IEEE ICC 2016 - Cognitive Radio and Networks Symposium

Decentralized Power Allocation for Secondary Random Access in Cognitive Radio Networks with Successive Interference Cancellation Huifa Lin, Koji Ishibashi, Won-Yong Shin, and Takeo Fujii Abstract—This paper studies a decentralized power allocation for uplink random access of secondary users in cognitive network with successive interference cancellation. First, for the additive white Gaussian noise channel, we propose a novel algorithm, which enables to obtain discrete power levels and optimize the corresponding probabilities, iterating per-level from the lowest power level to the highest one. Under a fading environment, we further propose an opportunistic transmission protocol to reduce the interference temperature at the primary base station, by allocating powers only to the secondary users who will result in small interference. The proposed algorithms are verified via computer simulations. Index Terms—Cognitive radio, decentralized power allocation, random access, successive interference cancellation.

I. I NTRODUCTION Cognitive radio (CR) has been extensively studied as a promising technology to solve the growing problem of wireless spectrum scarcity [1]–[3]. In spectrum sharing CR networks, secondary users (SUs) are allowed to transmit simultaneously using the same frequency band assigned to primary users (PUs), provided that the requirement of an interference temperature constraint at the primary base station (PBS) is fulfilled [2]. The interference temperature is defined as the tolerable interference level at the primary receiver such as the PBS for uplink [4]. It is critical to protect the transmission of PUs by restricting the resulting interference temperature at the PBS through transmit power allocation at the SUs [5]–[11]. In [7], it is shown that an average interference power (AIP) constraint can better protect the PBS and provide the secondary system higher transmission data rates, comparing to a peak interference power constraint. In [8], instead of the power constraints, an outage probability constraint at the PBS is considered to protect the quality of service (QoS) of the primary system. In [9], an joint optimization of power and bandwidth allocation has been proposed. Recently, the power allocation for the CR network has beed investigated from various new perspectives, such as optimization on energy efficiency to implement green CR, and robust power allocation algorithms designed for imperfect system parameters including channel gain and interference power (see [10], [11], and references therein). On the one hand, since the number of user devices is likely to increase dramatically in the future, radio access networks should be able to support multiple access of massive users and achieve a higher spectral efficiency [12]. Specially, for the multiple access of a large number of SUs in CR networks,

978-1-4799-6664-6/16/$31.00 ©2016 IEEE

random access is an attractive option due to overheads for successful SU transmissions. Such overheads consume the scarce channel resource, which are thus undesired in the CR networks. On the other hand, to improve the spectral efficiency of the random access, successive interference cancellation (SIC) whose principle has been first proposed in [13] to achieve the broadcast channel capacity, enables to decode multiple packets by successively subtracting the correctly decoded packets at the receiver [14], [15]. Power allocation is shown to be critical to increase the throughput of random access using SIC [14]. An optimization algorithm has been designed for random access with the SIC receiver to decode two packets from one collision [15]. We focus on decentralized power allocation (DPA) algorithms for the uplink random access of SUs in the CR network with SIC. In the decentralized random access scenarios, SUs select their transmit power levels randomly without coordination of the SBS, which differs from the centralized power allocation (CPA) such that the SBS controls the SU transmit power in a centralized manners in [5]–[11]. Recently, an optimal DPA based on water-filling with threshold has been proposed for the random access but without the SIC receiver [16]. Different from the aforementioned DPA algorithm in [15], the optimization problem in this paper is formulated according to a more general case that the SIC receiver may decode multiple packets (could be more than two) from one collision. Hence, the optimization problem formulation is distinct and a new optimization algorithm is required. Moreover, we take into account the interference temperature constraint in the optimization problem formulation explicitly to protect the PBS. In our previous work, we have proposed DPA algorithms for the common random access without constraint of interference temperature, which were designed for maximizing the throughput of the media access control (MAC) layer or the system sum rate [17], [18]. In this paper, we first propose a novel DPA algorithm, which enables to obtain discrete power levels and optimize the corresponding probabilities for the additive white Gaussian noise (AWGN) channel. Under a fading environment, we further propose an opportunistic transmission protocol (OTP) that allocates powers only to the users who will cause small interference. Compared to the conventional DPA schemes, the proposed DPA can improve the performance on the sum rate of the secondary system, while fulfills the constraint of interference temperature at the PBS. In practical CR fading

Fig. 1. The random access system model of the CR network with K SUs, one SBS, and one PBS. Consider the uplink communication from the SUs to the SBS, sharing the same spectrum of the uplink channel to the PBS.

environments, the proposed OTP can further reduce the interference temperature at the PBS, in a decentralized manner. The remainder of this paper is organized as follows. Section II shows the system model. Section III presents the DPA algorithm for the AWGN channel. Section IV presents the OTP under a CR fading environment. Section V provides numerical results to verify the proposed algorithms. Section VI concludes this paper. II. S YSTEM M ODEL A. Channel Model As shown in Fig. 1, we consider the secondary multiple access channel of the uplink communication to one SBS with K SUs, sharing the same spectrum of the uplink channel to one PBS. By assuming half duplex for the uplink and the downlink, such as the time-division duplexing (TDD), we can focus on controlling or reducing the interference at the PBS caused by the SUs. A slotted ALOHA based random access is considered, where the SUs contend the transmission to the SBS with the SIC capability. Let K = {1, 2, · · · , K} denote the set of SUs. Channels are assumed to be quasistatic, i.e., the channels are constant during each time slot, but independently change from one slot to another. For the current time slot, let hi and gi denote the fading channel coefficients from the i-th user to the SBS and PBS, respectively, where i ∈ K. In this paper, we model these fading coefficients as independent and identically distributed (i.i.d.) circularly symmetric complex Gaussian random variables, following the probability density function (PDF) of CN (0, 1). The AWGN channel corresponds to hi = 1, gi = 1 for ∀i. We assume that the channel state information (CSI) is available at the SBS and each user has the local knowledge of its own transmit CSI. B. Transceiver Structure As shown in Fig. 2, at the transmitter side, the information blocks are first encoded by sufficiently powerful channel

codes, such as turbo codes, and then the coded packets are modulated to complex signals. The channel coding and the modulation together constitute the base code with the data rate Ro . For each time slot, each user randomly selects a transmit power from a set of discrete power levels E = {E0 , E1 , · · · , EL } according to the probability mass function (PMF) p = [p0 , p1 , · · · , pL ]. Here l ∈ {1, 2, · · · , L} and L are the index and the number of power levels, respectively. Specifically, a user keeps idle during the time slotPif E0 = 0 is L selected, and the corresponding probability is 1− i=1 pi ≥ 0. We have 0 < E1 < · · · < EL ≤ 1 due to the transmit power constraint such that the maximum transmit power of each user is 1. Let ek denote the transmit power of user k. Then the probability that user k transmits with El is pl = Pr(ek = El ). Each user selects the transmit power independently in a decentralized manner, and none has any knowledge of the transmit power of the other users. The network is assumed to be fully loaded. That is, each user always has a packet to transmit and the buffer is assumed to be sufficient. The received signal y at the SBS is given by y=

K X

√ hi ei xi + w + z,

(1)

i=1

where xi is the transmitted signal from the i-th SU with unit amplitude, w is the received signal from the PU, and z is the AWGN. Since the SU packets are assumed to be protected from the PU interference using the bit-interleaved coded modulation (BICM) [19], z 0 = w +z can be modeled as a circularly symmetric complex Gaussian random variable following CN (0, N0 ). Then, the signal-to-interference-and-noise ratio (SINR) corresponding to the user k can be calculated by SINRk =

|hk |2 ek , Θk + Φk + N0

(2)

where Θk is the sum interference power from the received packets before past processing, Φk is the sum power of the decoded signals, and  is the residual power ratio due to the imperfect SIC subtraction. Hence, Φk is the sum of the residual power from the decoded packets. The SBS can decode the packet of user k if and only if SINRk exceeds the decoding threshold ρ defined as Ro . The threshold of the ideal channel coding is given by ρ˜ = 2Ro −1. However, owing to a performance gap between the data rate achieved by the practical codes and the channel capacity, a higher SINR is required to correctly decode the information. Hence, when a small ∆ > 0 is used to capture this gap, the practical decoding threshold is given by  ρ = 2Ro − 1 (1 + ∆). (3) Upon successfully decoding the information packet, the SIC process begins to subtract the decoded packet from the received signal but still leaves the residual of power ek  as interference due to the imperfect cancellation. The SIC process is repeated in the order of descending SINR until all packets

Base code

User 1 ENC

TX power

MOD

Timeslot 1 (collision)

Base code

User 2 ENC

Timeslot 2 (idle)

TX power

MOD

. . .

. . .

Base code

Timeslot N (single packet)

TX power

User K ENC

MOD

Fig. 2. The block diagram of the random access using the same base code and decentralized power allocation with K SUs during N time slots.

are decoded except that none’s SINR exceeds the decoding threshold. C. Constraint of Interference Temperature

p,E

In the CR network, the SUs share the same uplink spectral with the PBS when transmitting to the SBS. To guarantee the reception at the PBS, we use the constraint of interference temperature EIT in our decentralized power allocation algorithm, which is given by K X

s.t.

j=1

2

|gi | ei ≤ EIT .

(4)

In addition, since each user selects the transmit power independently and the channel gain is random, the actual interference temperature for an individual time slot may exceed the constraint, which corresponds to an outage. We define the outage probability as K X

! 2

|gi | ei > EIT .

(5)

i=1

III. DPA FOR AWGN C HANNEL A. Problem Formulation Let Tl denote the MAC throughput contributed by the lth power level assuming that the packets at higher power levels are subtracted. Let ζi denote the probability that the SIC process successfully continues to a lower power level from the current i-th level (i.e., at the i-th level, the received packet is decoded successfully or no packet is received). Since the SIC receiver decodes the packets according to the descend order of the received power, for the packet of the l-th power level, all the probabilities of higher power levels have to be counted. Hence,Qthe practical throughput of the l-th power level is given L by Tl i=l+1 ζi . The overall throughput is the sum of the

i=j+1

0 < Ei ≤ 1, Ei−1 − Ei < 0, K X

i = 1, . . . , L

ei ≤ EIT

(6b) (6c)

i=1

0 < pi < 1,

i=1

Pout = Pr

throughput of all power levels. The throughput optimization problem is then formulated as   L−1 L X Y Tj max TL + ζi  (6a)

L X

pi ≤ 1,

i = 1, . . . , L.

(6d)

i=1

Compared to our previous works [17], [18], there is a new additional constraint of the interference temperature (6c) in the problem formulation. Since this optimization is almost intractable due to the complicated target function, we propose a bottom-up per-level iterative algorithm to obtain E and p. The idea behind this iterative algorithm is to convert the intractable overall optimization problem into simple tractable per-level subproblems, which can be proved to be quasi-concave. The iterative process is used to obtain the power and the probability of the current level, using the already obtained data of the lower levels. For the lowest power level (l = 1), the SBS decodes the corresponding packet treating the SIC residual of the higher power levels as noise. This power E1 should fulfill E1 ≥ ρ, (7) (EIT − E1 ) + N0 where (EIT − E1 ) is the estimated SIC residual for power level 1 according to the constraint of interference temperature. As in the slotted ALOHA, the optimal transmit probability is given by p∗1 = 1/K, resulting in the MAC throughput T1 = e−1 . For higher power levels (l ≥ 2), we use Algorithm 1 to calculate the power and the corresponding probability. B. Power Estimation For the l-th power level (l ≥ 2), to successfully decode the corresponding packet from the noise N0 , the sum interference

Algorithm 1 Optimize E and p Initialization: l = 2, E0 = 0, estimate E1 by (7), p∗1 = 1/K, save E0 , E1 to E, save p∗1 to p. while 1 do Estimate El by (12), estimate γl by (9), obtain p∗l by (18). Pl if El ≤ 1 & i p∗i ≤ 1 then Save El to E, save p∗l to p, calculate Tl by (13), l = l + 1, continue. else Discard El and p∗l , break. end if end while PL L = l, p∗0 = 1 − i=1 p∗i , save p∗0 to p.

from the lower power levels Θl , and the sum SIC residual from the higher power levels Φl , the power El should satisfy: El ≥ρ Θl + Φl + N0

(8)

following with high probability (whp), where Kl denotes the number of transmitting P PL users with power El , Θl = l−1 K E , and Φ = i i l i=1 i=l+1 Ki Ei . Let γl denote the probability of successful decoding when a single packet at the l-th level is received, which is given by  γl = Pr

El Θl + Φl + N0

 >ρ ,

(9)

where ζl = Pr(Kl = 1)γl + Pr(Kl = 0). With probability of 1 − γl , the SBS fails to decode the packet and the decoding is terminated at the l-th level. Hence, El should lead to sufficient large γl . Since each of Θl and Φl is the sum of random variables, to guarantee the successful decoding, an estimated ˆ l , is given by Θl , Θ ˆl = Θ =

l−2 X i=1 l−1 X

Kpi Ei + βEl−1 (10)

C. Probability Optimization Regarding the throughput Tl−1 as a constant, we can obtain the optimal probability p∗l by maximizing the following target function of the MAC throughput fl (λl ) = Pr(Kl = 0)Tl−1 + γl Pr(Kl = 1)(1 + Tl−1 ) = e−λl Tl−1 + γl λl e−λl (1 + Tl−1 ).

(13)

For given K, deriving the optimal probability p∗l is equivalent to deriving the optimal λ∗l . The optimization problem is thus formulated as λ∗l = arg max{fl (λl )}.

(14)

0≤λl ≤K

To obtain λ∗l , the first order derivative of fl (λl ) with respect to λl is calculated as follows: fl0 (λl ) = e−λl (Tl−1 γl + γl − Tl−1 − γl (1 + Tl−1 )λl ). (15) Proposition 1. For fixed Tl−1 , there is one and only one λ∗l that maximizes fl (λl ). Proof. We prove that there is one and only one solution for fl0 (λl ) = 0, which maximizes fl (λl ). The second order derivative with λl is given by fl00 (λl ) = e−λl (Tl−1 + γl (1 + Tl−1 )(λl − 2)) .

(16)

Tl−1 ), fl (λl ) Since fl00 (λl ) < 0 for λl ∈ [0, 2 − γl (1+T l−1 ) is concave in this interval with the maximal point λa , 1+Tl−1 (1−1/γl ) . The function fl (λl ) is convex for λl ∈ [2 − 1+Tl−1 Tl−1 γl (1+Tl−1 ) , ∞)

since fl00 (λl ) ≥ 0, and the maximal point is to be found on boundary. Hence the the maximal point Tl−1 could be either λl = 2 − γl (1+T or λl → ∞. Obviously, l−1 ) limλl →∞ fl (λl ) = 0 and the maximal point of this interval is Tl−1 . It is examined that fl (λa ) is always λb , 2 − γl (1+T l−1 ) greater than fl (λb ) since  fl (λa ) − fl (λb ) = γl (1 + Tl−1 ) e−λa − 2e−λb Tl−1 (17)  = γl (1 + Tl−1 )e γl (1+Tl−1 ) e−1 − eln 2−2 > 0.

Kpi Ei + (β − Kpl−1 )El−1 , Hence, λ∗l = λa =

i=1

where β is an adjustable parameter in the DPA algorithm to ˆ l ≥ Θl whp. An estimated Φl , Φ ˆ l , is given by satisfy Θ ˆ l = EIT − Φ

l−1 X

Kpi Ei − αEl−1 ,

(11)

i=1

where α is an adjustable parameter in the DPA algorithm to ˆ l ≥ Φl whp. From these estimated values, it follows satisfy Φ that   ˆ l + Φ ˆ l + N0 ρ. El = Θ (12)

1+Tl−1 (1−1/γl ) . 1+Tl−1

If γl < Tl−1 /(1 + Tl−1 ), then λ∗l becomes negative, which is not allowed since the probability p∗l = λ∗l /K must be nonnegative. In consequence, we have ( Tl−1 λ∗l = 0, γl < 1+T l−1 (18) (1−1/γl ) Tl−1 , 1+T ≤ γl ≤ 1. λ∗l = 1+Tl−1 1+Tl−1 l−1 By substituting the optimal λ∗l into (13), Tl is given by ∗



Tl = fl (λ∗l ) = e−λl Tl−1 + γl λ∗l e−λl (1 + Tl−1 ).

(19)

IV. OTP U NDER CR FADING E NVIRONMENT According to the random nature of fading channels and the decentralized random access, we propose the OTP to reduce the interference temperature at the PBS along with a smaller sum transmit power of the SUs, which is based on E and p obtained by the DPA algorithm for the AWGN channel. In each time slot, we choose such SUs that yield small |gi | and large |hi |, which result in less interference temperature and less sum transmit power, respectively. Specially, the OTP divides all the SUs into the following two groups: candidate group and idle group. The SUs satisfying |gi |/|hi | < η belong to the candidate group to randomly allocate power levels while the other users belong to the idle group in this time slot, where η > 0 is an adjustable coefficient. The probability of |gi |/|hi | < η is given by [20]     2 σg |gi | < η = arctan η , (20) δ(η) = Pr |hi | π σh

Fig. 3. The sum rate performance versus SNR according to various schemes with K = 100.

where σh and σg are the standard deviations of |hi | and |gi |, respectively. In this paper, we have σh = σg , thereby leading to δ(η) = 2/π arctan(η). The number of SUs in the candidate group is given by KCG = bδ(η)Kc. Among these KCG SUs, the transmit powers are allocated from E according to the probabilities of the adjusted p for the reduced number of available SUs. For instance, if the i-th user belongs to the candidate group and its allocated power level is El , then this user transmits with the power of El /|hi |2 . Fig. 4. The system sum rate versus η for various SNRs.

V. N UMERICAL R ESULTS In computer simulations, we consider a simple slotted ALOHA type random access with K full-loaded SUs contending the transmission to the SBS, without using the carrier sensing and the backoff mechanism. Both the AWGN and flat Rayleigh fading channels are assumed. All the transmitted packets are encoded using a powerful channel code with data rate Ro = 2/25 and ∆ = 0.1. For the estimation of power levels, we set α = 1 and β = 6 so that the probability of successful decoding γl sufficient high. In every time slot, each user randomly selects the transmit power from the power level set E according to the corresponding probabilities p. A. Performance for AWGN Channel We use the sum rate defined as Rsum = T × R to evaluate the system performance, where T and R indicate the MAC throughput and the data rate of the PHY layer, respectively. In our proposal, the sum rate is given by T × Ro . However, in the conventional MAC protocols such as the slotted ALOHA and the random access scheme with SIC [15], only the MAC throughput was evaluated without consideration of the PHY data rate. For a fair comparison, we assume that the data rates in these two conventional schemes achieve the point-to-point Gaussian channel capacity C = log2 (1 + SNR), which results in Rsum = T × C. Specifically, the ideal Rsum is given by e−1 × C and 0.57 × C, respectively, for the slotted ALOHA scheme and the random access scheme in [15]. The scheduled

orthogonal multiple access such as the time division multiple access (TDMA) achieves T = 1, yielding Rsum = 1 × C. Figure 3 shows the sum rates of various schemes with respect to the SNR for the AWGN channel, assuming the perfect SIC. The slotted ALOHA scheme is used as a baseline of random access schemes. The scheme in [15], termed the conventional multi-packet reception (MPR)-SIC, outperforms the slotted ALOHA for all SNR regions, due to the SIC receiver. The proposed DPA scheme, outperforms the conventional MPR-SIC scheme for all SNR regions, since the SBS can decode more than two packets from a collision. The DPA scheme even outperforms the TDMA in the low SNR region due to the non-orthogonal feature that the sum transmit power can PKexceed the constraint of the single-user transmit power ( k=1 ek > 1). In the high SNR region, since the interference from other packets becomes dominant, the scheduled TDMA scheme outperforms all the random access schemes. B. Performance Under CR Fading Environment In practical CR fading environments, we take into account  > 0 to capture the effect of the imperfect SIC caused by the inaccurate channel estimation and set the constraint of interference temperature to EIT = 10. In this paper, we set  = 10−4 (which may be adjusted according to the accuracy of the channel estimation). The performance on the system sum rate Rsum is presented in Fig. 4 according to the parameter η

via computer simulations. Future work includes performance evaluation under more practical assumptions, such as severer SIC residuals or a mismatch between the actual number of SUs and the estimated one. ACKNOWLEDGMENT This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (MSIP) (2015R1A2A1A15054248) and by JSPS KAKENHI Grant Numbers 15H04004, 15H04010. R EFERENCES Fig. 5. The average interference temperature at the PBS versus η for various SNRs.

Fig. 6. Outage probability of the interference temperature at the PBS for various values of SNR.

that controls the ratio of the candidate group of SUs, δ(η). If δ(η) < 1−p0 , there are not enough SUs in the candidate group for allocating the non-zero power levels, which thus results in a degraded Rsum . Figures 5 and 6 show the average interference temperature ¯IT and the outage probability Pout such that the interference E temperature exceeds the constraint according to η, respectively. ¯IT and Pout increase with η since a higher number Both E of SUs generating more interference are involved. Hence, the value of η can be used to control the tradeoff between the achievable sum rate and the interference temperature in the CR fading environment. For instance, consider the case of SNR = 10[dB]. By setting η = 1.0, the system achieves Rsum = 3.467[bps/Hz] that is close to that of the AWGN channel, ¯IT = 3.606 is obtained, which is significantly reduced while E ¯IT = 10). compared to the AWGN channel (E VI. C ONCLUDING R EMARKS In this paper, we have proposed a decentralized power allocation algorithm for the secondary random access with SIC in CR networks, which enables to enhance the system sum rate at the SBS. Based on this algorithm, we have proposed an opportunistic transmission protocol under CR fading environments, to reduce the interference temperature at the PBS. The effectiveness of the proposed algorithms has been verified

[1] J. Mitola and G. Maguire, “Cognitive radio: making software radios more personal,” IEEE Pers. Commun., vol. 6, no. 4, pp. 13–18, 1999. [2] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220, Feb. 2005. [3] A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, “Breaking spectrum gridlock with cognitive radios: An information theoretic perspective,” Proc. IEEE, vol. 97, no. 5, pp. 894–914, 2009. [4] Federal Communications Commission, “Spectrum Policy Task Force,” FCC, Tech. Rep. ET Docket no. 02-135, Nov. 2002. [5] A. Ghasemi and E. Sousa, “Fundamental limits of spectrum-sharing in fading environments,” IEEE Trans. Wireless Commun., vol. 6, no. 2, pp. 649–658, 2007. [6] R. Zhang, S. Cui, and Y. C. Liang, “On ergodic sum capacity of fading cognitive multiple-access and broadcast channels,” IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5161–5178, 2009. [7] R. Zhang, “On peak versus average interference power constraints for protecting primary users in cognitive radio networks,” IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 2112–2120, 2009. [8] X. Kang, Y. C. Liang, and H. K. Garg, “Fading cognitive multiple access channels: Outage capacity regions and optimal power allocation,” IEEE Trans. Wirel. Commun., vol. 9, no. 7, pp. 2382–2391, 2010. [9] X. Gong, S. A. Vorobyov, and C. Tellambura, “Optimal bandwidth and power allocation for sum ergodic capacity under fading channels in cognitive radio networks,” IEEE Trans. Signal Process., vol. 59, no. 4, pp. 1814–1826, 2011. [10] F. Zhou, N. Beaulieu, Z. Li, J. Si, and P. Qi, “Energy-Efficient Optimal Power Allocation for Fading Cognitive Radio Channels: Ergodic Capacity, Outage Capacity and Minimum-Rate Capacity,” IEEE Trans. Wireless Commun., vol. 1276, no. c, pp. 1–1, 2015. [11] Y. Xu, X. Zhao, and Y.-C. Liang, “Robust power control and beamforming in cognitive radio networks: a survey,” IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 1834–1857, 2015. [12] F. Boccardi, R. Heath, A. Lozano, T. Marzetta, and P. Popovski, “Five disruptive technology directions for 5G,” IEEE Commun. Mag., vol. 52, no. 2, pp. 74–80, Feb. 2014. [13] T. Cover, “Broadcast channels,” IEEE Trans. Inf. Theory, vol. 18, no. 1, pp. 2–14, Jan. 1972. [14] R. LaMaire, A. Krishna, and M. Zorzi, “On the randomization of transmitter power levels to increase throughput in multiple access radio systems,” Wirel. Networks, vol. 4, no. 3, pp. 263–277, Mar. 1998. [15] C. Xu, L. Ping, P. Wang, S. Chan, and X. Lin, “Decentralized power control for random access with successive interference cancellation,” IEEE J. Sel. Areas Commun., vol. 31, no. 11, pp. 2387–2396, Nov. 2013. [16] E. Nekouei, H. Inaltekin, and S. Dey, “Power control and asymptotic throughput analysis for the distributed cognitive uplink,” IEEE Trans. Commun., vol. 62, no. 1, pp. 41–58, 2014. [17] H. Lin, K. Ishibashi, W.-Y. Shin, and T. Fujii, “Decentralized Multilevel Power Allocation for Random Access,” IEICE Trans. Commun., vol. E98.B, no. 10, pp. 1978–1987, 2015. [18] ——, “A simple random access scheme with multilevel power allocation,” IEEE Commun. Lett., vol. 19, no. 12, pp. 2118–2121, 2015. [19] G. Caire, G. Taricco, and E. Biglieri, “Bit-interleaved coded modulation,” IEEE Trans. Inf. Theory, vol. 44, no. 3, pp. 927–946, May 1998. [20] M. Simon, Probability Distributions Involving Gaussian Random Variables. Boston, MA: Springer US, 2006.

Decentralized Power Allocation for Secondary Random ...

promising technology to solve the growing problem of wireless spectrum scarcity ..... is used to obtain the power and the probability of the current level, using the ...

2MB Sizes 1 Downloads 219 Views

Recommend Documents

Decentralized Multilevel Power Allocation for Random ...
Oct 10, 2015 - formance of the media access control (MAC) layer, ignoring the details of ..... tion DL(p, E) is identical to the maximization of the system. MAC throughput. Direct formulation of the optimization problem is hence given by max p,E. DL(

Decentralized power allocation for coordinated multiple access channels
optimal power allocation in multiple access channels (MAC) .... GAUSSIAN SISO MULTIPLE ACCESS .... [0, +∞[4 and define the two constrained functions.

Power Allocation for OFDM-based Cognitive Radio ... - Semantic Scholar
Cognitive radio (CR) is a highly promising technology to solve the spectrum insufficiency ... Small Cell Based Autonomic Wireless Network]. is assumed to have ...

Power and subcarrier allocation for physical-layer ...
Page 3 of 10. Page 3 of 10. Wang_Xiaowei_TIFS11_Power_and_subcarrier_alloca ... _in_OFDMA_Based_Broadband_wireless_networks.pdf.

Joint Power Allocation and Beamforming for Multiuser ...
Multiuser MIMO Two-way Relay Networks. Mohammad .... The problem is formulated and solved via the proposed iterative scheme in. Section III. Simulation results are presented in Section IV. Finally, conclusions are drawn in Section V. II. SYSTEM .....

Power and subcarrier allocation for physical-layer security in ...
I. INTRODUCTION. S ECURITY is a crucial issue in wireless systems due to ... The as- sociate editor coordinating the review of this manuscript and approving it for .... _in_OFDMA_Based_Broadband_wireless_networks.pdf ... .pdf. Page 1 of 14.

A Distributed Cooperative Power Allocation Method for Campus ...
in power system operation and control. Therefore, building- to-grid integration has recently attracted significant attention. in the smart grid research [3]–[10].

A Distributed Cooperative Power Allocation Method for Campus ...
A Distributed Cooperative Power Allocation Method for Campus Buildings.pdf. A Distributed Cooperative Power Allocation Method for Campus Buildings.pdf.

Reduced Complexity Power Allocation Strategies for ...
Abstract—We consider wireless multiple-input–multiple-output. (MIMO) systems ..... allocation algorithm, we propose some novel allocation tech- niques that are ...

Symbol repetition and power re-allocation scheme for ... - IEEE Xplore
Symbol Repetition and Power Re-allocation Scheme for Orthogonal Code Hopping Multiplexing Systems. Bang Chul Jung, Jae Hoon Clung, and Dan Keuii Sung. CNR Lab.. Dept. of EECS.. KAIST. 373-1. Guseong-dong. Yuseong-gu. Daejeon. 305-70 I _ KOREA. En~ail

Distributed Cooperative Q-learning for Power Allocation ...
Since femtocells are installed by the end user, their number and positions are random ..... a femto/macro-user is set to 800 meters, 3) The maximum distance between a .... relatively small overhead. ... Challenges for Business and Technology.

Adaptive Power Allocation for Noncooperative OFDM ...
complementary approach is to design smarter transmitters with ... by the system designer, and is made possible only if the transmitter can ... Application of.

Fixed Power Allocation with Nulling for TDD-Based ...
Index Terms—Power allocation, fading channels, inter-cell interference. I. INTRODUCTION. CHANNEL capacity is an important performance metric for digital communication systems. Studies on Shannon capacity in fading channels have been extensively don

Efficient Resource Allocation for Power Minimization in ...
While these solutions are optimal in minimiz- .... this section, an efficient solution to the power minimization .... remains in contact with this minimum surface.

Robust Power Allocation for Multicarrier Amplify-and ... - IEEE Xplore
Sep 11, 2013 - Abstract—It has been shown that adaptive power allocation can provide a substantial performance gain in wireless communication systems ...

Power Allocation and Scheduling for Ultra-Wideband ...
(MUI); 3) the diverse quality of service (QoS) requirements of multimedia ...... RIM/CITO Chair on Pico-Cellular Wireless Internet Access Networks and is.

Optimal Power Allocation for Fading Channels in ...
Jul 8, 2008 - communication network (SCN) to opportunistically operate in the ...... Telecommunications Conference (GLOBECOM07), Washington. DC, USA ...

Multi-Group Random Access Resource Allocation ... - Semantic Scholar
J.-W. Choi (corresponding author) is with the Department of Informa- tion & Communication Engineering, Daegu ..... SIR (dB). Probability. Group 1 @ Underlay P1=1.0000P1. Group 2 @ Underlay P2=0.1975P1. Group 3 @ Underlay P3=0.0672P1. Group 1 @ Overla

BLIND DECENTRALIZED ESTIMATION FOR ...
fusion center are perfect. ... unlabeled nature of the fusion center observations makes the problem .... where ˆψML is the solution obtained through the EM algo-.

Decentralized Workflow Execution for Virtual ...
Decentralized Workflow Execution for Virtual Enterprises in Grid. Environment. Wei Tan ... grid, to serve as the process management platform. We also stress that ...

learning distributed power allocation policies in mimo ...
nt . Note that the Kronecker propa- gation model ( where the channel matrices are of the form. Hk = R. 1/2 k. ˜ΘkT. 1/2 k. ) is a special case of the UIU model. The.

Power Allocation Policies with Full and Partial Inter ...
of diverse wireless systems, the demand for spectrum has increased in recent ... ent multiple wireless systems or operators. ...... Cambridge University Press. 35.

Distributive Subband Allocation, Power and Rate ... - IEEE Xplore
in an orthogonal frequency-division multiple-access (OFDMA) cellular system with ... systems with imperfect CSIT in order to take into account of potential packet ...

Combined Higher Secondary Level Examination 2017 - Career Power
15 hours ago - The candidates may take a print out of their respective Question Paper(s) along with the Final Answer Keys by using the link given below.