scispace - formally typeset
Search or ask a question

Showing papers by "Lajos Hanzo published in 2020"


Journal ArticleDOI
TL;DR: This paper proposes to invoke an IRS at the cell boundary of multiple cells to assist the downlink transmission to cell-edge users, whilst mitigating the inter-cell interference, which is a crucial issue in multicell communication systems.
Abstract: Intelligent reflecting surfaces (IRSs) constitute a disruptive wireless communication technique capable of creating a controllable propagation environment. In this paper, we propose to invoke an IRS at the cell boundary of multiple cells to assist the downlink transmission to cell-edge users, whilst mitigating the inter-cell interference, which is a crucial issue in multicell communication systems. We aim for maximizing the weighted sum rate (WSR) of all users through jointly optimizing the active precoding matrices at the base stations (BSs) and the phase shifts at the IRS subject to each BS’s power constraint and unit modulus constraint. Both the BSs and the users are equipped with multiple antennas, which enhances the spectral efficiency by exploiting the spatial multiplexing gain. Due to the non-convexity of the problem, we first reformulate it into an equivalent one, which is solved by using the block coordinate descent (BCD) algorithm, where the precoding matrices and phase shifts are alternately optimized. The optimal precoding matrices can be obtained in closed form, when fixing the phase shifts. A pair of efficient algorithms are proposed for solving the phase shift optimization problem, namely the Majorization-Minimization (MM) Algorithm and the Complex Circle Manifold (CCM) Method. Both algorithms are guaranteed to converge to at least locally optimal solutions. We also extend the proposed algorithms to the more general multiple-IRS and network MIMO scenarios. Finally, our simulation results confirm the advantages of introducing IRSs in enhancing the cell-edge user performance.

865 citations


Journal ArticleDOI
TL;DR: A novel scheme for joint target search and communication channel estimation, which relies on omni-directional pilot signals generated by the HAD structure, is proposed, which is possible to recover the target echoes and mitigate the resulting interference to the UE signals, even when the radar and communication signals share the same signal-to-noise ratio (SNR).
Abstract: Sharing of the frequency bands between radar and communication systems has attracted substantial attention, as it can avoid under-utilization of otherwise permanently allocated spectral resources, thus improving efficiency. Further, there is increasing demand for radar and communication systems that share the hardware platform as well as the frequency band, as this not only decongests the spectrum, but also benefits both sensing and signaling operations via the full cooperation between both functionalities. Nevertheless, the success of spectrum and hardware sharing between radar and communication systems critically depends on high-quality joint radar and communication designs. In the first part of this paper, we overview the research progress in the areas of radar-communication coexistence and dual-functional radar-communication (DFRC) systems, with particular emphasis on application scenarios and technical approaches. In the second part, we propose a novel transceiver architecture and frame structure for a DFRC base station (BS) operating in the millimeter wave (mmWave) band, using the hybrid analog-digital (HAD) beamforming technique. We assume that the BS is serving a multi-antenna user equipment (UE) over a mmWave channel, and at the same time it actively detects targets. The targets also play the role of scatterers for the communication signal. In that framework, we propose a novel scheme for joint target search and communication channel estimation, which relies on omni-directional pilot signals generated by the HAD structure. Given a fully-digital communication precoder and a desired radar transmit beampattern, we propose to design the analog and digital precoders under non-convex constant-modulus (CM) and power constraints, such that the BS can formulate narrow beams towards all the targets, while pre-equalizing the impact of the communication channel. Furthermore, we design a HAD receiver that can simultaneously process signals from the UE and echo waves from the targets. By tracking the angular variation of the targets, we show that it is possible to recover the target echoes and mitigate the resulting interference to the UE signals, even when the radar and communication signals share the same signal-to-noise ratio (SNR). The feasibility and efficiency of the proposed approaches in realizing DFRC are verified via numerical simulations. Finally, the paper concludes with an overview of the open problems in the research field of communication and radar spectrum sharing (CRSS).

846 citations


Journal ArticleDOI
TL;DR: In this paper, the authors proposed a new type of high-gain yet low-cost RIS that bears 256 elements, where positive intrinsic negative (PIN) diodes are used to realize 2-bit phase shifting for beamforming.
Abstract: One of the key enablers of future wireless communications is constituted by massive multiple-input multiple-output (MIMO) systems, which can improve the spectral efficiency by orders of magnitude. In existing massive MIMO systems, however, conventional phased arrays are used for beamforming. This method results in excessive power consumption and high hardware costs. Recently, reconfigurable intelligent surface (RIS) has been considered as one of the revolutionary technologies to enable energy-efficient and smart wireless communications, which is a two-dimensional structure with a large number of passive elements. In this paper, we develop a new type of high-gain yet low-cost RIS that bears 256 elements. The proposed RIS combines the functions of phase shift and radiation together on an electromagnetic surface, where positive intrinsic-negative (PIN) diodes are used to realize 2-bit phase shifting for beamforming. This radical design forms the basis for the world's first wireless communication prototype using RIS having 256 two-bit elements. The prototype consists of modular hardware and flexible software that encompass the following: the hosts for parameter setting and data exchange, the universal software radio peripherals (USRPs) for baseband and radio frequency (RF) signal processing, as well as the RIS for signal transmission and reception. Our performance evaluation confirms the feasibility and efficiency of RISs in wireless communications. We show that, at 2.3 GHz, the proposed RIS can achieve a 21.7 dBi antenna gain. At the millimeter wave (mmWave) frequency, that is, 28.5 GHz, it attains a 19.1 dBi antenna gain. Furthermore, it has been shown that the RIS-based wireless communication prototype developed is capable of significantly reducing the power consumption.

523 citations


Journal ArticleDOI
TL;DR: In this article, the authors review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning and investigate their employment in the compelling applications of wireless networks, including heterogeneous networks, cognitive radios (CR), Internet of Things (IoT), machine to machine networks (M2M), and so on.
Abstract: Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of Things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.

413 citations


Journal ArticleDOI
TL;DR: In this article, the authors investigated the beneficial role of RISs in MEC systems, where single-antenna devices may opt for offloading a fraction of their computational tasks to the edge computing node via a multi-ANTenna access point with the aid of an RIS.
Abstract: Computation off-loading in mobile edge computing (MEC) systems constitutes an efficient paradigm of supporting resource-intensive applications on mobile devices. However, the benefit of MEC cannot be fully exploited, when the communications link used for off-loading computational tasks is hostile. Fortunately, the propagation-induced impairments may be mitigated by intelligent reflecting surfaces (IRS), which are capable of enhancing both the spectral- and energy-efficiency. Specifically, an IRS comprises an IRS controller and a large number of passive reflecting elements, each of which may impose a phase shift on the incident signal, thus collaboratively improving the propagation environment. In this paper, the beneficial role of IRSs is investigated in MEC systems, where single-antenna devices may opt for off-loading a fraction of their computational tasks to the edge computing node via a multi-antenna access point with the aid of an IRS. Pertinent latency-minimization problems are formulated for both single-device and multi-device scenarios, subject to practical constraints imposed on both the edge computing capability and the IRS phase shift design. To solve this problem, the block coordinate descent (BCD) technique is invoked to decouple the original problem into two subproblems, and then the computing and communications settings are alternatively optimized using low-complexity iterative algorithms. It is demonstrated that our IRS-aided MEC system is capable of significantly outperforming the conventional MEC system operating without IRSs. Quantitatively, about 20 % computational latency reduction is achieved over the conventional MEC system in a single cell of a 300 m radius and 5 active devices, relying on a 5-antenna access point.

403 citations


Journal ArticleDOI
TL;DR: In this paper, an intelligent reflecting surface (IRS) is invoked for enhancing the energy harvesting performance of a simultaneous wireless information and power transfer (SWIPT) aided system, where a multiantenna aided base station (BS) communicates with several multi-antenna assisted information receivers (IRs), while guaranteeing the EE requirement of the energy receivers (ERs).
Abstract: An intelligent reflecting surface (IRS) is invoked for enhancing the energy harvesting performance of a simultaneous wireless information and power transfer (SWIPT) aided system. Specifically, an IRS-assisted SWIPT system is considered, where a multi-antenna aided base station (BS) communicates with several multi-antenna assisted information receivers (IRs), while guaranteeing the energy harvesting requirement of the energy receivers (ERs). To maximize the weighted sum rate (WSR) of IRs, the transmit precoding (TPC) matrices of the BS and passive phase shift matrix of the IRS should be jointly optimized. To tackle this challenging optimization problem, we first adopt the classic block coordinate descent (BCD) algorithm for decoupling the original optimization problem into several subproblems and alternately optimize the TPC matrices and the phase shift matrix. For each subproblem, we provide a low-complexity iterative algorithm, which is guaranteed to converge to the Karush-Kuhn-Tucker (KKT) point of each subproblem. The BCD algorithm is rigorously proved to converge to the KKT point of the original problem. We also conceive a feasibility checking method to study its feasibility. Our extensive simulation results confirm that employing IRSs in SWIPT beneficially enhances the system performance and the proposed BCD algorithm converges rapidly, which is appealing for practical applications.

308 citations


Journal ArticleDOI
TL;DR: In this paper, a system for serving paired power-domain non-orthogonal multiple access (NOMA) users by designing the passive beamforming weights at the reconfigurable intelligent surfaces (RISs) is proposed.
Abstract: Reconfigurable intelligent surfaces (RISs) constitute a promising performance enhancement for next-generation (NG) wireless networks in terms of enhancing both their spectral efficiency (SE) and energy efficiency (EE). We conceive a system for serving paired power-domain non-orthogonal multiple access (NOMA) users by designing the passive beamforming weights at the RISs. In an effort to evaluate the network performance, we first derive the best-case and worst-case of new channel statistics for characterizing the effective channel gains. Then, we derive the best-case and worst-case of our closed-form expressions derived both for the outage probability and for the ergodic rate of the prioritized user. For gleaning further insights, we investigate both the diversity orders of the outage probability and the high-signal-to-noise (SNR) slopes of the ergodic rate. We also derive both the SE and EE of the proposed network. Our analytical results demonstrate that the base station (BS)-user links have almost no impact on the diversity orders attained when the number of RISs is high enough. Numerical results are provided for confirming that: i) the high-SNR slope of the RIS-aided network is one; ii) the proposed RIS-aided NOMA network has superior network performance compared to its orthogonal counterpart.

213 citations


Journal ArticleDOI
TL;DR: This Letter reports the first measurement-device-independent(MDI) QSDC protocol with sequences of entangled photon pairs and single photons, which eliminates security loopholes associated with the measurement device.
Abstract: Quantum secure direct communication (QSDC) is a unique technique, which supports the secure transmission of confidential information directly through a quantum channel without the need for a secret key and for ciphertext. Hence this secure communication protocol fundamentally differs from its conventional counterparts. In this article, we report the first measurement-device-independent (MDI) QSDC protocol relying on sequences of entangled photon pairs and single photons. Explicitly, it eliminates the security loopholes associated with the measurement device. Additionally, this MDI technique is capable of doubling the communication distance of its conventional counterpart operating without using our MDI technique. We also conceive a protocol associated with linear optical Bell-basis measurements, where only two of the four Bell-basis states could be measured. When the number of qubits in a sequence reduces to 1, the MDI-QSDC protocol degenerates to a deterministic MDI quantum key distribution protocol.

158 citations


Journal ArticleDOI
TL;DR: In this paper, the authors shed light on the quantum entanglement in the context of quantum teleportation and the challenges in the design and practical application of these functionalities, and acknowledge that quantum information is subject to the deleterious effects of quantum decoherence.
Abstract: Quantum Teleportation is the key communication functionality of the Quantum Internet, allowing the “transmission” of qubits without the physical transfer of the particle storing the qubit. Quantum teleportation is facilitated by the action of quantum entanglement, a somewhat counter-intuitive physical phenomenon with no direct counterpart in the classical word. As a consequence, the very concept of the classical communication system model has to be redesigned to account for the peculiarities of quantum teleportation. This re-design is a crucial prerequisite for constructing any effective quantum communication protocol. The aim of this manuscript is to shed light on this key concept, with the objective of allowing the reader: i) to appreciate the fundamental differences between the transmission of classical information versus the teleportation of quantum information; ii) to understand the communications functionalities underlying quantum teleportation, and to grasp the challenges in the design and practical employment of these functionalities; iii) to acknowledge that quantum information is subject to the deleterious effects of a noise process termed as quantum decoherence. This imperfection has no direct counterpart in the classical world; iv) to recognize how to contribute to the design and employment of the Quantum Internet.

143 citations


Journal ArticleDOI
TL;DR: In this paper, the ergodic sum-rate gain (ESG) of NOMA over orthogonal multiple access (OMA) in uplink cellular communication systems was investigated and revealed.
Abstract: In this paper, we investigate and reveal the ergodic sum-rate gain (ESG) of non-orthogonal multiple access (NOMA) over orthogonal multiple access (OMA) in uplink cellular communication systems. A base station equipped with a single-antenna, with multiple antennas, and with massive antenna arrays is considered both in single-cell and multi-cell deployments. In particular, in single-antenna systems, we identify two types of gains brought about by NOMA: 1) a large-scale near-far gain arising from the distance discrepancy between the base station and users; 2) a small-scale fading gain originating from the multipath channel fading. Furthermore, we reveal that the large-scale near-far gain increases with the normalized cell size, while the small-scale fading gain is a constant, given by $\gamma = 0.57721$ nat/s/Hz, in Rayleigh fading channels. When extending single-antenna NOMA to M -antenna NOMA, we prove that both the large-scale near-far gain and small-scale fading gain achieved by single-antenna NOMA can be increased by a factor of M for a large number of users. Moreover, given a massive antenna array at the base station and considering a fixed ratio between the number of antennas, M , and the number of users, K , the ESG of NOMA over OMA increases linearly with both M and K . We then further extend the analysis to a multi-cell scenario. Compared to the single-cell case, the ESG in multi-cell systems degrades as NOMA faces more severe inter-cell interference due to the non-orthogonal transmissions. Besides, we unveil that a large cell size is always beneficial to the ergodic sum-rate performance of NOMA in both single-cell and multi-cell systems. Numerical results verify the accuracy of the analytical results derived and confirm the insights revealed about the ESG of NOMA over OMA in different scenarios.

130 citations


Posted Content
TL;DR: In this article, a distributed caching optimization algorithm via belief propagation (BP) for minimizing the downloading latency is proposed, where the authors derive the delay minimization objective function and formulate an optimization problem.
Abstract: Heterogeneous cellular networks (HCN) with embedded small cells are considered, where multiple mobile users wish to download network content of different popularity. By caching data into the small-cell base stations (SBS), we will design distributed caching optimization algorithms via belief propagation (BP) for minimizing the downloading latency. First, we derive the delay-minimization objective function (OF) and formulate an optimization problem. Then we develop a framework for modeling the underlying HCN topology with the aid of a factor graph. Furthermore, distributed BP algorithm is proposed based on the network's factor graph. Next, we prove that a fixed point of convergence exists for our distributed BP algorithm. In order to reduce the complexity of the BP, we propose a heuristic BP algorithm. Furthermore, we evaluate the average downloading performance of our HCN for different numbers and locations of the base stations (BS) and mobile users (MU), with the aid of stochastic geometry theory. By modeling the nodes distributions using a Poisson point process, we develop the expressions of the average factor graph degree distribution, as well as an upper bound of the outage probability for random caching schemes. We also improve the performance of random caching. Our simulations show that (1) the proposed distributed BP algorithm has a near-optimal delay performance, approaching that of the high-complexity exhaustive search method, (2) the modified BP offers a good delay performance at a low communication complexity, (3) both the average degree distribution and the outage upper bound analysis relying on stochastic geometry match well with our Monte-Carlo simulations, and (4) the optimization based on the upper bound provides both a better outage and a better delay performance than the benchmarks.

Journal ArticleDOI
TL;DR: A pair of dominant methodologies of using DL for wireless communications are investigated, including DL-based architecture design, which breaks the classical model-based block design rule of wireless communications in the past decades.
Abstract: Wireless communications are envisioned to bring about dramatic changes in the future, with a variety of emerging applications, such as virtual reality, Internet of Things, and so on, becoming a reality. However, these compelling applications have imposed many new challenges, including unknown channel models, low-latency requirement in large-scale super-dense networks, and so on. The amazing success of deep learning in various fields, particularly in computer science, has recently stimulated increasing interest in applying it to address those challenges. Hence, in this review, a pair of dominant methodologies of using DL for wireless communications are investigated. The first one is DL-based architecture design, which breaks the classical model-based block design rule of wireless communications in the past decades. The second one is DL-based algorithm design, which will be illustrated by several examples in a series of typical techniques conceived for 5G and beyond. Their principles, key features, and performance gains will be discussed. Open problems and future research opportunities will also be pointed out, highlighting the interplay between DL and wireless communications. We expect that this review can stimulate more novel ideas and exciting contributions for intelligent wireless communications.

Journal ArticleDOI
TL;DR: This paper provides a comprehensive survey of lightweight security solutions conceived for IoT, relying on key generation from wireless channels, and demonstrates that key generation relying on the randomness of wireless channels is eminently suitable for IoT.
Abstract: The Internet of Things (IoT) is a transformative technology, which is revolutionizing our everyday life by connecting everyone and everything together. The massive number of devices are preferably connected wirelessly because of the easy installment and flexible deployment. However, the broadcast nature of the wireless medium makes the information accessible to everyone including malicious users, which should hence be protected by encryption. Unfortunately, the secure and efficient provision of cryptographic keys for low-cost IoT devices is challenging; weak keys have resulted in severe security breaches, as evidenced by numerous notorious cyberattacks. This paper provides a comprehensive survey of lightweight security solutions conceived for IoT, relying on key generation from wireless channels. We first introduce the key generation fundamentals and protocols. We then examine how to apply this emerging technique to secure IoT and demonstrate that key generation relying on the randomness of wireless channels is eminently suitable for IoT. This paper reviews the extensive research efforts in the areas of theoretical modelling, simulation based validation and experimental exploration. We finally discuss the hurdles and challenges that key generation is facing and suggest future work to make key generation a reliable and secure solution to safeguard the IoT.

Journal ArticleDOI
TL;DR: It is demonstrated that the QMF-DL04 QSDC scheme significantly increases both the secure information rate and the communication distance of the original DL04 protocol, and significantly improves the originalDL04QSDC’s robustness.
Abstract: Quantum secure direct communication (QSDC) is capable of direct confidential communications over a quantum channel, which is achieved by dispensing with the key agreement channel of the well-known quantum key distribution (QKD) However, to make QSDC a practical reality, we have to mitigate its reliance on quantum memory, its immediate communication interruption caused by eavesdropping and its low transmission reliability due to the heavy qubit losses Hence a new QSDC protocol is proposed based on a sophisticated coded single-photon DL04 QSDC protocol to tackle the open challenges In particular, quantum memory is dispensed with and a high-accuracy secrecy capacity estimate is derived for this protocol by conceiving dynamic joint encryption and error-control (JEEC) coding We demonstrate that this quantum-memory-free DL04 QSDC (QMF-DL04 QSDC) protocol inches closer to the quantum channel’s capacity and significantly improves the original DL04 QSDC’s robustness Moreover, a rate-compatible low-rate JEEC coding scheme is designed for the proposed framework, and the JEEC code advocated is shown to approach the secrecy capacity, despite tolerating an extremely high loss of qubits in the time-varying wiretap channel Our simulations and experimental results demonstrate that the QMF-DL04 QSDC scheme significantly increases both the secure information rate and the communication distance of the original DL04 protocol

Journal ArticleDOI
TL;DR: A combined uplink FTN-SCMA system in which the data symbols corresponding to a user are further packed using FTN signaling, and a low complexity iterative receiver based on the factor graph framework is designed.
Abstract: The sparse code multiple access (SCMA) is a promising candidate for bandwidth-efficient next generation wireless communications, since it can support more users than the number of resource elements. On the same note, faster-than-Nyquist (FTN) signaling can also be used to improve the spectral efficiency. Hence in this paper, we consider a combined uplink FTN-SCMA system in which the data symbols corresponding to a user are further packed using FTN signaling. As a result, a higher spectral efficiency is achieved at the cost of introducing intentional inter-symbol interference (ISI). To perform joint channel estimation and detection, we design a low complexity iterative receiver based on the factor graph framework. In addition, to reduce the signaling overhead and transmission latency of our SCMA system, we intrinsically amalgamate it with grant-free scheme. Consequently, the active and inactive users should be distinguished. To address this problem, we extend the aforementioned receiver and develop a new algorithm for jointly estimating the channel state information, detecting the user activity and for performs data detection. In order to further reduce the complexity, an energy minimization based approximation is employed for restricting the user state to Gaussian. Finally, a hybrid message passing algorithm is conceived. Our Simulation results show that the FTN-SCMA system relying on the proposed receiver design has a higher throughput than conventional SCMA scheme at a negligible performance loss.

Journal ArticleDOI
TL;DR: A unified, big data-aided machinelearning framework is proposed that consists of feature extraction, data modeling, and prediction/online refinement that can refine the motivation, problem formulations, and methodology of powerful machine-learning algorithms in the context of wireless networks.
Abstract: We have witnessed an exponential growth in commercial data services, which has led to the so-called big data era. Machine learning, one of the most promising artificial intelligence (AI) tools for analyzing this deluge of data, has been called upon in many industry and academic research areas. In this article, we briefly review big data analysis and machine learning, along with their potential applications in next-generation (NG) wireless networks. Next, we invoke big data analysis to predict the requirements of mobile users and exploit such analysis to improve the performance of "social network-aware wireless." In particular, a unified, big data-aided machinelearning framework is proposed that consists of feature extraction, data modeling, and prediction/online refinement. The main benefits of this proposed framework are that, by relying on big data that reflects both the spectral and other challenging requirements of users, we can refine the motivation, problem formulations, and methodology of powerful machine-learning algorithms in the context of wireless networks.

Journal ArticleDOI
TL;DR: This article considers image classification tasks in UAV-aided exploration scenarios, where the coordination of multiple UAVs is implemented by a ground fusion center (GFC) positioned in a strategic, but inaccessible location, where recharging the battery is uneconomical or may even be infeasible.
Abstract: Unmanned aerial vehicles (UAVs) have been recognized as a promising technology to be used in a wide range of civilian, public and military applications. However, given their limited payload and flight time, multiple UAVs may have to be harnessed for accomplishing complex high-level tasks, where a control center can be employed for coordinating their actions. In this article, we consider image classification tasks in UAV-aided exploration scenarios, where the coordination of multiple UAVs is implemented by a ground fusion center (GFC) positioned in a strategic, but inaccessible location, such as a mountain top, where recharging the battery is uneconomical or may even be infeasible. On-board cameras are carried by each UAV and then, federated learning (FL) is invoked for reducing the communication cost between the UAVs and the GFC, and the computational complexity imposed on the GFC. In our proposed FL-aided classification approach, initially local training is performed by each UAV based on the locally collected images to create a local model. Then, each UAV sends its locally acquired model to the GFC via a fading wireless channel, where a global model is generated, which is then fed back to each UAV for the next round of their local training. In order to further minimize the computational complexity imposed on the GFC by the UAVs, weighted zero-forcing (WZF) transmit precoding (TPC) is used at each UAV based on realistic imperfect channel state information (CSI). The system performance attained is evaluated by simulations, showing that the proposed system is capable of attaining a high classification accuracy at relatively low communication cost.

Journal ArticleDOI
TL;DR: A joint user activity tracking and data detection algorithm based on the factor graph framework, which relies on a sophisticated amalgam of expectation maximization (EM) and hybrid message passing algorithms is proposed, which is effective in tracking user activity and detecting data symbols in dynamic random access systems.
Abstract: Given the requirements of increased data rate and massive connectivity in the Internet-of-things (IoT) applications of the fifth-generation communication systems (5G), non-orthogonal multiple access (NOMA) was shown to be capable of supporting more users than OMA. As a further potential enhancement, the faster-than-Nyquist (FTN) signaling is also capable of increasing the symbol rate. Since NOMA and FTN signaling impose non-orthogonalities from different perspectives, it is possible to achieve further increased spectral efficiency by exploiting both. Hence we investigate the FTN-NOMA uplink in the context of random access. Although random access schemes reduce the signaling overheads as well as latency, they require the base station to identify active users before performing data detection. As both inter-symbol and inter-user interferences exist, performing optimal detection requires a prohibitively high complexity. Moreover, in typical mobile communication environments, the channel envelope of users fluctuates violently, which imposes challenges on the receiver design. To tackle this problem, we propose a joint user activity tracking and data detection algorithm based on the factor graph framework, which relies on a sophisticated amalgam of expectation maximization (EM) and hybrid message passing algorithms. The complexity of the algorithm advocated only increases linearly with the number of active users. Our simulation results show that the proposed algorithm is effective in tracking user activity and detecting data symbols in dynamic random access systems.

Journal ArticleDOI
TL;DR: A joint hybrid beamforming and resource allocation algorithm for mmWave MEC and the superiority of the proposed algorithm is demonstrated by quantifying the benefits of intrinsically amalgamating MEC with mmWave communications.
Abstract: Mobile edge computing (MEC) has been identified as a key technique of next-generation wireless networks, which supports cloud computing along with other compelling service capabilities at the network’s edge with the objective of reducing the system delay. As one of the prospective candidates for new spectrum in next-generation networks, millimeter wave (mmWave) communications has been gaining significant attention as a benefit of its high rate. Hence we conceive a joint hybrid beamforming and resource allocation algorithm for mmWave MEC. Explicitly, we jointly optimize the analog beamforming vectors at the users, the analog and digital beamforming matrices at the base station (BS), the computation task offloading ratios and resource allocation at the MEC server for minimizing the maximum system delay subject to the affordable communication and computing budget. We conceive a powerful algorithm for solving this challenging nonconvex optimization problem with coupled constraints based on the penalty dual decomposition (PDD) technique. The proposed algorithm can be implemented in a parallel and distributed fashion. Our numerical results demonstrate the superiority of the proposed algorithm by quantifying the benefits of intrinsically amalgamating MEC with mmWave communications.

Journal ArticleDOI
TL;DR: The downlink (DL) of a non-orthogonal-multiple-access (NOMA)-based cell-free massive multiple-input multiple-output (MIMO) system is analyzed, where the channel state information (CSI) is estimated using pilots.
Abstract: The downlink (DL) of a non-orthogonal-multiple-access (NOMA)-based cell-free massive multiple-input multiple-output (MIMO) system is analyzed, where the channel state information (CSI) is estimated using pilots. It is assumed that the users are grouped into multiple clusters. The same pilot sequences are assigned to the users within the same clusters whereas the pilots allocated to all clusters are mutually orthogonal. First, a user’s bandwidth efficiency (BE) is derived based on his/her channel statistics under the assumption of employing successive interference cancellation (SIC) at the users’ end with no DL training. Next, the classic max-min optimization framework is invoked for maximizing the minimum BE of a user under per-access point (AP) power constraints. The max-min user BE of NOMA-based cell-free massive MIMO is compared to that of its orthogonal multiple-access (OMA) counter part, where all users employ orthogonal pilots. Finally, our numerical results are presented and an operating mode switching scheme is proposed based on the average per-user BE of the system, where the mode set is given by Mode = { OMA, NOMA }. Our numerical results confirm that the switching point between the NOMA and OMA modes depends both on the length of the channel’s coherence time and on the total number of users.

Journal ArticleDOI
TL;DR: An adaptive scheme by relying on the graph embedding technique during the state representation and reinforcement learning in the training phase can beneficially reduce the epidemiological reproduction rate of the infection.
Abstract: The recent outbreak of the coronavirus disease 2019 (COVID-19) has rapidly become a pandemic, which calls for prompt action in identifying suspected cases at an early stage through risk prediction To suppress its further spread, we exploit the social relationships between mobile devices in the Social Internet of Things (SIoT) to help control its propagation by allocating the limited protective resources to the influential so-called high-degree individuals to stem the tide of precipitated spreading By exploiting the so-called differential contact intensity and the infectious rate in susceptible-exposed-infected-removed (SEIR) epidemic model, the resultant optimization problem can be transformed into the minimum weight vertex cover (MWVC) problem of graph theory To solve this problem in a high-dynamic random network topology, we propose an adaptive scheme by relying on the graph embedding technique during the state representation and reinforcement learning in the training phase By relying on a pair of real-life datasets, the results demonstrate that our scheme can beneficially reduce the epidemiological reproduction rate of the infection This technique has the potential of assisting in the early identification of COVID-19 cases

Journal ArticleDOI
TL;DR: The error correction and error detection performance of the 3GPP NR polar codes in the uplink, broadcast and downlink control channels is comprehensively characterized.
Abstract: Since their inception in 2008, polar codes have been shown to offer near-capacity error correction performance across a wide range of block lengths and coding rates. Owing to this, polar codes have been selected to provide channel coding in the control channels of Third Generation Partnership Project (3GPP) New Radio (NR). The operation of the 3GPP NR polar codes is specified in the 3GPP standard TS 38.212, together with schemes for code block segmentation, Cyclic Redundancy Check (CRC) attachment, CRC scrambling, CRC interleaving, frozen and parity check bit insertion, sub-block interleaving, bit selection, channel interleaving and code block concatenation. The configuration of these components is different for the uplink, broadcast and downlink control channels. However, the lack of visualisations and diagrammatic explanations in TS 38.212 limits the accessibility of the standard to new readers. This motivates the aims of the paper, which provides detailed tutorials on the operation and motivation of the components of the 3GPP NR polar codes, as well as surveys of the 3GPP discussions that led to their specification. Furthermore, we comprehensively characterize the error correction and error detection performance of the 3GPP NR polar codes in the uplink, broadcast and downlink control channels.

Journal ArticleDOI
TL;DR: A novel framework for enhancing the driving safety and fuel economy of autonomous vehicles (AVs) with the aid of vehicle-to-infrastructure (V2I) communication networks is proposed and a deep reinforcement learning (DRL) approach is proposed for making collision-free decisions.
Abstract: A novel framework is proposed for enhancing the driving safety and fuel economy of autonomous vehicles (AVs) with the aid of vehicle-to-infrastructure (V2I) communication networks. The problem of driving trajectory design is formulated for minimizing the total fuel consumption, while enhancing driving safety (by obeying the traffic rules and avoiding obstacles). In an effort to solve this pertinent problem, a deep reinforcement learning (DRL) approach is proposed for making collision-free decisions. Firstly, a deep Q-network (DQN) aided algorithm is proposed for determining the trajectory and velocity of the AV by receiving real-time traffic information from the base stations (BSs). More particularly, the AV acts as an agent to carry out optimal action such as lane change and velocity change by interacting with the environment. Secondly, to overcome the large overestimation of action values by the Q-learning model, a double deep Q-network (DDQN) algorithm is proposed by decomposing the max-Q-value operation into action selection and action evaluation. Additionally, three practical driving policies are also proposed as benchmarks. Numerical results are provided for demonstrating that the proposed trajectory design algorithms are capable of enhancing the driving safety and fuel economy of AVs. We demonstrate that the proposed DDQN based algorithm outperforms the DQN based algorithm. Additionally, it is also demonstrated that the proposed fuel-economy (FE) based driving policy derived from the DRL algorithm is capable of achieving in excess of 24% of fuel savings over the benchmarks.

Journal ArticleDOI
TL;DR: This article proposes a hybrid relaying (HR) approach employing a pair of orthogonal frequency bands and proposes furthermore a simplified algorithm based on the inexact block coordinate descent (IBCD) method, which leads to much lower computational complexity.
Abstract: In this article, relay-assisted computation offloading (RACO) is investigated, where user $A$ wishes to share the results of computational tasks with another user $B$ with the assistance of a mobile-edge relay server (MERS). To enable this computation offloading, we propose a hybrid relaying (HR) approach employing a pair of orthogonal frequency bands, which are, respectively, used for the amplify–forward relaying of computational results and the decode–forward relaying of the unprocessed raw tasks. The motivation here is to adapt the allocation of computing and communication resources both to dynamic user requirements and to diverse computational tasks. Using this framework, we seek to minimize the weighted sum of the execution delays and the energy consumption in the RACO system by jointly optimizing the computation offloading ratio, the bandwidth allocation, the processor speeds, as well as the transmit power levels of both user $A$ and the MERS, under some practical constraints. By adopting a series of transformations, we first recast this problem into a form amenable to optimization and then develop an efficient iterative algorithm for its solution based on the concave–convex procedure (CCCP). By virtue of the particular problem structure in our case, we propose furthermore a simplified algorithm based on the inexact block coordinate descent (IBCD) method, which leads us to much lower computational complexity. Finally, our numerical results demonstrate the advantages of the proposed algorithms over the state-of-the-art benchmark schemes.

Journal ArticleDOI
TL;DR: It is shown that frequency- domain equalization fails to reliably detect the FTN signal with a low FTN packing factor, while the time-domain equalization still performs well.
Abstract: Faster-than-Nyquist (FTN) signaling has been recognized as a promising technique for next-generation high data rate communications. By intentionally reducing the symbol interval, FTN signaling is capable of transmitting more symbols than classic Nyquist signaling within the same time period and bandwidth. However, the intentional non-orthogonality of the bandlimited signaling pulses imposes severe inter-symbol interference (ISI), which requires powerful equalization at the receiver. Hence, we embark on the comparison of time- and frequency-domain equalization for FTN signaling both by theoretical analysis and numerical simulations. It is shown that frequency-domain equalization fails to reliably detect the FTN signal with a low FTN packing factor, while the time-domain equalization still performs well.

Posted Content
TL;DR: This work investigates the physical layer security of the downlink in IRS-aided non-orthogonal multiple access networks in the presence of an eavesdropper, where an IRS is deployed for enhancing the quality by assisting the cell-edge user to communicate with the base station.
Abstract: Intelligent reflective surface (IRS) technology is emerging as a promising performance enhancement technique for next-generation wireless networks. Hence, we investigate the physical layer security of the downlink in IRS-aided non-orthogonal multiple access networks in the presence of an eavesdropper, where an IRS is deployed for enhancing the quality by assisting the cell-edge user to communicate with the base station. To characterize the network's performance, the expected value of the new channel statistics is derived for the reflected links in the case of Nakagami-m fading. Furthermore, the performance of the proposed network is evaluated both in terms of the secrecy outage probability (SOP) and the average secrecy capacity (ASC). The closed-form expressions of the SOP and the ASC are derived. We also study the impact of various network parameters on the overall performance of the network considered. To obtain further insights, the secrecy diversity orders and the high signal-to-noise ratio slopes are obtained. We finally show that: 1) the expectation of the channel gain in the reflected links is determined both by the number of IRSs and by the Nakagami-m fading parameters; 2) The SOP of both receiver 1 and receiver 2 becomes unity, when the number of IRSs is sufficiently high; 3) The secrecy diversity orders are affected both by the number of IRSs and by the Nakagami-m fading parameters, whereas the high-SNR slopes are not affected by these parameters. Our Monte-Carlo simulations perfectly demonstrate the analytical results.

Journal ArticleDOI
TL;DR: The simulation results match the analytical results well, which show that the coverage probability of the network first increases upon increasing the THz UAV BS density, and then decreases beyond the maximum, which indicates that a higher UAV density is required for a certain coverage probability than at lower carrier frequencies.
Abstract: Terahertz (THz) transmission technologies constitute a promising candidate for supporting ultra-broadband short-range next generation communications. Hence, we analyse the performance of unmanned aerial vehicle (UAV) in the THz networks. The coverage probability is derived as well as the area spectral efficiency (ASE) and a pair of Line-of-sight (LoS)/non-line-of-sight (NLoS) probability models, namely the macrocell LoS/NLoS probability model and picocell LoS/NLoS probability model are adopted. Furthermore, the lower-bound of the network performance are derived via homogeneous Poisson point process (HPPP) analysis, as well as the upper-bound. The simulation results match the analytical results well, which show that the coverage probability of the network first increases upon increasing the THz UAV BS density, and then decreases beyond the maximum. Given the severe path loss experienced by THz signals, a higher UAV density is required for a certain coverage probability than at lower carrier frequencies.

Journal ArticleDOI
TL;DR: This work proposes a pair of novel trajectory optimization algorithms based on stochastic modelling and reinforcement learning, which allows the UAV to optimize its flight trajectory without the need for system identification.
Abstract: Unmanned aerial vehicles (UAVs) with the potential of providing reliable high-rate connectivity, are becoming a promising component of future wireless networks. A UAV collects data from a set of randomly distributed sensors, where both the locations of these sensors and their data volume to be transmitted are unknown to the UAV. In order to assist the UAV in finding the optimal motion trajectory in the face of the uncertainty without the above knowledge whilst aiming for maximizing the cumulative collected data, we formulate a reinforcement learning problem by modelling the motion-trajectory as a Markov decision process with the UAV acting as the learning agent. Then, we propose a pair of novel trajectory optimization algorithms based on stochastic modelling and reinforcement learning, which allows the UAV to optimize its flight trajectory without the need for system identification. More specifically, by dividing the considered region into small tiles, we conceive state-action-reward-state-action (Sarsa) and $Q$-learning based UAV-trajectory optimization algorithms (i.e., SUTOA and QUTOA) aiming to maximize the cumulative data collected during the finite flight-time. Our simulation results demonstrate that both of the proposed approaches are capable of finding an optimal trajectory under the flight-time constraint. The preference for QUTOA vs. SUTOA depends on the relative position of the start and the end points of the UAVs.

Journal ArticleDOI
TL;DR: The time-domain beam scheduling problem for downlink ICI avoidance is investigated by modeling the entire network as a graph, where the number of time slots occupied by each beam is considered as a constraint to guarantee service quality and a least beam collision algorithm is proposed.
Abstract: The application of high directional beam in millimeter wave leads to a new downlink inter-cell interference (ICI) characteristic that the ICI is high only if the beam of a neighboring cell points towards a user in local cell. This characteristic indicates that the ICI can be avoided if the beams in the network are scheduled coordinately. In this paper, we investigate the time-domain beam scheduling problem for downlink ICI avoidance by modeling the entire network as a graph, where the number of time slots occupied by each beam is considered as a constraint to guarantee service quality. The beams in each cell are classified according to the neighboring cells they may interfere with. If two adjacent cells simultaneously use the beam which may interfere with each other, beam collision occurs, leading to strong ICI. Based on graph theory, we propose a least beam collision (LBC) algorithm to minimize the number of beam collisions, and we prove that this LBC algorithm is capable of acquiring the global minimum beam collision solution. Our simulation results verify that the strong ICI between two neighboring cells can be efficiently eliminated, which benefits the transmission reliability and the network's sum rate.

Journal ArticleDOI
TL;DR: This paper analyses the performance of filter bank multicarrier (FBMC) signaling in conjunction with offset quadrature amplitude modulation (OQAM) in multi-user (MU) massive multiple-input multiple-output (MIMO) systems and presents numerical results to demonstrate the close match between analysis and simulations.
Abstract: This paper analyses the performance of filter bank multicarrier (FBMC) signaling in conjunction with offset quadrature amplitude modulation (OQAM) in multi-user (MU) massive multiple-input multiple-output (MIMO) systems. Initially, closed form expressions are derived for tight lower bounds corresponding to the achievable uplink sum-rates for FBMC-based single-cell MU massive MIMO systems relying on maximum ratio combining (MRC), zero forcing (ZF) and minimum mean square error (MMSE) receiver processing with/without perfect channel state information (CSI) at the base station (BS). This is achieved by exploiting the statistical properties of the intrinsic interference that is characteristic of FBMC systems. Analytical results are also developed for power scaling in the uplink of MU massive MIMO-FBMC systems. The above analysis of the achievable sum-rates and corresponding power scaling laws is subsequently extended to multi-cell scenarios considering both perfect as well as imperfect CSI, and the effect of pilot contamination. The delay-spread-induced performance erosion imposed on the linear processing aided BS receiver is numerically quantified by simulations. Numerical results are presented to demonstrate the close match between our analysis and simulations, and to illustrate and compare the performance of FBMC and traditional orthogonal frequency division multiplexing (OFDM)-based MU massive MIMO systems.