SlideShare a Scribd company logo
0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
1
Joint Beamforming, Power and Channel Allocation
in Multi-User and Multi-Channel Underlay MISO
Cognitive Radio Networks
Suren Dadallage, Changyan Yi and Jun Cai, Senior Member, IEEE
Abstract—In this paper, we consider a joint beamforming,
power, and channel allocation in a multi-user and multi-channel
underlay multiple input single output (MISO) cognitive radio
network (CRN). In this system, primary users’ (PUs’) spec-
trum can be reused by the secondary user transmitters (SU-
TXs) to maximize the spectrum utilization while the intra-user
interference is minimized by implementing beamforming at each
SU-TX. After formulating the joint optimization problem as
a non-convex, mixed integer nonlinear programming (MINLP)
problem, we propose a solution which consists of two stages.
In the first stage, a feasible solution for power allocation and
beamforming vectors is derived under a given channel allocation
by converting the original problem into a convex form with an
introduced optimal auxiliary variable and semidefinite relaxation
(SDR) approach. After that, in the second stage, two explicit
searching algorithms, i.e., genetic algorithm (GA) and simulated
annealing (SA)-based algorithm, are proposed to determine
suboptimal channel allocations. Simulation results show that
beamforming, power and channel allocation with SA (BPCA-SA)
algorithm can achieve close-to-optimal sum-rate while having a
lower computational complexity compared with beamforming,
power and channel allocation with GA (BPCA-GA) algorithm.
Furthermore, our proposed allocation scheme has significant
improvement in achievable sum-rate compared to the existing
zero-forcing beamforming (ZFBF).
Index Terms—Cognitive radio network, beamforming, semidef-
inite relaxation, genetic algorithm, simulated annealing.
I. INTRODUCTION
RECENT studies reveal that the existing static spectrum
allocation is the key reason for highly inefficient spec-
trum utilization [1], [2], which in turn leads to a prob-
lem of spectrum scarcity. To overcome this issue, a novel
concept called cognitive radio (CR) was introduced [3]–[5],
which allows unlicensed users or secondary users (SUs) to
initiate transmissions with the licensed communications. For
an underlay CR network (CRN) coexisting with a multi-
channel primary user (PU) network, managing interference is
a critical issue since spectrum reusing among multiple users
may cause negative effects on received signals at both PUs
and SUs. By exploiting multiple antennas, a signal processing
technology called beamforming [6] has been introduced to CR
Copyright (c) 2015 IEEE. Personal use of this material is permitted.
However, permission to use this material for any other purposes must be
obtained from the IEEE by sending a request to pubs-permissions@ieee.org.
This work was supported by the Natural Sciences and Engineering Research
Council of Canada under Discovery Grant.
The authors are with the Department of Electrical and Computer Engineer-
ing, University of Manitoba, Winnipeg, MB, Canada R3T 5V6. E-mail: dadal-
las@myumanitoba.ca, changyan.yi@umanitoba.ca, jun.cai@umanitoba.ca.
for directional signal transmission, so as to effectively mitigate
the mutual interference and improve the signal-to-interference-
plus noise ratio (SINR) [7].
In the literature, joint beamforming and resources allocation
have been widely studied for multiple-antenna CRNs. For
example, Xie et al. in [8] considered a sum-rate maximization
problem in a single PU channel CRN. In this work, the mutual
interference between SUs are nullified by deploying the zero-
forcing beamforming (ZFBF). The authors in [9] discussed a
joint beamforming and single PU channel assignment problem
to maximize the uplink throughput of the CRN while guaran-
teeing a SINR constraint at each secondary user receiver (SU-
RX) and interference cancellation at the primary user receiver
(PU-RX). However, ZFBF does not consider the potential
interference tolerance at SUs, which in turns results in a
degradation on overall achievable sum-rate of the secondary
network. Recent studies [10]–[12] showed that both PU and
SU receivers can tolerate some amount of interference. As a
result, it is not necessary to null the co-channel interference.
Jiang et al. in [13] employed a zero-gradient based iterative
approach to determine the local optimal beamforming vectors
while maximizing the energy efficiency of the CRN. In [14],
beamforming vectors were calculated by using an iterative
algorithm based on semidefinite programming to maximize
the sum-rate with a total power constraint and co-channel
interference constraints at both PU and SU receivers. This
work was further extended in [15] by adding an extra quality
of service (QoS) constraint. However, the assumption of a
single PU channel as used in [13]–[15] reduces the degree
of freedom available at the secondary base station (SBS) on
channel allocation for SUs. Therefore, joint beamforming and
resource allocation with multiple PU channels were studied.
For example, in [7], a single secondary user transmitter (SU-
TX)/SU-RX pair was considered with uniformly distributed
primary user transmitters (PU-TXs) and PU-RXs in a circular
disc area. Beamforming was implemented by the SU-TX to
minimize the interference to the PU-RXs while the received
signal strength was maximized at the SU-RX. Gharavol et
al. in [16] discussed a transmit power minimization problem
with a guarantee of SUs’ QoS and total power constraints in a
multiple channels multiple-input-single-output (MISO) CRN.
Some other works in this area include an adaptive intercell
interference cancellation (ICIC) technique for MISO downlink
cellular systems with channel allocation and beamforming to
maximize the weighted sum-rate [17]. Hamdi et al. in [18]
considered joint beamforming with a near-orthogonal user
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
2
selection method to maximize the downlink throughput of the
CRN, subject to constraints on SINR at each SU, interference
at the PU-RX and total transmission power. The authors in
[19] proposed an algorithm based on branch and bound (BnB)
method to allocate PU frequency bands with beamforming to
serve a maximum number of SUs.
However, most of these works [14]–[21] assumed a cellular
architecture for secondary networks, where either SU-Tx or
SU-Rx is the secondary base station. Recently, device-to-
device (D2D) communication based secondary networks [22],
[23] are attracting more attentions from researchers due to their
advantages in offering greater coverage with spatial diversity,
higher data rates and lower energy consumption. Different
from the traditional cellular architecture, D2D communications
cause co-channel receivers interfered by multiple transmitters
at different locations. This challenge requests the consideration
of individual SINR constraint at each SU-Rx, and makes the
joint beamforming and resource allocation more complicated
than the traditional case.
In this paper, we readdress the joint transmit beamforming,
power and channel allocation problem in an underlay CRN
with independent D2D communications among multiple PU
and SU pairs. Specifically, in our work, beamforming is
performed by each SU-TX instead of a single SBS so as to
promote the spatial diversity and curtail the interference. Our
main objective is to maximize the sum-rate of the secondary
network while minimizing the intra-user interference subject
to the constraints of total power budget, interference on PUs
and SINR requirement at each SU. We formulate the joint
optimization problem as a non-convex, mixed integer nonlin-
ear programming (MINLP) problem [14], which is NP-hard.
In order to solve this problem with reasonable computational
complexity, a two-stage solution approach is proposed. In the
first stage, an iterative algorithm is proposed to determine the
feasible beamforming vectors and power allocation for a given
channel allocation. After that, two explicit searching algo-
rithms based on genetic algorithm (GA) [24] and simulated
annealing (SA) [25] are proposed to find out the suboptimal
channel allocation. The main contributions of this paper are
summarized as follows.
• We consider a multi-channel underlay CR system with
the capability of beamforming at each SU-TX to mitigate
interference, allow more transmission opportunities, and
exploit the benefits of spatial diversity.
• We develop a sum-rate maximization problem to joint-
ly optimize beamforming vectors, power allocation and
channel allocation.
• Two different algorithms are proposed to solve the for-
mulated non-convex MINLP problem.
• Simulation results show that the proposed system model
outperforms the existing ZFBF model by exploiting inter-
ference tolerance capacities. The proposed algorithms can
achieve close-to-optimal performance in terms of sum-
rate with low computation complexity so that they are
more suitable for practical applications.
The rest of this paper is organized as follows. The system
model and the problem formulation are discussed in Section II.
PU-RXn
PU-TXn
SU-TXk
SU-RXk
SU-TXm
SU-RXm
gnk
hkn
hmk
hk
Central
Entity
PU-TX
SU-TX
PU-RX
SU-RX
PU-RXPU-TX
Desired Channel
Interference Channel
Fig. 1. System model and channel responses.
The solution approaches and their computational complexities
are analyzed in Section III. After that, the simulation results
are presented in Section IV, followed by the conclusions in
Section V.
II. SYSTEM MODEL AND PROBLEM FORMULATION
We consider a CRN with N PU transceivers and K SU
transceivers randomly distributed in the coverage area of the
primary network. Each PU transceiver occupies one separated
licensed channel so that there are N PU channels in total.
Each SU-TX is equipped with J antennas and its receiver
with a single antenna, while each PU (transmitter or receiver)
has a single antenna. Each SU-TX is allowed to communi-
cate with its corresponding receiver in the underlay manner
while satisfying a pre-defined interference constraint at the
corresponding PU-RX. There is a central entity who performs
all control functions (e.g., resource allocations) for SUs. An
illustration of the system model is shown in Fig. 1. We define
two sets S and P to indicate all possible SU pairs and PU
pairs in the network, respectively.
The following notations are used in this paper. Boldface
uppercase and lowercase letters will be used for matrices and
vectors, respectively. (·)†
, (·)T
, E{·} and x denote conju-
gate transpose, transpose, expectation and Euclidean norm of
vector x, respectively. In addition, Tr(A) indicates the trace
operation of a square matrix A. For convenience, Table I lists
some important symbols used in this paper.
A. Signal Model
Define the transmitted signals from the kth SU-TX, i.e.,
SU-TXk, to its receiver SU-RXk and from nth PU-TX, i.e.,
PU-TXn, to its receiver PU-RXn as sk and un, respectively.
We assume that each modulated transmitted signal has unit
energy and is uncorrelated with each other, i.e., E{|sk|2
} =
E{|un|2
} = 1, E{sks†
m} = E{unu†
d} = 0, ∀k, m ∈ S and
n, d ∈ P, k = m and d = n. With antenna array, each
SU-TX performs transmit beamforming to direct the signal
to the intended receiver while at the same time controlling the
interference to other users (PUs and SUs). The received signal
at the SU-RXk using the nth PU channel can be represented
as the aggregation of desired signal, interference from other
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
3
TABLE I
LIST OF NOTATIONS
Symbol Definition
Sn Set of SU pairs using the nth PU channel
K Number of SU pairs
N Number of PU channels
sk/un kth SU transmit signal/nth PU transmit signal
hk Channel response between the SU-TXk and the SU-RXk
hmk Channel response between the SU-TXm and the SU-RXk
hmn Channel response between the SU-TXm and the PU-RXn
gnk Channel response between the PU-TXn and the SU-RXk
gn Channel response between the PU-TXn and the PU-RXn
ηk/ηn Noise at the SU-RXk/PU-RXn
Qn PU-TXn’s transmit power
ˆαki, ¯αkn, αn, βk Large-scale fading coefficients
ˆϑki, ¯ϑkn, ϑn, bk Small-scale fading coefficients
J Number of transmit antennas
vk(θ, φ) SU-TXk’s steering vector having a counter-clockwise azimuth angle of θ and φ elevation
rn
k Rate of the kth SU-TX on nth PU channel
B Transmission bandwidth of each PU channel
In
th Maximum interference tolerance threshold at the PU-RXn
Γk Minimum QoS threshold at the kth SU-RX
Pmax Power budget of the secondary network
ϕ Auxiliary vector to indicate the intra-user interference thresholds of each SU-RX
ϕk kth SU-RX intra-user interference threshold
wk kth SU-TX beamforming vector
Wk kth SU-TX positive semidefinite beamforming matrix
xn
k Binary variable to indicate the nth PU channel allocation on kth SU-TX
SU-TXs using the same PU channel for transmission, the
interference from the nth PU-TX, and noise, i.e.,
yn
k = (wksk)†
hk +
m∈Sn,m=k
(wmsm)†
hmk + Qngnkun + ηk,
(1)
where wk is the kth SU-TX’s beamforming vector with size of
J ×1, Qn is the transmit power of the nth PU-TX, hk denotes
the J × 1 channel response between SU-TXk and SU-RXk,
hmk is the J × 1 channel response between SU-TXm and
SU-RXk, gnk denotes the channel response between PU-TXn
and SU-RXk, and Sn denotes the set of SU-TXs using the nth
PU channel. The noise ηk is Gaussian distributed with zero
mean and variance σ2
. Similarly, the received signal at the nth
PU-RX consists of desired PU signal, co-channel interference
from SUs and noise. Thus, it can be formulated as
yn = Qngnun+
k∈Sn
(wksk)†
hkn+ηn, n = 1, . . . , N (2)
where gn and hkn are channel responses from the nth PU
transmitter and the kth SU-TX to the nth PU-RX, respectively,
and ηn denotes the noise.
The channel responses hki, gkn and gn in (1) and (2) can
be further defined as
hki =
hki = [h1
ki . . . hJ
ki]T
, if i = k ∈ Sn, i ∈ Sn ∪ P,(3a)
βkbkvk(θ, φ), if i = k (3b)
hl
ki = ˆαki
ˆϑki, i = k ∈ Sn, i ∈ Sn ∪ P and l = 1, . . . , J (4)
gkn = αknϑkn, k ∈ Sn and n ∈ P (5)
gn = ¯αn
¯ϑn, n ∈ P (6)
where ˆαki, ¯αkn, αn and βk denote the large-scale fading, while
ˆϑki, ¯ϑkn, ϑn and bk represent the small-scale fading which are
modeled as Rayleigh distributed random variables. Consider
uniform circular array (UCA) [26] of antenna configuration at
each SU-TX. Then, vk(θ, φ) is the steering vector for the kth
SU-TX, which indicates the relative responses of the isotropic
array elements with respect to the signal impinging at the
center of the array from a particular direction. Here, φ denotes
the counter-clockwise azimuth angle measured from X-axis
and θ denotes elevation measured from Z-axis. In this paper,
we assume that all users are located in the same plane, so
that θ becomes zero and mutual coupling [27] among array
elements is not considered.
Similar to [15], we assume that perfect knowledge of the
channel state information (CSI) is available at each SU-TX
before transmission.
B. Problem Formulation
Given the kth SU transceiver is working on the nth PU
channel, the SINR at the kth SU-RX, denoted as SINRk, can
be represented as
SINRk =
|w†
khk|2
m∈Sn,m=k
|w†
mhmk|2 + Qn|gnk|2 + σ2
(7)
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
4
where |w†
khk|2
is the desired received signal power at the
SU-RXk.
m∈Sn,m=k
|w†
mhmk|2
denotes the total intra-user
interference received at the SU-RXk from other SU-TXs’
who are using the same channel. Qn|gnk|2
and σ2
are the
interference power from PU-TXn and the noise power at the
SU-RXk, respectively.
Let xn
k , k = 1, . . . , K, n = 1, . . . , N, denote the channel
allocation for SUs. xn
k = 1 means that the nth PU channel is
assigned to the SU-TXk. Otherwise, xn
k = 0. Then, from (7),
the achievable rate of SU pair k on the nth PU channel, rn
k ,
can be calculated as
rn
k = B log2


1 +
xn
k |w†
khk|2
m∈Sn,m=k
|w†
mhmk|2 + Qn|gnk|2 + σ2



(8)
where B is the transmission bandwidth of a single PU channel.
Our major objective is to maximize the sum-rate of the SU
network while allowing concurrent transmission with PUs. The
optimization problem can be formulated as
P1 : max
w,X
K
k=1
N
n=1
rn
k (9)
s.t.
K
k=1
|w†
khkn|2
xn
k ≤ In
th, ∀n = 1, . . . , N, (10)
SINRk ≥ Γk, ∀k = 1, . . . , K, (11)
K
k=1
N
n=1
wk
2
xn
k ≤ Pmax, (12)
N
n=1
xn
k ≤ 1, ∀k = 1, . . . , K, (13)
xn
k ∈ {0, 1}, ∀k ∈ S, ∀n ∈ P,(14)
where In
th is the maximum interference tolerance threshold
of the nth PU-RX. Γk is the minimum QoS threshold at
the kth SU-RX. Pmax is the available power budget of the
secondary network. w = [w1 . . . wK] of size J × K indicates
the beamforming weights matrix, where its kth column defines
the beamforming vector for the SU-TXk. X is a K×N channel
allocation matrix, which consists of all xn
k , k ∈ S and n ∈ P.
The constraint (10) limits the total interference power from
SU-TXs to a specific PU-RX below a pre-defined threshold.
Constraint (11) guarantees the required SINR level at each
SU-RX. Constraint (12) keeps the total power consumption
under the available power budget. Constraint (13) implies that
each SU-TX can access at most one PU channel. Note that the
setting of single-channel access has been widely used in most
of related works [10]–[12]. Even though the sum-rate may be
further improved by adopting multiple channels for a single
SU-TX, it will significantly increase the complexity of the
system due to the difficulties involved in the power allocation.
Since the power allocation of SU-TXk is determined by
wk
2
, the problem P1 in fact integrates beamforming, power
allocation and channel allocation.
III. A TWO-STAGE SOLUTION APPROACH
The problem P1 consists of both continuous and discrete
variables, and there are nonlinear terms in both the objective
function and constraints. Hence, it is a non-convex, mixed
integer non-linear programming problem, which has been
proved to be NP-hard [28]. In order to balance performance
and computational complexity, in the following a two-stage
solution approach is proposed. The idea is to separate the
main problem into two sub-problems. In the first sub-problem,
the power and beamforming vectors are calculated based
on a given channel allocation. After that, the second sub-
problem, which determines a suboptimal channel allocation,
will be solved. For the second sub-problem, two algorithms
are proposed with different computational complexity.
A. Power and beamforming vector determination based on a
given channel allocation
In this section, the beamforming vector and power allocation
for each SU-TX will be determined based on a given channel
allocation, ˜X. Given ˜X, constraints (10) and (12) can be
transformed to a summation of quadratic terms and norms
so that they become convex. However, the original problem
P1 is still non-convex because neither the objective function
(9) nor the constraint (11) are convex. To overcome this issue,
we use semidefinite programming (SDP) approach [29], which
allows to express the quadratic terms with some equivalent
affine expressions. With SDP, the quadratic terms, |w†
khkn|2
,
|w†
mhmk|2
and wk
2
, can be equivalently represented as
|w†
khkn|2
= Tr(w†
khknh†
knwk)
= Tr(WkHkn), ∀k ∈ S, ∀n ∈ P (15)
wk
2
= Tr(Wk), ∀k ∈ S (16)
|w†
mhmk|2
=
Tr(WmHmk), ∀m = k, m ∈ Sn
Tr(WkHk), m = k
(17)
where Wk = wkw†
k, Hkn = hknh†
kn, Hk = hkh†
k, and
Hmk = hmkh†
mk. From (15) - (17), we have i) Wk is a rank
one positive semidefinite (PSD) matrix, i.e., Wk 0, ∀k;
ii) Tr(WkHkn), Tr(WkHk) and Tr(WmHmk) are all affine
expressions with respect to the symmetric PSD matrices Wk
and Wm.
With (15), (16), (17) and the assumption of a known channel
allocation, the optimization problem P1 can be rewritten as
P2 : max
W1,...,WK
K
k=1
N
n=1
rn
k (18)
s.t.
K
k=1
˜xn
k Tr(WkHkn) ≤ In
th, ∀n = 1, . . . , N (19)
SINRk ≥ Γk, ∀k = 1, . . . , K (20)
K
k=1
N
n=1
˜xn
k Tr(Wk) ≤ Pmax, (21)
Wk 0, ∀k = 1, . . . , K, (22)
Rank(Wk) = 1, ∀k = 1, . . . , K (23)
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
5
where,
rn
k = B log2

1 +
˜xn
k Tr(WkHk)
m∈Sn
m=k
Tr(WmHmk) + Qn|gnk|2 + σ2


(24)
Note that two additional constraints, (22) and (23), are
added in P2. Obviously, the former has a convex expression,
but the later does not. In addition, the constraints (19) and (21)
have been transformed to linear functions without affecting
their convexity. The optimization problem P2 can be further
transformed into a convex form by doing the following two
steps. First, the non-convex rank constraint of (23) can be
relaxed by using the SDR approach again [30]. Then, follow-
ing the similar approach in [14], intra-user interference from
other SUs to the SU-RXk, i.e., m∈Sn
m=k
Tr(WmHmk), can
be constrained by introducing a new auxiliary variable. After
these two steps, the revised optimization problem P3 can be
written as
P3 : max
W,ϕ
K
k=1
N
n=1
B log2 1 +
˜xn
k Tr(WkHk)
ϕk + Qn|gnk|2 + σ2
(25)
s.t. constraints (19), (21), (22),
Tr(WkHk) ≥ Γk
m∈Sn
m=k
Tr(WmHmk)
+ Qn|gnk|2
+ σ2
, ∀k ∈ Sn (26)
m∈Sn
m=k
Tr(WmHmk) ≤ ϕk, ϕk ≥ 0, ∀k = 1, . . . , K (27)
where W = [W1 . . . WK] is a J ×KJ matrix which consists
of all the beamforming matrices, and ϕ = [ϕ1, . . . , ϕK]T
is
a K × 1 non-negative auxiliary vector which represents intra-
user interference thresholds of all SU-RXs.
Given ϕ, the objective function becomes concave since it is
just a logarithmic function of an affine expression. In addition,
the convexity of the constraint (26) can be proven as in [15].
As a result, the problem P3 turns into a form of convex
optimization problem. It is similar to the standard form of SDP,
but with a logarithmic rather than a linear objective function.
There are many tools available in literature (e.g., CVX [31],
a Matlab based modeling software package) to solve such a
convex optimization problem. Thus, we only need to determine
the optimal value for ϕ. Following the similar method in [14],
we introduce the following iterative algorithm for P3.
(i) Initialization: Relax the intra-user interference constraint
(27) by assigning a feasible non-negative large val-
ue for ϕ. Then, solve the problem P3 to find out
a feasible value of W, called ˜W(0)
. Set the intra-
user interference thresholds for each user as ϕ
(0)
k =
m∈Sn
m=k
Tr( ˜W
(0)
m Hmk), ∀k ∈ S and calculate the sum-
rate, R( ˜W(0)
, ϕ(0)
), based on (25). Define SU pair
index, k = 1, 1 ≤ k ≤ K and the iteration index,
a = 1.
(ii) Update: Update ϕ(a)
by ϕ(a)
= ϕ(a−1)
− (1 −
δ)ϕ
(a−1)
k Ik where δ is a fixed step size, 0 < δ < 1,
and Ik is the kth column of an K × K identity matrix.
(iii) Iteration results: Calculate the new R( ˜W(a)
, ϕ(a)
) by
using ˜W(a)
.
(iv) Check improvements: Calculate ∆R = R( ˜W(a)
, ϕ(a)
)−
R( ˜W(a−1)
, ϕ(a−1)
). The nonnegativity of ∆R can be
proved as in [15]. If ∆R is greater than a predefined
threshold, let a = a + 1 and repeat steps (ii) and (iii) till
∆R below a pre-defined threshold. Then, set ˜W(a)
=
˜W(a−1)
, R( ˜W(a)
, ϕ(a)
) = R( ˜W(a−1)
, ϕ(a−1)
) and
update the intra-user interference for each user as ϕ
(a)
k =
m∈Sn
m=k
Tr( ˜W
(a)
m Hmk), ∀k ∈ S.
(v) Continue iterations and pick the next user: Set k = k+1
and continue steps (ii) - (iv) for the newly selected user.
(vi) Termination: If k > K, stop the iterations.
At each iteration, the problem P3 needs to be solved. Since
most of the convex optimization toolboxes (e.g., CVX) use the
interior-point algorithm [32] as a basic solution platform, con-
sidering the worst-case scenario as in [30], the computational
complexity of a SDR problem P3 can be expressed as
O(max{ξ, κ}4
κ(1/2)
log(1/ )) (28)
where κ and ξ describe the problem size (i.e., number of
PSD matrices) and the number of constraints involved in the
optimization problem P3, respectively. is the given accuracy
of the solution defined by the solver. Let tT denote the total
number of iterations taken by the iterative algorithm to produce
a feasible solution for total K SU pairs. Then, the overall
complexity to find beamforming and power vectors for a given
channel allocation can be derived as
O(max{ξ, κ}4
κ(1/2)
log(1/ )) × tT (29)
Let ˜W = [ ˜W1 . . . ˜WK] and ˜ϕ = [ ˜ϕ1, . . . , ˜ϕK]T
be the
feasible solutions of the problem P3. Then, ˜W is optimal if
and only if the rank of each Wk, ∀k ∈ S, is equal to one, i.e.,
rank(Wk) = 1. If such condition is not satisfied, appropriate
rank one approximation methods, e.g., eigen-decomposition
method [30], can be deployed to get the final solution of
˜W. By using eigen-decomposition method, each beamforming
matrix Wk can be equivalently represented as
Wk =
J
j=1
λkjckjc†
kj (30)
where λkj and ckj denote the jth eigenvalue and the cor-
responding eigenvector of the kth beamforming matrix Wk,
respectively. If Wk is a rank one matrix, then there exists
exactly one non-zero eigenvalue, say λkJ . As a result, using
(30), the kth user beamforming matrix Wk can be written as
Wk = λkJ ckJ c†
kJ = ( λkJ ckJ )( λkJ ckJ )†
(31)
= wkw†
k
Thus, the beamforming vector for the SU-TXk is,
wk = λkJ ckJ (32)
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
6
B. Suboptimal channel allocation
In the previous section, we have determined the optimal
power and beamforming vectors for a known channel allo-
cation. In order to find the optimal channel allocation, an
exhaustive searching algorithm can be used, which needs to
compute beamforming vectors, power allocations and sum-
rates for all possible channel allocations. With N PU channels
and K SU pairs, the searching space size of the exhaustive
searching algorithm is (N + 1)K
, which increases exponen-
tially with K. Obviously, this searching method is practically
infeasible. Hence, for practical applications, we propose two
channel allocation algorithms based on genetic algorithm (GA)
[24] and simulated annealing (SA) [33], [34] algorithm to find
suboptimal channel allocations.
1) Genetic Algorithm (GA): GA is a searching algorithm,
which can be applied to find out near optimal solution to an
optimization problem without the knowledge of the objective
function’s derivatives or any gradient related information. The
key idea of GA is to first select a set of feasible values for the
decision variables and then design new solutions based on the
previous set to improve the objective function [35]. Different
from standard GA, in this thesis, we define a K×N matrix as a
chromosome instead of a single string chromosome as in [24],
where the kth row and nth column entry of the chromosome
indicates whether the nth channel is allocated to the kth SU-
TX or not. In fact, a chromosome describes one realization of
channel allocation. An example of a chromosome for two PU
channels and four SU-TXs can be written as
Chromosome =




1 0
0 1
0 1
1 0



 (33)
Define Φ as the search space, which includes all possible
channel allocations, and has a size of (N + 1)K
. Define the
size of each generation as ν. Let ρ (0 < ρ < ν) and Gmax
denote the number of best chromosomes being selected and
the maximum number of generations, respectively. The details
of GA is as follows.
Initially, ν chromosomes are randomly selected from Φ,
called the initial generation, Φ(0)
. We define R(i)
(W, ϕ), the
sum-rate achieved for chromosome i, as the fitness function
for GA. Then, the chromosomes in Φ(0)
can be ordered with
the descending order of their sum-rates. From the sorted chro-
mosome list (G
(g)
sorted), the first ρ chromosomes are selected
and put into the set G
(g)
best, while the last ρ chromosomes are
removed and inserted into the set G
(g)
worst at the gth generation.
The set of remaining chromosomes, G
(g)
luckies, is named as
luckies.
Next, a new generation of chromosomes is formed. The
new generation consists of the set G
(g)
best and ν − ρ new
chromosomes generated from the two sets G
(g)
best and G
(g)
luckies,
through Children Generation Process (CGP). CGP consists of
two major operations called Mutation and Cross-over. The
details are explained as follows.
• At first, two chromosomes, P1 and P2, are randomly
selected from the two sets G
(g)
best and G
(g)
luckies, respectively.
Algorithm 1 : GA-based channel allocation algorithm
1: Initialization: Given K, N, Φ, ν, ρ and Gmax
2: Start : randomly pick ν channel realizations from Φ to
define the initial generation Φ(0)
, Φ(0)
⊂ Φ
3: Fitness : find R(i)
(W, ϕ) ∈ R(0)
for each chromosome i
within the set Φ(0)
4: Set g = 0,
5: while g < Gmax do
6: if g = 0 then
7: G(0)
= Φ(0)
, the set of corresponding rates are R(0)
8: else
9: Fitness : find R(g)
← R(i)
(W, ϕ), ∀chromosome i ∈
G(g)
10: end if
11: [R
(g)
sorted, G
(g)
sorted] ←sort(R(g)
, G(g)
,‘Descending’)
12: [R
(g)
best, G
(g)
best] ←select(R
(g)
sorted, G
(g)
sorted,,‘Best’)
13: [R
(g)
worst, G
(g)
worst] ←select(R
(g)
sorted, G
(g)
sorted,,‘Worst’)
14: [R
(g)
luckies] ← (R
(g)
best − R
(g)
worst)
15: [G
(g)
luckies] ← (G
(g)
best − G
(g)
worst)
16: for c = 1 : (ν − ρ) do
17: P1 ← select(G
(g)
best, 1,’Random’)
18: P2 ← select(G
(g)
luckies, 1,’Random’)
19: [TempCH1, TempCH2] ← Crossover(P1, P2)
20: [CH1, CH2] ← Mutation(TempCH1, TempCH2)
21: [G
(g)
child] ← [CH1, CH2]
22: end for
23: G(g+1)
← {G
(g)
best + G
(g)
child}
24: g ← g + 1
25: end while
26: Output: Optimal channel allocation (or chromosome),
optimal beamforming matrices, W
P1 and P2 are called parents.
• Next, the cross-over operation is initiated between the
two selected parents to generate two new children,
called TempCH1 and TempCH2. Here, we use the
Single Point Cross-over technique [36] as an example.
Specifically, entries of a randomly selected column of the
two parents will be swapped to perform the single point
cross-over. Note that swapping may produce infeasible
chromosomes such as multiple channel allocation to a
single user. In this case, except the swapped column,
we keep the parent columns unchanged and let only
the troublesome entries of the swapped column of both
children to be zero to ensure that channel allocation
constraint (13) is always satisfied.
• At the end, two randomly selected entries, xn1
k , xn2
k , of
an arbitrary selected kth row will be swapped, called
mutation. Note that, when selecting those two entries,
either of them should have a value of one. The importance
of mutation is to avoid GA converging to a local optimal
value.
The termination condition for GA will be activated when
the number of generations produced is beyond the predefined
value Gmax. Eventually, the chromosome in the last genera-
tion, which has the maximum fitness, will be the best solution.
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
7
Furthermore, the corresponding fitness value will be the near
optimal sum-rate.
At each iteration, the complexity of GA results from three
major operations, i.e., sorting, mutation and cross-over, which
introduce complexity of O(ν log(ν)), O(K) and O(K), re-
spectively. Beside the first generation, (ν − ρ) fitness values
have to be determined at each generation. Thus, the overall
complexity of GA can be computed as
Gmax × O(nlog(n)) + (ν − ρ)/2 (O(K))
+ (ν − ρ) × tT × O(max{ξ, κ}4
κ(1/2)
log(1/ )) (34)
The implementation steps of the GA is summarized in
Algorithm 1. We call the proposed beamforming, power, and
channel allocation with GA as BPCA-GA.
2) Simulated Annealing (SA)-based algorithm: From (34),
the complexity of GA mainly depends on the values of ν and
ρ. Since these two parameters also decide the accuracy and the
convergence of GA, sufficiently large values of ν and ρ have to
be set, which causes high computational complexity for GA.
In order to further reduce the complexity, a new allocation
algorithm based on SA [33] is introduced.
Let Φ = {X1, . . . , XL} denote the feasible set of all chan-
nel allocations available with K SU pairs and N PU channels,
where a K×N matrix Xl, l = 1, . . . , L = (N+1)K
, indicates
a certain channel allocation with binary entries and a row sum,
i.e.,
N
n=1 xn
k ≤ 1. Then, the optimization problem for X can
be equivalently expressed as
X = arg max
Xl∈Φ
R(Xl) (35)
where R(Xl) indicates the sum-rate associated with Xl. The
SA-based algorithm uses neighborhood searching to determine
a suboptimal solution. Specifically, the SA-based algorithm
starts with a control parameter and an initial channel allocation
that is used to generate new neighbor channel allocation.
Then, the new channel allocation is clearly selected if it
shows any performance improvement. Otherwise, it may still
be accepted with a certain probability, which allows SA-
based algorithm to escape from local optimal configurations.
The cooling schedule manages the control parameter during
the optimization process. The details of the algorithm is as
follows.
At the initial state, we set the iteration index l = 0 and
randomly pick a channel allocation, X0, from Φ. Using X0, a
new neighbor channel allocation, i.e., ˆX0 ∈ Φ, is formed by
swapping randomly selected row of X0 with an entry in A,
which denotes the set of all feasible combinations of channel
allocation to a single user. Given X0 and ˆX0, we compute the
corresponding sum-rates, which are denoted as R(X0) and
R( ˆX0), respectively. The acceptance rule at the lth iteration
can be formulated as
P{Accept ˆXl} =



1, if R( ˆXl) ≥ R(X0)
exp
∆R
Tl
, if R( ˆXl) < R(X0),
(36)
Algorithm 2 : SA-based channel allocation algorithm
1: Initialization: Given K, N, Φ, cooling-rate and Smax
2: Set l = 0,
3: Start : Initial channel allocation X0, X0 ⊂ Φ and compute
R(X0)
4: while l < Smax do
5: Generate new channel allocation, ˆXl from X0, ˆXl ⊂ Φ
6: Calculate sum-rate, R( ˆXl)
7: ∆R := R( ˆXl) − R(X0)
8: if l = 0 then
9: Compute T0
10: end if
11: if ∆R ≥ 0 then
12: X0 ← ˆXl and R(X0) ← R( ˆXl)
13: else if exp
∆R
Tl
> random [0, 1] then
14: X0 ← ˆXl and R(X0) ← R( ˆXl)
15: end if
16: Update Tl+1 = cooling-rate ∗ Tl
17: l ← l + 1
18: end while
19: Output: suboptimal channel allocation and suboptimal
beamforming matrices, i.e., X0 and W
where ∆R = R( ˆXl) − R(X0). It implies that a candidate
neighbor channel allocation, i.e., ˆXl, is accepted with the
probability of one if its sum-rate is greater than that of the
current channel allocation, or exp
∆R
Tl
if the new neighbor
channel allocation has a smaller achievable sum-rate than the
current allocation. If accepted, we replace X0 by ˆXl, and
update the value of the control parameter for the next iteration
as Tl+1 = cooling-rate∗Tl, where cooling-rate takes a value in
[0.50; 0.99] [37]. Note that T0 can be determined by following
the similar way as in [38]. We increase l by one and repeat
the aforementioned process. When the maximum number of
allowable iterations is reached, the algorithm is terminated and
the resulting outputs give the suboptimal channel allocation,
sum-rate and the beamforming vectors.
The SA-based algorithm has two major steps, i.e., the
generation of a neighbor channel allocation and the deter-
mination of sum-rate. A new neighbor channel allocation
can be generated from the current channel allocation with
a complexity of O(N), and a sum-rate calculation process
involves a complexity of O(max{ξ, κ}4
κ(1/2)
log(1/ )) × tT
as in (29). If Smax is the maximum number of iterations for
convergence, the complexity of the algorithm can be computed
as
Smax × {O(N) + O(max{ξ, κ}4
κ(1/2)
log(1/ )) × tT } (37)
Compared with (34), the computational complexity of SA-
based algorithm is much smaller than the GA. The SA-based
algorithm is summarized as in Algorithm 2. In this paper, we
call the proposed beamforming, power, and channel allocation
with SA-based algorithm as BPCA-SA.
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
8
IV. SIMULATION RESULTS
In this section, the performance of both BPCA-GA and
BPCA-SA algorithms is evaluated by using computer simu-
lations.
A. Simulation environment
Consider a CRN with three PU-TX/PU-RX pairs (i.e.,
N = 3). The locations of the PU-TXs are given by the x-y
plane coordinates (300, 0), (−400, 0) and (0, −100), and their
associated PU-RXs are situated at (600, 0), (−400, 300) and
(0, −400), respectively, where all the distances are measured
in meters. There are six SU-TX/SU-RX pairs (i.e., K = 6)
randomly located within a square area of 600m × 600m.
For each SU-TX, its associated SU-RX is randomly located
in a circle centered at the SU-TX with a radius of 100m.
Each SU-TX with J = 3 antennas is oriented in a UCA
configuration having a radius of λ =
c
fc
, where the carrier
frequency fc = 900MHz and the speed of light c = 3 ×
108
m/s. The transmit power budget, Pmax = 30dBm and
Qn = 23dBm, ∀n ∈ P. Furthermore, each PU-RX has an
interference threshold, In
th, ∀n ∈ P, of −40dBm and each
SU-RX’s minimum QoS threshold, Γk, ∀k ∈ S, is 6dB. The
noise power at any location is considered as −90dBm and the
bandwidth of each channel, B, is set as 10MHz. The small-
scale fading coefficients are modeled as a Circular Symmetric
Complex Gaussian (CSCG) random variables with zero mean
and unit variance. We consider the free space propagation
model to simulate the path-loss, i.e., PL = λ
4πd
2
, where
d is the distance between the transmitter and the receiver.
Normally, the generation size ν in GA should be neither too
small nor too large. A small generation size tends to end up
with a local optimal value, while a large generation size leads
to a high computational complexity though it may be closer
to the optimal value. Hence, in order to balance this tradeoff,
we use the size of the searching space (i.e., Φ = (N +1)K
) in
determining ν, and set ν as the ceiling integer of (N + 1)K.
Accordingly, we let ρ be the ceiling integer of
√
ν. The
stopping criteria for SA algorithm is based on the maximum
number of iterations Smax. We define Smax as the number of
iterations after which a given minimum temperature level, i.e.,
Tlast = 0.3×T0 can be reached. Thus, Smax can be calculated
based on the equation Tlast = (cooling-rate)Smax
× T0,
where the cooling-rate is a constant of 0.99. Note that some
parameters may vary according to evaluation scenarios.
B. Convergence of BPCA-GA and BPCA-SA algorithms
Fig. 2 shows the convergence of the two proposed algo-
rithms, i.e., BPCA-GA and BPCA-SA. The optimal sum-
rate, 42.1765 bits/Hz, is determined by adopting the exhaus-
tive searching method. From the figure, we can see that
BPCA-GA approaches a close-to-optimal sum-rate value of
41.9634 bits/Hz. BPCA-SA can find a suboptimal channel
allocation with a sum-rate value of 41.0557 bits/Hz which
is only 2.16% worse than BPCA-GA. By considering the
computational complexity, we can conclude that BPCA-SA
is more feasible for practical applications. Note that, though
10 20 30 40 50 60 70 80 90 100 110 120 130 140 150
20
25
30
35
40
45
Iterations (Generations)
Sum−rate(bits/Hz)
Optimal sum−rate
BPCA−GA
BPCA−SA
Fig. 2. Convergence of the BPCA-GA and BPCA-SA algorithms with K =
4, N = 3, Pmax = 1W, J = 3.
TABLE II
AVERAGED COMPUTATION TIMES OF DIFFERENT SCHEMES.
Scenario BPCA-SA (s) BPCA-GA (s)
K = 3, N = 2 293.65 688.04
K = 3, N = 3 334.69 1518.50
K = 3, N = 4 548.08 3660.75
BPCA-GA converges much faster than BPCA-SA in terms of
the number of iterations, each iteration takes more time in
BPCA-GA than BPCA-SA because of the high computational
complexity involved in GA. As a proof for such fact, Table II
illustrates the numerical values of the average computation
times taken by the two proposed schemes with respect to
different configurations (i.e., the number of SU-pairs (K) and
channels (N)). From this table, we can clearly observe that
the computation time of BPCA-SA algorithm is always shorter
than that of the BPCA-GA, which proves that the BPCA-SA
has lower computational complexity than the BPCA-GA. In
addition, such superiority becomes more obvious for larger
values of K and N.
C. The achievable sum-rate with increased number of SU
pairs and PU channels
Fig. 3 illustrates a comparison of the achievable sum-rate
by the BPCA-GA and BPCA-SA algorithms. From the figure,
we can see that when the number of SU pairs is small, e.g.,
K = 2, both algorithms show similar performance. This is
because the search space is small in this case so that both GA
and SA-based algorithms have an equal chance to obtain a
close-to-optimal value. However, as the number of SU pairs
increases, the BPCA-GA outperforms BPCA-SA.
Fig. 4 depicts the performance of BPCA-GA and BPCA-SA
with the number of PU channels. From the figure, a similar
observation as in Fig.3 can be obtained. As N increases,
achievable sum-rate of both algorithms tend to increase due to
the increased degrees of freedom on channel allocation. For
most of the cases, BPCA-SA is lagged behind BPCA-GA with
a small performance gap. By comparing Figs 3 and 4, we can
further observe that the number of SU pairs has more effects
on the performance than the number of PU channels.
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
9
2 3 4 5 6
0
10
20
30
40
50
60
Number of SU pairs (K)
Sumrate(bits/Hz)
BPCA−GA
BPCA−SA
Fig. 3. Optimal sum-rate with an increased number of SU pairs for N = 3
PU channels, Pmax = 1W and J = 3.
1 2 3 4 5
10
15
20
25
30
35
40
Number of PU channels (N)
Sumrate(bits/Hz)
BPCA−GA
BPCA−SA
Fig. 4. Optimal sum-rate with an increased number of PU channels for
K = 3 SU pairs, Pmax = 1W and J = 3.
D. Comparison with Zero-Forcing Beamforming (ZFBF)
We compare the proposed beamforming method with the
traditional ZFBF scenario where the beamforming vectors
for each SU-TX is determined by confining the interference
among the SUs to become zero. We call the secondary
user zero-forcing beamforming, power and channel allocation
with GA and SA-based algorithm as ZFBPCA-GAS and
ZFBPCA-SAS, respectively.
Fig. 5 shows that our proposed model outperforms the ZFBF
scenario irrespective to the channel allocation algorithms.
It is because the degrees of freedom available on channel
allocation in our proposed system model are much greater
than those in the ZFBF model. Moreover, after K > 3, the
curve for ZFBPCA-GAS increases gradually while that for
ZFBPCA-SAS decreases. It is because once K reached the
maximum number of channels (i.e., N = 3 in our simulation),
it is very difficult to find the beamforming vectors with ZFBF
due to the increased channel access requirement of the SUs.
Furthermore, after K > 3, the ZFBPCA-SAS tends to gener-
ate more infeasible channel allocation, and hence eventually
converges to a value which is away from the optimal. The
2 3 4 5 6
0
10
20
30
40
50
60
Number of SU pairs (K)
Sumrate(bps/Hz)
BPCA−GA
BPCA−SA
ZFBPCA−GAs
ZFBPCA−SAs
Fig. 5. Comparison of sum-rate between SU ZFBF and proposed system
models with an increased number of SU pairs for N = 3 PU channels,
Pmax = 1W and J = 3.
2 3 4
10
15
20
25
30
35
40
45
Number of Antennas (J)
Sumrate(bps/Hz)
BFCA−GA
BFCA−SA
ZFBFCA−GAs
ZFBFCA−SAs
Fig. 6. Comparison of sum-rate between SU ZFBF and proposed system
models with an increased number of antennas with N = 2 PU channels,
K = 4 SU pairs and Pmax = 1W.
performance of achievable sum-rate with respect to the number
of transmit antennas is shown in Fig. 6. The figure depicts that
the sum-rates are increased with the number of antennas. It is
because once J increases, the transmitter can direct the signal
with better intensity to the intended receiver and at the same
time further suppress the interference to the other users who
are using the same channel.
We further compare the proposed beamforming method
with another ZFBF scenario with respect to the number of
SU pairs and the number of antennas, as shown in Figs. 7
and 8, respectively. The beamforming vectors in this ZFBF
scenario are determined by eliminating the interference at
each PU-Rx. We call the GA and SA-based algorithms as-
sociated with primary user zero-forcing beamforming, power
and channel allocation as ZFBPCA-GAP and ZFBPCA-SAP,
respectively. Compared to Figs. 5 and 6, similar observations
can be obtained. It is obvious that our proposed algorithm can
outperform the primary user ZFBF scenario regardless of the
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
10
2 3 4 5 6
0
10
20
30
40
50
60
Number of SU pairs (K)
Sumrate(bps/Hz)
BPCA−GA
BPCA−SA
ZFBPCA−GAp
ZFBPCA−SAp
Fig. 7. Comparison of sum-rate between PU ZFBF and proposed system
models with an increased number of SU pairs for N = 3 PU channels,
Pmax = 1W and J = 3.
2 3 4
10
15
20
25
30
35
40
45
Number of Antennas (J)
Sumrate(bps/Hz)
BFCA−GA
BFCA−SA
ZFBFCA−GAp
ZFBFCA−SAp
Fig. 8. Comparison of sum-rate between PU ZFBF and proposed system
models with an increased number of antennas with N = 2 PU channels,
K = 4 SU pairs and Pmax = 1W.
channel allocation algorithms.
E. The performance of BPCA-GA and BPCA-SA with different
power budget
Fig. 9 illustrates the performance of sum-rates by varying
power budget, Pmax. As we increase the power budget, the
achievable sum-rate also increases as shown in the figure. In
fact, the sum-rate performance gap between the BPCA-GA
and BPCA-SA is small and keeps approximately unchanged
as we increase Pmax. It is mainly because the convergence
properties of both algorithms do not change with the power.
With the increased power budget, the SUs are favored to have
more individual power allocation. Hence, they are rewarded
with more power as long as the interference constrains are
satisfied, which in return increases the sum-rate.
V. CONCLUSION
In this paper, a problem of joint beamforming, power and
channel allocation is considered for multi-user multi-channel
0.6 0.8 1 1.2
25
30
35
40
Power (W)
Sumrate(bits/Hz)
BPCA−GA
BPCA−SA
Fig. 9. Comparison of sum-rate variation for BPCA-GA and BPCA-SA with
total power budget available for fixed N = 2 PU channels, K = 4 SU pairs
and J = 3 antennas.
underlay cognitive radio networks. The problem is formulated
as a non-convex MINLP problem, which is NP-hard. In order
to reduce the computational complexity, we decouple the origi-
nal problem into two sub-problems. At first, a feasible solution
for beamforming vectors and power allocation is obtained for
a known channel allocation by an iterative algorithm, which
uses the SDR approach with an auxiliary variable. After that,
GA and SA-based algorithms have been applied to determine
suboptimal channel allocations. Simulation results show that
BPCA-GA can obtain close-to-optimal solution with a price
of high computation complexity. Whereas, BPCA-SA can sig-
nificantly reduce the computational complexity with marginal
performance degradation compared to BPCA-GA. Moreover,
beamforming with interference tolerance capability introduced
by our system model can achieve better performance than
traditional ZFBF.
REFERENCES
[1] “Spectrum policy task force, spectrum policy task force report,” Federal
Communications Commission ET, 2002.
[2] S. Haykin, “Cognitive radio: brain-empowered wireless communication-
s,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220, Feb. 2005.
[3] R. Qiu, Z. Hu, H. Li, and M. Wicks, Cognitive Radio Communication
and Networking: Principles and Practice. Wiley, 2012.
[4] C. Yi and J. Cai, “Two-stage spectrum sharing with combinatorial
auction and stackelberg game in recall-based cognitive radio networks,”
IEEE Trans. Commun., vol. 62, no. 11, pp. 3740–3752, Nov. 2014.
[5] C. Yi and J. Cai, “Multi-item spectrum auction for recall-based cognitive
radio networks with multiple heterogeneous secondary users,” IEEE
Trans. Veh. Technol., vol. 64, no. 2, pp. 781–792, Feb. 2015.
[6] B. Van Veen and K. Buckley, “Beamforming: a versatile approach to
spatial filtering,” IEEE ASSP Mag., vol. 5, no. 2, pp. 4–24, Apr. 1988.
[7] S. Yiu, M. Vu, and V. Tarokh, “Interference reduction by beamforming
in cognitive networks,” in Proc. IEEE Globecom, Nov. 2008, pp. 1–6.
[8] R. Xie, F. Yu, and H. Ji, “Joint power allocation and beamforming
with users selection for cognitive radio networks via discrete stochastic
optimization,” in Proc. IEEE Globecom, Dec. 2011, pp. 1–5.
[9] B. Zayen, A. Hayar, and G. Oien, “Resource allocation for cognitive
radio networks with a beamforming user selection strategy,” in Signals,
Syst. and Comput., Conf. Rec. of the Forty-Third Asilomar, Nov. 2009,
pp. 544–549.
[10] O. Abdulghfoor, M. Ismail, and R. Nordin, “Power allocation via
interference compensation in underlay cognitive radio networks: A game
theoretic perspective,” in Int.l Symp. Telecommun. Tech. (ISTT), Nov
2012, pp. 296–301.
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457
0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology
11
[11] K. W. Sung, M. Tercero, and J. Zander, “Aggregate interference in
secondary access with interference protection,” IEEE Commun. Lett.,
vol. 15, no. 6, pp. 629–631, Jun. 2011.
[12] Y. Wen, S. Loyka, and A. Yongacoglu, “Asymptotic analysis of interfer-
ence in cognitive radio networks,” IEEE J. Sel. Areas Commun., vol. 30,
no. 10, pp. 2040–2052, Nov. 2012.
[13] C. Jiang and L. Cimini, “Downlink energy-efficient multiuser beam-
forming with individual sinr constraints,” in Proc. Milcom, Nov. 2011,
pp. 495–500.
[14] Y.-L. Liu, M.-L. Ku, and L.-C. Wang, “Joint beamforming, scheduling,
and power allocation for hierarchical cellular systems,” in Proc. IEEE
ICC, Jun. 2012, pp. 1773–1778.
[15] M.-L. Ku, L.-C. Wang, and Y.-T. Su, “Toward optimal multiuser antenna
beamforming for hierarchical cognitive radio systems,” IEEE Trans.
Commun., vol. 60, no. 10, pp. 2872–2885, Oct. 2012.
[16] E. Gharavol, Y.-C. Liang, and K. Mouthaan, “Robust downlink beam-
forming in multiuser miso cognitive radio networks with imperfect
channel-state information,” IEEE Trans. Veh. Technol., vol. 59, no. 6,
pp. 2852–2860, Jul. 2010.
[17] S.-H. Moon, C. Lee, S.-R. Lee, and I. Lee, “Joint user scheduling and
adaptive intercell interference cancelation for miso downlink cellular
systems,” IEEE Trans. Veh. Technol., vol. 62, no. 1, pp. 172–181, Jan.
2013.
[18] K. Hamdi, W. Zhang, and K. Letaief, “Joint beamforming and scheduling
in cognitive radio networks,” in Proc. IEEE Globecom, Nov. 2007, pp.
2977–2981.
[19] K. Cumanan, R. Krishna, L. Musavian, and S. Lambotharan, “Joint
beamforming and user maximization techniques for cognitive radio
networks based on branch and bound method,” IEEE Trans. Wireless
Commun., vol. 9, no. 10, pp. 3082–3092, Oct. 2010.
[20] C. Pitz, E. Ortiz Batista, and R. Seara, “On the joint beamforming and
power control in cellular systems: Algorithm and stochastic model,”
IEEE Trans. Wireless Commun., vol. 13, no. 12, pp. 6943–6954, Dec.
2014.
[21] C.-C. Chien, H.-J. Su, and H.-J. Li, “Joint beamforming and power
allocation for MIMO relay broadcast channel with individual SINR
constraints,” IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1660–1677,
May 2014.
[22] P. Cheng, L. Deng, H. Yu, Y. Xu, and H. Wang, “Resource allocation
for cognitive networks with d2d communication: An evolutionary ap-
proach,” in Proc. IEEE WCNC, Apr. 2012, pp. 2671–2676.
[23] A. Ghazanfari, A. Tolli, and H. Pennanen, “Sum power minimization
for cellular systems with underlay d2d communications,” in Proc.
CROWNCOM, Jun. 2014, pp. 45–50.
[24] K. Illanko, K. Raahemifar, and A. Anpalagan, “Sub-channel and power
allocation for multiuser OFDM with rate constraints using genetic
algorithm,” in Proc. IEEE PacRim, Aug. 2009, pp. 571–575.
[25] B. Ye, M. Nekovee, A. Pervez, and M. Ghavami, “TV white space
channel allocation with simulated annealing as meta algorithm,” in Proc.
CROWNCOM, Jun. 2012, pp. 175–179.
[26] N. Noordin, V. Zuniga, A. El-Rayis, N. Haridas, A. Erdogan, and
T. Arslan, “Uniform circular arrays for phased array antenna,” in
Antennas and Propagation Conf. (LAPC), Nov. 2011, pp. 1–4.
[27] B. H. Wang, H. T. Hui, and M.-S. Leong, “Decoupled 2d direction of ar-
rival estimation using compact uniform circular arrays in the presence of
elevation-dependent mutual coupling,” IEEE Trans. Antennas Propag.,
vol. 58, no. 3, pp. 747–755, Mar. 2010.
[28] Y. Tachwali, B. Lo, I. Akyildiz, and R. Agusti, “Multiuser resource
allocation optimization using bandwidth-power product in cognitive
radio networks,” IEEE J. Sel. Areas Commun., vol. 31, no. 3, pp. 451–
463, Mar. 2013.
[29] L. Vandenberghe and S. Boyd, “Semidefinite programming,” SIAM
Review, vol. 38, no. 1, pp. 49–95, 1996.
[30] Z.-Q. Luo, W.-K. Ma, A.-C. So, Y. Ye, and S. Zhang, “Semidefinite
relaxation of quadratic optimization problems,” IEEE Signal Processing
Mag., vol. 27, no. 3, pp. 20–34, May 2010.
[31] I. CVX Research, “CVX: Matlab software for disciplined convex
programming, version 2.0,” http://cvxr.com/cvx, Aug. 2012.
[32] S. Boyd and L. Vandenberghe. Cambridge University Press, 2004.
[33] P. van Laarhoven and E. Aarts, Simulated Annealing: Theory and Appli-
cations, ser. Ellis Horwood series in mathematics and its applications.
Springer, 1987.
[34] S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, “Optimization by
simulated annealing,” Science, vol. 220, no. 4598, pp. 671–680, 1983.
[35] S. Chantaraskul and K. Moessner, “Implementation of a genetic algo-
rithm based decision making framework for opportunistic radio,” IET
Commun., vol. 4, no. 5, pp. 495–506, Mar. 2010.
[36] G. K. Soon, T. T. Guan, C. K. On, R. Alfred, and P. Anthony, “A
comparison on the performance of crossover techniques in video game,”
in Proc. IEEE ICCSCE, Nov. 2013, pp. 493–498.
[37] A. J. Monticelli, R. Romero, and E. N. Asada, Fundamentals of
Simulated Annealing. John Wiley and Sons, Inc., 2007.
[38] D. Thompson and G. Bilbro, “Sample-sort simulated annealing,” IEEE
Trans. Syst. Man Cybern. B, Cybern., vol. 35, no. 3, pp. 625–632, Jun.
2005.
Suren Dadallage received the B.Sc. degree in Elec-
tronics and Telecommunication Engineering from
University of Moratuwa, Sri Lanka, in 2010, and
M.Sc. degree in Electrical and Computer Engineer-
ing from University of Manitoba, Winnipeg, MB,
Canada, in 2015. His research interests include
beamforming algorithms and radio resource manage-
ment for cognitive radio networks.
Changyan Yi received the B.Sc. degree from Guilin
University of Electronic Technology, China, in 2012,
and M.Sc. degree from University of Manitoba, Win-
nipeg, MB, Canada, in 2014. He is currently working
toward the Ph.D. degree in electrical and computer
engineering, University of Manitoba. He was award-
ed Edward R. Toporeck Graduate Fellowship in En-
gineering in 2014, and University of Manitoba Grad-
uate Fellowship (UMGF) in 2015-2018. His research
interests include algorithmic game, optimization and
queueing theories for radio resource management,
prioritized scheduling and network economics in wireless communications.
Jun Cai (M’04, SM’14) received the B.Sc. and
M.Sc. degrees from Xi’an Jiaotong University, X-
i’an, China, in 1996 and 1999, respectively, and the
Ph.D. degree from the University of Waterloo, ON,
Canada, in 2004, all in electrical engineering. From
June 2004 to April 2006, he was with McMaster
University, Hamilton, ON, as a Natural Sciences and
Engineering Research Council of Canada Postdoc-
toral Fellow. Since July 2006, he has been with the
Department of Electrical and Computer Engineering,
University of Manitoba, Winnipeg, MB, Canada,
where he is currently an Associate Professor. His current research inter-
ests include energy-efficient and green communications, dynamic spectrum
management and cognitive radio, radio resource management in wireless
communications networks, and performance analysis. Dr. Cai served as the
Technical Program Committee Co-Chair for the IEEE Vehicular Technology
Conference 2012 Fall Wireless Applications and Services Track, the IEEE
Global Communications Conference (Globecom) 2010 Wireless Communi-
cations Symposium, and International Wireless Communications and Mobile
Computing (IWCMC) Conference 2008 General Symposium; the Publicity
Co-Chair for IWCMC in 2010, 2011, 2013, and 2014; and the Registration
Chair for the First International Conference on Heterogeneous Networking for
Quality, Reliability, Security and Robustness (QShine) in 2005. He also served
on the editorial board of the Journal of Computer Systems, Networks, and
Communications and as a Guest Editor of the special issue of the Association
for Computing Machinery Mobile Networks and Applications. He received
the Best Paper Award from Chinacom in 2013, the Rh Award for outstanding
contributions to research in applied sciences in 2012 from the University of
Manitoba, and the Outstanding Service Award from IEEE Globecom in 2010.
For More Details Contact G.Venkat Rao
PVR TECHNOLOGIES 8143271457

More Related Content

What's hot

Performance evaluation of route selection schemes over a clustered cognitive ...
Performance evaluation of route selection schemes over a clustered cognitive ...Performance evaluation of route selection schemes over a clustered cognitive ...
Performance evaluation of route selection schemes over a clustered cognitive ...
Conference Papers
 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
IJECEIAES
 
I010614347
I010614347I010614347
I010614347
IOSR Journals
 
A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks
IJECEIAES
 
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...
IJSRED
 
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
IJECEIAES
 
L0333057062
L0333057062L0333057062
L0333057062
theijes
 
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Kumar Goud
 
Lte
LteLte
Lte
vipin_v
 
Energy conservation in wireless communication systems with relays
Energy conservation in wireless communication systems with relaysEnergy conservation in wireless communication systems with relays
Energy conservation in wireless communication systems with relays
Aniruddha Chandra
 
LARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETS
LARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETSLARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETS
LARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETS
csandit
 
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
IJCNCJournal
 
Energy efficient wireless technology
Energy efficient wireless technologyEnergy efficient wireless technology
Energy efficient wireless technology
Eisha Madhwal
 
GPS Enabled Energy Efficient Routing for Manet
GPS Enabled Energy Efficient Routing for ManetGPS Enabled Energy Efficient Routing for Manet
GPS Enabled Energy Efficient Routing for Manet
CSCJournals
 
13_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-293813_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-2938
Vennila Raja
 
Energy Efficient Wireless Communications
Energy Efficient Wireless CommunicationsEnergy Efficient Wireless Communications
Energy Efficient Wireless Communications
Jingon Joung
 
Enhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems usingEnhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems using
eSAT Publishing House
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
eSAT Publishing House
 

What's hot (18)

Performance evaluation of route selection schemes over a clustered cognitive ...
Performance evaluation of route selection schemes over a clustered cognitive ...Performance evaluation of route selection schemes over a clustered cognitive ...
Performance evaluation of route selection schemes over a clustered cognitive ...
 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
 
I010614347
I010614347I010614347
I010614347
 
A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks
 
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...
 
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
 
L0333057062
L0333057062L0333057062
L0333057062
 
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
 
Lte
LteLte
Lte
 
Energy conservation in wireless communication systems with relays
Energy conservation in wireless communication systems with relaysEnergy conservation in wireless communication systems with relays
Energy conservation in wireless communication systems with relays
 
LARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETS
LARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETSLARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETS
LARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETS
 
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
 
Energy efficient wireless technology
Energy efficient wireless technologyEnergy efficient wireless technology
Energy efficient wireless technology
 
GPS Enabled Energy Efficient Routing for Manet
GPS Enabled Energy Efficient Routing for ManetGPS Enabled Energy Efficient Routing for Manet
GPS Enabled Energy Efficient Routing for Manet
 
13_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-293813_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-2938
 
Energy Efficient Wireless Communications
Energy Efficient Wireless CommunicationsEnergy Efficient Wireless Communications
Energy Efficient Wireless Communications
 
Enhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems usingEnhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems using
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 

Similar to Joint beamforming, power and channel allocation in multi user and multi-channel underlay miso cognitive radio networks

Block diagonalization precoding and power allocation for clustering small-cel...
Block diagonalization precoding and power allocation for clustering small-cel...Block diagonalization precoding and power allocation for clustering small-cel...
Block diagonalization precoding and power allocation for clustering small-cel...
journalBEEI
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
acijjournal
 
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
IJECEIAES
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
ranjith kumar
 
Wireless Powered Communications: Performance Analysis and Optimization
Wireless Powered Communications: Performance Analysis and OptimizationWireless Powered Communications: Performance Analysis and Optimization
Wireless Powered Communications: Performance Analysis and Optimization
dtvt2006
 
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...Best sum-throughput evaluation of cooperative downlink transmission nonorthog...
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...
IJECEIAES
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
eSAT Journals
 
Promoting fractional frequency reuse performance for combating pilot contami...
Promoting fractional frequency reuse performance for  combating pilot contami...Promoting fractional frequency reuse performance for  combating pilot contami...
Promoting fractional frequency reuse performance for combating pilot contami...
IJECEIAES
 
Joint Interference Coordination and Spatial Resource Reuse
Joint Interference Coordination and Spatial Resource ReuseJoint Interference Coordination and Spatial Resource Reuse
Joint Interference Coordination and Spatial Resource Reuse
IJMTST Journal
 
Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...
ijwmn
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
IJERA Editor
 
An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...
IJECEIAES
 
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...
ijwmn
 
QoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksQoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networks
journalBEEI
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ijasuc
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ijasuc
 
Flexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmFlexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithm
ijsrd.com
 
Modelling and QoS-Achieving Solution in full-duplex Cellular Systems
Modelling and QoS-Achieving Solution in full-duplex Cellular SystemsModelling and QoS-Achieving Solution in full-duplex Cellular Systems
Modelling and QoS-Achieving Solution in full-duplex Cellular Systems
IJCNCJournal
 
Downlink massive full dimension-multiple input multiple output downlink beam...
Downlink massive full dimension-multiple input multiple output  downlink beam...Downlink massive full dimension-multiple input multiple output  downlink beam...
Downlink massive full dimension-multiple input multiple output downlink beam...
IJECEIAES
 
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
ijwmn
 

Similar to Joint beamforming, power and channel allocation in multi user and multi-channel underlay miso cognitive radio networks (20)

Block diagonalization precoding and power allocation for clustering small-cel...
Block diagonalization precoding and power allocation for clustering small-cel...Block diagonalization precoding and power allocation for clustering small-cel...
Block diagonalization precoding and power allocation for clustering small-cel...
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Wireless Powered Communications: Performance Analysis and Optimization
Wireless Powered Communications: Performance Analysis and OptimizationWireless Powered Communications: Performance Analysis and Optimization
Wireless Powered Communications: Performance Analysis and Optimization
 
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...Best sum-throughput evaluation of cooperative downlink transmission nonorthog...
Best sum-throughput evaluation of cooperative downlink transmission nonorthog...
 
Channel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communicationsChannel feedback scheduling for wireless communications
Channel feedback scheduling for wireless communications
 
Promoting fractional frequency reuse performance for combating pilot contami...
Promoting fractional frequency reuse performance for  combating pilot contami...Promoting fractional frequency reuse performance for  combating pilot contami...
Promoting fractional frequency reuse performance for combating pilot contami...
 
Joint Interference Coordination and Spatial Resource Reuse
Joint Interference Coordination and Spatial Resource ReuseJoint Interference Coordination and Spatial Resource Reuse
Joint Interference Coordination and Spatial Resource Reuse
 
Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
 
An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...
 
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...
An Intercell Interference Coordination Scheme in LTE Downlink Networks based ...
 
QoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksQoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networks
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
 
Flexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmFlexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithm
 
Modelling and QoS-Achieving Solution in full-duplex Cellular Systems
Modelling and QoS-Achieving Solution in full-duplex Cellular SystemsModelling and QoS-Achieving Solution in full-duplex Cellular Systems
Modelling and QoS-Achieving Solution in full-duplex Cellular Systems
 
Downlink massive full dimension-multiple input multiple output downlink beam...
Downlink massive full dimension-multiple input multiple output  downlink beam...Downlink massive full dimension-multiple input multiple output  downlink beam...
Downlink massive full dimension-multiple input multiple output downlink beam...
 
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
 

More from Pvrtechnologies Nellore

A High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesA High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
Performance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPerformance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesHybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
2016 2017 ieee vlsi project titles
2016   2017 ieee vlsi project titles2016   2017 ieee vlsi project titles
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
2016 2017 ieee ece embedded- project titles
2016   2017 ieee ece  embedded- project titles2016   2017 ieee ece  embedded- project titles
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorA High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
11.online library management system
11.online library management system11.online library management system
11.online library management system
Pvrtechnologies Nellore
 
06.e voting system
06.e voting system06.e voting system
06.e voting system
Pvrtechnologies Nellore
 
New web based projects list
New web based projects listNew web based projects list
New web based projects list
Pvrtechnologies Nellore
 
Power controlled medium access control
Power controlled medium access controlPower controlled medium access control
Power controlled medium access control
Pvrtechnologies Nellore
 
IEEE PROJECTS LIST
IEEE PROJECTS LIST IEEE PROJECTS LIST
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Pvrtechnologies Nellore
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
Pvrtechnologies Nellore
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 

More from Pvrtechnologies Nellore (20)

A High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesA High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar Codes
 
Performance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPerformance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division Units
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesHybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic Architectures
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
 
2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles
 
2016 2017 ieee vlsi project titles
2016   2017 ieee vlsi project titles2016   2017 ieee vlsi project titles
2016 2017 ieee vlsi project titles
 
2016 2017 ieee ece embedded- project titles
2016   2017 ieee ece  embedded- project titles2016   2017 ieee ece  embedded- project titles
2016 2017 ieee ece embedded- project titles
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorA High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
 
6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...
 
11.online library management system
11.online library management system11.online library management system
11.online library management system
 
06.e voting system
06.e voting system06.e voting system
06.e voting system
 
New web based projects list
New web based projects listNew web based projects list
New web based projects list
 
Power controlled medium access control
Power controlled medium access controlPower controlled medium access control
Power controlled medium access control
 
IEEE PROJECTS LIST
IEEE PROJECTS LIST IEEE PROJECTS LIST
IEEE PROJECTS LIST
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorization
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
 

Recently uploaded

Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 

Recently uploaded (20)

Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 

Joint beamforming, power and channel allocation in multi user and multi-channel underlay miso cognitive radio networks

  • 1. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology 1 Joint Beamforming, Power and Channel Allocation in Multi-User and Multi-Channel Underlay MISO Cognitive Radio Networks Suren Dadallage, Changyan Yi and Jun Cai, Senior Member, IEEE Abstract—In this paper, we consider a joint beamforming, power, and channel allocation in a multi-user and multi-channel underlay multiple input single output (MISO) cognitive radio network (CRN). In this system, primary users’ (PUs’) spec- trum can be reused by the secondary user transmitters (SU- TXs) to maximize the spectrum utilization while the intra-user interference is minimized by implementing beamforming at each SU-TX. After formulating the joint optimization problem as a non-convex, mixed integer nonlinear programming (MINLP) problem, we propose a solution which consists of two stages. In the first stage, a feasible solution for power allocation and beamforming vectors is derived under a given channel allocation by converting the original problem into a convex form with an introduced optimal auxiliary variable and semidefinite relaxation (SDR) approach. After that, in the second stage, two explicit searching algorithms, i.e., genetic algorithm (GA) and simulated annealing (SA)-based algorithm, are proposed to determine suboptimal channel allocations. Simulation results show that beamforming, power and channel allocation with SA (BPCA-SA) algorithm can achieve close-to-optimal sum-rate while having a lower computational complexity compared with beamforming, power and channel allocation with GA (BPCA-GA) algorithm. Furthermore, our proposed allocation scheme has significant improvement in achievable sum-rate compared to the existing zero-forcing beamforming (ZFBF). Index Terms—Cognitive radio network, beamforming, semidef- inite relaxation, genetic algorithm, simulated annealing. I. INTRODUCTION RECENT studies reveal that the existing static spectrum allocation is the key reason for highly inefficient spec- trum utilization [1], [2], which in turn leads to a prob- lem of spectrum scarcity. To overcome this issue, a novel concept called cognitive radio (CR) was introduced [3]–[5], which allows unlicensed users or secondary users (SUs) to initiate transmissions with the licensed communications. For an underlay CR network (CRN) coexisting with a multi- channel primary user (PU) network, managing interference is a critical issue since spectrum reusing among multiple users may cause negative effects on received signals at both PUs and SUs. By exploiting multiple antennas, a signal processing technology called beamforming [6] has been introduced to CR Copyright (c) 2015 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to pubs-permissions@ieee.org. This work was supported by the Natural Sciences and Engineering Research Council of Canada under Discovery Grant. The authors are with the Department of Electrical and Computer Engineer- ing, University of Manitoba, Winnipeg, MB, Canada R3T 5V6. E-mail: dadal- las@myumanitoba.ca, changyan.yi@umanitoba.ca, jun.cai@umanitoba.ca. for directional signal transmission, so as to effectively mitigate the mutual interference and improve the signal-to-interference- plus noise ratio (SINR) [7]. In the literature, joint beamforming and resources allocation have been widely studied for multiple-antenna CRNs. For example, Xie et al. in [8] considered a sum-rate maximization problem in a single PU channel CRN. In this work, the mutual interference between SUs are nullified by deploying the zero- forcing beamforming (ZFBF). The authors in [9] discussed a joint beamforming and single PU channel assignment problem to maximize the uplink throughput of the CRN while guaran- teeing a SINR constraint at each secondary user receiver (SU- RX) and interference cancellation at the primary user receiver (PU-RX). However, ZFBF does not consider the potential interference tolerance at SUs, which in turns results in a degradation on overall achievable sum-rate of the secondary network. Recent studies [10]–[12] showed that both PU and SU receivers can tolerate some amount of interference. As a result, it is not necessary to null the co-channel interference. Jiang et al. in [13] employed a zero-gradient based iterative approach to determine the local optimal beamforming vectors while maximizing the energy efficiency of the CRN. In [14], beamforming vectors were calculated by using an iterative algorithm based on semidefinite programming to maximize the sum-rate with a total power constraint and co-channel interference constraints at both PU and SU receivers. This work was further extended in [15] by adding an extra quality of service (QoS) constraint. However, the assumption of a single PU channel as used in [13]–[15] reduces the degree of freedom available at the secondary base station (SBS) on channel allocation for SUs. Therefore, joint beamforming and resource allocation with multiple PU channels were studied. For example, in [7], a single secondary user transmitter (SU- TX)/SU-RX pair was considered with uniformly distributed primary user transmitters (PU-TXs) and PU-RXs in a circular disc area. Beamforming was implemented by the SU-TX to minimize the interference to the PU-RXs while the received signal strength was maximized at the SU-RX. Gharavol et al. in [16] discussed a transmit power minimization problem with a guarantee of SUs’ QoS and total power constraints in a multiple channels multiple-input-single-output (MISO) CRN. Some other works in this area include an adaptive intercell interference cancellation (ICIC) technique for MISO downlink cellular systems with channel allocation and beamforming to maximize the weighted sum-rate [17]. Hamdi et al. in [18] considered joint beamforming with a near-orthogonal user For More Details Contact G.Venkat Rao PVR TECHNOLOGIES 8143271457
  • 2. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology 2 selection method to maximize the downlink throughput of the CRN, subject to constraints on SINR at each SU, interference at the PU-RX and total transmission power. The authors in [19] proposed an algorithm based on branch and bound (BnB) method to allocate PU frequency bands with beamforming to serve a maximum number of SUs. However, most of these works [14]–[21] assumed a cellular architecture for secondary networks, where either SU-Tx or SU-Rx is the secondary base station. Recently, device-to- device (D2D) communication based secondary networks [22], [23] are attracting more attentions from researchers due to their advantages in offering greater coverage with spatial diversity, higher data rates and lower energy consumption. Different from the traditional cellular architecture, D2D communications cause co-channel receivers interfered by multiple transmitters at different locations. This challenge requests the consideration of individual SINR constraint at each SU-Rx, and makes the joint beamforming and resource allocation more complicated than the traditional case. In this paper, we readdress the joint transmit beamforming, power and channel allocation problem in an underlay CRN with independent D2D communications among multiple PU and SU pairs. Specifically, in our work, beamforming is performed by each SU-TX instead of a single SBS so as to promote the spatial diversity and curtail the interference. Our main objective is to maximize the sum-rate of the secondary network while minimizing the intra-user interference subject to the constraints of total power budget, interference on PUs and SINR requirement at each SU. We formulate the joint optimization problem as a non-convex, mixed integer nonlin- ear programming (MINLP) problem [14], which is NP-hard. In order to solve this problem with reasonable computational complexity, a two-stage solution approach is proposed. In the first stage, an iterative algorithm is proposed to determine the feasible beamforming vectors and power allocation for a given channel allocation. After that, two explicit searching algo- rithms based on genetic algorithm (GA) [24] and simulated annealing (SA) [25] are proposed to find out the suboptimal channel allocation. The main contributions of this paper are summarized as follows. • We consider a multi-channel underlay CR system with the capability of beamforming at each SU-TX to mitigate interference, allow more transmission opportunities, and exploit the benefits of spatial diversity. • We develop a sum-rate maximization problem to joint- ly optimize beamforming vectors, power allocation and channel allocation. • Two different algorithms are proposed to solve the for- mulated non-convex MINLP problem. • Simulation results show that the proposed system model outperforms the existing ZFBF model by exploiting inter- ference tolerance capacities. The proposed algorithms can achieve close-to-optimal performance in terms of sum- rate with low computation complexity so that they are more suitable for practical applications. The rest of this paper is organized as follows. The system model and the problem formulation are discussed in Section II. PU-RXn PU-TXn SU-TXk SU-RXk SU-TXm SU-RXm gnk hkn hmk hk Central Entity PU-TX SU-TX PU-RX SU-RX PU-RXPU-TX Desired Channel Interference Channel Fig. 1. System model and channel responses. The solution approaches and their computational complexities are analyzed in Section III. After that, the simulation results are presented in Section IV, followed by the conclusions in Section V. II. SYSTEM MODEL AND PROBLEM FORMULATION We consider a CRN with N PU transceivers and K SU transceivers randomly distributed in the coverage area of the primary network. Each PU transceiver occupies one separated licensed channel so that there are N PU channels in total. Each SU-TX is equipped with J antennas and its receiver with a single antenna, while each PU (transmitter or receiver) has a single antenna. Each SU-TX is allowed to communi- cate with its corresponding receiver in the underlay manner while satisfying a pre-defined interference constraint at the corresponding PU-RX. There is a central entity who performs all control functions (e.g., resource allocations) for SUs. An illustration of the system model is shown in Fig. 1. We define two sets S and P to indicate all possible SU pairs and PU pairs in the network, respectively. The following notations are used in this paper. Boldface uppercase and lowercase letters will be used for matrices and vectors, respectively. (·)† , (·)T , E{·} and x denote conju- gate transpose, transpose, expectation and Euclidean norm of vector x, respectively. In addition, Tr(A) indicates the trace operation of a square matrix A. For convenience, Table I lists some important symbols used in this paper. A. Signal Model Define the transmitted signals from the kth SU-TX, i.e., SU-TXk, to its receiver SU-RXk and from nth PU-TX, i.e., PU-TXn, to its receiver PU-RXn as sk and un, respectively. We assume that each modulated transmitted signal has unit energy and is uncorrelated with each other, i.e., E{|sk|2 } = E{|un|2 } = 1, E{sks† m} = E{unu† d} = 0, ∀k, m ∈ S and n, d ∈ P, k = m and d = n. With antenna array, each SU-TX performs transmit beamforming to direct the signal to the intended receiver while at the same time controlling the interference to other users (PUs and SUs). The received signal at the SU-RXk using the nth PU channel can be represented as the aggregation of desired signal, interference from other For More Details Contact G.Venkat Rao PVR TECHNOLOGIES 8143271457
  • 3. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology 3 TABLE I LIST OF NOTATIONS Symbol Definition Sn Set of SU pairs using the nth PU channel K Number of SU pairs N Number of PU channels sk/un kth SU transmit signal/nth PU transmit signal hk Channel response between the SU-TXk and the SU-RXk hmk Channel response between the SU-TXm and the SU-RXk hmn Channel response between the SU-TXm and the PU-RXn gnk Channel response between the PU-TXn and the SU-RXk gn Channel response between the PU-TXn and the PU-RXn ηk/ηn Noise at the SU-RXk/PU-RXn Qn PU-TXn’s transmit power ˆαki, ¯αkn, αn, βk Large-scale fading coefficients ˆϑki, ¯ϑkn, ϑn, bk Small-scale fading coefficients J Number of transmit antennas vk(θ, φ) SU-TXk’s steering vector having a counter-clockwise azimuth angle of θ and φ elevation rn k Rate of the kth SU-TX on nth PU channel B Transmission bandwidth of each PU channel In th Maximum interference tolerance threshold at the PU-RXn Γk Minimum QoS threshold at the kth SU-RX Pmax Power budget of the secondary network ϕ Auxiliary vector to indicate the intra-user interference thresholds of each SU-RX ϕk kth SU-RX intra-user interference threshold wk kth SU-TX beamforming vector Wk kth SU-TX positive semidefinite beamforming matrix xn k Binary variable to indicate the nth PU channel allocation on kth SU-TX SU-TXs using the same PU channel for transmission, the interference from the nth PU-TX, and noise, i.e., yn k = (wksk)† hk + m∈Sn,m=k (wmsm)† hmk + Qngnkun + ηk, (1) where wk is the kth SU-TX’s beamforming vector with size of J ×1, Qn is the transmit power of the nth PU-TX, hk denotes the J × 1 channel response between SU-TXk and SU-RXk, hmk is the J × 1 channel response between SU-TXm and SU-RXk, gnk denotes the channel response between PU-TXn and SU-RXk, and Sn denotes the set of SU-TXs using the nth PU channel. The noise ηk is Gaussian distributed with zero mean and variance σ2 . Similarly, the received signal at the nth PU-RX consists of desired PU signal, co-channel interference from SUs and noise. Thus, it can be formulated as yn = Qngnun+ k∈Sn (wksk)† hkn+ηn, n = 1, . . . , N (2) where gn and hkn are channel responses from the nth PU transmitter and the kth SU-TX to the nth PU-RX, respectively, and ηn denotes the noise. The channel responses hki, gkn and gn in (1) and (2) can be further defined as hki = hki = [h1 ki . . . hJ ki]T , if i = k ∈ Sn, i ∈ Sn ∪ P,(3a) βkbkvk(θ, φ), if i = k (3b) hl ki = ˆαki ˆϑki, i = k ∈ Sn, i ∈ Sn ∪ P and l = 1, . . . , J (4) gkn = αknϑkn, k ∈ Sn and n ∈ P (5) gn = ¯αn ¯ϑn, n ∈ P (6) where ˆαki, ¯αkn, αn and βk denote the large-scale fading, while ˆϑki, ¯ϑkn, ϑn and bk represent the small-scale fading which are modeled as Rayleigh distributed random variables. Consider uniform circular array (UCA) [26] of antenna configuration at each SU-TX. Then, vk(θ, φ) is the steering vector for the kth SU-TX, which indicates the relative responses of the isotropic array elements with respect to the signal impinging at the center of the array from a particular direction. Here, φ denotes the counter-clockwise azimuth angle measured from X-axis and θ denotes elevation measured from Z-axis. In this paper, we assume that all users are located in the same plane, so that θ becomes zero and mutual coupling [27] among array elements is not considered. Similar to [15], we assume that perfect knowledge of the channel state information (CSI) is available at each SU-TX before transmission. B. Problem Formulation Given the kth SU transceiver is working on the nth PU channel, the SINR at the kth SU-RX, denoted as SINRk, can be represented as SINRk = |w† khk|2 m∈Sn,m=k |w† mhmk|2 + Qn|gnk|2 + σ2 (7) For More Details Contact G.Venkat Rao PVR TECHNOLOGIES 8143271457
  • 4. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology 4 where |w† khk|2 is the desired received signal power at the SU-RXk. m∈Sn,m=k |w† mhmk|2 denotes the total intra-user interference received at the SU-RXk from other SU-TXs’ who are using the same channel. Qn|gnk|2 and σ2 are the interference power from PU-TXn and the noise power at the SU-RXk, respectively. Let xn k , k = 1, . . . , K, n = 1, . . . , N, denote the channel allocation for SUs. xn k = 1 means that the nth PU channel is assigned to the SU-TXk. Otherwise, xn k = 0. Then, from (7), the achievable rate of SU pair k on the nth PU channel, rn k , can be calculated as rn k = B log2   1 + xn k |w† khk|2 m∈Sn,m=k |w† mhmk|2 + Qn|gnk|2 + σ2    (8) where B is the transmission bandwidth of a single PU channel. Our major objective is to maximize the sum-rate of the SU network while allowing concurrent transmission with PUs. The optimization problem can be formulated as P1 : max w,X K k=1 N n=1 rn k (9) s.t. K k=1 |w† khkn|2 xn k ≤ In th, ∀n = 1, . . . , N, (10) SINRk ≥ Γk, ∀k = 1, . . . , K, (11) K k=1 N n=1 wk 2 xn k ≤ Pmax, (12) N n=1 xn k ≤ 1, ∀k = 1, . . . , K, (13) xn k ∈ {0, 1}, ∀k ∈ S, ∀n ∈ P,(14) where In th is the maximum interference tolerance threshold of the nth PU-RX. Γk is the minimum QoS threshold at the kth SU-RX. Pmax is the available power budget of the secondary network. w = [w1 . . . wK] of size J × K indicates the beamforming weights matrix, where its kth column defines the beamforming vector for the SU-TXk. X is a K×N channel allocation matrix, which consists of all xn k , k ∈ S and n ∈ P. The constraint (10) limits the total interference power from SU-TXs to a specific PU-RX below a pre-defined threshold. Constraint (11) guarantees the required SINR level at each SU-RX. Constraint (12) keeps the total power consumption under the available power budget. Constraint (13) implies that each SU-TX can access at most one PU channel. Note that the setting of single-channel access has been widely used in most of related works [10]–[12]. Even though the sum-rate may be further improved by adopting multiple channels for a single SU-TX, it will significantly increase the complexity of the system due to the difficulties involved in the power allocation. Since the power allocation of SU-TXk is determined by wk 2 , the problem P1 in fact integrates beamforming, power allocation and channel allocation. III. A TWO-STAGE SOLUTION APPROACH The problem P1 consists of both continuous and discrete variables, and there are nonlinear terms in both the objective function and constraints. Hence, it is a non-convex, mixed integer non-linear programming problem, which has been proved to be NP-hard [28]. In order to balance performance and computational complexity, in the following a two-stage solution approach is proposed. The idea is to separate the main problem into two sub-problems. In the first sub-problem, the power and beamforming vectors are calculated based on a given channel allocation. After that, the second sub- problem, which determines a suboptimal channel allocation, will be solved. For the second sub-problem, two algorithms are proposed with different computational complexity. A. Power and beamforming vector determination based on a given channel allocation In this section, the beamforming vector and power allocation for each SU-TX will be determined based on a given channel allocation, ˜X. Given ˜X, constraints (10) and (12) can be transformed to a summation of quadratic terms and norms so that they become convex. However, the original problem P1 is still non-convex because neither the objective function (9) nor the constraint (11) are convex. To overcome this issue, we use semidefinite programming (SDP) approach [29], which allows to express the quadratic terms with some equivalent affine expressions. With SDP, the quadratic terms, |w† khkn|2 , |w† mhmk|2 and wk 2 , can be equivalently represented as |w† khkn|2 = Tr(w† khknh† knwk) = Tr(WkHkn), ∀k ∈ S, ∀n ∈ P (15) wk 2 = Tr(Wk), ∀k ∈ S (16) |w† mhmk|2 = Tr(WmHmk), ∀m = k, m ∈ Sn Tr(WkHk), m = k (17) where Wk = wkw† k, Hkn = hknh† kn, Hk = hkh† k, and Hmk = hmkh† mk. From (15) - (17), we have i) Wk is a rank one positive semidefinite (PSD) matrix, i.e., Wk 0, ∀k; ii) Tr(WkHkn), Tr(WkHk) and Tr(WmHmk) are all affine expressions with respect to the symmetric PSD matrices Wk and Wm. With (15), (16), (17) and the assumption of a known channel allocation, the optimization problem P1 can be rewritten as P2 : max W1,...,WK K k=1 N n=1 rn k (18) s.t. K k=1 ˜xn k Tr(WkHkn) ≤ In th, ∀n = 1, . . . , N (19) SINRk ≥ Γk, ∀k = 1, . . . , K (20) K k=1 N n=1 ˜xn k Tr(Wk) ≤ Pmax, (21) Wk 0, ∀k = 1, . . . , K, (22) Rank(Wk) = 1, ∀k = 1, . . . , K (23) For More Details Contact G.Venkat Rao PVR TECHNOLOGIES 8143271457
  • 5. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology 5 where, rn k = B log2  1 + ˜xn k Tr(WkHk) m∈Sn m=k Tr(WmHmk) + Qn|gnk|2 + σ2   (24) Note that two additional constraints, (22) and (23), are added in P2. Obviously, the former has a convex expression, but the later does not. In addition, the constraints (19) and (21) have been transformed to linear functions without affecting their convexity. The optimization problem P2 can be further transformed into a convex form by doing the following two steps. First, the non-convex rank constraint of (23) can be relaxed by using the SDR approach again [30]. Then, follow- ing the similar approach in [14], intra-user interference from other SUs to the SU-RXk, i.e., m∈Sn m=k Tr(WmHmk), can be constrained by introducing a new auxiliary variable. After these two steps, the revised optimization problem P3 can be written as P3 : max W,ϕ K k=1 N n=1 B log2 1 + ˜xn k Tr(WkHk) ϕk + Qn|gnk|2 + σ2 (25) s.t. constraints (19), (21), (22), Tr(WkHk) ≥ Γk m∈Sn m=k Tr(WmHmk) + Qn|gnk|2 + σ2 , ∀k ∈ Sn (26) m∈Sn m=k Tr(WmHmk) ≤ ϕk, ϕk ≥ 0, ∀k = 1, . . . , K (27) where W = [W1 . . . WK] is a J ×KJ matrix which consists of all the beamforming matrices, and ϕ = [ϕ1, . . . , ϕK]T is a K × 1 non-negative auxiliary vector which represents intra- user interference thresholds of all SU-RXs. Given ϕ, the objective function becomes concave since it is just a logarithmic function of an affine expression. In addition, the convexity of the constraint (26) can be proven as in [15]. As a result, the problem P3 turns into a form of convex optimization problem. It is similar to the standard form of SDP, but with a logarithmic rather than a linear objective function. There are many tools available in literature (e.g., CVX [31], a Matlab based modeling software package) to solve such a convex optimization problem. Thus, we only need to determine the optimal value for ϕ. Following the similar method in [14], we introduce the following iterative algorithm for P3. (i) Initialization: Relax the intra-user interference constraint (27) by assigning a feasible non-negative large val- ue for ϕ. Then, solve the problem P3 to find out a feasible value of W, called ˜W(0) . Set the intra- user interference thresholds for each user as ϕ (0) k = m∈Sn m=k Tr( ˜W (0) m Hmk), ∀k ∈ S and calculate the sum- rate, R( ˜W(0) , ϕ(0) ), based on (25). Define SU pair index, k = 1, 1 ≤ k ≤ K and the iteration index, a = 1. (ii) Update: Update ϕ(a) by ϕ(a) = ϕ(a−1) − (1 − δ)ϕ (a−1) k Ik where δ is a fixed step size, 0 < δ < 1, and Ik is the kth column of an K × K identity matrix. (iii) Iteration results: Calculate the new R( ˜W(a) , ϕ(a) ) by using ˜W(a) . (iv) Check improvements: Calculate ∆R = R( ˜W(a) , ϕ(a) )− R( ˜W(a−1) , ϕ(a−1) ). The nonnegativity of ∆R can be proved as in [15]. If ∆R is greater than a predefined threshold, let a = a + 1 and repeat steps (ii) and (iii) till ∆R below a pre-defined threshold. Then, set ˜W(a) = ˜W(a−1) , R( ˜W(a) , ϕ(a) ) = R( ˜W(a−1) , ϕ(a−1) ) and update the intra-user interference for each user as ϕ (a) k = m∈Sn m=k Tr( ˜W (a) m Hmk), ∀k ∈ S. (v) Continue iterations and pick the next user: Set k = k+1 and continue steps (ii) - (iv) for the newly selected user. (vi) Termination: If k > K, stop the iterations. At each iteration, the problem P3 needs to be solved. Since most of the convex optimization toolboxes (e.g., CVX) use the interior-point algorithm [32] as a basic solution platform, con- sidering the worst-case scenario as in [30], the computational complexity of a SDR problem P3 can be expressed as O(max{ξ, κ}4 κ(1/2) log(1/ )) (28) where κ and ξ describe the problem size (i.e., number of PSD matrices) and the number of constraints involved in the optimization problem P3, respectively. is the given accuracy of the solution defined by the solver. Let tT denote the total number of iterations taken by the iterative algorithm to produce a feasible solution for total K SU pairs. Then, the overall complexity to find beamforming and power vectors for a given channel allocation can be derived as O(max{ξ, κ}4 κ(1/2) log(1/ )) × tT (29) Let ˜W = [ ˜W1 . . . ˜WK] and ˜ϕ = [ ˜ϕ1, . . . , ˜ϕK]T be the feasible solutions of the problem P3. Then, ˜W is optimal if and only if the rank of each Wk, ∀k ∈ S, is equal to one, i.e., rank(Wk) = 1. If such condition is not satisfied, appropriate rank one approximation methods, e.g., eigen-decomposition method [30], can be deployed to get the final solution of ˜W. By using eigen-decomposition method, each beamforming matrix Wk can be equivalently represented as Wk = J j=1 λkjckjc† kj (30) where λkj and ckj denote the jth eigenvalue and the cor- responding eigenvector of the kth beamforming matrix Wk, respectively. If Wk is a rank one matrix, then there exists exactly one non-zero eigenvalue, say λkJ . As a result, using (30), the kth user beamforming matrix Wk can be written as Wk = λkJ ckJ c† kJ = ( λkJ ckJ )( λkJ ckJ )† (31) = wkw† k Thus, the beamforming vector for the SU-TXk is, wk = λkJ ckJ (32) For More Details Contact G.Venkat Rao PVR TECHNOLOGIES 8143271457
  • 6. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology 6 B. Suboptimal channel allocation In the previous section, we have determined the optimal power and beamforming vectors for a known channel allo- cation. In order to find the optimal channel allocation, an exhaustive searching algorithm can be used, which needs to compute beamforming vectors, power allocations and sum- rates for all possible channel allocations. With N PU channels and K SU pairs, the searching space size of the exhaustive searching algorithm is (N + 1)K , which increases exponen- tially with K. Obviously, this searching method is practically infeasible. Hence, for practical applications, we propose two channel allocation algorithms based on genetic algorithm (GA) [24] and simulated annealing (SA) [33], [34] algorithm to find suboptimal channel allocations. 1) Genetic Algorithm (GA): GA is a searching algorithm, which can be applied to find out near optimal solution to an optimization problem without the knowledge of the objective function’s derivatives or any gradient related information. The key idea of GA is to first select a set of feasible values for the decision variables and then design new solutions based on the previous set to improve the objective function [35]. Different from standard GA, in this thesis, we define a K×N matrix as a chromosome instead of a single string chromosome as in [24], where the kth row and nth column entry of the chromosome indicates whether the nth channel is allocated to the kth SU- TX or not. In fact, a chromosome describes one realization of channel allocation. An example of a chromosome for two PU channels and four SU-TXs can be written as Chromosome =     1 0 0 1 0 1 1 0     (33) Define Φ as the search space, which includes all possible channel allocations, and has a size of (N + 1)K . Define the size of each generation as ν. Let ρ (0 < ρ < ν) and Gmax denote the number of best chromosomes being selected and the maximum number of generations, respectively. The details of GA is as follows. Initially, ν chromosomes are randomly selected from Φ, called the initial generation, Φ(0) . We define R(i) (W, ϕ), the sum-rate achieved for chromosome i, as the fitness function for GA. Then, the chromosomes in Φ(0) can be ordered with the descending order of their sum-rates. From the sorted chro- mosome list (G (g) sorted), the first ρ chromosomes are selected and put into the set G (g) best, while the last ρ chromosomes are removed and inserted into the set G (g) worst at the gth generation. The set of remaining chromosomes, G (g) luckies, is named as luckies. Next, a new generation of chromosomes is formed. The new generation consists of the set G (g) best and ν − ρ new chromosomes generated from the two sets G (g) best and G (g) luckies, through Children Generation Process (CGP). CGP consists of two major operations called Mutation and Cross-over. The details are explained as follows. • At first, two chromosomes, P1 and P2, are randomly selected from the two sets G (g) best and G (g) luckies, respectively. Algorithm 1 : GA-based channel allocation algorithm 1: Initialization: Given K, N, Φ, ν, ρ and Gmax 2: Start : randomly pick ν channel realizations from Φ to define the initial generation Φ(0) , Φ(0) ⊂ Φ 3: Fitness : find R(i) (W, ϕ) ∈ R(0) for each chromosome i within the set Φ(0) 4: Set g = 0, 5: while g < Gmax do 6: if g = 0 then 7: G(0) = Φ(0) , the set of corresponding rates are R(0) 8: else 9: Fitness : find R(g) ← R(i) (W, ϕ), ∀chromosome i ∈ G(g) 10: end if 11: [R (g) sorted, G (g) sorted] ←sort(R(g) , G(g) ,‘Descending’) 12: [R (g) best, G (g) best] ←select(R (g) sorted, G (g) sorted,,‘Best’) 13: [R (g) worst, G (g) worst] ←select(R (g) sorted, G (g) sorted,,‘Worst’) 14: [R (g) luckies] ← (R (g) best − R (g) worst) 15: [G (g) luckies] ← (G (g) best − G (g) worst) 16: for c = 1 : (ν − ρ) do 17: P1 ← select(G (g) best, 1,’Random’) 18: P2 ← select(G (g) luckies, 1,’Random’) 19: [TempCH1, TempCH2] ← Crossover(P1, P2) 20: [CH1, CH2] ← Mutation(TempCH1, TempCH2) 21: [G (g) child] ← [CH1, CH2] 22: end for 23: G(g+1) ← {G (g) best + G (g) child} 24: g ← g + 1 25: end while 26: Output: Optimal channel allocation (or chromosome), optimal beamforming matrices, W P1 and P2 are called parents. • Next, the cross-over operation is initiated between the two selected parents to generate two new children, called TempCH1 and TempCH2. Here, we use the Single Point Cross-over technique [36] as an example. Specifically, entries of a randomly selected column of the two parents will be swapped to perform the single point cross-over. Note that swapping may produce infeasible chromosomes such as multiple channel allocation to a single user. In this case, except the swapped column, we keep the parent columns unchanged and let only the troublesome entries of the swapped column of both children to be zero to ensure that channel allocation constraint (13) is always satisfied. • At the end, two randomly selected entries, xn1 k , xn2 k , of an arbitrary selected kth row will be swapped, called mutation. Note that, when selecting those two entries, either of them should have a value of one. The importance of mutation is to avoid GA converging to a local optimal value. The termination condition for GA will be activated when the number of generations produced is beyond the predefined value Gmax. Eventually, the chromosome in the last genera- tion, which has the maximum fitness, will be the best solution. For More Details Contact G.Venkat Rao PVR TECHNOLOGIES 8143271457
  • 7. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology 7 Furthermore, the corresponding fitness value will be the near optimal sum-rate. At each iteration, the complexity of GA results from three major operations, i.e., sorting, mutation and cross-over, which introduce complexity of O(ν log(ν)), O(K) and O(K), re- spectively. Beside the first generation, (ν − ρ) fitness values have to be determined at each generation. Thus, the overall complexity of GA can be computed as Gmax × O(nlog(n)) + (ν − ρ)/2 (O(K)) + (ν − ρ) × tT × O(max{ξ, κ}4 κ(1/2) log(1/ )) (34) The implementation steps of the GA is summarized in Algorithm 1. We call the proposed beamforming, power, and channel allocation with GA as BPCA-GA. 2) Simulated Annealing (SA)-based algorithm: From (34), the complexity of GA mainly depends on the values of ν and ρ. Since these two parameters also decide the accuracy and the convergence of GA, sufficiently large values of ν and ρ have to be set, which causes high computational complexity for GA. In order to further reduce the complexity, a new allocation algorithm based on SA [33] is introduced. Let Φ = {X1, . . . , XL} denote the feasible set of all chan- nel allocations available with K SU pairs and N PU channels, where a K×N matrix Xl, l = 1, . . . , L = (N+1)K , indicates a certain channel allocation with binary entries and a row sum, i.e., N n=1 xn k ≤ 1. Then, the optimization problem for X can be equivalently expressed as X = arg max Xl∈Φ R(Xl) (35) where R(Xl) indicates the sum-rate associated with Xl. The SA-based algorithm uses neighborhood searching to determine a suboptimal solution. Specifically, the SA-based algorithm starts with a control parameter and an initial channel allocation that is used to generate new neighbor channel allocation. Then, the new channel allocation is clearly selected if it shows any performance improvement. Otherwise, it may still be accepted with a certain probability, which allows SA- based algorithm to escape from local optimal configurations. The cooling schedule manages the control parameter during the optimization process. The details of the algorithm is as follows. At the initial state, we set the iteration index l = 0 and randomly pick a channel allocation, X0, from Φ. Using X0, a new neighbor channel allocation, i.e., ˆX0 ∈ Φ, is formed by swapping randomly selected row of X0 with an entry in A, which denotes the set of all feasible combinations of channel allocation to a single user. Given X0 and ˆX0, we compute the corresponding sum-rates, which are denoted as R(X0) and R( ˆX0), respectively. The acceptance rule at the lth iteration can be formulated as P{Accept ˆXl} =    1, if R( ˆXl) ≥ R(X0) exp ∆R Tl , if R( ˆXl) < R(X0), (36) Algorithm 2 : SA-based channel allocation algorithm 1: Initialization: Given K, N, Φ, cooling-rate and Smax 2: Set l = 0, 3: Start : Initial channel allocation X0, X0 ⊂ Φ and compute R(X0) 4: while l < Smax do 5: Generate new channel allocation, ˆXl from X0, ˆXl ⊂ Φ 6: Calculate sum-rate, R( ˆXl) 7: ∆R := R( ˆXl) − R(X0) 8: if l = 0 then 9: Compute T0 10: end if 11: if ∆R ≥ 0 then 12: X0 ← ˆXl and R(X0) ← R( ˆXl) 13: else if exp ∆R Tl > random [0, 1] then 14: X0 ← ˆXl and R(X0) ← R( ˆXl) 15: end if 16: Update Tl+1 = cooling-rate ∗ Tl 17: l ← l + 1 18: end while 19: Output: suboptimal channel allocation and suboptimal beamforming matrices, i.e., X0 and W where ∆R = R( ˆXl) − R(X0). It implies that a candidate neighbor channel allocation, i.e., ˆXl, is accepted with the probability of one if its sum-rate is greater than that of the current channel allocation, or exp ∆R Tl if the new neighbor channel allocation has a smaller achievable sum-rate than the current allocation. If accepted, we replace X0 by ˆXl, and update the value of the control parameter for the next iteration as Tl+1 = cooling-rate∗Tl, where cooling-rate takes a value in [0.50; 0.99] [37]. Note that T0 can be determined by following the similar way as in [38]. We increase l by one and repeat the aforementioned process. When the maximum number of allowable iterations is reached, the algorithm is terminated and the resulting outputs give the suboptimal channel allocation, sum-rate and the beamforming vectors. The SA-based algorithm has two major steps, i.e., the generation of a neighbor channel allocation and the deter- mination of sum-rate. A new neighbor channel allocation can be generated from the current channel allocation with a complexity of O(N), and a sum-rate calculation process involves a complexity of O(max{ξ, κ}4 κ(1/2) log(1/ )) × tT as in (29). If Smax is the maximum number of iterations for convergence, the complexity of the algorithm can be computed as Smax × {O(N) + O(max{ξ, κ}4 κ(1/2) log(1/ )) × tT } (37) Compared with (34), the computational complexity of SA- based algorithm is much smaller than the GA. The SA-based algorithm is summarized as in Algorithm 2. In this paper, we call the proposed beamforming, power, and channel allocation with SA-based algorithm as BPCA-SA. For More Details Contact G.Venkat Rao PVR TECHNOLOGIES 8143271457
  • 8. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology 8 IV. SIMULATION RESULTS In this section, the performance of both BPCA-GA and BPCA-SA algorithms is evaluated by using computer simu- lations. A. Simulation environment Consider a CRN with three PU-TX/PU-RX pairs (i.e., N = 3). The locations of the PU-TXs are given by the x-y plane coordinates (300, 0), (−400, 0) and (0, −100), and their associated PU-RXs are situated at (600, 0), (−400, 300) and (0, −400), respectively, where all the distances are measured in meters. There are six SU-TX/SU-RX pairs (i.e., K = 6) randomly located within a square area of 600m × 600m. For each SU-TX, its associated SU-RX is randomly located in a circle centered at the SU-TX with a radius of 100m. Each SU-TX with J = 3 antennas is oriented in a UCA configuration having a radius of λ = c fc , where the carrier frequency fc = 900MHz and the speed of light c = 3 × 108 m/s. The transmit power budget, Pmax = 30dBm and Qn = 23dBm, ∀n ∈ P. Furthermore, each PU-RX has an interference threshold, In th, ∀n ∈ P, of −40dBm and each SU-RX’s minimum QoS threshold, Γk, ∀k ∈ S, is 6dB. The noise power at any location is considered as −90dBm and the bandwidth of each channel, B, is set as 10MHz. The small- scale fading coefficients are modeled as a Circular Symmetric Complex Gaussian (CSCG) random variables with zero mean and unit variance. We consider the free space propagation model to simulate the path-loss, i.e., PL = λ 4πd 2 , where d is the distance between the transmitter and the receiver. Normally, the generation size ν in GA should be neither too small nor too large. A small generation size tends to end up with a local optimal value, while a large generation size leads to a high computational complexity though it may be closer to the optimal value. Hence, in order to balance this tradeoff, we use the size of the searching space (i.e., Φ = (N +1)K ) in determining ν, and set ν as the ceiling integer of (N + 1)K. Accordingly, we let ρ be the ceiling integer of √ ν. The stopping criteria for SA algorithm is based on the maximum number of iterations Smax. We define Smax as the number of iterations after which a given minimum temperature level, i.e., Tlast = 0.3×T0 can be reached. Thus, Smax can be calculated based on the equation Tlast = (cooling-rate)Smax × T0, where the cooling-rate is a constant of 0.99. Note that some parameters may vary according to evaluation scenarios. B. Convergence of BPCA-GA and BPCA-SA algorithms Fig. 2 shows the convergence of the two proposed algo- rithms, i.e., BPCA-GA and BPCA-SA. The optimal sum- rate, 42.1765 bits/Hz, is determined by adopting the exhaus- tive searching method. From the figure, we can see that BPCA-GA approaches a close-to-optimal sum-rate value of 41.9634 bits/Hz. BPCA-SA can find a suboptimal channel allocation with a sum-rate value of 41.0557 bits/Hz which is only 2.16% worse than BPCA-GA. By considering the computational complexity, we can conclude that BPCA-SA is more feasible for practical applications. Note that, though 10 20 30 40 50 60 70 80 90 100 110 120 130 140 150 20 25 30 35 40 45 Iterations (Generations) Sum−rate(bits/Hz) Optimal sum−rate BPCA−GA BPCA−SA Fig. 2. Convergence of the BPCA-GA and BPCA-SA algorithms with K = 4, N = 3, Pmax = 1W, J = 3. TABLE II AVERAGED COMPUTATION TIMES OF DIFFERENT SCHEMES. Scenario BPCA-SA (s) BPCA-GA (s) K = 3, N = 2 293.65 688.04 K = 3, N = 3 334.69 1518.50 K = 3, N = 4 548.08 3660.75 BPCA-GA converges much faster than BPCA-SA in terms of the number of iterations, each iteration takes more time in BPCA-GA than BPCA-SA because of the high computational complexity involved in GA. As a proof for such fact, Table II illustrates the numerical values of the average computation times taken by the two proposed schemes with respect to different configurations (i.e., the number of SU-pairs (K) and channels (N)). From this table, we can clearly observe that the computation time of BPCA-SA algorithm is always shorter than that of the BPCA-GA, which proves that the BPCA-SA has lower computational complexity than the BPCA-GA. In addition, such superiority becomes more obvious for larger values of K and N. C. The achievable sum-rate with increased number of SU pairs and PU channels Fig. 3 illustrates a comparison of the achievable sum-rate by the BPCA-GA and BPCA-SA algorithms. From the figure, we can see that when the number of SU pairs is small, e.g., K = 2, both algorithms show similar performance. This is because the search space is small in this case so that both GA and SA-based algorithms have an equal chance to obtain a close-to-optimal value. However, as the number of SU pairs increases, the BPCA-GA outperforms BPCA-SA. Fig. 4 depicts the performance of BPCA-GA and BPCA-SA with the number of PU channels. From the figure, a similar observation as in Fig.3 can be obtained. As N increases, achievable sum-rate of both algorithms tend to increase due to the increased degrees of freedom on channel allocation. For most of the cases, BPCA-SA is lagged behind BPCA-GA with a small performance gap. By comparing Figs 3 and 4, we can further observe that the number of SU pairs has more effects on the performance than the number of PU channels. For More Details Contact G.Venkat Rao PVR TECHNOLOGIES 8143271457
  • 9. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology 9 2 3 4 5 6 0 10 20 30 40 50 60 Number of SU pairs (K) Sumrate(bits/Hz) BPCA−GA BPCA−SA Fig. 3. Optimal sum-rate with an increased number of SU pairs for N = 3 PU channels, Pmax = 1W and J = 3. 1 2 3 4 5 10 15 20 25 30 35 40 Number of PU channels (N) Sumrate(bits/Hz) BPCA−GA BPCA−SA Fig. 4. Optimal sum-rate with an increased number of PU channels for K = 3 SU pairs, Pmax = 1W and J = 3. D. Comparison with Zero-Forcing Beamforming (ZFBF) We compare the proposed beamforming method with the traditional ZFBF scenario where the beamforming vectors for each SU-TX is determined by confining the interference among the SUs to become zero. We call the secondary user zero-forcing beamforming, power and channel allocation with GA and SA-based algorithm as ZFBPCA-GAS and ZFBPCA-SAS, respectively. Fig. 5 shows that our proposed model outperforms the ZFBF scenario irrespective to the channel allocation algorithms. It is because the degrees of freedom available on channel allocation in our proposed system model are much greater than those in the ZFBF model. Moreover, after K > 3, the curve for ZFBPCA-GAS increases gradually while that for ZFBPCA-SAS decreases. It is because once K reached the maximum number of channels (i.e., N = 3 in our simulation), it is very difficult to find the beamforming vectors with ZFBF due to the increased channel access requirement of the SUs. Furthermore, after K > 3, the ZFBPCA-SAS tends to gener- ate more infeasible channel allocation, and hence eventually converges to a value which is away from the optimal. The 2 3 4 5 6 0 10 20 30 40 50 60 Number of SU pairs (K) Sumrate(bps/Hz) BPCA−GA BPCA−SA ZFBPCA−GAs ZFBPCA−SAs Fig. 5. Comparison of sum-rate between SU ZFBF and proposed system models with an increased number of SU pairs for N = 3 PU channels, Pmax = 1W and J = 3. 2 3 4 10 15 20 25 30 35 40 45 Number of Antennas (J) Sumrate(bps/Hz) BFCA−GA BFCA−SA ZFBFCA−GAs ZFBFCA−SAs Fig. 6. Comparison of sum-rate between SU ZFBF and proposed system models with an increased number of antennas with N = 2 PU channels, K = 4 SU pairs and Pmax = 1W. performance of achievable sum-rate with respect to the number of transmit antennas is shown in Fig. 6. The figure depicts that the sum-rates are increased with the number of antennas. It is because once J increases, the transmitter can direct the signal with better intensity to the intended receiver and at the same time further suppress the interference to the other users who are using the same channel. We further compare the proposed beamforming method with another ZFBF scenario with respect to the number of SU pairs and the number of antennas, as shown in Figs. 7 and 8, respectively. The beamforming vectors in this ZFBF scenario are determined by eliminating the interference at each PU-Rx. We call the GA and SA-based algorithms as- sociated with primary user zero-forcing beamforming, power and channel allocation as ZFBPCA-GAP and ZFBPCA-SAP, respectively. Compared to Figs. 5 and 6, similar observations can be obtained. It is obvious that our proposed algorithm can outperform the primary user ZFBF scenario regardless of the For More Details Contact G.Venkat Rao PVR TECHNOLOGIES 8143271457
  • 10. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology 10 2 3 4 5 6 0 10 20 30 40 50 60 Number of SU pairs (K) Sumrate(bps/Hz) BPCA−GA BPCA−SA ZFBPCA−GAp ZFBPCA−SAp Fig. 7. Comparison of sum-rate between PU ZFBF and proposed system models with an increased number of SU pairs for N = 3 PU channels, Pmax = 1W and J = 3. 2 3 4 10 15 20 25 30 35 40 45 Number of Antennas (J) Sumrate(bps/Hz) BFCA−GA BFCA−SA ZFBFCA−GAp ZFBFCA−SAp Fig. 8. Comparison of sum-rate between PU ZFBF and proposed system models with an increased number of antennas with N = 2 PU channels, K = 4 SU pairs and Pmax = 1W. channel allocation algorithms. E. The performance of BPCA-GA and BPCA-SA with different power budget Fig. 9 illustrates the performance of sum-rates by varying power budget, Pmax. As we increase the power budget, the achievable sum-rate also increases as shown in the figure. In fact, the sum-rate performance gap between the BPCA-GA and BPCA-SA is small and keeps approximately unchanged as we increase Pmax. It is mainly because the convergence properties of both algorithms do not change with the power. With the increased power budget, the SUs are favored to have more individual power allocation. Hence, they are rewarded with more power as long as the interference constrains are satisfied, which in return increases the sum-rate. V. CONCLUSION In this paper, a problem of joint beamforming, power and channel allocation is considered for multi-user multi-channel 0.6 0.8 1 1.2 25 30 35 40 Power (W) Sumrate(bits/Hz) BPCA−GA BPCA−SA Fig. 9. Comparison of sum-rate variation for BPCA-GA and BPCA-SA with total power budget available for fixed N = 2 PU channels, K = 4 SU pairs and J = 3 antennas. underlay cognitive radio networks. The problem is formulated as a non-convex MINLP problem, which is NP-hard. In order to reduce the computational complexity, we decouple the origi- nal problem into two sub-problems. At first, a feasible solution for beamforming vectors and power allocation is obtained for a known channel allocation by an iterative algorithm, which uses the SDR approach with an auxiliary variable. After that, GA and SA-based algorithms have been applied to determine suboptimal channel allocations. Simulation results show that BPCA-GA can obtain close-to-optimal solution with a price of high computation complexity. Whereas, BPCA-SA can sig- nificantly reduce the computational complexity with marginal performance degradation compared to BPCA-GA. Moreover, beamforming with interference tolerance capability introduced by our system model can achieve better performance than traditional ZFBF. REFERENCES [1] “Spectrum policy task force, spectrum policy task force report,” Federal Communications Commission ET, 2002. [2] S. Haykin, “Cognitive radio: brain-empowered wireless communication- s,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220, Feb. 2005. [3] R. Qiu, Z. Hu, H. Li, and M. Wicks, Cognitive Radio Communication and Networking: Principles and Practice. Wiley, 2012. [4] C. Yi and J. Cai, “Two-stage spectrum sharing with combinatorial auction and stackelberg game in recall-based cognitive radio networks,” IEEE Trans. Commun., vol. 62, no. 11, pp. 3740–3752, Nov. 2014. [5] C. Yi and J. Cai, “Multi-item spectrum auction for recall-based cognitive radio networks with multiple heterogeneous secondary users,” IEEE Trans. Veh. Technol., vol. 64, no. 2, pp. 781–792, Feb. 2015. [6] B. Van Veen and K. Buckley, “Beamforming: a versatile approach to spatial filtering,” IEEE ASSP Mag., vol. 5, no. 2, pp. 4–24, Apr. 1988. [7] S. Yiu, M. Vu, and V. Tarokh, “Interference reduction by beamforming in cognitive networks,” in Proc. IEEE Globecom, Nov. 2008, pp. 1–6. [8] R. Xie, F. Yu, and H. Ji, “Joint power allocation and beamforming with users selection for cognitive radio networks via discrete stochastic optimization,” in Proc. IEEE Globecom, Dec. 2011, pp. 1–5. [9] B. Zayen, A. Hayar, and G. Oien, “Resource allocation for cognitive radio networks with a beamforming user selection strategy,” in Signals, Syst. and Comput., Conf. Rec. of the Forty-Third Asilomar, Nov. 2009, pp. 544–549. [10] O. Abdulghfoor, M. Ismail, and R. Nordin, “Power allocation via interference compensation in underlay cognitive radio networks: A game theoretic perspective,” in Int.l Symp. Telecommun. Tech. (ISTT), Nov 2012, pp. 296–301. For More Details Contact G.Venkat Rao PVR TECHNOLOGIES 8143271457
  • 11. 0018-9545 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2015.2440412, IEEE Transactions on Vehicular Technology 11 [11] K. W. Sung, M. Tercero, and J. Zander, “Aggregate interference in secondary access with interference protection,” IEEE Commun. Lett., vol. 15, no. 6, pp. 629–631, Jun. 2011. [12] Y. Wen, S. Loyka, and A. Yongacoglu, “Asymptotic analysis of interfer- ence in cognitive radio networks,” IEEE J. Sel. Areas Commun., vol. 30, no. 10, pp. 2040–2052, Nov. 2012. [13] C. Jiang and L. Cimini, “Downlink energy-efficient multiuser beam- forming with individual sinr constraints,” in Proc. Milcom, Nov. 2011, pp. 495–500. [14] Y.-L. Liu, M.-L. Ku, and L.-C. Wang, “Joint beamforming, scheduling, and power allocation for hierarchical cellular systems,” in Proc. IEEE ICC, Jun. 2012, pp. 1773–1778. [15] M.-L. Ku, L.-C. Wang, and Y.-T. Su, “Toward optimal multiuser antenna beamforming for hierarchical cognitive radio systems,” IEEE Trans. Commun., vol. 60, no. 10, pp. 2872–2885, Oct. 2012. [16] E. Gharavol, Y.-C. Liang, and K. Mouthaan, “Robust downlink beam- forming in multiuser miso cognitive radio networks with imperfect channel-state information,” IEEE Trans. Veh. Technol., vol. 59, no. 6, pp. 2852–2860, Jul. 2010. [17] S.-H. Moon, C. Lee, S.-R. Lee, and I. Lee, “Joint user scheduling and adaptive intercell interference cancelation for miso downlink cellular systems,” IEEE Trans. Veh. Technol., vol. 62, no. 1, pp. 172–181, Jan. 2013. [18] K. Hamdi, W. Zhang, and K. Letaief, “Joint beamforming and scheduling in cognitive radio networks,” in Proc. IEEE Globecom, Nov. 2007, pp. 2977–2981. [19] K. Cumanan, R. Krishna, L. Musavian, and S. Lambotharan, “Joint beamforming and user maximization techniques for cognitive radio networks based on branch and bound method,” IEEE Trans. Wireless Commun., vol. 9, no. 10, pp. 3082–3092, Oct. 2010. [20] C. Pitz, E. Ortiz Batista, and R. Seara, “On the joint beamforming and power control in cellular systems: Algorithm and stochastic model,” IEEE Trans. Wireless Commun., vol. 13, no. 12, pp. 6943–6954, Dec. 2014. [21] C.-C. Chien, H.-J. Su, and H.-J. Li, “Joint beamforming and power allocation for MIMO relay broadcast channel with individual SINR constraints,” IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1660–1677, May 2014. [22] P. Cheng, L. Deng, H. Yu, Y. Xu, and H. Wang, “Resource allocation for cognitive networks with d2d communication: An evolutionary ap- proach,” in Proc. IEEE WCNC, Apr. 2012, pp. 2671–2676. [23] A. Ghazanfari, A. Tolli, and H. Pennanen, “Sum power minimization for cellular systems with underlay d2d communications,” in Proc. CROWNCOM, Jun. 2014, pp. 45–50. [24] K. Illanko, K. Raahemifar, and A. Anpalagan, “Sub-channel and power allocation for multiuser OFDM with rate constraints using genetic algorithm,” in Proc. IEEE PacRim, Aug. 2009, pp. 571–575. [25] B. Ye, M. Nekovee, A. Pervez, and M. Ghavami, “TV white space channel allocation with simulated annealing as meta algorithm,” in Proc. CROWNCOM, Jun. 2012, pp. 175–179. [26] N. Noordin, V. Zuniga, A. El-Rayis, N. Haridas, A. Erdogan, and T. Arslan, “Uniform circular arrays for phased array antenna,” in Antennas and Propagation Conf. (LAPC), Nov. 2011, pp. 1–4. [27] B. H. Wang, H. T. Hui, and M.-S. Leong, “Decoupled 2d direction of ar- rival estimation using compact uniform circular arrays in the presence of elevation-dependent mutual coupling,” IEEE Trans. Antennas Propag., vol. 58, no. 3, pp. 747–755, Mar. 2010. [28] Y. Tachwali, B. Lo, I. Akyildiz, and R. Agusti, “Multiuser resource allocation optimization using bandwidth-power product in cognitive radio networks,” IEEE J. Sel. Areas Commun., vol. 31, no. 3, pp. 451– 463, Mar. 2013. [29] L. Vandenberghe and S. Boyd, “Semidefinite programming,” SIAM Review, vol. 38, no. 1, pp. 49–95, 1996. [30] Z.-Q. Luo, W.-K. Ma, A.-C. So, Y. Ye, and S. Zhang, “Semidefinite relaxation of quadratic optimization problems,” IEEE Signal Processing Mag., vol. 27, no. 3, pp. 20–34, May 2010. [31] I. CVX Research, “CVX: Matlab software for disciplined convex programming, version 2.0,” http://cvxr.com/cvx, Aug. 2012. [32] S. Boyd and L. Vandenberghe. Cambridge University Press, 2004. [33] P. van Laarhoven and E. Aarts, Simulated Annealing: Theory and Appli- cations, ser. Ellis Horwood series in mathematics and its applications. Springer, 1987. [34] S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, “Optimization by simulated annealing,” Science, vol. 220, no. 4598, pp. 671–680, 1983. [35] S. Chantaraskul and K. Moessner, “Implementation of a genetic algo- rithm based decision making framework for opportunistic radio,” IET Commun., vol. 4, no. 5, pp. 495–506, Mar. 2010. [36] G. K. Soon, T. T. Guan, C. K. On, R. Alfred, and P. Anthony, “A comparison on the performance of crossover techniques in video game,” in Proc. IEEE ICCSCE, Nov. 2013, pp. 493–498. [37] A. J. Monticelli, R. Romero, and E. N. Asada, Fundamentals of Simulated Annealing. John Wiley and Sons, Inc., 2007. [38] D. Thompson and G. Bilbro, “Sample-sort simulated annealing,” IEEE Trans. Syst. Man Cybern. B, Cybern., vol. 35, no. 3, pp. 625–632, Jun. 2005. Suren Dadallage received the B.Sc. degree in Elec- tronics and Telecommunication Engineering from University of Moratuwa, Sri Lanka, in 2010, and M.Sc. degree in Electrical and Computer Engineer- ing from University of Manitoba, Winnipeg, MB, Canada, in 2015. His research interests include beamforming algorithms and radio resource manage- ment for cognitive radio networks. Changyan Yi received the B.Sc. degree from Guilin University of Electronic Technology, China, in 2012, and M.Sc. degree from University of Manitoba, Win- nipeg, MB, Canada, in 2014. He is currently working toward the Ph.D. degree in electrical and computer engineering, University of Manitoba. He was award- ed Edward R. Toporeck Graduate Fellowship in En- gineering in 2014, and University of Manitoba Grad- uate Fellowship (UMGF) in 2015-2018. His research interests include algorithmic game, optimization and queueing theories for radio resource management, prioritized scheduling and network economics in wireless communications. Jun Cai (M’04, SM’14) received the B.Sc. and M.Sc. degrees from Xi’an Jiaotong University, X- i’an, China, in 1996 and 1999, respectively, and the Ph.D. degree from the University of Waterloo, ON, Canada, in 2004, all in electrical engineering. From June 2004 to April 2006, he was with McMaster University, Hamilton, ON, as a Natural Sciences and Engineering Research Council of Canada Postdoc- toral Fellow. Since July 2006, he has been with the Department of Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada, where he is currently an Associate Professor. His current research inter- ests include energy-efficient and green communications, dynamic spectrum management and cognitive radio, radio resource management in wireless communications networks, and performance analysis. Dr. Cai served as the Technical Program Committee Co-Chair for the IEEE Vehicular Technology Conference 2012 Fall Wireless Applications and Services Track, the IEEE Global Communications Conference (Globecom) 2010 Wireless Communi- cations Symposium, and International Wireless Communications and Mobile Computing (IWCMC) Conference 2008 General Symposium; the Publicity Co-Chair for IWCMC in 2010, 2011, 2013, and 2014; and the Registration Chair for the First International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine) in 2005. He also served on the editorial board of the Journal of Computer Systems, Networks, and Communications and as a Guest Editor of the special issue of the Association for Computing Machinery Mobile Networks and Applications. He received the Best Paper Award from Chinacom in 2013, the Rh Award for outstanding contributions to research in applied sciences in 2012 from the University of Manitoba, and the Outstanding Service Award from IEEE Globecom in 2010. For More Details Contact G.Venkat Rao PVR TECHNOLOGIES 8143271457