Lagrange Multiplier Optimization in a Nutshell
|
|
|
- Matilda McDowell
- 5 years ago
- Views:
Transcription
1 Lagrange Multiplier Optimization for Optimal Spectrum Balancing of DSL with Logarithmic Complexity Amir R. Forouzan and Marc Moonen Dept. of Electrical EngineeringESAT-SISTA), Katholiee Universiteit Leuven, Leuven, 3001, Belgium Abstract Lagrange dual optimizationldo) technique is a powerful tool for solving constrained optimization problems in and is generally considered to be optimal in the literature. LDO relaxes a constrained problem into an unconstrained dual problem using Lagrange multipliers. To solve the dual problem, the optimal value of the Lagrange multipliers should be found. The Lagrange multipliers are usually determined in an iterative process and reducing the number of iterations is of crucial importance to obtain systems with manageable computational complexity.inthispaper,weshowthatfortheldotobeoptimal in optimal spectrum balancing of DSL, the joint rate and power regionjrpr) should be strictly convex. Moreover, we propose a new LDO based algorithm with two advantages. Firstly, the computational complexity of the algorithm is logarithmic in the desired precision. Secondly, the algorithm can be used to find the optimal solution even when the JRPR is not strictly convex. Index Terms Convex optimization, digital subscriber line DSL), dual decomposition, dynamic spectrum management DSM), non-convex optimization, resource allocation. I. INTRODUCTION Lagrange dual optimizationldo) techniques have attracted a lot of attention for solving constrained optimization problems in various fields of communications[1] [6]. The most famous problem in this category is the optimal spectrum balancing OSB)ofDSL[1] 1.TheOSBproblemisstatedasfollows: maximize R 1 subjectto R n R n) min foralln;2 n N, and 1b) P n P max n) foralln;1 n N, 1a) 1c) 1 Inthispaper,weconcentrateontheOSBproblem,however,ourresults can be generalized to a wide range of separable optimization problems in MIMO OFDM systems [2], communications in fading channels with quantized states[3], cognitive radios[4], joint routing and resource allocation [5], power allocation in the vector broadcast channels[6], etc. This research wor was carried out at the ESAT Laboratory of Katholiee Universiteit Leuven, in the frame of K.U.Leuven Research Council CoE EF/05/006 Optimization in EngineeringOPTEC), Concerted Research Action GOA-MaNet, The Belgian Programme on Interuniversity Attraction Poles initiated by the Belgian Federal Science Policy Office IUAP P6/04 Dynamical systems, control and optimization DYSCO) , Research Project IBBT, Research Project FWO nr.g Design and evaluation of DSL systems with common mode signal exploitation, and IWT Project PHysical layer and Access Node TEchnology Revolutions: enabling the next generation broadband networ PHANTER). The scientific responsibility is assumed by its authors. wherer n andp n arethebit-rateandaggregatetransmitpower of user n, R n) min and Pn) max are the minimum required bitrate and the maximum aggregate transmit power for user n, and N isthetotalnumberofusers.therateregionrr) isdefinedasthesetofallachievable N-dimensionalN-D) vectors R 1,...,R N ) T whichsatisfy1c).tosolve1)using LDO, we maximize the following Lagrangian[1]: L N N w n R n λ n P n 2) where w n 0and λ n 0arecalledtheweightfactorand Lagrangemultiplierforuser n.thesolutionisfoundbyan iterativeprocessinwhich w n and λ n areupdateduntilall oftheconstraintsin1b)and1c)aresatisfied.thenumber of iterations plays an important role in the computational complexity of the technique and several techniques have been proposed to reduce the number of iterations including the bisection search[1], sub-gradient ascend[2], and step-adaptive sub-gradient ascent[7]. The number of iterations required by these algorithms is at least quadratically proportional to the inverse of the desired precision. In [8], an improved dual decomposition approach has been proposed for which the number of required iterations is proportional to the inverse of the desired precision. This means that the average number ofiterationstoachieveaprecisionof1%isafactorof)100. TheoptimalityoftheLDOforsolvingOSBhasbeenshown in[2],[9],[10]basicallybyarguingthatthedualitygapis zero when the number of tones is large. Despite these results, finding a set of weight factors and Lagrange multipliers to solve1) precisely is usually a tedious job and sometimes impossibleinpractice[8].infact,in[11]weshowedthat insomecasestheldofailstofindallpointsontherr when there are no power constraints. This problem occurs whentherrisnotstrictlyconvex.insomeextremecases,the OSB solution provides significantly smaller bit-rates for some oftheusersthanthatcanbeobtainedintheoryorevenby suboptimal techniques such as static spectrum management. To resolve this problem, iterative facet dividingifda) algorithm hasbeenproposedin[11].ithasbeenshownthattheifdais capable of finding any point on the RR very closely. Moreover, the number of iterations is proportional to the logarithm of the inverse of the desired precision, meaning that to achieve aprecisionof1%weonlyneedafactorof) log iterations /11/$ IEEE
2 Theresultsin[11]arelimitedtothecaseswherethereareno power constraints. Bac to the general case, these results bring twoeyissuestoattention.thefirstissueiswhetherthere exist cases for which LDO is incapable of approaching points ontheboundaryoftherr.statedinotherwords,arethere anyscenariosinwhichtherrisnotstrictlyconvexinthe general case? The second issue is whether we can generalize IFDA to find Lagrange multipliers jointly with weight factors inordertotaeadvantageoftherobustnessandspeedofthe technique. In this paper, we address these issues. This paper is organized as follows. The multiuser DSL transmissionsystemisdescribedinsec.ii.insec.iii,we extendtheifdatothegeneralcasewherethereexistssome power constraints. Simulation results are presented in Sec. IV, andfinallythepaperisconcludedinsec.v. II. SYSTEM DESCRIPTION We assume N discrete multi-tonedmt) DSL users with disjoint upstreamus) and downstreamds) bands transmitting over Ktones.Inordertoobtain KparallelMIMOchannels, weassumethatallusersaredmtsymbolsynchronizedatthe receiverside.thebit-rateofuser nperdmtsymbolis R n = K =1 b n) 3) where b n) isthenumberofbitsloadedtotone foruser n obtained by ) } b n) = min b max, log Γ SNRn), 4) where b max isthemaximumnumberofbitsthatcanbeloaded toeachtone, denotesthefloorfunction, Γisthesignal-tonoiseratioSNR)gap,and SNR n) isthesnrattone of user n.thesnrisobtainedby SNR n) = s n) gn,n) σ n) + N m=1;m n sm) g n,m), 5) where s n) isthetransmitpsdofuser nattone, σ n) is the PSDofthe n-threceiver snoiseattone,and g n,m) is the channel s power gain from transmitter m to receiver n at tone.indslsystems,thetransmitpsdofeachuserisbounded byaregulatorypsdmas,i.e., s n) s n),mas.theaggregate transmitpowerofuser nis f P n where f isthedmttone spacing and P n K =1 s n). 6) ThetotaltransmitpowerthatcanbesentunderthePSDmas is f P n) mas,where P n) mas K =1 s n),mas. 7) By substituting3) and6) into2), the problem is decoupled into K parallel per-tone maximization problems, i.e., maximize b,s } L ;1 K, 8) where L N w nb n) N λ ns n) is the per-tone Lagrangianontone.Theper-toneproblemisnotconvexin the general case and is solved by exhaustive search. However, nearly optimal algorithms exist for solving the per-tone problemwithpolynomialcomplexityin N.From5),theelementwiseminimumpowervector s = s 1),...,sN) ) Ttoload ) Tontone thebit-loadingvector b = b 1),...,bN) is obtained by[1],[11] s = D ΓB C ) 1 ΓB σ, 9) } where D = diag,...,g N,N), B = diag 2 b } g 1,1) I N, C = G D [G ] n,m = g n,m) ), and ) T.Thebit-andpower-loadingvector σ = σ 1),...,σN) Tiscalledachievableif b T,s) T b and s satisfy9)and 0 b n) b max and 0 s n) s n),masfor 1 n N. III. GENERALIZED IFDA The IFDA as proposed in[11] is implemented using geometricaloperationsontherr.toextendifdatothegeneralcase where the objective and constraint functions are defined on the bit rates as well as transmit powers, we consider the concept ofjointrateandpowerregionjrpr).thejrprontone, Φ,isthesetofallachievablebit-andpower-loadingvectors b T,s T ) T.TheJRPRoveralltonesis Φ = Φ1 Φ K where denotes the Minowsi sum. The Minowsi sum of twosets Aand Bisdefinedby A B a+b a A b B}. 10) If we loo at R n and P n as independent variables and L as a constant, the Lagrangian L = N w nr n N λ np n can be interpreted as ahyperplane 1 Hinthe 2N-Dspacewithanormalvector ν w 1,w 2,...,w N, λ 1, λ 2,..., λ N ) T.Ifweset L = N L max where L max max b,s ; } w nr n N λ np n, then H indicates a supporting hyperplane to Φ. Now ) consider the line l : t,r 2) min,...,rn) min,p1) max,...,p max N), where t is an independent variable. Assuming that the problem is feasibleandallconstraintsin1b)and1c)arebinding 2,the solutionislocatedon l.moreover,whentheboundaryofthe convexhullof Φisin Φ,thesolutionisontheboundary of Φ. Therefore, the solution is located at the intersection of landtheboundaryof Φandasupportinghyperplaneto Φ 1 Weuseafew N-Dgeometricalobjectsinthispapersuchashyperplane, line, simplex, and facet. Please refer to[12] for their definitions. 2 A constraint is called binding if it is met at equality in the solution, otherwise, it is unbinding or slac.
3 The algorithm is terminated when the required precision isachievedorwhenthelastcalculatedpointislocatedon thelastfacet.thesecondcasecouldonlyhappenwhenthe JRPR is not strictly convex. In this case, traditional LDO based algorithms would fail to find the solution. However, insec.iii-c,weproposeamixingalgorithmwhichfindsthe solution using the bit- and power-loadings associated with the vertices of the last facet. Fig.1. AnillustrationofoneiterationoftheIFDAontheJRPRfora single-user scenario. canbefoundatthesolution.figure1showsthejrprthe shadedarea)and lthedottedline)forasingleusercase 1. Inthefollowingweusethisfiguretoexplainouralgorithm. Considertwopoints Aand BontheboundaryoftheJRPR suchthat lintersects ABthelinesegmentbetween Aand B) at p sol.notethat p sol islocatedontheboundaryof Φonthe arcbetweenthepoints Aand B.Assume ν AB = ν 1,ν 2 ) T is thenormalvectorto ABwhere ν 1 > 0.Considerline AB, thesupportinghyperplaneto Φparallelto AB,andlet C = R C,P C ) T denotethepointatwhich AB supports Φ.Since AB ischaracterizedby ν 1 R 1 + ν 2 P 1 = ν 1 R C + ν 2 P C, C canbereachedbymaximizingthelagrangian L = w 1 R 1 λ 1 P 1 with w 1 = ν 1 and λ 1 = ν 2.Nowconsidertheline segments AC and BC. Since l intersects AB, it intersects either ACor BC.InFig.1, lhasintersected AC.Asitcan beseen,thesolutionpoint p sol isalsobetween Aand Conthe boundaryof Φ.Asitcanberealized,startingfrom AB,we havefoundashorterlinesegment ACintersectedby lwith its ends located on the boundary of Φ. Therefore, by applying this procedure iteratively and assuming that the convex hull ofjrprisstrictlyconvex,wewouldfindtwopointsineach iteration which eventually converge together at the solution. Thealgorithmcanbereadilygeneralizedto N > 1.For N > 1,thepoints Aand Barereplacedby 2Nstartingpoints p 1 to p 2N.Thestartingpointsindicateafacet Fin 2Nspace whichbyassumptionisintersectedby l 2.Tooperateeach iteration,thenormalvector ν = ν 1,...,ν 2N ) T with ν 1 > 0) to F is calculated and the Lagrangian is maximized by setting w 1 = ν 1,..., w N = ν N, λ 1 = ν N+1,..., λ N = ν 2N toobtainanewpoint q = R 1,...,R N,P 1,...,P N ) T onthe boundaryofφ.pointqformsafacetwithany2n 1selection ofpointsfrom p 1 to p 2N.Let F n denotethefacetindicatedby thepoints q, p 1,..., p n 1, p n+1,..., p 2N.Since lintersects F,itintersectsoneofthefacets F 1 to F 2N aswell.let F m denotetheintersectedfacet.thentheverticesof F m,i.e., q, p 1,..., p m 1, p m+1,..., p 2N,arethestartingpointsforthe next iteration of the algorithm. 1 TheJRPRcannotbeillustratedfor N > 1,asithasatleast4dimensions in that case. 2 WewillproposeanalgorithmforfindingthestartingpointsinSec.III-B. A. Unbinding Power Constraints and Negative Lagrange Multipliers Usually, the weight factors and Lagrange multipliers associated with inequality constraints are considered to be nonnegative. The IFDA sets the weight factors and Lagrange multipliers according to the elements of the normal vector to a facet which may not necessarily satisfy this condition. More explicitly,as ν 1 = w 1 isenforcedtobepositive, ν 2 = w 2 to ν N + w N should be non-negative, and ν N+1 = λ 1 to ν 2N = λ N should be non-positive for all iterations. Our simulation results show that sometimes oneor more) elements)in ν N+1 to ν 2N taepositivevaluesleadingtoone or more) negative Lagrange multipliers). This happens when apowerconstraintin1c)isnotbindingortheoptimalpoint isclosetoaregionwhereapowerconstraintisnotbinding). Toresolvethisissue, λ n arelettotaenegativevaluesby modifyingthelagrangian Landper-toneLagrangians L as follows: N N L w n R n λ n Pn, 11) L N w n b n) N λ n s n), 12) Pn ; λ n 0 where Pn P max; n) and s n λ n < 0 sn ; λ n 0 s n) max; λ n < 0. When λ n is positive, L and L reduce to L and L. However, when λ n is negative, the power of user n is virtually assumed to be equal to the maximum value in the range 3. However, the actual power sent by user n is independently set during the exhaustive search for finding the optimal point and can be smaller. This avoids bit rate loss for other users by experiencing less crosstalinducedby s n).notethatthepoint q calculated in each iteration of the IFDA is redefined as well by q = R 1,...,R N, P 1,..., P ) T. N From the geometrical point of view this modification is equal to adding all 2 N 1 projections of Φ on the N hyperplanes P n = P n) masandtheirintersectionsto Φ.Bythis modification l intersects Φ even if the power constraints are not binding. 3 Inthegeneralcase,wemightnothaveaPSDmaslimitation.However, duetopracticallimitations,thetransmitpoweroneachtoneislimitedtoa maximumvaluewhichcanbeusedinsteadof s n),mas in12).
4 B. The Expanding Algorithm for Finding the Starting Points The generalized IFDA discussed above requires 2N starting points p 1 to p 2N atthestart-up.hereweproposeanalgorithm which finds the starting points for the algorithm. If the problem is feasible then the point p 0,R 2) min,...,rn) min,p1) T max,...,p max) N) lislocatedonthe boundaryoftheconvexhullofthejrpr.thealgorithmwors bymainga2n-dsimplex S expan whichisiterativelyexpandedtoward p.since lpassesthrough p,itisguaranteed that lintersects S expan afterafewiterations.thealgorithm, called the expanding algorithm, is explained in more details in the following: 1) First 2N distinct points r 1 to r 2N are calculated by solving the problem at 2N different arbitrarily e.g. randomly)selectedvectorsof w 1,...,w N,λ 1,...,λ N ). Let F denotethefacetindicatedby r 1 to r 2N. 2) If lintersects F,then r 1 to r 2N canbeusedasthe starting points. Otherwise, we go to Step 3. 3) A new point is calculated by solving the problem at w 1,...,w N,λ 1,...,λ N ) T = ν,where ν isanormal vectorto F.Thesignof νshouldbeselectedsuchthat itsdirectionistowards p.let S expan denotethesimplex identifiedbythevertices p and r 1 to r 2N. 4) If l intersects S expan then it intersects two facets of S expan. The vertices of either of these facets can be usedasthestartingpoints p 1 to p 2N,however,forfaster convergence, the facet intersected by l at a greater value of t= R 1 )ispreferable. 5) If ldoesnotintersect S expan,thenwecanfindatleast onefacetof S expan,namely F 1,forwhich p islocated ononesideofitandtheremainingverticesof S expan arelocatedontheothersideofit.nowwereplace r 1 to r 2N bytheverticesof F 1 and F by F 1 andreturnto Step 3. C. The Mixing Algorithm When the solution is located on a nonstrictly-convex region of the JRPR boundary, it is usually not achievable by a particular set of weight factors and Lagrange multipliers. Fortunately, the generalized IFDA provides us with 2N points surrounding the solution. By using the per-tone bit- and power-loading vectors associated with these points in a mixed fashion, we can reach thesolutionverycloselywhenthenumberoftonesislarge. Assumethefinalpoints p 1 to p 2N indicatefacet F final on theboundaryofthejrprandlet b,m = b,m,...,b,m ) T and s,m = s,m,...,s,m ) T denote the bit- and powerloading vectors associated with p m on tone. Let λ n,m denote the n-th Lagrange multiplier associated with the m- s 1),m,..., sn),m thpoint.wedefine s,m = s n),m, λ n,m 0 s n),mas, λ n,m < 0.Notethat p m = ) Twhere s n),m = K =1 [b,m] 1, K =1 [ s,m] N ) T,..., K =1 [b,m] N, K =1 [ s,m] 1,..., where [x] n denotesthe n-thelementofvector x.let p sol = Algorithm 1: The Mixing Algorithm /* STEP 1 */ Set p mix p 1 and µ 1for1 K; /* STEP 2 */ repeat for =1...Kdo ) T; p mix p mix b T,µ, s T,µ µ index min m dist p mix p mix + p sol,p mix + ) T; b T,µ, s T,µ ) } T b T,m, s T,m ; until no improvements can be made; /* STEP 3 */ repeat Pictworandomtoneindices 1, 2 ; 1 2 ; p mix p mix ) T ) T; b T 1,µ1, s T 1,µ1 b T 2,µ 2, s T 2,µ 2 µ 1,µ 2 ) indexmin dist p sol,p mix m 1,m 2) ) T ) } T + b T 1,m1, s T 1,m1 + b T 2,m2, s T 2,m2 ; p mix p mix ) T ) T. + b T 1,µ1, s T 1,µ1 + b T 2,µ 2, s T 2,µ 2 until the desired precision achieved or the maximum number of iterations is reached; Tdenotetheintersection R 1) min,...,rn) min,p1) max,...,p max) N) pointof land F final.let µ [1 : 2N]indicatethepoint whosebit-andpower-loadingswillbeusedontone.the sequence µ 1 to µ K indicateapointon F final calculatedby K p mix = =1 [b,µ ],..., K =1 [b,µ ] N, K =1 [ s,µ ] 1,..., K =1 [ s,µ ] N ) T.Thegoalistooptimize µ1 to µ K such that p mix islocatedcloseto p sol withintherequiredprecision. Algorithm1canbeusedforthispurpose. Thealgorithmworsasfollows:Inthefirststepweassume that p mix isequalto p 1 andwesetallindices µ equalto 1. Inthesecondstep,werepeatedlytestalltones andfindthe point µ whichminimizesthenormalizedeuclideandistance of p mix and p sol ifitsassociatedbit-andpower-loadingsis selectedontone.thenormalizedeuclideandistanceof p mix and p sol iscalculatedbynormalizingthefirst Ndimensions by R 1) minto RN) minandthesecond Ndimensionsby P1) maxto P max.finally,inthethirdstep,wepictworandomtones N) 1 and 2 andfindthepoints µ 1 and µ 2 minimizingthe distanceof p mix to p sol iftheirbit-andpower-loadingsare selectedon 1 and 2,respectively.Thisprocedureisrepeated until we reach the desired precision or the maximum number of iterations.
5 TABLE I SIMULATION PARAMETERS PARAMETER VALUE Crosstal model ANSI standard 1% worst-case model[13] without considering FSAN power sum rule Bandplan and PSD mas VDSL 997 DS:.138-3, MHz, US: 3-5.1, MHz)[14] VDSL2E17 B7-9 DS:.138-3, , MHz, US: 3-5.1, , MHz)[15] Cable type 26 AWG[13] Noise White noise,-140 dbm/hz Tonespacing, f Hz Symbolrate, f s 4Hz b max 15 b min 2 SNRgap, Γ 12.0dB Per tone PSD 3dB granularity IV. SIMULATION RESULTS For the first simulation, we consider a two-user US VDSL scenario in which two equal length loops are transmitting overa250m26-awgcable.weset P max n) =.2 P n) mas = mWandR 2) min =52Mbps.Othersimulationparameters arelistedintablei. The expanding algorithm converges after two iterations, and then the generalized IFDA reaches the optimal point in 32 iterationswithprecision Theverticesofthefinalfacet are p 1 = 34.91Mbps,69.01Mbps,.79mW,1.61mW) T, p 2 = 81.22Mbps,22.71Mbps,2.27mW,.14mW) T, p 3 = 22.71Mbps,81.22Mbps,.14mW,2.27mW) T,and p 4 = 58.44Mbps,45.49Mbps,1.20mW,1.21mW) T. The corresponding vectors of weight factors and Lagrange multipliersω m w 1,m,...,w N,m,λ 1,m,...,λ N,m ) T )are ω 1 = , , , ) T, ω 2 = , , , ) T, ω 3 = , , , ) T,and ω 4 = , , , ) T. As it can be seen, the obtained points are located relatively far away from each other on the boundary of the JRPR. However, the vectors of weight factors and Lagrange multipliers are very close to each other. This clearly shows that theboundaryofthejrprisnotstrictlyconvexandisflatat leasttoaprecisionof 10 4.Asaresult,averysmallchange in the weight factors or Lagrange multipliers causes a large change in the obtained solution which explains why traditional algorithms for tuning the weight factors and Lagrange multipliers fail to find the solution. Line l intersects the facet indicatedbyp 1 top 4 atp sol = Mbps, Mbps, mW, mW) T. By mixing the bit- and powerloadingsof p 1 to p 4 usingtheproposedmixingalgorithm, weobtainp mix = Mbps, Mbps, mW, mW) T.Asitcanbeseen, p mix isconsiderablyclose to p sol. Figure 2 compares the convergence properties of the proposed algorithm with the step-adaptive subgradient method Fig. 2. Convergence of the proposed algorithm compared to the step-adaptive subgradient algorithm for a two-user US VDSL scenario. proposed in[7]. Four curves have been plotted in this figure. The solid curve shows thenormalized Euclidean) distance of the resulting point to the target point for the subgradient algorithm vs. the number of iterations. The original stepadaptive subgradient algorithm described in [7] wors by finding the Lagrange multipliers after fixing the weight factors astherrisunnownbeforesolvingtheproblem.thismeans that the weight factors have to be optimized separately leading to considerably higher number of iterations. Here, we now thelocationofthesolutionontherr,andwehaveused it to find the weight factors and the Lagrange multipliers simultaneously. The other three curves in Fig. 2 show the results for the generalized IFDA. The dotted curve shows the distance of the last obtained point in each iteration with thesolution.thegreencurveshowsthedistanceofthelast obtained point with the corresponding facet. Finally, the dashdotted curve shows the distance of the solution with the intersection point of l and the last facet. The subgradient algorithm converges in about 80 iterations. The minimum achieved distance to the solution for the algorithmis.2185.thedistanceofthepointsobtainedbythe generalizedifdato lisonthesameorderofmagnitude. However,asitcanbeseen,thedistanceoftheintersection point to the solution decreases with an almost constant slope in the logarithmic scale meaning that the required number of iterationsislogarithmicintheinverseofthedesiredprecision 1. These observations also imply that the solution is located on afacetontheboundaryofthejrpr.asaresult,thesolution is not achievable by tuning the weight factors and Lagrange multipliers.thatisbecauseonlyoneofthepointslocatedona facetofthejrprcanbereachedbysettingtheweightfactors and Lagrange multipliers according to the normal vector of 1 Wehaveanalyticallyprovedthattherequirednumberofiterationsforthe algorithm is logarithmic in the inverse of the desired precision which is not includedhereduetolacofspace.
6 thatfacet[11].ontheotherhand,thegeneralizedifdais capable of reaching the point as it mixes the bit-loadings and politeness values for 2N points located around the target point onthefinalfacet. Asforthesecondsimulation,weconsideracaseinwhich the power constraints are not binding for a user. This scenario is a near-far two-user US VDSL2 scenario with one user locatedat100mandtheotheruserlocatedat500mfromthe centraloffice.forthisscenario,weset P max n) =.2 P n) mas and R 2) min = 49 Mbps,where Pn) mas = mw.thedesired precision is 1%. By executing the algorithm, the vertices of thefinalfacetareobtainedas p 1 = Mbps,53.388Mbps,.36mW,13.28mW) T, p 2 = Mbps,46.074Mbps,.36mW,4.31mW) T, p 3 = Mbps,48.268Mbps,.36mW,8.26mW) T, and p 4 = Mbps,46.806Mbps,35.90mW,4.67mW) T. The corresponding vectors of weight factors and Lagrange multipliers are ω 1 = , , , ) T, ω 2 = , , , ) T, ω 3 = , , , ) T,and ω 4 = , , , ) T. Asitcanbeseen,thefirstLagrangemultiplierforthefourth pointi.e.,thethirdelementof ω 4 )isnegative,whichhas resultedinafullvirtualtransmitpowerforthefirstuserthe thirdelementof p 4 ).Usingthemixingalgorithm,weobtain p mix = 101.0Mbps,49.0Mbps,.36mW,7.18mW) T, whichindicatesthat R 2 = R 2) min, P 1 < P max,and 1) P 2 = P max. 2) As it can be seen, the algorithm has successfully identified the unbinding constraint the power constraint for the first user) and the binding constraints the bit rate and power constraints for the second user) and is capable of solving theproblemforthecasesinwhichsomeconstraintsarenot binding without any prior nowledge about the binding and unbinding constraints. REFERENCES [1] R. Cendrillon, W. Yu, M. Moonen, J. Verlinden, and T. Bostoen, Optimal multiuser spectrum balancing for digital subscriber lines, IEEETrans.Commun.,vol.54,no.5,pp ,May2006. [2] W. Yu and R. Lui, Dual methods for nonconvex spectrum optimization of multicarrier systems, IEEE Trans. Commun., vol. 54, no. 7, pp , Jul [3] M. Mohseni, R. Zhang, and J. Cioffi, Optimized transmission for fading multiple-access and broadcast channels with multiple antennas, IEEE J.Select.AreasCommun.,vol.24,no.8,pp ,Aug [4] A. Marques, X. Wang, and G. Giannais, Optimal stochastic dual resource allocation for cognitive radios based on quantized CSI, in IEEE Int l. Conf. on Acoustics, Speech,& Signal Processing, ICASSP 08, Las Vegas, NA, Mar. 2008, pp [5] L. Xiao, M. Johansson, and S. Boyd, Simultaneous routing and resource allocation via dual decomposition, IEEE Trans. Commun., vol. 52, no.7,pp ,Jul [6] W. Yu, Sum-capacity computation for the gaussian vector broadcast channel via dual decomposition, IEEE Trans. Inform. Theory, vol. 52, no.2,pp ,Feb [7] P. Tsiaflais, J. Vangorp, M. Moonen, and J. Verlinden, A low complexity optimal spectrum balancing algorithm for digital subscriber lines, Signal Process, vol. 87, no. 7, pp , Jul [8] P. Tsiaflais, I. Necoara, J. Suyens, and M. Moonen, Improved dual decomposition based optimization for DSL dynamic spectrum management, IEEE Trans. Signal Processing, vol. 58, no. 4, pp , Apr [9] Z.-Q. Luo and S. Zhang, Dynamic spectrum management: complexity and duality, IEEE J. Select. Topics Signal Processing, vol. 2, no. 1, pp , Feb [10], Duality gap estimation and polynomial time approximation for optimal spectrum management, IEEE Trans. Signal Processing, vol. 57, no. 7, pp , Jul [11] A. R. Forouzan, Optimal spectrum management of DSL with nonstrictly convex rate region, IEEE Trans. Signal Processing, vol. 57, no.7,pp ,Jul [12] E. W. Weisstein, Mathword, A Wolfram web resource. [Online]. Available: [13] Spectrum management for loop transmission systems, ANSI Standard T , Feb [14] ETSI, Transmission and MultiplexingTM); Access transmission systems on metallic access cables; Very High Speed Digital Subscriber LineVDSL); Part I: Functional Requirements, ETSI Std. TS , Rev. V.1.3.1, [15] ITU-T G.993.2; Amendment 1, Very high speed digital subscriber line transceivers 2VDSL2), Geneva, Switzerland, Apr V. CONCLUSION Dual optimization techniques are optimal for spectrum balancing of DSL, merely when the JRPR is strictly convex. WhentheJRPRisnotstrictlyconvex,wemaynotbeable tofindthedesiredsolutionbytuningtheweightfactorsand Lagrange multipliers. We proposed a new algorithm which findstheoptimalsolutionbymixingthesolutionofthedual problem for 2N points surrounding the target point. The algorithm consists of three parts: the expanding algorithm which finds the starting points, the generalized IFDA, and the mixing algorithm. The algorithm is capable of finding the optimal solution without any prior nowledge about binding and unbinding power constraints. Our simulation results show that the number of iterations required for the algorithm to converge is proportional to the logarithm of the inverse of the desired precision.
Fair Greening for DSL Broadband Access
Fair Greening for DSL Broadband Access Paschalis Tsiaflais The Katholiee Univ. Leuven, Belgium [email protected] Yung Yi School of Electrical and Computer Science KAIST, South Korea [email protected]
Capacity Limits of MIMO Channels
Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References
Multiuser Communications in Wireless Networks
Multiuser Communications in Wireless Networks Instructor Antti Tölli Centre for Wireless Communications (CWC), University of Oulu Contact e-mail: [email protected], tel. +358445000180 Course period
ITERATIVE WATERFILLING FOR WEIGHTED RATE SUM MAXIMIZATION IN MIMO-MAC
ITERATIVE WATERFILLING FOR WEIGHTED RATE SUM MAXIMIZATION IN MIMO-MAC Mari Kobayashi and Giuseppe Caire Centre Tecnològic de Telecomunicacions de Catalunya, Barcelona, Spain University of Southern California,
Duality in General Programs. Ryan Tibshirani Convex Optimization 10-725/36-725
Duality in General Programs Ryan Tibshirani Convex Optimization 10-725/36-725 1 Last time: duality in linear programs Given c R n, A R m n, b R m, G R r n, h R r : min x R n c T x max u R m, v R r b T
Bi-directional Signalling Strategies for Dynamic TDD Networks
12 October, 2015 Bi-directional Signalling Strategies for Dynamic TDD Networks 1 Bi-directional Signalling Strategies for Dynamic TDD Networks Antti Tölli Praneeth Jayasinghe, Jarkko Kaleva University
Efficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
COORDINATED UPLINK SCHEDULING AND BEAMFORMING FOR WIRELESS CELLULAR NETWORKS VIA SUM-OF-RATIO PROGRAMMING AND MATCHING. Kaiming Shen and Wei Yu
COORDINATED UPLINK SCHEDULING AND BEAMFORMING FOR WIRELESS CELLULAR NETWORKS VIA SUM-OF-RATIO PROGRAMMING AND MATCHING Kaiming Shen and Wei Yu Electrical and Computer Engineering Department University
www.zte.com.cn VDSL2 A feasible Solution for Last Mile
www.zte.com.cn VDSL2 A feasible Solution for Last Mile Version Date Author Approved By Remarks V1.00 009-08-8 MichaelSong Not open to the Third Party 009 ZTE Corporation. All rights reserved. ZTE CONFIDENTIAL:
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
Enhancing Wireless Security with Physical Layer Network Cooperation
Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory
ADVANCED ALGORITHMS FOR EQUALIZATION ON ADSL CHANNEL
ADVANCED ALGORITHMS FOR EQUALIZATION ON ADSL CHANNEL T. Mazanec Institute of Information Theory and Automation, Dept. of Signal Processing Abstract Digital subscriber line modems equalize response of line
An Adaptive Multiuser Power Control Algorithm for VDSL
An Adaptive Multiuser Power Control Algorithm for VDSL Wei Yu, George Ginis and John M. Cioffi Electrical Engineering Department 350 Serra Mall, Room 360, Stanford University, Stanford, CA 94305, USA.
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology
ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING
Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA
On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2
On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com
Support Vector Machine (SVM)
Support Vector Machine (SVM) CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Margin concept Hard-Margin SVM Soft-Margin SVM Dual Problems of Hard-Margin
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method
Lecture 3 3B1B Optimization Michaelmas 2015 A. Zisserman Linear Programming Extreme solutions Simplex method Interior point method Integer programming and relaxation The Optimization Tree Linear Programming
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
Spectrum Balancing for DSL with Restrictions on Maximum Transmit PSD
Spectrm Balancing for DSL with Restrictions on Maximm Transmit PSD Driton Statovci, Tomas Nordström, and Rickard Nilsson Telecommnications Research Center Vienna (ftw.), Dona-City-Straße 1, A-1220 Vienna,
A NEW LOOK AT CONVEX ANALYSIS AND OPTIMIZATION
1 A NEW LOOK AT CONVEX ANALYSIS AND OPTIMIZATION Dimitri Bertsekas M.I.T. FEBRUARY 2003 2 OUTLINE Convexity issues in optimization Historical remarks Our treatment of the subject Three unifying lines of
CNR Requirements for DVB-T2 Fixed Reception Based on Field Trial Results
CNR Requirements for DVB-T2 Fixed Reception Based on Field Trial Results Iñaki Eizmendi, Gorka Berjon-Eriz, Manuel Vélez, Gorka Prieto, Amaia Arrinda This letter presents the C/N requirements for DVB-T2
ALOHA Performs Delay-Optimum Power Control
ALOHA Performs Delay-Optimum Power Control Xinchen Zhang and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {xzhang7,mhaenggi}@nd.edu Abstract As
System Design in Wireless Communication. Ali Khawaja
System Design in Wireless Communication Ali Khawaja University of Texas at Dallas December 6, 1999 1 Abstract This paper deals with the micro and macro aspects of a wireless system design. With the growing
Nonlinear Optimization: Algorithms 3: Interior-point methods
Nonlinear Optimization: Algorithms 3: Interior-point methods INSEAD, Spring 2006 Jean-Philippe Vert Ecole des Mines de Paris [email protected] Nonlinear optimization c 2006 Jean-Philippe Vert,
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
Adaptive Linear Programming Decoding
Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan
MIMO CHANNEL CAPACITY
MIMO CHANNEL CAPACITY Ochi Laboratory Nguyen Dang Khoa (D1) 1 Contents Introduction Review of information theory Fixed MIMO channel Fading MIMO channel Summary and Conclusions 2 1. Introduction The use
A Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
Project Report on Adaptive Resource Allocation Algorithm for Multiuser Mimo-Ofdm Systems:
EE-575 INFORMATION THEORY - SEM 092 Project Report on Adaptive Resource Allocation Algorithm for Multiuser Mimo-Ofdm Systems: Prepared By: Mohammed Akber Ali Student ID # G200806120. Page 1 Context Abstract
The art of deploying DSL, Broadband via noisy telephony wiring
The art of deploying DSL, Broadband via noisy telephony wiring Whitepaper on DSL Rob F.M. van den Brink, TNO, The Netherlands, Oct 29 Abstract 1 : The huge spread in crosstalk coupling between the individual
COMMITTEE T1 TELECOMMUNICATIONS Working Group T1E1.4 (DSL Access) Costa Mesa, California, March 8 12, 1999
COMMITTEE T1 TELECOMMUNICATIONS Working Group T1E1.4 (DSL Access) Costa Mesa, California, March 8 1, 1999 T1E1.4/99-16 CONTRIBUTION TITLE: SOURCE*: PROJECT: Proposal for an Improved Upstream FEXT Model
Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
RADIO FREQUENCY INTERFERENCE AND CAPACITY REDUCTION IN DSL
RADIO FREQUENCY INTERFERENCE AND CAPACITY REDUCTION IN DSL Padmabala Venugopal, Michael J. Carter*, Scott A. Valcourt, InterOperability Laboratory, Technology Drive Suite, University of New Hampshire,
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
TELECOMMUNICATIONS STANDARDS ADVISORY COMMITTEE WORKING GROUP ON COMMON CONNECTION STANDARDS (CCS)
TELECOMMUNICATIONS STANDARDS ADVISORY COMMITTEE WORKING GROUP ON COMMON CONNECTION STANDARDS (CCS) Overview of Very High Speed Digital Subscriber Line 2 (VDSL2) 甚 高 速 數 碼 用 戶 線 路 2 的 概 覽 Introduction ADSL
In this section, we will consider techniques for solving problems of this type.
Constrained optimisation roblems in economics typically involve maximising some quantity, such as utility or profit, subject to a constraint for example income. We shall therefore need techniques for solving
Enhancing the SNR of the Fiber Optic Rotation Sensor using the LMS Algorithm
1 Enhancing the SNR of the Fiber Optic Rotation Sensor using the LMS Algorithm Hani Mehrpouyan, Student Member, IEEE, Department of Electrical and Computer Engineering Queen s University, Kingston, Ontario,
Cloud Radios with Limited Feedback
Cloud Radios with Limited Feedback Dr. Kiran Kuchi Indian Institute of Technology, Hyderabad Dr. Kiran Kuchi (IIT Hyderabad) Cloud Radios with Limited Feedback 1 / 18 Overview 1 Introduction 2 Downlink
Big Data - Lecture 1 Optimization reminders
Big Data - Lecture 1 Optimization reminders S. Gadat Toulouse, Octobre 2014 Big Data - Lecture 1 Optimization reminders S. Gadat Toulouse, Octobre 2014 Schedule Introduction Major issues Examples Mathematics
CONTRIBUTION ABSTRACT
1 T1E1.4/2002-194 [ COMMITTEE T1 TELECOMMUNICATIONS Working Group T1E1.4 (DSL Access) Westminster, CO; August l 8-23, 2002 T1E1.4/2002-194 CONTRIBUTION TITLE: SOURCE: PROJECT: STATUS: SHDSL enhancement:
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
Evolution from Voiceband to Broadband Internet Access
Evolution from Voiceband to Broadband Internet Access Murtaza Ali DSPS R&D Center Texas Instruments Abstract With the growth of Internet, demand for high bit rate Internet access is growing. Even though
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
Public Switched Telephone System
Public Switched Telephone System Structure of the Telephone System The Local Loop: Modems, ADSL Structure of the Telephone System (a) Fully-interconnected network. (b) Centralized switch. (c) Two-level
Joint Optimization of Routing and Radio Configuration in Fixed Wireless Networks
Joint Optimization of Routing and Radio Configuration in Fixed Wireless Networks David Coudert, Napoleão Nepomuceno, Hervé Rivano Projet Mascotte, I3S(CNRS-UNSA) INRIA Réunion Mascotte, March 2009 MASCOTTE
Opportunities and techniques for power saving in DSL
Opportunities and techniques for power saving in DSL ITU SQ15 Low Power Tutorial Session Les Humphrey BT 14 th February 2006, Geneva Reminder Drivers Social Responsibility Embraced by corporate leadership
Constrained Least Squares
Constrained Least Squares Authors: G.H. Golub and C.F. Van Loan Chapter 12 in Matrix Computations, 3rd Edition, 1996, pp.580-587 CICN may05/1 Background The least squares problem: min Ax b 2 x Sometimes,
Functional Optimization Models for Active Queue Management
Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA [email protected]
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Maximum Likelihood Estimation of ADC Parameters from Sine Wave Test Data. László Balogh, Balázs Fodor, Attila Sárhegyi, and István Kollár
Maximum Lielihood Estimation of ADC Parameters from Sine Wave Test Data László Balogh, Balázs Fodor, Attila Sárhegyi, and István Kollár Dept. of Measurement and Information Systems Budapest University
Network Requirements for DSL systems, (ADSL through G.Fast) (A summarized view)
Network Requirements for DSL systems, (ADSL through G.Fast) (A summarized view) Gilberto GG Guitarte, BB Connectivity Director TE Connectivity FTTH LATAM Chapter CHAIRMAN 2/24/2014 G.A.Guitarte 1 Executive
Part II Redundant Dictionaries and Pursuit Algorithms
Aisenstadt Chair Course CRM September 2009 Part II Redundant Dictionaries and Pursuit Algorithms Stéphane Mallat Centre de Mathématiques Appliquées Ecole Polytechnique Sparsity in Redundant Dictionaries
INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2
ISSN 2277-2685 IJESR/June 2014/ Vol-4/Issue-6/333-337 Y. Naveena et al./ International Journal of Engineering & Science Research INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena
Introduction to Support Vector Machines. Colin Campbell, Bristol University
Introduction to Support Vector Machines Colin Campbell, Bristol University 1 Outline of talk. Part 1. An Introduction to SVMs 1.1. SVMs for binary classification. 1.2. Soft margins and multi-class classification.
MIMO detector algorithms and their implementations for LTE/LTE-A
GIGA seminar 11.01.2010 MIMO detector algorithms and their implementations for LTE/LTE-A Markus Myllylä and Johanna Ketonen 11.01.2010 2 Outline Introduction System model Detection in a MIMO-OFDM system
Using Linear Fractal Interpolation Functions to Compress Video. The paper in this appendix was presented at the Fractals in Engineering '94
Appendix F Using Linear Fractal Interpolation Functions to Compress Video Images The paper in this appendix was presented at the Fractals in Engineering '94 Conference which was held in the École Polytechnic,
Multihopping for OFDM based Wireless Networks
Multihopping for OFDM based Wireless Networks Jeroen Theeuwes, Frank H.P. Fitzek, Carl Wijting Center for TeleInFrastruktur (CTiF), Aalborg University Neils Jernes Vej 12, 9220 Aalborg Øst, Denmark phone:
Broadband access. Nils Holte, NTNU. NTNU Department of Telecommunications Kursdagene ved NTNU, Digitale telenett, 9. januar 2002 1.
Broadband access - properties of the copper network Nils Holte, Kursdagene ved, Digitale telenett, 9. januar 2002 1 Definition of broadband Overview Alternatives for fixed broadband access pair cable,
XDSL TECHNIQUES FOR POWER LINE COMMUNICATIONS
XDSL TECHNIQUES FOR POWER LINE COMMUNICATIONS Costas Assimakopoulos*, P.L. Katsis*, F.-N. Pavlidou*, Danilo Obradovic**, Milorad Obradovic** Abstract *Aristotle University of Thessaloniki Dept. of Elec.
ITU-T. G.994.1 Amendment 5 (04/2010)
International Telecommunication Union ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU G.994.1 Amendment 5 (04/2010) SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Digital
Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network
Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network Xiaoan Lu, David Goodman, Yao Wang, and Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn,
1 Multi-channel frequency division multiplex frequency modulation (FDM-FM) emissions
Rec. ITU-R SM.853-1 1 RECOMMENDATION ITU-R SM.853-1 NECESSARY BANDWIDTH (Question ITU-R 77/1) Rec. ITU-R SM.853-1 (1992-1997) The ITU Radiocommunication Assembly, considering a) that the concept of necessary
8 MIMO II: capacity and multiplexing
CHAPTER 8 MIMO II: capacity and multiplexing architectures In this chapter, we will look at the capacity of MIMO fading channels and discuss transceiver architectures that extract the promised multiplexing
Numerisches Rechnen. (für Informatiker) M. Grepl J. Berger & J.T. Frings. Institut für Geometrie und Praktische Mathematik RWTH Aachen
(für Informatiker) M. Grepl J. Berger & J.T. Frings Institut für Geometrie und Praktische Mathematik RWTH Aachen Wintersemester 2010/11 Problem Statement Unconstrained Optimality Conditions Constrained
Downlink resource allocation algorithm: Quality of Service
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
The Impact of PLC-to-DSL Interference on VDSL2, Vectored VDSL2, and G.fast
The Impact of PLC-to-DSL Interference on VDSL2, Vectored VDSL2, and G.fast Kenneth J. Kerpez, Stefano Galli ASSIA, Inc. Redwood City, CA, USA {kkerpez, sgalli}@assia-inc.com Hubert Mariotte, Fabienne Moulin
Managing Interference in a Vectored VDSL2 environment Communications Alliance WC58
Managing Interference in a Vectored VDSL2 environment Communications Alliance WC58 18 November 2014 Stefan Keller-Tuberg, Acting Editor Communications Alliance Working Committee 58 1 CA Working Committee
Support Vector Machines Explained
March 1, 2009 Support Vector Machines Explained Tristan Fletcher www.cs.ucl.ac.uk/staff/t.fletcher/ Introduction This document has been written in an attempt to make the Support Vector Machines (SVM),
Full Duplex Device-to-Device Communication in Cellular Networks
Full Duplex Device-to-Device Communication in Cellular Networks Samad Ali Email: [email protected] Nandana Rajatheva Email: [email protected] Matti Latva-aho Email: [email protected] Abstract In this paper
Planning for 802.11ac Adoption with Ekahau Site Survey 6.0
Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 1 P a g e w w w. e k a h a u. c o m / e s s Introduction to 802.11ac The emerging next generation Wi-Fi standard IEEE 802.11ac aims to break the
Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B
CSE 3461 / 5461: Computer Networking & Internet Technologies Data Transmission Presentation B Kannan Srinivasan 08/30/2012 Data Communications Model Figure 1.2 Studying Assignment: 3.1-3.4, 4.1 Presentation
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
A New Method for Estimating Maximum Power Transfer and Voltage Stability Margins to Mitigate the Risk of Voltage Collapse
A New Method for Estimating Maximum Power Transfer and Voltage Stability Margins to Mitigate the Risk of Voltage Collapse Bernie Lesieutre Dan Molzahn University of Wisconsin-Madison PSERC Webinar, October
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
Written examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
Support Vector Machines
Support Vector Machines Charlie Frogner 1 MIT 2011 1 Slides mostly stolen from Ryan Rifkin (Google). Plan Regularization derivation of SVMs. Analyzing the SVM problem: optimization, duality. Geometric
MR-257 An Overview of G.993.5 Vectoring
MARKETING REPORT MR-257 An Overview of G.993.5 Vectoring Issue: 1 Issue Date: May 2012 The Broadband Forum. All rights reserved. Issue History Issue Issue Date Issue Editor Changes Number 1 May 2012 Peter
Achievable Transmission Rates and Self-Interference Channel Estimation in Hybrid Full-Duplex/Half-Duplex MIMO Relaying
Achievable Transmission Rates and Self-Interference Channel Estimation in Hybrid Full-Duplex/Half-Duplex MIMO Relaying Dani Korpi 1, Taneli Riihonen 2,3, Katsuyuki Haneda 4, Koji Yamamoto 5, and Mikko
