Professional Documents
Culture Documents
I. I NTRODUCTION
c 2010 IEEE
1536-1276/10$25.00
Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:38:02 UTC from IEEE Xplore. Restrictions apply.
571
parameter given the second (or first) parameter and the probability, respectively. That is, if (, ) = , then we have
{ (
)
1
1 (, ), = ,
)
(
(7)
, 1
2 (, ) = .
max
,
(8)
2
2
2
w2
(1)
s.t.
w2
2
w2
2
g w
,
2
w2
2
w2 2
2
1 , .
2
max
where the probabilistic measures are done over the CSI error
w
w2 2
, .
,
1
s.t.
g w 1
1
be chosen carefully to softly tradeoff the performance between
2
w2 2
2
the PUs and the SU.
To proceed, we express the service probability by noting The above reformulation has inspired us to solve (8) by first
that
addressing the problem for a given transmit power w2 = ,
h w = h w + h w ,
(5) for some , and then searching for the optimal .
which is recognized as a non-central Chi-square random vari2
w2
able with degrees of freedom = 2, variance 2 =
2
w2 . As such,
and noncentrality parameter 2 = h
(
)
)
( 2
,
Prob h w =
,
(6)
where (, , ) denotes the generalized Marcums Q-function
[12, eq. (2.1122)]. Moreover, we define two useful inverse
1
functions, 1
1 and 2 , with regard to the first (or second)
w2 =
where
1
1
2
2
, 1
2
2 .
Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:38:02 UTC from IEEE Xplore. Restrictions apply.
(10)
572
h
w
s.t.
(11)
max
w2
g w2 , .
The main advantage of this formulation is that (11) is now
convex and standard interior point algorithms can be used to
efficiently and optimally solve it. The rationale behind is that if
there exists some optimal and if it is known to (11), then the
resulting w must satisfy the equality w2 = . This means
that at the optimum, the relaxation is tight, and therefore (11)
is useful to derive the exact optimal solution to the original
problem (8).
max
(12)
,
2
2
w
s.t.
w2
2
w2
2
w2 ,
g
w
1 .
w2 2
w2 2
7:
Store this solution to the set , i.e., := {w}.
8:
end
9:
Update := + 1 and := .
10:
end
11:
12:
13:
w2 2
w2 2
h
.
(13)
The optimality of and wopt in (13) can be easily detected by substituting (13) into the interference constraint.
If it is satisfied, then and (13) are indeed optimal.
C2: The interference constraint is active regardless of whether
w2 = . The optimal robust beamforming solution
in this case is less obvious, and is addressed through
the geometrical understanding of the problem structure
described in the remainder of this section.
A. Upper and Lower Bounds on w2 =
The transmit power of the SU can vary in the interval
(0, ], and the higher the transmit power, the less the
likelihood of the interference requirement being met. In this
subsection, we present the upper and lower bounds on ,
provided the interference constraint is active.
Lemma 1. The allowable transmit power, w2 = , satisfies
, where the bounds are given, respectively, by
2
(14a)
=
[
(
)]2 ,
2
g
2 1
,
1
2
1
2 (0, 1
]2 .
)
Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:38:02 UTC from IEEE Xplore. Restrictions apply.
(14b)
= 1
, 1
2
w2 2
2
w2 2
2
)
(
2
g
,1 ,
= 1
2
(15)
2
[
(
)]2 .
2
g
2 1
,
1
(16)
that w1 = .
It is easy to check that the interference caused by w1
remains the same as that by wopt , i.e.,
=g
wopt .
w1 =
g
g g
w2 2
.
(17)
g w = 1
, 1
1
2
2
2
w
2
w2 = ,
w s.t.
2
max h
g w = 1
.
, 1
1
2
(18)
The following lemma describes an important fact for the
optimal solution of (18).
Lemma 2. The optimal w, denoted by wopt , to (18) should
and g , i.e., wopt =
g + g ,
lie in the space spanned by g
where , are complex scalar coefficients and
(
)
g
g
g I
h.
(19)
g
g
Proof: The following proof is inspired by Proposition 1
in [13].
is a vector of length and g
g = 0, the
Since h
optimal solution, without loss of generality, wopt , can always
be expressed as
wopt =
g + g + U,
573
(20)
(22)
= h (
g + g ) + h I
h
g
g
wopt .
(
g + g ) = h
h
(23)
Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:38:02 UTC from IEEE Xplore. Restrictions apply.
4:
if , then
5:
wopt is given by (13).
6:
Go to line 28.
7:
end
8:
if , then
9:
if w2 = is optimal, then
10:
wopt is given by (13).
11:
Go to line 28.
12:
else
).
:= min(,
13:
14:
= .
15:
Initialize = 1.
16:
While
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
0.9
0.8
0.7
Proposed, l=0.8
0.6
0.5
NonRobust
Proposed, =0.95
0.4
0.3
0.2
0.1
0
70
60
50
40
30
20
10
10
20
Fig. 1. The c.d.f. for the interference power received at the first PU with
= 10 (dB) .
10
:= + 1.
:= + ( 1) .
end
10
BER for PU 1
[] =
17:
c.d.f.
574
NonRobust
Proposed, =0.8
l
10
Proposed, l=0.95
Worst Case, l=0.95
min
w h ()
h w2 s.t.
max
()
g w2 ,
(24)
()
for some carefully chosen () and { }. Note that it is
possible to use an ellipsoidal region to bound the CSI errors,
as in [16], and the principle is the same. Further, (24) in its
current form is not convex, but can be reformulated to an
SOCP problem as follows [17]:
()
w () w s.t.
g
w
w .
h
max
2
w
(25)
To have a fair comparison between the proposed algorithm
(Algorithms 1 & 2) and the worst-case based method, we
()
obtain the bounds () and { } appropriately such that
)
(
2 2
w ,
(27)
,
1
1
2
w2 2
2
10
SNR at PU 1 (dB)
10
Fig. 2. The BER results for the PUs against the received SNR with
0 (dB) .
15
()
w.
(28)
B. Results
In Fig. 1, results are provided for the cumulative distribution
function (c.d.f.) of the received interference power at the first
PU (or PU 1) from the SU when the interference temperature
is set to 10 dB, i.e., 0 = 10 dB for = 1, 2. The
interference levels to the PUs are required to be 80% and 95%
acceptable, or = 0.80, 0.95 . We see that the required
probability that the resulting interference is below 10 dB
is satisfied for the proposed scheme, while in the worst-case
method, the interference power never exceeds 10 dB. Results
also show that for the non-robust method, more than 90% of
the time, the interference level exceeds the required 10 dB.
The effect of interference control is studied by the biterror-rate (BER) results for PU 1 as shown in Fig. 2, where
Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:38:02 UTC from IEEE Xplore. Restrictions apply.
1
Proposed, =0.8
0.9
0.8
0.7
c.d.f.
0.6
0.5
0.4
0.3
0.2
0.1
0
40
30
20
10
10
Fig. 3. The c.d.f. for the received signal power at the SU with
10 (dB) .
20
10
10
Proposed, l=0.8
Worst Case, l=0.8
NonRobust
Proposed, l=0.9
2
10
VI. C ONCLUSION
This letter studied the stochastic robust transmit beamforming in CR to balance the interference control for PUs and
signal enhancement for SU using probabilistic constraints.
We showed that the problem can be optimally solved using
SOCP in tandem with a simple one-dimensional search on the
transmit power. For the case with only one PU and a given
transmit power, a closed-form solution is possible. Simulation results illustrated that the proposed algorithm provides
adjustable robustness and a controllable performance tradeoff
between the PUs and the SU in CR and greatly improves
SU performance over the worst-case approach with slight PUs
performance degradation.
R EFERENCES
Fig. 4.
Proposed, l=0.95
Worst Case, l=0.95
10
15
575
10
Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:38:02 UTC from IEEE Xplore. Restrictions apply.
576
Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:38:02 UTC from IEEE Xplore. Restrictions apply.