• ### 3D Placement of an Unmanned Aerial Vehicle Base Station for Maximum Coverage of Users with Different QoS Requirements(1709.05235)

Sept. 15, 2017 cs.IT, math.IT
The need for a rapid-to-deploy solution for providing wireless cellular services can be realized by unmanned aerial vehicle base stations (UAV-BSs). To the best of our knowledge, this letter is the first in literature that studies a novel 3D UAV-BS placement that maximizes the number of covered users with different Quality-of-Service requirements. We model the placement problem as a multiple circles placement problem and propose an optimal placement algorithm that utilizes an exhaustive search (ES) over a one-dimensional parameter in a closed region. We also propose a low-complexity algorithm, namely, maximal weighted area (MWA) algorithm to tackle the placement problem. Numerical simulations are presented showing that the MWA algorithm performs very close to the ES algorithm with a significant complexity reduction.
• ### 3D Placement of an Unmanned Aerial Vehicle Base Station (UAV-BS) for Energy-Efficient Maximal Coverage(1705.03415)

May 9, 2017 cs.IT, math.IT
Unmanned Aerial Vehicle mounted base stations (UAV-BSs) can provide wireless services in a variety of scenarios. In this letter, we propose an optimal placement algorithm for UAV-BSs that maximizes the number of covered users using the minimum transmit power. We decouple the UAV-BS deployment problem in the vertical and horizontal dimensions without any loss of optimality. Furthermore, we model the UAV-BS deployment in the horizontal dimension as a circle placement problem and a smallest enclosing circle problem. Simulations are conducted to evaluate the performance of the proposed method for different spatial distributions of the users.
• ### Degrees of Freedom in Cached MIMO Relay Networks With Multiple Base Stations(1702.05528)

Feb. 17, 2017 cs.IT, math.IT
The ability of physical layer relay caching to increase the degrees of freedom (DoF) of a single cell was recently illustrated. In this paper, we extend this result to the case of multiple cells in which a caching relay is shared among multiple non-cooperative base stations (BSs). In particular, we show that a large DoF gain can be achieved by exploiting the benefits of having a shared relay that cooperates with the BSs. We first propose a cache-assisted relaying protocol that improves the cooperation opportunity between the BSs and the relay. Next, we consider the cache content placement problem that aims to design the cache content at the relay such that the DoF gain is maximized. We propose an optimal algorithm and a near-optimal low-complexity algorithm for the cache content placement problem. Simulation results show significant improvement in the DoF gain using the proposed relay-caching protocol.
• ### Optimal Beamforming for MIMO Shared Relaying in Downlink Cellular Networks with ARQ(1610.03089)

Oct. 10, 2016 cs.IT, math.IT
In this paper, we study the performance of the downlink of a cellular network with automatic repeat-request (ARQ) and a half duplex decode-and-forward shared relay. In this system, two multiple-input-multiple-output (MIMO) base stations serve two single antenna users. A MIMO shared relay retransmits the lost packets to the target users. First, we study the system with direct retransmission from the base station and derive a closed form expression for the outage probability of the system.We show that the direct retransmission can overcome the fading, however, it cannot overcome the interference. After that, we invoke the shared relay and design the relay beamforming matrices such that the signal-to-interference-and-noise ratio (SINR) is improved at the users subject to power constraints on the relay. In the case when the transmission of only one user fails, we derive a closed form solution for the relay beamformers. On the other hand when both transmissions fail, we pose the beamforming problem as a sequence of non-convex feasibility problems. We use semidefinite relaxation (SDR) to convert each feasibility problem into a convex optimization problem. We ensure a rank one solution, and hence, there is no loss of optimality in SDR. Simulation results are presented showing the superior performance of the proposed relay beamforming strategy compared to direct ARQ system in terms of the outage probability.
• ### Optimal Energy Allocation For Delay-Constrained Traffic Over Fading Multiple Access Channels(1607.00711)

Sept. 13, 2016 cs.IT, math.IT
In this paper, we consider a multiple-access fading channel where $N$ users transmit to a single base station (BS) within a limited number of time slots. We assume that each user has a fixed amount of energy available to be consumed over the transmission window. We derive the optimal energy allocation policy for each user that maximizes the total system throughput under two different assumptions on the channel state information. First, we consider the offline allocation problem where the channel states are known a priori before transmission. We solve a convex optimization problem to maximize the sum-throughput under energy and delay constraints. Next, we consider the online allocation problem, where the channels are causally known to the BS and obtain the optimal energy allocation via dynamic programming when the number of users is small. We also develop a suboptimal resource allocation algorithm whose performance is close to the optimal one. Numerical results are presented showing the superiority of the proposed algorithms over baseline algorithms in various scenarios.
• ### Asymmetric Degrees of Freedom of the Full-Duplex MIMO 3-Way Channel with Unicast and Broadcast Messages(1608.00209)

July 31, 2016 cs.IT, math.IT
In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two message configurations; the first configuration is when each node has two unicast messages to be delivered to the two other nodes, while the second configuration is when each node has two unicast messages as well as one broadcast message to be delivered to the two other nodes. For each configuration, we first derive upper bounds on the total DoF of the system. Cut-set bounds in conjunction with genie-aided bounds are derived to characterize the achievable total DoF. Afterwards, we analytically derive the optimal number of transmit and receive antennas at each node to maximize the total DoF of the system, subject to the total number of antennas at each node. Finally, the achievable schemes for each configuration are constructed. The proposed schemes are mainly based on zero-forcing and null-space transmit beamforming.
• ### Proactive Location-Based Scheduling of Delay-Constrained Traffic Over Fading Channels(1607.00329)

July 1, 2016 cs.IT, math.IT
In this paper, proactive resource allocation based on user location for point-to-point communication over fading channels is introduced, whereby the source must transmit a packet when the user requests it within a deadline of a single time slot. We introduce a prediction model in which the source predicts the request arrival $T_p$ slots ahead, where $T_p$ denotes the prediction window (PW) size. The source allocates energy to transmit some bits proactively for each time slot of the PW with the objective of reducing the transmission energy over the non-predictive case. The requests are predicted based on the user location utilizing the prior statistics about the user requests at each location. We also assume that the prediction is not perfect. We propose proactive scheduling policies to minimize the expected energy consumption required to transmit the requested packets under two different assumptions on the channel state information at the source. In the first scenario, offline scheduling, we assume the channel states are known a-priori at the source at the beginning of the PW. In the second scenario, online scheduling, it is assumed that the source has causal knowledge of the channel state. Numerical results are presented showing the gains achieved by using proactive scheduling policies compared with classical (reactive) networks. Simulation results also show that increasing the PW size leads to a significant reduction in the consumed transmission energy even with imperfect prediction.
• ### On the Degrees of Freedom of SISO X-networks with Synergistic Alternating Channel State Information at transmitters(1605.07069)

May 23, 2016 cs.IT, math.IT
In this paper, we consider the two-user single-input single-output (SISO) X-channel and $K$-user SISO X-network in fast fading environment. It is assumed that the transmitters have access to synergistic alternating channel state information (CSI). Specifically, the CSIT alternates between three states, namely, perfect, delayed and no-CSIT, in a certain manner to enable these states to work together cooperatively. These states are associated with fractions of time denoted by $\lambda_P$, $\lambda_D$ \text{and} $\lambda_N$, respectively. For the two-user $X$-channel, simple upper bound is developed to prove the tightness of the achievability result of $4/3$ DoF under a certain distribution of the availability of three CSIT states for $\Lambda(\lambda_P=1/3, \lambda_D= 1/3, \lambda_N=1/3)$. For the $K$-user $X$-network, it is shown that the sum Degrees of freedom (DoF) is at least $2K/(K + 1)$, using two-phase transmission schemes over finite symbols channel extension and under the same distribution of the availability of $\Lambda(\lambda_P=1/3, \lambda_D= 1/3, \lambda_N=1/3)$.This achievability result, can be considered as a tight lower bound, coincides with the best lower bound known for the same network but with partial output feedback in stead of alternating CSIT. Hence, we show that the role of synergistic alternating CSIT with distribution $\Lambda(1/3,1/3,1/3)$ is equivalent to the partial output feedback. Also, this lower bound is strictly better than the best lower bound known for the case of delayed CSI assumption for all values of $K$. All the proposed transmission schemes are based on two phases transmission strategy, namely, interference creation and interference resurrection, which exploit the synergy of instantaneous CSI and delay CSIT to retrospectively align interference in the subsequent channel uses.
• ### Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alternating CSIT via Interference Creation-Resurrection(1605.02928)

May 10, 2016 cs.IT, math.IT
Channel state information at the transmitter affects the degrees of freedom of the wireless networks. In this paper, we analyze the DoF for the K-user multiple-input single-output (MISO) broadcast channel (BC) with synergistic alternating channel state information at the transmitter (CSIT). Specifically, the CSIT of each user alternates between three states, namely, perfect CSIT (P), delayed CSIT (D) and no CSIT (N) among different time slots. For the K-user MISO BC, we show that the total achievable degrees of freedom (DoF) are given by $\frac{K^{2}}{2K-1}$ through utilizing the synergistic benefits of CSIT patterns. We compare the achievable DoF with results reported previously in the literature in the case of delayed CSIT and hybrid CSIT models.
• ### On Optimizing Cooperative Cognitive User Performance under Primary QoS Constraints(1603.09530)

March 31, 2016 cs.NI
We study the problem of optimizing the performance of cognitive radio users with opportunistic real-time applications subject to primary users quality-of-service (QoS) constraints. Two constrained optimization problems are formulated; the first problem is maximizing the secondary user throughput while the second problem is minimizing the secondary user average delay, subject to a common constraint on the primary user average delay. In spite of the complexity of the optimization problems, due to their non-convexity, we transform the first problem into a set of linear programs and the second problem into a set of quasiconvex optimization problems. We prove that both problems are equivalent with identical feasible sets and optimal solutions. We show, through numerical results, that the proposed cooperation policy represents the best compromise between enhancing the secondary users QoS and satisfying the primary users QoS requirements.
• ### Efficient 3-D Placement of an Aerial Base Station in Next Generation Cellular Networks(1603.00300)

Feb. 26, 2016 cs.NI, math.OC
Agility and resilience requirements of future cellular networks may not be fully satisfied by terrestrial base stations in cases of unexpected or temporary events. A promising solution is assisting the cellular network via low-altitude unmanned aerial vehicles equipped with base stations, i.e., drone-cells. Although drone-cells provide a quick deployment opportunity as aerial base stations, efficient placement becomes one of the key issues. In addition to mobility of the drone-cells in the vertical dimension as well as the horizontal dimension, the differences between the air-to-ground and terrestrial channels cause the placement of the drone-cells to diverge from placement of terrestrial base stations. In this paper, we first highlight the properties of the dronecell placement problem, and formulate it as a 3-D placement problem with the objective of maximizing the revenue of the network. After some mathematical manipulations, we formulate an equivalent quadratically-constrained mixed integer non-linear optimization problem and propose a computationally efficient numerical solution for this problem. We verify our analytical derivations with numerical simulations and enrich them with discussions which could serve as guidelines for researchers, mobile network operators, and policy makers.
• ### Interactive Multiple Model Estimation of Doubly-Selective Channels for OFDM systems(1602.01038)

Feb. 2, 2016 cs.IT, math.IT
In this paper, we propose an algorithm for channel estimation, acquisition and tracking, for orthogonal frequency division multiplexing (OFDM) systems. The proposed algorithm is suitable for vehicular communications that encounter very high mobility. A preamble sequence is used to derive an initial estimate of the channel using least squares (LS). The temporal variation of the channel within one OFDM symbol is approximated by two complex exponential basis expansion models (CE-BEM). One of the Fourier-based BEMs is intended to capture the low frequencies in the channel (slow variations corresponding to low Doppler), while the other is destined to capture high frequencies (fast variations corresponding to high Doppler). Kalman filtering is employed to track the BEM coefficients iteratively on an OFDM symbol-by-symbol basis. An interactive multiple model (IMM) estimator is implemented to dynamically mix the estimates obtained by the two Kalman filters, each of which matched to one of the BEMs. Extensive numerical simulations are conducted to signify the gain obtained by the proposed combining technique.
• ### Achievable Degrees of Freedom on K-user MIMO Multi-way Relay Channel with Common and Private Messages(1510.00359)

Oct. 15, 2015 cs.IT, math.IT
This paper investigates the achievable total degrees of freedom (DoF) of the MIMO multi-way relay channel that consists of K users, where each user is equipped with M antennas, and a decode-and-forward relay equipped with N antennas. In this channel, each user wants to convey K-1 private messages to the other users in addition to a common message to all of them. Due to the absence of direct links between the users, communication occurs through the relay in two phases; a multiple access channel phase (MAC) and a broadcast (BC) phase. We drive cut-set bounds on the total DoF of the network, and show that the network has DoF less than or equal to K min(N,M). Achievability of the upper bound is shown by using signal space alignment for network coding in the MAC phase, and zero-forcing precoding in the BC phase. We show that introducing the common messages besides the private messages leads to achieving higher total DoF than using the private messages only.
• ### Sensing/Decision-Based Cooperative Relaying Schemes With Multi-Access Transmission: Stability Region And Average Delay Characterization(1506.08895)

June 29, 2015 cs.IT, math.IT
We consider a cooperative relaying system which consists of a number of source terminals, one shared relay, and a common destination with multi-packet reception (MPR) capability. In this paper, we study the stability and delay analysis for two cooperative relaying schemes; the sensing-based cooperative (SBC) scheme and the decision-based cooperative (DBC) scheme. In the SBC scheme, the relay senses the channel at the beginning of each time slot. In the idle time slots, the relay transmits the packet at the head of its queue, while in the busy one, the relay decides either to transmit simultaneously with the source terminal or to listen to the source transmission. The SBC scheme is a novel paradigm that utilizes the spectrum more efficiently than the other cooperative schemes because the relay not only exploits the idle time slots, but also has the capability to mildly interfere with the source terminal. On the other hand, in the DBC scheme, the relay does not sense the channel and it decides either to transmit or to listen according to certain probabilities. Numerical results reveal that the two proposed schemes outperform existing cooperative schemes that restrict the relay to send only in the idle time slots. Moreover, we show how the MPR capability at the destination can compensate for the sensing need at the relay, i.e., the DBC scheme achieves almost the same stability region as that of the SBC scheme. Furthermore, we derive the condition under which the two proposed schemes achieve the same maximum stable throughput.
• ### A Probabilistic MAC for Cognitive Radio Systems with Energy Harvesting Nodes(1408.2779)

Oct. 29, 2014 cs.IT, math.IT, cs.NI
In this paper, we consider a cognitive radio (CR) system where the secondary user (SU) harvests energy from both the nature resources and the primary user (PU) radio frequency(RF) signal. We propose an energy-based probabilistic access scheme in which SU probabilistically accesses and senses the primary channel. The decision is based on the available energy and the PU's activity. We investigate the problem of maximizing the SU's success rate provided that the PU average quality of service (QoS) constraint is satisfied. We also assume multi-packet reception (MPR) capability and sensing errors under a Rayleigh fading channel. Numerical results show the effectiveness of the proposed probabilistic access scheme.
• ### On the Stable Throughput of Cooperative Cognitive Radio Networks with Finite Relaying Buffer(1410.2419)

Oct. 9, 2014 cs.NI
In this paper, we study the problem of cooperative communications in cognitive radio systems where the secondary user has limited relaying room for the overheard primary packets. More specifically, we characterize the stable throughput region of a cognitive radio network with a finite relaying buffer at the secondary user. Towards this objective, we formulate a constrained optimization problem for maximizing the secondary user throughput while guaranteeing the stability of the primary user queue. We consider a general cooperation policy where the packet admission and queue selection probabilities, at the secondary user, are both dependent on the state (length) of the finite relaying buffer. Despite the sheer complexity of the optimization problem, attributed to its non-convexity, we transform it to a linear program. Our numerical results reveal a number of valuable insights, e.g., it is always mutually beneficial to cooperate in delivering the primary packets in terms of expanding the stable throughput region. In addition, the stable throughput region of the system, compared to the case of infinite relaying queue capacity, marginally shrinks for limited relaying queue capacity.
• ### On the Degrees of Freedom of SISO X-Channel with Alternating CSIT(1407.8348)

July 31, 2014 cs.IT, math.IT
In this paper, we establish the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel with alternating channel state information at the transmitters (CSIT). Three cases are considered for the availability of CSIT; perfect, delayed and no-CSIT. Each state is associated with a fraction of time denoted by $\lambda_P, \lambda_D$ and $\lambda_N$, respectively. We provide new results for DoF of the two-user SISO X-channel when the available CSIT alternates between these three cases under a certain distribution $\Lambda(\lambda_P, \lambda_D, \lambda_N )$. Specifically, we show that the X-channel with alternating CSIT for $\Lambda(1/8, 3/8, 1/2)$ can achieve $5/4$ DoF. The interesting thing about $5/4$ is that it represents a position of compromise or a middle ground between the channel knowledge that transmitters need to steer interference and the degrees of freedom that the network can achieve. Moreover, $5/4$ is strictly greater than $6/5$ which is the upper bound for the X-channel with \textit{fixed} delayed CSIT.
• ### On the Coexistence of a Primary User with an Energy Harvesting Secondary User: A Case of Cognitive Cooperation(1307.4744)

July 28, 2014 cs.IT, math.IT, cs.NI
In this paper, we consider a cognitive scenario where an energy harvesting secondary user (SU) shares the spectrum with a primary user (PU). The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues; a queue for storing its own packets and the other for storing the fraction of the undelivered primary packets accepted for relaying. The secondary source is assumed to be a battery-based node which harvests energy packets from the environment. In addition to its data queues, the SU has an energy queue to store the harvested energy packets. The secondary energy packets are used for primary packets decoding and data packets transmission. More specifically, if the secondary energy queue is empty, the secondary source can neither help the primary source nor transmit a packet from the data queues. The energy queue is modeled as a discrete time queue with Markov arrival and service processes. Due to the interaction of the queues, we provide inner and outer bounds on the stability region of the proposed system. We investigate the impact of the energy arrival rate on the stability region. Numerical results show the significant gain of cooperation.
• ### The asymmetric DoF Region for the 3-user MxN Interference Channel(1407.2981)

July 10, 2014 cs.IT, math.IT
In this paper, the 3-user Gaussian MIMO interference channel is considered. The asymmetric distribution of the DoF, where different users have different number of DoF, is studied. Two cases are presented, the first is when all transmitters and receivers have equal number of antennas $M$, the other when the transmitters have $M$ antennas each, while the receivers have $N$ antennas each. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. The region of the achievable DoF tuple $(d_1; d_2; d_3)$ is presented.
• ### Energy-Efficient Cooperative Cognitive Relaying Protocols for Full-Duplex Cognitive Radio Users and Delay-Aware Primary Users(1406.2255)

July 8, 2014 cs.IT, math.IT, cs.NI
This paper considers a network in which a primary user (PU) may cooperate with a cognitive radio (CR) user for transmission of its data packets. The PU is assumed to be a buffered terminal operating in a time-slotted fashion. We develop two protocols which involve cooperation between primary and secondary users. To satisfy certain quality of service requirements, users share time slot duration and frequency bandwidth. Moreover, the secondary user (SU) may leverage the primary feedback signal. The proposed protocols are designed such that the secondary rate is maximized and the primary queueing delay is maintained less than the queueing delay in case of non-cooperative PU. In addition, the proposed protocols guarantee the stability of the primary queue and maintain the average energy emitted by the CR user below a certain value. The proposed protocols also provide more robust and potentially continuous service for SUs compared to the conventional practice in cognitive networks where SUs transmit in the spectrum holes and silence sessions of the PUs. We include primary source burstiness, sensing errors, and feedback reception errors to the analysis of the proposed cooperative cognitive protocols. Numerical results show the beneficial gains of the cooperative protocols in terms of secondary rate and primary throughput, queueing delay, and average energy savings.
• ### Maximum Secondary Stable Throughput of a Cooperative Secondary Transmitter-Receiver Pair: Protocol Design and Stability Analysis(1206.6302)

June 9, 2014 cs.IT, math.IT, cs.NI
In this paper, we investigate the impact of cooperation between a secondary transmitter-receiver pair and a primary transmitter (PT) on the maximum stable throughput of the primary-secondary network. Each transmitter, primary or secondary, has a buffer for storing its own traffic. In addition to its own buffer, the secondary transmitter (ST) has a buffer for storing a fraction of the undelivered primary packets due to channel impairments. Moreover, the secondary destination has a relaying queue for storing a fraction of the undelivered primary packets. In the proposed cooperative system, the ST and the secondary destination increase the spectrum availability for the secondary packets by relaying the unsuccessfully transmitted packets of the PT. We consider two multiple access strategies to be used by the ST and the secondary destination to utilize the silence sessions of the PT. Numerical results demonstrate the gains of the proposed cooperative system over the non-cooperation case.
• ### A DoF-Optimal Scheme for the two-user X-channel with Synergistic Alternating CSIT(1404.6348)

April 25, 2014 cs.IT, math.IT
In this paper, the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel are investigated. Three cases are considered for the availability of channel state information at the transmitters (CSIT); perfect, delayed, and no-CSIT. A new achievable scheme is proposed to elucidate the potency of interference creation-resurrection (IRC) when the available CSIT alternates between these three cases. For some patterns of alternating CSIT, the proposed scheme achieves $4/3$ DoF, and hence, coincides with the information theoretic upper bound on the DoF of the two-user X-channel with perfect and instantaneous CSIT. The CSIT alternation patterns are investigated where the patterns that provide extraordinary synergistic gain and dissociative ones are identified.
• ### Coverage Probability Analysis for Wireless Networks Using Repulsive Point Processes(1309.3597)

Sept. 13, 2013 cs.NI
The recent witnessed evolution of cellular networks from a carefully planned deployment to more irregular, heterogeneous deployments of Macro, Pico and Femto-BSs motivates new analysis and design approaches. In this paper, we analyze the coverage probability in cellular networks assuming repulsive point processes for the base station deployment. In particular, we characterize, analytically using stochastic geometry, the downlink probability of coverage under a Matern hardcore point process to ensure minimum distance between the randomly located base stations. Assuming a mobile user connects to the nearest base station and Rayleigh fading, we derive two lower bounds expressions on the downlink probability of coverage that is within 4% from the simulated scenario. To validate our model, we compare the probability of coverage of the Matern hardcore topology against an actual base station deployment obtained from a public database. The comparison shows that the actual base station deployment can be fitted by setting the appropriate Matern point process density.
• ### A New Achievable DoF Region for the 3-user MxN Symmetric Interference Channel(1105.4026)

May 20, 2011 cs.IT, math.IT
In this paper, the 3-user multiple-input multiple-output Gaussian interference channel with M antennas at each transmitter and N antennas at each receiver is considered. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. A novel scheme is presented that spans a new achievable degrees of freedom region. For some values of M and N, the proposed scheme achieve higher number of DoF than are currently achievable, while for other values it meets the best known upperbound. Simulation results are presented showing the superior performance of the proposed schemes to earlier approaches.
• ### Power Control for Maximum Throughput in Spectrum Underlay Cognitive Radio Networks(1002.1584)

Feb. 8, 2010 cs.IT, math.IT, cs.NI, math.OC
We investigate power allocation for users in a spectrum underlay cognitive network. Our objective is to find a power control scheme that allocates transmit power for both primary and secondary users so that the overall network throughput is maximized while maintaining the quality of service (QoS) of the primary users greater than a certain minimum limit. Since an optimum solution to our problem is computationally intractable, as the optimization problem is non-convex, we propose an iterative algorithm based on sequential geometric programming, that is proved to converge to at least a local optimum solution. We use the proposed algorithm to show how a spectrum underlay network would achieve higher throughput with secondary users operation than with primary users operating alone. Also, we show via simulations that the loss in primary throughput due to the admission of the secondary users is accompanied by a reduction in the total primary transmit power.