No Arabic abstract
In this paper, a framework is proposed to simplify solving the infinite horizon average cost problem for the weakly coupled multi-dimensional systems. Specifically, to address the computational complexity issue, we first introduce a virtual continuous time system (VCTS) and obtain the associated fluid value function. The relationship between the VCTS and the original discrete time system is further established. To facilitate the low complexity distributed implementation and address the coupling challenge, we model the weakly coupled system as a perturbation of a decoupled base system and study the decoupled base system. The fluid value function of the VCTS is approximated by the sum of the per-flow fluid value functions and the approximation error is established using perturbation analysis. Finally, we obtain a low complexity distributed solution based on the per-flow fluid value function approximation. We apply the framework to solve a delay-optimal control problem for the K-pair interference networks and obtain a distributed power control algorithm. The proposed algorithm is compared with various baseline schemes through simulations and it is shown that significant delay performance gain can be achieved.
In this paper we study the spectrum of certain large random Hermitian Jacobi matrices. These matrices are known to describe certain communication setups. In particular we are interested in an uplink cellular channel which models mobile users experiencing a soft-handoff situation under joint multicell decoding. Considering rather general fading statistics we provide a closed form expression for the per-cell sum-rate of this channel in high-SNR, when an intra-cell TDMA protocol is employed. Since the matrices of interest are tridiagonal, their eigenvectors can be considered as sequences with second order linear recurrence. Therefore, the problem is reduced to the study of the exponential growth of products of two by two matrices. For the case where $K$ users are simultaneously active in each cell, we obtain a series of lower and upper bound on the high-SNR power offset of the per-cell sum-rate, which are considerably tighter than previously known bounds.
In this paper, we study covert communications between {a pair of} legitimate transmitter-receiver against a watchful warden over slow fading channels. There coexist multiple friendly helper nodes who are willing to protect the covert communication from being detected by the warden. We propose an uncoordinated jammer selection scheme where those helpers whose instantaneous channel gains to the legitimate receiver fall below a pre-established selection threshold will be chosen as jammers radiating jamming signals to defeat the warden. By doing so, the detection accuracy of the warden is expected to be severely degraded while the desired covert communication is rarely affected. We then jointly design the optimal selection threshold and message transmission rate for maximizing covert throughput under the premise that the detection error of the warden exceeds a certain level. Numerical results are presented to validate our theoretical analyses. It is shown that the multi-jammer assisted covert communication outperforms the conventional single-jammer method in terms of covert throughput, and the maximal covert throughput improves significantly as the total number of helpers increases, which demonstrates the validity and superiority of our proposed scheme.
This paper demonstrates how spectrum up to 1 THz will support mobile communications beyond 5G in the coming decades. Results of rooftop surrogate satellite/tower base station measurements at 140 GHz show the natural isolation between terrestrial networks and surrogate satellite systems, as well as between terrestrial mobile users and co-channel fixed backhaul links. These first-of-their-kind measurements and accompanying analysis show that by keeping the energy radiated by terrestrial emitters on the horizon (e.g., elevation angles $leq$15textdegree), there will not likely be interference in the same or adjacent bands between passive satellite sensors and terrestrial terminals, or between mobile links and terrestrial backhaul links at frequencies above 100 GHz.
The feasibility of physical-layer-based security approaches for wireless communications in the presence of one or more eavesdroppers is hampered by channel conditions. In this paper, cooperation is investigated as an approach to overcome this problem and improve the performance of secure communications. In particular, a decode-and-forward (DF) based cooperative protocol is considered, and the objective is to design the system for secrecy capacity maximization or transmit power minimization. System design for the DF-based cooperative protocol is first studied by assuming the availability of global channel state information (CSI). For the case of one eavesdropper, an iterative scheme is proposed to obtain the optimal solution for the problem of transmit power minimization. For the case of multiple eavesdroppers, the problem of secrecy capacity maximization or transmit power minimization is in general intractable. Suboptimal system design is proposed by adding an additional constraint, i.e., the complete nulling of signals at all eavesdroppers, which yields simple closed-form solutions for the aforementioned two problems. Then, the impact of imperfect CSI of eavesdroppers on system design is studied, in which the ergodic secrecy capacity is of interest.
A range of efficient wireless processes and enabling techniques are put under a magnifier glass in the quest for exploring different manifestations of correlated processes, where sub-Nyquist sampling may be invoked as an explicit benefit of having a