Achievable Throughput of Energy Harvesting Fading Multiple-Access Channels under Statistical QoS Constraints

Size: px
Start display at page:

Download "Achievable Throughput of Energy Harvesting Fading Multiple-Access Channels under Statistical QoS Constraints"

Transcription

1 Achievable Throughput of Energy Harvesting Fading Multiple-Access Channels under Statistical QoS Constraints Deli Qiao and Jingwen Han Abstract This paper studies the achievable throughput of fading multiple-access channels with energy harvesting transmitters subject to statistical quality of service QoS constraints in the form of limitations on the buffer overflow probability. Effective capacity, which characterizes the maximum constant arrival rate that a given process can support while satisfying the QoS constraints, is employed as the performance metric. Perfect channel state information CSI and energy arrivals are assumed to be available at both the transmitters and the receiver. With the assumption of naive power control scheme, in which the transmission power level is irrespective of the CSI and decided by the instantaneous harvested energy, the effective throughput regions of different transmission strategies are characterized. In the two-user case, the optimal energy and channel aware decoding strategy is determined for the scenario in which the two users have the same QoS constraints. With the assumption that the channel states and harvested energy in all time slots are known at the transmitters, the point-to-point link is first revisited. Then, for a given decoding order strategy in two-user multiple-access channels, the conditions that the optimal offline power control policies must satisfy are determined, and an algorithm to compute the optimal policies is provided. I. INTRODUCTION Energy harvesting EH systems, in which the transmitters harvest energy from the environment and store in their rechargeable batteries, have attracted much interest recently see, e.g., []-[] This work has been supported in part by the National Natural Science Foundation of China , and the Shanghai Sailing Program 6YF The authors are with the School of Information Science and Technology, East China Normal University, Shanghai, China D. Qiao is also with the Key Laboratory of Wireless Sensor Network & Communication, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, 865 Changning Road, Shanghai China dlqiao@ce.ecnu.edu.cn, @ecnu.cn.

2 2 and references therein. The harvested energy is generally generated by renewable resources, such as solar, wind, motion, etc. Utilizing the available energy in the batteries, the transmitters can transmit messages to the receivers through power adaptation to achieve better performance. There have been numerous works on the power allocation problems in EH systems under the energy harvesting constraints, i.e., the total consumed energy at any time cannot be greater than the harvested energy so far. There are generally two types of power control policies: online and offline. The online power control policies only require the causal energy and channel state information CSI, and hence can be implemented for all EH systems. However, obtaining the optimal online power control policies is extremely complicated even for the point-to-point links with finite time slots [2]. Suboptimal power control policies that can achieve the average rate within constant additive and multiplicative gap of the channel capacity have been proposed in [6]. On the other hand, the offline power control policies are identified based on the assumption of non-causal energy and channel state information CSI, and hence are applicable to highly predictable systems [4]. For instance, in [], the authors have characterized the optimal offline power control policies for point-to-point fading channels, which have been shown to be piecewise water-filling in case of infinite energy buffers. In [2], the authors have also derived the optimal offline power control policies for point-to-point links and shown that the water-levels are non-decreasing staircase functions. They have also designed an algorithm to determine the optimal power control policy. Meanwhile, multiple-access channel MAC in which multiple users communicate with a single user e.g., a base station is one of the important scenarios of energy harvesting systems, especially considering the wireless sensor networks [3]. Through energy harvesting operations, massive wireless connections with sensors and objects are expected to be enabled for the next generation wireless systems. The design and analysis of efficient transmission schemes in this model have been of significant interest recently. For instance, in [7], the offline optimal power control policy that maximizes the sum rate in energy harvesting Gaussian MAC has been identified. The authors have designed a dynamic iterative water-filling algorithm that maximizes the sum rate of fading MAC with energy harvesting users in [8]. The capacity region of the energy harvesting MAC and the inner and outer bounds that differ by a constant gap have been characterized in [9]. In [0], the authors have investigated the performance of time division multiple access TDMA with energy harvesting users and showed that in case of unknown

3 3 instantaneous energy arrivals of each other, each user should transmit at the same power level decided by the average energy arrivals. In [], the authors considered the Gaussian MAC with energy cooperation as well and derived the capacity region, which is shown to coincide with the traditional Gaussian MAC with energy cooperation. In this paper, we investigate the achievable throughput of fading MAC with energy harvesting transmitters under statistical quality of service QoS constraints, in the form of limitations on the buffer violation probabilities. For this analysis, we employ the concepts of effective bandwidth [2] and effective capacity [3] to determine the maximum throughput in such settings. Recently, we have investigated the throughput regions of fading MAC under QoS constraints without energy harvesting constraints in [4]. We note that there have been some works on the energy harvesting systems under statistical QoS constraints. For instance, the optimal power control policies for point-to-point links under statistical QoS constraints have been characterized in [5]. The energy efficient time slot allocation for energy harvesting MAC with TDMA has been identified in [6]. In this work, we assume that both the data and energy buffers at the transmitters are infinite and that both the energy arrivals and CSI are independent and identically distributed IID. Initially, we assume that the causal energy and CSI information is available at both the transmitters and the receiver. Suppose that the users use all harvested energy in each time slot, i.e., naive power control. We identify the effective capacity for three different transmission strategies: TDMA and superposition coding with fixed/variable decoding order. Specifically, for the two-user MAC case, we design an optimal energy and channel aware decoding strategy that maximizes the weighted sum rate of the users with the same QoS constraints. Then, we assume that the noncausal energy and CSI information of all time slots are available at both the transmitters and the receiver. We first revisit the point-to-point links and show that the offline optimal power control policy can achieve the same performance as that of traditional systems without energy harvesting constraints with a large number of time slots. Motivated by this finding, we derive the effective capacity expression with the associated offline optimal power control policy in case of infinite number of time slots. We propose a suboptimal online power control policy that requires only the statistics and causal energy and CSI information, which can achieve almost the same performance as the offline optimal one. Subsequently, we consider the two-user MAC with superposition coding with variable decoding order strategy, and identify the optimality conditions that the offline optimal power control policy should satisfy. Incorporating the algorithm proposed in [2], we also design

4 4 Fig. : System Model an algorithm that can determine the allocated power under such policies. The organization of this paper is as follows. In Section II, the system model and preliminaries on the channel rate and effective capacity are briefly discussed. Performances of naive power control policies are investigated in Section III with numerical results provided as well. In Section IV, the offline optimal power control policies for point-to-point links and the two-user MAC case are studied. Finally, Section V concludes this paper, with some length proofs in Appendices. II. SYSTEM MODEL AND PRELIMINARIES A. System Model As shown in Fig., we consider a multiple-access fading channel, in which M energy harvesting users transmit to a single receiver. It is assumed that the transmitters generate data sequences which are divided into frames of duration T and initially stored in the buffers before transmitted over the wireless channels. Each user is subject to certain statistical QoS constraints in order to limit the buffer overflow probability. The transmitters randomly harvest energy from

5 5 the environment and store them in the rechargeable batteries. We assume that both the data and energy buffers are of infinite length. We consider flat fading channels and the channel input-output relationship can be described by y = M g j x j + n, j= where x j is the channel input of the j-th user and y is the output at the receiver. n denote the zero-mean circularly-symmetric, complex Gaussian noise at the receiver with E n 2 } = N 0. g j denotes the fading coefficient of the channel between user j and the receiver, and we denote the magnitude-square of the fading coefficients by h j = g j 2. We consider a block fading scenario, and hence the fading coefficients stay constant over the frame duration T and change independently for each frame and each user. Let b j [t] denote the amount of energy present at the beginning of frame t at transmitter j. Then, b j [t] evolves as b j [t + ] = b j [t] e j [t] + E j [t + ], j =,..., M, 2 where e j [t] is the energy consumed by user j in frame t, and E j [t + ] denotes the amount of energy harvested by user j at the beginning of frame t +. Assuming that the symbol rate is B complex symbols per second, we can see that the energy for the channel input of the j-th user is e j [t]/t B. Let the instantaneous transmitted SNR level of user j be µ j [t] = e j[t] N 0. It is assumed T B that the harvested amounts of energy E j [t]} are independent and identically distributed IID with mean Ēj for all frames and users. The average energy harvesting rates are then given by Ē j T J/s Watt, respectively. Obviously, we must have the energy harvesting constraints e j [t] b j [t], t, 3 i.e., the transmitters can consume at most all the current available energy. B. Channel Rate We assume that the CSI of the network is available at both the transmitters and the receiver. We can obtain the instantaneous channel rate for different transmission strategies.

6 6 Time Division Multiple Access TDMA: We first consider the time division scheme in which the users send their signals in non-overlapping time intervals. Denote τ j as the fraction of time allocated to user j. Note that we have τ j 0 and M j= τ j =. Then, the instantaneous channel rate of user j is given by R j = τ j B log 2 + µ jh j τ j, bits/s. 4 Note that user j is assumed to transmit with the amount of energy e j [t] in the allocated τ j fraction of the time, resulting in higher energy for each input e j τ j T B. 2 Superposition Coding with Fixed Decoding Order SC-FDO: We assume that the transmitters simultaneously send data to the receiver and the receiver decodes the received signal in a fixed order in each frame. Denote τ k as the fraction of time allocated to decoding order π k, k =,..., M!. Note that we have τ k 0 and M! k= τ k =. In τ k fraction of the time, the instantaneous channel rate of user j at a given decoding order π k is given by R π k j = B log µ j h j π k i>π j µ, 5 ih i where π k is the inverse trace function of π k. From the above expression, the transmitted signal of user i that is decoded later than user j in decoding order π k is seen by user j as interference. Then, the transmission rate of user j for each frame is M! R j = τ k B log 2 + k= The instantaneous rate region is given by [20] R MAC = R,..., R M : RS B log 2 + j S + π k µ j h j µ j h j k i>π k j µ ih i, S,..., M}. 6 } 7 3 Superposition Coding with Variable Decoding Order SC-VDO: We also consider the case in which the decoding order can vary over different frames. We assume that the receiver varies the decoding order depending on the channel states h = h,..., h M. Assume that the vector space R M + of the possible values for h is partitioned into M! disjoint regions denoted

7 7 by H k } M! k=. When h H k, the receiver decodes the information in the order π k, and the instantaneous channel rate of user j is then given by 5 for this frame. C. Effective Capacity We employ effective capacity to measure the throughput under statistical queueing constraints. In [3], effective capacity is defined as the maximum constant arrival rate that a given service process can support in order to guarantee a statistical QoS requirement specified by the QoS exponent θ. If we define Q as the stationary queue length, then θ is the decay rate of the tail distribution of the queue length Q log PrQ q lim q q = θ. 8 Therefore, for large q max, we have the following approximation for the buffer violation probability: PrQ q max e θq max. Hence, while larger θ corresponds to more strict QoS constraints, smaller θ implies looser QoS guarantees. The effective capacity is given by C E θ = lim t θt log Ee θs[t] } bits/s, 9 where the expectation is with respect to S[t] = t i= r[i], which is the time-accumulated service process. r[i], i =, 2,...} denotes the discrete-time stationary and ergodic stochastic service process. In case of IID service rates for different frames under the block fading scenario, the effective capacity can be expressed as [8] C E θ = θt log Ee θt R } bits/s 0 where R is the instantaneous channel rate in each frame. Throughout this paper, we use the effective capacity normalized by bandwidth B, which is denoted by C E θ = C Eθ B = θt B log Ee θt R } bits/s/hz. Let Θ = θ,..., θ M be the vector composed of the QoS constraints of M users and C E Θ = C E, θ,..., C E,M θ M denote the vector of the normalized effective capacities of the users. Throughout the text, logarithm expressed without a base, i.e., log, refers to the natural logarithm log e.

8 8 The effective throughput region is described as C MAC Θ = C E Θ 0 : R R MAC s.t. 3 C E,j θ j θ j T B log E e θ jt R j } } 2 where R = [R,..., R M ] represents the vector composed the instantaneous transmission rate of M users in the instantaneous achievable rate region R MAC satisfying the energy harvesting constraints 3. It can be easily verified that the effective throughput region is convex [4, Theorem ]. Remark : Throughout this text, we generally obtain the effective capacity values on the boundary surface for simplicity and brevity. Note that effective capacity regions can be decided immediately using the boundary points. III. TRANSMISSIONS WITH NAIVE POWER CONTROL In this section, we assume that the energy used by each user for transmission is exactly the harvested energy at the beginning of each frame, i.e., e j [t] = E j [t]. Then, we have µ j [t] = E j [t] N 0. We consider the effective throughput region of TDMA and superposition coding with T B fixed/variable decoding order. Note that the energy harvesting and channel fading processes can be different in time scale. For instance, the energy arrivals are typically slower than the variations in channel [4], in which the transmission power of different frames becomes correlated. In case of naive power control policy, we can show the following result. Proposition : Assume that the incoming energy stays constant for m Z, m > frames and varies independently each m frames. Then, the effective capacity can be expressed as Proof: See Appendix A for details. C E θ = θt log E e θt R}. 3 The above result tells us that slower variations in the harvested energy will not alter the expression for effective capacity. As can be seen in the proof, the expectation is now taken over the energy arrival E and the channel state h. Henceforth, we consider the scenario of very fast change of the incoming energy, where the energy varies in the same time scale as that of channel fading coefficients.

9 9 A. TDMA Considering the transmission strategy described in Section II-B and 0, we can obtain the maximum effective capacity for user j C E,j θ = θ j T B log E } e θ jτ j T B log 2 + µ j h j τ j. 4 The optimal time allocation policy that maximizes the sum rate can be obtained through the optimization problem max τ j } s.t. M j= } θ j T B log E e θ jτ j T B log 2 + µ j h j τ j M τ j =, τ j 0. 5 j= It has been shown in [4] that the above optimization problem is concave for constant transmission power levels, i.e., µ j is constant. Following a similar way, we can show that the above optimization problem is concave with IID energy arrivals E j, i.e., random variable µ j. Then, we can solve the above problem through Lagrangian maximization method. Although obtaining the closed-form solutions seems unlikely, we can employ convex optimization tools to derive the optimal values of τ j numerically. B. SC-FDO In this scheme, the time sharing strategy is independent of the energy arrivals and the channel states, and hence is fixed in all blocks. Combining 6 and 0, we have C E,j θ = θjt B θ j T B log E e M! k= τ k log π k µ j h j i>π k j µ i h i. 6 Note that the rate 5 is the maximum instantaneous rate achieved with superposition coding and a particular decoding order. Therefore, the effective capacities specify the maximum throughput under the statistical QoS constraints. The optimal time-sharing strategy that maximizes the sum rate can be obtained similarly to the discussions for TDMA.

10 0 C. SC-VDO Given the channel state partition H k } M! k=, we have the effective capacity for user j as C E,j θ = θjt B θ j T B log E e M! k= log π k µ j h j i>π k j µ i h i h H k }, 7 where } is the indicator function. Obtaining the optimal partition of the fading states in a general scenario seems intractable. We consider a simplified two-user MAC case and the users have the same QoS constraints θ = θ 2 = θ. As a significant departure from the results in [4] for fixed power transmissions, we denote h 2 = gh, E, E 2 as the partition function that depends on both the energy arrivals and the CSI. Now, users are decoded in the order,2 if h 2 < gh, E, E 2 and 2, if h 2 > gh, E, E 2. The effective capacity expressions for the two users can be expressed as C E, θ = θt B log + gh,e,e 2 e θt B log gh,e,e 2 + µ h +µ 2 h 2 p h h, h 2 p E E, E 2 dh 2 dh de de 2 e θt B log 2 +µ h p h h, h 2 p E E, E 2 dh 2 dh de de 2. 8 C E,2 θ = θt B log + gh,e,e e θt B log gh,e,e 2 e θt B log 2 +µ 2h 2 p h h, h 2 p E E, E 2 dh 2 dh de de 2 + µ 2 h 2 +µ h p h h, h 2 p E E, E 2 dh 2 dh de de 2, where p h h, h 2 and p E E, E 2 are the joint distribution of the fading gains and harvested energies, respectively. Implicitly, gh, E, E 2 should be greater than zero in 8 and 9. If this condition is not satisfied, we should have the partition function h = fh 2, E, E 2 instead. Then, we have the following result. Theorem : The optimal joint energy and channel aware decoding strategy that maximizes 9

11 the weighted sum rate for a specific QoS constraint θ in the two-user case is characterized by + E h N 0 λ T B gh, E, E 2 =, if λ 20 fh 2, E, E 2 = where λ > 0 is some constant. Proof: See Appendix B for details. E 2 N 0 T B + E 2h 2 N 0 T B E N 0 T B λ, if 0 λ < 2 Remark 2: Note that the optimal decoding strategy derived in this paper depends on both the channel states and the harvest energy. Through numerical evaluations, we find that the policy that maximizes the throughput is opposite to the opportunistic scheduling. When one user s channel or harvested energy is stronger, it can be decoded first to offer a more fair treatment of users. In this way, the variance of the channel rate of the users can be smaller leading to a higher achievable throughput, which is in consistent with the findings in [9]. When the users have the same number of QoS constraints, we also propose a suboptimal decoding order for an arbitrary number of users given by κ π h π κ π2 h π2 κ πm h πm, 22 where κ is the weight of the weighted sum with κ j 0, M j= κ j =. D. Numerical Results In this part, we perform numerical analysis for independent poisson energy arrivals and Rayleigh fading with Eh} =. We assume T = 2 ms, B = 00 KHz, and N 0 = 0 5. In Fig. 2, we plot the effective throughput regions of the transmission strategies. In the figure, we assume θ = θ 2 = 0.0 and Ē T = Ē2 T = 0 db. In the figure, Time sharing represents the superposition coding with fixed decoding, and Variable decoding is the superposition coding with the optimal decoding strategy characterized in Theorem and suboptimal decoding strategy 22. Obviously, the superposition coding with the joint energy and channel aware decoding strategy achieves the largest region. It is interesting that the suboptimal decoding strategy can achieve performance very close to the optimal one.

12 User Variable decoding w/ optimal order Variable decoding w/ suboptimal order TDMA Time sharing User Fig. 2: Effective throughput region. θ = θ 2 = 0.0. Ē T = Ē2 T = 0 db. Ē T In Fig. 3, we assume θ = θ 2 = 0.0 and plot the sum rate as the average arrival energy = Ē2 T varies. The sum rate increases as the average arrival energy increases for all transmission strategies. Again, we can find that superposition coding with the proposed energy and channel aware decoding achieves the best performance. It is interesting that TDMA can achieve better performance than superposition coding with fixed decoding when the mean arrival energy is larger. In Fig. 4, we plot the sum rate as θ = θ 2 = θ varies. Now, the curves of different strategies converge as θ increases, which implies that orthogonal transmission strategies can be efficient in terms of sum rate under strict queueing constraints. In addition, we can find that TDMA can achieve better performance than the superposition coding with fixed coding order as θ increases, i.e., more stringent QoS constraints. IV. OPTIMAL OFFLINE POWER CONTROL In this section, we first revisit the point-to-point links and derive the achievable effective capacity associated with the optimal offline power control policy. Then, we consider the twouser MAC case and assume that the CSI and energy arrivals of all time slots are available at the transmitters, and identify the conditions that the offline optimal power control schemes should satisfy for SC-VDO with a given decoding order strategy, from which we design an algorithm

13 3 Sum ratebps/hz Variable decoding w/ optimal order Variable decoding w/ suboptimal order TDMA Time sharing Average arrival energy J/s Fig. 3: Sum rate as a function of average arrival energy. θ = θ 2 = Variable decoding w/ optimal order Variable decoding w/ suboptimal order TDMA Time sharing Sum ratebps/hz θ Fig. 4: Sum rate as a function of QoS exponent θ. Ē T = Ē2 T = 0 db. to determine the optimal power allocated to each time slot with any large number of time slots. A. Point-to-Point Links Note that in absence of delay constraints, the offline optimal power control policies for a point-to-point link have been characterized for any finite number of time frames in [], [2].

14 4 Specifically, the optimization problem can be written as where µ[t] = e[t] N 0 T B max µ[t] 0, t s.t. N B log 2 + µ[t]h[t] 23 t= t e[k] k= t E[k], t =,..., N, 24 k= denotes the instantaneous transmitter SNR level with the consumed energy e[t] in the t-th frame. The optimal power control policy is given in the form of µ opt [t] =, h[t] α[t] α[t] h[t] 0, else. where α[t] = log 2 B 25 N k=t λ[k] with λ[k], k =,..., N representing the Lagrange multipliers associated with energy harvesting constraints 24. Without the energy harvesting constraints, the optimal power control policy is the well-known water-filling policy [ µ[t] = ] + 26 α 0 h[t] with constant water level α 0 satisfying the average power constraints Eµ} = lim N N N t= µ[t] Ē N 0 T B with equality. In this work, we consider the case of infinite transmission frames, i.e., N. Then, we immediately have the following result. Theorem 2: As the number of frames N goes to infinity, lim N α[n] = α That is, the optimal power control policy is converging to the water-filling scheme without energy harvesting constraints for infinite frames. Proof: See Appendix C for details. Remark 3: This is in general due to the fact that the energy buffer is at the boundary of an absorbing and a non-absorbing queue and the event that 25 cannot take the value of 26 has almost zero probability [5]. Then, we can also show that the average rate of the point-to-point energy harvesting system with the optimal offline power control policy is the same as that of the equivalent system with average power constraints only for infinite number of frames.

15 5 Note that for power control policies other than the naive scheme, the available energy for each frame b[t] can be viewed as a first-order stationary Markov process over time t [2]. In this case, obtaining the exact expression for the effective capacity seems intractable. Fortunately, inspired by the above characterizations of the optimal power control policy in absence of QoS constraints, we can show the following result. Proposition 2: In a point-to-point link with IID harvested energy process and channel fading process described in Section II-A, the effective capacity is given by C E θ = θt B log E e θt B log +µ[t]h[t]} 2 28 = N log lim + µ[t]h[t] β θt B N N 29 t= with the associated optimal power control policy β, h[t] α[t], µ opt [t] = α[t] β+ h[t] h[t] β+ 0, else, 30 where α[t] = N β k=t λ[k] with λ[k], k =,..., N representing the Lagrange multipliers associated with constraints 24. Proof: See Appendix D for details. Remark 4: With the above characterization, it is possible for us to approach the effective capacity in energy harvesting systems in the form of 29 given by C E θ = θt B log N N + µ[t]h[t] β, 3 t= for any large but finite N number of time slots, which has been adopted in [5] to characterize the performance of point-to-point links. Note that the above expression holds only for the offline optimal power control policy. In case of other power control policies, the effective capacity expression is still difficult to obtain [7].

16 6 Suboptimal Online Power Control Policy: We also propose a suboptimal online power control policy given by b[t] µ[t] = min N 0 T B, α β+ 0 h[t] β β+ + h[t], 32 where b[t] is the available energy [ in the current ] time slot, and α 0 is the threshold to satisfy the + } average power constraint E β β+ α0 h[t] β+ h[t] = Ē N 0. Due to Remark 3, we can show T B that the proposed online power control policy can achieve almost the same performance as the offline optimal one. B. Two-User MAC In this section, we study the optimal power allocation policy for the two-user MAC employing superposition coding with variable decoding order with respect to the channel fading states described in Section II-B3. Denote H = H, H 2 as a particular partition of the space of the positive values of h = h, h 2. In particular, when h[t] H, the decoding order at the receiver is given by, 2, i.e., signal from user is decoded first in the presence of interference from the signal from user 2. We know R [t] = B log 2 + µ [t]h [t], 33 + µ 2 [t]h 2 [t] R 2 [t] = B log 2 + µ 2 [t]h 2 [t]. 34 On the other hand, when h[t] H 2, the decoding order at the receiver is 2,, and R [t] = B log 2 + µ [t]h [t], 35 R 2 [t] = B log 2 + µ 2[t]h 2 [t] µ [t]h [t] Given the power control policies µ = µ [t], µ 2 [t] and H, the associated effective capacity

17 7 of each user can be expressed as C µ, H = θ T B log N C 2 µ, H = θ 2 T B log N N t= + µ β [t]h [t] h[t] H } + µ 2 [t]h 2 [t], µ [t]h [t] β h[t] H 2 } + N t= + µ 2 [t]h 2 [t] β 2 h[t] H } + µ 2[t]h 2 [t] + µ [t]h [t] β2 h[t] H 2 }. 38 The optimal power control policy can be obtained by solving the convex optimization problem max µ s.t. κc µ, H + κc 2 µ, H 39 t µ [k] k= t µ 2 [k] k= t k= t k= E [k], t =,..., N, 40 N 0 T B E 2 [k], t =,..., N, 4 N 0 T B where κ 0,. The following analysis is conducted from given channel state partition H, and the notation C j µ, H is replaced by C j µ for brevity. We identify the conditions that the optimal power control policies should satisfy. Let us express the Lagrangian of the convex optimization problem as J = κc µ, H + κc 2 µ, H N t t E [k] λ [t] µ [k] N N t= 0 T B k= k= N t t E 2 [k] λ 2 [t] µ 2 [k], 42 N N 0 T B t= k= where κ 0,, and λ [t]} N t=, λ 2 [t]} N t= are the Lagrangian multipliers associated with the k=

18 8 energy harvesting constraints 40 and 4, respectively. Define ϕ = N ϕ 2 = N N t= N t= + µ β [t]h [t] h[t] H } + + µ [t]h[t] β h[t] H 2 }, + µ 2 [t]h 2 [t] 43 + µ 2 [t]h 2 [t] β 2 h[t] H } + + µ β2 2[t]h 2 [t] h[t] H 2 }. + µ [t]h [t] Taking the derivative of J with respect to µ and µ 2 in H and H 2, respectively, we obtain the optimality conditions as follows: 44 κ + µ β [t]h [t] h [t] ϕ log 2 + µ 2 [t]h 2 [t] + µ 2 [t]h 2 [t] N λ [k] = 0, h[t] H 45 k=t κ 2 + µ β [t]h [t] µ [t]h [t]h 2 [t] ϕ log 2 + µ 2 [t]h 2 [t] + µ 2 [t]h 2 [t] 2 + κ h 2 [t] N ϕ 2 log 2 + µ 2 [t]h 2 [t] λ β+ 2 [k] = 0, h[t] H 46 3 k=t κ + µ β 2[t]h 2 [t] µ 2 [t]h 2 [t]h [t] ϕ 2 log 2 + µ [t]h [t] + µ [t]h [t] 2 κ h [t] N λ [k] = 0, h[t] H ϕ log 2 + µ [t]h [t] β+ κ 4 + µ 2[t]h 2 [t] ϕ 2 log 2 + µ [t]h [t] k=t β h 2 [t] + µ [t]h [t] N λ 2 [k] = 0, h[t] H 2, 48 k=t where 45 and 46 are obtained by differentiating the Lagrangian with respect to µ [t] and µ 2 [t], respectively, over h H. Similarly, 47 and 48 are obtained by differentiating with respect to µ and µ 2, respectively, over h H 2. Due to the convexity, whenever µ j, j =, 2 is negative valued, we set µ j = 0, j =, 2 [2].

19 9 Let us first define ζ [t] = ζ 2 [t] = N k=t λ [k]ϕ 2 log 2 κ N k=t λ [k]ϕ log 2 κ, ζ 2 [t] = N k=t λ 2[k]ϕ 2 log 2 κ, ζ 2 [t] = N k=t λ 2[k]ϕ log 2 κ, and, where λ [t]} N t=, λ 2 [t]} N t= are the Lagrange multipliers whose values are chosen to satisfy the energy harvesting constraints constraints 40 and 4 with equality, and ϕ and ϕ 2 are defined in 43 and 44. Now, consider 47 and 48. The channel state h[t] lies in H. Through a simple computation using 48, we can derive µ 2 [t] = + µ [t]h [t] β2 β 2 + β α 2 [t] 2 + h 2 [t] β 2 β µ [t]h [t] h 2 [t] 49 which tells us that µ 2 [t] = 0 if h 2 [t] + µ [t]h [t] < α 2[t]. 50 If µ 2 [t] = 0, we have from 47 that which gives us that κ ϕ log e 2 + µ [t]h [t] β h [t] N λ [k] = 0 5 k=t µ [t] = β α [t] + h [t] β β + h [t] 52 which implies that µ [t] = 0 if h [t] < α [t]. 53 Now, if we substitute 49 into 47, we obtain the following additional condition for having µ [t] = 0: the equation h [t] α [t] + µ [t]h [t] β + h [t]α 2 [t] h 2 [t]α 2 [t] h 2 [t] α 2 [t] + µ [t]h [t] β 2 + = 0 54 has a solution that returns a negative or zero value for µ [t]. The above discussion enables us to characterize the regions in which one user transmits while the other one is silent. We also have a closed-form formula in 52 for the optimal power adaptation policy when only one user transmits, which is the optimal power control policy derived in Proposition 2 for a point-to-point link. When both users transmit, the power control policies µ [t], µ 2 [t] are given directly by the

20 20 non-negative solution of 47 and 48. Similar analysis can be conducted from 45 and 46 to obtain µ [t], µ 2 [t] when h[t] H. With the above characterizations, we can derive an algorithm to determine the optimal power allocated for each time slot t with given parameters as shown in Table I. Note that now the threshold values may vary for different time slots. In the algorithm, the optimal parameters λ [t]} N t=, λ 2 [t]} N t= with given ϕ and ϕ 2 can be determined through [2, Algorithm 2], while the power values allocated to the users in different time slots are determined by the algorithm in Table I instead. The next step is to find the optimal ϕ and ϕ 2. We propose an algorithm in Table II to find the optimal ϕ and ϕ 2. Note that we above have not specified how the values of ϕ and ϕ 2 are updated for each iteration in order to keep the algorithm generic. In our numerical computations, we have updated λ [t]} N t= and λ 2 [t]} N t= using the bisection search algorithm. The values of ϕ and ϕ 2 are updated in Step 7 of the algorithm by assigning them the values evaluated in Step 4. Hence, the most recent values are carried over to the new iteration. by Online Power Control: We also consider an online power control algorithm that is given } bj [t] µ j [t] = min N 0 T B, µ j,0[t], 55 where µ j,0 [t] is the allocated power for channel states h[t] under the average power constraints only according to [4, Section V]. Similar to the above characterizations in Section IV-A, it is expected that this policy can achieve performance close to the one in absence of energy harvesting constraints. C. Numerical Results We first consider the point-to-point link to validate our analysis. We assume N = 0 5 in the following results. We assume θ = 0.0. In Fig. 5, we plot the effective capacity as the average arrival energy varies. The curve of average power constraints only is computed numerically, while the other curves are obtained through Monte Carlo simulations over N frames of IID poisson energy arrivals and Rayleigh fading channels with unit mean. We can see from the figure that both the offline optimal power control policy and the proposed online power control

21 2 TABLE I: The Power Allocation Algorithm. Given κ 0,, the partition H, ϕ, ϕ 2, λ [t]} N t=, λ 2 [t]} N t=; 2 Determine ζ [t] = N k=t λ [k]ϕ 2 log 2 κ ; N k=t λ[k]ϕ log 2 κ, ζ 2 [t] = ζ 2 [t] = 3 for t = : N 4 do if h[t] H 2 5 then if h 2 [t] > ζ 2 [t] 6 then µ 2 [t] = N k=t β 2 ζ 2 [t] β 2 + h 2 [t] β 2 + λ2[k]ϕ2 log 2 κ, ζ 2 [t] = h 2[t] ; 7 if h[t] ζ [t] + µ [t]h [t] β+ h[t]ζ2[t] h 2[t] β 2 + h 2 [t]ζ 2 [t] ζ 2 [t]+µ [t]h [t] = 0 returns nonpositive µ [t] 8 then µ [t] = 0; 9 else if h 2[t] ζ 2 [t] < h [t] ζ [t] 0 then µ 2 [t] = 0, µ [t] = [ β ζ [t] β + h [t] β + β + h [t]] + ; else Compute µ [t], µ 2 [t] from 47 and 48; [ 2 else µ 2 [t] = 0, µ [t] = 3 if h[t] H 4 then if h [t] > ζ [t] 5 then µ [t] = β ζ [t] β + h [t] β + β ζ [t] β + h [t] β + h [t] ; 6 if h2[t] ζ 2 [t] + µ 2[t]h 2 [t] β 2+ h2[t]ζ[t] h [t] h [t]ζ 2[t] ζ [t]+µ 2[t]h 2[t] returns nonpositive µ 2 [t] 7 then µ 2 [t] = 0; 8 else if h β ζ < h2 2 + ζ 2 9 then µ [t] = 0, [ µ 2 [t] = β 2 ζ 2 [t] β 2 + h 2 [t] β 2 + β + h 2 [t]] + ; h [t]] + ; = 0 20 else Compute µ [t], µ 2 [t] from 45 and 46; [ 2 else µ [t] = 0, µ 2 [t] = β 2 ζ 2[t] β 2 + h 2[t] β 2 + h 2 [t]] + ; N k=t λ2[k]ϕ log 2 κ,

22 22.8 Effective capacity bps/hz Average power constraints only Offline optimal Proposed online Average arrival energy J/s Fig. 5: Effective capacity as average arrival energy varies. 0 0 Simulation Theoretical PrQ>q max q max bps/hz Fig. 6: The queue overflow probability.

23 23 TABLE II: Finding Optimal ϕ and ϕ 2. Given κ 0,, the partition H; 2 Initialize ϕ and ϕ 2 ; 3 Incorporate the algorithm in Table I into [2, Algorithm 2] to determine the power allocated to the users µ [t]} N t=, µ 2 [t]} N t= with given ϕ and ϕ 2 ; 4 Evaluate ϕ and ϕ 2 according to 43 and 44; 5 Check if the new values of ϕ and ϕ 2 agree up to a certain margin with those used in Step 3; 6 if do not agree 7 then update the values of ϕ and ϕ 2, and return to Step 3; 8 else declare the power allocation policies µ [t]} N t= and µ 2 [t]} N t=, and ϕ and ϕ 2 as the ones obtained with the given parameters. policy almost achieve the same performance as the one achieved with average power constraints 2. We also would like to validate that the approximation of the effective capacity under the offline optimal power control policy is correct. In Fig. 6, we let the constant arrival rate to the source to be C E θ = bps/hz with Ē T = 0 db and θ = 0.0, and the source employs the offline optimal power control policy in each time slot. We plot the buffer overflow probability PrQ > q max } of the queue at the transmitter as the queue length threshold q max varies. We are interested in the decay exponent of the buffer overflow probabilities. Note that according to 8, the logarithm of the buffer overflow probability is linear in q max with the slope given by θ. Computing the derivatives of the logarithms of the simulated curves, we obtain θ from the simulation results, which are very close to the theoretical values, verifying the theoretical analysis. Then, we consider the two-user MAC case. We assume Ē/T = Ē2/T = 0 db. Due to the symmetric settings, we consider the decoding strategy given by H = h : h > h 2 }. In Fig. 7, we plot the sum rate as the average arrival energy varies. Again, we can see from the figure that both the offline optimal power control policy and the proposed suboptimal online power control policy can achieve almost the same performance as the one achieved with the optimal power control policy in [4] without energy harvesting constraints. This tells us that the proposed online power control policy is sufficient enough to achieve performance close to the optimal one 2 Note that the performance gap in larger average arrival energy is due to the fact that N = 0 5 for Monte Carlo simulations. When N is larger, this gap diminishes. However, the computation complexity for finding the offline optimal power control policy increases dramatically, and becomes unaffordable. Therefore, we only consider N = 0 5 in the numerical results.

24 Sum throughput bps/hz Average power constraints only Offline optimal Online suboptimal Average arrival energy J/s Fig. 7: Sum rate as average arrival energy varies. in large number of time slots. V. CONCLUSION In this paper, we have investigated the performance of fading MAC with energy harvesting transmitters under statistical QoS constraints. We have employed the effective capacity as a performance metric of the throughput. We have considered different transmission strategies for the case of causal energy and CSI information at the transmitters and the receiver. With the naive power control policy, we have derived the effective capacity for TDMA and superposition coding with fixed/variable decoding order. Regarding the two-user MAC case with the same QoS constraints, we have derived the optimal energy and channel aware decoding strategy for superposition coding. We have noted that when the arrival energy or the channel state is stronger for one user, the optimal strategy is to decode this user first and subsequently decode the other user such that the other user does not experience any interference. We have also found that TDMA can achieve better performance in comparison with superposition coding with fixed decoding order in larger mean arrival energy or more stringent QoS constraints. Regarding the case of noncausal energy and CSI information at the transmitters and the receiver, we have revisited the point-to-point links. We have shown that the offline optimal

25 25 power control policy can achieve the same performance as the traditional water-filling scheme in infinite number of time slots. Afterwards, we have derived the expression for the effective capacity with the associated offline optimal power control policy. We have also proposed a suboptimal online power control policy based on causal energy and channel information and shown that this policy can achieve performance close to the optimal one in case of large number of time slots. Then, for the two-user MAC employing superposition coding, we have identified the offline optimal power control control policies with given decoding order. We have designed an algorithm to determine the values of the power allocated to the users in each time slot. A. Proof of Proposition According to 9, we have APPENDIX C E θ = lim t θt log E e θ } t i= r s[i] = lim n θnt log E E[i]} n i=,h[i]}n i= = lim n θnt log E E[i]} n i=,h[i]}n i= e θt } n i= R[i] e θt n/m m } i= j= R[im+j] n/m = lim n θnt log E E[im]},h[i m+j]} m j= e θt } m j= R[i m+j] i= = lim n θnt log = θmt log E E,h[j]} m j= E E,h[j]} m j= e θt m e θt m j= R[j] } = θmt log E E,h e θt R[j] } m = θt log E E,h j= R[j] } n/m e θt R } 6 where E denotes the expectation taken over the random variables }, E and h are the random variables for the harvested energy and channel state, respectively, and we have divided the frames into intervals of mt such that in each interval the harvest energy stays constant and varies independently in 56 to obtain 57, IID assumptions of the harvested energy and channel states are incorporated into 57 to derive 58 in which we take the expectation over the harvested energy in the intervals and the resulted expected values are the same for the intervals, and 60

26 26 is due to the IID channel fading processes. B. Proof of Theorem Assume that the optimal partition function is h 2 = gh, E, E 2. We define J ĝh, E, E 2 = κc θ, ĝh, E, E 2 + κc 2 θ, ĝh, E, E 2, 62 where κ 0, and ĝh, E, E 2 = gh, E, E 2 + sηh, E, E 2. s is any constant, and ηh, E, E 2 represents arbitrary perturbation. A necessary condition that needs to be satisfied is [22] We define ϕ = + ϕ 2 = + gh,e,e 2 e θt B log 2 + µ h +µ 2 h gh,e,e 2 gh,e,e e θt B log 2 + µ 2 h gh,e,e 2 By noting that dĝh,e,e 2 ds 0 0 κ ϕ 2 log 2 0 d ds J ĝh, E, E 2 = s=0 p h h, h 2 p E E, E 2 dh 2 dh de de 2 e θt B log 2 +µ h p h h, h 2 p E E, E 2 dh 2 dh de de 2, 64 e θt B log 2 +µ 2h 2 p h h, h 2 p E E, E 2 dh 2 dh de de 2 +µ h p h h, h 2 p E E, E 2 dh 2 dh de de = ηh, E, E 2, and from 63 65, we can derive κ + ϕ log 2 + µ 2 gh, E, E 2 β β µ h + µ h β + µ 2 gh, E, E 2 + µ β 2gh, E, E 2 + µ h p h h, gh, E, E 2 p E E, E 2 ηh, E, E 2 dh de de 2 = 0, 66

27 27 where β = θt B log 2 ηh, E, E 2, it follows that κ + ϕ log 2 is the normalized QoS exponent. Since the above equation holds for any κ ϕ 2 log 2 which after rearranging yields Defining λ = κϕ κϕ 2 β µ h + µ h β + µ 2 gh, E, E 2 + µ 2 gh, E, E 2 β + β µ h +µ 2gh,E,E 2 + µ h β + µ 2gh,E,E 2 +µ h β + µ2 gh, E, E 2 β = β equation after simple computations + µ β 2gh, E, E 2 = µ h κϕ κϕ > 0 and noting that µ j = E j N 0, j =, 2, we can obtain the following T B + E N 0 T B h + E 2 N 0 T B gh, E, E 2 = λ, 69 which leads to 20 after rearrangement. Note here that if λ <, gh, E, E 2 < 0 for h < /λ E. We need to find the optimal partition function given by h = fh 2 instead. Following a N 0 T B similar approach as shown in 8 through 69 yields 2. C. Proof of Theorem 2 Note that it has been shown in [2, Theorem 3] that the optimal power allocation policy for point-to-point links is staircase water-filling, where the threshold α[t] is non-increasing. First, we can show that α[n] 0 is finite as N. Otherwise, µ[t] = 0 for all t. Then, we have N N t= µ[t] = 0 violating 24 at t = N. Then, we know that α[t]}n t= are lowered bounded. So there must be a limit for α[t]. Denote ξ = lim N α[n]. We must have ξ = α 0. Otherwise, the average power constraint 24 at t = N cannot be satisfied. We can show this by contradiction. Assume that ξ < α 0. Then, given ϵ = α 0 ξ 2 > 0, there exists N ξ such that for all t N ξ, α[t] ξ < ϵ, 70

28 28 or equivalently, α[t] ξ < ϵ α[t] < ξ + ϵ = ξ + α 0 2 < α 0. 7 Then, we have N where N N t= [ N µ[t] = N t= α 0 h[t] = N > N = N N ξ t= N ξ t= N ξ t= N ξ t= ] + = Ē N 0 T B µ[t] + N µ[t] N t=n ξ 72 [ α[t] ] + + N [ h[t] N α[t] ] + h[t] 73 [ α[t] ] + + h[t] N t=n ξ N t=n ξ [ α[t] ] + [ h[t] α 0 h[t] [ ] + 74 α 0 h[t] ] + + Ē N 0 T B, 75 is incorporated for 75. Note that as N, the first term in 75 approaches zero since N ξ is finite. Then, we have N N k= µ[k] > Ē N 0. That is, T B 24 cannot be satisfied at t = N. Similarly, we can show the contradiction if ξ > α 0. Therefore, we must have 27. D. Proof of Proposition 2 The idea of the proof is similar to the proof of Theorem. First, we can solve the following optimization problem min µ[t] 0, t s.t. N + µ[t]h[t] β, 76 t= t e[k] k= t E[k], t =,..., N, 77 k= and obtain the optimal µ[t] given in 30. Then, similar to [2, Theorem 3], we can show that α[t] is a staircase like function, where it stays constant for certain time intervals and changes when all available energy has been consumed up. Denote t, t 2,..., t m as the time slot when

29 29 α[t] changes and let t m+ = N +. Since the harvested energies are IID, we can show that C E θ = lim t θt log E e θ } t i= rs[i] = lim N θnt log E E[i]} N i=,h[i]}n i= = lim N θnt log E E[i]} N i=,h[i]}n i= = lim N = lim N m θnt log i= m θnt log i= E t i+ j=t i t i+ j=t i e θt B } N i= log 2 +µ[i]h[i] e θt B m t i+ i= j=t log 2 +µ[j]h[j] i E[j],h j } t i+ j=t i E t i+ j=t i e } t i+ θt B j=t log 2 +µ[j]h[j] i } E j,h j e θt B log 2 +µ[j]h[j] }, 80 where we have divided the frames into intervals specified by t i } such that the threshold α[j] stays constant for µ[j] of each interval [t i, t i+ in 78. IID assumptions of the harvested energy and channel states are incorporated into 78 to derive 79 such that the consumed energy for each interval t i+ j=t E j is independent of each other. 80 is due to the IID channel fading i processes within each interval such that the allocated power in each frame 30 only varies with the instantaneous channel state and hence is independent of each other. Now, similar to Theorem 2, we can show that α[n] in 30 approaches to some finite value determined by the average power constraints only, and hence the effective capacity 80 can be reduced to the form 29 as the number of frames N approaches to infinity, which is the value achieved by the power control policies with average power constraints only. Above, we have shown the achievability, i.e., the rate 29 with the associated power control policy 30 can be achieved. Note also that 28 with the optimal power control policy satisfying the average power constraints only is indeed the maximum value of the effective capacity achievable in the energy harvesting system, since it only considers the average energy constraints, i.e., t = N in 77. Therefore, the effective capacity of the point-to-point energy harvesting system is given by 29 with the optimal power control policy given by 30. REFERENCES [] O. Ozel, K. Tutuncuoglu, J. Yang, S. Ulukus, A. Yener, Transmission with energy harvesting nodes in fading wireless channels: optimal policies, IEEE J. Sel. Areas Commun., vol. 29, no. 8, pp , Sep. 20.

30 30 [2] C. K. Ho, R. Zhang, Optimal energy allocation for wireless communications with energy harvesting constraints, IEEE Trans. Sig. Process., vol. 60, no. 9, pp , Aug [3] S. Ulukus, A. Yener, E. Erkip, O. Simeone, M. Zorzi, P. Grover, and K. Huang, Energy harvesting wireless communications: a review of recent advances, IEEE J. Sel. Areas Commun., vol. 33, no. 3, pp , Mar [4] H. Li, J. Xu, R. Zhang, and S. Cui, A general utility optimization framework for energy-harvesting-based wireless communications, IEEE Commun. Mag., vol. 53, no. 4, pp , Apr [5] N. Zlatanov, R. Schober, and Z. Hadzi-Velkov, Asymptotically optimal power allocation for energy harvesting communication networks, IEEE Trans. Vehi. Technol., vol. pp, no. 99, pp. -, 207. [6] D. Shaviv and A. Özgür, Universally near optimal online power control for energy harvesting nodes, IEEE J. Sel. Areas Commun., vol. 34, no. 2, pp , Dec [7] B. Gurakan, S. Ulukus, Energy harvesting multiple access channel with data arrivals, in IEEE Global Communications Conference Globecom, San Diego, Dec [8] Z. Wang, V. Aggarwal, and X. Wang, Iterative dynamic water-filling for fading multiple-access channels with energy harvesting, IEEE J. Sel. Areas Commun., vol. 33, no. 3, pp , Mar [9] H. A. Inan, D. Shaviv and A. Özgür, Capacity of the energy harvesting MAC, in Proc. of IEEE Int. Symp. Inf. Theory ISIT, Barcelona, Spain, July 206. [0] J. Liu, H. Dai, and W. Chen, On throughput maximization of time division multiple access with energy harvesting users, IEEE Trans. Vehi. Technol., vol. 65, no. 4, pp , Apr [] Y. Dong, Z. Chen, and P. Fan, Capacity region of Gaussian multiple-access channels with energy harvesting and energy cooperation, IEEE Access, vol. 5, pp , 207. [2] C.-S. Chang, Performance Guarantees in Communication Networks, New York: Springer, 995. [3] D. Wu and R. Negi, Effective capacity: A wireless link model for support of quality of service, IEEE Trans. Wireless Commun., vol. 2, no. 4, pp , Jul [4] D. Qiao, M. Gursoy, and S. Velipasalar, Transmission strategies in multiple-access fading channels with statistical qos constraints, IEEE Trans. Inf. Theory, vol. 58, no. 3, pp , Mar [5] I. Ahmed, K. T. Phan, T. L. Ngoc, Optimal stochastic power control for energy harvesting systems with delay constraints, IEEE J. Sel. Areas Commun., vol. 34, no. 2, pp , Dec [6] T. A. Zewde, M. C. Gursoy, Energy-efficient time allocation for wireless energy harvesting communication networks, in 206 IEEE Globecom Workshops, Washington D.C., Dec [7] J. Gong, S. Zhang, X. Wang, S. Zhou, and Z. Niu, Supporting quality of service in energy harvesting wireless links: the effective capacity analysis, in 204 IEEE ICC Workshops, Sydney, Australia, June 204. [8] J. Tang, X. Zhang, Quality-of-service driven power and rate adaptation over wireless links, IEEE Trans. Wireless Commun., vol. 6, no. 8, pp , Aug [9] M. Qin, Q. Yang, J. Yang, K.-S. Kwak, and R. R. Rao, Throughput of QoS guaranteed wireless systems with/without channel state information, IEEE Trans. Vehi. Technol., vol. pp, no. 99, pp. -, 206. [20] A. Goldsmith, Wireless Communications, st ed. Cambridge University Press, [2] S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, [22] George B. Arfken, Mathmatical Methods for Physicist, Academic Press, 985.

Achievable Throughput of Energy Harvesting Fading Multiple-Access Channels under Statistical QoS Constraints

Achievable Throughput of Energy Harvesting Fading Multiple-Access Channels under Statistical QoS Constraints Achievable Throughput of Energy Harvesting Fading Multiple-Access Channels under Statistical QoS Constraints Deli Qiao and Jingwen Han Abstract This paper studies the achievable throughput of fading multiple-access

More information

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio

More information

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, ACCEPTED AND TO APPEAR IN 05 Optimal Power Allocation With Statistical QoS Provisioning for DD and Cellular Communications Over Underlaying Wireless Networks

More information

4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016

4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 Online Power Control Optimization for Wireless Transmission With Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member,

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Cooperative Energy Harvesting Communications with Relaying and Energy Sharing

Cooperative Energy Harvesting Communications with Relaying and Energy Sharing Cooperative Energy Harvesting Communications with Relaying and Energy Sharing Kaya Tutuncuoglu and Aylin Yener Department of Electrical Engineering The Pennsylvania State University, University Park, PA

More information

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Hyun-Suk Lee Dept. of Electrical and Electronic Eng., Yonsei University, Seoul, Korea Jang-Won Lee Dept. of Electrical

More information

Cooperative Diamond Channel With Energy Harvesting Nodes Berk Gurakan, Student Member, IEEE, and Sennur Ulukus, Fellow, IEEE

Cooperative Diamond Channel With Energy Harvesting Nodes Berk Gurakan, Student Member, IEEE, and Sennur Ulukus, Fellow, IEEE 1604 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 016 Cooperative Diamond Channel With Energy Harvesting Nodes Berk Gurakan, Student Member, IEEE, and Sennur Ulukus, Fellow, IEEE

More information

Optimal Harvest-or-Transmit Strategy for Energy Harvesting Underlay Cognitive Radio Network

Optimal Harvest-or-Transmit Strategy for Energy Harvesting Underlay Cognitive Radio Network Optimal Harvest-or-Transmit Strategy for Energy Harvesting Underlay Cognitive Radio Network Kalpant Pathak and Adrish Banerjee Department of Electrical Engineering, Indian Institute of Technology Kanpur,

More information

Broadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter

Broadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter roadcasting with a attery Limited Energy Harvesting Rechargeable Transmitter Omur Ozel, Jing Yang 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland, College

More information

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks Wenchi Cheng, Xi Zhang, Senior Member, IEEE, and Hailin Zhang, Member,

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges

Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Ahmed Arafa, Jing Yang 2, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

Outage Probability for Two-Way Solar-Powered Relay Networks with Stochastic Scheduling

Outage Probability for Two-Way Solar-Powered Relay Networks with Stochastic Scheduling Outage Probability for Two-Way Solar-Powered Relay Networks with Stochastic Scheduling Wei Li, Meng-Lin Ku, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of

More information

Optimal Sensing and Transmission in Energy Harvesting Sensor Networks

Optimal Sensing and Transmission in Energy Harvesting Sensor Networks University of Arkansas, Fayetteville ScholarWorks@UARK Theses and Dissertations 2-206 Optimal Sensing and Transmission in Energy Harvesting Sensor Networks Xianwen Wu University of Arkansas, Fayetteville

More information

USING multiple antennas has been shown to increase the

USING multiple antennas has been shown to increase the IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 1, JANUARY 2007 11 A Comparison of Time-Sharing, DPC, and Beamforming for MIMO Broadcast Channels With Many Users Masoud Sharif, Member, IEEE, and Babak

More information

Online Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage

Online Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage Online Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member, IEEE and Min Dong, Senior Member, IEEE arxiv:606.046v2 [cs.it] 26 Feb

More information

Amr Rizk TU Darmstadt

Amr Rizk TU Darmstadt Saving Resources on Wireless Uplinks: Models of Queue-aware Scheduling 1 Amr Rizk TU Darmstadt - joint work with Markus Fidler 6. April 2016 KOM TUD Amr Rizk 1 Cellular Uplink Scheduling freq. time 6.

More information

Spectral and Energy Efficient Wireless Powered IoT Networks: NOMA or TDMA?

Spectral and Energy Efficient Wireless Powered IoT Networks: NOMA or TDMA? 1 Spectral and Energy Efficient Wireless Powered IoT Networs: NOMA or TDMA? Qingqing Wu, Wen Chen, Derric Wing wan Ng, and Robert Schober Abstract Wireless powered communication networs WPCNs, where multiple

More information

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National

More information

Energy-Efficient Data Transmission with Non-FIFO Packets

Energy-Efficient Data Transmission with Non-FIFO Packets Energy-Efficient Data Transmission with Non-FIFO Packets 1 Qing Zhou, Nan Liu National Mobile Communications Research Laboratory, Southeast University, arxiv:1510.01176v1 [cs.ni] 5 Oct 2015 Nanjing 210096,

More information

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department

More information

NOMA: An Information Theoretic Perspective

NOMA: An Information Theoretic Perspective NOMA: An Information Theoretic Perspective Peng Xu, Zhiguo Ding, Member, IEEE, Xuchu Dai and H. Vincent Poor, Fellow, IEEE arxiv:54.775v2 cs.it] 2 May 25 Abstract In this letter, the performance of non-orthogonal

More information

Distributed Opportunistic Scheduling for Wireless Networks Powered by Renewable Energy Sources

Distributed Opportunistic Scheduling for Wireless Networks Powered by Renewable Energy Sources Distributed Opportunistic Scheduling for Wireless Networks Powered by Renewable Energy Sources Hang Li, Chuan Huang, Shuguang Cui, and Junshan Zhang Department of Electrical and Computer Engineering, Texas

More information

Energy State Amplification in an Energy Harvesting Communication System

Energy State Amplification in an Energy Harvesting Communication System Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu

More information

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University

More information

ABSTRACT WIRELESS COMMUNICATIONS. criterion. Therefore, it is imperative to design advanced transmission schemes to

ABSTRACT WIRELESS COMMUNICATIONS. criterion. Therefore, it is imperative to design advanced transmission schemes to ABSTRACT Title of dissertation: DELAY MINIMIZATION IN ENERGY CONSTRAINED WIRELESS COMMUNICATIONS Jing Yang, Doctor of Philosophy, 2010 Dissertation directed by: Professor Şennur Ulukuş Department of Electrical

More information

Energy Harvesting Communications under Explicit and Implicit Temperature Constraints

Energy Harvesting Communications under Explicit and Implicit Temperature Constraints Energy Harvesting Communications under Explicit and Implicit Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of

More information

Zenaidi, Mohamed Ridha; Rezki, Zouheir; Alouini, Mohamed-Slim

Zenaidi, Mohamed Ridha; Rezki, Zouheir; Alouini, Mohamed-Slim KAUST Repository Performance imits of Online Energy Harvesting Communications with Noisy Channel State Information at the Transmitter Item type Authors Citation Eprint version DOI Publisher Journal Rights

More information

Capacity of channel with energy harvesting transmitter

Capacity of channel with energy harvesting transmitter IET Communications Research Article Capacity of channel with energy harvesting transmitter ISSN 75-868 Received on nd May 04 Accepted on 7th October 04 doi: 0.049/iet-com.04.0445 www.ietdl.org Hamid Ghanizade

More information

ABSTRACT ENERGY HARVESTING COMMUNICATION NETWORKS WITH SYSTEM COSTS. Title of dissertation: Ahmed Arafa, Doctor of Philosophy, 2017

ABSTRACT ENERGY HARVESTING COMMUNICATION NETWORKS WITH SYSTEM COSTS. Title of dissertation: Ahmed Arafa, Doctor of Philosophy, 2017 ABSTRACT Title of dissertation: ENERGY HARVESTING COMMUNICATION NETWORKS WITH SYSTEM COSTS Ahmed Arafa, Doctor of Philosophy, 2017 Dissertation directed by: Professor Şennur Ulukuş Department of Electrical

More information

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Ibrahim Fawaz 1,2, Philippe Ciblat 2, and Mireille Sarkiss 1 1 LIST, CEA, Communicating Systems Laboratory,

More information

On the Power Allocation for Hybrid DF and CF Protocol with Auxiliary Parameter in Fading Relay Channels

On the Power Allocation for Hybrid DF and CF Protocol with Auxiliary Parameter in Fading Relay Channels On the Power Allocation for Hybrid DF and CF Protocol with Auxiliary Parameter in Fading Relay Channels arxiv:4764v [csit] 4 Dec 4 Zhengchuan Chen, Pingyi Fan, Dapeng Wu and Liquan Shen Tsinghua National

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

Short-Packet Communications in Non-Orthogonal Multiple Access Systems

Short-Packet Communications in Non-Orthogonal Multiple Access Systems Short-Packet Communications in Non-Orthogonal Multiple Access Systems Xiaofang Sun, Shihao Yan, Nan Yang, Zhiguo Ding, Chao Shen, and Zhangdui Zhong State Key Lab of Rail Traffic Control and Safety, Beijing

More information

Optimal power-delay trade-offs in fading channels: small delay asymptotics

Optimal power-delay trade-offs in fading channels: small delay asymptotics Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract

More information

Effective Rate Analysis of MISO Systems over α-µ Fading Channels

Effective Rate Analysis of MISO Systems over α-µ Fading Channels Effective Rate Analysis of MISO Systems over α-µ Fading Channels Jiayi Zhang 1,2, Linglong Dai 1, Zhaocheng Wang 1 Derrick Wing Kwan Ng 2,3 and Wolfgang H. Gerstacker 2 1 Tsinghua National Laboratory for

More information

The Impact of QoS Constraints on the Energy Efficiency of Fixed-Rate Wireless Transmissions

The Impact of QoS Constraints on the Energy Efficiency of Fixed-Rate Wireless Transmissions University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Faculty Publications from the Department of Electrical and Computer Engineering Electrical & Computer Engineering, Department

More information

On the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling

On the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling On the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling Ruben de Francisco and Dirk T.M. Slock Eurecom Institute Sophia-Antipolis, France Email: {defranci, slock}@eurecom.fr Abstract

More information

AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS

AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS 1 AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS Shensheng Tang, Brian L. Mark, and Alexe E. Leu Dept. of Electrical and Computer Engineering George Mason University Abstract We apply a

More information

Proportional Fairness in ALOHA Networks. with RF Energy Harvesting

Proportional Fairness in ALOHA Networks. with RF Energy Harvesting Proportional Fairness in ALOHA Networks 1 with RF Energy Harvesting Zoran Hadzi-Velkov, Slavche Pejoski, Nikola Zlatanov, and Robert Schober arxiv:1806.00241v2 [cs.it] 10 Sep 2018 Abstract In this paper,

More information

On the Capacity Region of the Gaussian Z-channel

On the Capacity Region of the Gaussian Z-channel On the Capacity Region of the Gaussian Z-channel Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@eng.umd.edu ulukus@eng.umd.edu

More information

How Much Training and Feedback are Needed in MIMO Broadcast Channels?

How Much Training and Feedback are Needed in MIMO Broadcast Channels? How uch raining and Feedback are Needed in IO Broadcast Channels? ari Kobayashi, SUPELEC Gif-sur-Yvette, France Giuseppe Caire, University of Southern California Los Angeles CA, 989 USA Nihar Jindal University

More information

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong Multi-User Gain Maximum Eigenmode Beamforming, and IDMA Peng Wang and Li Ping City University of Hong Kong 1 Contents Introduction Multi-user gain (MUG) Maximum eigenmode beamforming (MEB) MEB performance

More information

On the Optimality of Multiuser Zero-Forcing Precoding in MIMO Broadcast Channels

On the Optimality of Multiuser Zero-Forcing Precoding in MIMO Broadcast Channels On the Optimality of Multiuser Zero-Forcing Precoding in MIMO Broadcast Channels Saeed Kaviani and Witold A. Krzymień University of Alberta / TRLabs, Edmonton, Alberta, Canada T6G 2V4 E-mail: {saeed,wa}@ece.ualberta.ca

More information

Spatial-Temporal Water-Filling Power Allocation in MIMO Systems with Harvested Energy

Spatial-Temporal Water-Filling Power Allocation in MIMO Systems with Harvested Energy Spatial-Temporal Water-Filling Power Allocation in MIMO Systems with Harvested Energy Congshi Hu, Jie Gong, Xiaolei Wang, Sheng Zhou, Zhisheng Niu Tsinghua National Laboratory for Information Science and

More information

Multiuser Joint Energy-Bandwidth Allocation with Energy Harvesting - Part I: Optimum Algorithm & Multiple Point-to-Point Channels

Multiuser Joint Energy-Bandwidth Allocation with Energy Harvesting - Part I: Optimum Algorithm & Multiple Point-to-Point Channels 1 Multiuser Joint Energy-Bandwidth Allocation with Energy Harvesting - Part I: Optimum Algorithm & Multiple Point-to-Point Channels arxiv:1410.2861v1 [cs.it] 10 Oct 2014 Zhe Wang, Vaneet Aggarwal, Xiaodong

More information

Sami Akin and Mustafa Cenk Gursoy. Abstract

Sami Akin and Mustafa Cenk Gursoy. Abstract Performance Analysis of Cognitive Radio Systems 1 under QoS Constraints and Channel Uncertainty Sami Akin and Mustafa Cenk Gursoy arxiv:1005.0375v2 [cs.it] 2 Nov 2010 Abstract In this paper, performance

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,

More information

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information

More information

Energy-Efficient Resource Allocation for MIMO-OFDM Systems Serving Random Sources with Statistical QoS Requirement

Energy-Efficient Resource Allocation for MIMO-OFDM Systems Serving Random Sources with Statistical QoS Requirement Energy-Efficient Resource Allocation for MIMO-OFDM Systems Serving Random Sources with Statistical QoS Requirement Changyang She, Chenyang Yang, and Lingjia Liu Abstract This paper optimizes resource allocation

More information

Can Feedback Increase the Capacity of the Energy Harvesting Channel?

Can Feedback Increase the Capacity of the Energy Harvesting Channel? Can Feedback Increase the Capacity of the Energy Harvesting Channel? Dor Shaviv EE Dept., Stanford University shaviv@stanford.edu Ayfer Özgür EE Dept., Stanford University aozgur@stanford.edu Haim Permuter

More information

Wireless Transmission with Energy Harvesting and Storage. Fatemeh Amirnavaei

Wireless Transmission with Energy Harvesting and Storage. Fatemeh Amirnavaei Wireless Transmission with Energy Harvesting and Storage by Fatemeh Amirnavaei A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in The Faculty of Engineering

More information

Optimal Transmission Policies for Energy Harvesting Transmitter with Hybrid Energy Source in Fading Wireless Channel

Optimal Transmission Policies for Energy Harvesting Transmitter with Hybrid Energy Source in Fading Wireless Channel Optimal Transmission Policies for Energy Harvesting Transmitter with Hybrid Energy Source in Fading Wireless Channel DIDI LIU JIMING LIN, JUNYI WANG, YUXIANG SHEN, YIBIN CHEN School of Telecommunication

More information

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Rui Wang, Jun Zhang, S.H. Song and K. B. Letaief, Fellow, IEEE Dept. of ECE, The Hong Kong University of Science

More information

Cooperative Communication with Feedback via Stochastic Approximation

Cooperative Communication with Feedback via Stochastic Approximation Cooperative Communication with Feedback via Stochastic Approximation Utsaw Kumar J Nicholas Laneman and Vijay Gupta Department of Electrical Engineering University of Notre Dame Email: {ukumar jnl vgupta}@ndedu

More information

User Cooperation in Wireless Powered Communication Networks

User Cooperation in Wireless Powered Communication Networks User Cooperation in Wireless Powered Communication Networks Hyungsik Ju and Rui Zhang Abstract arxiv:403.723v2 [cs.it] 7 Apr 204 This paper studies user cooperation in the emerging wireless powered communication

More information

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 11, NOVEMBER

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 11, NOVEMBER IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 11, NOVEMBER 2016 7357 Buffer-Aided Diamond Relay Network With Block Fading and Inter-Relay Interference Renato Simoni, Vahid Jamali, Student

More information

The Poisson Channel with Side Information

The Poisson Channel with Side Information The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH

More information

Adaptive Distributed Algorithms for Optimal Random Access Channels

Adaptive Distributed Algorithms for Optimal Random Access Channels Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October, 2 Adaptive Distributed Algorithms for Optimal Random Access Channels Yichuan Hu and Alejandro Ribeiro

More information

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Half-Duplex Gaussian Relay Networks with Interference Processing Relays Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras

More information

IN this paper, we show that the scalar Gaussian multiple-access

IN this paper, we show that the scalar Gaussian multiple-access 768 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 5, MAY 2004 On the Duality of Gaussian Multiple-Access and Broadcast Channels Nihar Jindal, Student Member, IEEE, Sriram Vishwanath, and Andrea

More information

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting 1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University

More information

Multiple-Level Power Allocation Strategy for

Multiple-Level Power Allocation Strategy for Multiple-Level Power Allocation Strategy for 1 Secondary Users in Cognitive Radio Networks Zhong Chen, Feifei Gao, Zhenwei Zhang, James C. F. Li, and Ming Lei arxiv:137.158v2 [cs.i] 12 Dec 213 Abstract

More information

Markov decision processes with threshold-based piecewise-linear optimal policies

Markov decision processes with threshold-based piecewise-linear optimal policies 1/31 Markov decision processes with threshold-based piecewise-linear optimal policies T. Erseghe, A. Zanella, C. Codemo Dept. of Information Engineering, University of Padova, Italy Padova, June 2, 213

More information

When does vectored Multiple Access Channels (MAC) optimal power allocation converge to an FDMA solution?

When does vectored Multiple Access Channels (MAC) optimal power allocation converge to an FDMA solution? When does vectored Multiple Access Channels MAC optimal power allocation converge to an FDMA solution? Vincent Le Nir, Marc Moonen, Jan Verlinden, Mamoun Guenach Abstract Vectored Multiple Access Channels

More information

Energy Harvesting and Remotely Powered Wireless Networks

Energy Harvesting and Remotely Powered Wireless Networks IEEE ISIT 216 Tutorial July 1, 216 Energy Harvesting and Remotely Powered Wireless Networks Ayfer Ozgur (Stanford) Sennur Ulukus (UMD) Aylin Yener(Penn State) Outline of This Tutorial Introduction to energy

More information

On Outage Probability for Two-Way Relay Networks with Stochastic Energy Harvesting

On Outage Probability for Two-Way Relay Networks with Stochastic Energy Harvesting On Outage Probability for Two-Way Relay Networks with Stochastic Energy Harvesting 1 Wei Li, Meng-Lin Ku, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland,

More information

Lecture 4. Capacity of Fading Channels

Lecture 4. Capacity of Fading Channels 1 Lecture 4. Capacity of Fading Channels Capacity of AWGN Channels Capacity of Fading Channels Ergodic Capacity Outage Capacity Shannon and Information Theory Claude Elwood Shannon (April 3, 1916 February

More information

An Analysis of Uplink Asynchronous Non-Orthogonal Multiple Access Systems

An Analysis of Uplink Asynchronous Non-Orthogonal Multiple Access Systems 1 An Analysis of Uplink Asynchronous Non-Orthogonal Multiple Access Systems Xun Zou, Student Member, IEEE, Biao He, Member, IEEE, and Hamid Jafarkhani, Fellow, IEEE arxiv:18694v1 [csit] 3 Jun 18 Abstract

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Syracuse University SURFACE Dissertations - ALL SURFACE June 2017 Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Yi Li Syracuse University Follow this and additional works

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012

More information

Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines

Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines Xinyun Wang, Ying Cui, Zhi Liu, Junfeng Guo, Mingyu Yang Abstract In this paper, we would like to investigate

More information

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider

More information

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and

More information

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Behrouz Khoshnevis and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario,

More information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information SUBMIED O IEEE INERNAIONAL SYMPOSIUM ON INFORMAION HEORY, DE. 23 1 Optimal Power Allocation for Parallel Gaussian Broadcast hannels with Independent and ommon Information Nihar Jindal and Andrea Goldsmith

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

Energy Management in Large-Scale MIMO Systems with Per-Antenna Energy Harvesting

Energy Management in Large-Scale MIMO Systems with Per-Antenna Energy Harvesting Energy Management in Large-Scale MIMO Systems with Per-Antenna Energy Harvesting Rami Hamdi 1,2, Elmahdi Driouch 1 and Wessam Ajib 1 1 Department of Computer Science, Université du Québec à Montréal (UQÀM),

More information

Minimizing Age of Information with Soft Updates

Minimizing Age of Information with Soft Updates Minimizing Age of Information with Soft Updates Melih Bastopcu Sennur Ulukus arxiv:8.0848v [cs.it] 9 Dec 08 Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074

More information

When Simplicity Meets Optimality: Efficient Transmission Power Control with Stochastic Energy Harvesting

When Simplicity Meets Optimality: Efficient Transmission Power Control with Stochastic Energy Harvesting When Simplicity Meets Optimality: Efficient Transmission Power Control with Stochastic Energy Harvesting Qingsi Wang and Mingyan iu EECS Department University of Michigan, Ann Arbor (qingsi, mingyan)@umichedu

More information

This is a repository copy of Optimal Power Allocation Scheme for Non-Orthogonal Multiple Access with \alpha-fairness.

This is a repository copy of Optimal Power Allocation Scheme for Non-Orthogonal Multiple Access with \alpha-fairness. This is a repository copy of Optimal Power Allocation Scheme for Non-Orthogonal Multiple Access with \alpha-fairness. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.u/8886/

More information

K User Interference Channel with Backhaul

K User Interference Channel with Backhaul 1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Approximate Ergodic Capacity of a Class of Fading Networks

Approximate Ergodic Capacity of a Class of Fading Networks Approximate Ergodic Capacity of a Class of Fading Networks Sang-Woon Jeon, Chien-Yi Wang, and Michael Gastpar School of Computer and Communication Sciences EPFL Lausanne, Switzerland {sangwoon.jeon, chien-yi.wang,

More information

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels 1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it

More information

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels 1 Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels Ain-ul-Aisha, Lifeng Lai, Yingbin Liang and Shlomo Shamai (Shitz Abstract In this paper, we analyze the sum-rate capacity of two-user Poisson

More information

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung

More information

Energy Efficient Multiuser Scheduling: Statistical Guarantees on Bursty Packet Loss

Energy Efficient Multiuser Scheduling: Statistical Guarantees on Bursty Packet Loss Energy Efficient Multiuser Scheduling: Statistical Guarantees on Bursty Packet Loss M. Majid Butt, Eduard A. Jorswieck and Amr Mohamed Department of Computer Science and Engineering, Qatar University,

More information

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Junfeng Guo, Zhaozhe Song, Ying Cui Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, P. R. China

More information