2009
DOI: 10.1109/tcomm.2009.12.080414
|View full text |Cite
|
Sign up to set email alerts
|

Opportunistic cophasing transmission in MISO systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…In this case, approximate schemes need to be resorted to. One example is the Markov Chain Monte Carlo (MCMC) method, which approximates the distributions and integration operations using a large number of random samples [31], [34]. However, sampling methods can be computationally demanding, often limiting their use to small-scale problems.…”
Section: State Estimation Under Sampling Phase Errormentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, approximate schemes need to be resorted to. One example is the Markov Chain Monte Carlo (MCMC) method, which approximates the distributions and integration operations using a large number of random samples [31], [34]. However, sampling methods can be computationally demanding, often limiting their use to small-scale problems.…”
Section: State Estimation Under Sampling Phase Errormentioning
confidence: 99%
“…Since the goal is to derive a distributed algorithm, it is also assumed that each bus has access only to the mean and variance of its own state from SCADA estimates, i.e., , with and . Then, the optimal variational distributions and can be obtained through minimizing the KL divergence in (31). Similar to (21) and (22), the and that minimize (31) are given by (32) and (33) at the bottom of the next page.…”
Section: B Distributed Estimationmentioning
confidence: 99%
“…In general, for the ( ) round of message exchange, factor node receive messages from its neighboring variable nodes and then compute messages using (7). After some derivations, it can be obtained that (11) where the inverse of covariance matrix is (12) and the mean vector is (13) On the other hand, using (8), the messages passed from variable nodes to factor nodes can be computed as (14) where (15) and (16) Furthermore, during each round of message passing, each node can compute the belief for using (9), which can be easily shown to be , with the inverse of covariance matrix (17) and mean vector (18) When the algorithm converges or the maximum number of message exchange is reached, each node computes the CFOs according to (10) as (19) The iterative algorithm based on BP is summarized as follows.…”
Section: B Message Computationmentioning
confidence: 99%
“…For example, Distributed beamforming: As shown in Fig. 1(a), to improve the range of communications and save battery power Manuscript during the transmission, multiple mobile terminals form a virtual antenna array and cooperatively direct a beam in the desired direction of transmission [6], [7]. Since each source node in the distributed beamformer has an independent local oscillator, common carrier frequency among all transmitters is crucial to ensure that a beam is aimed in the desired direction.…”
Section: Introductionmentioning
confidence: 99%
“…On the contrary, opportunistic scheduling exploits multi-user diversity gain and achieves the sum-rate capacity as the number of users K approaches infinity [3]. When the base station (BS) is equipped with N t > 1 transmit antennas, opportunistic scheduling can be implemented by opportunistic beamforming (OBF), which generates N = N t beams and serves up to N t users for each channel use [4], [5]. While it achieves the sum-rate capacity, OBF can result in significant scheduling delay over the users, especially in densely populated networks.…”
Section: and By King Abdullah University Of Science Andmentioning
confidence: 99%