SlideShare a Scribd company logo
1 of 46
Download to read offline
An Adaptive Modulation Scheme for Two-user Fading
          MAC with Quantized Fade State Feedback

                               Sudipta Kundu and B. Sundar Rajan




                           Department of Electrical Communication Engineering
                                 Indian Institute Of Science, Bangalore


                                            IEEE PIMRC’12
                                           Sydney, Australia,
                                         September 9-12, 2012


Sudipta Kundu & B. Sundar Rajan (IISc)        IEEE PIMRC’12               September 9-12, 2012   1 / 35
Outline of Presentation


  1   Introduction

  2   Contributions

  3   Channel Quantization

  4   Adaptive Modulation Scheme

  5   Concluding Remarks and Future Work




Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   2 / 35
Outline


  1   Introduction

  2   Contributions

  3   Channel Quantization

  4   Adaptive Modulation Scheme

  5   Concluding Remarks and Future Work




Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   3 / 35
System Model


                       User-1                       z ∼ CN (0, σ 2)
                                   h1
                       x1 ∈ S 1
                                                                        √             √
                                                                   y=       P h 1 x1 + P h 2 x2 + z
                       User-2
                                   h2
                       x2 ∈ S 2
                                         Two-user fading MAC with Gaussian noise.




         The symbols of the users are jointly decoded at the destination as follows
                                                       √          √
                      (s1 , s2 ) = arg
                        ˆ ˆ              min     |y − ( Ph1 s1 + Ph2 s2 )|2 .
                                               (s1 ,s2 )∈S1 ×S2




Sudipta Kundu & B. Sundar Rajan (IISc)               IEEE PIMRC’12                         September 9-12, 2012   4 / 35
Motivation - Example : With No CSI
  Consider the case when there is no additive noise at the destination, and
  both users use QPSK signal sets at the input.
                         √
  Let h1 = 1∠0 and h2 = 2∠ π .4




                              2

                                         1
                     3                                                     (4, 1)
                                                                            OR
                                  4                                        (2, 4)

                     QPSK Signal Set

                                                   Sum Constellation

Sudipta Kundu & B. Sundar Rajan (IISc)       IEEE PIMRC’12             September 9-12, 2012   5 / 35
Fade State

                             User-1                   z ∼ CN (0, σ 2)
                                         h1
                             x1 ∈ S 1
                                                                        √                √
                                                                   y=       P h 1 x1 +       P h 2 x2 + z
                             User-2
                                         h2
                             x2 ∈ S 2

                                          Two-user fading MAC with Gaussian noise.




         Can be viewed as a single user AWGN channel with symbols chosen from
                                   √        √           √
                           Ssum = Ph1 S1 + Ph2 S2 = Ph1 (S1 + γe jθ S2 ),
                                                                                               Seff
                        h2
         where γ =      h1
                             and θ = ∠ h2 . (fade state)
                                       h      1

         Assume S1 = S2 = S, where S is a symmetric M-PSK signal set, with M = 2λ , λ being a
         positive integer.
         Assume γ ≥ 1.


Sudipta Kundu & B. Sundar Rajan (IISc)                IEEE PIMRC’12                                   September 9-12, 2012   6 / 35
Fade State

                             User-1                   z ∼ CN (0, σ 2)
                                         h1
                             x1 ∈ S 1
                                                                        √                √
                                                                   y=       P h 1 x1 +       P h 2 x2 + z
                             User-2
                                         h2
                             x2 ∈ S 2

                                          Two-user fading MAC with Gaussian noise.




         Can be viewed as a single user AWGN channel with symbols chosen from
                                   √        √           √
                           Ssum = Ph1 S1 + Ph2 S2 = Ph1 (S1 + γe jθ S2 ),
                                                                                               Seff
                        h2
         where γ =      h1
                             and θ = ∠ h2 . (fade state)
                                       h      1

         Assume S1 = S2 = S, where S is a symmetric M-PSK signal set, with M = 2λ , λ being a
         positive integer.
         Assume γ ≥ 1.


Sudipta Kundu & B. Sundar Rajan (IISc)                IEEE PIMRC’12                                   September 9-12, 2012   6 / 35
Outline


  1   Introduction

  2   Contributions

  3   Channel Quantization

  4   Adaptive Modulation Scheme

  5   Concluding Remarks and Future Work




Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   7 / 35
Contributions



         Quantization of (Γ, Θ) plane when both the users use M-PSK signal
         sets

         Adaptive Modulation Scheme based on constellation rotation which
         satisfies a minimum distance guarantee δ in Seff (γ, θ)

         Optimal angles for rotation in closed form

         Upper bound on δ

         Performance gains




Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   8 / 35
Outline


  1   Introduction

  2   Contributions

  3   Channel Quantization

  4   Adaptive Modulation Scheme

  5   Concluding Remarks and Future Work




Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   9 / 35
Distance Distribution in Effective Constellation

  Distance between (s1 , s2 )sum , (s1 , s2 )sum ∈ Ssum given by
                                       √
            d(s1 ,s2 )sum ↔(s ,s )sum = P|h1 ||(s1 − s1 ) + γe jθ (s2 − s2 )|
                             1 2
                                       √
                                      = P|h1 |d(s1 ,s2 )↔(s1 ,s2 ) ,

  where (s1 , s2 ), (s1 , s2 ) ∈ Seff and

                           d(s1 ,s2 )↔(s1 ,s2 ) = |(s1 − s1 ) + γe jθ (s2 − s2 )|
  .

                                         (s1 − s1 )
                     If γe jθ = −                   , then d(s1 ,s2 )↔(s1 ,s2 ) = 0 .
                                         (s2 − s2 )



Sudipta Kundu & B. Sundar Rajan (IISc)            IEEE PIMRC’12              September 9-12, 2012   10 / 35
Distance Distribution in Effective Constellation

  Distance between (s1 , s2 )sum , (s1 , s2 )sum ∈ Ssum given by
                                       √
            d(s1 ,s2 )sum ↔(s ,s )sum = P|h1 ||(s1 − s1 ) + γe jθ (s2 − s2 )|
                             1 2
                                       √
                                      = P|h1 |d(s1 ,s2 )↔(s1 ,s2 ) ,

  where (s1 , s2 ), (s1 , s2 ) ∈ Seff and

                           d(s1 ,s2 )↔(s1 ,s2 ) = |(s1 − s1 ) + γe jθ (s2 − s2 )|
  .

                                         (s1 − s1 )
                     If γe jθ = −                   , then d(s1 ,s2 )↔(s1 ,s2 ) = 0 .
                                         (s2 − s2 )



Sudipta Kundu & B. Sundar Rajan (IISc)            IEEE PIMRC’12              September 9-12, 2012   10 / 35
Singular Fade States



  Definition (Singular Fade State)                            1.5



  A fade state (γ, θ) is said to be a                         1


  singular fade state if |Seff | < M 2 .
                                                             0.5




                                  s1 − s1                     0

                   γe jθ = −
                                  s2 − s2                   −0.5



  Depends on the signal sets being used                      −1

  by the users!
                                                            −1.5
                                                              −1.5       −1     −0.5      0      0.5       1       1.5


     H = Set of all singular fade states.
                                                                     Singular fade states for QPSK case.




Sudipta Kundu & B. Sundar Rajan (IISc)      IEEE PIMRC’12                        September 9-12, 2012          11 / 35
Observations


         Minimum distance is Seff , dmin (γ, θ) ≤ dmin (S).

         When both the users use M-PSK signal sets,
                                                                             2π
                Distance distribution in Seff is periodic in θ with period        .
                                                                              M
                If (γ , θ ) is a singular fade state, then there exists singular fade states
                at (γ , θ + p 2π ), where 1 ≤ p ≤ M − 1.
                                M

                To study distance profile in Seff , sufficient to consider only the case
                               π
                when 0 ≤ θ ≤ .
                               M
                                                                    π
                Sufficient to obtain quantization only for wedge [0, M ] .




Sudipta Kundu & B. Sundar Rajan (IISc)     IEEE PIMRC’12              September 9-12, 2012   12 / 35
Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   13 / 35
Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   14 / 35
Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   15 / 35
Distance Class



                                                                                                                 6
        3                                                                      3
                           6
                                                                                                                          5
                                                                               2
                                                                                               7
        2                                             2
                  7                          5
                                                                                                             8                         2
        1                       8                                              1         10
                                                  3        1
                                                                                                                                                   1
                 10                                                                                                           3
        0                                                                      0
                                                                                                   9
                                    9                 4                            11
       −1   11                                   14                        −1                                                              4
                                                                                                                     14
                                                      13                                 12
       −2             12            15                                     −2
                                                                                                                              13
                                                                                                       15

       −3                                    16                            −3
                                                                                                              16
            −3   −2        −1            0        1   2    3                        −3    −2           −1        0        1        2           3




                       (γ, θ) = (1.8, 25◦ )                                                    (γ, θ) = (2.1, 7◦ )




Sudipta Kundu & B. Sundar Rajan (IISc)                         IEEE PIMRC’12                                September 9-12, 2012                   16 / 35
Definitions


  Definition (Distance Class)
                                                               2
  A distance class denoted by C, is a subset of Seff (γ, θ), which contains the pairs
  of the form {(s1 , s2 ), (s1 , s2 )}, (s1 , s2 ) = (s1 , s2 ) where (s1 , s2 ) and (s1 , s2 ) denote
  the complex points in Seff , such that the distance between the two elements of a
  pair is same for all pairs in C and this property holds for all values of γ and θ,
  though the value of the distance depends on (γ, θ).

                                 16
         For the QPSK case,           = 120 possible pairwise distances in Seff (γ, θ) is
                                  2
         partitioned into just 20 distance classes.
                        ¯
         For a given S, C = set of the all distance classes for it




Sudipta Kundu & B. Sundar Rajan (IISc)        IEEE PIMRC’12                 September 9-12, 2012   17 / 35
Definitions


  Definition (Class Distance Function)
  Associated with every distance class C is a class distance function
  dC (γ, θ) : (Γ, Θ) → R, which gives the value of the distance between the
  two elements of a pair in C for any (γ, θ).

  Definition
  The region corresponding to distance class C, R(C) is the region on the
  (Γ, Θ) plane for which the class distance function dC (γ, θ), gives the
  minimum distance in Seff .

                                                              π
                                  RW (C) = R(C) ∩ wedge [0,     ].
                                                              M


Sudipta Kundu & B. Sundar Rajan (IISc)      IEEE PIMRC’12            September 9-12, 2012   18 / 35
Channel Quantization for QPSK Signal Sets




                                         (γ, θ) = (2, 14◦ ).



                                                                   √
Step 1   The singular fade states lying in the wedge [0, π/4] are ( 2, π/4) and
         (1, 0).

Sudipta Kundu & B. Sundar Rajan (IISc)    IEEE PIMRC’12        September 9-12, 2012   19 / 35
Channel Quantization for QPSK Signal Sets




                                         (γ, θ) = (2, 14◦ ).



                    √
Step 2          At ( 2, π/4), the class distance function
                dCk (γ, θ) = 2γ 2 + 4 − 4γ cos θ − 4γ sin θ reduces to zero.
                 2
                     1




Sudipta Kundu & B. Sundar Rajan (IISc)    IEEE PIMRC’12             September 9-12, 2012   19 / 35
Channel Quantization for QPSK Signal Sets




                                            (γ, θ) = (2, 14◦ ).



Step 2          For the singular fade state (1, 0) the class distance functions that
                reduce to zero are as follows
                          dCk (γ, θ) = 2γ 2 + 2 − 4γ cos θ
                           2
                              2

                          dCk (γ, θ) = 4γ 2 + 4 − 8γ cos θ = 2dCk (γ, θ) ≥ dCk (γ, θ).
                           2                                   2            2
                              3                                   2              2


Sudipta Kundu & B. Sundar Rajan (IISc)       IEEE PIMRC’12             September 9-12, 2012   19 / 35
Channel Quantization for QPSK Signal Sets




         To find the region RW (Ck1 ) we need to find (γ, θ) where
                                2            2
                               dCk (γ, θ) ≤ dCk (γ, θ),
                                             1                   2
                                   2           2
                                 dCk (γ, θ) ≤ dmin (S).
                                     1
         The pairwise boundaries are as follows
             2            2
            dCk (γ, θ) = dCk (γ, θ) ⇒ γ sin θ = 1/2
                   1                     2
               2
              dCk (γ, θ) = dmin (S) = 2 ⇒ (γ cos θ − 1)2 + (γ sin θ − 1)2 = 1.
                            2
                   1




Sudipta Kundu & B. Sundar Rajan (IISc)           IEEE PIMRC’12       September 9-12, 2012   20 / 35
Channel Quantization for QPSK Signal Sets
         To find the region RW (Ck1 ) we need to find (γ, θ) where
                                2            2
                               dCk (γ, θ) ≤ dCk (γ, θ),
                                                1                   2
                                              2                 2
                                           ≤ dCk (γ, θ)        dmin (S).
                                                1
         The pairwise boundaries are as follows
             2            2
            dCk (γ, θ) = dCk (γ, θ) ⇒ γ sin θ = 1/2
                   1                     2

              dCk (γ, θ) = dmin (S) = 2 ⇒ (γ cos θ − 1)2 + (γ sin θ − 1)2 = 1.
               2            2
                   1




Sudipta Kundu & B. Sundar Rajan (IISc)              IEEE PIMRC’12          September 9-12, 2012   20 / 35
Channel Quantization for QPSK Signal Sets




Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   21 / 35
Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   22 / 35
Outline


  1   Introduction

  2   Contributions

  3   Channel Quantization

  4   Adaptive Modulation Scheme

  5   Concluding Remarks and Future Work




Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   23 / 35
Violation Circles


         Goal: To provide a minimum distance guarantee of δ in Seff .

         We have dCki (γ, θ) = |s2,i − s2,i ||γe jθ − γi e jθi | .

         Avoid fade states for which dCki (γ, θ) < δ, 1 ≤ i ≤ NW i.e.,

                                                            δ
                            |γe jθ − γi e jθi | <                    , for 1 ≤ i ≤ NW .
                                                    |s2,i   − s2,i |

         Above equation represents circular regions on (Γ, Θ) plane with center
                                                      δ
         at (γi , θi ) and radius ρ(γi , θi ) = |s2,i −s | . (Violation Circles)
                                                                2,i




Sudipta Kundu & B. Sundar Rajan (IISc)         IEEE PIMRC’12                   September 9-12, 2012   24 / 35
Example: Violation Circles for QPSK case


                                                                       Class representative for
                                                                                      C
                                                                       distance class√ k1 is (3,√
                                                                                                5).
                                                                       Therefore, ρ( 2, π ) = 2.
                                                                                           4
                                                                       The√ violation circle centered
                                                                       at ( 2, π ) has radius ( √2 ).
                                                                                4
                                                                                                 δ

                                                                       Similarly, the violation circle
                                                                       centered at (1, 0) has radius
                                                                        δ
                                                                       √ .
                                                                         2




              Violation circles for QPSK signal sets




Sudipta Kundu & B. Sundar Rajan (IISc)                 IEEE PIMRC’12              September 9-12, 2012   25 / 35
Constellation Rotation Scheme



         For fade states inside the violation circles : users adapt their
         transmission in order to meet the minimum distance requirement
         For fade states outside the violation circles : no adaptation required
         Adaptation via rotation of constellation of one user relative to the
         other, without varying transmit power

                                     S + γe jθ {e jα S} = S + γe j(θ+α) S
         i.e., fade state (γ, θ) is transformed to (γ, θ + α) after rotation.




Sudipta Kundu & B. Sundar Rajan (IISc)         IEEE PIMRC’12           September 9-12, 2012   26 / 35
Optimal Angle of Rotation


  Definition
  An optimal rotation angle, for a violation circle with center at singular
  fade state (γi , θi ) , 1 ≤ i ≤ NW is that angle of rotation which maximizes
  the minimum distance in Seff for the same transmit power, when fade
  state (γ, θ) = (γi , θi ).

         Find the optimal phase θi,opt for each (γi , θi ).
         Optimal phase corresponds to the phase of one of the point of
         intersections of the arc γ = γi with the pairwise boundaries between
         the regions within the wedge.
         Optimal rotation angle αi,opt transforms fade state from (γi , θi ) to
         (γi , θi,opt ).



Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12        September 9-12, 2012   27 / 35
Optimal Rotation Angles for the QPSK case




                                         Optimal rotation angles for the QPSK case




Sudipta Kundu & B. Sundar Rajan (IISc)               IEEE PIMRC’12                   September 9-12, 2012   28 / 35
Upper bound on δ
                                             P is transfered to P’ after rotation, which still lies
                                  γ sin θ    within the violation circle and thus does not satisfy
                                         2   the minimum distance guarantee.




                                                     Initial position of fade state (γ, θ)

                                                              P
                                                                              Effective shifted
                                                                              position of the
                                         1
                                                                              fade state
                                                                              after rotation.
                                                                       P’




                                                                                                 γ cos θ
                                         0                         1                             2




  Required: For each i, 1 ≤ i ≤ NW ,

              ρ(γi , θi ) + ρ(γj , θj ) ≤ d(γi ,θi,opt )↔(γj ,θj ) , for all 1 ≤ j ≤ NW .

Sudipta Kundu & B. Sundar Rajan (IISc)                   IEEE PIMRC’12                                     September 9-12, 2012   29 / 35
Upper bound on δ
                                             P is transfered to P’ after rotation, which still lies
                                  γ sin θ    within the violation circle and thus does not satisfy
                                         2   the minimum distance guarantee.




                                                     Initial position of fade state (γ, θ)

                                                              P
                                                                              Effective shifted
                                                                              position of the
                                         1
                                                                              fade state
                                                                              after rotation.
                                                                       P’




                                                                                                 γ cos θ
                                         0                         1                             2




  Required: For each i, 1 ≤ i ≤ NW ,

              ρ(γi , θi ) + ρ(γj , θj ) ≤ d(γi ,θi,opt )↔(γj ,θj ) , for all 1 ≤ j ≤ NW .

Sudipta Kundu & B. Sundar Rajan (IISc)                   IEEE PIMRC’12                                     September 9-12, 2012   29 / 35
Example: QPSK case


         The radii of the violation circles are
                                                       √            δ
                                         ρ(1, 0◦ ) = ρ( 2, 45◦ ) = √
                                                                     2


                         d(√2,45◦ )↔(√2,20.7◦ ) = d(1,0◦ )↔(√2,20.7◦ ) ≈ 0.5936
                         d(√2,45◦ )↔(1,30◦ ) = d(1,0◦ )↔(1,30◦ ) ≈ 0.5176.

         To avoid overlap we must have
                               δ
                           2( √ ) ≤ min{0.5936, 0.5176} =⇒ δ ≤ 0.365.
                                2



Sudipta Kundu & B. Sundar Rajan (IISc)          IEEE PIMRC’12            September 9-12, 2012   30 / 35
Summary


         The destination checks if the fade state lies within any of the NW
         violation circles.
         The location of the fade state - whether in any of the NW violation
         circles or outside is indicated to the users by a feedback of
          log2 (NW + 1) bits. The destination also indicates which of the two
         ratios h1 or h1 is used for quantization (i.e., for γ >= 1) using a
                 h2
                       h2
         single bit feedback.
         (Total feedback overhead = log2 (NW + 1) + 1 bits per quasistatic interval.)
                                                            h2
         One of the two users (User-2 if ratio computed is h1 and User-1
         otherwise), using the feedback they receive, rotates its constellation
         by the optimal angles.



Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12             September 9-12, 2012   31 / 35
Simulation Results: QPSK




Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   32 / 35
Outline


  1   Introduction

  2   Contributions

  3   Channel Quantization

  4   Adaptive Modulation Scheme

  5   Concluding Remarks and Future Work




Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   33 / 35
Conclusions and Future Work


  Conclusions:
         Channel quantization for M-PSK signal sets
         Identified violation circles which result in violating minimum distance
         guarantee
         Obtained optimal angles of rotation in closed form
         Presented simulation results to show the extent of performance
         improvement by the proposed scheme
  Future Work:
         Coding across time
         More than two users
         With QAM signal sets



Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12        September 9-12, 2012   34 / 35
Thank You!




Sudipta Kundu & B. Sundar Rajan (IISc)     IEEE PIMRC’12   September 9-12, 2012   35 / 35
Channel Quantization for 8-PSK Signal Sets




                                 Quantization of the wedge [0, π/8] for 8-PSK signal sets.

Sudipta Kundu & B. Sundar Rajan (IISc)               IEEE PIMRC’12                           September 9-12, 2012   1/5
Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   2/5
Optimal Angle of Rotation

  Lemma
  Let dCki (γ, θ) be the class distance function which reduces to zero at the
  singular fade state (γi , θi ) ∈ HW . For a fixed γ0 and (γ0 , θ) lying within
  the wedge [0, π/M], the value of dCki (γ0 , θ) increases as the difference
  |θi − θ| increases.



                                                    (γi, θi)
                                                                     γ = γ0


                                                1
                                     Diagram illustrates the above lemma.



Sudipta Kundu & B. Sundar Rajan (IISc)           IEEE PIMRC’12                September 9-12, 2012   3/5
Procedure to find the Optimal Phase


                                                                    π
Step 1 If there are no such points of intersections then θi,opt = | M − θi |.
Step 2 If there are L such points of intersections, calculate the phase of each of
         these points of intersection θl,intersect , 1 ≤ l ≤ L by solving the equation
                                           2            2
                                          dCk (γ, θ) = dCk (γ, θ)|γ=γi .
                                             a,l               b,l


         Then compute the minimum distances corresponding to the point of
         intersection (γi , θl,intersect ) as
                                                            2
                               dmin (γi , θl,intersect ) = dCk (γ, θ)|γ=γi ,θ=θl,intersect .
                                                              a,l


         Choose l = arg max1≤l≤L dmin (γi , θl,intersect ), and θi,opt = θl                ,intersect .




Sudipta Kundu & B. Sundar Rajan (IISc)             IEEE PIMRC’12                      September 9-12, 2012   4/5
Simulation Results: 8-PSK




Sudipta Kundu & B. Sundar Rajan (IISc)   IEEE PIMRC’12   September 9-12, 2012   5/5

More Related Content

What's hot

Spectral methods for solving differential equations
Spectral methods for solving differential equationsSpectral methods for solving differential equations
Spectral methods for solving differential equationsRajesh Aggarwal
 
Munich07 Foils
Munich07 FoilsMunich07 Foils
Munich07 FoilsAntonini
 
Optimization of distributed generation of renewable energy sources by intelli...
Optimization of distributed generation of renewable energy sources by intelli...Optimization of distributed generation of renewable energy sources by intelli...
Optimization of distributed generation of renewable energy sources by intelli...Beniamino Murgante
 
study Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Imagesstudy Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large ImagesChiamin Hsu
 
Simulated Binary Crossover
Simulated Binary CrossoverSimulated Binary Crossover
Simulated Binary Crossoverpaskorn
 
R-NSGAII
R-NSGAIIR-NSGAII
R-NSGAIIpaskorn
 
1.differential approach to cardioid distribution -1-6
1.differential approach to cardioid distribution -1-61.differential approach to cardioid distribution -1-6
1.differential approach to cardioid distribution -1-6Alexander Decker
 
11.0001www.iiste.org call for paper.differential approach to cardioid distrib...
11.0001www.iiste.org call for paper.differential approach to cardioid distrib...11.0001www.iiste.org call for paper.differential approach to cardioid distrib...
11.0001www.iiste.org call for paper.differential approach to cardioid distrib...Alexander Decker
 
The International Journal of Engineering and Science
The International Journal of Engineering and ScienceThe International Journal of Engineering and Science
The International Journal of Engineering and Sciencetheijes
 
Skiena algorithm 2007 lecture15 backtracing
Skiena algorithm 2007 lecture15 backtracingSkiena algorithm 2007 lecture15 backtracing
Skiena algorithm 2007 lecture15 backtracingzukun
 
Connected roman domination in graphs
Connected roman domination in graphsConnected roman domination in graphs
Connected roman domination in graphseSAT Publishing House
 
A probabilistic model for recursive factorized image features ppt
A probabilistic model for recursive factorized image features pptA probabilistic model for recursive factorized image features ppt
A probabilistic model for recursive factorized image features pptirisshicat
 
Self Adaptive Simulated Binary Crossover
Self Adaptive Simulated Binary CrossoverSelf Adaptive Simulated Binary Crossover
Self Adaptive Simulated Binary Crossoverpaskorn
 
Unit 3 greedy method
Unit 3  greedy methodUnit 3  greedy method
Unit 3 greedy methodMaryJacob24
 

What's hot (17)

Spectral methods for solving differential equations
Spectral methods for solving differential equationsSpectral methods for solving differential equations
Spectral methods for solving differential equations
 
Munich07 Foils
Munich07 FoilsMunich07 Foils
Munich07 Foils
 
Advances in Directed Spanners
Advances in Directed SpannersAdvances in Directed Spanners
Advances in Directed Spanners
 
Optimization of distributed generation of renewable energy sources by intelli...
Optimization of distributed generation of renewable energy sources by intelli...Optimization of distributed generation of renewable energy sources by intelli...
Optimization of distributed generation of renewable energy sources by intelli...
 
study Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Imagesstudy Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Images
 
Simulated Binary Crossover
Simulated Binary CrossoverSimulated Binary Crossover
Simulated Binary Crossover
 
R-NSGAII
R-NSGAIIR-NSGAII
R-NSGAII
 
1.differential approach to cardioid distribution -1-6
1.differential approach to cardioid distribution -1-61.differential approach to cardioid distribution -1-6
1.differential approach to cardioid distribution -1-6
 
11.0001www.iiste.org call for paper.differential approach to cardioid distrib...
11.0001www.iiste.org call for paper.differential approach to cardioid distrib...11.0001www.iiste.org call for paper.differential approach to cardioid distrib...
11.0001www.iiste.org call for paper.differential approach to cardioid distrib...
 
The International Journal of Engineering and Science
The International Journal of Engineering and ScienceThe International Journal of Engineering and Science
The International Journal of Engineering and Science
 
Skiena algorithm 2007 lecture15 backtracing
Skiena algorithm 2007 lecture15 backtracingSkiena algorithm 2007 lecture15 backtracing
Skiena algorithm 2007 lecture15 backtracing
 
NCCU CPDA Lecture 12 Attribute Based Encryption
NCCU CPDA Lecture 12 Attribute Based EncryptionNCCU CPDA Lecture 12 Attribute Based Encryption
NCCU CPDA Lecture 12 Attribute Based Encryption
 
Connected roman domination in graphs
Connected roman domination in graphsConnected roman domination in graphs
Connected roman domination in graphs
 
A probabilistic model for recursive factorized image features ppt
A probabilistic model for recursive factorized image features pptA probabilistic model for recursive factorized image features ppt
A probabilistic model for recursive factorized image features ppt
 
1568973267 effect of multi-tone
1568973267 effect of multi-tone1568973267 effect of multi-tone
1568973267 effect of multi-tone
 
Self Adaptive Simulated Binary Crossover
Self Adaptive Simulated Binary CrossoverSelf Adaptive Simulated Binary Crossover
Self Adaptive Simulated Binary Crossover
 
Unit 3 greedy method
Unit 3  greedy methodUnit 3  greedy method
Unit 3 greedy method
 

Viewers also liked

Discontinuous modulation scheme for a differential mode cuk inverter
Discontinuous modulation scheme for a differential mode cuk inverterDiscontinuous modulation scheme for a differential mode cuk inverter
Discontinuous modulation scheme for a differential mode cuk inverterI3E Technologies
 
Performance Analysis Of Different Digital Modulation Scheme
Performance Analysis Of Different Digital Modulation SchemePerformance Analysis Of Different Digital Modulation Scheme
Performance Analysis Of Different Digital Modulation SchemeAjay Walia
 
Lte drivetest guideline with genex probe
Lte drivetest guideline with genex probeLte drivetest guideline with genex probe
Lte drivetest guideline with genex probeRay KHASTUR
 
3 g interview question & answer by telsol360
3 g interview question & answer  by telsol3603 g interview question & answer  by telsol360
3 g interview question & answer by telsol360Tel sol
 
Digital modulation techniques
Digital modulation techniquesDigital modulation techniques
Digital modulation techniquessrkrishna341
 
Lte drive test parameter introduction
Lte drive test parameter introductionLte drive test parameter introduction
Lte drive test parameter introductionRay KHASTUR
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTESofian .
 
Dc hspatechnology-120919125703-phpapp01
Dc hspatechnology-120919125703-phpapp01Dc hspatechnology-120919125703-phpapp01
Dc hspatechnology-120919125703-phpapp01Virak Sou
 

Viewers also liked (10)

Discontinuous modulation scheme for a differential mode cuk inverter
Discontinuous modulation scheme for a differential mode cuk inverterDiscontinuous modulation scheme for a differential mode cuk inverter
Discontinuous modulation scheme for a differential mode cuk inverter
 
Slides day one
Slides   day oneSlides   day one
Slides day one
 
Performance Analysis Of Different Digital Modulation Scheme
Performance Analysis Of Different Digital Modulation SchemePerformance Analysis Of Different Digital Modulation Scheme
Performance Analysis Of Different Digital Modulation Scheme
 
Lte drivetest guideline with genex probe
Lte drivetest guideline with genex probeLte drivetest guideline with genex probe
Lte drivetest guideline with genex probe
 
3 g interview question & answer by telsol360
3 g interview question & answer  by telsol3603 g interview question & answer  by telsol360
3 g interview question & answer by telsol360
 
Digital modulation techniques
Digital modulation techniquesDigital modulation techniques
Digital modulation techniques
 
Lte drive test parameter introduction
Lte drive test parameter introductionLte drive test parameter introduction
Lte drive test parameter introduction
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTE
 
Dc hspatechnology-120919125703-phpapp01
Dc hspatechnology-120919125703-phpapp01Dc hspatechnology-120919125703-phpapp01
Dc hspatechnology-120919125703-phpapp01
 
Lte optimization
Lte optimizationLte optimization
Lte optimization
 

Similar to PIMRC 2012

Instantons and Chern-Simons Terms in AdS4/CFT3
Instantons and Chern-Simons Terms in AdS4/CFT3Instantons and Chern-Simons Terms in AdS4/CFT3
Instantons and Chern-Simons Terms in AdS4/CFT3Sebastian De Haro
 
2007 EuRad Conference: Speech on Rough Layers (odp)
2007 EuRad Conference: Speech on Rough Layers (odp)2007 EuRad Conference: Speech on Rough Layers (odp)
2007 EuRad Conference: Speech on Rough Layers (odp)Nicolas Pinel
 
2007 EuRad Conference: Speech on Rough Layers (ppt)
2007 EuRad Conference: Speech on Rough Layers (ppt)2007 EuRad Conference: Speech on Rough Layers (ppt)
2007 EuRad Conference: Speech on Rough Layers (ppt)Nicolas Pinel
 
A study on active microstrip circular patch antenna
A study on active microstrip circular patch antennaA study on active microstrip circular patch antenna
A study on active microstrip circular patch antennaAlexander Decker
 
Detection of unknown signal
Detection of unknown signalDetection of unknown signal
Detection of unknown signalsumitf1
 
New Classes of Odd Graceful Graphs
New Classes of Odd Graceful GraphsNew Classes of Odd Graceful Graphs
New Classes of Odd Graceful Graphsgraphhoc
 
Parallel Coordinate Descent Algorithms
Parallel Coordinate Descent AlgorithmsParallel Coordinate Descent Algorithms
Parallel Coordinate Descent AlgorithmsShaleen Kumar Gupta
 
Asynchronous Differential Distributed Space-Time Coding
Asynchronous Differential Distributed Space-Time CodingAsynchronous Differential Distributed Space-Time Coding
Asynchronous Differential Distributed Space-Time Codingmravendi
 
Lecture4 kenrels functions_rkhs
Lecture4 kenrels functions_rkhsLecture4 kenrels functions_rkhs
Lecture4 kenrels functions_rkhsStéphane Canu
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalGiselleginaGloria
 
Matrix Models of 2D String Theory in Non-trivial Backgrounds
Matrix Models of 2D String Theory in Non-trivial BackgroundsMatrix Models of 2D String Theory in Non-trivial Backgrounds
Matrix Models of 2D String Theory in Non-trivial BackgroundsUtrecht University
 
Calculating Non-adiabatic Pressure Perturbations during Multi-field Inflation
Calculating Non-adiabatic Pressure Perturbations during Multi-field InflationCalculating Non-adiabatic Pressure Perturbations during Multi-field Inflation
Calculating Non-adiabatic Pressure Perturbations during Multi-field InflationIan Huston
 

Similar to PIMRC 2012 (20)

Instantons and Chern-Simons Terms in AdS4/CFT3
Instantons and Chern-Simons Terms in AdS4/CFT3Instantons and Chern-Simons Terms in AdS4/CFT3
Instantons and Chern-Simons Terms in AdS4/CFT3
 
Talk5
Talk5Talk5
Talk5
 
2007 EuRad Conference: Speech on Rough Layers (odp)
2007 EuRad Conference: Speech on Rough Layers (odp)2007 EuRad Conference: Speech on Rough Layers (odp)
2007 EuRad Conference: Speech on Rough Layers (odp)
 
2007 EuRad Conference: Speech on Rough Layers (ppt)
2007 EuRad Conference: Speech on Rough Layers (ppt)2007 EuRad Conference: Speech on Rough Layers (ppt)
2007 EuRad Conference: Speech on Rough Layers (ppt)
 
A study on active microstrip circular patch antenna
A study on active microstrip circular patch antennaA study on active microstrip circular patch antenna
A study on active microstrip circular patch antenna
 
Final_presentation
Final_presentationFinal_presentation
Final_presentation
 
Detection of unknown signal
Detection of unknown signalDetection of unknown signal
Detection of unknown signal
 
Metric Embeddings and Expanders
Metric Embeddings and ExpandersMetric Embeddings and Expanders
Metric Embeddings and Expanders
 
New Classes of Odd Graceful Graphs
New Classes of Odd Graceful GraphsNew Classes of Odd Graceful Graphs
New Classes of Odd Graceful Graphs
 
48
4848
48
 
Parallel Coordinate Descent Algorithms
Parallel Coordinate Descent AlgorithmsParallel Coordinate Descent Algorithms
Parallel Coordinate Descent Algorithms
 
Quantum chaos of generic systems - Marko Robnik
Quantum chaos of generic systems - Marko RobnikQuantum chaos of generic systems - Marko Robnik
Quantum chaos of generic systems - Marko Robnik
 
Asynchronous Differential Distributed Space-Time Coding
Asynchronous Differential Distributed Space-Time CodingAsynchronous Differential Distributed Space-Time Coding
Asynchronous Differential Distributed Space-Time Coding
 
Lecture4 kenrels functions_rkhs
Lecture4 kenrels functions_rkhsLecture4 kenrels functions_rkhs
Lecture4 kenrels functions_rkhs
 
Ph ddefence
Ph ddefencePh ddefence
Ph ddefence
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
 
Pcm
PcmPcm
Pcm
 
Monopole zurich
Monopole zurichMonopole zurich
Monopole zurich
 
Matrix Models of 2D String Theory in Non-trivial Backgrounds
Matrix Models of 2D String Theory in Non-trivial BackgroundsMatrix Models of 2D String Theory in Non-trivial Backgrounds
Matrix Models of 2D String Theory in Non-trivial Backgrounds
 
Calculating Non-adiabatic Pressure Perturbations during Multi-field Inflation
Calculating Non-adiabatic Pressure Perturbations during Multi-field InflationCalculating Non-adiabatic Pressure Perturbations during Multi-field Inflation
Calculating Non-adiabatic Pressure Perturbations during Multi-field Inflation
 

Recently uploaded

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 

Recently uploaded (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 

PIMRC 2012

  • 1. An Adaptive Modulation Scheme for Two-user Fading MAC with Quantized Fade State Feedback Sudipta Kundu and B. Sundar Rajan Department of Electrical Communication Engineering Indian Institute Of Science, Bangalore IEEE PIMRC’12 Sydney, Australia, September 9-12, 2012 Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 1 / 35
  • 2. Outline of Presentation 1 Introduction 2 Contributions 3 Channel Quantization 4 Adaptive Modulation Scheme 5 Concluding Remarks and Future Work Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 2 / 35
  • 3. Outline 1 Introduction 2 Contributions 3 Channel Quantization 4 Adaptive Modulation Scheme 5 Concluding Remarks and Future Work Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 3 / 35
  • 4. System Model User-1 z ∼ CN (0, σ 2) h1 x1 ∈ S 1 √ √ y= P h 1 x1 + P h 2 x2 + z User-2 h2 x2 ∈ S 2 Two-user fading MAC with Gaussian noise. The symbols of the users are jointly decoded at the destination as follows √ √ (s1 , s2 ) = arg ˆ ˆ min |y − ( Ph1 s1 + Ph2 s2 )|2 . (s1 ,s2 )∈S1 ×S2 Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 4 / 35
  • 5. Motivation - Example : With No CSI Consider the case when there is no additive noise at the destination, and both users use QPSK signal sets at the input. √ Let h1 = 1∠0 and h2 = 2∠ π .4 2 1 3 (4, 1) OR 4 (2, 4) QPSK Signal Set Sum Constellation Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 5 / 35
  • 6. Fade State User-1 z ∼ CN (0, σ 2) h1 x1 ∈ S 1 √ √ y= P h 1 x1 + P h 2 x2 + z User-2 h2 x2 ∈ S 2 Two-user fading MAC with Gaussian noise. Can be viewed as a single user AWGN channel with symbols chosen from √ √ √ Ssum = Ph1 S1 + Ph2 S2 = Ph1 (S1 + γe jθ S2 ), Seff h2 where γ = h1 and θ = ∠ h2 . (fade state) h 1 Assume S1 = S2 = S, where S is a symmetric M-PSK signal set, with M = 2λ , λ being a positive integer. Assume γ ≥ 1. Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 6 / 35
  • 7. Fade State User-1 z ∼ CN (0, σ 2) h1 x1 ∈ S 1 √ √ y= P h 1 x1 + P h 2 x2 + z User-2 h2 x2 ∈ S 2 Two-user fading MAC with Gaussian noise. Can be viewed as a single user AWGN channel with symbols chosen from √ √ √ Ssum = Ph1 S1 + Ph2 S2 = Ph1 (S1 + γe jθ S2 ), Seff h2 where γ = h1 and θ = ∠ h2 . (fade state) h 1 Assume S1 = S2 = S, where S is a symmetric M-PSK signal set, with M = 2λ , λ being a positive integer. Assume γ ≥ 1. Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 6 / 35
  • 8. Outline 1 Introduction 2 Contributions 3 Channel Quantization 4 Adaptive Modulation Scheme 5 Concluding Remarks and Future Work Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 7 / 35
  • 9. Contributions Quantization of (Γ, Θ) plane when both the users use M-PSK signal sets Adaptive Modulation Scheme based on constellation rotation which satisfies a minimum distance guarantee δ in Seff (γ, θ) Optimal angles for rotation in closed form Upper bound on δ Performance gains Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 8 / 35
  • 10. Outline 1 Introduction 2 Contributions 3 Channel Quantization 4 Adaptive Modulation Scheme 5 Concluding Remarks and Future Work Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 9 / 35
  • 11. Distance Distribution in Effective Constellation Distance between (s1 , s2 )sum , (s1 , s2 )sum ∈ Ssum given by √ d(s1 ,s2 )sum ↔(s ,s )sum = P|h1 ||(s1 − s1 ) + γe jθ (s2 − s2 )| 1 2 √ = P|h1 |d(s1 ,s2 )↔(s1 ,s2 ) , where (s1 , s2 ), (s1 , s2 ) ∈ Seff and d(s1 ,s2 )↔(s1 ,s2 ) = |(s1 − s1 ) + γe jθ (s2 − s2 )| . (s1 − s1 ) If γe jθ = − , then d(s1 ,s2 )↔(s1 ,s2 ) = 0 . (s2 − s2 ) Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 10 / 35
  • 12. Distance Distribution in Effective Constellation Distance between (s1 , s2 )sum , (s1 , s2 )sum ∈ Ssum given by √ d(s1 ,s2 )sum ↔(s ,s )sum = P|h1 ||(s1 − s1 ) + γe jθ (s2 − s2 )| 1 2 √ = P|h1 |d(s1 ,s2 )↔(s1 ,s2 ) , where (s1 , s2 ), (s1 , s2 ) ∈ Seff and d(s1 ,s2 )↔(s1 ,s2 ) = |(s1 − s1 ) + γe jθ (s2 − s2 )| . (s1 − s1 ) If γe jθ = − , then d(s1 ,s2 )↔(s1 ,s2 ) = 0 . (s2 − s2 ) Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 10 / 35
  • 13. Singular Fade States Definition (Singular Fade State) 1.5 A fade state (γ, θ) is said to be a 1 singular fade state if |Seff | < M 2 . 0.5 s1 − s1 0 γe jθ = − s2 − s2 −0.5 Depends on the signal sets being used −1 by the users! −1.5 −1.5 −1 −0.5 0 0.5 1 1.5 H = Set of all singular fade states. Singular fade states for QPSK case. Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 11 / 35
  • 14. Observations Minimum distance is Seff , dmin (γ, θ) ≤ dmin (S). When both the users use M-PSK signal sets, 2π Distance distribution in Seff is periodic in θ with period . M If (γ , θ ) is a singular fade state, then there exists singular fade states at (γ , θ + p 2π ), where 1 ≤ p ≤ M − 1. M To study distance profile in Seff , sufficient to consider only the case π when 0 ≤ θ ≤ . M π Sufficient to obtain quantization only for wedge [0, M ] . Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 12 / 35
  • 15. Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 13 / 35
  • 16. Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 14 / 35
  • 17. Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 15 / 35
  • 18. Distance Class 6 3 3 6 5 2 7 2 2 7 5 8 2 1 8 1 10 3 1 1 10 3 0 0 9 9 4 11 −1 11 14 −1 4 14 13 12 −2 12 15 −2 13 15 −3 16 −3 16 −3 −2 −1 0 1 2 3 −3 −2 −1 0 1 2 3 (γ, θ) = (1.8, 25◦ ) (γ, θ) = (2.1, 7◦ ) Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 16 / 35
  • 19. Definitions Definition (Distance Class) 2 A distance class denoted by C, is a subset of Seff (γ, θ), which contains the pairs of the form {(s1 , s2 ), (s1 , s2 )}, (s1 , s2 ) = (s1 , s2 ) where (s1 , s2 ) and (s1 , s2 ) denote the complex points in Seff , such that the distance between the two elements of a pair is same for all pairs in C and this property holds for all values of γ and θ, though the value of the distance depends on (γ, θ). 16 For the QPSK case, = 120 possible pairwise distances in Seff (γ, θ) is 2 partitioned into just 20 distance classes. ¯ For a given S, C = set of the all distance classes for it Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 17 / 35
  • 20. Definitions Definition (Class Distance Function) Associated with every distance class C is a class distance function dC (γ, θ) : (Γ, Θ) → R, which gives the value of the distance between the two elements of a pair in C for any (γ, θ). Definition The region corresponding to distance class C, R(C) is the region on the (Γ, Θ) plane for which the class distance function dC (γ, θ), gives the minimum distance in Seff . π RW (C) = R(C) ∩ wedge [0, ]. M Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 18 / 35
  • 21. Channel Quantization for QPSK Signal Sets (γ, θ) = (2, 14◦ ). √ Step 1 The singular fade states lying in the wedge [0, π/4] are ( 2, π/4) and (1, 0). Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 19 / 35
  • 22. Channel Quantization for QPSK Signal Sets (γ, θ) = (2, 14◦ ). √ Step 2 At ( 2, π/4), the class distance function dCk (γ, θ) = 2γ 2 + 4 − 4γ cos θ − 4γ sin θ reduces to zero. 2 1 Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 19 / 35
  • 23. Channel Quantization for QPSK Signal Sets (γ, θ) = (2, 14◦ ). Step 2 For the singular fade state (1, 0) the class distance functions that reduce to zero are as follows dCk (γ, θ) = 2γ 2 + 2 − 4γ cos θ 2 2 dCk (γ, θ) = 4γ 2 + 4 − 8γ cos θ = 2dCk (γ, θ) ≥ dCk (γ, θ). 2 2 2 3 2 2 Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 19 / 35
  • 24. Channel Quantization for QPSK Signal Sets To find the region RW (Ck1 ) we need to find (γ, θ) where 2 2 dCk (γ, θ) ≤ dCk (γ, θ), 1 2 2 2 dCk (γ, θ) ≤ dmin (S). 1 The pairwise boundaries are as follows 2 2 dCk (γ, θ) = dCk (γ, θ) ⇒ γ sin θ = 1/2 1 2 2 dCk (γ, θ) = dmin (S) = 2 ⇒ (γ cos θ − 1)2 + (γ sin θ − 1)2 = 1. 2 1 Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 20 / 35
  • 25. Channel Quantization for QPSK Signal Sets To find the region RW (Ck1 ) we need to find (γ, θ) where 2 2 dCk (γ, θ) ≤ dCk (γ, θ), 1 2 2 2 ≤ dCk (γ, θ) dmin (S). 1 The pairwise boundaries are as follows 2 2 dCk (γ, θ) = dCk (γ, θ) ⇒ γ sin θ = 1/2 1 2 dCk (γ, θ) = dmin (S) = 2 ⇒ (γ cos θ − 1)2 + (γ sin θ − 1)2 = 1. 2 2 1 Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 20 / 35
  • 26. Channel Quantization for QPSK Signal Sets Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 21 / 35
  • 27. Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 22 / 35
  • 28. Outline 1 Introduction 2 Contributions 3 Channel Quantization 4 Adaptive Modulation Scheme 5 Concluding Remarks and Future Work Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 23 / 35
  • 29. Violation Circles Goal: To provide a minimum distance guarantee of δ in Seff . We have dCki (γ, θ) = |s2,i − s2,i ||γe jθ − γi e jθi | . Avoid fade states for which dCki (γ, θ) < δ, 1 ≤ i ≤ NW i.e., δ |γe jθ − γi e jθi | < , for 1 ≤ i ≤ NW . |s2,i − s2,i | Above equation represents circular regions on (Γ, Θ) plane with center δ at (γi , θi ) and radius ρ(γi , θi ) = |s2,i −s | . (Violation Circles) 2,i Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 24 / 35
  • 30. Example: Violation Circles for QPSK case Class representative for C distance class√ k1 is (3,√ 5). Therefore, ρ( 2, π ) = 2. 4 The√ violation circle centered at ( 2, π ) has radius ( √2 ). 4 δ Similarly, the violation circle centered at (1, 0) has radius δ √ . 2 Violation circles for QPSK signal sets Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 25 / 35
  • 31. Constellation Rotation Scheme For fade states inside the violation circles : users adapt their transmission in order to meet the minimum distance requirement For fade states outside the violation circles : no adaptation required Adaptation via rotation of constellation of one user relative to the other, without varying transmit power S + γe jθ {e jα S} = S + γe j(θ+α) S i.e., fade state (γ, θ) is transformed to (γ, θ + α) after rotation. Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 26 / 35
  • 32. Optimal Angle of Rotation Definition An optimal rotation angle, for a violation circle with center at singular fade state (γi , θi ) , 1 ≤ i ≤ NW is that angle of rotation which maximizes the minimum distance in Seff for the same transmit power, when fade state (γ, θ) = (γi , θi ). Find the optimal phase θi,opt for each (γi , θi ). Optimal phase corresponds to the phase of one of the point of intersections of the arc γ = γi with the pairwise boundaries between the regions within the wedge. Optimal rotation angle αi,opt transforms fade state from (γi , θi ) to (γi , θi,opt ). Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 27 / 35
  • 33. Optimal Rotation Angles for the QPSK case Optimal rotation angles for the QPSK case Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 28 / 35
  • 34. Upper bound on δ P is transfered to P’ after rotation, which still lies γ sin θ within the violation circle and thus does not satisfy 2 the minimum distance guarantee. Initial position of fade state (γ, θ) P Effective shifted position of the 1 fade state after rotation. P’ γ cos θ 0 1 2 Required: For each i, 1 ≤ i ≤ NW , ρ(γi , θi ) + ρ(γj , θj ) ≤ d(γi ,θi,opt )↔(γj ,θj ) , for all 1 ≤ j ≤ NW . Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 29 / 35
  • 35. Upper bound on δ P is transfered to P’ after rotation, which still lies γ sin θ within the violation circle and thus does not satisfy 2 the minimum distance guarantee. Initial position of fade state (γ, θ) P Effective shifted position of the 1 fade state after rotation. P’ γ cos θ 0 1 2 Required: For each i, 1 ≤ i ≤ NW , ρ(γi , θi ) + ρ(γj , θj ) ≤ d(γi ,θi,opt )↔(γj ,θj ) , for all 1 ≤ j ≤ NW . Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 29 / 35
  • 36. Example: QPSK case The radii of the violation circles are √ δ ρ(1, 0◦ ) = ρ( 2, 45◦ ) = √ 2 d(√2,45◦ )↔(√2,20.7◦ ) = d(1,0◦ )↔(√2,20.7◦ ) ≈ 0.5936 d(√2,45◦ )↔(1,30◦ ) = d(1,0◦ )↔(1,30◦ ) ≈ 0.5176. To avoid overlap we must have δ 2( √ ) ≤ min{0.5936, 0.5176} =⇒ δ ≤ 0.365. 2 Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 30 / 35
  • 37. Summary The destination checks if the fade state lies within any of the NW violation circles. The location of the fade state - whether in any of the NW violation circles or outside is indicated to the users by a feedback of log2 (NW + 1) bits. The destination also indicates which of the two ratios h1 or h1 is used for quantization (i.e., for γ >= 1) using a h2 h2 single bit feedback. (Total feedback overhead = log2 (NW + 1) + 1 bits per quasistatic interval.) h2 One of the two users (User-2 if ratio computed is h1 and User-1 otherwise), using the feedback they receive, rotates its constellation by the optimal angles. Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 31 / 35
  • 38. Simulation Results: QPSK Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 32 / 35
  • 39. Outline 1 Introduction 2 Contributions 3 Channel Quantization 4 Adaptive Modulation Scheme 5 Concluding Remarks and Future Work Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 33 / 35
  • 40. Conclusions and Future Work Conclusions: Channel quantization for M-PSK signal sets Identified violation circles which result in violating minimum distance guarantee Obtained optimal angles of rotation in closed form Presented simulation results to show the extent of performance improvement by the proposed scheme Future Work: Coding across time More than two users With QAM signal sets Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 34 / 35
  • 41. Thank You! Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 35 / 35
  • 42. Channel Quantization for 8-PSK Signal Sets Quantization of the wedge [0, π/8] for 8-PSK signal sets. Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 1/5
  • 43. Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 2/5
  • 44. Optimal Angle of Rotation Lemma Let dCki (γ, θ) be the class distance function which reduces to zero at the singular fade state (γi , θi ) ∈ HW . For a fixed γ0 and (γ0 , θ) lying within the wedge [0, π/M], the value of dCki (γ0 , θ) increases as the difference |θi − θ| increases. (γi, θi) γ = γ0 1 Diagram illustrates the above lemma. Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 3/5
  • 45. Procedure to find the Optimal Phase π Step 1 If there are no such points of intersections then θi,opt = | M − θi |. Step 2 If there are L such points of intersections, calculate the phase of each of these points of intersection θl,intersect , 1 ≤ l ≤ L by solving the equation 2 2 dCk (γ, θ) = dCk (γ, θ)|γ=γi . a,l b,l Then compute the minimum distances corresponding to the point of intersection (γi , θl,intersect ) as 2 dmin (γi , θl,intersect ) = dCk (γ, θ)|γ=γi ,θ=θl,intersect . a,l Choose l = arg max1≤l≤L dmin (γi , θl,intersect ), and θi,opt = θl ,intersect . Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 4/5
  • 46. Simulation Results: 8-PSK Sudipta Kundu & B. Sundar Rajan (IISc) IEEE PIMRC’12 September 9-12, 2012 5/5