, No. 2, 20, pp. 29-34 A semidefinite relaxation scheme for quadratically constrained quadratic problems with an additional linear constraint M. Salahi Semidefinite

More information

y(x) = x w + ε(x), (1)

y(x) = x w + ε(x), (1) Linear regression We are ready to consider our first machine-learning problem: linear regression. Suppose that e are interested in the values of a function y(x): R d R, here x is a d-dimensional vector-valued

More information

Adaptive Noise Cancellation

Adaptive Noise Cancellation Adaptive Noise Cancellation P. Comon and V. Zarzoso January 5, 2010 1 Introduction In numerous application areas, including biomedical engineering, radar, sonar and digital communications, the goal is

More information

ASYMPTOTIC PERFORMANCE OF MIMO WIRELESS CHANNELS WITH LIMITED FEEDBACK

ASYMPTOTIC PERFORMANCE OF MIMO WIRELESS CHANNELS WITH LIMITED FEEDBACK ASYMPTTIC PERFRMANCE F MIM WIRELESS CHANNELS WITH LIMITED FEEDBACK Wiroonsak Santipach and Michael L. Honig Department of Electrical and Computer Engineering Northestern University 2145 Sheridan Road Evanston,

More information

On the approximation of real powers of sparse, infinite, bounded and Hermitian matrices

On the approximation of real powers of sparse, infinite, bounded and Hermitian matrices On the approximation of real poers of sparse, infinite, bounded and Hermitian matrices Roman Werpachoski Center for Theoretical Physics, Al. Lotnikó 32/46 02-668 Warszaa, Poland Abstract We describe a

More information

An Investigation of the use of Spatial Derivatives in Active Structural Acoustic Control

An Investigation of the use of Spatial Derivatives in Active Structural Acoustic Control An Investigation of the use of Spatial Derivatives in Active Structural Acoustic Control Brigham Young University Abstract-- A ne parameter as recently developed by Jeffery M. Fisher (M.S.) for use in

More information

Agenda. Applications of semidefinite programming. 1 Control and system theory. 2 Combinatorial and nonconvex optimization

Agenda. Applications of semidefinite programming. 1 Control and system theory. 2 Combinatorial and nonconvex optimization Agenda Applications of semidefinite programming 1 Control and system theory 2 Combinatorial and nonconvex optimization 3 Spectral estimation & super-resolution Control and system theory SDP in wide use

More information

A Framework for Training-Based Estimation in Arbitrarily Correlated Rician MIMO Channels with Rician Disturbance

A Framework for Training-Based Estimation in Arbitrarily Correlated Rician MIMO Channels with Rician Disturbance A Framework for Training-Based Estimation in Arbitrarily Correlated Rician MIMO Channels with Rician Disturbance IEEE TRANSACTIONS ON SIGNAL PROCESSING Volume 58, Issue 3, Pages 1807-1820, March 2010.

More information

A turbulence closure based on the maximum entropy method

A turbulence closure based on the maximum entropy method Advances in Fluid Mechanics IX 547 A turbulence closure based on the maximum entropy method R. W. Derksen Department of Mechanical and Manufacturing Engineering University of Manitoba Winnipeg Canada Abstract

More information

Convex relaxation. In example below, we have N = 6, and the cut we are considering

Convex relaxation. In example below, we have N = 6, and the cut we are considering Convex relaxation The art and science of convex relaxation revolves around taking a non-convex problem that you want to solve, and replacing it with a convex problem which you can actually solve the solution

More information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 52, NO. 5, MAY

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 52, NO. 5, MAY IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 52, NO. 5, MAY 2004 1179 Optimum Linear Joint ansmit-receive Processing for MIMO Channels with QoS Constraints Daniel Pérez Palomar, Member, IEEE, Miguel Angel

More information

Robust Adaptive Beamforming for. General-Rank Signal Model with Positive Semi-Definite Constraint via POTDC

Robust Adaptive Beamforming for. General-Rank Signal Model with Positive Semi-Definite Constraint via POTDC Robust Adaptive Beamforming for 1 General-Rank Signal Model with Positive Semi-Definite Constraint via POTDC arxiv:1212.3624v1 [cs.it] 14 Dec 2012 Arash Khabbazibasmenj, Student Member, IEEE, Sergiy A.

More information

Sum Rate Maximizing Multigroup Multicast Beamforming under Per-antenna Power Constraints

Sum Rate Maximizing Multigroup Multicast Beamforming under Per-antenna Power Constraints Sum Rate Maximizing Multigroup Multicast Beamforming under Per-antenna Power Constraints 1 arxiv:1407.0005v1 [cs.it] 29 Jun 2014 Dimitrios Christopoulos, Symeon Chatzinotas and Björn Ottersten SnT - securityandtrust.lu,

More information

Lecture 7 MIMO Communica2ons

Lecture 7 MIMO Communica2ons Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10

More information

Capacity optimization for Rician correlated MIMO wireless channels

Capacity optimization for Rician correlated MIMO wireless channels Capacity optimization for Rician correlated MIMO wireless channels Mai Vu, and Arogyaswami Paulraj Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford, CA

More information

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,

More information

Convex relaxation. In example below, we have N = 6, and the cut we are considering

Convex relaxation. In example below, we have N = 6, and the cut we are considering Convex relaxation The art and science of convex relaxation revolves around taking a non-convex problem that you want to solve, and replacing it with a convex problem which you can actually solve the solution

More information

QUADRATICALLY constrained quadratic programming

QUADRATICALLY constrained quadratic programming IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 64, NO. 20, OCTOBER 15, 2016 5297 Consensus-ADMM for General Quadratically Constrained Quadratic Programming Kejun Huang, Student Member, IEEE, and Nicholas

More information

Signaling Design of Two-Way MIMO Full-Duplex Channel: Optimality Under Imperfect Transmit Front-End Chain

Signaling Design of Two-Way MIMO Full-Duplex Channel: Optimality Under Imperfect Transmit Front-End Chain DRAFT 1 Signaling Design of Two-Way MIMO Full-Duplex Channel: Optimality Under Imperfect Transmit Front-End Chain Shuqiao Jia and Behnaam Aazhang, arxiv:1506.00330v1 [cs.it] 1 Jun 2015 Abstract We derive

More information