Secrecy-Optimized Resource Allocation for Device-to-Device Communication Underlaying Heterogeneous Networks

Size: px
Start display at page:

Download "Secrecy-Optimized Resource Allocation for Device-to-Device Communication Underlaying Heterogeneous Networks"

Transcription

1 Secrecy-Optimized Resource Allocatio for Device-to-Device Commuicatio Uderlayig Heterogeeous Networks Kecheg Zhag, Muge Peg, Seior Member, I, Pig Zhag, Seior Member, I, ad Xuelog Li, Fellow, I arxiv: v [cs.it] 5 Sep 207 Abstract Device-to-device D2D commuicatios recetly have attracted much attetio for its potetial capability to improve spectral efficiecy uderlayig the existig heterogeeous etworks HetNets. Due to o sophisticated cotrol, D2D user equipmets DUs themselves caot resist eavesdroppig or security attacks. It is urget to maximize the secure capacity for both cellular users ad DUs. This paper formulates the radio resource allocatio problem to maximize the secure capacity of DUs for the D2D commuicatio uderlayig HetNets which cosist of high power odes ad low power odes. The optimizatio obective fuctio with trasmit bit rate ad power costraits, which is o-covex ad hard to be directly derived, is firstly trasformed ito matrix form. The the equivalet covex form of the optimizatio problem is derived accordig to the Perro-Frobeius theory. A heuristic iterative algorithm based o the proximal theory is proposed to solve this equivalet covex problem through evaluatig the proximal operator of Lagrage fuctio. Numerical results show that the proposed radio resource allocatio solutio sigificatly improves the secure capacity with a fast covergece speed. Idex Terms Device-to-device commuicatio, heterogeeous etwork, secure capacity, resource allocatio I. INTRODUCTION Heterogeeous etworks HetNets, which are expected to sigificatly improve capacity ad exted coverage, have bee widely applied to affordig the explosive growth of data traffic []. A HetNet uses a mixture of high power odes HPNs e.g., macro or micro base statios BSs ad low power odes LPNs e.g., picocell BSs, femtocell BSs, small cell BSs, wireless relay, or distributed ateas i the same coverage. HPNs are deployed to provide seamless coectivity ad guaratee the basic quality of service QoS requiremets of user equipmets Us. Sice the trasmit power of HPNs is sufficietly high to achieve seamless coverage, all Us ofte access the HPN to obtai the cotrol sigallig of the whole HetNet, which fulfills the decouple of cotrol ad user plaes [2]. I some hot spots with huge value of packet traffic, a U Copyright c 205 I. Persoal use of this material is permitted. However, permissio to use this material for ay other purposes must be obtaied from the I by sedig a request to pubs-permissios@ieee.org. Kecheg Zhag buptzkc@63.com, Muge Peg pmg@bupt.edu.c, ad Pig Zhag pzhag@bupt.edu.c are with the Key Laboratory of Uiversal Wireless Commuicatios for Miistry of ducatio, Beiig Uiversity of Posts ad Telecommuicatios BUPT, Chia. Xuelog Li xuelog_li@opt.ac.c is with the Ceter for OPTical IMagery Aalysis ad Learig OPTIMAL, State Key Laboratory of Trasiet Optics ad Photoics, Xi a Istitute of Optics ad Precisio Mechaics, Chiese Academy of Scieces, Xi a 709, Chia. prefers to access LPNs rather tha HPNs because LPNs ca provide much higher capacity tha the HPN does. Therefore, the dese deploymet of LPNs icreases spectral efficiecy S ad is oe of the key factors for boostig the capacity of the future etwork [3]. However, although the HetNet is a good alterative to improve S with seamless coverage, the iter-tier iterferece betwee HPNs ad LPNs is severe, ad the backhaul is ofte costraied because Us have to coect with the core etwork with a high capacity requiremet [4]. I order to alleviate the heavy load o backhaul, several alterative approaches have bee preseted. I particular, a hierarchical cloud computig architecture is proposed i [5] through addig a mobile dyamic cloud. To alleviate the heavy burde o the backhaul ad improve S i HetNets, device-to-device D2D commuicatio which is defied as direct commuicatio betwee Us without passig through BSs has bee proposed i the 3 rd geeratio partership proect log term evolutio-advaced [6]. With more traffic beig trasmitted by D2D commuicatio, iformatio exchage betwee Us ad core etwork is abated [7]. Recetly, D2D commuicatio has attracted much attetio with the ever icreasig demad for the local cotet exchage betwee two earby Us. I D2D uderlayig HetNets, radio resource is typically reused betwee the direct D2D lik ad the cellular air access lik. As a result, the iter-tier iterferece is critical to make D2D commuicatio rollout. May works have bee doe to improve S for the D2D commuicatio uderlayig HetNets. I [8], the authors show that D2D commuicatios ca effectively improve the total throughput without geeratig harmful iterferece to HetNets with proper maagmet. I [9], the harmful iter-system iterferece problems for D2D uderlayig cellular etworks are addressed, i which two iterferece avoidace mechaisms are applied to suppress the iter-tier iterferece betwee cellular ad D2D liks. Other recet researches, e.g., [0] [2], also have verified that the D2D commuicatio uderlayig HetNets have several advatages, icludig the high spectral utilizatio, the low eergy cosumptio, ad icurrig ew packet services. To improve S, the resource allocatio should be optimized for D2D commuicatio uderlayig HetNets, which is a o-covex optimizatio problem. The o-covex optimizatio problem has bee extesively researched, i which the Lagragia dual method has bee widely used [3], [4]. However, it is assumed that the iterferece from cellular users to D2D users is costat i [3] ad the iter-tier

2 2 iterferece betwee cellular users ad D2D users is replaced by the maximum allowed oise i [4]. These assumptios simplify the problem ad caot achieve the best performace. To tackle this problem, ew optimizatio method should be applied for D2D commuicatio uderlayig HetNets. Meawhile, to ehace the security of wireless trasmissio, physical layer security has bee developed based o iformatio theoretic cocepts [5] [7]. Physical-layer security, which exploits the physical characteristics of wireless chael to ehace the security, has sigificatly iflueced the wireless commuicatio because there exists a secured data trasmissio betwee power odes ad the eavsedropper [8]. To avoid the iformatio from power odes to Us beig leaked, the data rate of eavesdroppers should be maitaied at a low level. With a more ope cotrol plae, D2D user equipmet is more vulerable to the attacks of eavesdroppers. There have bee some studies to improve the secure capacity of D2D uderlayig systems from the viewpoit of physicallayer security. I [9], two secure capacity optimizatio problems for a multi-iput ad multi-output secrecy chael with multiple D2D commuicatios are researched ad two coservative approximatio approaches to covert the probability based costraits ito the determiistic costrait have bee addressed. Furthermore, the radio resource allocatio as a matchig problem i a weighted bipartite graph has bee formulated i [20], i which the Kuh-Mukres KM algorithm to obtai the optimal solutio is proposed. However, the D2D commuicatio oly helps to improve the secure capacity of cellular Us by cofusig the eavesdroppers i both [9] ad [20]. I other words, the D2D commuicatio acts as a kid of iterferece agaist eavesdroppig whe a eavesdropper tries to overhear the cellular commuicatio, therefore, the available rate of eavesdropper is lesseed [2]. To our best kowledge, there have bee few publicatios to optimize the secure capacity of both cellular Us ad D2D liks. I particular, few works maximize the secure capacity of the D2D commuicatio uderlayig HetNets. Note that such secure capacity optimizatio problem is o-covex ad hard to be directly solved because of the existece of iter-tier ad itra-tier iterferece. The goal of this paper is to optimize the radio resource allocatio aimig to maximize the secure capacity of D2D commuicatio uderlayig HetNets. The o-covex obective fuctio with several costraits are first trasformed ito matrix form. The, the equivalet covex form of the matrix form is derived accordig to the Perro-Frobeius theory which is based o the eigevalue ad eigevector [22] [24]. Note that the Perro-Frobeius theory has bee maily used i homogeeous etworks, there are lack of publicatios to use this theory to address the optimizatio issue i the D2D commuicatio uderlayig HetNets. To derive this Perro-Frobeius theory based equivalet covex optimizatio problem, the correspodig Lagrage fuctio has bee formulated ad the proximal operator has bee evaluated. Fially, a ovel iterative algorithm based o the proximal theory has bee proposed. The mai cotributios of this paper ca be summarized as followig: The optimizatio problem of radio resource allocatio aimig to maximize the secure capacity i D2D commuicatio uderlayig HetNets has bee addressed i this paper. To our best kowledge, previous works maily take D2D commuicatio as friedly ammer to improve the secure capacity of cellular users. Thus, oly the performace of cellular users is optimized ad the performace of D2D commuicatio is igored. Furthermore, previous works maily focus o the traditioal S ad do ot focus o the secure capacity. Besides, whe solvig the optimizatio problem, previous works maily try to simplify the iterferece betwee cellular users ad D2D users by settig the iterferece with costat, which caot take full advatage of the beefit of subcarrier reusig. This paper explores the resource allocatio scheme for both cellular users ad D2D users whe they share the same subcarrier resource to maximize the secure capacity of D2D commuicatio uderlayig HetNets. To deal with the secrecy-optimized resource allocatio problem, a o-covex obective fuctio has bee formulated. This o-covex obective fuctio is hard to be directly derived. The existig works ofte simplify the iterferece ito costat, ad the the Lagragia dual theory ca be used. However, the iterferece i the D2D uderlayig HetNets is ofte dyamical ad should ot be regarded as costat. To deal with this o-covex issue, the obective fuctio is trasformed to a equivalet covex optimizatio problem accordig to the Perro-Frobeius theory. Furthermore, to solve the equivalet covex problem, a iterative algorithm based o the proximal theory cosistig of both outer ad ier loop optimizatios has bee proposed to achieve the global optimal solutio. The S performace of the proposed resource allocatio solutio has bee umerically evaluated. Simulatio results show that the proposed iterative algorithm ca promptly coverge ad outperforms the baselie algorithms. The effects of the QoS ad power costraits with various other comparisos have bee show to evaluate the performace gais of the proposals. The remider of this paper is orgaized as follows. I Sectio II, the system model of D2D commuicatio uderlayig HetNets will be described ad the optimizatio problem will be formulated. The solutio to the optimizatio problem ad the correspodig iterative algorithm will be preseted i Sectio III. Sectio IV will provide simulatios to verify the effectiveess of the proposed algorithm ad the correspodig solutios. Fially, the paper will be cocluded i Sectio V. II. SYSTM MODL A D2D commuicatio uderlayig HetNets is show i Fig., i which L LPNs sharig N subcarriers with the HPN is cosidered. It is assumed that each subcarrier occupies B MHz badwidth. The HPN ad LPNs are all closed accessed. The closed access meas that each cell ca oly schedule the Us that belog to it, while the ope access meas that oe cell ca schedule ay U as log as the referece sigal receivig power is sufficietly high. Similar assumptio ca be

3 3 foud i previous works [25], [26]. Uder the closed access, Us moopolize their ow servig cells ad the privacy ad security of the commuicatio ca be guarateed, though the performace of closed access is worse tha that of ope access. Sice this paper focus o the secure capacity, the closed access is oly cosidered. Let H deote the average umber of HPN-accessed Us HUs i each HPN ad M deote the average umber of LPN-accessed Us LUs i each LPN, respectively. Besides, K D2D-worked Us DUs coexist with LUs i each LPN. It is assumed that all Us e.g., HUs, LUs or DUs have low mobility so that the chael state iformatio betwee Us ad power odes as well as the chael state iformatio betwee the trasmitter ad receiver of ay D2D user pair remai statioary [27] [29]. Therefore, subcarriers ca be assumed to be idepedet from each other, ad the chael fadig of each subcarrier ca be assumed the same withi a time slot, but may vary cross differet subcarriers. O each subcarrier, there exists a eavesdropper that leverages the iformatio of the desired Us. Sice DUs prefer to share the uplik radio resources with HUs or LUs to avoid the severe iter-tier iterferece, this paper oly focuses o the resource allocatio to optimized the secure capacity i uplik. HPN LPN HU LU DU h HH h h HL hl h HD hlk h H h h LH lm h LL lm h LD lmk h L lm h DH lk h DL lk h LD lmk h L lm p H h p L lm p D lk α H h α L lm α D lk TABL I SUMMARY OF NOTATIONS IN THIS PAPR high power ode low power ode HPN-accessed U LPN-accessed U D2D-worked U the chael gai from the h-th HU to the HPN o the -th subcarrier the chael gai from the h-th HU to the l-th LPN o the -th subcarrier the chael gai from the h-th HU to the receiver of the k-th DU pair of the l-th LPN o the -th subcarrier the chael gai from the h-th HU to the eavesdropper o the -th subcarrier the chael gai from the m-th LU of the l-th LPN to the HPN o the -th subcarrier the chael gai from the m-th LU of the l-th LPN to the -th LPN o the -th subcarrier the chael gai from the m-th LU of the l-th LPN to the receiver of the k-th DU pair of the -th LPN o the -th subcarrier the chael gai from the m-th LU of the l-th LPN to the eavesdropper o the -th subcarrier the chael gai from the trasmitter of the k-th DU pair of the l-th LPN to the HPN o the -th subcarrier the chael gai from the trasmitter of the k-th DU pair of the l-th LPN to the -th LPN o the -th subcarrier the chael gai from the trasmitter of the k-th DU pair of the l-th LPN to the receiver of the i-th DU pair of the -th LPN o the -th subcarrier the chael gai from the trasmitter of the k-th DU pair of the l-th LPN to to the eavesdropper o the -th subcarrier the trasmit power of the h-th HU o the -th subcarrier the trasmit power of the m-th LU of the l-th LPN o the -th subcarrier the trasmitter of the k-th DU pair of the l-th LPN o the -th subcarrier subcarrier allocatio idex which deotes whether the -th subcarrier is allocated to the h-th HU subcarrier allocatio idex which deotes whether the -th subcarrier is allocated to the m-th LU of the l-th LPN subcarrier allocatio idex which deotes whether the -th subcarrier is allocated to the k-th DU pair of the l-th LPN Let h HH h,hhl hl,hhd hlk, ad hh h deote the radio chael Fig.. D2D commuicatio uderlayig HetNets. gai from the h-th HU to the HPN, from the h-th HU to the l-th LPN, from the h-th HU to the receiver of the k-th DU pair of the l-th LPN, ad from the h-th HU to the eavesdropper o the -th subcarrier, respectively. Meawhile,, ad hl lm deote the radio chael gai from the m-th LU of the l-th LPN to the HPN, from the m-th LU of the l-th LPN to the -th LPN, from the m-th LU of the l-th LPN to the receiver of the k-th DU pair of the -th LPN, ad from the m-th LU of the l-th LPN to the eavesdropper o the -th subcarrier, respectively. Similarly, let h LH lm, hll lm, hld lmk, ad hd lk deote the chael gai from the trasmitter of the k-th DU pair of the l-th LPN to the HPN, to the -th LPN, to the receiver of the i-th DU pair of the -th LPN, ad to the eavesdropper o the -th subcarrier, h DH lk, hdl lk, hdd lki respectively. Deotep H h,pl lm, adpd lk by the trasmit power of the h-th HU, the trasmit power of the m-th LU of the l-th LPN, ad the trasmitter of the k-th DU pair of the l-th LPN o the -th subcarrier, respectively. I orthogoal frequecy divisio multiple access OFDMA based wireless etworks, a base statio allocates orthogoal subcarriers to differet users. Thus, i each cell e.g., a HPN or a LPN, each subcarrier ca be allocated to oly oe cellular U or a DU pair [30] [32], but oe or more subcarriers ca be allocated to the same cellular U or a DU pair. It meas that at most oe elemet of p H h,ph h2 hn, ph is positive ad the others are all zero. Let α H h,αl lm,αd lk {0,} deote the allocatio idex of subcarriers, which deotes whether the -th subcarrier is allocated to the h-th HU, the m-th LU of the l-th LPN, ad the k-th DU pair of the l-th LPN or ot, respectively. It should be oted that eavesdroppers are passive ad will ot share its CSI with the HPN or LPN. I fact, if eavesdroppers keep silet all the time, it is impossible for the etwork to estimate the CSI of them. However, whe eavesdropper become active, they ca be detected by the etwork [33]. Thus, i this paper, the CSI of eavesdropper is assumed to be kow ad similar assumptio ca be foud i previous works [34] [36]. The uplik sigal-to-iterferece-plus-oise ratio SINRfrom the h-th HU to the HPN o the -th subcarrier ρ H h ca be expressed as:

4 4 ρ H h = l=m= α H h ph h hhh h α L lm pl lm hlh lm L l= k=. α D lk pd lk hdh lk Bσ2 The uplik SINR from the h-th HU to the eavesdropper o the -th subcarrier ρ H h ca be expressed as: ρ H h = l=m= α H h ph h hh h α L lm pl lm hl l L l=k=. α D lk pd lk hd lk Bσ2 2 The uplik SINR from the m-th LU of the l-th LPN to the l-th LPN o the -th subcarrier ρ L lm ca be expressed as: h= ρ L lm = αl lm pl lm hll lml I L lm σ2, 3 where Ilm L deotes the iterferece ad is expressed as: Ilm= L α H hp H hh HL hl = k= =, l i= α L ip L ih LL il α D kp D kh DL kl. 4 The uplik SINR from the the l-th LPN to the eavesdropper o the -th subcarrier ρ L lm ca be expressed as: where I D lk I D lk = deotes the iterferece ad is expressed as: H h= L α H h ph h hh h =, l i= = m= α L m pl m hl l α L i pd i hd i. 0 Let Ch HS, CLS lm, CDS lk deote the secrecy capacity of the h-th HU, the m-th LU of the l-th LPN, ad the k-th DU pair of the l-the LPN, respectively. Accordigly, Ch HS, CLS lm, ca be expressed as: lk Ch HS = Blogρ H hblogρ H h, Clm LS = BlogρL lm BlogρL lm, 2 Clk DS = Blogρ D lkblogρ D lk, 3 ρ L lm =αl lm pl lm hl lm I L lm σ2, 5 where Ilm L deotes the iterferece ad is expressed as: I L lm = h= α H hp H hh H h = k= =, l i= α L ip L ih L α D k pd k hd k. 6 The uplik SINR from the trasmitter of the k-th DU pair of the l-the LPN to the receiver of the k-th DU pair of the l-the LPN o the -th subcarrier ρ D lk ca be expressed as: ρ D lk= αd lk pd lk hdd lklk I D lk σ2, 7 where Ilk D deotes the iterferece ad is expressed as: I D lk = h= α H hp H hh HD hl =, l i= = m= α L mp L mh LD ml α D i pd i hdd ilk. 8 Similarly, the uplik SINR from the trasmitter of the k-th DU pair of the l-the LPN to the eavesdropper ρ D lk ca be expressed as: ρ D lk =αd lk pd lk hd lk I D lk σ2, 9 respectively. Therefore, the secrecy capacity of the D2D commuicatio uderlayig HetNets ca be writte as: h== C HS h L l= m= C LS lm L l= k= = lk. 4 It is assumed that the secrecy capacity of each U should be o less tha the pre-defied threshold to guaratee QoS. Meawhile, to save the eergy cosumptio, the maximum allowed trasmit power of each power ode is limited. Besides, the subcarrier allocatio idex should be restricted to prevet the same subcarrier beig allocated to more tha oe U of the same type, e.g., HUs, LUs, ad DUs. As a result, the secrecy-optimized resource allocatio problem for the D2D commuicatio uderlayig HetNets ca be formulated with the QoS ad trasmit power costraits. Problem Secrecy Capacity Optimizatio: With the costraits o the required QoS ad maximum trasmit power allowace, the secrecy-optimized resource allocatio problem for the D2D commuicatio uderlayig HetNets ca be

5 5 formulated as: max {p H h,pl lm,pd lk } s.t. h== C HS h L l= k== Ch HS CHS mi = = l= m= C LS lm lk 5, h, 6 Clm LS CLS mi, l,m, 7 lk mi, l, k, 8 p H h P H max, h, 9 p L lm PL max, l,m, 20 p D lk Pmax, l,k, D 2 α H h =,,α H h {0,}, 22 h= α L lm =, l,,α L lm {0,},23 m= α D lk =, l,,α D lk {0,}, 24 k= where the costraits 6-8 correspod to the required lower boud of the the secrecy capacity of HUs, LUs, ad DUs, respectively. The costraits 9-2 represet the maximum allowed trasmit power of HUs, LUs, ad DUs, respectively. The costraits put limitatios o the subcarrier allocatio policy so that each subcarrier ca oly be allocated to at most oe U of the same type. III. SCRCY-OPTIMIZD RSOURC ALLOCATION OPTIMIZATION Joit optimizatio of subcarriers ad trasmit power is a itractable problem [], ad the optimizatio problem 5 with costraits 6-24 listed i Sectio II is odetermiistic polyomial NP hard, which is impossible to be directly solved. But it is oted that uder ay give the subcarrier allocatio policy, problem 5 ca be trasformed to a covex form accordig to the Perro-Frobeius theory. Thus, if we solve the equivalet covex problem for every possible subcarrier allocatio policy, the global optimal solutio ca be derived. However, such exhaustive method with high complexity is hard to be practical. I this paper, we solve this trasformed covex-optimizatio problem with two steps. I the first step, we propose a suboptimal algorithm to allocate each user with proper subcarriers. I the secod step, we desig a optimal power allocatio scheme uder the subcarrier allocatio policy proposed i the first step. Similar method to tackle the NP-hard problem has bee used i previous works [37] [39]. Based o the proposed subcarrier allocatio solutio, it ca be demostrated that the optimizatio problem 5 ca be completely solved through proposig the optimal power allocatio solutio. A. Subcarrier Allocatio I this subsectio, subcarrier allocatio scheme is derived for solvig problem 5. Note that the subcarrier allocatio idex is a discrete variable ad for ay give subcarrier allocatio scheme the optimal power allocatio is idepedet from the subcarrier allocatio results. Therefore, the followig theorem ca be holde. Theorem : For ay optimizatio problem max {x,y} fx,y, where x N X is a fiite discrete variable vector ad each elemet of x is oe of S iteger values. y R Y is cotiuous variable. X, S ad Y are positive itegers. Let x i deote the i-th feasible solutio of x, where x is the optimal x, ad y i deote the optimal y uder x i ad i X S. Therefore, x ca be expressed as: x = argmax {x i} fx i,y i. 25 Proof: Please see Appedix A. Accordig to Theorem, let x deote the subcarrier allocatio scheme ad y deote the trasmit power allocatio scheme, the optimal subcarrier allocatio scheme ca be directly derived with exhaustive method. However, such exhaustive method is impractical because each subcarrier eeds to be searched to derive the optimal subcarrier allocatio, which resultig i a high complexity. I this subsectio, a suboptimal subcarrier allocatio scheme is proposed to optimize the capacity of each cell e.g., HPNs or LPNs, which ca be expressed as: max s.t. h== h= log αh h ph h hhh h Bσ 2 26 p H h hhl hl IH, 27 α H h =,αh h {0,}, 28 h= var p H h,αh h, 29 where I H is the maximum allowed iterferece caused by HUs. Obviously, it ca be solved by usig the Lagragia fuctio, i.e., Lα H h,ph h = H h== λ log αh h ph h hhh h σ 2 h= where λ is the Lagrage multiplier. p H h hhl hl IH, 30

6 6 Accordig to the Karush-Kuh-Tucker KKT coditio, the optimal subcarrier allocatio scheme to maximize the data rate of HPNs ca be expressed as: { α H h = = argmax log λσ λ [ 2 λ σ2]. 3 0 others Iitialize the Lagrage multiplier ad the use the subgradiet-based method [40] to search for the subcarrier allocatio scheme. The proposed algorithm is executed i each cell e.g., HPNs or LPNs to a achieve good performace. I the whole etwork comprised of multiple HPNs, this proposal ca work efficietly i each HPN, thus the overall performace ca be optimized. B. Power Allocatio Scheme I this subsectio, based o the aforemetioed subcarrier allocatio, the power allocatio to solve problem 5 is researched. Problem 5 ca be rewritte as: h== C HS h H = h= l= m= C HS h L C LS lm l= m= l= k== C LS lm L l= k= lk = lk. 32 I OFDMA based wireless etworks, the iterferece betwee ay two differet subcarriers ca be igored due to the orthogoal characteristics. Therefore, the primal obective fuctio ca be divided ito N idepedet subproblems, which idicates that the primal problem ca be derived by solvig the N subproblems. The -th subproblem optimizatio ca be give as: max {p H h,pl lm,pd lk } s.t. h= C HS h L l= m= C LS lm L l= k= lk 33 Ch HS Cmi, HS h, 34 Clm LS mi, l,m, 35 Clk DS Cmi, DS l, k, 36 p H h PH max, h,, 37 p L lm Pmax, l,m,, L 38 p D lk PD max, l,k,. 39 Note that 33 is still o-covex due to the iter-tier iterferece. To trasform it ito a covex form, the uplik chael state iformatio CSI vector of the h-th HU o the -th subcarrier, which represets the CSI from the h-th HU to the HPN, from the h-th HU to LPNs, ad from the h-th HU to the receiver of other DUs that share the -th subcarrier, is give by G H h = [ h HH h,hhl h, hhl hl,hhd h, hhd hl ] T, 40 where h,m,l { h,l h,m,lα H h,αl lm,αd lk 0}. Accurately, uder give subcarrier allocatio scheme, at most oe LU ca be allocated to the -th subcarrier of the l-th LPN. Similarly, the uplik CSI vector for the LU o the -th subcarrier of the l-th LPN ca be give as: [ T, G L l = h LH lm,h LL lm, h LL lml,h LD lm, hlml ] LD 4 where h,m,l { h,l h,m,lα H h,αl lm,αd lk 0}. Similarly, the uplik CSI vector for the DU o the -th subcarrier of the l-th LPN ca be give as: G D l = [ h DH lk,hdl lk, hdl lkl,hdd lk,hdd lkl ] T, 42 where h,k,l { h,l h,k,lα H h,αl lm,αd lk 0}. Combie these three CSIs G H h, GL l, GD l together, it ca be derived that o the -th subcarrier, the CSI matrix amog all users o the -th subcarrier ca be expressed as: G = G H h,g L,G L 2, G L l, G D,G D 2 G D l G. }{{}}{{} LPN D2Duserpair 43 Similarly, the CSI betwee users ad the eavesdropper o the -th subcarrier is give by G = h H h,h L m,h L 2m, h L }{{ lm, } LPN h D k,h D 2k, h D lk }{{} D2D. 44 Note that for a give subcarrier allocatio scheme, G ad G are fixed, which meas that the umber of users HU, LU ad DU o the -th subcarrier is determied ad the CSI matrix ca be kow. Without loss of geerality, let G be a J J matrix which deotes that the umber of users o the -th chael is J, ad let G be a J vector. The trasmit power matrix of the J users is give by p. A oegative matrix is defied F with etries F i = { 0 ifi = G i G ifi, 45 T. σ ad the vector v = 2 σ G, 2 σ G, 2 22 G JJ Now, the SINR of the -th user i the uplik is S = p F p v, ad its correspodig capacity ca be expressed as: Similarly, we ca have C = log S. 46 F i = ad the vector v = { 0 ifi = σ 2 G G i G ifi T. σ, 2 σ G, 2 2 G J, 47

7 7 Now the SINR of the -th user i the wiretap chael ca be expressed as S = p F pv, ad the data rate is C = log S. Rewrite 33 as: max {p } s.t. C = C = 48 C C C S mi,, 49 0 p p max,, 50 where C S mi ad p max are the miimum secrecy data rate ad maximum trasmit power costraits, respectively. Due to the iter-tier iterferece, the optimizatio problem i 48 is still hard to be derived. To solve this problem, we ca defie the vector α { 0 i α i = 5 i = ad the costrait 50 ca be expressed as: α T p p max. 52 To trasfer the costrait 50, we ca have the followig theorem: Theorem 2: Let B = F the costrait 50 is equal to: p max v α T, 53 B = F v p max αt, 54 q = F p v, 55 q = F p v, 56 B diage C q IB q, 57 B diage C q IB q. 58 Proof: Please see Appedix B. Based o Theorem 2, the optimizatio problem i 48 ca be trasformed to max C C 59 {C,C,q,q } = = s.t. C C C S mi,, 60 B diage C q IB q,, 6 B diage C q IB q,. 62 Obviously, the obective fuctio 59 has bee trasferred to be liear. However, this optimizatio problem is still ocovex because of the o-covex costraits 6 ad 62. These two costraits ca be trasformed ito be covex by usig the followig theorem. Theorem 3: If the o-egative matrix B = IB B ad B = IB B holds, the optimizatio problem i 59 ca be trasformed ito a covex form as: max {C,C } s.t. C = C = 63 C C C S mi,, 64 log ρ B diag e C 0,, 65 log ρ B diag e C 0,, 66 where ρ is the the Perro-Frobeius eigevalue of a oegative matrix. Proof: Please see Appedix C. Due to the log-covexity property of the Perro-Frobeius eigevalue, the costraits 65 ad 66 are covex. Now the cocered optimizatio problem i 59 is a covex optimizatio problem ad ca be solved i polyomial time. However, such problem is very hard to solve by the traditioal sub-gradiet covex optimizatio method because it is difficult to get the closed-form expressios of C ad C, which is essetial to achieve the solutio. To deal with this challege, a ovel method which is effective for this problem is proposed i the followig cotet. The Lagragia fuctio of problem 63 ca be expressed as: LC,C,λ,β,µ = = C = = C = λ C C C mi S β log ρ B diag e C = µ log ρ B diag e C, 67 where λ, β, µ are the Lagrage multipliers correspodig to the costraits. The, the Lagragia dual fuctio ca be expressed as: gλ,β,µ = max {C,C } LC,C,λ,β,µ. 68 Therefore, the dual optimizatio problem ca be formulated as: mi {λ,β,µ} gλ,β,µ s.t. λ 0,β 0,µ Sice the optimizatio problem i 63 is covex, the duality gap betwee the primal problem ad its dual problem is zero, which illustrates that the primal problem ca be solved by solvig its dual problem69. The sub-gradiet-based method ca be utilized to solve 69 ad the sub-gradiet of the

8 8 Lagrage multipliers i the dual fuctio i the i-th iteratio ca be writte as: λ i = C i C i C mi S, J, 70 β i = logρ B diage Ci, J, 7 µ i = logρ B diageci, J 72 where C i ad C i are the capacity ad leakage capacity of the-th U o the-th subcarrier i thei-th iteratio, respectively. λ i, β i ad µ i deote the -th sub-gradiet correspodig to λ, β ad µ utilized i the i -th iteratio. Therefore, the update equatios for the dual variables i the i-th iteratio ca be expressed as: λ i = [ λ i ξ λ i β i = µ i = C i C i C mi S ] 73 [β i ξ β ilogρ B diage Ci ] 74 ] [µ i ξ µ ilogρ B diageci 75 where ξ λ i, ξ β i ad ξ µ i are positive step sizes. Accordig to the above derivatios, a sub-gradiet method based iteratio algorithm is preseted to solve 69 as show i Algorithm. To solve 76, rewrite 67 with give Lagrage multiplier λ i,β i,µ i as: LC,C = C = = = = C = λ i C C C mi S β i log ρ B diag e C µ i ρ B log diag e C 77 = f C,C g C,C, 78 Algorithm Sub-gradiet method based iteratio algorithm for the outer loop optimziatio : Set the iteratio idex i =. Iitialize the Lagrage multiplier λ i,β i,µ i, the step size ξ λ,ξ β,ξ µ, the maximum umber of iteratios I max ad the iteratio threshold δ. 2: for i I max 3: Calculate C i,c i which ca be expressed as 4: C i,c i = argmi LC i,c i,λ i,β i,µ i 76 {C i,c i } λ i = [ λ i ξ λ i C i C i ] C mi S ; [ ] ; 5: β i = β i ξ β ilogρ B diage Ci [ ; 6: µ i = µ i ξ µ ilogρ B diageci ] 7: if λ i λ i β i β i µ i µ i δ 8: break out; 9: ed if 0: i = i; : ed for 2: retur C i C i. where f C,C = β i log ρ B diag e C = = g C,C = C = = µ i ρ B log diag e C C = 79 λ i C C C mi S. 80 It is obvious that g C,C is closed proper covex fuctio ad f C,C is differetiable. So the proximal gradiet method ca be used to solve 76 accordig to the proximal theory. The proximal operator of f C,C is calculated as: prox g C,C = λ i C C I. 8 The partial derivatives of f C,C with respect to C,C are give by

9 9 f dc = f dc = = = β i x B diage C y B diage C, µ i x B diage C y B diage C., i.e., OJ. Therefore, the complexity of the power allocatio scheme is OJ 2. Therefore, the total complexity of the proposed algorithm is ONJ 2 HLM LK. The algorithm proposed i [3] has a complexity of ONKN M. Compared with the algorithm preseted i [3], the algorithm proposed i this paper cosiders both subcarrier ad power allocatio scheme at the expese of the complexity. Due to icludig subcarrier ad power allocatio executios, the proposed algorithm i this paper ca be solved i polyomial time ad is acceptable i practice. where x ad y represet the right ad left Perro- Frobeius eigevalue, respectively. It obvious that problem 76 is covex because it is a dual problem [40]. Due to the proximal gradiet method, the proximal operator of 76 has a fixed poit, which is the optimal value of 76, too. Therefore, a iterative algorithm is proposed to fid the fixed poit as show by the Algorithm 2. I fact, Algorithm ad Algorithm 2 are the outer loop ad ier loop, respectively. O each subcarrier, the Algorithm is executed to solve the equivalet covex optimizatio problem of D2D uderlayig HetNets, while the Algorithm 2 is utilized to solve the dual problem proposed i Algorithm. The complexity of the proposed algorithm is aalyzed ad compared with the algorithm preseted i [3] as follows. The complexity of the subcarrier allocatio scheme is liear with ONH LM LK. The complexity of the power allocatio algorithm is determied by Algorithm ad Algorithm 2. The complexity of Algorithm is liear with the umber of dual factors, i.e., OJ. The complexity of Algorithm 2 is liear with the umber of the elemets of C i,c i IV. SIMULATION RSULTS AND DISCUSSIONS I this sectio, the secrecy capacity performace of the D2D commuicatio uderlayig HetNets ad the correspodig optimizatio results are umerically evaluated with simulatios. I our simulatios, oe HPN is cocered, ad all LPNs are uiformly located i the circle with the distace of 000m whose ceter is the HPN. The cell radius of HPN ad LPN are 800m ad 200m, respectively. The miimum allowed distace betwee HPN ad users is 50 m ad the miimum allowed distace betwee LPN ad users is 20 m to protect users from radiatio. It is assumed that H = 2, i.e., there are 2 HUs who access to the HPN. Deote M = 5 ad K = 5, which suggests that 5 LUs ad 5 D2D liks radomly locate i the coverage of each LPN. All of LPNs share N = 8 subcarriers Algorithm 2 The dual problem solutio for the ier loop optimizatio : Set the iteratio idex s =. Iitialize the Lagrage multiplier λ i,β i,µ i of the i-th iteratio of Algorithm, the maximum umber of iteratios S max ad the iteratio threshold η. 2: for s S max 3: Calculate C s C s 4: if C s 5: break out; 6: ed if 7: s = s C s = prox g C s f dc s = prox g C s,c s 8: ed for 9: retur C s ad C s C s C s,c s, 84 f dc s η. 85 ad each subcarrier occupies 200 KHz. O each subcarrier, a eavesdropper exists i the cocered sceario ad it locates radomly. The total trasmit power of HPN is 43 dbm ad equally allocated o all subcarriers. The trasmit power of the trasmitter of DU is 5 dbm ad the distace betwee the trasmitter ad the receiver is 0 m. It is assumed that the path loss model is expressed as log 0 d for the D2D lik ad the LPN-to-LU, LPN-D2D ad D2D-LU lik with short trasmit distace, while log 0 d is used for other log liks, where d deotes the distace betwee the trasmitter ad the receiver i meters. The umber of simulatio sapshots is set at 000. I all sapshots, the fast-fadig coefficiets are all geerated as idepedetly ad idetically distributed i.i.d. Rayleigh radom variables with uit variaces. A. Covergece of the Proposed Algorithm To evaluate the covergece performace of the algorithm uder more users, we set H = 0, N = 20, M = 5 ad K = 5, respectively. The covergece of the proposed algorithm with differet QoS requiremets is show i Fig. 2. It ca be obviously illustrated that the proposed algorithm coverges withi 5 iteratio umbers for differet QoS requiremets, which suggests that the proposed algorithm ca work efficietly. Besides, the differet levels of QoS requiremets have sigificat impacts o the performace of the secrecy capacity. To evaluate the ifluece of the QoS requiremets, three QoS levels are set ad the maximum allowed trasmit power of LPNs is set at 24 dbm. Fig. 2 shows that the secrecy capacity of the system decrease with the QoS requiremet icreasig. I the case of high QoS requiremet, more trasmit power should be allocated to the user who is uable to achieve the QoS requiremet, thus the system performace has a decrease. So there exists a balace betwee the system performace ad the user performace.

10 0.5.5 Secure capacitybps/hz 0.5 QoS requiremet=0 bps/hz QoS requiremet=0. bps/hz QoS requiremet=0.2 bps/hz QoS requiremet=0.3 bps/hz QoS requiremet=0.4 bps/hz Secure capacity bps/hz 0.5 Maximum trasmit power allowace of LPN=24dBm Maximum trasmit power allowace of LPN=2dBm Maximum trasmit power allowace of LPN=8dBm Maximum trasmit power allowace of LPN=5dBm Iteratios QoS requiremet bps/hz Fig. 2. Covergece evolutio uder differet QoS requiremets B. Secure Capacity Performaces of the Proposed Solutios I this part, key factors impactig o the secrecy capacity performaces of the proposed algorithm are evaluated. Sice the trasmit power costrait ad the QoS requiremet are two mai costraits i the proposed optimizatio problem, the impact of these two factors are evaluated i Fig. 3 ad Fig. 4, respectively. Besides, the average secrecy capacity per U is more sigificat tha the total secrecy capacity to evaluate the performace of the D2D uderlayig HetNets whe the umber of Us chages frequetly. Therefore, to evaluate the impact of the umber of Us to the D2D uderlayig HetNets, the relatioship betwee the umber of Us ad the average secrecy capacity per U should be evaluated. Sice LUs usually cotribute more capacity to the etwork tha HUs ad DUs, without loss of geerality, oly the relatioship betwee the umber of LUs per LPN ad the average secrecy capacity per LU is evaluated i this part ad the correspodig simulatio result is show i Fig. 5. It should be oted that i HetNets, HPNs are maily deployed to provide seamless coverage ad LPNs which are closer to users are deployed i hot spots to provide high capacity. Therefore, the capacity of the etwork is maily determied by LPNs ad oly the maximum trasmit power allowace of LPN is simulated i this paper. I Fig. 3, the secrecy capacity performaces uder varied QoS requiremets with a step size of 0.02 are compared amog differet maximum allowed trasmit power. Whe the QoS requiremet is ot sufficietly large, the secrecy performace decreases slowly with the icreasig QoS requiremet because most users ca set a sufficietly high trasmit power to satisfy its QoS requiremet. However, whe the QoS requiremet becomes large eough, more users ca afford the QoS requiremet ad the more trasmit power has to be allocated to these users to meet the QoS requiremet. Furthermore, it ca be illustrated from Fig. 3 that with the larger maximum allowed trasmit power of LPN, the secrecy capacity performace icreases, which has a similar tred with Fig. 4. Fig. 3. Secure capacity performace comparisos uder differet QoS requiremets To further evaluate the impact of the maximum allowed trasmit power of LPNs o the secure capacity performaces, four baselies are preseted. The first baselie is the upper boud of this problem ad it is calculated by the exhaustive method. We do the power allocatio algorithm for each possible subcarrier allocatio scheme ad get the optimal subcarrier ad power allocatio for the problem. The secod baselie is proposed by [3]. I [3], users that cause severe iterferece are scheduled to the other subcarriers to alleviate iterferece. For example, if user A iterferes other users seriously o the i-th subcarrier, it ca be scheduled to the -th subcarrier, o which the iterferece ca be almost avoided. The third baselie is based o the classic orthogoal subcarrier allocatio which has bee widely used i HetNets. The fourth baselie is based o the fixed power scheme, i.e., the trasmit power allocated to LUs is same ad fixed. Fig. 4 compares the secure capacity performace of differet algorithms i terms of maximum allowed trasmit power of LPNs. I this simulatio case, the QoS requiremet is set at 0 ad the maximum allowed trasmit power of LPNs varies withi [4 dbm, 36 dbm] with the step size of 2 dbm. Fig. 4 shows that whe the trasmit power is ot sufficietly high, the secure capacity performace icreases with the trasmit power rises because the iterferece is still ot the bottleeck ad the icremet of secure capacity maily depeds o icreasig trasmit power. However, whe the maximum allowed trasmit power of LPNs is sufficietly high, the iterferece limits the icrease of the secure capacity. Thus, o more trasmit power is allocated to users. As show i Fig. 4, the proposed algorithm is closed to the upper boud ad outperforms the algorithm preseted i [3] because the referece [3] ust proposed some mechaisms to mitigate the ifluece of iterferece. Ad the algorithm preseted i [3] is better tha the orthogoal subcarrier allocatio due to the beefit of frequecy reuse. Furthermore, the fixed power scheme has the worst performace because it takes o measures to optimize the secure capacity performace

11 Secure capacity bps/hz Upper boud Proposed algorithm Algorithm proposed by [3] Orthogoal subcarrier allocatio Fixed powr scheme Secure rate per LU bps/hz Maximum trasmit power allowace of LPN=24dBm Maximum trasmit power allowace of LPN=2dBm Maximum trasmit power allowace of LPN=8dBm Maximum trasmit power allowace of LPN=5dBm Maximum trasmit power allowac of LPNdBm Number of LUs Fig. 4. Secure capacity performace comparisos uder differet maximum trasmit power allowaces of LPNs Fig. 5. Average secure capacity per LU comparisos uder differet umber of LUs per LPN of the whole system. Fig. 5 illustrates the relatioship betwee the umber of LUs ad the average secrecy capacity per LU to evaluate the impact of the umber of Us to the whole etwork. I this simulatio case, the QoS requiremet is set at 0. bps/hz ad the maximum allowed trasmit power of LPNs varies from 8 dbm to 22 dbm with a step size of 2 dbm. The miimum umber of LUs per LPN is set to. Sice the umber of subcarriers is set to 8, which suggests that at most 8 LUs ca simultaeously coect to the LPN i each time slot i each LPN, the maximum umber of LUs per LPN are set to 8. It ca be see i Fig. 5 that as the umber of LUs per LPN icreases, the average secrecy capacity per LU decreases because the itra-tier iterferece icreases with more LUs coectig to the same LPN. The augmet of itra-tier iterferece leads to the abatemet of average secrecy capacity per LU. However, it ca be calculated from Fig. 5 that the total secrecy capacity of the whole LUs keeps icreasig as the umber of LUs per LPN rises, because whe more LUs coect to the LPN, more subcarriers ca be allocated to these LUs util the umber of LUs is equal to the umber of the subcarriers. Besides, Fig. 5 shows that the higher the maximum trasmit power allowace of LPN is, the better the secrecy capacity of the whole etwork achieves, which has the same tred as show i Fig. 3. V. CONCLUSION I this paper, the secrecy-optimized resource allocatio for the device-to-device D2D commuicatio uderlayig heterogeeous etworks HetNets has bee researched. I the cocered system model, there desely exist high power ode ad low power ode with D2D commuicatio, therefore, the iter-tier iterferece is always severe, which leads to the secrecy-optimized maximizatio problem beig o-covex. To solve this o-covex optimizatio problem, the primal o-covex optimizatio problem has bee trasformed ito the covex issue with several steps. Firstly, the obective fuctio with several costraits are trasformed ito a matrix form. Secodly, the equivalet covex form of the maximizatio problem for the matrix form is derived accordig to the Perro-Frobeius theory. Thirdly, the proximal operator of the trasformed covex problem is evaluated. The, a ovel iterative algorithm based o the proximal theory to solve the equivalet covex problem is proposed. Simulatio results have demostrated that the secrecy capacity has a sigificat improvemet ad the proposed algorithm is effective ad coverges fast. Furthermore, comparig with four baselies, the proposal has a sigificat performace gai o the secrecy capacity of the whole etwork. I the future, the o-ideal CSIs should be cosidered to optimize the secrecy capacity. I additio, the advaced iter-tier iterferece i the physical layer ad the dyamical queue characteristics i the upper layer should be oitly cosidered with the radio resource allocatio to optimize the secrecy capacity i the D2D commuicatio uderlyig HetNets. APPNDIX A PROOF OF THORM Without loss of geerality, let x p deote the optimal x. Thus, It ca be derived as: x p = argmax {x i} fx i,y i. 86 Assume that there exists x x which is better tha x i. Therefore, the followig equatio holds. which meas that fx p,yp < fx,y, 87 x = argmax {x i} fx i,yi. 88 It is obviously that 88s coflict with 86. Thus x p is the optimal x ad theorem holds.

12 2 APPNDIX B PROOF OF THORM 2 Accordig to 46, it ca be derived that e C = p S = F p v which is the same as: APPNDIX C PROOF OF THORM 3 Sice IB exists, multiply both sides of costrait 6 by IB, ad the followig equatio ca be derived as: diage C I F p v = p. 89 Substitutig 55 ito 89, it ca be derived as: diage C q = p q. 90 Multiply both sides of 90 by B which is give by 53, we ca have = F F =F p p max v α T p max v α T diage C q p F v α T q p max 9 v α T p F v α T p max p max q. Accordig to 52, α T p p max. Thus 92 p max v α T p = v α T p p max v, 93 ad F p v α T p max p F v α T q p max F p v F v α T q 94 p max = q F v α T q 95 p max = IF v α T q, 96 p max where 95 is derived by 55. Now the formula ca be derived as: F v α T diage C q p max IF v α T q. 97 p max Substitutig 53 ito the above iequality, 57 ca be derived. Similarly, 58 ca be derived accordig to 54 ad 56. B diage C q IB q IB B diage C q q B diage C q q. 98 Accordig to the subivariace theorem [4], if a oegative matrix A, a positive umber a ad a oegative vector v satisfy Av av, the ρa a ad the equality holds if ad oly if Av = av. Let A = B diage C, a = ad v = q ad rewrite 6 as ρ B diag e C, which is the same as log ρ B diag e C 0. Similarly, it ca be derived that log ρ B diag e C 0. RFRNCS [] V. Suryaprakash, J. Moller, ad G. Fettweis, O the modelig ad aalysis of heterogeeous radio access etworks usig a poisso cluster process, I Tras. Wireless Commu., vol. 4, o. 2, pp , Feb [2] J. Youg, M. Hasa, ad A. Ghrayeb, Modelig heterogeeous cellular etworks iterferece usig poisso cluster processes, I J. Sel. Areas Commu., vol. 33, o. 0, pp , Oct [3] S. Sigh ad J. Adrews, Joit resource partitioig ad offloadig i heterogeeous cellular etworks, I Tras. Wireless Commu., vol. 3, o. 2, pp , Feb [4] M. Peg, C. Wag, J. Li, H. Xiag, ad V. Lau, Recet advaces i uderlay heterogeeous etworks: Iterferece cotrol, resource allocatio, ad self-orgaizatio, I Commu. Surveys & Tutorials, vol. 7, o. 2, pp , secod quarter, 205. [5] M. Jo, T. Maksymyuk, B. Strykhalyuk, ad C.H. Cho, Device-todevice-based heterogeeous radio access etwork architecture for mobile cloud computig, I Wireless Commu., vol. 22, o. 3, pp , Ju [6] K. Doppler et. al., Device-to-device commuicatio as a uderlay to LT-advaced etworks, I Commuicatios Magazie, vol. 47, o. 2, pp , Dec [7] H. Dog, W. Kae, S. Wha, ad G. Dog, Two-stage semi-distributed resource maagemet for Device-to-Device commuicatio i cellular etworks, I Tras. Wireless Commu., vol. 3, o. 4, pp , Apr [8] C. Yu, K. Doppler, C. B. Ribeiro, ad O. Tirkkoe, Resource allocatio optimizatio for device-to-device commuicatio uderlayig cellular etworks, I Tras. Wireless Commu., vol. 0, o. 8, pp , Aug. 20. [9] T. Peg, Q. Lu, H. Wag, S. Xu, ad W. Wag, Iterferece avoidace mechaisms i the hybrid cellular ad device-to-device systems, i Proc I PIMRC, pp [0] H. Mi, J. Lee, S. Park, ad D. Hog, Capacity ehacemet usig a iterferece limited area for device-to-device uplik uderlayig cellular etworks, I Tras. Wireless Commu., vol. 0, o. 2, pp , Dec. 20. [] X. Che, L. Che, M. Zeg, X. Zhag, ad D. Yag, Dowlik resource allocatio for device-to-device commuicatio uderlayig cellular etworks, i Proc. Pers. Idoor, Mobile Radio Commu. Cof., pp [2] F. Li, M. Lei, ad F. Gao, Device-to-device D2D commuicatio i MU-MIMO cellular etworks, i Proc. Global Commu. Cof.., pp , Dec [3] B. Peg, C. Hu, T. Peg ad W. Wag, Optimal resource allocatio for multi-d2d liks uderlyig OFDMA-based commuicatios, i Proc. Iteratioal Coferece o Wireless Commuicatios, Networkig ad Mobile Computig WiCOM, pp. 4, Shaghai, 202. [4] W. Liu, Y. Yag, T Peg, ad W. Wag, Optimal resource allocatio scheme for satisfyig the data rate requiremet i hybrid etwork of D2D-cellular, Joural of Computers, vol. 9, o. 5, may. 204.

13 3 [5] X. Tag, R. Liu, P. Spasoevic, ad H. Poor, Iterferece assisted secret commuicatio, I Tras. If. Theory, vol. 57, o. 5, pp , May 20. [6] L. Dog, Z. Ha, A. Petropulu, ad H. Poor, Improvig wireless physical layer security via cooperatig relays, I Tras. Sigal Process., vol. 58, o. 3, pp , Mar [7] Y. Liag, H. Poor, ad S. Shamai, Secure commuicatio over fadig chaels, I Tras. If. Theory, vol. 54, o. 6, pp , Ju [8] X. Tag, R. Liu, P. Spasoevic, ad H. Poor, Iterferece assisted secret commuicatio, I Tras. If. Theory, vol. 57, o. 5, pp , May 20. [9] Z. Chu, K. Cumaa, M. Xu, ad Z. Dig, Robust secrecy rate optimisatios for multiuser multiple-iput-sigle-output chael with device-to-device commuicatios, IT Commuicatios, vol. 9, o. 3, pp , Feb [20] H. Zhag, T. Wag, L. Sog, ad Z. Ha, Radio resource allocatio for physical-layer security i D2D uderlay commuicatios, i Proc. 204 I ICC, pp , Jue [2] J. Yue, C. Ma, H. Yu, ad W. Zhou, Secrecy-Based Access Cotrol for Device-to-Device Commuicatio Uderlayig Cellular Networks, I Commu. Lett., vol. 7, o., pp , Nov [22] V. Blodel, L. Niove, ad P. Doore, A affie eigevalue problem o the oegative orthat, Liear Algebra Its Appl., vol. 404, pp. 69C84, [23] U. Krause, Cocave PerroCFrobeius theory ad applicatios, Noliear Aal, vol. 47, o. 200, pp. 457C466, 200. [24] C. Ta, S. Friedlad, ad S. Low, Noegative matrix iequalities ad their applicatio to ocovex power cotrol optimizatio, SIAM J. Matrix Aal. Appl., vol. 32, o. 3, pp. 030C055, 20. [25] A. Tolli, H. Peae, ad P. Komulaie, Decetralized miimum power multi-cell beamformig with limited backhaul sigalig, I Trasactios o Wireless Commu., vol. 0, o. 2, pp , Feb. 20. [26] W. Xu ad X. Wag, Pricig-based distributed dowlik beamformig i multi-cell OFDMA etworks, I J. Sel. Areas Commu., vol. 30, o. 9, pp , Oct [27] B. Dai ad W. Yu, Sparse beamformig ad user-cetric clusterig for dowlik cloud radio access etwork, I Access, vol. 2, pp , Oct [28] D. W. K. Ng,. S. Lo, ad R. Schober, ergy-efficiet resource allocatio i multi-cell OFDMA systems with limited backhaul capacity, I Trasactios o Wireless Commu., vol., o. 0, pp , Oct [29] C. Xiog, G. Y. Li, S. Zhag, Y. Che ad S. Xu, ergy- ad spectralefficiecy tradeoff i dowlik OFDMA etworks, I Trasactios o Wireless Commu., vol. 0, o., pp , Nov. 20. [30] C. Xiog, G.Y. Li, S. Zhag, Y. Che, ad S. Xu, ergy-efficiet resource allocatio i ofdma etworks, I Tras. Commu., vol. 60, o. 2, pp , Dec [3] X. Xiao, X. Tao, ad J. Lu, QoS-aware eergy-efficiet radio resource schedulig i multi-user ofdma systems, I Commu. Lett., vol. 7, o., pp , Ja [32] W. Dag, M. Tao, H. Mu, ad J. Huag, Subcarrier-pair based resource allocatio for cooperative multi-relay OFDM systems, I Tras. Wireless Commu., vol. 9, o. 5, pp , May 200. [33] J. Zhag, L. Fu, ad X. Wag, Asymptotic aalysis o secrecy capacity i large-scale wireless etworks, I/ACM Tras. Netw., vol. 22, o., pp , Feb [34] A. Khisti ad G. W. Worell, Secure trasmissio with multiple ateas I: The MISOM wiretap chael, I Tras. If. Theory, vol. 56, o. 7, pp , Jul [35] F. Oggier ad B. Hassibi, The secrecy capacity of the MIMO wiretap chael, I Tras. If. Theory, vol. 57, o. 8, pp , Aug. 20. [36] T. Liu ad S. Shamai, A ote o the secrecy capacity of the multipleatea wiretap chael, I Tras. If. Theory, vol. 55, o. 6, pp , Ju [37] D. W. K. Ng,. S. Lo, ad R. Schober, ergy-efficiet resource allocatio i multi-cell OFDMA systems with limited backhaul capacity, I Trasactios o Wireless Commu., vol., o. 0, pp , Oct [38] G. Lim, C. Xiog, L. J. Cimii, ad G. Y. Li, ergy-efficiet resource allocatio for OFDMA-based multi-rat etworks, I Trasactios o Wireless Commu., vol. 3, o. 5, pp , May 204. [39] M. Tao, Y. C. Liag ad F. Zhag, Resource allocatio for delay differetiated traffic i multiuser OFDM systems, I Trasactios o Wireless Commu., vol. 7, o. 6, pp , Ju [40] S. Boyd ad L. Vaderberghe, Covex Optimizatio, Cambridge Uiversity Press, [4] C. Ta, S. Friedlad, ad S. Low, Noegative matrix iequalities ad their applicatio to ocovex power cotrol optimizatio, SIAM J. Matrix Aalysis Appl, vol. 32, o. 3, pp , 20.

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg

More information

Subcarriers and Bits Allocation in Multiuser Orthogonal Frequency Division Multiplexing System

Subcarriers and Bits Allocation in Multiuser Orthogonal Frequency Division Multiplexing System Sesors & Trasducers, Vol. 168, Issue 4, April 014, pp. 10-15 Sesors & Trasducers 014 by IFSA Publishig, S. L. http://www.sesorsportal.com Subcarriers ad Bits Allocatio i Multiuser Orthogoal Frequecy Divisio

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

Tier-Aware Resource Allocation in OFDMA Macrocell-Small Cell Networks

Tier-Aware Resource Allocation in OFDMA Macrocell-Small Cell Networks 1 Tier-Aware Resource Allocatio i OFDMA Macrocell-Small Cell Networks Amr Abdelasser, Ekram Hossai, ad Dog I Kim arxiv:145.2v1 [cs.ni] 8 May 214 Abstract We preset a joit sub-chael ad power allocatio framework

More information

Location-Aware Coordinated Multipoint Transmission in OFDMA Networks

Location-Aware Coordinated Multipoint Transmission in OFDMA Networks Locatio-Aware Coordiated Multipoit Trasmissio i OFDMA Networks Ahmed Hamdi Sakr, Hesham ElSawy, ad Ekram Hossai Abstract We propose a ovel Locatio-Aware multicell Cooperatio (LAC) scheme for dowlik trasmissio

More information

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are

More information

ROBUST RADIO RESOURCE ALLOCATION IN LTE NETWORKS BY CHANNEL AND RELAY ASSIGNMENT

ROBUST RADIO RESOURCE ALLOCATION IN LTE NETWORKS BY CHANNEL AND RELAY ASSIGNMENT Joural of Egieerig Sciece ad Techology Vol. 12, No. 7 (2017) 1845-1854 School of Egieerig, Taylor s Uiversity ROBUST RADIO RESOURCE ALLOCATION IN LTE NETWORKS BY CHANNEL AND RELAY ASSIGNMENT R. SANTHAKUMAR*,

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

Joint Resource Allocation Scheme for Device-To-Device Communication under a Cellular Network

Joint Resource Allocation Scheme for Device-To-Device Communication under a Cellular Network BULGARIAN ACAEMY OF SCIENCES CYBERNETICS AN INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 015 Prit ISSN: 1311-970; Olie ISSN: 1314-4081 OI: 10.1515/cait-015-0070

More information

ACCEPTED FOR PUBLICATION AT THE EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING 1

ACCEPTED FOR PUBLICATION AT THE EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING 1 ACCEPTED FOR PUBLICATIO AT TE EURASIP JOURAL O WIRELESS COMMUICATIOS AD ETWORKIG 1 A Approach to Optimum Joit Beamformig Desig i a MIMO-OFDM Multiuser System Atoio Pascual-Iserte, Aa I. Pérez-eira, ad

More information

Joint Power Allocation and Beamforming for Cooperative Networks

Joint Power Allocation and Beamforming for Cooperative Networks It. J. Commuicatios, etwork ad System Scieces,, 4, 447-45 doi:.436/ijcs..4753 Published Olie July (http://www.scirp.org/joural/ijcs) Joit Power Allocatio ad Beamformig for Cooperative etworks Sodes Maadi,,

More information

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA 1274 LETTER A Novel Adaptive Chael Estimatio Scheme for DS-CDMA Che HE a), Member ad Xiao-xiag LI, Nomember SUMMARY This paper proposes a adaptive chael estimatio scheme, which uses differet movig average

More information

SIDELOBE SUPPRESSION IN OFDM SYSTEMS

SIDELOBE SUPPRESSION IN OFDM SYSTEMS SIDELOBE SUPPRESSION IN OFDM SYSTEMS Iva Cosovic Germa Aerospace Ceter (DLR), Ist. of Commuicatios ad Navigatio Oberpfaffehofe, 82234 Wesslig, Germay iva.cosovic@dlr.de Vijayasarathi Jaardhaam Muich Uiversity

More information

Lecture 4: Frequency Reuse Concepts

Lecture 4: Frequency Reuse Concepts EE 499: Wireless & Mobile Commuicatios (8) Lecture 4: Frequecy euse Cocepts Distace betwee Co-Chael Cell Ceters Kowig the relatio betwee,, ad, we ca easily fid distace betwee the ceter poits of two co

More information

A Research on Spectrum Allocation Using Optimal Power in Downlink Wireless system

A Research on Spectrum Allocation Using Optimal Power in Downlink Wireless system Iteratioal Research Joural of Egieerig ad Techology (IRJET) e-iss: 2395-0056 Volume: 03 Issue: 04 Apr-206 www.irjet.et p-iss: 2395-0072 A Research o Spectrum Allocatio Usig Optimal Power i Dowli Wireless

More information

A novel adaptive modulation and coding strategy based on partial feedback for enhanced MBMS network

A novel adaptive modulation and coding strategy based on partial feedback for enhanced MBMS network THE JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOMMUNICATIONS Volume 5, Issue, March 2008 SHENG Yu, PENG Mu-ge, WANG We-bo A ovel adaptive modulatio ad codig strategy based o partial feedback for ehaced

More information

ONE of the emerging technologies towards enabling Fifth

ONE of the emerging technologies towards enabling Fifth Eergy ad Spectrum Efficiecy Trade-off for Gree Small Cell Networs Haris Pervaiz, Leila usavia ad Qiag Ni School of Computig ad Commuicatios, IfoLab 21, Lacaster Uiversity, Lacaster, UK Email: {h.pervaiz,

More information

A Radio Resource Allocation Algorithm for QoS Provision in PMP-based Systems

A Radio Resource Allocation Algorithm for QoS Provision in PMP-based Systems 530 OURAL OF COMMUICATIOS, VOL. 5, O. 7, ULY 00 A Radio Resource Allocatio Algorithm for QoS Provisio i PMP-based Systems Pig Wag Broadbad Wireless commuicatios ad Multimedia laboratory, Key Laboratory

More information

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ *

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ * Available olie at www.sciecedirect.com Physics Procedia 33 (0 ) 75 73 0 Iteratioal Coferece o Medical Physics ad Biomedical Egieerig Data Acquisitio System for Electric Vehicle s Drivig Motor Test Bech

More information

Adaptive Resource Allocation in Multiuser OFDM Systems

Adaptive Resource Allocation in Multiuser OFDM Systems Adaptive Resource Allocatio i Multiuser OFDM Systems Fial Report Multidimesioal Digital Sigal Processig Malik Meherali Saleh The Uiversity of Texas at Austi malikmsaleh@mail.utexas.edu Sprig 005 Abstract

More information

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1 Advaces i Egieerig Research, volume 8 d Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 7) Radar emitter recogitio method based o AdaBoost ad decisio tree Tag Xiaojig,

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

OPTIMIZED LINK ADAPTATION FOR WIRELESS PACKET COMMUNICATIONS BASED ON DISCRETE-RATE MODULATION AND CODING SCHEMES

OPTIMIZED LINK ADAPTATION FOR WIRELESS PACKET COMMUNICATIONS BASED ON DISCRETE-RATE MODULATION AND CODING SCHEMES OPTIMIZED LIK ADAPTATIO FO WIELE PACKET COMMUICATIO BAED O DICETE-ATE MODULATIO AD CODIG CHEME Jalil eifali Harsii, ad Farshad Lahouti Wireless Multimedia Commuicatios Laboratory chool of Electrical ad

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

Relay Selection and Max-Min Resource Allocation for Multi-Source OFDM-Based Mesh Networks

Relay Selection and Max-Min Resource Allocation for Multi-Source OFDM-Based Mesh Networks Relay Selectio ad Max-Mi Resource Allocatio for Multi-Source OFDM-Based Mesh Networks Kiaoush Hosseii ad Raviraj Adve The Edward S. Rogers Sr. Departmet of Electrical ad Computer Egieerig, Uiversity of

More information

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015)

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015) Iteratioal Power, Electroics ad Materials Egieerig Coferece (IPEMEC 205) etwork Mode based o Multi-commuicatio Mechaism Fa Yibi, Liu Zhifeg, Zhag Sheg, Li Yig Departmet of Military Fiace, Military Ecoomy

More information

Database-assisted Spectrum Access in Dynamic Networks: A Distributed Learning Solution

Database-assisted Spectrum Access in Dynamic Networks: A Distributed Learning Solution 1 Database-assisted Spectrum Access i Dyamic Networks: A Distributed Learig Solutio Yuhua Xu, Member, IEEE, Yitao Xu ad Alaga Apalaga, Seior Member, IEEE arxiv:1502.06669v2 [cs.it] 3 Jul 2015 Abstract

More information

Symbol Error Rate Evaluation for OFDM Systems with MPSK Modulation

Symbol Error Rate Evaluation for OFDM Systems with MPSK Modulation Symbol Error Rate Evaluatio for OFDM Systems with MPS Modulatio Yuhog Wag ad Xiao-Pig Zhag Departmet of Electrical ad Computer Egieerig, Ryerso Uiversity 35 Victoria Street, Toroto, Otario, Caada, M5B

More information

IEEE ICC Wireless Networking Symposium

IEEE ICC Wireless Networking Symposium IEEE ICC 2013 - Wireless Networkig Symposium Traffic-aware Utility based QoS Provisioig i OFDMA Hybrid Smallcells Ravikumar Balakrisha, Berk Caberk ad Ia F. Akyildiz Broadbad Wireless Networkig Laboratory

More information

SIMULTANEOUS INFORMATION-AND-POWER TRANSFER FOR BROADBAND DOWNLINK SYTEMS

SIMULTANEOUS INFORMATION-AND-POWER TRANSFER FOR BROADBAND DOWNLINK SYTEMS This is the Pre-Published Versio. SIMULTANEOUS INFORMATION-AND-POWER TRANSFER FOR BROADBAND DOWNLINK SYTEMS Kaibi Huag Hog Kog Polytechic Uiversity, Hog Kog Email: huagkb@ieee.org Erik G. Larsso Liko pig

More information

Stable Throughput Region of Downlink NOMA Transmissions with Limited CSI

Stable Throughput Region of Downlink NOMA Transmissions with Limited CSI Stable Throughput Regio of Dowlik NOMA Trasmissios with imited CSI Yog Zhou ad Vicet W.S. Wog Departmet of Electrical ad Computer Egieerig The Uiversity of British Columbia, Vacouver, Caada e-mail: {zhou,

More information

Cancellation of Multiuser Interference due to Carrier Frequency Offsets in Uplink OFDMA

Cancellation of Multiuser Interference due to Carrier Frequency Offsets in Uplink OFDMA Cacellatio of Multiuser Iterferece due to Carrier Frequecy Offsets i Upli OFDMA S. Maohar, V. Tiiya, D. Sreedhar, ad A. Chocaligam Departmet of ECE, Idia Istitute of Sciece, Bagalore 56001, INDIA Abstract

More information

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay Efficiet Feedback-Based Schedulig Policies for Chuked Network Codes over Networks with Loss ad Delay Aoosheh Heidarzadeh ad Amir H. Baihashemi Departmet of Systems ad Computer Egieerig, Carleto Uiversity,

More information

Measurement of Equivalent Input Distortion AN 20

Measurement of Equivalent Input Distortion AN 20 Measuremet of Equivalet Iput Distortio AN 2 Applicatio Note to the R&D SYSTEM Traditioal measuremets of harmoic distortio performed o loudspeakers reveal ot oly the symptoms of the oliearities but also

More information

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells The Potetial of Dyamic Power ad Sub-carrier Assigmets i Multi-User OFDM-FDMA Cells Mathias Bohge, James Gross, Adam Wolisz TU Berli Eisteiufer 5, 1587 Berli, Germay {bohge gross wolisz}@tk.tu-berli.de

More information

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells The Potetial of Dyamic Power ad Sub-carrier Assigmets i Multi-User OFDM-FDMA Cells Mathias Bohge, James Gross, Adam Wolisz Telecommuicatio Networks Group, TU Berli Eisteiufer 5, 1587 Berli, Germay {bohge

More information

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks O the Delay Performace of I-etwork Aggregatio i Lossy Wireless Sesor Networks Chaghee Joo, Member, IEEE, ad Ness B. Shroff, Fellow, IEEE Abstract I this paper, we study the implicatio of wireless broadcast

More information

Selective Periodic Component Carrier Assignment Technique in LTE and LTE-A Systems

Selective Periodic Component Carrier Assignment Technique in LTE and LTE-A Systems Selective Periodic Compoet Carrier Assigmet Techique i LTE ad LTE-A Systems Husu S. Narma ad Mohammed Atiquzzama School of Computer Sciece, Uiversity of Oklahoma, Norma, OK 73019 Email: {husu, atiq}@ou.edu

More information

Optimization of Fractional Frequency Reuse in Long Term Evolution Networks

Optimization of Fractional Frequency Reuse in Long Term Evolution Networks 2012 IEEE Wireless Commuicatios ad Networkig Coferece: Mobile ad Wireless Networks Optimizatio of Fractioal Frequecy Reuse i Log Term Evolutio Networks Dimitrios Bilios 1,2, Christos Bouras 1,2, Vasileios

More information

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Chapter ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West

More information

Resource Allocation in Downlink MIMO-OFDMA with Proportional Fairness

Resource Allocation in Downlink MIMO-OFDMA with Proportional Fairness 8 JOURAL OF COUICATIOS VOL. 4 O. FERUARY 009 Resource Allocatio i Dowli IO-OFDA with Proportioal Fairess i Da ad Chi Chug o Departmet of Electrical ad Computer Egieerig atioal Uiversity of Sigapore Email:{dabi

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 5 Special Issue o Applicatio of Advaced Computig ad Simulatio i Iformatio Systems Sofia 06 Prit ISSN: 3-970; Olie ISSN:

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract The capacity of wireless ad hoc etwors is maily restricted by the umber

More information

Broadcast Capacity in Multihop Wireless Networks

Broadcast Capacity in Multihop Wireless Networks Broadcast Capacity i Multihop ireless Networks Alireza Keshavarz- Haddad alireza@rice.edu Viay Ribeiro viay@rice.edu Rudolf Riedi riedi@rice.edu Departmet of Electrical ad Computer Egieerig ad Departmet

More information

Spread Spectrum Signal for Digital Communications

Spread Spectrum Signal for Digital Communications Wireless Iformatio Trasmissio System Lab. Spread Spectrum Sigal for Digital Commuicatios Istitute of Commuicatios Egieerig Natioal Su Yat-se Uiversity Spread Spectrum Commuicatios Defiitio: The trasmitted

More information

CHAPTER 8 JOINT PAPR REDUCTION AND ICI CANCELLATION IN OFDM SYSTEMS

CHAPTER 8 JOINT PAPR REDUCTION AND ICI CANCELLATION IN OFDM SYSTEMS CHAPTER 8 JOIT PAPR REDUCTIO AD ICI CACELLATIO I OFDM SYSTEMS Itercarrier Iterferece (ICI) is aother major issue i implemetig a OFDM system. As discussed i chapter 3, the OFDM subcarriers are arrowbad

More information

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003 troductio to Wireless Commuicatio ystems ECE 476/ECE 501C/C 513 Witer 2003 eview for Exam #1 March 4, 2003 Exam Details Must follow seatig chart - Posted 30 miutes before exam. Cheatig will be treated

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

PERFORMANCE OF MULTIBEAM MIMO FOR NLOS MILLIMETER WAVE INDOOR COMMUNICATION SYSTEMS CHAPTER 6

PERFORMANCE OF MULTIBEAM MIMO FOR NLOS MILLIMETER WAVE INDOOR COMMUNICATION SYSTEMS CHAPTER 6 PERFORMANCE OF MULTIBEAM MIMO FOR NLOS MILLIMETER WAVE INDOOR COMMUNICATION SYSTEMS CAPTER 6 1 PERFORMANCE OF MULTIBEAM MIMO FOR NLOS MILLIMETER WAVE INDOOR COMMUNICATION SYSTEMS CAPTER 6 igh data rate

More information

Multiple Antennas and Beamforming for SWIPT Systems

Multiple Antennas and Beamforming for SWIPT Systems THE UNIVERSITY OF NEW SOUTH WALES SCHOOL OF ELECTRICAL ENGINEERING AND TELECOMMUNICATIONS Multiple Ateas ad Beamformig for SWIPT Systems Author: Cheyag She Submissio Date: 27-October-2017 Master of Egieerig

More information

PHY-MAC dialogue with Multi-Packet Reception

PHY-MAC dialogue with Multi-Packet Reception PHY-AC dialogue with ulti-packet Receptio arc Realp 1 ad Aa I. Pérez-Neira 1 CTTC-Cetre Tecològic de Telecomuicacios de Cataluya Edifici Nexus C/Gra Capità, - 0803-Barceloa (Cataluya-Spai) marc.realp@cttc.es

More information

OFDMA Based Two-hop Cooperative Relay Network Resources Allocation

OFDMA Based Two-hop Cooperative Relay Network Resources Allocation This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the ICC 008 proceedigs. OFDMA Based Two-hop Cooperative Relay Network Resources

More information

Analysis of SDR GNSS Using MATLAB

Analysis of SDR GNSS Using MATLAB Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite

More information

IEEE TRANSACTIONS ON COMMUNICATIONS 1

IEEE TRANSACTIONS ON COMMUNICATIONS 1 IEEE TRANSACTIONS ON COMMUNICATIONS 3 5 6 7 8 9 0 3 5 6 7 8 9 0 3 5 6 7 Adaptive Buffer-Aided Distributed Space-Time Codig for Cooperative Wireless Networks Tog Peg ad Rodrigo C. de Lamare, Seior Member,

More information

Information-Theoretic Analysis of an Energy Harvesting Communication System

Information-Theoretic Analysis of an Energy Harvesting Communication System Iformatio-Theoretic Aalysis of a Eergy Harvestig Commuicatio System Omur Ozel Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 074 omur@umd.edu ulukus@umd.edu

More information

Wi-Fi or Femtocell: User Choice and Pricing Strategy of Wireless Service Provider

Wi-Fi or Femtocell: User Choice and Pricing Strategy of Wireless Service Provider Wi-Fi or Femtocell: User Choice ad Pricig Strategy of Wireless Service Provider Yajiao Che, Qia Zhag Departmet of Computer Sciece ad Egieerig Hog Kog Uiversity of Sciece ad Techology Email: {cheyajiao,

More information

An Adaptive Image Denoising Method based on Thresholding

An Adaptive Image Denoising Method based on Thresholding A Adaptive Image Deoisig Method based o Thresholdig HARI OM AND MANTOSH BISWAS Departmet of Computer Sciece & Egieerig Idia School of Mies, Dhabad Jharkad-86004 INDIA {hariom4idia, matoshb}@gmail.com Abstract

More information

Relay Selection and Resource Allocation for D2D-Relaying under Uplink Cellular Power Control

Relay Selection and Resource Allocation for D2D-Relaying under Uplink Cellular Power Control Relay Selectio ad Resource Allocatio for DD-Relayig uder Upli Cellular Power Cotrol Juqua Deg, Alexis A. Dowhuszo, Ragar Freij, Olav Tiroe Departmet of Commuicatios ad Networig, Aalto Uiversity, Espoo,

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

Joint Scheduling and Dynamic Power Spectrum Optimization for Wireless Multicell Networks

Joint Scheduling and Dynamic Power Spectrum Optimization for Wireless Multicell Networks Joit Schedulig ad Dyamic Power Spectrum Optimizatio for Wireless Multicell Networks Wei Yu Dept. of Electrical ad Computer Eg. Uiversity of Toroto Toroto, Otario, Caada M5S 3G4 Email: weiyu@comm.utoroto.ca

More information

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting Test Time Miimizatio for Hybrid BIST with Test Patter Broadcastig Raimud Ubar, Maksim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity EE-126 18 Talli, Estoia {raiub, maksim}@pld.ttu.ee Gert

More information

Importance Analysis of Urban Rail Transit Network Station Based on Passenger

Importance Analysis of Urban Rail Transit Network Station Based on Passenger Joural of Itelliget Learig Systems ad Applicatios, 201, 5, 22-26 Published Olie November 201 (http://www.scirp.org/joural/jilsa) http://dx.doi.org/10.426/jilsa.201.54027 Importace Aalysis of Urba Rail

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 9, SEPTEMBER

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 9, SEPTEMBER IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 9, SEPTEMBER 27 3353 Delay Cosideratios for Opportuistic Schedulig i Broadcast Fadig Chaels Masoud Sharif ad Babak Hassibi Abstract We cosider

More information

SELEX Elsag. 5/18/2012 R. Pucci SDR 12 WinnComm 1

SELEX Elsag. 5/18/2012 R. Pucci SDR 12 WinnComm 1 SELEX Elsag 5/18/01 R. Pucci SDR 1 WiComm 1 Military BU - SELEX Elsag Possible update of SDR Platforms to COGNITIVE architectures COGNITIVE MANAGER INTERFACE Geolocatio, Voice, Video, etc Applicatio Policy

More information

General Model :Algorithms in the Real World. Applications. Block Codes

General Model :Algorithms in the Real World. Applications. Block Codes Geeral Model 5-853:Algorithms i the Real World Error Correctig Codes I Overview Hammig Codes Liear Codes 5-853 Page message (m) coder codeword (c) oisy chael decoder codeword (c ) message or error Errors

More information

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels Compariso of Frequecy Offset Estimatio Methods for OFDM Burst Trasmissio i the Selective Fadig Chaels Zbigiew Długaszewski Istitute of Electroics ad Telecommuicatios Pozań Uiversity of Techology 60-965

More information

Interference Management in LTE Femtocell Systems Using an Adaptive Frequency Reuse Scheme

Interference Management in LTE Femtocell Systems Using an Adaptive Frequency Reuse Scheme Iterferece Maagemet i LTE Femtocell Systems Usig a Adaptive Frequecy Reuse Scheme Christos Bouras 1,2, Georgios Kavourgias 2, Vasileios Kokkios 1,2, Adreas Papazois 1,2 1 Computer Techology Istitute &

More information

Optimal Geolocation Updating for Location Aware Service Provisioning in Wireless Networks

Optimal Geolocation Updating for Location Aware Service Provisioning in Wireless Networks Optimal Geolocatio Updatig for Locatio Aware Service Provisioig i Wireless Networks Siri Tekiay Amer Catovic tekiay@adm.jit.edu axc4466@jit.edu New Jersey Istitute of Techology Uiversity Heights, Newark,

More information

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks Ehacemet of the IEEE 8.5. MAC Protocol for Scalable Data Collectio i Dese Sesor Networks Kira Yedavalli Departmet of Electrical Egieerig - Systems Uiversity of Souther Califoria Los Ageles, Califoria,

More information

Mixed Contiguous and Aggregated Spectrum Allocation Algorithm for CR based TD-LTE System

Mixed Contiguous and Aggregated Spectrum Allocation Algorithm for CR based TD-LTE System Commuicatios ad etwork, 2013, 5, 298-302 http://dx.doi.org/10.4236/c.2013.532055 Published Olie September 2013 (http://www.scirp.org/oural/c) ixed Cotiguous ad Aggregated Spectrum Allocatio Algorithm for

More information

WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI

WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI Muhammad Kabir McGill Uiversity Departmet of Electrical ad Computer Egieerig Motreal, QC H3A 2A7 Email: muhammad.kabir@mail.mcgill.ca Carlos Christofferse

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

Cross-Entropy-Based Sign-Selection Algorithms for Peak-to-Average Power Ratio Reduction of OFDM Systems

Cross-Entropy-Based Sign-Selection Algorithms for Peak-to-Average Power Ratio Reduction of OFDM Systems 4990 IEEE TRASACTIOS O SIGAL PROCESSIG, VOL. 56, O. 10, OCTOBER 2008 Cross-Etropy-Based Sig-Selectio Algorithms for Peak-to-Average Power Ratio Reductio of OFDM Systems Luqig Wag ad Chitha Tellambura Abstract

More information

A D2D-based Protocol for Ultra-Reliable Wireless Communications for Industrial Automation

A D2D-based Protocol for Ultra-Reliable Wireless Communications for Industrial Automation 1 A D2D-based Protocol for Ultra-Reliable Wireless Commuicatios for Idustrial Automatio Liag Liu, Member, IEEE ad Wei Yu, Fellow, IEEE arxiv:1710.01265v3 [cs.it] 15 May 2018 Abstract As a idispesable use

More information

Matching Games for Ad Hoc Networks with Wireless Energy Transfer. Burak Varan, Student Member, IEEE, and Aylin Yener, Fellow, IEEE

Matching Games for Ad Hoc Networks with Wireless Energy Transfer. Burak Varan, Student Member, IEEE, and Aylin Yener, Fellow, IEEE IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL. 1, NO. 4, DECEMBER 017 503 Matchig Games for Ad Hoc Networks with Wireless Eergy Trasfer Burak Vara, Studet Member, IEEE, ad Ayli Yeer, Fellow,

More information

A New Basic Unit for Cascaded Multilevel Inverters with the Capability of Reducing the Number of Switches

A New Basic Unit for Cascaded Multilevel Inverters with the Capability of Reducing the Number of Switches Joural of Power Electroics, ol, o, pp 67-677, July 67 JPE --6 http://dxdoiorg/6/jpe67 I(Prit: 98-9 / I(Olie: 9-78 A ew Basic Uit for Cascaded Multi Iverters with the Capability of Reducig the umber of

More information

Summary of Random Variable Concepts April 19, 2000

Summary of Random Variable Concepts April 19, 2000 Summary of Radom Variable Cocepts April 9, 2000 his is a list of importat cocepts we have covered, rather tha a review that derives or explais them. he first ad primary viewpoit: A radom process is a idexed

More information

Capacity of Interference-limited Three Dimensional CSMA Networks

Capacity of Interference-limited Three Dimensional CSMA Networks Capacity of Iterferece-limited Three Dimesioal CSMA Networks Tao Yag, Guoqiag Mao School of Electrical ad Iformatio Egieerig The Uiversity of Sydey Email: {tao.yag, guoqiag.mao}@sydey.edu.au Wei Zhag School

More information

Adaptive Channel Estimation Techniques for MIMO OFDM Systems

Adaptive Channel Estimation Techniques for MIMO OFDM Systems (IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, Adaptive Chael Estimatio Techiques for MIMO OFDM Systems Md. Masud Raa Dept. of Electroics ad Radio Egieerig Kyug ee Uiversity South

More information

Capacity of Large-scale CSMA Wireless Networks

Capacity of Large-scale CSMA Wireless Networks Capacity of Large-scale CSMA Wireless Networks Chi-Ki Chau, Member, IEEE, Mighua Che, Member, IEEE, ad Soug Ch Liew, Seior Member, IEEE Abstract I the literature, asymptotic studies of multi-hop wireless

More information

Management of a Shared Spectrum Network in Wireless Communications

Management of a Shared Spectrum Network in Wireless Communications Maagemet of a Shared Spectrum Network i Wireless Commuicatios Shiig Wu, Jiheg Zhag, Rachel Q. Zhag Departmet of Logistics ad Maritime Studies The Hog Kog Polytechic Uiversity, Hog Kog Departmet of Idustrial

More information

This is a repository copy of Enabling low-latency applications in LTE-A based mixed fog/cloud computing systems.

This is a repository copy of Enabling low-latency applications in LTE-A based mixed fog/cloud computing systems. This is a repository copy of Eablig low-latecy applicatios i LTE-A based mixed fog/cloud computig systems. White Rose Research Olie URL for this paper: http://eprits.whiterose.ac.uk/1338/ Versio: Accepted

More information

Single Bit DACs in a Nutshell. Part I DAC Basics

Single Bit DACs in a Nutshell. Part I DAC Basics Sigle Bit DACs i a Nutshell Part I DAC Basics By Dave Va Ess, Pricipal Applicatio Egieer, Cypress Semicoductor May embedded applicatios require geeratig aalog outputs uder digital cotrol. It may be a DC

More information

Introduction to CPM-OFDM: An Energy Efficient Multiple Access Transmission Scheme

Introduction to CPM-OFDM: An Energy Efficient Multiple Access Transmission Scheme Joural of Commuicatio ad Computer 1 (015) 37-43 doi: 10.1765/1548-7709/015.01.007 D DAVID PUBLISHING Itroductio to CPM-OFDM: A Eergy Efficiet Multiple Access Trasmissio Scheme Mohammad Irfa, Sag Hoo Lee

More information

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks Throughput/Delay Aalysis of pectrally Phase- Ecoded Optical over etwors K. Putsri *,. ittichivapa * ad H.M.H.halaby ** * Kig Mogut s Istitute of Techology Ladrabag Departmet of Telecommuicatios Egieerig,

More information

Measurements of the Communications Environment in Medium Voltage Power Distribution Lines for Wide-Band Power Line Communications

Measurements of the Communications Environment in Medium Voltage Power Distribution Lines for Wide-Band Power Line Communications Measuremets of the Commuicatios viromet i Medium Voltage Power Distributio Lies for Wide-Bad Power Lie Commuicatios Jae-Jo Lee *,Seug-Ji Choi *,Hui-Myoug Oh *, Wo-Tae Lee *, Kwa-Ho Kim * ad Dae-Youg Lee

More information

WSN Node Localization Regularization Algorithm Based on Quasi Optimal Criterion Parameter Selection

WSN Node Localization Regularization Algorithm Based on Quasi Optimal Criterion Parameter Selection Sesors & rasducers Vol. 23 Special Issue July 203 pp. 94-98 Sesors & rasducers 203 by IFSA http://www.sesorsportal.com WSN Node Localizatio Regularizatio Algorithm Based o Quasi Optimal Criterio Parameter

More information

Converge-Cast with MIMO

Converge-Cast with MIMO Coverge-Cast with MIMO Luoyi Fu, Yi Qi 2, Xibig Wag 3, Xue Liu 4,2,3 Depart. of Electroic Egieerig, Shaghai Jiaotog Uiversity, Chia 4 Depart. of Computer Sciece & Egieerig, Uiversity of Nebraska Licol,

More information

Sectorization with Beam Pattern Design Using 3D Beamforming Techniques

Sectorization with Beam Pattern Design Using 3D Beamforming Techniques Sectorizatio with Beam Patter Desig Usig 3D Beamformig Techiques Chag-She Lee, Mig-Chu Lee, Chug-Jug uag, ad Ta-Sug Lee Departmet of Electrical Egieerig, Natioal Chiao Tug Uiversity, Taiwa, ROC E-mail:

More information

Performance Evaluation of Scheduling in IEEE Based Wireless Mesh Networks

Performance Evaluation of Scheduling in IEEE Based Wireless Mesh Networks Performace Evaluatio of Schedulig i IEEE 802.6 Based Wireless Mesh Networks Bo Ha, Fug Po Tso, Lidog Li ad Weijia Jia Departmet of Computer Sciece, City Uiversity of Hog Kog 83 Tat Chee Aveue, Kowloo,

More information

4. INTERSYMBOL INTERFERENCE

4. INTERSYMBOL INTERFERENCE DATA COMMUNICATIONS 59 4. INTERSYMBOL INTERFERENCE 4.1 OBJECT The effects of restricted badwidth i basebad data trasmissio will be studied. Measuremets relative to itersymbol iterferece, usig the eye patter

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

Markov Modulated Punctured Autoregressive Processes for Traffic and Channel Modeling *

Markov Modulated Punctured Autoregressive Processes for Traffic and Channel Modeling * Markov Modulated Puctured Autoregressive Processes for Traffic ad Chael Modelig * Trista Pei-chu Che ad Tsuha Che + Departmet of Electrical ad Computer Egieerig Caregie Mello Uiversity, PA 1513 {peichu,

More information

Implementation of OFDM wireless communication model for achieving the improved BER using DWT-OFDM

Implementation of OFDM wireless communication model for achieving the improved BER using DWT-OFDM www.ijecs.i Iteratioal Joural Of Egieerig Ad Computer Sciece ISSN: 2319-7242 Volume 6 Issue 1 Ja. 2017, Page No. 19951-19959 Idex Copericus Value (2015): 58.10, DOI: 10.18535/ijecs/v6i1.17 Implemetatio

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks 3878 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 2009 O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract

More information

Computational Algorithm for Higher Order Legendre Polynomial and Gaussian Quadrature Method

Computational Algorithm for Higher Order Legendre Polynomial and Gaussian Quadrature Method Computatioal Algorithm for Higher Order Legre olyomial ad Gaussia Quadrature Method Asif M. Mughal, Xiu Ye ad Kamra Iqbal Dept. of Applied Sciece, Dept. of Mathematics ad Statistics, Dept. of Systems Egieerig

More information

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio Performace Aalysis of Chael Switchig with Various Badwidths i Cogitive Radio Po-Hao Chag, Keg-Fu Chag, Yu-Che Che, ad Li-Kai Ye Departmet of Electrical Egieerig, Natioal Dog Hwa Uiversity, 1,Sec.2, Da-Hsueh

More information

Analysis and Optimization Design of Snubber Cricuit for Isolated DC-DC Converters in DC Power Grid

Analysis and Optimization Design of Snubber Cricuit for Isolated DC-DC Converters in DC Power Grid Aalysis ad Optimizatio Desig of Subber Cricuit for Isolated DC-DC Coverters i DC Power Grid Koji Orikawa Nagaoka Uiversity of Techology Nagaoka, Japa orikawa@st.agaokaut.ac.jp Ju-ichi Itoh Nagaoka Uiversity

More information