Next Article in Journal
Design and Fabrication of Interdigital Nanocapacitors Coated with HfO2
Previous Article in Journal
A Novel Vibration Mode Testing Method for Cylindrical Resonators Based on Microphones
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Joint Spatial-Code Clustered Interference Alignment Scheme for Large-Scale Wireless Sensor Networks

1
School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin 150001, China
2
School of Information and Communication Engineering, Dalian University of Technology, Dalian 116024, China
*
Author to whom correspondence should be addressed.
Sensors 2015, 15(1), 1964-1997; https://doi.org/10.3390/s150101964
Submission received: 29 September 2014 / Accepted: 12 January 2015 / Published: 16 January 2015
(This article belongs to the Section Sensor Networks)

Abstract

: Interference alignment (IA) has been put forward as a promising technique which can mitigate interference and effectively increase the throughput of wireless sensor networks (WSNs). However, the number of users is strictly restricted by the IA feasibility condition, and the interference leakage will become so strong that the quality of service will degrade significantly when there are more users than that IA can support. In this paper, a novel joint spatial-code clustered (JSCC)-IA scheme is proposed to solve this problem. In the proposed scheme, the users are clustered into several groups so that feasible IA can be achieved within each group. In addition, each group is assigned a pseudo noise (PN) code in order to suppress the inter-group interference via the code dimension. The analytical bit error rate (BER) expressions of the proposed JSCC-IA scheme are formulated for the systems with identical and different propagation delays, respectively. To further improve the performance of the JSCC-IA scheme in asymmetric networks, a random grouping selection (RGS) algorithm is developed to search for better grouping combinations. Numerical results demonstrate that the proposed JSCC-IA scheme is capable of accommodating many more users to communicate simultaneously in the same frequency band with better performance.

1. Introduction

Wireless sensor networks (WSNs) have attracted wide attention in recent years, and have been applied to the areas of environmental monitoring, remote healthcare assistance, battlefield surveillance, intelligent homes, industrial control, etc. [1]. In particular, there is an increasing demand for WSNs to be capable of producing multimedia information such as image and video. In addition, the limited battery capacity of the sensors imposes strict constraints on the energy consumption of WSNs. Therefore, high data rates and high energy efficient transmission methods are required by modern WSNs. The multiple-input multiple-output (MIMO) technique represents a promising method which can significantly increase the system throughput and energy efficiency [2], therefore, MIMO has become a prospective communication scheme for WSNs.

Although MIMO exhibits significant advantages in terms of sum rate and energy efficiency, it is still limited by the interference from the unintended users, especially when there are plenty of users. Interference alignment (IA) is a promising technique which can effectively mitigate the interference in the MIMO interference channel, where different users might transmit messages simultaneously via the same frequency band. The main idea of IA is to confine the interference to one half of the signal subspaces, and to recover the desired signal through the other half that is free from interference by designing proper precoding and decoding matrices [3]. Cadambe and Jafar have come to the astonishing conclusion that the sum rate of the MIMO interference channel can increase proportionally with the number of users by applying IA in the high signal-to-noise ratio (SNR) regime [4]. The degrees of freedom (DoFs) of the MIMO interference channel were further studied theoretically in [5], which showed that IA can achieve the maximal DoFs. In addition, the conclusions above were verified experimentally over the measured MIMO orthogonal frequency division-multiplexing (OFDM) channels in [6], and the viability of IA was substantiated. Due to its excellent performance in suppressing interference and increasing the throughput, IA has been applied to relay networks [7], cognitive radio [8], ad-hoc networks [9], etc. In particular, Pandey et al. have validated the feasibility of IA in sensor networks in [10].

Although IA can effectively suppress the interference, the number of users K in the networks with M transmitting antennas, N receiving antennas and d DoFs is still limited by the IA feasibility constraint, i.e., K ≤ (M + N)/d − 1 [11]. In other words, the scale of the antennas should become larger when the number of users in the networks increases. Unfortunately, the number of antennas is strictly restricted by many limitations such as the equipment volume, power consumption and price. When the amount of users exceeds the IA feasibility constraint, the interference leakage will become so strong that the quality of service (QoS) will degrade significantly and may become unacceptable. To the best of our knowledge, most of the current works on IA were conducted under the assumption that the IA feasibility condition is satisfied, and the methods herein may not perform well when such a constraint cannot be met. Therefore, we focus on this problem in the large-scale networks with limited antennas, where the number of users exceeds that IA can accept.

The idea of clustering [12,13] may provide an alternative approach to address this problem. The users in the networks are divided into several small groups, and IA is applied to each group independently. Halima and Saadani [12] proposed a clustered IA scheme by time division multiplexing. Although it can accommodate more users, real-time transmission cannot be guaranteed when there are plenty of users. A scheduled clustered IA for the asymmetric interference networks was proposed by Chen and Cheng in [13]. Unfortunately, this method cannot be applied to the conventional symmetric interference channel.

Against the deficiencies of the current IA systems above, we propose a novel clustered IA scheme to address the problem of strong interference in the large-scale MIMO networks with limited antennas. The main contributions of this paper may be summarized as follows:

(1)

A joint spatial-code clustered (JSCC)-IA scheme is proposed, where the users are partitioned into several small groups. In each cluster, the intra-group interference is eliminated by the traditional spatial IA, and the inter-group interference is suppressed by the orthogonality of the pseudo noise (PN) codes assigned to each group. It is well known that the spread spectrum technique serves as an effective anti-interference approach with the advantage of good confidentiality. Therefore, the proposed IA scheme may serve as a more viable alternative approach to mitigate the interference in large-scale networks.

(2)

The analytical expressions of the bit error rate (BER) for the proposed JSCC-IA scheme are formulated in the situations of identical and different propagation delays, respectively. To the best of our knowledge, many of the existing literatures investigate the performance of IA from the perspectives of achievable rate or DoFs, while only a few analyze the error performance. As larger sum rate cannot guarantee better QoS, BER is employed as the performance measurement in this paper.

(3)

Both of the symmetric and asymmetric networks are considered, and a random grouping selection (RGS) algorithm is proposed to search for better grouping combinations for the asymmetric networks. The RGS algorithm can further improve the QoS of the JSCC-IA scheme, and provides a good tradeoff between the computational complexity and performance improvement on BER and received SINR.

The rest of the paper is organized as follows: Section 2 presents the related work. Section 3 introduces the system model of a complete binary phase shift keying (BPSK) transmission system in the K-user MIMO interference channel. The JSCC-IA scheme is proposed in Section 4, and its mechanism and error performance are analyzed. In Section 5, the random grouping selection algorithm is developed for the asymmetric networks. Simulation results are provided in Section 6, followed by the conclusion and future work in Section 7.

Notation: AT, AH, ‖A‖, real(A), sign(A) and A(i,j) represent the transpose, the conjugate transpose, the Frobenius norm, the real part, the sign and the element located on the i-th row and the j-th column of matrix A, respectively. Ak,j denotes the j-th column of matrix Ak. E[•], var[•] and ⌈ •⌉ are the expected value, the variance and the ceiling operators, respectively. We employ R, C, and CM×N to represent the spaces of the real value, the complex value and the M × N complex matrices, respectively. The notation rectT(t) indicates the unit-amplitude rectangular function with non-zero duration of T. CN(μ, σ2) represents a Gaussian distribution with expected value of μ and variance of σ2. The notation (M × N, d)K means a K-user MIMO interference channel where each user transmits d data streams via M transmitting antennas and N receiving antennas.

2. Related Work

In this section, we present a further survey on the application of the MIMO technique in the WSNs. Moreover, some key issues on IA are further investigated. As shown in the Introduction, the MIMO technique is one promising method to improve the performance of WSNs. The introduction of multi-antenna transmission to WSNs can further explore the channel capacity. A threshold-based medium access control strategy was developed in [14], which can exploit the diversity gain of the MIMO WSNs. Since the energy consumption of sensor nodes plays a critical role on their lifetime, it is important to increase the energy efficiency to prolong the endurance of the WSNs. Recently, a large number of researchers have employed the MIMO technique to achieve energy efficient WSNs. Yuan et al. [15] developed a multi-hop virtual MIMO (VMIMO) scheme to improve the energy efficiency and QoS of the WSNs. The cooperative MIMO and data-aggregation techniques were leveraged to jointly reduce the energy consumption of the sensor nodes in [16]. The random WSNs using cooperative MIMO technique were considered in [17], where packet error rate, nodes active rate and energy consumption were jointly analyzed. Park and Jeong [18] analyzed the performances of two kinds of VMIMO schemes in the WSNs, i.e., space-time block coding and spatial multiplexing, and developed a new switching algorithm between them to achieve energy efficient transmission. In addition, relay communication has been cooperated with the MIMO technique to further enhance the performance of WSNs. A multi-hop hybrid VMIMO scheme was developed in [19], where a route with minimum energy consuming was designed, while satisfying the given data rate and BER constraints. In addition, a number of testbeds for WSNs have been developed such as EasiTest, Emstar, Kansei and MoteLab, which can facilitate the development of the advanced WSNs [20].

Although the MIMO technique has shown bright prospects in WSNs, many problems still exist in this systems. As the scale of WSNs becomes larger and larger, the interference becomes a severe impediment to the increasing demand for communications. Against this background, IA has emerged as a promising technology which can effectively eliminate the interference.

One of the major challenges in IA is the design of precoding and decoding matrices, which has significant impact on the levels of interference leakage and sum rate that IA can achieve. The closed-form solutions to IA were provided in [4] for the MIMO interference channel with three users, one DoF, two transmitting and receiving antennas, and were extended to a more general situation of N + 1 users and N antennas in [21]. Unfortunately, the problem of designing the optimal precoding and decoding matrices has been proved to be NP-hard [22], and the number of solutions increases rapidly with the scale of the system. Therefore, numerical methods have to be employed to search for the suboptimal solutions. Gomadam et al. proposed a minimizing interference leakage (MinIL) algorithm in [23], which highlights the advantage of relatively low signaling overhead by utilizing the channel reciprocity. However, the MinIL algorithm might degrade significantly in the low SNR regime for the reason that it only focuses on suppressing the interference from the unintended users, without considering the power loss of the desired signal. Hence, Gomadam et al. modified the method and progressed to the maximizing signal-to-interference-plus-noise (Max-SINR) algorithm in [24], which can improve the throughput especially when the SNR is low. A low-complexity modified alternating minimization algorithm was proposed in [25], which leverages the courant penalty function to jointly optimize the interference leakage and intended signal. The concept of signal leakage was introduced by Shrestha et al. in [26], and the IA solutions were searched under the maximal signal-to-leakage-plus-noise ratio criterion. A sequential antenna switching IA algorithm was proposed in [27], where the QoS is improved by selecting proper antenna configurations.

Another challenge that IA confronts is the acquisition of channel state information (CSI), and a large number of works [2833] have focused on this problem. Sungyoon et al. proposed feedback topologies in [29], which can reduce the signaling overhead significantly. An analogy CSI feedback strategy was proposed in [30], which can achieve lower feedback burden while maintaining the full multiplexing gain in the case of comparable forward and backward SNR levels. El Ayach et al. designed a CSI training and feedback scheme to maximize the effective sum rate of the IA networks in [32]. Zhao et al. have concentrated on the CSI feedback latency in [33] and proposed a new IA scheme by taking advantage of the channel prediction.

3. System Model

In this paper, we concentrate on the BPSK transmission system in the (M × N, d)K MIMO interference channel as shown in Figure 1. Admittedly, many other types of modulation schemes such as quadrature phase shift keying (QPSK), offset QPSK (O-QPSK) and minimum phase shift keying (MSK) can be applied to the system.

The discussion on the selection of modulation schemes is beyond the scope of this paper, and the readers can refer to [34] for more information. Besides, perfect carrier recovery and symbol synchronization are assumed to be achieved. Therefore, the bandpass waveforms can be transformed to the equivalent baseband signals [35]. As shown in Figure 1, the binary bit vector mk ε Rd×1 of the k-th user is first modulated by the waveform function gk(t), and the modulated waveform vector sk(t) ε Rd×1 can be expressed as:

s k ( t ) = m k g k ( t ) , 0 t T b , k = 1 , 2 , , K
where Tb represents the bit period and:
m k = [ m k , 1 , m k , 2 , , m k , d ] T , m k , l { + 1 , 1 } , l = 1 , 2 , , d
s k ( t ) = [ s k , 1 ( t ) , s k , 2 ( t ) , , s k , d ( t ) ] T

Then the modulated waveform vector is precoded by the precoding matrix Vk ε CM×d to produce the transmitted waveform vector, i.e.,

X k ( t ) = V k s k ( t )
where:
V k = [ V k , 1 , V k , 2 , , V k , d ]
V k , l ϵ C M × 1 , l = 1 , 2 , , d
V k , l = 1

The precoded waveforms will be sent across the interference channel, and the received waveform vector Yk(t) ε CN×1 at the k-th receiver can be expressed as:

Y k ( t ) = i = 1 K γ k i H k i X i ( t ) + n k ( t ) = i = 1 K γ k i H k i V i s i ( t ) + n k ( t ) , 0 t T b
where nk(t) ε CN×1 denotes the received noise vector at the k-th receiver, each element of which is an independent zero-mean additive white Gaussian noise (AWGN) process with two-sided power spectral density of N0/2 W/Hz; Hki ε CN×M represents the small scale fading channel gain matrix from the i-th transmitter to the k-th receiver, each entity of which is an independent random variable with the distribution of CN(0,1); γki denotes the large-scale channel attenuation between the i-th transmitter and the k-th receiver.

Most of the previous works have focused on the symmetric networks, where the users are located in the proximity of each other and share the same path-loss, i.e., γki = 1 for all users. However, in practical communication systems, the users might scatter around geographically. Therefore, we will also consider the asymmetric networks, where the large-scale fading is associated with the distance and is given by [13]:

γ k i = r k i α

The notations α and γki represent the path-loss exponent and the distance between the transmitter i and receiver k, respectively.

At the k-th receiver, a decoding matrix Uk ε CN×d is applied to suppress the interference from the unintended users, and the reconstructed signal waveform vector can be formulated as:

s ˜ k ( t ) = U k H Y k ( t ) = i = 1 K γ k i U k H H k i V i s i ( t ) + U k H n k ( t ) = γ k k U k H H k k V k s k ( t ) + i = 1 , i k K γ k i U k H H k i V i s i ( t ) + U k H n k ( t )
where:
U k = [ U k , 1 , U k , 2 , , U k , d ]
U k , l ϵ C N × 1 , l = 1 , 2 , , d
U k , l = 1

At the demodulator, the received signal vector k(t) is correlated with the match filter to yield the test statistic vector, i.e.,

s ^ k = 0 T b s ˜ k ( t ) g k ( t ) d t

Finally, the demodulated bit vector k is determined according to the real part of the test statistic vector, i.e.,

m ^ k , l = { 1 , when real ( s ^ k , l ) > 0 1 , when real ( s ^ k , l ) < 0 , l = 1 , 2 , , d
where:
s ^ k = [ s ^ k , 1 , s ^ k , 2 , , s ^ k , d ] T , m ^ k = [ m ^ k , 1 , m ^ k , 2 , , m ^ k , d ] T

According to [11], the IA feasible condition can be given as follows:

K ( M + N ) / d 1

Under the constraint of Equation (17), the system is likely to be feasible, and perfect IA can be achieved if the following conditions are satisfied:

U k H H k j V j = 0 ; k , j = 1 , 2 , , K ; k j
rank ( U k H H k k V k ) = d

Many works have concentrated the design of the precoding and decoding matrices for IA [2326]. One of the most representative methods is the Max-SINR algorithm as shown in Algorithm 1. The Max-SINR algorithm highlights the advantage of good sum rate achievement. In this paper, the Max-SINR algorithm is selected as the strategy for designing the corresponding matrices. Perfect CSI and large-scale channel attenuation γki are assumed to be known at each node. Although the situations of imperfect CSI are interesting and more practical, detailed discussion on CSI feedback is beyond the scope of this paper. The readers who are interested in this area can refer to the “Related Work” section and the references herein. Besides, we assume that the nodes in the WSNs can communicate with each other. In the scenario where the distances between some nodes are too large, the relay nodes [36,37] can be added to transmit data between them.


Algorithm 1 Max-SINR Algorithm

  • Set the maximal iterations and the initial precoding matrices as Vk (k = 1, 2,…, K). The columns of Vk are linearly independent unit vectors.

  • (Forward Iteration) Calculate the interference-plus-noise covariance matrices Jk,l (l = 1, 2, …, d) in the original channel, i.e.,

    J k , l = j = 1 , j k K H k j V j V j H H k j H + r = 1 , r l d H k k V k , r V k , r H H k k H + σ 2 I

    Formulate the decoding matrix Uk, the l-th column of which can be represented as

    U k , l = J k , l 1 H k k V k , l / J k , l 1 H k k V k , l

  • (Backward Iteration) Calculate the interference-plus-noise covariance matrices J⃖k,l in the reciprocal channel as:

    J k , l = j = 1 , j k K H j k H U j U j H H j k + r = 1 , r l d H k k H U k , r U k , r H H k k + σ 2 I

    Formulate the decoding matrix Vk, the l-th column of which can be represented as

    V k , l = J k , l 1 H k k H U k , l / J k , l 1 H k k H U k , l

  • Repeat step (2) and (3) until the algorithm converges or the maximal iterations number is reached.


4. The Joint Spatial-Code Clustered IA Scheme

The conventional IA can achieve low interference leakage and high throughput when the number of users satisfies the IA feasibility condition. However, in large-scale networks with limited antennas, the IA feasibility condition cannot be met, and the interference leakage may become intense, giving rise to significant degradation of the QoS. Since the interference from the unintended users cannot be eliminated only through the spatial domain, extra dimensions have to be introduced to address this problem. In this section, we jointly explore the spatial as well as the code dimensions, and propose a novel joint spatial-code clustered IA scheme to mitigate the interference that the conventional IA cannot suppress effectively. Moreover, most of the existing works mainly concentrate on IA from the perspectives of sum rate and DoFs, without further analyzing the error performance. However, in the practical communication systems, BER serves as an important measurement of the QoS. Therefore, we formulate the BER expressions of the proposed JSCC-IA scheme in the cases of identical and different propagation delays, respectively.

4.1. The Mechanism of the JSCC-IA Scheme

The JSCC-IA scheme is depicted in Figure 2 for the (M × N, d)K interference channel where the number of users exceeds the IA feasibility constraint, i.e., K > (M + N)/d − 1. The basic idea of the JSCC-IA scheme is to partition the users into G groups, with K0 users in each group that satisfies:

K 0 ( M + N ) / d 1

Therefore, the precoding and decoding matrices can be designed to mitigate the intra-group interference just as the conventional IA. The key point of the JSCC-IA scheme is that the data within each group is modulated by a distinct PN code to suppress the inter-group interference according to the idea of spread spectrum. Therefore, the inter-group and intra-group interference can be respectively aligned in the code and spatial domains, and thus the networks can accommodate many more users to communicate simultaneously via the same frequency band.

Without loss of generality, we assign the k-th user to the ⌈k/K0⌉-th group, and the j-th group is assigned with the PN sequence Cj(n). We will employ k to represent ⌈k/K0⌉ henceforth to avoid cumbersome notation. The PN sequence Cj(n) can be given by:

C j ( n ) = { ± 1 , 0 n L 1 0 , else
where L is the length of the PN sequence. Then the baseband waveform associated with Cj(n) can be expressed as:
c j ( t ) = A n = 0 L 1 C j ( n ) rect T c ( t n T c ) , 0 t L T c
where A and Tc represent the amplitude of the transmitted signal and the duration of one PN chip, respectively. The relationship of Tb, Tc and L can be expressed as:
T b = L T c

Therefore, the waveform function for the JSCC-IA system can be given by:

g k ( t ) = c k _ ( t )

And the bit energy Eb of the JSCC-IA scheme can be calculated as:

E b = 0 T b [ m k , l g k ( t ) ] 2 d t = 0 T b [ g k ( t ) ] 2 d t = 0 T b [ c k _ ( t ) ] 2 d t = A 2 T b = L A 2 T c

The most significant difference between the proposed JSCC-IA and the conventional IA systems lies in the receiver, and the demodulator of the JSCC-IA scheme can suppress the inter-group interference by correlating the received signal with the local PN waveform. To facilitate the analysis in the next subsections, we define the correlation between two PN sequences as:

ρ i j ( l ) = n = 0 L 1 C i ( n ) C j ( n l )

According to the properties of PN sequences, the autocorrelation value ρii(0), which equals to L, is significantly larger than the cross-correlation value ρij(0) with ij. Therefore, the correlation of the PN codes can not only provide extra gains to the desired signals within each cluster, but also mitigate the interference from the unintended groups. There are various types of PN sequences such as m-sequence, M-sequence and Gold sequence. We employ the Gold sequence in the JSCC-IA system due to its advantage of low cross-correlation value, easy implementation, large number of available sequences and so on. Further discussion on the properties of different PN sequences is beyond the scope of this paper, and the readers can refer to [34] for more details.

4.2. Error Performance of the JSCC-IA Scheme with Identical Propagation Delay

In the JSCC-IA system, when all users share the same propagation delay, the reconstructed signal waveform vector at the kth receiver can be expressed as Equation (10). The demodulator employs gk(t) to correlate with k(t), and the test statistic vector can be written as:

s ^ k = 0 T b i = 1 K γ k i U k H H k i V i m i g i ( t ) g k ( t ) d t + 0 T b U k H n k ( t ) g k ( t ) d t

From Equations (24) and (26)(28), the correlation between gi(t) and gk(t) can be calculated as:

0 T b g i ( t ) g k ( t ) d t = 0 T b c i _ ( t ) c k _ ( t ) d t = A 2 n = 0 L 1 [ C i _ ( n ) C k _ ( n ) n T c ( n + 1 ) T c rect T c ( t n T c ) rect T c ( t n T c ) d t ] = A 2 T c n = 0 L 1 C k _ ( n ) C i _ ( n ) = E b ρ k _ i _ ( 0 ) / L

Substitute Equation (30) into Equation (29), and the test statistic vector can be rewritten as:

s ^ k = 1 L i = 1 K E b γ k i ρ k _ i _ ( 0 ) U k H H k i V i m i + n ^ k = 1 L E b γ k k ρ k _ k _ ( 0 ) U k H H k k V k m k + 1 L i = 1 , i k K E b γ k i ρ k _ i _ ( 0 ) U k H H k i V i m i + n ^ k
where:
n ^ k = 0 T b U k H n k ( t ) g k ( t ) d t
represents the statistic noise vector with the property as follows:

Theorem 1

The statistic noise vector at the k-th receiver, i.e., k = [k,1, n̂k,2, …,k,N]T ε CN×1 is a zero-mean Gaussian random vector. Particularly, the variances of n̂k,l and real(n̂k,l) can be respectively given by var[k,l] = N0Eb / 2 and var[real(n̂k,l)] = N0Eb / 4, with l = 1, 2, …, N.

Theorem 1 of Proof

See Appendix.

As shown in Equation (31), the distortion of mk comes from the residual interference and the statistic noise vector n̂k, and the received SINR of the l-th data stream of the k-th user can be calculated as:

SINR JSCC 1 ( k , l ) = | E b γ k k ρ k _ k _ ( 0 ) U k , l H H k k V k , l m k , l / L | 2 i = 1 , i k K j = 1 d | E b γ k i ρ k _ i _ ( 0 ) U k , l H H k i V i , j m i , j / L | 2 + j = 1 , j l d | E b γ k k ρ k _ k _ ( 0 ) U k , l H H k k V k , j m k , j / L | 2 + N 0 E b / 2 = | γ k k ρ k _ k _ ( 0 ) U k , l H H k k V k , l | 2 i = 1 , i k K j = 1 d | γ k i ρ k _ i _ ( 0 ) U k , l H H k i V i , j | 2 + j = 1 , j l d | E b γ k k ρ k _ k _ ( 0 ) U k , l H H k k V k , j | 2 + L 2 N 0 / 2 E b

Since ρkk (0) ≫ ρki(0) when ki, the correlation of the PN code can not only increase the desired signal power, but can also suppress the interference from the other groups.

As shown in Equation (31), when mi (i = 1, 2, …, K) is transmitted, the test statistic vector k is a Gaussian random vector with the expected value as:

E [ s ^ k ] = 1 L i = 1 K E b γ k i ρ k _ i _ ( 0 ) U k H H k i V i m i

Define:

F k i = γ k i ρ k _ i _ ( 0 ) U k H H k i V k ϵ C d × d
and E[k] can be rewritten as:
E [ s ^ k ] = E b L i = 1 K F k i m i

To attain the expected value of k, all the possible transmitted messages have to be considered, and we introduce the transformation matrix TJSCC1, the overall bit vector M and the overall test statistic vector as follows:

T JSCC 1 = [ F 11 , F 12 , , F 1 K F 21 , F 22 , , F 2 K F K 1 , F K 2 , , F K K ] ϵ C K d × K d , M = [ m 1 m 2 m K ] ϵ R K d × 1 , s ¯ = [ s ^ 1 s ^ 2 s ^ K ] ϵ C K d × 1

It is obvious that there are 2Kd possible value of M, and we index them as M1,M2,…M2Kd. From Equations (36) and (37), when Mj (j = 1, 2, …, 2Kd) is transmitted, the expected value of can be calculated as:

E [ s ¯ | M j ] = ( E b / L ) T JSCC 1 M j

Therefore, the expected values of under all the transmitted bit vectors can be written as:

[ E [ s ¯ | M 1 ] , E [ s ¯ | M 2 ] , , E [ s ¯ | M 2 K d ] ] = ( E b / L ) T JSCC 1 [ M 1 , M 2 , , M 2 K d ] = ( E b / L ) T JSCC 1 M ¯ JSCC 1 = ( E b / L ) D JSCC 1
where:
M ¯ JSCC 1 = [ M 1 , M 2 , , M 2 K d ]
D JSCC 1 = T JSCC 1 M ¯ JSCC 1

Based on the analysis above, the BER expression of the proposed JSCC-IA with identical propagation delay is straightforward and can be expressed as the following theorem.

Theorem 2

The BER of the l-th data stream of the k-th user in the JSCC-IA system with identical propagation delay can be expressed as:

BER JSCC 1 ( k , l ) = 1 2 K d q = 1 2 K d { 1 2 + 1 2 erf [ M ¯ JSCC 1 ( ( k 1 ) d + l , q ) real [ D JSCC 1 ( ( k 1 ) d + l , q ) ] 1 L 2 E b N 0 ] }

And the overall BER of the whole system is given by:

BER ¯ JSCC 1 = 1 K d k = 1 K l = 1 d BER JSCC 1 ( k , l )

Theorem 2 of Proof

For the case where the priori probabilities of the transmitted data are equal, the probability of the transmitted bit vector can be expressed as:

P ( M q ) = 1 / 2 K d , q = 1 , 2 , , 2 K d

As shown in Equation (39), when Mq is transmitted, the expected value of can be given by:

E [ s ¯ | M q ] = ( E b / L ) D JSCC 1 , q
where DJSCC1,q represents the q-th column of DJSCC1. As we make the decision according to the real part of the test statistic, the expected value and variance of real(k,l) when Mq is transmitted can be respectively given as:
E [ real ( s ^ k , l ) | M q ] = ( E b / L ) real [ D JSCC 1 ( ( k 1 ) d + l , q ) ]
var [ real ( s ^ k , l ) | M q ] = σ R 2 = N 0 E b / 4

Therefore, the probability density function of real(k,l) can be formulated as:

P ( z | M q ) = 1 2 π σ R 2 exp { { z E [ real ( s ^ k , l ) | M q ] } 2 2 σ R 2 } = 1 2 π σ R 2 exp { { z ( E b / L ) real [ D JSCC 1 ( ( k 1 ) d + l , q ) ] } 2 2 σ R 2 }

When mk,l = 1, the probability of the error occurrence is:

P ( e | M q , m k , l = 1 ) = P ( z < 0 | M q , m k , l = 1 ) = 0 P ( z | M q ) d z = 1 2 + 1 2 erf { ( E b / L ) real [ D JSCC 1 ( ( k 1 ) d + l , q ) ] 2 σ R 2 } = 1 2 + 1 2 erf { m k , l ( E b / L ) real [ D JSCC 1 ( ( k 1 ) d + l , q ) ] 2 σ R 2 }

When mk,l = −1, the probability of the error occurrence is:

P ( e | M q , m k , l = 1 ) = P ( z > 0 | M q , m k , l = 1 ) = 0 + P ( z | M q ) d z = 1 2 + 1 2 erf { ( E b / L ) real [ D JSCC 1 ( ( k 1 ) d + l , q ) ] 2 σ R 2 } = 1 2 + 1 2 erf { m k , l ( E b / L ) real [ D JSCC 1 ( ( k 1 ) d + l , q ) ] 2 σ R 2 }

As mk,l= M̂JSCCI((k −1)d + l,q), we substitute it into Equations (49) and (50) to attain the error probability of mk,l, i.e.,

P ( e | M q ) = 1 2 + 1 2 erf { ( E b / L ) M ¯ JSCC 1 ( ( k 1 ) d + l , q ) real [ D JSCC 1 ( ( k 1 ) d + l , q ) ] 2 σ R 2 }

Substitute Equation (47) into Equation (51), and the error probability of mk,l can be expressed as:

P ( e | M q ) = 1 2 + 1 2 erf { M ¯ JSCC 1 ( ( k 1 ) d + l , q ) real [ D JSCC 1 ( ( k 1 ) d + l , q ) ] 1 L 2 E b N 0 }

When all the possible transmitted bit vectors are considered, the overall averaged BER of mk,l can be formulated as:

BER JSCC 1 ( k , l ) = P ( M q ) q = 1 2 K d P ( e | M q )

Substitute Equations (44) and (52) into Equation (53), and Equation (42) can be verified.

4.3. Error Performance of the JSCC-IA Scheme with Different Propagation Delays

Based on the analysis in Section 4.2, we progress to a more complex but practical situation where the users have different propagation delays. As shown in Figure 3, there might be two incomplete message frames during one message interval. Without loss of generality, the propagation delay between the k-th and i-th users is assumed to be the multiples of the duration of one PN chip, i.e.,

τ k i = Δ k i T c , Δ k i = 0 , 1 , , L 1

Then the reconstructed signal waveform vector at the k-th receiver can be expressed as:

s ˜ k ( t ) = γ k k U k H H k k V k m k ( 0 ) g k ( t ) + i = 1 , i k K { γ k i U k H H k i V i [ m i ( 0 ) g i ( t τ k i ) + m i ( 1 ) g i ( t + T b τ k i ) ] } + U k H n k ( t ) , 0 t T b

The demodulator employ gk(t) to correlate with k(t), and the test statistic vector can be written as:

s ^ k = 0 T b s ˜ k ( t ) g k ( t ) d t = γ k k U k H H k k V k m k ( 0 ) 0 T b g k ( t ) g k ( t ) d t + i = 1 , i k K { γ k i U k H H k i V i [ m i ( 0 ) 0 T b g k ( t ) g i ( t τ k i ) d t + m i ( 1 ) 0 T b g k ( t ) g i ( t + T b τ k i ) d t ] } + 0 T b U k H n k ( t ) g k ( t ) d t

From Equations (24), (26), (28) and (54), the integrals in Equation (56) can be rewritten as:

0 T b g k ( t ) g i ( t τ k i ) d t = E b ρ k _ i _ ( Δ k i ) / L
0 T b g k ( t ) g i ( t + T b τ k i ) d t = E b ρ k _ i _ ( Δ k i L ) / L

Substitute Equations (57) and (58) into Equation (56), and the test statistic vector can be rewritten as:

s ^ k = E b γ k k U k H H k k V k m k ( 0 ) + E b L i = 1 , i k K { γ k i U k H H k i V i [ m i ( 0 ) ρ k _ i _ ( Δ k i ) + m i ( 1 ) ρ k _ i _ ( Δ k i L ) ] } + n ^ k

As shown in Equation (59), the desired signal vector mk(0) is degraded by the two consecutive messages from the other users, and the received SINR of the l-th data stream of the k-th user can be calculated as:

SINR JSCC 2 ( k , l ) = P JSCC 2 ( k , l ) I JSCC 2 ( k , l ) + N 0 E b / 2
where:
P JSCC 2 ( k , l ) = | E b γ k k ρ k _ k _ ( 0 ) U k , l H H k k V k , l m k , l / L | 2
I JSCC 2 ( k , l ) = i = 1 , i k K j = 1 d | E b γ k i ρ k _ i _ ( Δ k i ) U k , l H H k i V i , j m i , j ( 0 ) / L | 2 + i = 1 , i k K j = 1 d | E b γ k i ρ k _ i _ ( Δ k i L ) U k , l H H k i V i , j m i , j ( 1 ) / L | 2 + j = 1 , j l d | E b γ k k ρ k _ k _ ( 0 ) U k , l H H k k V k , j m k , j / L | 2

From Theorem 1, the statistic noise vector k is a Gaussian random vector, each component of which is a zero-mean Gaussian variable with variance N0Eb/2. As shown in Equation (59), the expected value of k is determined by the transmitted bit vectors m1(−1), m1(0), …, mk−1(−1), mk−1(0), mk(0), mk+1(−1), mk+1(0), …, mK(−1), mK(0). Similar as Equation (40), we introduce a (2K − 1)d × 2(2K−1)d transmitted data matrix JSCDC2, the column of which represents each possible transmitted data vector. In addition, we also introduce the transformation matrix for the JSCC-IA system with different propagation delays as:

T JSCC 2 = [ L Q 11 , ρ 1 _ 2 _ ( Δ 12 ) Q 12 , ρ 1 _ 2 _ ( L Δ 12 ) Q 12 , , ρ 1 _ K _ ( Δ 1 K ) Q 1 K , ρ 1 _ K _ ( L Δ 1 K ) Q 1 K ρ 2 _ 1 _ ( Δ 21 ) Q 21 , ρ 2 _ 1 _ ( L Δ 21 ) Q 21 , L Q 22 , , ρ 2 _ K _ ( Δ 2 K ) Q 2 K , ρ 2 _ K _ ( L Δ 2 K ) Q 2 K ρ K _ 1 _ ( Δ K 1 ) Q K 1 , ρ K _ 1 _ ( L Δ K 1 ) Q K 1 , , ρ K _ K 1 _ ( Δ K ( K 1 ) ) Q K ( K 1 ) , ρ K _ K 1 _ ( L Δ K ( K 1 ) ) Q K ( K 1 ) , L Q K K ]
where Q i j = γ i j U i H H i j V j ϵ C d × d. Then the expected values matrix of under different transmitted data can be expressed as:
( E b / L ) T JSCC 2 M ¯ JSCC 2 = ( E b / L ) D JSCC 2

Then the BER for the JSCC-IA scheme with different propagation delays can be expressed as the follow theorem.

Theorem 3

The BER of the l-th data stream of the k-th user in the JSCC-IA scheme with different propagation delays can be expressed as:

BER JSCC 2 ( k , l ) = 1 2 ( 2 K 1 ) d q = 1 2 ( 2 K 1 ) d { 1 2 + 1 2 erf [ M ¯ JSCC 2 ( 2 ( k 1 ) d + l , q ) real [ D JSCC 2 ( 2 ( k 1 ) d + l , q ) ] 1 L 2 E b N 0 ] }

And the overall averaged BER of the whole system can be expressed as:

BER ¯ JSCC 2 = 1 K d k = 1 K l = 1 d BER JSCC 2 ( k , l )

Theorem 3 of Proof

The proof for Theorem 3 is similar as that of Theorem 2.

4.4. Error Performance of the Conventional IA scheme

To make a comparison between the proposed JSCC-IA and the conventional IA schemes, the error performance of the latter one is investigated in this subsection. The equivalent baseband waveform function and the bit energy Eb of the BPSK signal in the conventional IA system can be respectively expressed as:

g k ( t ) = A rect T b ( t )
E b = 0 T b g k ( t ) g k ( t ) d t = A 2 T b

Substitute Equations (1), (10), (67) and (68) into Equation (14), and the test statistic vector can be rewritten as:

s ^ k = E b γ k k U k H H k k V k m k + i = 1 , i k K E b γ k i U k H H k i V i m i + n ^ k

Therefore, the SINR of the l-th data stream of the k-th user can be calculated as:

SINR IA ( k , l ) = | E b γ k k U k , l H H k k V k , l m k , l | 2 i = 1 , i k K j = 1 d | E b γ k i U k , l H H k i V i , j m i , j | 2 + j = 1 , j l d | E b γ k k U k , l H H k k V k , j m k , j | 2 + N 0 E b / 2

Similar as the JSCC-IA scheme with identical propagation delay, we introduce the matrix as Equation (40) and the the transformation matrix TIA as follows:

T IA = [ B 11 , B 12 , , B 1 K B 21 , B 22 , , B 2 K B K 1 , B K 2 , , B K K ] ϵ C K d × K d
where B i j = γ i j U i H H i j V j. Then the BER expression of the conventional IA system can be expressed as the following theorem.

Theorem 4

The BER of the l-th data stream of the k-th user in the conventional IA system can be expressed as:

BER IA ( k , l ) = 1 2 K d q = 1 2 K d { 1 2 + 1 2 erf [ sign [ M ¯ ( ( k 1 ) d + l , q ) ] real [ D IA ( ( k 1 ) d + l , q ) ] 2 E b N 0 ] }

And the overall averaged BER of the whole system can be expressed as:

BER ¯ IA = 1 K d k = 1 K l = 1 d BER IA ( k , l )

Theorem 4 of Proof

The proof for Theorem 4 is similar as that of Theorem 2.

In this section, we have introduced the JSCC-IA scheme and formulated the associated BER expressions analytically. We have clustered the users randomly, without further considering the effect of different grouping combinations. In the next section, we turn to more practical situations of asymmetric networks, and propose a grouping algorithm to select more appropriate clustering combinations with better performance.

5. The Random Grouping Selection Algorithm for the JSCC-IA Scheme in the Asymmetric Networks

The proposed JSCC-IA scheme can improve the BER performance of the IA system in the large-scale networks with limited antennas. However, for asymmetric networks where the attenuation varies significantly among the users, the way how the users are clustered might have an impact on the BER performance, and the simple grouping strategy in Section 4 might not fully explore the potential of the JSCC-IA scheme. In this section, a random grouping selection algorithm is proposed to search for better clustering combinations which can further improve the error performance of the proposed JSCC-IA scheme.

5.1. The Random Grouping Selection Algorithm

In the JSCC-IA scheme with G groups and K0 users per group, the number of all possible clustering combinations is D = C G K 0 K 0 C ( G 1 ) K 0 K 0 C 2 K 0 K 0 and the set that consists all the possible combinations is S = {P1, P2,…, PD}. Therefore, the optimal combination under the criterion of optimal BER can be expressed as:

P opt BER = arg min P m { BER ¯ JSCC , m = 1 , 2 , , D }
where BER ¯ JSCC represents BER ¯ JSCC 1 or BER ¯ JSCC 2 for the JSCC-IA systems with identical or different propagation delays, respectively.

Although the objective function in Equation (74) can achieve the optimal overall error performance, the computational complexity of the theoretical BER by Equation (42) or Equation (65) increases exponentially with the number of users, which hinders the application of the grouping selection strategy. Therefore, we introduce the minimal received SINR as the alternative objective function, i.e.,

P opt SINR = arg max P m { min k , l { SINR JSCC ( k , l ) , k = 1 , 2 , K , l = 1 , 2 , , d } , m = 1 , 2 , , D }
where SINRJSCC represents SINRJSCC1 or SINRJSC2 for the JSCC-IA systems with identical or different propagation delays, respectively. Since the received SINR has a significant impact on the error performance, the minimal received SINR can serve as the measurement of the QoS, and the grouping combination that has the highest minimal SINR is chosen as the optimal solution in Equation (75). Moreover, the computational complexity of calculating the received SINR is much lower than that of the BER. Therefore, the proposed objective function can serve as a good measurement to evaluate the performance of different grouping combinations with low computational complexity.

When the number of users is small, brute-force searching (BFS) can be employed to select the optimal grouping combination. However, the number of candidates increases dramatically with the network scale, and searching the optimal clustering combination is a NP-hard problem. Therefore, it is impossible to enumerate all the possible combinations in the case of massive users due to the limited computational time in the practical systems. For the high price of searching for the optimal combination, we can turn to the suboptimal solutions by the RGS algorithm with much lower computational complexity and good performance.

As shown in Algorithm 2, the RGS algorithm provides a grouping combination which can achieve the preset objective minimal received SINR ξ, or returns the one that has the highest minimal SINR within the Θ tested combinations. In the small size networks, Θ can be set as D so that all the available candidates can be tested, and the optimal grouping combination can be attained. However, in the large scale networks, D is such a huge number that Θ should be much smaller than D. Although the solution in the case of Θ < D is not optimal, the RGS JSCC-IA scheme can improve the error performance significantly without too much additional computational complexity.


Algorithm 2 Random Grouping Selection Algorithm

  • Set the maximal number of iterations as Θ and the objective minimal received SINR as ξ. The variable i is used to represent the number of iterations with initial value of 1. Select Θ grouping combinations randomly from S as S = { P 1 , P 2 , P Θ }. Begin iteration.

  • Select the grouping combination P i from S′, and calculate the precoding and decoding matrices of each group according to the Max-SINR algorithm as Wi = {{Vi},{Ui}}.

  • Calculate the SINR of all the data streams according to Equation (33) or Equation (60), and attain the minimal SINR as ξi.

  • If i = 1, set λ = ξ1, Popt = P1 and Wopt = W1; otherwise, if ξi ≥ λ, set λ = ξi, Popt = Pi, and Wopt = Wi.

  • If λ > ξ or i > Θ, stop and output Popt and Wopt; otherwise update ii + 1 and go to step (2).


Furthermore, in the case of small ξ, the actual number of iterations is likely to be smaller than Θ, and the complexity of RGS algorithm is low at the expense of little improvement. On the contrary, when ξ is large, the RGS algorithm might have to take much more iterations to search the solution, and the improvement is expected to be significant at the expense of larger computational cost. Therefore, the RGS algorithm provides a good tradeoff between the performance improvement and the computational complexity by adjusting the preset parameters. In addition, a large number of low complexity IA algorithms have recently been developed to attain V and U with a remarkable fast convergence speed [25,38]. The development of very-large-scale integration (VLSI) also makes it much faster to complete the calculation. Therefore, in the practical situation, Θ can be set to be relatively large, and the possibility that ξ cannot be reached is small.

5.2. The Complexity Analysis

In this subsection, the computational complexity of the proposed RGS algorithm is analyzed and compared with the BFS algorithm. The number of complex multiplications is employed as the measurement of the complexity. As shown in Algorithm 2, the computation complexity mainly comes from the Max-SINR algorithm in step (2) and the SINR calculation in step (3). Detail analysis on each step is provided as follows:

(1)

From the description of the Max-SINR method in Algorithm 1, for the k-th user's interference-plus-noise covariance matrices Jk,l, we can firstly calculate the terms HkjVj with MNd complex multiplications and then compute the product of HkjVj and (HkjVj)H which takes N2d complex multiplications. Therefore, the number of complex multiplications required by calculating the interference-plus-noise covariance matrix of each data stream can be expressed as (K0 − 1)(NMd + N2d) + (d − 1)(NM + N2). As there are Kd data streams in total, the sum complexity for calculating all the interference-plus-noise covariance matrices is Kd[(K0 − 1)(NMd + N2d) + (d − 1)(NM + N2)].

(2)

For the decoding vector Uk,l, the calculation of J k , l 1 requires (N − 1)!(N − 2)N2 + N!(N − 1) complex multiplications and one complex division. The multiplication of J k , l 1, Hkk and Vk,l takes MN2 + NM complex multiplications and the normalization needs N complex multiplications and N complex divisions. Therefore, it requires (N − 1)!(N − 2)N2 + N!(N − 1) + MN2 + NM + N complex multiplications and N complex divisions to attain each decoding vector. As there are Kd data streams in total, the sum complexity for calculating all the decoding vectors is Kd[(N − 1)!(N − 2)N2 + N!(N − 1) + MN2 + NM + N] complex multiplications and KNd complex divisions.

(3)

The complexity for calculating Jk,l is similar as that of Jk,l, and the total number of complex multiplications is Kd[(K0 − 1)(NMd + M2d) + (d − 1)(NM + M2)].

(4)

The complexity for calculating Vk is similar as that of Uk, and the total number of complex multiplications is Kd[(M − 1)!(M − 2)M2 + M!(M − 1)+NM2 + NM + M].

(5)

For the JSCC-IA scheme with identical propagation delay, the calculation of the SINR for each data stream requires Kd[(MN + M) + 3] complex multiplications and one real division according to Equation (33). For the JSCC-IA scheme with different propagation delays, the calculation of SINR requires (2K − 1)d[(MN + M) + 3] complex multiplications and one real division according to Equation (60). As there are Kd data streams in total, the overall computational complexity for all the data streams is K2d2[(MN + M) + 3] and K(2K − 1)d2[(MN + M) + 3] for the identical and different propagation delays cases, respectively.

In all, the total numbers of complex multiplications per iteration for the RGS algorithm with the identical and different propagation delays can be respectively summarized as follows:

c 1 = K d [ ( K 0 1 ) ( NMd + N 2 d ) + ( d 1 ) ( N M + N 2 ) ] + K d [ ( N 1 ) ! ( N 2 ) N 2 + N ! ( N 1 ) + M N 2 + N M + N ] + K d [ ( K 0 1 ) ( NMd + M 2 d ) + ( d 1 ) ( N M + M 2 ) ] + K d [ ( M 1 ) ! ( M 2 ) M 2 + M ! ( M 1 ) + M 2 N + N M + M ] + K 2 d 2 [ ( M N + M ) + 3 ]
c 2 = K d [ ( K 0 1 ) ( NMd + N 2 d ) + ( d 1 ) ( N M + N 2 ) ] + K d [ ( N 1 ) ! ( N 2 ) N 2 + N ! ( N 1 ) + M N 2 + N M + N ] + K d [ ( K 0 1 ) ( NMd + M 2 d ) + ( d 1 ) ( N M + M 2 ) ] + K d [ ( M 1 ) ! ( M 2 ) M 2 + M ! ( M 1 ) + M 2 N + N M + M ] + K ( 2 K 1 ) d 2 [ ( M N + M ) + 3 ] .

The BFS will have to take D iterations, and the corresponding overall complexity for the cases of identical and different propagation delays can be respectively represented as:

C BFS 1 = D c 1
C BFS 2 = D c 2

On the contrary, the RGS algorithm only requires Θ iterations at most, and the associated overall computational complexity for the cases of identical and different propagation delays can be respectively represented as:

C RGS 1 = Θ c 1
C RGS 2 = Θ c 2

Table 1 lists the overall complexity of the RGS and BFS algorithms under different number of antennas, users, data streams and groups. The maximal number of iterations for RGS algorithm is chosen as Θ = 20. From the results, we can see that the number of complex multiplications of the BFS algorithm increases dramatically with the network scale, and the complexity is so huge that it is infeasible in the practical systems. On the contrary, the complexity of the RGS algorithm is several orders lower than that of the BFS algorithm, and does not increase rapidly when the network scale becomes larger. From the rate of the complexity between the two algorithms, it can be seen that the proposed RGS algorithm can reduce the computational cost significantly.

6. Numerical Results

In this section, we evaluate the proposed JSCC-IA scheme and compare it with the conventional IA system in large-scale networks with limited antennas. The MIMO interference networks (4 × 4, 1)10, (4 × 4, 1)20 and (6 × 6, 2)18 are considered. According to the IA feasibility condition, when four antennas are used, the maximal numbers of users are seven and three for the cases of single and double DoFs, respectively. The JSCC-IA system partitions the users into two and four groups with five users in each cluster for the (4 × 4, 1)10 and (4 × 4, 1)20 networks, respectively. Similarly, the users in (6 × 6, 2)18 are divided into six groups with three users in each cluster. In the first subsection, the symmetric networks are considered, and the error performance, minimal received SINR and average received SINR are evaluated for the proposed and the conventional IA schemes. In the second subsection, we turn to more practical situations of asymmetric networks. The RGS algorithm is discussed in terms of BER and received SINR. In each figure below, the performances are averaged over 200 realizations of randomly generated channel coefficients. The Max-SINR algorithm is chosen to design the precoding and decoding matrices with the iterations of 1000. The Gold sequences are selected as the PN codes with the length of 63 in the following simulations.

6.1. Performance in the Symmetric Networks

The theoretical and experimental BER performances of the proposed JSCC-IA schemes with identical and different propagation delays for the (4 × 4, 1)10 network are provided and compared with those of the conventional IA scheme in Figure 4.

From the results, it can be seen that the experimental BER agrees very well with the theoretical one, verifying the analytical BER expressions in Section 4. For the JSCC-IA scheme with the same propagation delay, the experimental BER becomes zero when Eb/N0 is larger than 10 dB due to the finite length of the simulation messages. It is expected that the performance of the traditional IA system is significantly degraded by the strong interference that cannot be mitigated only by the spatial adjustment. The average BER of the conventional IA scheme stays at a very high level, and can only reach the level of 10−3 at Eb/N0 = 14 dB, which is certainly inadequate for the practical requirements. However, when the code domain is introduced, there is a substantial improvement in the error performance. In the JSCC-IA system with identical propagation delay, the BER can be suppressed to the level of 10−5 only at Eb/N0 of 4 dB. The BER of the JSCC-IA scheme decreases rapidly with the raise in Eb/N0, and the theoretical value can reach the degree of 10−16 at Eb/N0 of 14 dB. For the JSCC-IA system with different propagation delays, the performance might be degraded by the various delays, and the associated BER becomes higher. In spite of this, its performance is still much superior to that of the conventional IA system, with BER of 10−5 at Eb/N0 of 8 dB.

To further evaluate the performances in the large-scale WSNs, the scenarios with even more users are considered, and the experimental BER in the (4 × 4, 1)20 network is presented in Figure 5. As the number of users is much larger than that the conventional IA scheme can accommodate, the average BER of the conventional IA scheme stays around the high level of 10−1. On the contrary, the JSCC-IA scheme can suppress the BER to a much lower level. Considering the Eb/N0 of 8 dB, the associated BER is 10−7 and 10−4 for the JSCC-IA schemes with identical and different propagation delays, respectively. When Eb/N0 increases, the proposed scheme can achieve even better BER.

Aside from the single DoF circumstance, we progress to a more complicated double data streams situation, and the performances in the (6 × 6, 2)18 network are depicted in Figure 6. The BER of the conventional IA system still stays at the unacceptable high value of 10−1, and does not show significant improvement with the raise in Eb/N0. On the other hand, the proposed JSCC-IA scheme exhibits much better BER than the conventional IA system. For the scenario of identical propagation delay, the BER decreases dramatically with the rise in Eb/N0, and reaches the level of 10−9 at Eb/N0 = 6 dB. Although the performance of the JSCC-IA scheme with different propagation delays is inferior to that with the same delay, it still shows good performance, with BER of 10−5 at 4 dB. Therefore, simulations validate the application of JSCC-IA in multi-data-stream networks. Consequently, the proposed JSCC-IA scheme exhibits an implicit advantage over the conventional IA system in term of BER performance.

Error rate is not the only performance measure of the system, and we also evaluate the schemes from the perspective of minimal received SINR, which represents the performance of the worst data stream. If the minimal received SINR is too low, the communications of some users might be terminated. Therefore, it is important to guarantee the minimal received SINR so that all the users in the network can transmit data normally. The average minimal received SINR of different schemes are compared in Figures 7 and 8 for the (4 × 4, 1)20 and (6 × 6, 2)18 symmetric networks, respectively.

For the (4 × 4, 1)20 network in Figure 7, the minimal received SINR of the conventional IA system increases slowly with the raise in Eb/N0, and ranges only from −6 to −3 dB, implying that the worst data stream is suffering from strong interference and the communication of the corresponding user is likely to be terminated. On the contrary, the JSCC-IA scheme with identical propagation delay can achieve much higher minimal received SINR, and can reach the value of 17 dB at Eb/N0 = 14 dB. When different propagation delays are considered, the JSCC-IA scheme might be degraded in the high Eb/N0 regimes, and cannot reach such a high level as the one with the same delay. In spite of this, it still exhibits much better minimal received SINR than the conventional IA system, with as much as 9 dB higher minimal received SINR than the traditional IA system at Eb/N0 = 14 dB.

For the multi-data-stream scenario of (6 × 6, 2)18 in Figure 8, similar performances can be observed. Considering the Eb/N0 of 14 dB, the JSCC-IA scheme shows implicit advantage over the conventional IA system, with 23 and 10 dB higher minimal SINR than the traditional one in the cases of identical and different propagation delays, respectively. Therefore, the JSCC-IA scheme can enhance the minimal SINR, and thus reduce the outage probability in the large-scale WSNs.

Although the minimal received SINR provides us the measure of the performance of the worst data stream, it does not present further details on the other streams. Therefore, we introduce the average received SINR among all the data streams to further evaluate the overall performance thoroughly in Figures 9 and 10.

For the (4 × 4, 1)20 network in Figure 9, the performance of the conventional IA scheme is poor, only ranging from the value of −3 to 0 dB from the Eb/N0 of −10 to 14 dB. Therefore, most of the users in the traditional IA system are suffering from strong interference, and might fail to communicate normally under such a low received SINR level.

However, the JSCC-IA scheme can achieve higher average received SINR, especially in the high Eb/N0 regimes. For instance, given Eb/N0 = 14 dB, the average received SINR of the conventional IA scheme, the JSCC-IA scheme with identical propagation delay and the JSCC-IA scheme with different propagation delays is 0 dB, 21 dB and 11 dB, respectively.

For the (6 × 6, 2)18 network in Figure 10, the performance of the conventional IA system becomes even poorer due to the larger number of total data streams, and the best average received SINR is only −1 dB at Eb/N0 = 14 dB, indicating that the communication might be terminated. Meanwhile, the JSCC-IA scheme does not seem to be degraded by the increase in DoFs and the number of total data streams, and still enjoys high average received SINR.

6.2. Performance in the Asymmetric Networks

In the simulations above, the users are assumed to be free from large-scale fading. However, in practical communication systems, different users might locate randomly and suffer from different levels of large-scale fading. In this section, we evaluate the IA schemes in more practical asymmetric networks. It is assumed that the transmitters are uniformly located in a 10 km × 10 km square with the receivers randomly distributed around the associated transmitters. The distance between each transmitter-receiver pair is 1 km, and the path-loss exponent α is set to be 3.76 [13]. Different from the simulations in Subsection 6.1, the grouping combinations in the asymmetric networks might have an impact on the performance of the JSCC-IA scheme. Since brute-force searching of all the possible grouping combinations is unacceptable for the networks with large number of users, the RGS JSCC-IA scheme is introduced in Section 5, which can reduce the computational complexity and select better grouping combinations. In this subsection, we evaluate the RGS JSCC-IA scheme and compare it with the conventional IA system. The preset objective minimal received SINR and maximal number of iterations for the RGS JSCC-IA scheme are set to be ξ = 15 dB and as Θ = 20, respectively.

The error performances of the conventional IA, JSCC-IA and RGS JSCC-IA schemes are compared in Figures 11 and 12 for the (4 × 4, 1)20 and (6 × 6, 2)18 networks, respectively. From the results, we can observe that the conventional IA system can achieve better BER in the asymmetric than the symmetric networks for the reason that the interference is relatively weaker due to the large-scale fading. In spite of this, the proposed JSCC-IA scheme can still achieve lower average BER than the conventional IA system.

For the (4 × 4, 1)20 network in Figure 11, given the BER of 10−5, the Eb/N0 required by the JSCC-IA system with identical propagation delay is 0 dB, compared with the 4 dB required by the conventional IA system. When RGS algorithm is applied, it provides approximately 2 dB Eb/N0 gains over the non-RGS JSCC-IA scheme at the BER of 10−5, and the gain increases with the decrease in BER. Although the different propagation delays degrade the performance of the JSCC-IA system, the difference of the Eb/N0 between the JSCC-IA schemes with identical and different delays is no more than 2 dB at the same BER. Besides, the JSCC-IA scheme with different propagation delays still outperforms the convention IA system, especially when the RGS algorithm is applied. At Eb/N0 = 2 dB, the BER of the conventional IA scheme, the RGS JSCC-IA schemes with identical and different propagation delays is 10−4, 10−7 and 10−6, respectively.

For the (6 × 6, 2)18 case in Figure 12, the BER performance of the JSCC-IA scheme is better than that of the conventional IA system. Considering the Eb/N0 of 2 dB, the BER of the JSCC-IA schemes with identical and different propagation delays is respectively 10−7 and 10−6, while the conventional IA system can only reach the level of 10−4. When the RGS algorithm is applied, the RGS JSCC-IA scheme can show even better performances. Given the BER of 10−8, the RGS strategy can provide 4 dB Eb/N0 gains over the non-RGS JSCC-IA scheme for the scenario of different propagation delays. Moreover, the gain increases with the raise in Eb/N0, implying that the RGS algorithm can select better grouping combinations.

Like the symmetric networks, we also evaluate the schemes from the perspective of minimal received SINR in order to evaluate the performance of the worst data stream. For the (4 × 4, 1)20 network in Figure 13, the JSCC-IA scheme with identical propagation delay can achieve about 2 dB higher minimal received SINR than the conventional IA system at the same Eb/N0. The RGS algorithm can further improve the performance, and provide an extra gain of 2 to 4 dB over the non-RGS JSCC-IA scheme from the low to high Eb/N0 regimes. The difference between the JSCC-IA schemes with identical and different propagation delays is small at low Eb/N0 regimes, and is no more than 1.5 dB at the high Eb/N0 regimes. Similarly, for the RGS JSCC-IA schemes, the different propagation delays do not have a significant impact on the minimal received SINR, and only yield slight degradation in the high Eb/N0 regimes.

For the (6 × 6, 2)18 network in Figure 14, the total number of data steams is 36, which is much larger than that of the (4 × 4, 1)20 network. The minimal received SINR of the conventional IA system is further degraded by the stronger interference, and the best minimal received SINR is only 14 dB at Eb/N0 =14dB.

On the contrary, the JSCC-IA scheme with identical propagation delay can achieve much higher minimal received SINR, and exhibits a gain of 4 to 6 dB over the conventional IA system from the low to high Eb/N0 regimes. Moreover, the RGS algorithm can further improve the performance, and achieve about 2 dB higher minimal received SINR than the non-RGS JSCC-IA scheme with identical delay at Eb/N0 =14 dB. Although the performance of the JSCC-IA scheme with different propagation delays is inferior to that with the same delay, it still shows higher minimal received SINR than the conventional IA system. In addition, the RGS strategy can improve the performance, and the minimal received SINR of the RGS JSCC-IA system with different delays at Eb/N0 =14 dB is 17 dB, which is about 3 dB higher than that of the conventional IA system. Therefore, the proposed JSCC-IA and RGS JSCC-IA schemes can improve the performance of the worst data stream and reduce of the chance of communication outage.

In addition, we also compare the average received SINR in order to provide a more thorough insight into the JSCC-IA schemes. For the (4 × 4, 1)20 network in Figure 15, the average received SINR of the JSCC-IA and RGS JSCC-IA schemes have almost the same value in the low Eb/N0 regimes, and they exhibit about 2 dB higher average received SINR over the conventional IA system under the same Eb/N0. On the other hand, when Eb/N0 increases, the proposed schemes show even better performances. Considering Eb/N0 = 14 dB, the RGS JSCC-IA schemes with identical and different propagation delays can provide about 4 and 3 dB higher average SINR than the conventional IA system, respectively.

For the (6 × 6, 2)18 network in Figure 16, similar performances can be observed. In the low Eb/N0 regimes, the proposed schemes can achieve about 2.5 dB higher average received SINR than the convention IA scheme. Moreover, the difference of average received SINR between the conventional and the proposed schemes increases with the rise in Eb/N0. For instance, the average SINR at Eb/N0 = 14 dB is 19 dB, 26 dB and 24 dB for the conventional IA scheme, the (RGS) JSCC-IA schemes with identical delay and the (RGS) JSCC-IA schemes with different delays, respectively. Therefore, simulations validate that the proposed JSCC-IA schemes can improve the overall performance of the networks by increasing the averaged received SINR.

To sum up, the proposed JSCC-IA scheme can accomplish better BER and received SINR performances than the conventional IA system, not only in symmetric but also in asymmetric networks. Moreover, the RGS algorithm can search for better grouping combinations and provide further improvement over the non-RGS JSCC-IA scheme in the asymmetric networks.

7. Conclusions and Future Work

In this paper, a novel joint spatial-code clustered IA scheme has been proposed to mitigate the strong interference that cannot be suppressed well by the traditional IA system in large-scale wireless sensor networks with limited antennas. In the proposed JSCC-IA scheme, the users are clustered into several groups, and traditional IA methods such as the Max-SINR algorithm are applied within each group to eliminate the intra-group interference. Moreover, each group is assigned with an exclusive PN code so than the inter-group interference can be mitigated through the orthogonality of the PN codes. The analytical BER expressions of the the proposed JSCC-IA scheme have been formulated in the situations of identical and different propagation delays, respectively. Both of the symmetric and asymmetric networks have been considered, and a random selection grouping algorithm has been introduced to search for better grouping combinations for the latter circumstance. Numerical results have demonstrated that the proposed JSCC-IA scheme outperforms the conventional IA system, and can achieve significantly lower BER and higher received SINR in the situation where the number of users exceeds the IA feasibility constraint.

Perfect CSI is assumed to be available and the signaling feedback strategy is not discussed in this paper. However, in the practical WSNs, the ideal CSI might be difficult to acquire due to the feedback latency, estimation error and so on. In our future work, we will extend our work to the scenario of imperfect CSI to make the proposed scheme more practical. Moreover, we will further investigate the relationship between the grouping combinations and the error performance. We will develop a more intelligent and efficient clustering algorithm to search for even better grouping combinations.

Author Contributions

Z. W. and L. J. conceived the scheme; G. R. performed the experiments; N. Z. analyzed the data; L. J. and Y. Z. wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

Acknowledgments

This research was supported partly by the National Natural Science Foundation of China under Grant No. 61102085 and No. 61201224, Natural Scientific Research Innovation Foundation in Harbin Institute of Technology under No. HIT.NSRIF 201151, China Postdoctoral Science Foundation Special Funded Project under 2013T60282 and the Fundamental Research Funds for the Central Universities under DUT14QY44.

Appendix

Proof of Theorem 1

For convenience, the vectors k and nk(t) are first expanded as follows:

n ^ k = [ n ^ k , 1 , n ^ k , 2 , , n ^ k , N ] T , n k ( t ) = [ n k , 1 ( t ) , n k , 2 ( t ) , , n k , N ( t ) ] T

From Equations (11) and (32), the l-th component of k can be expressed as:

n ^ k , l = 0 T b U k , l H n k ( t ) g k ( t ) d t = 0 T b j = 1 N U k ( j , l ) * n k , j ( t ) g k ( t ) d t .

Since nk,j(t) is a zero-mean AWGN process, the expected value of k,l can be expressed as:

E [ n ^ k , l ] = 0 T b j = 1 N U k ( j , l ) * E [ n k , j ( t ) g k ( t ) ] d t = 0

The variance of k,l can be expressed as:

var [ n ^ k , l ] = E [ | n ^ k , l E [ n ^ k , l ] | 2 ] = E [ n ^ k , l n ^ k , l * ] = E [ 0 T b j = 1 N U k ( j , l ) * n k , j ( t ) g k ( t ) d t 0 T b p = 1 N U k ( p , l ) n k , p * ( τ ) g k ( τ ) d τ ] = j = 1 N p = 1 N U k ( j , l ) * U k ( p , l ) 0 T b 0 T b E [ n k , j ( t ) n k , p * ( τ ) ] g k ( t ) g k ( τ ) dtd τ

When jp, nk,j(t) and nk,p(t) are uncorrelated and we have:

E [ n k , j ( t ) n k , p * ( τ ) ] = 0 , j p

When j = k, as nk,j(t) is an AWGN process with two-sided power spectral density of N0/2 W/Hz, we have:

E [ n k , j ( t ) n k , j * ( τ ) ] = N 0 2 δ ( t τ )

Substitute Equations (A.5) and (A.6) into Equation (A.4), and the variance of k,l can be written as:

var [ n ^ k , l ] = j = 1 N U k ( j , l ) * U k ( j , l ) 0 T b N 0 2 g k ( t ) g k ( t ) d t = N 0 2 E b j = 1 N | | U k ( j , l ) | 2 = N 0 E b / 2

In addition, the real and imaginary parts of k,l share the same distribution, and the expected value and variance of the real part of k,l can be calculated as:

E [ real ( n ^ k , l ) ] = E [ n ^ k , l ] / 2 = 0
var [ real ( n ^ k , l ) ] = var [ n ^ k , l ] / 2 = N 0 E b / 4

References

  1. Rafique, Z.; Seet, B.C.; Al-Anbuky, A. Performance analysis of cooperative virtual MIMO systems for wireless sensor networks. Sensors 2013, 13, 7033–7052. [Google Scholar]
  2. Islam, M.R.; Han, Y.S. Cooperative MIMO communication at wireless sensor network: An error correcting code approach. Sensors 2011, 11, 9887–9903. [Google Scholar]
  3. Sung, H.; Park, S.H.; Lee, K.J.; Lee, I. Linear precoder designs for K-user interference channels. IEEE Trans. Wirel. Commun. 2010, 9, 291–301. [Google Scholar]
  4. Cadambe, V.R.; Jafar, S.A. Interference alignment and degrees of freedom of the K-user interference channel. IEEE Trans. Inf. Theory 2008, 54, 3425–3441. [Google Scholar]
  5. Gou, T.G.; Jafar, S.A. Degrees of freedom of the K user M × N MIMO interference channel. IEEE Trans. Inf. Theory 2010, 56, 6040–6057. [Google Scholar]
  6. El Ayach, O.; Peters, S.W.; Heath, R.W. The feasibility of interference alignment over measured MIMO-OFDM channels. IEEE Trans. Veh. Technol. 2010, 59, 4309–4321. [Google Scholar]
  7. Jin, D.S.; No, J.S.; Shin, D.J. New interference alignment schemes with full and half-duplex relays for the quasi-static X channel. IET Commun. 2014, 8, 351–359. [Google Scholar]
  8. Xu, Y.; Mao, S.W. Stackelberg game for cognitive radio networks with MIMO and distributed interference alignment. IEEE Trans. Veh. Technol. 2014, 63, 879–892. [Google Scholar]
  9. Luo, Y.; Du, H.; Xue, J.; Ratnarajah, T.; Wilcox, D. On the performance of asynchronous ad-hoc networks using interference alignment with renewal process. IET Commun. 2013, 7, 1628–1637. [Google Scholar]
  10. Pandey, P.; Hajimirsadeghi, M.; Pompili, D. Region of feasibility of interference alignment in underwater sensor networks. IEEE J. Ocean. Eng. 2014, 39, 189–202. [Google Scholar]
  11. Yetis, C.M.; Gou, T.; Jafar, S.A.; Kayran, A.H. On feasibility of interference alignment in MIMO interference networks. IEEE Trans. Signal Process 2010, 58, 4771–4782. [Google Scholar]
  12. Halima, S.B.; Saadani, A. Joint clustering and interference alignment for overloaded femtocell networks. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China, 1–4 April 2012; pp. 1229–1233.
  13. Chen, S.; Cheng, R.S. Clustering for interference alignment in multiuser interference network. IEEE Trans. Veh. Technol. 2014, 63, 2613–2624. [Google Scholar]
  14. Soy, H.; Ozdemir, O.; Bayrak, M.; Hamila, R.; Al-Dhahir, N. Decentralized multiuser diversity with opportunistic packet transmission in MIMO wireless sensor networks. AEU-Int. J. Electron. Commun. 2013, 67, 910–925. [Google Scholar]
  15. Yuan, Y.; He, Z.H.; Chen, M. Virtual MIMO-based cross-layer design for wireless sensor networks. IEEE Trans. Veh. Technol. 2006, 55, 856–864. [Google Scholar]
  16. Gao, Q.A.; Zuo, Y.; Zhang, J.; Peng, X.H. Improving energy efficiency in a wireless wensor network by combining cooperative MIMO with data aggregation. IEEE Trans. Veh. Technol. 2010, 59, 3956–3965. [Google Scholar]
  17. Li, B.; Li, H.X.; Wang, W.J.; Yin, Q.Y.; Liu, H. Performance analysis and optimization for energy-efficient cooperative transmission in random wireless sensor network. IEEE Trans. Wirel. Commun. 2013, 12, 4647–4657. [Google Scholar]
  18. Park, J.; Jeong, B.J. Energy-efficient adaptive virtual MIMO transmission in a transmit-side correlated wireless sensor network. IEICE Trans. Commun. 2013, E96B, 976–985. [Google Scholar]
  19. Chung, J.M.; Kim, J.; Han, D. Multihop hybrid virtual MIMO scheme for wireless sensor networks. IEEE Trans. Veh. Technol. 2012, 61, 4069–4078. [Google Scholar]
  20. Zhao, Z.; Yang, G.H.; Liu, Q.; Li, V.O.K.; Cui, L. Implementation and application of a multi-radio wireless sensor networks testbed. IET Wirel. Sens. Syst. 2011, 1, 191–199. [Google Scholar]
  21. Tresch, R.; Guillaud, M.; Riegler, E. On the achievability of interference alignment in the K-user constant MIMO interference channel. Proceedings of the 15th IEEE Workshop on Statistical Signal Processing, Cardiff, Wales, UK, 31 August–3 September 2009; pp. 277–280.
  22. Razaviyayn, M.; Sanjabi, M.; Luo, Z.Q. Linear transceiver design for interference alignment: Complexity and computation. IEEE Trans. Inf. Theory 2012, 58, 2896–2910. [Google Scholar]
  23. Gomadam, K.; Cadambe, V.R.; Jafar, S.A. Approaching the capacity of wireless networks through distributed interference alignment. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), New Orleans, LA, USA, 30 November–4 December 2008; pp. 1–6.
  24. Gomadam, K.; Cadambe, V.R.; Jafar, S.A. A distributed numerical approach to interference alignment and applications to wireless interference networks. IEEE Trans. Inf. Theory 2011, 57, 3309–3322. [Google Scholar]
  25. Sun, C.; Yang, Y.C.; Yuan, Y.X. Low complexity interference alignment algorithms for desired signal power maximization problem of MIMO channels. EURASIP J. Adv. Signal Process 2012, 2012, 1–13. [Google Scholar]
  26. Shrestha, R.; Bae, I.; Kim, J.M. A leakage-based solution for interference alignment in MIMO interference channel networks. KSII Trans. Internet Inf. Syst. 2014, 8, 424–442. [Google Scholar]
  27. Zhao, N.; Yu, F.R.; Sun, H.; Nallanathan, A.; Yin, H. A novel interference alignment scheme based on sequential antenna switching in wireless networks. IEEE Trans. Wirel. Commun. 2013, 12, 5008–5021. [Google Scholar]
  28. De Kerret, P.; Gesbert, D. CSI sharing strategies for transmitter cooperation in wireless networks. IEEE Wirel. Commun. 2013, 20, 43–49. [Google Scholar]
  29. Cho, S.; Huang, K.; Kim, D.K.; Lau, V.K.; Chae, H.; Seo, H.; Kim, B.H. Feedback-topology designs for interference alignment in MIMO interference channels. IEEE Trans. Signal Process 2012, 60, 6561–6575. [Google Scholar]
  30. Ayach, O.E.; Heath, R.W. Interference aignment with analog channel state feedback. IEEE Trans. Wirel. Commun. 2012, 11, 626–636. [Google Scholar]
  31. Zhang, L.; Song, L.; Ma, M.; Zhang, Z.; Lei, M.; Jiao, B. Interference alignment with differential feedback. IEEE Trans. Veh. Technol. 2012, 61, 2878–2883. [Google Scholar]
  32. El Ayach, O.; Lozano, A.; Heath, R.W. On the overhead of interference alignment: Training, feedback, and cooperation. IEEE Trans. Wirel. Commun. 2012, 11, 4192–4203. [Google Scholar]
  33. Nan, Z.; Yu, F.R.; Hongjian, S.; Hongxi, Y.; Nallanathan, A. Interference alignment based on channel prediction with delayed channel state information. Proceedings of the IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December 2012; pp. 4244–4248.
  34. Abu-Rgheff, M.A. Introduction to CDMA Wireless Communications, 1st ed.; Academic Press: London, UK, 2007. [Google Scholar]
  35. Sklar, B. Digtal Communications: Fundamentals and Applications, 2nd ed.; Prentice Hall: Upper Saddle River, NJ, USA, 2001. [Google Scholar]
  36. Han, X.; Cao, X.; Lloyd, E.L.; Shen, C.C. Fault-tolerant relay node placement in heterogeneous wireless sensor networks. IEEE Trans. Mob. Comput. 2010, 9, 643–656. [Google Scholar]
  37. Hou, Y.T.; Shi, Y.; Sherali, H.D.; Midkiff, S.F. On energy provisioning and relay node placement for wireless sensor networks. IEEE Trans. Wirel. Commun. 2005, 4, 2579–2590. [Google Scholar]
  38. Gonzalez, O.; Lameiro, C.; Santamaria, I. A quadratically convergent method for interference alignment in MIMO interference channels. IEEE Signal Process. Lett. 2014, 21, 1423–1427. [Google Scholar]
Figure 1. The BPSK transmission system in the K-user MIMO interference channel.
Figure 1. The BPSK transmission system in the K-user MIMO interference channel.
Sensors 15 01964f1 1024
Figure 2. The JSCC-IA scheme with G groups and K0 users in each group.
Figure 2. The JSCC-IA scheme with G groups and K0 users in each group.
Sensors 15 01964f2 1024
Figure 3. The propagation delay between two users.
Figure 3. The propagation delay between two users.
Sensors 15 01964f3 1024
Figure 4. The average theoretical and experimental BER performances of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)10 symmetric networks.
Figure 4. The average theoretical and experimental BER performances of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)10 symmetric networks.
Sensors 15 01964f4 1024
Figure 5. The average experimental BER performances of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)20 symmetric networks.
Figure 5. The average experimental BER performances of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)20 symmetric networks.
Sensors 15 01964f5 1024
Figure 6. The average experimental BER performances of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (6 × 6, 2)18 symmetric networks.
Figure 6. The average experimental BER performances of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (6 × 6, 2)18 symmetric networks.
Sensors 15 01964f6 1024
Figure 7. The average minimal received SINR of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)20 symmetric networks.
Figure 7. The average minimal received SINR of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)20 symmetric networks.
Sensors 15 01964f7 1024
Figure 8. The average minimal received SINR of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (6 × 6, 2)18 symmetric networks.
Figure 8. The average minimal received SINR of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (6 × 6, 2)18 symmetric networks.
Sensors 15 01964f8 1024
Figure 9. The average received SINR of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)20 symmetric networks.
Figure 9. The average received SINR of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)20 symmetric networks.
Sensors 15 01964f9 1024
Figure 10. The average received SINR of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (6 × 6, 2)18 symmetric networks.
Figure 10. The average received SINR of the conventional IA scheme and the JSCC-IA schemes with identical/different propagation delays in the (6 × 6, 2)18 symmetric networks.
Sensors 15 01964f10 1024
Figure 11. The average experimental BER performances of the conventional IA scheme, the JSCC-IA schemes with identical/different propagation delays and the RGS JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)20 asymmetric networks.
Figure 11. The average experimental BER performances of the conventional IA scheme, the JSCC-IA schemes with identical/different propagation delays and the RGS JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)20 asymmetric networks.
Sensors 15 01964f11 1024
Figure 12. The average experimental BER performances of the conventional IA scheme, the JSCC-IA schemes with identical/different propagation delays and the RGS JSCC-IA schemes with identical/different propagation delays in the (6 × 6, 2)18 asymmetric networks.
Figure 12. The average experimental BER performances of the conventional IA scheme, the JSCC-IA schemes with identical/different propagation delays and the RGS JSCC-IA schemes with identical/different propagation delays in the (6 × 6, 2)18 asymmetric networks.
Sensors 15 01964f12 1024
Figure 13. The average minimal received SINR of the conventional IA scheme, the JSCC-IA schemes with identical/different propagation delays and the RGS JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)20 asymmetric networks.
Figure 13. The average minimal received SINR of the conventional IA scheme, the JSCC-IA schemes with identical/different propagation delays and the RGS JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)20 asymmetric networks.
Sensors 15 01964f13 1024
Figure 14. The average minimal received SINR of the conventional IA scheme, the JSCC-IA schemes with identical/different propagation delays and the RGS JSCC-IA schemes with identical/different propagation delays in the (6 × 6, 2)18 asymmetric networks.
Figure 14. The average minimal received SINR of the conventional IA scheme, the JSCC-IA schemes with identical/different propagation delays and the RGS JSCC-IA schemes with identical/different propagation delays in the (6 × 6, 2)18 asymmetric networks.
Sensors 15 01964f14 1024
Figure 15. The average received SINR of the conventional IA scheme, the JSCC-IA schemes with identical/different propagation delays and the RGS JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)20 asymmetric networks.
Figure 15. The average received SINR of the conventional IA scheme, the JSCC-IA schemes with identical/different propagation delays and the RGS JSCC-IA schemes with identical/different propagation delays in the (4 × 4, 1)20 asymmetric networks.
Sensors 15 01964f15 1024
Figure 16. The average received SINR of the conventional IA scheme, the JSCC-IA schemes with identical/different propagation delays and the RGS JSCC-IA schemes with identical/different propagation delays in the (6 × 6, 2)18 asymmetric networks.
Figure 16. The average received SINR of the conventional IA scheme, the JSCC-IA schemes with identical/different propagation delays and the RGS JSCC-IA schemes with identical/different propagation delays in the (6 × 6, 2)18 asymmetric networks.
Sensors 15 01964f16 1024
Table 1. The number of overall complex multiplications required by the RGS and BFS algorithms.
Table 1. The number of overall complex multiplications required by the RGS and BFS algorithms.
(M,K,d,K0,G)CBFS1CBFS2CRGS1CRGS2CRGS1/CBFS1CRGS2/CBFS2
(2,6,1,2,3)5.51×1047.94 × 1041.22 × 1041.76 × 1042.22 × 10−12.22 × 10−1
(2,8,1,2,4)2.42 × 1063.69 × 1061.92 × 1042.93 × 1047.94 × 10−37.94 × 10−3
(2,10,1,2,5)1.56 × 1082.48 × 1082.76 × 1044.38 × 1041.76 × 10−41.76 × 10−4
(4,10,1,5,2)2.98 × 1063.50 × 1062.36 × 1052.78 × 1057.94 × 10−27.94 × 10−2
(4,15,1,5,3)1.47 × 10101.84 × 10103.89 × 1054.86 × 1052.64 × 10−52.64 × 10−5
(4,20,1,5,4)3.31 × 10144.34 × 10145.65 × 1057.40 × 1051.70 × 10−91.70 × 10−9
(4,25,1,5,5)2.38 × 10193.24 × 10197.63 × 1051.04 × 1063.21 × 10−143.21 × 10−14
(4,8,2,2,4)5.06 × 1076.36 × 1074.02 × 1055.05 × 1057.94 × 10−37.94 × 10−3
(4,10,2,2,5)3.06 × 1094.00 × 1095.39 × 1057.05 × 1051.76 × 10−41.76 × 10−4

Share and Cite

MDPI and ACS Style

Wu, Z.; Jiang, L.; Ren, G.; Zhao, N.; Zhao, Y. A Novel Joint Spatial-Code Clustered Interference Alignment Scheme for Large-Scale Wireless Sensor Networks. Sensors 2015, 15, 1964-1997. https://doi.org/10.3390/s150101964

AMA Style

Wu Z, Jiang L, Ren G, Zhao N, Zhao Y. A Novel Joint Spatial-Code Clustered Interference Alignment Scheme for Large-Scale Wireless Sensor Networks. Sensors. 2015; 15(1):1964-1997. https://doi.org/10.3390/s150101964

Chicago/Turabian Style

Wu, Zhilu, Lihui Jiang, Guanghui Ren, Nan Zhao, and Yaqin Zhao. 2015. "A Novel Joint Spatial-Code Clustered Interference Alignment Scheme for Large-Scale Wireless Sensor Networks" Sensors 15, no. 1: 1964-1997. https://doi.org/10.3390/s150101964

APA Style

Wu, Z., Jiang, L., Ren, G., Zhao, N., & Zhao, Y. (2015). A Novel Joint Spatial-Code Clustered Interference Alignment Scheme for Large-Scale Wireless Sensor Networks. Sensors, 15(1), 1964-1997. https://doi.org/10.3390/s150101964

Article Metrics

Back to TopTop