SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Interactive Communication for Resource
Allocation
Jie Ren
jr843@drexel.edu
John MacLaren Walsh
jmw96@drexel.edu
Adaptive Signal Processing and Information Theory Group
Department of Electrical and Computer Engineering
Drexel University, Philadelphia, PA 19104
This research has been supported by the Air Force Research Laboratory
under agreement number FA9550-12-1-0086.
March 19th, 2014
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 1 / 20
Introduction
Outline
1 Introduction
2 Problem Model
3 Analysis
4 Results
5 Conclusions
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 2 / 20
Introduction
Motivation
M. I. Salman etc. ”IETE Technical Review”
• Which user to assign the
subcarrier to
• Which modulation and coding
scheme to employ
X1
X2
X3
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 3 / 20
Introduction
Adaptive Modulation and Coding
• Overheads
• Reference Signals
• Channel Quality Indicators
• Control Decisions
• Occupy the OFDMA resource
blocks
• Approximately 1/4 to 1/3 of all
downlink transmission in LTE
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 4 / 20
Introduction
Background
Rateless Codes
http://www.telematica.polito.it/oldsite/sas-ipl/
• Almost achieve channel capacity
• Without requiring of channel
information at the transmitter
side
• Allow variable block length
3 dB
2 dB
2 dB
Ut( t = 3dB)
X1
X2
X3
V 1
t = 1
V 2
t = 0
V 3
t = 0
• BS: wishes to maximize the
system throughput
• Only needs to learn the arg-max
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 5 / 20
Introduction
Background
Interactive Communication
• Interaction for Lossy Source
Reproduction (Kaspi 1985)
• Interaction for function
computation (Ishwar & Ma
2011)
• Benefit can be arbitrarily large
• Infinite rounds interaction
may help
Rt ={R|∃Ut
, s.t.∀i = 1, · · · , t
Ri ≥ I(X; Ui |Y , Ui−1
), Ui − (X, Ui−1
) − Y , i odd
Ri ≥ I(Y ; Ui |Y , Ui−1
), Ui − (Y , Ui−1
) − X, i even
H(f (X, Y )|Y , Ut
) = 0}
(1)
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 6 / 20
Introduction
Main Contribution
Achievable Interactive Communication Scheme for Resource
Allocation
• Determine the arg-max (use rateless codes for data transmission)
• Solve by dynamic programming
• Show huge savings
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 7 / 20
Problem Model
Outline
1 Introduction
2 Problem Model
3 Analysis
4 Results
5 Conclusions
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 8 / 20
Problem Model
Problem Model
3 dB
2 dB
2 dB
Ut( t = 3dB)
X1
X2
X3
V 1
t = 1
V 2
t = 0
V 3
t = 0
Notations
• Xi ∈ Xt = {at, . . . , bt}
• Ut Broadcasting message at
round t
• V i
t Replied message from MS i
at round t
Achievable Interaction Scheme
1: BS broadcasts a threshold λt at
round t
2: MS i replies a 1 if Xi ≥ λt and 0
otherwise
3: Stops when BS knows arg-max
reliably
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 9 / 20
Problem Model
Problem Model
3 dB
2 dB
2 dB
Ut( t = 3dB)
X1
X2
X3
V 1
t = 1
V 2
t = 0
V 3
t = 0
Some Assumptions
• BS knows the initial distribution
of X
• BS knows the initial number of
MSs
• MSs are not allowed to
communicate with each other
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 10 / 20
Analysis
Outline
1 Introduction
2 Problem Model
3 Analysis
4 Results
5 Conclusions
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 11 / 20
Analysis
Analysis
Non-increasing Support set of X
If some users reply 1
at+1 = λt
bt+1 = bt
Ft+1(x) =
Ft(x) − Ft(λt)
Ft(bt) − Ft(λt)
(2)
If no user replies 1
at+1 = at
bt+1 = λt
Ft+1(x) =
Ft(x) − Ft(at)
Ft(λt) − Ft(at)
(3)
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 12 / 20
Analysis
Analysis
Aggregate rate
Rt(λ) = H(λ|λ1, · · · , λt−1) + Nt + (Ft(λ))Nt
R∗
(Nt, at, λ)
+
Nt
i=1
(1 − Ft(λ))i
Ft(λ)Nt −i Nt!
i!(Nt − i)!
R∗
(i, λ, bt) (4)
Policy Iteration
λ∗
t = arg min
λ
Rt(λ) (5)
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 13 / 20
Analysis
Analysis
• Efficiently Encode the Threshold
H(λt|λ1, . . . , λt−1) (6)
• Why H(Nt|Nt−1) works?
• Xt and Nt determines λ∗
t
• Xt−1,Nt−1 and Nt determines
Xt
• Two other strategies
• Non-conditioning Encode the
Threshold: H(λt)
• Encode the Number of Users:
H(Nt|Nt−1)
Xt =



{λ∗
t−1, bt−1} if Nt < Nt−1
{at−1, λ∗
t−1} if Nt = Nt−1 and λ∗
t−1 > xi
{λ∗
t−1, bt−1} if Nt = Nt−1 and λ∗
t−1 ≤ xi
(7)
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 14 / 20
Results
Outline
1 Introduction
2 Problem Model
3 Analysis
4 Results
5 Conclusions
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 15 / 20
Results
Results
• X = {1, . . . , 16}
2 3 4 5 6 7 8 9 10 11 12
5
10
15
20
25
30
35
40
45
50
number of users
overheads
Non−interaction
Interaction
Sending Threshold
Sending Number of Uers
One−way Limit
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 16 / 20
Results
Some Extensions
Interaction with Distortion
E[max{X1, . . . , XNt } − Xi ] ≤ D (8)
Bits Cost Vs. Time Cost
C = µR + (1 − µ)T (9)
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 17 / 20
Conclusions
Outline
1 Introduction
2 Problem Model
3 Analysis
4 Results
5 Conclusions
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 18 / 20
Conclusions
Contribution & Future Work
Review of Contribution
• Achievable Interactive Communication Scheme for Resource
Allocation
• Solve by Dynamic Programming
Future Work
• Consider Scalar Quantization than the 1-bit Message
• Fundamental Limits (Rate-distortion Curve)
• Resource Allocation in MIMO system
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 19 / 20
Conclusions
Acknowledgments
Supported by the AFOSR under agreement number FA9550-12-1-0086
Jie Ren (Drexel ASPITRG) ICFRA March 19th
, 2014 20 / 20

Contenu connexe

Tendances

Data Structures and Algorithm - Week 8 - Minimum Spanning Trees
Data Structures and Algorithm - Week 8 - Minimum Spanning TreesData Structures and Algorithm - Week 8 - Minimum Spanning Trees
Data Structures and Algorithm - Week 8 - Minimum Spanning TreesFerdin Joe John Joseph PhD
 
(Icca 2014) shortest path analysis in social graphs
(Icca 2014) shortest path analysis in social graphs(Icca 2014) shortest path analysis in social graphs
(Icca 2014) shortest path analysis in social graphsWaqas Nawaz
 
Application of interpolation in CSE
Application of interpolation in CSEApplication of interpolation in CSE
Application of interpolation in CSEMd. Tanvir Hossain
 
FINDING FREQUENT SUBPATHS IN A GRAPH
FINDING FREQUENT SUBPATHS IN A GRAPHFINDING FREQUENT SUBPATHS IN A GRAPH
FINDING FREQUENT SUBPATHS IN A GRAPHIJDKP
 
Brief introduction on GAN
Brief introduction on GANBrief introduction on GAN
Brief introduction on GANDai-Hai Nguyen
 
Lecture 28
Lecture 28Lecture 28
Lecture 28Shani729
 
Data Structures and Algorithm - Week 5 - AVL Trees
Data Structures and Algorithm - Week 5 - AVL TreesData Structures and Algorithm - Week 5 - AVL Trees
Data Structures and Algorithm - Week 5 - AVL TreesFerdin Joe John Joseph PhD
 
Learning To Rank data2day 2017
Learning To Rank data2day 2017Learning To Rank data2day 2017
Learning To Rank data2day 2017Stefan Kühn
 
The Evolution of Computationally Practical Linear Programming
The Evolution of Computationally Practical Linear ProgrammingThe Evolution of Computationally Practical Linear Programming
The Evolution of Computationally Practical Linear ProgrammingBob Fourer
 
Inductive Triple Graphs: A purely functional approach to represent RDF
Inductive Triple Graphs: A purely functional approach to represent RDFInductive Triple Graphs: A purely functional approach to represent RDF
Inductive Triple Graphs: A purely functional approach to represent RDFJose Emilio Labra Gayo
 
Optimization Software and Systems for Operations Research: Best Practices and...
Optimization Software and Systems for Operations Research: Best Practices and...Optimization Software and Systems for Operations Research: Best Practices and...
Optimization Software and Systems for Operations Research: Best Practices and...Bob Fourer
 
Recognition as Graph Matching
  Recognition as Graph Matching  Recognition as Graph Matching
Recognition as Graph MatchingVishakha Agarwal
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaEdureka!
 
Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...IAEME Publication
 

Tendances (19)

Data Structures and Algorithm - Week 8 - Minimum Spanning Trees
Data Structures and Algorithm - Week 8 - Minimum Spanning TreesData Structures and Algorithm - Week 8 - Minimum Spanning Trees
Data Structures and Algorithm - Week 8 - Minimum Spanning Trees
 
(Icca 2014) shortest path analysis in social graphs
(Icca 2014) shortest path analysis in social graphs(Icca 2014) shortest path analysis in social graphs
(Icca 2014) shortest path analysis in social graphs
 
Application of interpolation in CSE
Application of interpolation in CSEApplication of interpolation in CSE
Application of interpolation in CSE
 
FINDING FREQUENT SUBPATHS IN A GRAPH
FINDING FREQUENT SUBPATHS IN A GRAPHFINDING FREQUENT SUBPATHS IN A GRAPH
FINDING FREQUENT SUBPATHS IN A GRAPH
 
Brief introduction on GAN
Brief introduction on GANBrief introduction on GAN
Brief introduction on GAN
 
Data Structures 01
Data Structures 01Data Structures 01
Data Structures 01
 
Lecture 28
Lecture 28Lecture 28
Lecture 28
 
Data Structures and Algorithm - Week 5 - AVL Trees
Data Structures and Algorithm - Week 5 - AVL TreesData Structures and Algorithm - Week 5 - AVL Trees
Data Structures and Algorithm - Week 5 - AVL Trees
 
Learning To Rank data2day 2017
Learning To Rank data2day 2017Learning To Rank data2day 2017
Learning To Rank data2day 2017
 
The Evolution of Computationally Practical Linear Programming
The Evolution of Computationally Practical Linear ProgrammingThe Evolution of Computationally Practical Linear Programming
The Evolution of Computationally Practical Linear Programming
 
Inductive Triple Graphs: A purely functional approach to represent RDF
Inductive Triple Graphs: A purely functional approach to represent RDFInductive Triple Graphs: A purely functional approach to represent RDF
Inductive Triple Graphs: A purely functional approach to represent RDF
 
A* algorithm
A* algorithmA* algorithm
A* algorithm
 
Optimization Software and Systems for Operations Research: Best Practices and...
Optimization Software and Systems for Operations Research: Best Practices and...Optimization Software and Systems for Operations Research: Best Practices and...
Optimization Software and Systems for Operations Research: Best Practices and...
 
Recognition as Graph Matching
  Recognition as Graph Matching  Recognition as Graph Matching
Recognition as Graph Matching
 
Id3313941396
Id3313941396Id3313941396
Id3313941396
 
Lgm saarbrucken
Lgm saarbruckenLgm saarbrucken
Lgm saarbrucken
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
 
20151130
2015113020151130
20151130
 
Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...
 

En vedette

CommunicationComplexity1_jieren
CommunicationComplexity1_jierenCommunicationComplexity1_jieren
CommunicationComplexity1_jierenjie ren
 
presentation
presentationpresentation
presentationjie ren
 
presentation
presentationpresentation
presentationjie ren
 
adeoye adeyemi johnson
adeoye adeyemi johnsonadeoye adeyemi johnson
adeoye adeyemi johnsonadeyemi adeoye
 
slides-defense-jie
slides-defense-jieslides-defense-jie
slides-defense-jiejie ren
 
[AVTOKYO2015] THREAT OF DATA URL SCHEME THEY ARE STILL HERE
[AVTOKYO2015] THREAT OF DATA URL SCHEME THEY ARE STILL HERE[AVTOKYO2015] THREAT OF DATA URL SCHEME THEY ARE STILL HERE
[AVTOKYO2015] THREAT OF DATA URL SCHEME THEY ARE STILL HEREllamakko
 
新卒採用戦線 総括2015レポート報告 20140902
新卒採用戦線 総括2015レポート報告 20140902新卒採用戦線 総括2015レポート報告 20140902
新卒採用戦線 総括2015レポート報告 20140902Keiko Hirano
 
Alex_Vlachos_Advanced_VR_Rendering_GDC2015
Alex_Vlachos_Advanced_VR_Rendering_GDC2015Alex_Vlachos_Advanced_VR_Rendering_GDC2015
Alex_Vlachos_Advanced_VR_Rendering_GDC2015Alex Vlachos
 
16卒採用&就職活動中間レポート_20150827
16卒採用&就職活動中間レポート_2015082716卒採用&就職活動中間レポート_20150827
16卒採用&就職活動中間レポート_20150827Keiko Hirano
 
Alex_Vlachos_Advanced_VR_Rendering_Performance_GDC2016
Alex_Vlachos_Advanced_VR_Rendering_Performance_GDC2016Alex_Vlachos_Advanced_VR_Rendering_Performance_GDC2016
Alex_Vlachos_Advanced_VR_Rendering_Performance_GDC2016Alex Vlachos
 
キャリア教育におけるアクティブラーニング実施時の着眼点と工夫_20150314
キャリア教育におけるアクティブラーニング実施時の着眼点と工夫_20150314キャリア教育におけるアクティブラーニング実施時の着眼点と工夫_20150314
キャリア教育におけるアクティブラーニング実施時の着眼点と工夫_20150314Keiko Hirano
 
Mary_Vincent_Resume 6-7-2015
Mary_Vincent_Resume 6-7-2015Mary_Vincent_Resume 6-7-2015
Mary_Vincent_Resume 6-7-2015Marion Vincent
 
NEW RESUME danilo UPDATED 2015.doc
NEW RESUME danilo UPDATED 2015.docNEW RESUME danilo UPDATED 2015.doc
NEW RESUME danilo UPDATED 2015.docDanilo Jr Vargas
 

En vedette (16)

computational_law
computational_lawcomputational_law
computational_law
 
CommunicationComplexity1_jieren
CommunicationComplexity1_jierenCommunicationComplexity1_jieren
CommunicationComplexity1_jieren
 
presentation
presentationpresentation
presentation
 
Lamey Wellehan
Lamey WellehanLamey Wellehan
Lamey Wellehan
 
presentation
presentationpresentation
presentation
 
Event look
Event lookEvent look
Event look
 
adeoye adeyemi johnson
adeoye adeyemi johnsonadeoye adeyemi johnson
adeoye adeyemi johnson
 
slides-defense-jie
slides-defense-jieslides-defense-jie
slides-defense-jie
 
[AVTOKYO2015] THREAT OF DATA URL SCHEME THEY ARE STILL HERE
[AVTOKYO2015] THREAT OF DATA URL SCHEME THEY ARE STILL HERE[AVTOKYO2015] THREAT OF DATA URL SCHEME THEY ARE STILL HERE
[AVTOKYO2015] THREAT OF DATA URL SCHEME THEY ARE STILL HERE
 
新卒採用戦線 総括2015レポート報告 20140902
新卒採用戦線 総括2015レポート報告 20140902新卒採用戦線 総括2015レポート報告 20140902
新卒採用戦線 総括2015レポート報告 20140902
 
Alex_Vlachos_Advanced_VR_Rendering_GDC2015
Alex_Vlachos_Advanced_VR_Rendering_GDC2015Alex_Vlachos_Advanced_VR_Rendering_GDC2015
Alex_Vlachos_Advanced_VR_Rendering_GDC2015
 
16卒採用&就職活動中間レポート_20150827
16卒採用&就職活動中間レポート_2015082716卒採用&就職活動中間レポート_20150827
16卒採用&就職活動中間レポート_20150827
 
Alex_Vlachos_Advanced_VR_Rendering_Performance_GDC2016
Alex_Vlachos_Advanced_VR_Rendering_Performance_GDC2016Alex_Vlachos_Advanced_VR_Rendering_Performance_GDC2016
Alex_Vlachos_Advanced_VR_Rendering_Performance_GDC2016
 
キャリア教育におけるアクティブラーニング実施時の着眼点と工夫_20150314
キャリア教育におけるアクティブラーニング実施時の着眼点と工夫_20150314キャリア教育におけるアクティブラーニング実施時の着眼点と工夫_20150314
キャリア教育におけるアクティブラーニング実施時の着眼点と工夫_20150314
 
Mary_Vincent_Resume 6-7-2015
Mary_Vincent_Resume 6-7-2015Mary_Vincent_Resume 6-7-2015
Mary_Vincent_Resume 6-7-2015
 
NEW RESUME danilo UPDATED 2015.doc
NEW RESUME danilo UPDATED 2015.docNEW RESUME danilo UPDATED 2015.doc
NEW RESUME danilo UPDATED 2015.doc
 

Similaire à presentation

Dictionary Learning for Massive Matrix Factorization
Dictionary Learning for Massive Matrix FactorizationDictionary Learning for Massive Matrix Factorization
Dictionary Learning for Massive Matrix FactorizationArthur Mensch
 
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...ijma
 
http://www.logos.ic.i.u-tokyo.ac.jp/~kay/papers/ccgrid2008_stable_broadcast.pdf
http://www.logos.ic.i.u-tokyo.ac.jp/~kay/papers/ccgrid2008_stable_broadcast.pdfhttp://www.logos.ic.i.u-tokyo.ac.jp/~kay/papers/ccgrid2008_stable_broadcast.pdf
http://www.logos.ic.i.u-tokyo.ac.jp/~kay/papers/ccgrid2008_stable_broadcast.pdfHiroshi Ono
 
Resourceful fast dht algorithm for vlsi implementation by split radix algorithm
Resourceful fast dht algorithm for vlsi implementation by split radix algorithmResourceful fast dht algorithm for vlsi implementation by split radix algorithm
Resourceful fast dht algorithm for vlsi implementation by split radix algorithmeSAT Publishing House
 
IRJET- A Study on Algorithms for FFT Computations
IRJET- A Study on Algorithms for FFT ComputationsIRJET- A Study on Algorithms for FFT Computations
IRJET- A Study on Algorithms for FFT ComputationsIRJET Journal
 
Massive Matrix Factorization : Applications to collaborative filtering
Massive Matrix Factorization : Applications to collaborative filteringMassive Matrix Factorization : Applications to collaborative filtering
Massive Matrix Factorization : Applications to collaborative filteringArthur Mensch
 
Dictionary Learning for Massive Matrix Factorization
Dictionary Learning for Massive Matrix FactorizationDictionary Learning for Massive Matrix Factorization
Dictionary Learning for Massive Matrix Factorizationrecsysfr
 
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...IJERA Editor
 
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...IRJET Journal
 
INDUSTRIAL TRAINING REPORT
INDUSTRIAL TRAINING REPORTINDUSTRIAL TRAINING REPORT
INDUSTRIAL TRAINING REPORTABHISHEK DABRAL
 
2021 itu challenge_reinforcement_learning
2021 itu challenge_reinforcement_learning2021 itu challenge_reinforcement_learning
2021 itu challenge_reinforcement_learningLASSEMedia
 
5.3 dyn algo-i
5.3 dyn algo-i5.3 dyn algo-i
5.3 dyn algo-iKrish_ver2
 
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...cscpconf
 
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...csandit
 
Radar 2009 a 3 review of signals systems and dsp
Radar 2009 a  3 review of signals systems and dspRadar 2009 a  3 review of signals systems and dsp
Radar 2009 a 3 review of signals systems and dspForward2025
 
Radar 2009 a 3 review of signals, systems, and dsp
Radar 2009 a  3 review of signals, systems, and dspRadar 2009 a  3 review of signals, systems, and dsp
Radar 2009 a 3 review of signals, systems, and dspsubha5
 
Radar 2009 a 3 review of signals, systems, and dsp
Radar 2009 a  3 review of signals, systems, and dspRadar 2009 a  3 review of signals, systems, and dsp
Radar 2009 a 3 review of signals, systems, and dspVi Binh Q. Le
 

Similaire à presentation (20)

Dictionary Learning for Massive Matrix Factorization
Dictionary Learning for Massive Matrix FactorizationDictionary Learning for Massive Matrix Factorization
Dictionary Learning for Massive Matrix Factorization
 
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
 
2019 GDRR: Blockchain Data Analytics - Dissecting Blockchain Price Analytics...
2019 GDRR: Blockchain Data Analytics  - Dissecting Blockchain Price Analytics...2019 GDRR: Blockchain Data Analytics  - Dissecting Blockchain Price Analytics...
2019 GDRR: Blockchain Data Analytics - Dissecting Blockchain Price Analytics...
 
A new radix 4 fft algorithm
A new radix 4 fft algorithmA new radix 4 fft algorithm
A new radix 4 fft algorithm
 
http://www.logos.ic.i.u-tokyo.ac.jp/~kay/papers/ccgrid2008_stable_broadcast.pdf
http://www.logos.ic.i.u-tokyo.ac.jp/~kay/papers/ccgrid2008_stable_broadcast.pdfhttp://www.logos.ic.i.u-tokyo.ac.jp/~kay/papers/ccgrid2008_stable_broadcast.pdf
http://www.logos.ic.i.u-tokyo.ac.jp/~kay/papers/ccgrid2008_stable_broadcast.pdf
 
Resourceful fast dht algorithm for vlsi implementation by split radix algorithm
Resourceful fast dht algorithm for vlsi implementation by split radix algorithmResourceful fast dht algorithm for vlsi implementation by split radix algorithm
Resourceful fast dht algorithm for vlsi implementation by split radix algorithm
 
IRJET- A Study on Algorithms for FFT Computations
IRJET- A Study on Algorithms for FFT ComputationsIRJET- A Study on Algorithms for FFT Computations
IRJET- A Study on Algorithms for FFT Computations
 
Massive Matrix Factorization : Applications to collaborative filtering
Massive Matrix Factorization : Applications to collaborative filteringMassive Matrix Factorization : Applications to collaborative filtering
Massive Matrix Factorization : Applications to collaborative filtering
 
Dictionary Learning for Massive Matrix Factorization
Dictionary Learning for Massive Matrix FactorizationDictionary Learning for Massive Matrix Factorization
Dictionary Learning for Massive Matrix Factorization
 
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
 
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
 
INDUSTRIAL TRAINING REPORT
INDUSTRIAL TRAINING REPORTINDUSTRIAL TRAINING REPORT
INDUSTRIAL TRAINING REPORT
 
2021 itu challenge_reinforcement_learning
2021 itu challenge_reinforcement_learning2021 itu challenge_reinforcement_learning
2021 itu challenge_reinforcement_learning
 
5.3 dyn algo-i
5.3 dyn algo-i5.3 dyn algo-i
5.3 dyn algo-i
 
NNPDF3.1
NNPDF3.1NNPDF3.1
NNPDF3.1
 
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
 
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
 
Radar 2009 a 3 review of signals systems and dsp
Radar 2009 a  3 review of signals systems and dspRadar 2009 a  3 review of signals systems and dsp
Radar 2009 a 3 review of signals systems and dsp
 
Radar 2009 a 3 review of signals, systems, and dsp
Radar 2009 a  3 review of signals, systems, and dspRadar 2009 a  3 review of signals, systems, and dsp
Radar 2009 a 3 review of signals, systems, and dsp
 
Radar 2009 a 3 review of signals, systems, and dsp
Radar 2009 a  3 review of signals, systems, and dspRadar 2009 a  3 review of signals, systems, and dsp
Radar 2009 a 3 review of signals, systems, and dsp
 

presentation

  • 1. Interactive Communication for Resource Allocation Jie Ren jr843@drexel.edu John MacLaren Walsh jmw96@drexel.edu Adaptive Signal Processing and Information Theory Group Department of Electrical and Computer Engineering Drexel University, Philadelphia, PA 19104 This research has been supported by the Air Force Research Laboratory under agreement number FA9550-12-1-0086. March 19th, 2014 Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 1 / 20
  • 2. Introduction Outline 1 Introduction 2 Problem Model 3 Analysis 4 Results 5 Conclusions Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 2 / 20
  • 3. Introduction Motivation M. I. Salman etc. ”IETE Technical Review” • Which user to assign the subcarrier to • Which modulation and coding scheme to employ X1 X2 X3 Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 3 / 20
  • 4. Introduction Adaptive Modulation and Coding • Overheads • Reference Signals • Channel Quality Indicators • Control Decisions • Occupy the OFDMA resource blocks • Approximately 1/4 to 1/3 of all downlink transmission in LTE Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 4 / 20
  • 5. Introduction Background Rateless Codes http://www.telematica.polito.it/oldsite/sas-ipl/ • Almost achieve channel capacity • Without requiring of channel information at the transmitter side • Allow variable block length 3 dB 2 dB 2 dB Ut( t = 3dB) X1 X2 X3 V 1 t = 1 V 2 t = 0 V 3 t = 0 • BS: wishes to maximize the system throughput • Only needs to learn the arg-max Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 5 / 20
  • 6. Introduction Background Interactive Communication • Interaction for Lossy Source Reproduction (Kaspi 1985) • Interaction for function computation (Ishwar & Ma 2011) • Benefit can be arbitrarily large • Infinite rounds interaction may help Rt ={R|∃Ut , s.t.∀i = 1, · · · , t Ri ≥ I(X; Ui |Y , Ui−1 ), Ui − (X, Ui−1 ) − Y , i odd Ri ≥ I(Y ; Ui |Y , Ui−1 ), Ui − (Y , Ui−1 ) − X, i even H(f (X, Y )|Y , Ut ) = 0} (1) Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 6 / 20
  • 7. Introduction Main Contribution Achievable Interactive Communication Scheme for Resource Allocation • Determine the arg-max (use rateless codes for data transmission) • Solve by dynamic programming • Show huge savings Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 7 / 20
  • 8. Problem Model Outline 1 Introduction 2 Problem Model 3 Analysis 4 Results 5 Conclusions Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 8 / 20
  • 9. Problem Model Problem Model 3 dB 2 dB 2 dB Ut( t = 3dB) X1 X2 X3 V 1 t = 1 V 2 t = 0 V 3 t = 0 Notations • Xi ∈ Xt = {at, . . . , bt} • Ut Broadcasting message at round t • V i t Replied message from MS i at round t Achievable Interaction Scheme 1: BS broadcasts a threshold λt at round t 2: MS i replies a 1 if Xi ≥ λt and 0 otherwise 3: Stops when BS knows arg-max reliably Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 9 / 20
  • 10. Problem Model Problem Model 3 dB 2 dB 2 dB Ut( t = 3dB) X1 X2 X3 V 1 t = 1 V 2 t = 0 V 3 t = 0 Some Assumptions • BS knows the initial distribution of X • BS knows the initial number of MSs • MSs are not allowed to communicate with each other Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 10 / 20
  • 11. Analysis Outline 1 Introduction 2 Problem Model 3 Analysis 4 Results 5 Conclusions Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 11 / 20
  • 12. Analysis Analysis Non-increasing Support set of X If some users reply 1 at+1 = λt bt+1 = bt Ft+1(x) = Ft(x) − Ft(λt) Ft(bt) − Ft(λt) (2) If no user replies 1 at+1 = at bt+1 = λt Ft+1(x) = Ft(x) − Ft(at) Ft(λt) − Ft(at) (3) Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 12 / 20
  • 13. Analysis Analysis Aggregate rate Rt(λ) = H(λ|λ1, · · · , λt−1) + Nt + (Ft(λ))Nt R∗ (Nt, at, λ) + Nt i=1 (1 − Ft(λ))i Ft(λ)Nt −i Nt! i!(Nt − i)! R∗ (i, λ, bt) (4) Policy Iteration λ∗ t = arg min λ Rt(λ) (5) Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 13 / 20
  • 14. Analysis Analysis • Efficiently Encode the Threshold H(λt|λ1, . . . , λt−1) (6) • Why H(Nt|Nt−1) works? • Xt and Nt determines λ∗ t • Xt−1,Nt−1 and Nt determines Xt • Two other strategies • Non-conditioning Encode the Threshold: H(λt) • Encode the Number of Users: H(Nt|Nt−1) Xt =    {λ∗ t−1, bt−1} if Nt < Nt−1 {at−1, λ∗ t−1} if Nt = Nt−1 and λ∗ t−1 > xi {λ∗ t−1, bt−1} if Nt = Nt−1 and λ∗ t−1 ≤ xi (7) Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 14 / 20
  • 15. Results Outline 1 Introduction 2 Problem Model 3 Analysis 4 Results 5 Conclusions Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 15 / 20
  • 16. Results Results • X = {1, . . . , 16} 2 3 4 5 6 7 8 9 10 11 12 5 10 15 20 25 30 35 40 45 50 number of users overheads Non−interaction Interaction Sending Threshold Sending Number of Uers One−way Limit Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 16 / 20
  • 17. Results Some Extensions Interaction with Distortion E[max{X1, . . . , XNt } − Xi ] ≤ D (8) Bits Cost Vs. Time Cost C = µR + (1 − µ)T (9) Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 17 / 20
  • 18. Conclusions Outline 1 Introduction 2 Problem Model 3 Analysis 4 Results 5 Conclusions Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 18 / 20
  • 19. Conclusions Contribution & Future Work Review of Contribution • Achievable Interactive Communication Scheme for Resource Allocation • Solve by Dynamic Programming Future Work • Consider Scalar Quantization than the 1-bit Message • Fundamental Limits (Rate-distortion Curve) • Resource Allocation in MIMO system Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 19 / 20
  • 20. Conclusions Acknowledgments Supported by the AFOSR under agreement number FA9550-12-1-0086 Jie Ren (Drexel ASPITRG) ICFRA March 19th , 2014 20 / 20