This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings

Power and Subcarrier Allocation for Physical-Layer Security in OFDMA Networks Xiaowei Wang, Meixia Tao, Jianhua Mo and Youyun Xu Department of Electronic Engineering, Shanghai Jiao Tong University Shanghai, P.R. China 200240, Email: {wangxiaowei, mxtao, mjh}@sjtu.edu.cn, [email protected].

Abstract—Providing physical-layer security for mobile users in future broadband wireless networks is of both theoretical and practical importance. In this paper, we formulate an analytical framework for resource allocation in a downlink OFDMA-based broadband network with coexistence of secure users (SU) and normal users (NU). The problem is formulated as joint power and subcarrier allocation with the objective of maximizing average aggregate information rate of all NU’s while maintaining an average secrecy rate for each individual SU under a total transmit power constraint for the base station. We solve this problem in an asymptotically optimal manner using dual decomposition. Our analysis shows that an SU becomes a candidate competing for a subcarrier only if its channel gain on this subcarrier is the largest among all and exceeds the second largest by a certain threshold. Furthermore, while the power allocation for NU’s follows the conventional water-filling principle, the power allocation for SU’s depends on both its own channel gain and the largest channel gain among others. We also design a suboptimal algorithm to reduce the computational cost. Numerical studies are conducted to evaluate the performance of the proposed algorithms in terms of the achievable pair of information rate for NU’s and secrecy rate for SU at different power consumptions.

I. I NTRODUCTION Security is a crucial issue in wireless systems due to the broadcasting nature of wireless radio waves. Traditionally, most of security work is undertaken on upper layers based on computational complexity. In the standard five-layered protocol stack, security approaches are designed on every layer except physical layer. Thus, establishing physical-layer security is of both theoretical and practical significance. In this paper, we aim to provide physical-layer security for mobile users in future broadband wireless networks and formulate an analytical strategy for resource allocation to achieve this goal. Information-theoretic security explores secrecy capacity and coding technique to protect messages from being decoded by any eavesdropper. Information-theoretic security originates from Shannon’s notion of perfect secrecy [1]. The concept of information-theoretic security and wire-tap channel was defined by Wyner [2]. Then the study is extended to various kinds of channels, such as Gaussian wire-tap channel [3], slow fading channels [4], independent parallel channels [5] and Gaussian interference channel [6]. This work was supported by The Joint Research Fund for Overseas Chinese, Hong Kong and Macao Young Scholars (61028001), Shanghai Pujiang Talent Program (09PJ1406000), the Innovation Program of Shanghai Municipal Education Commission (11ZZ19), and the 111 Project (B07022).

Orthogonal frequency division multiple access (OFDMA) enables efficient transmission by optimizing power, subcarrier or bit allocation among different users [7]–[9]. Nevertheless, none of these works take into account the security issue, which attracts increasing attention recently in wireless networks as aforementioned. Secrecy message exchanges between mobile users and base station (BS) are generally needed in present and future wireless networks. Hence, it is essential to consider security demand when assigning radio resources to all users. In this study, we introduce two types of users according to their secrecy demands. The first type have physical-layer security requirements and should be served at a non-zero secrecy rate. These users are referred to as secure users (SU). The other type has no confidential messages and their traffic is treated in a besteffort way. These users are regarded as normal users (NU). The coexistence of SU’s and NU’s imposes major differences on resource allocation problem in OFDMA networks. Firstly, an SU can occupy a subcarrier only if the channel gain of the SU on this subcarrier is the largest among all the users. Note that this observation is very different from that in conventional OFDMA networks. Secondly, even if an SU has the best channel condition on a given subcarrier, assigning this subcarrier to the SU may not be the optimal solution from the system perspective. Our goal is to seek an optimal power and subcarrier allocation policy to maximize the long-term aggregate information rate of all NU’s while maintaining a target average secrecy rate of each individual SU under a total power constraint. Since a non-zero instantaneous secrecy rate for each SU cannot be guaranteed all the time, the average secrecy rate requirement is considered instead. We solve this optimization problem in dual domain using the decomposition method in an asymptotically optimal manner. We further propose a low-complexity suboptimal power and subcarrier allocation algorithm by decoupling the joint update of the Lagrangian multipliers as required in the optimal algorithm. Numerical results show that the proposed optimal and suboptimal power and subcarrier adaptation policies have significant advantages over fixed subcarrier assignments in terms of achievable pair of information rate for NU’s and secrecy rate for SU at different power consumptions.

978-1-61284-233-2/11/$26.00 ©2011 IEEE

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings

can be expressed as

II. S YSTEM M ODEL AND P ROBLEM F ORMULATION We consider the downlink of an OFDMA broadband network with one BS and K mobile users. The first K1 users, indexed as k = 1, . . . , K1 , are SU’s. Each of them demands a secrecy rate no lower than a constant Ck , for 1 ≤ k ≤ K1 . The other K − K1 users, indexed as k = K1 + 1, . . . , K, are NU’s. The communication link between the BS and each user is modeled as a slowly time-varying frequency-selective fading channel. The total bandwidth is logically divided into N orthogonal subcarriers by using OFDMA with each experiencing slow fading. The total transmit power of the BS is subject to a long-term average constraint. We assume full statistical and instantaneous knowledge of channel state information (CSI) at the BS and that each subcarrier is occupied only by one user at each time frame to avoid multi-user interference. Let αk,n denote the channel-to-noise ratio (CNR) of user k on subcarrier n for all k and n. The system channel condition is denoted by the set α = {αk,n }, which have a joint probability density function of f (α). Let Ω(α) = {Ω1 , ..., ΩK } denote the subcarrier assignment policy, where Ωk represents the set of subcarriers assigned to user k. Furthermore, let p(α) = {pk,n , ∀k, ∀n} denote the corresponding power allocation policy, where pk,n represents the transmit power allocated to user k on subcarrier n. For SU k, 1 ≤ k ≤ K1 , the achievable secrecy rate at a given channel realization is the summation of those achieved on each subcarrier in the presence of K − 1 potential eavesdroppers, and can thus be expressed as [10]: rks =



s rk,n

(1)

n∈Ωk

where +

s = [log(1 + pk,n αk,n ) − log(1 + pk,n βk,n )] . rk,n

(2)

Here βk,n = max αk ,n denotes the largest CNR among all   k ,k =k

the users except user k on subcarrier n. On the other hand, the achievable information rate of NU k for K1 < k ≤ K is given by: rk =



rk,n ,

(3)

n∈Ωk

where rk,n = log(1 + pk,n αk,n ).

(4)

The problem is to find the optimal power and subcarrier allocation policies (p(α), Ω(α)) so as to maximize the average aggregate information rate of the K − K1 NU’s while satisfying the individual average secrecy rate requirement for each of the K1 SU’s. This functional optimization problem

max

{Ω(α),p(α)}



K 

E

ωk

subject to E



E

rk,n

(5)



s rk,n

≥ Ck , 1 ≤ k ≤ K1

n∈Ωk





n∈Ωk

k=K1 +1





(6)



K  

≤P

pk,n

(7)

k=1 n∈Ωk

pk,n ≥ 0, ∀k, n Ω1 ∪ ... ∪ ΩK ⊆ {1, 2, ..., N } Ω1 , ..., ΩK are disjoint

(8) (9)

where notation E represents statistical average over the joint  distribution of channel conditions, i.e. E[·] = (·)f (α)dα, and ωk is a weighting parameter of NU k, representing its quality-of-service demand. Constraint (7) is the average total power constraint. III. O PTIMAL R ESOURCE A LLOCATION U SING D UAL M ETHOD It is not difficult to observe that the problem formulated in Section II satisfies the time-sharing condition [11]. That is, the objective function is concave and constraint (6) is convex s is concave in pk,n and the integral preserves because rk,n concavity. Therefore, we can use dual approach for resource allocation and the solution is asymptotically optimal for large enough number of subcarriers. Define P(α) as a set of all possible non-negative power parameters {pk,n } at any given system channel condition α satisfying that for each subcarrier n only one pk,n is positive. This definition takes into account both the power constraint (8) and the exclusive subcarrier allocation constraint (9). The Lagrange dual function is thus given by g(μ, λ) =

  E

max

{pk,n }∈P(α)

+

K1 

 

μk

K 

E

k=1



+λ P −E

ωk

k=K1 +1 N 

s rk,n

n=1 K N 

N 







rk,n pk,n (α), α

n=1









pk,n (α), α

− Ck

 pk,n (α)

,

(10)

k=1 n=1

where μ = (μ1 , . . . , μK1 )  0 and λ ≥ 0 are the Lagrange multipliers for the constraints (6) and (7) respectively, and notation E stands for the statistical average over all channel conditions α. Then the dual problem of the original problem (5) is given by min g(μ, λ) s.t. μ  0, λ ≥ 0.

(11)

Observing (10), we find that the maximization in the Lagrange dual function can be decomposed into N independent

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings

for 1 ≤ k ≤ K1 and p∗k,n defined in (15), and

sub-functions as: g(μ, λ) =

N 

gn (μ, λ) −

n=1

K1 

μk Ck + λP,

(12)

k=1

where gn (μ, λ) =

max

{pk,n }∈P(α)

E [Jn (μ, λ, α, {pk,n }k )] , (13)

with Jn (μ, λ, α, {pk,n }k ) = K1 K K    s ωk rk,n + μk rk,n −λ pk,n . k=K1 +1

k=1

k=1

The function in (14) is concave in pk,n and hence its maximum value can be found by using Karush-Kuhn-Tucker (KKT) conditions. Specifically, suppose that subcarrier n is assigned to user k, then taking the partial derivation of Jn (μ, λ, α, {pk,n }k ) with respect pk,n and equating it to zero, we obtain the following optimality condition of power allocation: 

2  1 1 1 1 4μk 1 ∗ − + − pk,n = 2 αk,n βk,n λ βk,n αk,n

 + 1 1 − + (15) αk,n βk,n

C. Dual Update Substituting gn (μ, λ) for n = 1, . . . , N into (12), we obtain g(μ, λ). As studied in [12], the dual problem (11) can be minimized by simultaneously updating (μ, λ) using gradient descent algorithms. However, g(μ, λ) is not differentiable and hence its gradient does not exist. Therefore, we present a subgradient of g(μ, λ) as follows:

N  s∗ rk,n − Ck , (21) Δμk = E 



1 ωk − λ αk,n

+

Δλ = P − E (16)

B. Optimality Condition of Subcarrier Assignment Next, substituting (15) and (16) into (13) and comparing all the K possible user assignments for each subcarrier n, we obtain   max Hk,n (μ, λ, α) ,

1≤k≤K

(17)

where the function Hk,n (·) is defined as   1 + p∗k,n αk,n − λp∗k,n (18) Hk,n (μ, λ, α) = μk log 1 + p∗k,n βk,n

(20)

Note that for k = K1 + 1, ..., K, Hk,n is monotonically increasing in αk,n . Therefore, the NU with larger αk,n is more likely to be assigned subcarrier n. We also notice that for k = 1, ..., K1 , Hk,n > 0 only when SU k has the largest αk,n among all the K users and satisfies αk,n > βk,n + λ/μk . In other words, an SU becomes a candidate for subcarrier n only if its CNR is the largest and is λ/μk larger than the second largest.

n=1

for k = K1 + 1, . . . , K. We can conclude from (16) that the optimal power allocation for NU’s follows the conventional water-filling principle. On the other hand, it is seen from (15) that the SU must satisfy αk,n − βk,n ≥ μλk in order to obtain non-zero power. This means that the power allocation for SU depends on both the channel gain of the SU and the largest channel gain among all the other users.

gn (μ, λ) = E

for n = 1, ..., N.

k

(14)

A. Optimality Condition of Power Allocation

p∗k,n =

for K1 < k ≤ K. From (17) it is observed that for any given dual variables μ and λ, the subcarrier n will be assigned to the user with the maximum value of Hk,n . Then, the optimality condition for subcarrier assignment is given by kn∗ = arg max Hk,n ,

For fixed μ and λ, the maximization problem in (13) is a single-carrier multiple-user power allocation problem. We can obtain the maximum by directly maximizing the function (14).

for k = 1, . . . , K1 , and

Hk,n (μ, λ, α) = ωk

+  ωk αk,n + λ log − ωk − (19) λ αk,n



N K  

p∗k,n

,

(22)

k=1 n=1 s∗ where rk,n is obtained by substituting the optimal p∗k,n into (2). The results in (21) and (22) can be proved by using the same method as [9]. After finding the optimal dual variables {μ∗k } and λ∗ , the optimal power and subcarrier allocation policy is then obtained by substituting them into (15), (16) and (20).

D. Discussion of Feasibility In this subsection, we will derive an upper bound of average secrecy rate each SU can obtain. If Ck is set equal or greater than this upper bound, the secrecy requirement cannot be satisfied and thus this optimization problem is not feasible. For simplicity, we assume that the channel conditions of all the K users on each subcarrier are i.i.d., and follow Rayleigh distribution. We can write the average achievable secrecy rate of each SU k as  + α N N k,n s s ¯ k ≤ E[ lim rk,n ] = E log . (23) R K pk,n →∞ K βk,n

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings

¯ s can be theoretically derived Therefore, an upper bound on R k using order statistics as  ∞ ∞ ν1 ¯ ks ≤ N log f (ν1 , ν2 )dν1 dν2 R K 0 ν2  ν2 ν2 N −2 N ∞ ∞ = N (N − 1)(1 − e− ρ ) K 0 ν2 ν1 1 − νρ2 1 − νρ1 e e log dν1 dν2 (24) ρ ρ ν2 In the above derivation, ν1 and ν2 denote the largest and second largest CNR’s on a given subcarrier, f (ν1 , ν2 ) is the joint probability density function of ν1 and ν2x. The probability distribution function of CNR is f (x) = ρ1 e− ρ , where ρ is the mean value. Since it is difficult to further express the integrals in (24) in a closed form, we use numerical integration to get the upper limit value. As an example, when the parameters are set to be N = 64, K = 8, K1 = 4 and ρ = 1, we ¯ s ≤ 3.5-3.6nat/OFDMA symbol. In this case, when obtain R k ¯ s , the problem becomes the secrecy rate constraint Ck > R k infeasible. IV. S UBOPTIMAL A LGORITHM The complexity of the optimal policy mainly lies in the joint update of Lagrange multipliers {μk } and λ. If the ellipsoid method is used, it converges in O((K1 + 1)2 log 1 ) iterations where  is the accuracy [12]. By decoupling the joint update of the Lagrangian multipliers, we propose a suboptimal algorithm. In this scheme, the power allocation adopts the expressions in (15) and (16) except that the parameter λ/μk , k = 1, . . . , K1 in (15) is replaced by a new variable νk . Also, in (16) we define Lk = ωk L0 , for k = K1 + 1, . . . , K where L0 = λ1 . Thus,, νk and L0 can be found through two separate binary searches and this suboptimal algorithm converges in O((K1 + 1) log 1 ) iterations. The outline of this suboptimal algorithm is presented below. Suboptimal Algorithm Find the optimal νk to achieve the secrecy rate requirement Ck for k = 1, . . . , K1 . 1) Set νkU B sufficiently large, νkLB = 0 and νk = 12 (νkLB + νkU B ). 2) For every training channel realization α Find Ωk = {n|αk,n > max k =k (αk ,n ) + νk };s pk,n (α) and rk (α) = Compute pk (α) = n∈Ωk  s s rk (α), where pk,n (α) and rk,n (α) are computed n∈Ωk

according to (15) and (2), respectively with λ/μk replaced by νk ; Compute rsk = E [rks (α)] and pk = E [pk (α)]. 3) If rsk > Ck , νkLB = νk , else νkU B = νk . Set νk = 1 LB + νkU B ). 2 (νk 4) Repeat Steps 2)-3) until |rsk − Ck | ≤ Ck , for each k ∈ [1, K1 ] .

5) Compute the power consumed by SU’s, P SU =

K 1 k=1

pk .

Find the optimal water level L0 to meet the power constraint. B B sufficiently large, LLB = 0 and L0 = 12 (LU 6) Set LU 0 0 0 + LB L0 ). 7) For every training channel realization α K 1 Ωk , i.e. not For every residual subcarrier n ∈ / occupied by SU’s Find k = arg

k=1

max

k∈(K1 ,K]

Hk,n according to (19) with

1/λ replaced by L0 ; For the found k, compute pk,n (α) and rk,n (α) according to (16) and (4) with 1/λ replaced by L0 ; N   rk,n (α) and P N U = Compute rk = E 

n=1 N K   E pk,n (α) . k=K1 +1 n=1

B = L0 , else LLB = L0 . Set 8) If P N U > P − P SU , LU 0 0 1 UB LB L0 = 2 (L0 + L0 ). 9) Repeat Steps 7)-8) until |P SU + P N U − P | < P .

V. N UMERICAL R ESULTS In the simulation setup, we consider an OFDMA network with N = 64 subcarriers and K = 8 mobile users, among which K − K1 = 4 are NU’s and K1 = 4 are SU’s. For simplicity, all the weighting parameters ωk are set to 1 and the secrecy rate requirements Ck for SU’s are set to be identical, denoted as Ck = RSU . Let RN U denote the average total information rate of the NU’s. The channel on each subcarrier for each user is assumed to be i.i.d. with Rayleigh fading. We also introduce two non-adaptive schemes as benchmarks. In these two schemes, subcarrier assignment is fixed beforehand while power allocated conforms to (15) and (16). In the first scheme, denoted as FSA-1, the 64 subcarriers are equally assigned to the 8 users. In the second scheme, denoted as FSA-2, the SU’s are given higher priority and each is assigned 12 subcarriers, whereas each NU is assigned 4. We first demonstrate the rate pair (RN U , RSU ) at average total SNR=30dB in Fig. 1. First it is observed that using both optimal and suboptimal algorithms, RN U decreases with the increase of RSU and falls sharply to zero at around RSU = 3.5nat/OFDM symbol, which is the feasible point. It is then observed that the suboptimal algorithm only incurs less than 20% loss in RN U compared with the optimal algorithm. Both schemes earn evident advantage over the two benchmarks FSA-1 and FSA-2. Fig. 2 shows the average power consumption of all SU’s, when total transmit power is fixed at 30 dB. From Fig. 2, we notice that the optimal scheme spends more power on SU’s than the suboptimal scheme. For the two non-adaptive benchmarks, the feasible points appear at around RSU =0.44 and 0.66nat/OFDM symbol respectively which are much lower than those in optimal and suboptimal algorithms.

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings

700

220

200

Power consumed by all SU’s

600

180

160 RNU

Optimal Suboptimal FSA−1 FSA−2

140

120

500

400

300

200

100 Optimal

100

Suboptimal

80

FSA−1

0

FSA−2 60

0

0.5

1

1.5

2

2.5

3

0

1

SU

Achievable (RSU , RN U ) pair at total transmit SNR of 30dB.

1.5

2

2.5

3

3.5

RSU

R

Fig. 1.

0.5

3.5

Fig. 2.

Power consumption by SU’s versus RSU at SNR=30dB.

250

VI. C ONCLUSION This work investigated the power and subcarrier allocation policy for OFDMA networks where both SU’s and NU’s coexist. We formulated the problem as maximizing the average aggregate information rate of NU’s while satisfying the basic average secrecy rate requirements of SU’s. We solve the problem asymptotically in dual domain by using decomposition method. To reduce the computational cost, a suboptimal scheme with favorable performance is presented. Numerical results show that the optimal algorithm effectively boosts the average total information rate of NU’s. This work can be extended in several aspects, such as the resource allocation with user or eavesdropper cooperation, as well as distributed implementation of these algorithms with partial or local channel knowledge. R EFERENCES [1] C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, 2009. [2] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1367, Oct. 1975. [3] S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wire-tap channel,” IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451–456, Jul. 1978. [4] J. Barros and M. Rodrigues, “Secrecy capacity of wireless channels,” in Proc. IEEE Int. Symp. Info. Theory, Seattle, USA, 2006, pp. 356–360.

200

Optimal Suboptimal FSA−1 FSA−2

150 RNU

We next demonstrate the relation between RN U and total transmit SNR for a given RSU =0.4 nat/OFDM symbol in Fig. 3. Note that the constraint RSU = 0.4 is feasible when SNR≥ -2dB for the optimal and suboptimal schemes and when SNR≥ 3 or 9 dB, respectively for FSA-1 and FSA-2. To conclude the above results, the proposed optimal and suboptimal schemes significantly outperform those with fixed subcarrier assignment. This observation indicates the great importance of carefully coordinating the subcarrier allocation with adaptation to the system channel conditions. Moreover, the suboptimal scheme provides a good tradeoff between performance and complexity.

100

50

0 −5

0

5

10 15 SNR(dB)

20

25

30

Fig. 3. RN U versus total transmit SNR at RSU = 0.4nats/OFDM symbol. [5] Z. Li, R. Yates, and W. Trappe, “Secrecy capacity of independent parallel channels,” in Proc. 41st Annual Allerton Conference, Allerton House, UIUC, lllinois, USA. [6] J. Zhu, J. Mo, and M. Tao, “Cooperative secret communication with artificial noise in symmetric interference channel,” IEEE Commun. Letters, vol. 14, no. 10, pp. 885–887, Oct. 2010. [7] C. Y. Wong, R. S. Cheng, K. B. Letaief, and R. D. Murch, “Multi-user OFDM with adaptive sub-carrier, bit, and power allocation,” IEEE J. Sel. Areas Commun., vol. 17, no. 10, pp. 1747–1758, Oct. 1999. [8] J. Jang and K. B. Lee, “Transmit power adaptation for multiuser OFDM systems,” IEEE J. Sel. Areas Commun., vol. 21, no. 2, pp. 171–178, Feb. 2003. [9] M. Tao, Y.-C. Liang, and F. Zhang, “Resource allocation for delay differentiated traffic in multiuser OFDM systems,” IEEE Trans. Wirel. Commun., vol. 7, no. 6, pp. 2190–2201, Jun. 2008. [10] P. Wang, G. Yu, and Z. Zhang, “On the secrecy capacity of fading wireless channel with multiple eavesdroppers,” in Proc. IEEE Int. Symp. Inf. Theory, Nice,France, 2007, pp. 1301–1305. [11] W. Yu and R. Lui, “Dual methods for nonconvex spectrum optimization of multicarrier systems,” IEEE Trans. Commun., vol. 54, no. 7, pp. 1310– 1322, Jul. 2006. [12] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, 2004.

Wang_Xiaowei_ICC11_Power and subcarrier allocation for physical ...

Wang_Xiaowei_ICC11_Power and subcarrier allocation for physical layer security in OFDMA networks.pdf. Wang_Xiaowei_ICC11_Power and subcarrier ...

159KB Sizes 2 Downloads 208 Views

Recommend Documents

Power and subcarrier allocation for physical-layer ...
Page 3 of 10. Page 3 of 10. Wang_Xiaowei_TIFS11_Power_and_subcarrier_alloca ... _in_OFDMA_Based_Broadband_wireless_networks.pdf.

Power and subcarrier allocation for physical-layer security in ...
I. INTRODUCTION. S ECURITY is a crucial issue in wireless systems due to ... The as- sociate editor coordinating the review of this manuscript and approving it for .... _in_OFDMA_Based_Broadband_wireless_networks.pdf ... .pdf. Page 1 of 14.

Optimizing Constellations for Single-Subcarrier ...
limited systems results in a smaller power penalty than when using formats optimized for average power in peak-power limited systems. We also evaluate the modulation formats in terms of their ... In the absence of optical amplification, an IM/DD syst

Power efficient subcarrier modulation for intensity ...
Therefore, intensity modulation and direct detection (IM/DD), where the information is modulated ... nonlinear fashion [3, 4]. Since the optical phase in an IM/DD system cannot be used to carry information, multilevel .... The above definitions ensur

incentive-based resource allocation and control for ...
Computing services, loosely defined as the allocation and management of ... resources in service computing environments, procedures which have many ...

Fair Beamwidth Selection and Resource Allocation for ...
†School of ECE, College of Engineering, University of Tehran, Iran. ‡School of ... promising technology for supporting extremely high data rates in the next generation .... devices begin with finding the best sector-level beams through a sequence

Joint Power Allocation and Beamforming for Multiuser ...
Multiuser MIMO Two-way Relay Networks. Mohammad .... The problem is formulated and solved via the proposed iterative scheme in. Section III. Simulation results are presented in Section IV. Finally, conclusions are drawn in Section V. II. SYSTEM .....

Dynamic Resource Allocation Techniques for Half- and ...
Nov 7, 2014 - limited environments with applications to both wireline and wireless ...... approximate global knowledge by taking advantage of the clustered ...

pdf-0751\media-access-control-and-resource-allocation-for-next ...
... apps below to open or edit this item. pdf-0751\media-access-control-and-resource-allocation- ... ks-springerbriefs-in-applied-sciences-and-technolo.pdf.

incentive-based resource allocation and control for ...
In this dissertation, we discuss four distinct models which address the issues ..... various features of “grid,” “utility,” and “cloud” computing, has received much re-.

Adaptive resource allocation and frame scheduling for wireless multi ...
allocation and frame scheduling concept for wireless video streaming. ... I. INTRODUCTION. Wireless multimedia communication is challenging due to the time ...

Symbol repetition and power re-allocation scheme for ... - IEEE Xplore
Symbol Repetition and Power Re-allocation Scheme for Orthogonal Code Hopping Multiplexing Systems. Bang Chul Jung, Jae Hoon Clung, and Dan Keuii Sung. CNR Lab.. Dept. of EECS.. KAIST. 373-1. Guseong-dong. Yuseong-gu. Daejeon. 305-70 I _ KOREA. En~ail

Optimal Quantization and Bit Allocation for ...
Etienne Marcheret, Vaibhava Goel, Peder A. Olsen. IBM T. J. Watson Research, Yorktown Heights, NY, USA ... The first stage, level 1, relies on a set of Gaussians. G to convert an input d-dimensional feature vector xt to offset .... terms of the produ

MARKS ALLOCATION
MARKS FOR EXCEL test (calc payment due) - GROUP 1D. FORMAT. 10. 10. 5. 5. 5. 5. 5. 45. MARKAH stdno. time. TIMEMARK weightage Overall % TOTAL ...

Robust Power Allocation for Multicarrier Amplify-and ... - IEEE Xplore
Sep 11, 2013 - Abstract—It has been shown that adaptive power allocation can provide a substantial performance gain in wireless communication systems ...

Power Allocation and Scheduling for Ultra-Wideband ...
(MUI); 3) the diverse quality of service (QoS) requirements of multimedia ...... RIM/CITO Chair on Pico-Cellular Wireless Internet Access Networks and is.

Dynamic Resource Allocation Techniques for Half- and ...
Oct 20, 2014 - Department of Electrical and Computer Engineering ... Demand for data-intensive services is increasing ... Interference must be managed.

DREAM: Dynamic Resource Allocation for Software-defined ...
1. INTRODUCTION. Today's data center and enterprise networks require expensive .... services have a large number of tenants; for example, 3 million do-.

Resource and Bandwidth Allocation
Grid computing systems (machines) pool together the resources of a heterogeneous collection of computing systems that are widely distributed, possibly.

Input Allocation, Workforce Management and ...
Oct 27, 2017 - University College London, European University Institute, University of Zurich, University .... We use workforce turnover information in the data to investigate how employment ...... The importance of peer learning for teachers.

Bookbuilding and Strategic Allocation
∗Cornelli is at the Fuqua School of Business, Duke University, the London Business School, and CEPR ..... and receives 800 shares. Bidder A's .... cases is that rationing should favor investors who demand a smaller number of shares. Another ...

Land Markets, Resource Allocation, and Agricultural Productivity
Further emergence of private property during this period resulted in powerful ...... zones with the highest and lowest efficiency gain as these outliers cloud out.