• ### Next Generation Backscatter Communication: Systems, Techniques and Applications(1701.07588)

March 27, 2019 cs.IT, math.IT
The rapid growth of IoT driven by recent advancements in consumer electronics, 5G communication technologies, and cloud-computing enabled big-data analytics, has recently attracted tremendous attention from both the industry and academia. One of the major open challenges for IoT is the limited network lifetime due to massive IoT devices being powered by batteries with finite capacities. The low-power and low-complexity backscatter communications (BackCom), which simply relies on passive reflection and modulation of an incident radio-frequency (RF) wave, has emerged to be a promising technology for tackling this challenge. However, the contemporary BackCom has several major limitations, such as short transmission range, low data rate, and uni-directional information transmission. The article aims at introducing the recent advances in the active area of BackCom. Specifically, we provide a systematic introduction of the next generation BackCom covering basic principles, systems, techniques besides IoT applications. Lastly, we describe the IoT application scenarios with the next generation BackCom.
• ### Optimal Compression and Transmission Rate Control for Node-Lifetime Maximization(1803.08650)

April 8, 2018 cs.IT, math.IT
We consider a system that is composed of an energy constrained sensor node and a sink node, and devise optimal data compression and transmission policies with an objective to prolong the lifetime of the sensor node. While applying compression before transmission reduces the energy consumption of transmitting the sensed data, blindly applying too much compression may even exceed the cost of transmitting raw data, thereby losing its purpose. Hence, it is important to investigate the trade-off between data compression and transmission energy costs. In this paper, we study the joint optimal compression-transmission design in three scenarios which differ in terms of the available channel information at the sensor node, and cover a wide range of practical situations. We formulate and solve joint optimization problems aiming to maximize the lifetime of the sensor node whilst satisfying specific delay and bit error rate (BER) constraints. Our results show that a jointly optimized compression-transmission policy achieves significantly longer lifetime (90% to 2000%) as compared to optimizing transmission only without compression. Importantly, this performance advantage is most profound when the delay constraint is stringent, which demonstrates its suitability for low latency communication in future wireless networks.
• ### Uplink Coverage Performance of an Underlay Drone Cell for Temporary Events(1801.05948)

March 6, 2018 cs.IT, math.IT
Using a drone as an aerial base station (ABS) to provide coverage to users on the ground is envisaged as a promising solution for beyond fifth generation (beyond-5G) wireless networks. While the literature to date has examined downlink cellular networks with ABSs, we consider an uplink cellular network with an ABS. Specifically, we analyze the use of an underlay ABS to provide coverage for a temporary event, such as a sporting event or a concert in a stadium. Using stochastic geometry, we derive the analytical expressions for the uplink coverage probability of the terrestrial base station (TBS) and the ABS. The results are expressed in terms of (i) the Laplace transforms of the interference power distribution at the TBS and the ABS and (ii) the distance distribution between the ABS and an independently and uniformly distributed (i.u.d.) ABS-supported user equipment and between the ABS and an i.u.d. TBS-supported user equipment. The accuracy of the analytical results is verified by Monte Carlo simulations. Our results show that varying the ABS height leads to a trade-off between the uplink coverage probability of the TBS and the ABS. In addition, assuming a quality of service of 90% at the TBS, an uplink coverage probability of the ABS of over 85% can be achieved, with the ABS deployed at or below its optimal height of typically between 250-500 m for the considered setup.
• ### Power Beacon-Assisted Millimeter Wave Ad Hoc Networks(1703.06611)

Sept. 6, 2017 cs.IT, math.IT
Deployment of low cost power beacons (PBs) is a promising solution for dedicated wireless power transfer (WPT) in future wireless networks. In this paper, we present a tractable model for PB-assisted millimeter wave (mmWave) wireless ad hoc networks, where each transmitter (TX) harvests energy from all PBs and then uses the harvested energy to transmit information to its desired receiver. Our model accounts for realistic aspects of WPT and mmWave transmissions, such as power circuit activation threshold, allowed maximum harvested power, maximum transmit power, beamforming and blockage. Using stochastic geometry, we obtain the Laplace transform of the aggregate received power at the TX to calculate the power coverage probability. We approximate and discretize the transmit power of each TX into a finite number of discrete power levels in log scale to compute the channel and total coverage probability. We compare our analytical predictions to simulations and observe good accuracy. The proposed model allows insights into effect of system parameters, such as transmit power of PBs, PB density, main lobe beam-width and power circuit activation threshold on the overall coverage probability. The results confirm that it is feasible and safe to power TXs in a mmWave ad hoc network using PBs.
• ### Joint Optimization of User Association, Data Delivery Rate and Precoding for Cache-Enabled F-RANs(1706.10203)

June 30, 2017 cs.IT, math.IT
This paper considers the downlink of a cache-enabled fog radio access network (F-RAN) with limited fronthaul capacity, where user association (UA), data delivery rate (DDR) and signal precoding are jointly optimized. We formulate a mixed-integer nonlinear programming problem in which the weighted difference of network throughput and total power consumption is maximized, subject to the predefined DDR requirements and the maximum transmit power at each eRRH. To address this challenging problem, we first apply the l0-norm approximation and l1-norm minimization techniques to deal with the UA. After this key step, we arrive at an approximated problem that only involves the joint optimization of DDR and precoding. By using the alternating descent method, we further decompose this problem into a convex subproblem for DDR allocation and a nonconvex subproblem for precoding design. While the former is globally solved by the interior-point method, the latter is solved by a specifically tailored successive convex quadratic programming method. Finally, we propose an iterative algorithm for the original joint optimization that is guaranteed to converge. Importantly, each iteration of the developed algorithm only involves solving simple convex problems. Numerical examples demonstrate that the proposed design significantly improves both throughput and power performances, especially in practical F-RANs with limited fronthaul capacity. Compared to the sole precoder design for a given cache placement, our joint design is shown to improve the throughput by 50% while saving at least half of the total power consumption in the considered examples.
• ### A Novel Receiver Design with Joint Coherent and Non-Coherent Processing(1704.05614)

April 19, 2017 cs.IT, math.IT
In this paper, we propose a novel splitting receiver, which involves joint processing of coherently and non-coherently received signals. Using a passive RF power splitter, the received signal at each receiver antenna is split into two streams which are then processed by a conventional coherent detection (CD) circuit and a power-detection (PD) circuit, respectively. The streams of the signals from all the receiver antennas are then jointly used for information detection. We show that the splitting receiver creates a three-dimensional received signal space, due to the joint coherent and non-coherent processing. We analyze the achievable rate of a splitting receiver, which shows that the splitting receiver provides a rate gain of $3/2$ compared to either the conventional (CD-based) coherent receiver or the PD-based non-coherent receiver in the high SNR regime. We also analyze the symbol error rate (SER) for practical modulation schemes, which shows that the splitting receiver achieves asymptotic SER reduction by a factor of at least $\sqrt{M}-1$ for $M$-QAM compared to either the conventional (CD-based) coherent receiver or the PD-based non-coherent receiver.
• ### Full-Duplex Backscatter Interference Networks Based on Time-Hopping Spread Spectrum(1609.00062)

April 19, 2017 cs.IT, math.IT
Future Internet-of-Things (IoT) is expected to wirelessly connect billions of low-complexity devices. For wireless information transfer (WIT) in IoT, high density of IoT devices and their ad hoc communication result in strong interference which acts as a bottleneck on WIT. Furthermore, battery replacement for the massive number of IoT devices is difficult if not infeasible, making wireless energy transfer (WET) desirable. This motivates: (i) the design of full-duplex WIT to reduce latency and enable efficient spectrum utilization, and (ii) the implementation of passive IoT devices using backscatter antennas that enable WET from one device (reader) to another (tag). However, the resultant increase in the density of simultaneous links exacerbates the interference issue. This issue is addressed in this paper by proposing the design of full-duplex backscatter communication (BackCom) networks, where a novel multiple-access scheme based on time-hopping spread-spectrum (TH-SS) is designed to enable both one-way WET and two-way WIT in coexisting backscatter reader-tag links. Comprehensive performance analysis of BackCom networks is presented in this paper, including forward/backward bit-error rates and WET efficiency and outage probabilities, which accounts for energy harvesting at tags, non-coherent and coherent detection at tags and readers, respectively, and the effects of asynchronous transmissions.
• ### Massive Machine Type Communication with Data Aggregation and Resource Scheduling(1611.03183)

April 13, 2017 cs.IT, math.IT
To enable massive machine type communication (mMTC), data aggregation is a promising approach to reduce the congestion caused by a massive number of machine type devices (MTDs). In this work, we consider a two-phase cellular-based mMTC network where MTDs transmit to aggregators (i.e., aggregation phase) and the aggregated data is then relayed to base stations (i.e., relaying phase). Due to the limited resources, the aggregators not only aggregate data, but also schedule resources among MTDs. We consider two scheduling schemes: random resource scheduling (RRS) and channel-aware resource scheduling (CRS). By leveraging the stochastic geometry, we present a tractable analytical framework to investigate the signal-to-interference ratio (SIR) for each phase, thereby computing the MTD success probability, the average number of successful MTDs and probability of successful channel utilization, which are the key metrics characterizing the overall mMTC performance. Our numerical results show that, although the CRS outperforms the RRS in terms of SIR at the aggregation phase, the simpler RRS has almost the same performance as the CRS for most cases with regards to the overall mMTC performance. Furthermore, the provision of more resources at the aggregation phase is not always beneficial to the mMTC performance.
• ### Gauss-Legendre Sampling on the Rotation Group(1508.03353)

Jan. 13, 2017 cs.IT, math.IT
We propose a Gauss-Legendre quadrature based sampling on the rotation group for the representation of a band-limited signal such that the Fourier transform (FT) of a signal can be exactly computed from its samples. Our figure of merit is the sampling efficiency, which is defined as a ratio of the degrees of freedom required to represent a band-limited signal in harmonic domain to the number of samples required to accurately compute the FT. The proposed sampling scheme is asymptotically as efficient as the most efficient scheme developed very recently. For the computation of FT and inverse FT, we also develop fast algorithms of complexity similar to the complexity attained by the fast algorithms for the existing sampling schemes. The developed algorithms are stable, accurate and do not have any pre-computation requirements. We also analyse the computation time and numerical accuracy of the proposed algorithms and show, through numerical experiments, that the proposed Fourier transforms are accurate with errors on the order of numerical precision.
• ### Superimposed Signaling Inspired Channel Estimation in Full-Duplex Systems(1511.04794)

Dec. 28, 2016 cs.IT, math.IT
Residual self-interference (SI) cancellation in the digital baseband is an important problem in full-duplex (FD) communication systems. In this paper, we propose a new technique for estimating the SI and communication channels in a FD communication system, which is inspired from superimposed signalling. In our proposed technique, we add a constant real number to each constellation point of a conventional modulation constellation to yield asymmetric shifted modulation constellations with respect to the origin. We show mathematically that such constellations can be used for bandwidth efficient channel estimation without ambiguity. We propose an expectation maximization (EM) estimator for use with the asymmetric shifted modulation constellations. We derive a closed-form lower bound for the mean square error (MSE) of the channel estimation error, which allows us to find the minimum shift energy needed for accurate channel estimation in a given FD communication system. The simulation results show that the proposed technique outperforms the data-aided channel estimation method, under the condition that the pilots use the same extra energy as the shift, both in terms of MSE of channel estimation error and bit error rate. The proposed technique is also robust to an increasing power of the SI signal.
• ### Device-to-Device Communication Underlaying a Finite Cellular Network Region(1510.03162)

Oct. 27, 2016 cs.IT, math.IT
Underlay in-band device-to-device (D2D) communication can improve the spectrum efficiency of cellular networks. However, the coexistence of D2D and cellular users causes inter-cell and intra-cell interference. The former can be effectively managed through inter-cell interference coordination and, therefore, is not considered in this work. Instead, we focus on the intra-cell interference and propose a D2D mode selection scheme to manage it inside a finite cellular network region. The potential D2D users are controlled by the base station (BS) to operate in D2D mode based on the average interference generated to the BS. Using stochastic geometry, we study the outage probability experienced at the BS and a D2D receiver, and spectrum reuse ratio, which quantifies the average fraction of successfully transmitting D2D users. The analysis shows that the outage probability at the D2D receiver varies for different locations. Additionally, without impairing the performance at the BS, if the path-loss exponent on the cellular link is slightly lower than that on the D2D link, the spectrum reuse ratio can have negligible decrease while the D2D users' average number of successful transmissions increases with increasing D2D node density. This indicates that an increasing level of D2D communication can be beneficial in future networks..
• ### Path-Following Algorithms for Beamforming and Signal Splitting in RF Energy Harvesting Networks(1606.04191)

June 14, 2016 cs.IT, math.IT
We consider the joint design of transmit beamforming and receive signal-splitting ratios in the downlink of a wireless network with simultaneous radio-frequency (RF) information and energy transfer. Under constraints on the signal-to-interference-plus-noise ratio (SINR) at each user and the total transmit power at the base station, the design objective is to maximize either the sum harvested energy or the minimum harvested energy. We develop a computationally efficient path-following method to solve these challenging nonconvex optimization problems. We mathematically show that the proposed algorithms iteratively progress and converge to locally optimal solutions. Simulation results further show that these locally optimal solutions are the same as the globally optimal solutions for the considered practical network settings.
• ### Mode Selection, Resource Allocation and Power Control for D2D-Enabled Two-Tier Cellular Network(1509.00123)

April 7, 2016 cs.IT, math.IT
This paper proposes a centralized decision making framework at the macro base station (MBS) for device to device (D2D) communication underlaying a two-tier cellular network. We consider a D2D pair in the presence of an MBS and a femto access point, each serving a user, with quality of service constraints for all users. Our proposed solution encompasses mode selection (choosing between cellular or reuse or dedicated mode), resource allocation (in cellular and dedicated mode) and power control (in reuse mode) within a single framework. The framework prioritizes D2D dedicated mode if the D2D pair are close to each other and orthogonal resources are available. Otherwise, it allows D2D reuse mode if the D2D satisfies both the maximum distance and an additional interference criteria. For reuse mode, we present a geometric vertex search approach to solve the power allocation problem. We analytically prove the validity of this approach and show that it achieves near optimal performance. For cellular and dedicated modes, we show that frequency sharing maximizes sum rate and solve the resource allocation problem in closed form. Our simulations demonstrate the advantages of the proposed framework in terms of the performance gains achieved in D2D mode.
• ### Energy Harvesting Wireless Sensor Networks: Delay Analysis Considering Energy Costs of Sensing and Transmission(1509.06089)

March 15, 2016 cs.IT, math.IT
Energy harvesting (EH) provides a means of greatly enhancing the lifetime of wireless sensor nodes. However, the randomness inherent in the EH process may cause significant delay for performing sensing operation and transmitting the sensed information to the sink. Unlike most existing studies on the delay performance of EH sensor networks, where only the energy consumption of transmission is considered, we consider the energy costs of both sensing and transmission. Specifically, we consider an EH sensor that monitors some status environmental property and adopts a harvest-then-use protocol to perform sensing and transmission. To comprehensively study the delay performance, we consider two complementary metrics and analytically derive their statistics: (i) update age - measuring the time taken from when information is obtained by the sensor to when the sensed information is successfully transmitted to the sink, i.e., how timely the updated information at the sink is, and (ii) update cycle - measuring the time duration between two consecutive successful transmissions, i.e., how frequently the information at the sink is updated. Our results show that the consideration of sensing energy cost leads to an important tradeoff between the two metrics: more frequent updates result in less timely information available at the sink.
• ### Secure Communication with a Wireless-Powered Friendly Jammer(1412.0349)

Aug. 26, 2015 cs.IT, math.IT
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission. In the first phase, wireless power transfer is conducted from the source to the jammer. In the second phase, the source transmits the information-bearing signal under the protection of a jamming signal sent by the jammer using the harvested energy in the first phase. We analytically characterize the long-time behavior of the proposed protocol and derive a closed-form expression for the throughput. We further optimize the rate parameters for maximizing the throughput subject to a secrecy outage probability constraint. Our analytical results show that the throughput performance differs significantly between the single-antenna jammer case and the multi-antenna jammer case. For instance, as the source transmit power increases, the throughput quickly reaches an upper bound with single-antenna jammer, while the throughput grows unbounded with multi-antenna jammer. Our numerical results also validate the derived analytical results.
• ### Joint Resource Optimization for Multicell Networks with Wireless Energy Harvesting Relays(1408.4215)

March 24, 2015 cs.IT, math.IT
This paper first considers a multicell network deployment where the base station (BS) of each cell communicates with its cell-edge user with the assistance of an amplify-and-forward (AF) relay node. Equipped with a power splitter and a wireless energy harvester, the self-sustaining relay scavenges radio frequency (RF) energy from the received signals to process and forward the information. Our aim is to develop a resource allocation scheme that jointly optimizes (i) BS transmit powers, (ii) received power splitting factors for energy harvesting and information processing at the relays, and (iii) relay transmit powers. In the face of strong intercell interference and limited radio resources, we formulate three highly-nonconvex problems with the objectives of sum-rate maximization, max-min throughput fairness and sum-power minimization. To solve such challenging problems, we propose to apply the successive convex approximation (SCA) approach and devise iterative algorithms based on geometric programming and difference-of-convex-functions programming. The proposed algorithms transform the nonconvex problems into a sequence of convex problems, each of which is solved very efficiently by the interior-point method. We prove that our algorithms converge to the locally optimal solutions that satisfy the Karush-Kuhn-Tucker conditions of the original nonconvex problems. We then extend our results to the case of decode-and-forward (DF) relaying with variable timeslot durations. We show that our resource allocation solutions in this case offer better throughput than that of the AF counterpart with equal timeslot durations, albeit at a higher computational complexity. Numerical results confirm that the proposed joint optimization solutions substantially improve the network performance, compared with cases where the radio resource parameters are individually optimized.
• ### Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis(1310.7648)

March 18, 2015 cs.IT, math.IT
We consider wireless-powered amplify-and-forward and decode-and-forward relaying in cooperative communications, where an energy constrained relay node first harvests energy through the received radio-frequency signal from the source and then uses the harvested energy to forward the source information to the destination node. We propose time-switching based energy harvesting (EH) and information transmission (IT) protocols with two modes of EH at the relay. For continuous time EH, the EH time can be any percentage of the total transmission block time. For discrete time EH, the whole transmission block is either used for EH or IT. The proposed protocols are attractive because they do not require channel state information at the transmitter side and enable relay transmission with preset fixed transmission power. We derive analytical expressions of the achievable throughput for the proposed protocols. The derived expressions are verified by comparison with simulations and allow the system performance to be determined as a function of the system parameters. Finally, we show that the proposed protocols outperform the existing fixed time duration EH protocols in the literature, since they intelligently track the level of the harvested energy to switch between EH and IT in an online fashion, allowing efficient use of resources.
• ### Performance Analysis of Arbitrarily-Shaped Underlay Cognitive Networks: Effects of Secondary User Activity Protocols(1403.4669)

Nov. 7, 2014 cs.IT, math.IT
This paper analyzes the performance of the primary and secondary users (SUs) in an arbitrarily-shaped underlay cognitive network. In order to meet the interference threshold requirement for a primary receiver (PU-Rx) at an arbitrary location, we consider different SU activity protocols which limit the number of active SUs. We propose a framework, based on the moment generating function (MGF) of the interference due to a random SU, to analytically compute the outage probability in the primary network, as well as the average number of active SUs in the secondary network. We also propose a cooperation-based SU activity protocol in the underlay cognitive network which includes the existing threshold-based protocol as a special case. We study the average number of active SUs for the different SU activity protocols, subject to a given outage probability constraint at the PU and we employ it as an analytical approach to compare the effect of different SU activity protocols on the performance of the primary and secondary networks.
• ### A Novel User Pairing Scheme for Functional Decode-and-Forward Multi-way Relay Network(1402.6422)

Sept. 24, 2014 cs.IT, math.IT
In this paper, we consider a functional decode and forward (FDF) multi-way relay network (MWRN) where a common user facilitates each user in the network to obtain messages from all other users. We propose a novel user pairing scheme, which is based on the principle of selecting a common user with the best average channel gain. This allows the user with the best channel conditions to contribute to the overall system performance. Assuming lattice code based transmissions, we derive upper bounds on the average common rate and the average sum rate with the proposed pairing scheme. Considering M-ary quadrature amplitude modulation with square constellation as a special case of lattice code transmission, we derive asymptotic average symbol error rate (SER) of the MWRN. We show that in terms of the achievable rates, the proposed pairing scheme outperforms the existing pairing schemes under a wide range of channel scenarios. The proposed pairing scheme also has lower average SER compared to existing schemes. We show that overall, the MWRN performance with the proposed pairing scheme is more robust, compared to existing pairing schemes, especially under worst case channel conditions when majority of users have poor average channel gains.
• ### Channel, Phase Noise, and Frequency Offset in OFDM Systems: Joint Estimation, Data Detection, and Hybrid Cramer-Rao Lower Bound(1311.6853)

May 30, 2014 cs.IT, math.IT
Oscillator phase noise (PHN) and carrier frequency offset (CFO) can adversely impact the performance of orthogonal frequency division multiplexing (OFDM) systems, since they can result in inter carrier interference and rotation of the signal constellation. In this paper, we propose an expectation conditional maximization (ECM) based algorithm for joint estimation of channel, PHN, and CFO in OFDM systems. We present the signal model for the estimation problem and derive the hybrid Cramer-Rao lower bound (HCRB) for the joint estimation problem. Next, we propose an iterative receiver based on an extended Kalman filter for joint data detection and PHN tracking. Numerical results show that, compared to existing algorithms, the performance of the proposed ECM-based estimator is closer to the derived HCRB and outperforms the existing estimation algorithms at moderate-to-high signal-to-noise ratio (SNR). In addition, the combined estimation algorithm and iterative receiver are more computationally efficient than existing algorithms and result in improved average uncoded and coded bit error rate (BER) performance.
• ### Training-Based Synchronization and Channel Estimation in AF Two-Way Relaying Networks(1309.6690)

March 19, 2014 cs.IT, math.IT
Two-way relaying networks (TWRNs) allow for more bandwidth efficient use of the available spectrum since they allow for simultaneous information exchange between two users with the assistance of an intermediate relay node. However, due to superposition of signals at the relay node, the received signal at the user terminals is affected by \emph{multiple impairments}, i.e., channel gains, timing offsets, and carrier frequency offsets, that need to be jointly estimated and compensated. This paper presents a training-based system model for amplify-and-forward (AF) TWRNs in the presence of multiple impairments and proposes maximum likelihood and differential evolution based algorithms for joint estimation of these impairments. The Cramer-Rao lower bounds (CRLBs) for the joint estimation of multiple impairments are derived. A minimum mean-square error based receiver is then proposed to compensate the effect of multiple impairments and decode each user's signal. Simulation results show that the performance of the proposed estimators is very close to the derived CRLBs at moderate-to-high signal-to-noise-ratios. It is also shown that the bit-error rate performance of the overall AF TWRN is close to a TWRN that is based on assumption of perfect knowledge of the synchronization parameters.
• ### Outage Probability in Arbitrarily-Shaped Finite Wireless Networks(1304.6172)

Dec. 20, 2013 cs.IT, math.IT
This paper analyzes the outage performance in finite wireless networks. Unlike most prior works, which either assumed a specific network shape or considered a special location of the reference receiver, we propose two general frameworks for analytically computing the outage probability at any arbitrary location of an arbitrarily-shaped finite wireless network: (i) a moment generating function-based framework which is based on the numerical inversion of the Laplace transform of a cumulative distribution and (ii) a reference link power gain-based framework which exploits the distribution of the fading power gain between the reference transmitter and receiver. The outage probability is spatially averaged over both the fading distribution and the possible locations of the interferers. The boundary effects are accurately accounted for using the probability distribution function of the distance of a random node from the reference receiver. For the case of the node locations modeled by a Binomial point process and Nakagami-$m$ fading channel, we demonstrate the use of the proposed frameworks to evaluate the outage probability at any location inside either a disk or polygon region. The analysis illustrates the location dependent performance in finite wireless networks and highlights the importance of accurately modeling the boundary effects.
• ### A Tractable Framework for Exact Probability of Node Isolation and Minimum Node Degree Distribution in Finite Multi-hop Networks(1212.1283)

Nov. 29, 2013 cs.IT, math.IT, cs.NI
This paper presents a tractable analytical framework for the exact calculation of probability of node isolation and minimum node degree distribution when $N$ sensor nodes are independently and uniformly distributed inside a finite square region. The proposed framework can accurately account for the boundary effects by partitioning the square into subregions, based on the transmission range and the node location. We show that for each subregion, the probability that a random node falls inside a disk centered at an arbitrary node located in that subregion can be expressed analytically in closed-form. Using the results for the different subregions, we obtain the exact probability of node isolation and minimum node degree distribution that serves as an upper bound for the probability of $k$-connectivity. Our theoretical framework is validated by comparison with the simulation results and shows that the minimum node degree distribution serves as a tight upper bound for the probability of $k$-connectivity. The proposed framework provides a very useful tool to accurately account for the boundary effects in the design of finite wireless networks.
• ### Spatio-spectral Formulation and Design of Spatially-Varying Filters for Signal Estimation on the 2-Sphere(1308.6659)

Aug. 30, 2013 cs.IT, math.IT, astro-ph.IM
In this paper, we present an optimal filter for the enhancement or estimation of signals on the 2-sphere corrupted by noise, when both the signal and noise are realizations of anisotropic processes on the 2-sphere. The estimation of such a signal in the spatial or spectral domain separately can be shown to be inadequate. Therefore, we develop an optimal filter in the joint spatio-spectral domain by using a framework recently presented in the literature --- the spatially localized spherical harmonic transform --- enabling such processing. Filtering of a signal in the spatio-spectral domain facilitates taking into account anisotropic properties of both the signal and noise processes. The proposed spatio-spectral filtering is optimal under the mean-square error criterion. The capability of the proposed filtering framework is demonstrated with by an example to estimate a signal corrupted by an anisotropic noise process.
• ### Error Performance Analysis of DF and AF Multi-way Relay Networks with BPSK Modulation(1308.2264)

Aug. 10, 2013 cs.IT, math.IT
In this paper, we analyze the error performance of decode and forward (DF) and amplify and forward (AF) multi-way relay networks (MWRN). We consider a MWRN with pair-wise data exchange protocol using binary phase shift keying (BPSK) modulation in both additive white Gaussian noise (AWGN) and Rayleigh fading channels. We quantify the possible error events in an $L$-user DF or AF MWRN and derive accurate asymptotic bounds on the probability for the general case that a user incorrectly decodes the messages of exactly $k$ ($k\in[1,L-1]$) users. We show that at high signal-to-noise ratio (SNR), the higher order error events ($k\geq 3$) are less probable in AF MWRN, but all error events are equally probable in a DF MWRN. We derive the average BER of a user in a DF or AF MWRN in both AWGN and Rayleigh fading channels under high SNR conditions. Simulation results validate the correctness of the derived expressions. Our results show that at medium to high SNR, DF MWRN provides better error performance than AF MWRN in AWGN channels even with a large number of users (for example, L=100). Whereas, AF MWRN outperforms DF MWRN in Rayleigh fading channels even for much smaller number of users (for example, $L > 10$).