• ### Extracting the Most Weighted Throughput in UAV Empowered Wireless Systems With Nonlinear Energy Harvester(1804.10723)

April 28, 2018 cs.IT, math.IT
With the maturity of unmanned aerial vehicle (UAV) technology, this work investigates the integration of UAV into wireless communication systems. Since the UAV is powered by a capacity-limited battery, this work proposes to use the radio energy harvesting technology at the UAV in order to extend the lifetime of UAV empowered base station. To extract the most weighted throughput of UAV empowered wireless systems, the dirty paper coding scheme and information-theoretic uplink-downlink channel duality are exploited to propose an extracting the most weighted throughput algorithm. Numerical results are used to verify the proposed algorithm.
• ### An Edge Computing Empowered Radio Access Network With UAV-Mounted FSO Fronthaul and Backhaul: Key Challenges and Approaches(1803.06381)

March 16, 2018 cs.NI
One promising approach to address the supply-demand mismatch between the terrestrial infrastructure and the temporary and/or unexpected traffic demands is to leverage the unmanned aerial vehicle (UAV) technologies. Motivated by the recent advancement of UAV technologies and retromodulator based free space optical communication, we propose a novel edge-computing empowered radio access network architecture where the fronthaul and backhaul links are mounted on the UAVs for rapid event response and flexible deployment. The implementation of hardware and networking technologies for the proposed architecture are investigated. Due to the limited payload and endurance as well as the high mobility of UAVs, research challenges related to the communication resource management and recent research progress are reported.
• ### Secure Beamforming in Full-Duplex SWIPT Systems With Loopback Self-Interference Cancellation(1801.02609)

Jan. 8, 2018 cs.IT, math.IT, cs.NI
Security is a critical issue in full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems with loopback self-interference cancellation. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a secrecy rate maximization problem under energy transfer rate constraints. Although the secrecy rate maximization problem is non-convex, we solve it via semidefinite relaxation and a two-dimensional search. We prove the optimality of our proposed algorithm and demonstrate its performance via simulations.
• ### Secure Beamforming in Full-Duplex SWIPT Systems(1709.06623)

Sept. 19, 2017 cs.IT, math.IT
Physical layer security is a key issue in the full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, the joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a sum information transmission rate (SITR) maximization problem under information-leakage and energy constraints. In addition, we consider the fairness issue between the uplink and downlink information transmission rates by formulating a \mbox{fairness-aware} SITR-maximization problem. Although the formulated \mbox{SITR-maximization} and \mbox{fairness-aware} \mbox{SITR-maximization} problems are non-convex, we solve them via semidefinite relaxation and one-dimensional search. The optimality of our proposed algorithms is theoretically proved, and the computation complexities are established. Moreover, we propose two suboptimal solutions to the formulated optimization problems. In terms of the SITR-maximization problem, numerical results show that the performance achieved by one of the two suboptimal algorithms is close to the performance of the optimal algorithm with increasing maximum transmission power of the FD-BST.
• ### Dynamic Cross-Layer Beamforming in Hybrid Powered Communication Systems With Harvest-Use-Trade Strategy(1709.06625)

Sept. 19, 2017 cs.IT, math.IT
The application of renewable energy is a promising solution to realize the Green Communications. However, if the cellular systems are solely powered by the renewable energy, the weather dependence of the renewable energy arrival makes the systems unstable. On the other hand, the proliferation of the smart grid facilitates the loads with two-way energy trading capability. Hence, a hybrid powered cellular system, which combines the smart grid with the base stations, can reduce the grid energy expenditure and improve the utilization efficiency of the renewable energy. In this paper, the long-term grid energy expenditure minimization problem is formulated as a stochastic optimization model. By leveraging the stochastic optimization theory, we reformulate the stochastic optimization problem as a \mbox{per-frame} grid energy plus weighted penalized packet rate minimization problem, which is NP-hard. As a result, two suboptimal algorithms, which jointly consider the effects of the channel quality and the packet reception failure, are proposed based on the successive approximation beamforming (SABF) technique and the \mbox{zero-forcing} beamforming (ZFBF) technique. The convergence properties of the proposed suboptimal algorithms are established, and the corresponding computational complexities are analyzed. Simulation results show that the proposed SABF algorithm outperforms the ZFBF algorithm in both grid energy expenditure and packet delay. By tuning a control parameter, the grid energy expenditure can be traded for the packet delay under the proposed stochastic optimization model.
• ### Efficient Multi-Dimensional Mapping Using QAM Constellations for BICM-ID(1701.01167)

Dec. 30, 2016 cs.IT, math.IT
Bit-interleaved coded modulation with iterative decoding (BICM-ID) offers very good error performance over additive white Gaussian noise (AWGN) and fading channels if it uses a wisely designed signal mapping. Further, error performance of BICM-ID can significantly be improved by employing multi-dimensional (MD) modulation. However, suitable MD mappings are obtained by computer search techniques except for MD modulations that use smaller constellation e.g., binary phase shift keying (BPSK), quadrature phase shift keying (QPSK) and $8$-ary phase shift keying ($8$-PSK) as basic modulation. The alphabet size of MD modulations increases exponentially as the order of the basic modulation increases and computer search becomes intractable. In this paper, we propose a systematic mapping method for MD modulations. The innovativeness of our proposed method is that it generates MD mappings using $16$- and $64$-quadrature amplitude modulation (QAM) very efficiently. The presented numerical results show that the proposed method improves bit error rate (BER) of BICM-ID.
• ### Modeling and Analysis of Uplink Non-Orthogonal Multiple Access (NOMA) in Large-Scale Cellular Networks Using Poisson Cluster Processes(1610.06995)

Nov. 10, 2016 cs.IT, math.IT, cs.NI
Non-orthogonal multiple access (NOMA) serves multiple users by superposing their distinct message signals. The desired message signal is decoded at the receiver by applying successive interference cancellation (SIC). Using the theory of Poisson cluster process (PCP), we provide a framework to analyze multi-cell uplink NOMA systems. Specifically, we characterize the rate coverage probability of a NOMA user who is at rank $m$ (in terms of the distance from its serving BS) among all users in a cell and the mean rate coverage probability of all users in a cell. Since the signal-to-interference-plus-noise ratio (SINR) of $m$-th user relies on efficient SIC, we consider three scenarios, i.e., perfect SIC (in which the signals of $m-1$ interferers who are stronger than $m$-th user are decoded successfully), imperfect SIC (in which the signals of of $m-1$ interferers who are stronger than $m$-th user may or may not be decoded successfully), and imperfect worst case SIC (in which the decoding of the signal of $m$-th user is always unsuccessful whenever the decoding of its relative $m-1$ stronger users is unsuccessful). The derived expressions are customized to capture the performance of a user at rank $m$ in an equivalent orthogonal multiple access (OMA) system. Finally, numerical results are presented to validate the derived expressions.
• ### Non-Orthogonal Multiple Access (NOMA) in Cellular Uplink and Downlink: Challenges and Enabling Techniques(1608.05783)

Aug. 20, 2016 cs.IT, math.IT, cs.NI
By combining the concepts of superposition coding at the transmitter(s) and successive interference cancellation (SIC) at the receiver(s), non-orthogonal multiple access (NOMA) has recently emerged as a promising multiple access technique for 5G wireless technology. In this article, we first discuss the fundamentals of uplink and downlink NOMA transmissions and outline their key distinctions (in terms of implementation complexity, detection and decoding at the SIC receiver(s), incurred intra-cell and inter-cell interferences). Later, for both downlink and uplink NOMA, we theoretically derive the NOMA dominant condition for each individual user in a two-user NOMA cluster. NOMA dominant condition refers to the condition under which the spectral efficiency gains of NOMA are guaranteed compared to conventional orthogonal multiple access (OMA). The derived conditions provide direct insights on selecting appropriate users in two-user NOMA clusters. The conditions are distinct for uplink and downlink as well as for each individual user. Numerical results show the significance of the derived conditions for the user selection in uplink/downlink NOMA clusters and provide a comparison to the random user selection. A brief overview of the recent research investigations is then provided to highlight the existing research gaps. Finally, we discuss the potential applications and key challenges of NOMA transmissions.
• ### Fronthauling for 5G LTE-U Ultra Dense Cloud Small Cell Networks(1607.07015)

July 24, 2016 cs.IT, math.IT
Ultra dense cloud small cell network (UDCSNet), which combines cloud computing and massive deployment of small cells, is a promising technology for the fifth-generation (5G) LTE-U mobile communications because it can accommodate the anticipated explosive growth of mobile users' data traffic. As a result, fronthauling becomes a challenging problem in 5G LTE-U UDCSNet. In this article, we present an overview of the challenges and requirements of the fronthaul technology in 5G \mbox{LTE-U} UDCSNets. We survey the advantages and challenges for various candidate fronthaul technologies such as optical fiber, millimeter-wave based unlicensed spectrum, Wi-Fi based unlicensed spectrum, sub 6GHz based licensed spectrum, and free-space optical based unlicensed spectrum.
• ### Cellular Downlink Performance with Base Station Sleeping, User Association, and Scheduling(1401.7088)

Jan. 28, 2014 cs.IT, math.IT, cs.NI, stat.AP
Base station (BS) sleeping has emerged as a viable solution to enhance the overall network energy efficiency by inactivating the underutilized BSs. However, it affects the performance of users in sleeping cells depending on their BS association criteria, their channel conditions towards the active BSs, and scheduling criteria and traffic loads at the active BSs. This paper characterizes the performance of cellular systems with BS sleeping by developing a systematic framework to derive the spectral efficiency and outage probability of downlink transmission to the sleeping cell users taking into account the aforementioned factors. In this context, we develop a user association scheme in which a typical user in a sleeping cell selects a BS with \textbf{M}aximum best-case \textbf{M}ean channel \textbf{A}ccess \textbf{P}robability (MMAP) which is calculated by all active BSs based on their existing traffic loads. We consider both greedy and round-robin schemes at active BSs for scheduling users in a channel. Once the association is performed, the exact access probability for a typical sleeping cell user and the statistics of its received signal and interference powers are derived to evaluate the spectral and energy efficiencies of transmission. For the sleeping cell users, we also consider the conventional \textbf{M}aximum \textbf{R}eceived \textbf{S}ignal \textbf{P}ower (MRSP)-based user association scheme along with greedy and round-robin schemes at the BSs. The impact of cell-zooming is incorporated in the derivations to analyze its feasibility in reducing the coverage holes created by BS sleeping. Numerical results show the trade-offs between spectral efficiency and energy efficiency in various network scenarios. The accuracy of the analysis is verified through Monte-Carlo simulations.
• ### Towards Fully Optimized BICM Transceivers(1012.1799)

Dec. 8, 2010 cs.IT, math.IT
Bit-interleaved coded modulation (BICM) transceivers often use equally spaced constellations and a random interleaver. In this paper, we propose a new BICM design, which considers hierarchical (nonequally spaced) constellations, a bit-level multiplexer, and multiple interleavers. It is shown that this new scheme increases the degrees of freedom that can be exploited in order to improve its performance. Analytical bounds on the bit error rate (BER) of the system in terms of the constellation parameters and the multiplexing rules are developed for the additive white Gaussian Noise (AWGN) and Nakagami-$m$ fading channels. These bounds are then used to design the BICM transceiver. Numerical results show that, compared to conventional BICM designs, and for a target BER of $10^{-6}$, gains up to 3 dB in the AWGN channel are obtained. For fading channels, the gains depend on the fading parameter, and reach 2 dB for a target BER of $10^{-7}$ and $m=5$.