1,385 results
Search Results
2. Optimal beamforming in MISO cognitive channels with degraded message sets
- Author
-
Jing Lv, Adrian Kliks, Ragnar Thobaben, Eduard A. Jorswieck, and Ricardo Blasco-Serrano
- Subjects
Beamforming ,Mathematical optimization ,business.industry ,Computer science ,Transmitter ,Cognition ,Computer simulation ,Telekommunikation ,Cognitive radio ,Telecommunications ,Wireless telecommunication systems ,Dirty paper coding ,business ,Communication channel - Abstract
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with a multiple-input single-output (MISO) secondary user pair that has non-causal knowledge of the primary message. We study an achievable rate region that exploits this knowledge by combining selfless relaying to maintain the rate supported by the primary link with dirty paper coding to pre-cancel the interference at the secondary receiver. We find the optimal choice of power allocation between these operating modes at the secondary transmitter as well as the optimal beamforming vectors. Moreover, we address the robustness of the solution to uncertainties in the channel knowledge. Finally, we show by numerical evaluation the gains obtained due to the additional knowledge of the primary message. QC 20120905
- Published
- 2012
3. Modulation for interference avoidance on the AWGN channel
- Author
-
Du, Jinfeng
- Subjects
interference avoidance ,dirty paper coding ,Costa precoding ,Data_CODINGANDINFORMATIONTHEORY ,Tomlinson-Harashima precoding ,Electrical Engineering, Electronic Engineering, Information Engineering ,Elektroteknik och elektronik ,Computer Science::Information Theory - Abstract
Theoretic results have shown that the capacity of a channel does not decrease if the receiver observes the transmitted signal in the presence of interference, provided that the transmitter knows this interference non-causally. That is, if the transmitter has non-causal access to the interference, by using proper precoding this interference could be “avoided” (as if it were not present) under the same transmit power constraint. It indicates that lossless (in the sense of capacity) precoding is theoretically possible at any signal-to-noise-ratio (SNR). This is of special interest in digital watermarking, transmission for ISI channels as well as for MIMO broadcast channels. Recent research has elegantly demonstrated the (near) achievability of this “existence-type” result, while the complexity is notable. An interesting question is what one can do when very little extra complexity is permitted. This thesis treats such special cases of this problem in order to shed some light on this question. In the AWGN channel with additive interference, an optimum modulator is designed under the constraint of a binary signaling alphabet with binary interference.Tomlinson-Harashima precoding (THP), which is originally proposed for ISI channels, is improved by picking up optimized parameters and then taken as a benchmark. Simulation results show that the Optimum Modulator always outperforms the THP with optimized parameters. The difference in performance, in terms of mutual information between channel input and output as well as coded bit error rate with Turbo codes, is significant in many scenarios.
- Published
- 2006
4. An investigation on mutual information for the linear predictive system and the extrapolation of speech signals
- Abstract
Mutual information (MI) is an important information theoretic concept which has many applications in telecommunications, in blind source separation, and in machine learning. More recently, it has been also employed for the instrumental assessment of speech intelligibility where traditionally correlation based measures are used. In this paper, we address the difference between MI and correlation from the viewpoint of discovering dependencies between variables in the context of speech signals. We perform our investigation by considering the linear predictive approximation and the extrapolation of speech signals as examples. We compare a parametric MI estimation approach based on a Gaussian mixture model (GMM) with the k-nearest neighbor (KNN) approach which is a well-known non-parametric method available to estimate the MI. We show that the GMM-based MI estimator leads to more consistent results. © 2020 Sprachkommunikation - 10. ITG-Fachtagung. All rights reserved., QC 20201202
- Published
- 2020
5. Delay and Stability Analysis of Caching in Heterogeneous Cellular Networks
- Abstract
In this paper, we propose a general delay and stability performance analysis in Heterogeneous Cellular Caching Networks (HCCNs), based on queuing theory. We introduce new performance metrics in HCCNs and propose an optimization problem which minimizes the average experienced delay for users by ensuring the stability of the network. In addition, from the design perspective, we address the problem of finding the minimum cache size for the small cell base stations (SBSs) for having a tolerable average delay and also a stable network. Finally, the analytic expressions derived in this paper are validated through real trace-driven experiments on traffic of YouTube video requests., QC 20161209
- Published
- 2016
- Full Text
- View/download PDF
6. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
7. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
8. Statistical methods for inter-view depth enhancement
- Abstract
This paper briefly presents and evaluates recent advances in statistical methods for improving inter-view inconsistency in multiview depth imagery. View synthesis is vital in free-viewpoint television in order to allow viewers to move freely in a dynamic scene. Here, depth image-based rendering plays a pivotal role by synthesizing an arbitrary number of novel views by using a subset of captured views and corresponding depth maps only. Usually, each depth map is estimated individually at different viewpoints by stereo matching and, hence, shows lack of inter-view consistency. This lack of consistency affects the quality of view synthesis negatively. This paper discusses two different approaches to enhance the inter-view depth consistency. The first one uses generative models based on multiview color and depth classification to assign a probabilistic weight to each depth pixel. The weighted depth pixels are utilized to enhance depth maps. The second one performs inter-view consistency testing in depth difference space to enhance the depth maps at multiple viewpoints. We comparatively evaluate these two methods and discuss their pros and cons for future work., QC 20150109
- Published
- 2014
- Full Text
- View/download PDF
9. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
10. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
11. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
12. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
13. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
14. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
15. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
16. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
17. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
18. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
19. Dynamic decode-and-forward relaying with rate-compatible LDPC convolutional codes
- Abstract
Dynamic decode-and-forward (DDF) is an improved decode-and-forward (DF) protocol under which the relay decides based on its received channel-state information (CSI) when to switch from listening mode to transmission mode without knowing the CSI of other links. In this paper we propose to apply rate-compatible LDPC convolutional (RC-LDPCC) codes to the DDF relay channel. The RC-LDPCC codes are constructed by successive graph extensions, and they have been proved analytically to be capacity achieving over the binary erasure channel. In this paper we show that the RC-LDPCC codes fit well with the DDF relaying, and the regularity of degree distributions simplifies the code optimization. Numerical results in terms of bit erasure rate and achievable rate are provided to evaluate the performance of the system. The results show that the RC-LDPCC codes are able to provide high achievable rates for the DDF relay channel., QC 20120831
- Published
- 2012
- Full Text
- View/download PDF
20. Optimal beamforming in MISO cognitive channels with degraded message sets
- Abstract
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with a multiple-input single-output (MISO) secondary user pair that has non-causal knowledge of the primary message. We study an achievable rate region that exploits this knowledge by combining selfless relaying to maintain the rate supported by the primary link with dirty paper coding to pre-cancel the interference at the secondary receiver. We find the optimal choice of power allocation between these operating modes at the secondary transmitter as well as the optimal beamforming vectors. Moreover, we address the robustness of the solution to uncertainties in the channel knowledge. Finally, we show by numerical evaluation the gains obtained due to the additional knowledge of the primary message., QC 20120905
- Published
- 2012
- Full Text
- View/download PDF
21. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
22. Computing polynomial functions of correlated sources : Inner bounds
- Abstract
This paper considers the problem of source coding for computing functions of correlated i.i.d. random sources. The approach of combining standard and linear random coding for this problem was first introduced by Ahlswede and Han, in the special case of computing the modulo-two sum. In this paper, making use of an adapted version of that method, we generalize their result to more sophisticated scenarios, where the functions to be computed are polynomial functions. Since all discrete functions are fundamentally restrictions of polynomial functions, our results are universally applied., QC 20130109
- Published
- 2012
23. Impact of mobility in cooperative spectrum sensing : Theory vs. simulation
- Abstract
This work addresses the problem of cooperative spectrum sensing in cognitive radio networks, focusing on the impact of mobility on performance of cooperative sensing. First, a review of the most recent results on cooperative spectrum sensing is provided, resulting in the identification of measurement correlation and frame error rate in the reporting channel as the main parameters influencing the performance of cooperative sensing schemes. Next, the paper discusses the extension of the analysis to the case of mobile sensors, and determines the set of assumptions made in existing literature when taking into account mobility in sensing. The paper moves then to remove some of such assumptions, by presenting simulation results obtained in presence of realistic models for propagation in the considered area, as well as of a realistic mobility model. A comparison between theoretical derivation and simulation results shows that correlation among measurements taken by different sensors and the selected mobility model may significantly affect the sensing performance., QC 20130128
- Published
- 2012
- Full Text
- View/download PDF
24. Power Allocation for Multi-Hop Decode-and-Forward Cognitive Radio Networks with Line Topology
- Abstract
In the present paper we study the power allocation for multi-hop underlay cognitive radio networks (CRNs) with line topology. That is, we consider a scenario, where a CRN operates in parallel to the primary network provided that the interference created to the primary network is limited by an acceptable threshold. The CNR is assumed to be a multi-hop relay network and hence before reaching the destination information from the source node may pass several hops from node to node. At each hop, the information is decoded and forwarded to the following node. It is further assumed that transmissions can be overheard by neighboring nodes, thereby creating interference. The power at each node can be optimally adjusted so that the end-to-end throughput of the CRN is maximized, while the constraint on interference towards the primary network is satisfied. In this paper, we show that for line CRNs the optimal power allocation is achieved when capacities of all intermediate links are equal and the interference constraint of the most disturbed primary user is fulfilled with equality. To simplify the computation of the optimal power allocation we derive two approximate solutions as well as several distributed power allocation schemes. The numerical results illustrate the interplay between the proposed solutions and the optimal power allocation., QC 20130111
- Published
- 2012
- Full Text
- View/download PDF
25. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
26. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
27. Optimal beamforming in MISO cognitive channels with degraded message sets
- Abstract
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with a multiple-input single-output (MISO) secondary user pair that has non-causal knowledge of the primary message. We study an achievable rate region that exploits this knowledge by combining selfless relaying to maintain the rate supported by the primary link with dirty paper coding to pre-cancel the interference at the secondary receiver. We find the optimal choice of power allocation between these operating modes at the secondary transmitter as well as the optimal beamforming vectors. Moreover, we address the robustness of the solution to uncertainties in the channel knowledge. Finally, we show by numerical evaluation the gains obtained due to the additional knowledge of the primary message., QC 20120905
- Published
- 2012
- Full Text
- View/download PDF
28. Computing polynomial functions of correlated sources : Inner bounds
- Abstract
This paper considers the problem of source coding for computing functions of correlated i.i.d. random sources. The approach of combining standard and linear random coding for this problem was first introduced by Ahlswede and Han, in the special case of computing the modulo-two sum. In this paper, making use of an adapted version of that method, we generalize their result to more sophisticated scenarios, where the functions to be computed are polynomial functions. Since all discrete functions are fundamentally restrictions of polynomial functions, our results are universally applied., QC 20130109
- Published
- 2012
29. Optimal beamforming in MISO cognitive channels with degraded message sets
- Abstract
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with a multiple-input single-output (MISO) secondary user pair that has non-causal knowledge of the primary message. We study an achievable rate region that exploits this knowledge by combining selfless relaying to maintain the rate supported by the primary link with dirty paper coding to pre-cancel the interference at the secondary receiver. We find the optimal choice of power allocation between these operating modes at the secondary transmitter as well as the optimal beamforming vectors. Moreover, we address the robustness of the solution to uncertainties in the channel knowledge. Finally, we show by numerical evaluation the gains obtained due to the additional knowledge of the primary message., QC 20120905
- Published
- 2012
- Full Text
- View/download PDF
30. Optimal beamforming in MISO cognitive channels with degraded message sets
- Abstract
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with a multiple-input single-output (MISO) secondary user pair that has non-causal knowledge of the primary message. We study an achievable rate region that exploits this knowledge by combining selfless relaying to maintain the rate supported by the primary link with dirty paper coding to pre-cancel the interference at the secondary receiver. We find the optimal choice of power allocation between these operating modes at the secondary transmitter as well as the optimal beamforming vectors. Moreover, we address the robustness of the solution to uncertainties in the channel knowledge. Finally, we show by numerical evaluation the gains obtained due to the additional knowledge of the primary message., QC 20120905
- Published
- 2012
- Full Text
- View/download PDF
31. Computing polynomial functions of correlated sources : Inner bounds
- Abstract
This paper considers the problem of source coding for computing functions of correlated i.i.d. random sources. The approach of combining standard and linear random coding for this problem was first introduced by Ahlswede and Han, in the special case of computing the modulo-two sum. In this paper, making use of an adapted version of that method, we generalize their result to more sophisticated scenarios, where the functions to be computed are polynomial functions. Since all discrete functions are fundamentally restrictions of polynomial functions, our results are universally applied., QC 20130109
- Published
- 2012
32. Computing polynomial functions of correlated sources : Inner bounds
- Abstract
This paper considers the problem of source coding for computing functions of correlated i.i.d. random sources. The approach of combining standard and linear random coding for this problem was first introduced by Ahlswede and Han, in the special case of computing the modulo-two sum. In this paper, making use of an adapted version of that method, we generalize their result to more sophisticated scenarios, where the functions to be computed are polynomial functions. Since all discrete functions are fundamentally restrictions of polynomial functions, our results are universally applied., QC 20130109
- Published
- 2012
33. Computing polynomial functions of correlated sources : Inner bounds
- Abstract
This paper considers the problem of source coding for computing functions of correlated i.i.d. random sources. The approach of combining standard and linear random coding for this problem was first introduced by Ahlswede and Han, in the special case of computing the modulo-two sum. In this paper, making use of an adapted version of that method, we generalize their result to more sophisticated scenarios, where the functions to be computed are polynomial functions. Since all discrete functions are fundamentally restrictions of polynomial functions, our results are universally applied., QC 20130109
- Published
- 2012
34. Optimal beamforming in MISO cognitive channels with degraded message sets
- Abstract
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with a multiple-input single-output (MISO) secondary user pair that has non-causal knowledge of the primary message. We study an achievable rate region that exploits this knowledge by combining selfless relaying to maintain the rate supported by the primary link with dirty paper coding to pre-cancel the interference at the secondary receiver. We find the optimal choice of power allocation between these operating modes at the secondary transmitter as well as the optimal beamforming vectors. Moreover, we address the robustness of the solution to uncertainties in the channel knowledge. Finally, we show by numerical evaluation the gains obtained due to the additional knowledge of the primary message., QC 20120905
- Published
- 2012
- Full Text
- View/download PDF
35. Distortion Bounds on Anytime Source Transmission Using UEP Channel Coding
- Abstract
In this paper, we study the design of causal anytime codes for transmission over symmetric discrete memoryless channel. In our earlier work, we proposed an anytime transmission scheme which is based on unequal error protection using Luby transform codes (UEP-LT) and sequential belief propagation (BP) decoding. In this paper we extend our previous result by providing an analysis on the proposed scheme. In particular, an upperbound on the end-to-end distortion of the anytime transmission scheme is derived., QC 20111213
- Published
- 2011
36. Half-duplex relaying based on quantize-and-forward
- Abstract
The original compress-and-forward relaying scheme uses the technique of random binning at the relay node and successive decoding at the destination node. Recently, a scheme (termed the quantize-and-forward scheme in this paper) without binning and using joint decoding at the destination node has been proposed, which has been shown to achieve the same rate as the original compress-and-forward scheme. Since the previous work focuses on the so-called full duplex relay network, in this paper, an adaption of it for relay networks with a half-duplex relay is provided. Coding schemes and achievable rate results are presented for discrete memoryless half-duplex relay channels and half-duplex additive white Gaussian noise (AWGN) relay channels. Moreover, slow fading channels are considered, for which outage-related performance measures are evaluated. Specifically, the outage probability and the expected rate of the quantize-and-forward scheme are derived and compared with other well-known schemes. Furthermore, the diversity-multiplexing tradeoff is derived. It is shown that the quantize-and-forward scheme is a more suitable scheme than the compress-and-forward scheme over slow fading channels and it achieves the optimal diversity-multiplexing trade-off of a half-duplex relay channel., QC 20120131
- Published
- 2011
- Full Text
- View/download PDF
37. Distortion Bounds on Anytime Source Transmission Using UEP Channel Coding
- Abstract
In this paper, we study the design of causal anytime codes for transmission over symmetric discrete memoryless channel. In our earlier work, we proposed an anytime transmission scheme which is based on unequal error protection using Luby transform codes (UEP-LT) and sequential belief propagation (BP) decoding. In this paper we extend our previous result by providing an analysis on the proposed scheme. In particular, an upperbound on the end-to-end distortion of the anytime transmission scheme is derived., QC 20111213
- Published
- 2011
38. Distortion Bounds on Anytime Source Transmission Using UEP Channel Coding
- Abstract
In this paper, we study the design of causal anytime codes for transmission over symmetric discrete memoryless channel. In our earlier work, we proposed an anytime transmission scheme which is based on unequal error protection using Luby transform codes (UEP-LT) and sequential belief propagation (BP) decoding. In this paper we extend our previous result by providing an analysis on the proposed scheme. In particular, an upperbound on the end-to-end distortion of the anytime transmission scheme is derived., QC 20111213
- Published
- 2011
39. Distortion Bounds on Anytime Source Transmission Using UEP Channel Coding
- Abstract
In this paper, we study the design of causal anytime codes for transmission over symmetric discrete memoryless channel. In our earlier work, we proposed an anytime transmission scheme which is based on unequal error protection using Luby transform codes (UEP-LT) and sequential belief propagation (BP) decoding. In this paper we extend our previous result by providing an analysis on the proposed scheme. In particular, an upperbound on the end-to-end distortion of the anytime transmission scheme is derived., QC 20111213
- Published
- 2011
40. Distortion Bounds on Anytime Source Transmission Using UEP Channel Coding
- Abstract
In this paper, we study the design of causal anytime codes for transmission over symmetric discrete memoryless channel. In our earlier work, we proposed an anytime transmission scheme which is based on unequal error protection using Luby transform codes (UEP-LT) and sequential belief propagation (BP) decoding. In this paper we extend our previous result by providing an analysis on the proposed scheme. In particular, an upperbound on the end-to-end distortion of the anytime transmission scheme is derived., QC 20111213
- Published
- 2011
41. Iterative encoder-controller design based on approximate dynamic programming
- Abstract
In this paper, we study the iterative optimization of the encoder-controller pair for closed-loop control of a multi-dimensional plant over a noisy discrete memoryless channel. With the objective to minimize the expected linear quadratic cost over a finite horizon, we propose a joint design of the sensor measurement quantization, channel error protection, and optimal controller actuation. It was shown in our previous work that despite this optimization problem is known to be hard in general, an iterative design procedure can be derived to obtain a local optimal solution. However, in the vector case, optimizing the encoder for a fixed controller is in general not practically feasible due to the curse of dimensionality. In this paper, we propose a novel approach that uses the approximate dynamic programming (ADP) to implement a computationally feasible encoder updating policy with promising performance. Especially, we introduce encoder updating rules adopting the rollout approach. Numerical experiments are carried out to demonstrate the performance obtained by employing the proposed iterative design procedure and to compare it with other relevant schemes., QC 20111205
- Published
- 2010
- Full Text
- View/download PDF
42. The influence of error propagation on the capacity of wireless networks
- Abstract
In this paper, it is shown that the achievable throughput capacity of wireless networks suffers from a fundamental limitation under finite node resource constraints. It is shown that this reduction results from a fundamental lower bound on the error performance of the wireless-channel model. In particular, the problem is addressed for the classic parallel-unicast problem introduced by Gupta-Kumar (2000). Under an AWGN channel-model assumption and for a pathloss exponent of α > 2, it is shown that the best available scheme for this setup achieves a throughput-capacity scaling of only Θ(n-1/2(log n)-1) per node. This is significant since an upper bound on asymptotic throughput capacity, scaling as Θ(n-1/2), was earlier shown to have been achieved by a scheme introduced by Franceschetti et. al. in 2006. The gap between achievability and the upper bound did not figure in past work on this problem, mainly due to transmission models that implicitly assume wireless nodes to have unlimited storage and encoding/decoding capabilities. Under the assumption of finite node memory, it is shown that such transmission models are unjustified in a strict information-theoretic sense. The new reduction in capacity scaling occurs from a necessity to modify the schemes used for showing achievability, in order to ensure that the failure probability is arbitrarily small. The analysis presented in this paper employs well-known sphere-packing bounds on the error probability of any block code in terms of the channel-error exponent. The result shows that for wireless networks with resource-constrained nodes, (a) the tightness of the best-known upper bound on capacity scaling still needs to be investigated, and (b) perhaps a better scheme that achieves higher capacity-scaling can be devised, but it is still an open problem., QC 20120124
- Published
- 2010
- Full Text
- View/download PDF
43. Encoder-controller design for control over the binary-input Gaussian channel
- Abstract
In this paper, we consider the problem of the joint optimization of encoder-controller for closed-loop control with state feedback over a binary-input Gaussian channel (BGC). The objective is to minimize the expected linear quadratic cost over a finite horizon. Thisencoder-controller optimization problem is hard in general, mostly because of the curse of dimensionality. The result of this paper is a synthesis technique for a computationally feasible suboptimal controller which exploits both the soft and hard information of thechannel outputs. The proposed controller is efficient in the sense that it embraces measurement quantization, error protection and control over a finite-input infinite-output noisy channel. How to effectively implement this controller is also addressed in the paper. In particular, this is done by using Hadamard techniques. Numerical experiments are carried out to verify the promising gain offered by the combined controller, in comparison to the hard-information-based controller., QC 20120124
- Published
- 2010
- Full Text
- View/download PDF
44. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
45. Coding for the Z Channel With a Digital Relay Link
- Abstract
This paper considers a discrete memoryless four-node network where two nodes want to send three independent messages to the other two nodes. The two receiving nodes are allowed to cooperate by means of a unidirectional noiseless link with finite capacity. A coding scheme is proposed which combines rate splitting, block Markov multi-level superposition coding with binning and joint decoding. The general achievable rates are then specialized to degraded channel and Gaussian channel, where it is shown that the sum capacity for the Gaussian channel is achieved under certain conditions. Results in this paper recover and unify previously known results for the discrete memoryless Z channel without cooperation, and results for the Gaussian Z-interference channel with a digital relay link., QC 20111114
- Published
- 2010
- Full Text
- View/download PDF
46. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
47. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
48. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
49. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
50. Binary weight distribution of non-binary LDPC codes
- Abstract
This paper is the first part of an investigation if the capacity of a binary-input memoryless symmetric channel under ML decoding can be achieved asymptotically by using non-binary LDPC codes. We consider (l.r)-regular LDPC codes both over finite fields and over the general linear group and compute their asymptotic binary weight distributions in the limit of large blocklength and of large alphabet size. A surprising fact, the average binary weight distributions that we obtain do not tend to the binomial one for values of normalized binary weights ω smaller than 1-2-l/r. However, it does not mean that non-binary codes do not achieve the capacity asymptotically, but rather that there exists some exponentially small fraction of codes in the ensemble, which contains an exponentially large number of codewords of poor weight. The justification of this fact is beyond the scope of this paper and will be given in [1]., QC 20141010
- Published
- 2009
- Full Text
- View/download PDF
51. Dynamic Single-User OFDM Adaptation for IEEE 802.11 Systems
- Abstract
Earlier paper have demonstrated that the achievable throughput of OFDM systems can benefit significantly from individual modulation/transmit power selection on a per sub-carrier basis according to the actual gain of individual sub-carriers (so called dynamic OFDM scheme). Usage of such approach requires, however, providing support for additional functionality like: acquisition of the subcarrier gains, signaling of the used modulation types between the sender and receiver, etc. Therefore dynamic OFDM is actively pursued for future radio interfaces, rather then considered as extension of existing OFDM based standards. In this paper we present for the first time a proposal how the widely accepted IEEE 802.11a/g systems might be extended to support the dynamic OFDM in a singleuser (point-to-point) setting while assuring backward compatibility. We address these issues by a) presenting a set of protocol modifications; and b) a performance evaluation of the suggested extension (referred further on to as single-user 802.11 DYN mode) demonstrating the potential of performance improvement., QC 20140103
- Published
- 2007
- Full Text
- View/download PDF
52. Dynamic Single-User OFDM Adaptation for IEEE 802.11 Systems
- Abstract
Earlier paper have demonstrated that the achievable throughput of OFDM systems can benefit significantly from individual modulation/transmit power selection on a per sub-carrier basis according to the actual gain of individual sub-carriers (so called dynamic OFDM scheme). Usage of such approach requires, however, providing support for additional functionality like: acquisition of the subcarrier gains, signaling of the used modulation types between the sender and receiver, etc. Therefore dynamic OFDM is actively pursued for future radio interfaces, rather then considered as extension of existing OFDM based standards. In this paper we present for the first time a proposal how the widely accepted IEEE 802.11a/g systems might be extended to support the dynamic OFDM in a singleuser (point-to-point) setting while assuring backward compatibility. We address these issues by a) presenting a set of protocol modifications; and b) a performance evaluation of the suggested extension (referred further on to as single-user 802.11 DYN mode) demonstrating the potential of performance improvement., QC 20140103
- Published
- 2007
- Full Text
- View/download PDF
53. Dynamic Single-User OFDM Adaptation for IEEE 802.11 Systems
- Abstract
Earlier paper have demonstrated that the achievable throughput of OFDM systems can benefit significantly from individual modulation/transmit power selection on a per sub-carrier basis according to the actual gain of individual sub-carriers (so called dynamic OFDM scheme). Usage of such approach requires, however, providing support for additional functionality like: acquisition of the subcarrier gains, signaling of the used modulation types between the sender and receiver, etc. Therefore dynamic OFDM is actively pursued for future radio interfaces, rather then considered as extension of existing OFDM based standards. In this paper we present for the first time a proposal how the widely accepted IEEE 802.11a/g systems might be extended to support the dynamic OFDM in a singleuser (point-to-point) setting while assuring backward compatibility. We address these issues by a) presenting a set of protocol modifications; and b) a performance evaluation of the suggested extension (referred further on to as single-user 802.11 DYN mode) demonstrating the potential of performance improvement., QC 20140103
- Published
- 2007
- Full Text
- View/download PDF
54. Dynamic Single-User OFDM Adaptation for IEEE 802.11 Systems
- Abstract
Earlier paper have demonstrated that the achievable throughput of OFDM systems can benefit significantly from individual modulation/transmit power selection on a per sub-carrier basis according to the actual gain of individual sub-carriers (so called dynamic OFDM scheme). Usage of such approach requires, however, providing support for additional functionality like: acquisition of the subcarrier gains, signaling of the used modulation types between the sender and receiver, etc. Therefore dynamic OFDM is actively pursued for future radio interfaces, rather then considered as extension of existing OFDM based standards. In this paper we present for the first time a proposal how the widely accepted IEEE 802.11a/g systems might be extended to support the dynamic OFDM in a singleuser (point-to-point) setting while assuring backward compatibility. We address these issues by a) presenting a set of protocol modifications; and b) a performance evaluation of the suggested extension (referred further on to as single-user 802.11 DYN mode) demonstrating the potential of performance improvement., QC 20140103
- Published
- 2007
- Full Text
- View/download PDF
55. Dynamic Single-User OFDM Adaptation for IEEE 802.11 Systems
- Abstract
Earlier paper have demonstrated that the achievable throughput of OFDM systems can benefit significantly from individual modulation/transmit power selection on a per sub-carrier basis according to the actual gain of individual sub-carriers (so called dynamic OFDM scheme). Usage of such approach requires, however, providing support for additional functionality like: acquisition of the subcarrier gains, signaling of the used modulation types between the sender and receiver, etc. Therefore dynamic OFDM is actively pursued for future radio interfaces, rather then considered as extension of existing OFDM based standards. In this paper we present for the first time a proposal how the widely accepted IEEE 802.11a/g systems might be extended to support the dynamic OFDM in a singleuser (point-to-point) setting while assuring backward compatibility. We address these issues by a) presenting a set of protocol modifications; and b) a performance evaluation of the suggested extension (referred further on to as single-user 802.11 DYN mode) demonstrating the potential of performance improvement., QC 20140103
- Published
- 2007
- Full Text
- View/download PDF
56. Cooperative Multi-Subarray Beam Training in Millimeter Wave Communication Systems
- Abstract
This paper studies beam training design for a codebook-based beamforming millimeter wave (mmwave) system where multiple antenna arrays are employed and each array is capable of beamforming independently. To reduce the training overhead and the complexity of subsequent beam direction search, we propose a cooperative multi-subarray beam training method. Specifically, from the perspective of excluding non-effective beam direction combinations and thus reducing search space, method and criterion of beam superposition are proposed to construct a wide beam from multiple narrow beams corresponding to multiple subarrays. Then, a cooperative multi-subarray beam training scheme is proposed based on the proposed criterion. Finally, simulation results show that the proposed scheme achieves a spectral efficiency close to that of the optimal exhaustive search scheme, while has greatly reduced training overhead and computational complexity., QC 20180507
- Published
- 2017
- Full Text
- View/download PDF
57. Performance of Wiretap Rayleigh Fading Channels under Statistical Delay Constraints
- Abstract
In this paper, we investigate the performance of the wiretap Rayleigh fading channel in the presence of statistical delay constraints. We invoke tools from stochastic network calculus to derive probabilistic bounds on the delay. This method requires a statistical characterization of the wiretap fading service process, which we derive in closed form. We then validate these analytical bounds via simulations. Interestingly, the analysis of the wiretap fading channel reveals close structural similarities with the interference channel in terms of service process characterization, which is derived in our prior work. In our numerical evaluations, we show that the delay performance of the wiretap fading channel is in particular sensitive to bursty arrival processes due to the high variance of the service process., QC 20170519
- Published
- 2017
- Full Text
- View/download PDF
58. Performance of Wiretap Rayleigh Fading Channels under Statistical Delay Constraints
- Abstract
In this paper, we investigate the performance of the wiretap Rayleigh fading channel in the presence of statistical delay constraints. We invoke tools from stochastic network calculus to derive probabilistic bounds on the delay. This method requires a statistical characterization of the wiretap fading service process, which we derive in closed form. We then validate these analytical bounds via simulations. Interestingly, the analysis of the wiretap fading channel reveals close structural similarities with the interference channel in terms of service process characterization, which is derived in our prior work. In our numerical evaluations, we show that the delay performance of the wiretap fading channel is in particular sensitive to bursty arrival processes due to the high variance of the service process., QC 20170519
- Published
- 2017
- Full Text
- View/download PDF
59. Performance of Wiretap Rayleigh Fading Channels under Statistical Delay Constraints
- Abstract
In this paper, we investigate the performance of the wiretap Rayleigh fading channel in the presence of statistical delay constraints. We invoke tools from stochastic network calculus to derive probabilistic bounds on the delay. This method requires a statistical characterization of the wiretap fading service process, which we derive in closed form. We then validate these analytical bounds via simulations. Interestingly, the analysis of the wiretap fading channel reveals close structural similarities with the interference channel in terms of service process characterization, which is derived in our prior work. In our numerical evaluations, we show that the delay performance of the wiretap fading channel is in particular sensitive to bursty arrival processes due to the high variance of the service process., QC 20170519
- Published
- 2017
- Full Text
- View/download PDF
60. Performance of Wiretap Rayleigh Fading Channels under Statistical Delay Constraints
- Abstract
In this paper, we investigate the performance of the wiretap Rayleigh fading channel in the presence of statistical delay constraints. We invoke tools from stochastic network calculus to derive probabilistic bounds on the delay. This method requires a statistical characterization of the wiretap fading service process, which we derive in closed form. We then validate these analytical bounds via simulations. Interestingly, the analysis of the wiretap fading channel reveals close structural similarities with the interference channel in terms of service process characterization, which is derived in our prior work. In our numerical evaluations, we show that the delay performance of the wiretap fading channel is in particular sensitive to bursty arrival processes due to the high variance of the service process., QC 20170519
- Published
- 2017
- Full Text
- View/download PDF
61. Performance of Wiretap Rayleigh Fading Channels under Statistical Delay Constraints
- Abstract
In this paper, we investigate the performance of the wiretap Rayleigh fading channel in the presence of statistical delay constraints. We invoke tools from stochastic network calculus to derive probabilistic bounds on the delay. This method requires a statistical characterization of the wiretap fading service process, which we derive in closed form. We then validate these analytical bounds via simulations. Interestingly, the analysis of the wiretap fading channel reveals close structural similarities with the interference channel in terms of service process characterization, which is derived in our prior work. In our numerical evaluations, we show that the delay performance of the wiretap fading channel is in particular sensitive to bursty arrival processes due to the high variance of the service process., QC 20170519
- Published
- 2017
- Full Text
- View/download PDF
62. Variational Inference for Watson Mixture Model
- Abstract
This paper addresses modelling data using the Watson distribution. The Watson distribution is one of the simplest distributions for analyzing axially symmetric data. This distribution has gained some attention in recent years due to its modeling capability. However, its Bayesian inference is fairly understudied due to difficulty in handling the normalization factor. Recent development of Markov chain Monte Carlo (MCMC) sampling methods can be applied for this purpose. However, these methods can be prohibitively slow for practical applications. A deterministic alternative is provided by variational methods that convert inference problems into optimization problems. In this paper, we present a variational inference for Watson mixture models. First, the variational framework is used to side-step the intractability arising from the coupling of latent states and parameters. Second, the variational free energy is further lower bounded in order to avoid intractable moment computation. The proposed approach provides a lower bound on the log marginal likelihood and retains distributional information over all parameters. Moreover, we show that it can regulate its own complexity by pruning unnecessary mixture components while avoiding over-fitting. We discuss potential applications of the modeling with Watson distributions in the problem of blind source separation, and clustering gene expression data sets., QC 20161012
- Published
- 2016
- Full Text
- View/download PDF
63. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
64. Secret key generation over noisy channels with common randomness
- Abstract
This paper investigates the problem of secret key generation over a wiretap channel when the terminals have access to correlated sources. These sources are independent of the main channel and the users observe them before the transmission takes place. A novel achievable scheme for this model is proposed and is shown to be optimal under certain less noisy conditions. This result improves upon the existing literature where the more stringent condition of degradedness was needed., QC 20161121
- Published
- 2016
- Full Text
- View/download PDF
65. Feature-Based Multi-User Authentication for Parallel Uplink Transmissions
- Abstract
We study a multi-user up-link scenario where an attacker tries to impersonate the legitimate transmitters. We present a new framework for deriving a posteriori attack probabilities from the channel observations at the access point, which enables fast intrusion detection and authentication at the physical layer and can be exploited to reduce the security overhead by offtoading higher-layer authentication schemes. This is highly relevant for delay-sensitive applications that are targeted in 5G where the security overhead may limit the real-time performance. We take a factor-graph approach that can easily be extended to take into account other features, channel models, and radio access schemes. While related works only consider single-link scenarios, the multi-user approach in this paper allows us to exploit the cross-channel correlation of the large-scale fading parameters that is due to the propagation environment for improving the detection performance. As numerical results show, especially for slowly changing channels with high correlation our approach provides significant performance gains., QC 20161209, CERCES
- Published
- 2016
- Full Text
- View/download PDF
66. Video coding using multi-reference motion-adaptive transforms based on graphs
- Abstract
The purpose of the work is to produce jointly coded frames for efficient video coding. We use motion-adaptive transforms in the temporal domain to generate the temporal subbands. The motion information is used to form graphs for transform construction. In our previous work, the motion-adaptive transform allows only one reference pixel to be the lowband coefficient. In this paper, we extend the motion-adaptive transform such that it permits multiple references and produces multiple lowband coefficients, which can be used in the case of bidirectional or multihypothesis motion estimation. The multi-reference motion-adaptive transform (MRMAT) is always orthonormal, thus, the energy is preserved by the transform. We compare MRMAT and the motion-compensated orthogonal transform (MCOT) [1], while HEVC intra coding is used to encode the temporal subbands. The experimental results show that MRMAT outperforms MCOT by about 0.6dB., QC 20170228
- Published
- 2016
- Full Text
- View/download PDF
67. On the tightness of linear policies for stabilization of linear systems over Gaussian networks
- Abstract
In this paper, we consider stabilization of multi-dimensional linear systems driven by Gaussian noise controlled over parallel Gaussian channels. For such systems, it has been recognized that for stabilization in the sense of asymptotic stationarity or stability in probability, Shannon capacity of a channel is an appropriate measure on characterizing whether a system can be made stable when controlled over the channel. However, this is in general not the case for quadratic stabilization. On a related problem of joint-source channel coding, in the information theory literature, the source-channel matching principle has been shown to lead to optimality of uncoded or analog transmission and when such matching conditions occur, it has been shown that capacity is also a relevant figure of merit for quadratic stabilization. A special case of this result is applicable to a scalar LQG system controlled over a scalar Gaussian channel. In this paper, we show that even in the absence of source-channel matching, to achieve quadratic stability, it may suffice that information capacity (in Shannon’s sense) is greater than the sum of the logarithm of unstable eigenvalue magnitudes. In particular, we show that periodic linear time varying coding policies are optimal in the sense of obtaining a finite second moment for the state of the system with minimum transmit power requirements for a large class of vector Gaussian channels. Our findings also extend the literature which has considered noise-free systems., QC 20160126
- Published
- 2016
- Full Text
- View/download PDF
68. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
69. Lifetime Maximization for Sensor Networks with Wireless Energy Transfer
- Abstract
In Wireless Sensor Networks (WSNs), to supply energy to the sensor nodes, wireless energy transfer (WET) is a promising technique. One of the most efficient procedures to transfer energy to the sensor nodes consists in using a sharp wireless energy beam from the base station to each node at a time. A natural fundamental question is what is the lifetime ensured by WET and how to maximize the network lifetime by scheduling the transmissions of the energy beams. In this paper, such a question is addressed by posing a new lifetime maximization problem for WET enabled WSNs. The binary nature of the energy transmission process introduces a binary constraint in the optimization problem, which makes challenging the investigation of the fundamental properties of WET and the computation of the optimal solution. The sufficient condition for which the WET makes WSNs immortal is established as function of the WET parameters. When such a condition is not met, a solution algorithm to the maximum lifetime problem is proposed. The numerical results show that the lifetime achieved by the proposed algorithm increases by about 50% compared to the case without WET, for a WSN with a small to medium size number of nodes. This suggests that it is desirable to schedule WET to prolong lifetime of WSNs having small or medium network sizes., QC 20170131
- Published
- 2016
- Full Text
- View/download PDF
70. Statistical Delay Bound for WirelessHART Networks
- Abstract
In this paper we provide a performance analysis framework for wireless industrial networks by deriving a service curve and a bound on the delay violation probability. For this purpose we use the (min; ×) stochastic network calculus as well as a recently presented recursive formula for an end-To-end delay bound of wireless heterogeneous networks. The derived results are mapped to WirelessHART networks used in process automation and validated via simulations. In addition to WirelessHART, our results can be applied to any wireless network whose physical layer conforms the IEEE 802.15.4 standard, while itsMAC protocol incorporates channel hopping and TDMA, like e.g. ISA100.11a or TSCHbased networks. The provided delay analysis is especially useful during the network design phase, offering further research potential towards optimal routing and power management in QoS-constrained wireless industrial networks., QC 20160923
- Published
- 2016
- Full Text
- View/download PDF
71. Model-Checking Assisted Protocol Design for Ultra-Reliable Low-Latency Wireless Networks
- Abstract
Recently, the wireless networking community is getting more and more interested in novel protocol designs for safety-critical applications. These new applications come with unprecedented latency and reliability constraints which poses many open challenges. A particularly important one relates to the question how to develop such systems. Traditionally, development of wireless systems has mainly relied on simulations to identify viable architectures. However, in this case the drawbacks of simulations – in particular increasing run-times – rule out its application. Instead, in this paper we propose to use probabilistic model checking, a formal model-based verification technique, to evaluate different system variants during the design phase. Apart from allowing evaluations and therefore design iterations with much smaller periods, probabilistic model checking provides bounds on the reliability of the considered design choices. We demonstrate these salient features with respect to the novel EchoRing protocol, which is a token-based system designed for safety-critical industrial applications. Several mechanisms for dealing with a token loss are modeled and evaluated through probabilistic model checking, showing its potential as suitable evaluation tool for such novel wireless protocols. In particular, we show by probabilistic model checking that wireless tokenpassing systems can benefit tremendously from the considered fault-tolerant methods. The obtained performance guarantees for the different mechanisms even provide reasonable bounds for experimental results obtained from a real-world implementation., QC 20161010
- Published
- 2016
- Full Text
- View/download PDF
72. Throughput Analysis of Proportional Fair Scheduling for Sparse and Ultra-Dense Interference-Limited OFDMA/LTE Networks
- Abstract
Various system tasks, such as interference coordination, handover decisions, admission control, and so on in current cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, LTE cellular systems are interference limited; hence, the way interference is modeled is crucial for the accuracy. In this paper, we present a closed-form analytical model for the throughput expectation of proportional fair scheduling in orthogonal frequency division multiple access/LTE networks. The model takes into account a precise signal-to-interference-and-noise ratio (SINR) distribution as well as considering limitations with respect to modulation and coding, as encountered in LTE networks. Furthermore, the analysis is extended to ultradense deployments likely to happen in the 5th generation of cellular networks. The resulting analytical performance model is validated by means of simulations, considering realistic network deployments. Compared with related work, the model introduced in this paper demonstrates a significantly higher accuracy for mid-term throughput estimation., QCR 20161118
- Published
- 2016
- Full Text
- View/download PDF
73. Optimal Transmission with Per-antenna Power Constraints for Multiantenna Bidirectional Broadcast Channels
- Abstract
This paper considers the optimal transmit strategy for multi-antenna bidirectional broadcast channels with per-antenna power constraints. First, an equivalent formulation of the weighted rate sum maximization problem is provided. This allows us to come up with an effective solution to characterize the boundary of the capacity region which relies on the weighted rate sum optimal rate pair. To that end, an iterative algorithm to find the optimal transmit strategy is derived, the convergence to the optimum is proved, and a closed-form solution of the corresponding off-diagonal elements of the optimal transmit strategy is provided. Further, we provide a parametrization of the curved section of the capacity region. Finally, the theoretical results and algorithm performance are illustrated by numerical examples., QC 20160901
- Published
- 2016
- Full Text
- View/download PDF
74. On the Energy Efficiency in Multi-user Multi-relayCoded Network
- Abstract
In this paper, the energy efficiency (EE) of a cooperative diversity system with maximum diversity network coding (MDNC) is studied. In the considered system, channel state information (CSI) is only available at the receivers for all the channels. We formulate the problem of maximizing the EEunder the constraint on the outage probability. The problem is NP-hard due to the non-convexity of the outage probability function and the nonlinear fractional structure of the introducedEE. To solve the optimization problem efficiently, first, the outage probability function is tightly approximated as a log-convex form in the high signal-to-noise ratio (SNR) region. Further, based on the fractional programming, we transform the introduced EEinto a subtractive-form, which is proved to be a convex form. The tradeoff between outage probability and EE is given. The results show that our power allocation (PA) policy can substantially increase the EE. We show that EE can be increased if more relays forward the messages. Additionally, we also investigate the effect of the relay locations on the EE and demonstrate that the increase in the transmission distance in the first hop causes the loss of the EE. The loss can be reduced by our PA policy., QC 20160923
- Published
- 2016
- Full Text
- View/download PDF
75. Performance Analysis of Cooperative ARQ Systems for Industrial Wireless Networks
- Abstract
The proliferation of wireless communications has lead to a high interest to establish this technology in industrial settings. The main arguments in favor of wireless are reduced costs in deployment and maintenance, as well as increased flexibility. In contrast to home and office environments, industrial settings include mission-critical machine-to-machine applications, demanding stringent requirements for reliability and latency in the area of 1-10-9 PDR and 1ms, respectively. One way to achieve both is cooperative Automatic Repeat reQuest (ARQ), which leverages spatial diversity. This paper presents a wireless multi-user Time Division Multiple Access system with cooperative ARQ for mission-critical communication. We evaluate two design options analytically, using an outage-capacity model, to investigate whether the relaying of messages should be performed centrally at a multi-antenna AP with perfect Channel State Information (CSI) or decentrally at simultaneously transmitting stations with average CSI. Results indicate that both options are able to achieve the targeted communication guarantees when a certain degree of diversity is implemented, showing a stable system performance even with an increasing number of stations., QC 20160512
- Published
- 2016
- Full Text
- View/download PDF
76. CrossZig : Combating Cros-Technology Interference in Low-Power Wireless Networks
- Abstract
Low-power wireless devices suffer notoriously from Cross- Technology Interference (CTI). To enable co-existence, researchers have proposed a variety of interference mitigation strategies. Existing solutions, however, are designed to work with the limitations of currently available radio chips. In this paper, we investigate how to exploit physical layer properties of 802.15.4 signals to better address CTI. We present CrossZig, a cross-layer solution that takes advantage of physical layer information and processing to improve low-power communication under CTI. To this end, CrossZig utilizes physical layer information to detect presence of CTI in a corrupted packet and to apply an adaptive packet recovery which incorporates a novel cross-layer based packet merging and an adaptive FEC coding. We implement a prototype of CrossZig for the low-power IEEE 802.15.4 in a software-defined radio platform. We show the adaptability and the performance gain of CrossZig through experimental evaluation considering both micro-benchmarking and system performance under various interference patterns. Our results demonstrate that CrossZig can achieve a high accuracy in error localization (94.3% accuracy) and interference type identification (less than 5% error rate for SINR ranges below 3 dB). Moreover, our system shows consistent performance improvements under interference from various interfering technologies., QC 20160408
- Published
- 2016
- Full Text
- View/download PDF
77. Learning-based resource allocation scheme for TDD-based 5G CRAN system
- Abstract
Provision of high data rates with always-onconnectivity to high mobility users is one of the motivations for design of fifth generation (5G) systems. High system capacity can be achieved by coordination between large number of antennas, which is done using the cloud radio access network (CRAN) design in 5G systems. In terms of baseband processing, allocation of appropriate resources to the users is necessary to achieve high system capacity, for which the state of the art uses the users' channel state information (CSI); however, they do not take into account the associated overhead, which poses a major bottleneck for the effective system performance. In contrast to this approach, this paper proposes the use of machine learning for allocating resources to high mobility users using only their position estimates. Specifically, the 'random forest' algorithm, a supervised machine learning technique, is used to design a learning-based resource allocation scheme by exploiting the relationships between the system parameters and the users' position estimates. In this way, the overhead for CSI acquisition is avoided by using the position estimates instead, with better spectrum utilization. While the initial numerical investigations, with minimum number of users in the system, show that the proposed learning-based scheme achieves 86% of the efficiency achieved by the perfect CSI-based scheme, if the effect of overhead is factored in, the proposed scheme performs better than the CSI-based approach. In a realistic scenario, with multiple users in the system, the significant increase in overhead for the CSI-based scheme leads to a performance gain of 100%, or more, by using the proposed scheme, and thus proving the proposed scheme to be more efficient in terms of system performance., QC 20170314
- Published
- 2016
- Full Text
- View/download PDF
78. Error Performance of Sparse Code Multiple Access Networks with Joint ML Detection
- Abstract
This paper investigates error performance of sparse code multiple access (SCMA) networks with multiple access channels (MAC) and broadcast channels (BC). We give the closedform expression for the pairwise error probability (PEP) of joint maximum likelihood (ML) detection for multiuser signals over additive white Gaussian noise (AWGN) and Rayleigh fading channels with an arbitrary number of users and multidimensional codebooks. An upper bound for the average symbol error rate (SER) is calculated. The bound is tight in both AWGN channel and Rayleigh fading channels for high SNR regions. The analytical bounds are compared with simulations, and the results confirm the effectiveness of the analysis for both AWGN and Rayleigh fading channels., QC 20161208
- Published
- 2016
- Full Text
- View/download PDF
79. Rate of prefix-free codes in LQG control systems
- Abstract
In this paper, we consider a discrete time linear quadratic Gaussian (LQG) control problem in which state information of the plant is encoded in a variable-length binary codeword at every time step, and a control input is determined based on the codewords generated in the past. We derive a lower bound of the rate achievable by the class of prefix-free codes attaining the required LQG control performance. This lower bound coincides with the infimum of a certain directed information expression, and is computable by semidefinite programming (SDP). Based on a technique by Silva et al., we also provide an upper bound of the best achievable rate by constructing a controller equipped with a uniform quantizer with subtractive dither and Shannon-Fano coding. The gap between the obtained lower and upper bounds is less than 0:754r + 1 bits per time step regardless of the required LQG control performance, where r is the rank of a signal-to-noise ratio matrix obtained by SDP, which is no greater than the dimension of the state., QC 20161122
- Published
- 2016
- Full Text
- View/download PDF
80. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
81. Lifetime Maximization for Sensor Networks with Wireless Energy Transfer
- Abstract
In Wireless Sensor Networks (WSNs), to supply energy to the sensor nodes, wireless energy transfer (WET) is a promising technique. One of the most efficient procedures to transfer energy to the sensor nodes consists in using a sharp wireless energy beam from the base station to each node at a time. A natural fundamental question is what is the lifetime ensured by WET and how to maximize the network lifetime by scheduling the transmissions of the energy beams. In this paper, such a question is addressed by posing a new lifetime maximization problem for WET enabled WSNs. The binary nature of the energy transmission process introduces a binary constraint in the optimization problem, which makes challenging the investigation of the fundamental properties of WET and the computation of the optimal solution. The sufficient condition for which the WET makes WSNs immortal is established as function of the WET parameters. When such a condition is not met, a solution algorithm to the maximum lifetime problem is proposed. The numerical results show that the lifetime achieved by the proposed algorithm increases by about 50% compared to the case without WET, for a WSN with a small to medium size number of nodes. This suggests that it is desirable to schedule WET to prolong lifetime of WSNs having small or medium network sizes., QC 20170131
- Published
- 2016
- Full Text
- View/download PDF
82. Model-Checking Assisted Protocol Design for Ultra-Reliable Low-Latency Wireless Networks
- Abstract
Recently, the wireless networking community is getting more and more interested in novel protocol designs for safety-critical applications. These new applications come with unprecedented latency and reliability constraints which poses many open challenges. A particularly important one relates to the question how to develop such systems. Traditionally, development of wireless systems has mainly relied on simulations to identify viable architectures. However, in this case the drawbacks of simulations – in particular increasing run-times – rule out its application. Instead, in this paper we propose to use probabilistic model checking, a formal model-based verification technique, to evaluate different system variants during the design phase. Apart from allowing evaluations and therefore design iterations with much smaller periods, probabilistic model checking provides bounds on the reliability of the considered design choices. We demonstrate these salient features with respect to the novel EchoRing protocol, which is a token-based system designed for safety-critical industrial applications. Several mechanisms for dealing with a token loss are modeled and evaluated through probabilistic model checking, showing its potential as suitable evaluation tool for such novel wireless protocols. In particular, we show by probabilistic model checking that wireless tokenpassing systems can benefit tremendously from the considered fault-tolerant methods. The obtained performance guarantees for the different mechanisms even provide reasonable bounds for experimental results obtained from a real-world implementation., QC 20161010
- Published
- 2016
- Full Text
- View/download PDF
83. Statistical Delay Bound for WirelessHART Networks
- Abstract
In this paper we provide a performance analysis framework for wireless industrial networks by deriving a service curve and a bound on the delay violation probability. For this purpose we use the (min; ×) stochastic network calculus as well as a recently presented recursive formula for an end-To-end delay bound of wireless heterogeneous networks. The derived results are mapped to WirelessHART networks used in process automation and validated via simulations. In addition to WirelessHART, our results can be applied to any wireless network whose physical layer conforms the IEEE 802.15.4 standard, while itsMAC protocol incorporates channel hopping and TDMA, like e.g. ISA100.11a or TSCHbased networks. The provided delay analysis is especially useful during the network design phase, offering further research potential towards optimal routing and power management in QoS-constrained wireless industrial networks., QC 20160923
- Published
- 2016
- Full Text
- View/download PDF
84. Performance Analysis of Cooperative ARQ Systems for Industrial Wireless Networks
- Abstract
The proliferation of wireless communications has lead to a high interest to establish this technology in industrial settings. The main arguments in favor of wireless are reduced costs in deployment and maintenance, as well as increased flexibility. In contrast to home and office environments, industrial settings include mission-critical machine-to-machine applications, demanding stringent requirements for reliability and latency in the area of 1-10-9 PDR and 1ms, respectively. One way to achieve both is cooperative Automatic Repeat reQuest (ARQ), which leverages spatial diversity. This paper presents a wireless multi-user Time Division Multiple Access system with cooperative ARQ for mission-critical communication. We evaluate two design options analytically, using an outage-capacity model, to investigate whether the relaying of messages should be performed centrally at a multi-antenna AP with perfect Channel State Information (CSI) or decentrally at simultaneously transmitting stations with average CSI. Results indicate that both options are able to achieve the targeted communication guarantees when a certain degree of diversity is implemented, showing a stable system performance even with an increasing number of stations., QC 20160512
- Published
- 2016
- Full Text
- View/download PDF
85. Optimal Transmission with Per-antenna Power Constraints for Multiantenna Bidirectional Broadcast Channels
- Abstract
This paper considers the optimal transmit strategy for multi-antenna bidirectional broadcast channels with per-antenna power constraints. First, an equivalent formulation of the weighted rate sum maximization problem is provided. This allows us to come up with an effective solution to characterize the boundary of the capacity region which relies on the weighted rate sum optimal rate pair. To that end, an iterative algorithm to find the optimal transmit strategy is derived, the convergence to the optimum is proved, and a closed-form solution of the corresponding off-diagonal elements of the optimal transmit strategy is provided. Further, we provide a parametrization of the curved section of the capacity region. Finally, the theoretical results and algorithm performance are illustrated by numerical examples., QC 20160901
- Published
- 2016
- Full Text
- View/download PDF
86. CrossZig : Combating Cros-Technology Interference in Low-Power Wireless Networks
- Abstract
Low-power wireless devices suffer notoriously from Cross- Technology Interference (CTI). To enable co-existence, researchers have proposed a variety of interference mitigation strategies. Existing solutions, however, are designed to work with the limitations of currently available radio chips. In this paper, we investigate how to exploit physical layer properties of 802.15.4 signals to better address CTI. We present CrossZig, a cross-layer solution that takes advantage of physical layer information and processing to improve low-power communication under CTI. To this end, CrossZig utilizes physical layer information to detect presence of CTI in a corrupted packet and to apply an adaptive packet recovery which incorporates a novel cross-layer based packet merging and an adaptive FEC coding. We implement a prototype of CrossZig for the low-power IEEE 802.15.4 in a software-defined radio platform. We show the adaptability and the performance gain of CrossZig through experimental evaluation considering both micro-benchmarking and system performance under various interference patterns. Our results demonstrate that CrossZig can achieve a high accuracy in error localization (94.3% accuracy) and interference type identification (less than 5% error rate for SINR ranges below 3 dB). Moreover, our system shows consistent performance improvements under interference from various interfering technologies., QC 20160408
- Published
- 2016
- Full Text
- View/download PDF
87. On the Energy Efficiency in Multi-user Multi-relayCoded Network
- Abstract
In this paper, the energy efficiency (EE) of a cooperative diversity system with maximum diversity network coding (MDNC) is studied. In the considered system, channel state information (CSI) is only available at the receivers for all the channels. We formulate the problem of maximizing the EEunder the constraint on the outage probability. The problem is NP-hard due to the non-convexity of the outage probability function and the nonlinear fractional structure of the introducedEE. To solve the optimization problem efficiently, first, the outage probability function is tightly approximated as a log-convex form in the high signal-to-noise ratio (SNR) region. Further, based on the fractional programming, we transform the introduced EEinto a subtractive-form, which is proved to be a convex form. The tradeoff between outage probability and EE is given. The results show that our power allocation (PA) policy can substantially increase the EE. We show that EE can be increased if more relays forward the messages. Additionally, we also investigate the effect of the relay locations on the EE and demonstrate that the increase in the transmission distance in the first hop causes the loss of the EE. The loss can be reduced by our PA policy., QC 20160923
- Published
- 2016
- Full Text
- View/download PDF
88. Lifetime Maximization for Sensor Networks with Wireless Energy Transfer
- Abstract
In Wireless Sensor Networks (WSNs), to supply energy to the sensor nodes, wireless energy transfer (WET) is a promising technique. One of the most efficient procedures to transfer energy to the sensor nodes consists in using a sharp wireless energy beam from the base station to each node at a time. A natural fundamental question is what is the lifetime ensured by WET and how to maximize the network lifetime by scheduling the transmissions of the energy beams. In this paper, such a question is addressed by posing a new lifetime maximization problem for WET enabled WSNs. The binary nature of the energy transmission process introduces a binary constraint in the optimization problem, which makes challenging the investigation of the fundamental properties of WET and the computation of the optimal solution. The sufficient condition for which the WET makes WSNs immortal is established as function of the WET parameters. When such a condition is not met, a solution algorithm to the maximum lifetime problem is proposed. The numerical results show that the lifetime achieved by the proposed algorithm increases by about 50% compared to the case without WET, for a WSN with a small to medium size number of nodes. This suggests that it is desirable to schedule WET to prolong lifetime of WSNs having small or medium network sizes., QC 20170131
- Published
- 2016
- Full Text
- View/download PDF
89. Statistical Delay Bound for WirelessHART Networks
- Abstract
In this paper we provide a performance analysis framework for wireless industrial networks by deriving a service curve and a bound on the delay violation probability. For this purpose we use the (min; ×) stochastic network calculus as well as a recently presented recursive formula for an end-To-end delay bound of wireless heterogeneous networks. The derived results are mapped to WirelessHART networks used in process automation and validated via simulations. In addition to WirelessHART, our results can be applied to any wireless network whose physical layer conforms the IEEE 802.15.4 standard, while itsMAC protocol incorporates channel hopping and TDMA, like e.g. ISA100.11a or TSCHbased networks. The provided delay analysis is especially useful during the network design phase, offering further research potential towards optimal routing and power management in QoS-constrained wireless industrial networks., QC 20160923
- Published
- 2016
- Full Text
- View/download PDF
90. Model-Checking Assisted Protocol Design for Ultra-Reliable Low-Latency Wireless Networks
- Abstract
Recently, the wireless networking community is getting more and more interested in novel protocol designs for safety-critical applications. These new applications come with unprecedented latency and reliability constraints which poses many open challenges. A particularly important one relates to the question how to develop such systems. Traditionally, development of wireless systems has mainly relied on simulations to identify viable architectures. However, in this case the drawbacks of simulations – in particular increasing run-times – rule out its application. Instead, in this paper we propose to use probabilistic model checking, a formal model-based verification technique, to evaluate different system variants during the design phase. Apart from allowing evaluations and therefore design iterations with much smaller periods, probabilistic model checking provides bounds on the reliability of the considered design choices. We demonstrate these salient features with respect to the novel EchoRing protocol, which is a token-based system designed for safety-critical industrial applications. Several mechanisms for dealing with a token loss are modeled and evaluated through probabilistic model checking, showing its potential as suitable evaluation tool for such novel wireless protocols. In particular, we show by probabilistic model checking that wireless tokenpassing systems can benefit tremendously from the considered fault-tolerant methods. The obtained performance guarantees for the different mechanisms even provide reasonable bounds for experimental results obtained from a real-world implementation., QC 20161010
- Published
- 2016
- Full Text
- View/download PDF
91. Throughput Analysis of Proportional Fair Scheduling for Sparse and Ultra-Dense Interference-Limited OFDMA/LTE Networks
- Abstract
Various system tasks, such as interference coordination, handover decisions, admission control, and so on in current cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, LTE cellular systems are interference limited; hence, the way interference is modeled is crucial for the accuracy. In this paper, we present a closed-form analytical model for the throughput expectation of proportional fair scheduling in orthogonal frequency division multiple access/LTE networks. The model takes into account a precise signal-to-interference-and-noise ratio (SINR) distribution as well as considering limitations with respect to modulation and coding, as encountered in LTE networks. Furthermore, the analysis is extended to ultradense deployments likely to happen in the 5th generation of cellular networks. The resulting analytical performance model is validated by means of simulations, considering realistic network deployments. Compared with related work, the model introduced in this paper demonstrates a significantly higher accuracy for mid-term throughput estimation., QCR 20161118
- Published
- 2016
- Full Text
- View/download PDF
92. On the Energy Efficiency in Multi-user Multi-relayCoded Network
- Abstract
In this paper, the energy efficiency (EE) of a cooperative diversity system with maximum diversity network coding (MDNC) is studied. In the considered system, channel state information (CSI) is only available at the receivers for all the channels. We formulate the problem of maximizing the EEunder the constraint on the outage probability. The problem is NP-hard due to the non-convexity of the outage probability function and the nonlinear fractional structure of the introducedEE. To solve the optimization problem efficiently, first, the outage probability function is tightly approximated as a log-convex form in the high signal-to-noise ratio (SNR) region. Further, based on the fractional programming, we transform the introduced EEinto a subtractive-form, which is proved to be a convex form. The tradeoff between outage probability and EE is given. The results show that our power allocation (PA) policy can substantially increase the EE. We show that EE can be increased if more relays forward the messages. Additionally, we also investigate the effect of the relay locations on the EE and demonstrate that the increase in the transmission distance in the first hop causes the loss of the EE. The loss can be reduced by our PA policy., QC 20160923
- Published
- 2016
- Full Text
- View/download PDF
93. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
94. Optimal Transmission with Per-antenna Power Constraints for Multiantenna Bidirectional Broadcast Channels
- Abstract
This paper considers the optimal transmit strategy for multi-antenna bidirectional broadcast channels with per-antenna power constraints. First, an equivalent formulation of the weighted rate sum maximization problem is provided. This allows us to come up with an effective solution to characterize the boundary of the capacity region which relies on the weighted rate sum optimal rate pair. To that end, an iterative algorithm to find the optimal transmit strategy is derived, the convergence to the optimum is proved, and a closed-form solution of the corresponding off-diagonal elements of the optimal transmit strategy is provided. Further, we provide a parametrization of the curved section of the capacity region. Finally, the theoretical results and algorithm performance are illustrated by numerical examples., QC 20160901
- Published
- 2016
- Full Text
- View/download PDF
95. Performance Analysis of Cooperative ARQ Systems for Industrial Wireless Networks
- Abstract
The proliferation of wireless communications has lead to a high interest to establish this technology in industrial settings. The main arguments in favor of wireless are reduced costs in deployment and maintenance, as well as increased flexibility. In contrast to home and office environments, industrial settings include mission-critical machine-to-machine applications, demanding stringent requirements for reliability and latency in the area of 1-10-9 PDR and 1ms, respectively. One way to achieve both is cooperative Automatic Repeat reQuest (ARQ), which leverages spatial diversity. This paper presents a wireless multi-user Time Division Multiple Access system with cooperative ARQ for mission-critical communication. We evaluate two design options analytically, using an outage-capacity model, to investigate whether the relaying of messages should be performed centrally at a multi-antenna AP with perfect Channel State Information (CSI) or decentrally at simultaneously transmitting stations with average CSI. Results indicate that both options are able to achieve the targeted communication guarantees when a certain degree of diversity is implemented, showing a stable system performance even with an increasing number of stations., QC 20160512
- Published
- 2016
- Full Text
- View/download PDF
96. CrossZig : Combating Cros-Technology Interference in Low-Power Wireless Networks
- Abstract
Low-power wireless devices suffer notoriously from Cross- Technology Interference (CTI). To enable co-existence, researchers have proposed a variety of interference mitigation strategies. Existing solutions, however, are designed to work with the limitations of currently available radio chips. In this paper, we investigate how to exploit physical layer properties of 802.15.4 signals to better address CTI. We present CrossZig, a cross-layer solution that takes advantage of physical layer information and processing to improve low-power communication under CTI. To this end, CrossZig utilizes physical layer information to detect presence of CTI in a corrupted packet and to apply an adaptive packet recovery which incorporates a novel cross-layer based packet merging and an adaptive FEC coding. We implement a prototype of CrossZig for the low-power IEEE 802.15.4 in a software-defined radio platform. We show the adaptability and the performance gain of CrossZig through experimental evaluation considering both micro-benchmarking and system performance under various interference patterns. Our results demonstrate that CrossZig can achieve a high accuracy in error localization (94.3% accuracy) and interference type identification (less than 5% error rate for SINR ranges below 3 dB). Moreover, our system shows consistent performance improvements under interference from various interfering technologies., QC 20160408
- Published
- 2016
- Full Text
- View/download PDF
97. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
98. Throughput Analysis of Proportional Fair Scheduling for Sparse and Ultra-Dense Interference-Limited OFDMA/LTE Networks
- Abstract
Various system tasks, such as interference coordination, handover decisions, admission control, and so on in current cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, LTE cellular systems are interference limited; hence, the way interference is modeled is crucial for the accuracy. In this paper, we present a closed-form analytical model for the throughput expectation of proportional fair scheduling in orthogonal frequency division multiple access/LTE networks. The model takes into account a precise signal-to-interference-and-noise ratio (SINR) distribution as well as considering limitations with respect to modulation and coding, as encountered in LTE networks. Furthermore, the analysis is extended to ultradense deployments likely to happen in the 5th generation of cellular networks. The resulting analytical performance model is validated by means of simulations, considering realistic network deployments. Compared with related work, the model introduced in this paper demonstrates a significantly higher accuracy for mid-term throughput estimation., QCR 20161118
- Published
- 2016
- Full Text
- View/download PDF
99. Lifetime Maximization for Sensor Networks with Wireless Energy Transfer
- Abstract
In Wireless Sensor Networks (WSNs), to supply energy to the sensor nodes, wireless energy transfer (WET) is a promising technique. One of the most efficient procedures to transfer energy to the sensor nodes consists in using a sharp wireless energy beam from the base station to each node at a time. A natural fundamental question is what is the lifetime ensured by WET and how to maximize the network lifetime by scheduling the transmissions of the energy beams. In this paper, such a question is addressed by posing a new lifetime maximization problem for WET enabled WSNs. The binary nature of the energy transmission process introduces a binary constraint in the optimization problem, which makes challenging the investigation of the fundamental properties of WET and the computation of the optimal solution. The sufficient condition for which the WET makes WSNs immortal is established as function of the WET parameters. When such a condition is not met, a solution algorithm to the maximum lifetime problem is proposed. The numerical results show that the lifetime achieved by the proposed algorithm increases by about 50% compared to the case without WET, for a WSN with a small to medium size number of nodes. This suggests that it is desirable to schedule WET to prolong lifetime of WSNs having small or medium network sizes., QC 20170131
- Published
- 2016
- Full Text
- View/download PDF
100. Model-Checking Assisted Protocol Design for Ultra-Reliable Low-Latency Wireless Networks
- Abstract
Recently, the wireless networking community is getting more and more interested in novel protocol designs for safety-critical applications. These new applications come with unprecedented latency and reliability constraints which poses many open challenges. A particularly important one relates to the question how to develop such systems. Traditionally, development of wireless systems has mainly relied on simulations to identify viable architectures. However, in this case the drawbacks of simulations – in particular increasing run-times – rule out its application. Instead, in this paper we propose to use probabilistic model checking, a formal model-based verification technique, to evaluate different system variants during the design phase. Apart from allowing evaluations and therefore design iterations with much smaller periods, probabilistic model checking provides bounds on the reliability of the considered design choices. We demonstrate these salient features with respect to the novel EchoRing protocol, which is a token-based system designed for safety-critical industrial applications. Several mechanisms for dealing with a token loss are modeled and evaluated through probabilistic model checking, showing its potential as suitable evaluation tool for such novel wireless protocols. In particular, we show by probabilistic model checking that wireless tokenpassing systems can benefit tremendously from the considered fault-tolerant methods. The obtained performance guarantees for the different mechanisms even provide reasonable bounds for experimental results obtained from a real-world implementation., QC 20161010
- Published
- 2016
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.