scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Transactions on Communications in 2017"


Journal ArticleDOI
TL;DR: A baseline analytical approach based on stochastic geometry that allows the computation of the statistical distributions of the downlink signal-to-interference-plus-noise ratio (SINR) and also the per link data rate, which depends on the SINR as well as the average load is presented.
Abstract: We provide a comprehensive overview of mathematical models and analytical techniques for millimeter wave (mmWave) cellular systems. The two fundamental physical differences from conventional sub-6-GHz cellular systems are: 1) vulnerability to blocking and 2) the need for significant directionality at the transmitter and/or receiver, which is achieved through the use of large antenna arrays of small individual elements. We overview and compare models for both of these factors, and present a baseline analytical approach based on stochastic geometry that allows the computation of the statistical distributions of the downlink signal-to-interference-plus-noise ratio (SINR) and also the per link data rate, which depends on the SINR as well as the average load. There are many implications of the models and analysis: 1) mmWave systems are significantly more noise-limited than at sub-6 GHz for most parameter configurations; 2) initial access is much more difficult in mmWave; 3) self-backhauling is more viable than in sub-6-GHz systems, which makes ultra-dense deployments more viable, but this leads to increasingly interference-limited behavior; and 4) in sharp contrast to sub-6-GHz systems cellular operators can mutually benefit by sharing their spectrum licenses despite the uncontrolled interference that results from doing so. We conclude by outlining several important extensions of the baseline model, many of which are promising avenues for future research.

767 citations


Journal ArticleDOI
TL;DR: This paper proposes an optimization framework of offloading from a single mobile device (MD) to multiple edge devices and proposes a linear relaxation-based approach and a semidefinite relaxation (SDR)-based approach for the fixed CPU frequency case, and an exhaustive search- based approach and an SDR-based approaches for the elasticCPU frequency case.
Abstract: In this paper, we propose an optimization framework of offloading from a single mobile device (MD) to multiple edge devices. We aim to minimize both total tasks’ execution latency and the MD’s energy consumption by jointly optimizing the task allocation decision and the MD’s central process unit (CPU) frequency. This paper considers two cases for the MD, i.e., fixed CPU frequency and elastic CPU frequency. Since these problems are NP-hard, we propose a linear relaxation-based approach and a semidefinite relaxation (SDR)-based approach for the fixed CPU frequency case, and an exhaustive search-based approach and an SDR-based approach for the elastic CPU frequency case. Our simulation results show that the SDR-based algorithms achieve near optimal performance. Performance improvement can be obtained with the proposed scheme in terms of energy consumption and tasks’ execution latency when multiple edge devices and elastic CPU frequency are considered. Finally, we show that the MD’s flexible CPU range can have an impact on the task allocation.

735 citations


Journal ArticleDOI
TL;DR: In this article, the authors investigated resource allocation algorithm design for multicarrier non-orthogonal multiple access (MC-NOMA) systems employing a full-duplex (FD) base station for serving multiple HD downlink and uplink users simultaneously.
Abstract: In this paper, we investigate resource allocation algorithm design for multicarrier non-orthogonal multiple access (MC-NOMA) systems employing a full-duplex (FD) base station for serving multiple half-duplex (HD) downlink and uplink users simultaneously. The proposed algorithm is obtained from the solution of a non-convex optimization problem for the maximization of the weighted sum system throughput. We apply monotonic optimization to develop an optimal joint power and subcarrier allocation policy. The optimal resource allocation policy serves as a system performance benchmark due to its high computational complexity. Furthermore, a suboptimal iterative scheme based on successive convex approximation is proposed to strike a balance between computational complexity and optimality. Our simulation results reveal that the proposed suboptimal algorithm achieves a close-to-optimal performance. In addition, FD MC-NOMA systems employing the proposed resource allocation algorithms provide a substantial system throughput improvement compared with conventional HD multicarrier orthogonal multiple access (MC-OMA) systems and other baseline schemes. In addition, our results unveil that FD MC-NOMA systems enable a fairer resource allocation compared with traditional HD MC-OMA systems.

530 citations


Journal ArticleDOI
TL;DR: In this paper, the authors give an overview on the various radiative wireless power transfer (WPT) technologies, the historical development of the radiative WPT technology and the main challenges in designing contemporary WPT systems, focusing on the state-of-the-art communication and signal processing techniques that can be applied to tackle these challenges.
Abstract: Radiative wireless power transfer (WPT) is a promising technology to provide cost-effective and real-time power supplies to wireless devices. Although radiative WPT shares many similar characteristics with the extensively studied wireless information transfer or communication, they also differ significantly in terms of design objectives, transmitter/receiver architectures and hardware constraints, and so on. In this paper, we first give an overview on the various WPT technologies, the historical development of the radiative WPT technology and the main challenges in designing contemporary radiative WPT systems. Then, we focus on the state-of-the-art communication and signal processing techniques that can be applied to tackle these challenges. Topics discussed include energy harvester modeling, energy beamforming for WPT, channel acquisition, power region characterization in multi-user WPT, waveform design with linear and non-linear energy receiver model, safety and health issues of WPT, massive multiple-input multiple-output and millimeter wave enabled WPT, wireless charging control, and wireless power and communication systems co-design. We also point out directions that are promising for future research.

408 citations


Journal ArticleDOI
TL;DR: In this paper, the authors derived the downlink coverage probability of a reference receiver located at an arbitrary position on the ground assuming Nakagami-$m$ fading for all wireless links.
Abstract: In this paper, we consider a finite network of unmanned aerial vehicles serving a given region. Modeling this network as a uniform binomial point process, we derive the downlink coverage probability of a reference receiver located at an arbitrary position on the ground assuming Nakagami- $m$ fading for all wireless links. The reference receiver is assumed to connect to its closest transmitting node as is usually the case in cellular systems. After deriving the distribution of distances from the reference receiver to the serving and interfering nodes, we derive an exact expression for downlink coverage probability in terms of the derivative of Laplace transform of interference power distribution. In the downlink of this system, it is not unusual to encounter scenarios in which the line-of-sight component is significantly stronger than the reflected multipath components. To emulate such scenarios, we also derive the coverage probability in the absence of fading from the results of Nakagami- $m$ fading by taking the limit $m \to \infty$ . Using asymptotic expansion of incomplete gamma function, we concretely show that this limit reduces to a redundant condition. Consequently, we derive an accurate coverage probability approximation for this case using dominant interferer-based approach in which the effect of dominant interferer is exactly captured and the residual interference from other interferers is carefully approximated. We then derive the bounds of the approximate coverage probability using Berry-Esseen theorem. Our analyses reveal several useful trends in coverage probability as a function of height of the transmitting nodes and the location of reference receiver on the ground.

348 citations


Journal ArticleDOI
TL;DR: This paper proposes a joint time allocation and power control scheme, which takes into account the uncertainty regarding the channel state information (CSI) and provides robustness against imperfect CSI knowledge, and formulate two non-convex optimization problems for different objectives.
Abstract: In this paper, we consider a multiple-input multiple-output wireless powered communication network, where multiple users harvest energy from a dedicated power station in order to be able to transmit their information signals to an information receiving station. Employing a practical non-linear energy harvesting (EH) model, we propose a joint time allocation and power control scheme, which takes into account the uncertainty regarding the channel state information (CSI) and provides robustness against imperfect CSI knowledge. In particular, we formulate two non-convex optimization problems for different objectives, namely system sum throughput maximization and the maximization of the minimum individual throughput across all wireless powered users. To overcome the non-convexity, we apply several transformations along with a one-dimensional search to obtain an efficient resource allocation algorithm. Numerical results reveal that a significant performance gain can be achieved when the resource allocation is designed based on the adopted non-linear EH model instead of the conventional linear EH model. Besides, unlike a non-robust baseline scheme designed for perfect CSI, the proposed resource allocation schemes are shown to be robust against imperfect CSI knowledge.

317 citations


Journal ArticleDOI
TL;DR: In this paper, the authors investigated the performance of linear precoders, such as maximal-ratio transmission and zero-forcing, subject to coarse quantization and derived a closed-form approximation on the rate achievable under such quantization.
Abstract: Massive multiuser (MU) multiple-input multiple-output (MIMO) is foreseen to be one of the key technologies in fifth-generation wireless communication systems. In this paper, we investigate the problem of downlink precoding for a narrowband massive MU-MIMO system with low-resolution digital-to-analog converters (DACs) at the base station (BS). We analyze the performance of linear precoders, such as maximal-ratio transmission and zero-forcing, subject to coarse quantization. Using Bussgang’s theorem, we derive a closed-form approximation on the rate achievable under such coarse quantization. Our results reveal that the performance attainable with infinite-resolution DACs can be approached using DACs having only 3–4 bits of resolution, depending on the number of BS antennas and the number of user equipments (UEs). For the case of 1-bit DACs, we also propose novel nonlinear precoding algorithms that significantly outperform linear precoders at the cost of an increased computational complexity. Specifically, we show that nonlinear precoding incurs only a 3 dB penalty compared with the infinite-resolution case for an uncoded bit-error rate of 10−3, in a system with 128 BS antennas that uses 1-bit DACs and serves 16 single-antenna UEs. In contrast, the penalty for linear precoders is about 8 dB.

307 citations


Journal ArticleDOI
TL;DR: This paper attempts to maximize the ergodic capacity of the V2I connections while ensuring reliability guarantee for each V2V link, and proposes novel algorithms that yield optimal resource allocation and are robust to channel variations.
Abstract: The widely deployed cellular network, assisted with device-to-device (D2D) communications, can provide a promising solution to support efficient and reliable vehicular communications. Fast channel variations caused by high mobility in a vehicular environment need to be properly accounted for when designing resource allocation schemes for the D2D-enabled vehicular networks. In this paper, we perform spectrum sharing and power allocation based only on slowly varying large-scale fading information of wireless channels. Pursuant to differing requirements for different types of links, i.e., high capacity for vehicle-to-infrastructure (V2I) links and ultrareliability for vehicle-to-vehicle (V2V) links, we attempt to maximize the ergodic capacity of the V2I connections while ensuring reliability guarantee for each V2V link. Sum ergodic capacity of all V2I links is first taken as the optimization objective to maximize the overall V2I link throughput. Minimum ergodic capacity maximization is then considered to provide a more uniform capacity performance across all V2I links. Novel algorithms that yield optimal resource allocation and are robust to channel variations are proposed. Their desirable performance is confirmed by computer simulation.

302 citations


Journal ArticleDOI
TL;DR: Monte Carlo simulations on BER corroborate the analyses and show that the proposed schemes appear as promising multi-carrier transmission alternatives by outperforming the existing OFDM-IM counterparts.
Abstract: Orthogonal frequency division multiplexing with index modulation (OFDM-IM) performs transmission by considering two modes over OFDM subcarriers, which are the null and the conventional $M$ -ary signal constellation The spectral efficiency (SE) of the system, however, is limited, since the null mode itself does not carry any information and the number of subcarrier activation patterns increases combinatorially In this paper, a novel IM scheme, called multiple-mode OFDM-IM (MM-OFDM-IM), is proposed for OFDM systems to improve the SE by conveying information through multiple distinguishable modes and their full permutations A practical and efficient mode selection strategy, which is constrained on the phase shift keying/quadrature amplitude modulation constellations, is designed Two efficient detectors that provide different tradeoffs between the error performance and detection complexity are also proposed The principle of MM-OFDM-IM is further extended to the in-phase and quadrature components of OFDM signals, and the method of generating multiple modes from the $M$ -ary pulse amplitude modulation constellation for this modified scheme is also introduced Bit error rate (BER) analyses are provided for the proposed schemes Monte Carlo simulations on BER corroborate the analyses and show that the proposed schemes appear as promising multi-carrier transmission alternatives by outperforming the existing OFDM-IM counterparts

252 citations


Journal ArticleDOI
TL;DR: In this article, a power-efficient resource allocation for multicarrier non-orthogonal multiple access (NOMA) systems is studied, which jointly designs the power allocation, rate allocation, user scheduling, and successive interference cancellation (SIC) decoding policy for minimizing the total transmit power.
Abstract: In this paper, we study power-efficient resource allocation for multicarrier non-orthogonal multiple access systems. The resource allocation algorithm design is formulated as a non-convex optimization problem which jointly designs the power allocation, rate allocation, user scheduling, and successive interference cancellation (SIC) decoding policy for minimizing the total transmit power. The proposed framework takes into account the imperfection of channel state information at transmitter and quality of service requirements of users. To facilitate the design of optimal SIC decoding policy on each subcarrier, we define a channel-to-noise ratio outage threshold . Subsequently, the considered non-convex optimization problem is recast as a generalized linear multiplicative programming problem, for which a globally optimal solution is obtained via employing the branch-and-bound approach. The optimal resource allocation policy serves as a system performance benchmark due to its high computational complexity. To strike a balance between system performance and computational complexity, we propose a suboptimal iterative resource allocation algorithm based on difference of convex programming. Simulation results demonstrate that the suboptimal scheme achieves a close-to-optimal performance. Also, both proposed schemes provide significant transmit power savings than that of conventional orthogonal multiple access schemes.

213 citations


Journal ArticleDOI
TL;DR: Simulation results demonstrate significant performance gains are obtained for both networks, thanks to the use of the proposed cooperative MCR-NOMA scheme, and it is demonstrated that higher spatial diversity order can be achieved by opportunistically utilizing the CSI available for the secondary user scheduling.
Abstract: Non-orthogonal multiple access (NOMA) is emerging as a promising, yet challenging, multiple access technology to improve spectrum utilization for the fifth generation (5G) wireless networks. In this paper, the application of NOMA to multicast cognitive radio networks (termed as MCR-NOMA) is investigated. A dynamic cooperative MCR-NOMA scheme is proposed, where the multicast secondary users serve as relays to improve the performance of both primary and secondary networks. Based on the available channel state information (CSI), three different secondary user scheduling strategies for the cooperative MCR-NOMA scheme are presented. To evaluate the system performance, we derive the closed-form expressions of the outage probability and diversity order for both networks. Furthermore, we introduce a new metric, referred to as mutual outage probability to characterize the cooperation benefit compared to non-cooperative MCR-NOMA scheme. Simulation results demonstrate significant performance gains are obtained for both networks, thanks to the use of our proposed cooperative MCR-NOMA scheme. It is also demonstrated that higher spatial diversity order can be achieved by opportunistically utilizing the CSI available for the secondary user scheduling.

Journal ArticleDOI
TL;DR: In this article, the authors considered the application of non-orthogonal multiple access (NOMA) to a multi-user network with mixed multicasting and unicasting traffic and proposed design of beamforming and power allocation ensuring that the unicasting performance is improved while maintaining the reception reliability of multicasting.
Abstract: This paper considers the application of non-orthogonal multiple access (NOMA) to a multi-user network with mixed multicasting and unicasting traffic. The proposed design of beamforming and power allocation ensures that the unicasting performance is improved while maintaining the reception reliability of multicasting. Both analytical and simulation results are provided to demonstrate that the use of the NOMA assisted multicast-unicast scheme yields a significant improvement in spectral efficiency compared with orthogonal multiple access (OMA) schemes which realize multicasting and unicasting services separately. Since unicast messages are broadcast to all the users, how the use of NOMA can prevent those multicast receivers intercepting the unicasting messages is also investigated, where it is shown that the secrecy unicasting rate achieved by NOMA is always larger than or equal to that of OMA. Simulation results are provided to verify the developed analytical results and demonstrate the superior performance of the proposed NOMA scheme.

Journal ArticleDOI
TL;DR: Numerical results show that by incorporating such two techniques, the performance of the secondary system can be improved significantly compared with the case when the ST performs either harvest-then-transmit or ambient backscatter technique.
Abstract: This paper introduces a new solution to improve the performance for secondary systems in radio frequency (RF) powered cognitive radio networks (CRNs) In a conventional RF-powered CRN, the secondary system works based on the harvest-then-transmit protocol That is, the secondary transmitter (ST) harvests energy from primary signals and then uses the harvested energy to transmit data to its secondary receiver (SR) However, with this protocol, the performance of the secondary system is much dependent on the amount of harvested energy as well as the primary channel activity, eg, idle and busy periods Recently, ambient backscatter communication has been introduced, which enables the ST to transmit data to the SR by backscattering ambient signals Therefore, it is potential to be adopted in the RF-powered CRN We investigate the performance of RF-powered CRNs with ambient backscatter communication over two scenarios, ie, overlay and underlay CRNs For each scenario, we formulate and solve the optimization problem to maximize the overall transmission rate of the secondary system Numerical results show that by incorporating such two techniques, the performance of the secondary system can be improved significantly compared with the case when the ST performs either harvest-then-transmit or ambient backscatter technique

Journal ArticleDOI
TL;DR: Analytically show that a legacy system—employing an orthogonal frequency-division multiplexing (OFDM) modulation scheme—can turn the RF interference arising from the backscatter process into a form of multipath diversity that can be exploited to increase its performance.
Abstract: Ambient backscatter is an intriguing wireless communication paradigm that allows small devices to compute and communicate by using only the power they harvest from far-field radio-frequency (RF) signals in the air. Ambient backscattering devices reflect RF signals emitted by existing or legacy communications systems, such as digital TV broadcasting, cellular, or Wi-Fi ones, which are designed for transporting information and are not intended for RF energy transfer. This paper deals with mathematical modeling and performance analysis of wireless broadband networks operating over fading channels with ambient backscatter devices. After introducing a detailed signal model of the relevant communication links, we study the influence of physical parameters on the capacity of both legacy and backscatter channels, by considering different receiver architectures. We analytically show that, under reasonable operative conditions, a legacy system—employing an orthogonal frequency-division multiplexing (OFDM) modulation scheme—can turn the RF interference arising from the backscatter process into a form of multipath diversity that can be exploited to increase its performance. Moreover, our analysis proves that a backscatter system—transmitting one symbol per OFDM symbol of the legacy system—can achieve satisfactory data rates over relatively short distances, especially when the intended recipient of the backscatter signal is co-located with the legacy transmitter, i.e., they are on the same device.

Journal ArticleDOI
TL;DR: This paper analytically studies the performance of multiple-input multiple-output underwater wireless optical communication (UWOC) systems with ON–OFF keying modulation and shows that spatial diversity can considerably improve the system performance, especially for channels with higher turbulence.
Abstract: In this paper, we analytically study the performance of multiple-input multiple-output underwater wireless optical communication (UWOC) systems with ON–OFF keying modulation. To mitigate turbulence-induced fading, which is amongst the major degrading effects of underwater channels on the propagating optical signal, we use spatial diversity over UWOC links. Furthermore, the effects of absorption and scattering are considered in our analysis. We analytically obtain the exact and an upper bound bit error rate (BER) expressions for both optimal and equal gain combining. In order to more effectively calculate the system BER, we apply Gauss-Hermite quadrature formula as well as approximation to the sum of lognormal random variables. We also apply the photon-counting method to evaluate the system BER in the presence of shot noise. Our numerical results indicate an excellent match between the exact and upper bound BER curves. Also, a good match between the analytical results and numerical simulations confirms the accuracy of our derived expressions. Moreover, our results show that spatial diversity can considerably improve the system performance, especially for channels with higher turbulence, e.g., a $3\times 1$ multiple-input single-output transmission in a 25 m coastal water link with a log-amplitude variance of 0.16 can introduce 8 dB performance improvement at the BER of 10−9.

Journal ArticleDOI
TL;DR: Using the theory of Poisson cluster process (PCPPCP), the authors in this article provided a framework to analyze multi-cell uplink uplink NOMA systems.
Abstract: Using the theory of Poisson cluster process (PCP), this paper provides a framework to analyze multi-cell uplink non-orthogonal multiple access (NOMA) systems Specifically, we characterize the rate coverage probability of an NOMA user who is at rank $m$ (in terms of the distance from its serving base station) among all users in a cell and the mean rate coverage probability of all users in a cell Since the signal-to-interference-plus-noise ratio of the $m$ th user relies on efficient successive interference cancellation (SIC), we consider three scenarios, ie, perfect SIC (in which the signals of $m-1$ interferers who are stronger than the $m$ th user are decoded successfully), imperfect SIC (in which the signals of $m-1$ interferers who are stronger than the $m$ th user may or may not be decoded successfully), and imperfect worst case SIC (in which the decoding of the signal of the $m$ th user is always unsuccessful whenever the decoding of its relative $m-1$ stronger users is unsuccessful) To derive the rate coverage expressions, we first characterize the Laplace transforms of the intra-cluster interferences in closed-form considering various SIC scenarios The Laplace transform of the inter-cluster interference is then characterized by exploiting distance distributions from geometric probability The derived expressions are customized for an equivalent OMA system Finally, numerical results are presented to validate the derived expressions The worst case SIC assumption provides remarkable simplifications in the mathematical analysis and is found to be highly accurate for higher user target rate requirements A comparison of Poisson point process-based and PCP-based modeling is also conducted

Journal ArticleDOI
TL;DR: A distributed matching algorithm is proposed in the downlink NOMA network, aiming to optimize the user pairing and power allocation between weak users and strong users, subject to the users’ targeted rate requirements, and results show that the proposed algorithm outperforms the conventional orthogonal multiple access scheme and approaches the performance of the centralized algorithm.
Abstract: In this paper, we study the user pairing in a downlink non-orthogonal multiple access (NOMA) network, where the base station allocates the power to the pairwise users within the cluster. In the considered NOMA network, a user with poor channel condition is paired with a user with good channel condition, when both their rate requirements are satisfied. Specifically, the quality of service for weak users can be guaranteed, since the transmit power allocated to strong users is constrained following the concept of cognitive radio. A distributed matching algorithm is proposed in the downlink NOMA network, aiming to optimize the user pairing and power allocation between weak users and strong users, subject to the users’ targeted rate requirements. Our results show that the proposed algorithm outperforms the conventional orthogonal multiple access scheme and approaches the performance of the centralized algorithm, despite its low complexity. In order to improve the system’s throughput, we design a practical adaptive turbo trellis coded modulation scheme for the considered network, which adaptively adjusts the code rate and the modulation mode based on the instantaneous channel conditions. The joint design work leads to significant mutual benefits for all the users as well as the improved system throughput.

Journal ArticleDOI
TL;DR: Numerical results illustrate that the proposed joint subchannel and power allocation algorithm are an effective approach for obtaining near-optimal performance with acceptable complexity and the NOMA enhanced D2D communication scheme is capable of achieving promising gains in terms of network sum rate and the number of accessed users, compared to a traditional OMA-based D2d communication scheme.
Abstract: In this paper, a novel non-orthogonal multiple access (NOMA) enhanced device-to-device (D2D) communication scheme is considered. Our objective is to maximize the system sum rate by optimizing subchannel and power allocation. We propose a novel solution that jointly assigns subchannels to D2D groups and allocates power to receivers in each D2D group. For the subchannel assignment, a novel algorithm based on the many-to-one two-sided matching theory is proposed for obtaining a suboptimal solution. Since the power allocation problem is non-convex, sequential convex programming is adopted to transform the original power allocation problem to a convex one. The power allocation vector is obtained by iteratively tightening the lower bound of the original power allocation problem until convergence. Numerical results illustrate that: 1) the proposed joint subchannel and power allocation algorithm are an effective approach for obtaining near-optimal performance with acceptable complexity and 2) the NOMA enhanced D2D communication scheme is capable of achieving promising gains in terms of network sum rate and the number of accessed users, compared to a traditional OMA-based D2D communication scheme.

Journal ArticleDOI
TL;DR: This paper quantifies the impact of correlated fading on secure communication of multiple amplify-and-forward (AF) relaying networks and concludes that the channel correlation is always beneficial to the secrecy performance of full relay selection, however, it deteriorates the confidentiality performance if partial-relay selection is used.
Abstract: This paper quantifies the impact of correlated fading on secure communication of multiple amplify-and-forward (AF) relaying networks. In such a network, the base station (BS) is equipped with multiple antennas and communicates with the destination through multiple AF relays, while the message from the relays can be overheard by an eavesdropper. We focus on the practical communication scenario, where the main and eavesdropper’s channels are correlated. In order to enhance the transmission security, transmit antenna selection is performed at the BS, and the best relay is chosen according to the full- or partial-relay selection criterion, which relies on the dual-hop relay channels or the second-hop relay channels, respectively. For these criteria, we study the impact of correlated fading on the network secrecy performance, by deriving an analytical approximation for the secrecy outage probability and an asymptotic expression for the high main-to-eavesdropper ratio. From these results, it is concluded that the channel correlation is always beneficial to the secrecy performance of full relay selection. However, it deteriorates the secrecy performance if partial-relay selection is used, when the number of antennas at the BS is less than the number of relays.

Journal ArticleDOI
TL;DR: This paper derives the analytical expressions for exact and asymptotic secrecy outage probability by using the stochastic geometry method and simulations are carried out to verify the proposed analytical models.
Abstract: In this paper, a hybrid visible light communication-radio frequency (RF) system, including a legitimate receiver (R) and an eavesdropper (E) is considered R can harvest energy from the light emitted by light emitting diodes (LEDs), which is used for the information transmission between R and the RF receiver which is close to the LED It is assumed that E tries to eavesdrop the information delivered from R to the RF receiver and R is with finite energy storage Considering the randomness of the locations of R and E, the statistical characteristics of the received signal-to-noise ratio at the RF receiver and E are characterized; then, we derive the analytical expressions for exact and asymptotic secrecy outage probability by using the stochastic geometry method Finally, simulations are carried out to verify our proposed analytical models

Journal ArticleDOI
TL;DR: Numerical results are presented to show that, when a large amount of harvested power is required, a single harvester or the linear range of a practical nonlinear harvesters are more efficient, to avoid power outage.
Abstract: In this paper, we study the average, the probability density function, and the cumulative distribution function of the harvested power. The signals are transmitted from multiple sources. The channels are assumed to be either Rician fading or Gamma-shadowed Rician fading. The received signals are then harvested by using either a single harvester for simultaneous transmissions or multiple harvesters for transmissions at different frequencies, antennas or time slots. Both linear and nonlinear models for the energy harvester at the receiver are examined. Numerical results are presented to show that, when a large amount of harvested power is required, a single harvester or the linear range of a practical nonlinear harvester are more efficient, to avoid power outage. Further, the power transfer strategy can be optimized for fixed total power. Specifically, for Rayleigh fading, the optimal strategy is to put the total power at the source with the best channel condition and switch off all other sources, while for general Rician fading, the optimum magnitudes and phases of the transmitting waveforms depend on the channel parameters.

Journal ArticleDOI
TL;DR: In this article, a traffic-aware spatio-temporal mathematical model for IoT devices supported by cellular uplink connectivity is developed to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices.
Abstract: The Internet of Things (IoT) is large scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

Journal ArticleDOI
TL;DR: A new hierarchical codebook is proposed to achieve uniform BA performance with low overhead and a power allocation scheme used in different training stages to further improve the BA performance is proposed.
Abstract: Owing to abundant spectrum resources, millimeter wave (mmwave) communication promises to provide Gbps data rates, which, however, may be restricted by large path-loss. Thus, antenna arrays are commonly used along with beam alignment (BA) as an important step to achieve the array gain. Efficient BA relies on the beam training codebook design. In this paper, we propose a new hierarchical codebook to achieve uniform BA performance with low overhead. To better elaborate on the design principle, a single-path channel model is considered first to frame the proposal. The codebook design is formulated as an optimization problem, where the ripple in the main/side lobes is constrained such that each training beam is close to the ideal one with a flat magnitude response and a narrow transition band. Then, we propose an efficient algorithm to find such a beam training codebook. Furthermore, we derive closed-form expressions of the BA misalignment probability or error rate of the proposed beam training codebook. Our results reveal that using the proposed codebook, the error rate of tree-search-based BA exponentially decreases with the SNR for a given channel, and linearly decreases in the log–log coordinate axis for a fading channel. We further propose a power allocation scheme used in different training stages to further improve the BA performance. Finally, the proposed framework is extended to the more complex case of multi-path channels. Numerical results confirm the effectiveness of the proposed training codebook and power allocation scheme as well as the accuracy of the performance analysis.

Journal ArticleDOI
De Mi1, Mehrdad Dianati1, Lei Zhang1, Sami Muhaidat1, Rahim Tafazolli1 
TL;DR: This paper uses the truncated Gaussian distribution to model the RF mismatch, and derive closed-form expressions of the output signal-to-interference-plus-noise ratio for maximum ratio transmission and zero forcing precoders, to provide valuable insights into the practical system designs.
Abstract: Channel reciprocity in time-division duplexing (TDD) massive multiple-input multiple-output (MIMO) systems can be exploited to reduce the overhead required for the acquisition of channel state information (CSI). However, perfect reciprocity is unrealistic in practical systems due to random radio-frequency (RF) circuit mismatches in uplink and downlink channels. This can result in a significant degradation in the performance of linear precoding schemes, which are sensitive to the accuracy of the CSI. In this paper, we model and analyse the impact of RF mismatches on the performance of linear precoding in a TDD multi-user massive MIMO system, by taking the channel estimation error into considerations. We use the truncated Gaussian distribution to model the RF mismatch, and derive closed-form expressions of the output signal-to-interference-plus-noise ratio for maximum ratio transmission and zero forcing precoders. We further investigate the asymptotic performance of the derived expressions, to provide valuable insights into the practical system designs, including useful guidelines for the selection of the effective precoding schemes. Simulation results are presented to demonstrate the validity and accuracy of the proposed analytical results.

Journal ArticleDOI
TL;DR: In this paper, a centralized coded caching system, consisting of a server delivering popular files, each of size $F$ bits, to $K$ users through an error-free shared link, is considered.
Abstract: A centralized coded caching system, consisting of a server delivering $N$ popular files, each of size $F$ bits, to $K$ users through an error-free shared link, is considered. It is assumed that each user is equipped with a local cache memory with capacity $MF$ bits, and contents can be proactively cached into these caches over a low traffic period, however, without the knowledge of the user demands. During the peak traffic period, each user requests a single file from the server. The goal is to minimize the number of bits delivered by the server over the shared link, known as the delivery rate , over all user demand combinations. A novel coded caching scheme for the cache capacity of $M= (N-1)/K$ is proposed. It is shown that the proposed scheme achieves a smaller delivery rate than the existing coded caching schemes in the literature, when $K > N \ge 3$ . Furthermore, we argue that the delivery rate of the proposed scheme is within a constant multiplicative factor of 2 of the optimal delivery rate for cache capacities $1/K \le M \le (N-1)/K$ , when $K > N \ge 3$ .

Journal ArticleDOI
TL;DR: In this article, a set of transmit beamformers were designed to adapt to the directional characteristics of mmWave links assuming a uniform planar array (UPA) and hybrid beamforming.
Abstract: Fifth generation wireless networks are expected to utilize wide bandwidths available at millimeter wave (mmWave) frequencies for enhancing system throughput. However, the unfavorable channel conditions of mmWave links, such as, higher path loss and attenuation due to atmospheric gases or water vapor, hinder reliable communications. To compensate for these severe losses, it is essential to have a multitude of antennas to generate sharp and strong beams for directional transmission. In this paper, we consider mmWave systems using uniform planar array (UPA) antennas, which effectively place more antennas on a 2-D grid. A hybrid beamforming setup is also considered to generate beams by combining a multitude of antennas using only a few radio frequency chains. We focus on designing a set of transmit beamformers generating beams adapted to the directional characteristics of mmWave links assuming a UPA and hybrid beamforming. We first define ideal beam patterns for UPA structures. Each beamformer is constructed to minimize the mean squared error from the corresponding ideal beam pattern. Simulation results verify that the proposed codebooks enhance beamforming reliability and data rate in mmWave systems.

Journal ArticleDOI
TL;DR: This paper proposes a centralized algorithm by employing a semidefinite relaxation approach, and proves that this centralized algorithm learns efficient caching by deriving a sub-linear learning regret bound, and proposes a distributed algorithm based on alternating direction method of multipliers, where each BS only solves their own problems by exchanging local information with neighbor BSs.
Abstract: Content caching at base stations (BSs) is a promising technique for future wireless networks by reducing network traffic and alleviating server bottleneck. However, in practice, the content popularity distribution may change with spatio-temporal variation but be unknown for BSs, which is an intractable obstacle for efficient caching strategy design. In this paper, considering unknown popularity distribution, we explore the content caching problem by jointly optimizing the content caching in cooperative BSs, content sharing among BSs, and cost of content retrieving. We tackle the problem from a multi-armed bandit learning perspective, where the learning of the popularity distribution is incorporated with the content caching and sharing process. Specifically, we first propose a centralized algorithm by employing a semidefinite relaxation approach, and we prove that this centralized algorithm learns efficient caching by deriving a sub-linear learning regret bound. To further reduce computational complexity, we propose a distributed algorithm based on alternating direction method of multipliers, where each BS only solves their own problems by exchanging local information with neighbor BSs. Extensive simulation results show the effectiveness of the proposed algorithms in terms of learning content popularity distributions of individual BSs, offloading traffic from the content server, and reducing cost of content retrieving.

Journal ArticleDOI
TL;DR: By exploring the lattice structure of SCMA code words, a low-complexity decoding algorithm based on list sphere decoding (LSD) is proposed that can reduce the decoding complexity substantially while the performance loss compared with the existing algorithm is negligible.
Abstract: Sparse code multiple access (SCMA) is one of the most promising methods among all the non-orthogonal multiple access techniques in the future 5G communication. Compared with some other non-orthogonal multiple access techniques, such as low density signature, SCMA can achieve better performance due to the shaping gain of the SCMA code words. However, despite the sparsity of the code words, the decoding complexity of the current message passing algorithm utilized by SCMA is still prohibitively high. In this paper, by exploring the lattice structure of SCMA code words, we propose a low-complexity decoding algorithm based on list sphere decoding (LSD). The LSD avoids the exhaustive search for all possible hypotheses and only considers signal within a hypersphere. As LSD can be viewed a depth-first tree search algorithm, we further propose several methods to prune the redundancy-visited nodes in order to reduce the size of the search tree. Simulation results show that the proposed algorithm can reduce the decoding complexity substantially while the performance loss compared with the existing algorithm is negligible.

Journal ArticleDOI
TL;DR: The differences between homogeneous and heterogeneous networks regarding APS are discussed, and a two-stage APS method is proposed for hybrid Li-Fi/Wi-Fi networks, which achieves a close-to-optimal throughput at significantly reduced complexity.
Abstract: Hybrid light fidelity (Li-Fi) and wireless fidelity (Wi-Fi) networks are an emerging technology for future indoor wireless communications. This hybrid network combines the high-speed data transmission offered by visible light communication and the ubiquitous coverage of radio-frequency techniques. While a hybrid network can improve the system throughput and users’ experience, it also challenges the process of access point selection (APS) due to the mixture of heterogeneous access points. In this paper, the differences between homogeneous and heterogeneous networks regarding APS are discussed, and a two-stage APS method is proposed for hybrid Li-Fi/Wi-Fi networks. In the first stage, a fuzzy logic system is developed to determine the users that should be connected to Wi-Fi. In the second stage, the remaining users are assigned in the environment of a homogeneous Li-Fi network. Compared with the optimisation method, the proposed method achieves a close-to-optimal throughput at significantly reduced complexity. Simulation results also show that our method greatly improves the system throughput over the conventional methods, such as the signal strength strategy and load balancing, at slightly increased complexity.

Journal ArticleDOI
TL;DR: The numerical and simulation results show that the NOMA with the proposed asynchronous IC technique outperforms the OFDMA and it is shown that employing iterative IC provides significant performance gain for NOM a and the number of required iterations depends on the modulation level and the detection method.
Abstract: The non-orthogonal multiple access (NOMA) allows one subcarrier to be allocated to more than one user at the same time in an orthogonal frequency division multiplexing (OFDM) system. NOMA is a promising technique to provide high throughput due to frequency reuse within a cell. In this paper, a novel interference cancellation (IC) technique is proposed for asynchronous NOMA systems. The proposed IC technique exploits a triangular pattern to perform the IC from all interfering users for the desired user. The bit error rate and the capacity performance analysis of an uplink NOMA system with the proposed IC technique are presented, along with the comparison to orthogonal frequency division multiple access (OFDMA) systems. The numerical and simulation results show that the NOMA with the proposed asynchronous IC technique outperforms the OFDMA. It is also shown that employing iterative IC provides significant performance gain for NOMA and the number of required iterations depends on the modulation level and the detection method. With hard decision, two iterations are sufficient, and however, with soft decision, two iterations are enough only for low modulation level, and more iterations are desirable for high modulation level.