The document discusses joint beamforming, power, and channel allocation in a multi-user and multi-channel underlay MISO cognitive radio network. It aims to maximize the sum-rate of the secondary network while minimizing interference to primary users. A two-stage approach is proposed: 1) derive feasible beamforming vectors and power allocation for a given channel allocation using convex optimization; 2) use genetic algorithm and simulated annealing to find suboptimal channel allocations. Simulation results show the proposed algorithms achieve close-to-optimal sum-rate with lower complexity than existing zero-forcing beamforming approaches.
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
n this paper, to detect the moving objects between frames in compressed video and to obtain the bes
t
compression video
and the noiseless video. We describe a video in which frames by classifying
macroblocks (MB), and describe motion estimation (ME), motion vector field (MV) and motion
compensation (MC). we propose to classify Macroblocks of each video frame into different
classes and use
this class information to describe the frame content based on the motion vector. MB class informatio
n
video applications such as shot change detection, motion discontinuity detection, Outlier rejection
for
global motion estimation. To reduc
e the noise and to improve the clarity of the compressed video by using
contrast limited adaptive histogram equalization (CLAHE) Algorithm
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Mobile operators commonly use macro cells with trad
itional wide beam antennas for wider coverage in th
e
cell, but future capacity demands cannot be achieve
d by using them only. It is required to achieve max
imum
practical capacity from macro cells by employing hi
gher order sectorization and by utilizing all possi
ble
antenna solutions including smart antennas. This pa
per presents enhanced tessellation for 6-sector sit
es
and proposes novel layout for 12-sector sites. The
main target of this paper is to compare the perform
ance
of conventional wide beam antenna, switched beam sm
art antenna, adaptive beam antenna and different
network layouts in terms of offering better receive
d signal quality and user throughput. Splitting mac
ro cell
into smaller micro or pico cells can improve the ca
pacity of network, but this paper highlights the
importance of higher order sectorization and advanc
e antenna techniques to attain high Signal to
Interference plus Noise Ratio (SINR), along with im
proved network capacity. Monte Carlo simulations a
t
system level were done for Dual Cell High Speed Dow
nlink Packet Access (DC-HSDPA) technology with
multiple (five) users per Transmission Time Interva
l (TTI) at different Intersite Distance (ISD). The
obtained results validate and estimate the gain of
using smart antennas and higher order sectorization
with
proposed network layout.
Network efficiency enhancement by reactive channel state based allocation sch...IJECEIAES
Now a day the large MIMO has considered as the efficient approach to improve the spectral and energy efficiency at WMN. However, the PC is a big issue that caused by reusing similar pilot sequence at cells, which also restrict the performance of massive MIMO network. Here, we give the alternative answer, where each of UEs required allotting a channel sequences before passing the payload data, so as to avoid the channel collision of inter-cell. Our proposed protocol will ready to determine the channel collisions in distributed and scalable process, however giving unique properties of the large MIMO channels. Here we have proposed a RCSA (Reactive channel state based allocation) scheme, which will very productively work with the RAP blockers at large network of MIMO. The position of time-frequency of RAP blocks is modified in the middle of the adjacent cells, because of this design decision the RAP defend from the hardest types of interference at inter-cell. Further, to validate the performance of our proposed scheme it will be compared with other existing technique.
This document summarizes research on energy allocation approaches in energy harvesting wireless cooperative networks. It first discusses previous work on parallel, auction-based, and optimal power allocation strategies. It then proposes using an asymmetric Nash Bargaining algorithm at the relay to allocate power to users based on their channel state information and requirements. Simulations show this distributed approach can achieve performance close to more complex centralized strategies while reducing overhead. The key contribution is analyzing energy allocation when an energy harvesting relay communicates with multiple source-destination pairs using FDMA.
Enhanced fractional frequency reuse approach for interference mitigation in f...journalBEEI
Small cell networks are expected to heavily be deployed in wireless communication networks due to it ability to enhance signals quality and spectrum utilisation. However, interference is posing a major threat to wireless communication especially cellular femtocell networks whereby its performance is degraded in dense deployment areas. For this reason, an enhanced fractional frequency reuse approach is proposed in this paper to mitigate the interference in femtocell networks. This is achieved by dividing the service area and frequency into three regions and three sets whereby each set is allocated different frequency set. The femtocell location is later obtained and assigned frequency in accordance to the region. The proposed approach helps in reducing the interference, boost the signal to interference plus noise (SINR), and enhance the throughput.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET Journal
This document proposes a channel allocation strategy for a cognitive radio network that takes into account the locations of secondary users. The coverage area is divided into an overlay region near primary users and a hybrid region further away. Secondary users in the overlay region use an overlay spectrum access method, while those in the hybrid region use a sensing-free method. The paper formulates a resource allocation problem that optimizes power and channel allocation for secondary users based on their locations and spectrum access methods. It then proposes an adaptive algorithm that incorporates an interference violation test to determine resource allocation parameters and enable sensing-free access, while minimizing total power consumption subject to quality of service constraints. Simulation results demonstrate the effectiveness of the proposed location-aware and adaptive strategy in improving
Design of wideband dielectric resonator antenna with square slots excited usi...Conference Papers
The document describes the design of a wideband dielectric resonator antenna (DRA) with square slots for 5G communication applications operating at 26 GHz. Square slots of two different sizes are introduced in the DRA to reduce its quality factor and achieve a bandwidth of 3 GHz (11.5%) from 25-28 GHz. The DRA is excited using a microstrip feed line. Simulation results show the proposed antenna achieves a peak gain of 4.8 dBi and radiation efficiency of 93%. Compared to reference DRAs, the proposed antenna with slots provides the widest bandwidth for 5G millimeter-wave applications.
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
n this paper, to detect the moving objects between frames in compressed video and to obtain the bes
t
compression video
and the noiseless video. We describe a video in which frames by classifying
macroblocks (MB), and describe motion estimation (ME), motion vector field (MV) and motion
compensation (MC). we propose to classify Macroblocks of each video frame into different
classes and use
this class information to describe the frame content based on the motion vector. MB class informatio
n
video applications such as shot change detection, motion discontinuity detection, Outlier rejection
for
global motion estimation. To reduc
e the noise and to improve the clarity of the compressed video by using
contrast limited adaptive histogram equalization (CLAHE) Algorithm
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Mobile operators commonly use macro cells with trad
itional wide beam antennas for wider coverage in th
e
cell, but future capacity demands cannot be achieve
d by using them only. It is required to achieve max
imum
practical capacity from macro cells by employing hi
gher order sectorization and by utilizing all possi
ble
antenna solutions including smart antennas. This pa
per presents enhanced tessellation for 6-sector sit
es
and proposes novel layout for 12-sector sites. The
main target of this paper is to compare the perform
ance
of conventional wide beam antenna, switched beam sm
art antenna, adaptive beam antenna and different
network layouts in terms of offering better receive
d signal quality and user throughput. Splitting mac
ro cell
into smaller micro or pico cells can improve the ca
pacity of network, but this paper highlights the
importance of higher order sectorization and advanc
e antenna techniques to attain high Signal to
Interference plus Noise Ratio (SINR), along with im
proved network capacity. Monte Carlo simulations a
t
system level were done for Dual Cell High Speed Dow
nlink Packet Access (DC-HSDPA) technology with
multiple (five) users per Transmission Time Interva
l (TTI) at different Intersite Distance (ISD). The
obtained results validate and estimate the gain of
using smart antennas and higher order sectorization
with
proposed network layout.
Network efficiency enhancement by reactive channel state based allocation sch...IJECEIAES
Now a day the large MIMO has considered as the efficient approach to improve the spectral and energy efficiency at WMN. However, the PC is a big issue that caused by reusing similar pilot sequence at cells, which also restrict the performance of massive MIMO network. Here, we give the alternative answer, where each of UEs required allotting a channel sequences before passing the payload data, so as to avoid the channel collision of inter-cell. Our proposed protocol will ready to determine the channel collisions in distributed and scalable process, however giving unique properties of the large MIMO channels. Here we have proposed a RCSA (Reactive channel state based allocation) scheme, which will very productively work with the RAP blockers at large network of MIMO. The position of time-frequency of RAP blocks is modified in the middle of the adjacent cells, because of this design decision the RAP defend from the hardest types of interference at inter-cell. Further, to validate the performance of our proposed scheme it will be compared with other existing technique.
This document summarizes research on energy allocation approaches in energy harvesting wireless cooperative networks. It first discusses previous work on parallel, auction-based, and optimal power allocation strategies. It then proposes using an asymmetric Nash Bargaining algorithm at the relay to allocate power to users based on their channel state information and requirements. Simulations show this distributed approach can achieve performance close to more complex centralized strategies while reducing overhead. The key contribution is analyzing energy allocation when an energy harvesting relay communicates with multiple source-destination pairs using FDMA.
Enhanced fractional frequency reuse approach for interference mitigation in f...journalBEEI
Small cell networks are expected to heavily be deployed in wireless communication networks due to it ability to enhance signals quality and spectrum utilisation. However, interference is posing a major threat to wireless communication especially cellular femtocell networks whereby its performance is degraded in dense deployment areas. For this reason, an enhanced fractional frequency reuse approach is proposed in this paper to mitigate the interference in femtocell networks. This is achieved by dividing the service area and frequency into three regions and three sets whereby each set is allocated different frequency set. The femtocell location is later obtained and assigned frequency in accordance to the region. The proposed approach helps in reducing the interference, boost the signal to interference plus noise (SINR), and enhance the throughput.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET Journal
This document proposes a channel allocation strategy for a cognitive radio network that takes into account the locations of secondary users. The coverage area is divided into an overlay region near primary users and a hybrid region further away. Secondary users in the overlay region use an overlay spectrum access method, while those in the hybrid region use a sensing-free method. The paper formulates a resource allocation problem that optimizes power and channel allocation for secondary users based on their locations and spectrum access methods. It then proposes an adaptive algorithm that incorporates an interference violation test to determine resource allocation parameters and enable sensing-free access, while minimizing total power consumption subject to quality of service constraints. Simulation results demonstrate the effectiveness of the proposed location-aware and adaptive strategy in improving
Design of wideband dielectric resonator antenna with square slots excited usi...Conference Papers
The document describes the design of a wideband dielectric resonator antenna (DRA) with square slots for 5G communication applications operating at 26 GHz. Square slots of two different sizes are introduced in the DRA to reduce its quality factor and achieve a bandwidth of 3 GHz (11.5%) from 25-28 GHz. The DRA is excited using a microstrip feed line. Simulation results show the proposed antenna achieves a peak gain of 4.8 dBi and radiation efficiency of 93%. Compared to reference DRAs, the proposed antenna with slots provides the widest bandwidth for 5G millimeter-wave applications.
Performance evaluation of route selection schemes over a clustered cognitive ...Conference Papers
This document evaluates the performance of different route selection schemes over a clustered cognitive radio network (CRN) using a testbed with Universal Software Radio Peripheral (USRP) and GNU Radio platforms. The experimental results show that an enhanced reinforcement learning (RL)-based route selection scheme (C-ERL) selects stable routes in a clustered CRN while improving cluster stability and network scalability without significantly impacting quality of service metrics like throughput, packet delivery rate, and end-to-end delay. C-ERL adjusts its learning rate based on route capacity to reduce the number of route breakages and number of clusters compared to other non-clustered and clustered non-RL and RL-based route selection schemes.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
This document analyzes the performance of adaptive subcarrier allocation in coherent optical OFDM systems. It proposes two allocation schemes: proportional allocation and equal allocation. Proportional allocation aims to maximize data rate while ensuring fairness among users by assigning subcarriers to the user with the highest SNR for that subcarrier, as long as it does not exceed their proportional share. Equal allocation simply divides subcarriers equally among all users. The document models an optical OFDM system transmitting over 1000km of single-mode fiber and investigates how adaptive subcarrier allocation can improve performance compared to static allocation schemes.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
This document presents a novel approach to optimally deploy small cells in next-generation cellular networks. The approach aims to minimize total network installation costs, balance resource allocation among small cells, and provide optimal coverage with minimal interference between stations. An accurate formula is derived to determine the optimum number of small cell deployments. Mathematical expressions are also presented to calculate the critical handoff point between neighboring wireless stations. Simulation results demonstrate that the proposed approach can effectively alleviate interference and enhance coverage area compared to non-optimized small cell deployment strategies.
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...IJSRED
This document discusses an asynchronous cognitive radio network with wireless energy harvesting capabilities. It proposes a model where a primary ad hoc network operates alongside a cognitive secondary network, with the primary nodes connected to a power grid and the secondary nodes capable of harvesting radio frequency (RF) energy. The channel access of both networks is asynchronous and modeled using time-space Poisson point processes. An analytical framework is developed based on stochastic geometry to evaluate the performance of this asynchronous cognitive radio network with wireless energy harvesting secondary nodes.
Efficient energy, cost reduction, and QoS based routing protocol for wireless...IJECEIAES
Recent developments and widespread in wireless sensor network have led to many routing protocols, many of these protocols consider the efficiency of energy as the ultimate factor to maximize the WSN lifetime. The quality of Service (QoS) requirements for different applications of wireless sensor networks has posed additional challenges. Imaging and data transmission needs both QoS aware routing and energy to ensure the efficient use of sensors. In this paper, we propose an Efficient, Energy-Aware, Least Cost, (ECQSR) quality of service routing protocol for sensor networks which can run efficiently with best-effort traffic processing. The protocol aims to maximize the lifetime of the network out of balancing energy consumption across multiple nodes, by using the concept of service differentiation, finding lower cost by finding the shortest path using nearest neighbor algorithm (NN), also put certain constraints on the delay of the path for real-time data from where link cost that captures energy nodes reserve, energy of the transmission, error rate and other parameters. The results show that the proposed protocol improves the network lifetime and low power consumption.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Kumar Goud
Abstract: - Multiple Inputs and Multiple Output (MIMO) and Orthogonal Frequency Division Multiplexing (OFDM) system have the potential to attain high capability on the propagation setting. The aim of this paper is that the adaptive resource allocation in MIMO-OFDM system uses the water filling formula. Water filling answer is enforced for allocating the ability so as to extend the data rate. The overall system capability is maximised subject to the constraints on total power, signal to noise quantitative relation, and proportionality. Channel is assumed as a flat attenuation channel and therefore the comparison is created for various 2×2, 2×3, 3×2 and 4×4 MIMO-OFDM systems and water filling formula with allotted power. Supported the capability contribution from the relaying terminal, a brand new parameter referred to as cooperation constant is introduced as an operate of the relaying sub channel. This parameter is employed to switch the target parameter of the subcarrier allocation procedure. Fairness-oriented [Fading Channel] and throughput-oriented [Near finish Channel] algorithms square measure elite from the literature to check the planned technique. Each algorithms square measure changed to use the mean of cooperation constant within the objective parameter of the subcarrier allocation procedure and shown to own a much better total turnout with none sacrifice.
Keywords - MIMO-OFDM; Water filling Algorithm; Subcarrier Resource Allocation
1) The document analyzes how carrier aggregation (CA) in LTE-Advanced affects the total power transmitted by eNodeBs to meet users' quality of service (QoS) requirements.
2) It derives a general expression showing that the eNodeB's total transmit power is inversely proportional to the channel bandwidth and directly proportional to the cell radius and number of users.
3) Numerical analysis of single-cell and multi-cell scenarios show that using two-carrier CA can reduce the eNodeB's required transmit power by around 65% compared to a single carrier, improving energy efficiency.
Energy conservation in wireless communication systems with relaysAniruddha Chandra
The document discusses energy conservation in wireless communication systems using relays. It provides an introduction to the growing energy consumption of wireless networks and the need for more efficient designs. The basics of relaying are described, including what relays are, why they are used, and common relaying protocols. A framework for modeling energy consumption is also presented, including equations for power at transmit and receive, energy per bit, and the impact of fading. Research challenges in optimizing the use of relays are noted.
LARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETScsandit
In this paper, we consider the optimization of wireless capacity-limited backhaul links in future heterogeneous networks (HetNets). We assume that the HetNet is formed with one macro-cell base station (MBS), which is associated with multiple small-cell base stations (SBSs). It is also assumed both the MBS and the SBSs are equipped with massive arrays, while all mobiles users (macro-cell and small-cell users) have single antenna. For the backhaul links, we propose to use a capacity-aware beamforming scheme at the SBSs and MRC at the MBS. Using particle swarm optimization (PSO), each SBS seeks the optimal transmit weight vectors that maximize the backhaul uplink capacity and the access uplinks signal-to-interference plus noise ratio (SINR). The performance evaluation in terms of the symbol error rate (SER) and the ergodic system capacity shows that the proposed capacity-aware backhaul link scheme achieves similar or better performance than traditional wireless backhaul links and requires considerably less computational complexity.
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
This document analyzes the performance of three uplink transmission modes - single-hop direct, multi-hop cellular V2X, and store-carry-forward (SCF) - for delay sensitive real-time services in LTE-V2X networks. It presents a highway system model and compares the total energy consumption and transmission delay of the three modes using numerical simulations validated with ns-3. The results show that SCF mode consumes the least energy due to its carry phase, but incurs high delays unacceptable for real-time applications. Single-hop direct has the reverse performance. Multi-hop cellular V2X outperforms in terms of balancing low latency and moderate energy consumption beyond a cell radius of 600
Green technology is the development of products and systems that minimize environmental impact and conserve resources. It aims to reduce degradation of the environment, greenhouse gas emissions, and efficient use of energy and natural resources. Spectral efficiency refers to the information rate transmitted over a given bandwidth, while energy efficiency is the number of bits transmitted per joule of energy. Techniques like orthogonal frequency-division multiple access, multiple-input multiple-output, and relay transmission can improve the spectral efficiency of wireless networks. Adaptively allocating resources and turning off redundant systems when not in use can enhance both the energy efficiency and spectral efficiency-energy efficiency tradeoff.
GPS Enabled Energy Efficient Routing for ManetCSCJournals
In this paper, we propose an energy aware reactive approach by introducing energy and distance based threshold criteria. Cross Layer interaction is exploited the performance of physical layer which leads to significant improvement in the energy efficiency of a network.
The document discusses distributed power allocation strategies for wireless sensor networks with energy harvesting capabilities. It proposes using an asymmetric Nash bargaining algorithm where a relay allocates power to users based on their channel state information and requirements. This achieves a faster decay rate of 1/SNR. Simulations show the approach provides substantial tradeoffs between system performance and complexity compared to conventional methods. It also uses frequency division multiple access to divide bandwidths among users.
Energy Efficient Wireless CommunicationsJingon Joung
The tutorial begins with a brief introduction of spectral efficiency (SE) and energy efficiency (EE) in communications. Various definitions of EE will also be covered briefly. One typically used EE, i.e., bits-per-Joule, is theoretically derived and the ideal SE-EE tradeoff is introduced. It is recognized that a power amplifier (PA) is one of the most critical components in wireless communication systems and consumes a significant fraction of the total energy. The fundamental properties of PA, such as linearity and efficiency, are introduced. With the practical characteristics of PA, the detrimental effects of the signal non-linearity and power inefficiency of the PA on the SE, EE, and their tradeoff, are quantified.
Next, various existing EE-improving techniques are categorized from three perspectives: PA design, signal design and network design. This broad understanding based on the three categories will help motivate holistic design approaches to mitigate the non-ideal effects in real-life PA devices, and accelerate cross-domain research to further enhance the available techniques for high EE or good SE-EE tradeoff.
Last, the remaining challenges and future work for EE issue will be discussed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Block diagonalization precoding and power allocation for clustering small-cel...journalBEEI
The clustering network is a solution to improve data-rate transmission in small-cells. In this case, clustering small-cells (CSCs) adopt a multiple antennas concept. The multiple antennas are used to maximize the downlink data-rate transmission at the users, but it requires precoding techniques to minimize interference among CSC users. This paper proposes a block diagonalization (BD) as a precoding technique for minimizing interference among CSC users. The performance of the BD precoding implemented on the clustering network under various numbers of small-cells. The CSC also implements a water-filling power allocation (PA-CoopWF) to distribute the available transmission power along with the CSCs antennas. To show the performance, our paper simulates two types of precoding techniques; those are the proposed BD and minimum mean square error (MMSE) in CSCs. Based on the receiver user parts under the overlapping coordination of CSCs, our method based on the BD precoding achieves considerably higher data-rate transmission compared to the MMSE precoding, especially on larger clusters. The simulation also shows that by implementing CSC with the BD in short-range distances and higher numbers of antennas, it promotes better data-rate performances compared to the MMSE precoding by 2.75 times at distance 100m and 67% at 50 antennas.
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
This document summarizes research on downlink beamforming and admission control for spectrum sharing cognitive radio systems. It discusses maximizing the number of admitted secondary links under interference and QoS constraints, as well as maximizing the sum throughput of admitted secondary links. An iterative algorithm based on geometric programming is proposed to solve the non-convex throughput maximization problem. Simulation results show a tradeoff between number of admitted links and secondary network throughput, but that enforcing QoS constraints does not significantly reduce throughput. The goal is to minimize secondary transmitter power while meeting SINR and interference limits.
Dynamic resource allocation for opportunistic software-defined IoT networks: s...IJECEIAES
This document proposes a dynamic resource allocation algorithm for opportunistic software-defined IoT networks using a stochastic optimization framework. It formulates the problem as a two-stage binary linear stochastic program that aims to maximize network throughput while selecting transmission powers to minimize total power consumption under uncertain interference and traffic demands. Due to interference being a continuous random variable correlated over time, the algorithm instead solves a suboptimal sampling problem exploiting interference correlation. It periodically runs over time to adapt to changing channel and interference conditions, significantly increasing simultaneous IoT transmissions and achieved throughput compared to typical algorithms.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Performance evaluation of route selection schemes over a clustered cognitive ...Conference Papers
This document evaluates the performance of different route selection schemes over a clustered cognitive radio network (CRN) using a testbed with Universal Software Radio Peripheral (USRP) and GNU Radio platforms. The experimental results show that an enhanced reinforcement learning (RL)-based route selection scheme (C-ERL) selects stable routes in a clustered CRN while improving cluster stability and network scalability without significantly impacting quality of service metrics like throughput, packet delivery rate, and end-to-end delay. C-ERL adjusts its learning rate based on route capacity to reduce the number of route breakages and number of clusters compared to other non-clustered and clustered non-RL and RL-based route selection schemes.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
This document analyzes the performance of adaptive subcarrier allocation in coherent optical OFDM systems. It proposes two allocation schemes: proportional allocation and equal allocation. Proportional allocation aims to maximize data rate while ensuring fairness among users by assigning subcarriers to the user with the highest SNR for that subcarrier, as long as it does not exceed their proportional share. Equal allocation simply divides subcarriers equally among all users. The document models an optical OFDM system transmitting over 1000km of single-mode fiber and investigates how adaptive subcarrier allocation can improve performance compared to static allocation schemes.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
This document presents a novel approach to optimally deploy small cells in next-generation cellular networks. The approach aims to minimize total network installation costs, balance resource allocation among small cells, and provide optimal coverage with minimal interference between stations. An accurate formula is derived to determine the optimum number of small cell deployments. Mathematical expressions are also presented to calculate the critical handoff point between neighboring wireless stations. Simulation results demonstrate that the proposed approach can effectively alleviate interference and enhance coverage area compared to non-optimized small cell deployment strategies.
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...IJSRED
This document discusses an asynchronous cognitive radio network with wireless energy harvesting capabilities. It proposes a model where a primary ad hoc network operates alongside a cognitive secondary network, with the primary nodes connected to a power grid and the secondary nodes capable of harvesting radio frequency (RF) energy. The channel access of both networks is asynchronous and modeled using time-space Poisson point processes. An analytical framework is developed based on stochastic geometry to evaluate the performance of this asynchronous cognitive radio network with wireless energy harvesting secondary nodes.
Efficient energy, cost reduction, and QoS based routing protocol for wireless...IJECEIAES
Recent developments and widespread in wireless sensor network have led to many routing protocols, many of these protocols consider the efficiency of energy as the ultimate factor to maximize the WSN lifetime. The quality of Service (QoS) requirements for different applications of wireless sensor networks has posed additional challenges. Imaging and data transmission needs both QoS aware routing and energy to ensure the efficient use of sensors. In this paper, we propose an Efficient, Energy-Aware, Least Cost, (ECQSR) quality of service routing protocol for sensor networks which can run efficiently with best-effort traffic processing. The protocol aims to maximize the lifetime of the network out of balancing energy consumption across multiple nodes, by using the concept of service differentiation, finding lower cost by finding the shortest path using nearest neighbor algorithm (NN), also put certain constraints on the delay of the path for real-time data from where link cost that captures energy nodes reserve, energy of the transmission, error rate and other parameters. The results show that the proposed protocol improves the network lifetime and low power consumption.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Kumar Goud
Abstract: - Multiple Inputs and Multiple Output (MIMO) and Orthogonal Frequency Division Multiplexing (OFDM) system have the potential to attain high capability on the propagation setting. The aim of this paper is that the adaptive resource allocation in MIMO-OFDM system uses the water filling formula. Water filling answer is enforced for allocating the ability so as to extend the data rate. The overall system capability is maximised subject to the constraints on total power, signal to noise quantitative relation, and proportionality. Channel is assumed as a flat attenuation channel and therefore the comparison is created for various 2×2, 2×3, 3×2 and 4×4 MIMO-OFDM systems and water filling formula with allotted power. Supported the capability contribution from the relaying terminal, a brand new parameter referred to as cooperation constant is introduced as an operate of the relaying sub channel. This parameter is employed to switch the target parameter of the subcarrier allocation procedure. Fairness-oriented [Fading Channel] and throughput-oriented [Near finish Channel] algorithms square measure elite from the literature to check the planned technique. Each algorithms square measure changed to use the mean of cooperation constant within the objective parameter of the subcarrier allocation procedure and shown to own a much better total turnout with none sacrifice.
Keywords - MIMO-OFDM; Water filling Algorithm; Subcarrier Resource Allocation
1) The document analyzes how carrier aggregation (CA) in LTE-Advanced affects the total power transmitted by eNodeBs to meet users' quality of service (QoS) requirements.
2) It derives a general expression showing that the eNodeB's total transmit power is inversely proportional to the channel bandwidth and directly proportional to the cell radius and number of users.
3) Numerical analysis of single-cell and multi-cell scenarios show that using two-carrier CA can reduce the eNodeB's required transmit power by around 65% compared to a single carrier, improving energy efficiency.
Energy conservation in wireless communication systems with relaysAniruddha Chandra
The document discusses energy conservation in wireless communication systems using relays. It provides an introduction to the growing energy consumption of wireless networks and the need for more efficient designs. The basics of relaying are described, including what relays are, why they are used, and common relaying protocols. A framework for modeling energy consumption is also presented, including equations for power at transmit and receive, energy per bit, and the impact of fading. Research challenges in optimizing the use of relays are noted.
LARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETScsandit
In this paper, we consider the optimization of wireless capacity-limited backhaul links in future heterogeneous networks (HetNets). We assume that the HetNet is formed with one macro-cell base station (MBS), which is associated with multiple small-cell base stations (SBSs). It is also assumed both the MBS and the SBSs are equipped with massive arrays, while all mobiles users (macro-cell and small-cell users) have single antenna. For the backhaul links, we propose to use a capacity-aware beamforming scheme at the SBSs and MRC at the MBS. Using particle swarm optimization (PSO), each SBS seeks the optimal transmit weight vectors that maximize the backhaul uplink capacity and the access uplinks signal-to-interference plus noise ratio (SINR). The performance evaluation in terms of the symbol error rate (SER) and the ergodic system capacity shows that the proposed capacity-aware backhaul link scheme achieves similar or better performance than traditional wireless backhaul links and requires considerably less computational complexity.
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
This document analyzes the performance of three uplink transmission modes - single-hop direct, multi-hop cellular V2X, and store-carry-forward (SCF) - for delay sensitive real-time services in LTE-V2X networks. It presents a highway system model and compares the total energy consumption and transmission delay of the three modes using numerical simulations validated with ns-3. The results show that SCF mode consumes the least energy due to its carry phase, but incurs high delays unacceptable for real-time applications. Single-hop direct has the reverse performance. Multi-hop cellular V2X outperforms in terms of balancing low latency and moderate energy consumption beyond a cell radius of 600
Green technology is the development of products and systems that minimize environmental impact and conserve resources. It aims to reduce degradation of the environment, greenhouse gas emissions, and efficient use of energy and natural resources. Spectral efficiency refers to the information rate transmitted over a given bandwidth, while energy efficiency is the number of bits transmitted per joule of energy. Techniques like orthogonal frequency-division multiple access, multiple-input multiple-output, and relay transmission can improve the spectral efficiency of wireless networks. Adaptively allocating resources and turning off redundant systems when not in use can enhance both the energy efficiency and spectral efficiency-energy efficiency tradeoff.
GPS Enabled Energy Efficient Routing for ManetCSCJournals
In this paper, we propose an energy aware reactive approach by introducing energy and distance based threshold criteria. Cross Layer interaction is exploited the performance of physical layer which leads to significant improvement in the energy efficiency of a network.
The document discusses distributed power allocation strategies for wireless sensor networks with energy harvesting capabilities. It proposes using an asymmetric Nash bargaining algorithm where a relay allocates power to users based on their channel state information and requirements. This achieves a faster decay rate of 1/SNR. Simulations show the approach provides substantial tradeoffs between system performance and complexity compared to conventional methods. It also uses frequency division multiple access to divide bandwidths among users.
Energy Efficient Wireless CommunicationsJingon Joung
The tutorial begins with a brief introduction of spectral efficiency (SE) and energy efficiency (EE) in communications. Various definitions of EE will also be covered briefly. One typically used EE, i.e., bits-per-Joule, is theoretically derived and the ideal SE-EE tradeoff is introduced. It is recognized that a power amplifier (PA) is one of the most critical components in wireless communication systems and consumes a significant fraction of the total energy. The fundamental properties of PA, such as linearity and efficiency, are introduced. With the practical characteristics of PA, the detrimental effects of the signal non-linearity and power inefficiency of the PA on the SE, EE, and their tradeoff, are quantified.
Next, various existing EE-improving techniques are categorized from three perspectives: PA design, signal design and network design. This broad understanding based on the three categories will help motivate holistic design approaches to mitigate the non-ideal effects in real-life PA devices, and accelerate cross-domain research to further enhance the available techniques for high EE or good SE-EE tradeoff.
Last, the remaining challenges and future work for EE issue will be discussed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Block diagonalization precoding and power allocation for clustering small-cel...journalBEEI
The clustering network is a solution to improve data-rate transmission in small-cells. In this case, clustering small-cells (CSCs) adopt a multiple antennas concept. The multiple antennas are used to maximize the downlink data-rate transmission at the users, but it requires precoding techniques to minimize interference among CSC users. This paper proposes a block diagonalization (BD) as a precoding technique for minimizing interference among CSC users. The performance of the BD precoding implemented on the clustering network under various numbers of small-cells. The CSC also implements a water-filling power allocation (PA-CoopWF) to distribute the available transmission power along with the CSCs antennas. To show the performance, our paper simulates two types of precoding techniques; those are the proposed BD and minimum mean square error (MMSE) in CSCs. Based on the receiver user parts under the overlapping coordination of CSCs, our method based on the BD precoding achieves considerably higher data-rate transmission compared to the MMSE precoding, especially on larger clusters. The simulation also shows that by implementing CSC with the BD in short-range distances and higher numbers of antennas, it promotes better data-rate performances compared to the MMSE precoding by 2.75 times at distance 100m and 67% at 50 antennas.
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
This document summarizes research on downlink beamforming and admission control for spectrum sharing cognitive radio systems. It discusses maximizing the number of admitted secondary links under interference and QoS constraints, as well as maximizing the sum throughput of admitted secondary links. An iterative algorithm based on geometric programming is proposed to solve the non-convex throughput maximization problem. Simulation results show a tradeoff between number of admitted links and secondary network throughput, but that enforcing QoS constraints does not significantly reduce throughput. The goal is to minimize secondary transmitter power while meeting SINR and interference limits.
Dynamic resource allocation for opportunistic software-defined IoT networks: s...IJECEIAES
This document proposes a dynamic resource allocation algorithm for opportunistic software-defined IoT networks using a stochastic optimization framework. It formulates the problem as a two-stage binary linear stochastic program that aims to maximize network throughput while selecting transmission powers to minimize total power consumption under uncertain interference and traffic demands. Due to interference being a continuous random variable correlated over time, the algorithm instead solves a suboptimal sampling problem exploiting interference correlation. It periodically runs over time to adapt to changing channel and interference conditions, significantly increasing simultaneous IoT transmissions and achieved throughput compared to typical algorithms.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Wireless Powered Communications: Performance Analysis and Optimizationdtvt2006
This document analyzes the average throughput of a wireless powered communications system where an energy constrained source is powered by a dedicated power beacon (PB) and communicates with a destination. It derives analytical expressions for the average throughput of delay tolerant and delay intolerant transmission modes assuming Nakagami-m fading channels. It also obtains closed-form solutions for the optimal time split that maximizes average throughput in some special cases. The impact of co-channel interference is studied, showing that interference can potentially improve average throughput by providing extra energy, and that increasing PB antennas significantly improves throughput. Source position is also shown to greatly impact average throughput.
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...IJECEIAES
In cooperative simultaneous wireless information and power transfer (SWIPT) nonorthogonal multiple access (NOMA) downlink situations, the current research investigates the total throughput of users in center and edge of cell. We focus on creating ways to solve these problems because the fair transmission rate of users located in cell edge and outage performance are significant hurdles at NOMA schemes. To enhance the functionality of cell-edge users, we examine a two-user NOMA scheme whereby the cell- center user functions as a SWIPT relay using power splitting (PS) with a multiple-input single-output. We calculated the probability of an outage for both center and edge cell users, using closed-form approximation formulas and evaluate the system efficacy. The usability of cell-edge users is maximized by downlink transmission NOMA (CDT-NOMA) employing a SWIPT relay that employs PS. The suggested approach calculates the ideal value of the PS coefficient to optimize the sum throughput. Compared to the noncooperative and single-input single-output NOMA systems, the best SWIPT-NOMA system provides the cell-edge user with a significant throughput gain. Applying SWIPT-based relaying transmission has no impact on the framework’s overall throughput.
Channel feedback scheduling for wireless communicationseSAT Journals
Abstract Opportunistic scheduling can significantly improve wireless network performance by exploiting the underlying channel condition. There has been a lot of work on opportunistic scheduling, but the problem of finding the right feedback mechanism to convey channel information has largely been untouched. In emerging multichannel systems, the per-channel feedback induces a substantial amount of feedback overhead and requires high computational complexity. To reduce the feedback overhead, we consider an opportunistic feedback strategy that activates the channel feedback opportunistically according to the channel condition. Then, we combine the opportunistic feedback with the best-n channel feedback scheme where a mobile user chooses the best n channels and transfers this information to the base station. We analyze the throughput and the amount of channel feedback information for proportionally fair opportunistic scheduling under Rayleigh fading i.i.d. channels. The numerical results confirm that our partial feedback schemes achieve a remarkable reduction in the amount of feedback information without significant throughput degradation, thereby saving the scarce wireless bandwidth and limited battery power.
Promoting fractional frequency reuse performance for combating pilot contami...IJECEIAES
Massive multiple-input multiple-output (MIMO) improves spectrum efficiency by increasing the capacity of the wireless structure. Therefore, massive MIMO is promising for fifth generation (5G) wireless communications. In massive MIMO, channel estimation is a crucial part that should achieve reliable performance. Pilots are sent from the end-users to be used for estimating the channel. However, the problem of interference in pilot contamination affects the performance for cell-edge users. Specifically, pilot contamination appears when the same pilot sequence is utilized at the same time by more than one terminal. This lead to an inaccurate estimation of the channel. Consequently, the decoded data will not be reliable. For mitigating these pilot contamination effects, an enhanced fractional frequency reuse (eFFR) scheme is proposed that uses an algorithm in the allocation of pilot sequences to end users’ devices based on the locations of the users from the target base station (BS). The simulation results exhibit that the proposed scenario outweighs the traditional FFR within both signal to interference, and noise ratio (SINR), and capacity. Consequently, the suggested scenario enhances the performance of more than 80% of the cell terminals and the other 20% of the terminals have a slightly lower performance compared to the FFR.
Joint Interference Coordination and Spatial Resource ReuseIJMTST Journal
Multihop cellular networks (MCNs) have drawn tremendous attention due to its high throughput and extensive coverage. Deploying relay nodes is foreseen a cost-efficient solution to combat the severe propagation loss at cell edge. However, relay cell coverage is limited by the low transmit power, limited antenna capabilities and wireless backhaul link bottleneck which may lead to load imbalances and hence low resource utilization efficiency. Further challenges in relay deployments are attributed to increased interference levels in the network compared with macro cell-only deployments, causing degradation of the user throughput. In this context, relay cell coverage expansion and interference coordination techniques are expected to improve the performance of relay deployments. In this study, we analyze the impact of the additional interference due to the relay node transmissions. Jointly with our previous study on cell expansion, spatial resource reuse from the graph-theoretical perspective. Next, our focus shifts to developing a simple but efficient radio resource management algorithm which enables the spatial resource reuse, the pricing- based radio resource management (PRRM) strategy. The PRRM performs spatial reuse for interference-free users operating in the high signal-to-interference-and-noise ratio (SINR) region, while guaranteeing the signal quality of interference-susceptible users usually located near the coverage boundary. By applying the PRRM, we evaluate the potential benefits of the spatial resource reuse.
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Mobile operators commonly use macro cells with traditional wide beam antennas for wider coverage in the
cell, but future capacity demands cannot be achieved by using them only. It is required to achieve maximum
practical capacity from macro cells by employing higher order sectorization and by utilizing all possible
antenna solutions including smart antennas. This paper presents enhanced tessellation for 6-sector sites
and proposes novel layout for 12-sector sites. The main target of this paper is to compare the performance
of conventional wide beam antenna, switched beam smart antenna, adaptive beam antenna and different
network layouts in terms of offering better received signal quality and user throughput. Splitting macro cell
into smaller micro or pico cells can improve the capacity of network, but this paper highlights the
importance of higher order sectorization and advance antenna techniques to attain high Signal to
Interference plus Noise Ratio (SINR), along with improved network capacity. Monte Carlo simulations at
system level were done for Dual Cell High Speed Downlink Packet Access (DC-HSDPA) technology with
multiple (five) users per Transmission Time Interval (TTI) at different Intersite Distance (ISD). The
obtained results validate and estimate the gain of using smart antennas and higher order sectorization with
proposed network layout.
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...IJERA Editor
In present days the wireless communications are widely increases because of this reason spectrum utilization can be rapidly increased.For efficient usage of spectrum we can implement the Vacate on demand algorithm in different networks. CR users also need to sense the spectrum and vacate the channel upon the detection of the PU‟s presence to protectPUs from harmful interference. To achieve these fundamental CR functions, CR users usually coordinate with each other by using a common medium for control message exchange ensuring a priority of PUs over CR users. This paper presents the Vacate on Demand (VD) algorithm which enables dynamic spectrum access and ensures to vacate the assigned channel in case of PU activity and move the CR user to some other vacant channel to make spectrum available to PUs as well as to CR users. The basic idea is to use a ranking table of the available channels based on the PU activity detected on each channel. To improve the spectrum efficiency we can implement the Vacate on demand algorithm in MANET Network.
An energy aware scheme for layered chain in underwater wireless sensor networ...IJECEIAES
Extending the network lifetime is a very challenging problem that needs to be taken into account during routing data in wireless sensor networks in general and particularly in underwater wireless sensor networks (UWSN). For this purpose, the present paper proposes a multilayer chain based on genetic algorithm routing (MCGA) for routing data from nodes to the sink. This algorithm consists to create a limited number of local chains constructed by using genetic algorithm in order to obtain the shortest path between nodes; furthermore, a leader node (LN) is elected in each chain followed by constructing a global chain containing LNs. The selection of the LN in the closest chain to the sink is as follows: Initially, the closest node to sink is elected LN in this latter because all nodes have initially the same energy value; then the future selection of the LN is based on the residual energy of the nodes. LNs in the other chains are selected based on the proximity to the previous LNs. Data transmission is performed in two steps: intra-chain transmission and inter-chain transmission. Furthermore, MCGA is simulated for different scenarios of mobility and density of nodes in the networks. The performance evaluation of the proposed technique shows a considerable reduction in terms of energy consumption and network lifespan.
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...ijwmn
The document proposes an intercell interference coordination scheme for LTE downlink networks based on user priority and fuzzy logic. It calculates user priority based on interference level, QoS, and delay. Users are then scheduled on subbands according to their priority. ENodeBs dynamically control transmit power using fuzzy logic and message exchanges to reduce interference between cells. Simulation results show the proposed scheme outperforms existing reuse factor one and soft frequency reuse schemes in terms of cell throughput, cell edge throughput, delay, and interference level.
QoS controlled capacity offload optimization in heterogeneous networksjournalBEEI
An efficient resource allocation mechanism in the physical layer of wireless networks ensures that resources such as bandwidth and power are used with high efficiency in spite of low delay and high edge user data rate. Microcells in the network are typically set with bias settings to artificially increase the Signal-to-Interference-Plus-Noise Ratio, thus encouraging users to offload to the microcell. However, the artificial bias settings are tedious and often suboptimal. This work presents a low complexity algorithm for maximization of network capacity with load balancing in a heterogeneous network without the need for bias setting. The small cells were deployed in a grid topology at a selected distance from macrocell to enhance network capacity through coverage overlap. User association and minimum user throughput were incorporated as constraints to enable closer simulation to real word Quality of Service requirements. The results showed that the proposed algorithm was able to maintain less than 10% user drop rate. The proposed algorithm can increase user confidence as well as maintain load balancing, maintain the scalability, and reduce power consumption of the wireless network.
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
This paper addresses the maximizing network lifetime problem in wireless sensor networks (WSNs) taking
into account the total Symbol Error rate (SER) at destination. Therefore, efficient power management is
needed for extend network lifetime. Our approach consists to provide the optimal transmission power
using the orthogonal multiple access channels between each sensor. In order to deeply study the
properties of our approach, firstly, the simple case is considered; the information sensed by the source
node passes by a single relay before reaching the destination node. Secondly, global case is studied; the
information passes by several relays. We consider, in the previous both cases, that the batteries are nonrechargeable. Thirdly, we spread our work the case where the batteries are rechargeable with unlimited
storage capacity. In all three cases, we suppose that Maximum Ratio Combining (MRC) is used as a
detector, and Amplify and Forward (AF) as a relaying strategy. Simulation results show the viability of
our approach which the network lifetime is extended of more than 70.72%when the batteries are non
rechargeable and 100.51% when the batteries are rechargeable in comparison with other traditional
method.
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
This paper addresses the maximizing network lifetime problem in wireless sensor networks (WSNs) taking
into account the total Symbol Error rate (SER) at destination. Therefore, efficient power management is
needed for extend network lifetime. Our approach consists to provide the optimal transmission power
using the orthogonal multiple access channels between each sensor. In order to deeply study the
properties of our approach, firstly, the simple case is considered; the information sensed by the source
node passes by a single relay before reaching the destination node. Secondly, global case is studied; the
information passes by several relays. We consider, in the previous both cases, that the batteries are nonrechargeable. Thirdly, we spread our work the case where the batteries are rechargeable with unlimited
storage capacity. In all three cases, we suppose that Maximum Ratio Combining (MRC) is used as a
detector, and Amplify and Forward (AF) as a relaying strategy. Simulation results show the viability of
our approach which the network lifetime is extended of more than 70.72%when the batteries are non
rechargeable and 100.51% when the batteries are rechargeable in comparison with other traditional
method.
Flexible channel allocation using best Secondary user detection algorithmijsrd.com
This document proposes a flexible channel allocation algorithm for cooperative cognitive radio networks using secondary user detection. It introduces Flexible Channel Cooperation (FLEC) which allows secondary users to optimize their use of resources including channels and time slots from primary users. The document develops efficient resource allocation algorithms for FLEC, including a distributed bargaining algorithm and centralized heuristic algorithm. It evaluates the performance of FLEC and shows it provides throughput improvements of 20-60% over conventional identical channel cooperation. A centralized heuristic algorithm achieves near-optimal performance with only 5% loss compared to the optimal centralized algorithm, providing a good tradeoff between performance and complexity.
Modelling and QoS-Achieving Solution in full-duplex Cellular SystemsIJCNCJournal
The global bandwidth scarcity and the ever-growing demand for fast wireless services have motivated the quest for new techniques that enhance the spectral efficiency (SE) of wireless systems. Most conventional SE increasing methods (e.g., adaptive modulation and coding) have already been exhausted. Single-channel full-duplex (SCFD) communication is a new attractive approach in which each node may simultaneously receive and transmit over the same frequency channel, and thus, it has the potential to double the current SE figures. In this paper, we derive a model for the signal-to-interference-plus-noise ratio (SINR) in a SCFD-based cellular system with imperfect self-interference cancellation. Furthermore, given a set of uplink and downlink quality of service requirements, we answer the following two fundamental questions. First, is this set achievable in the SCFD-based cellular system? Second, if the given set is achievable, what is the optimal achieving policy? To that end, we provide a unified model for the SCFD-based cellular system, and give insights in the matrix of interference channel gains. Simulation results suggest that depending on the locations of the users, a combination of full-duplex and half-duplex modes over the whole network is more favourable policy
Downlink massive full dimension-multiple input multiple output downlink beam...IJECEIAES
The long-term evolution and advancement (LTE-A) of the 5G wireless network depends critically on energy consumption. Many existing solutions focus on limiting power constraints and consequently system coverage. So, improving the antenna array elements of the base station (BS) can solve this issue. In this paper, introduce a coordinated ON-OFF switching method in the massive full dimensional multiple input multiple output (massive-FD-MIMO) system. It enhances the radiation pattern of the antenna array element by adjusting the angular power spectra at the BS. By the way, it allows to select the minimum number of antennas for effective beamforming toward specific user equipment’s (UEs). In this context, part of antenna element should be active mode and remining should be sleep mode at the time of signal beamforming. The multipath spatial profiles are decided the beamforming frequency band with minimize energy consumption. As part of the method, we used a conjugated beamforming with power optimization scheme to determine the individual antenna potential and fading channel condition, power optimization is performed. This method quality of service, reliability, energy consumption and data rate can all be evaluated by experimenting with different-sized antenna arrays such as 16×16, 32×32, 64×64 and 128×128.
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...ijwmn
This paper proposes a novel efficient method to analyze the ergodic channel capacity of cooperative amplify-and-forward relay systems. This is accomplished by employing a very tight approximate moment generating function of the end-to-end signal-to-noise ratio that is applicable to various fading environments, including mixed and composite fading channels. Three adaptive source transmission policies are considered: constant power with optimal rate adaptation, optimal joint power and rate adaptation, and fixed rate with truncated channel inversion. Closed-form expressions for ergodic capacity under these policies are derived for Nakagami-m fading with independent but not identically distributed statistics. The accuracy of the proposed approximate method is validated through existing results and Monte Carlo simulations.
Similar to Joint beamforming, power and channel allocation in multi user and multi-channel underlay miso cognitive radio networks (20)
This document proposes a reduced latency list decoding algorithm and high throughput decoder architecture for polar codes. The reduced latency list decoding algorithm visits fewer nodes in the decoding tree and considers fewer possibilities of information bits than existing successive cancellation list decoding algorithms, significantly reducing decoding latency and improving throughput with little performance degradation. An implementation of the proposed decoder architecture in a 90nm CMOS technology demonstrates significant latency reduction and area efficiency improvement compared to other list polar decoders.
A researcher developed a radix-8 divider for binary64 division units to improve energy efficiency at high clock rates. Simulation results showed the radix-8 divider requires less energy per division than radix-4 or radix-16 approaches. The researcher used Xilinx 10.1 and ModelSim 6.4b tools and VHDL/Verilog languages to develop and test the minimally redundant radix-8 divider.
Hybrid FPGA architectures containing a mixture of lookup tables (LUTs) and hardened multiplexers are evaluated to improve logic density and reduce chip area. Simulation results show that non-fracturable hybrid architectures naturally save up to 8% area after placement and routing without optimizing the technology mapper, and additional area is saved with architecture-aware mapping optimizations. Fracturable hybrid architectures only provide marginal area gains of up to 2% after placement and routing. For the most area-efficient hybrid architectures, timing performance is minimally impacted.
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Pvrtechnologies Nellore
This document proposes a reconfigurable approximate architecture for MPEG encoders that optimizes power consumption while maintaining a particular Peak Signal-to-Noise Ratio threshold for any input video. It designs reconfigurable adder/subtractor blocks that can modulate their degree of approximation, and integrates them into the motion estimation and discrete cosine transform modules of the MPEG encoder. Experimental results show the approach dynamically adjusts the degree of hardware approximation based on the input video to respect the given quality bound across different videos while achieving up to a 38% power saving over a conventional non-approximated MPEG encoder architecture.
This document lists 69 MATLAB projects related to various domains including image processing, biometrics, medical image processing, computer vision, and more. It provides the project titles, domains or sub-domains, programming languages and years. It also lists the support that will be provided to registered students including the IEEE base paper, documentation, source code, execution help, and publication support. The projects involve techniques such as image segmentation, super resolution, steganography, action recognition, and license plate detection. Support includes documentation templates, software installation guides, and assistance with conferences or journal publications.
This document lists 50 VLSI projects from 2016-2017 across various domains such as low power, high speed data transmission, area efficient/timing and delay reduction, audio/video processing, networking, verification, and Tanner/Microwind. The projects cover a range of topics including ECG acquisition systems, modular multiplication, adaptive radios, arrhythmia prediction, electrical capacitance tomography, approximate computing using memoization, FFT processors, error correction coding, carry skip adders, dynamic voltage and frequency scaling, code compression, turbo decoding, variable digital filters, parallel FFTs, MIMO communications, timing error correction, LU decomposition, FPGA logic architectures, LDPC decoding, minimum energy systems, elliptic curve multiplication, NB
This document lists 97 potential final year projects for students in various domains including embedded systems, Internet of Things, robotics, ZigBee, GSM and GPS, consumer electronics, automation, and more. It provides contact information for the project coordinator and describes the domain and programming language/year for each potential project. Students who register will receive support including an IEEE base paper, documentation, source code, and assistance with publication.
This document describes a high-speed FPGA implementation of an elliptic curve cryptography processor based on redundant signed digit representation. The processor employs pipelining techniques to achieve high throughput for Karatsuba–Ofman multiplication. It also includes an efficient modular adder without comparison and a high throughput modular divider to maximize frequency. The processor supports the NIST P256 curve and performs single-point multiplication in 2.26 ms at a maximum frequency of 160 MHz on a Xilinx Virtex 5 FPGA.
Retiming of digital circuits is conventionally based on the estimates of propagation delays across different paths in the data-flow graphs (DFGs) obtained by discrete component
timing model, which implicitly assumes that operation of a node can begin only after the completion of the operation(s) of its preceding node(s) to obey the data dependence requirement. Such a discrete component timing model very often gives much higher
estimates of the propagation delays than the actuals particularly when the computations in the DFG nodes correspond to fixed point arithmetic operations like additions and multiplications
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPvrtechnologies Nellore
This paper introduces an architecture for pre-encoded multipliers used in digital signal processing based on offline encoding of coefficients using a non-redundant radix-4 signed-digit encoding technique. Experimental analysis shows the proposed multipliers using this encoding technique, along with a coefficients memory, are more efficient in terms of area and power compared to conventional Modified Booth encoding schemes.
Quality of-protection-driven data forwarding for intermittently connected wir...Pvrtechnologies Nellore
The document proposes a quality-of-protection (QoP)-driven data forwarding strategy for intermittent wireless networks. The existing system relies on collaborative data delivery, but non-cooperative behavior impairs network QoP and user quality of experience (QoE). The proposed system evaluates process-based and relationship-based credibility of nodes in a distributed manner using locally recorded forwarding behavior information. An intrusion detection mechanism helps select reliable relay nodes for transmission, improving QoP, QoE, reducing network load, and enhancing resource utilization. Numerical results show the proposed approach provides reliable data transmission with high QoP and improved user QoE.
The document provides information about an IT services company called Coalesce Technologies. It discusses Coalesce's services, commitment to client satisfaction, growing network, and customized solutions. It also describes the library management system project, including the problems with existing systems, proposed new system features, and UML diagrams for modeling the system. Key aspects of the proposed system include automating transactions, providing a simple GUI, efficient database updating, and restricting administrative access for security.
The document discusses an e-voting system project that aims to provide a secure and user-friendly online voting system. It outlines the existing paper-based voting system and proposes an online voting system where voters can cast their votes from anywhere in India through a database that stores voter information and votes. The proposed system is designed to accurately record and retrieve voter information and votes in a planned, reliable, and redundant manner. It requires hardware like a PC and Windows OS along with Java programming language to develop the online voting software.
PVR Technology lists 26 new web-based projects including an airline automation system, attendance management system, automated college admission system, clustering datasets using machine learning algorithms, corporate transportation system, courier information system, e-voting system, e-complaints system in PHP, e-learning system in PHP, exam result application, hairstylesalon system, inventory management system, library management system, medical reference system, online placement and training system, online admission system, online bank system, vehicle investigation system, resource management system in PHP, online vegetables purchase system, online shopping for gadgets system, online seat booking system, online requitment system, online quiz system, online placement and training cell system, online movie ticket system,
The document proposes a new medium access control (MAC) protocol called PoCMAC that uses distributed power control to manage interference in full-duplex WiFi networks. PoCMAC allows simultaneous uplink and downlink transmissions between an access point and half-duplex clients. It identifies regimes where power control provides throughput gains and develops a full 802.11-based protocol for distributed selection of three-node topologies. Simulations and software-defined radio experiments show PoCMAC achieves higher capacity and throughput compared to half-duplex networks, while maintaining similar fairness.
This document contains information about PVR Technology, including their head office location, website, email, and phone number. It then lists 20 project titles related to power electronics and renewable energy systems. The projects cover topics like power quality improvement, single-stage converters, grid-connected inverters, maximum power point tracking, stand-alone energy sources, power factor correction, resonant inverters, DC-DC converters, AC-DC converters, filters, and induction heating applications.
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Pvrtechnologies Nellore
This document proposes a scheme called AnonyControl to address privacy concerns with cloud data access. It aims to control access privileges while preserving user identity privacy. AnonyControl decentralizes the central authority across multiple attribute authorities to limit identity leakage and achieve semi-anonymity. It also generalizes file access control to privilege control to manage cloud data operations in a fine-grained way. The document describes existing access control schemes, disadvantages related to identity privacy, and how AnonyControl improves on previous work by protecting user identities through attribute distribution across authorities.
Control cloud data access privilege and anonymity with fully anonymous attrib...Pvrtechnologies Nellore
This document proposes two schemes, AnonyControl and AnonyControl-F, to address privacy issues in existing access control schemes for cloud storage. AnonyControl decentralizes the central authority to limit identity leakage and achieve semi-anonymity. It also generalizes file access control to privilege control. AnonyControl-F fully prevents identity leakage and achieves full anonymity. The schemes use attribute-based encryption and a multi-authority system to securely control user access privileges without revealing identity information. Security analysis shows the schemes are secure under certain cryptographic assumptions.
The document proposes CloudKeyBank, a key management framework that addresses the confidentiality, search privacy, and owner authorization of outsourced encryption keys. It does so using a new cryptographic primitive called Searchable Conditional Proxy Re-Encryption (SC-PRE) that combines Hidden Vector Encryption and Proxy Re-Encryption. The framework allows key owners to encrypt keys for outsourcing while maintaining privacy and granting controlled authorization. It aims to solve security issues not addressed by traditional outsourced data solutions.
Circuit ciphertext policy attribute-based hybrid encryption with verifiablePvrtechnologies Nellore
The document proposes a scheme for circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. It aims to ensure data confidentiality, fine-grained access control, and verifiability of delegated computation results. The scheme uses a combination of ciphertext-policy attribute-based encryption, symmetric encryption, and verifiable computation. It is proven secure based on computational assumptions and simulations show it is practical for cloud computing applications.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Joint beamforming, power and channel allocation in multi user and multi-channel underlay miso cognitive radio networks
1. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
1
Joint Beamforming, Power and Channel Allocation
in Multi-User and Multi-Channel Underlay MISO
Cognitive Radio Networks
Suren Dadallage, Changyan Yi and Jun Cai, Senior Member, IEEE
Abstract—In this paper, we consider a joint beamforming,
power, and channel allocation in a multi-user and multi-channel
underlay multiple input single output (MISO) cognitive radio
network (CRN). In this system, primary users’ (PUs’) spec-
trum can be reused by the secondary user transmitters (SU-
TXs) to maximize the spectrum utilization while the intra-user
interference is minimized by implementing beamforming at each
SU-TX. After formulating the joint optimization problem as
a non-convex, mixed integer nonlinear programming (MINLP)
problem, we propose a solution which consists of two stages.
In the first stage, a feasible solution for power allocation and
beamforming vectors is derived under a given channel allocation
by converting the original problem into a convex form with an
introduced optimal auxiliary variable and semidefinite relaxation
(SDR) approach. After that, in the second stage, two explicit
searching algorithms, i.e., genetic algorithm (GA) and simulated
annealing (SA)-based algorithm, are proposed to determine
suboptimal channel allocations. Simulation results show that
beamforming, power and channel allocation with SA (BPCA-SA)
algorithm can achieve close-to-optimal sum-rate while having a
lower computational complexity compared with beamforming,
power and channel allocation with GA (BPCA-GA) algorithm.
Furthermore, our proposed allocation scheme has significant
improvement in achievable sum-rate compared to the existing
zero-forcing beamforming (ZFBF).
Index Terms—Cognitive radio network, beamforming, semidef-
inite relaxation, genetic algorithm, simulated annealing.
I. INTRODUCTION
RECENT studies reveal that the existing static spectrum
allocation is the key reason for highly inefficient spec-
trum utilization [1], [2], which in turn leads to a prob-
lem of spectrum scarcity. To overcome this issue, a novel
concept called cognitive radio (CR) was introduced [3]–[5],
which allows unlicensed users or secondary users (SUs) to
initiate transmissions with the licensed communications. For
an underlay CR network (CRN) coexisting with a multi-
channel primary user (PU) network, managing interference is
a critical issue since spectrum reusing among multiple users
may cause negative effects on received signals at both PUs
and SUs. By exploiting multiple antennas, a signal processing
technology called beamforming [6] has been introduced to CR
Copyright (c) 2015 IEEE. Personal use of this material is permitted.
However, permission to use this material for any other purposes must be
obtained from the IEEE by sending a request to pubs-permissions@ieee.org.
This work was supported by the Natural Sciences and Engineering Research
Council of Canada under Discovery Grant.
The authors are with the Department of Electrical and Computer Engineer-
ing, University of Manitoba, Winnipeg, MB, Canada R3T 5V6. E-mail: dadal-
las@myumanitoba.ca, changyan.yi@umanitoba.ca, jun.cai@umanitoba.ca.
for directional signal transmission, so as to effectively mitigate
the mutual interference and improve the signal-to-interference-
plus noise ratio (SINR) [7].
In the literature, joint beamforming and resources allocation
have been widely studied for multiple-antenna CRNs. For
example, Xie et al. in [8] considered a sum-rate maximization
problem in a single PU channel CRN. In this work, the mutual
interference between SUs are nullified by deploying the zero-
forcing beamforming (ZFBF). The authors in [9] discussed a
joint beamforming and single PU channel assignment problem
to maximize the uplink throughput of the CRN while guaran-
teeing a SINR constraint at each secondary user receiver (SU-
RX) and interference cancellation at the primary user receiver
(PU-RX). However, ZFBF does not consider the potential
interference tolerance at SUs, which in turns results in a
degradation on overall achievable sum-rate of the secondary
network. Recent studies [10]–[12] showed that both PU and
SU receivers can tolerate some amount of interference. As a
result, it is not necessary to null the co-channel interference.
Jiang et al. in [13] employed a zero-gradient based iterative
approach to determine the local optimal beamforming vectors
while maximizing the energy efficiency of the CRN. In [14],
beamforming vectors were calculated by using an iterative
algorithm based on semidefinite programming to maximize
the sum-rate with a total power constraint and co-channel
interference constraints at both PU and SU receivers. This
work was further extended in [15] by adding an extra quality
of service (QoS) constraint. However, the assumption of a
single PU channel as used in [13]–[15] reduces the degree
of freedom available at the secondary base station (SBS) on
channel allocation for SUs. Therefore, joint beamforming and
resource allocation with multiple PU channels were studied.
For example, in [7], a single secondary user transmitter (SU-
TX)/SU-RX pair was considered with uniformly distributed
primary user transmitters (PU-TXs) and PU-RXs in a circular
disc area. Beamforming was implemented by the SU-TX to
minimize the interference to the PU-RXs while the received
signal strength was maximized at the SU-RX. Gharavol et
al. in [16] discussed a transmit power minimization problem
with a guarantee of SUs’ QoS and total power constraints in a
multiple channels multiple-input-single-output (MISO) CRN.
Some other works in this area include an adaptive intercell
interference cancellation (ICIC) technique for MISO downlink
cellular systems with channel allocation and beamforming to
maximize the weighted sum-rate [17]. Hamdi et al. in [18]
considered joint beamforming with a near-orthogonal user
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
2. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
2
selection method to maximize the downlink throughput of the
CRN, subject to constraints on SINR at each SU, interference
at the PU-RX and total transmission power. The authors in
[19] proposed an algorithm based on branch and bound (BnB)
method to allocate PU frequency bands with beamforming to
serve a maximum number of SUs.
However, most of these works [14]–[21] assumed a cellular
architecture for secondary networks, where either SU-Tx or
SU-Rx is the secondary base station. Recently, device-to-
device (D2D) communication based secondary networks [22],
[23] are attracting more attentions from researchers due to their
advantages in offering greater coverage with spatial diversity,
higher data rates and lower energy consumption. Different
from the traditional cellular architecture, D2D communications
cause co-channel receivers interfered by multiple transmitters
at different locations. This challenge requests the consideration
of individual SINR constraint at each SU-Rx, and makes the
joint beamforming and resource allocation more complicated
than the traditional case.
In this paper, we readdress the joint transmit beamforming,
power and channel allocation problem in an underlay CRN
with independent D2D communications among multiple PU
and SU pairs. Specifically, in our work, beamforming is
performed by each SU-TX instead of a single SBS so as to
promote the spatial diversity and curtail the interference. Our
main objective is to maximize the sum-rate of the secondary
network while minimizing the intra-user interference subject
to the constraints of total power budget, interference on PUs
and SINR requirement at each SU. We formulate the joint
optimization problem as a non-convex, mixed integer nonlin-
ear programming (MINLP) problem [14], which is NP-hard.
In order to solve this problem with reasonable computational
complexity, a two-stage solution approach is proposed. In the
first stage, an iterative algorithm is proposed to determine the
feasible beamforming vectors and power allocation for a given
channel allocation. After that, two explicit searching algo-
rithms based on genetic algorithm (GA) [24] and simulated
annealing (SA) [25] are proposed to find out the suboptimal
channel allocation. The main contributions of this paper are
summarized as follows.
• We consider a multi-channel underlay CR system with
the capability of beamforming at each SU-TX to mitigate
interference, allow more transmission opportunities, and
exploit the benefits of spatial diversity.
• We develop a sum-rate maximization problem to joint-
ly optimize beamforming vectors, power allocation and
channel allocation.
• Two different algorithms are proposed to solve the for-
mulated non-convex MINLP problem.
• Simulation results show that the proposed system model
outperforms the existing ZFBF model by exploiting inter-
ference tolerance capacities. The proposed algorithms can
achieve close-to-optimal performance in terms of sum-
rate with low computation complexity so that they are
more suitable for practical applications.
The rest of this paper is organized as follows. The system
model and the problem formulation are discussed in Section II.
PU-RXn
PU-TXn
SU-TXk
SU-RXk
SU-TXm
SU-RXm
gnk
hkn
hmk
hk
Central
Entity
PU-TX
SU-TX
PU-RX
SU-RX
PU-RXPU-TX
Desired Channel
Interference Channel
Fig. 1. System model and channel responses.
The solution approaches and their computational complexities
are analyzed in Section III. After that, the simulation results
are presented in Section IV, followed by the conclusions in
Section V.
II. SYSTEM MODEL AND PROBLEM FORMULATION
We consider a CRN with N PU transceivers and K SU
transceivers randomly distributed in the coverage area of the
primary network. Each PU transceiver occupies one separated
licensed channel so that there are N PU channels in total.
Each SU-TX is equipped with J antennas and its receiver
with a single antenna, while each PU (transmitter or receiver)
has a single antenna. Each SU-TX is allowed to communi-
cate with its corresponding receiver in the underlay manner
while satisfying a pre-defined interference constraint at the
corresponding PU-RX. There is a central entity who performs
all control functions (e.g., resource allocations) for SUs. An
illustration of the system model is shown in Fig. 1. We define
two sets S and P to indicate all possible SU pairs and PU
pairs in the network, respectively.
The following notations are used in this paper. Boldface
uppercase and lowercase letters will be used for matrices and
vectors, respectively. (·)†
, (·)T
, E{·} and x denote conju-
gate transpose, transpose, expectation and Euclidean norm of
vector x, respectively. In addition, Tr(A) indicates the trace
operation of a square matrix A. For convenience, Table I lists
some important symbols used in this paper.
A. Signal Model
Define the transmitted signals from the kth SU-TX, i.e.,
SU-TXk, to its receiver SU-RXk and from nth PU-TX, i.e.,
PU-TXn, to its receiver PU-RXn as sk and un, respectively.
We assume that each modulated transmitted signal has unit
energy and is uncorrelated with each other, i.e., E{|sk|2
} =
E{|un|2
} = 1, E{sks†
m} = E{unu†
d} = 0, ∀k, m ∈ S and
n, d ∈ P, k = m and d = n. With antenna array, each
SU-TX performs transmit beamforming to direct the signal
to the intended receiver while at the same time controlling the
interference to other users (PUs and SUs). The received signal
at the SU-RXk using the nth PU channel can be represented
as the aggregation of desired signal, interference from other
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
3. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
3
TABLE I
LIST OF NOTATIONS
Symbol Definition
Sn Set of SU pairs using the nth PU channel
K Number of SU pairs
N Number of PU channels
sk/un kth SU transmit signal/nth PU transmit signal
hk Channel response between the SU-TXk and the SU-RXk
hmk Channel response between the SU-TXm and the SU-RXk
hmn Channel response between the SU-TXm and the PU-RXn
gnk Channel response between the PU-TXn and the SU-RXk
gn Channel response between the PU-TXn and the PU-RXn
ηk/ηn Noise at the SU-RXk/PU-RXn
Qn PU-TXn’s transmit power
ˆαki, ¯αkn, αn, βk Large-scale fading coefficients
ˆϑki, ¯ϑkn, ϑn, bk Small-scale fading coefficients
J Number of transmit antennas
vk(θ, φ) SU-TXk’s steering vector having a counter-clockwise azimuth angle of θ and φ elevation
rn
k Rate of the kth SU-TX on nth PU channel
B Transmission bandwidth of each PU channel
In
th Maximum interference tolerance threshold at the PU-RXn
Γk Minimum QoS threshold at the kth SU-RX
Pmax Power budget of the secondary network
ϕ Auxiliary vector to indicate the intra-user interference thresholds of each SU-RX
ϕk kth SU-RX intra-user interference threshold
wk kth SU-TX beamforming vector
Wk kth SU-TX positive semidefinite beamforming matrix
xn
k Binary variable to indicate the nth PU channel allocation on kth SU-TX
SU-TXs using the same PU channel for transmission, the
interference from the nth PU-TX, and noise, i.e.,
yn
k = (wksk)†
hk +
m∈Sn,m=k
(wmsm)†
hmk + Qngnkun + ηk,
(1)
where wk is the kth SU-TX’s beamforming vector with size of
J ×1, Qn is the transmit power of the nth PU-TX, hk denotes
the J × 1 channel response between SU-TXk and SU-RXk,
hmk is the J × 1 channel response between SU-TXm and
SU-RXk, gnk denotes the channel response between PU-TXn
and SU-RXk, and Sn denotes the set of SU-TXs using the nth
PU channel. The noise ηk is Gaussian distributed with zero
mean and variance σ2
. Similarly, the received signal at the nth
PU-RX consists of desired PU signal, co-channel interference
from SUs and noise. Thus, it can be formulated as
yn = Qngnun+
k∈Sn
(wksk)†
hkn+ηn, n = 1, . . . , N (2)
where gn and hkn are channel responses from the nth PU
transmitter and the kth SU-TX to the nth PU-RX, respectively,
and ηn denotes the noise.
The channel responses hki, gkn and gn in (1) and (2) can
be further defined as
hki =
hki = [h1
ki . . . hJ
ki]T
, if i = k ∈ Sn, i ∈ Sn ∪ P,(3a)
βkbkvk(θ, φ), if i = k (3b)
hl
ki = ˆαki
ˆϑki, i = k ∈ Sn, i ∈ Sn ∪ P and l = 1, . . . , J (4)
gkn = αknϑkn, k ∈ Sn and n ∈ P (5)
gn = ¯αn
¯ϑn, n ∈ P (6)
where ˆαki, ¯αkn, αn and βk denote the large-scale fading, while
ˆϑki, ¯ϑkn, ϑn and bk represent the small-scale fading which are
modeled as Rayleigh distributed random variables. Consider
uniform circular array (UCA) [26] of antenna configuration at
each SU-TX. Then, vk(θ, φ) is the steering vector for the kth
SU-TX, which indicates the relative responses of the isotropic
array elements with respect to the signal impinging at the
center of the array from a particular direction. Here, φ denotes
the counter-clockwise azimuth angle measured from X-axis
and θ denotes elevation measured from Z-axis. In this paper,
we assume that all users are located in the same plane, so
that θ becomes zero and mutual coupling [27] among array
elements is not considered.
Similar to [15], we assume that perfect knowledge of the
channel state information (CSI) is available at each SU-TX
before transmission.
B. Problem Formulation
Given the kth SU transceiver is working on the nth PU
channel, the SINR at the kth SU-RX, denoted as SINRk, can
be represented as
SINRk =
|w†
khk|2
m∈Sn,m=k
|w†
mhmk|2 + Qn|gnk|2 + σ2
(7)
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
4. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
4
where |w†
khk|2
is the desired received signal power at the
SU-RXk.
m∈Sn,m=k
|w†
mhmk|2
denotes the total intra-user
interference received at the SU-RXk from other SU-TXs’
who are using the same channel. Qn|gnk|2
and σ2
are the
interference power from PU-TXn and the noise power at the
SU-RXk, respectively.
Let xn
k , k = 1, . . . , K, n = 1, . . . , N, denote the channel
allocation for SUs. xn
k = 1 means that the nth PU channel is
assigned to the SU-TXk. Otherwise, xn
k = 0. Then, from (7),
the achievable rate of SU pair k on the nth PU channel, rn
k ,
can be calculated as
rn
k = B log2
1 +
xn
k |w†
khk|2
m∈Sn,m=k
|w†
mhmk|2 + Qn|gnk|2 + σ2
(8)
where B is the transmission bandwidth of a single PU channel.
Our major objective is to maximize the sum-rate of the SU
network while allowing concurrent transmission with PUs. The
optimization problem can be formulated as
P1 : max
w,X
K
k=1
N
n=1
rn
k (9)
s.t.
K
k=1
|w†
khkn|2
xn
k ≤ In
th, ∀n = 1, . . . , N, (10)
SINRk ≥ Γk, ∀k = 1, . . . , K, (11)
K
k=1
N
n=1
wk
2
xn
k ≤ Pmax, (12)
N
n=1
xn
k ≤ 1, ∀k = 1, . . . , K, (13)
xn
k ∈ {0, 1}, ∀k ∈ S, ∀n ∈ P,(14)
where In
th is the maximum interference tolerance threshold
of the nth PU-RX. Γk is the minimum QoS threshold at
the kth SU-RX. Pmax is the available power budget of the
secondary network. w = [w1 . . . wK] of size J × K indicates
the beamforming weights matrix, where its kth column defines
the beamforming vector for the SU-TXk. X is a K×N channel
allocation matrix, which consists of all xn
k , k ∈ S and n ∈ P.
The constraint (10) limits the total interference power from
SU-TXs to a specific PU-RX below a pre-defined threshold.
Constraint (11) guarantees the required SINR level at each
SU-RX. Constraint (12) keeps the total power consumption
under the available power budget. Constraint (13) implies that
each SU-TX can access at most one PU channel. Note that the
setting of single-channel access has been widely used in most
of related works [10]–[12]. Even though the sum-rate may be
further improved by adopting multiple channels for a single
SU-TX, it will significantly increase the complexity of the
system due to the difficulties involved in the power allocation.
Since the power allocation of SU-TXk is determined by
wk
2
, the problem P1 in fact integrates beamforming, power
allocation and channel allocation.
III. A TWO-STAGE SOLUTION APPROACH
The problem P1 consists of both continuous and discrete
variables, and there are nonlinear terms in both the objective
function and constraints. Hence, it is a non-convex, mixed
integer non-linear programming problem, which has been
proved to be NP-hard [28]. In order to balance performance
and computational complexity, in the following a two-stage
solution approach is proposed. The idea is to separate the
main problem into two sub-problems. In the first sub-problem,
the power and beamforming vectors are calculated based
on a given channel allocation. After that, the second sub-
problem, which determines a suboptimal channel allocation,
will be solved. For the second sub-problem, two algorithms
are proposed with different computational complexity.
A. Power and beamforming vector determination based on a
given channel allocation
In this section, the beamforming vector and power allocation
for each SU-TX will be determined based on a given channel
allocation, ˜X. Given ˜X, constraints (10) and (12) can be
transformed to a summation of quadratic terms and norms
so that they become convex. However, the original problem
P1 is still non-convex because neither the objective function
(9) nor the constraint (11) are convex. To overcome this issue,
we use semidefinite programming (SDP) approach [29], which
allows to express the quadratic terms with some equivalent
affine expressions. With SDP, the quadratic terms, |w†
khkn|2
,
|w†
mhmk|2
and wk
2
, can be equivalently represented as
|w†
khkn|2
= Tr(w†
khknh†
knwk)
= Tr(WkHkn), ∀k ∈ S, ∀n ∈ P (15)
wk
2
= Tr(Wk), ∀k ∈ S (16)
|w†
mhmk|2
=
Tr(WmHmk), ∀m = k, m ∈ Sn
Tr(WkHk), m = k
(17)
where Wk = wkw†
k, Hkn = hknh†
kn, Hk = hkh†
k, and
Hmk = hmkh†
mk. From (15) - (17), we have i) Wk is a rank
one positive semidefinite (PSD) matrix, i.e., Wk 0, ∀k;
ii) Tr(WkHkn), Tr(WkHk) and Tr(WmHmk) are all affine
expressions with respect to the symmetric PSD matrices Wk
and Wm.
With (15), (16), (17) and the assumption of a known channel
allocation, the optimization problem P1 can be rewritten as
P2 : max
W1,...,WK
K
k=1
N
n=1
rn
k (18)
s.t.
K
k=1
˜xn
k Tr(WkHkn) ≤ In
th, ∀n = 1, . . . , N (19)
SINRk ≥ Γk, ∀k = 1, . . . , K (20)
K
k=1
N
n=1
˜xn
k Tr(Wk) ≤ Pmax, (21)
Wk 0, ∀k = 1, . . . , K, (22)
Rank(Wk) = 1, ∀k = 1, . . . , K (23)
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
5. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
5
where,
rn
k = B log2
1 +
˜xn
k Tr(WkHk)
m∈Sn
m=k
Tr(WmHmk) + Qn|gnk|2 + σ2
(24)
Note that two additional constraints, (22) and (23), are
added in P2. Obviously, the former has a convex expression,
but the later does not. In addition, the constraints (19) and (21)
have been transformed to linear functions without affecting
their convexity. The optimization problem P2 can be further
transformed into a convex form by doing the following two
steps. First, the non-convex rank constraint of (23) can be
relaxed by using the SDR approach again [30]. Then, follow-
ing the similar approach in [14], intra-user interference from
other SUs to the SU-RXk, i.e., m∈Sn
m=k
Tr(WmHmk), can
be constrained by introducing a new auxiliary variable. After
these two steps, the revised optimization problem P3 can be
written as
P3 : max
W,ϕ
K
k=1
N
n=1
B log2 1 +
˜xn
k Tr(WkHk)
ϕk + Qn|gnk|2 + σ2
(25)
s.t. constraints (19), (21), (22),
Tr(WkHk) ≥ Γk
m∈Sn
m=k
Tr(WmHmk)
+ Qn|gnk|2
+ σ2
, ∀k ∈ Sn (26)
m∈Sn
m=k
Tr(WmHmk) ≤ ϕk, ϕk ≥ 0, ∀k = 1, . . . , K (27)
where W = [W1 . . . WK] is a J ×KJ matrix which consists
of all the beamforming matrices, and ϕ = [ϕ1, . . . , ϕK]T
is
a K × 1 non-negative auxiliary vector which represents intra-
user interference thresholds of all SU-RXs.
Given ϕ, the objective function becomes concave since it is
just a logarithmic function of an affine expression. In addition,
the convexity of the constraint (26) can be proven as in [15].
As a result, the problem P3 turns into a form of convex
optimization problem. It is similar to the standard form of SDP,
but with a logarithmic rather than a linear objective function.
There are many tools available in literature (e.g., CVX [31],
a Matlab based modeling software package) to solve such a
convex optimization problem. Thus, we only need to determine
the optimal value for ϕ. Following the similar method in [14],
we introduce the following iterative algorithm for P3.
(i) Initialization: Relax the intra-user interference constraint
(27) by assigning a feasible non-negative large val-
ue for ϕ. Then, solve the problem P3 to find out
a feasible value of W, called ˜W(0)
. Set the intra-
user interference thresholds for each user as ϕ
(0)
k =
m∈Sn
m=k
Tr( ˜W
(0)
m Hmk), ∀k ∈ S and calculate the sum-
rate, R( ˜W(0)
, ϕ(0)
), based on (25). Define SU pair
index, k = 1, 1 ≤ k ≤ K and the iteration index,
a = 1.
(ii) Update: Update ϕ(a)
by ϕ(a)
= ϕ(a−1)
− (1 −
δ)ϕ
(a−1)
k Ik where δ is a fixed step size, 0 < δ < 1,
and Ik is the kth column of an K × K identity matrix.
(iii) Iteration results: Calculate the new R( ˜W(a)
, ϕ(a)
) by
using ˜W(a)
.
(iv) Check improvements: Calculate ∆R = R( ˜W(a)
, ϕ(a)
)−
R( ˜W(a−1)
, ϕ(a−1)
). The nonnegativity of ∆R can be
proved as in [15]. If ∆R is greater than a predefined
threshold, let a = a + 1 and repeat steps (ii) and (iii) till
∆R below a pre-defined threshold. Then, set ˜W(a)
=
˜W(a−1)
, R( ˜W(a)
, ϕ(a)
) = R( ˜W(a−1)
, ϕ(a−1)
) and
update the intra-user interference for each user as ϕ
(a)
k =
m∈Sn
m=k
Tr( ˜W
(a)
m Hmk), ∀k ∈ S.
(v) Continue iterations and pick the next user: Set k = k+1
and continue steps (ii) - (iv) for the newly selected user.
(vi) Termination: If k > K, stop the iterations.
At each iteration, the problem P3 needs to be solved. Since
most of the convex optimization toolboxes (e.g., CVX) use the
interior-point algorithm [32] as a basic solution platform, con-
sidering the worst-case scenario as in [30], the computational
complexity of a SDR problem P3 can be expressed as
O(max{ξ, κ}4
κ(1/2)
log(1/ )) (28)
where κ and ξ describe the problem size (i.e., number of
PSD matrices) and the number of constraints involved in the
optimization problem P3, respectively. is the given accuracy
of the solution defined by the solver. Let tT denote the total
number of iterations taken by the iterative algorithm to produce
a feasible solution for total K SU pairs. Then, the overall
complexity to find beamforming and power vectors for a given
channel allocation can be derived as
O(max{ξ, κ}4
κ(1/2)
log(1/ )) × tT (29)
Let ˜W = [ ˜W1 . . . ˜WK] and ˜ϕ = [ ˜ϕ1, . . . , ˜ϕK]T
be the
feasible solutions of the problem P3. Then, ˜W is optimal if
and only if the rank of each Wk, ∀k ∈ S, is equal to one, i.e.,
rank(Wk) = 1. If such condition is not satisfied, appropriate
rank one approximation methods, e.g., eigen-decomposition
method [30], can be deployed to get the final solution of
˜W. By using eigen-decomposition method, each beamforming
matrix Wk can be equivalently represented as
Wk =
J
j=1
λkjckjc†
kj (30)
where λkj and ckj denote the jth eigenvalue and the cor-
responding eigenvector of the kth beamforming matrix Wk,
respectively. If Wk is a rank one matrix, then there exists
exactly one non-zero eigenvalue, say λkJ . As a result, using
(30), the kth user beamforming matrix Wk can be written as
Wk = λkJ ckJ c†
kJ = ( λkJ ckJ )( λkJ ckJ )†
(31)
= wkw†
k
Thus, the beamforming vector for the SU-TXk is,
wk = λkJ ckJ (32)
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
6. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
6
B. Suboptimal channel allocation
In the previous section, we have determined the optimal
power and beamforming vectors for a known channel allo-
cation. In order to find the optimal channel allocation, an
exhaustive searching algorithm can be used, which needs to
compute beamforming vectors, power allocations and sum-
rates for all possible channel allocations. With N PU channels
and K SU pairs, the searching space size of the exhaustive
searching algorithm is (N + 1)K
, which increases exponen-
tially with K. Obviously, this searching method is practically
infeasible. Hence, for practical applications, we propose two
channel allocation algorithms based on genetic algorithm (GA)
[24] and simulated annealing (SA) [33], [34] algorithm to find
suboptimal channel allocations.
1) Genetic Algorithm (GA): GA is a searching algorithm,
which can be applied to find out near optimal solution to an
optimization problem without the knowledge of the objective
function’s derivatives or any gradient related information. The
key idea of GA is to first select a set of feasible values for the
decision variables and then design new solutions based on the
previous set to improve the objective function [35]. Different
from standard GA, in this thesis, we define a K×N matrix as a
chromosome instead of a single string chromosome as in [24],
where the kth row and nth column entry of the chromosome
indicates whether the nth channel is allocated to the kth SU-
TX or not. In fact, a chromosome describes one realization of
channel allocation. An example of a chromosome for two PU
channels and four SU-TXs can be written as
Chromosome =
1 0
0 1
0 1
1 0
(33)
Define Φ as the search space, which includes all possible
channel allocations, and has a size of (N + 1)K
. Define the
size of each generation as ν. Let ρ (0 < ρ < ν) and Gmax
denote the number of best chromosomes being selected and
the maximum number of generations, respectively. The details
of GA is as follows.
Initially, ν chromosomes are randomly selected from Φ,
called the initial generation, Φ(0)
. We define R(i)
(W, ϕ), the
sum-rate achieved for chromosome i, as the fitness function
for GA. Then, the chromosomes in Φ(0)
can be ordered with
the descending order of their sum-rates. From the sorted chro-
mosome list (G
(g)
sorted), the first ρ chromosomes are selected
and put into the set G
(g)
best, while the last ρ chromosomes are
removed and inserted into the set G
(g)
worst at the gth generation.
The set of remaining chromosomes, G
(g)
luckies, is named as
luckies.
Next, a new generation of chromosomes is formed. The
new generation consists of the set G
(g)
best and ν − ρ new
chromosomes generated from the two sets G
(g)
best and G
(g)
luckies,
through Children Generation Process (CGP). CGP consists of
two major operations called Mutation and Cross-over. The
details are explained as follows.
• At first, two chromosomes, P1 and P2, are randomly
selected from the two sets G
(g)
best and G
(g)
luckies, respectively.
Algorithm 1 : GA-based channel allocation algorithm
1: Initialization: Given K, N, Φ, ν, ρ and Gmax
2: Start : randomly pick ν channel realizations from Φ to
define the initial generation Φ(0)
, Φ(0)
⊂ Φ
3: Fitness : find R(i)
(W, ϕ) ∈ R(0)
for each chromosome i
within the set Φ(0)
4: Set g = 0,
5: while g < Gmax do
6: if g = 0 then
7: G(0)
= Φ(0)
, the set of corresponding rates are R(0)
8: else
9: Fitness : find R(g)
← R(i)
(W, ϕ), ∀chromosome i ∈
G(g)
10: end if
11: [R
(g)
sorted, G
(g)
sorted] ←sort(R(g)
, G(g)
,‘Descending’)
12: [R
(g)
best, G
(g)
best] ←select(R
(g)
sorted, G
(g)
sorted,,‘Best’)
13: [R
(g)
worst, G
(g)
worst] ←select(R
(g)
sorted, G
(g)
sorted,,‘Worst’)
14: [R
(g)
luckies] ← (R
(g)
best − R
(g)
worst)
15: [G
(g)
luckies] ← (G
(g)
best − G
(g)
worst)
16: for c = 1 : (ν − ρ) do
17: P1 ← select(G
(g)
best, 1,’Random’)
18: P2 ← select(G
(g)
luckies, 1,’Random’)
19: [TempCH1, TempCH2] ← Crossover(P1, P2)
20: [CH1, CH2] ← Mutation(TempCH1, TempCH2)
21: [G
(g)
child] ← [CH1, CH2]
22: end for
23: G(g+1)
← {G
(g)
best + G
(g)
child}
24: g ← g + 1
25: end while
26: Output: Optimal channel allocation (or chromosome),
optimal beamforming matrices, W
P1 and P2 are called parents.
• Next, the cross-over operation is initiated between the
two selected parents to generate two new children,
called TempCH1 and TempCH2. Here, we use the
Single Point Cross-over technique [36] as an example.
Specifically, entries of a randomly selected column of the
two parents will be swapped to perform the single point
cross-over. Note that swapping may produce infeasible
chromosomes such as multiple channel allocation to a
single user. In this case, except the swapped column,
we keep the parent columns unchanged and let only
the troublesome entries of the swapped column of both
children to be zero to ensure that channel allocation
constraint (13) is always satisfied.
• At the end, two randomly selected entries, xn1
k , xn2
k , of
an arbitrary selected kth row will be swapped, called
mutation. Note that, when selecting those two entries,
either of them should have a value of one. The importance
of mutation is to avoid GA converging to a local optimal
value.
The termination condition for GA will be activated when
the number of generations produced is beyond the predefined
value Gmax. Eventually, the chromosome in the last genera-
tion, which has the maximum fitness, will be the best solution.
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
7. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
7
Furthermore, the corresponding fitness value will be the near
optimal sum-rate.
At each iteration, the complexity of GA results from three
major operations, i.e., sorting, mutation and cross-over, which
introduce complexity of O(ν log(ν)), O(K) and O(K), re-
spectively. Beside the first generation, (ν − ρ) fitness values
have to be determined at each generation. Thus, the overall
complexity of GA can be computed as
Gmax × O(nlog(n)) + (ν − ρ)/2 (O(K))
+ (ν − ρ) × tT × O(max{ξ, κ}4
κ(1/2)
log(1/ )) (34)
The implementation steps of the GA is summarized in
Algorithm 1. We call the proposed beamforming, power, and
channel allocation with GA as BPCA-GA.
2) Simulated Annealing (SA)-based algorithm: From (34),
the complexity of GA mainly depends on the values of ν and
ρ. Since these two parameters also decide the accuracy and the
convergence of GA, sufficiently large values of ν and ρ have to
be set, which causes high computational complexity for GA.
In order to further reduce the complexity, a new allocation
algorithm based on SA [33] is introduced.
Let Φ = {X1, . . . , XL} denote the feasible set of all chan-
nel allocations available with K SU pairs and N PU channels,
where a K×N matrix Xl, l = 1, . . . , L = (N+1)K
, indicates
a certain channel allocation with binary entries and a row sum,
i.e.,
N
n=1 xn
k ≤ 1. Then, the optimization problem for X can
be equivalently expressed as
X = arg max
Xl∈Φ
R(Xl) (35)
where R(Xl) indicates the sum-rate associated with Xl. The
SA-based algorithm uses neighborhood searching to determine
a suboptimal solution. Specifically, the SA-based algorithm
starts with a control parameter and an initial channel allocation
that is used to generate new neighbor channel allocation.
Then, the new channel allocation is clearly selected if it
shows any performance improvement. Otherwise, it may still
be accepted with a certain probability, which allows SA-
based algorithm to escape from local optimal configurations.
The cooling schedule manages the control parameter during
the optimization process. The details of the algorithm is as
follows.
At the initial state, we set the iteration index l = 0 and
randomly pick a channel allocation, X0, from Φ. Using X0, a
new neighbor channel allocation, i.e., ˆX0 ∈ Φ, is formed by
swapping randomly selected row of X0 with an entry in A,
which denotes the set of all feasible combinations of channel
allocation to a single user. Given X0 and ˆX0, we compute the
corresponding sum-rates, which are denoted as R(X0) and
R( ˆX0), respectively. The acceptance rule at the lth iteration
can be formulated as
P{Accept ˆXl} =
1, if R( ˆXl) ≥ R(X0)
exp
∆R
Tl
, if R( ˆXl) < R(X0),
(36)
Algorithm 2 : SA-based channel allocation algorithm
1: Initialization: Given K, N, Φ, cooling-rate and Smax
2: Set l = 0,
3: Start : Initial channel allocation X0, X0 ⊂ Φ and compute
R(X0)
4: while l < Smax do
5: Generate new channel allocation, ˆXl from X0, ˆXl ⊂ Φ
6: Calculate sum-rate, R( ˆXl)
7: ∆R := R( ˆXl) − R(X0)
8: if l = 0 then
9: Compute T0
10: end if
11: if ∆R ≥ 0 then
12: X0 ← ˆXl and R(X0) ← R( ˆXl)
13: else if exp
∆R
Tl
> random [0, 1] then
14: X0 ← ˆXl and R(X0) ← R( ˆXl)
15: end if
16: Update Tl+1 = cooling-rate ∗ Tl
17: l ← l + 1
18: end while
19: Output: suboptimal channel allocation and suboptimal
beamforming matrices, i.e., X0 and W
where ∆R = R( ˆXl) − R(X0). It implies that a candidate
neighbor channel allocation, i.e., ˆXl, is accepted with the
probability of one if its sum-rate is greater than that of the
current channel allocation, or exp
∆R
Tl
if the new neighbor
channel allocation has a smaller achievable sum-rate than the
current allocation. If accepted, we replace X0 by ˆXl, and
update the value of the control parameter for the next iteration
as Tl+1 = cooling-rate∗Tl, where cooling-rate takes a value in
[0.50; 0.99] [37]. Note that T0 can be determined by following
the similar way as in [38]. We increase l by one and repeat
the aforementioned process. When the maximum number of
allowable iterations is reached, the algorithm is terminated and
the resulting outputs give the suboptimal channel allocation,
sum-rate and the beamforming vectors.
The SA-based algorithm has two major steps, i.e., the
generation of a neighbor channel allocation and the deter-
mination of sum-rate. A new neighbor channel allocation
can be generated from the current channel allocation with
a complexity of O(N), and a sum-rate calculation process
involves a complexity of O(max{ξ, κ}4
κ(1/2)
log(1/ )) × tT
as in (29). If Smax is the maximum number of iterations for
convergence, the complexity of the algorithm can be computed
as
Smax × {O(N) + O(max{ξ, κ}4
κ(1/2)
log(1/ )) × tT } (37)
Compared with (34), the computational complexity of SA-
based algorithm is much smaller than the GA. The SA-based
algorithm is summarized as in Algorithm 2. In this paper, we
call the proposed beamforming, power, and channel allocation
with SA-based algorithm as BPCA-SA.
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
8. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
8
IV. SIMULATION RESULTS
In this section, the performance of both BPCA-GA and
BPCA-SA algorithms is evaluated by using computer simu-
lations.
A. Simulation environment
Consider a CRN with three PU-TX/PU-RX pairs (i.e.,
N = 3). The locations of the PU-TXs are given by the x-y
plane coordinates (300, 0), (−400, 0) and (0, −100), and their
associated PU-RXs are situated at (600, 0), (−400, 300) and
(0, −400), respectively, where all the distances are measured
in meters. There are six SU-TX/SU-RX pairs (i.e., K = 6)
randomly located within a square area of 600m × 600m.
For each SU-TX, its associated SU-RX is randomly located
in a circle centered at the SU-TX with a radius of 100m.
Each SU-TX with J = 3 antennas is oriented in a UCA
configuration having a radius of λ =
c
fc
, where the carrier
frequency fc = 900MHz and the speed of light c = 3 ×
108
m/s. The transmit power budget, Pmax = 30dBm and
Qn = 23dBm, ∀n ∈ P. Furthermore, each PU-RX has an
interference threshold, In
th, ∀n ∈ P, of −40dBm and each
SU-RX’s minimum QoS threshold, Γk, ∀k ∈ S, is 6dB. The
noise power at any location is considered as −90dBm and the
bandwidth of each channel, B, is set as 10MHz. The small-
scale fading coefficients are modeled as a Circular Symmetric
Complex Gaussian (CSCG) random variables with zero mean
and unit variance. We consider the free space propagation
model to simulate the path-loss, i.e., PL = λ
4πd
2
, where
d is the distance between the transmitter and the receiver.
Normally, the generation size ν in GA should be neither too
small nor too large. A small generation size tends to end up
with a local optimal value, while a large generation size leads
to a high computational complexity though it may be closer
to the optimal value. Hence, in order to balance this tradeoff,
we use the size of the searching space (i.e., Φ = (N +1)K
) in
determining ν, and set ν as the ceiling integer of (N + 1)K.
Accordingly, we let ρ be the ceiling integer of
√
ν. The
stopping criteria for SA algorithm is based on the maximum
number of iterations Smax. We define Smax as the number of
iterations after which a given minimum temperature level, i.e.,
Tlast = 0.3×T0 can be reached. Thus, Smax can be calculated
based on the equation Tlast = (cooling-rate)Smax
× T0,
where the cooling-rate is a constant of 0.99. Note that some
parameters may vary according to evaluation scenarios.
B. Convergence of BPCA-GA and BPCA-SA algorithms
Fig. 2 shows the convergence of the two proposed algo-
rithms, i.e., BPCA-GA and BPCA-SA. The optimal sum-
rate, 42.1765 bits/Hz, is determined by adopting the exhaus-
tive searching method. From the figure, we can see that
BPCA-GA approaches a close-to-optimal sum-rate value of
41.9634 bits/Hz. BPCA-SA can find a suboptimal channel
allocation with a sum-rate value of 41.0557 bits/Hz which
is only 2.16% worse than BPCA-GA. By considering the
computational complexity, we can conclude that BPCA-SA
is more feasible for practical applications. Note that, though
10 20 30 40 50 60 70 80 90 100 110 120 130 140 150
20
25
30
35
40
45
Iterations (Generations)
Sum−rate(bits/Hz)
Optimal sum−rate
BPCA−GA
BPCA−SA
Fig. 2. Convergence of the BPCA-GA and BPCA-SA algorithms with K =
4, N = 3, Pmax = 1W, J = 3.
TABLE II
AVERAGED COMPUTATION TIMES OF DIFFERENT SCHEMES.
Scenario BPCA-SA (s) BPCA-GA (s)
K = 3, N = 2 293.65 688.04
K = 3, N = 3 334.69 1518.50
K = 3, N = 4 548.08 3660.75
BPCA-GA converges much faster than BPCA-SA in terms of
the number of iterations, each iteration takes more time in
BPCA-GA than BPCA-SA because of the high computational
complexity involved in GA. As a proof for such fact, Table II
illustrates the numerical values of the average computation
times taken by the two proposed schemes with respect to
different configurations (i.e., the number of SU-pairs (K) and
channels (N)). From this table, we can clearly observe that
the computation time of BPCA-SA algorithm is always shorter
than that of the BPCA-GA, which proves that the BPCA-SA
has lower computational complexity than the BPCA-GA. In
addition, such superiority becomes more obvious for larger
values of K and N.
C. The achievable sum-rate with increased number of SU
pairs and PU channels
Fig. 3 illustrates a comparison of the achievable sum-rate
by the BPCA-GA and BPCA-SA algorithms. From the figure,
we can see that when the number of SU pairs is small, e.g.,
K = 2, both algorithms show similar performance. This is
because the search space is small in this case so that both GA
and SA-based algorithms have an equal chance to obtain a
close-to-optimal value. However, as the number of SU pairs
increases, the BPCA-GA outperforms BPCA-SA.
Fig. 4 depicts the performance of BPCA-GA and BPCA-SA
with the number of PU channels. From the figure, a similar
observation as in Fig.3 can be obtained. As N increases,
achievable sum-rate of both algorithms tend to increase due to
the increased degrees of freedom on channel allocation. For
most of the cases, BPCA-SA is lagged behind BPCA-GA with
a small performance gap. By comparing Figs 3 and 4, we can
further observe that the number of SU pairs has more effects
on the performance than the number of PU channels.
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
9. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
9
2 3 4 5 6
0
10
20
30
40
50
60
Number of SU pairs (K)
Sumrate(bits/Hz)
BPCA−GA
BPCA−SA
Fig. 3. Optimal sum-rate with an increased number of SU pairs for N = 3
PU channels, Pmax = 1W and J = 3.
1 2 3 4 5
10
15
20
25
30
35
40
Number of PU channels (N)
Sumrate(bits/Hz)
BPCA−GA
BPCA−SA
Fig. 4. Optimal sum-rate with an increased number of PU channels for
K = 3 SU pairs, Pmax = 1W and J = 3.
D. Comparison with Zero-Forcing Beamforming (ZFBF)
We compare the proposed beamforming method with the
traditional ZFBF scenario where the beamforming vectors
for each SU-TX is determined by confining the interference
among the SUs to become zero. We call the secondary
user zero-forcing beamforming, power and channel allocation
with GA and SA-based algorithm as ZFBPCA-GAS and
ZFBPCA-SAS, respectively.
Fig. 5 shows that our proposed model outperforms the ZFBF
scenario irrespective to the channel allocation algorithms.
It is because the degrees of freedom available on channel
allocation in our proposed system model are much greater
than those in the ZFBF model. Moreover, after K > 3, the
curve for ZFBPCA-GAS increases gradually while that for
ZFBPCA-SAS decreases. It is because once K reached the
maximum number of channels (i.e., N = 3 in our simulation),
it is very difficult to find the beamforming vectors with ZFBF
due to the increased channel access requirement of the SUs.
Furthermore, after K > 3, the ZFBPCA-SAS tends to gener-
ate more infeasible channel allocation, and hence eventually
converges to a value which is away from the optimal. The
2 3 4 5 6
0
10
20
30
40
50
60
Number of SU pairs (K)
Sumrate(bps/Hz)
BPCA−GA
BPCA−SA
ZFBPCA−GAs
ZFBPCA−SAs
Fig. 5. Comparison of sum-rate between SU ZFBF and proposed system
models with an increased number of SU pairs for N = 3 PU channels,
Pmax = 1W and J = 3.
2 3 4
10
15
20
25
30
35
40
45
Number of Antennas (J)
Sumrate(bps/Hz)
BFCA−GA
BFCA−SA
ZFBFCA−GAs
ZFBFCA−SAs
Fig. 6. Comparison of sum-rate between SU ZFBF and proposed system
models with an increased number of antennas with N = 2 PU channels,
K = 4 SU pairs and Pmax = 1W.
performance of achievable sum-rate with respect to the number
of transmit antennas is shown in Fig. 6. The figure depicts that
the sum-rates are increased with the number of antennas. It is
because once J increases, the transmitter can direct the signal
with better intensity to the intended receiver and at the same
time further suppress the interference to the other users who
are using the same channel.
We further compare the proposed beamforming method
with another ZFBF scenario with respect to the number of
SU pairs and the number of antennas, as shown in Figs. 7
and 8, respectively. The beamforming vectors in this ZFBF
scenario are determined by eliminating the interference at
each PU-Rx. We call the GA and SA-based algorithms as-
sociated with primary user zero-forcing beamforming, power
and channel allocation as ZFBPCA-GAP and ZFBPCA-SAP,
respectively. Compared to Figs. 5 and 6, similar observations
can be obtained. It is obvious that our proposed algorithm can
outperform the primary user ZFBF scenario regardless of the
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
10. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
10
2 3 4 5 6
0
10
20
30
40
50
60
Number of SU pairs (K)
Sumrate(bps/Hz)
BPCA−GA
BPCA−SA
ZFBPCA−GAp
ZFBPCA−SAp
Fig. 7. Comparison of sum-rate between PU ZFBF and proposed system
models with an increased number of SU pairs for N = 3 PU channels,
Pmax = 1W and J = 3.
2 3 4
10
15
20
25
30
35
40
45
Number of Antennas (J)
Sumrate(bps/Hz)
BFCA−GA
BFCA−SA
ZFBFCA−GAp
ZFBFCA−SAp
Fig. 8. Comparison of sum-rate between PU ZFBF and proposed system
models with an increased number of antennas with N = 2 PU channels,
K = 4 SU pairs and Pmax = 1W.
channel allocation algorithms.
E. The performance of BPCA-GA and BPCA-SA with different
power budget
Fig. 9 illustrates the performance of sum-rates by varying
power budget, Pmax. As we increase the power budget, the
achievable sum-rate also increases as shown in the figure. In
fact, the sum-rate performance gap between the BPCA-GA
and BPCA-SA is small and keeps approximately unchanged
as we increase Pmax. It is mainly because the convergence
properties of both algorithms do not change with the power.
With the increased power budget, the SUs are favored to have
more individual power allocation. Hence, they are rewarded
with more power as long as the interference constrains are
satisfied, which in return increases the sum-rate.
V. CONCLUSION
In this paper, a problem of joint beamforming, power and
channel allocation is considered for multi-user multi-channel
0.6 0.8 1 1.2
25
30
35
40
Power (W)
Sumrate(bits/Hz)
BPCA−GA
BPCA−SA
Fig. 9. Comparison of sum-rate variation for BPCA-GA and BPCA-SA with
total power budget available for fixed N = 2 PU channels, K = 4 SU pairs
and J = 3 antennas.
underlay cognitive radio networks. The problem is formulated
as a non-convex MINLP problem, which is NP-hard. In order
to reduce the computational complexity, we decouple the origi-
nal problem into two sub-problems. At first, a feasible solution
for beamforming vectors and power allocation is obtained for
a known channel allocation by an iterative algorithm, which
uses the SDR approach with an auxiliary variable. After that,
GA and SA-based algorithms have been applied to determine
suboptimal channel allocations. Simulation results show that
BPCA-GA can obtain close-to-optimal solution with a price
of high computation complexity. Whereas, BPCA-SA can sig-
nificantly reduce the computational complexity with marginal
performance degradation compared to BPCA-GA. Moreover,
beamforming with interference tolerance capability introduced
by our system model can achieve better performance than
traditional ZFBF.
REFERENCES
[1] “Spectrum policy task force, spectrum policy task force report,” Federal
Communications Commission ET, 2002.
[2] S. Haykin, “Cognitive radio: brain-empowered wireless communication-
s,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220, Feb. 2005.
[3] R. Qiu, Z. Hu, H. Li, and M. Wicks, Cognitive Radio Communication
and Networking: Principles and Practice. Wiley, 2012.
[4] C. Yi and J. Cai, “Two-stage spectrum sharing with combinatorial
auction and stackelberg game in recall-based cognitive radio networks,”
IEEE Trans. Commun., vol. 62, no. 11, pp. 3740–3752, Nov. 2014.
[5] C. Yi and J. Cai, “Multi-item spectrum auction for recall-based cognitive
radio networks with multiple heterogeneous secondary users,” IEEE
Trans. Veh. Technol., vol. 64, no. 2, pp. 781–792, Feb. 2015.
[6] B. Van Veen and K. Buckley, “Beamforming: a versatile approach to
spatial filtering,” IEEE ASSP Mag., vol. 5, no. 2, pp. 4–24, Apr. 1988.
[7] S. Yiu, M. Vu, and V. Tarokh, “Interference reduction by beamforming
in cognitive networks,” in Proc. IEEE Globecom, Nov. 2008, pp. 1–6.
[8] R. Xie, F. Yu, and H. Ji, “Joint power allocation and beamforming
with users selection for cognitive radio networks via discrete stochastic
optimization,” in Proc. IEEE Globecom, Dec. 2011, pp. 1–5.
[9] B. Zayen, A. Hayar, and G. Oien, “Resource allocation for cognitive
radio networks with a beamforming user selection strategy,” in Signals,
Syst. and Comput., Conf. Rec. of the Forty-Third Asilomar, Nov. 2009,
pp. 544–549.
[10] O. Abdulghfoor, M. Ismail, and R. Nordin, “Power allocation via
interference compensation in underlay cognitive radio networks: A game
theoretic perspective,” in Int.l Symp. Telecommun. Tech. (ISTT), Nov
2012, pp. 296–301.
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
11. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
11
[11] K. W. Sung, M. Tercero, and J. Zander, “Aggregate interference in
secondary access with interference protection,” IEEE Commun. Lett.,
vol. 15, no. 6, pp. 629–631, Jun. 2011.
[12] Y. Wen, S. Loyka, and A. Yongacoglu, “Asymptotic analysis of interfer-
ence in cognitive radio networks,” IEEE J. Sel. Areas Commun., vol. 30,
no. 10, pp. 2040–2052, Nov. 2012.
[13] C. Jiang and L. Cimini, “Downlink energy-efficient multiuser beam-
forming with individual sinr constraints,” in Proc. Milcom, Nov. 2011,
pp. 495–500.
[14] Y.-L. Liu, M.-L. Ku, and L.-C. Wang, “Joint beamforming, scheduling,
and power allocation for hierarchical cellular systems,” in Proc. IEEE
ICC, Jun. 2012, pp. 1773–1778.
[15] M.-L. Ku, L.-C. Wang, and Y.-T. Su, “Toward optimal multiuser antenna
beamforming for hierarchical cognitive radio systems,” IEEE Trans.
Commun., vol. 60, no. 10, pp. 2872–2885, Oct. 2012.
[16] E. Gharavol, Y.-C. Liang, and K. Mouthaan, “Robust downlink beam-
forming in multiuser miso cognitive radio networks with imperfect
channel-state information,” IEEE Trans. Veh. Technol., vol. 59, no. 6,
pp. 2852–2860, Jul. 2010.
[17] S.-H. Moon, C. Lee, S.-R. Lee, and I. Lee, “Joint user scheduling and
adaptive intercell interference cancelation for miso downlink cellular
systems,” IEEE Trans. Veh. Technol., vol. 62, no. 1, pp. 172–181, Jan.
2013.
[18] K. Hamdi, W. Zhang, and K. Letaief, “Joint beamforming and scheduling
in cognitive radio networks,” in Proc. IEEE Globecom, Nov. 2007, pp.
2977–2981.
[19] K. Cumanan, R. Krishna, L. Musavian, and S. Lambotharan, “Joint
beamforming and user maximization techniques for cognitive radio
networks based on branch and bound method,” IEEE Trans. Wireless
Commun., vol. 9, no. 10, pp. 3082–3092, Oct. 2010.
[20] C. Pitz, E. Ortiz Batista, and R. Seara, “On the joint beamforming and
power control in cellular systems: Algorithm and stochastic model,”
IEEE Trans. Wireless Commun., vol. 13, no. 12, pp. 6943–6954, Dec.
2014.
[21] C.-C. Chien, H.-J. Su, and H.-J. Li, “Joint beamforming and power
allocation for MIMO relay broadcast channel with individual SINR
constraints,” IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1660–1677,
May 2014.
[22] P. Cheng, L. Deng, H. Yu, Y. Xu, and H. Wang, “Resource allocation
for cognitive networks with d2d communication: An evolutionary ap-
proach,” in Proc. IEEE WCNC, Apr. 2012, pp. 2671–2676.
[23] A. Ghazanfari, A. Tolli, and H. Pennanen, “Sum power minimization
for cellular systems with underlay d2d communications,” in Proc.
CROWNCOM, Jun. 2014, pp. 45–50.
[24] K. Illanko, K. Raahemifar, and A. Anpalagan, “Sub-channel and power
allocation for multiuser OFDM with rate constraints using genetic
algorithm,” in Proc. IEEE PacRim, Aug. 2009, pp. 571–575.
[25] B. Ye, M. Nekovee, A. Pervez, and M. Ghavami, “TV white space
channel allocation with simulated annealing as meta algorithm,” in Proc.
CROWNCOM, Jun. 2012, pp. 175–179.
[26] N. Noordin, V. Zuniga, A. El-Rayis, N. Haridas, A. Erdogan, and
T. Arslan, “Uniform circular arrays for phased array antenna,” in
Antennas and Propagation Conf. (LAPC), Nov. 2011, pp. 1–4.
[27] B. H. Wang, H. T. Hui, and M.-S. Leong, “Decoupled 2d direction of ar-
rival estimation using compact uniform circular arrays in the presence of
elevation-dependent mutual coupling,” IEEE Trans. Antennas Propag.,
vol. 58, no. 3, pp. 747–755, Mar. 2010.
[28] Y. Tachwali, B. Lo, I. Akyildiz, and R. Agusti, “Multiuser resource
allocation optimization using bandwidth-power product in cognitive
radio networks,” IEEE J. Sel. Areas Commun., vol. 31, no. 3, pp. 451–
463, Mar. 2013.
[29] L. Vandenberghe and S. Boyd, “Semidefinite programming,” SIAM
Review, vol. 38, no. 1, pp. 49–95, 1996.
[30] Z.-Q. Luo, W.-K. Ma, A.-C. So, Y. Ye, and S. Zhang, “Semidefinite
relaxation of quadratic optimization problems,” IEEE Signal Processing
Mag., vol. 27, no. 3, pp. 20–34, May 2010.
[31] I. CVX Research, “CVX: Matlab software for disciplined convex
programming, version 2.0,” http://cvxr.com/cvx, Aug. 2012.
[32] S. Boyd and L. Vandenberghe. Cambridge University Press, 2004.
[33] P. van Laarhoven and E. Aarts, Simulated Annealing: Theory and Appli-
cations, ser. Ellis Horwood series in mathematics and its applications.
Springer, 1987.
[34] S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, “Optimization by
simulated annealing,” Science, vol. 220, no. 4598, pp. 671–680, 1983.
[35] S. Chantaraskul and K. Moessner, “Implementation of a genetic algo-
rithm based decision making framework for opportunistic radio,” IET
Commun., vol. 4, no. 5, pp. 495–506, Mar. 2010.
[36] G. K. Soon, T. T. Guan, C. K. On, R. Alfred, and P. Anthony, “A
comparison on the performance of crossover techniques in video game,”
in Proc. IEEE ICCSCE, Nov. 2013, pp. 493–498.
[37] A. J. Monticelli, R. Romero, and E. N. Asada, Fundamentals of
Simulated Annealing. John Wiley and Sons, Inc., 2007.
[38] D. Thompson and G. Bilbro, “Sample-sort simulated annealing,” IEEE
Trans. Syst. Man Cybern. B, Cybern., vol. 35, no. 3, pp. 625–632, Jun.
2005.
Suren Dadallage received the B.Sc. degree in Elec-
tronics and Telecommunication Engineering from
University of Moratuwa, Sri Lanka, in 2010, and
M.Sc. degree in Electrical and Computer Engineer-
ing from University of Manitoba, Winnipeg, MB,
Canada, in 2015. His research interests include
beamforming algorithms and radio resource manage-
ment for cognitive radio networks.
Changyan Yi received the B.Sc. degree from Guilin
University of Electronic Technology, China, in 2012,
and M.Sc. degree from University of Manitoba, Win-
nipeg, MB, Canada, in 2014. He is currently working
toward the Ph.D. degree in electrical and computer
engineering, University of Manitoba. He was award-
ed Edward R. Toporeck Graduate Fellowship in En-
gineering in 2014, and University of Manitoba Grad-
uate Fellowship (UMGF) in 2015-2018. His research
interests include algorithmic game, optimization and
queueing theories for radio resource management,
prioritized scheduling and network economics in wireless communications.
Jun Cai (M’04, SM’14) received the B.Sc. and
M.Sc. degrees from Xi’an Jiaotong University, X-
i’an, China, in 1996 and 1999, respectively, and the
Ph.D. degree from the University of Waterloo, ON,
Canada, in 2004, all in electrical engineering. From
June 2004 to April 2006, he was with McMaster
University, Hamilton, ON, as a Natural Sciences and
Engineering Research Council of Canada Postdoc-
toral Fellow. Since July 2006, he has been with the
Department of Electrical and Computer Engineering,
University of Manitoba, Winnipeg, MB, Canada,
where he is currently an Associate Professor. His current research inter-
ests include energy-efficient and green communications, dynamic spectrum
management and cognitive radio, radio resource management in wireless
communications networks, and performance analysis. Dr. Cai served as the
Technical Program Committee Co-Chair for the IEEE Vehicular Technology
Conference 2012 Fall Wireless Applications and Services Track, the IEEE
Global Communications Conference (Globecom) 2010 Wireless Communi-
cations Symposium, and International Wireless Communications and Mobile
Computing (IWCMC) Conference 2008 General Symposium; the Publicity
Co-Chair for IWCMC in 2010, 2011, 2013, and 2014; and the Registration
Chair for the First International Conference on Heterogeneous Networking for
Quality, Reliability, Security and Robustness (QShine) in 2005. He also served
on the editorial board of the Journal of Computer Systems, Networks, and
Communications and as a Guest Editor of the special issue of the Association
for Computing Machinery Mobile Networks and Applications. He received
the Best Paper Award from Chinacom in 2013, the Rh Award for outstanding
contributions to research in applied sciences in 2012 from the University of
Manitoba, and the Outstanding Service Award from IEEE Globecom in 2010.
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457