Efficient OOK/DS-CDMA Detection Threshold Selection
|
|
- Ginger Polly Bridges
- 6 years ago
- Views:
Transcription
1 2013 American Control Conference ACC) Washington, DC, USA, June 17-19, 2013 Efficient OOK/DS-CDMA Detection Threshold Selection Dimitrios Katselis, Carlo Fischione and Håan Hjalmarsson Abstract A major constraint in deployments of wireless sensor networs WSNs) is the energy consumption related to the battery lifetime of the networ nodes. To this end, power efficient digital modulation techniques such as On- Off eying OOK) are highly attractive. However, the OOK detection thresholds, namely the thresholds against which the received signals are compared to detect which bit is transmitted, must be carefully selected to minimize the bit error rate. This is challenging to accomplish in resource-limited nodes with constrained computational capabilities. In this paper, the system scenario considers simultaneously transmitting nodes in Rayleigh fading conditions. Various iterative algorithms to numerically select the detection thresholds are established. Convergence analysis accompanies these algorithms. Numerical simulations are provided to support the derived results and to compare the proposed algorithms. It is concluded that OOK modulation is beneficial in resource constrained WSNs provided that efficient optimization algorithms are employed for the threshold selection. I. INTRODUCTION Minimizing the energy consumption is a crucial tas in the deployment of WSNs. To this end, on off eying OOK) has been proposed as an effective technique for these networs 1] 3]. To minimize the bit error rate BER) at the receiver, OOK requires an optimal real-time computation of the detection thresholds. However, such an operation is difficult or impossible to perform in resourcelimited nodes, because accurate channel state information CSI) for both the useful and the interfering signals must be acquired. The difficulty is exacerbated when nodes have high mobility, where due to moving metal objects, or movements of the nodes themselves, the nodes experience severe fading conditions. Vehicular applications are also a typical example, where the node or obstacle mobility give quic and deep fading fluctuations in addition to induced Doppler spread and time-selectivity of the channels. In all these situations, the minimization of the average BER is of relevant interest 4]. This yields the need for proper threshold selection, if OOK is employed. We assume OOK modulation over direct sequence code division multiple access DS-CDMA) with randomly selected signatures for each node. This modulation, together with the DS-CDMA, is commonly employed in popular WSN standards such as IEEE ]. To minimize the computations performed in each node, the derivation This wor was supported by the European Research Council under the advanced grant LEARN, the Swedish Research Council under the contract and by EU projects Hydrobionets and Hycon2. D. Katselis, C. Fischione and H. Hjalmarsson are with the Automatic Control Lab, ACCESS Linnaeus Center, School of Electrical Engineering, KTH Royal Institute of Technology , Stocholm, Sweden. dimitri@th.se, carlofi@ee.th.se, hjalmars@th.se. of closed-form expressions for the average bit error probability BEP) would be of interest. The threshold selection problem becomes challenging due to the absence of such expressions. Instead, accurate approximations of acceptable computational complexity for the average BEP may be used to serve this goal. In this paper, we first propose an approximation to the average BEP. Then, we derive three iterative numerical algorithms offering different performance. The algorithms minimize the average BEP in every transmitter-receiver pair, while they run locally in the receiving nodes, providing them with the detection thresholds. For the first algorithm, we show how its time-varying step sizes have to be selected to minimize the number of iterations, which reduces the computational complexity. Then, a second algorithm, which is a variation of the first algorithm, is developed based on a constant stepsize. Finally, to shed more light into the detection threshold selection problem, we propose a third algorithm that uses a heavy ball version of the second algorithm 11]. The first and second algorithms are of firstorder, in the sense that each new threshold, produced at the end of an iteration, only depends on the previous threshold. The heavy ball formulation of the third algorithm introduces memory to the threshold selection, maing the order of the algorithm equal to 2. This approach is similar to the well-nown Successive Over-Relaxation SOR) method in numerical analysis 12]. To give the approximation of the average BEP, assumptions have to be imposed on the nature of fast fading and shadowing impairing the communication lins between the desired transmitter and receiver and between the interferers and the desired receiver. However, the focus of this paper is mainly on the problem of detection threshold selection. Therefore, we consider only fast fading as in 7], 8] and we examine the Rayleigh case 13], 14]. The rest of the paper is organized as follows: Section II presents the system model occurring by using the OOK modulation over DS-CDMA with random signatures. The BEP is analytically approximated in Section III. Algorithms for selecting the detection thresholds are derived in Section IV. Supporting simulations verifying the validity of our analysis are provided in Section V, whereas Section VI concludes the paper. II. SYSTEM MODEL Consider the scenario where K transmitter-receiver pairs of nodes are communicating. The bits of the ith transmitter, i = 1,...,K, are transmitted using an OOK modulation: only bits having value one are transmitted over the wireless /$ AACC 3523
2 channel, while no signal is transmitted when the bit is zero. Assuming DS-CDMA, each bit is transmitted via a spreading sequence. Considering the realistic scenario of imperfect synchronization among distributed nodes, the asynchronous version of DS-CDMA is considered. The same fixed bandwidth W is allocated to each transmitter-receiver pair. Let N = T b /T c be the processing gain, where T b and T c are the bit and chip durations, respectively. All the communication lins in the networ are considered narrowband, therefore the fading is assumed to be flat. These assumptions are representative of the IEEE standard. We will only consider the case of slow flat fading, therefore all channels are considered quasi-static with respect to the duration of two spreading sequences, i.e, two bit symbol) durations. To elaborate more the signal model, we assume that the transmitter of the ith lin transmits the signal 8] s i t) = 2p i b i t)a i t)cosω c t+θ i ), 1) where p i represents the transmitted signal power, b i t) is the data signal data waveform), a i t) the spreading waveform, ω c the carrier frequency and θ i the phase angle of the carrier for the ith transmitter 1. The data signal b i t) is a random process expressed as b i t) = + = b i) dt T b), 2) where dt) = 1,0 t < T b and dt) = 0 otherwise. Additionally, b i) denotes the th bit of the ith transmitter, taing values in {0,1} with probabilities Prb i) = 1] = π i),prb i) = 0] = 1 πi) for all. The spreading signal can be expressed as a i t) = + = a i) ct T c), 3) where ct) is the chip waveform time-limited to 0,T c ). Usually, the chip waveform is assumed to be normalized so that T c c 2 t)dt = T 0 c, while the th chip of the ith user,, taes on values in { 1,+1}. All signatures {ai) } are randomly generated in the sense that every chip polarity is determined by flipping an unbiased coin. Each signal s i t) is transmitted through a flat fading channel. Let h ij t) be the wireless channel coefficient associated to the path from the transmitter of the ith lin to the receiver of the jth lin. Then, h ij t) can be expressed as 8], 14] a i) h ij t) = A ij e jβij δt τ ij ), 4) where δt) represents the Dirac delta function. The fading random variables A ij s are independent and they follow a Rayleigh distribution. Furthermore, A ij s correspond to the envelope of complex Gaussian random processes and {β ij } K i,j=1 correspond to random phases introduced by the channel, considered to be uniformly distributed in 0,2π) 14]. Finally, {τ ij } K i,j=1 correspond to propagation delays 1 transmitter of the ith lin through the wireless medium and lac of synchronism amongst the transmitters. They are assumed to be random variables uniformly distributed in 0,T b ). The received signal at the input of the jth correlation matched filter) receiver is r j t) = = K s i t) h ij t)+n j t) i=1 K 2pi A ij b i t τ ij )a i t τ ij )cosω c t+φ ij ) i=1 +n j t), 5) where denotes convolution. Easily, φ ij = θ i + β ij ω c τ ij and is uniformly distributed in 0,2π). Furthermore, n j t) is assumed to be zero mean, white Gaussian noise with two-sided power spectral density N 0 /2. The random variables, defined above, are generated by different physical sources, thus {A ij } K i,j=1,{φ ij} K i,j=1,{bi) }K i=1,{ai) }K i=1 are mutually independent 7], 8]. In the next section, we characterize the bit error probability experienced at a receiver node. III. BIT ERROR PROBABILITY In this section, we give the expression of the BER that will be used in the development of the iterative detection threshold algorithms. Due to the basic assumptions and properties of the spreadspectrum multiple access systems, our setup possesses symmetry with respect to the desired receiver. Therefore, we can focus on the received signal of the jth receiver. Additionally, only relative time delays and phase angles are important. Thus, without loss of generality we can set φ jj = τ jj = 0. The parameters {τ ij },{φ ij },i j are now the time delays and phase differences of the ith transmitter relative to the jth transmitter at the jth receiver 6], 9]. The decision statistic at the output of the jth coherent correlation receiver for the th transmitted bit of the jth transmitter, is Z j) = D j) +I j) +N j), 6) where D j) is the information bearing signal for the jth pair, I j) is the multiple access interference MAI) due to the presence of multiple transmitting nodes and N j) is the AWGN noise having zero mean and variance N 0 T b /4. Then and I j) K i=1,i j D j) B j) bj) = pj 2 A jjt b }{{} B j) b j), 7) pi 2 A ij b i) 1 Rij) τ ij )+b i) ˆR ] ij) τ ij ) cosφ ij ), 8) 3524
3 where R ij) τ ij ), ˆR ij) τ ij ) are continuous-time partial correlation functions given by R ij) τ ij ) = ˆR ij) τ ij ) = τij 0 Tb a i t τ ij )a j t)dt, τ ij a i t τ ij )a j t)dt 9) and 0 τ ij < T b. We denote b i) 1 Rij) τ ij )+b i) ˆR ij) τ ij ) by W ij), where we neglect the dependence on the subscript due to symmetry of our problem with respect to this subscript. A complete probabilistic description of W ij) is very complicated and long, thus it is omitted here due to lac of space 2. To setup the algorithms for the threshold selection, we need to have an accurate expression or approximation of the BEP. For the case of BPSK, two approaches to obtain such an approximation appear in 8], 16], namely the standard Gaussian approximation SGA) and the improved Gaussian approximation IGA). It has been observed that the IGA is much more accurate than the SGA, especially for small K. Furthermore, in 16], Holtzman has proposed a much simpler but still accurate BEP approximation based on the Stirling formula. We will pursue an analogous approximation here for the OOK modulation. Let A j) be the set of indices corresponding to chip boundaries without transitions in the signature waveform of the jth transmitter and B j) the set of indices corresponding to chip boundaries with transitions in the same signature waveform 6]. Clearly, A j) B j) =, A j) B j) = {0,1,...,N 1}, A j) + B j) = N 1, while according to our assumptions both A j) and B j) are uniformly distributed on {0,1,...,N 1}. Here, C denotes the cardinality of the set C, the set intersection, the set union and the empty set. Furthermore, we assume that G ij) = p i /2A ij cosφ ij ) and we define the set G j) = {G 1j),G 2j),...,G j 1j),G j+1j),...,g Kj) }. Similarly, S j) = {S 1j),S 2j),...,S j 1j),S j+1j),...,s Kj) }, where S ij) = τ ij τ ij /T c T c U0,T c ) models the fractional chip displacement of the ith transmitter relative to the jth transmitter at the jth receiver. Denoting by E ] the expectation operator and using a similar analysis as in 8], 16] for the IGA, it can be proved that 3 E I j) +N j) Gj),S j),b j)] = 0. Furthermore, we may define ϑ j as follows: ) ] 2 G ϑ j = E I j) +N j) j),s j),b j). 10) Based on the fact that G ij) are zero mean Gaussian random variables with variance EA 2 ij ]p i/4, it can be shown that all 2 This analysis is beyond the scope of this paper. It will be presented together with the complete proofs of lemmas and propositions in this paper in the corresponding journal version. 3 This result is a direct consequence of the aforementioned probabilistic description of W ij) omitted here due to lac of space. the moments, hence the probability density functions, of ϑ j s are nown. Remar 1: The above is exploited in IGA. Nevertheless, Stirling formula can provide a tight approximation of the probability of error 16]. The derivation of the BER distinguishes two cases of error: the decision variable 6) is decoded as a zero bit, when a one bit was transmitted; or 6) is decoded as one, when no bit was transmitted. Conditioning on the transmitted bits of the jth transmitter, its channel amplitude A jj and G j),s j),b j), we denote these probabilities by P j 0,Ajj,G j),s j),bj) and P j 1,Ajj,G j),s j),bj), respectively, where P j 0,Ajj,G j),s j),b =Pr Z j) j) δ j b j) = 0,A jj,g j),s j), ) B j)] δ j = Q, 11) ϑj P j 1,Ajj,G j),s j),b =Pr Z j) j) < δ j b j) = 1,A jj,g j),s j), ) B j)] B j) δ j = Q, 12) ϑj where δ j is the decision threshold for Z j), Qx) = 1/ 2π x exp t2 /2)dt is the complementary standard Gaussian distribution function. In 12), we have used the even symmetry of the Gaussian bell. By averaging with respect to A jj,g j),s j),b j), we obtain )] P j δ j ) = 1 π j)) δ j E Ajj,G j),s j),b Q j) ϑj +π j) E Ajj,G j),s j),b j) Q )] B j) δ j. ϑj 13) The minimization of 13) with respect to δ j is difficult, because the resulting probability function is non linear and no closed-form is available for the expectations. Hence, we resort to the Stirling approximation proposed by Holtzman 16], as we mentioned earlier. With this goal in mind, let us define the random variables ζ j0 δ j ) = δ j / ϑ j, ζ j1 δ j ) = B j) δ j )/ ϑ j. Let µ ζjb δ j ) and σ ζjb δ j ) be the mean value and standard deviation of ζ jb for b = 0,1, respectively, with respect to A jj,g j),s j),b j). Then, by 14], 16] we have EQζ jb )] f b δ j ) 2 3 Q µ ζjb δ j ) ) + 1 µ 6 Q ζjb δ j )+ ) 3σ ζjb δ j ) + 1 µ 6 Q ζjb δ j ) ) 3σ ζjb δ j ). 14) Eq. 14) can be used to compute an approximate expression of the BEP 13): P j δ j ) 1 π j) )f 0 δ j )+π j) f 1 δ j ). 15) 3525
4 The nowledge of the probability density functions of ϑ j s can be used to compute the mean values of 1/ ϑ j and 1/ϑ j present in µ ζjb δ j ) and σ ζjb δ j ), b = 0,1, e.g., by employing Riemann integrations over the essential support of the involved random variables. In the next section, we present algorithms to efficiently select the detection thresholds. IV. OPTIMAL DETECTION THRESHOLDS The optimal value of δ j, which we denote by δj, is given by the minimization of 15). Instantaneously, the threshold should be placed between the minimum and maximum value of esssupp{d j) }, where esssupp{x} stands for the essential support of the variable x. Since we are ] averaging over A jj,g j),s j),b j), δj j), where j) min, j) max min = 2 q T b σ Ajj pj /2 and j) max = µ j) B +2 q T b σ Ajj pj /2. Here, µ j) B = p i /2EA jj ]T b and σa 2 jj the variance of A jj. Moreover, the integers q, have to be empirically selected. An empirical rule of thumb corresponds to q 2, = 1. We now state the following important result: Proposition 1: There is a unique minimum of the BEP 15), which is attained when 1 π j)) df 0 δ j ) +π j)df 1δ j ) = 0. 16) Setch of Proof : The BEP 15) is given by the sum of a strictly decreasing function and ] a strictly increasing function in the region j) min, j) max under very mild conditions. Therefore, there is a unique minimum in this interval. To prove that this minimum is attained at points where the BEP derivative ] is zero, note that there are values of δ j in j) min, j) max such that df b δ j )/,b = 0,1 are both positive or negative. Since these derivatives are continuous functions of δ j, it follows that there are δ j s for which the BEP derivative is zero. Remar 2: It can be shown that the BEP probability is a quasiconvex function. Furthermore, dp j 0)/ 0, P j δ j ) 1 π j) ) as δ j and P j δ j ) π j) as δ j +. Therefore,δ j 0) = 0 is a good initialization point for the following detection threshold selection algorithms based on the general notion of descent directions. From Proposition 1, it follows that the minimum of the BEP is given by solving 16). Unfortunately, the derivatives of the functions f 0 δ j ) and f 1 δ j ) are highly non-linear and a closed-form solution cannot be achieved. Numerical techniques have to be used. Simple algorithms such as the steepest-descent, the bisection or a straightforward gridding 17] can be applied to compute the solution of 16). These algorithms, however, are not optimized for our function at hand. In the following, we propose an algorithm for a quic numerical computation of the optimal detection thresholds. A. Algorithm 1: Optimal Contractive Threshold Selector OCTS) Proposition 1 suggests the following iterative algorithm: δ j +1) = δ j ) β) 1 π j)) df 0 δ j )) +π j)df ] 1δ j )), 17) where is the iteration step, and β) is any scalar. When β) is such that the mapping is contractive, then it is easy to show that the fixed point of the mapping belongs in the set interval) of possible optimal detection thresholds 18]. The important question is how to choose β) so that the convergence of the algorithm is quic. We have the following result: Proposition 2: Let the convergence rate of the algorithm in 17) be given by the Lipschitz constant of the iteration and βj) 1 = ). 18) 1 π j) d 2 f 0 δ j )) +π dδj 2 j)d2 f 1 δ j )) dδj 2 Then the convergence rate is maximized. By the previous results, we can set up an optimal algorithm for the determination of the detection thresholds, given by the following iteration: δ j +1) =δ j ) β j) 1 π j)) df 0 δ j )) +π j)df ] 1δ j )), 19) In the following, we will call this algorithm Optimal Contractive Threshold Selector OCTS). Remar 3: Clearly, the OCTS is a first-order algorithm in the sense that every new threshold computation depends only on the previous threshold. Note that in every step of the algorithm, the optimal stepsize βj ), as well as the factor in the bracets, have to be re-evaluated. Additionally, OCTS is a time-varying step size algorithm. In the sequel, we propose an alternative version of this algorithm that uses a constant stepsize till the algorithm converges. This is motivated by the fact that a constant stepsize is generally computationally easier to achieve. B. Algorithm 2: Constant Contractive Threshold Selector CCTS) The OCTS has the form of the standard gradient method. The study of this standard version will lead to many useful results, conclusions and variants for the OCTS. In essence, we want to minimize 15) and we set up an iteration of the form: δ j +1) = δ j ) β) dp jδ j )) 20) for some initial threshold δ j 0) and some step size β). An alternative way to examine if 20) converges and at what speed, is to chec if P j δ j ) is twice differentiable, strongly convex and if dp j δ j )/ is Lipschitz continuous. 3526
5 Clearly, P j δ j ) is twice differentiable. Furthermore, P j δ j ) is strongly convex and has a Lipschitz derivative ] if 0 < l d 2 P j δ j )/dδj 2 L for all δ j j) min, j) max. ] The last condition may not hold for all δ j j) min, j) max. Nevertheless, in our context ] it is enough to show ] that there is a subinterval Γ j) min,γj) max j) min, j) max such that this condition holds. Since there is a threshold point nulling the first derivative of BEP, there is a neighborhood around this point that the second derivative is positive. This implies the existence of the aforementioned desired subinterval. If l,l are nown beforehand, then it is not hard to see that the best convergence rate is attained for β j ) = 2/L + l), which results to ) L l δ j +1) δj δ j ) δ L+l j 21) for the gradient method. We may also proceed even further by isolating the function gl,l) = L l)/l + l). It can be easily checed that g/ L > 0 and g/ l < 0. The convergence { speed is therefore maximized ]} when l = inf d 2 P j δ j )/dδj 2 δ j Γ j) min,γj) max and L = { ]} sup d 2 P j δ j )/dδj 2 δ j Γ j) min,γj) max. The constants l and L can be determined via line search as follows: { l = inf d 2 P j δ j )/dδj 2 > 0 δ j { L = sup d 2 P j δ j )/dδj 2 > 0 δ j j) min, j) max j) min, j) max ]}, ]} 22) Equation 21) shows that for given l,l we can setup the algorithm: Clearly, the gradient algorithm for the tas of the threshold computation is first-order, while the heavy ball method yields a second-order algorithm. This is done by introducing memory to the computation process. If P j δ j ) were strongly convex and had Lipschitz continuous derivatives everywhere, then the heavy ball method would converge 11]. The inequality describing its convergence properties would be: δ j +1) =δ j ) 2 1 π j)) df 0 δ j )) +π j)df ] 1δ j )) δ j +1) δj, L+l 23) which is a contraction with a fixed stepsize. We call this algorithm Constant Contractive Threshold Selector CCTS). Remar 4: Clearly, CCTS requires a line search to determine l,l. The complexity of such a search is comparable with that of the determination of the optimal detection thresholds via line search or gridding. Nevertheless, such a choice is justified in two alternative setups: either when l,l are a priori nown to the receiver or if l,l are approximately determined via a much coarser gridding than the one required to determine the optimal thresholds. C. Algorithm 3: Constant Second-Order Threshold Selector CSOTS) The Heavy Ball Method for our problem can be expressed in two steps of state transitions. Setting an auxiliary state vector θ j ), we have θ j ) = 1 π j)) df 0 δ j )) +π j)df ] 1δ j )) + ζ j )θ j 1) 24) δ j +1) = δ j )+ξ j )θ j ) 25) 3527 Thresholds OCTS CCTS CSOTS TABLE I K = 5,T b = 1,N = 8,N 0 = 1,π 1) = 0.4,π 2) = 0.2,π 3) = 0.3,π 4) = 0.5,π 5) = 0.6,{p i = 1} K i=1 : OPTIMAL THRESHOLDS VALUES OBTAINED BY OCTS, CCTS AND CSOTS WITH A COARSE GRIDDING IN THE DETERMINATION OF l,l. for some initial points θ j 0),δ j 0) and some positive sequences ζ j ),ξ j ). Typically, we set θ j 0) = 0. This algorithm can be rewritten as the iteration: δ j +1) =δ j ) ξ j ) 1 π j)) df 0 δ j )) +π j)df 1δ j )) dδ ] j +ζ j )δ j ) δ j 1)). 26) L l L+ L δ j ) δ j 27) which is achieved for ξ j ) = 4/ L+ l) 2 and ζ j ) = max{ 1 ξ j )l, 1 ξ j )L } 2 11]. Since it holds L l)/ L+ L) L l)/l+l) the heavy ball method would converge faster than the CCTS. Nevertheless, in our case P j δ j ) is strongly convex and has Lipschitz Γ j) min,γj) max ]. Convergence continuous derivatives only in can be guaranteed as shown in Remar 5 below, but not always faster than CCTS. In the following, we will call the algorithm 26) with the aforementioned constant optimal ξ j ) and ζ j ) Constant Second-Order Threshold Selector CSOTS). Remar 5: Whenever P j δ j + 1)) P j δ j )) fails, a safe way to ensure convergence is to set ζ j ) = 0 and ξ j ) = 2/L+l) and to iterate a reduction of ξ j ) by, e.g., a factor of 1/2 till the desired BEP reduction is achieved. In this way, CSOTS behaves as a heavy-ball/ccts hybrid algorithm with guaranteed convergence for a quasiconvex average BEP. V. SIMULATIONS In this section, numerical examples are provided to validate the derived theoretical results and compare the proposed
6 Iterations OCTS CCTS CSOTS TABLE II K = 5,T b = 1,N = 8,N 0 = 1,π 1) = 0.4,π 2) = 0.2,π 3) = 0.3,π 4) = 0.5,π 5) = 0.6,{p i = 1} K i=1 : NUMBER OF ITERATIONS FOR OCTS, CCTS AND CSOTS WITH A COARSE GRIDDING IN THE Threshold Value DETERMINATION OF l,l. Tb=1, Tc=0.125, N=8, K=5, Eq. Pows= Iterations OCTS CCTS CSOTS Fig. 1. K = 5,T b = 1,N = 8,N 0 = 1,π 1) = 0.4,π 2) = 0.2,π 3) = 0.3,π 4) = 0.5,π 5) = 0.6,{p i = 1} K i=1 : Numerical illustration of the obtained first transmit/receive pair thresholds for the OCTS, CCTS and CSOTS with a coarse gridding in the determination of l,l vs. the number of iterations. algorithms. First, we give an illustrative example for the convergence of the algorithms presented in this paper. We assume K = 5,T b = 1,N = 8,N 0 = 1,π 1) = 0.4,π 2) = 0.2,π 3) = 0.3,π 4) = 0.5,π 5) = 0.6,{p i = 1} K i=1. In Table I, the obtained optimal thresholds for the OCTS, CCTS and CSOTS are given, whereas the corresponding number of iterations are presented in Table II. Fig. 1 gives a graphical representation of the algorithm trajectories for the first transmit/receive pair till convergence. In all cases, the halting step corresponds to the case that δ j +1) δ j ) falls below ǫ = We observe that all algorithms give approximately the same optimal threshold values and in a few iterations. The parameters l,l have been determined with a coarse gridding relatively to the one that would be needed to determine the optimal thresholds. We observe that this does not affect the numerical performance of CCTS and CSOTS. Furthermore, CSOTS as a hybrid scheme is not always faster 4 than CCTS or even OCTS as these specific numerical results illustrate. VI. CONCLUSIONS In this paper, we presented various algorithms of different complexity and performance to numerically select the detection thresholds in OOK/CS-CDMA resource-limited networs, and we analytically characterized their convergence properties. Numerical simulations illustrated our results and showed that all the proposed algorithms for the optimal detection threshold determination correspond to good choices for practical deployments of such networs. REFERENCES 1] C. Fischione, K. H. Johansson, A. Sangiovanni-Vincentelli, and B. Zurita Ares, Minmum Energy Coding in CDMA Wireless Sensor Networs, IEEE Transactions on Wireless Communications, vol. 8, no. 2, pp , February ] C. Erin, H. H. Asada, and K.Y. Siu, Minimum Energy Coding for RF Transmission, Proc. WCNC-99, New Orleans, LA, Sept ] M. A. M. Viera, C. N. J. Choelo, D. C. J. da Silva, and J. M. da Mata, Survey on Wireless Sensor Networs Devices, Proc. ETFA- 03, Lisbon, Portugal, Sept ] A. F. Molish, Wireless Communications, Wiley, ] P. Par, P. Di Marco, P. Soldati, C. Fischione, and K. H. Johansson, A generalized Marov chain model for effective analysis of slotted IEEE , Proc. MASS-09, Macau S.A.R.), China, Oct ] J. S. Lehnert, M. B. Pursley, Error Probabilities for Binary Direct- Sequence Spread-Spectrum Communications with Random Signature Sequences, IEEE Transactions on Communications, vol. 35, no, 1, pp , January ] B. Smida, L. Hanzo, S. Affes, Accurate BER of MC-DS-CDMA over Rayleigh Fading Channels, Proc. MC-SS-07, Herrsching, Germany, 7-9 May ] J. Cheng, N. C. Beaulieu, Accurate DS-CDMA Bit-Error Probability Calculation in Rayleigh Fading Channels, IEEE Transactions on Wireless Communications, vol. 1, no. 1, pp. 3-15, January ] M. B. Pursley, D. V. Sarwate, W. E. Star, Error Probability for Direct-Sequence Spread Spectrum Multiple-Access CommunicationsPart I: Upper and Lower Bounds, IEEE Transactions on Communications, vol. 30, no. 5, pp , May ] S-M. Tseng, M. R. Bell, Asynchronous Multicarrier DS-CDMA Using Mutually Orthogonal Complementary Sets of Sequences, IEEE Transactions on Communications, vol. 48, no. 1, pp , January ] J. Nocedal and S. J. Wright, Numerical Optimization, Springer Series in Operations Research, Springer-Verlag, New Yor, 2nd edition), ] R. Janti, S-L. Kim, Second-Order Power Control with Asymptotically Fast Convergence, IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, pp , March ] T. S. Rappaport, J. C. Liberti, Smart Antennas for Wireless Communications : IS-95 and Third Generation CDMA Applications, Prentice Hall Communications Engineering and Emerging Technologies Series, ] G. L. Stuber, Principles of Mobile Communication, Kluwer Academic Publishers, ] S. Verdu, Multiuser Detection, Cambridge University Press, ] J. M. Holtzman, A Simple, Accurate Method to Calculate Spread- Spectrum Multiple-Access Error Probabilities, IEEE Transaction on Communications, vol. 40, no. 3, pp , March ] S. Boyd and L. Vandenberghe Convex Optimization, Cambridge, University Press ] D. P. Bertseas and J. N. Tsitsilis, Parallel and Distributed Computation: Numerical Methods, Athena Scientific, It is faster in most cases. 3528
Performance Analysis of Spread Spectrum CDMA systems
1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department
More informationWireless Communication Technologies 16:332:559 (Advanced Topics in Communications) Lecture #17 and #18 (April 1, April 3, 2002)
Wireless Communication echnologies Lecture 7 & 8 Wireless Communication echnologies 6:33:559 (Advanced opics in Communications) Lecture #7 and #8 (April, April 3, ) Instructor rof. arayan Mandayam Summarized
More informationDirect-Sequence Spread-Spectrum
Chapter 3 Direct-Sequence Spread-Spectrum In this chapter we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously.
More informationThese outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n
Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:
More informationDesign of MMSE Multiuser Detectors using Random Matrix Techniques
Design of MMSE Multiuser Detectors using Random Matrix Techniques Linbo Li and Antonia M Tulino and Sergio Verdú Department of Electrical Engineering Princeton University Princeton, New Jersey 08544 Email:
More informationThe Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals
Clemson University TigerPrints All Theses Theses 1-015 The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals Allison Manhard Clemson University,
More informationANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM
ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway
More informationAdvanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur
Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Lecture - 19 Multi-User CDMA Uplink and Asynchronous CDMA
More informationADAPTIVE DETECTION FOR A PERMUTATION-BASED MULTIPLE-ACCESS SYSTEM ON TIME-VARYING MULTIPATH CHANNELS WITH UNKNOWN DELAYS AND COEFFICIENTS
ADAPTIVE DETECTION FOR A PERMUTATION-BASED MULTIPLE-ACCESS SYSTEM ON TIME-VARYING MULTIPATH CHANNELS WITH UNKNOWN DELAYS AND COEFFICIENTS Martial COULON and Daniel ROVIRAS University of Toulouse INP-ENSEEIHT
More informationOVER the past decades, CDMA systems have primarily
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 56, NO., JANUARY 8 Closed-Form BER Results for Multiple-Chip-Rate CDMA Systems Based on the Simplified Improved Gaussian Approximation MinChul Ju, Hyung-Myung
More informationPower and Rate Control Outage Based in CDMA Wireless Networks under MAI and Heterogeneous Traffic Sources
1 Power and Rate Control Outage Based in CDMA Wireless Networks under MAI and Heterogeneous Traffic Sources Carlo Fischione and Matteo Butussi Abstract We characterize the maximum throughput achievable
More informationLecture 2. Fading Channel
1 Lecture 2. Fading Channel Characteristics of Fading Channels Modeling of Fading Channels Discrete-time Input/Output Model 2 Radio Propagation in Free Space Speed: c = 299,792,458 m/s Isotropic Received
More informationTowards control over fading channels
Towards control over fading channels Paolo Minero, Massimo Franceschetti Advanced Network Science University of California San Diego, CA, USA mail: {minero,massimo}@ucsd.edu Invited Paper) Subhrakanti
More informationDiversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver
Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Michael R. Souryal and Huiqing You National Institute of Standards and Technology Advanced Network Technologies Division Gaithersburg,
More informationRandom Matrices and Wireless Communications
Random Matrices and Wireless Communications Jamie Evans Centre for Ultra-Broadband Information Networks (CUBIN) Department of Electrical and Electronic Engineering University of Melbourne 3.5 1 3 0.8 2.5
More informationOutput MAI Distributions of Linear MMSE Multiuser Receivers in DS-CDMA Systems
1128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Output MAI Distributions of Linear MMSE Multiuser Receivers in DS-CDMA Systems Junshan Zhang, Member, IEEE, Edwin K. P. Chong, Senior
More informationApplications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012
Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications
More informationPerformance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks
Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless
More informationThe Fading Number of a Multiple-Access Rician Fading Channel
The Fading Number of a Multiple-Access Rician Fading Channel Intermediate Report of NSC Project Capacity Analysis of Various Multiple-Antenna Multiple-Users Communication Channels with Joint Estimation
More informationLecture 7: Wireless Channels and Diversity Advanced Digital Communications (EQ2410) 1
Wireless : Wireless Advanced Digital Communications (EQ2410) 1 Thursday, Feb. 11, 2016 10:00-12:00, B24 1 Textbook: U. Madhow, Fundamentals of Digital Communications, 2008 1 / 15 Wireless Lecture 1-6 Equalization
More informationDistributed Stochastic Optimization in Networks with Low Informational Exchange
Distributed Stochastic Optimization in Networs with Low Informational Exchange Wenjie Li and Mohamad Assaad, Senior Member, IEEE arxiv:80790v [csit] 30 Jul 08 Abstract We consider a distributed stochastic
More informationUpper Bounds for the Average Error Probability of a Time-Hopping Wideband System
Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System Aravind Kailas UMTS Systems Performance Team QUALCOMM Inc San Diego, CA 911 Email: akailas@qualcommcom John A Gubner Department
More informationDistributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security
Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical
More informationGame Theoretic Approach to Power Control in Cellular CDMA
Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University
More informationMinimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading
Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider
More informationWireless Information Transmission System Lab. Channel Estimation. Institute of Communications Engineering. National Sun Yat-sen University
Wireless Information Transmission System Lab. Channel Estimation Institute of Communications Engineering National Sun Yat-sen University Table of Contents Introduction to Channel Estimation Generic Pilot
More informationSNR i = 2E b 6N 3. Where
Correlation Properties Of Binary Sequences Generated By The Logistic Map-Application To DS-CDMA *ZOUHAIR BEN JEMAA, **SAFYA BELGHITH *EPFL DSC LANOS ELE 5, 05 LAUSANNE **LABORATOIRE SYSCOM ENIT, 002 TUNIS
More informationDigital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10
Digital Band-pass Modulation PROF. MICHAEL TSAI 211/11/1 Band-pass Signal Representation a t g t General form: 2πf c t + φ t g t = a t cos 2πf c t + φ t Envelope Phase Envelope is always non-negative,
More informationEstimation of the Capacity of Multipath Infrared Channels
Estimation of the Capacity of Multipath Infrared Channels Jeffrey B. Carruthers Department of Electrical and Computer Engineering Boston University jbc@bu.edu Sachin Padma Department of Electrical and
More informationEfficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers
Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers Johannes Lindblom, Eleftherios Karipidis and Erik G. Larsson Linköping
More informationEE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques
EE6604 Personal & Mobile Communications Week 13 Multi-antenna Techniques 1 Diversity Methods Diversity combats fading by providing the receiver with multiple uncorrelated replicas of the same information
More informationSIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.
SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of
More informationEnergy-Efficient Resource Allocation for Multi-User Mobile Edge Computing
Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Junfeng Guo, Zhaozhe Song, Ying Cui Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, P. R. China
More informationApproximate Minimum Bit-Error Rate Multiuser Detection
Approximate Minimum Bit-Error Rate Multiuser Detection Chen-Chu Yeh, Renato R. opes, and John R. Barry School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 30332-0250
More informationOptimal matching in wireless sensor networks
Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network
More informationOptimal Sequences and Sum Capacity of Synchronous CDMA Systems
Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Pramod Viswanath and Venkat Anantharam {pvi, ananth}@eecs.berkeley.edu EECS Department, U C Berkeley CA 9470 Abstract The sum capacity of
More informationHow long before I regain my signal?
How long before I regain my signal? Tingting Lu, Pei Liu and Shivendra S. Panwar Polytechnic School of Engineering New York University Brooklyn, New York Email: tl984@nyu.edu, peiliu@gmail.com, panwar@catt.poly.edu
More informationResource Allocation for Wireless Fading Relay Channels: Max-Min Solution 1 2
Submitted to IEEE Trans. Inform. Theory, Special Issue on Models, Theory and odes for elaying and ooperation in ommunication Networs, Aug. 2006, revised Jan. 2007 esource Allocation for Wireless Fading
More informationComputation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems
Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems Department of Electrical Engineering, College of Engineering, Basrah University Basrah Iraq,
More informationPower Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,
More informationOptimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters
Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,
More informationUpper Bounds on the Capacity of Binary Intermittent Communication
Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,
More informationWideband Fading Channel Capacity with Training and Partial Feedback
Wideband Fading Channel Capacity with Training and Partial Feedback Manish Agarwal, Michael L. Honig ECE Department, Northwestern University 145 Sheridan Road, Evanston, IL 6008 USA {m-agarwal,mh}@northwestern.edu
More informationTransmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations
Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National
More informationELEC546 Review of Information Theory
ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random
More informationOptimal Power Control in Decentralized Gaussian Multiple Access Channels
1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017
More informationSIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.
SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of
More informationBayesian Data Fusion for Asynchronous DS-CDMA Sensor Networks in Rayleigh Fading
Bayesian Data Fusion for Asynchronous DS-CDMA Sensor Networs in Rayleigh Fading Justin S. Dyer 1 Department of EECE Kansas State University Manhattan, KS 66506 E-mail: jdyer@su.edu Balasubramaniam Natarajan
More informationDigital Transmission Methods S
Digital ransmission ethods S-7.5 Second Exercise Session Hypothesis esting Decision aking Gram-Schmidt method Detection.K.K. Communication Laboratory 5//6 Konstantinos.koufos@tkk.fi Exercise We assume
More informationLinear and Nonlinear Iterative Multiuser Detection
1 Linear and Nonlinear Iterative Multiuser Detection Alex Grant and Lars Rasmussen University of South Australia October 2011 Outline 1 Introduction 2 System Model 3 Multiuser Detection 4 Interference
More informationResearch Article BER Analysis Using Beat Probability Method of 3D Optical CDMA Networks with Double Balanced Detection
Mathematical Problems in Engineering Volume 2015, Article ID 456829, 6 pages http://dxdoiorg/101155/2015/456829 Research Article BER Analysis Using Beat Probability Method of 3D Optical CDMA Networks with
More informationApproximately achieving the feedback interference channel capacity with point-to-point codes
Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used
More informationMultiuser Capacity in Block Fading Channel
Multiuser Capacity in Block Fading Channel April 2003 1 Introduction and Model We use a block-fading model, with coherence interval T where M independent users simultaneously transmit to a single receiver
More informationComparison of DPSK and MSK bit error rates for K and Rayleigh-lognormal fading distributions
Comparison of DPSK and MSK bit error rates for K and Rayleigh-lognormal fading distributions Ali Abdi and Mostafa Kaveh ABSTRACT The composite Rayleigh-lognormal distribution is mathematically intractable
More informationCell throughput analysis of the Proportional Fair scheduler in the single cell environment
Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Jin-Ghoo Choi and Seawoong Bahk IEEE Trans on Vehicular Tech, Mar 2007 *** Presented by: Anh H. Nguyen February
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationEM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels
EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels Ayman Assra 1, Walaa Hamouda 1, and Amr Youssef 1 Department of Electrical and Computer Engineering Concordia Institute
More informationCDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control
962 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control Junshan Zhang, Student Member, IEEE, and Edwin
More informationECE6604 PERSONAL & MOBILE COMMUNICATIONS. Week 3. Flat Fading Channels Envelope Distribution Autocorrelation of a Random Process
1 ECE6604 PERSONAL & MOBILE COMMUNICATIONS Week 3 Flat Fading Channels Envelope Distribution Autocorrelation of a Random Process 2 Multipath-Fading Mechanism local scatterers mobile subscriber base station
More informationOn the Secrecy Capacity of the Z-Interference Channel
On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer
More informationOptimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers
Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Pramod Viswanath, Venkat Anantharam and David.C. Tse {pvi, ananth, dtse}@eecs.berkeley.edu
More informationOn the estimation of the K parameter for the Rice fading distribution
On the estimation of the K parameter for the Rice fading distribution Ali Abdi, Student Member, IEEE, Cihan Tepedelenlioglu, Student Member, IEEE, Mostafa Kaveh, Fellow, IEEE, and Georgios Giannakis, Fellow,
More informationWIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department
More informationResidual Versus Suppressed-Carrier Coherent Communications
TDA Progress Report -7 November 5, 996 Residual Versus Suppressed-Carrier Coherent Communications M. K. Simon and S. Million Communications and Systems Research Section This article addresses the issue
More informationImproved Detected Data Processing for Decision-Directed Tracking of MIMO Channels
Improved Detected Data Processing for Decision-Directed Tracking of MIMO Channels Emna Eitel and Joachim Speidel Institute of Telecommunications, University of Stuttgart, Germany Abstract This paper addresses
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationA Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels
A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels Mehdi Mohseni Department of Electrical Engineering Stanford University Stanford, CA 94305, USA Email: mmohseni@stanford.edu
More informationBinary Compressive Sensing via Analog. Fountain Coding
Binary Compressive Sensing via Analog 1 Fountain Coding Mahyar Shirvanimoghaddam, Member, IEEE, Yonghui Li, Senior Member, IEEE, Branka Vucetic, Fellow, IEEE, and Jinhong Yuan, Senior Member, IEEE, arxiv:1508.03401v1
More informationCHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz.
CHAPTER 4 Problem 4. : Based on the info about the scattering function we know that the multipath spread is T m =ms, and the Doppler spread is B d =. Hz. (a) (i) T m = 3 sec (ii) B d =. Hz (iii) ( t) c
More informationMax-Min Relay Selection for Legacy Amplify-and-Forward Systems with Interference
1 Max-Min Relay Selection for Legacy Amplify-and-Forward Systems with Interference Ioannis Kriidis, Member, IEEE, John S. Thompson, Member, IEEE, Steve McLaughlin, Senior Member, IEEE, and Norbert Goertz,
More informationInterleave Division Multiple Access. Li Ping, Department of Electronic Engineering City University of Hong Kong
Interleave Division Multiple Access Li Ping, Department of Electronic Engineering City University of Hong Kong 1 Outline! Introduction! IDMA! Chip-by-chip multiuser detection! Analysis and optimization!
More informationEnergy Harvesting Multiple Access Channel with Peak Temperature Constraints
Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,
More informationMulti User Detection I
January 12, 2005 Outline Overview Multiple Access Communication Motivation: What is MU Detection? Overview of DS/CDMA systems Concept and Codes used in CDMA CDMA Channels Models Synchronous and Asynchronous
More informationEVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS
EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS Ramin Khalili, Kavé Salamatian LIP6-CNRS, Université Pierre et Marie Curie. Paris, France. Ramin.khalili, kave.salamatian@lip6.fr Abstract Bit Error
More informationA new analytic approach to evaluation of Packet Error Rate in Wireless Networks
A new analytic approach to evaluation of Packet Error Rate in Wireless Networks Ramin Khalili Université Pierre et Marie Curie LIP6-CNRS, Paris, France ramin.khalili@lip6.fr Kavé Salamatian Université
More informationTRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS
The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,
More informationAnalysis of coding on non-ergodic block-fading channels
Analysis of coding on non-ergodic block-fading channels Joseph J. Boutros ENST 46 Rue Barrault, Paris boutros@enst.fr Albert Guillén i Fàbregas Univ. of South Australia Mawson Lakes SA 5095 albert.guillen@unisa.edu.au
More informationInteractions of Information Theory and Estimation in Single- and Multi-user Communications
Interactions of Information Theory and Estimation in Single- and Multi-user Communications Dongning Guo Department of Electrical Engineering Princeton University March 8, 2004 p 1 Dongning Guo Communications
More informationPower Control in Multi-Carrier CDMA Systems
A Game-Theoretic Approach to Energy-Efficient ower Control in Multi-Carrier CDMA Systems Farhad Meshkati, Student Member, IEEE, Mung Chiang, Member, IEEE, H. Vincent oor, Fellow, IEEE, and Stuart C. Schwartz,
More informationDetermining the Optimal Decision Delay Parameter for a Linear Equalizer
International Journal of Automation and Computing 1 (2005) 20-24 Determining the Optimal Decision Delay Parameter for a Linear Equalizer Eng Siong Chng School of Computer Engineering, Nanyang Technological
More informationLarge Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences
Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences Guang Gong 1 Fei Huo 1 and Yang Yang 2,3 1 Department of Electrical and Computer Engineering University of
More informationMULTICARRIER code-division multiple access (MC-
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 479 Spectral Efficiency of Multicarrier CDMA Antonia M. Tulino, Member, IEEE, Linbo Li, and Sergio Verdú, Fellow, IEEE Abstract We
More informationDistributed Optimization over Networks Gossip-Based Algorithms
Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random
More information19. Channel coding: energy-per-bit, continuous-time channels
9. Channel coding: energy-per-bit, continuous-time channels 9. Energy per bit Consider the additive Gaussian noise channel: Y i = X i + Z i, Z i N ( 0, ). (9.) In the last lecture, we analyzed the maximum
More informationcertain class of distributions, any SFQ can be expressed as a set of thresholds on the sufficient statistic. For distributions
Score-Function Quantization for Distributed Estimation Parvathinathan Venkitasubramaniam and Lang Tong School of Electrical and Computer Engineering Cornell University Ithaca, NY 4853 Email: {pv45, lt35}@cornell.edu
More informationInformation Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels
1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it
More informationPerformance of Multi Binary Turbo-Codes on Nakagami Flat Fading Channels
Buletinul Ştiinţific al Universităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 5(65), Fascicola -2, 26 Performance of Multi Binary
More informationTight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels
Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels Özgür Oyman ), Rohit U. Nabar ), Helmut Bölcskei 2), and Arogyaswami J. Paulraj ) ) Information Systems Laboratory, Stanford
More informationRevision of Lecture 4
Revision of Lecture 4 We have completed studying digital sources from information theory viewpoint We have learnt all fundamental principles for source coding, provided by information theory Practical
More informationLecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH
: Antenna Diversity and Theoretical Foundations of Wireless Communications Wednesday, May 4, 206 9:00-2:00, Conference Room SIP Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication
More informationDiversity Combining Techniques
Diversity Combining Techniques When the required signal is a combination of several plane waves (multipath), the total signal amplitude may experience deep fades (Rayleigh fading), over time or space.
More informationADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria
ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS Jesus Perez and Ignacio Santamaria Advanced Signal Processing Group, University of Cantabria, Spain, https://gtas.unican.es/
More informationPower and Rate Control with Outage Constraints in CDMA Wireless Networks
Power and Rate Control with Outage Constraints in CDMA Wireless Networks C. FISCHIONE, M. BUTUSSI, AND K. H. JOHANSSON Stockholm 2007 Automatic Control Group School of Electrical Engineering Kungliga Tekniska
More informationLIKELIHOOD RECEIVER FOR FH-MFSK MOBILE RADIO*
LIKELIHOOD RECEIVER FOR FH-MFSK MOBILE RADIO* Item Type text; Proceedings Authors Viswanathan, R.; S.C. Gupta Publisher International Foundation for Telemetering Journal International Telemetering Conference
More informationThreshold Optimization for Capacity-Achieving Discrete Input One-Bit Output Quantization
Threshold Optimization for Capacity-Achieving Discrete Input One-Bit Output Quantization Rudolf Mathar Inst. for Theoretical Information Technology RWTH Aachen University D-556 Aachen, Germany mathar@ti.rwth-aachen.de
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationDynamic spectrum access with learning for cognitive radio
1 Dynamic spectrum access with learning for cognitive radio Jayakrishnan Unnikrishnan and Venugopal V. Veeravalli Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University
More informationPerformance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels
Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering
More informationThe Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels
The Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels Parastoo Sadeghi National ICT Australia (NICTA) Sydney NSW 252 Australia Email: parastoo@student.unsw.edu.au Predrag
More informationECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)
ECE 564/645 - Digital Communications, Spring 018 Homework # Due: March 19 (In Lecture) 1. Consider a binary communication system over a 1-dimensional vector channel where message m 1 is sent by signaling
More information