scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Transactions on Communications in 2010"


Journal ArticleDOI
TL;DR: This paper considers the special case of flat-fading channels to develop an upper bound on energy efficiency and to characterize its variation with bandwidth, channel gain and circuit power, and demonstrates the fundamental tradeoff between energy-efficient and spectrum-efficient transmission.
Abstract: Energy efficiency is becoming increasingly important for small form factor mobile devices, as battery technology has not kept up with the growing requirements stemming from ubiquitous multimedia applications. This paper addresses link adaptive transmission for maximizing energy efficiency, as measured by the "throughput per Joule" metric. In contrast to the existing water-filling power allocation schemes that maximize throughput subject to a fixed overall transmit power constraint, our scheme maximizes energy efficiency by adapting both overall transmit power and its allocation, according to the channel states and the circuit power consumed. We demonstrate the existence of a unique globally optimal link adaptation solution and develop iterative algorithms to obtain it. We further consider the special case of flat-fading channels to develop an upper bound on energy efficiency and to characterize its variation with bandwidth, channel gain and circuit power. Our results for OFDM systems demonstrate improved energy savings with energy optimal link adaptation as well as illustrate the fundamental tradeoff between energy-efficient and spectrum-efficient transmission.

651 citations


Journal ArticleDOI
TL;DR: This paper surveys and unifies a number of recent contributions that have collectively developed a metric for decentralized wireless network analysis known as transmission capacity and applies it to show how TC can be used to better understand scheduling, power control, and the deployment of multiple antennas in a decentralized network.
Abstract: This paper surveys and unifies a number of recent contributions that have collectively developed a metric for decentralized wireless network analysis known as transmission capacity. Although it is notoriously difficult to derive general end-to-end capacity results for multi-terminal or adhoc networks, the transmission capacity (TC) framework allows for quantification of achievable single-hop rates by focusing on a simplified physical/MAC-layer model. By using stochastic geometry to quantify the multi-user interference in the network, the relationship between the optimal spatial density and success probability of transmissions in the network can be determined, and expressed-often fairly simply-in terms of the key network parameters. The basic model and analytical tools are first discussed and applied to a simple network with path loss only and we present tight upper and lower bounds on transmission capacity (via lower and upper bounds on outage probability). We then introduce random channels (fading/shadowing) and give TC and outage approximations for an arbitrary channel distribution, as well as exact results for the special cases of Rayleigh and Nakagami fading. We then apply these results to show how TC can be used to better understand scheduling, power control, and the deployment of multiple antennas in a decentralized network. The paper closes by discussing shortcomings in the model as well as future research directions.

417 citations


Journal ArticleDOI
TL;DR: By making different assumptions on the availability of the white noise power value at the CR receiver, two algorithms are derived that are shown to outperform the standard energy detector.
Abstract: In this letter, we propose multi-antenna based spectrum sensing methods for cognitive radios (CRs) using the generalized likelihood ratio test (GLRT) paradigm. The proposed methods utilize the eigenvalues of the sample covariance matrix of the received signal vector from multiple antennas, taking advantage of the fact that in practice, the primary user signals to be detected will either occupy a subspace of dimension strictly smaller than the dimension of the observation space, or have a non-white spatial spectrum. These methods do not require prior knowledge of the primary user signals, or the channels from the primary users to the CR. By making different assumptions on the availability of the white noise power value at the CR receiver, we derive two algorithms that are shown to outperform the standard energy detector.

401 citations


Journal ArticleDOI
TL;DR: This paper investigates the performance of the best-relay selection scheme where the "best" relay only participates in the relaying, a general mathematical probability model is developed and closed-form expressions for the outage probability and average channel capacity are derived.
Abstract: Cooperative diversity is a relatively new technique that can be used to improve the performance of the wireless networks. The main advantage of this technique is that the diversity gain can be achieved without the need to install multiple antennas at the transmitter or the receiver. In this paper, we investigate the performance of the best-relay selection scheme where the "best" relay only participates in the relaying. Therefore, two channels only are needed in this case (one for the direct link and the other one for the best indirect link) regardless of the number of relays (M). The best relay is selected as the relay node that can achieve the highest signal-to-noise ratio at the destination node. A general mathematical probability model is developed to study the outage performance of the best-relay selection adaptive decode-and-forward cooperative networks. In particular, closed-form expressions for the outage probability and average channel capacity are derived. Results show that the best-relay selection not only reduces the amount of required resources but also can maintain a full diversity order.

287 citations


Journal ArticleDOI
TL;DR: This work proposes a novel Space-Time Shift Keying (STSK) modulation scheme for Multiple-Input Multiple-Output (MIMO) communication systems, where the concept of SM is extended to include both the space and time dimensions, in order to provide a general shift-keying framework.
Abstract: Motivated by the recent concept of Spatial Modulation (SM), we propose a novel Space-Time Shift Keying (STSK) modulation scheme for Multiple-Input Multiple-Output (MIMO) communication systems, where the concept of SM is extended to include both the space and time dimensions, in order to provide a general shift-keying framework. More specifically, in the proposed STSK scheme one out of Q dispersion matrices is activated during each transmitted block, which enables us to strike a flexible diversity and multiplexing tradeoff. This is achieved by optimizing both the space-time block duration as well as the number of the dispersion matrices in addition to the number of transmit and receive antennas. We will demonstrate that the resultant equivalent system model does not impose any Inter-Channel Interference (ICI), and hence the employment of single-stream Maximum Likelihood (ML) detection becomes realistic at a low-complexity. Furthermore, we propose a Differential STSK (DSTSK) scheme, assisted by the Cayley unitary transform, which does not require any Channel State Information (CSI) at the receiver. Here, the usual error-doubling, caused by the differential decoding, gives rise to 3-dB performance penalty in comparison to Coherent STSK (CSTSK). Additionally, we introduce an enhanced CSTSK scheme, which avoids the requirement of Inter-Antenna Synchronization (IAS) between the RF chains associated with the transmit Antenna Elements (AEs) by imposing a certain constraint on the dispersion matrix design, where each column of the dispersion matrices includes only a single non-zero component. Moreover, according to the turbo-coding principle, the proposed CSTSK and DSTSK schemes are combined with multiple serially concatenated codes and an iterative bit-to-symbol soft-demapper. More specifically, the associated STSK parameters are optimized with the aid of Extrinsic Information Transfer (EXIT) charts, for the sake of achieving a near-capacity performance.

263 citations


Journal ArticleDOI
TL;DR: An evolutionary game framework is proposed to answer the question of "how to collaborate" in multiuser de-centralized cooperative spectrum sensing, because evolutionary game theory provides an excellent means to address the strategic uncertainty that a user/player may face.
Abstract: Cooperative spectrum sensing has been shown to be able to greatly improve the sensing performance in cognitive radio networks. However, if cognitive users belong to different service providers, they tend to contribute less in sensing in order to increase their own throughput. In this paper, we propose an evolutionary game framework to answer the question of "how to collaborate" in multiuser de-centralized cooperative spectrum sensing, because evolutionary game theory provides an excellent means to address the strategic uncertainty that a user/player may face by exploring different actions, adaptively learning during the strategic interactions, and approaching the best response strategy under changing conditions and environments using replicator dynamics. We derive the behavior dynamics and the evolutionarily stable strategy (ESS) of the secondary users. We then prove that the dynamics converge to the ESS, which renders the possibility of a de-centralized implementation of the proposed sensing game. According to the dynamics, we further develop a distributed learning algorithm so that the secondary users approach the ESS solely based on their own payoff observations. Simulation results show that the average throughput achieved in the proposed cooperative sensing game is higher than the case where secondary users sense the primary user individually without cooperation. The proposed game is demonstrated to converge to the ESS, and achieve a higher system throughput than the fully cooperative scenario, where all users contribute to sensing in every time slot.

233 citations


Journal ArticleDOI
TL;DR: In this letter, a dual-hop relay fading channel in an interference-limited environment is analyzed and it is shown that in terms of the outage probability performance, the worst scenario appears to be the case with equal received-power interferers, for a given total received interference power.
Abstract: In this letter, we analyze the outage performance of a dual-hop relay fading channel in an interference-limited environment. We first derive closed-form expressions for the outage probability of both the amplify-and-forward (AF) and the decode-and-forward (DF) relay channels, based on which, the diversity analysis is conducted. In addition, we show that in terms of the outage probability performance, the worst scenario appears to be the case with equal received-power interferers, for a given total received interference power.

228 citations


Journal ArticleDOI
TL;DR: An efficient implementation of the Extended Min-Sum (EMS) decoder is proposed which reduces the order of complexity to ¿(nm log2 nm) and starts to be reasonable enough to compete with binary decoders.
Abstract: In this paper, we propose a new implementation of the Extended Min-Sum (EMS) decoder for non-binary LDPC codes. A particularity of the new algorithm is that it takes into accounts the memory problem of the non-binary LDPC decoders, together with a significant complexity reduction per decoding iteration. The key feature of our decoder is to truncate the vector messages of the decoder to a limited number nm of values in order to reduce the memory requirements. Using the truncated messages, we propose an efficient implementation of the EMS decoder which reduces the order of complexity to ?(nm log2 nm). This complexity starts to be reasonable enough to compete with binary decoders. The performance of the low complexity algorithm with proper compensation is quite good with respect to the important complexity reduction, which is shown both with a simulated density evolution approach and actual simulations.

225 citations


Journal ArticleDOI
TL;DR: The multimode model is proposed, which provides an analytical expression for the received power and the power delay profile at any position in a tunnel and is extended to characterize the room-and-pillar channel in the underground mines after combining it with the shadow fading model.
Abstract: Wireless networks can greatly facilitate the communication in underground mines and road/subway tunnels, where the propagation characteristics of electromagnetic (EM) waves are significantly different from those in terrestrial environments. According to the structure of underground mines and road tunnels, two types of channel models can be utilized, namely, tunnel and room/pillar channel models. However, there exists no theoretical model for room-and-pillar channel in underground mines to date, and current existing tunnel channel models do not provide an analytical solution for both near and far regions of the sources. In this paper, the multimode model is proposed, which provides an analytical expression for the received power and the power delay profile at any position in a tunnel.Moreover, the multimode model is extended to characterize the room-and-pillar channel in the underground mines after combining it with the shadow fading model. The theoretical models are validated by experimental measurements. Based on the proposed channel models, the effects of various factors on the signal propagation are analyzed. The factors include: the operating frequency, the size of the tunnel or underground mine room, the antenna position and polarization, and the electrical parameters.

222 citations


Journal ArticleDOI
TL;DR: The performance of hybrid-ARQ (automatic repeat request) in Rayleigh block-fading channels is studied to provide a significant advantage compared to systems that do not use H- ARQ and only adapt rate based on the channel statistics.
Abstract: This paper studies the performance of hybrid-ARQ (automatic repeat request) in Rayleigh block-fading channels. The long-term average transmitted rate is analyzed in a fast-fading scenario where the transmitter only has knowledge of channel statistics, and, consistent with contemporary wireless systems, rate adaptation is performed such that a target outage probability (after a maximum number of H-ARQ rounds) is maintained. H-ARQ allows for early termination once decoding is possible, and thus is a coarse, and implicit, mechanism for rate adaptation to the instantaneous channel quality. Although the rate with H-ARQ is not as large as the ergodic capacity, which is achievable with rate adaptation to the instantaneous channel conditions, even a few rounds of H-ARQ make the gap to ergodic capacity reasonably small for operating points of interest. Furthermore, the rate with H-ARQ provides a significant advantage compared to systems that do not use H-ARQ and only adapt rate based on the channel statistics.

203 citations


Journal ArticleDOI
TL;DR: A new scheme for cooperative wireless networking based on linear network codes designed such that the BS is able to rebuild the user information from a minimum possible set of coded blocks conveyed through the dynamic network, and shows the existence of deterministic DNCs.
Abstract: We propose a new scheme for cooperative wireless networking based on linear network codes. The network consists of multiple (M ≥ 2) users having independent information to be transmitted to a common basestation (BS), assuming block-fading channels with independent fading for different codewords. The users collaborate in relaying messages. Because of potential transmission errors in links, resulting in erasures, the network topology is dynamic. To efficiently exploit the diversity available by cooperation and time-varying fading, we propose the use of diversity network codes (DNCs) over finite fields. These codes are designed such that the BS is able to rebuild the user information from a minimum possible set of coded blocks conveyed through the dynamic network. We show the existence of deterministic DNCs. We also show that the resulting diversity order using the proposed DNCs is 2 M - 1, which is higher than schemes without network coding or with binary network coding. Numerical results from simulations also show substantial improvement by the proposed DNCs over the benchmark schemes. We also propose simplified versions of the DNCs, which have much lower design complexity and still achieve the diversity order 2 M - 1.

Journal ArticleDOI
TL;DR: In this article, the performance of a Nt x 1 MISO system setup with maximum likelihood (ML) detection and full CSI at the receiver is analyzed in closed-form.
Abstract: In this paper, we offer an accurate framework for analyzing the performance of wireless communication systems adopting the recently proposed Space Shift Keying (SSK) modulation scheme. More specifically, we study the performance of a Nt x 1 MISO (Multiple-Input-Single-Output) system setup with Maximum-Likelihood (ML) detection and full Channel State Information (CSI) at the receiver. The exact Average Bit Error Probability (ABEP) over generically correlated and non-identically distributed Nakagami-m fading channels is computed in closed-form when Nt=2, while very accurate and asymptotically tight upper bounds are proposed to compute the ABEP when Nt > 2. With respect to current literature, our contribution is threefold: i) the ABEP is computed in closed-form without resorting to Monte Carlo numerical simulations, which, besides being computationally intensive, only yield limited insights about the system performance and cannot be exploited for a systematic optimization of it, ii) the framework accounts for arbitrary fading conditions and is not restricted to identically distributed fading channels, thus offering a comprehensive understanding of the performance of SSK modulation over generalized fading channels, and iii) the analytical framework could be readily adapted to study the performance over generalized fading channels with arbitrary fading distributions, since the Nakagami-m distribution is a very flexible fading model, which either includes or can closely approximate several other fading models. Numerical results show that the performance of SSK modulation is significantly affected by the characteristics of fading channels, {e.g.}, channel correlation, fading severity, and power imbalance among the Nt transmit-receive wireless links. Analytical frameworks and theoretical findings are also substantiated via Monte Carlo simulations.

Journal ArticleDOI
TL;DR: This work shows how to recover from collisions on the physical layer and successfully read the data and proposes a channel estimation method and two types of receiver structures for separating the signals of a collision of two tags.
Abstract: Arbitration and scheduling of multiple tags in state-of-the-art Radio Frequency Identification (RFID) systems is accomplished on the medium access control layer. Currently, only answers of a single tag can be decoded in such a system. If multiple tags respond simultaneously, a collision occurs. In that case, conventional systems discard the physical layer information and a retransmission is executed. This work shows how to recover from such collisions on the physical layer and successfully read the data. The contributions of the paper are: 1) An analysis of the achievable throughput increase of a system, that can recover from collisions at a physical layer is given. 2) A model for a description of collisions on the physical layer is presented. 3) Based on this model, we propose a channel estimation method and two types of receiver structures for separating the signals of a collision of two tags: first, single antenna receivers that discriminate the sources of the two tags in the I/Q plane, and second, multiple antenna receivers which exploit the different spatial signatures of both tags. 4) The functionality of the proposed receiver structures is verified with measurement data of two colliding tags. Eventually, a performance analysis of the receivers is provided.

Journal ArticleDOI
TL;DR: Compared with the traditional cumulant-based classifiers, the proposed K-S classifiers offer superior classification performance, require less number of signal samples (thus is fast), and is more robust to various channel impairments.
Abstract: A new approach to modulation classification based on the Kolmogorov-Smirnov (K-S) test is proposed. The K-S test is a non-parametric method to measure the goodness of fit. The basic procedure involves computing the empirical cumulative distribution function (ECDF) of some decision statistic derived from the received signal, and comparing it with the CDFs or the ECDFs of the signal under each candidate modulation format. The K-S-based modulation classifiers are developed for various channels, including the AWGN channel, the flat-fading channel, the OFDM channel, and the channel with unknown phase and frequency offsets, as well as the non-Gaussian noise channel, for both QAM and PSK modulations. Extensive simulation results demonstrate that compared with the traditional cumulant-based classifiers, the proposed K-S classifiers offer superior classification performance, require less number of signal samples (thus is fast), and is more robust to various channel impairments.

Journal ArticleDOI
TL;DR: This letter considers the adaptive decode- and-forward (DF) and amplify-and- forward (AF) cooperative-diversity systems with the Nth best-relay selection scheme and derives closed-form expressions for the symbol error probability, outage probability and asymptotic error probability.
Abstract: In this letter, we consider the adaptive decode-and-forward (DF) and amplify-and-forward (AF) cooperative-diversity systems with the Nth best-relay selection scheme. In the best-relay selection scheme, from the set of M relays the best relay only forwards the source signal to the destination. However, the best relay might be unavailable; hence we might resort to the second, third or generally the Nth best relay. We derive closed-form expressions for the symbol error probability, outage probability and asymptotic error probability. In particular, we derive a closed-form expression for the probability density function (PDF) of the signal-to-noise ratio (SNR) of the relayed signal at the destination node. Then, we find a closed-form expression for the moment generating function (MGF) of the output SNR at the destination. This MGF is used to derive the closed-form expressions of the performance metrics. All these expressions are derived over identical and non-identical Rayleigh fading channels. Results show that with the Nth best relay the diversity order is equal to (M - N + 2) where M is the number of relays.

Journal ArticleDOI
TL;DR: Results show that the proposed O-TR scheme achieves a better performance compared to the fully-distributed space-time two-way relaying (FDST-TR), which has been identified as the best decode-and-forward two- way relaying method so far.
Abstract: In this paper, we study a decode-and-forward two-way relaying network. We propose an opportunistic two-way relaying (O-TR) scheme based on joint network coding and opportunistic relaying. In the proposed scheme, one single "best relay" is selected by MaxMin criterion to perform network coding on two decoded symbols sent from two sources, and then to broadcast the network-coded symbols back to the two sources. The performance of the proposed scheme is analyzed, and verified through Monte Carlo simulations. Results show that the proposed scheme achieves a better performance compared to the fully-distributed space-time two-way relaying (FDST-TR), which has been identified as the best decode-and-forward two-way relaying method so far.

Journal ArticleDOI
TL;DR: In this article, a learning-based cognitive beamforming (CB) scheme with the EIC was proposed to maximize the effective throughput of the CR link under opportunistic spectrum sharing with an existing primary radio (PR) link.
Abstract: This paper studies the transmit strategy for a secondary link or the so-called cognitive radio (CR) link under opportunistic spectrum sharing with an existing primary radio (PR) link. It is assumed that the CR transmitter is equipped with multi-antennas, whereby transmit precoding and power control can be jointly deployed to balance between avoiding interference at the PR terminals and optimizing performance of the CR link. This operation is named as cognitive beamforming (CB). Unlike prior study on CB that assumes perfect knowledge of the channels over which the CR transmitter interferes with the PR terminals, this paper proposes a practical CB scheme utilizing a new idea of effective interference channel (EIC), which can be efficiently estimated at the CR transmitter from its observed PR signals. Somehow surprisingly, this paper shows that the learning-based CB scheme with the EIC improves the CR channel capacity against the conventional scheme even with the exact CRto- PR channel knowledge, when the PR link is equipped with multi-antennas but only communicates over a subspace of the total available spatial dimensions. Moreover, this paper presents algorithms for the CR to estimate the EIC over a finite learning time. Due to channel estimation errors, the proposed CB scheme causes leakage interference at the PR terminals, which leads to an interesting learning-throughput tradeoff phenomenon for the CR, pertinent to its time allocation between channel learning and data transmission. This paper derives the optimal channel learning time to maximize the effective throughput of the CR link, subject to the CR transmit power constraint and the interference power constraints for the PR terminals.

Journal ArticleDOI
TL;DR: This work analyzes the error performance of the physical-layer network coding (PNC) protocol without channel coding in bidirectional relay networks for binary phase shift keying over Rayleigh fading channels and derives tight upper and lower bounds in closed form for the average symbol error probability of the MAC at the relay.
Abstract: We analyze the error performance of the physical-layer network coding (PNC) protocol without channel coding in bidirectional relay networks for binary phase shift keying (BPSK) over Rayleigh fading channels. It is assumed that a bidirectional relay network consists of two sources and a relay, where each node has a single antenna and operates in a half-duplex mode, and the PNC over finite GF(2) is employed. In this system, since the maximum-likelihood (ML) detection metric of the multiple access channel (MAC) at the relay is given by the sum of two exponential functions, it is not possible to utilize the classical Euclidean distance rule. To make the performance analysis tractable, we approximate the ML detection metric by adopting the max-log approximation. Then we derive tight upper and lower bounds in closed form for the average symbol error probability of the MAC at the relay. Finally, we obtain tight upper and lower bounds in closed form for the end-to-end average bit-error rate (BER).

Journal ArticleDOI
TL;DR: This paper presents a novel generic framework for the standard condition number (SCN) distribution which accounts for both central and non-central Wishart matrices of arbitrary dimension, and derives new exact polynomial expressions for both the SCN and DCN distributions.
Abstract: This paper investigates the distribution of the condition number of complex Wishart matrices. Two closely related measures are considered: the standard condition number (SCN) and the Demmel condition number (DCN), both of which have important applications in the context of multiple-input multiple-output (MIMO) communication systems, as well as in various branches of mathematics. We first present a novel generic framework for the SCN distribution which accounts for both central and non-central Wishart matrices of arbitrary dimension. This result is a simple unified expression which involves only a single scalar integral, and therefore allows for fast and efficient computation. For the case of dual Wishart matrices, we derive new exact polynomial expressions for both the SCN and DCN distributions. We also formulate a new closed-form expression for the tail SCN distribution which applies for correlated central Wishart matrices of arbitrary dimension and demonstrates an interesting connection to the maximum eigenvalue moments of Wishart matrices of smaller dimension. Based on our analytical results, we gain valuable insights into the statistical behavior of the channel conditioning for various MIMO fading scenarios, such as uncorrelated/semi-correlated Rayleigh fading and Ricean fading.

Journal ArticleDOI
TL;DR: In this paper, the authors consider a wireless network in which each node is equipped with a wideband antenna array capable of performing both TOA and angle-of-arrival (AOA) measurements.
Abstract: Accurate positional information is essential for many applications in wireless networks. Time-of-arrival (TOA) and angle-of-arrival (AOA) are the two most commonly used signal metrics for localizing nodes with unknown positions. In this paper, we consider a wireless network in which each node is equipped with a wideband antenna array capable of performing both TOA and AOA measurements. Since both the position and orientation of the agent are of interest, we propose a localization framework that jointly estimates these two parameters. The notion of equivalent fisher information is applied to derive the squared error bounds for the position and orientation. Since our analysis starts from the received waveforms rather than directly from the signal metrics, these bounds characterize the fundamental limits of the position and orientation accuracy. Surprisingly, our result reveals that AOA measurements obtained by wideband antenna arrays do not further improve position accuracy beyond that provided by TOA measurements.

Journal ArticleDOI
TL;DR: A novel class of bit-flipping algorithm for decoding low-density parity-check (LDPC) codes is presented, which exhibit better decoding performance than known BF algorithms, such as the weighted BF algorithms or the modified weighted BF algorithm for several LDPC codes.
Abstract: A novel class of bit-flipping (BF) algorithm for decoding low-density parity-check (LDPC) codes is presented. The proposed algorithms, which are referred to as gradient descent bit flipping (GDBF) algorithms, can be regarded as simplified gradient descent algorithms. The proposed algorithms exhibit better decoding performance than known BF algorithms, such as the weighted BF algorithm or the modified weighted BF algorithm for several LDPC codes.

Journal ArticleDOI
TL;DR: A step-by-step methodology for the simulation and time-series generation of the proposed MIMO-LMS channel model is provided, which is useful for the design and performance assessment of MIMo-L MS transmission systems.
Abstract: This Letter addresses the statistical modeling of dual-polarized MIMO-LMS fading channels. In the absence of accurate experimental results, a statistical model for the characterization of MIMO-LMS channels is proposed based on consolidation of available experimental results for SISO-LMS and MIMO wireless channels as well as on their extrapolation to the MIMO-LMS case of interest. Moreover, a step-by-step methodology for the simulation and time-series generation of the proposed MIMO-LMS channel model is provided, which is useful for the design and performance assessment of MIMO-LMS transmission systems. The proposed model incorporates the effects of all relevant critical channel aspects in a flexible and fully-parameterized way.

Journal ArticleDOI
TL;DR: The problem of developing energy efficient transmission strategies for Body Sensor Networks with energy harvesting is addressed as a Markov Decision Process (MDP) and the performance of the transmission policy derived is compared with that of energy balancing as well as aggressive policies.
Abstract: This paper addresses the problem of developing energy efficient transmission strategies for Body Sensor Networks (BSNs) with energy harvesting. It is assumed that multiple transmission modes that allow a tradeoff between the energy consumption and packet error probability are available to the sensor nodes. Taking into account the energy harvesting capabilities of the nodes, decision policies are developed to determine the transmission mode to use at a given instant of time in order to maximize the quality of coverage. The problem is formulated as a Markov Decision Process (MDP) and the performance of the transmission policy thus derived is compared with that of energy balancing as well as aggressive policies. An upper bound on the performance of arbitrary policies, and lower bounds specific to energy balancing and aggressive policies are derived.

Journal ArticleDOI
TL;DR: Informed Dynamic Scheduling strategies that select the message-passing schedule according to the observed rate of change of the messages are proposed that address several issues including performance for short-blocklength codes, complexity, and implementability.
Abstract: Low-Density Parity-Check (LDPC) codes are usually decoded by running an iterative belief-propagation (BP), or message-passing, algorithm over the factor graph of the code. The traditional message-passing scheduling, called flooding, consists of updating all the variable nodes in the graph, using the same pre-update information, followed by updating all the check nodes of the graph, again, using the same pre-update information. Recently, several studies show that sequential scheduling, in which messages are generated using the latest available information, significantly improves the convergence speed in terms of number of iterations. Sequential scheduling introduces the problem of finding the best sequence of message updates. We propose Informed Dynamic Scheduling (IDS) strategies that select the message-passing schedule according to the observed rate of change of the messages. In general, IDS strategies require computation to select the message to update but converge in fewer message updates because they focus on the part of the graph that has not converged. Moreover, IDS yields a lower error-rate performance than either flooding or sequential scheduling because IDS strategies overcome traditional trapping-set errors. This paper presents IDS strategies that address several issues including performance for short-blocklength codes, complexity, and implementability.

Journal ArticleDOI
TL;DR: This work considers a bidirectional network consisting of two different end-sources and multiple relays, where each terminal has a single antenna and operates in a half-duplex mode and confirms that the closed-form expression of the ANC protocol and the one-integral form of the TDBC protocol are very accurate, and that theclosed-form lower bound of theTDBC protocol is also tight.
Abstract: We study relay selection (RS) with the analog network coding (ANC) and time division broadcast (TDBC), which are two major amplify-and-forward (AF)-based protocols in bidirectional relay networks. We consider a bidirectional network consisting of two different end-sources and multiple relays, where each terminal has a single antenna and operates in a half-duplex mode. In this network, a single best relay is selected depending on channel conditions to help bidirectional communication between the two end-sources. Specifically, we first consider RS schemes for the ANC and TDBC protocols based on a max-min criterion to minimize the outage probabilities. Then, for the RS in the ANC protocol, we derive a closed-form expression of the outage probability; for the RS in the TDBC protocol, we derive a one-integral form of the outage probability and its lower bound in closed-form. Numerical results confirm that the closed-form expression of the ANC protocol and the one-integral form of the TDBC protocol are very accurate, and that the closed-form lower bound of the TDBC protocol is also tight.

Journal ArticleDOI
TL;DR: Simulations performed on a space-time bit-interleaved coded modulation (STBICM) architecture over quasi-static MIMO fading channels demonstrate that the SIOF V-BLast detector provides performance gains over previous turbo-BLAST detectors, most notably when more transmit antennas are used.
Abstract: We propose an improved minimum mean square error (MMSE) vertical Bell Labs layered space-time (V-BLAST) detection technique, called a soft input, soft output, and soft feedback (SIOF) V-BLAST detector, for turbo multi-input multioutput (turbo-MIMO) systems. We derive a symbol estimator by minimizing the power of the interference plus noise, given a priori probabilities of undetected layer symbols and a posteriori probabilities for past detected layer symbols. For a low-complexity implementation, an approximate SIOF algorithm is presented, which allows for a time-invariant realization of the symbol ordering and an MMSE filtering process. Another implementation, referred to as the iterative SIOF algorithm is introduced, which decides on symbol detection order based on a posteriori symbol probabilities to improve the detection performance. Simulations performed on a space-time bit-interleaved coded modulation (STBICM) architecture over quasi-static MIMO fading channels demonstrate that the SIOF V-BLAST detector provides performance gains over previous turbo-BLAST detectors, most notably when more transmit antennas are used.

Journal ArticleDOI
TL;DR: It is established that the overhead optimization for multiantenna systems is effectively the same as for single-antenna systems with the normalized Doppler frequency multiplied by the number of transmit antennas.
Abstract: The optimization of the pilot overhead in single-user wireless fading channels is investigated, and the dependence of this overhead on various system parameters of interest (e.g., fading rate, signal-to-noise ratio) is quantified. The achievable pilot-based spectral efficiency is expanded with respect to the fading rate about the no-fading point, which leads to an accurate order expansion for the pilot overhead. This expansion identifies that the pilot overhead, as well as the spectral efficiency penalty with respect to a reference system with genie-aided CSI (channel state information) at the receiver, depend on the square root of the normalized Doppler frequency. It is also shown that the widely-used block fading model is a special case of more accurate continuous fading models in terms of the achievable pilot-based spectral efficiency. Furthermore, it is established that the overhead optimization for multiantenna systems is effectively the same as for single-antenna systems with the normalized Doppler frequency multiplied by the number of transmit antennas.

Journal ArticleDOI
TL;DR: An iterative algorithm is proposed for joint multi-path Rayleigh channel complex gains estimation and data recovery in fast fading environments and is supported by theoretical analysis and simulation results, which are obtained considering Jakes' channels with high Doppler spreads.
Abstract: This paper deals with the case of a high speed mobile receiver operating in an orthogonal-frequency-division-multiplexing (OFDM) communication system. Assuming the knowledge of delay-related information, we propose an iterative algorithm for joint multi-path Rayleigh channel complex gains estimation and data recovery in fast fading environments. Each complex gain time-variation, within one OFDM symbol, is approximated by a polynomial representation. Based on the Jakes process, an auto-regressive (AR) model of the polynomial coefficients dynamics is built, making it possible to employ the Kalman filter estimator for the polynomial coefficients. Hence, the channel matrix is easily computed, and the data symbol is estimated with free inter-sub-carrier-interference (ICI) thanks to the use of a QR-decomposition of the channel matrix. Our claims are supported by theoretical analysis and simulation results, which are obtained considering Jakes' channels with high Doppler spreads.

Journal ArticleDOI
TL;DR: An approach for constructing quasi-cyclic LDPC codes based on Latin squares over finite fields based on parity-check matrices is presented, and combinatorial expressions for their ranks and dimensions are derived.
Abstract: Quasi-cyclic LDPC codes are the most promising class of structured LDPC codes due to their ease of implementation and excellent performance over noisy channels when decoded with message-passing algorithms as extensive simulation studies have shown. In this paper, an approach for constructing quasi-cyclic LDPC codes based on Latin squares over finite fields is presented. By analyzing the parity-check matrices of these codes, combinatorial expressions for their ranks and dimensions are derived. Experimental results show that, with iterative decoding algorithms, the constructed codes perform very well over the AWGN and the binary erasure channels.

Journal ArticleDOI
TL;DR: A new relationship between the secrecy channel and the recently developed cognitive radio (CR) channel is explored, in which the secondary user transmits over the same spectrum simultaneously with multiple primary users, subject to the received interference power constraints at the primary users.
Abstract: This paper studies the achievable rates of the multi-antenna or multiple-input multiple-output (MIMO) secrecy channel with multiple single-/multi-antenna eavesdroppers. By assuming Gaussian input, the maximum achievable secrecy rate is obtained with the optimal transmit covariance matrix that maximizes the minimum difference between the channel mutual information of the secrecy user and those of the eavesdroppers. The maximum secrecy rate computation can thus be formulated as a non-convex max-min problem, which cannot be solved efficiently by existing methods. To handle this difficulty, this paper explores a new relationship between the secrecy channel and the recently developed cognitive radio (CR) channel, in which the secondary user transmits over the same spectrum simultaneously with multiple primary users, subject to the received interference power constraints at the primary users, or the so-called "interference temperature (IT)" constraints. By constructing an auxiliary multi-antenna CR channel that has the same channel responses as the secrecy channel, this paper shows that the optimal transmit covariance to achieve the maximum secrecy rate is the same as that to achieve the CR spectrum sharing capacity with properly selected IT constraints. Thereby, finding the optimal complex transmit covariance matrix for the secrecy channel becomes equivalent to searching over a set of real IT constraints in the auxiliary CR channel. Based on this relationship, efficient algorithms are proposed to solve the non-convex secrecy rate maximization problem by transforming it into a sequence of convex CR spectrum sharing capacity computation problems, under various setups of the secrecy channel.