Efficient OOK/DS-CDMA Detection Threshold Selection

Size: px
Start display at page:

Download "Efficient OOK/DS-CDMA Detection Threshold Selection"

Transcription

1 2013 American Control Conference ACC) Washington, DC, USA, June 17-19, 2013 Efficient OOK/DS-CDMA Detection Threshold Selection Dimitrios Katselis, Carlo Fischione and Håan Hjalmarsson Abstract A major constraint in deployments of wireless sensor networs WSNs) is the energy consumption related to the battery lifetime of the networ nodes. To this end, power efficient digital modulation techniques such as On- Off eying OOK) are highly attractive. However, the OOK detection thresholds, namely the thresholds against which the received signals are compared to detect which bit is transmitted, must be carefully selected to minimize the bit error rate. This is challenging to accomplish in resource-limited nodes with constrained computational capabilities. In this paper, the system scenario considers simultaneously transmitting nodes in Rayleigh fading conditions. Various iterative algorithms to numerically select the detection thresholds are established. Convergence analysis accompanies these algorithms. Numerical simulations are provided to support the derived results and to compare the proposed algorithms. It is concluded that OOK modulation is beneficial in resource constrained WSNs provided that efficient optimization algorithms are employed for the threshold selection. I. INTRODUCTION Minimizing the energy consumption is a crucial tas in the deployment of WSNs. To this end, on off eying OOK) has been proposed as an effective technique for these networs 1] 3]. To minimize the bit error rate BER) at the receiver, OOK requires an optimal real-time computation of the detection thresholds. However, such an operation is difficult or impossible to perform in resourcelimited nodes, because accurate channel state information CSI) for both the useful and the interfering signals must be acquired. The difficulty is exacerbated when nodes have high mobility, where due to moving metal objects, or movements of the nodes themselves, the nodes experience severe fading conditions. Vehicular applications are also a typical example, where the node or obstacle mobility give quic and deep fading fluctuations in addition to induced Doppler spread and time-selectivity of the channels. In all these situations, the minimization of the average BER is of relevant interest 4]. This yields the need for proper threshold selection, if OOK is employed. We assume OOK modulation over direct sequence code division multiple access DS-CDMA) with randomly selected signatures for each node. This modulation, together with the DS-CDMA, is commonly employed in popular WSN standards such as IEEE ]. To minimize the computations performed in each node, the derivation This wor was supported by the European Research Council under the advanced grant LEARN, the Swedish Research Council under the contract and by EU projects Hydrobionets and Hycon2. D. Katselis, C. Fischione and H. Hjalmarsson are with the Automatic Control Lab, ACCESS Linnaeus Center, School of Electrical Engineering, KTH Royal Institute of Technology , Stocholm, Sweden. dimitri@th.se, carlofi@ee.th.se, hjalmars@th.se. of closed-form expressions for the average bit error probability BEP) would be of interest. The threshold selection problem becomes challenging due to the absence of such expressions. Instead, accurate approximations of acceptable computational complexity for the average BEP may be used to serve this goal. In this paper, we first propose an approximation to the average BEP. Then, we derive three iterative numerical algorithms offering different performance. The algorithms minimize the average BEP in every transmitter-receiver pair, while they run locally in the receiving nodes, providing them with the detection thresholds. For the first algorithm, we show how its time-varying step sizes have to be selected to minimize the number of iterations, which reduces the computational complexity. Then, a second algorithm, which is a variation of the first algorithm, is developed based on a constant stepsize. Finally, to shed more light into the detection threshold selection problem, we propose a third algorithm that uses a heavy ball version of the second algorithm 11]. The first and second algorithms are of firstorder, in the sense that each new threshold, produced at the end of an iteration, only depends on the previous threshold. The heavy ball formulation of the third algorithm introduces memory to the threshold selection, maing the order of the algorithm equal to 2. This approach is similar to the well-nown Successive Over-Relaxation SOR) method in numerical analysis 12]. To give the approximation of the average BEP, assumptions have to be imposed on the nature of fast fading and shadowing impairing the communication lins between the desired transmitter and receiver and between the interferers and the desired receiver. However, the focus of this paper is mainly on the problem of detection threshold selection. Therefore, we consider only fast fading as in 7], 8] and we examine the Rayleigh case 13], 14]. The rest of the paper is organized as follows: Section II presents the system model occurring by using the OOK modulation over DS-CDMA with random signatures. The BEP is analytically approximated in Section III. Algorithms for selecting the detection thresholds are derived in Section IV. Supporting simulations verifying the validity of our analysis are provided in Section V, whereas Section VI concludes the paper. II. SYSTEM MODEL Consider the scenario where K transmitter-receiver pairs of nodes are communicating. The bits of the ith transmitter, i = 1,...,K, are transmitted using an OOK modulation: only bits having value one are transmitted over the wireless /$ AACC 3523

2 channel, while no signal is transmitted when the bit is zero. Assuming DS-CDMA, each bit is transmitted via a spreading sequence. Considering the realistic scenario of imperfect synchronization among distributed nodes, the asynchronous version of DS-CDMA is considered. The same fixed bandwidth W is allocated to each transmitter-receiver pair. Let N = T b /T c be the processing gain, where T b and T c are the bit and chip durations, respectively. All the communication lins in the networ are considered narrowband, therefore the fading is assumed to be flat. These assumptions are representative of the IEEE standard. We will only consider the case of slow flat fading, therefore all channels are considered quasi-static with respect to the duration of two spreading sequences, i.e, two bit symbol) durations. To elaborate more the signal model, we assume that the transmitter of the ith lin transmits the signal 8] s i t) = 2p i b i t)a i t)cosω c t+θ i ), 1) where p i represents the transmitted signal power, b i t) is the data signal data waveform), a i t) the spreading waveform, ω c the carrier frequency and θ i the phase angle of the carrier for the ith transmitter 1. The data signal b i t) is a random process expressed as b i t) = + = b i) dt T b), 2) where dt) = 1,0 t < T b and dt) = 0 otherwise. Additionally, b i) denotes the th bit of the ith transmitter, taing values in {0,1} with probabilities Prb i) = 1] = π i),prb i) = 0] = 1 πi) for all. The spreading signal can be expressed as a i t) = + = a i) ct T c), 3) where ct) is the chip waveform time-limited to 0,T c ). Usually, the chip waveform is assumed to be normalized so that T c c 2 t)dt = T 0 c, while the th chip of the ith user,, taes on values in { 1,+1}. All signatures {ai) } are randomly generated in the sense that every chip polarity is determined by flipping an unbiased coin. Each signal s i t) is transmitted through a flat fading channel. Let h ij t) be the wireless channel coefficient associated to the path from the transmitter of the ith lin to the receiver of the jth lin. Then, h ij t) can be expressed as 8], 14] a i) h ij t) = A ij e jβij δt τ ij ), 4) where δt) represents the Dirac delta function. The fading random variables A ij s are independent and they follow a Rayleigh distribution. Furthermore, A ij s correspond to the envelope of complex Gaussian random processes and {β ij } K i,j=1 correspond to random phases introduced by the channel, considered to be uniformly distributed in 0,2π) 14]. Finally, {τ ij } K i,j=1 correspond to propagation delays 1 transmitter of the ith lin through the wireless medium and lac of synchronism amongst the transmitters. They are assumed to be random variables uniformly distributed in 0,T b ). The received signal at the input of the jth correlation matched filter) receiver is r j t) = = K s i t) h ij t)+n j t) i=1 K 2pi A ij b i t τ ij )a i t τ ij )cosω c t+φ ij ) i=1 +n j t), 5) where denotes convolution. Easily, φ ij = θ i + β ij ω c τ ij and is uniformly distributed in 0,2π). Furthermore, n j t) is assumed to be zero mean, white Gaussian noise with two-sided power spectral density N 0 /2. The random variables, defined above, are generated by different physical sources, thus {A ij } K i,j=1,{φ ij} K i,j=1,{bi) }K i=1,{ai) }K i=1 are mutually independent 7], 8]. In the next section, we characterize the bit error probability experienced at a receiver node. III. BIT ERROR PROBABILITY In this section, we give the expression of the BER that will be used in the development of the iterative detection threshold algorithms. Due to the basic assumptions and properties of the spreadspectrum multiple access systems, our setup possesses symmetry with respect to the desired receiver. Therefore, we can focus on the received signal of the jth receiver. Additionally, only relative time delays and phase angles are important. Thus, without loss of generality we can set φ jj = τ jj = 0. The parameters {τ ij },{φ ij },i j are now the time delays and phase differences of the ith transmitter relative to the jth transmitter at the jth receiver 6], 9]. The decision statistic at the output of the jth coherent correlation receiver for the th transmitted bit of the jth transmitter, is Z j) = D j) +I j) +N j), 6) where D j) is the information bearing signal for the jth pair, I j) is the multiple access interference MAI) due to the presence of multiple transmitting nodes and N j) is the AWGN noise having zero mean and variance N 0 T b /4. Then and I j) K i=1,i j D j) B j) bj) = pj 2 A jjt b }{{} B j) b j), 7) pi 2 A ij b i) 1 Rij) τ ij )+b i) ˆR ] ij) τ ij ) cosφ ij ), 8) 3524

3 where R ij) τ ij ), ˆR ij) τ ij ) are continuous-time partial correlation functions given by R ij) τ ij ) = ˆR ij) τ ij ) = τij 0 Tb a i t τ ij )a j t)dt, τ ij a i t τ ij )a j t)dt 9) and 0 τ ij < T b. We denote b i) 1 Rij) τ ij )+b i) ˆR ij) τ ij ) by W ij), where we neglect the dependence on the subscript due to symmetry of our problem with respect to this subscript. A complete probabilistic description of W ij) is very complicated and long, thus it is omitted here due to lac of space 2. To setup the algorithms for the threshold selection, we need to have an accurate expression or approximation of the BEP. For the case of BPSK, two approaches to obtain such an approximation appear in 8], 16], namely the standard Gaussian approximation SGA) and the improved Gaussian approximation IGA). It has been observed that the IGA is much more accurate than the SGA, especially for small K. Furthermore, in 16], Holtzman has proposed a much simpler but still accurate BEP approximation based on the Stirling formula. We will pursue an analogous approximation here for the OOK modulation. Let A j) be the set of indices corresponding to chip boundaries without transitions in the signature waveform of the jth transmitter and B j) the set of indices corresponding to chip boundaries with transitions in the same signature waveform 6]. Clearly, A j) B j) =, A j) B j) = {0,1,...,N 1}, A j) + B j) = N 1, while according to our assumptions both A j) and B j) are uniformly distributed on {0,1,...,N 1}. Here, C denotes the cardinality of the set C, the set intersection, the set union and the empty set. Furthermore, we assume that G ij) = p i /2A ij cosφ ij ) and we define the set G j) = {G 1j),G 2j),...,G j 1j),G j+1j),...,g Kj) }. Similarly, S j) = {S 1j),S 2j),...,S j 1j),S j+1j),...,s Kj) }, where S ij) = τ ij τ ij /T c T c U0,T c ) models the fractional chip displacement of the ith transmitter relative to the jth transmitter at the jth receiver. Denoting by E ] the expectation operator and using a similar analysis as in 8], 16] for the IGA, it can be proved that 3 E I j) +N j) Gj),S j),b j)] = 0. Furthermore, we may define ϑ j as follows: ) ] 2 G ϑ j = E I j) +N j) j),s j),b j). 10) Based on the fact that G ij) are zero mean Gaussian random variables with variance EA 2 ij ]p i/4, it can be shown that all 2 This analysis is beyond the scope of this paper. It will be presented together with the complete proofs of lemmas and propositions in this paper in the corresponding journal version. 3 This result is a direct consequence of the aforementioned probabilistic description of W ij) omitted here due to lac of space. the moments, hence the probability density functions, of ϑ j s are nown. Remar 1: The above is exploited in IGA. Nevertheless, Stirling formula can provide a tight approximation of the probability of error 16]. The derivation of the BER distinguishes two cases of error: the decision variable 6) is decoded as a zero bit, when a one bit was transmitted; or 6) is decoded as one, when no bit was transmitted. Conditioning on the transmitted bits of the jth transmitter, its channel amplitude A jj and G j),s j),b j), we denote these probabilities by P j 0,Ajj,G j),s j),bj) and P j 1,Ajj,G j),s j),bj), respectively, where P j 0,Ajj,G j),s j),b =Pr Z j) j) δ j b j) = 0,A jj,g j),s j), ) B j)] δ j = Q, 11) ϑj P j 1,Ajj,G j),s j),b =Pr Z j) j) < δ j b j) = 1,A jj,g j),s j), ) B j)] B j) δ j = Q, 12) ϑj where δ j is the decision threshold for Z j), Qx) = 1/ 2π x exp t2 /2)dt is the complementary standard Gaussian distribution function. In 12), we have used the even symmetry of the Gaussian bell. By averaging with respect to A jj,g j),s j),b j), we obtain )] P j δ j ) = 1 π j)) δ j E Ajj,G j),s j),b Q j) ϑj +π j) E Ajj,G j),s j),b j) Q )] B j) δ j. ϑj 13) The minimization of 13) with respect to δ j is difficult, because the resulting probability function is non linear and no closed-form is available for the expectations. Hence, we resort to the Stirling approximation proposed by Holtzman 16], as we mentioned earlier. With this goal in mind, let us define the random variables ζ j0 δ j ) = δ j / ϑ j, ζ j1 δ j ) = B j) δ j )/ ϑ j. Let µ ζjb δ j ) and σ ζjb δ j ) be the mean value and standard deviation of ζ jb for b = 0,1, respectively, with respect to A jj,g j),s j),b j). Then, by 14], 16] we have EQζ jb )] f b δ j ) 2 3 Q µ ζjb δ j ) ) + 1 µ 6 Q ζjb δ j )+ ) 3σ ζjb δ j ) + 1 µ 6 Q ζjb δ j ) ) 3σ ζjb δ j ). 14) Eq. 14) can be used to compute an approximate expression of the BEP 13): P j δ j ) 1 π j) )f 0 δ j )+π j) f 1 δ j ). 15) 3525

4 The nowledge of the probability density functions of ϑ j s can be used to compute the mean values of 1/ ϑ j and 1/ϑ j present in µ ζjb δ j ) and σ ζjb δ j ), b = 0,1, e.g., by employing Riemann integrations over the essential support of the involved random variables. In the next section, we present algorithms to efficiently select the detection thresholds. IV. OPTIMAL DETECTION THRESHOLDS The optimal value of δ j, which we denote by δj, is given by the minimization of 15). Instantaneously, the threshold should be placed between the minimum and maximum value of esssupp{d j) }, where esssupp{x} stands for the essential support of the variable x. Since we are ] averaging over A jj,g j),s j),b j), δj j), where j) min, j) max min = 2 q T b σ Ajj pj /2 and j) max = µ j) B +2 q T b σ Ajj pj /2. Here, µ j) B = p i /2EA jj ]T b and σa 2 jj the variance of A jj. Moreover, the integers q, have to be empirically selected. An empirical rule of thumb corresponds to q 2, = 1. We now state the following important result: Proposition 1: There is a unique minimum of the BEP 15), which is attained when 1 π j)) df 0 δ j ) +π j)df 1δ j ) = 0. 16) Setch of Proof : The BEP 15) is given by the sum of a strictly decreasing function and ] a strictly increasing function in the region j) min, j) max under very mild conditions. Therefore, there is a unique minimum in this interval. To prove that this minimum is attained at points where the BEP derivative ] is zero, note that there are values of δ j in j) min, j) max such that df b δ j )/,b = 0,1 are both positive or negative. Since these derivatives are continuous functions of δ j, it follows that there are δ j s for which the BEP derivative is zero. Remar 2: It can be shown that the BEP probability is a quasiconvex function. Furthermore, dp j 0)/ 0, P j δ j ) 1 π j) ) as δ j and P j δ j ) π j) as δ j +. Therefore,δ j 0) = 0 is a good initialization point for the following detection threshold selection algorithms based on the general notion of descent directions. From Proposition 1, it follows that the minimum of the BEP is given by solving 16). Unfortunately, the derivatives of the functions f 0 δ j ) and f 1 δ j ) are highly non-linear and a closed-form solution cannot be achieved. Numerical techniques have to be used. Simple algorithms such as the steepest-descent, the bisection or a straightforward gridding 17] can be applied to compute the solution of 16). These algorithms, however, are not optimized for our function at hand. In the following, we propose an algorithm for a quic numerical computation of the optimal detection thresholds. A. Algorithm 1: Optimal Contractive Threshold Selector OCTS) Proposition 1 suggests the following iterative algorithm: δ j +1) = δ j ) β) 1 π j)) df 0 δ j )) +π j)df ] 1δ j )), 17) where is the iteration step, and β) is any scalar. When β) is such that the mapping is contractive, then it is easy to show that the fixed point of the mapping belongs in the set interval) of possible optimal detection thresholds 18]. The important question is how to choose β) so that the convergence of the algorithm is quic. We have the following result: Proposition 2: Let the convergence rate of the algorithm in 17) be given by the Lipschitz constant of the iteration and βj) 1 = ). 18) 1 π j) d 2 f 0 δ j )) +π dδj 2 j)d2 f 1 δ j )) dδj 2 Then the convergence rate is maximized. By the previous results, we can set up an optimal algorithm for the determination of the detection thresholds, given by the following iteration: δ j +1) =δ j ) β j) 1 π j)) df 0 δ j )) +π j)df ] 1δ j )), 19) In the following, we will call this algorithm Optimal Contractive Threshold Selector OCTS). Remar 3: Clearly, the OCTS is a first-order algorithm in the sense that every new threshold computation depends only on the previous threshold. Note that in every step of the algorithm, the optimal stepsize βj ), as well as the factor in the bracets, have to be re-evaluated. Additionally, OCTS is a time-varying step size algorithm. In the sequel, we propose an alternative version of this algorithm that uses a constant stepsize till the algorithm converges. This is motivated by the fact that a constant stepsize is generally computationally easier to achieve. B. Algorithm 2: Constant Contractive Threshold Selector CCTS) The OCTS has the form of the standard gradient method. The study of this standard version will lead to many useful results, conclusions and variants for the OCTS. In essence, we want to minimize 15) and we set up an iteration of the form: δ j +1) = δ j ) β) dp jδ j )) 20) for some initial threshold δ j 0) and some step size β). An alternative way to examine if 20) converges and at what speed, is to chec if P j δ j ) is twice differentiable, strongly convex and if dp j δ j )/ is Lipschitz continuous. 3526

5 Clearly, P j δ j ) is twice differentiable. Furthermore, P j δ j ) is strongly convex and has a Lipschitz derivative ] if 0 < l d 2 P j δ j )/dδj 2 L for all δ j j) min, j) max. ] The last condition may not hold for all δ j j) min, j) max. Nevertheless, in our context ] it is enough to show ] that there is a subinterval Γ j) min,γj) max j) min, j) max such that this condition holds. Since there is a threshold point nulling the first derivative of BEP, there is a neighborhood around this point that the second derivative is positive. This implies the existence of the aforementioned desired subinterval. If l,l are nown beforehand, then it is not hard to see that the best convergence rate is attained for β j ) = 2/L + l), which results to ) L l δ j +1) δj δ j ) δ L+l j 21) for the gradient method. We may also proceed even further by isolating the function gl,l) = L l)/l + l). It can be easily checed that g/ L > 0 and g/ l < 0. The convergence { speed is therefore maximized ]} when l = inf d 2 P j δ j )/dδj 2 δ j Γ j) min,γj) max and L = { ]} sup d 2 P j δ j )/dδj 2 δ j Γ j) min,γj) max. The constants l and L can be determined via line search as follows: { l = inf d 2 P j δ j )/dδj 2 > 0 δ j { L = sup d 2 P j δ j )/dδj 2 > 0 δ j j) min, j) max j) min, j) max ]}, ]} 22) Equation 21) shows that for given l,l we can setup the algorithm: Clearly, the gradient algorithm for the tas of the threshold computation is first-order, while the heavy ball method yields a second-order algorithm. This is done by introducing memory to the computation process. If P j δ j ) were strongly convex and had Lipschitz continuous derivatives everywhere, then the heavy ball method would converge 11]. The inequality describing its convergence properties would be: δ j +1) =δ j ) 2 1 π j)) df 0 δ j )) +π j)df ] 1δ j )) δ j +1) δj, L+l 23) which is a contraction with a fixed stepsize. We call this algorithm Constant Contractive Threshold Selector CCTS). Remar 4: Clearly, CCTS requires a line search to determine l,l. The complexity of such a search is comparable with that of the determination of the optimal detection thresholds via line search or gridding. Nevertheless, such a choice is justified in two alternative setups: either when l,l are a priori nown to the receiver or if l,l are approximately determined via a much coarser gridding than the one required to determine the optimal thresholds. C. Algorithm 3: Constant Second-Order Threshold Selector CSOTS) The Heavy Ball Method for our problem can be expressed in two steps of state transitions. Setting an auxiliary state vector θ j ), we have θ j ) = 1 π j)) df 0 δ j )) +π j)df ] 1δ j )) + ζ j )θ j 1) 24) δ j +1) = δ j )+ξ j )θ j ) 25) 3527 Thresholds OCTS CCTS CSOTS TABLE I K = 5,T b = 1,N = 8,N 0 = 1,π 1) = 0.4,π 2) = 0.2,π 3) = 0.3,π 4) = 0.5,π 5) = 0.6,{p i = 1} K i=1 : OPTIMAL THRESHOLDS VALUES OBTAINED BY OCTS, CCTS AND CSOTS WITH A COARSE GRIDDING IN THE DETERMINATION OF l,l. for some initial points θ j 0),δ j 0) and some positive sequences ζ j ),ξ j ). Typically, we set θ j 0) = 0. This algorithm can be rewritten as the iteration: δ j +1) =δ j ) ξ j ) 1 π j)) df 0 δ j )) +π j)df 1δ j )) dδ ] j +ζ j )δ j ) δ j 1)). 26) L l L+ L δ j ) δ j 27) which is achieved for ξ j ) = 4/ L+ l) 2 and ζ j ) = max{ 1 ξ j )l, 1 ξ j )L } 2 11]. Since it holds L l)/ L+ L) L l)/l+l) the heavy ball method would converge faster than the CCTS. Nevertheless, in our case P j δ j ) is strongly convex and has Lipschitz Γ j) min,γj) max ]. Convergence continuous derivatives only in can be guaranteed as shown in Remar 5 below, but not always faster than CCTS. In the following, we will call the algorithm 26) with the aforementioned constant optimal ξ j ) and ζ j ) Constant Second-Order Threshold Selector CSOTS). Remar 5: Whenever P j δ j + 1)) P j δ j )) fails, a safe way to ensure convergence is to set ζ j ) = 0 and ξ j ) = 2/L+l) and to iterate a reduction of ξ j ) by, e.g., a factor of 1/2 till the desired BEP reduction is achieved. In this way, CSOTS behaves as a heavy-ball/ccts hybrid algorithm with guaranteed convergence for a quasiconvex average BEP. V. SIMULATIONS In this section, numerical examples are provided to validate the derived theoretical results and compare the proposed

6 Iterations OCTS CCTS CSOTS TABLE II K = 5,T b = 1,N = 8,N 0 = 1,π 1) = 0.4,π 2) = 0.2,π 3) = 0.3,π 4) = 0.5,π 5) = 0.6,{p i = 1} K i=1 : NUMBER OF ITERATIONS FOR OCTS, CCTS AND CSOTS WITH A COARSE GRIDDING IN THE Threshold Value DETERMINATION OF l,l. Tb=1, Tc=0.125, N=8, K=5, Eq. Pows= Iterations OCTS CCTS CSOTS Fig. 1. K = 5,T b = 1,N = 8,N 0 = 1,π 1) = 0.4,π 2) = 0.2,π 3) = 0.3,π 4) = 0.5,π 5) = 0.6,{p i = 1} K i=1 : Numerical illustration of the obtained first transmit/receive pair thresholds for the OCTS, CCTS and CSOTS with a coarse gridding in the determination of l,l vs. the number of iterations. algorithms. First, we give an illustrative example for the convergence of the algorithms presented in this paper. We assume K = 5,T b = 1,N = 8,N 0 = 1,π 1) = 0.4,π 2) = 0.2,π 3) = 0.3,π 4) = 0.5,π 5) = 0.6,{p i = 1} K i=1. In Table I, the obtained optimal thresholds for the OCTS, CCTS and CSOTS are given, whereas the corresponding number of iterations are presented in Table II. Fig. 1 gives a graphical representation of the algorithm trajectories for the first transmit/receive pair till convergence. In all cases, the halting step corresponds to the case that δ j +1) δ j ) falls below ǫ = We observe that all algorithms give approximately the same optimal threshold values and in a few iterations. The parameters l,l have been determined with a coarse gridding relatively to the one that would be needed to determine the optimal thresholds. We observe that this does not affect the numerical performance of CCTS and CSOTS. Furthermore, CSOTS as a hybrid scheme is not always faster 4 than CCTS or even OCTS as these specific numerical results illustrate. VI. CONCLUSIONS In this paper, we presented various algorithms of different complexity and performance to numerically select the detection thresholds in OOK/CS-CDMA resource-limited networs, and we analytically characterized their convergence properties. Numerical simulations illustrated our results and showed that all the proposed algorithms for the optimal detection threshold determination correspond to good choices for practical deployments of such networs. REFERENCES 1] C. Fischione, K. H. Johansson, A. Sangiovanni-Vincentelli, and B. Zurita Ares, Minmum Energy Coding in CDMA Wireless Sensor Networs, IEEE Transactions on Wireless Communications, vol. 8, no. 2, pp , February ] C. Erin, H. H. Asada, and K.Y. Siu, Minimum Energy Coding for RF Transmission, Proc. WCNC-99, New Orleans, LA, Sept ] M. A. M. Viera, C. N. J. Choelo, D. C. J. da Silva, and J. M. da Mata, Survey on Wireless Sensor Networs Devices, Proc. ETFA- 03, Lisbon, Portugal, Sept ] A. F. Molish, Wireless Communications, Wiley, ] P. Par, P. Di Marco, P. Soldati, C. Fischione, and K. H. Johansson, A generalized Marov chain model for effective analysis of slotted IEEE , Proc. MASS-09, Macau S.A.R.), China, Oct ] J. S. Lehnert, M. B. Pursley, Error Probabilities for Binary Direct- Sequence Spread-Spectrum Communications with Random Signature Sequences, IEEE Transactions on Communications, vol. 35, no, 1, pp , January ] B. Smida, L. Hanzo, S. Affes, Accurate BER of MC-DS-CDMA over Rayleigh Fading Channels, Proc. MC-SS-07, Herrsching, Germany, 7-9 May ] J. Cheng, N. C. Beaulieu, Accurate DS-CDMA Bit-Error Probability Calculation in Rayleigh Fading Channels, IEEE Transactions on Wireless Communications, vol. 1, no. 1, pp. 3-15, January ] M. B. Pursley, D. V. Sarwate, W. E. Star, Error Probability for Direct-Sequence Spread Spectrum Multiple-Access CommunicationsPart I: Upper and Lower Bounds, IEEE Transactions on Communications, vol. 30, no. 5, pp , May ] S-M. Tseng, M. R. Bell, Asynchronous Multicarrier DS-CDMA Using Mutually Orthogonal Complementary Sets of Sequences, IEEE Transactions on Communications, vol. 48, no. 1, pp , January ] J. Nocedal and S. J. Wright, Numerical Optimization, Springer Series in Operations Research, Springer-Verlag, New Yor, 2nd edition), ] R. Janti, S-L. Kim, Second-Order Power Control with Asymptotically Fast Convergence, IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, pp , March ] T. S. Rappaport, J. C. Liberti, Smart Antennas for Wireless Communications : IS-95 and Third Generation CDMA Applications, Prentice Hall Communications Engineering and Emerging Technologies Series, ] G. L. Stuber, Principles of Mobile Communication, Kluwer Academic Publishers, ] S. Verdu, Multiuser Detection, Cambridge University Press, ] J. M. Holtzman, A Simple, Accurate Method to Calculate Spread- Spectrum Multiple-Access Error Probabilities, IEEE Transaction on Communications, vol. 40, no. 3, pp , March ] S. Boyd and L. Vandenberghe Convex Optimization, Cambridge, University Press ] D. P. Bertseas and J. N. Tsitsilis, Parallel and Distributed Computation: Numerical Methods, Athena Scientific, It is faster in most cases. 3528

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

Wireless Communication Technologies 16:332:559 (Advanced Topics in Communications) Lecture #17 and #18 (April 1, April 3, 2002)

Wireless Communication Technologies 16:332:559 (Advanced Topics in Communications) Lecture #17 and #18 (April 1, April 3, 2002) Wireless Communication echnologies Lecture 7 & 8 Wireless Communication echnologies 6:33:559 (Advanced opics in Communications) Lecture #7 and #8 (April, April 3, ) Instructor rof. arayan Mandayam Summarized

More information

Direct-Sequence Spread-Spectrum

Direct-Sequence Spread-Spectrum Chapter 3 Direct-Sequence Spread-Spectrum In this chapter we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously.

More information

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:

More information

Design of MMSE Multiuser Detectors using Random Matrix Techniques

Design of MMSE Multiuser Detectors using Random Matrix Techniques Design of MMSE Multiuser Detectors using Random Matrix Techniques Linbo Li and Antonia M Tulino and Sergio Verdú Department of Electrical Engineering Princeton University Princeton, New Jersey 08544 Email:

More information

The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals

The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals Clemson University TigerPrints All Theses Theses 1-015 The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals Allison Manhard Clemson University,

More information

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway

More information

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Lecture - 19 Multi-User CDMA Uplink and Asynchronous CDMA

More information

ADAPTIVE DETECTION FOR A PERMUTATION-BASED MULTIPLE-ACCESS SYSTEM ON TIME-VARYING MULTIPATH CHANNELS WITH UNKNOWN DELAYS AND COEFFICIENTS

ADAPTIVE DETECTION FOR A PERMUTATION-BASED MULTIPLE-ACCESS SYSTEM ON TIME-VARYING MULTIPATH CHANNELS WITH UNKNOWN DELAYS AND COEFFICIENTS ADAPTIVE DETECTION FOR A PERMUTATION-BASED MULTIPLE-ACCESS SYSTEM ON TIME-VARYING MULTIPATH CHANNELS WITH UNKNOWN DELAYS AND COEFFICIENTS Martial COULON and Daniel ROVIRAS University of Toulouse INP-ENSEEIHT

More information

OVER the past decades, CDMA systems have primarily

OVER the past decades, CDMA systems have primarily IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 56, NO., JANUARY 8 Closed-Form BER Results for Multiple-Chip-Rate CDMA Systems Based on the Simplified Improved Gaussian Approximation MinChul Ju, Hyung-Myung

More information

Power and Rate Control Outage Based in CDMA Wireless Networks under MAI and Heterogeneous Traffic Sources

Power and Rate Control Outage Based in CDMA Wireless Networks under MAI and Heterogeneous Traffic Sources 1 Power and Rate Control Outage Based in CDMA Wireless Networks under MAI and Heterogeneous Traffic Sources Carlo Fischione and Matteo Butussi Abstract We characterize the maximum throughput achievable

More information

Lecture 2. Fading Channel

Lecture 2. Fading Channel 1 Lecture 2. Fading Channel Characteristics of Fading Channels Modeling of Fading Channels Discrete-time Input/Output Model 2 Radio Propagation in Free Space Speed: c = 299,792,458 m/s Isotropic Received

More information

Towards control over fading channels

Towards control over fading channels Towards control over fading channels Paolo Minero, Massimo Franceschetti Advanced Network Science University of California San Diego, CA, USA mail: {minero,massimo}@ucsd.edu Invited Paper) Subhrakanti

More information

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Michael R. Souryal and Huiqing You National Institute of Standards and Technology Advanced Network Technologies Division Gaithersburg,

More information

Random Matrices and Wireless Communications

Random Matrices and Wireless Communications Random Matrices and Wireless Communications Jamie Evans Centre for Ultra-Broadband Information Networks (CUBIN) Department of Electrical and Electronic Engineering University of Melbourne 3.5 1 3 0.8 2.5

More information

Output MAI Distributions of Linear MMSE Multiuser Receivers in DS-CDMA Systems

Output MAI Distributions of Linear MMSE Multiuser Receivers in DS-CDMA Systems 1128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Output MAI Distributions of Linear MMSE Multiuser Receivers in DS-CDMA Systems Junshan Zhang, Member, IEEE, Edwin K. P. Chong, Senior

More information

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012 Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications

More information

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless

More information

The Fading Number of a Multiple-Access Rician Fading Channel

The Fading Number of a Multiple-Access Rician Fading Channel The Fading Number of a Multiple-Access Rician Fading Channel Intermediate Report of NSC Project Capacity Analysis of Various Multiple-Antenna Multiple-Users Communication Channels with Joint Estimation

More information

Lecture 7: Wireless Channels and Diversity Advanced Digital Communications (EQ2410) 1

Lecture 7: Wireless Channels and Diversity Advanced Digital Communications (EQ2410) 1 Wireless : Wireless Advanced Digital Communications (EQ2410) 1 Thursday, Feb. 11, 2016 10:00-12:00, B24 1 Textbook: U. Madhow, Fundamentals of Digital Communications, 2008 1 / 15 Wireless Lecture 1-6 Equalization

More information

Distributed Stochastic Optimization in Networks with Low Informational Exchange

Distributed Stochastic Optimization in Networks with Low Informational Exchange Distributed Stochastic Optimization in Networs with Low Informational Exchange Wenjie Li and Mohamad Assaad, Senior Member, IEEE arxiv:80790v [csit] 30 Jul 08 Abstract We consider a distributed stochastic

More information

Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System

Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System Aravind Kailas UMTS Systems Performance Team QUALCOMM Inc San Diego, CA 911 Email: akailas@qualcommcom John A Gubner Department

More information

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical

More information

Game Theoretic Approach to Power Control in Cellular CDMA

Game Theoretic Approach to Power Control in Cellular CDMA Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University

More information

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider

More information

Wireless Information Transmission System Lab. Channel Estimation. Institute of Communications Engineering. National Sun Yat-sen University

Wireless Information Transmission System Lab. Channel Estimation. Institute of Communications Engineering. National Sun Yat-sen University Wireless Information Transmission System Lab. Channel Estimation Institute of Communications Engineering National Sun Yat-sen University Table of Contents Introduction to Channel Estimation Generic Pilot

More information

SNR i = 2E b 6N 3. Where

SNR i = 2E b 6N 3. Where Correlation Properties Of Binary Sequences Generated By The Logistic Map-Application To DS-CDMA *ZOUHAIR BEN JEMAA, **SAFYA BELGHITH *EPFL DSC LANOS ELE 5, 05 LAUSANNE **LABORATOIRE SYSCOM ENIT, 002 TUNIS

More information

Digital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10

Digital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10 Digital Band-pass Modulation PROF. MICHAEL TSAI 211/11/1 Band-pass Signal Representation a t g t General form: 2πf c t + φ t g t = a t cos 2πf c t + φ t Envelope Phase Envelope is always non-negative,

More information

Estimation of the Capacity of Multipath Infrared Channels

Estimation of the Capacity of Multipath Infrared Channels Estimation of the Capacity of Multipath Infrared Channels Jeffrey B. Carruthers Department of Electrical and Computer Engineering Boston University jbc@bu.edu Sachin Padma Department of Electrical and

More information

Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers

Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers Johannes Lindblom, Eleftherios Karipidis and Erik G. Larsson Linköping

More information

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques EE6604 Personal & Mobile Communications Week 13 Multi-antenna Techniques 1 Diversity Methods Diversity combats fading by providing the receiver with multiple uncorrelated replicas of the same information

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Junfeng Guo, Zhaozhe Song, Ying Cui Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, P. R. China

More information

Approximate Minimum Bit-Error Rate Multiuser Detection

Approximate Minimum Bit-Error Rate Multiuser Detection Approximate Minimum Bit-Error Rate Multiuser Detection Chen-Chu Yeh, Renato R. opes, and John R. Barry School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 30332-0250

More information

Optimal matching in wireless sensor networks

Optimal matching in wireless sensor networks Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network

More information

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Pramod Viswanath and Venkat Anantharam {pvi, ananth}@eecs.berkeley.edu EECS Department, U C Berkeley CA 9470 Abstract The sum capacity of

More information

How long before I regain my signal?

How long before I regain my signal? How long before I regain my signal? Tingting Lu, Pei Liu and Shivendra S. Panwar Polytechnic School of Engineering New York University Brooklyn, New York Email: tl984@nyu.edu, peiliu@gmail.com, panwar@catt.poly.edu

More information

Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution 1 2

Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution 1 2 Submitted to IEEE Trans. Inform. Theory, Special Issue on Models, Theory and odes for elaying and ooperation in ommunication Networs, Aug. 2006, revised Jan. 2007 esource Allocation for Wireless Fading

More information

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems Department of Electrical Engineering, College of Engineering, Basrah University Basrah Iraq,

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

Wideband Fading Channel Capacity with Training and Partial Feedback

Wideband Fading Channel Capacity with Training and Partial Feedback Wideband Fading Channel Capacity with Training and Partial Feedback Manish Agarwal, Michael L. Honig ECE Department, Northwestern University 145 Sheridan Road, Evanston, IL 6008 USA {m-agarwal,mh}@northwestern.edu

More information

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National

More information

ELEC546 Review of Information Theory

ELEC546 Review of Information Theory ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

Bayesian Data Fusion for Asynchronous DS-CDMA Sensor Networks in Rayleigh Fading

Bayesian Data Fusion for Asynchronous DS-CDMA Sensor Networks in Rayleigh Fading Bayesian Data Fusion for Asynchronous DS-CDMA Sensor Networs in Rayleigh Fading Justin S. Dyer 1 Department of EECE Kansas State University Manhattan, KS 66506 E-mail: jdyer@su.edu Balasubramaniam Natarajan

More information

Digital Transmission Methods S

Digital Transmission Methods S Digital ransmission ethods S-7.5 Second Exercise Session Hypothesis esting Decision aking Gram-Schmidt method Detection.K.K. Communication Laboratory 5//6 Konstantinos.koufos@tkk.fi Exercise We assume

More information

Linear and Nonlinear Iterative Multiuser Detection

Linear and Nonlinear Iterative Multiuser Detection 1 Linear and Nonlinear Iterative Multiuser Detection Alex Grant and Lars Rasmussen University of South Australia October 2011 Outline 1 Introduction 2 System Model 3 Multiuser Detection 4 Interference

More information

Research Article BER Analysis Using Beat Probability Method of 3D Optical CDMA Networks with Double Balanced Detection

Research Article BER Analysis Using Beat Probability Method of 3D Optical CDMA Networks with Double Balanced Detection Mathematical Problems in Engineering Volume 2015, Article ID 456829, 6 pages http://dxdoiorg/101155/2015/456829 Research Article BER Analysis Using Beat Probability Method of 3D Optical CDMA Networks with

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Multiuser Capacity in Block Fading Channel

Multiuser Capacity in Block Fading Channel Multiuser Capacity in Block Fading Channel April 2003 1 Introduction and Model We use a block-fading model, with coherence interval T where M independent users simultaneously transmit to a single receiver

More information

Comparison of DPSK and MSK bit error rates for K and Rayleigh-lognormal fading distributions

Comparison of DPSK and MSK bit error rates for K and Rayleigh-lognormal fading distributions Comparison of DPSK and MSK bit error rates for K and Rayleigh-lognormal fading distributions Ali Abdi and Mostafa Kaveh ABSTRACT The composite Rayleigh-lognormal distribution is mathematically intractable

More information

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Jin-Ghoo Choi and Seawoong Bahk IEEE Trans on Vehicular Tech, Mar 2007 *** Presented by: Anh H. Nguyen February

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels

EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels Ayman Assra 1, Walaa Hamouda 1, and Amr Youssef 1 Department of Electrical and Computer Engineering Concordia Institute

More information

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control 962 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control Junshan Zhang, Student Member, IEEE, and Edwin

More information

ECE6604 PERSONAL & MOBILE COMMUNICATIONS. Week 3. Flat Fading Channels Envelope Distribution Autocorrelation of a Random Process

ECE6604 PERSONAL & MOBILE COMMUNICATIONS. Week 3. Flat Fading Channels Envelope Distribution Autocorrelation of a Random Process 1 ECE6604 PERSONAL & MOBILE COMMUNICATIONS Week 3 Flat Fading Channels Envelope Distribution Autocorrelation of a Random Process 2 Multipath-Fading Mechanism local scatterers mobile subscriber base station

More information

On the Secrecy Capacity of the Z-Interference Channel

On the Secrecy Capacity of the Z-Interference Channel On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer

More information

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Pramod Viswanath, Venkat Anantharam and David.C. Tse {pvi, ananth, dtse}@eecs.berkeley.edu

More information

On the estimation of the K parameter for the Rice fading distribution

On the estimation of the K parameter for the Rice fading distribution On the estimation of the K parameter for the Rice fading distribution Ali Abdi, Student Member, IEEE, Cihan Tepedelenlioglu, Student Member, IEEE, Mostafa Kaveh, Fellow, IEEE, and Georgios Giannakis, Fellow,

More information

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department

More information

Residual Versus Suppressed-Carrier Coherent Communications

Residual Versus Suppressed-Carrier Coherent Communications TDA Progress Report -7 November 5, 996 Residual Versus Suppressed-Carrier Coherent Communications M. K. Simon and S. Million Communications and Systems Research Section This article addresses the issue

More information

Improved Detected Data Processing for Decision-Directed Tracking of MIMO Channels

Improved Detected Data Processing for Decision-Directed Tracking of MIMO Channels Improved Detected Data Processing for Decision-Directed Tracking of MIMO Channels Emna Eitel and Joachim Speidel Institute of Telecommunications, University of Stuttgart, Germany Abstract This paper addresses

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels Mehdi Mohseni Department of Electrical Engineering Stanford University Stanford, CA 94305, USA Email: mmohseni@stanford.edu

More information

Binary Compressive Sensing via Analog. Fountain Coding

Binary Compressive Sensing via Analog. Fountain Coding Binary Compressive Sensing via Analog 1 Fountain Coding Mahyar Shirvanimoghaddam, Member, IEEE, Yonghui Li, Senior Member, IEEE, Branka Vucetic, Fellow, IEEE, and Jinhong Yuan, Senior Member, IEEE, arxiv:1508.03401v1

More information

CHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz.

CHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz. CHAPTER 4 Problem 4. : Based on the info about the scattering function we know that the multipath spread is T m =ms, and the Doppler spread is B d =. Hz. (a) (i) T m = 3 sec (ii) B d =. Hz (iii) ( t) c

More information

Max-Min Relay Selection for Legacy Amplify-and-Forward Systems with Interference

Max-Min Relay Selection for Legacy Amplify-and-Forward Systems with Interference 1 Max-Min Relay Selection for Legacy Amplify-and-Forward Systems with Interference Ioannis Kriidis, Member, IEEE, John S. Thompson, Member, IEEE, Steve McLaughlin, Senior Member, IEEE, and Norbert Goertz,

More information

Interleave Division Multiple Access. Li Ping, Department of Electronic Engineering City University of Hong Kong

Interleave Division Multiple Access. Li Ping, Department of Electronic Engineering City University of Hong Kong Interleave Division Multiple Access Li Ping, Department of Electronic Engineering City University of Hong Kong 1 Outline! Introduction! IDMA! Chip-by-chip multiuser detection! Analysis and optimization!

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

Multi User Detection I

Multi User Detection I January 12, 2005 Outline Overview Multiple Access Communication Motivation: What is MU Detection? Overview of DS/CDMA systems Concept and Codes used in CDMA CDMA Channels Models Synchronous and Asynchronous

More information

EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS

EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS Ramin Khalili, Kavé Salamatian LIP6-CNRS, Université Pierre et Marie Curie. Paris, France. Ramin.khalili, kave.salamatian@lip6.fr Abstract Bit Error

More information

A new analytic approach to evaluation of Packet Error Rate in Wireless Networks

A new analytic approach to evaluation of Packet Error Rate in Wireless Networks A new analytic approach to evaluation of Packet Error Rate in Wireless Networks Ramin Khalili Université Pierre et Marie Curie LIP6-CNRS, Paris, France ramin.khalili@lip6.fr Kavé Salamatian Université

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Analysis of coding on non-ergodic block-fading channels

Analysis of coding on non-ergodic block-fading channels Analysis of coding on non-ergodic block-fading channels Joseph J. Boutros ENST 46 Rue Barrault, Paris boutros@enst.fr Albert Guillén i Fàbregas Univ. of South Australia Mawson Lakes SA 5095 albert.guillen@unisa.edu.au

More information

Interactions of Information Theory and Estimation in Single- and Multi-user Communications

Interactions of Information Theory and Estimation in Single- and Multi-user Communications Interactions of Information Theory and Estimation in Single- and Multi-user Communications Dongning Guo Department of Electrical Engineering Princeton University March 8, 2004 p 1 Dongning Guo Communications

More information

Power Control in Multi-Carrier CDMA Systems

Power Control in Multi-Carrier CDMA Systems A Game-Theoretic Approach to Energy-Efficient ower Control in Multi-Carrier CDMA Systems Farhad Meshkati, Student Member, IEEE, Mung Chiang, Member, IEEE, H. Vincent oor, Fellow, IEEE, and Stuart C. Schwartz,

More information

Determining the Optimal Decision Delay Parameter for a Linear Equalizer

Determining the Optimal Decision Delay Parameter for a Linear Equalizer International Journal of Automation and Computing 1 (2005) 20-24 Determining the Optimal Decision Delay Parameter for a Linear Equalizer Eng Siong Chng School of Computer Engineering, Nanyang Technological

More information

Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences

Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences Guang Gong 1 Fei Huo 1 and Yang Yang 2,3 1 Department of Electrical and Computer Engineering University of

More information

MULTICARRIER code-division multiple access (MC-

MULTICARRIER code-division multiple access (MC- IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 479 Spectral Efficiency of Multicarrier CDMA Antonia M. Tulino, Member, IEEE, Linbo Li, and Sergio Verdú, Fellow, IEEE Abstract We

More information

Distributed Optimization over Networks Gossip-Based Algorithms

Distributed Optimization over Networks Gossip-Based Algorithms Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random

More information

19. Channel coding: energy-per-bit, continuous-time channels

19. Channel coding: energy-per-bit, continuous-time channels 9. Channel coding: energy-per-bit, continuous-time channels 9. Energy per bit Consider the additive Gaussian noise channel: Y i = X i + Z i, Z i N ( 0, ). (9.) In the last lecture, we analyzed the maximum

More information

certain class of distributions, any SFQ can be expressed as a set of thresholds on the sufficient statistic. For distributions

certain class of distributions, any SFQ can be expressed as a set of thresholds on the sufficient statistic. For distributions Score-Function Quantization for Distributed Estimation Parvathinathan Venkitasubramaniam and Lang Tong School of Electrical and Computer Engineering Cornell University Ithaca, NY 4853 Email: {pv45, lt35}@cornell.edu

More information

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels 1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it

More information

Performance of Multi Binary Turbo-Codes on Nakagami Flat Fading Channels

Performance of Multi Binary Turbo-Codes on Nakagami Flat Fading Channels Buletinul Ştiinţific al Universităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 5(65), Fascicola -2, 26 Performance of Multi Binary

More information

Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels

Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels Özgür Oyman ), Rohit U. Nabar ), Helmut Bölcskei 2), and Arogyaswami J. Paulraj ) ) Information Systems Laboratory, Stanford

More information

Revision of Lecture 4

Revision of Lecture 4 Revision of Lecture 4 We have completed studying digital sources from information theory viewpoint We have learnt all fundamental principles for source coding, provided by information theory Practical

More information

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH : Antenna Diversity and Theoretical Foundations of Wireless Communications Wednesday, May 4, 206 9:00-2:00, Conference Room SIP Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

Diversity Combining Techniques

Diversity Combining Techniques Diversity Combining Techniques When the required signal is a combination of several plane waves (multipath), the total signal amplitude may experience deep fades (Rayleigh fading), over time or space.

More information

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS Jesus Perez and Ignacio Santamaria Advanced Signal Processing Group, University of Cantabria, Spain, https://gtas.unican.es/

More information

Power and Rate Control with Outage Constraints in CDMA Wireless Networks

Power and Rate Control with Outage Constraints in CDMA Wireless Networks Power and Rate Control with Outage Constraints in CDMA Wireless Networks C. FISCHIONE, M. BUTUSSI, AND K. H. JOHANSSON Stockholm 2007 Automatic Control Group School of Electrical Engineering Kungliga Tekniska

More information

LIKELIHOOD RECEIVER FOR FH-MFSK MOBILE RADIO*

LIKELIHOOD RECEIVER FOR FH-MFSK MOBILE RADIO* LIKELIHOOD RECEIVER FOR FH-MFSK MOBILE RADIO* Item Type text; Proceedings Authors Viswanathan, R.; S.C. Gupta Publisher International Foundation for Telemetering Journal International Telemetering Conference

More information

Threshold Optimization for Capacity-Achieving Discrete Input One-Bit Output Quantization

Threshold Optimization for Capacity-Achieving Discrete Input One-Bit Output Quantization Threshold Optimization for Capacity-Achieving Discrete Input One-Bit Output Quantization Rudolf Mathar Inst. for Theoretical Information Technology RWTH Aachen University D-556 Aachen, Germany mathar@ti.rwth-aachen.de

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Dynamic spectrum access with learning for cognitive radio

Dynamic spectrum access with learning for cognitive radio 1 Dynamic spectrum access with learning for cognitive radio Jayakrishnan Unnikrishnan and Venugopal V. Veeravalli Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University

More information

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering

More information

The Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels

The Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels The Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels Parastoo Sadeghi National ICT Australia (NICTA) Sydney NSW 252 Australia Email: parastoo@student.unsw.edu.au Predrag

More information

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture) ECE 564/645 - Digital Communications, Spring 018 Homework # Due: March 19 (In Lecture) 1. Consider a binary communication system over a 1-dimensional vector channel where message m 1 is sent by signaling

More information