• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 24
  • 6
  • 4
  • 3
  • 1
  • 1
  • Tagged with
  • 41
  • 41
  • 16
  • 16
  • 13
  • 12
  • 12
  • 11
  • 10
  • 10
  • 9
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Interference Management in MIMO Wireless Networks

Ghasemi, Akbar January 2013 (has links)
The scarce and overpopulated radio spectrum is going to present a major barrier to the growth and development of future wireless networks. As such, spectrum sharing seems to be inevitable to accommodate the exploding demand for high data rate applications. A major challenge to realizing the potential advantages of spectrum sharing is interference management. This thesis deals with interference management techniques in noncooperative networks. In specific, interference alignment is used as a powerful technique for interference management. We use the degrees of freedom (DoF) as the figure of merit to evaluate the performance improvement due to the interference management schemes. This dissertation is organized in two parts. In the first part, we consider the K-user multiple input multiple output (MIMO) Gaussian interference channel (IC) with M antennas at each transmitter and N antennas at each receiver. This channel models the interaction between K transmitter-receiver pairs sharing the same spectrum for data communication. It is assumed that the channel coefficients are constant and are available at all nodes prior to data transmission. A new cooperative upper-bound on the DoF of this channel is developed which outperforms the known bounds. Also, a new achievable transmission scheme is provided based on the idea of interference alignment. It is shown that the achievable DoF meets the upper-bound when the number of users is greater than a certain threshold, and thus it reveals the channel DoF. In the second part, we consider communication over MIMO interference and X channels in a fast fading environment. It is assumed that the transmitters obtain the channel state information (CSI) after a finite delay which is greater than the coherence time of the channel. In other words, the CSI at the transmitters becomes outdated prior to being exploited for the current transmission. New transmission schemes are proposed which exploit the knowledge of the past CSI at the transmitters to retrospectively align interference in the subsequent channel uses. The proposed transmission schemes offer DoF gain compared to having no CSI at transmitters. The achievable DoF results are the best known results for these channels. Simple cooperative upper-bounds are developed to prove the tightness of our achievable results for some network configurations.
12

Cooperative Protocols for Relay and Interference Channels with Half-Duplex Constraint

Bagheri, Hossein January 2010 (has links)
Enabling cooperation among nodes of a wireless network can significantly reduce the required transmit power as well as the induced intra-network interference. Due to the practical half-duplexity constraint of the cooperating nodes, they are prohibited to simultaneously transmit and receive data at the same time-frequency resource. The purpose of this dissertation is to illustrate the value of cooperation in such an environment. To understand how to cooperate efficiently, information theory is employed as a useful tool, which not only determines the fundamental limits of communication (i.e., capacity) over the considered network, but also provides insights into the design of a proper transmission scheme for that network. In this thesis, two simple but yet important types of wireless networks, namely Relay Channel, and Interference Channel are studied. In fact, these models constitute building blocks for larger networks. The first considered channel is a diamond-shaped relay channel consisting of a source, a destination, and two parallel relays. The second analyzed channel is an interference channel composed of two transmitter-receiver pairs with out-of-band transmitter cooperation, also referred to as conferencing encoders. While characterizing the capacity of these channels are difficult, a simpler and a more common approach is to find an achievable scheme for each channel that ensures a small gap from the capacity for all channel parameters. In chapter 2, the diamond relay channel is investigated in detail. Because of the half-duplex nature of the relays, each relay is either in transmit or receive mode, making four modes possible for the two-relay combination, specifically, 1) broadcast mode (both relays receive) 2,3) routing modes (one relay transmits, another receives) 4) multiple-access mode (both relays transmit). An appropriate scheduling ( i.e., timing over the modes) and transmission scheme based on the decode-and-forward strategy are proposed and shown to be able to achieve either the capacity for certain channel conditions or at most 3.6 bits below the capacity for general channel conditions. Particularly, by assuming each transmitter has a constant power constraint over all modes, a parameter Δ is defined, which captures some important features of the channel. It is proven that for Δ=0 the capacity of the channel can be attained by successive relaying, i.e., using modes 2 and 3 defined above in a successive manner. This strategy may have an infinite gap from the capacity of the channel when Δ≠0. To achieve rates as close as 0.71 bits to the capacity, it is shown that the cases of Δ>0 and Δ<0 should be treated differently. Using new upper bounds based on the dual problem of the linear program associated with the cut-set bounds, it is proven that the successive relaying strategy needs to be enhanced by an additional broadcast mode (mode 1), or multiple access mode (mode 4), for the cases of Δ<0 and Δ>0, respectively. Furthermore, it is established that under average power constraints the aforementioned strategies achieve rates as close as 3.6 bits to the capacity of the channel. In chapter 3, a two-user Gaussian Interference Channel (GIC) is considered, in which encoders are connected through noiseless links with finite capacities. The setup can be motivated by downlink cellular systems, where base stations are connected via infrastructure backhaul networks. In this setting, prior to each transmission block the encoders communicate with each other over the cooperative links. The capacity region and the sum-capacity of the channel are characterized within some constant number of bits for some special classes of symmetric and Z interference channels. It is also established that properly sharing the total limited cooperation capacity between the cooperative links may enhance the achievable region, even when compared to the case of unidirectional transmitter cooperation with infinite cooperation capacity. To obtain the results, genie-aided upper bounds on the sum-capacity and cut-set bounds on the individual rates are compared with the achievable rate region. The achievable scheme enjoys a simple type of Han-Kobayashi signaling, together with the zero-forcing, and basic relaying techniques.
13

On the capacity of multi-terminal systems : the interference and fading broadcast channels

Jafarian, Amin 12 October 2012 (has links)
A central feature of wireless networks is multiple users sharing a common medium. Cellular systems are among the most common examples of such networks. The main phenomenon resulting from this inter-user interaction is interference, and thus analyzing interference networks is critical to determine the capacity of wireless networks. The capacity region of an interference network is defined as the set of rates that the users can simultaneously achieve while ensuring arbitrarily small probability of decoding error. It is an inherently hard problem to find the capacity region of interference networks. Even the capacity region of a general 2-user interference channel is a prominent open problem in information theory. This work's goal is to derive achievable regions that are improved over known results, and when possible, capacity theorems, for K user interference networks. Another multiuser channel that is commonly found in wireless systems is a broadcast channel. Broadcast channels stand side by side with Interference channels as the two of the most important channels for which capacity results are still not completely known. In this work we develop inner and outer bounds on the capacity region of fading broadcast channels, using which we find a part of the capacity region under some conditions. In summary, this work first presents coding arguments for new achievable rate regions and, where possible, capacity results for K-user interference networks. Second, it provides inner and outer-bounds for a class of fading broadcast channels. / text
14

Source and channel aware resource allocation for wireless networks

Jose, Jubin 21 October 2011 (has links)
Wireless networks promise ubiquitous communication, and thus facilitate an array of applications that positively impact human life. At a fundamental level, these networks deal with compression and transmission of sources over channels. Thus, accomplishing this task efficiently is the primary challenge shared by these applications. In practice, sources include data and video while channels include interference and relay networks. Hence, effective source and channel aware resource allocation for these scenarios would result in a comprehensive solution applicable to real-world networks. This dissertation studies the problem of source and channel aware resource allocation in certain scenarios. A framework for network resource allocation that stems from rate-distortion theory is presented. Then, an optimal decomposition into an application-layer compression control, a transport-layer congestion control and a network-layer scheduling is obtained. After deducing insights into compression and congestion control, the scheduling problem is explored in two cross-layer scenarios. First, appropriate queue architecture for cooperative relay networks is presented, and throughput-optimality of network algorithms that do not assume channel-fading and input-queue distributions are established. Second, decentralized algorithms that perform rate allocation, which achieve the same overall throughput region as optimal centralized algorithms, are derived. In network optimization, an underlying throughput region is assumed. Hence, improving this throughput region is the next logical step. This dissertation addresses this problem in the context of three significant classes of interference networks. First, degraded networks that capture highly correlated channels are explored, and the exact sum capacity of these networks is established. Next, multiple antenna networks in the presence of channel uncertainty are considered. For these networks, robust optimization problems that result from linear precoding are investigated, and efficient iterative algorithms are derived. Last, multi-cell time-division-duplex systems are studied in the context of corrupted channel estimates, and an efficient linear precoding to manage interference is developed. / text
15

Cooperative Protocols for Relay and Interference Channels with Half-Duplex Constraint

Bagheri, Hossein January 2010 (has links)
Enabling cooperation among nodes of a wireless network can significantly reduce the required transmit power as well as the induced intra-network interference. Due to the practical half-duplexity constraint of the cooperating nodes, they are prohibited to simultaneously transmit and receive data at the same time-frequency resource. The purpose of this dissertation is to illustrate the value of cooperation in such an environment. To understand how to cooperate efficiently, information theory is employed as a useful tool, which not only determines the fundamental limits of communication (i.e., capacity) over the considered network, but also provides insights into the design of a proper transmission scheme for that network. In this thesis, two simple but yet important types of wireless networks, namely Relay Channel, and Interference Channel are studied. In fact, these models constitute building blocks for larger networks. The first considered channel is a diamond-shaped relay channel consisting of a source, a destination, and two parallel relays. The second analyzed channel is an interference channel composed of two transmitter-receiver pairs with out-of-band transmitter cooperation, also referred to as conferencing encoders. While characterizing the capacity of these channels are difficult, a simpler and a more common approach is to find an achievable scheme for each channel that ensures a small gap from the capacity for all channel parameters. In chapter 2, the diamond relay channel is investigated in detail. Because of the half-duplex nature of the relays, each relay is either in transmit or receive mode, making four modes possible for the two-relay combination, specifically, 1) broadcast mode (both relays receive) 2,3) routing modes (one relay transmits, another receives) 4) multiple-access mode (both relays transmit). An appropriate scheduling ( i.e., timing over the modes) and transmission scheme based on the decode-and-forward strategy are proposed and shown to be able to achieve either the capacity for certain channel conditions or at most 3.6 bits below the capacity for general channel conditions. Particularly, by assuming each transmitter has a constant power constraint over all modes, a parameter Δ is defined, which captures some important features of the channel. It is proven that for Δ=0 the capacity of the channel can be attained by successive relaying, i.e., using modes 2 and 3 defined above in a successive manner. This strategy may have an infinite gap from the capacity of the channel when Δ≠0. To achieve rates as close as 0.71 bits to the capacity, it is shown that the cases of Δ>0 and Δ<0 should be treated differently. Using new upper bounds based on the dual problem of the linear program associated with the cut-set bounds, it is proven that the successive relaying strategy needs to be enhanced by an additional broadcast mode (mode 1), or multiple access mode (mode 4), for the cases of Δ<0 and Δ>0, respectively. Furthermore, it is established that under average power constraints the aforementioned strategies achieve rates as close as 3.6 bits to the capacity of the channel. In chapter 3, a two-user Gaussian Interference Channel (GIC) is considered, in which encoders are connected through noiseless links with finite capacities. The setup can be motivated by downlink cellular systems, where base stations are connected via infrastructure backhaul networks. In this setting, prior to each transmission block the encoders communicate with each other over the cooperative links. The capacity region and the sum-capacity of the channel are characterized within some constant number of bits for some special classes of symmetric and Z interference channels. It is also established that properly sharing the total limited cooperation capacity between the cooperative links may enhance the achievable region, even when compared to the case of unidirectional transmitter cooperation with infinite cooperation capacity. To obtain the results, genie-aided upper bounds on the sum-capacity and cut-set bounds on the individual rates are compared with the achievable rate region. The achievable scheme enjoys a simple type of Han-Kobayashi signaling, together with the zero-forcing, and basic relaying techniques.
16

Interference Management in MIMO Wireless Networks

Ghasemi, Akbar January 2013 (has links)
The scarce and overpopulated radio spectrum is going to present a major barrier to the growth and development of future wireless networks. As such, spectrum sharing seems to be inevitable to accommodate the exploding demand for high data rate applications. A major challenge to realizing the potential advantages of spectrum sharing is interference management. This thesis deals with interference management techniques in noncooperative networks. In specific, interference alignment is used as a powerful technique for interference management. We use the degrees of freedom (DoF) as the figure of merit to evaluate the performance improvement due to the interference management schemes. This dissertation is organized in two parts. In the first part, we consider the K-user multiple input multiple output (MIMO) Gaussian interference channel (IC) with M antennas at each transmitter and N antennas at each receiver. This channel models the interaction between K transmitter-receiver pairs sharing the same spectrum for data communication. It is assumed that the channel coefficients are constant and are available at all nodes prior to data transmission. A new cooperative upper-bound on the DoF of this channel is developed which outperforms the known bounds. Also, a new achievable transmission scheme is provided based on the idea of interference alignment. It is shown that the achievable DoF meets the upper-bound when the number of users is greater than a certain threshold, and thus it reveals the channel DoF. In the second part, we consider communication over MIMO interference and X channels in a fast fading environment. It is assumed that the transmitters obtain the channel state information (CSI) after a finite delay which is greater than the coherence time of the channel. In other words, the CSI at the transmitters becomes outdated prior to being exploited for the current transmission. New transmission schemes are proposed which exploit the knowledge of the past CSI at the transmitters to retrospectively align interference in the subsequent channel uses. The proposed transmission schemes offer DoF gain compared to having no CSI at transmitters. The achievable DoF results are the best known results for these channels. Simple cooperative upper-bounds are developed to prove the tightness of our achievable results for some network configurations.
17

Efficient Computation of Pareto Optimal Beamforming Vectors for the MISO Interference Channel with Successive Interference Cancellation

Lindblom, Johannes, Karipidis, Eletherios, Larsson, Erik G. January 2013 (has links)
We study the two-user multiple-input single-output (MISO) Gaussian interference channel where the transmitters have perfect channel state information and employ single-stream beamforming. The receivers are capable of performing successive interference cancellation, so when the interfering signal is strong enough, it can be decoded, treating the desired signal as noise, and subtracted from the received signal, before the desired signal is decoded. We propose efficient methods to compute the Pareto-optimal rate points and corresponding beamforming vector pairs, by maximizing the rate of one link given the rate of the other link. We do so by splitting the original problem into four subproblems corresponding to the combinations of the receivers' decoding strategies - either decode the interference or treat it as additive noise. We utilize recently proposed parameterizations of the optimal beamforming vectors to equivalently reformulate each subproblem as a quasi-concave problem, which we solve very efficiently either analytically or via scalar numerical optimization. The computational complexity of the proposed methods is several orders-of-magnitude less than the complexity of the state-of-the-art methods. We use the proposed methods to illustrate the effect of the strength and spatial correlation of the channels on the shape of the rate region.
18

Optimal Sum-Rate of Multi-Band MIMO Interference Channel

Dhillon, Harpreet Singh 02 September 2010 (has links)
While the channel capacity of an isolated noise-limited wireless link is well-understood, the same is not true for the interference-limited wireless links that coexist in the same area and occupy the same frequency band(s). The performance of these wireless systems is coupled to each other due to the mutual interference. One such wireless scenario is modeled as a network of simultaneously communicating node pairs and is generally referred to as an interference channel (IC). The problem of characterizing the capacity of an IC is one of the most interesting and long-standing open problems in information theory. A popular way of characterizing the capacity of an IC is to maximize the achievable sum-rate by treating interference as Gaussian noise, which is considered optimal in low-interference scenarios. While the sum-rate of the single-band SISO IC is relatively well understood, it is not so when the users have multiple-bands and multiple-antennas for transmission. Therefore, the study of the optimal sum-rate of the multi-band MIMO IC is the main goal of this thesis. The sum-rate maximization problem for these ICs is formulated and is shown to be quite similar to the one already known for single-band MIMO ICs. This problem is reduced to the problem of finding the optimal fraction of power to be transmitted over each spatial channel in each frequency band. The underlying optimization problem, being non-linear and non-convex, is difficult to solve analytically or by employing local optimization techniques. Therefore, we develop a global optimization algorithm by extending the Reformulation and Linearization Technique (RLT) based Branch and Bound (BB) strategy to find the provably optimal solution to this problem. We further show that the spatial and spectral channels are surprisingly similar in a multi-band multi-antenna IC from a sum-rate maximization perspective. This result is especially interesting because of the dissimilarity in the way the spatial and frequency channels affect the perceived interference. As a part of this study, we also develop some rules-of-thumb regarding the optimal power allocation strategies in multi-band MIMO ICs in various interference regimes. Due to the recent popularity of Interference Alignment (IA) as a means of approaching capacity in an IC (in high-interference regime), we also compare the sum-rates achievable by our technique to the ones achievable by IA. The results indicate that the proposed power control technique performs better than IA in the low and intermediate interference regimes. Interestingly, the performance of the power control technique improves further relative to IA with an increase in the number of orthogonal spatial or frequency channels. / Master of Science
19

Noisy channel-output feedback in the interference channel / Retour de sortie de canal bruyant dans le canal d'interférence

Quintero Florez, Victor 12 December 2017 (has links)
Dans cette thèse, le canal Gaussien à interférence à deux utilisateurs avec voie de retour dégradée par un bruit additif (GIC-NOF) est étudié sous deux perspectives : les réseaux centralisés et décentralisés. Du point de vue des réseaux centralisés, les limites fondamentales du GIC-NOF sont caractérisées par la région de capacité. L’une des principales contributions de cette thèse est une approximation à un nombre constant de bits près de la région de capacité du GIC-NOF. Ce résultat est obtenu grâce à l’analyse d’un modèle de canal plus simple, le canal linéaire déterministe à interférence à deux utilisateurs avec voie de retour dégradée par un bruit additif (LDIC-NOF). L’analyse pour obtenir la région de capacité du LDIC-NOF fournit les idées principales pour l’analyse du GIC-NOF. Du point de vue des réseaux décentralisés, les limites fondamentales du GIC-NOF sont caractérisées par la région d’η-équilibre de Nash (η-EN). Une autre contribution de cette thèse est une approximation de la région η-EN du GIC-NOF, avec η > 1. Comme dans le cas centralisé, le cas décentralisé LDIC-NOF (D-LDIC-NOF) est étudié en premier et les observations sont appliquées dans le cas décentralisé GIC-NOF (D-GIC-NOF). La contribution finale de cette thèse répond à la question suivante : “À quelles conditions la voie de retour permet d’agrandir la région de capacité, la région η-EN du GIC-NOF ou du D-GIC-NOF ? ”. La réponse obtenue est de la forme : L’implémentation de la voie de retour de la sortie du canal dans l’émetteur-récepteur i agrandit la région de capacité ou la région η-EN si le rapport signal sur bruit de la voie de retour est supérieure à SNRi* , avec i ∈ {1, 2}. La valeur approximative de SNRi* est une fonction de tous les autres paramètres du GIC-NOF ou du D-GIC-NOF. / In this thesis, the two-user Gaussian interference channel with noisy channel-output feedback (GIC-NOF) is studied from two perspectives: centralized and decentralized networks. From the perspective of centralized networks, the fundamental limits of the two-user GICNOF are characterized by the capacity region. One of the main contributions of this thesis is an approximation to within a constant number of bits of the capacity region of the two-user GIC-NOF. This result is obtained through the analysis of a simpler channel model, i.e., a two-user linear deterministic interference channel with noisy channel-output feedback (LDIC-NOF). The analysis to obtain the capacity region of the two-user LDIC-NOF provides the main insights required to analyze the two-user GIC-NOF. From the perspective of decentralized networks, the fundamental limits of the two-user decentralized GIC-NOF (D-GIC-NOF) are characterized by the η-Nash equilibrium (η-NE) region. Another contribution of this thesis is an approximation of the η-NE region of the two-user GIC-NOF, with η> 1. As in the centralized case, the two-user decentralized LDIC-NOF (D-LDIC-NOF) is studied first and the lessons learnt are applied in the two-user D-GIC-NOF. The final contribution of this thesis consists in a closed-form answer to the question: “When does channel-output feedback enlarge the capacity or η-NE regions of the two-user GIC-NOF or two-user D-GIC-NOF?”. This answer is of the form: Implementing channel-output feedback in transmitter-receiver i enlarges the capacity or η-NE regions if the feedback SNR is beyond SNRi* , with i ∈ {1, 2}. The approximate value of SNRi* is shown to be a function of all the other parameters of the two-user GIC-NOF or two-user D-GIC-NOF.
20

Transmission distribuée dans le canal multi-antennaire à interférences

Ho, Ka Ming 20 December 2010 (has links) (PDF)
Dans cette thèse, notre objectif est d'optimiser les stratégies de transmission et de réception dans un réseau où il y a peu ou pas de gestion centrale des ressources du tout, et o'u les nœuds ont une connaissance limitée du canal avec seulement un lien restreint entre eux. En particulier, les ́émetteurs ont la plupart du temps des informations locales seulement sur le canal, et nous considérons qu'il n'y a pas de partage des données 'a transmettre aux utilisateurs, ce qui empêche la transmission conjointe en système virtuel MIMO. L'utilisation commune des ressources du système (par exemple en transmettant en même temps et dans la même bande de fréquence) conduit 'a la génération d'interférence au niveau des différents récepteurs, ce qui rend la gestion des interférences essentielle. En considérant l'optimisation du précodeur dans le cadre de la théorie des jeux, des stratégies extrêmes, égoïste ou altruiste, peuvent être ́définies. Un émetteur égoïste agit en prenant compte de son propre intérêt et recherche la maximisation de son propre rapport signal sur bruit plus interférence (SINR) sans considération des interférences générées aux autres récepteurs. Un émetteur altruiste, par contre, utilise toutes ses ressources afin d'annuler les interférences qu'il crée aux autres récepteurs. Il est intuitif qu'aucune de ces deux stratégies extrêmes n'est optimale pour maximiser le débit total du réseau. Un travail récent sur le design du vecteur de précodage dans un canal d'interférence MISO (MISO-IC) sans décodage des interférences au récepteur (SUD) a mis en évidence qu'il est possible, en balançant les approches égoïste et altruiste, d'atteindre un point d'opération se situant sur la frontière Pareto optimale de la région de débit, qui est la frontière limitant la région des débits atteignables par l'utilisation de précodage linéaire. En gardant 'a l'esprit ce résultat, nous étudions l'optimisation distribuée des vecteurs de précodage pour le MISO-IC-SUD dans le chapitre 2. Nous développons un algorithme qui est initialisé 'a l'équilibre de Nash (point d'opération égoïste) et se déplace 'a chaque itération vers la solution du zéro-forcing (point d'opération altruiste) 'a pas fixe. L'algorithme s'arrête si un des émetteurs observe une baisse de son débit, imitant ainsi le procédé de négociation. L'algorithme propos ́e atteint un point d'opération proche de la frontière Pareto optimale, et chaque utilisateur obtient un débit supérieur 'a celui qu'il aurait eu 'a l'équilibre de Nash. Nous démontrons ainsi que les joueurs (les paires ́émetteur-récepteur) peuvent atteindre des débits supérieurs dans le MISO-IC-SUD en coopérant et en balançant égoïsme et altruisme. Le problème du design des vecteurs de précodage pour le MISO-IC-SUD est étendu au cas du MIMO-IC-SUD au chapitre 3. En supposant une connaissance locale, nous modélisons ce problème en un jeu bayésien prenant en compte le fait que le canal ne soit pas complètement connu, et o'u les joueurs maximisent l'espérance de leur fonction d'utilité 'a partir des statistiques du canal. Nous trouvons le point d'équilibre de ce jeu bayésien et étudions la maximisation de la somme des débits dans un MIMO-IC-SUD. Nous observons que la maximisation du débit total peut aussi être interprétée dans ce scénario comme un équilibre entre les approches égoïstes et altruistes. Avec cette analyse, un algorithme dans lequel les vecteurs de transmission et de réception sont obtenus par une optimisation alternée aux émetteurs et aux récepteurs est développé. L'algorithme converge vers une solution qui aligne les interférences lorsque le SNR devient large, ce qui implique que le débit total augmente indéfiniment avec le SNR (avec une pente égale aux nombre de degrés de liberté). Dans le régime 'a faible SNR, notre approche fonctionne mieux que les algorithmes conventionnels visant 'a aligner les interférences, ce qui est une conséquence de l'équilibre entre égoïsme et altruisme. En particulier, l'algorithme propos ́e atteint des performances presque optimales dans des réseaux asymétriques pour lesquels certains récepteurs sont soumis 'a du bruit de fond incontrôlé. Dans le chapitre 4, nous considérons enfin des récepteurs ayant la capacité de décoder les interférences (IDC) dans un MISO-IC. Ce degré de liberté additionnel permet aux récepteurs de décoder les interférences et de les soustraire au signal reçu, ce qui permet ainsi d'obtenir une communication sans interférence. En revanche, les choix des récepteurs dépendent des vecteurs de précodage aux émetteurs. Pour chaque choix de vecteur de précodage, nous obtenons un nouveau SISO-IC avec une nouvelle région de capacité correspondante. Ainsi, nous devons choisir pour chaque réalisation d'un canal MISO le vecteur de précodage et la puissance de transmission de manière 'a atteindre un débit maximal après avoir considéré toutes les possibilités pour les actions des récepteurs (décodage des interférences ou traitement des interférences comme du bruit). Il y a trois paramètres influant le design: la structure du récepteur, le vecteur de précodage, et la puissance de transmission. Ces trois paramètres sont interdépendants et l'obtention du triplet optimal est un problème qui a ́et ́e démontré comme étant NP-complet. Quoi qu'il en soit, nous avons simplifié cette analyse en reformulant la région des débits atteignables d'un MISO-IC-IDC comme l'union des régions pour les différentes structures. Ensuite nous avons caractérisé les limites de ces régions de débit atteignable et obtenu ainsi la frontière Pareto optimale du problème initial. Les vecteurs de précodage Pareto optimaux sont obtenus par une combinaison linéaire de deux vecteurs du canal avec des poids dépendant seulement de deux scalaires réels entre zéro et un. Nous utilisons ensuite cette caractérisation de la frontière Pareto optimale pour obtenir une caractérisation du point o'u le débit total maximum est atteint. Cet ensemble de solutions potentielles est un sous-ensemble strict de la frontière Pareto optimale, ce qui réduit ainsi considérablement l'espace de recherche du problème NP-complet initial.

Page generated in 0.7226 seconds