Volume 3, Issue 3 (9-2011)                   IJICTR 2011, 3(3): 35-45 | Back to browse issues page

XML Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Beheshti S M, Mahboobi B, Ardebilipour M. Joint Power Adaptation and Interference Avoidance for Unlicensed Wireless Systems: A Game Theoretic Approach . IJICTR. 2011; 3 (3) :35-45
URL: http://ijict.itrc.ac.ir/article-1-208-en.html
1- SSWC-Lab.Faculty of Electrical & Computer Engineering, Khaje Nasir Toosi University of Technology Tehran, Iran
Abstract:   (2999 Views)

In multiuser wireless systems, waveform adaptation is one of the interference management methods in which the users adaptively change their transmitting waveforms in signal space to enhance the system performance subject to some Quality-of-Service (QoS) requirements. In this paper, the uplink scenario of a Multi Carrier Code Division Multiple Access (MC-CDMA) is considered under slow and frequency selective fading. An admissibility test under maximum received power constraint is presented to check that if there exist feasiblepowers and waveforms for network users to hold the QoS constraint of each user above a predetermined level. In our set-up, a number of licensed (fixed) and unlicensed (agile) users share some orthogonal carriers to send data to a common receiver (or colocated independent receivers), subject to specific target SINRs for users. We analyze this system as a non-cooperative separable game and show the existence of Nash equilibrium point for this joint power control and codeword adaptation game.An iterative distributed algorithm based on better response strategy is presented which at the receiversresults in an ensemble of well-known Generalized Welch Bound Equality (GWBE) optimal waveforms and orthogonal waveforms for oversized users in addition to optimal transmission power for each user. We investigate the properties of fixed point and the effect of algorithm on the performance of fixed users’ network. Finally the algorithm will be confirmed by the numerical examples.

Full-Text [PDF 877 kb]   (1044 Downloads)    
Type of Study: Research | Subject: Information Technology

Add your comments about this article : Your username or Email: