國立臺灣大學電機資訊學院電信工程學研究所 碩士論文
Graduate Institute of Communication Engineering College of Electrical Engineering and Computer Science
National Taiwan University Master Thesis
周全系統參數下最大化廣義分頻多工系統之頻譜效率 Maximization of Spectral Efficiency of Generalized
Frequency Division Multiplexing Systems Under Performance Constraints That Considers Comprehensive
System Parameters
羅政捷 Cheng-Chieh Lo
指導教授:蘇柏青 博士 Advisor: Borching Su, Ph.D.
中華民國 111 年 11 月 November, 2022
摘要
近年來,由於廣義分頻多工(generalized frequency division multi- plexing, GFDM)系統具有低頻帶外輻射(out-of-band emission, OOBE)、 低延遲、高頻譜效率(spectral efficiency)的特性,因此被推出來做為 取代正交分頻多工(orthogonal frequency division multiplexing, OFDM)
系統的候選人之一。然而,廣義分頻多工系統會因為具有非么正的傳 輸矩陣(transmitter matrix)而造成雜訊放大(noise enhancement)和 接收端在均方誤差(mean square error, MSE)以及符元錯誤率(symbol error rate, SER)上有性能下降的情形。因此,過去多項研究探討了廣 義分頻多工系統在最小化頻帶外輻射並維持良好頻帶內性能的原型濾 波器(prototype filter)設計最佳化演算法。不過,這些最佳化方法沒 有把副載波(subcarrier)大小、副符碼(subsymbol)大小、頻譜資源 分配方法、循環前綴(cyclic prefix, CP)長度納為設計參數,而這些 參數會影響到廣義分頻多工系統的頻譜效率。此外,一個有彈性的取 樣頻率(sample rate)也會影響系統的頻譜效率,但前人並未對此做過 研究。
在本研究中,我們設計了一道綜合參數的最佳化問題,在符合性 能限制的條件下最大化廣義分頻多工系統的頻譜效率。我們提出了 多項演算法來解決這道混合整數規劃問題(mixed integer programming problem)。另外,我們還應用了一些方法使提出的演算法更有效率。
模擬結果顯示,我們提出的設計方法能夠比前人的方法達到更高的頻 譜效率。
關鍵詞:廣義分頻多工,頻譜效率,混合整數規劃問題
Abstract
In recent years, generalized frequency division multiplexing (GFDM) sys- tems have been promoted as an alternative to orthogonal frequency divi- sion multiplexing (OFDM) systems due to their low out-of-band emission (OOBE), low latency, and high spectral efficiency. However, GFDM systems can suffer from noise enhancement and in-band performance degradation in receiver mean square error (MSE) and symbol error rate (SER) from having non-unitary transmitter matrices. Therefore, filter optimization algorithms for GFDM to minimize OOBE while maintaining good in-band performance had been studied in the past. Nevertheless, these optimization methods didn’t take subcarrier and subsymbol sizes, spectral resource allocation method, and CP length as optimization variables, and these factors have impacts on GFDM systems’ spectral efficiency. Furthermore, the effect of flexible sample rates has not yet been studied, which can also sway the systems’ spectral efficiency.
In this research, a joint optimization problem to maximize spectral effi- ciency for GFDM systems under performance constraints is introduced. The proposed method is presented to solve this mixed integer programming prob- lem by dissecting it into simpler problems, and heuristics specific to the prob- lems were incorporated to make the proposed method more time-efficient.
Simulation results show that the proposed method is able to achieve higher spectral efficiency for GFDM systems compared to existing GFDM optimiza- tion methods.
Keywords: generalized frequency division multiplexing (GFDM), spec- tral efficiency, mixed integer programming problem
Contents
口試委員會審定書 iii
摘要 v
Abstract vi
Contents vii
List of Figures ix
List of Tables xi
1 Introduction 1
1.1 Introduction . . . 2
1.2 Notation . . . 3
2 System Model 4 2.1 GFDM System Model . . . 5
2.2 Power Spectral Density (PSD) of Analog GFDM Signals . . . 7
2.3 Spectrum Emission Mask (SEM) . . . 8
2.4 Noise Enhancement Factor (NEF) . . . 8
3 Problem Formulation 9 3.1 Problem Statement . . . 10
3.2 Proposed Method . . . 11
3.2.1 Solve Problem 1 . . . 11
3.2.2 Solve Problem 2 . . . 12
3.2.3 Solve Problem 3 . . . 15
3.2.4 Solve Problem 4 . . . 17
3.3 Speed Up the Proposed Method . . . 18
3.3.1 Speed Up Algorithm 2 . . . 19
3.3.2 Speed Up Algorithm 3 . . . 19
4 Simulation Results 22 4.1 Proposed Method vs. Existing Methods . . . 23
4.1.1 Parameter Settings . . . 23
4.1.2 Simulation Results . . . 24
4.2 Additional Simulations . . . 25
4.2.1 Parameter Settings . . . 25
4.2.2 Simulation Results . . . 26
4.2.3 Lower Sample Rate Beyond The Channel Bandwidth . . . 28
5 Conclusion and Future Work 33 5.1 Conclusion . . . 34
5.2 Future Work . . . 34
Appendix A Lemma 1 Proof 35
Appendix B Definition of Function update_f_s_LB(·) 36
Appendix C Equivalency of Problem 4 (3.6) and Problem 4.1 (3.8) 37
Appendix D Obtain g from S = ggH 38
Bibliography 39
List of Figures
2.1 Block diagram of GFDM transceivers. . . 5
2.2 Resource allocation for K = 5, M = 7, Kon = 3, Mon = 5,K = {0, 2, 4}, and M = {0, 2, 3, 5, 6}, where reshape(v, K, M) is a K × M matrix whose (k, m)-th element is [v]k+mK,∀ 0 ≤ k < K, 0 ≤ m < M. . 5
3.1 Contiguous subcarrier resources are used to fill in the SEM passband region. 13 3.2 PSD of used resources, PSDs of unused subsymbols, and the prototype filter for using contiguous subsymbols. Unspecified parameter settings follow that of case 3 in section 4.2. . . 13
3.3 PSD of used resources, PSDs of unused subsymbols, and the prototype fil- ter for using non-contiguous subsymbols. Unspecified parameter settings follow that of case 3 in section 4.2. . . 13
3.4 Overview of the proposed algorithms to solve problem 1 (3.2). . . 19
4.1 PSDs of case 1 and the first simulation of Chen et al. [6]. . . 25
4.2 PSDs of case 2 and the first simulation of Lin et al. [7]. . . 25
4.3 Adding CP to the top solution of simulation case 3 resulting a PSD with larger sidelobes. . . 27
4.4 R (106 symbol/s/Hz) of different K and M for case 3. Infeasible results are labeled ”n/a”. . . 29
4.5 PSD and g for the top three solutions of case 3. . . . 29
4.6 R (106 symbol/s/Hz) of different K and M for case 4. Infeasible results are labeled ”n/a”. . . 30
4.7 PSD and g for the top 3 solutions of case 4. . . . 30
4.8 R (106 symbol/s/Hz) of different K and M for case 5. Infeasible results are labeled ”n/a”. . . 31 4.9 PSD and g for the top three solutions of case 5. . . . 31 4.10 R (106 symbol/s/Hz) of different K and M for case 6. Infeasible results
are labeled ”n/a”. . . 32 4.11 PSD and g for the top three solutions of case 6. . . . 32
List of Tables
4.1 Parameter settings for cases 1-2. . . 24
4.2 Optimal values for cases 1-2 and the cases from existing methods. . . 25
4.3 Parameter settings for cases 3-6. . . 26
4.4 Optimal values for the top 3 solutions of case 3. . . 29
4.5 Optimal values for the top 3 solutions of case 4. . . 30
4.6 Optimal values for the top 3 solutions of case 5. . . 31
4.7 Optimal values for the top 3 solutions of case 6. . . 32
Chapter 1
Introduction
1.1 Introduction
Only a finite portion of the total electromagnetic spectrum supports radio communication, so it is crucial to use this precious resource as efficiently as possible [1]. One impor- tant measure is spectral efficiency, which is the amount of data bandwidth that a specific technology can extract from a certain amount of radio spectrum [1].
Orthogonal frequency division multiplexing (OFDM) has been the dominant technol- ogy for broadband multicarrier communications mainly because of its robustness against multipath channels and easy implementation based on Fast Fourier Transform (FFT) al- gorithms [2]. However, OFDM signals with one cyclic prefix (CP) per symbol would present a prohibitively low spectral efficiency [2]. The low spectrum efficiency due to CP insertion is also a problem for its applications [2]. Additionally, the high out-of-band emission (OOBE) of OFDM poses a challenge to avoid harmful interference [2]. There- fore, generalized frequency division multiplexing (GFDM) [3] has been promoted as an alternative to OFDM. It has been extensively studied to address the requirements of low latency and low OOBE [2]. Also, GFDM has flexible time-frequency structures to adapt to various application scenarios, such as multiple access and cognitive radios [2]. With low OOBE, GFDM does not require wide guard bands between adjacent bands as OFDM does, so it may achieve a higher spectral efficiency [4].
Since the GFDM transmitter matrix is in general non-unitary, GFDM can suffer from noise enhancement and in-band performance degradation in receiver mean square error (MSE) and symbol error rate (SER) compared to that achieved through OFDM [5][6].
In the research from Chen et al. (2017) [6], a filter optimization algorithm that mini- mizes OOBE while maintaining good in-band performance is proposed for GFDM. Under the same spectral efficiency, optimized filters perform the best in terms of both OOBE and SER compared to OFDM and prototype filters existing in the literature [6]. In the research from Lin et al. (2018) [7], a prototype transmit filter design method along with an idea of spectral regrowth prediction (SRP) is proposed for GFDM. The resulting OOBE can meet any given spectrum emission mask (SEM) with maximal spectral resource utilization in the GFDM system [7].
The aforementioned GFDM optimization methods [6][7] have predetermined subcar- rier and subsymbol sizes, spectral resource allocation methods, and CP lengths. These factors have impacts on GFDM signals’ power spectral density (PSD) and the optimiza- tion algorithms, influencing the system’s spectral efficiency. Moreover, a flexible sample rate can also affect the system’s spectral efficiency, so we took it into account in designing our optimization problem to maximize spectral efficiency.
In this paper, we formulate a joint optimization problem to maximize the spectral effi- ciency of GFDM systems under performance constraints, which considers subcarrier and subsymbol sizes, spectral resource allocation, prototype filter coefficient, CP length, and sample rate as optimization variables. Also, we propose several algorithms to solve this mixed integer joint optimization problem.
1.2 Notation
Matrices, column vectors, and scalars are denoted by boldfaced upper case letters, bold- faced lower case letters, and italic letters, respectively, e.g., X, x, and x. [X]i,j for any matrix X denotes the entry of the i-th row and the j-th column of X, and [x]n denotes the n-th element of the vector x. Superscripts (·)∗, (·)−1, (·)T, (·)H, and (·)◦−1 denote conjugate, inverse, transpose, transpose-conjugate, and Hadamard inverse (defined by [X◦−1]m,n = [X−1]m,n,∀ m, n), respectively. A set is denoted by calligraphic font, e.g., A. For any set A, we denote its cardinality by |A|. Given a matrix X, ∥X∥2, tr(X), and rank(X) denotes its Frobenius norm, trace, and rank. ⟨·⟩D denotes modulo D, and E[·]
denotes the expectation operator.Z, Z>0,Z≥0andR>0 denote the set of integers, positive integers, non-negative integers, and positive real numbers. CD andHD+ denote the set of D×1 complex vectors and D×D Hermitian positive semidefinite matrices. A⊗B denotes the Kronecker product of matrices A and B. Throughout the paper, we adopt zero-based indexing.
Chapter 2
System Model
Figure 2.1: Block diagram of GFDM transceivers.
Figure 2.2: Resource allocation for K = 5, M = 7, Kon = 3, Mon = 5,K = {0, 2, 4}, andM = {0, 2, 3, 5, 6}, where reshape(v, K, M) is a K × M matrix whose (k, m)-th element is [v]k+mK,∀ 0 ≤ k < K, 0 ≤ m < M.
2.1 GFDM System Model
GFDM is a block-based modulation scheme as shown in Figure 2.1 [2]. Each GFDM block has D = KM spectral resources, which can be decomposed into K subcarriers and M subsymbols. To meet performance constraints, not all spectral resources are used to transmit data. We perform resource allocation to map data symbols to specific resource indicesK and M, as shown in Figure 2.2, where K ⊆ {0, 1, . . . , K − 1} is the set of used subcarrier indices, M ⊆ {0, 1, . . . , M − 1} is the set of used subsymbol indices, and unused resources are filled with 0. Kon = |K| is the number of used subcarriers, Mon = |M| is the number of used subsymbols, N = KonMon is the number of used resources, and KonKMMon = ND is the utility rate. The N × 1 complex data symbol vector in the l-th block transmission s[l] can be expressed as
s[l] = [s0,0[l], . . . , sKon−1,0[l], s0,1[l], . . . , sKon−1,1[l], . . . , sKon−1,Mon−1[l]]T. (2.1)
Let sk,m[l] be zero-mean, independent, and identically distributed with symbol energy Es, we obtain the D× 1 resource allocated data symbol vector in the l-th block transmission
d[l] by mapping s[l] to the used resources. It can be expressed as
d[l] = [d0,0[l], . . . , dK−1,0[l], d0,1[l], . . . , dK−1,1[l], . . . , dK−1,M−1[l]]T, (2.2)
where dk,m[l] is the resource allocated data symbol on the k-th subcarrier and m-th sub- symbol in the l-th block. Each resource allocated data symbol dk,m[l] is transmitted with its corresponding pulse shape gk,m, whose n-th entry is
[gk,m]n= [g]⟨n−mK⟩D · ej2πKkn, n = 0, 1, . . . , D− 1, (2.3)
where the D× 1 complex vector g is the prototype filter [2]. The D × D complex GFDM transmitter matrix can be modeled as [2]
A = [g0,0, . . . , gK−1,0, g0,1, . . . , gK−1,1, . . . , gK−1,M−1]. (2.4)
The transmit signal x[l] can then be obtained by x[l] = Ad[l]. Due to channel delay spread, a CP of sample length NCP is added to prevent intersymbol interference (ISI).
After parallel-to-serial conversion (P/S), the digital baseband transmit signal x[n] is then passes through a digital-to-analog converter (D/C) with sampling rate Tsand a pulse shap- ing filter p1(t) to produce the continuous-time baseband signal
x(t) =
∑∞ n=−∞
∑∞ l=−∞
∑
k∈K
∑
m∈M
dk,m[l]gm[n− lD′]ej2πk(nK−lD′) · p1(t− nTs), (2.5)
where D′ = D + NCP is the number of time-domain samples in each block transmission, and
gm[n] =
[g]⟨n−mK−NCP⟩D , n = 0, 1, . . . , D′− 1
0 , otherwise
. (2.6)
After passing the baseband signal through a wireless channel, the received signal can be modeled as y(t) = c(t)∗x(t)+w(t), where c(t) is the channel impulse response and w(t) is a zero-mean complex additive white Gaussian noise (AWGN) with variance N0. By
processing y(t) with a receive filter p2(t) and an analog-to-digital converter (C/D) with sampling rate Ts, we get the discrete-time received signal, y[n]. After serial-to-parallel (S/P) conversion and CP removal, we get the received sample vector y[l]. It can be shown [2] that y[l] = Cx[l] + w[l], where C is a D× D circulant matrix with its first column be [c(0), c(1), . . . , c(Nc), 0, . . . , 0]T, Nc ≤ NCP, and w[l] is the noise vector. The D× 1 received resource allocated data symbol vector ˆd[l] is obtained by applying a zero-forcing (ZF) equalizer so that ˆd[l] = BZFy[l], where BZF = A−1C−1[2]. Finally, we obtained the N× 1 received data symbol vector ˆs[l] by unmapping ˆd[l] from the used resource indices.
2.2 Power Spectral Density (PSD) of Analog GFDM Sig- nals
The PSD of analog GFDM signals (2.5) can be derived as [8]
Sa(f, fs, g, NCP,K, M) = Esfs|P1(f )|2 D′
∑
k∈K
∑
m∈M
|Gm
(f fs − k
K )
|2, (2.7)
where fs = T1
s is the sample rate, P1(f ) is the frequency response of the pulse shaping filter p1(t), and
Gm(ejw) =
∑∞ n=−∞
gm[n]e−jwn (2.8)
is the discrete-time Fourier transform (DTFT) of gm[n]. Gm(ejw) can also be expressed as Gm(ejw) = bHgm, where b = [1, ejw, ej2w, . . . , ej(D′−1)w]T and gm = [gm[0], gm[1], . . . , gm[D′− 1]]T. b performs frequency modulation, and gm = Pmg, where
Pm =
0NCP×(D−NCP) INCP ID
01×(D−1) 1 ID−1 0(D−1)×1
−mK
(2.9)
is a D′× D matrix that performs circular shift and CP insertion.
With some derivations, we can further obtain that
|Gm
(f fs − k
K )
|2 = tr(ffHggH) = tr(FS), (2.10)
where f = PHmbk, bk = [1, ej2π (f
fs−Kk
) , ej4π
(f fs−Kk
)
, . . . , ej2(D′−1)π (f
fs−Kk
)
]T, F = ffH, and S = ggH.
The PSD of analog GFDM signals can then be expressed as a function of S
Sa(f, fs, S, NCP,K, M) = Esfs|P1(f )|2 D′
∑
k∈K
∑
m∈M
tr(FS). (2.11)
2.3 Spectrum Emission Mask (SEM)
SEM is a relative measurement of the out-of-channel emissions to the in-channel power.
The SEM measurement is used to measure the excess emissions that would interfere with other channels or with other systems. SEM(f ) denotes the SEM, and its channel band- width C is provided alongside the SEM in networking specifications.
2.4 Noise Enhancement Factor (NEF)
The NEF of the GFDM ZF receiver can be derived as [8]
ξ(g) = 1 D2tr([
(WM ⊗ IK)ggH(WM ⊗ IK)H]◦−1)
. (2.12)
It is proven in [8] that ξ(g) ≥ 1, and when ξ(g) = 1, the GFDM transmitter matrix (2.4) is known to be unitary [8]. A unitary transmitter matrix (2.4) implies equal noise enhancement for each subcarrier and subsymbol [8].
Chapter 3
Problem Formulation
3.1 Problem Statement
The goal of this research is to design a method to solve a joint optimization problem to maximize the spectral efficiency of GFDM systems under performance constraints, in- cluding noise enhancement penalty prevention, SEM requirement, ISI prevention, radio subframe duration limit, and sample rate range limit. Optimization variables include sub- carrier size K, subsymbol size M , resource allocation methodK and M, prototype filter g, CP length NCP, and sample rate fs. The spectral efficiency R is defined as
R(symbol/s/Hz) =
( KonMon KM + NCP · fs
)÷ C. (3.1)
Let K, M, Es, P1(f ), SEM(f ), C, root mean square (RMS) delay spread τRMS, sample rate upper bound fsUB, and radio subframe duration τsubframebe given. The problem can be formulated as problem 1
K,M,K,M,NmaxCP,fs,g
( KonMon
KM + NCP · fs
)÷ C (3.2a)
subject to ∥g∥22= 1 (3.2b)
ξ(g)≤ 1 (3.2c)
Sa(f, fs, g, NCP, K, M,K, M) ≤ SEM(f) ∀f (3.2d)
NCP > τRMS· fs (3.2e)
KM + NCP ≤ τsubframe· fs (3.2f)
fs≤ fsUB (3.2g)
Optimization variables K and M are in the setZ>0,K and M are themselves sets that are subsets ofZ≥0. NCP is in the setZ≥0, fsis in the setR>0, and g is in the setCD. The objective function (3.2a) is to maximize the GFDM system’s spectral efficiency R (3.1).
The constraint (3.2b) is to normalize the prototype filter energy. The constraint (3.2c) guarantees that the GFDM modulation matrix (2.4) is unitary so that there is no additional noise enhancement at the ZF receiver [8]. The constraint (3.2d) warrants the PSD (2.7) meets the given SEM requirement. The constraint (3.2e) prevents ISI by making sure that the CP duration is longer than the RMS delay spread [9]. Constraint (3.2f) puts a limit on GFDM frame size to guarantee the frame duration doesn’t exceed the radio subframe duration set by telecommunication standards. Lastly, using high sample rates can result in high power consumption and performance degradation in analog-to-digital converters
[10][11], so we introduce constraint (3.2f) to set a sample rate upper bound.
3.2 Proposed Method
Problem 1 (3.2) is a mixed integer programming problem that is difficult to analyze. Our approach to solving problem 1 (3.2) is to recursively dissect it into smaller problems. If the smaller problem can be turned into a convex problem, we can solve it using convex optimization methods [12]. If the smaller problem is still a mixed integer programming problem, we can make it more accessible by solving some of its non-convex variables and constraints. We repeat this procedure until it produces a convex problem.
3.2.1 Solve Problem 1
To simplify problem 1 (3.2), first, we want to tackle integer variables K and M because K, M, and g are dependent on them. The upper bound of the product KM is the largest integer that is smaller than the product τsubframe· fsUB to satisfy constraint (3.2f)
KM ≤ τsubframe· fsUB,∀ K, M. (3.3)
Those cases with K = 1 or M = 1 are excluded to preserve the time-frequency structure of GFDM. We can then get all candidate solutions of problem 1 (3.2) by brute-force searching all valid K and M combinations. The candidate with the highest spectral efficiency R (3.1) is the solution. This algorithm is called algorithm 1, and problem 1 (3.2) can be broken down into algorithm 1 and problem 2, where problem 2 can be expressed as
K,M,NmaxCP,fs,g
( KonMon KM + NCP · fs
)÷ C (3.4a)
subject to ∥g∥22= 1 (3.4b)
ξ(g)≤ 1 (3.4c)
Sa(f, fs, g, NCP,K, M) ≤ SEM(f) ∀f (3.4d)
NCP > τRMS· fs (3.4e)
KM + NCP ≤ τsubframe· fs (3.4f)
fs≤ fsUB (3.4g)
Algorithm 1: Solveproblem 1 by solving problem 2
Input : Es, P1(f ), C, SEM(f ), τRMS, τsubframe, fsUB. Output : R, K, M,K, M, NCP, fs, g.
1 Rmax← 0
2 for K ∈ {n ∈ Z|n ≥ 2}, M ∈ {n ∈ Z|n ≥ 2} that KM ≤ τsubframe· fsUB do
3 [R(K,M ),K(K,M ),M(K,M ), NCP(K,M ), fs(K,M ), g(K,M )]← solve problem 2
4 if R(K,M ) > Rmaxthen
5 Rmax← R(K,M )
6 K′ ← K, M′ ← M
7 if Rmax> 0 then
8 return Rmax, K′, M′,K(K′,M′),M(K′,M′), NCP(K′,M′), fs(K′,M′), g(K′,M′)
9 else
10 return infeasible
3.2.2 Solve Problem 2
Problem 2 (3.4) is a mixed integer programming problem. We want to simplify it by deal- ing with integer set variables K and M. To tackle variables K and M, we can again apply brute-force search to find the optimal values. However, brute-force searching allK andM combinations can be a time-intensive process. The following lemma and conjec- ture enable us to reduce the search space of problem 2 (3.4), that is, the set ofK and M candidate solutions.
Lemma 1: For a GFDM system with K subcarriers, M subsymbols, sample rate of fs, CP length of NCP, symbol energy Es, and pulse shaping filter P1(f ). Its analog PSD is derived as (2.7), where D = KM . The PSD with prototype filter g, used sub- carrier indices K, and used subsymbol indices M, Sa(f, fs, g, NCP,K, M), is equal to the PSD with prototype filter g′, used subcarrier indices K′, and used subsymbol in- dicesM′, Sa(f, fs, g′, NCP,K′,M′), where [g′]n = [g]⟨n−pK⟩Dej2πrnK , n = 0, 1, . . . , D, K′ = {k′|(∃k ∈ K)[k′ = ⟨k − r⟩K]}, M′ = {m′|(∃m ∈ M)[m′ = ⟨m − p⟩M]},
∀ r ∈ 0, . . . , K − 1, p ∈ 0, . . . , M − 1.
The proof of lemma 1 is shown in Appendix A. From lemma 1, we can derive that circular shifted versions of a{K, M} pair are considered redundant in the search space of problem 2 (3.4), because they can produce the same PSD.
Conjecture 1: Assume the SEM being used has a continuous passband region, we
-0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 -70
-60 -50 -40 -30 -20 -10 0 10
Figure 3.1: Contiguous subcarrier resources are used to fill in the SEM passband region.
-0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5
-70 -60 -50 -40 -30 -20 -10 0 10
-0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5
-70 -60 -50 -40 -30 -20 -10 0 10
0 10 20 30 40 50
real imaginary absolute
Figure 3.2: PSD of used resources, PSDs of unused subsymbols, and the prototype filter for using contiguous subsymbols. Unspecified parameter settings follow that of case 3 in section 4.2.
-0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5
-70 -60 -50 -40 -30 -20 -10 0 10
-0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5
-70 -60 -50 -40 -30 -20 -10 0 10
0 10 20 30 40 50
real imaginary absolute
Figure 3.3: PSD of used resources, PSDs of unused subsymbols, and the prototype filter for using non-contiguous subsymbols. Unspecified parameter settings follow that of case 3 in section 4.2.
conjecture that the used subcarrier indicesK and the used subsymbol indices M should be set to be contiguous to achieve the highest spectral efficiency R (3.1).
In conjecture 1, if the SEM has a continuous passband region, it is intuitive to occupy contiguous subcarrier resourcesK to fill in said regions, as shown in Figure 3.1. In Figure 3.2 and Figure 3.3, we compare using contiguous subsymbols and non-contiguous sub- symbols on the proposed method. For the SEM being a low-pass mask, we can see that by using contiguous subsymbols, the PSD has smaller sidelobes because the prototype filter g has fewer high-frequency components. Furthermore, by using contiguous subsymbols, even the PSDs of unused subsymbols have fewer high-frequency components. This can
result in a higher utility rate for using contiguous subsymbols.
For simplicity, we can fix the starting indices ofK and M to 0. Since used subcarriers are contiguous and the starting index is fixed, K and Kon contain the same amount of information, the number of subcarriers being used, so we can representK using Kon, their relation can be written as K = {0, . . . , Kon − 1}. With the same logic, we can also representM using Mon, and their relation can be written as M = {0, . . . , Mon − 1}.
Instead of brute-force searching allK and M combinations, the remaining candidate K andM solutions can be represented by all valid Konand Moncombinations. The search space of problem 2 (3.4) is thus reduced to 1
(KonK )(MonM ) of its original size.
We can then solve problem 2 (3.4) by brute-force searching all valid Kon and Mon combinations, and this algorithm is called algorithm 2. Problem 2 (3.4) can be broken down into algorithm 2 and problem 3, where problem 3 can be expressed as
NCPmax,fs,g
( KonMon
KM + NCP · fs
)÷ C (3.5a)
subject to ∥g∥22= 1 (3.5b)
ξ(g)≤ 1 (3.5c)
Sa(f, fs, g, NCP,K, M) ≤ SEM(f) ∀f (3.5d)
NCP > τRMS· fs (3.5e)
KM + NCP ≤ τsubframe· fs (3.5f)
fs≤ fsUB (3.5g)
Algorithm 2: Solve problem 2 by solving problem 3
Input : K, M, Es, P1(f ), C, SEM(f ), τRMS, τsubframe, fsUB. Output : R,K, M, NCP, fs, g.
1 R′max← 0
2 for Kon∈ {n ∈ Z|1 ≤ n ≤ K}, Mon∈ {n ∈ Z|1 ≤ n ≤ M} do
3 K ← {0, . . . , Kon− 1}, M ← {0, . . . , Mon− 1}
4 [R, NCP, fs, g]← solve problem 3
5 if problem 3 is feasible then
6 if R > R′maxthen
7 R′max ← R
8 Ksol← K, Msol← M, NCPsol ← NCP, fssol ← fs, gsol ← g
9 if R′max> 0 then
10 return R′max,Ksol,Msol, NCPsol, fssol, gsol 11 else
12 return infeasible
3.2.3 Solve Problem 3
Problem 3 (3.5) is a mixed integer programming problem. We can simplify it by tackling the integer variable NCP and the positive real variable fs.
An optimization problem, problem 4, is introduced to find the prototype filter g that satisfies constraints (3.5b)-(3.5d)
find g (3.6a)
subject to ∥g∥22= 1 (3.6b)
ξ(g)≤ 1 (3.6c)
Sa(f, fs, g, NCP,K, M) ≤ SEM(f), ∀f (3.6d)
Even though fsis a continuous variable, it is not convex in (3.5d), so we can’t solve it using convex optimization methods. Instead, by treating the feasibility of problem 4 (3.6) as a monotonic function of fs, that the problem is infeasible when fsis larger than a certain value, we can solve fs of problem 3 (3.5) by utilizing the bisection method under the radio subframe constraint (3.5f) and the sample rate upper bound constraint (3.5g).
Given fs, the minimal CP length that meets the ISI prevention constraint (3.5e) can be derived by applying the ceiling function to the right side of (3.5e)
NCP =⌈τRMS· fs⌉. (3.7)
Problem 3 (3.5) can thus be broken down into algorithm 3 and problem 4 (3.6).
At the beginning of algorithm 3, we first update the sample rate lower bound fsLB so it meets the subframe duration constraint (3.5f) and the sample rate upper bound constraint (3.5g) by calling the function update_f_s_LB(·), which is defined in Appendix B. Then, let [fsa, fsb] be the starting range of the bisection method, and R′′maxbe the highest spectral efficiency R (3.1) reached in an arbitrary point of the algorithm. Each iteration of the bisection method performs these steps:
1. Calculate fs = fsa+f2 sb, the midpoint of the interval.
2. Calculate the minimum CP length NCP using equation (3.7) so (3.5e) is satisfied.
3. Check if fsfits the radio subframe constraint (3.5f). If it fits, then proceed to solve
problem 4. Otherwise, update fsa.
(a) Solve problem 4.
(b) If problem 4 is feasible and it reaches a higher spectral efficiency R (3.1) than R′′max, then updates fsa, R′′max and other output variables. Otherwise, update fsb.
4. Stop when fsb−f2 sa < ϵ, where ϵ > 0 is the bisection tolerance.
Algorithm 3: Solveproblem 3 by solving problem 4
Input : K, M,K, M, Es, P1(f ), C, SEM(f ), τRMS, τsubframe, fsUB, ϵ.
Output : R, fs, NCP, g.
1 fsLB ← update_f_s_LB(KM, C, τRMS, τsubframe, fsUB)
2 if fsLB is not valid then
3 return infeasible
4 fsa ← fsLB
5 fsb ← fsUB
6 R′′max← 0
7 repeat
8 fs← fsa+f2 sb
9 NCP ← ⌈τRMS· fs⌉
10 if fs ≥ KM +NτsubframeCP then
11 [R, g] ← solve problem 4
12 if problem 4 is feasible then
13 if R > R′′maxthen
14 R′′max← R
15 fsa ← fs
16 NCPsol ← NCP, fssol ← fs, gsol ← g
17 else
18 fsb ← fs
19 else
20 fsb ← fs
21 else
22 fsa ← fs
23 until fsb−f2 sa < ϵ;
24 if R′′max> 0 then
25 return R′′max, NCPsol, fssol, gsol
26 else
27 return infeasible
3.2.4 Solve Problem 4
Problem 4 (3.6) is not convex. To turn it into a convex problem, we implement the method of semidefinite relaxation (SDR) [13] with a rank 1 constraint, which is used by Chen et al. [6].
A positive semidefinite matrix S = ggH is introduced. Constraint (3.6b) can be rewrit- ten as tr(S) = 1. The NEF (2.12) constraint (3.6c) can be rewritten as a function of S as ξ(S) = D12tr([
(WM ⊗ IK)S(WM ⊗ IK)H]◦−1)
. The PSD constraint (3.6d) can be ex- pressed as a function of S as (2.11). Problem 4 (3.6) can thus be turned into an equivalent problem, problem 4.1, with the addition of a rank 1 constraint
find S∈ HD+ (3.8a)
subject to tr(S) = 1 (3.8b)
ξ(S)≤ 1 (3.8c)
Sa(f, fs, NCP, S,K, M) ≤ SEM(f), ∀f (3.8d)
rank(S) = 1 (3.8e)
Problem 4 (3.6) and problem 4.1 (3.8) are equivalent problems, and the details are explicated in Appendix C. The constraint (3.8b) is affine, the constraint (3.8c) and con- straint (3.8d) are convex. However, the rank 1 constraint (3.8e) is not convex. Like Chen et al. [6], we tackle the non-convex rank 1 constraint (3.8e) by using the Dattorro iterative algorithm [14].
S(ψ) = Q(ψ)Λ(ψ)[Q(ψ)]H is the eigendecomposition of S with ordered (non-increasing) eigenvalues in the ψ-th iteration, where enis the eigenvector corresponds to the n-th eigen- value σn, n = 0, 1, . . . , D − 1. V(ψ+1) = U(ψ)[U(ψ)]H, where U(ψ) is Λ(ψ) with its first column removed, and V(0) = 0. V(ψ+1) represents the (D − 1)-dimensional space or- thogonal to the principal eigenvector of S(ψ). The non-convex rank 1 constraint (3.8e) is replaced by tr(SV(ψ)) in the objective function. If the column space of V(ψ) is the or- thogonal complement of span(e0), then minimizing tr(SV(ψ)) suppresses the eigenvalues of S that is not σ0. When the second largest eigenvalue σ1 of S is smaller than a certain threshold µ > 0, S can be seen as a rank 1 matrix. We can thus tackle problem 4.1 (3.8) by iteratively solving problem 4.2, where problem 4.2 can be expressed as
min
S∈HD+
tr(SV(ψ)) (3.9a)
subject to tr(S) = 1 (3.9b)
ξ(S)≤ 1 (3.9c)
Sa(f, fs, NCP, S,K, M) ≤ SEM(f), ∀f (3.9d)
Problem 4.2 (3.9) is a convex problem, and CVX [15] was used to construct and solve
the convex program. A rank 1 S can be obtained by iteratively solving (3.9), and the pro- totype filter g can be derived by g =√
σ0e0, where the derivation is detailed in Appendix D. The algorithm is called algorithm 4.
Algorithm 4: Dattorro iterative algorithm to solve problem 4.2 Input : K, M,K, M, NCP, Es, P1(f ), SEM(f ), C, fs, µ.
Output : g.
1 V(0) ← 0
2 ψ ← 0
3 repeat
4 cvx
5 variable S(D, D) hermitian nonnegative semidefinite
6 minimize tr(SV(ψ))
7 subject to
8 tr(S) == 1
9 ξ(S) ≤ 1
10 Sa(f, fs, NCP, S,K, M) ≤ SEM(f)
11 if the problem is infeasible then
12 return infeasible
13 [Q(ψ)Λ(ψ)]← eig(S)
14 U(ψ)← Λ(ψ)[:, 1 : D− 1]
15 V(ψ+1)← U(ψ)[U(ψ)]H
16 e0 ← Λ(ψ)[:, 0], σ0 ← Q(ψ)[0, 0], σ1 ← Q(ψ)[1, 1]
17 ψ ← ψ + 1
18 until σ1 < µ;
19 g← √σ0e0
20 return g
Using algorithms 1-4, we can solve problem 1 given Es, P1(f ), C, SEM(f ), τRMS, fsUB, and τsubframe, as shown in Figure (3.4).
3.3 Speed Up the Proposed Method
Brute-force search and the bisection method can be time-intensive processes. To make the proposed method more time-efficient, some heuristics specific to the problems are introduced.
Figure 3.4: Overview of the proposed algorithms to solve problem 1 (3.2).
3.3.1 Speed Up Algorithm 2
To speed up algorithm 2, let R′max be the highest spectral efficiency (3.1) reached in an arbitrary point of the algorithm, we can factor out the set of candidates with utility rate
KonMon
KM lower than Rf′maxC
sUB , because those candidates can’t reach a higher spectral efficiency R (3.1) than R′max without fs exceeding the sample rate upper bound fsUB. Moreover, we can reorder the search space in the descending order of KonMon to execute only the valid candidates. Also, we set the sample rate lower bound fsLB in this step instead of in algorithm 3, so the algorithm can be terminated here if the sample rate lower bound fsLB is invalid without going into the subsequent algorithms. This updated algorithm is called algorithm 2.1, and it can replace algorithm 2 in the proposed method without affecting the optimal values.
3.3.2 Speed Up Algorithm 3
To speed up algorithm 3, we first try to solve problem 4.2 (3.9) with fs = fsa. If it is infeasible, then we know that problem 3 (3.5) is also infeasible, eliminating doing the bisection method. If it is feasible, we will run the bisection method to see if it can reach a higher spectral efficiency R (3.1). Additionally, we only have to solve problem 4.2 (3.9) if the updated fswarrants a higher spectral efficiency R (3.1) considering its CP length. This updated algorithm is called algorithm 3.1, and it can replace algorithm 3 in the proposed method without affecting the optimal values.
Algorithm 2.1: Speed up algorithm 2
Input : K, M, Es, P1(f ), C, SEM(f ), τRMS, τsubframe, fsUB. Output : R,K, M, NCP, fs, g.
1 R′max← 0
2 γ ← 0
3 fsLB ← update_f_s_LB(KM, C, τRMS, τsubframe, fsUB)
4 if fsLB is invalid then
5 return infeasible
6 for Kon∈ {n ∈ Z|1 ≤ n ≤ K}, Mon∈ {n ∈ Z|1 ≤ n ≤ M} in the descending order of KonMondo
7 if KonKMMon > Rfmax′ C
sUB then
8 K ← {0, . . . , Kon− 1}, M ← {0, . . . , Mon− 1}
9 if γ ̸= 0 then
10 fsLB ← update_f_s_LB(KM,KonγMon, τRMS, τsubframe, fsUB)
11 if fsLB is invalid then
12 break
13 [R, NCP, fs, g]← solve problem 3
14 if problem 3 is feasible then
15 if R > R′maxthen
16 R′max← R
17 Ksol ← K, Msol ← M, NCPsol ← NCP, fssol ← fs, gsol ← g
18 γ ← KonMonfs
19 else
20 break
21 if R′max> 0 then
22 return R′max,Ksol,Msol, NCPsol, fssol, gsol
23 else
24 return infeasible