-
Learning the P2D Model for Lithium-Ion Batteries with SOH Detection
Authors:
Maricela Best McKay,
Bhushan Gopaluni,
Brian Wetton
Abstract:
Lithium ion batteries are widely used in many applications. Battery management systems control their optimal use and charging and predict when the battery will cease to deliver the required output on a planned duty or driving cycle. Such systems use a simulation of a mathematical model of battery performance. These models can be electrochemical or data-driven. Electrochemical models for batteries…
▽ More
Lithium ion batteries are widely used in many applications. Battery management systems control their optimal use and charging and predict when the battery will cease to deliver the required output on a planned duty or driving cycle. Such systems use a simulation of a mathematical model of battery performance. These models can be electrochemical or data-driven. Electrochemical models for batteries running at high currents are mathematically and computationally complex. In this work, we show that a well-regarded electrochemical model, the Pseudo Two Dimensional (P2D) model, can be replaced by a computationally efficient Convolutional Neural Network (CNN) surrogate model fit to accurately simulated data from a class of random driving cycles. We demonstrate that a CNN is an ideal choice for accurately capturing Lithium ion concentration profiles. Additionally, we show how the neural network model can be adjusted to correspond to battery changes in State of Health (SOH).
△ Less
Submitted 19 February, 2025;
originally announced February 2025.
-
AI Across Borders: Exploring Perceptions and Interactions in Higher Education
Authors:
Juliana Gerard,
Sahajpreet Singh,
Morgan Macleod,
Michael McKay,
Antoine Rivoire,
Tanmoy Chakraborty,
Muskaan Singh
Abstract:
This study investigates students' perceptions of Generative Artificial Intelligence (AI), with a focus on Higher Education institutions in Northern Ireland and India. We collect quantitative Likert ratings and qualitative comments from 1,211 students on their awareness and perceptions of AI and investigate variations in attitudes toward AI across institutions and subject areas, as well as interact…
▽ More
This study investigates students' perceptions of Generative Artificial Intelligence (AI), with a focus on Higher Education institutions in Northern Ireland and India. We collect quantitative Likert ratings and qualitative comments from 1,211 students on their awareness and perceptions of AI and investigate variations in attitudes toward AI across institutions and subject areas, as well as interactions between these variables with demographic variables (focusing on gender). We find that: (a) while perceptions varied across institutions, responses for Computer Sciences students were similar; and (b) after controlling for institution and subject area, we observed no effect of gender. These results are consistent with previous studies, which find that students' perceptions are predicted by prior experience. We consider the implications of this relation and some considerations for the role of experience.
△ Less
Submitted 15 December, 2024;
originally announced January 2025.
-
Impact of architecture on robustness and interpretability of multispectral deep neural networks
Authors:
Charles Godfrey,
Elise Bishoff,
Myles McKay,
Eleanor Byler
Abstract:
Including information from additional spectral bands (e.g., near-infrared) can improve deep learning model performance for many vision-oriented tasks. There are many possible ways to incorporate this additional information into a deep learning model, but the optimal fusion strategy has not yet been determined and can vary between applications. At one extreme, known as "early fusion," additional ba…
▽ More
Including information from additional spectral bands (e.g., near-infrared) can improve deep learning model performance for many vision-oriented tasks. There are many possible ways to incorporate this additional information into a deep learning model, but the optimal fusion strategy has not yet been determined and can vary between applications. At one extreme, known as "early fusion," additional bands are stacked as extra channels to obtain an input image with more than three channels. At the other extreme, known as "late fusion," RGB and non-RGB bands are passed through separate branches of a deep learning model and merged immediately before a final classification or segmentation layer. In this work, we characterize the performance of a suite of multispectral deep learning models with different fusion approaches, quantify their relative reliance on different input bands and evaluate their robustness to naturalistic image corruptions affecting one or more input channels.
△ Less
Submitted 27 September, 2023; v1 submitted 21 September, 2023;
originally announced September 2023.
-
Quantifying the robustness of deep multispectral segmentation models against natural perturbations and data poisoning
Authors:
Elise Bishoff,
Charles Godfrey,
Myles McKay,
Eleanor Byler
Abstract:
In overhead image segmentation tasks, including additional spectral bands beyond the traditional RGB channels can improve model performance. However, it is still unclear how incorporating this additional data impacts model robustness to adversarial attacks and natural perturbations. For adversarial robustness, the additional information could improve the model's ability to distinguish malicious in…
▽ More
In overhead image segmentation tasks, including additional spectral bands beyond the traditional RGB channels can improve model performance. However, it is still unclear how incorporating this additional data impacts model robustness to adversarial attacks and natural perturbations. For adversarial robustness, the additional information could improve the model's ability to distinguish malicious inputs, or simply provide new attack avenues and vulnerabilities. For natural perturbations, the additional information could better inform model decisions and weaken perturbation effects or have no significant influence at all. In this work, we seek to characterize the performance and robustness of a multispectral (RGB and near infrared) image segmentation model subjected to adversarial attacks and natural perturbations. While existing adversarial and natural robustness research has focused primarily on digital perturbations, we prioritize on creating realistic perturbations designed with physical world conditions in mind. For adversarial robustness, we focus on data poisoning attacks whereas for natural robustness, we focus on extending ImageNet-C common corruptions for fog and snow that coherently and self-consistently perturbs the input data. Overall, we find both RGB and multispectral models are vulnerable to data poisoning attacks regardless of input or fusion architectures and that while physically realizable natural perturbations still degrade model performance, the impact differs based on fusion architecture and input data.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
How many dimensions are required to find an adversarial example?
Authors:
Charles Godfrey,
Henry Kvinge,
Elise Bishoff,
Myles Mckay,
Davis Brown,
Tim Doster,
Eleanor Byler
Abstract:
Past work exploring adversarial vulnerability have focused on situations where an adversary can perturb all dimensions of model input. On the other hand, a range of recent works consider the case where either (i) an adversary can perturb a limited number of input parameters or (ii) a subset of modalities in a multimodal problem. In both of these cases, adversarial examples are effectively constrai…
▽ More
Past work exploring adversarial vulnerability have focused on situations where an adversary can perturb all dimensions of model input. On the other hand, a range of recent works consider the case where either (i) an adversary can perturb a limited number of input parameters or (ii) a subset of modalities in a multimodal problem. In both of these cases, adversarial examples are effectively constrained to a subspace $V$ in the ambient input space $\mathcal{X}$. Motivated by this, in this work we investigate how adversarial vulnerability depends on $\dim(V)$. In particular, we show that the adversarial success of standard PGD attacks with $\ell^p$ norm constraints behaves like a monotonically increasing function of $ε(\frac{\dim(V)}{\dim \mathcal{X}})^{\frac{1}{q}}$ where $ε$ is the perturbation budget and $\frac{1}{p} + \frac{1}{q} =1$, provided $p > 1$ (the case $p=1$ presents additional subtleties which we analyze in some detail). This functional form can be easily derived from a simple toy linear model, and as such our results land further credence to arguments that adversarial examples are endemic to locally linear models on high dimensional spaces.
△ Less
Submitted 10 April, 2023; v1 submitted 24 March, 2023;
originally announced March 2023.
-
Testing predictions of representation cost theory with CNNs
Authors:
Charles Godfrey,
Elise Bishoff,
Myles Mckay,
Davis Brown,
Grayson Jorgenson,
Henry Kvinge,
Eleanor Byler
Abstract:
It is widely acknowledged that trained convolutional neural networks (CNNs) have different levels of sensitivity to signals of different frequency. In particular, a number of empirical studies have documented CNNs sensitivity to low-frequency signals. In this work we show with theory and experiments that this observed sensitivity is a consequence of the frequency distribution of natural images, wh…
▽ More
It is widely acknowledged that trained convolutional neural networks (CNNs) have different levels of sensitivity to signals of different frequency. In particular, a number of empirical studies have documented CNNs sensitivity to low-frequency signals. In this work we show with theory and experiments that this observed sensitivity is a consequence of the frequency distribution of natural images, which is known to have most of its power concentrated in low-to-mid frequencies. Our theoretical analysis relies on representations of the layers of a CNN in frequency space, an idea that has previously been used to accelerate computations and study implicit bias of network training algorithms, but to the best of our knowledge has not been applied in the domain of model robustness.
△ Less
Submitted 25 September, 2023; v1 submitted 3 October, 2022;
originally announced October 2022.
-
Envy-freeness in 3D Hedonic Games
Authors:
Michael McKay,
Ágnes Cseh,
David Manlove
Abstract:
We study the problem of partitioning a set of agents into coalitions based on the agents' additively separable preferences, which can also be viewed as a hedonic game. We apply three successively weaker solution concepts, namely envy-freeness, weakly justified envy-freeness, and justified envy-freeness.
In a model in which coalitions may have any size, trivial solutions exist for these concepts,…
▽ More
We study the problem of partitioning a set of agents into coalitions based on the agents' additively separable preferences, which can also be viewed as a hedonic game. We apply three successively weaker solution concepts, namely envy-freeness, weakly justified envy-freeness, and justified envy-freeness.
In a model in which coalitions may have any size, trivial solutions exist for these concepts, which provides a strong motivation for placing restrictions on coalition size. In this paper, we require feasible coalitions to have size three. We study the existence of partitions that are envy-free, weakly justified envy-free, and justified envy-free, and the computational complexity of finding such partitions, if they exist.
We present a comprehensive complexity classification, in terms of the restrictions placed on the agents' preferences. From this, we identify a general trend that for the three successively weaker solution concepts, existence and polynomial-time solvability hold under successively weaker restrictions.
△ Less
Submitted 2 August, 2024; v1 submitted 15 September, 2022;
originally announced September 2022.
-
Packing $K_r$s in bounded degree graphs
Authors:
Michael McKay,
David Manlove
Abstract:
We study the problem of finding a maximum-cardinality set of $r$-cliques in an undirected graph of fixed maximum degree $Δ$, subject to the cliques in that set being either vertex-disjoint or edge-disjoint. It is known for $r=3$ that the vertex-disjoint (edge-disjoint) problem is solvable in linear time if $Δ=3$ ($Δ=4$) but APX-hard if $Δ\geq 4$ ($Δ\geq 5$).
We generalise these results to an arb…
▽ More
We study the problem of finding a maximum-cardinality set of $r$-cliques in an undirected graph of fixed maximum degree $Δ$, subject to the cliques in that set being either vertex-disjoint or edge-disjoint. It is known for $r=3$ that the vertex-disjoint (edge-disjoint) problem is solvable in linear time if $Δ=3$ ($Δ=4$) but APX-hard if $Δ\geq 4$ ($Δ\geq 5$).
We generalise these results to an arbitrary but fixed $r \geq 3$, and provide a complete complexity classification for both the vertex- and edge-disjoint variants in graphs of maximum degree $Δ$.
Specifically, we show that the vertex-disjoint problem is solvable in linear time if $Δ< 3r/2 - 1$, solvable in polynomial time if $Δ< 5r/3 - 1$, and APX-hard if $Δ\geq \lceil 5r/3 \rceil - 1$. We also show that if $r\geq 6$ then the above implications also hold for the edge-disjoint problem. If $r \leq 5$, then the edge-disjoint problem is solvable in linear time if $Δ< 3r/2 - 1$, solvable in polynomial time if $Δ\leq 2r - 2$, and APX-hard if $Δ> 2r - 2$.
△ Less
Submitted 6 April, 2024; v1 submitted 8 September, 2022;
originally announced September 2022.
-
Optimal Grouping Strategy for Reconfigurable Intelligent Surface Assisted Wireless Communications
Authors:
Neel Kanth Kundu,
Zan Li,
Junhui Rao,
Shanpu Shen,
Matthew R. McKay,
Ross Murch
Abstract:
The channel estimation overhead of reconfigurable intelligent surface (RIS) assisted communication systems can be prohibitive. Prior works have demonstrated via simulations that grouping neighbouring RIS elements can help to reduce the pilot overhead and improve achievable rate. In this paper, we present an analytical study of RIS element grouping. We derive a tight closed-form upper bound for the…
▽ More
The channel estimation overhead of reconfigurable intelligent surface (RIS) assisted communication systems can be prohibitive. Prior works have demonstrated via simulations that grouping neighbouring RIS elements can help to reduce the pilot overhead and improve achievable rate. In this paper, we present an analytical study of RIS element grouping. We derive a tight closed-form upper bound for the achievable rate and then maximize it with respect to the group size. Our analysis reveals that more coarse-grained grouping is important-when the channel coherence time is low (high mobility scenarios) or the transmit power is large. We also demonstrate that optimal grouping can yield significant performance improvements over simple `On-Off' RIS element switching schemes that have been recently considered.
△ Less
Submitted 20 November, 2021;
originally announced November 2021.
-
The Three-Dimensional Stable Roommates Problem with Additively Separable Preferences
Authors:
Michael McKay,
David Manlove
Abstract:
The Stable Roommates problem involves matching a set of agents into pairs based on the agents' strict ordinal preference lists. The matching must be stable, meaning that no two agents strictly prefer each other to their assigned partners. A number of three-dimensional variants exist, in which agents are instead matched into triples. Both the original problem and these variants can also be viewed a…
▽ More
The Stable Roommates problem involves matching a set of agents into pairs based on the agents' strict ordinal preference lists. The matching must be stable, meaning that no two agents strictly prefer each other to their assigned partners. A number of three-dimensional variants exist, in which agents are instead matched into triples. Both the original problem and these variants can also be viewed as hedonic games. We formalise a three-dimensional variant using general additively separable preferences, in which each agent provides an integer valuation of every other agent. In this variant, we show that a stable matching may not exist and that the related decision problem is NP-complete, even when the valuations are binary. In contrast, we show that if the valuations are binary and symmetric then a stable matching must exist and can be found in polynomial time. We also consider the related problem of finding a stable matching with maximum utilitarian welfare when valuations are binary and symmetric. We show that this optimisation problem is NP-hard and present a novel 2-approximation algorithm.
△ Less
Submitted 9 July, 2021;
originally announced July 2021.
-
MIMO Terahertz Quantum Key Distribution
Authors:
Neel Kanth Kundu,
Soumya P. Dash,
Matthew R. McKay,
Ranjan K. Mallik
Abstract:
We propose a multiple-input multiple-output (MIMO) quantum key distribution (QKD) scheme for terahertz (THz) frequency applications operating at room temperature. Motivated by classical MIMO communications, a transmit-receive beamforming scheme is proposed that converts the rank-$r$ MIMO channel between Alice and Bob into $r$ parallel lossy quantum channels. Compared with existing single-antenna Q…
▽ More
We propose a multiple-input multiple-output (MIMO) quantum key distribution (QKD) scheme for terahertz (THz) frequency applications operating at room temperature. Motivated by classical MIMO communications, a transmit-receive beamforming scheme is proposed that converts the rank-$r$ MIMO channel between Alice and Bob into $r$ parallel lossy quantum channels. Compared with existing single-antenna QKD schemes, we demonstrate that the MIMO QKD scheme leads to performance improvements by increasing the secret key rate and extending the transmission distance. Our simulation results show that multiple antennas are necessary to overcome the high free-space path loss at THz frequencies. We demonstrate a non-monotonic relation between performance and frequency, and reveal that positive key rates are achievable in the $10-30$ THz frequency range. The proposed scheme can be used for both indoor and outdoor QKD applications for beyond fifth-generation ultra-secure wireless communications systems.
△ Less
Submitted 10 July, 2021; v1 submitted 8 May, 2021;
originally announced May 2021.
-
Exact Statistical Characterization of $2\times2$ Gram Matrices with Arbitrary Variance Profile
Authors:
Nicolas Auguin,
David Morales-Jimenez,
Matthew McKay
Abstract:
This paper is concerned with the statistical properties of the Gram matrix $\mathbf{W}=\mathbf{H}\mathbf{H}^\dagger$, where $\mathbf{H}$ is a $2\times2$ complex central Gaussian matrix whose elements have arbitrary variances. With such arbitrary variance profile, this random matrix model fundamentally departs from classical Wishart models and presents a significant challenge as the classical analy…
▽ More
This paper is concerned with the statistical properties of the Gram matrix $\mathbf{W}=\mathbf{H}\mathbf{H}^\dagger$, where $\mathbf{H}$ is a $2\times2$ complex central Gaussian matrix whose elements have arbitrary variances. With such arbitrary variance profile, this random matrix model fundamentally departs from classical Wishart models and presents a significant challenge as the classical analytical toolbox no longer directly applies. We derive new exact expressions for the distribution of $\mathbf{W}$ and that of its eigenvalues by means of an explicit parameterization of the group of unitary matrices. Our results yield remarkably simple expressions, which are further leveraged to study the outage data rate of a dual-antenna communication system under different variance profiles.
△ Less
Submitted 12 April, 2017;
originally announced May 2017.
-
Power Allocation Schemes for Multicell Massive MIMO Systems
Authors:
Qi Zhang,
Shi Jin,
Matthew McKay,
David Morales-Jimenez,
Hongbo Zhu
Abstract:
This paper investigates the sum-rate gains brought by power allocation strategies in multicell massive multipleinput multiple-output systems, assuming time-division duplex transmission. For both uplink and downlink, we derive tractable expressions for the achievable rate with zero-forcing receivers and precoders respectively. To avoid high complexity joint optimization across the network, we propo…
▽ More
This paper investigates the sum-rate gains brought by power allocation strategies in multicell massive multipleinput multiple-output systems, assuming time-division duplex transmission. For both uplink and downlink, we derive tractable expressions for the achievable rate with zero-forcing receivers and precoders respectively. To avoid high complexity joint optimization across the network, we propose a scheduling mechanism for power allocation, where in a single time slot, only cells that do not interfere with each other adjust their transmit powers. Based on this, corresponding transmit power allocation strategies are derived, aimed at maximizing the sum rate per-cell. These schemes are shown to bring considerable gains over equal power allocation for practical antenna configurations (e.g., up to a few hundred). However, with fixed number of users (N), these gains diminish as M turns to infinity, and equal power allocation becomes optimal. A different conclusion is drawn for the case where both M and N grow large together, in which case: (i) improved rates are achieved as M grows with fixed M/N ratio, and (ii) the relative gains over the equal power allocation diminish as M/N grows. Moreover, we also provide applicable values of M/N under an acceptable power allocation gain threshold, which can be used as to determine when the proposed power allocation schemes yield appreciable gains, and when they do not. From the network point of view, the proposed scheduling approach can achieve almost the same performance as the joint power allocation after one scheduling round, with much reduced complexity.
△ Less
Submitted 10 June, 2015;
originally announced June 2015.
-
Large Dimensional Analysis of Robust M-Estimators of Covariance with Outliers
Authors:
David Morales-Jimenez,
Romain Couillet,
Matthew R. McKay
Abstract:
A large dimensional characterization of robust M-estimators of covariance (or scatter) is provided under the assumption that the dataset comprises independent (essentially Gaussian) legitimate samples as well as arbitrary deterministic samples, referred to as outliers. Building upon recent random matrix advances in the area of robust statistics, we specifically show that the so-called Maronna M-es…
▽ More
A large dimensional characterization of robust M-estimators of covariance (or scatter) is provided under the assumption that the dataset comprises independent (essentially Gaussian) legitimate samples as well as arbitrary deterministic samples, referred to as outliers. Building upon recent random matrix advances in the area of robust statistics, we specifically show that the so-called Maronna M-estimator of scatter asymptotically behaves similar to well-known random matrices when the population and sample sizes grow together to infinity. The introduction of outliers leads the robust estimator to behave asymptotically as the weighted sum of the sample outer products, with a constant weight for all legitimate samples and different weights for the outliers. A fine analysis of this structure reveals importantly that the propensity of the M-estimator to attenuate (or enhance) the impact of outliers is mostly dictated by the alignment of the outliers with the inverse population covariance matrix of the legitimate samples. Thus, robust M-estimators can bring substantial benefits over more simplistic estimators such as the per-sample normalized version of the sample covariance matrix, which is not capable of differentiating the outlying samples. The analysis shows that, within the class of Maronna's estimators of scatter, the Huber estimator is most favorable for rejecting outliers. On the contrary, estimators more similar to Tyler's scale invariant estimator (often preferred in the literature) run the risk of inadvertently enhancing some outliers.
△ Less
Submitted 4 March, 2015;
originally announced March 2015.
-
Artificial-Noise-Aided Secure Multi-Antenna Transmission with Limited Feedback
Authors:
Xi Zhang,
Matthew R. McKay,
Xiangyun Zhou,
Robert W. Heath Jr
Abstract:
We present an optimized secure multi-antenna transmission approach based on artificial-noise-aided beamforming, with limited feedback from a desired single-antenna receiver. To deal with beamformer quantization errors as well as unknown eavesdropper channel characteristics, our approach is aimed at maximizing throughput under dual performance constraints - a connection outage constraint on the des…
▽ More
We present an optimized secure multi-antenna transmission approach based on artificial-noise-aided beamforming, with limited feedback from a desired single-antenna receiver. To deal with beamformer quantization errors as well as unknown eavesdropper channel characteristics, our approach is aimed at maximizing throughput under dual performance constraints - a connection outage constraint on the desired communication channel and a secrecy outage constraint to guard against eavesdropping. We propose an adaptive transmission strategy that judiciously selects the wiretap coding parameters, as well as the power allocation between the artificial noise and the information signal. This optimized solution reveals several important differences with respect to solutions designed previously under the assumption of perfect feedback. We also investigate the problem of how to most efficiently utilize the feedback bits. The simulation results indicate that a good design strategy is to use approximately 20% of these bits to quantize the channel gain information, with the remainder to quantize the channel direction, and this allocation is largely insensitive to the secrecy outage constraint imposed. In addition, we find that 8 feedback bits per transmit antenna is sufficient to achieve approximately 90% of the throughput attainable with perfect feedback.
△ Less
Submitted 21 January, 2015;
originally announced January 2015.
-
Tomlinson-Harashima Precoding for Multiuser MIMO Systems with Quantized CSI Feedback and User Scheduling
Authors:
Liang Sun,
Matthew R. McKay
Abstract:
This paper studies the sum rate performance of a low complexity quantized CSI-based Tomlinson-Harashima (TH) precoding scheme for downlink multiuser MIMO tansmission, employing greedy user selection. The asymptotic distribution of the output signal to interference plus noise ratio of each selected user and the asymptotic sum rate as the number of users K grows large are derived by using extreme va…
▽ More
This paper studies the sum rate performance of a low complexity quantized CSI-based Tomlinson-Harashima (TH) precoding scheme for downlink multiuser MIMO tansmission, employing greedy user selection. The asymptotic distribution of the output signal to interference plus noise ratio of each selected user and the asymptotic sum rate as the number of users K grows large are derived by using extreme value theory. For fixed finite signal to noise ratios and a finite number of transmit antennas $n_T$, we prove that as K grows large, the proposed approach can achieve the optimal sum rate scaling of the MIMO broadcast channel. We also prove that, if we ignore the precoding loss, the average sum rate of this approach converges to the average sum capacity of the MIMO broadcast channel. Our results provide insights into the effect of multiuser interference caused by quantized CSI on the multiuser diversity gain.
△ Less
Submitted 3 August, 2014;
originally announced August 2014.
-
On the Equivalence between Interference and Eavesdropping in Wireless Communications
Authors:
Gerardo Gomez,
F. Javier Lopez-Martinez,
David Morales-Jimenez,
Matthew R. McKay
Abstract:
We show that the problem of analyzing the outage probability in cellular systems affected by co-channel interference and background noise is mathematically equivalent to the problem of analyzing the wireless information-theoretic security in terms of the maximum secrecy rate in fading channels. Hence, these both apparently unrelated problems can be addressed by using a common approach. We illustra…
▽ More
We show that the problem of analyzing the outage probability in cellular systems affected by co-channel interference and background noise is mathematically equivalent to the problem of analyzing the wireless information-theoretic security in terms of the maximum secrecy rate in fading channels. Hence, these both apparently unrelated problems can be addressed by using a common approach. We illustrate the applicability of the connection unveiled herein to provide new results for the secrecy outage probability in different scenarios.
△ Less
Submitted 25 February, 2015; v1 submitted 31 July, 2014;
originally announced July 2014.
-
Transmit Designs for the MIMO Broadcast Channel with Statistical CSI
Authors:
Yongpeng Wu,
Shi Jin,
Xiqi Gao,
Matthew R. McKay,
Chengshan Xiao
Abstract:
We investigate the multiple-input multiple-output broadcast channel with statistical channel state information available at the transmitter. The so-called linear assignment operation is employed, and necessary conditions are derived for the optimal transmit design under general fading conditions. Based on this, we introduce an iterative algorithm to maximize the linear assignment weighted sum-rate…
▽ More
We investigate the multiple-input multiple-output broadcast channel with statistical channel state information available at the transmitter. The so-called linear assignment operation is employed, and necessary conditions are derived for the optimal transmit design under general fading conditions. Based on this, we introduce an iterative algorithm to maximize the linear assignment weighted sum-rate by applying a gradient descent method. To reduce complexity, we derive an upper bound of the linear assignment achievable rate of each receiver, from which a simplified closed-form expression for a near-optimal linear assignment matrix is derived. This reveals an interesting construction analogous to that of dirty-paper coding. In light of this, a low complexity transmission scheme is provided. Numerical examples illustrate the significant performance of the proposed low complexity scheme.
△ Less
Submitted 30 June, 2014;
originally announced June 2014.
-
Analysis and Design of Multiple-Antenna Cognitive Radios with Multiple Primary User Signals
Authors:
David Morales-Jimenez,
Raymond H. Y. Louie,
Matthew R. McKay,
Yang Chen
Abstract:
We consider multiple-antenna signal detection of primary user transmission signals by a secondary user receiver in cognitive radio networks. The optimal detector is analyzed for the scenario where the number of primary user signals is no less than the number of receive antennas at the secondary user. We first derive exact expressions for the moments of the generalized likelihood ratio test (GLRT)…
▽ More
We consider multiple-antenna signal detection of primary user transmission signals by a secondary user receiver in cognitive radio networks. The optimal detector is analyzed for the scenario where the number of primary user signals is no less than the number of receive antennas at the secondary user. We first derive exact expressions for the moments of the generalized likelihood ratio test (GLRT) statistic, yielding approximations for the false alarm and detection probabilities. We then show that the normalized GLRT statistic converges in distribution to a Gaussian random variable when the number of antennas and observations grow large at the same rate. Further, using results from large random matrix theory, we derive expressions to compute the detection probability without explicit knowledge of the channel, and then particularize these expressions for two scenarios of practical interest: 1) a single primary user sending spatially multiplexed signals, and 2) multiple spatially distributed primary users. Our analytical results are finally used to obtain simple design rules for the signal detection threshold.
△ Less
Submitted 23 April, 2015; v1 submitted 25 May, 2014;
originally announced May 2014.
-
Enhancing Secrecy with Multi-Antenna Transmission in Wireless Ad Hoc Networks
Authors:
Xi Zhang,
Xiangyun Zhou,
Matthew R. McKay
Abstract:
We study physical-layer security in wireless ad hoc networks and investigate two types of multi-antenna transmission schemes for providing secrecy enhancements. To establish secure transmission against malicious eavesdroppers, we consider the generation of artificial noise with either sectoring or beamforming. For both approaches, we provide a statistical characterization and tradeoff analysis of…
▽ More
We study physical-layer security in wireless ad hoc networks and investigate two types of multi-antenna transmission schemes for providing secrecy enhancements. To establish secure transmission against malicious eavesdroppers, we consider the generation of artificial noise with either sectoring or beamforming. For both approaches, we provide a statistical characterization and tradeoff analysis of the outage performance of the legitimate communication and the eavesdropping links. We then investigate the networkwide secrecy throughput performance of both schemes in terms of the secrecy transmission capacity, and study the optimal power allocation between the information signal and the artificial noise. Our analysis indicates that, under transmit power optimization, the beamforming scheme outperforms the sectoring scheme, except for the case where the number of transmit antennas are sufficiently large. Our study also reveals some interesting differences between the optimal power allocation for the sectoring and beamforming schemes.
△ Less
Submitted 24 August, 2013;
originally announced August 2013.
-
Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective
Authors:
Xiangyun Zhou,
Matthew R. McKay,
Behrouz Maham,
Are Hjorungnes
Abstract:
This letter studies information-theoretic security without knowing the eavesdropper's channel fading state. We present an alternative secrecy outage formulation to measure the probability that message transmissions fail to achieve perfect secrecy. Using this formulation, we design two transmission schemes that satisfy the given security requirement while achieving good throughput performance.
This letter studies information-theoretic security without knowing the eavesdropper's channel fading state. We present an alternative secrecy outage formulation to measure the probability that message transmissions fail to achieve perfect secrecy. Using this formulation, we design two transmission schemes that satisfy the given security requirement while achieving good throughput performance.
△ Less
Submitted 6 June, 2013;
originally announced June 2013.
-
On the Distribution of MIMO Mutual Information: An In-Depth Painlevé Based Characterization
Authors:
Shang Li,
Matthew R. McKay,
Yang Chen
Abstract:
This paper builds upon our recent work which computed the moment generating function of the MIMO mutual information exactly in terms of a Painlevé V differential equation. By exploiting this key analytical tool, we provide an in-depth characterization of the mutual information distribution for sufficiently large (but finite) antenna numbers. In particular, we derive systematic closed-form expansio…
▽ More
This paper builds upon our recent work which computed the moment generating function of the MIMO mutual information exactly in terms of a Painlevé V differential equation. By exploiting this key analytical tool, we provide an in-depth characterization of the mutual information distribution for sufficiently large (but finite) antenna numbers. In particular, we derive systematic closed-form expansions for the high order cumulants. These results yield considerable new insight, such as providing a technical explanation as to why the well known Gaussian approximation is quite robust to large SNR for the case of unequal antenna arrays, whilst it deviates strongly for equal antenna arrays. In addition, by drawing upon our high order cumulant expansions, we employ the Edgeworth expansion technique to propose a refined Gaussian approximation which is shown to give a very accurate closed-form characterization of the mutual information distribution, both around the mean and for moderate deviations into the tails (where the Gaussian approximation fails remarkably). For stronger deviations where the Edgeworth expansion becomes unwieldy, we employ the saddle point method and asymptotic integration tools to establish new analytical characterizations which are shown to be very simple and accurate. Based on these results we also recover key well established properties of the tail distribution, including the diversity-multiplexing-tradeoff.
△ Less
Submitted 21 January, 2013;
originally announced January 2013.
-
On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels
Authors:
Xi Zhang,
Xiangyun Zhou,
Matthew R. McKay
Abstract:
In this paper, we investigate the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels. The primary design concerns include the transmit power allocation and the rate parameters of the wiretap code. We consider two scenarios with different complexity levels: i) the design parameters are chosen to be fixed for all transmissions, ii) they are adaptively adjusted…
▽ More
In this paper, we investigate the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels. The primary design concerns include the transmit power allocation and the rate parameters of the wiretap code. We consider two scenarios with different complexity levels: i) the design parameters are chosen to be fixed for all transmissions, ii) they are adaptively adjusted based on the instantaneous channel feedback from the intended receiver. In both scenarios, we provide explicit design solutions for achieving the maximal throughput subject to a secrecy constraint, given by a maximum allowable secrecy outage probability. We then derive accurate approximations for the maximal throughput in both scenarios in the high signal-to-noise ratio region, and give new insights into the additional power cost for achieving a higher security level, whilst maintaining a specified target throughput. In the end, the throughput gain of adaptive transmission over non-adaptive transmission is also quantified and analyzed.
△ Less
Submitted 20 January, 2013; v1 submitted 14 December, 2012;
originally announced December 2012.
-
Distributions of Demmel and Related Condition Numbers
Authors:
Prathapasinghe Dharmawansa,
Matthew McKay,
Yang Chen
Abstract:
Consider a random matrix $\mathbf{A}\in\mathbb{C}^{m\times n}$ ($m \geq n$) containing independent complex Gaussian entries with zero mean and unit variance, and let $0<λ_1\leq λ_{2}\leq ...\leq λ_n<\infty$ denote the eigenvalues of $\mathbf{A}^{*}\mathbf{A}$ where $(\cdot)^*$ represents conjugate-transpose. This paper investigates the distribution of the random variables…
▽ More
Consider a random matrix $\mathbf{A}\in\mathbb{C}^{m\times n}$ ($m \geq n$) containing independent complex Gaussian entries with zero mean and unit variance, and let $0<λ_1\leq λ_{2}\leq ...\leq λ_n<\infty$ denote the eigenvalues of $\mathbf{A}^{*}\mathbf{A}$ where $(\cdot)^*$ represents conjugate-transpose. This paper investigates the distribution of the random variables $\frac{\sum_{j=1}^n λ_j}{λ_k}$, for $k = 1$ and $k = 2$. These two variables are related to certain condition number metrics, including the so-called Demmel condition number, which have been shown to arise in a variety of applications. For both cases, we derive new exact expressions for the probability densities, and establish the asymptotic behavior as the matrix dimensions grow large. In particular, it is shown that as $n$ and $m$ tend to infinity with their difference fixed, both densities scale on the order of $n^3$. After suitable transformations, we establish exact expressions for the asymptotic densities, obtaining simple closed-form expressions in some cases. Our results generalize the work of Edelman on the Demmel condition number for the case $m = n$.
△ Less
Submitted 2 November, 2012;
originally announced November 2012.
-
On the Exact Distribution of the Scaled Largest Eigenvalue
Authors:
Lu Wei,
Olav Tirkkonen,
Prathapasinghe Dharmawansa,
Matthew McKay
Abstract:
In this paper we study the distribution of the scaled largest eigenvalue of complexWishart matrices, which has diverse applications both in statistics and wireless communications. Exact expressions, valid for any matrix dimensions, have been derived for the probability density function and the cumulative distribution function. The derived results involve only finite sums of polynomials. These resu…
▽ More
In this paper we study the distribution of the scaled largest eigenvalue of complexWishart matrices, which has diverse applications both in statistics and wireless communications. Exact expressions, valid for any matrix dimensions, have been derived for the probability density function and the cumulative distribution function. The derived results involve only finite sums of polynomials. These results are obtained by taking advantage of properties of the Mellin transform for products of independent random variables.
△ Less
Submitted 3 February, 2012;
originally announced February 2012.
-
Extreme Eigenvalue Distributions of Some Complex Correlated Non-Central Wishart and Gamma-Wishart Random Matrices
Authors:
Prathapasinghe Dharmawansa,
Matthew R. McKay
Abstract:
Let $\mathbf{W}$ be a correlated complex non-central Wishart matrix defined through $\mathbf{W}=\mathbf{X}^H\mathbf{X}$, where $\mathbf{X}$ is $n\times m \, (n\geq m)$ complex Gaussian with non-zero mean $\boldsymbolΥ$ and non-trivial covariance $\boldsymbolΣ$. We derive exact expressions for the cumulative distribution functions (c.d.f.s) of the extreme eigenvalues (i.e., maximum and minimum) of…
▽ More
Let $\mathbf{W}$ be a correlated complex non-central Wishart matrix defined through $\mathbf{W}=\mathbf{X}^H\mathbf{X}$, where $\mathbf{X}$ is $n\times m \, (n\geq m)$ complex Gaussian with non-zero mean $\boldsymbolΥ$ and non-trivial covariance $\boldsymbolΣ$. We derive exact expressions for the cumulative distribution functions (c.d.f.s) of the extreme eigenvalues (i.e., maximum and minimum) of $\mathbf{W}$ for some particular cases. These results are quite simple, involving rapidly converging infinite series, and apply for the practically important case where $\boldsymbolΥ$ has rank one. We also derive analogous results for a certain class of gamma-Wishart random matrices, for which $\boldsymbolΥ^H\boldsymbolΥ$ follows a matrix-variate gamma distribution. The eigenvalue distributions in this paper have various applications to wireless communication systems, and arise in other fields such as econometrics, statistical physics, and multivariate statistics.
△ Less
Submitted 5 January, 2011;
originally announced January 2011.
-
Open-Loop Spatial Multiplexing and Diversity Communications in Ad Hoc Networks
Authors:
Raymond H. Y. Louie,
Matthew R. McKay,
Iain B. Collings
Abstract:
This paper investigates the performance of open-loop multi-antenna point-to-point links in ad hoc networks with slotted ALOHA medium access control (MAC). We consider spatial multiplexing transmission with linear maximum ratio combining and zero forcing receivers, as well as orthogonal space time block coded transmission. New closed-form expressions are derived for the outage probability, throughp…
▽ More
This paper investigates the performance of open-loop multi-antenna point-to-point links in ad hoc networks with slotted ALOHA medium access control (MAC). We consider spatial multiplexing transmission with linear maximum ratio combining and zero forcing receivers, as well as orthogonal space time block coded transmission. New closed-form expressions are derived for the outage probability, throughput and transmission capacity. Our results demonstrate that both the best performing scheme and the optimum number of transmit antennas depend on different network parameters, such as the node intensity and the signal-to-interference-and-noise ratio operating value. We then compare the performance to a network consisting of single-antenna devices and an idealized fully centrally coordinated MAC. These results show that multi-antenna schemes with a simple decentralized slotted ALOHA MAC can outperform even idealized single-antenna networks in various practical scenarios.
△ Less
Submitted 17 September, 2010; v1 submitted 16 September, 2010;
originally announced September 2010.
-
Perturbed Hankel Determinants: Applications to the Information Theory of MIMO Wireless Communications
Authors:
Yang Chen,
Matthew R. McKay
Abstract:
In this paper we compute two important information-theoretic quantities which arise in the application of multiple-input multiple-output (MIMO) antenna wireless communication systems: the distribution of the mutual information of multi-antenna Gaussian channels, and the Gallager random coding upper bound on the error probability achievable by finite-length channel codes. It turns out that the math…
▽ More
In this paper we compute two important information-theoretic quantities which arise in the application of multiple-input multiple-output (MIMO) antenna wireless communication systems: the distribution of the mutual information of multi-antenna Gaussian channels, and the Gallager random coding upper bound on the error probability achievable by finite-length channel codes. It turns out that the mathematical problem underpinning both quantities is the computation of certain Hankel determinants generated by deformed versions of classical weight functions. For single-user MIMO systems, it is a deformed Laguerre weight, whereas for multi-user MIMO systems it is a deformed Jacobi weight. We apply two different methods to characterize each of these Hankel determinants. First, we employ the ladder operators of the corresponding monic orthogonal polynomials to give an exact characterization of the Hankel determinants in terms of Painlevé differential equations. This turns out to be a Painlevé V for the single-user MIMO scenario and a Painlevé VI for the multi user scenario. We then employ Coulomb fluid methods to derive new closed-form approximations for the Hankel determinants which, although formally valid for large matrix dimensions, are shown to give accurate results for both the MIMO mutual information distribution and the error exponent even when the matrix dimensions are small. Focusing on the single-user mutual information distribution, we then employ both the exact Painlevé representation and the Coulomb fluid approximation to yield deeper insights into the scaling behavior in terms of the number of antennas and signal-to-noise ratio. Among other things, these results allow us to study the asymptotic Gaussianity of the distribution as the number of antennas increase, and to explicitly compute the correction terms to the mean, variance, and higher order cumulants.
△ Less
Submitted 3 July, 2010;
originally announced July 2010.
-
Secure Transmission with Artificial Noise over Fading Channels: Achievable Rate and Optimal Power Allocation
Authors:
Xiangyun Zhou,
Matthew R. McKay
Abstract:
We consider the problem of secure communication with multi-antenna transmission in fading channels. The transmitter simultaneously transmits an information bearing signal to the intended receiver and artificial noise to the eavesdroppers. We obtain an analytical closed-form expression of an achievable secrecy rate, and use it as the objective function to optimize the transmit power allocation betw…
▽ More
We consider the problem of secure communication with multi-antenna transmission in fading channels. The transmitter simultaneously transmits an information bearing signal to the intended receiver and artificial noise to the eavesdroppers. We obtain an analytical closed-form expression of an achievable secrecy rate, and use it as the objective function to optimize the transmit power allocation between the information signal and the artificial noise. Our analytical and numerical results show that equal power allocation is a simple yet near optimal strategy for the case of non-colluding eavesdroppers. When the number of colluding eavesdroppers increases, more power should be used to generate the artificial noise. We also provide an upper bound on the signal-to-noise ratio (SNR) above which the achievable secrecy rate is positive and show that the bound is tight at low SNR. Furthermore, we consider the impact of imperfect channel state information (CSI) at both the transmitter and the receiver and find that it is wise to create more artificial noise to confuse the eavesdroppers than to increase the signal strength for the intended receiver if the CSI is not accurately obtained.
△ Less
Submitted 30 June, 2010;
originally announced June 2010.
-
Eigen-Based Transceivers for the MIMO Broadcast Channel with Semi-Orthogonal User Selection
Authors:
Liang Sun,
Matthew R. McKay
Abstract:
This paper studies the sum rate performance of two low complexity eigenmode-based transmission techniques for the MIMO broadcast channel, employing greedy semi-orthogonal user selection (SUS). The first approach, termed ZFDPC-SUS, is based on zero-forcing dirty paper coding; the second approach, termed ZFBF-SUS, is based on zero-forcing beamforming. We first employ new analytical methods to prove…
▽ More
This paper studies the sum rate performance of two low complexity eigenmode-based transmission techniques for the MIMO broadcast channel, employing greedy semi-orthogonal user selection (SUS). The first approach, termed ZFDPC-SUS, is based on zero-forcing dirty paper coding; the second approach, termed ZFBF-SUS, is based on zero-forcing beamforming. We first employ new analytical methods to prove that as the number of users K grows large, the ZFDPC-SUS approach can achieve the optimal sum rate scaling of the MIMO broadcast channel. We also prove that the average sum rates of both techniques converge to the average sum capacity of the MIMO broadcast channel for large K. In addition to the asymptotic analysis, we investigate the sum rates achieved by ZFDPC-SUS and ZFBF-SUS for finite K, and show that ZFDPC-SUS has significant performance advantages. Our results also provide key insights into the benefit of multiple receive antennas, and the effect of the SUS algorithm. In particular, we show that whilst multiple receive antennas only improves the asymptotic sum rate scaling via the second-order behavior of the multi-user diversity gain; for finite K, the benefit can be very significant. We also show the interesting result that the semi-orthogonality constraint imposed by SUS, whilst facilitating a very low complexity user selection procedure, asymptotically does not reduce the multi-user diversity gain in either first (log K) or second-order (loglog K) terms.
△ Less
Submitted 14 June, 2010;
originally announced June 2010.
-
Spatial multiplexing with MMSE receivers: Single-stream optimality in ad hoc networks
Authors:
Raymond H. Y. Louie,
Matthew R. McKay,
Nihar Jindal,
Iain B. Collings
Abstract:
The performance of spatial multiplexing systems with linear minimum-mean-squared-error receivers is investigated in ad hoc networks. It is shown that single-stream transmission is preferable over multi-stream transmission, due to the weaker interference powers from the strongest interferers remaining after interference-cancelation. This result is obtained by new exact closed-form expressions we de…
▽ More
The performance of spatial multiplexing systems with linear minimum-mean-squared-error receivers is investigated in ad hoc networks. It is shown that single-stream transmission is preferable over multi-stream transmission, due to the weaker interference powers from the strongest interferers remaining after interference-cancelation. This result is obtained by new exact closed-form expressions we derive for the outage probability and transmission capacity.
△ Less
Submitted 15 March, 2010;
originally announced March 2010.
-
Statistical Eigenmode Transmission over Jointly-Correlated MIMO Channels
Authors:
Xiqi Gao,
Bin Jiang,
Xiao Li,
Alex B. Gershman,
Matthew R. McKay
Abstract:
We investigate MIMO eigenmode transmission using statistical channel state information at the transmitter. We consider a general jointly-correlated MIMO channel model, which does not require separable spatial correlations at the transmitter and receiver. For this model, we first derive a closed-form tight upper bound for the ergodic capacity, which reveals a simple and interesting relationship i…
▽ More
We investigate MIMO eigenmode transmission using statistical channel state information at the transmitter. We consider a general jointly-correlated MIMO channel model, which does not require separable spatial correlations at the transmitter and receiver. For this model, we first derive a closed-form tight upper bound for the ergodic capacity, which reveals a simple and interesting relationship in terms of the matrix permanent of the eigenmode channel coupling matrix and embraces many existing results in the literature as special cases. Based on this closed-form and tractable upper bound expression, we then employ convex optimization techniques to develop low-complexity power allocation solutions involving only the channel statistics. Necessary and sufficient optimality conditions are derived, from which we develop an iterative water-filling algorithm with guaranteed convergence. Simulations demonstrate the tightness of the capacity upper bound and the near-optimal performance of the proposed low-complexity transmitter optimization approach.
△ Less
Submitted 11 March, 2009;
originally announced March 2009.
-
Achievable Sum Rate of MIMO MMSE Recievers: A General Analytic Framework
Authors:
Matthew R. McKay,
Iain B. Collings,
Antonia M. Tulino
Abstract:
This paper investigates the achievable sum rate of multiple-input multiple-output (MIMO) wireless systems employing linear minimum mean-squared error (MMSE) receivers. We present a new analytic framework which unveils an interesting connection between the achievable sum rate with MMSE receivers and the ergodic mutual information achieved with optimal receivers. This simple but powerful result en…
▽ More
This paper investigates the achievable sum rate of multiple-input multiple-output (MIMO) wireless systems employing linear minimum mean-squared error (MMSE) receivers. We present a new analytic framework which unveils an interesting connection between the achievable sum rate with MMSE receivers and the ergodic mutual information achieved with optimal receivers. This simple but powerful result enables the vast prior literature on ergodic MIMO mutual information to be directly applied to the analysis of MMSE receivers. The framework is particularized to various Rayleigh and Rician channel scenarios to yield new exact closed-form expressions for the achievable sum rate, as well as simplified expressions in the asymptotic regimes of high and low signal to noise ratios. These expressions lead to the discovery of key insights into the performance of MIMO MMSE receivers under practical channel conditions.
△ Less
Submitted 3 March, 2009;
originally announced March 2009.
-
Maximum Sum-Rate of MIMO Multiuser Scheduling with Linear Receivers
Authors:
Raymond H. Y. Louie,
Matthew R. McKay,
Iain B. Collings
Abstract:
We analyze scheduling algorithms for multiuser communication systems with users having multiple antennas and linear receivers. When there is no feedback of channel information, we consider a common round robin scheduling algorithm, and derive new exact and high signal-to-noise ratio (SNR) maximum sum-rate results for the maximum ratio combining (MRC) and minimum mean squared error (MMSE) receive…
▽ More
We analyze scheduling algorithms for multiuser communication systems with users having multiple antennas and linear receivers. When there is no feedback of channel information, we consider a common round robin scheduling algorithm, and derive new exact and high signal-to-noise ratio (SNR) maximum sum-rate results for the maximum ratio combining (MRC) and minimum mean squared error (MMSE) receivers. We also present new analysis of MRC, zero forcing (ZF) and MMSE receivers in the low SNR regime. When there are limited feedback capabilities in the system, we consider a common practical scheduling scheme based on signal-to-interference-and-noise ratio (SINR) feedback at the transmitter. We derive new accurate approximations for the maximum sum-rate, for the cases of MRC, ZF and MMSE receivers. We also derive maximum sum-rate scaling laws, which reveal that the maximum sum-rate of all three linear receivers converge to the same value for a large number of users, but at different rates.
△ Less
Submitted 18 December, 2008; v1 submitted 17 December, 2008;
originally announced December 2008.
-
Ergodic Capacity Analysis of Amplify-and-Forward MIMO Dual-Hop Systems
Authors:
Shi Jin,
Matthew R. McKay,
Caijun Zhong,
Kai-Kit Wong
Abstract:
This paper presents an analytical characterization of the ergodic capacity of amplify-and-forward (AF) MIMO dual-hop relay channels, assuming that the channel state information is available at the destination terminal only. In contrast to prior results, our expressions apply for arbitrary numbers of antennas and arbitrary relay configurations. We derive an expression for the exact ergodic capaci…
▽ More
This paper presents an analytical characterization of the ergodic capacity of amplify-and-forward (AF) MIMO dual-hop relay channels, assuming that the channel state information is available at the destination terminal only. In contrast to prior results, our expressions apply for arbitrary numbers of antennas and arbitrary relay configurations. We derive an expression for the exact ergodic capacity, simplified closed-form expressions for the high SNR regime, and tight closed-form upper and lower bounds. These results are made possible to employing recent tools from finite-dimensional random matrix theory to derive new closed-form expressions for various statistical properties of the equivalent AF MIMO dual-hop relay channel, such as the distribution of an unordered eigenvalue and certain random determinant properties. Based on the analytical capacity expressions, we investigate the impact of the system and channel characteristics, such as the antenna configuration and the relay power gain. We also demonstrate a number of interesting relationships between the dual-hop AF MIMO relay channel and conventional point-to-point MIMO channels in various asymptotic regimes.
△ Less
Submitted 27 November, 2008;
originally announced November 2008.
-
On the Mutual Information Distribution of OFDM-Based Spatial Multiplexing: Exact Variance and Outage Approximation
Authors:
Matthew R. McKay,
Peter J. Smith,
Himal A. Suraweera,
Iain B. Collings
Abstract:
This paper considers the distribution of the mutual information of frequency-selective spatially-uncorrelated Rayleigh fading MIMO channels. Results are presented for OFDM-based spatial multiplexing. New exact closed-form expressions are derived for the variance of the mutual information. In contrast to previous results, our new expressions apply for systems with both arbitrary numbers of antenn…
▽ More
This paper considers the distribution of the mutual information of frequency-selective spatially-uncorrelated Rayleigh fading MIMO channels. Results are presented for OFDM-based spatial multiplexing. New exact closed-form expressions are derived for the variance of the mutual information. In contrast to previous results, our new expressions apply for systems with both arbitrary numbers of antennas and arbitrary-length channels. Simplified expressions are also presented for high and low SNR regimes. The analytical variance results are used to provide accurate analytical approximations for the distribution of the mutual information and the outage capacity.
△ Less
Submitted 30 November, 2007;
originally announced December 2007.
-
Asymptotic SER and Outage Probability of MIMO MRC in Correlated Fading
Authors:
Shi Jin,
Matthew R. McKay,
Xiqi Gao,
Iain B. Collings
Abstract:
This letter derives the asymptotic symbol error rate (SER) and outage probability of multiple-input multiple-output (MIMO) maximum ratio combining (MRC) systems. We consider Rayleigh fading channels with both transmit and receive spatial correlation. Our results are based on new asymptotic expressions which we derive for the p.d.f. and c.d.f. of the maximum eigenvalue of positive-definite quadra…
▽ More
This letter derives the asymptotic symbol error rate (SER) and outage probability of multiple-input multiple-output (MIMO) maximum ratio combining (MRC) systems. We consider Rayleigh fading channels with both transmit and receive spatial correlation. Our results are based on new asymptotic expressions which we derive for the p.d.f. and c.d.f. of the maximum eigenvalue of positive-definite quadratic forms in complex Gaussian matrices. We prove that spatial correlation does not affect the diversity order, but that it reduces the array gain and hence increases the SER in the high SNR regime.
△ Less
Submitted 3 November, 2006;
originally announced November 2006.
-
MIMO Multichannel Beamforming: SER and Outage Using New Eigenvalue Distributions of Complex Noncentral Wishart Matrices
Authors:
Shi Jin,
Matthew R. McKay,
Xiqi Gao,
Iain B. Collings
Abstract:
This paper analyzes MIMO systems with multichannel beamforming in Ricean fading. Our results apply to a wide class of multichannel systems which transmit on the eigenmodes of the MIMO channel. We first present new closed-form expressions for the marginal ordered eigenvalue distributions of complex noncentral Wishart matrices. These are used to characterize the statistics of the signal to noise r…
▽ More
This paper analyzes MIMO systems with multichannel beamforming in Ricean fading. Our results apply to a wide class of multichannel systems which transmit on the eigenmodes of the MIMO channel. We first present new closed-form expressions for the marginal ordered eigenvalue distributions of complex noncentral Wishart matrices. These are used to characterize the statistics of the signal to noise ratio (SNR) on each eigenmode. Based on this, we present exact symbol error rate (SER) expressions. We also derive closed-form expressions for the diversity order, array gain, and outage probability. We show that the global SER performance is dominated by the subchannel corresponding to the minimum channel singular value. We also show that, at low outage levels, the outage probability varies inversely with the Ricean K-factor for cases where transmission is only on the most dominant subchannel (i.e. a singlechannel beamforming system). Numerical results are presented to validate the theoretical analysis.
△ Less
Submitted 3 November, 2006; v1 submitted 1 November, 2006;
originally announced November 2006.
-
Performance Analysis of MIMO-MRC in Double-Correlated Rayleigh Environments
Authors:
Matthew R. McKay,
Alex J. Grant,
Iain B. Collings
Abstract:
We consider multiple-input multiple-output (MIMO) transmit beamforming systems with maximum ratio combining (MRC) receivers. The operating environment is Rayleigh-fading with both transmit and receive spatial correlation. We present exact expressions for the probability density function (p.d.f.) of the output signal-to-noise ratio (SNR), as well as the system outage probability. The results are…
▽ More
We consider multiple-input multiple-output (MIMO) transmit beamforming systems with maximum ratio combining (MRC) receivers. The operating environment is Rayleigh-fading with both transmit and receive spatial correlation. We present exact expressions for the probability density function (p.d.f.) of the output signal-to-noise ratio (SNR), as well as the system outage probability. The results are based on explicit closed-form expressions which we derive for the p.d.f. and c.d.f. of the maximum eigenvalue of double-correlated complex Wishart matrices. For systems with two antennas at either the transmitter or the receiver, we also derive exact closed-form expressions for the symbol error rate (SER). The new expressions are used to prove that MIMO-MRC achieves the maximum available spatial diversity order, and to demonstrate the effect of spatial correlation. The analysis is validated through comparison with Monte-Carlo simulations.
△ Less
Submitted 17 November, 2005;
originally announced November 2005.