• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-14
Yanan Wu; Nian Li; Xiangyong Zeng

In this paper, a class of $p$ -ary 3-weight linear codes and a class of binary 2-weight linear codes are proposed respectively by virtue of the properties of the perfect nonlinear functions over $\mathbb {F}_{p^{m}}$ and $(m,s)$ -bent functions from $\mathbb {F}_{2^{m}}$ to $\mathbb {F}_{2^{s}}$ , where $p$ is an odd prime and $m, s$ are positive integers. The weight distributions are completely determined by the sign of the Walsh transform of weakly regular bent functions and the size of the preimage of the employed $(m,s)$ -bent functions at the zero point, respectively. As a special case, a class of optimal linear codes meeting Griesmer bound is obtained from our construction.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-09-27
Damian Dudzicz; Silas L. Fong; Ashish Khisti

This paper presents a new construction of error correcting codes which achieves optimal recovery of a streaming source over a packet erasure channel. The channel model considered is the sliding-window erasure model, with burst and arbitrary losses, introduced by Badr et al. We present a simple construction, when the rate of the code is at least 1/2, which achieves optimal error correction in this setup. Our proposed construction is explicit and systematic. It uses off-the-shelf maximum distance separable (MDS) codes and maximum rank distance (MRD) Gabidulin block codes as constituent codes and combines them in a simple manner. This is in contrast to other recent works, where the construction involves a careful design of the generator or parity check matrix from first principles. The field size requirement which depends on the constituent MDS and MRD codes is also analyzed.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-04
Lingchen Huang; Huazi Zhang; Rong Li; Yiqun Ge; Jun Wang

In this paper, we investigate an artificial-intelligence (AI) driven approach to design error correction codes (ECC). Classic error-correction code design based upon coding-theoretic principles typically strives to optimize some performance-related code property such as minimum Hamming distance, decoding threshold, or subchannel reliability ordering. In contrast, AI-driven approaches, such as reinforcement learning (RL) and genetic algorithms, rely primarily on optimization methods to learn the parameters of an optimal code within a certain code family. We employ a constructor-evaluator framework, in which the code constructor can be realized by various AI algorithms and the code evaluator provides code performance metric measurements. The code constructor keeps improving the code construction to maximize code performance that is evaluated by the code evaluator. As examples, we focus on RL and genetic algorithms to construct linear block codes and polar codes. The results show that comparable code performance can be achieved with respect to the existing codes. It is noteworthy that our method can provide superior performances to classic constructions in certain cases (e.g., list decoding for polar codes).

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-18
Liyuan Song; Qin Huang; Zulin Wang

This paper analyzes and explicitly constructs quasi-cyclic (QC) codes for correcting multiple bursts via matrix transformations. Our analysis demonstrates that the multiple-burst-correction capability of QC codes is determined by sub-matrices in the diagonal of their transformed parity-check matrices. By well designing these sub-matrices, the proposed QC codes are able to achieve optimal or asymptotically optimal multiple-burst-correction capability. Moreover, it proves that these codes can be QC low-density parity-check (QC-LDPC) codes, if the diagonal sub-matrices of their transformed parity-check matrices are Hadamard powers of base matrices. Analysis and simulation results show that our QC-LDPC codes perform well over not only random symbol error/erasure channels, but also burst channels.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-07
Hee-Youl Kwak; Dae-Young Yun; Jong-Seon No

In research on spatially-coupled low-density parity-check (SC-LDPC) codes, rate-loss of SC-LDPC codes is one of the main issues to be addressed. One way to mitigate the rate-loss is to attach additional variable nodes with an irregular degree distribution, where the degree distribution is optimized with a constraint that the belief propagation (BP) threshold should not be degraded by attaching variable nodes. However, it is observed that the degree distribution obtained with the BP threshold constraint induces degradation of the finite-length performance. In order to address the problem, we propose new optimization methods to attach additional variable nodes while minimizing performance degradation. The proposed optimization methods are based on several design techniques including the scaling law, local threshold, expected graph evolution, differential evolution algorithms, the use of a protograph structure, and puncturing codewords. Using the optimized structure for additional variable nodes, the rate-loss of SC-LDPC codes can be reduced by more than 53% without sacrificing the finite-length performance. It is also shown that the rate-loss mitigation can be translated into a performance improvement if the proposed and the conventional SC-LDPC codes are compared at the same code rate.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-18
Zehui Chen; Clayton Schoeny; Lara Dolecek

Resistive random-access memory (ReRAM) with the crossbar structure is one promising candidate to be used as a next generation non-volatile memory device. In a crossbar ReRAM, in which a memristor is positioned on each row-column intersection, the sneak-path problem is one of the main challenges for a reliable readout. The sneak-path problem can be solved with additional selection devices. When some selection devices fail short, the sneak-path problem re-occurs. The re-occurred sneak-path problem is addressed in this paper. The re-occurred sneak-path event can be described combinatorially and its adverse effect can be modeled as a parallel interference. Based on a simple pilot construction, we probabilistically characterize the inter-cell dependency of the re-occurred sneak-path events. Utilizing this dependency, we propose adaptive thresholding schemes for resistive memory readout using side information provided by pilot cells. This estimation theoretic approach effectively reduces the bit-error rate while maintaining low redundancy overhead and low complexity.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-10
Abdelmohsen Ali; Walaa Hamouda

In this paper, we maximize the benefits from the ultra low power wideband sensing approach based on FFT-based 1-bit quantization by addressing the practical limitations to this method. Unlike the conventional architecture that assumes a fully synchronized and coordinated Primary User (PU) network, the proposed system relaxes these limitations by providing an analytical framework for an uncoordinated asynchronous FFT-based 1-bit quantization system. For this system, we analytically derive the sub-band power which is the main parameter for the closed-form expressions representing the false alarm and detection probabilities. Further, improving the system performance through cooperative sensing is considered. While respecting the decision fusion cooperation, the optimum threshold for the generalized FFT-based 1-bit quantization system is derived such that the aggregate error rate is minimized. In addition to its significant power and complexity reduction, the presented analysis expands the use of the FFT-based 1-bit quantization wideband sensing approach in practical deployments. The sensing performance and the analytical results are assessed through comparisons with respective results from computer simulations.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-09-30
Yunlong Wang; Ying Wu; Yuan Shen

The omnipresent signals of opportunity (SOOP) enable an effective way for passive target tracking using multiple agents. However, cooperative target tracking via non-cooperative SOOP is challenging since the positions of agents are not precisely known. In this paper, we determine the performance bounds of cooperative tracking using SOOP by multiple asynchronous agents equipped with antenna arrays. The Fisher information matrix of joint target and agent positions can be decomposed as the sum of the information from SOOP and self-localization networks, where the correlation of signals introduces an additional Fisher information component and the multipath effect is characterized by path-overlap coefficients. We demonstrate how the location information coupling between the target and agents affects localization accuracy and how the cooperation among agents improves tracking performance. Moreover, the angular information is shown to mitigate multipath and asynchronous effects by spatiotemporal separation and time-independent measurements, respectively. Then we propose a distributed hybrid belief propagation based algorithm for cooperative tracking and network synchronization via likelihood consensus. Finally, numerical results validate our theoretical analysis and the performance of the proposed algorithm.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-07
Nir Shlezinger; Emeka Abakasanga; Ron Dabora; Yonina C. Eldar

Non-orthogonal communications play an important role in future digital communication architectures. In such scenarios, the received signal is corrupted by an interfering communications signal, which is much stronger than the thermal noise, and is often modeled as a cyclostationary process in continuous-time. To facilitate digital processing, the receiver typically samples the received signal synchronously with the symbol rate of the information signal . If the period of the statistics of the interference is synchronized with that of the information signal, then the sampled interference is modeled as a discrete-time (DT) cyclostationary random process. However, in the common interference scenario, the period of the statistics of the interference is not necessarily synchronized with that of the information signal. In such cases, the DT interference may be modeled as an almost cyclostationary random process. In this work we characterize the capacity of DT memoryless additive noise channels in which the noise arises from a sampled cyclostationary Gaussian process. For the case of synchronous sampling, capacity can be obtained in closed form. When sampling is not synchronized with the symbol rate of the interference, the resulting channel is not information stable, thus classic information-theoretic tools are not applicable. Using information spectrum methods, we prove that capacity can be obtained as the limit of a sequence of capacities of channels with additive cyclostationary Gaussian noise. Our results allow to characterize the effects of changes in the sampling rate and sampling time offset on the capacity of the resulting DT channel. In particular, it is demonstrated that minor variations in the sampling period, such that the resulting noise switches from being synchronously-sampled to being asynchronously-sampled, can substantially change the capacity.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-04
Qianqian Yang; Parisa Hassanzadeh; Deniz Gündüz; Elza Erkip

Content delivery in a multi-user cache-aided broadcast network is studied, where a server holding a database of correlated contents communicates with the users over a Gaussian broadcast channel (BC). The minimum transmission power required to satisfy all possible demand combinations is studied, when the users are equipped with caches of equal size. Two centralized caching schemes are proposed, both of which not only utilize the user’s local caches, but also exploit the correlation among the contents in the database. The first scheme implements uncoded cache placement and delivers coded contents to users using superposition coding. The second scheme, which is proposed for small cache sizes, places coded contents in users’ caches and jointly encodes the cached contents of users and the messages targeted at them. The performance of the proposed schemes, which provide upper bounds on the required transmit power for a given cache capacity, is characterized. The scheme based on coded placement improves upon the first one for small cache sizes, and under certain conditions meets the uncoded placement lower bound. A lower bound on the required transmit power is also presented assuming uncoded cache placement. Our results indicate that exploiting the correlations among the contents in a cache-aided Gaussian BC can provide significant energy savings.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-10
Thomas Varela Santana; Richard Combes; Mari Kobayashi

We consider a Device-to-Device (D2D) aided multicast channel, where a base station (BS) wishes to convey a common message to many receivers and these receivers cooperate with each other. We analyze the performance of a two-phase cooperative multicasting scheme requiring only statistical channel knowledge at the BS. Our analysis reveals that, as the number of receivers K grows, the two-phase scheme guarantees an average multicast rate of $\frac {1 }{ 2} \log _{2}(1 + \beta \ln \text {K})$ with high probability for any $\beta < \beta ^\star$ where $\beta ^\star$ depends on the network topology. This scheme undergoes a phase transition at threshold $\beta ^\star \ln \text {K}$ where transmissions are successful/unsuccessful with high probability when the Signal to Noise Ratio (SNR) is above/below this threshold. We also analyze the multicast outage rate when a target joint decoding probability is fixed. Finally, we propose two enhanced schemes by optimally allocating the time resource between two phases and combining received signals from two phases. 1 1 A part of the results presented in the current manuscript has been presented at the IEEE International Symposium on Information Theory 2018 [1]. The results are published in Chapter 3 of the P.h.D. Thesis of the first author [2].

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-29
Jie Ding; Daiming Qu; Jinho Choi

Massive MIMO based grant-free random access (mGFRA) is a promising RA technique for massive access with low signaling overhead. However, due to a limited orthogonal preamble size, preamble collision is a key factor that constrains the success probability of mGFRA. In this paper, we examine the potential of applying non-orthogonal preambles to mitigate the issue, where two typical non-orthogonal sequences, i.e., Gaussian distribution sequences and Zadoff-Chu (ZC) sequences, are taken into account. Asymptotic behaviors of the success probabilities with the non-orthogonal preamble sequences are analyzed and compared using derived closed-forms. Through the analysis we reveal that ZC sequences outperform Gaussian ones. However, though non-orthogonal sequences are able to reduce or even alleviate the preamble collision, they do not necessarily provide better performance than the orthogonal counterpart. In addition, regarding orthogonal sequences as a single-root case of ZC sequences, we show that there exists an optimal number of ZC roots that maximizes the success probability for mGFRA, which is low-bounded by orthogonal baseline. Simulation results evaluate the performance of non-orthogonal sequences in mGFRA under various practical system parameters, and validate our analysis.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-29
Prem Singh; Himanshu B. Mishra; Aditya K. Jagannatham; K. Vasudevan; Lajos Hanzo

This paper analyses the performance of filter bank multicarrier (FBMC) signaling in conjunction with offset quadrature amplitude modulation (OQAM) in multi-user (MU) massive multiple-input multiple-output (MIMO) systems. Initially, closed form expressions are derived for tight lower bounds corresponding to the achievable uplink sum-rates for FBMC-based single-cell MU massive MIMO systems relying on maximum ratio combining (MRC), zero forcing (ZF) and minimum mean square error (MMSE) receiver processing with/without perfect channel state information (CSI) at the base station (BS). This is achieved by exploiting the statistical properties of the intrinsic interference that is characteristic of FBMC systems. Analytical results are also developed for power scaling in the uplink of MU massive MIMO-FBMC systems. The above analysis of the achievable sum-rates and corresponding power scaling laws is subsequently extended to multi-cell scenarios considering both perfect as well as imperfect CSI, and the effect of pilot contamination. The delay-spread-induced performance erosion imposed on the linear processing aided BS receiver is numerically quantified by simulations. Numerical results are presented to demonstrate the close match between our analysis and simulations, and to illustrate and compare the performance of FBMC and traditional orthogonal frequency division multiplexing (OFDM)-based MU massive MIMO systems.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-18
Wei Wang; Wei Zhang

Spatial modulation is an efficient transmission scheme for RF-chain limited MIMO systems. In this paper, we design a beam-switching based spatial modulation for mmWave MIMO uplink systems. At user side, a power iteration based algorithm is proposed to generate spatial symbols under the constant modulus constraint. With the generated spatial codebook, the optimal transmission mode is determined. At base station side, a round-robin path selection algorithm is proposed to select paths that are separated in angle of arrival. Inter-user interference is then suppressed by constraining the power of the received spatial symbols over selected paths only. Finally, ordered successive interference cancelation is applied to further reduce interference among users. Numerical results show that the proposed beam-switching based spatial modulation is superior to transmission over the strongest propagation path and is able to yield a satisfactory error performance in mmWave MIMO uplink.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-21
Ye Fan; Xiaodong Wang; Xuewen Liao

We investigate the secure degrees of freedom (SDoF) for the two-way $2\times 2\times 2$ MIMO interference channel (IC) under three wiretap models, i.e., the confidential messages (CM) model, the untrusted relays (UR) model, and the combined CM and UR (CM-UR) model. For the general case of arbitrary antenna configuration under each wiretap model, we derive the upper bound on SDoF with Markov chain and secrecy constraints, and obtain the achievability schemes with designed interference neutralization, cooperative jamming, and interference alignment schemes. To gain insight on these bounds, we further consider the special case where each user node has $M$ antennas and each relay node has $N$ antennas, and highlight the modification process when achieving the maximum SDoF. For such special case, we show that the optimum SDoF of the CM model is achieved in the regimes $M\ge N$ and $M < ({N}/{2})$ ; and for the UR model and CM-UR model, the optimum SDoF is achieved in the regimes $N\le ({M}/{2})$ , $N > 2M$ , and $N=M$ .

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-29
Sheng Chen; Soon Xin Ng; Emad F. Khalaf; Ali Morfeq; Naif D. Alotaibi

For the multiple-input multiple-output (MIMO) uplink employing high-order quadrature amplitude modulation (QAM) signaling and with nonlinear high power amplifiers (HPAs) at mobile users’ transmitters, the existing multiuser detection methods can no longer be applied. We propose a novel nonlinear multiuser detection scheme for the nonlinear MIMO uplink. Specifically, we adopt an effective B-spline parameterization of the nonlinear transmit HPAs and derive an efficient and accurate algorithm to identify the nonlinear MIMO uplink channel, including the nonlinear B-spline model of the nonlinear transmit HPAs and the estimate of the linear MIMO channel matrix. Moreover, as the direct result of this nonlinear MIMO channel identification, the B-spline inverse model of nonlinear transmit HPAs can readily be identified. The nonlinear multiuser detection can be effectively implemented by the zero-forcing linear detection based on the estimated linear MIMO channel and followed by compensating the nonlinear distortion of the nonlinear transmit HPAs based on the estimated B-spline inverse model. An extensive simulation investigation is performed to demonstrate the effectiveness of our proposed nonlinear multiuser detection scheme for nonlinear MIMO uplink with high-order QAM signaling.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-15

In this paper, we propose a novel low-complexity, near-optimal soft-input soft-output detector for $\text {N}\times \text {M}$ multiple-input multiple-output (MIMO) systems. Our algorithm is based on the combination of minimum mean square error decision feedback equalization (MMSE-DFE) and conditional optimization. In a round-robin fashion, one symbol is detected using exhaustive search in such a way that all $\text {N}\times (\text {M}-1)$ submatrices of the baseband channel matrix are considered and the one with the best metric is chosen. This search over all columns of the channel matrix, which can be performed in parallel, has the advantages of improving the performance of the hard-output version of the detector, and refining the list of candidates for efficient implementation of the soft-output detector for MIMO systems with error correcting codes. In particular, it is shown that the error performance of the soft-output system is comparable to that of the list sphere decoder (LSD) but with much smaller list size, and hence smaller complexity than the latter. We also analyze the performance and complexity of the proposed algorithm and discuss different techniques to further reduce its complexity without affecting the performance. Finally, the obtained theoretical results are validated via simulations.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-07
Luca Sanguinetti; Emil Björnson; Jakob Hoydis

Since the seminal paper by Marzetta from 2010, Massive MIMO has changed from being a theoretical concept with an infinite number of antennas to a practical technology. The key concepts are adopted into the 5G New Radio Standard and base stations (BSs) with $M=64$ fully digital transceivers have been commercially deployed in sub-6GHz bands. The fast progress was enabled by many solid research contributions of which the vast majority assume spatially uncorrelated channels and signal processing schemes developed for single-cell operation. These assumptions make the performance analysis and optimization of Massive MIMO tractable but have three major caveats: 1) practical channels are spatially correlated; 2) large performance gains can be obtained by multicell processing, without BS cooperation; 3) the interference caused by pilot contamination creates a finite capacity limit, as $M\to \infty$ . There is a thin line of papers that avoided these caveats, but the results are easily missed. Hence, this tutorial article explains the importance of considering spatial channel correlation and using signal processing schemes designed for multicell networks. We present recent results on the fundamental limits of Massive MIMO, which are not determined by pilot contamination but the ability to acquire channel statistics. These results will guide the journey towards the next level of Massive MIMO, which we call “Massive MIMO 2.0”.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-15
Jiliang Zhang; Kyeong Jin Kim; Andrés Alayón Glazunov; Yang Wang; Liqin Ding; Jie Zhang

A novel generalized polarization-space modulation (GPSM) is proposed for polarized multiple-input multiple-output (MIMO) systems with a limit number of radio frequency (RF) chains. In the spatial domain, multiple dual-polarized (DP) transmit antennas are activated, and then combinations of those indices are used to convey information. While in the polarization domain, depending on the random input bits, only one polarization state is selected for each active DP transmit antenna to transmit information following the rule of the polarized shift keying. At the receiver, the maximum likelihood detector is employed as a benchmark to detect information bits being used to select the polarization state and activated DP antennas. In the detector, imperfect channel state information (CSI) is taken into account. Two less computationally complex detectors, i.e., a linear detector and a sphere decoding (SD) detector are proposed to relieve the computational burden. Sacrificing the average bit error probability (ABEP) performance, the proposed linear detector can reduce the computational complexity significantly. The proposed SD detector can achieve the optimum ABEP performance, while reducing computational complexity by reducing the search space. A closed-form union upper bound (UUB) on the ABEP of the GPSM system with imperfect CSI at the receiver is analytically derived and validated through simulations. From the UUB, a loose asymptotic bound on the ABEP, which sheds light on deriving the diversity gain and the coding gain, is derived. Numerical results show that the signal-to-noise ratio loss caused by increasing the number of transmit antennas is less than 3 dB while the spectral efficiency is increased by 7 b/z/Hz. Therefore, the GPSM can be a promising candidate of down link massive MIMO systems to achieve a high spectral efficiency with a limit number of RF chains.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-11
Ru-Han Chen; Jian Zhang; Yan-Yu Zhang

We consider an intensity-modulated (IM) communication system in the presence of Gaussian noise. To improve the reliability of such a system, a space-only constellation-optimal structure was proposed by Zhang under a peak and an average power constraint. However, how to utilize time resource to design signals has been an unsolved problem. In this paper, we design a complexity-efficient coded modem for IM signals under a peak- and an average-power constraint in finite-blocklength regimes. The proposed modem consists of a lattice-based multidimensional constellation bounded by the optimal shaping region, decomposable constellation mapping and demapping based on the fast Fourier transform (FFT), and a fast demodulator with near maximum-likelihood performance. To the authors’ best knowledge, for the first time, the FFT and the inverse FFT (IFFT) algorithms are used for constellation mapping to reduce the involved complexity. Both theoretical analysis and Monte Carlo simulation results show that our proposed modem has significant signal-to-noise ratio gains and can support flexible-rate transmission compared to the one-dimensional optimal constellation with Gray labeling.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-05
Josep Font-Segura; Alfonso Martinez; Albert Guillén i Fàbregas

This paper proposes an efficient simulation method based on importance sampling to estimate the random-coding error probability of coded modulation. The technique is valid for complex-valued modulations over Gaussian channels, channels with memory, and naturally extends to fading channels. The simulation method is built on two nested importance samplers to respectively estimate the pairwise error probability and generate the channel input and output. The effect of the respective number of samples on the overall bias and variance of the estimate of the error probability is characterized. For a memoryless channel, the estimator is shown to be consistent and with a small variance, growing with the square root of the code length, rather than the exponential growth of a standard Monte Carlo estimator.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-15
Fan Xu; Meixia Tao; Tiankai Zheng

This paper studies caching in $(K\!+\!L\!-\!1)\!\times \!K$ partially connected wireless linear networks, where each of the $K$ receivers locally communicates with $L$ out of the $K\!+\!L\!-\!1$ transmitters, and caches are at all nodes. The goal is to design caching and delivery schemes to reduce the transmission latency, by using normalized delivery time (NDT) as the performance metric. For small transmitter cache size (any $L$ transmitters can collectively store the database just once), we propose a cyclic caching strategy so that each of every $L$ consecutive transmitters caches a distinct part of each file; the delivery strategy exploits coded multicasting and interference alignment by introducing virtual receivers. The obtained NDT is within a multiplicative gap of 2 to the optimum in the entire cache size region, and optimal in certain region. For large transmitter cache size (any $L$ transmitters can collectively store the database for multiple copies), we propose a modified caching strategy so that every bit is repeatedly cached at consecutive transmitters; the delivery strategy exploits self-interference cancellation and interference neutralization. By combining these schemes, the NDT is optimal in a larger region. We also extend our results to linear networks with heterogeneous receiver connectivity and partially connected circular networks.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-09-27
Howard H. Yang; Zuozhu Liu; Tony Q. S. Quek; H. Vincent Poor

Motivated by the increasing computational capacity of wireless user equipments (UEs), e.g., smart phones, tablets, or vehicles, as well as the increasing concerns about sharing private data, a new machine learning model has emerged, namely federated learning (FL), that allows a decoupling of data acquisition and computation at the central unit. Unlike centralized learning taking place in a data center, FL usually operates in a wireless edge network where the communication medium is resource-constrained and unreliable. Due to limited bandwidth, only a portion of UEs can be scheduled for updates at each iteration. Due to the shared nature of the wireless medium, transmissions are subjected to interference and are not guaranteed. The performance of FL system in such a setting is not well understood. In this paper, an analytical model is developed to characterize the performance of FL in wireless networks. Particularly, tractable expressions are derived for the convergence rate of FL in a wireless setting, accounting for effects from both scheduling schemes and inter-cell interference. Using the developed analysis, the effectiveness of three different scheduling policies, i.e., random scheduling (RS), round robin (RR), and proportional fair (PF), are compared in terms of FL convergence rate. It is shown that running FL with PF outperforms RS and RR if the network is operating under a high signal-to-interference-plus-noise ratio (SINR) threshold, while RR is more preferable when the SINR threshold is low. Moreover, the FL convergence rate decreases rapidly as the SINR threshold increases, thus confirming the importance of compression and quantization of the update parameters. The analysis also reveals a trade-off between the number of scheduled UEs and subchannel bandwidth under a fixed amount of available spectrum.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-07
Renzhi Yuan; Jianshe Ma; Ping Su; Yuhan Dong; Julian Cheng

Monte-Carlo models are analyzed for multiple scattering channels in optical wireless communications. It is demonstrated that the system impulse response function can be obtained by Monte-Carlo integration model. The convergence performance for the Monte-Carlo integration model is analyzed and improved by introducing different sampling methods. The simulation results show that the gamma function model for channel impulse response function can only be applied to the cases where the common volume between the transmitted light beam and the receiving field-of-view is open. Numerical simulation suggests that for a three-order scattering case, the computation efficiency of the Monte-Carlo integration model based on partial importance sampling is about 12 times of the original Monte-Carlo integration model based on uniform sampling, and 5.6 times of the widely used Monte-Carlo simulation model. The numerical results also show that the Monte-Carlo integration model based on partial importance sampling has higher computation efficiency than the Monte-Carlo simulation model in a higher-order scattering communication scenario.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-11
Hao Xu; Giuseppe Caire; Wei Xu; Ming Chen

This paper investigates the secrecy rate performance of a device-to-device (D2D) underlaid cellular network with an eavesdropper. Both the base station (BS) and the eavesdropper are assumed to have multiple antennas and apply minimum mean-square error (MMSE) receivers for detection. Different from the literature, mainly focused on enhancing the security of cellular communication using D2D jammers while neglected the secrecy performance of D2D communication, this paper aims to maximize the instantaneous weighted sum secrecy rate (IWSSR) of both cellular and D2D users. The maximization of IWSSR with respect to the transmit power of mobile users is a non-convex problem with non-differentiable objective function. In order to obtain efficient feasible solutions, we transform the IWSSR maximization problem to a min-max problem, relax the non-negative operator in secrecy rate expressions and then propose an alternative algorithm to solve the remaining problem. Simulation results show that the IWSSR of the network can be effectively increased by the proposed algorithm and, compared with exhaustive search (ES), the proposed algorithm performs very close to ES and involves much less computational complexity.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-05
Nader Sanandaji; Abolfazl Falahati

The capability of exploiting Orthogonal Space-Time Block Codes (OSTBC) for increasing physical layer security of wireless systems is studied. A technique named “hidden OSTBC” is introduced, in which, a pseudorandom sequence is utilized by both transmitter and legitimate receiver to provide required security. Traditionally, employing pseudorandom sequences with methods such as spread spectrum or cooperative jamming involves huge amount of bandwidth or transmission power constraints, which are major challenges for wireless systems. Without requiring additional power or bandwidth, this study is designed to address exploitation of a pseudorandom antipodal sequence as a precoder. Elements of this sequence are multiplied to each antenna’s transmitting symbol, and legitimate receiver employs the same sequence upon its combining rule. Mathematical analysis and simulations prove that an eavesdropper who does not know the pseudorandom sequence suffers from a degraded equivalent channel. Security enhancement is studied by investigating eavesdropper’s higher error rate compared with that of legitimate receiver. Also, by employing lattice-based codebooks, a lower-bound is drawn for secrecy capacity, implying the achievability of nearly perfect secrecy regarding information theoretic analysis.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-17
Yi Zhou; Cunhua Pan; Phee Lep Yeoh; Kezhi Wang; Maged Elkashlan; Branka Vucetic; Yonghui Li

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-01
Hui-Ming Wang; Yan Zhang; Xu Zhang; Zhetao Li

The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives rise to the confidential information leakage challenge in both civilian and military environments. The security and covert communication problems for a pair of terrestrial nodes against UAV surveillance are considered in this paper. To overcome the information leakage and increase the transmission reliability, a multi-hop relaying strategy is deployed. We aim to optimize the throughput by carefully designing the parameters of the multi-hop network, including the coding rates, transmit power, and required number of hops. In the secure transmission scenario, the expressions of the connection probability and secrecy outage probability of an end-to-end path are derived and the closed-form expressions of the optimal transmit power, transmission and secrecy rates under a fixed number of hops are obtained. In the covert communication problem, under the constraints of the detection error rate and aggregate power, the sub-problem of transmit power allocation is a convex problem and can be solved numerically. Simulation shows the impact of network settings on the transmission performance. The trade-off between secrecy/covertness and efficiency of the multi-hop transmission is discussed which leads to the existence of the optimal number of hops.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-15
Kisong Lee; Jun-Pyo Hong; Hyowoon Seo; Wan Choi

In this paper, we propose a resource management method based on deep learning, which controls both the transmit power and the power splitting ratio to maximize the sum rate with low computational complexity in D2D networks with energy harvesting requirements. The introduction of the energy harvesting requirements to D2D networks makes it hard to design an effective resource management solution since the treatment of interference signals should be completely different from the conventional resource management focusing only on the rate maximization. To deal with drawbacks of the conventional deep learning-based approach, we propose a new training algorithm suitable for our resource management problem. Numerical simulations show that the proposed learning-based method outperforms the benchmark methods, which are derived from some relevant works, in most situations and achieves performances comparable to an exhaustive search in terms of the sum rate and energy outage probability. Although the conventional optimization-based method is derived to achieve the asymptotic optimal performance for a large network, the proposed deep learning method is shown to achieve almost the same performance with much lower computational complexity. Furthermore, simulation results offer new insights to the impact of the energy harvesting requirements on the behaviour of the optimal resource management.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-15
Marie-Josepha Youssef; Joumana Farah; Charbel Abdel Nour; Catherine Douillard

In this paper, we study the traffic-aware resource allocation problem for a system with mixed traffic types. The considered framework encompasses real-time (RT) users having strict QoS requirements (in terms of amount of data and latency), and best-effort (BE) users for which the system tries to strike a balance between throughput and fairness. The resource allocation problem is studied in different contexts: orthogonal and non-orthogonal multiple access (OMA and NOMA respectively) in either centralized or distributed antenna systems (CAS and DAS respectively). Following the formulation of the resource optimization problem, we propose a low complexity suboptimal solution based on matching theory for each system context. We also propose an iterative approach to determine the number of subbands per antenna for the DAS contexts. The proposed techniques aim at guaranteeing the requirements of RT users while maximizing the utility function of BE users. Simulation results show that the proposed allocation method based on matching theory greatly outperforms a previously proposed greedy approach, especially in terms of RT users satisfaction.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-07
Fang Liu; Kenneth W. Shum; Wing Shing Wong

We consider a single-hop wireless sensor network in which each sensor node has an individual elastic data stream to transmit to each other node. We refer to this traffic pattern as unicast in this paper. The network has multiple slotted channels available for the data transmissions. To guarantee successful unicast within a bounded delay, we consider deterministic schemes that pre-assign each node a periodic schedule sequence to schedule transmitting and receiving at each time slot. The sequence period should be minimized since it upper bounds the unicast delay. We have investigated both synchronous TDMA sequences and asynchronous sequences. Since accurate time synchronization is difficult to achieve in sensor networks, we mainly present analysis and design for asynchronous sequences. In this paper, for a group-based channel assignment, we present a lower bound on the common period and propose a sequence construction method by which the period can achieve the same order as the lower bound. We also analyze optimal transmitting and receiving probabilities for two random schemes and compare their frequency utilization efficiency. Finally, unicast delay and energy consumption performance are compared by simulations.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-22
Mohamed Hassanin; Javier Garcia-Frias

This paper discuses the application of Analog Joint Source Channel Coding (JSCC) to Non-Linear Channels, including underwater acoustic channels. Different from traditional digital communication systems, which utilize a source code followed by a channel code, Analog JSCC systems perform coding via a single mapping. We will focus on a particular class of analog codes called space filling curves. The underwater acoustic channel is typically non-linear with Inter-Symbol Interference (ISI). We will first study a simplified version assuming no ISI, developing a scheme to adapt space filling curves to this environment, and studying the theoretical limits. Then, we will extend the analysis to the end-to-end acoustic channel (including ISI), discussing the proposed system in this case. Finally, we will present simulation results of the proposed communication system for the simplified (no ISI) and end-to-end channels.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-31
Qing Li; Yang Chen

We explore the connections between rate distortion/lossy source coding and deep learning models, the Restricted Boltzmann Machines (RBMs) and Deep Belief Networks (DBNs). We show that rate distortion is a function of the RBM log partition function and that RBM/DBN can be used to learn the rate distortion approaching posterior as in the Blahut-Arimoto algorithm. We propose an algorithm for lossy compressing of binary sources. The algorithm consists of two stages, a training stage that learns the posterior with training data of the same class as the source, and a compression/reproduction stage that is comprised of a lossless compression and a lossless reproduction. Theoretical results show that the proposed algorithm achieves the optimum rate distortion function for stationary ergodic sources asymptotically. Numerical experiments show that the proposed algorithm outperforms the reported best results.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-10
Chen Chen; Gongpu Wang; Panagiotis D. Diamantoulakis; Ruisi He; George K. Karagiannidis; Chintha Tellambura

Ambient backscatter devices (tags and readers) use existing radio frequency (RF) signals to transmit data. Most prior works consider single-antenna tags, but this paper investigates the case of multiple-antenna tags, which are capable of simultaneous energy harvesting and data transmission. However, the multi-antenna channel between the tag and the reader, and the unpredictable nature of RF signals due to uncontrollable RF sources (e.g., location and transmit power), make signal detection highly challenging. Thus, the detection process becomes a hypothesis testing problem with unknown parameters. Consequently, we design a blind detector based on the generalized likelihood ratio test (GLRT) without using channel state information (CSI), signal power and noise variance. The decision threshold and detection probability of it are also analyzed in detail. Furthermore, to maximize its detection performance, we develop the optimal backscatter antenna selection scheme. Interestingly, we show that the detector performs best when only two backscatter antennas are selected. Finally, extensive simulation results validate the analysis and illustrate the effectiveness of the proposed detector.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-31
Rimalapudi Sarvendranath; Neelesh B. Mehta

In underlay spectrum sharing, the interference constraint limits transmissions by the secondary transmitter, which concurrently accesses the spectrum, to protect the primary user from excessive interference. Transmit antenna selection enables a secondary user to overcome the limitations imposed by the interference constraint using low-complexity hardware. We develop an optimal and novel joint antenna selection and power adaptation rule that minimizes the average symbol error probability (SEP) of a secondary user that is subject to two practically well-motivated constraints. The first is the less-studied but general interference-outage constraint, which limits the probability that the interference power at the primary receiver exceeds a threshold. The second constraint limits the peak transmit power of the secondary transmitter. We show that the optimal rule for the interference-outage constraint has a novel structure that is markedly different from the rules considered in the literature. We then present an insightful geometric interpretation of its structure. Using this, we also propose a practically amenable and near-optimal variant of the optimal rule called the linear rule, and analyze its performance. Our numerical results show that the optimal rule reduces the average SEP by one to two orders of magnitude compared to the rules in the literature.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-29
Wei Wu; Fuhui Zhou; Rose Qingyang Hu; Baoyun Wang

Mobile edge computing (MEC) has been envisaged as a promising technique in the next-generation wireless networks. In order to improve the security of computation tasks offloading and enhance user connectivity, physical layer security and non-orthogonal multiple access (NOMA) are studied in MEC-aware networks. The secrecy outage probability is adopted to measure the secrecy performance of computation offloading by considering a practically passive eavesdropping scenario. The weighted sum-energy consumption minimization problem is firstly investigated subject to the secrecy offloading rate constraints, the computation latency constraints and the secrecy outage probability constraints. The semi-closed form expression for the optimal solution is derived. We then investigate the secrecy outage probability minimization problem by taking the priority of two users into account, and characterize the optimal secrecy offloading rates and power allocations with closed-form expressions. Numerical results demonstrate that the performance of our proposed design are better than those of the alternative benchmark schemes.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-07
Weihua Wu; Qinghai Yang; Runzi Liu; Tony Q. S. Quek; Kyung Sup Kwak

Long-term evolution (LTE) and wireless local area network (WLAN) are often presented as opposing technologies. Hence, efficient partitioning of the spectrum resources carries critical importance for achieving the coexistence of these on the unlicensed spectrum band. In this paper, we firstly develop an online spectrum partitioning algorithm, which needs little signal transmission and exchange between coordination manager and networks. Then, we focus on the convergence analysis of the online spectrum partitioning algorithm, which is difficult due to the time-varying wireless channels. To overcome this challenge, we model the algorithm and network dynamics as the stochastic differential equations (SDE) and show that the algorithm convergence is equivalent to the stochastic stability of a virtual stochastic dynamic system constructed by the SDEs. Then, we give the sufficient condition about the algorithm convergence and the upper bound on the tracking error of the spectrum partitioning algorithm under exogenous variations of time-varying channel state information (CSI). Based on the insights of the impact of time-varying CSI on algorithm convergence, an online compensative spectrum partitioning algorithm is developed to offset the tracking error caused by the disturbance of time-varying CSI. Through performance evaluation, we show that the coexistence performance efficiency will come at low expense of algorithm complexity and signal overhead.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-21
Xinping Yi; Hua Sun

The topological interference management (TIM) problem studies the degrees of freedom (DoF) of partially-connected interference networks with no channel state information (CSI) at the transmitters except the network topology (i.e., partial connectivity). In this paper, we consider a variant of the TIM problem with uncertainty in network topology, where the channel state with partial connectivity is only known to belong to one of $M$ states at the transmitters. In particular, the transmitter has access to all network topological information over $M$ states, but is unaware of which state it falls in exactly for communication. The receiver at any state is aware of the exact state it falls in besides the network topologies of all states, and wish to recover as much highly-prioritized information at current state as possible. We formulate it as the opportunistic TIM problem with network uncertainty modeled by $M$ state-varying network topologies. To adapt to network topology uncertainty and different message decoding priority, joint encoding and opportunistic decoding are enabled at the transmitters and receivers respectively. Specifically, being aware of all possible network topologies, each transmitter sends a signal jointly encoded from all messages desired over $M$ states, say $M$ distinct messages, and at a certain State $m$ , Receiver $k$ wishes to opportunistically decode the first $\pi _{k}(m) \in \{1,2,\cdots,M\}$ higher-priority messages. Under this opportunistic TIM setting, we construct a multi-state conflict graph to capture the mutual conflict of messages over $M$ states, and characterize the optimal DoF region of two classes of network topologies via polyhedral combinatorics. A remarkable fact is that, under an additional mild monotonous condition, the optimality conditions of orthogonal access and one-to-one interference alignment still apply to TIM with uncertainty in network topology.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-18
Zhiqiang Wei; Lei Yang; Derrick Wing Kwan Ng; Jinhong Yuan; Lajos Hanzo

In this paper, we investigate and reveal the ergodic sum-rate gain (ESG) of non-orthogonal multiple access (NOMA) over orthogonal multiple access (OMA) in uplink cellular communication systems. A base station equipped with a single-antenna, with multiple antennas, and with massive antenna arrays is considered both in single-cell and multi-cell deployments. In particular, in single-antenna systems, we identify two types of gains brought about by NOMA: 1) a large-scale near-far gain arising from the distance discrepancy between the base station and users; 2) a small-scale fading gain originating from the multipath channel fading. Furthermore, we reveal that the large-scale near-far gain increases with the normalized cell size, while the small-scale fading gain is a constant, given by $\gamma = 0.57721$ nat/s/Hz, in Rayleigh fading channels. When extending single-antenna NOMA to M -antenna NOMA, we prove that both the large-scale near-far gain and small-scale fading gain achieved by single-antenna NOMA can be increased by a factor of M for a large number of users. Moreover, given a massive antenna array at the base station and considering a fixed ratio between the number of antennas, M , and the number of users, K , the ESG of NOMA over OMA increases linearly with both M and K . We then further extend the analysis to a multi-cell scenario. Compared to the single-cell case, the ESG in multi-cell systems degrades as NOMA faces more severe inter-cell interference due to the non-orthogonal transmissions. Besides, we unveil that a large cell size is always beneficial to the ergodic sum-rate performance of NOMA in both single-cell and multi-cell systems. Numerical results verify the accuracy of the analytical results derived and confirm the insights revealed about the ESG of NOMA over OMA in different scenarios.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-17
Ning Gao; Zhijin Qin; Xiaojun Jing; Qiang Ni; Shi Jin

The downlink communications are vulnerable to intelligent unmanned aerial vehicle (UAV) jamming attack. In this paper, we propose a novel anti-intelligent UAV jamming strategy, in which the ground users can learn the optimal trajectory to elude such jamming. The problem is formulated as a stackelberg dynamic game, where the UAV jammer acts as a leader and the ground users act as followers. First, as the UAV jammer is only aware of the incomplete channel state information (CSI) of the ground users, for the first attempt, we model such leader sub-game as a partially observable Markov decision process (POMDP). Then, we obtain the optimal jamming trajectory via the developed deep recurrent Q-networks (DRQN) in the three-dimension space. Next, for the followers sub-game, we use the Markov decision process (MDP) to model it. Then we obtain the optimal communication trajectory via the developed deep Q-networks (DQN) in the two-dimension space. We prove the existence of the stackelberg equilibrium and derive the closed-form expression for the stackelberg equilibrium in a special case. Moreover, some insightful remarks are obtained and the time complexity of the proposed defense strategy is analyzed. The simulations show that the proposed defense strategy outperforms the benchmark strategies.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-04
Rania Morsi; Vahid Jamali; Amelie Hagelauer; Derrick Wing Kwan Ng; Robert Schober

In this paper, we study information-theoretic limits for simultaneous wireless information and power transfer (SWIPT) systems employing practical nonlinear radio frequency (RF) energy harvesting (EH) receivers (Rxs). In particular, we consider a SWIPT system with one transmitter that broadcasts a common signal to an information decoding (ID) Rx and multiple EH Rxs. Owing to the nonlinearity of the EH Rxs’ circuitry, the efficiency of wireless power transfer depends on the waveform of the transmitted signal. We aim to answer the following fundamental question: What is the optimal input distribution of the transmit signal waveform that maximizes the information transfer rate at the ID Rx conditioned on individual minimum required direct-current (DC) powers to be harvested at the EH Rxs? Specifically, we study the conditional capacity problem of a SWIPT system impaired by additive white Gaussian noise subject to average-power (AP) and peak-power (PP) constraints at the transmitter and nonlinear EH constraints at the EH Rxs. To this end, we develop a novel nonlinear EH model that captures the saturation of the harvested DC power by taking into account not only the forward current of the rectifying diode but also the reverse breakdown current. Then, we derive a novel semi-closed-form expression for the harvested DC power, which simplifies to closed form for low input RF powers. The derived analytical expressions are shown to closely match circuit simulation results. We solve the conditional capacity problem for real- and complex-valued signalling and prove that the optimal input distribution that maximizes the rate-energy (R-E) region is unique and discrete with a finite number of mass points. Furthermore, we show that, for the considered nonlinear EH model and a given AP constraint, the boundary of the R-E region saturates for high PP constraints due to the saturation of the harvested DC power for high input RF powers. In addition, we devise a suboptimal input distribution whose R-E tradeoff performance is close to optimal. All theoretical findings are verified by numerical evaluations.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-01
Hongyu Li; Ming Li; Qian Liu

Analog/digital hybrid beamforming architectures with large-scale antenna arrays have been widely considered in millimeter wave (mmWave) communication systems because they can address the tradeoff between performance and hardware efficiency compared with traditional fully-digital beamforming. Most of the prior work on hybrid beamforming focused on fully-connected architecture or partially-connected scheme with fixed-subarrays, in which the analog beamformers are usually realized by infinite-resolution phase shifters (PSs). In this paper, we introduce a novel hybrid beamforming architecture with dynamic subarrays and hardware-efficient low-resolution PSs for mmWave multiuser multiple-input single-output (MU-MISO) systems. By dynamically connecting each RF chain to a non-overlap subarray via a switch network and PSs, we can exploit multiple-antenna and multiuser diversities to mitigate the performance loss due to the use of practical low-resolution PSs. An iterative hybrid beamformer design algorithm is first proposed based on fractional programming (FP), aiming at maximizing the sum-rate performance of the MU-MISO system. In an effort to reduce the complexity, we also present a simple heuristic hybrid beamformer design algorithm for the dynamic subarray scheme. Extensive simulation results demonstrate the advantages of the proposed hybrid beamforming architecture with dynamic subarrays and low-resolution PSs compared to existing fixed-subarray schemes.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-15
Yang Zhang; Zehui Xiong; Dusit Niyato; Ping Wang; H. Vincent Poor; Dong In Kim

The Internet of Things (IoT) connects mobile and wireless devices, and enables the IoT service providers to deliver IoT services to the mobile users in various applications, e.g., transportation and communications. In this paper, the problem of IoT service delivery management is studied with the consideration of substitutability, complementarity, and externalities of delivering IoT services due to the diversity of different IoT components in mobile systems. The substitutable IoT services have similar functionalities to serve IoT users, and the IoT users can switch to buy service from any IoT service provider. The complementary IoT services have different functionalities to serve IoT users, and the IoT users may request a bundle of IoT services from multiple IoT service providers as their IoT services can be integrated. Externalities represent the situation in which IoT users in the same system can affect the utilities of each other due to the connections and interference among the IoT users, which leads to the presence of network effect and congestion effect. To analyze the impact of these factors on the performance of IoT systems, a multi-leader multi-follower Stackelberg game model is introduced. Therein, the IoT service providers and IoT users make their strategic decisions in terms of pricing and service requests, respectively, toward their individual objectives in a distributed manner. A closed-form equilibrium solution is derived analytically through backward induction.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-15
Khai Nguyen Doan; Mojtaba Vaezi; Wonjae Shin; H. Vincent Poor; Hyundong Shin; Tony Q. S. Quek

This work exploits the advantages of two prominent techniques in future communication networks, namely caching and non-orthogonal multiple access (NOMA). Particularly, a system with Rayleigh fading channels and cache-enabled users is analyzed. It is shown that the caching-NOMA combination provides a new opportunity of cache hit which enhances the cache utility as well as the effectiveness of NOMA. Importantly, this comes without requiring users’ collaboration, and thus, avoids many complicated issues such as users’ privacy and security, selfishness, etc. In order to optimize users’ quality of service and, concurrently, ensure the fairness among users, the probability that all users can decode the desired signals is maximized. In NOMA, a combination of multiple messages are sent to users, and the defined objective is approached by finding an appropriate power allocation for message signals. To address the power allocation problem, two novel methods are proposed. The first one is a divide-and-conquer-based method for which closed-form expressions for the optimal resource allocation policy are derived making this method simple and flexible to the system context. The second one is based on deep reinforcement learning method that allows all users to share the full bandwidth. Finally, simulation results are provided to demonstrate the effectiveness of the proposed methods and to compare their performance.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-11-05
Jinxiang Song; Bile Peng; Christian Häger; Henk Wymeersch; Anant Sahai

Data-driven optimization of transmitters and receivers can reveal new modulation and detection schemes and enable physical-layer communication over unknown channels. Previous work has shown that practical implementations of this approach require a feedback signal from the receiver to the transmitter. In this paper, we study the impact of quantized feedback on data-driven learning of physical-layer communication. A novel quantization method is proposed, which exploits the specific properties of the feedback signal and is suitable for non-stationary signal distributions. The method is evaluated for linear and nonlinear channels. Simulation results show that feedback quantization does not appreciably affect the learning process and can lead to similar performance as compared to the case where unquantized feedback is used for training, even with 1-bit quantization. In addition, it is shown that learning is surprisingly robust to noisy feedback where random bit flips are applied to the quantization bits.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-29
Shi Yan; Lin Qi; Yangcheng Zhou; Mugen Peng; G. M. Shafiqur Rahman

Non-orthogonal multiple access (NOMA) is regarded as a promising technology for the next-generation wireless communication system. Introducing NOMA into the fog radio access networks (F-RANs) is able to provide simultaneous transmissions to multiple users and significantly enhance F-RAN performance. However, due to the increasing number of users and the constraint of caching storage capacity, there exists a tradeoff between NOMA transmission performance and fronthaul saving. In this paper, a hierarchical game framework is presented to solve the joint optimization problem of user access mode selection and content popularity prediction in NOMA based F-RANs. More specifically, the access mode selection problem is formulated as an evolutionary game. The proposals’ evolutionary payoff expressions are derived by stochastic geometry tool, and the cost functions are related to the fog access point (F-AP) content placement profile as well as the fronthaul constraint. Moreover, the problem of what contents the F-AP should cache is modeled as a content popularity prediction problem, and based on both local and global user request states, a machine learning algorithm is presented to solve it. Simulation results validate the accuracy of analytical results and demonstrate our proposed algorithms can further improve the performance of NOMA based F-RANs.

更新日期：2020-01-17
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-12-25

Presents the table of contents for this issue of this publication.

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-12-17

Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication.

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-09-11
Alireza Sheikh; Alexandre Graell i Amat; Gianluigi Liva

We propose a novel binary message passing decoding algorithm for product-like codes based on bounded distance decoding (BDD) of the component codes. The algorithm, dubbed iterative BDD with scaled reliability (iBDD-SR), exploits the channel reliabilities and is therefore soft in nature. However, the messages exchanged by the component decoders are binary (hard) messages, which significantly reduces the decoder data flow. The exchanged binary messages are obtained by combining the channel reliability with the BDD decoder output reliabilities, properly conveyed by a scaling factor applied to the BDD decisions. We perform a density evolution analysis for generalized low-density parity-check (GLDPC) code ensembles and spatially coupled GLDPC code ensembles, from which the scaling factors of the iBDD-SR for product and staircase codes, respectively, can be obtained. For the white additive Gaussian noise channel, we show performance gains up to 0.29 dB and 0.31 dB for product and staircase codes compared to conventional iterative BDD (iBDD) with the same decoder data flow. Furthermore, we show that iBDD-SR approaches the performance of ideal iBDD that prevents miscorrections.

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-09-10
Çağkan Yapar; Kai Wan; Rafael F. Schaefer; Giuseppe Caire

We consider a cache-aided wireless device-to-device (D2D) network of the type introduced by Ji et al. , where the placement phase is orchestrated by a central server. We assume that the devices’ caches are filled with uncoded data, and the whole content database is contained in the collection of caches. After the cache placement phase, the files requested by the users are serviced by inter-device multicast communication. For such a system setting, we provide the exact characterization of the optimal load-memory trade-off under the assumptions of uncoded placement and one-shot delivery . In particular, we derive both the minimum average (under uniformly distributed demands) and the minimum worst-case sum-load of the D2D transmissions, for given individual cache memory size at disposal of each user. Furthermore, we show that the performance of the proposed scheme is within factor 4 of the information-theoretic optimum. Capitalizing on the one-shot delivery property, we also propose an extension of the presented scheme that provides robustness against random user inactivity.

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-09-17
Guiyang Li; Xing Lin; Xiaohu Tang

As a kind of erasure code, piggybacking has been applied in practice since it can significantly reduce the repair bandwidth of distributed storage systems. Currently, several efficient piggybacking designs have been proposed. In this paper, we propose a more efficient “one-to-one” piggybacking design (OOP) to further reduce the repair bandwidth. Different from the existing piggybacking designs, OOP adopts a simple encoding principle that one parity node only piggybacks symbols from one substripe. Particularly, OOP takes into account the efficient repair of systematic nodes and parity nodes simultaneously. It is shown that for OOP design, the optimal number of substripes is $(\sqrt {r-1}+r-1)$ , the average repair bandwidth ratio of systematic nodes can be as low as $\frac {2\sqrt {r-1}+1}{2\sqrt {r-1}+r}$ , and the average repair bandwidth ratio of parity nodes reaches $\left({\frac {\sqrt {r-1}+1}{r}+\frac {(r-1)^{2}-\sqrt {(r-1)^{3}}}{rk}}\right)$ . In contrast to the existing piggybacking designs, OOP can further reduce the repair bandwidth of both system nodes and parity nodes.

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-09-30
Ji Zhang; Baoming Bai; Shuangyang Li; Min Zhu; Huaan Li

This paper presents a new type of globally-coupled low-density parity-check (GC-LDPC) codes whose base matrix has a cyclic structure in the global part. Therefore, the resulting codes are referred to as tail-biting GC-LDPC (TB-GC-LDPC) codes. We propose two methods to construct TB GC quasi-cyclic LDPC (TB-GC-QC-LDPC) codes. For the first method, we extract a replicated version of a constructed base matrix and mask it with a designed masking matrix. Compared to the conventional construction methods, this method provides more flexibility in code length for TB-GC-QC-LDPC codes. The second method is based on designing the incidence matrix of a special type of packings. Examples show that the constructed TB-GC-QC-LDPC codes perform well over the additive white Gaussian noise channel (AWGNC) and the binary erasure channel (BEC). The asymptotic performance of TB-GC-LDPC ensembles over BECs are also analyzed by resorting to density evolution. Moreover, numerical results show that TB-GC-LDPC ensembles can achieve better flooding-schedule decoding (FSD) thresholds than the corresponding GC-LDPC ensembles with a similar structure. With sufficient decoding iterations in the global phase, the local/global two-phase iterative decoding (TPD) thresholds of the TB-GC-LDPC ensembles significantly outperform those of the corresponding GC-LDPC ensembles as well.

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-03
Yi Lei; Bin Chen; Gabriele Liga; Xiong Deng; Zizeng Cao; Jianqiang Li; Kun Xu; Alex Alvarado

Staircase codes (SCCs) are typically decoded using iterative bounded-distance decoding (BDD) and hard decisions. In this paper, a novel decoding algorithm is proposed, which partially uses soft information from the channel. The proposed algorithm is based on marking certain number of highly reliable and highly unreliable bits. These marked bits are used to improve the miscorrection-detection capability of the SCC decoder and the error-correcting capability of BDD. For SCCs with 2-error-correcting Bose-Chaudhuri-Hocquenghem component codes, our algorithm improves upon standard SCC decoding by up to 0.30 dB at a bit-error rate (BER) of 10 −7 . The proposed algorithm is shown to achieve almost half of the gain achievable by a genie decoder with this structure. The increased complexity caused by bit marking and additional calls to the component BDD decoder is discussed as well. Our algorithm is also extended (with minor modifications) to product codes. The simulation results show that in this case, the algorithm offers gains of up to 0.5 dB at a BER of 10 −7 .

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-03
Vaibhav Kumar; Barry Cardiff; Mark F. Flanagan

Non-orthogonal multiple access (NOMA) and spectrum sharing (SS) are two emerging multiple access technologies for efficient spectrum utilization in future wireless communications standards. In this paper, we present the performance analysis of a NOMA-based cooperative relaying system (CRS) in an underlay spectrum sharing scenario, considering a peak interference constraint (PIC), where the peak interference inflicted by the secondary (unlicensed) network on the primary-user (licensed) receiver (PU-Rx) should be less than a predetermined threshold. In the proposed system the relay and the secondary-user receiver (SU-Rx) are equipped with multiple receive antennas and apply selection combining (SC), where the antenna with highest instantaneous signal-to-noise ratio (SNR) is selected, and maximal-ratio combining (MRC), for signal reception. Closed-form expressions are derived for the average achievable rate and outage probabilities for SS-based CRS-NOMA. These results show that for large values of peak interference power, the SS-based CRS-NOMA outperforms the CRS with conventional orthogonal multiple access (OMA) in terms of spectral efficiency. The effect of the interference channel on the system performance is also discussed, and in particular, it is shown that the interference channel between the secondary-user transmitter (SU-Tx) and the PU-Rx has a more severe effect on the average achievable rate as compared to that between the relay and the PU-Rx. A close agreement between the analytical and numerical results confirm the correctness of our rate and outage analysis.

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-10-03
Haiyan Guo; Zhen Yang; Yulong Zou; Mujun Qian; Jia Zhu; Lajos Hanzo

A new joint best relay and jammer selection (JBRJS) scheme is conceived for enhancing the physical layer security (PLS) of cooperative networks relying on multiple energy harvesting (EH) aided intermediate nodes, which accumulate energy based on the power splitting (PS) protocol. Specifically, we select the best intermediate node as the relay, whilst exploiting all the remaining nodes as friendly jammers. Furthermore, we investigate the joint optimization of the PS ratio and the relay-aided beamforming for maximizing the system’s secrecy rate and present a full channel state information (CSI) based joint PS and beamforming ( $\it {f}$ JPSB) scheme as the optimal solution by converting the optimization problem formulated into a single-variable optimization problem. We also propose a partial-CSI based JPSB ( $\it {p}$ JPSB) method for the scenario where only the main link’s CSI is available. Our numerical results show that the proposed JBRJS scheme beneficially enhances the PLS compared to the joint random relay and jammer selection (JRRJS) and to the pure best relay selection (PBRS) schemes. Moreover, the secrecy rate of the proposed $\it {f}$ JPSB and $\it {p}$ JPSB schemes is obviously higher than that of the fixed PS and beamforming (FPSB) method, and it further increases with the number of the relay’s transmit antennas.

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-09-10
Avinash Vem; Krishna R. Narayanan; Jean-Francois Chamberland; Jun Cheng

This work introduces a novel coding paradigm for the unsourced multiple access channel model. The envisioned framework builds on a select few key components. First, the transmission period is partitioned into a sequence of sub-blocks, thereby yielding a slotted structure. Second, messages are split into two parts. A portion of the data is encoded using spreading sequences or codewords that are designed to be recovered by a compressed sensing type decoder. In addition to being an integral part of the data, the information bits associated with this first part also determine the parameters of the low-density parity check code employed during the subsequent stages of the communication process. The other portion of the message is encoded using the aforementioned low-density parity check code. The data embedded in this latter stage is decoded using a joint message passing algorithm designed for the $T$ -user binary input real adder channel. Finally, devices repeat their codeword in multiple sub-blocks, with the transmission pattern being a deterministic function of message content independent of the identity of the device. When combined with successive interference cancellation, the ensuing communication infrastructure offers significant performance improvement compared to coding schemes recently published in the literature for unsourced random access.

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-09-10
Junjuan Feng; Shaodan Ma; Sonia Aïssa; Minghua Xia

Two-way massive MIMO amplify-and-forward relaying systems with non-ideal transceivers are investigated in this paper. To be general, multiple-antenna nodes and antenna correlation at both the user equipments (UEs) and the relay are considered, which differentiates the analysis from the prior ones. The achievable rate is analyzed and derived deterministically in closed-form. Joint scaling of the transmission powers and hardware impairments is then particularly investigated. Feasible scaling speeds for the transmission powers and hardware impairments are discovered when the number of relay antennas grows large. It is shown that down scaling of the transmission powers at the UEs and the relay and up scaling of the hardware impairment at the relay with the number of relay antennas are tolerable without reducing the expected rate. However, UE hardware impairment is a key limiting factor to the achievable rate and is not allowed to scale up with the number of relay antennas in order to achieve a non-vanishing rate. Moreover, ceiling effect on the achievable rate is still observable and the ceiling rate varies among different scaling cases. More interestingly, scalings of the UEs transmission power and the relay hardware impairment are found to be offsettable, which means that the relay hardware cost and the UE transmission power are tradable. It is found that the best tradeoff is achieved in the medium scalings of both the relay hardware impairment and UE transmission power. Numerical results are provided to verify the analysis and the tradability between the relay hardware cost and the UE transmission power. The analytical results thus provide solid foundation for flexible system designs under various cost and energy constraints.

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-09-13
Sai Subramanyam Thoota; Prabhu Babu; Chandra R. Murthy

In this paper, we study the problem of downlink (DL) sum rate maximization in codebook based multiuser (MU) multiple input multiple output (MIMO) systems. The user equipments (UEs) estimate the DL channels using pilot symbols sent by the access point (AP) and feedback the estimates to the AP over a control channel. We present a closed form expression for the achievable sum rate of the MU-MIMO broadcast system with codebook constrained precoding based on the estimated channels, where multiple data streams are simultaneously transmitted to all users. Next, we present novel, computationally efficient, minorization-maximization (MM) based algorithms to determine the selection of beamforming vectors and power allocation to each beam that maximizes the achievable sum rate. Our solution involves multiple uses of MM in a nested fashion. Based on this approach, we propose and contrast two algorithms, which we call the square-root-MM (SMM) and inverse-MM (IMM) algorithms. The algorithms are iterative and converge to a locally optimal beamforming vector selection and power allocation solution from any initialization. We evaluate the performance and complexity of the algorithms for various values of the system parameters, compare them with existing solutions, and provide further insights into how they can be used in system design.

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-09-19
Wanming Hao; Ming Zeng; Gangcan Sun; Osamu Muta; Octavia A. Dobre; Shouyi Yang; Haris Gacanin

In this paper, we investigate the energy-efficient resource allocation problem in an uplink non-orthogonal multiple access (NOMA) millimeter wave system, where the fully-connected-based sparse radio frequency chain antenna structure is applied at the base station (BS). To relieve the pilot overhead for channel estimation, we propose a codebook-based analog beam design scheme, which only requires to obtain the equivalent channel gain. On this basis, users belonging to the same analog beam are served via NOMA. Meanwhile, an advanced NOMA decoding scheme is proposed by exploiting the global information available at the BS. Under predefined minimum rate and maximum transmit power constraints for each user, we formulate a max-min user energy efficiency (EE) optimization problem by jointly optimizing the detection matrix at the BS and transmit power at the users. We first transform the original fractional objective function into a subtractive one. Then, we propose a two-loop iterative algorithm to solve the reformulated problem. Specifically, the inner loop updates the detection matrix and transmit power iteratively, while the outer loop adopts the bi-section method. Meanwhile, to decrease the complexity of the inner loop, we propose a zero-forcing (ZF)-based iterative algorithm, where the detection matrix is designed via the ZF technique. Finally, simulation results show that the proposed schemes obtain a better performance in terms of spectral efficiency and EE than the conventional schemes.

更新日期：2020-01-04
• IEEE Trans. Commun. (IF 5.690) Pub Date : 2019-09-19
Yun Chen; Da Chen; Tao Jiang; Lajos Hanzo

Hybrid precoding is essential for millimeter wave (mmWave) multiple-input multiple output (MIMO) systems due to its inherent advantage of a high gain, whilst alleviating the high cost of hardware. However, most of the existing literature considered either the narrowband or wideband single-user mmWave MIMO scenarios. Hence in this paper we focus our attention on the more challenging design of hybrid Transmit Precoding (TPC) for wideband multiuser mmWave MIMO systems by exploiting the long-term channel’s covariance matrix and the angle of departure (AoD) information. Specifically, in the analog TPC designed, firstly, the analog TPC matrix having an infinite angular resolution is constructed based on the channel’s covariance matrix. Then, we also propose a non-uniformly spaced quantization codebook based analog TPC having finite angular resolution. Furthermore, a phase compensation operation is carried out to alleviate the effect of beam squint. As for the design of the digital TPC, a two-stage scheme is proposed to cancel the inter-user interference and to attain multiplexing gains. We study the effects of various parameters on the achievable sum rate and demonstrate with the aid of our simulation results that the proposed hybrid TPC is capable of achieving a similar performance to the excessive-complexity fully digital TPC.

更新日期：2020-01-04
Contents have been reproduced by permission of the publishers.

down
wechat
bug