Next Article in Journal
Research on Parameter Estimation Methods for Alpha Stable Noise in a Laser Gyroscope’s Random Error
Previous Article in Journal
Temporal and Spatial Denoising of Depth Maps
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Rapid Convergent Low Complexity Interference Alignment Algorithm for Wireless Sensor Networks

1
School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin 150001, China
2
School of Instrumentation Science and Opto-electronics Engineering, Beihang University, Beijing 100191, China
3
School of Information and Communication Engineering, Dalian University of Technology, Dalian 116024, China
*
Author to whom correspondence should be addressed.
Sensors 2015, 15(8), 18526-18549; https://doi.org/10.3390/s150818526
Submission received: 9 April 2015 / Revised: 29 June 2015 / Accepted: 23 July 2015 / Published: 29 July 2015
(This article belongs to the Section Sensor Networks)

Abstract

:
Interference alignment (IA) is a novel technique that can effectively eliminate the interference and approach the sum capacity of wireless sensor networks (WSNs) when the signal-to-noise ratio (SNR) is high, by casting the desired signal and interference into different signal subspaces. The traditional alternating minimization interference leakage (AMIL) algorithm for IA shows good performance in high SNR regimes, however, the complexity of the AMIL algorithm increases dramatically as the number of users and antennas increases, posing limits to its applications in the practical systems. In this paper, a novel IA algorithm, called directional quartic optimal (DQO) algorithm, is proposed to minimize the interference leakage with rapid convergence and low complexity. The properties of the AMIL algorithm are investigated, and it is discovered that the difference between the two consecutive iteration results of the AMIL algorithm will approximately point to the convergence solution when the precoding and decoding matrices obtained from the intermediate iterations are sufficiently close to their convergence values. Based on this important property, the proposed DQO algorithm employs the line search procedure so that it can converge to the destination directly. In addition, the optimal step size can be determined analytically by optimizing a quartic function. Numerical results show that the proposed DQO algorithm can suppress the interference leakage more rapidly than the traditional AMIL algorithm, and can achieve the same level of sum rate as that of AMIL algorithm with far less iterations and execution time.

1. Introduction

Wireless sensor networks (WSNs) have received considerable attention, and have been applied to a large number of scenarios in recent years [1]. With the growth in network scale, interference management has become one of the major challenges in WSNs where multiple users often share some common resources simultaneously and high data rates are often demanded. A large amount of research has focused on interference management techniques in order to increase the sum rate of the system [2,3,4,5]. One recent interesting interference management scheme that can approach the channel capacity is interference alignment (IA), which was firstly studied by Maddah-Ali et al. [6] as well as Jafar and Shamai [7] for the multiple-input and multiple-output (MIMO) X channel. Subsequently, Cadambe and Jafar [8] proved that the throughput of the system varies linearly with the number of users in high signal-to-noise ratio (SNR) regimes by employing IA. In addition, the degrees of freedom (DoFs), which serve as one key measure of the channel capacity, were studied by Lee et al. [9] in the case of the MIMO Y channel and by Cadambe and Jafar [10] in the case of relay networks. Thanks to its bright prospects IA has been extended to use in many scenarios such as OFDM systems [11], femtocell networks [12], and cognitive networks [13,14]. In particular, Wu et al. [15] have leveraged the IA technique to mitigate the strong interference in large scale WSNs. In heterogeneous networks, Sharma et al. [16] have proposed a novel spectral coexistence mechanism which takes advantage of the IA technique.
Essentially, achieving IA is to design proper transmitting precoding matrices V to align the desired signal and interference to different signal subspaces, and to design proper receiving decoding matrices U to eliminate the interference at each receiver [17]. Tresch et al. [18] have developed closed-form solutions to IA for the MIMO interference channel with M + 1 users, one degree of freedom, M transmitting antennas, and M receiving antennas. However, the closed-form solutions to IA remain unknown except for some special situations [19]. Peters and Heath [20] have shown that it is difficult to formulate the closed-form solutions of V and U in the situation of more than three users. In addition, Razaviyayn et al. [21] have also shown that searching the optimal V and U is a nonconvex problem. Ma et al. [22] have performed a deep analysis on the computational complexity of interference alignment, and shown that the problem becomes NP-hard when the number of antennas at each node is larger than two. Therefore, many researchers [20,21,22,23,24,25,26] have focused on numerical methods to find the suboptimal V and U. Gomadam et al. [23] have leveraged the channel reciprocity and proposed the alternating minimization interference leakage (AMIL) and Max-SINR algorithms, which only require local channel state information (CSI). It has been shown by Xu et al. [27] that the AMIL and Max-SINR algorithms show close multiplexing gains in high SNR regimes and the former approach has lower complexity than the latter one. A similar alternating minimization IA algorithm has been proposed in [20] without assuming the network reciprocity. Shen et al. [24] have developed the minimum mean square error (MMSE) IA algorithm for the case of imperfect CSI. A sequential antenna switch algorithm was proposed in [28], in which the quality of service of the IA system was considered.
Among these methods, the AMIL algorithm can suppress the interference leakage to a low level and thus can achieve high throughput in high SNR regimes where the sum rate of the system is determined by interference instead of noise. However, it might take a large number of iterations as well as long computational time in the case of large numbers of users and antennas. Furthermore, for the reason that CSI is time-variable, the practical IA system has limited computational time, which will certainly become the bottleneck of the implementation of AMIL algorithm when there are plenty of users and antennas. In this paper, we investigate the properties of the AMIL algorithm, and discover that the difference between the consecutive iteration results of the AMIL algorithm will approximately point to the convergence solution when the precoding and decoding matrices obtained from the intermediate iterations are sufficiently close to their convergence values. Based on this property, we propose a rapidly convergent low-complexity IA algorithm, i.e., directional quartic optimal (DQO) algorithm. It leverages a line search (LS) optimization method, which iteratively generates searching directions and optimal step sizes. The searching direction is obtained by subtracting the consecutive results of AMIL algorithm, and the optimal step size is calculated by solving a quartic optimization problem.
The rest of the paper is organized as follows: in Section 2, we describe the system model. The properties of the AMIL algorithm are studied in Section 3, which will serve as the foundation of the algorithm proposed later. In Section 4, the DQO algorithm is proposed, and the corresponding procedure, optimal step size calculation, and complexity analysis are provided. Numerical results to evaluate the proposed algorithm are presented and discussed in Section 5. Finally, the paper is concluded in Section 6. As far as the notation used in the paper is concerned, we employ (M × N, d)K to represent a K-user MIMO interference channel where each user wishes to transmit d data streams with M transmitting antennas and N receiving antennas. We use C, R, CM×N, I, and CN(μ, σ2) to represent the complex domain, the real domain, the M × N complex matrix, the identity matrix, and the complex Gaussian distribution with mean μ and variance σ2, respectively. Re{a} denotes the real part of scalar a. AT, A*, AH, ||A||, Tr[A] and A*(l) mean the transpose, the conjugate, the conjugate transpose, the Frobenius norm, the trace and the l-th column of matrix A, respectively. eigl[A] stands for the eigenvector associated with the l-th smallest eigenvalue of matrix A. We employ Ai to represent the value of A at the i-th iterations. diag(a1, a2, ..., am) represents a diagonal matrix with its diagonal elements equal to a1, a2, …, am.

2. System Model

In this paper, the (M × N, d)K MIMO interference channel is considered, and is depicted in Figure 1. The received signal of the k-th user can be represented as [23]:
Y k = l = 1 K H k l V l s l + n k , k 1 , 2 , ... , K
where sk ∈ Cd×1, Vk ∈ CM×d, and Yk ∈ CN×1 denote the data vector, the precoding matrix, and the received signal vector of the k-th user, respectively; nk ∈ CN×1 represents the noise vector with distribution of CN(0, σ2) for each element; Hkl ∈ CN×M represents the channel matrix from transmitter l to receiver k. In the network we considered, CSI is obtained through CSI feedback, which serves as one critical technique in IA. A large number of researchers such as Ayach [29], Cho [30], and Zhang [31] have focused on the CSI feedback strategy. Since we mainly focus on designing the precoding and decoding matrices, further investigation on CSI feedback is beyond the scope of the paper and an accurate global CSI is assumed to be available at each node throughout this paper.
Figure 1. System model of the K-user MIMO interference channel.
Figure 1. System model of the K-user MIMO interference channel.
Sensors 15 18526 g001
The k-th user’s covariance matrices of the forward and reciprocal networks are respectively given by:
Q k = l = 1 , l k K P l d H k l V l V l H H k l H
Q k = l = 1 , l k K P l d H l k H U l U l H H l k
where Pl and P denote the transmitting power of the l-th user in the forward and the reciprocal networks, respectively. Then the interference leakage at receiver k can be calculated as:
L k = Tr [ U k H Q k U k ]
where Uk ∈ CN×d is the decoding matrix at receiver k. The total interference leakage is defined as the sum of the leakage at each receiver, i.e.,:
L = k = 1 K L k
Then the minimal interference leakage problem is to design proper transmitting precoding matrices V and receiving decoding matrices U to minimize Equation (5) under the following constraints:
rank ( U k H H k k V k ) = d
V k H V k = I , U k H U k = I
The former constraint guarantees the feasibility of the desired signal reconstruction and the later one ensures the uniqueness of the IA solution [17].

3. Properties of AMIL Algorithm

The AMIL algorithm, whose procedure is summarized in Algorithm 1, was proposed by Gomadam et al. [23] to find the IA solution by exploiting the channel reciprocity. In this section, we investigate the properties of the AMIL algorithm, and show that the difference of the consecutive iteration results of AMIL algorithm will approximately point to the convergence solution when the precoding and decoding matrices obtained from the intermediate iterations are sufficiently close to their convergence values. This interesting property will serve as the foundation of the algorithm proposed later.
Algorithm 1 AMIL Algorithm
  • Initialize Lth, Imax, and V k 0 , with ( V k 0 ) H V k 0 =I (k = 1, 2,…, K).
  • i = 0.
  • Repeat
  • i = i + 1
  • (VU-step):Calculate Q k i according to Equation (2). Update U k i so that
  • U k(l) i = eig l [ Q k i ],l=1,2,..,d.
  • (UV-step):Calculate Q k i according to Equation (3). Update V k i so that
  • V k(l) i = eig l [ Q k i ],l=1,2,..,d.
  • Calculate the interference leakage L according to Equation (5).
  • Until L < Lth or i > Imax.
As shown in Algorithm 1, the AMIL algorithm calculates the optimal decoding matrices U by fixing V in the forward channel, and computes the optimal V by fixing U in the reciprocal channel. It can monotonously suppress the interference leakage, and has been proved to converge to a local minimum. Although the convergence point is not guaranteed to be the optimal IA solution, it has been verified numerically that in many cases AMIL algorithm can achieve a low interference leakage level after sufficient iterations. Therefore, in high SNR regimes, where the sum rate is limited by interference rather than noise, the AMIL algorithm serves as a good method to increase the sum rate. In addition, the procedure of alternating minimization is very effective, and is often employed by many other algorithms. In spite of this, the iterations as well as time required by AMIL algorithm to reach a certain level of interference leakage increase dramatically with the number of users and antennas. Therefore, the properties of AMIL algorithm are studied in order to figure out a way to increase the convergence rate and thus to reduce its complexity as well as the required computational time.
Throughout this paper, V k i ∈ CM×d and U k i ∈ CN×d are employed to represent the k-th user’s precoding and decoding matrices obtained from the i-th iteration, respectively. The convergence value of V k i and U k i are defined as V ˜ k and U ˜ k , respectively. Define Δ V k i ∈ CM×d as the deviation from V k i to V ˜ k , and Δ U k i ∈ CN×d as the deviation from U k i to U ˜ k so that:
V k i = V ˜ k + Δ V k i
U k i = U ˜ k + Δ U k i
Define V ¯ i , V ˜ ¯ , Δ V ¯ i ∈ CMdK×1 and U ¯ i , U ˜ ¯ , Δ U ¯ i ∈ CNdK×1 as:
V ¯ i = [ V 1 ( 1 ) i V 1 ( 2 ) i ... V 1 ( d ) i ... V K ( 1 ) i V K ( 2 ) i ... V K ( d ) i ] , V ˜ ¯ = [ V ˜ 1 ( 1 ) V ˜ 1 ( 2 ) ... V ˜ 1 ( d ) ... V ˜ K ( 1 ) V ˜ K ( 2 ) ... V ˜ K ( d ) ] , Δ V ¯ i = [ Δ V 1 ( 1 ) i Δ V 1 ( 2 ) i ... Δ V 1 ( d ) i ... Δ V K ( 1 ) i Δ V K ( 2 ) i ... Δ V K ( d ) i ] , U ¯ i = [ U 1 ( 1 ) i U 1 ( 2 ) i ... U 1 ( d ) i ... U K ( 1 ) i U K ( 2 ) i ... U K ( d ) i ] , U ˜ ¯ = [ U ˜ 1 ( 1 ) U ˜ 1 ( 2 ) ... U ˜ 1 ( d ) ... U ˜ K ( 1 ) U ˜ K ( 2 ) ... U ˜ K ( d ) ] , Δ U ¯ i = [ Δ U 1 ( 1 ) i Δ U 1 ( 2 ) i ... Δ U 1 ( d ) i ... Δ U K ( 1 ) i Δ U K ( 2 ) i ... Δ U K ( d ) i ]
From Equations (8) and (9), it can be obtained that:
V ¯ i = V ˜ ¯ + Δ V ¯ i
U ¯ i = U ˜ ¯ + Δ U ¯ i
The investigation begins with the linear transformation property of AMIL algorithm as follows:
Theorem 1.
If AMIL algorithm can converge to a point where the interference leakage is very small, there exist fixed linear transformations TV and TU, which do not change with iterations. When V ¯ i and U ¯ i are sufficiently close to V ˜ ¯ and U ˜ ¯ , respectively, the deviations of the (i + 1)-th iteration can be approximated as follows:
Δ V ¯ i + 1 T V Δ V ¯ i
Δ U ¯ i + 1 T U Δ U ¯ i
Proof of Theorem 1.
In the situation when AMIL algorithm converges to a point where the interference leakage is very small, which is easy to achieve for AMIL algorithm, we have:
U ˜ j H H j i V ˜ i 0 , j i
Define the interference covariance matrices at the convergence point as:
Q ˜ k = j = 1 , j k K H k j V ˜ j V ˜ j H H k j H
Q ˜ k = j = 1 , j k K H j k H U ˜ j U ˜ j H H j k
Assume that the l-th smallest eigenvalue and the associated eigenvector of Q ˜ k are λ k , l and ν k , l , respectively. Similarly for Q ˜ k , we have λ k , l and ν k , l . From the procedure of AMIL algorithm, V ˜ k and U ˜ k should be the eigenvectors corresponding to the d smallest eigenvalues of Q ˜ k and Q ˜ k , respectively. Therefore, V ˜ k and U ˜ k can be respectively given by:
V ˜ k = [ ν k , 1 , ν k , 2 , ... , ν k , d ]
U ˜ k = [ ν k , 1 , ν k , 2 , ... , ν k , d ]
At the (i + 1)-th iteration, the VU-step of AMIL algorithm is performed on the precoding matrices { V k i } and covariance matrix at the (i + 1)-th iteration can be expressed as:
Q k i + 1 = j = 1 , j k K H k j V j i V j i H H k j H = j = 1 , j k K H k j [ V ˜ j + Δ V j i ] [ V ˜ j + Δ V j i ] H H k j H = Q ˜ k + Δ Q k i + 1
where Δ Q k i + 1 is given by:
Δ Q k i + 1   = j = 1 , j k K H k j [ Δ V j i V ˜ j H + V ˜ j Δ V j i H + Δ V j i Δ V j i H ] H k j H
When V ¯ i and U ¯ i are sufficiently close to V ˜ ¯ and U ˜ ¯ respectively, the deviation Δ V j i is very small. Therefore, the high order term Δ V j i Δ V j i H can be ignored, and Equation (21) can be simplified as:
Δ Q k i + 1   j = 1 , j k K H k j [ Δ V j i V ˜ j H + V ˜ j Δ V j i H ] H k j H
According to the AMIL algorithm, U k i + 1 should be the eigenvector corresponding to the d smallest eigenvalues of Q k i + 1 . From Equations (19) and (20), using the Eigenvalue Perturbation Theory, the l-th column of U k i + 1 can be approximated by:
U k ( l ) i + 1 ν k , l + j = 1 , j l N ν k , j H Δ Q k i + 1 ν k , l λ k , l λ k , j ν k , j = U ˜ k ( l ) + j = 1 , j l N ν k , j H Δ Q k i + 1 U ˜ k ( l ) λ k , l λ k , j ν k , j = U ˜ k ( l ) + Δ U k ( l ) i + 1
where Δ U k ( l ) i + 1 is given by:
Δ U k ( l ) i + 1 = j = 1 , j l N ν k , j H Δ Q k i + 1 U ˜ k ( l ) λ k , l λ k , j ν k , j
Substitute Equation (22) into (24), and Δ U k ( l ) i + 1 can be rewritten as:
Δ U k ( l ) i + 1   j = 1 , j l N 1 λ k , l λ k , j ν k , j H { r = 1 , r k K H k r   [ Δ V r i V ˜ r H + V ˜ r Δ V r i H ] H k r H } U ˜ k ( l ) ν k , j
From Equation (15), the terms V ˜ r H H k r H U ˜ k ( l ) in Equation (25) is approximately zero and thus can be omitted. Therefore, Equation (25) can be simplified as:
Δ U k ( l ) i + 1 j = 1 , j l N ν k , j H r = 1 , r k K H k r V ˜ r Δ V r i H H k r H U ˜ k ( l ) λ k , l λ k , j ν k , j
From Equation (26), it can be seen that Δ U k ( l ) i + 1 is approximately the linear combination of the elements of ( Δ V r i ) , and the coefficients of the combination are corresponding to ν k , j H , H k r , V ˜ r , U ˜ k and λ k , j , which are fixed and do not vary with iterations i. Hence there exists a fixed matrix TVU ∈ CNKd × MKd which does not change with iterations, so that:
Δ U ¯ i + 1 T VU ( Δ V ¯ i )
Similarly for the UV-step, there exists a fixed matrix TUV ∈ CMKd × NKd which does not change with iterations, so that:
Δ V ¯ i + 1 T UV ( Δ U ¯ i + 1 )
From Equations (27) and (28), we have:
Δ V ¯ i + 1 T UV T VU Δ V ¯ i = T V Δ V ¯ i
Δ U ¯ i + 1 T VU T UV Δ U ¯ i = T U Δ U ¯ i
where:
T V = T UV T VU M K d × M K d
T U = T VU T UV N K d × N K d
It can be seen that TV and TU determine the properties of AMIL algorithm when the current point is sufficiently close to its convergence value. As the analytical forms of TV and TU are extremely complex, the features of these two transformations are investigated by simulation and one interesting property observed is given as follows:
Property 1.
In the case of (M × M, d)K channel, there exist two nonsingular matrices PV and PU, so that TV and TU can be expressed as:
T V = P V 1 Λ P V
T U = P U 1 Λ P U
where Λ = diag(κ1, κ2,…, κMKd) with κ1 > κ2 ... > κr and κr + 1 = κr + 2 = ... = κMKd = 0 (1 < r < KMd).
Based on the properties above, we further study the situation when consecutive applications of TV and TU are exerted on the deviation, and come to the following theorem.
Theorem 2.
In the (M × M, d)K channel, if AMIL algorithm can converge to a point where the interference leakage is very small, the convergence solutions V ˜ k and U ˜ k (k = 1, 2, ..., K) can be approximated by the following Equations (35) and (36), when V k i and U k i are sufficiently close to V ˜ k and U ˜ k , respectively :
V ˜ k V k i + t ( V k i V k i 1 ) , t
U ˜ k U k i + t ( U k i U k i 1 )
Proof of Theorem 2.
At the (i + i1)-th iteration, from Equations (29), (30), (33) and (34), we have:
Δ V ¯ i + i 1 T V i 1 Δ V ¯ i = P V 1 Λ i 1 P V Δ V ¯ i = P V 1 d i a g ( κ 1 i 1 , κ 2 i 1 , ... , κ M K d i 1 ) P V Δ V ¯ i
Δ U ¯ i + i 1 T U i 1 Δ U ¯ i = P U 1 Λ i 1 P U Δ U ¯ i = P U 1 d i a g ( κ 1 i 1 , κ 2 i 1 , ... , κ M K d i 1 ) P U Δ U ¯ i
Define ek, gk ∈ CMKd×1 and fk, sk ∈ C so that:
P V 1 = [ e 1 , e 2 , ... , e M K d ]
P U 1 = [ g 1 , g 2 , ... , g M K d ]
P V Δ V ¯ i = [ f 1 , f 2 , ... , f M K d ] T
P U Δ U ¯ i = [ h 1 , h 2 , ... , h M K d ] T
Thus Equations (37) and (38) can be written as:
Δ V ¯ i + i 1 j = 1 M K d κ j i 1 f j e j
Δ U ¯ i + i 1 j = 1 M K d κ j i 1 h j g j
According to Property 1, when i1 is large enough, it can be obtained that:
κ 1 i 1 κ 2 i 1 ... κ r i 1 , κ r + 1 i 1 = κ r + 2 i 1 = ... = κ M K d i 1 = 0
Therefore, Equations (43) and (44) can be approximated by:
Δ V ¯ i + i 1 κ 1 i 1 f 1 e 1
Δ U ¯ i + i 1 κ 1 i 1 h 1 g 1
At the (i + i1 + 1)-th iteration, it can be obtained that:
Δ V ¯ i + i 1 + 1 κ 1 i 1 + 1 f 1 e 1 κ 1 Δ V ¯ i + i 1
Δ U ¯ i + i 1 + 1 κ 1 i 1 + 1 h 1 g 1 κ 1 Δ U ¯ i + i 1
From Equations (11), (12), (48) and (49), we have:
V ˜ ¯ = V ¯ i + i 1 + 1 Δ V ¯ i + i 1 + 1 V ¯ i + i 1 + 1 + κ 1 1 κ 1 ( Δ V ¯ i + i 1 + 1 Δ V ¯ i + i 1 )
U ˜ ¯   = U ¯ i + i 1 + 1 Δ U ¯ i + i 1 + 1   U ¯ i + i 1 + 1 + κ 1 1 κ 1 ( Δ U ¯ i + i 1 + 1 Δ U ¯ i + i 1 )
Define t = κ1/(1 − κ1) ∈ R and replace i + i1 + 1 with i, it can be obtained that:
V ˜ ¯ V ¯ i + t ( Δ V ¯ i Δ V ¯ i 1 ) = V ¯ i + t ( V ¯ i V ¯ i 1 )
U ˜ ¯ U ¯ i + t ( Δ U ¯ i Δ U ¯ i 1 ) = U ¯ i + t ( U ¯ i U ¯ i 1 )
Substituting Equations (10) into Equations (52) and (53), then Equations (35) and (36) can be obtained. Therefore the difference between the consecutive iteration results of AMIL algorithm, i.e., V k i V k i 1 and U k i U k i 1 will approximately point to their convergence values V ˜ k and U ˜ k , when V k i and U k i are sufficiently close to V ˜ k and U ˜ k , respectively.
Theorem 2 provides an enlightenment to reach the convergence point more rapidly. Instead of going along the circuitous route of VU-step and UV-step of AMIL algorithm, we can approach the destination more directly by searching along the new direction, i.e., V k i V k i 1 and U k i U k i 1 .This interesting discovery inspires us to propose the rapid convergent IA algorithm which will be shown in the next section.

4. Directional Quartic Optimal Algorithm

The traditional AMIL algorithm suffers from high complexity when there are plenty of users and antennas. The large number of iterations and long computational time required by the AMIL algorithm limit its application to practical IA systems where the CSI is always changing. Therefore, a high efficiency algorithm is needed to reduce the computational cost. In this section, we focus on a rapid convergent low-complexity IA approach, and propose the DQO algorithm. As shown in Section 3, the direction attained from the difference of the consecutive iteration results of the AMIL algorithm serves as a good searching direction, through which we can go to the convergence point almost directly. In addition, the optimal step size can be calculated by solving a quartic optimization problem. In this section, the details of the proposed algorithm are provided, and the associated computational complexity is analyzed.

4.1. The Procedure of DQO Algorithm

The procedure of DQO algorithm is summarized in Algorithm 2. The framework of DQO algorithm is based on the AMIL algorithm, and the LS procedure is added. In the initial phase of DQO algorithm, it operates just like the AMIL algorithm. The VU and UV steps are executed, and the interference leakage L is evaluated in each iteration. When L is smaller than the preset threshold th1, as shown in the 21-th line of Algorithm 2, the variable flag is set and the current number of iterations is recorded as ib, indicating that the current point is close enough to the convergence value and the LS procedure can be implemented. Notice that flag and ib are updated only once and will remain unchanged afterward. After flag is set, the algorithm will execute the LS procedure every interval iterations, as shown in the 10-th line. The LS procedure cannot be carried out in every iteration for the reason that the approximations Equations (46) and (47) can be attained only when i1 is large enough.
Algorithm 2 DQO Algorithm
  • Initialize V k 0 , with ( V k 0 ) H V k 0 =I (k = 1, 2,…, K).
  • Initialize parameters: th1, th2 (th2 < th1), Imax, and interval.
  • Set flag = 0, i = 0, and ib = 0.
  • Repeat
  • i = i + 1.
  • (VU-step):Calculate Q k i according to Equation (2). Update U k i so that
  • U k(l) i = eig l [ Q k i ],l=1,2,..,d.
  • (UV-step):Calculate Q k i according to Equation (3). Update V k i so that
  • V k(l) i = eig l [ Q k i ],l=1,2,..,d.
  • If flag = 1 and (i ib) mod interval = 0, execute the LS procedure as:
  • (a) Calculate the new iteration direction as:
  • Δ U k = U k i U k i1
  • Δ V k = V k i V k i1
  • (b) Calculate the optimal step size t*.
  • (c) Update V k i and U k i as:
  • U k i U k i + t * Δ U k
  • V k i V k i + t * Δ V k
  • (d) Normalize each column of V k i and U k i .
  • else
  • Calculate the interference leakage L according to Equation (5)
  • If th2 < L < th1 and flag =0
  • Set flag = 1 and ib = i.
  • end if.
  • end if.
  • Until L < th2 or i > Imax.
Therefore, it has to take several UV and VU steps before κ 1 i 1 takes the dominant proposition so that Equations (35) and (36) hold. As a result, the parameter interval cannot be set to be one, and it will be further validated by simulation in Section 5.1. During each LS procedure, the new direction is calculated by subtracting the consecutive iteration results. The optimal step size t* can be obtained by solving a quartic optimization problem, and the associated details will be provided in Section 4.2. The new precoders and decoders are updated as the 16-th and 17-th lines. To guarantee the unit norm of the precoders and decoders, we normalize each column of U and V in the 18-th line. The algorithm will stop when the interference leakage is smaller than the objective threshold th2 or the maximal iterations number Imax is reached.

4.2. Optimal Step Size Calculation

The step size in DQO algorithm is an essential parameter which has a significant impact on the efficiency. Aiming at minimizing the interference leakage along the line search direction, the optimal step size can be calculated analytically by solving a quartic optimization problem. As is shown in Equations (35) and (36), the step size t should be a real value. From Equations (2), (4) and (5), the total interference leakage in the case of Uk + tΔUk, Vk + tΔVk (k = 1, 2, …, K) can be formulated as:
L ( t ) = k = 1 K l = 1 , l k K P l d Tr [ ( U k H + t Δ U k H ) H k l ( V l + t Δ V l ) ( V l H + t Δ V l H ) H k l H ( U k + t Δ U k ) ]
Without loss of generality, we assume Pl/d = 1 and define:
α k l = Δ U k H H k l V l
β k l = Δ U k H H k l Δ V l
γ k l = U k H H k l Δ V l
δ k l = U k H H k l V l
Then Equation (54) can be formulated as a real quartic function of t:
L ( t ) = a 4 t 4 + a 3 t 3 + a 2 t 2 + a 1 t 1 + a 0
where:
a 4 = k = 1 K l = 1 , l k K Tr [ β k l β k l H ]
a 3 = k = 1 K l = 1 , l k K 2 Re { Tr [ α k l β k l H + γ k l β k l H ] }
a 2 = k = 1 K l = 1 , l k K { Tr [ α k l α k l H + γ k l γ k l H ] + 2 Re { Tr [ α k l γ k l H + β k l δ k l H ] } }
a 1 = k = 1 K l = 1 , l k K 2 Re { Tr [ δ k l α k l H + δ k l γ k l H ] }
a 0 = k = 1 K l = 1 , l k K Tr [ δ k l δ k l H ]
In order to obtain the global minimum value of Equation (59), the following lemma is firstly introduced:
Lemma 1.
For a real quartic function f(t) = a4t4 + a3t3 + a2t2 + a1t + a0, t ∈ R, with a4 > 0, there exists an optimal t* ∈ R that satisfies f′(t*) = 0, so that f(t*) is the global minimal value of f(t).
Proof of Lemma 1.
As a4 > 0 and f ( t ) = 4 a 4 t 3 + 3 a 3 t 2 + 2 a 2 t + a 1 , it can be obtained that lim t + f ( t ) = + and lim t f ( t ) = . Therefore, there exist a, b ∈ R, so that f′(t) > 0, t ∈ [b, ∞) and f′(t) < 0, t ∈ (−∞ ,a]. Thus, f(t) increases monotonously in t ∈ [b, ∞) and has the minimal value f(b) at t = b. Similarly, f(t) decreases monotonously in t ∈ (−∞ ,a] and has the minimal value f(a) at t = a. When t ∈ [a, b], due to continuity, f(t) must have the minimal value f(c) at t = c where c ∈ [a, b]. Hence, min{f(a), f(b), f(c)} is the global minimum of f(t). In conclusion, there exists t* ∈ R (or t* ∈ {a, b, c}) so that f(t*) is the global minimal value. For f(t) ≥ f(t*), the left and right derivatives at t* can be formulated as:
f ( t * ) = lim Δ t 0 f ( t * + Δ t ) f ( t * ) Δ t 0
f + ( t * ) = lim Δ t 0 + f ( t * + Δ t ) f ( t * ) Δ t 0
For f ( t * ) = f ( t * ) = f + ( t * ) , we must have f ( t * ) = f ( t * ) = f + ( t * ) = 0 . Therefore, the global optimal value t* must be chosen from the solutions that satisfy f′(t*) = 0. When f′(t*) = 0 has only one real solution, it is the optimal t*. When f′(t*) = 0 has 2 or 3 real solutions, t* is the one that has the smallest function value.
From Equation (60) we have a4 > 0. According to Lemma 1, it can be deduced that there exists t* ∈ R with zero derivative, which makes L(t*) as the global minimal value of Equation (59). Let:
d L / d t = 4 a 4 t 3 + 3 a 3 t 2 + 2 a 2 t + a 1 = 0
The discriminant of Equation (65) is: Δ = Δ 1 2 + Δ 2 3 , where Δ1 = (bc)/(6a2) − b3/(27a3) − d/(2a), Δ2 = c/(3a) − b2/(9a2), a = 4a4, b = 3a3, c = 2a2, and d = a1. And the 3 solutions of Equation (65) are given by:
t 1  =  x 1 + x 2 + x 3
t 2 = x 1 + ( 1 + 3 i ) x 2 2 + ( 1 3 i ) x 3 2
t 3 = x 1 + ( 1 3 i ) x 2 2 + ( 1 + 3 i ) x 3 2
where x1 = −b/(3a), x 2 = Δ 1 + Δ 3 , and x 3 = Δ 1 Δ 3 . When Δ > 0 or Δ = Δ1 = Δ2 = 0, there is only one real root t1 which is the optimal t*; when Δ = 0 and Δ1 = Δ2 ≠ 0, there are 2 real roots; when Δ < 0, there are 3 real roots. If there are more than one real root, t* is the one that has the smallest function value.

4.3. Computational Complexity Analysis

The computational complexity of the AMIL and DQO algorithms is analyzed according to the number of complex multiplications (NoCM). For the AMIL algorithm, the complexity comes from the covariance matrices calculation, eigenvalue decomposition, and interference leakage evaluation with the complexity of K(K − 1)(MNd + Md2 + Nd2), 9K(M3 + N3), and K(K − 1)(d2M + d3), respectively [17]. Therefore the NoCM per iteration of the AMIL algorithm is summarized as:
C AMIL = K ( K 1 ) ( 2 M N d + N d 2 + M 2 d ) + 9 K ( N 3 + M 3 ) + K ( K 1 ) ( d 2 M + d 3 )
For the DQO algorithm, the complexity of the VU-step, UV-step, and interference leakage calculations are the same as those of the AMIL algorithm, and the extra complexity comes from the LS procedure. The complexity of LS comes from the coefficients calculation of Equations (55)–(58) and Equations (60)–(63), solving Equation (65), and normalization. The complexity of each LS procedure is analyzed as follows:
(1) As shown in Equation (55), αkl can be rewritten as α k l = [ ( U k i ) H H k l ( U k i 1 ) H H k l ] V l . Since ( U k i ) H H k l and ( U k i 1 ) H H k l have been calculated in Q k as shown in Equation (3), the complexity of computing αkl only comes from the multiplication of [ ( U k i ) H H k l ( U k i 1 ) H H k l ] and V l , with the NoCM of d2M. As k and l traverse from 1 to K with lk, the total complexity of calculating all αkl is K(K − 1)d2M. Similarly, βkl, γkl, and δkl have the same complexity as αkl.
(2) The complexity of calculating a1a4 mainly comes from the multiplications among αkl, βkl, γkl, and δkl. Notice that only the traces of the products are required, and we don’t have to compute all the elements of the products. Therefore, the complexity of calculating a1a4 are 2K(K − 1)d2, 4K(K − 1)d2, 2K(K − 1)d2, and K(K − 1)d2, respectively. Notice that there is no need to calculate a0.
(3) The number of real solutions of Equation (65) depends on Δ1, Δ2 as well as Δ, and we consider the most complex case of 3 real solutions. The details of the complexity of solving the cubic equation are listed in Table 1. NoRM, NoRD, NoSRC, and NoCRC are employed to represent the number of real multiplications, real divisions, square root calculations, and cubic root calculations, respectively.
Table 1. Complexity of solving the cubic Equation (65).
Table 1. Complexity of solving the cubic Equation (65).
TypesNoRMNoRDNoSRCNoCRC
a, b, c, d3000
Δ19300
Δ24200
Δ3000
x11100
x20011
x30011
t10000
t28000
t38000
L(t)21000
Total57620
(4) V k i and U k i are normalized so that the norm of each column is one. The normalization of one column of V k i takes M complex multiplications, one square root calculation and two real divisions. Therefore the normalization of all the precoding matrices takes dMK complex multiplications, dK square root calculations, and 2dK real divisions. Similarly, the normalization of all the decoding matrices takes dNK complex multiplications, dK square root calculations, and 2dK real divisions.
(5) As the complexity of one complex multiplication equals four real multiplications, the number of real multiplications will be replaced with the equivalent number of complex multiplications. And the complexity of one line search is summarized in Table 2.
Therefore the total number of equivalent complex multiplications of one line search is:
C LS = 4 K ( K 1 ) d 2 M + 9 K ( K 1 ) d 2 + d K ( M + N ) + 14.25
And the number of real divisions, square root calculations and cubic root calculations in one LS are 4dK + 6, 2dK + 2, and 2, respectively. As LS is implemented every interval iteration, the average NoCM per iteration of DQO algorithm is:
C DQO = C AMIL + C LS / i n t e r v a l
Table 2. Complexity of one line search.
Table 2. Complexity of one line search.
TypesNoRMNoRDNoSRCNoCRC
αklK(K − 1)d2M000
βklK(K − 1)d2M000
γklK(K − 1)d2M000
δklK(K − 1)d2M000
a12K(K − 1)d2000
a24K(K − 1)d2000
a32K(K − 1)d2000
a4K(K − 1)d2000
Solve (65)14.25622
NormalizationdK(M + N)4dK2dK0
The complexity of the AMIL and DQO algorithms with the parameter interval = 20 (the mechanism for determining the parameter will be provided in Section 5.1) is compared in Table 3. From the comparison, it can be seen that the average NoCM of the DQO algorithm per iteration is only slightly higher than that of the AMIL algorithm. Although LS will bring extra complexity per iteration, it can reduce the number of iterations significantly and thus lower the overall computational complexity, which will be shown in the numerical results.
Table 3. Complexity of AMIL and DQO algorithms in (M × M, d)K with interval = 20.
Table 3. Complexity of AMIL and DQO algorithms in (M × M, d)K with interval = 20.
(M × N, d)KCAMILCDQOCDQO/CAMIL
(6 × 6, 1)115.61 × 1045.63 × 1041.003
(6 × 6, 2)52.49 × 1042.50 × 1041.006
(7 × 7, 1)131.06 × 1051.06 × 1051.003
(7 × 7, 2)64.78 × 1044.80 × 1041.005
(8 × 8, 1)151.82 × 1051.83 × 1051.002
(8 × 8, 2)78.37 × 1048.40 × 1041.004
(9 × 9, 1)172.94 × 1052.95 × 1051.002
(9 × 9, 2)81.37 × 1051.37 × 1051.004
(10 × 10, 1)194.52 × 1054.53 × 1051.002
(10 × 10, 2)92.12 × 1052.12 × 1051.003

5. Numerical Results

In this section, the performance of the proposed DQO algorithm is evaluated and compared with the traditional AMIL algorithm by simulation. We will employ the interference leakage and sum rate as the performance metrics. The definition of interference leakage is shown in Equation (5), and that of sum rate can be found in reference [23]. Unless specially specified, 250 realizations of different channel coefficients with distribution CN(0, 1) and the corresponding initial precoding matrices are randomly generated to evaluate the average interference leakage and sum rate of the algorithms in each simulation.

5.1. Parameter Analysis

There are four parameters in the DQO algorithm: the interference leakage threshold for starting LS th1, the desired interference leakage th2, the interval for executing the LS interval, and the maximum iteration Im. The parameters th2 and Im are set according to the practical requirements. The other two have impacts on the efficiency of DQO algorithm. It is difficult to provide the exact optimal values of the two parameters analytically. Therefore, simulations are employed to determine the parameters th1 and interval in this section.
The parameter th1 decides the interference leakage threshold for starting line search. It is difficult to provide the exact optimal value of th1, and the performance of DQO algorithm is evaluated with different th1 for the (5 × 5, 2)4 and (10 × 10, 1)19 channels in Figure 2 and Figure 3, respectively. The parameter interval is preseted as 20, and th1 is chosen to be 1, 0.1, 0.01, and 0.001.
Figure 2. Convergence curves of the average interference leakage of DQO algorithm with th1 = 1, 0.1, 0.01, and 0.001 in (5 × 5, 2)4.
Figure 2. Convergence curves of the average interference leakage of DQO algorithm with th1 = 1, 0.1, 0.01, and 0.001 in (5 × 5, 2)4.
Sensors 15 18526 g002
As is shown in Theorem 2, the difference between the two consecutive iteration results of AMIL algorithm will approximately point to the convergence solution when the current precoding and decoding matrices are sufficiently close to their convergence values. In DQO algorithm, the interference leakage is employed to be a measure of the distance between the current point and the convergence point, and line search is started when the interference leakage is smaller than a preseted threshold th1. If th1 is set to be too large, the generated direction does not point to the convergence value. If th1 is set to be too small, the line search procedure cannot accelerate the convergence rate in time, and the effectiveness of DQO algorithm is degraded.
As is shown in Figure 2 and Figure 3, th1 = 0.1 has better performance than the too large value 1 and the too small value 0.001, which accords with the analysis above. Therefore, the parameter th1 is set to be 0.1 in the following simulations.
Figure 3. Convergence curves of the average interference leakage of DQO algorithm with th1 = 1, 0.1, 0.01, and 0.001 in (10 × 10, 1)19.
Figure 3. Convergence curves of the average interference leakage of DQO algorithm with th1 = 1, 0.1, 0.01, and 0.001 in (10 × 10, 1)19.
Sensors 15 18526 g003
The parameter interval controls the frequency of executing line search. The parameter cannot be set to be too small. This can be explained by the fact that Equations (46) and (47) can be attained only when i1 in Equation (45) is large enough. Therefore, it has to take several UV and VU steps before κ 1 i 1 in Equation (45) takes the dominant proposition so that Equations (35) and (36) hold.
The performance of DQO algorithm with different interval for the (5 × 5, 2)4 and (10 × 10, 1)19 channels is evaluated in Figure 4 and Figure 5, respectively. The parameter th1 is preseted as 0.1, and interval is chosen to be 1, 2, 10, 15, and 20. The curves with interval = 1 converge slowly, which verifies the analysis above. On the other hand, when interval is large enough, the convergence curves are very close to each other. As interval = 20 has better performance than the others in Figure 4, interval is chosen to be 20 in the following simulations.
Figure 4. Convergence curves of the average interference leakage of DQO algorithm with interval = 1, 2, 10, 15, and 20 in (5 × 5, 2)4.
Figure 4. Convergence curves of the average interference leakage of DQO algorithm with interval = 1, 2, 10, 15, and 20 in (5 × 5, 2)4.
Sensors 15 18526 g004
Figure 5. Convergence curves of the average interference leakage of DQO algorithm with interval = 1, 2, 10, 15, and 20 in (10 × 10, 1)19.
Figure 5. Convergence curves of the average interference leakage of DQO algorithm with interval = 1, 2, 10, 15, and 20 in (10 × 10, 1)19.
Sensors 15 18526 g005

5.2. Comparison of Different Algorithms

In this subsection, the performance of the DQO and AMIL algorithms is compared and analyzed. The parameters for the DQO algorithm are set as th1 = 0.1 and interval = 20. The interference leakage with respective to iterations for one realization of randomly generated channel coefficients in the (5 × 5, 2)4 channel is shown in Figure 6, which provides us the overall effectiveness of DQO algorithm. As reflected in the figure, the interference leakage of the two algorithms remains the same before 168 iterations since they employ the same VU and UV steps. When the interference leakage is smaller than threshold th1, DQO algorithm begins to perform the LS procedure, and a step-like decrease in interference leakage can be observed. After 350 iterations, DQO algorithm reaches the interference leakage of 1.2 × 10−4, which is one order lower than that of AMIL algorithm. The difference of the interference leakage becomes larger as the iterations increase, and DQO algorithm can reach the level which is 3 orders lower than that of AMIL algorithm. Therefore, the DQO algorithm can reach the same level of interference leakage as the traditional AMIL method with much fewer iterations.
Figure 6. Convergence curves of the interference leakage for one realization of randomly generated channel coefficients in (5 × 5, 2)4.
Figure 6. Convergence curves of the interference leakage for one realization of randomly generated channel coefficients in (5 × 5, 2)4.
Sensors 15 18526 g006
As iterations cannot represent the complexity of the two algorithms sufficiently, the average performance of the two algorithms is evaluated in terms of execution time in the following simulations. Average interference leakage as well as sum rate in (5 × 5, 2)4 and (10 × 10, 1)19 channels are considered. The convergence of average interference leakage for (5 × 5, 2)4 channel is illustrated in Figure 7.
Figure 7. Convergence curves of the average interference leakage in (5 × 5, 2)4.
Figure 7. Convergence curves of the average interference leakage in (5 × 5, 2)4.
Sensors 15 18526 g007
From the results, it can be seen that the DQO algorithm can suppress the interference leakage to 6.8 × 10−5 while the AMIL algorithm can only reach the level of 1.2 × 10−3 at 1 s. The difference of the average interference leakage between them increases with time, and the DQO algorithm outperforms the AMIL algorithm with three orders lower at 2 s. The convergence of the average sum rate with SNR = 40 dB for (5 × 5, 2)4 channel is depicted in Figure 8.
Figure 8. Convergence curves of the average sum rate in (5 × 5, 2)4.
Figure 8. Convergence curves of the average sum rate in (5 × 5, 2)4.
Sensors 15 18526 g008
As reflected in the figure, the average sum rate of the DQO algorithm increases more rapidly than that of the AMIL algorithm during the first 0.5 s and the DQO algorithm converges approximately at 0.61 s with the average sum rate of 104 bps/Hz while the AMIL algorithm takes about 1.78 s to reach the same level. Like the (5 × 5, 2)4 case, the convergence curves of average interference leakage as well as sum rate for (10 × 10, 1)19 channel are plotted in Figure 9 and Figure 10, respectively. As the number of users and antennas has become larger, it requires more iterations as well as computational time to suppress the interference leakage and to increase the sum rate. In Figure 9, the DQO algorithm can suppress the interference leakage more rapidly than the AMIL algorithm and achieves the interference leakage of 5.6 × 10−5 at 60 s, which is one order lower than that of the AMIL algorithm. In particular, the AMIL algorithm seems to converge at approximately 60 s while the DQO algorithm has the tendency to reach an even lower level of interference leakage afterward. In Figure 10, the average sum rate of the DQO algorithm converges much more rapidly than that of the AMIL algorithm during the first 10 s and the DQO algorithm achieves a higher average sum rate than the AMIL algorithm. To further compare their efficiency, average iterations NAMIL and NDQO as well as executing time TAMIL and TDQO with th2 = 10−4 are listed in the cases of different numbers of users and antennas in Table 4. Yetis et al. [32] have provided the feasible condition for IA in the (M × N, d)K channel as d ≤ (M + N)/(K + 1), therefore we mainly provide the results of the most complex situation when d = (M + N)/(K + 1).
Figure 9. Convergence curves of the average interference leakage in (10 × 10, 1)19.
Figure 9. Convergence curves of the average interference leakage in (10 × 10, 1)19.
Sensors 15 18526 g009
Figure 10. Convergence curves of the average sum rate in (10 × 10, 1)19.
Figure 10. Convergence curves of the average sum rate in (10 × 10, 1)19.
Sensors 15 18526 g010
The convergence rate and complexity of the algorithms can be compared by the iterations and computational time which are required to reach a certain level of interference leakage. As is shown in Table 4, the iterations and executing time of the DQO algorithm are only 22%–33% and 23%–33% of those of the AMIL algorithm, respectively. Therefore, simulations above confirm that DQO algorithm can converge faster than the AMIL algorithm and save nearly 2/3 of the computational complexity.
Table 4. Comparison between AMIL and DQO algorithms in (M × N, d)K.
Table 4. Comparison between AMIL and DQO algorithms in (M × N, d)K.
(M × N, d)KNAMILNDQONDQO/NAMILTAMIL(s)TDQO(s)TAMIL/TDQO
(6 × 6, 1)113.38 × 1037.76 × 1020.2217.123.890.23
(6 × 6, 2)52.63 × 1038.13 × 1020.314.091.270.31
(7 × 7, 1)134.93 × 1031.27 × 1030.2535.759.030.25
(7 × 7, 2)64.60 × 1031.47 × 1030.329.943.180.32
(8 × 8, 1)157.23 × 1031.74 × 1030.2464.2615.350.24
(8 × 8, 2)76.16 × 1032.06 × 1030.3317.755.910.33
(9 × 9, 1)178.35 × 1032.04 × 1030.2499.3324.160.24
(9 × 9, 2)88.12 × 1032.24 × 1030.2730.618.410.27
(10 × 10, 1)199.44 × 1032.52 × 1030.27140.1236.710.27
(10 × 10, 2)98.94 × 1032.35 × 1030.2642.4911.100.26

6. Conclusions and Future Work

In this paper, the properties of the traditional AMIL algorithm for IA have been studied. It has been found that if the AMIL algorithm can converge to a point where the interference leakage is very small, there exist fixed linear transformations TV and TU that exert on the deviations when the current point is sufficiently close to the convergence value. Particularly, successive exertions of the transformations on the deviations will lead to an interesting property that the difference of the consecutive iterations of AMIL algorithm will approximately point to the convergence value. Based on this discovery, a rapid convergent low-complexity minimization interference leakage algorithm, namely the DQO algorithm, has been proposed to speed up the convergence rate by employing optimal line search procedure. The direction for LS is generated by subtracting the consecutive iteration results of the AMIL algorithm, and the optimal step size can be determined analytically by optimizing a quartic function. Complexity analysis of the DQO and AMIL algorithms has been provided, and simulation results have shown that the DQO algorithm can reduce the number of iterations and execution time significantly under the same interference leakage and sum rate conditions. In the future, we will focus on extending the proposed algorithm to many more scenarios, such as systems with imperfect CSI [33,34], cooperative communications [35], and so on.

Acknowledgments

We would like to express our appreciation to the editors and reviewers for their comments and suggestions, which have helped us improve the quality of the article. This research was supported partly by the National Natural Science Foundation of China under Grant No. 61102085 and No. 61201224, Natural Scientific Research Innovation Foundation in Harbin Institute of Technology under No. HIT.NSRIF 201151, China Postdoctoral Science Foundation Special Funded Project under 2013T60282 and the Fundamental Research Funds for the Central Universities under DUT14QY44.

Author Contributions

Z.W. and L.J. conceived the scheme; G.R. and G.W. performed the experiments; N.Z. analyzed the data; L.J. wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Rafique, Z.; Seet, B.C.; Al-Anbuky, A. Performance analysis of cooperative virtual MIMO systems for wireless sensor networks. Sensors 2013, 13, 7033–7052. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Mhiri, F.; Sethom, K.; Bouallegue, R. A survey on interference management techniques in femtocell self-organizing networks. J. Netw. Comput. Appl. 2013, 36, 58–65. [Google Scholar] [CrossRef]
  3. Jeon, S.-W.; Gastpar, M. A survey on interference networks: Interference alignment and neutralization. Entropy 2012, 14, 1842–1863. [Google Scholar] [CrossRef]
  4. Zhang, H.; Chu, X.; Ma, W.; Zheng, W.; Wen, X. Resource allocation with interference mitigation in OFDMA femtocells for co-channel deploymenta. EURASIP J. Wirel. Commun. Netw. 2012, 2012. [Google Scholar] [CrossRef]
  5. Zhao, N.; Yu, F.R.; Leung, V.C.M. Opportunistic communications in interference alignment networks with wireless power transfer. IEEE Wirel. Commun. 2015, 22, 88–95. [Google Scholar] [CrossRef]
  6. Maddah-Ali, M.A.; Motahari, A.S.; Khandani, A.K. Communication over MIMO X Channels: Interference alignment, decomposition, and performance analysis. IEEE Trans. Inf. Theory 2008, 54, 3457–3470. [Google Scholar] [CrossRef]
  7. Jafar, S.A.; Shamai, S. Degrees of freedom region of the MIMO X channel. IEEE Trans. Inf. Theory 2008, 54, 151–170. [Google Scholar] [CrossRef]
  8. Cadambe, V.R.; Jafar, S.A. Interference alignment and degrees of freedom of the K-user interference channel. IEEE Trans. Inf. Theory 2008, 54, 3425–3441. [Google Scholar] [CrossRef]
  9. Lee, N.; Lim, J.-B.; Chun, J. Degrees of freedom of the MIMO Y channel: Signal space alignment for network coding. IEEE Trans. Inf. Theory 2010, 56, 3332–3342. [Google Scholar] [CrossRef]
  10. Cadambe, V.R.; Jafar, S.A. Degrees of freedom of wireless networks with relays, feedback, cooperation, and full duplex operation. IEEE Trans. Inf. Theory 2009, 55, 2334–2344. [Google Scholar] [CrossRef]
  11. Maso, M.; Debbah, M.; Vangelista, L. A distributed approach to interference alignment in OFDM-based two-tiered networks. IEEE Trans. Veh. Technol. 2013, 62, 1935–1949. [Google Scholar] [CrossRef]
  12. Lertwiram, N.; Popovski, P.; Sakaguchi, K. A study of trade-off between opportunistic resource allocation and interference alignment in femtocell scenarios. IEEE Wirel. Commun. Lett. 2012, 1, 356–359. [Google Scholar] [CrossRef]
  13. Xu, Y.; Mao, S.W. Stackelberg game for cognitive radio networks with MIMO and distributed interference alignment. IEEE Trans. Veh. Technol. 2014, 63, 879–892. [Google Scholar] [CrossRef]
  14. Tsinos, C.G.; Berberidis, K. Blind opportunistic interference alignment in MIMO cognitive radio systems. IEEE Trans. Emerg. Sel. Top. Circuits Syst. 2013, 3, 626–639. [Google Scholar] [CrossRef]
  15. Wu, Z.; Jiang, L.; Ren, G.; Zhao, N.; Zhao, Y. A novel joint spatial-code clustered interference alignment scheme for large-scale wireless sensor networks. Sensors 2015, 15, 1964–1997. [Google Scholar] [CrossRef] [PubMed]
  16. Sharma, S.K.; Chatzinotas, S.; Ottersten, B. Interference alignment for spectral coexistence of heterogeneous networks. EURASIP J. Wirel. Commun. Netw. 2013, 2013. [Google Scholar] [CrossRef]
  17. Sun, C.; Yang, Y.C.; Yuan, Y.X. Low complexity interference alignment algorithms for desired signal power maximization problem of MIMO channels. EURASIP J. Adv. Signal Process. 2012, 2012, 1–13. [Google Scholar] [CrossRef]
  18. Tresch, R.; Guillaud, M.; Riegler, E. On the achievability of interference alignment in the K-user constant MIMO interference channel. In Proceedings of the IEEE Workshop on Statistical Signal Processing, Cardiff, Wales, UK, 31 August–3 September 2009; pp. 277–280.
  19. Wilson, C.; Veeravalli, V. A convergent version of the max SINR algorithm for the MIMO Interference channel. IEEE Trans. Wirel. Commun. 2013, 12, 2952–2961. [Google Scholar] [CrossRef]
  20. Peters, S.W.; Heath, R.W. Interference alignment via alternating minimization. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Taipei, Taiwan, 19–24 April 2009; pp. 2445–2448.
  21. Razaviyayn, M.; Sanjabi, M.; Luo, Z.-Q. Linear transceiver design for interference alignment: Complexity and computation. IEEE Trans. Inf. Theory 2012, 58, 2896–2910. [Google Scholar] [CrossRef]
  22. Ma, L.; Xu, T.; Sternberg, G. Computational complexity of interference alignment for symmetric MIMO networks. IEEE Commun. Lett. 2013, 17, 2308–2311. [Google Scholar] [CrossRef]
  23. Gomadam, K.; Cadambe, V.R.; Jafar, S.A. A distributed numerical approach to interference alignment and applications to wireless interference networks. IEEE Trans. Inf. Theory 2011, 57, 3309–3322. [Google Scholar] [CrossRef]
  24. Shen, H.; Li, B.; Tao, M.; Luo, Y. The new interference alignment scheme for the MIMO interference channel. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, 18–21 April 2010; pp. 1–6.
  25. Santamaria, I.; Gonzalez, O.; Heath, R.W.; Peters, S.W. Maximum sum-rate interference alignment algorithms for MIMO channels. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Miami, FL, USA, 6–10 December 2010; pp. 1–6.
  26. Ram, B.H.; Wei, L.; Ayyar, A.; Lilleberg, J.; Giridhar, K. Precoder design for K-user interference channels with finite alphabet signals. IEEE Commun. Lett. 2013, 17, 681–684. [Google Scholar] [CrossRef]
  27. Xu, T.; Xia, X.G. A diversity analysis for distributed interference alignment using the max-SINR algorithm. IEEE Trans. Inf. Theory 2014, 60, 1857–1868. [Google Scholar] [CrossRef]
  28. Zhao, N.; Yu, F.R.; Sun, H.; Nallanathan, A.; Yin, H. A novel interference alignment scheme based on sequential antenna switching in wireless networks. IEEE Trans. Wirel. Commun. 2013, 12, 5008–5021. [Google Scholar] [CrossRef]
  29. Ayach, O.E.; Heath, R.W. Interference alignment with analog channel state feedback. IEEE Trans. Wirel. Commun. 2012, 11, 626–636. [Google Scholar] [CrossRef]
  30. Cho, S.; Huang, K.; Kim, D.K.; Lau, V.K.N.; Chae, H.; Seo, H.; Kim, B.-H. Feedback-topology designs for interference alignment in MIMO interference channels. IEEE Trans. Signal Process. 2012, 60, 6561–6575. [Google Scholar]
  31. Zhang, L.; Song, L.; Ma, M.; Zhang, Z.; Lei, M.; Jiao, B. Interference alignment with differential feedback. IEEE Trans. Veh. Technol. 2012, 61, 2878–2883. [Google Scholar] [CrossRef]
  32. Yetis, C.M.; Gou, T.; Jafar, S.A.; Kayran, A.H. On feasibility of interference alignment in MIMO interference networks. IEEE Trans. Signal Process. 2010, 58, 4771–4782. [Google Scholar] [CrossRef]
  33. Taki, M.; Rezaee, M.; Guillaud, M. Adaptive modulation and coding for interference alignment with imperfect CSIT. IEEE Trans. Wireless Commun. 2014, 13, 5264–5273. [Google Scholar] [CrossRef]
  34. Razavi, S.M.; Ratnarajah, T. Performance Analysis of interference alignment under CSI mismatch. IEEE Trans. Veh. Technol. 2014, 63, 4740–4748. [Google Scholar] [CrossRef]
  35. Wang, H.; Xia, X. Asynchronous cooperative communication systems: A survey on signal designs. Sci. China-Inf. Sci. 2011, 54, 1547–1561. [Google Scholar] [CrossRef]

Share and Cite

MDPI and ACS Style

Jiang, L.; Wu, Z.; Ren, G.; Wang, G.; Zhao, N. A Rapid Convergent Low Complexity Interference Alignment Algorithm for Wireless Sensor Networks. Sensors 2015, 15, 18526-18549. https://doi.org/10.3390/s150818526

AMA Style

Jiang L, Wu Z, Ren G, Wang G, Zhao N. A Rapid Convergent Low Complexity Interference Alignment Algorithm for Wireless Sensor Networks. Sensors. 2015; 15(8):18526-18549. https://doi.org/10.3390/s150818526

Chicago/Turabian Style

Jiang, Lihui, Zhilu Wu, Guanghui Ren, Gangyi Wang, and Nan Zhao. 2015. "A Rapid Convergent Low Complexity Interference Alignment Algorithm for Wireless Sensor Networks" Sensors 15, no. 8: 18526-18549. https://doi.org/10.3390/s150818526

Article Metrics

Back to TopTop