skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Backhaul-Aware Uplink Communications in Full-Duplex DBS-Aided HetNets
Drone-mounted base stations (DBSs) are promising solutions to provide ubiquitous connections to users and support many applications in the fifth generation of mobile networks while full duplex communications has the potential to improve the spectrum efficiency. In this paper, we have investigated the backhaul-aware uplink communications in a full-duplex DBS-aided HetNet (BUD) problem with the objective to maximize the total throughput of the network, and this problem is decomposed into two sub-problems: the DBS Placement problem (including the vertical position and horizontal position) and the joint UE association, power and bandwidth assignment (Joint-UPB) problem. Since the BUD problem is NP- hard, we propose approximation algorithms to solve the sub-problems and another, named the AA-BUD algorithm, to solve the BUD problem with guaranteed performance. The performance of the AA- BUD algorithm has been demonstrated via extensive simulations, and results show that the AA-BUD algorithm is superior to two benchmark algorithms.  more » « less
Award ID(s):
1814748
PAR ID:
10185647
Author(s) / Creator(s):
;
Date Published:
Journal Name:
2019 IEEE Global Communications Conference (GLOBECOM)
Page Range / eLocation ID:
1 to 6
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Multiple drone-mounted base stations (DBSs) are used to be deployed over a disaster struck area to help mobile users (MUs) communicate with working BSs, which are located beyond the disaster-struck area. DBSs are considered as relay nodes between MUs and working BSs. In order to relax the bottleneck in wireless backhaul links, we propose a cooperative drone assisted mobile access network architecture by enabling DBSs (whose backhaul links are congested) to offload their traffic to other DBSs (whose backhaul links are not congested) via DBS-to-DBS communications. We formulate the DBS placement and channel allocation problem in the context of the cooperative drone assisted mobile access network architecture, and design a COoperative DBS plAcement and CHannel allocation (COACH) algorithm to solve the problem. The performance of COACH is demonstrated via extensive simulations. 
    more » « less
  2. We propose capacity-achieving schemes for private information retrieval (PIR) from uncoded databases (DBs) with both homogeneous and heterogeneous storage constraints. In the PIR setting, a user queries a set of DBs to privately download a message, where privacy implies that no one DB can infer which message the user desires. In general, a PIR scheme is comprised of storage placement and delivery designs. Previous works have derived the capacity, or infimum download cost, of PIR with uncoded storage placement and sufficient conditions of storage placement to meet capacity. However, the currently proposed storage placement designs require splitting each message into an exponential number of sub-messages with respect to the number of DBs. In this work, when DBs have the same storage constraint, we propose two simple storage placement designs that satisfy the capacity conditions. Then, for more general heterogeneous storage constraints, we translate the storage placement design process into a “filling problem”. We design an iterative algorithm to solve the filling problem where, in each iteration, messages are partitioned into sub-messages and stored at subsets of DBs. All of our proposed storage placement designs require a number of sub-messages per message at most equal to the number of DBs. 
    more » « less
  3. In this paper, we investigate the integration of integrated sensing and communication (ISAC) and reconfigurable intelligent surfaces (RIS) for providing wide-coverage and ultrareliable communication and high-accuracy sensing functions. In particular, we consider an RIS-assisted ISAC system in which a multi-antenna base station (BS) simultaneously performs multiuser multi-input single-output (MU-MISO) communications and radar sensing with the assistance of an RIS. We focus on both target detection and parameter estimation performance in terms of the signal-to-noise ratio (SNR) and Cramér-Rao bound (CRB), respectively. Two optimization problems are formulated for maximizing the achievable sum-rate of the multi-user communications under an SNR constraint for target detection or a CRB constraint for parameter estimation, the transmit power budget, and the unit-modulus constraint of the RIS reflection coefficients. Efficient algorithms are developed to solve these two complicated non-convex problems. We then extend the proposed joint design algorithms to the scenario with imperfect self-interference cancellation. Extensive simulation results demonstrate the advantages of the proposed joint beamforming and reflection designs compared with other schemes. In addition, it is shown that more RIS reflection elements bring larger performance gains for directof- arrival (DoA) estimation than for target detection. 
    more » « less
  4. null (Ed.)
    In this paper we consider the problem of minimizing composite objective functions consisting of a convex differentiable loss function plus a non-smooth regularization term, such as $$L_1$$ norm or nuclear norm, under Rényi differential privacy (RDP). To solve the problem, we propose two stochastic alternating direction method of multipliers (ADMM) algorithms: ssADMM based on gradient perturbation and mpADMM based on output perturbation. Both algorithms decompose the original problem into sub-problems that have closed-form solutions. The first algorithm, ssADMM, applies the recent privacy amplification result for RDP to reduce the amount of noise to add. The second algorithm, mpADMM, numerically computes the sensitivity of ADMM variable updates and releases the updated parameter vector at the end of each epoch. We compare the performance of our algorithms with several baseline algorithms on both real and simulated datasets. Experimental results show that, in high privacy regimes (small ε), ssADMM and mpADMM outperform baseline algorithms in terms of classification and feature selection performance, respectively. 
    more » « less
  5. Algorithms to solve hard combinatorial problems often exhibit complementary performance, i.e. where one algorithm fails, another shines. Algorithm portfolios and algorithm selection take advantage of this by running all algorithms in parallel or choosing the best one to run on a problem instance. In this paper, we show that neither of these approaches gives the best possible performance and propose the happy medium of running a subset of all algorithms in parallel. We propose a method to choose this subset automatically for each problem instance, and demonstrate empirical improvements of up to 19% in terms of runtime, 81% in terms of misclassification penalty, and 26% in terms of penalized averaged runtime on scenarios from the ASlib benchmark library. Unlike all other algorithm selection and scheduling approaches in the literature, our performance measures are based on the actual performance for algorithms running in parallel rather than assuming overhead-free parallelization based on sequential performance. Our approach is easy to apply in practice and does not require to solve hard problems to obtain a schedule, unlike other techniques in the literature, while still delivering superior performance. 
    more » « less