+ All Categories
Home > Documents > Linear Transceiver design for Downlink Multiuser MIMO Systems: Downlink-Interference Duality ...

Linear Transceiver design for Downlink Multiuser MIMO Systems: Downlink-Interference Duality ...

Date post: 04-Jun-2018
Category:
Upload: tadilo-endeshaw
View: 218 times
Download: 0 times
Share this document with a friend
15
1 Linear Transceiver design for Downlink Multiuser MIMO Systems: Downlink-Interference Duality Approach Tadilo Endeshaw Bogale,  Student Member, IEEE  and Luc Vandendorpe  Fellow, IEEE  AbstractThi s paper con sid ers linear tra nsc ei ver des ign for downlink multiuser multiple-input multiple-output (MIMO) systems. We examine different transceiver design problems. We focus on two groups of design problems. The rst group is the weighted sum mean-square-error (WSMSE) (i.e., symbol-wise or user-wise WSMSE) minimization problems and the second group is the minimi zat ion of the max imum we ighted me an- squ ar e- error (WMS E) (symb ol-wise or user -wis e WMSE ) prob lems. The problems are examined for the practically relevant scenario where the power constraint is a combination of per base station (BS ) ant enna and per symbol (user ), and the noi se vec tor of each mobile station is a zero-mean circularly symmetric complex Gaussian random variable with arbitrary covariance matrix. For each of these problems, we propose a novel downlink-interference duality based iterative solution. Each of these problems is solved as fol lows . Firs t, we estab lish a new mean-squ are -err or (MSE) downlink-interf erence duality . Second, we formulate the power all oca tion par t of the prob lem in the downlink cha nne l as a Geometric Program (GP). Third, using the duality result and the solut ion of GP , we utili ze alternatin g optimizati on tech nique to solve the original downlink problem. For the rst group of prob- lems , we have establis hed symbo l-wi se and user -wis e WSMSE downlink-interf erence duality . These duality are established by for mulat ing the noise covaria nce matr ices of the inte rfer ence cha nne ls as xe d poi nt fun cti ons. On the other hand, for the second group of problems, we have established symbol-wise and user-wise MSE downlink-interference duality. These duality are established by formulating the noise covariance matrices of the interference channels as marginally stable (convergent) discrete- time-switched syst ems. The prop osed duali ty based iter ative solutions can be extended straightforwardly to solve many other linear transceiver design problems. We also show that our MSE down link- inter fer ence duali ty unify all exist ing MSE dualit y. In our simulatio n res ults, we hav e obse rve d that the pro posed duality based iterative algorithms utilize less total BS power than that of the existing algorithms.  Index TermsMul tiuser MI MO, MSE , Downl ink -up link dualit y, Down link-interference duali ty , xed point func tion, discrete-time-switched system and convex optimization. I. I NTRODUCTION Mul tip le- inp ut mul tip le- out put (MI MO) is a promis ing technique to exploit the spectral efciency of wireless chan- nels. Thi s spe ctr al ef cienc y can be exp loited by app lyi ng The authors would like to thank BELSPO for the nanc ial suppor t of the IAP pr oj ect BESTCOM in the fr amewor k of whic h this work has been achi ev ed. Pa rt of this work has been publ is hed in the ICASSP , Kyo to, Jap an, Mar . 2012. Tadi lo Endesh aw Bogale and Luc V anden- dorp e are wit h the ICTEAM Ins tit ute , Uni ver sit ´ e ca thol ique de Lou- va in, Pl ace du Le va nt 2, 134 8 - Louvai n La Ne uve, Belgium. Emai l: {tadilo.bogale, luc.vandendorpe }@uclo uvain .be, Phone: +3210478 071, Fax: +3210472089. signa l proce ssing at the trans mitter (precode r) and recei ver (decoder). Signal processing is performed to meet a certain design criterion. It is well known that most practically relevant des ign proble ms suc h as wei ght ed sum rat e max imi zat ion , rate or signal-to-interference-plus -noise-ratio (SINR) balanc- ing and rat e or SINR con str ain ed power minimi zat ion can be equivalently expressed as mean-square-error (MSE) based problems (see for example [1]). Because of this, the current paper examines MSE-based problems. In general, the uplink channel MSE-based problems are better understood than those of the downl ink cha nne l. Due to this fact, mos t lit era tur es foc us on sol vin g the downlink MSE-ba sed pro blems. The downlink MSE-bas ed problems can be solved by direc t ap- proach as in [2], [3] or by uplink-downlink duality approach as in [4]–[6]. For a given downlink channel system model and its MSE- based problem, the idea behind uplink-downlink duality is rst to create the virtual uplink channel by exchanging the roles of the trans mit ter and rec ei ve r, and then to ena ble the pre - coder/decoder transformation from uplink to downlink channel and vice versa by ensuring the same MSE in both channels. Once the se two tas ks are per for med , the do wnl ink MSE- bas ed pro ble ms are exami ned as fol lows: Whe n the glo bal optimality of the dual uplink channel MSE-based problem is guaranteed, the duality approach simply transfers the optimal uplink channel precoder/decoder pairs from uplink to downlink channel (see for example the sum MSE minimization problem in [5]). When the global optimal solution of the dual uplink cha nne l MSE-ba sed pro ble m can not ens ure d, the dua lit y app roa ch exami nes the do wnl ink MSE-ba sed proble ms by iteratively switching between the uplink and downlink channel problems (see for example the problems in [7]). Several MSE-based problems have been examined by dual- ity approach [4]–[8]. However, the duality of these papers are able to solve total BS power constrained MSE-based problems only . In a prac tical multi-antenna base stati on (BS) system, the maximum power of eac h BS antenna is limite d [9]. In some scenario allocatin g diff erent powers to diff erent users (symbols) according to their priority or protection level has some interest. This motivates [10] to solve (robust) sum MSE- bas ed proble ms wit h per ant enn a, use r and symbol power constraints by duality approach. However, since the problems in [10] allocate the same MSE weight to all symbols (users), [10] ignores priority and fairness issues in terms of MSE. In a mul timedi a commun ica tion, dif ferent typ es of in- for mation (for examp le, audio and video inf ormation) can
Transcript
Page 1: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 115

1

Linear Transceiver design for Downlink Multiuser

MIMO Systems Downlink-Interference Duality

ApproachTadilo Endeshaw Bogale Student Member IEEE and Luc Vandendorpe Fellow IEEE

Abstractmdash This paper considers linear transceiver designfor downlink multiuser multiple-input multiple-output (MIMO)systems We examine different transceiver design problems Wefocus on two groups of design problems The first group is theweighted sum mean-square-error (WSMSE) (ie symbol-wise oruser-wise WSMSE) minimization problems and the second groupis the minimization of the maximum weighted mean-square-error (WMSE) (symbol-wise or user-wise WMSE) problemsThe problems are examined for the practically relevant scenario

where the power constraint is a combination of per base station(BS) antenna and per symbol (user) and the noise vector of each mobile station is a zero-mean circularly symmetric complexGaussian random variable with arbitrary covariance matrix Foreach of these problems we propose a novel downlink-interferenceduality based iterative solution Each of these problems is solvedas follows First we establish a new mean-square-error (MSE)downlink-interference duality Second we formulate the powerallocation part of the problem in the downlink channel as aGeometric Program (GP) Third using the duality result and thesolution of GP we utilize alternating optimization technique tosolve the original downlink problem For the first group of prob-lems we have established symbol-wise and user-wise WSMSEdownlink-interference duality These duality are established byformulating the noise covariance matrices of the interference

channels as fixed point functions On the other hand for thesecond group of problems we have established symbol-wise anduser-wise MSE downlink-interference duality These duality areestablished by formulating the noise covariance matrices of theinterference channels as marginally stable (convergent) discrete-time-switched systems The proposed duality based iterativesolutions can be extended straightforwardly to solve many otherlinear transceiver design problems We also show that our MSEdownlink-interference duality unify all existing MSE dualityIn our simulation results we have observed that the proposedduality based iterative algorithms utilize less total BS power thanthat of the existing algorithms

Index Termsmdash Multiuser MIMO MSE Downlink-uplinkduality Downlink-interference duality fixed point function

discrete-time-switched system and convex optimization

I INTRODUCTION

Multiple-input multiple-output (MIMO) is a promising

technique to exploit the spectral efficiency of wireless chan-

nels This spectral efficiency can be exploited by applying

The authors would like to thank BELSPO for the financial support of the IAP project BESTCOM in the framework of which this work hasbeen achieved Part of this work has been published in the ICASSPKyoto Japan Mar 2012 Tadilo Endeshaw Bogale and Luc Vanden-dorpe are with the ICTEAM Institute Universite catholique de Lou-vain Place du Levant 2 1348 - Louvain La Neuve Belgium Emailtadilobogale lucvandendorpeuclouvainbe Phone +3210478071

Fax +3210472089

signal processing at the transmitter (precoder) and receiver

(decoder) Signal processing is performed to meet a certain

design criterion It is well known that most practically relevant

design problems such as weighted sum rate maximization

rate or signal-to-interference-plus-noise-ratio (SINR) balanc-

ing and rate or SINR constrained power minimization can

be equivalently expressed as mean-square-error (MSE) based

problems (see for example [1]) Because of this the current

paper examines MSE-based problems In general the uplink

channel MSE-based problems are better understood than those

of the downlink channel Due to this fact most literatures

focus on solving the downlink MSE-based problems The

downlink MSE-based problems can be solved by direct ap-

proach as in [2] [3] or by uplink-downlink duality approach

as in [4]ndash[6]

For a given downlink channel system model and its MSE-

based problem the idea behind uplink-downlink duality is first

to create the virtual uplink channel by exchanging the roles

of the transmitter and receiver and then to enable the pre-

coderdecoder transformation from uplink to downlink channel

and vice versa by ensuring the same MSE in both channelsOnce these two tasks are performed the downlink MSE-

based problems are examined as follows When the global

optimality of the dual uplink channel MSE-based problem is

guaranteed the duality approach simply transfers the optimal

uplink channel precoderdecoder pairs from uplink to downlink

channel (see for example the sum MSE minimization problem

in [5]) When the global optimal solution of the dual uplink

channel MSE-based problem can not ensured the duality

approach examines the downlink MSE-based problems by

iteratively switching between the uplink and downlink channel

problems (see for example the problems in [7])

Several MSE-based problems have been examined by dual-

ity approach [4]ndash[8] However the duality of these papers are

able to solve total BS power constrained MSE-based problems

only In a practical multi-antenna base station (BS) system

the maximum power of each BS antenna is limited [9] In

some scenario allocating different powers to different users

(symbols) according to their priority or protection level has

some interest This motivates [10] to solve (robust) sum MSE-

based problems with per antenna user and symbol power

constraints by duality approach However since the problems

in [10] allocate the same MSE weight to all symbols (users)

[10] ignores priority and fairness issues in terms of MSE

In a multimedia communication different types of in-

formation (for example audio and video information) can

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 215

2

be sent to a user (all users) simultaneously [11] [12] In

such a scenario for successful transmission more priority

(power) could be given to symbols (users) corresponding to

the video information Thus for this scenario the design

criteria may incorporate fairnesspriority and power constraints

for each symbol (user) On the other hand examining com-

bined (per antenna and symbol (user)) power constraints

may have practical interest (for example in network MIMO)For these reasons the current paper generalizes the work of

[10] by incorporating both symbol-wise and user-wise MSE

fairnesspriority and combined (ie per antenna and symbol

(user)) power constraints We examine the following problems

Minimization of symbol-wise weighted sum mean-square-

error (WSMSE) constrained with per BS antenna and symbol

powers (P 1) minimization of user-wise WSMSE constrained

with per BS antenna and user powers (P 2) minimization

of the maximum symbol-wise weighted mean-square-error

(WMSE) constrained with per BS antenna and symbol powers

(P 3) and minimization of the maximum user-wise WMSE

constrained with per BS antenna and user powers (P 4) Each

of these problems is examined for the scenario where the

noise vector of each mobile station (MS) is a zero-mean

circularly symmetric complex Gaussian (ZMCSCG) random

variable with arbitrary covariance matrix

To the best of our knowledge the problems P 1 - P 4 are

non-convex Furthermore duality based solutions for these

problems with our noise covariance matrix assumptions are

not known In the current paper we propose duality based

iterative solutions to solve the problems Each of these prob-

lems is solved as follows First we establish a new MSE

downlink-interference duality Second we formulate the power

allocation part of the problem in the downlink channel as

a Geometric Program (GP) Third using the duality resultand the solution of GP we utilize alternating optimization

technique to solve the original downlink problem For the

problems P 1 and P 2 the duality are established by for-

mulating the noise covariance matrices of the interference

channels as fixed point functions For these two problems the

noise covariance matrices of the dual interference channels

are computed by modifying the approach of [10] to P 1 and

P 2 of the current paper On the other hand for the problems

P 3 and P 4 the duality are established by formulating the

noise covariance matrices of the interference channels as new

marginally stable (convergent) discrete-time-switched systems

The proposed duality based iterative solutions can be extendedstraightforwardly to solve many other linear transceiver design

problems We also show that our MSE downlink-interference

duality unify all existing MSE duality In our simulation

results we have observed that the proposed duality based

iterative algorithms utilize less total BS power than that of

the existing algorithms The main contributions of the current

paper can thus be summarized as follows

1) To solve the problems P 1 and P 2 we have established

WSMSE downlink-interference duality by formulating

the noise covariance matrices of the interference chan-

nels as fixed point functions These noise covariance

matrices are formulated by modifying the approach of

[10] to P 1 and P 2 of the current paper As will be

clear later for WSMSE-based problems with a total BS

power constraint function the proposed duality based

algorithm requires less computation than that of the

existing duality based algorithms

2) To solve the problems P 3 and P 4 we have established

novel MSE (symbol-wise and user-wise) downlink-

interference duality by formulating the noise covariancematrices of the interference channels as marginally sta-

ble (convergent) discrete-time-switched systems

Furthermore as will be shown later in Section IX

the proposed duality based iterative solutions can be

extended straightforwardly to solve many other linear

transceiver design problems We also show that the MSE

downlink-interference duality of the current paper is

also applicable to solve total BS power based linear

transceiver design problems Thus the current duality

unify all existing MSE duality1

3) By employing the system model of [1] and [8] we

formulate the power allocation parts of P 1 - P 4 as GPs

The GPs are formulated by applying the GP formulation

approach of [1] Consequently we are able to solve our

problems by alternating optimization technique [4] [7]

[8] [10] (ie duality based iterative algorithm)

4) In our simulation results we have observed that the

proposed duality based iterative algorithms utilize less

total BS power than that of the existing algorithms

This paper is organized as follows In Section II multiuser

MIMO downlink and virtual interference channel system mod-

els are presented In Section III we formulate our problems P 1- P 4 and discuss the general framework of our duality based

iterative solutions Sections IV - VIII present the proposed

duality based iterative solutions for solving these problemsThe extension of our duality based iterative algorithms to other

problems is discussed in Section IX In Section X computer

simulations are used to compare the performance of the

proposed duality algorithms with that of existing algorithms

Finally conclusions are drawn in Section XI

Notations Upperlower case boldface letters denote matri-

cescolumn vectors The X(nn) X(n) tr(X) XT XH and

E(X) denote the (n n) element nth row trace transpose

conjugate transpose and expected value of X respectively In

is an identity matrix of size n times n and CM timesM (realM timesM ) rep-

resent spaces of M times M matrices with complex (real) entries

The diagonal and block-diagonal matrices are represented bydiag() and blkdiag() respectively Subject to is denoted by

st and ()⋆ denotes optimal solution The superscripts ()DL

and ()I denote downlink and interference respectively

II SYSTEM M ODEL

In this section multiuser MIMO downlink and virtual

interference channel system models are discussed which are

shown in Fig 1 In the downlink channel the BS and kth

MS are equipped with N and M k antennas respectively The

total number of MS antennas are thus M = sumK

k=1 M k By

1Note that the existing MSE duality are established for a total BS power

based linear transceiver design problems (see [1] [4] [5])

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 315

3

d2

d1 HH 1

HH 2

HH K

WH 2

n1

nK

n2

WH K

WH 1

d1

d2

dK

= d B

dK

(a)

V1

V2

nI

1S 1

nI

K 1

nI KS K

nI 11

tH

KS K

tH K 1

tH

1S 1

tH 11

H111

H11S 1

H21S 1

H1KS K

H1K 1

HKK 1

HK 1S 1

H2K 1

HKKS K

dK 1

d11

VK

HK 11

H2KS K

H211

d1

dKS K

d1S 1d2

dK

(b)

Fig 1 Multiuser MIMO system model (a) downlink channel (b) virtualinterference channel

denoting the symbol intended for the k th user as dk isin CS ktimes1

and S =sumK

k=1 S k the entire symbol can be written in a data

vector d isin CS times1 as d = [dT 1 middot middot middot dT

K ]T The BS precodes d

into an N length vector by using its overall precoder matrix

B = [b11 middot middot middot bKS K ] where bks isin CN times1

is the precodervector of the BS for the kth MS sth symbol The kth MS

employs a receiver wks to estimate the symbol dks We follow

the same channel matrix notations as in [8] The estimates of

the k th MS sth symbol (dks) and k th user (dk) are given by

dks =wH ks(HH

k

K 991761i=1

Bidi + nk) = wH ks(HH

k Bd + nk) (1)

dk =WH k (HH

k Bd + nk) (2)

where HH k isin CM ktimesN is the channel matrix between the BS

and kth MS Wk = [wk1 middot middot middotwkS k ] Bk = [bk1 middot middot middotbkS k ] and

nk is the kth MS additive noise Without loss of generality

we can assume that the entries of dk are independent and

identically distributed (iid) ZMCSCG random variables all

with unit variance ie EdkdH k = IS k Edkd

H i = 0

foralli = k and EdknH i = 0 foralli k The kth MS noise vector is

a ZMCSCG random variable with covariance matrix Rnk isinCM ktimesM k

To establish our MSE downlink-interference duality we

model the virtual interference channel (Fig 1(b)) is modeled

by introducing precoders Vk = [vk1 middot middot middot vkS k ]K k=1 and de-

coders Tk = [tk1 middot middot middot tkS k ]K k=1 where vks isin CM ktimes1 and

tks isin CN times1 forallk s In this channel it is assumed that the k th

userrsquos sth symbol (dks) is an iid ZMCSCG random variable

with variance ζ ks and estimated independently by tks isin C N times1

ie EdksdH ks = ζ ks EdksdH

ij = 0 forall(i j) = (k s) and

EdknH i = 0 foralli k Moreover nI

ks forallsK k=1 (Fig 1(b))

are also ZMCSCG random variables with covariance matrices

∆ks isin realN timesN = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1 and the

channels between the k th transmitter and all receivers are the

same (ie Hkjs = Hk forall j sK k=1) Note that from the system

model aspect the current paper and [10] share the same idea

As can be seen from Fig 1 the outputs of Fig 1(a) and

Fig 1(b) are not the same However since Fig 1(b) is a

rdquovirtualrdquo interference channel which is introduced just to solve

the downlink MSE-based problems by duality approach the

output of Fig 1(b) is not required in practice For this reason

the difference in the outputs of the downlink and interference

channels of Fig 1 will not affect the downlink MSE-based

problem formulations and the duality based solutions

For the downlink system model of Fig 1(a) the symbol-

wise and user-wise MSEs can be expressed as

ξ DLks =Ed(dks minus dks)(dks minus dks)H

=wH ks(HH

k BBH Hk + Rnk)wks minus wH ksH

H k bksminus

bH ksHkwks + 1 (3)

ξ DLk =Ed(dk minus dk)(dk minus dk)H

=trIS k + WH k (HH

k BBH Hk + Rnk)Wkminus

WH k H

H k Bk minus BH

k HkWk (4)

Using these two equations the symbol-wise and user-wise

WSMSEs can be expressed as

ξ DLws =

K 991761k=1

S k991761s=1

ηksξ DLks = trη + ηWH HH BBH HW+

ηWH RnW minus ηWH HH B minus ηBH HW (5)

ξ DLwu =

K 991761k=1

ηkξ DLk = trη + ηWH HH BBH HW

+ ηWH RnW minus ηWH HH B minus ηBH HW (6)

where Rn = blkdiag(Rn1 middot middot middot RnK ) η =diag(η11 middot middot middot η1S 1 middot middot middot ηK 1 middot middot middot ηKS K ) and η =blkdiag(η1IS 1 middot middot middot ηK IS K ) with ηks and ηk are the

MSE weights of the kth user sth symbol and kth user

respectively Like in the downlink channel the interference

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 415

4

channel symbol user MSE and WSMSEs are expressed as

ξ I ks =tH

ksΓctks + tH ks∆kstks minus tH

ksHkvksζ ksminus

ζ ksvH ksH

H k tks + ζ ks (7)

ξ I k =trTH

k ΓcTk minus TH k HkVkζ k minus ζ kV

H k H

H k Tk + ζ k+

S k

991761s=1

tH ks∆kstks (8)

ξ I ws =

K 991761k=1

S k991761s=1

λksξ I ks = trλTH ΓcT minus λTH HVζ minus

λζ VH HH T + λζ +

K 991761k=1

S k991761s=1

λkstH ks∆kstks (9)

ξ I wu =

K 991761k=1

λkξ I k = trλTH ΓcT minus λTH HVζ minus

λζ VH HH T + λζ +K 991761

k=1

S k991761s=1

λktH ks∆kstks (10)

where ζ k = diag(ζ k1 middot middot middot ζ kS k) ζ = blkdiag(ζ 1 middot middot middot ζ K )

λ = diag(λ11 middot middot middot λ1S 1 middot middot middot λK 1 middot middot middot λKS K )

λ = blkdiag(λ1IS 1 middot middot middot λK IS K ) and Γc =sumK i=1

sumS ij=1 ζ ijHivijv

H ijH

H i with λks and λk are the

MSE weights of the kth user sth symbol and kth user

respectively

III PROBLEM F ORMULATION

The aforementioned MSE-based optimization problems

can be formulated as

P 1 minBkWkKk=1

K

991761k=1

S k

991761s=1 ηksξ

DL

ks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks (11)

P 2 minBkWk

Kk=1

K 991761k=1

ηkξ DLk

st [BBH ](nn) le ˘ pn trBH k Bk le ˆ pk foralln k (12)

P 3 minBkWkKk=1

max ρksξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks (13)

P 4 minBkWkKk=1

max ρkξ DLk

st [BBH

](nn) le ˘ pn trBH k Bk le ˆ pk foralln k (14)

where ρk(ˆ pk) and ρks(˘ pks) are the MSE balancing weights

(maximum available power) of the kth user and kth user sth

symbol respectively and ˘ pn denotes the maximum transmitted

power by the nth antenna

For both the WSMSE minimization and min max WMSE

problems different weights are given to different symbols

(users) However at optimality the solutions of these two

problems are not necessarily the same This is due to the

fact that the aim of the WSMSE minimization problem is

just to minimize the WSMSE of all symbols (users) (ie in

such a problem the minimized WMSE of each symbol (user)

depends on its corresponding channel gain) whereas the aim

of min max WMSE problem is to minimize and balance the

WMSE of each symbol (user) simultaneously (ie in such

a problem all symbols (users) achieve the same minimized

WMSE [13]) Moreover as will be clear later the solution ap-

proach of WSMSE minimization problem can not be extended

straightforwardly to solve the min max WMSE problem Due

to these facts we examine the WSMSE minimization and min

max WMSE problems separatelySince the problems P 1 - P 4 are not convex convex

optimization framework can not be applied to solve them To

the best of our knowledge duality based solutions for these

problems are not known In the following we present an MSE

downlink-interference duality based approach for solving each

of these problems which is shown in Algorithm I2

Algorithm I

Initialization For each problem initialize Bk = 0K k=1

such that the power constraint functions are satisfied3

Then update WkK k=1 by using minimum mean-

square-error (MMSE) receiver approach ie

Wk = (HH k BBH Hk + Rnk)minus1HH k Bk forallk (15)

Repeat Interference channel

1) Transfer the symbol-wise (user-wise) WSMSE or

WMSE from downlink to interference channel

2) Update the receivers of the interference channel

tks forallsK k=1 using MMSE receiver technique

Downlink channel

3) Transfer the symbol-wise (user-wise) WSMSE or

WMSE from interference to downlink channel

4) Update the receivers of the downlink channel WkK k=1

by MMSE receiver approach (15)

Until convergence

The above iterative algorithm is already known in [5] [8] and

[10] However the approaches of these papers can not ensure

the power constraints of P 1 - P 4 at step 3 of Algorithm I

Hence one can not apply the approaches of these papers to

solve P 1 - P 4 In the following sections we establish our

MSE downlink-interference duality

IV SYMBOL-WISE WSMSE DOWNLINK-INTERFERENCE

DUALITY

This duality is established to solve symbol-wise WSMSE-

based problems (for example P 1)

A Symbol-wise WSMSE transfer (From downlink to interfer-

ence channel)

In order to use this WSMSE transfer for solving P 1 we set

the interference channel precoder decoder noise covariance

input covariance and MSE weight matrices as

V = β W T = Bβ ζ = η λ = I ∆ks = Ψ + microksI

(16)

2As will be clear later in Section VIII to solve P 3 and P 4 (and moregeneral MSE-based problems) an additional power allocation step is requiredIn Algorithm I this step is omitted for clarity of presentation

3For the simulation we use Bk = [Hk](1Sk)Kk=1 followed by the

appropriate normalization of BkKk=1 to ensure the power constraints

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 515

5

where β ψnN n=1 and microks forallsK

k=1 are positive real

scalars that will be determined in the sequel and Ψ =diag(ψ1 middot middot middot ψN ) Substituting (16) into (9) and equating

ξ I ws = ξ DL

ws yields

trBH HWηWH HH B minus BH HWη minus ηWH HH B + η+

1

β 2

K

991761k=1

S k

991761s=1

bH

ks

(Ψ + microksIN )bks = trηWH HH BBH HW

+ ηWH RnW minus ηWH HH B minus ηBH HW + η

It follows

β 2τ =

N 991761n=1

ψn ˇ pn +

K 991761k=1

S k991761s=1

microks macr pks = pT ψ + pT micro (17)

where τ = trηWH RnW ψ = [ψ1 middot middot middot ψN ]T micro =

[micro11 middot middot middot micro1S 1 middot middot middot microK 1 middot middot middot microKS K ]T p = [ˇ p1 middot middot middot ˇ pN ]T

and p = [macr p11 middot middot middot macr p1S 1 middot middot middot macr pK 1 middot middot middot macr pKS K ]T with macr pks =bH

ksbks ˇ pn = bH n

bn and bH n is the nth row of B

The above equation shows that by choosing any ψnN n=1

and microks forallsK k=1 that satisfy (17) one can transfer thedownlink channel precoderdecoder to the interference channel

decoderprecoder ensuring ξ DLws = ξ I 1

ws where ξ I 1w is the

interference WSMSE at step 1 of Algorithm I However here

ψnN n=1 and microks forallsK

k=1 should be selected in a way that

P 1 can be solved by Algorithm I To this end we choose ψ

and micro as

β 2τ ge pT ψ + pT micro (18)

By doing so the interference channel symbol-wise WSMSE

is upper bounded by that of the downlink channel (ie ξ I 1ws le

ξ DLws ) As will be clear later to solve (11) with Algorithm

I macrβ ψ and micro should be selected as in (18) This shows

that step 1 of Algorithm I can be carried out with (16) To

perform step 2 of Algorithm I we update tks of (16) by using

the interference channel MMSE receiver approach which is

expressed as

tks =(Γc + ∆ks)minus1Hkvksζ ks

=β (HWηWH HH + Ψ + microksI)minus1Hkwksηks (19)

where the second equality is obtained from (16) The above

expression shows that by choosing microks gt 0 forallsK k=1 ψn gt

0N n=1 we ensure (HWηWH HH +Ψ+microksI)minus1 exists Next

we transfer the symbol-wise WSMSE from interference to

downlink channel by ensuring the power constraint of P 1 (iewe perform step 3 of Algorithm I)

B Symbol-wise WSMSE transfer (From interference to down-

link channel)

For a given symbol-wise WSMSE in the interference

channel with ζ = η and λ = I we can achieve the same

WSMSE in the downlink channel (with the MSE weighting

matrix η) using a nonzero scaling factor (β ) satisfying

B = β T W = Vβ (20)

In this precoderdecoder transformation we use the notations

B and W to differentiate from the precoder and decoder

matrices used in Section IV-A By substituting (20) into

ξ DLws (with B=B W=W) equating the resulting symbol-wise

WSMSE with that of the interference channel (9) and after

some simple manipulations we get

K 991761k=1

S k991761s=1

tH ks(Ψ + microksIN )tks =

1

β 2trηVH RnV

rArr β 2 = trηVH RnVsumK k=1

sumS ks=1 t

H ks(Ψ + microksIN )tks

=β 2τ sumN

n=1 ψntH n

tn +sumK

k=1

sumS ii=1 microkit

H kitki

(21)

where tH n is the nth row of the MMSE matrix T (19) and

the third equality follows from (16) The power constraints of

each BS antenna and symbol in the downlink channel are thus

given by

ˇ

b

H

bn =β 2tH

n tn (22)

=β 2τ tH

n

tnsumN

i=1 ψitH i

ti +sumK

i=1sumS i

j=1 microijtH ij tij

le ˘ pn foralln

bH ksbks =β 2tH

kstks (23)

=β 2τ tH

kstkssumN i=1 ψit

H i

ti +sumK

i=1

sumS ij=1 microijt

H ij tij

le ˘ pks forallk s

where bH

n is the nth row of B By multiplying both sides of

(22) and (23) with ψn foralln and microks forallk s we get

ψn ge f n and microks ge f ks forallnks (24)

where f n = β2τ ˘ pn

ψntHn tn

sumN

i=1 ψitH

iti+sum

K

i=1sum

Si

j=1 microijtH

ijtij

and f ks =

β2τ ˘ pks

microkstHkstkssum

N i=1 ψit

Hi ti+

sumKi=1

sumSij=1 microijtHijtij

Now for any given β

tH n

tnN n=1 and tH

kstks forallsK k=1 suppose that there exist

ψn gt 0N n=1 and microks gt 0 forallsK

k=1 that satisfy

ψn = f n and microks = f ks forallnks (25)

From the above equation one can also achieve ψn ˘ pn =f n ˘ pn microks ˘ pks = f ks ˘ pks forallnks Summing up these expres-

sions for all n k and s results

N

991761n=1

ψn ˘ pn +K

991761k=1

S k

991761s=1

microks ˘ pks =N

991761n=1

f n ˘ pn +K

991761k=1

S k

991761s=1

f ks ˘ pks

=β 2τ (26)

This equation shows that the solution of (25) satisfies (26)

Moreover as ˘ pn ge ˇ pnN n=1 and ˘ pks ge macr pks forallsK

k=1

the latter solution also ensures (18) Therefore by choosing

ψnN n=1 and microks forallsK

k=1 such that (25) is satisfied step 3

of Algorithm I can be performed Furthermore one can notice

from (26) that β 2 can be any positive value

Next we show that there exists at least a set of feasible

ψn gt 0N n=1 and microks gt 0 forallsK

k=1 that satisfy (25) To this

end we consider the following Theorem [14]

Theorem 1 Let (X ∥∥2) be a complete metric space We

say that X rarr X is an almost contraction if there exist

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 615

6

κ(κ) isin [0 1) and χ(χ) ge 0 such that

∥(x) minus (y)∥2 le κ∥x minus y∥2 + χ∥y minus (x)∥2 or (27)

∥(x) minus (y)∥2 le κ∥x minus y∥2 + χ∥x minus (y)∥2 forallxy isin X

If satisfies (27) then the following holds true

1) existx isin X x = (x)

2) For any initial x0 isin X the iteration xn+1 = (xn)

for n = 0 1 2 middot middot middot converges to some x⋆ isin X3) The solution x⋆ is not necessarily unique

Proof See Theorem 11 of [14] Note that according to

[15] (see (11) and (12) of [15]) the two inequalities of (27)

are dual to each other

Define x and as x [x1 middot middot middot xS +N ]T =

[ψ1 middot middot middot ψN micro11 middot middot middot micro1S 1 middot middot middot microK 1 middot middot middot microKS K ]T

(x) [ f 1 middot middot middot f N f 11 middot middot middot f 1S 1 middot middot middot f K 1 middot middot middot f KS K ]with xn = ψn isin [ϵ (β 2τ minus ϵ

sumN i=1 i=n pim)pnm]N

n=1

and xrS +N r=N +1 = microks =isin [ϵ (β 2τ minus

ϵsumK

i=1

sumS ij=1(ij)=(ks) pijm)pksm] forallsK

k=14 As we can

see from (27) when ∥(x1) minus(x2)∥2 = 0 with x1 = x2 or

x1 = x2 one can set κ(κ) = 0 and χ(χ) = 0 to satisfy thisinequality And when ∥(x1) minus(x2)∥2 gt 0 (ie x1 = x2)

one can select appropriate κ(κ) isin [0 1) and χ(χ) ge 0 such

that (27) is satisfied This is due to the fact that in the latter

case ∥x2 minus (x1)∥2 gt 0 andor ∥x1 minus (x2)∥2 gt 0 and

∥x1 minus x2∥2 gt 0 are positive and bounded This explanation

shows the existence of κ(κ) isin [0 1) and χ(χ) ge 0 ensuring

(27) for any ∥(x1) minus (x2)∥2 x1x2 isin X Consequently

(x) is an almost contraction which implies

xn+1 = (xn) x0 = [x01 x02 middot middot middot x0(S +N )]T ge ϵ1N +S

for n = 0 1 2 middot middot middot converges (28)

where 1N +S is an N + S length vector with each elementequal to unity Thus there exist ψn ge ϵN

n=1 and microks geϵ forallsK

k=1 that satisfy (25) and can be computed using (28)

For numerical simulation we initialize x0 as x01 = x02 =middot middot middot = x0(S +N ) However finding the optimal initialization

strategy is still an open research topic

Once the appropriate ψnN n=1 and microksforallsK

k=1 are ob-

tained step 4 of Algorithm I is immediate and hence P 1 can

be solved iteratively using this algorithm

C Extension of the current duality for P 1 with a total BS

power constraint

If the constraints of P 1 are modified to a total BS powerthe power constraint at step 3 of Algorithm I can be ensured

by applying the precoderdecoder transformation expression of

[5] The precoderdecoder transformation of [5] is performed

by computing S scaling factors These scaling factors are

obtained by solving S systems of equations which require

matrix inversion with complexity O(S 3) (see (23) of [5])

In the current paper if the constraints of P 1 are modified

to a total BS power one can ensure the power constraint at step

3 of Algorithm I just by assigning ∆ks of (16) as ∆ks = I

By doing so β 2 of (17) and β 2 of (21) can be expressed as

4For our simulation we use ϵ =

min(10minus6 βτpnmN n=1 βτpksm forallsKk=1)

β 2 =sumK

k=1

sumSks=1 b

Hksbks

τ = P max

τ and β 2 = trηVHRnV

sumKk=1

sumSks=1 t

Hkstks

where P max is the total BS power Now by employing (20)

the total BS power at step 3 of Algorithm I can thus be given

as trBBH = β 2trTTH = β 2τ = P max (ie the total

BS power constraint is satisfied) Thus for P 1 (with a total BS

power constraint) we do not need to use Theorem I Moreover

our duality requires only one scaling factor to perform the

precoderdecoder transformation (ie β 2(β 2)) This showsthat for this problem the proposed duality based algorithm

requires less computation compared to that of [5] Note that

the duality algorithm of [5] requires the same computation as

that of [8] and less computation than that of [1] and [4] Thus

it is sufficient to compare the current duality algorithm with

the duality algorithm of [5]

For other WSMSE-based problems with a total BS power

constraint function the computational advantage of the current

duality based algorithm over that of [5] can be analysed like

in this subsection

V USE R-WISE WSMSE DOWNLINK-INTERFERENCE

DUALITYThis duality is established to solve user-wise WSMSE-

based problems (for example P 2)

A User-wise WSMSE transfer (From downlink to interference

channel)

To apply this WSMSE transfer for solving P 2 we set the

precoder decoder and noise covariance matrices as

V = β W T = Bβ ζ = η λ = I∆ks = Ψ + microkI (29)

where β ψnN n=1 and microkK

k=1 are real positive scalars

Substituting (29) into (10) and equating ξ I wu = ξ DL

wu yields

β 2τ =

N 991761n=1

ψn ˇ pn +

K 991761k=1

microk pk = pT ψ + pT micro (30)

where τ = trηWH RnW micro = [micro1 middot middot middot microK ]T p =

[˜ p1 middot middot middot ˜ pK ]T with ˜ pk = trBkB

H k Like in Section IV-A

we perform step 1 of Algorithm I by choosing β 2 ψ and microas

β τ ge pT ψ + pT micro (31)

To perform step 2 of Algorithm I we update tks of (29)

using the interference channel MMSE receiver as

tks =β (HWηWH HH + Ψ + microkI)minus1Hkwksηk (32)

This expression shows that by choosing microk gt 0K k=1 ψn gt

0N n=1 we ensure that (HWηWH HH + Ψ+ microkI)minus1 exists

B User-wise WSMSE transfer (From interference to downlink

channel)

For a given user-wise WSMSE in the interference channel

with ζ = η and λ = I we can achieve the same WSMSE in

the downlink channel (with the weighting matrix η) by using

a nonzero scaling factor ( ˜β ) which satisfies

B = ˜β T W = V

˜β (33)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 715

7

In this precoderdecoder transformation we use the notationsB and W to differentiate from the precoder and decoder

matrices used in Section V-A By substituting (33) into ξ DLwu

(with B=B W=W) then equating the resulting user-wise

WSMSE with that of the interference channel (ξ I wu) and after

simple manipulations we get

˜β 2

=

β 2τ sumN n=1 ψntH

n tn +sumK

k=1 microktrTH k Tk (34)

where tH n is the nth row of the MMSE matrix T (32) The

power constraints of each BS antenna and user (ie step 3 of

Algorithm I) in the downlink channel can be expressed as

ψn ge ˇf n and microk ge f k forallk (35)

where

ˇf n =β 2τ

˘ pn

ψntH n

tnsumN i=1 ψit

H i

ti +sumK

i=1 microitrTH i Ti

(36)

f k =β 2τ

ˆ pk

microktrTH k Tk

sumN i=1 ψitH i ti +sumK

i=1 microitrTH i Ti

(37)

For given β tH n

tnN n=1 and trTH

k TkK k=1 one can show

that there exist ψnN n=1 and microkK

k=1 which satisfy

ψn = ˇf n and microk = f k forallnk (38)

The solution of (38) can be obtained exactly like that of (25)

As ˘ pn ge ˇ pnN n=1 and ˆ pk ge ˜ pkK

k=1 the latter solution also

satisfies (31) Thus P 2 can be solved using Algorithm I

V I SYMBOL-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

In this section we establish the symbol-wise MSE duality

between downlink and interference channels If all symbols

are active this duality can be applied to solve MSE based

problems However as will be clear later this duality requires

more computation compared to the duality of Sections IV and

V Thus we propose this duality to be employed for problems

like in P 3 since this problem maintains all symbols active and

can not be solved by the duality in Sections IV and V

A Symbol-wise MSE transfer (From downlink to interference

channel)

To apply this duality for P 3 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

vks = β kswks tks = bksβ ks ζ = I

∆ks = Ψ + microksIN forallks (39)

Substituting (39) into (7) and ξ DLks = ξ I

ks forallsK k=1 yields

wH ks(HH

k

K 991761i=1

S i991761j=1

bijbH ijHk + Rnk)wks minus wH

ksHH k bks

minus bH ksHkwks + 1 =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1

β 2ijHiwijwH ijH

H i +

Ψ + microksIN )bks minus bH

ksHkwks minus wH

ksHH

k bks + 1 forallks

It implies

wH ks(HH

k

K 991761i=1

S i991761j=1(ij)=(ks)

bijbH ijHk + Rnk)wks =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijHiwijwH ij H

H i + Ψ+

microksIN )bks forallks (40)

Collecting the above expression for all k and s gives

(Y + Θ)β2

=[a11 middot middot middot a1S 1 middot middot middot aK 1 middot middot middot aKS K ]T = ˜Px

rArr β2

=Θminus1(I + YΘminus1)minus1 ˜Px (41)

where β2

= [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T

Θ = diag(θ11 middot middot middot θ1K 1 middot middot middot θK 1 middot middot middot θKS K )

aks = bH ksΨbks + microksb

H ksbks ˜P = [ macrP P] and

Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

θks = wH ksRnkwks macrP isin realS timesN = |BH |2

P = diag(macr p11 middot middot middot macr p1S 1 middot middot middot macr pK 1 middot middot middot macr pKS K )

yks = [minus|bH ksH1w11|2 middot middot middot zks middot middot middot minus|bH

ksHK wK 1| middot middot middot minus |bH

ksHK wKS K |]T and zks =

wH ksH

H k

sumK i=1

sumS ij=1(ij)=(ks) bijb

H ijHkwks Next we

examine two important properties of (I + YΘminus1)minus1 To this

end we examine the following Theorem

Theorem 2 Let A isin realntimesn and A(ij)(i=j) le 0 1 lei( j) le n If the diagonal elements of A are A(ii) = 1 minussumn

j=1j=i A(ji) then

Property 1 Aminus1 ge 0 (42)

Property 2 |||Aminus1|||1 = 1 (43)

where () ge 0 and ||||||1 denote matrix non-negativity and

one norm respectively

Proof See Appendix A

According to the first property of Theorem 2 if θks gt0 forallsK

k=15 the inverse of (I + YΘminus1) exists and it has

nonnegative entries Consequently for any positive ψnN n=1

and microks forallsK k=1 β ks forallsK

k=1 of (41) are strictly positive6

Now by selecting ψnN n=1 and microks forallsK

k=1 such that (41) is

fulfilled we can transfer the MSE of each symbol from down-

link to interference channel ensuring ξ DLks = ξ I 1

ks forallsK k=1

where ξ I 1ks is the MSE of the kth user sth symbol at step 1

of Algorithm I Here we should also select ψnN n=1 and

microks forallsK k=1 such that the power constraint of P 3 at step 3

of Algorithm I is satisfied To this end we examine the steps(2) and (3) of this algorithm

Like in Section IV we perform step 2 of Algorithm 1 by

updating tks using MMSE receiver as

tks =(Γc + ∆ks)minus1Hkvksζ ks (44)

=(

K 991761i=1

S i991761j=1

β ijHiwijwH ijH

H i + Ψ + microksI)minus1Hkwksβ ks

where the second equality is obtained from (39) The above

expression shows that by choosing microks gt 0 forallsK k=1 ψn gt

5For P 3 wH ksRnkwks gt 0forallsK

k=1 is always true

6Note that the application of (43) will be clear in the sequel (see (55))

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 815

8

0N n=1 we ensure (

sumK i=1

sumS ij=1 β ijHiwijw

H ij H

H i + Ψ +

microksI)minus1 exists Next we transfer the symbol-wise MSE from

interference to downlink channel by satisfying the power

constraint of P 3 (ie we perform step 3)

B Symbol-wise MSE transfer (From interference to downlink

channel)

For a given symbol MSE in the interference channel with

ζ = I we can achieve the same symbol MSE in the downlink

channel by using a nonzero scaling factor (β ks) which satisfies

bks = β kstks wks = vksβ ks (45)

Here we use the notations B and W to differentiate with

the precoder and decoder matrices used in Section VI-A By

substituting (45) into ξ DLks (with B=B W=W) then equating

the resulting symbol MSE with that of the interference channel

(7) and after some straightforward steps we get

1β 2ksvH ks(HH k

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijtijtH ijHk + Rnk)vks =

tH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

HivijvH ij H

H i + Ψ + microksI)tks forallks

By collecting the above equalities for all k and s β ks forallsK k=1

can be determined by

(Y + Ω)β2 =[vH 11Rn1v11 middot middot middot vH

1S 1Rn1v1S 1

middot middot middot vH K 1RnK vK 1 middot middot middot vH

KS KRnK vKS K ]T

=Θβ2

= ΘΘminus1(I + YΘminus1)minus1 ˜Px

rArr β2 =(Y + Ω)minus1(I + YΘminus1)minus1 ˜Px

=Ωminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜Px (46)

where the third equality follows from (41)

β2 = [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T Ω =diag(tH

11Ψt11 middot middot middot tH 1S 1

Ψt1S 1 middot middot middot tH K 1ΨtK 1 middot middot middot

tH KS K

ΨtKS K ) Ω = diag(micro11tH 11t11 middot middot middot micro1S 1t

H 1S 1

t1S 1 middot middot middot

microK 1tH K 1tK 1 middot middot middot microKS Kt

H KS K

tKS K ) Ω = Ω + Ω

and Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

yks = [minus|tH 11H1vks|2 middot middot middot zks middot middot middot minus|tH

K 1HK vks|2 middot middot middot minus |tH

KS KHK vks|2]T and zks =

tH kssum

K i=1sum

S ij=1(ij)

=(ks)Hivijv

H ij H

H i tks By applying

Theorem 2 it can be shown that β ks forallsK k=1 are strictly

positive for ψn gt 0N n=1 and microks gt 0 forallsK

k=1 The power

constraints of the nth BS antenna and kth user sth symbol

are given by

bH

nbn = tH

n Υtn le ˘ pn foralln (47)bH ksbks = β 2kst

H kstks le ˘ pks forallk s (48)

where Υ = diag(β 211 middot middot middot β 1S 1 middot middot middot β 2K 1 middot middot middot β KS K ) Mul-

tiplying both sides of (47) by ψn and stacking the resulting

inequality for all n yields

˘Pψ ge

˜Ωβ

2

(49)

where P = diag(˘ p1 middot middot middot ˘ pN ) and Ω = Ψ|T|2 Like in the

above expression by multiplying both sides of (48) with microks

and collecting the resulting inequality for all k and s the

power constraints (48) can be expressed as

macrPmicro ge Ωβ2 (50)

where macrP = diag(˘ p11 middot middot middot ˘ p1S 1 middot middot middot ˘ pK 1 middot middot middot ˘ pKS K ) By

employing β2 of (46) (49) and (50) can be combined as

xprime ge ˜Ωβ2 = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1xprime

= (xprime)xprime (51)

where ˜P = blkdiag(P macrP) ˜Ω = [ΩT ΩT ]T xprime = ˜

P[ψ micro]T

and (xprime) = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1

Next we show that there exists xprime gt 0 such that (51) is

satisfied Towards this end we consider the following discrete-

time switched system [16]

xn+1 = Fσnxn for n = 0 1 2 middot middot middot (52)

where x isin realmtimes1 is a state Fσn isin realmtimesm is a switchingmatrix and σn isin 0 1 2 middot middot middot According to [16] (Remark 2

of [16]) the above system is marginally stable (convergent) if

maxσn

∥Fσn∥⋆ = 1 for n = 0 1 middot middot middot (53)

where ∥∥⋆ denotes an induced matrix norm

Let us consider the following iteration

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (54)

Now if we assume (xprimen) = Fσn foralln7 we can interpret (54)

as a discrete time switched system Consequently the above

iteration is guaranteed to converge if maxn ∥ (xprimen)∥⋆ = 1 It

is known that ||||||1 is an induced matrix norm [17] For any

xprime the matrix one norm of (xprime) is given by

||| (xprime)|||1

=||| ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1|||1

le||| ˇΩ|||1|||(I + YΩminus1)minus1|||1|||(I + YΘminus1)minus1|||1||| ˇP|||1

=||| ˇΩ|||1||| ˇP|||1 le 1 (55)

where ˇΩ = [ ˜ΩΩminus1 0(N +S )timesN ] ˇP = [ ˜P( ˜P)minus1 0N times(N +S )]

the second inequality is due to the fact that |||XY|||1 le|||X|||1|||Y|||1 [17] (page 290) the third equality is obtained

by applying Theorem 2 and the last inequality employs thefollowing facts Using the definition (73) (see Appendix A)

one can get ||| ˇΩ|||1 le 1 by applying (46) and (51) and

||| ˇP|||1 le 1 by applying (13) (41) and (51)

Thus maxn ∥ (xprimen)∥⋆ = 1 holds true and (54) is guar-

anteed to converge As we can see (54) is derived by using

(41) and (46) Thus the solution of (54) also satisfies (41)

and (46) Moreover for any initial xprime0 gt 0 since (xprimen) foralln is

positive the solution of (54) is strictly positive and [ψ micro]T =

( ˜P)minus1xprime gt 0 which is the desired result

7Since (xprimen) is the products of stochastic matrices (see the proof of Theorem 2) (xprimen) is a bounded matrix for any xprime gt 0 Thus the assumption

(xprimen) = Fσn foralln holds true

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 915

9

Once the feasible microks forallsK k=1 and λnN

n=1 are obtained

step 4 of Algorithm 1 is immediate As a result P 3 can be

solved using Algorithm I with an additional power allocation

step which will be detailed in Section VIII

C Extension of the current duality for P 3 with a total BS

power constraint

In this subsection we show the extension of the current

duality for P 3 with a total BS power constraint For this

problem we set ∆ks of (39) as ∆ks = I forallk s (ie like in

Section IV-B) Upon doing so β2 is computed directly from

the first equality of (46) (ie the bound (55) is not needed)

By summing the left and right hand sides of this equality one

can get trBBH = P max This shows that for P 3 with a

total BS power constraint problem the total BS power at step

3 of Algorithm I is satisfied Thus one can apply Algorithm

I (with the additional power allocation step) to solve the latter

problem by setting ∆ks of (39) as ∆ks = I forallk s

For other total BS power constrained WMSE-based prob-

lems the current duality based algorithm can be applied likein this subsection The details are omitted for conciseness

Note that for such problem types the duality algorithm of the

current paper has the same complexity as that of [5]

VII USE R-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

This section establishes user-wise MSE duality between

downlink and interference channels This duality is established

to solve the problems of type P 4

A User-wise MSE transfer (From downlink to interference

channel)

To apply this MSE transfer for P 4 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

Vk = β kWk Tk = Bkβ k ζ = I ∆ks = Ψ + microkI (56)

Like in Section VI substituting (56) into (8) equating ξ DLk =

ξ I k K

k=1 and after some straightforward steps we get the

following system of equations

(Y + Θ)β2

= ˜Px rArr β2

= Θminus1(I + YΘminus1)minus1 ˜Px (57)

where

Y(kl) =

983163 sumK i=1i=k ∥WH

k HH k Bi∥2F for k = l

minus∥WH l H

H l Bk∥2F for k = l

(58)

Θ = diag(θ1 middot middot middot θK ) β2

= [β 21 middot middot middot β 2K ]T

˜P = [ macrP P]

with θk = trWH k RnkWk macrP isin realS timesN = |BH |2 P =

diag(macr p1 middot middot middot macr pK ) By applying Theorem 2 it can be shown

that β kK k=1 of (57) are strictly positive Thus step 1 of

Algorithm I can be performed using (57) We perform step 2

of Algorithm I by updating tks using MMSE receiver as

tks =(K

991761i=1

β iHiWiWH i H

H i + Ψ + microkI)minus1Hkwksβ k (59)

B User-wise MSE transfer (From interference to downlink

channel)

For a given user MSE in the interference channel with

ζ = I we can achieve the same MSE in the downlink channel

by using nonzero scaling factors ( ˜β kK k=1) that satisfy

Bk = ˜β kTk

Wk = Vk ˜β k (60)

Here we also use the notations B and W to differentiate

with the precoder and decoder matrices used in Section VII-

A By substituting (60) into ξ DLk (with B=B W=W) and

then equating the resulting user-wise MSE with that of the

interference channel (7) and after some steps ˜β kK k=1 are

determined as

(I + ˇYˇΩminus1

) ˇΩ ˜β2

= [trVH 1 Rn1V1 middot middot middot trVH

K RnK VK ]T

rArr ˜β2

= ˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px (61)

where the second equality follows from

(57) ˜β2

= [ ˜β 21

middot middot middot ˜β 2K

]T Ωprime =diag(trTH

1 ΨT1 middot middot middot trTH K ΨTK ) Ω =

diag(micro1trTH 1 T1 middot middot middot microK trTH

K TK ) ˇΩ = Ωprime + Ω

By applying Theorem 2 it can be shown that ˜β kK k=1 are

strictly positive for ψn gt 0N n=1 and microk gt 0K

k=1 Like in

Section VI-B the power constraint of the nth BS antenna

and kth user can thus be expressed as

xprime ge ˆΩ ˜β2

= ˆΩˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px

= (xprime)xprime (62)

where P = diag(ˆ p1 middot middot middot ˆ pK ) ˆP = blkdiag(P ˆP) ˆΩ =

[ΩT

ΩT

]T

xprime

= ˜P[ψ micro]

T

and (xprime

) = ˆΩˇΩ

minus1

(I +ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜P( ˆP)minus1 Like in Section VI-B it

can be shown that there exists a feasible xprime gt 0 that satisfy

(62) and can be obtained iteratively by

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (63)

By initializing xprime0 gt 0 the solution of the above iteration

is always positive Consequently λn gt 0N n=1 and microk gt

0K k=1 holds true Once the feasible microkK

k=1 and λnN n=1

are obtained step 4 of Algorithm 1 is straightforward As a

result P 4 can be solved using Algorithm I with the additional

power allocation step of Section VIII

VIII GENERALIZED AND IMPROVED VERSION OF

Algorithm I

From the discussions of Sections IV - VII one can

understand that each iteration of Algorithm I gives a non

increasing sequence of symbol (user) WMSEWSMSE As can

be seen from Section III the objective of P 1(P 2) is just to

minimize the total WSMSE of all symbols (users) whereas

the objective of P 3(P 4) is to simultaneously minimize and

balance the WMSE of all symbols (users) Thus Algorithm

I is appropriate to solve P 1(P 2) of the current paper For

P 3(P 4) although each iteration of Algorithm I is able to

provide a non increasing sequence of symbol (user) WMSE

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1015

10

(ie minimizes the maximum WMSE of all symbols (users))

each iteration of this algorithm is not able to guarantee

balanced WMSEs of all symbols (users) On the other hand

for an MSE constrained total BS power minimization problem

(for example P 7 in Section IX) an iterative algorithm that

can provide a non increasing sequence of total BS power is

required This shows that Algorithm I also can not solve the

latter problem In the following we address the drawbacks of Algorithm I just by including a power allocation step into

Algorithm I as explained below

In [8] for fixed transmit and receive filters the power

allocation parts of total BS power constrained MSE-based

problems have been formulated as GPs by employing the

approach and system model of [1] under the assumption that

all symbols are strictly active8 For this assumption in [8] we

show that the system model of [1] is appropriate to solve any

kind of total BS power constrained MSE-based problems using

duality approach (alternating optimization) This motivates us

to utilize the system model of [1] in the downlink channel

only and then include the power allocation step (ie GP) into

Algorithm I Towards this end we decompose the precoders

and decoders of the downlink channel as

Bk =GkP12k Wk = UkαkP

minus12k forallk (64)

where Pk = diag( pk1 middot middot middot pkS k) isin realS ktimesS k Gk =[gk1 middot middot middot gkS k ] isin CN timesS k Uk = [uk1 middot middot middot ukS k ] isin CM ktimesS k

and αk = diag(αk1 middot middot middot αkS k) isin realS ktimesS k are the transmit

power unity norm transmit filter unity norm receive filter and

receiver scaling factor matrices of the kth user respectively

ie gH ksgks = uH

ksuks = 1 forallsK k=1

By employing (64) and stacking ξ = [ξ DL11 middot middot middot ξ DL

KS K]T

= [ξ DL1 middot middot middot ξ DL

S ]T = [ξ DLl S

l=1]T the l th downlink symbol

MSE can be expressed as (see [1] and [10] for more detailsabout (64) and the above descriptions)

ξ DLl = pminus1l [(D + α2ΦT )p]l + pminus1l α2

l uH l Rnul (65)

where

Φ(lj) =

983163 |gH

l Huj |2 for l = j0 for l = j

(66)

D(ll) =α2l |gH

l Hul|2 minus 2αlreal(uH l H

H gl) + 1 (67)

1 le l( j) le S P = blkdiag(P1 middot middot middot PK ) =diag( p1 middot middot middot pS ) p = [ p1 middot middot middot pS ]

T G = [G1 middot middot middot GK ] =[g1 middot middot middot gS ] U = blkdiag(U1 middot middot middot UK ) = [u1 middot middot middot uS ]

and α = blkdiag(α1 middot middot middot αK ) = diag(α1 middot middot middot αS ) with∥gl∥2 = ∥ul∥2 = 1 Using (65) for fixed GU and α the

power allocation part of P 1 can be formulated as

min plSl=1

S 991761l=1

ηlξ DLl st ς T

np le ˘ pn pl le ˘ pl foralln l (68)

where ς T n isin real1timesS = |[G(ni)|2S

i=1 [η1 middot middot middot ηS ]T =

[η11 middot middot middot ηKS K ]T and [ ˘ pl middot middot middot ˘ pS ]T = [ ˘ p11 middot middot middot ˘ pKS K ]T As

ξ DLl is a posynomial (where plS

l=1 are the variables) (68)

8Note that this assumption is not always true for all MSE-based problemsHowever as mentioned in [1] in practice replacing zero powers by a smallvalue will not affect the overall optimization Due to this reason we replace

zero powers by 10minus6 in the simulation section

is a GP for which global optimality is guaranteed Thus it

can be efficiently solved using interior point methods with a

worst-case polynomial-time complexity [18]

For fixed GU and α the power allocation parts of

P 2 minus P 4 can be formulated as GPs like in P 1 Our duality

based algorithm for each of these problems including the

power allocation step is summarized in Algorithm II

Algorithm II

Initialization Like in Algorithm I

Repeat Interference channel

1) For P 1 and P 2 set V = WT = B (ie β = β = 1)

then compute ψn microks forallksn and ψn microk forallk nusing (25) and (38) respectively For P 3 and P 4 first

compute ψn microks forallksn and ψn microk forallk n using

(54) and (63) respectively then transfer each symbol

and user MSE from downlink to interference channels

by (39) and (56) respectively

2) Update the MMSE receivers of the interference channel

for P 1 P 2 P 3 and P 4 using (19) (32) (44) and (59)

respectivelyDownlink channel

3) Transfer the MSE (weighted sum user or symbol MSE)

from interference to downlink channel using (20) (33)

(45) and (60) for P 1 P 2 P 3 and P 4 respectively

4) For each of the problems P 1 minus P 4 decompose the

precoder and decoder matrices of each user as in (64)

Then formulate and solve the GP power allocation part

For example the power allocation part of P 1 can be

expressed in GP form as (68)

5) For each of the problems P 1minusP 4 by keeping PkK k=1

constant update the receive filters UkK k=1 and scal-

ing factors αkK

k=1 by applying downlink MMSE

receiver approach ie Ukαk = (HH k GPGH Hk +

Rnk)minus1HH k GkPkK

k=1 Note that in these expressions

αkK k=1 are chosen such that each column of UkK

k=1

has unity norm Then compute BkWkK k=1 by (64)

Until convergence

Convergence It can be shown that at each iteration

of this algorithm the objective function of each of the

problems P 1 - P 4 is non-increasing [4] [7] [19] Thus

the above iterative algorithm is convergent However

since P 1 - P 4 are non-convex this iterative algorithm

is not guaranteed to converge to the global optimum

In this algorithm we stop iteration (ie our convergence

condition) when the difference between the objectivefunctions in two consecutive iterations is smaller than

some small value ϵ (we use ϵ = 10minus6 for the simulation)

Computational complexity As can be seen from this

algorithm when we increase the number of users andor

(BS andor MS antennas) the number and size of

optimization variables increase Because of this the

computational complexity of Algorithm II increases as

K andor N andor M increases However studying the

complexity of this algorithm as a function of K N and

M needs effort and time And such a task is beyond the

scope of this work and is an open research topic

The power allocation step of Algorithm II has thus the

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1115

11

following benefits (1) For BS power constrained WSMSE

minimization problems this step improves the convergence

speed of Algorithm II compared to that of Algorithm I9 (for

example in P 1 minus P 2) The degree of improvement depends on

different parameters (for example Hk ∆ks forallk s etc) Thus

the theoretical comparison of these two algorithms in terms of

convergence speed requires time and effort And this task is

beyond the scope of this work and it is an open research topic(2) For symbol-wise (user-wise) WMSE balancing problems

this step helps to balance the WMSE of all symbols (users)

(for example in P 3 minus P 4) (3) For MSE constrained total

BS power minimization problems this step ensures a non

increasing total BS power at each iteration of Algorithm II

IX APPLICATION OF THE PROPOSED DUALITY BASED

ALGORITHM FOR OTHER PROBLEMS

A MSE based problem with entry-wise power constraint

The symbol-wise WSMSE minimization constrained with

entry wise power ie bH

ksnb

ksn le macr p

ksn forallksn problem is

formulated as

P 5 minBkWkKk=1

K 991761k=1

S k991761s=1

ηksξ DLks st bH

ksnbksn le macr pksn (69)

It can be shown that this problem can be solved by Algorithm

II with ∆ks = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1

B Weighted sum rate optimization constrained with per an-

tenna and symbol power problem

By employing the approach of [11] (see (16) of [11]) one

can equivalently express the weighted sum rate maximizationconstrained with per antenna and symbol power problem as

P 6 (70)

minτ ksν ksbkswksforallsK

k=1

K 991761k=1

S k991761s=1

θks1

τ ksν γ ks

ks +K 991761

k=1

S k991761s=1

ηksξ DLks

st [BBH ](nn) le ˘ pnbH ksbks le ˘ pks

K prodk=1

S kprods=1

ν ks = 1 τ ks gt 0

where 0 lt ωks lt 1 forallsK k=1 are the rate weighting factors

for all symbols ηks = τ microksks γ ks = 11minusωks

microks = 1ωks

minus 1 and

macrθks = ωksmicro

(1minusωks)

ks For fixed τ ks ν ks foralls

K

k=1 the aboveoptimization problem has the same mathematical structure

as that of P 1 Thus by keeping τ ks ν ks forallsK k=1 constant

bkswks forallsK k=1 can be optimized by applying the MSE

duality discussed in Section IV Moreover τ ks ν ks forallsK k=1

and the power allocation part of the above problem can be

optimized by a GP method like in (25) of [20] Consequently

we can apply Algorithm II to solve (70) The detailed expla-

nations are omitted for conciseness The following problems

9This is at the expense of additional computation However as mentionedin [1] (see Appendix A of [1]) a small desktop computer can solve a GP of 100 variables and 10000 constraints by standard interior point method under aminute Thus we believe that the complexity of Algorithm I and Algorithm

II are almost the same

can also be solved by simple modification of Algorithm II

P 7 minBkWk

Kk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

SINRks ge ϱks forallnks

equiv minBkWkKk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

ξ DLks le (1 + ϱks)minus1 forallnks

P 8 maxBkWk

Kk=1

min Rks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

equiv minBkWkKk=1

max ξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

where SINRks(Rks) is the SINR (rate) of the kth user sth

symbol and we use the fact that Rks = log(1 + SINRks)and ξ DL

ks = (1 + SINRks)minus1 [1] It is clearly seen that the

application of Algorithm II is not limited to the problems of

this paper

Note that under imperfect channel state information (CSI)

condition the stochastic robust design versions of P 1 - P 5 can

be solved like in [10] However to the best of our knowledge

the relationship between rate (SINR) and MSE is not known

when the CSI is imperfect [7] Hence solving the rate (SINR)-

based robust design problems (for example robust versions of

P 6 - P 8) by our duality approach is an open problem

X SIMULATION R ESULTS

In this section we present simulation results for P 1 minus P 4

All of our simulation results are averaged over 100 randomly

chosen channel realizations We set K = 2 N = 4 and

M k = S k = 2 ηks = ρks = ηk = ρk = 1 forallsK k=1

It is assumed that Rn1 = σ21IM 1 Rn2 = σ2

2IM 2 and

σ22 = 2σ2

1 The maximum power of each BS antenna is set

to ˘ pn = 25mW N n=1 And the maximum power allocated

to each symbol and user are set to ˘ pks

= 25mW forallsK

k=1and ˆ pk = 5mW K k=1 respectively For better exposition we

define the Signal-to-noise ratio (SNR) as P maxKσ2av and it

is controlled by varying σ2av where P max = 10mW is the

total maximum BS power and σ2av = (σ2

1 + σ22)2 We also

compare Algorithm II and the algorithm in [2]10

Note that the algorithm in [2] is designed for coordinated

BS systems scenario And the iterative algorithm of [2] is

based on the per BS power constraint However according

to [2] and [21] B coordinated BS systems each with Z

10As will be clear in the sequel the proposed algorithm and the algorithmof [2] may not utilize the entire 10mW for all noise levels Thus the afore-mentioned SNR can be considered as the maximum SNR of the transmitted

signal

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1215

12

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

Fig 2 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of WSMSE for [top] P 1 [bottom] P 2

antennas can be treated as one multiuser MIMO system with

BZ antennas Thus when Z = 1 the considered problem has

exactly the same structure as that of [2] To the best of our

knowledge there is no other general linear algorithm that cansolve the problem types P 1 minus P 4 On the other hand in all

problems since there are more than one power constraints (ie

per antenna and symbol (user) powers) all power constraints

may not be active at the optimal solution Due to these reasons

we compare Algorithm II and the algorithm in [2] both in

terms of the achieved MSE (ie minimized MSE) and total

utilized BS power at the achieved MSE

A Simulation results for problems P 1 minus P 2

In this subsection we compare the performance of our

proposed algorithm with that of [2] As can be seen from Fig

2 the proposed algorithm and the algorithm in [2] achievethe same symbol-wise and user-wise WSMSEs Next we plot

the total utilized powers at the BS to achieve these WSMSEs

which is shown in Fig 3 From these two figures one can see

that to achieve the same WSMSE the proposed duality based

iterative algorithm requires less total BS power than that of

[2] This scenario fits to that of [10] and [19] where the sum

MSE minimization constrained with a per BS antenna power

problem has been examined by duality approach

B Simulation results for problems P 3 minus P 4

Like in the above subsection here we compare the per-

formance of our proposed algorithm with that of [2] For

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 3 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 1 [bottom] P 2

For this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

10 15 20 25 30 350

005

01

015

02

025

SNR (dB)

M a x i m u m s y m b o l M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

005

01

015

02

025

03

035

04

045

05

SNR (dB)

M a x i m u m u s e r M S E

Algorithm II

Algorithm in [2]

Fig 4 Comparison of the proposed algorithm (Algorithm II) and that of

in [2] in terms of maximum achieved MSE for [top] P 3 [bottom] P 4

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 2: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 215

2

be sent to a user (all users) simultaneously [11] [12] In

such a scenario for successful transmission more priority

(power) could be given to symbols (users) corresponding to

the video information Thus for this scenario the design

criteria may incorporate fairnesspriority and power constraints

for each symbol (user) On the other hand examining com-

bined (per antenna and symbol (user)) power constraints

may have practical interest (for example in network MIMO)For these reasons the current paper generalizes the work of

[10] by incorporating both symbol-wise and user-wise MSE

fairnesspriority and combined (ie per antenna and symbol

(user)) power constraints We examine the following problems

Minimization of symbol-wise weighted sum mean-square-

error (WSMSE) constrained with per BS antenna and symbol

powers (P 1) minimization of user-wise WSMSE constrained

with per BS antenna and user powers (P 2) minimization

of the maximum symbol-wise weighted mean-square-error

(WMSE) constrained with per BS antenna and symbol powers

(P 3) and minimization of the maximum user-wise WMSE

constrained with per BS antenna and user powers (P 4) Each

of these problems is examined for the scenario where the

noise vector of each mobile station (MS) is a zero-mean

circularly symmetric complex Gaussian (ZMCSCG) random

variable with arbitrary covariance matrix

To the best of our knowledge the problems P 1 - P 4 are

non-convex Furthermore duality based solutions for these

problems with our noise covariance matrix assumptions are

not known In the current paper we propose duality based

iterative solutions to solve the problems Each of these prob-

lems is solved as follows First we establish a new MSE

downlink-interference duality Second we formulate the power

allocation part of the problem in the downlink channel as

a Geometric Program (GP) Third using the duality resultand the solution of GP we utilize alternating optimization

technique to solve the original downlink problem For the

problems P 1 and P 2 the duality are established by for-

mulating the noise covariance matrices of the interference

channels as fixed point functions For these two problems the

noise covariance matrices of the dual interference channels

are computed by modifying the approach of [10] to P 1 and

P 2 of the current paper On the other hand for the problems

P 3 and P 4 the duality are established by formulating the

noise covariance matrices of the interference channels as new

marginally stable (convergent) discrete-time-switched systems

The proposed duality based iterative solutions can be extendedstraightforwardly to solve many other linear transceiver design

problems We also show that our MSE downlink-interference

duality unify all existing MSE duality In our simulation

results we have observed that the proposed duality based

iterative algorithms utilize less total BS power than that of

the existing algorithms The main contributions of the current

paper can thus be summarized as follows

1) To solve the problems P 1 and P 2 we have established

WSMSE downlink-interference duality by formulating

the noise covariance matrices of the interference chan-

nels as fixed point functions These noise covariance

matrices are formulated by modifying the approach of

[10] to P 1 and P 2 of the current paper As will be

clear later for WSMSE-based problems with a total BS

power constraint function the proposed duality based

algorithm requires less computation than that of the

existing duality based algorithms

2) To solve the problems P 3 and P 4 we have established

novel MSE (symbol-wise and user-wise) downlink-

interference duality by formulating the noise covariancematrices of the interference channels as marginally sta-

ble (convergent) discrete-time-switched systems

Furthermore as will be shown later in Section IX

the proposed duality based iterative solutions can be

extended straightforwardly to solve many other linear

transceiver design problems We also show that the MSE

downlink-interference duality of the current paper is

also applicable to solve total BS power based linear

transceiver design problems Thus the current duality

unify all existing MSE duality1

3) By employing the system model of [1] and [8] we

formulate the power allocation parts of P 1 - P 4 as GPs

The GPs are formulated by applying the GP formulation

approach of [1] Consequently we are able to solve our

problems by alternating optimization technique [4] [7]

[8] [10] (ie duality based iterative algorithm)

4) In our simulation results we have observed that the

proposed duality based iterative algorithms utilize less

total BS power than that of the existing algorithms

This paper is organized as follows In Section II multiuser

MIMO downlink and virtual interference channel system mod-

els are presented In Section III we formulate our problems P 1- P 4 and discuss the general framework of our duality based

iterative solutions Sections IV - VIII present the proposed

duality based iterative solutions for solving these problemsThe extension of our duality based iterative algorithms to other

problems is discussed in Section IX In Section X computer

simulations are used to compare the performance of the

proposed duality algorithms with that of existing algorithms

Finally conclusions are drawn in Section XI

Notations Upperlower case boldface letters denote matri-

cescolumn vectors The X(nn) X(n) tr(X) XT XH and

E(X) denote the (n n) element nth row trace transpose

conjugate transpose and expected value of X respectively In

is an identity matrix of size n times n and CM timesM (realM timesM ) rep-

resent spaces of M times M matrices with complex (real) entries

The diagonal and block-diagonal matrices are represented bydiag() and blkdiag() respectively Subject to is denoted by

st and ()⋆ denotes optimal solution The superscripts ()DL

and ()I denote downlink and interference respectively

II SYSTEM M ODEL

In this section multiuser MIMO downlink and virtual

interference channel system models are discussed which are

shown in Fig 1 In the downlink channel the BS and kth

MS are equipped with N and M k antennas respectively The

total number of MS antennas are thus M = sumK

k=1 M k By

1Note that the existing MSE duality are established for a total BS power

based linear transceiver design problems (see [1] [4] [5])

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 315

3

d2

d1 HH 1

HH 2

HH K

WH 2

n1

nK

n2

WH K

WH 1

d1

d2

dK

= d B

dK

(a)

V1

V2

nI

1S 1

nI

K 1

nI KS K

nI 11

tH

KS K

tH K 1

tH

1S 1

tH 11

H111

H11S 1

H21S 1

H1KS K

H1K 1

HKK 1

HK 1S 1

H2K 1

HKKS K

dK 1

d11

VK

HK 11

H2KS K

H211

d1

dKS K

d1S 1d2

dK

(b)

Fig 1 Multiuser MIMO system model (a) downlink channel (b) virtualinterference channel

denoting the symbol intended for the k th user as dk isin CS ktimes1

and S =sumK

k=1 S k the entire symbol can be written in a data

vector d isin CS times1 as d = [dT 1 middot middot middot dT

K ]T The BS precodes d

into an N length vector by using its overall precoder matrix

B = [b11 middot middot middot bKS K ] where bks isin CN times1

is the precodervector of the BS for the kth MS sth symbol The kth MS

employs a receiver wks to estimate the symbol dks We follow

the same channel matrix notations as in [8] The estimates of

the k th MS sth symbol (dks) and k th user (dk) are given by

dks =wH ks(HH

k

K 991761i=1

Bidi + nk) = wH ks(HH

k Bd + nk) (1)

dk =WH k (HH

k Bd + nk) (2)

where HH k isin CM ktimesN is the channel matrix between the BS

and kth MS Wk = [wk1 middot middot middotwkS k ] Bk = [bk1 middot middot middotbkS k ] and

nk is the kth MS additive noise Without loss of generality

we can assume that the entries of dk are independent and

identically distributed (iid) ZMCSCG random variables all

with unit variance ie EdkdH k = IS k Edkd

H i = 0

foralli = k and EdknH i = 0 foralli k The kth MS noise vector is

a ZMCSCG random variable with covariance matrix Rnk isinCM ktimesM k

To establish our MSE downlink-interference duality we

model the virtual interference channel (Fig 1(b)) is modeled

by introducing precoders Vk = [vk1 middot middot middot vkS k ]K k=1 and de-

coders Tk = [tk1 middot middot middot tkS k ]K k=1 where vks isin CM ktimes1 and

tks isin CN times1 forallk s In this channel it is assumed that the k th

userrsquos sth symbol (dks) is an iid ZMCSCG random variable

with variance ζ ks and estimated independently by tks isin C N times1

ie EdksdH ks = ζ ks EdksdH

ij = 0 forall(i j) = (k s) and

EdknH i = 0 foralli k Moreover nI

ks forallsK k=1 (Fig 1(b))

are also ZMCSCG random variables with covariance matrices

∆ks isin realN timesN = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1 and the

channels between the k th transmitter and all receivers are the

same (ie Hkjs = Hk forall j sK k=1) Note that from the system

model aspect the current paper and [10] share the same idea

As can be seen from Fig 1 the outputs of Fig 1(a) and

Fig 1(b) are not the same However since Fig 1(b) is a

rdquovirtualrdquo interference channel which is introduced just to solve

the downlink MSE-based problems by duality approach the

output of Fig 1(b) is not required in practice For this reason

the difference in the outputs of the downlink and interference

channels of Fig 1 will not affect the downlink MSE-based

problem formulations and the duality based solutions

For the downlink system model of Fig 1(a) the symbol-

wise and user-wise MSEs can be expressed as

ξ DLks =Ed(dks minus dks)(dks minus dks)H

=wH ks(HH

k BBH Hk + Rnk)wks minus wH ksH

H k bksminus

bH ksHkwks + 1 (3)

ξ DLk =Ed(dk minus dk)(dk minus dk)H

=trIS k + WH k (HH

k BBH Hk + Rnk)Wkminus

WH k H

H k Bk minus BH

k HkWk (4)

Using these two equations the symbol-wise and user-wise

WSMSEs can be expressed as

ξ DLws =

K 991761k=1

S k991761s=1

ηksξ DLks = trη + ηWH HH BBH HW+

ηWH RnW minus ηWH HH B minus ηBH HW (5)

ξ DLwu =

K 991761k=1

ηkξ DLk = trη + ηWH HH BBH HW

+ ηWH RnW minus ηWH HH B minus ηBH HW (6)

where Rn = blkdiag(Rn1 middot middot middot RnK ) η =diag(η11 middot middot middot η1S 1 middot middot middot ηK 1 middot middot middot ηKS K ) and η =blkdiag(η1IS 1 middot middot middot ηK IS K ) with ηks and ηk are the

MSE weights of the kth user sth symbol and kth user

respectively Like in the downlink channel the interference

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 415

4

channel symbol user MSE and WSMSEs are expressed as

ξ I ks =tH

ksΓctks + tH ks∆kstks minus tH

ksHkvksζ ksminus

ζ ksvH ksH

H k tks + ζ ks (7)

ξ I k =trTH

k ΓcTk minus TH k HkVkζ k minus ζ kV

H k H

H k Tk + ζ k+

S k

991761s=1

tH ks∆kstks (8)

ξ I ws =

K 991761k=1

S k991761s=1

λksξ I ks = trλTH ΓcT minus λTH HVζ minus

λζ VH HH T + λζ +

K 991761k=1

S k991761s=1

λkstH ks∆kstks (9)

ξ I wu =

K 991761k=1

λkξ I k = trλTH ΓcT minus λTH HVζ minus

λζ VH HH T + λζ +K 991761

k=1

S k991761s=1

λktH ks∆kstks (10)

where ζ k = diag(ζ k1 middot middot middot ζ kS k) ζ = blkdiag(ζ 1 middot middot middot ζ K )

λ = diag(λ11 middot middot middot λ1S 1 middot middot middot λK 1 middot middot middot λKS K )

λ = blkdiag(λ1IS 1 middot middot middot λK IS K ) and Γc =sumK i=1

sumS ij=1 ζ ijHivijv

H ijH

H i with λks and λk are the

MSE weights of the kth user sth symbol and kth user

respectively

III PROBLEM F ORMULATION

The aforementioned MSE-based optimization problems

can be formulated as

P 1 minBkWkKk=1

K

991761k=1

S k

991761s=1 ηksξ

DL

ks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks (11)

P 2 minBkWk

Kk=1

K 991761k=1

ηkξ DLk

st [BBH ](nn) le ˘ pn trBH k Bk le ˆ pk foralln k (12)

P 3 minBkWkKk=1

max ρksξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks (13)

P 4 minBkWkKk=1

max ρkξ DLk

st [BBH

](nn) le ˘ pn trBH k Bk le ˆ pk foralln k (14)

where ρk(ˆ pk) and ρks(˘ pks) are the MSE balancing weights

(maximum available power) of the kth user and kth user sth

symbol respectively and ˘ pn denotes the maximum transmitted

power by the nth antenna

For both the WSMSE minimization and min max WMSE

problems different weights are given to different symbols

(users) However at optimality the solutions of these two

problems are not necessarily the same This is due to the

fact that the aim of the WSMSE minimization problem is

just to minimize the WSMSE of all symbols (users) (ie in

such a problem the minimized WMSE of each symbol (user)

depends on its corresponding channel gain) whereas the aim

of min max WMSE problem is to minimize and balance the

WMSE of each symbol (user) simultaneously (ie in such

a problem all symbols (users) achieve the same minimized

WMSE [13]) Moreover as will be clear later the solution ap-

proach of WSMSE minimization problem can not be extended

straightforwardly to solve the min max WMSE problem Due

to these facts we examine the WSMSE minimization and min

max WMSE problems separatelySince the problems P 1 - P 4 are not convex convex

optimization framework can not be applied to solve them To

the best of our knowledge duality based solutions for these

problems are not known In the following we present an MSE

downlink-interference duality based approach for solving each

of these problems which is shown in Algorithm I2

Algorithm I

Initialization For each problem initialize Bk = 0K k=1

such that the power constraint functions are satisfied3

Then update WkK k=1 by using minimum mean-

square-error (MMSE) receiver approach ie

Wk = (HH k BBH Hk + Rnk)minus1HH k Bk forallk (15)

Repeat Interference channel

1) Transfer the symbol-wise (user-wise) WSMSE or

WMSE from downlink to interference channel

2) Update the receivers of the interference channel

tks forallsK k=1 using MMSE receiver technique

Downlink channel

3) Transfer the symbol-wise (user-wise) WSMSE or

WMSE from interference to downlink channel

4) Update the receivers of the downlink channel WkK k=1

by MMSE receiver approach (15)

Until convergence

The above iterative algorithm is already known in [5] [8] and

[10] However the approaches of these papers can not ensure

the power constraints of P 1 - P 4 at step 3 of Algorithm I

Hence one can not apply the approaches of these papers to

solve P 1 - P 4 In the following sections we establish our

MSE downlink-interference duality

IV SYMBOL-WISE WSMSE DOWNLINK-INTERFERENCE

DUALITY

This duality is established to solve symbol-wise WSMSE-

based problems (for example P 1)

A Symbol-wise WSMSE transfer (From downlink to interfer-

ence channel)

In order to use this WSMSE transfer for solving P 1 we set

the interference channel precoder decoder noise covariance

input covariance and MSE weight matrices as

V = β W T = Bβ ζ = η λ = I ∆ks = Ψ + microksI

(16)

2As will be clear later in Section VIII to solve P 3 and P 4 (and moregeneral MSE-based problems) an additional power allocation step is requiredIn Algorithm I this step is omitted for clarity of presentation

3For the simulation we use Bk = [Hk](1Sk)Kk=1 followed by the

appropriate normalization of BkKk=1 to ensure the power constraints

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 515

5

where β ψnN n=1 and microks forallsK

k=1 are positive real

scalars that will be determined in the sequel and Ψ =diag(ψ1 middot middot middot ψN ) Substituting (16) into (9) and equating

ξ I ws = ξ DL

ws yields

trBH HWηWH HH B minus BH HWη minus ηWH HH B + η+

1

β 2

K

991761k=1

S k

991761s=1

bH

ks

(Ψ + microksIN )bks = trηWH HH BBH HW

+ ηWH RnW minus ηWH HH B minus ηBH HW + η

It follows

β 2τ =

N 991761n=1

ψn ˇ pn +

K 991761k=1

S k991761s=1

microks macr pks = pT ψ + pT micro (17)

where τ = trηWH RnW ψ = [ψ1 middot middot middot ψN ]T micro =

[micro11 middot middot middot micro1S 1 middot middot middot microK 1 middot middot middot microKS K ]T p = [ˇ p1 middot middot middot ˇ pN ]T

and p = [macr p11 middot middot middot macr p1S 1 middot middot middot macr pK 1 middot middot middot macr pKS K ]T with macr pks =bH

ksbks ˇ pn = bH n

bn and bH n is the nth row of B

The above equation shows that by choosing any ψnN n=1

and microks forallsK k=1 that satisfy (17) one can transfer thedownlink channel precoderdecoder to the interference channel

decoderprecoder ensuring ξ DLws = ξ I 1

ws where ξ I 1w is the

interference WSMSE at step 1 of Algorithm I However here

ψnN n=1 and microks forallsK

k=1 should be selected in a way that

P 1 can be solved by Algorithm I To this end we choose ψ

and micro as

β 2τ ge pT ψ + pT micro (18)

By doing so the interference channel symbol-wise WSMSE

is upper bounded by that of the downlink channel (ie ξ I 1ws le

ξ DLws ) As will be clear later to solve (11) with Algorithm

I macrβ ψ and micro should be selected as in (18) This shows

that step 1 of Algorithm I can be carried out with (16) To

perform step 2 of Algorithm I we update tks of (16) by using

the interference channel MMSE receiver approach which is

expressed as

tks =(Γc + ∆ks)minus1Hkvksζ ks

=β (HWηWH HH + Ψ + microksI)minus1Hkwksηks (19)

where the second equality is obtained from (16) The above

expression shows that by choosing microks gt 0 forallsK k=1 ψn gt

0N n=1 we ensure (HWηWH HH +Ψ+microksI)minus1 exists Next

we transfer the symbol-wise WSMSE from interference to

downlink channel by ensuring the power constraint of P 1 (iewe perform step 3 of Algorithm I)

B Symbol-wise WSMSE transfer (From interference to down-

link channel)

For a given symbol-wise WSMSE in the interference

channel with ζ = η and λ = I we can achieve the same

WSMSE in the downlink channel (with the MSE weighting

matrix η) using a nonzero scaling factor (β ) satisfying

B = β T W = Vβ (20)

In this precoderdecoder transformation we use the notations

B and W to differentiate from the precoder and decoder

matrices used in Section IV-A By substituting (20) into

ξ DLws (with B=B W=W) equating the resulting symbol-wise

WSMSE with that of the interference channel (9) and after

some simple manipulations we get

K 991761k=1

S k991761s=1

tH ks(Ψ + microksIN )tks =

1

β 2trηVH RnV

rArr β 2 = trηVH RnVsumK k=1

sumS ks=1 t

H ks(Ψ + microksIN )tks

=β 2τ sumN

n=1 ψntH n

tn +sumK

k=1

sumS ii=1 microkit

H kitki

(21)

where tH n is the nth row of the MMSE matrix T (19) and

the third equality follows from (16) The power constraints of

each BS antenna and symbol in the downlink channel are thus

given by

ˇ

b

H

bn =β 2tH

n tn (22)

=β 2τ tH

n

tnsumN

i=1 ψitH i

ti +sumK

i=1sumS i

j=1 microijtH ij tij

le ˘ pn foralln

bH ksbks =β 2tH

kstks (23)

=β 2τ tH

kstkssumN i=1 ψit

H i

ti +sumK

i=1

sumS ij=1 microijt

H ij tij

le ˘ pks forallk s

where bH

n is the nth row of B By multiplying both sides of

(22) and (23) with ψn foralln and microks forallk s we get

ψn ge f n and microks ge f ks forallnks (24)

where f n = β2τ ˘ pn

ψntHn tn

sumN

i=1 ψitH

iti+sum

K

i=1sum

Si

j=1 microijtH

ijtij

and f ks =

β2τ ˘ pks

microkstHkstkssum

N i=1 ψit

Hi ti+

sumKi=1

sumSij=1 microijtHijtij

Now for any given β

tH n

tnN n=1 and tH

kstks forallsK k=1 suppose that there exist

ψn gt 0N n=1 and microks gt 0 forallsK

k=1 that satisfy

ψn = f n and microks = f ks forallnks (25)

From the above equation one can also achieve ψn ˘ pn =f n ˘ pn microks ˘ pks = f ks ˘ pks forallnks Summing up these expres-

sions for all n k and s results

N

991761n=1

ψn ˘ pn +K

991761k=1

S k

991761s=1

microks ˘ pks =N

991761n=1

f n ˘ pn +K

991761k=1

S k

991761s=1

f ks ˘ pks

=β 2τ (26)

This equation shows that the solution of (25) satisfies (26)

Moreover as ˘ pn ge ˇ pnN n=1 and ˘ pks ge macr pks forallsK

k=1

the latter solution also ensures (18) Therefore by choosing

ψnN n=1 and microks forallsK

k=1 such that (25) is satisfied step 3

of Algorithm I can be performed Furthermore one can notice

from (26) that β 2 can be any positive value

Next we show that there exists at least a set of feasible

ψn gt 0N n=1 and microks gt 0 forallsK

k=1 that satisfy (25) To this

end we consider the following Theorem [14]

Theorem 1 Let (X ∥∥2) be a complete metric space We

say that X rarr X is an almost contraction if there exist

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 615

6

κ(κ) isin [0 1) and χ(χ) ge 0 such that

∥(x) minus (y)∥2 le κ∥x minus y∥2 + χ∥y minus (x)∥2 or (27)

∥(x) minus (y)∥2 le κ∥x minus y∥2 + χ∥x minus (y)∥2 forallxy isin X

If satisfies (27) then the following holds true

1) existx isin X x = (x)

2) For any initial x0 isin X the iteration xn+1 = (xn)

for n = 0 1 2 middot middot middot converges to some x⋆ isin X3) The solution x⋆ is not necessarily unique

Proof See Theorem 11 of [14] Note that according to

[15] (see (11) and (12) of [15]) the two inequalities of (27)

are dual to each other

Define x and as x [x1 middot middot middot xS +N ]T =

[ψ1 middot middot middot ψN micro11 middot middot middot micro1S 1 middot middot middot microK 1 middot middot middot microKS K ]T

(x) [ f 1 middot middot middot f N f 11 middot middot middot f 1S 1 middot middot middot f K 1 middot middot middot f KS K ]with xn = ψn isin [ϵ (β 2τ minus ϵ

sumN i=1 i=n pim)pnm]N

n=1

and xrS +N r=N +1 = microks =isin [ϵ (β 2τ minus

ϵsumK

i=1

sumS ij=1(ij)=(ks) pijm)pksm] forallsK

k=14 As we can

see from (27) when ∥(x1) minus(x2)∥2 = 0 with x1 = x2 or

x1 = x2 one can set κ(κ) = 0 and χ(χ) = 0 to satisfy thisinequality And when ∥(x1) minus(x2)∥2 gt 0 (ie x1 = x2)

one can select appropriate κ(κ) isin [0 1) and χ(χ) ge 0 such

that (27) is satisfied This is due to the fact that in the latter

case ∥x2 minus (x1)∥2 gt 0 andor ∥x1 minus (x2)∥2 gt 0 and

∥x1 minus x2∥2 gt 0 are positive and bounded This explanation

shows the existence of κ(κ) isin [0 1) and χ(χ) ge 0 ensuring

(27) for any ∥(x1) minus (x2)∥2 x1x2 isin X Consequently

(x) is an almost contraction which implies

xn+1 = (xn) x0 = [x01 x02 middot middot middot x0(S +N )]T ge ϵ1N +S

for n = 0 1 2 middot middot middot converges (28)

where 1N +S is an N + S length vector with each elementequal to unity Thus there exist ψn ge ϵN

n=1 and microks geϵ forallsK

k=1 that satisfy (25) and can be computed using (28)

For numerical simulation we initialize x0 as x01 = x02 =middot middot middot = x0(S +N ) However finding the optimal initialization

strategy is still an open research topic

Once the appropriate ψnN n=1 and microksforallsK

k=1 are ob-

tained step 4 of Algorithm I is immediate and hence P 1 can

be solved iteratively using this algorithm

C Extension of the current duality for P 1 with a total BS

power constraint

If the constraints of P 1 are modified to a total BS powerthe power constraint at step 3 of Algorithm I can be ensured

by applying the precoderdecoder transformation expression of

[5] The precoderdecoder transformation of [5] is performed

by computing S scaling factors These scaling factors are

obtained by solving S systems of equations which require

matrix inversion with complexity O(S 3) (see (23) of [5])

In the current paper if the constraints of P 1 are modified

to a total BS power one can ensure the power constraint at step

3 of Algorithm I just by assigning ∆ks of (16) as ∆ks = I

By doing so β 2 of (17) and β 2 of (21) can be expressed as

4For our simulation we use ϵ =

min(10minus6 βτpnmN n=1 βτpksm forallsKk=1)

β 2 =sumK

k=1

sumSks=1 b

Hksbks

τ = P max

τ and β 2 = trηVHRnV

sumKk=1

sumSks=1 t

Hkstks

where P max is the total BS power Now by employing (20)

the total BS power at step 3 of Algorithm I can thus be given

as trBBH = β 2trTTH = β 2τ = P max (ie the total

BS power constraint is satisfied) Thus for P 1 (with a total BS

power constraint) we do not need to use Theorem I Moreover

our duality requires only one scaling factor to perform the

precoderdecoder transformation (ie β 2(β 2)) This showsthat for this problem the proposed duality based algorithm

requires less computation compared to that of [5] Note that

the duality algorithm of [5] requires the same computation as

that of [8] and less computation than that of [1] and [4] Thus

it is sufficient to compare the current duality algorithm with

the duality algorithm of [5]

For other WSMSE-based problems with a total BS power

constraint function the computational advantage of the current

duality based algorithm over that of [5] can be analysed like

in this subsection

V USE R-WISE WSMSE DOWNLINK-INTERFERENCE

DUALITYThis duality is established to solve user-wise WSMSE-

based problems (for example P 2)

A User-wise WSMSE transfer (From downlink to interference

channel)

To apply this WSMSE transfer for solving P 2 we set the

precoder decoder and noise covariance matrices as

V = β W T = Bβ ζ = η λ = I∆ks = Ψ + microkI (29)

where β ψnN n=1 and microkK

k=1 are real positive scalars

Substituting (29) into (10) and equating ξ I wu = ξ DL

wu yields

β 2τ =

N 991761n=1

ψn ˇ pn +

K 991761k=1

microk pk = pT ψ + pT micro (30)

where τ = trηWH RnW micro = [micro1 middot middot middot microK ]T p =

[˜ p1 middot middot middot ˜ pK ]T with ˜ pk = trBkB

H k Like in Section IV-A

we perform step 1 of Algorithm I by choosing β 2 ψ and microas

β τ ge pT ψ + pT micro (31)

To perform step 2 of Algorithm I we update tks of (29)

using the interference channel MMSE receiver as

tks =β (HWηWH HH + Ψ + microkI)minus1Hkwksηk (32)

This expression shows that by choosing microk gt 0K k=1 ψn gt

0N n=1 we ensure that (HWηWH HH + Ψ+ microkI)minus1 exists

B User-wise WSMSE transfer (From interference to downlink

channel)

For a given user-wise WSMSE in the interference channel

with ζ = η and λ = I we can achieve the same WSMSE in

the downlink channel (with the weighting matrix η) by using

a nonzero scaling factor ( ˜β ) which satisfies

B = ˜β T W = V

˜β (33)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 715

7

In this precoderdecoder transformation we use the notationsB and W to differentiate from the precoder and decoder

matrices used in Section V-A By substituting (33) into ξ DLwu

(with B=B W=W) then equating the resulting user-wise

WSMSE with that of the interference channel (ξ I wu) and after

simple manipulations we get

˜β 2

=

β 2τ sumN n=1 ψntH

n tn +sumK

k=1 microktrTH k Tk (34)

where tH n is the nth row of the MMSE matrix T (32) The

power constraints of each BS antenna and user (ie step 3 of

Algorithm I) in the downlink channel can be expressed as

ψn ge ˇf n and microk ge f k forallk (35)

where

ˇf n =β 2τ

˘ pn

ψntH n

tnsumN i=1 ψit

H i

ti +sumK

i=1 microitrTH i Ti

(36)

f k =β 2τ

ˆ pk

microktrTH k Tk

sumN i=1 ψitH i ti +sumK

i=1 microitrTH i Ti

(37)

For given β tH n

tnN n=1 and trTH

k TkK k=1 one can show

that there exist ψnN n=1 and microkK

k=1 which satisfy

ψn = ˇf n and microk = f k forallnk (38)

The solution of (38) can be obtained exactly like that of (25)

As ˘ pn ge ˇ pnN n=1 and ˆ pk ge ˜ pkK

k=1 the latter solution also

satisfies (31) Thus P 2 can be solved using Algorithm I

V I SYMBOL-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

In this section we establish the symbol-wise MSE duality

between downlink and interference channels If all symbols

are active this duality can be applied to solve MSE based

problems However as will be clear later this duality requires

more computation compared to the duality of Sections IV and

V Thus we propose this duality to be employed for problems

like in P 3 since this problem maintains all symbols active and

can not be solved by the duality in Sections IV and V

A Symbol-wise MSE transfer (From downlink to interference

channel)

To apply this duality for P 3 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

vks = β kswks tks = bksβ ks ζ = I

∆ks = Ψ + microksIN forallks (39)

Substituting (39) into (7) and ξ DLks = ξ I

ks forallsK k=1 yields

wH ks(HH

k

K 991761i=1

S i991761j=1

bijbH ijHk + Rnk)wks minus wH

ksHH k bks

minus bH ksHkwks + 1 =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1

β 2ijHiwijwH ijH

H i +

Ψ + microksIN )bks minus bH

ksHkwks minus wH

ksHH

k bks + 1 forallks

It implies

wH ks(HH

k

K 991761i=1

S i991761j=1(ij)=(ks)

bijbH ijHk + Rnk)wks =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijHiwijwH ij H

H i + Ψ+

microksIN )bks forallks (40)

Collecting the above expression for all k and s gives

(Y + Θ)β2

=[a11 middot middot middot a1S 1 middot middot middot aK 1 middot middot middot aKS K ]T = ˜Px

rArr β2

=Θminus1(I + YΘminus1)minus1 ˜Px (41)

where β2

= [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T

Θ = diag(θ11 middot middot middot θ1K 1 middot middot middot θK 1 middot middot middot θKS K )

aks = bH ksΨbks + microksb

H ksbks ˜P = [ macrP P] and

Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

θks = wH ksRnkwks macrP isin realS timesN = |BH |2

P = diag(macr p11 middot middot middot macr p1S 1 middot middot middot macr pK 1 middot middot middot macr pKS K )

yks = [minus|bH ksH1w11|2 middot middot middot zks middot middot middot minus|bH

ksHK wK 1| middot middot middot minus |bH

ksHK wKS K |]T and zks =

wH ksH

H k

sumK i=1

sumS ij=1(ij)=(ks) bijb

H ijHkwks Next we

examine two important properties of (I + YΘminus1)minus1 To this

end we examine the following Theorem

Theorem 2 Let A isin realntimesn and A(ij)(i=j) le 0 1 lei( j) le n If the diagonal elements of A are A(ii) = 1 minussumn

j=1j=i A(ji) then

Property 1 Aminus1 ge 0 (42)

Property 2 |||Aminus1|||1 = 1 (43)

where () ge 0 and ||||||1 denote matrix non-negativity and

one norm respectively

Proof See Appendix A

According to the first property of Theorem 2 if θks gt0 forallsK

k=15 the inverse of (I + YΘminus1) exists and it has

nonnegative entries Consequently for any positive ψnN n=1

and microks forallsK k=1 β ks forallsK

k=1 of (41) are strictly positive6

Now by selecting ψnN n=1 and microks forallsK

k=1 such that (41) is

fulfilled we can transfer the MSE of each symbol from down-

link to interference channel ensuring ξ DLks = ξ I 1

ks forallsK k=1

where ξ I 1ks is the MSE of the kth user sth symbol at step 1

of Algorithm I Here we should also select ψnN n=1 and

microks forallsK k=1 such that the power constraint of P 3 at step 3

of Algorithm I is satisfied To this end we examine the steps(2) and (3) of this algorithm

Like in Section IV we perform step 2 of Algorithm 1 by

updating tks using MMSE receiver as

tks =(Γc + ∆ks)minus1Hkvksζ ks (44)

=(

K 991761i=1

S i991761j=1

β ijHiwijwH ijH

H i + Ψ + microksI)minus1Hkwksβ ks

where the second equality is obtained from (39) The above

expression shows that by choosing microks gt 0 forallsK k=1 ψn gt

5For P 3 wH ksRnkwks gt 0forallsK

k=1 is always true

6Note that the application of (43) will be clear in the sequel (see (55))

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 815

8

0N n=1 we ensure (

sumK i=1

sumS ij=1 β ijHiwijw

H ij H

H i + Ψ +

microksI)minus1 exists Next we transfer the symbol-wise MSE from

interference to downlink channel by satisfying the power

constraint of P 3 (ie we perform step 3)

B Symbol-wise MSE transfer (From interference to downlink

channel)

For a given symbol MSE in the interference channel with

ζ = I we can achieve the same symbol MSE in the downlink

channel by using a nonzero scaling factor (β ks) which satisfies

bks = β kstks wks = vksβ ks (45)

Here we use the notations B and W to differentiate with

the precoder and decoder matrices used in Section VI-A By

substituting (45) into ξ DLks (with B=B W=W) then equating

the resulting symbol MSE with that of the interference channel

(7) and after some straightforward steps we get

1β 2ksvH ks(HH k

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijtijtH ijHk + Rnk)vks =

tH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

HivijvH ij H

H i + Ψ + microksI)tks forallks

By collecting the above equalities for all k and s β ks forallsK k=1

can be determined by

(Y + Ω)β2 =[vH 11Rn1v11 middot middot middot vH

1S 1Rn1v1S 1

middot middot middot vH K 1RnK vK 1 middot middot middot vH

KS KRnK vKS K ]T

=Θβ2

= ΘΘminus1(I + YΘminus1)minus1 ˜Px

rArr β2 =(Y + Ω)minus1(I + YΘminus1)minus1 ˜Px

=Ωminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜Px (46)

where the third equality follows from (41)

β2 = [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T Ω =diag(tH

11Ψt11 middot middot middot tH 1S 1

Ψt1S 1 middot middot middot tH K 1ΨtK 1 middot middot middot

tH KS K

ΨtKS K ) Ω = diag(micro11tH 11t11 middot middot middot micro1S 1t

H 1S 1

t1S 1 middot middot middot

microK 1tH K 1tK 1 middot middot middot microKS Kt

H KS K

tKS K ) Ω = Ω + Ω

and Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

yks = [minus|tH 11H1vks|2 middot middot middot zks middot middot middot minus|tH

K 1HK vks|2 middot middot middot minus |tH

KS KHK vks|2]T and zks =

tH kssum

K i=1sum

S ij=1(ij)

=(ks)Hivijv

H ij H

H i tks By applying

Theorem 2 it can be shown that β ks forallsK k=1 are strictly

positive for ψn gt 0N n=1 and microks gt 0 forallsK

k=1 The power

constraints of the nth BS antenna and kth user sth symbol

are given by

bH

nbn = tH

n Υtn le ˘ pn foralln (47)bH ksbks = β 2kst

H kstks le ˘ pks forallk s (48)

where Υ = diag(β 211 middot middot middot β 1S 1 middot middot middot β 2K 1 middot middot middot β KS K ) Mul-

tiplying both sides of (47) by ψn and stacking the resulting

inequality for all n yields

˘Pψ ge

˜Ωβ

2

(49)

where P = diag(˘ p1 middot middot middot ˘ pN ) and Ω = Ψ|T|2 Like in the

above expression by multiplying both sides of (48) with microks

and collecting the resulting inequality for all k and s the

power constraints (48) can be expressed as

macrPmicro ge Ωβ2 (50)

where macrP = diag(˘ p11 middot middot middot ˘ p1S 1 middot middot middot ˘ pK 1 middot middot middot ˘ pKS K ) By

employing β2 of (46) (49) and (50) can be combined as

xprime ge ˜Ωβ2 = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1xprime

= (xprime)xprime (51)

where ˜P = blkdiag(P macrP) ˜Ω = [ΩT ΩT ]T xprime = ˜

P[ψ micro]T

and (xprime) = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1

Next we show that there exists xprime gt 0 such that (51) is

satisfied Towards this end we consider the following discrete-

time switched system [16]

xn+1 = Fσnxn for n = 0 1 2 middot middot middot (52)

where x isin realmtimes1 is a state Fσn isin realmtimesm is a switchingmatrix and σn isin 0 1 2 middot middot middot According to [16] (Remark 2

of [16]) the above system is marginally stable (convergent) if

maxσn

∥Fσn∥⋆ = 1 for n = 0 1 middot middot middot (53)

where ∥∥⋆ denotes an induced matrix norm

Let us consider the following iteration

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (54)

Now if we assume (xprimen) = Fσn foralln7 we can interpret (54)

as a discrete time switched system Consequently the above

iteration is guaranteed to converge if maxn ∥ (xprimen)∥⋆ = 1 It

is known that ||||||1 is an induced matrix norm [17] For any

xprime the matrix one norm of (xprime) is given by

||| (xprime)|||1

=||| ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1|||1

le||| ˇΩ|||1|||(I + YΩminus1)minus1|||1|||(I + YΘminus1)minus1|||1||| ˇP|||1

=||| ˇΩ|||1||| ˇP|||1 le 1 (55)

where ˇΩ = [ ˜ΩΩminus1 0(N +S )timesN ] ˇP = [ ˜P( ˜P)minus1 0N times(N +S )]

the second inequality is due to the fact that |||XY|||1 le|||X|||1|||Y|||1 [17] (page 290) the third equality is obtained

by applying Theorem 2 and the last inequality employs thefollowing facts Using the definition (73) (see Appendix A)

one can get ||| ˇΩ|||1 le 1 by applying (46) and (51) and

||| ˇP|||1 le 1 by applying (13) (41) and (51)

Thus maxn ∥ (xprimen)∥⋆ = 1 holds true and (54) is guar-

anteed to converge As we can see (54) is derived by using

(41) and (46) Thus the solution of (54) also satisfies (41)

and (46) Moreover for any initial xprime0 gt 0 since (xprimen) foralln is

positive the solution of (54) is strictly positive and [ψ micro]T =

( ˜P)minus1xprime gt 0 which is the desired result

7Since (xprimen) is the products of stochastic matrices (see the proof of Theorem 2) (xprimen) is a bounded matrix for any xprime gt 0 Thus the assumption

(xprimen) = Fσn foralln holds true

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 915

9

Once the feasible microks forallsK k=1 and λnN

n=1 are obtained

step 4 of Algorithm 1 is immediate As a result P 3 can be

solved using Algorithm I with an additional power allocation

step which will be detailed in Section VIII

C Extension of the current duality for P 3 with a total BS

power constraint

In this subsection we show the extension of the current

duality for P 3 with a total BS power constraint For this

problem we set ∆ks of (39) as ∆ks = I forallk s (ie like in

Section IV-B) Upon doing so β2 is computed directly from

the first equality of (46) (ie the bound (55) is not needed)

By summing the left and right hand sides of this equality one

can get trBBH = P max This shows that for P 3 with a

total BS power constraint problem the total BS power at step

3 of Algorithm I is satisfied Thus one can apply Algorithm

I (with the additional power allocation step) to solve the latter

problem by setting ∆ks of (39) as ∆ks = I forallk s

For other total BS power constrained WMSE-based prob-

lems the current duality based algorithm can be applied likein this subsection The details are omitted for conciseness

Note that for such problem types the duality algorithm of the

current paper has the same complexity as that of [5]

VII USE R-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

This section establishes user-wise MSE duality between

downlink and interference channels This duality is established

to solve the problems of type P 4

A User-wise MSE transfer (From downlink to interference

channel)

To apply this MSE transfer for P 4 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

Vk = β kWk Tk = Bkβ k ζ = I ∆ks = Ψ + microkI (56)

Like in Section VI substituting (56) into (8) equating ξ DLk =

ξ I k K

k=1 and after some straightforward steps we get the

following system of equations

(Y + Θ)β2

= ˜Px rArr β2

= Θminus1(I + YΘminus1)minus1 ˜Px (57)

where

Y(kl) =

983163 sumK i=1i=k ∥WH

k HH k Bi∥2F for k = l

minus∥WH l H

H l Bk∥2F for k = l

(58)

Θ = diag(θ1 middot middot middot θK ) β2

= [β 21 middot middot middot β 2K ]T

˜P = [ macrP P]

with θk = trWH k RnkWk macrP isin realS timesN = |BH |2 P =

diag(macr p1 middot middot middot macr pK ) By applying Theorem 2 it can be shown

that β kK k=1 of (57) are strictly positive Thus step 1 of

Algorithm I can be performed using (57) We perform step 2

of Algorithm I by updating tks using MMSE receiver as

tks =(K

991761i=1

β iHiWiWH i H

H i + Ψ + microkI)minus1Hkwksβ k (59)

B User-wise MSE transfer (From interference to downlink

channel)

For a given user MSE in the interference channel with

ζ = I we can achieve the same MSE in the downlink channel

by using nonzero scaling factors ( ˜β kK k=1) that satisfy

Bk = ˜β kTk

Wk = Vk ˜β k (60)

Here we also use the notations B and W to differentiate

with the precoder and decoder matrices used in Section VII-

A By substituting (60) into ξ DLk (with B=B W=W) and

then equating the resulting user-wise MSE with that of the

interference channel (7) and after some steps ˜β kK k=1 are

determined as

(I + ˇYˇΩminus1

) ˇΩ ˜β2

= [trVH 1 Rn1V1 middot middot middot trVH

K RnK VK ]T

rArr ˜β2

= ˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px (61)

where the second equality follows from

(57) ˜β2

= [ ˜β 21

middot middot middot ˜β 2K

]T Ωprime =diag(trTH

1 ΨT1 middot middot middot trTH K ΨTK ) Ω =

diag(micro1trTH 1 T1 middot middot middot microK trTH

K TK ) ˇΩ = Ωprime + Ω

By applying Theorem 2 it can be shown that ˜β kK k=1 are

strictly positive for ψn gt 0N n=1 and microk gt 0K

k=1 Like in

Section VI-B the power constraint of the nth BS antenna

and kth user can thus be expressed as

xprime ge ˆΩ ˜β2

= ˆΩˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px

= (xprime)xprime (62)

where P = diag(ˆ p1 middot middot middot ˆ pK ) ˆP = blkdiag(P ˆP) ˆΩ =

[ΩT

ΩT

]T

xprime

= ˜P[ψ micro]

T

and (xprime

) = ˆΩˇΩ

minus1

(I +ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜P( ˆP)minus1 Like in Section VI-B it

can be shown that there exists a feasible xprime gt 0 that satisfy

(62) and can be obtained iteratively by

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (63)

By initializing xprime0 gt 0 the solution of the above iteration

is always positive Consequently λn gt 0N n=1 and microk gt

0K k=1 holds true Once the feasible microkK

k=1 and λnN n=1

are obtained step 4 of Algorithm 1 is straightforward As a

result P 4 can be solved using Algorithm I with the additional

power allocation step of Section VIII

VIII GENERALIZED AND IMPROVED VERSION OF

Algorithm I

From the discussions of Sections IV - VII one can

understand that each iteration of Algorithm I gives a non

increasing sequence of symbol (user) WMSEWSMSE As can

be seen from Section III the objective of P 1(P 2) is just to

minimize the total WSMSE of all symbols (users) whereas

the objective of P 3(P 4) is to simultaneously minimize and

balance the WMSE of all symbols (users) Thus Algorithm

I is appropriate to solve P 1(P 2) of the current paper For

P 3(P 4) although each iteration of Algorithm I is able to

provide a non increasing sequence of symbol (user) WMSE

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1015

10

(ie minimizes the maximum WMSE of all symbols (users))

each iteration of this algorithm is not able to guarantee

balanced WMSEs of all symbols (users) On the other hand

for an MSE constrained total BS power minimization problem

(for example P 7 in Section IX) an iterative algorithm that

can provide a non increasing sequence of total BS power is

required This shows that Algorithm I also can not solve the

latter problem In the following we address the drawbacks of Algorithm I just by including a power allocation step into

Algorithm I as explained below

In [8] for fixed transmit and receive filters the power

allocation parts of total BS power constrained MSE-based

problems have been formulated as GPs by employing the

approach and system model of [1] under the assumption that

all symbols are strictly active8 For this assumption in [8] we

show that the system model of [1] is appropriate to solve any

kind of total BS power constrained MSE-based problems using

duality approach (alternating optimization) This motivates us

to utilize the system model of [1] in the downlink channel

only and then include the power allocation step (ie GP) into

Algorithm I Towards this end we decompose the precoders

and decoders of the downlink channel as

Bk =GkP12k Wk = UkαkP

minus12k forallk (64)

where Pk = diag( pk1 middot middot middot pkS k) isin realS ktimesS k Gk =[gk1 middot middot middot gkS k ] isin CN timesS k Uk = [uk1 middot middot middot ukS k ] isin CM ktimesS k

and αk = diag(αk1 middot middot middot αkS k) isin realS ktimesS k are the transmit

power unity norm transmit filter unity norm receive filter and

receiver scaling factor matrices of the kth user respectively

ie gH ksgks = uH

ksuks = 1 forallsK k=1

By employing (64) and stacking ξ = [ξ DL11 middot middot middot ξ DL

KS K]T

= [ξ DL1 middot middot middot ξ DL

S ]T = [ξ DLl S

l=1]T the l th downlink symbol

MSE can be expressed as (see [1] and [10] for more detailsabout (64) and the above descriptions)

ξ DLl = pminus1l [(D + α2ΦT )p]l + pminus1l α2

l uH l Rnul (65)

where

Φ(lj) =

983163 |gH

l Huj |2 for l = j0 for l = j

(66)

D(ll) =α2l |gH

l Hul|2 minus 2αlreal(uH l H

H gl) + 1 (67)

1 le l( j) le S P = blkdiag(P1 middot middot middot PK ) =diag( p1 middot middot middot pS ) p = [ p1 middot middot middot pS ]

T G = [G1 middot middot middot GK ] =[g1 middot middot middot gS ] U = blkdiag(U1 middot middot middot UK ) = [u1 middot middot middot uS ]

and α = blkdiag(α1 middot middot middot αK ) = diag(α1 middot middot middot αS ) with∥gl∥2 = ∥ul∥2 = 1 Using (65) for fixed GU and α the

power allocation part of P 1 can be formulated as

min plSl=1

S 991761l=1

ηlξ DLl st ς T

np le ˘ pn pl le ˘ pl foralln l (68)

where ς T n isin real1timesS = |[G(ni)|2S

i=1 [η1 middot middot middot ηS ]T =

[η11 middot middot middot ηKS K ]T and [ ˘ pl middot middot middot ˘ pS ]T = [ ˘ p11 middot middot middot ˘ pKS K ]T As

ξ DLl is a posynomial (where plS

l=1 are the variables) (68)

8Note that this assumption is not always true for all MSE-based problemsHowever as mentioned in [1] in practice replacing zero powers by a smallvalue will not affect the overall optimization Due to this reason we replace

zero powers by 10minus6 in the simulation section

is a GP for which global optimality is guaranteed Thus it

can be efficiently solved using interior point methods with a

worst-case polynomial-time complexity [18]

For fixed GU and α the power allocation parts of

P 2 minus P 4 can be formulated as GPs like in P 1 Our duality

based algorithm for each of these problems including the

power allocation step is summarized in Algorithm II

Algorithm II

Initialization Like in Algorithm I

Repeat Interference channel

1) For P 1 and P 2 set V = WT = B (ie β = β = 1)

then compute ψn microks forallksn and ψn microk forallk nusing (25) and (38) respectively For P 3 and P 4 first

compute ψn microks forallksn and ψn microk forallk n using

(54) and (63) respectively then transfer each symbol

and user MSE from downlink to interference channels

by (39) and (56) respectively

2) Update the MMSE receivers of the interference channel

for P 1 P 2 P 3 and P 4 using (19) (32) (44) and (59)

respectivelyDownlink channel

3) Transfer the MSE (weighted sum user or symbol MSE)

from interference to downlink channel using (20) (33)

(45) and (60) for P 1 P 2 P 3 and P 4 respectively

4) For each of the problems P 1 minus P 4 decompose the

precoder and decoder matrices of each user as in (64)

Then formulate and solve the GP power allocation part

For example the power allocation part of P 1 can be

expressed in GP form as (68)

5) For each of the problems P 1minusP 4 by keeping PkK k=1

constant update the receive filters UkK k=1 and scal-

ing factors αkK

k=1 by applying downlink MMSE

receiver approach ie Ukαk = (HH k GPGH Hk +

Rnk)minus1HH k GkPkK

k=1 Note that in these expressions

αkK k=1 are chosen such that each column of UkK

k=1

has unity norm Then compute BkWkK k=1 by (64)

Until convergence

Convergence It can be shown that at each iteration

of this algorithm the objective function of each of the

problems P 1 - P 4 is non-increasing [4] [7] [19] Thus

the above iterative algorithm is convergent However

since P 1 - P 4 are non-convex this iterative algorithm

is not guaranteed to converge to the global optimum

In this algorithm we stop iteration (ie our convergence

condition) when the difference between the objectivefunctions in two consecutive iterations is smaller than

some small value ϵ (we use ϵ = 10minus6 for the simulation)

Computational complexity As can be seen from this

algorithm when we increase the number of users andor

(BS andor MS antennas) the number and size of

optimization variables increase Because of this the

computational complexity of Algorithm II increases as

K andor N andor M increases However studying the

complexity of this algorithm as a function of K N and

M needs effort and time And such a task is beyond the

scope of this work and is an open research topic

The power allocation step of Algorithm II has thus the

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1115

11

following benefits (1) For BS power constrained WSMSE

minimization problems this step improves the convergence

speed of Algorithm II compared to that of Algorithm I9 (for

example in P 1 minus P 2) The degree of improvement depends on

different parameters (for example Hk ∆ks forallk s etc) Thus

the theoretical comparison of these two algorithms in terms of

convergence speed requires time and effort And this task is

beyond the scope of this work and it is an open research topic(2) For symbol-wise (user-wise) WMSE balancing problems

this step helps to balance the WMSE of all symbols (users)

(for example in P 3 minus P 4) (3) For MSE constrained total

BS power minimization problems this step ensures a non

increasing total BS power at each iteration of Algorithm II

IX APPLICATION OF THE PROPOSED DUALITY BASED

ALGORITHM FOR OTHER PROBLEMS

A MSE based problem with entry-wise power constraint

The symbol-wise WSMSE minimization constrained with

entry wise power ie bH

ksnb

ksn le macr p

ksn forallksn problem is

formulated as

P 5 minBkWkKk=1

K 991761k=1

S k991761s=1

ηksξ DLks st bH

ksnbksn le macr pksn (69)

It can be shown that this problem can be solved by Algorithm

II with ∆ks = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1

B Weighted sum rate optimization constrained with per an-

tenna and symbol power problem

By employing the approach of [11] (see (16) of [11]) one

can equivalently express the weighted sum rate maximizationconstrained with per antenna and symbol power problem as

P 6 (70)

minτ ksν ksbkswksforallsK

k=1

K 991761k=1

S k991761s=1

θks1

τ ksν γ ks

ks +K 991761

k=1

S k991761s=1

ηksξ DLks

st [BBH ](nn) le ˘ pnbH ksbks le ˘ pks

K prodk=1

S kprods=1

ν ks = 1 τ ks gt 0

where 0 lt ωks lt 1 forallsK k=1 are the rate weighting factors

for all symbols ηks = τ microksks γ ks = 11minusωks

microks = 1ωks

minus 1 and

macrθks = ωksmicro

(1minusωks)

ks For fixed τ ks ν ks foralls

K

k=1 the aboveoptimization problem has the same mathematical structure

as that of P 1 Thus by keeping τ ks ν ks forallsK k=1 constant

bkswks forallsK k=1 can be optimized by applying the MSE

duality discussed in Section IV Moreover τ ks ν ks forallsK k=1

and the power allocation part of the above problem can be

optimized by a GP method like in (25) of [20] Consequently

we can apply Algorithm II to solve (70) The detailed expla-

nations are omitted for conciseness The following problems

9This is at the expense of additional computation However as mentionedin [1] (see Appendix A of [1]) a small desktop computer can solve a GP of 100 variables and 10000 constraints by standard interior point method under aminute Thus we believe that the complexity of Algorithm I and Algorithm

II are almost the same

can also be solved by simple modification of Algorithm II

P 7 minBkWk

Kk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

SINRks ge ϱks forallnks

equiv minBkWkKk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

ξ DLks le (1 + ϱks)minus1 forallnks

P 8 maxBkWk

Kk=1

min Rks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

equiv minBkWkKk=1

max ξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

where SINRks(Rks) is the SINR (rate) of the kth user sth

symbol and we use the fact that Rks = log(1 + SINRks)and ξ DL

ks = (1 + SINRks)minus1 [1] It is clearly seen that the

application of Algorithm II is not limited to the problems of

this paper

Note that under imperfect channel state information (CSI)

condition the stochastic robust design versions of P 1 - P 5 can

be solved like in [10] However to the best of our knowledge

the relationship between rate (SINR) and MSE is not known

when the CSI is imperfect [7] Hence solving the rate (SINR)-

based robust design problems (for example robust versions of

P 6 - P 8) by our duality approach is an open problem

X SIMULATION R ESULTS

In this section we present simulation results for P 1 minus P 4

All of our simulation results are averaged over 100 randomly

chosen channel realizations We set K = 2 N = 4 and

M k = S k = 2 ηks = ρks = ηk = ρk = 1 forallsK k=1

It is assumed that Rn1 = σ21IM 1 Rn2 = σ2

2IM 2 and

σ22 = 2σ2

1 The maximum power of each BS antenna is set

to ˘ pn = 25mW N n=1 And the maximum power allocated

to each symbol and user are set to ˘ pks

= 25mW forallsK

k=1and ˆ pk = 5mW K k=1 respectively For better exposition we

define the Signal-to-noise ratio (SNR) as P maxKσ2av and it

is controlled by varying σ2av where P max = 10mW is the

total maximum BS power and σ2av = (σ2

1 + σ22)2 We also

compare Algorithm II and the algorithm in [2]10

Note that the algorithm in [2] is designed for coordinated

BS systems scenario And the iterative algorithm of [2] is

based on the per BS power constraint However according

to [2] and [21] B coordinated BS systems each with Z

10As will be clear in the sequel the proposed algorithm and the algorithmof [2] may not utilize the entire 10mW for all noise levels Thus the afore-mentioned SNR can be considered as the maximum SNR of the transmitted

signal

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1215

12

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

Fig 2 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of WSMSE for [top] P 1 [bottom] P 2

antennas can be treated as one multiuser MIMO system with

BZ antennas Thus when Z = 1 the considered problem has

exactly the same structure as that of [2] To the best of our

knowledge there is no other general linear algorithm that cansolve the problem types P 1 minus P 4 On the other hand in all

problems since there are more than one power constraints (ie

per antenna and symbol (user) powers) all power constraints

may not be active at the optimal solution Due to these reasons

we compare Algorithm II and the algorithm in [2] both in

terms of the achieved MSE (ie minimized MSE) and total

utilized BS power at the achieved MSE

A Simulation results for problems P 1 minus P 2

In this subsection we compare the performance of our

proposed algorithm with that of [2] As can be seen from Fig

2 the proposed algorithm and the algorithm in [2] achievethe same symbol-wise and user-wise WSMSEs Next we plot

the total utilized powers at the BS to achieve these WSMSEs

which is shown in Fig 3 From these two figures one can see

that to achieve the same WSMSE the proposed duality based

iterative algorithm requires less total BS power than that of

[2] This scenario fits to that of [10] and [19] where the sum

MSE minimization constrained with a per BS antenna power

problem has been examined by duality approach

B Simulation results for problems P 3 minus P 4

Like in the above subsection here we compare the per-

formance of our proposed algorithm with that of [2] For

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 3 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 1 [bottom] P 2

For this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

10 15 20 25 30 350

005

01

015

02

025

SNR (dB)

M a x i m u m s y m b o l M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

005

01

015

02

025

03

035

04

045

05

SNR (dB)

M a x i m u m u s e r M S E

Algorithm II

Algorithm in [2]

Fig 4 Comparison of the proposed algorithm (Algorithm II) and that of

in [2] in terms of maximum achieved MSE for [top] P 3 [bottom] P 4

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 3: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 315

3

d2

d1 HH 1

HH 2

HH K

WH 2

n1

nK

n2

WH K

WH 1

d1

d2

dK

= d B

dK

(a)

V1

V2

nI

1S 1

nI

K 1

nI KS K

nI 11

tH

KS K

tH K 1

tH

1S 1

tH 11

H111

H11S 1

H21S 1

H1KS K

H1K 1

HKK 1

HK 1S 1

H2K 1

HKKS K

dK 1

d11

VK

HK 11

H2KS K

H211

d1

dKS K

d1S 1d2

dK

(b)

Fig 1 Multiuser MIMO system model (a) downlink channel (b) virtualinterference channel

denoting the symbol intended for the k th user as dk isin CS ktimes1

and S =sumK

k=1 S k the entire symbol can be written in a data

vector d isin CS times1 as d = [dT 1 middot middot middot dT

K ]T The BS precodes d

into an N length vector by using its overall precoder matrix

B = [b11 middot middot middot bKS K ] where bks isin CN times1

is the precodervector of the BS for the kth MS sth symbol The kth MS

employs a receiver wks to estimate the symbol dks We follow

the same channel matrix notations as in [8] The estimates of

the k th MS sth symbol (dks) and k th user (dk) are given by

dks =wH ks(HH

k

K 991761i=1

Bidi + nk) = wH ks(HH

k Bd + nk) (1)

dk =WH k (HH

k Bd + nk) (2)

where HH k isin CM ktimesN is the channel matrix between the BS

and kth MS Wk = [wk1 middot middot middotwkS k ] Bk = [bk1 middot middot middotbkS k ] and

nk is the kth MS additive noise Without loss of generality

we can assume that the entries of dk are independent and

identically distributed (iid) ZMCSCG random variables all

with unit variance ie EdkdH k = IS k Edkd

H i = 0

foralli = k and EdknH i = 0 foralli k The kth MS noise vector is

a ZMCSCG random variable with covariance matrix Rnk isinCM ktimesM k

To establish our MSE downlink-interference duality we

model the virtual interference channel (Fig 1(b)) is modeled

by introducing precoders Vk = [vk1 middot middot middot vkS k ]K k=1 and de-

coders Tk = [tk1 middot middot middot tkS k ]K k=1 where vks isin CM ktimes1 and

tks isin CN times1 forallk s In this channel it is assumed that the k th

userrsquos sth symbol (dks) is an iid ZMCSCG random variable

with variance ζ ks and estimated independently by tks isin C N times1

ie EdksdH ks = ζ ks EdksdH

ij = 0 forall(i j) = (k s) and

EdknH i = 0 foralli k Moreover nI

ks forallsK k=1 (Fig 1(b))

are also ZMCSCG random variables with covariance matrices

∆ks isin realN timesN = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1 and the

channels between the k th transmitter and all receivers are the

same (ie Hkjs = Hk forall j sK k=1) Note that from the system

model aspect the current paper and [10] share the same idea

As can be seen from Fig 1 the outputs of Fig 1(a) and

Fig 1(b) are not the same However since Fig 1(b) is a

rdquovirtualrdquo interference channel which is introduced just to solve

the downlink MSE-based problems by duality approach the

output of Fig 1(b) is not required in practice For this reason

the difference in the outputs of the downlink and interference

channels of Fig 1 will not affect the downlink MSE-based

problem formulations and the duality based solutions

For the downlink system model of Fig 1(a) the symbol-

wise and user-wise MSEs can be expressed as

ξ DLks =Ed(dks minus dks)(dks minus dks)H

=wH ks(HH

k BBH Hk + Rnk)wks minus wH ksH

H k bksminus

bH ksHkwks + 1 (3)

ξ DLk =Ed(dk minus dk)(dk minus dk)H

=trIS k + WH k (HH

k BBH Hk + Rnk)Wkminus

WH k H

H k Bk minus BH

k HkWk (4)

Using these two equations the symbol-wise and user-wise

WSMSEs can be expressed as

ξ DLws =

K 991761k=1

S k991761s=1

ηksξ DLks = trη + ηWH HH BBH HW+

ηWH RnW minus ηWH HH B minus ηBH HW (5)

ξ DLwu =

K 991761k=1

ηkξ DLk = trη + ηWH HH BBH HW

+ ηWH RnW minus ηWH HH B minus ηBH HW (6)

where Rn = blkdiag(Rn1 middot middot middot RnK ) η =diag(η11 middot middot middot η1S 1 middot middot middot ηK 1 middot middot middot ηKS K ) and η =blkdiag(η1IS 1 middot middot middot ηK IS K ) with ηks and ηk are the

MSE weights of the kth user sth symbol and kth user

respectively Like in the downlink channel the interference

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 415

4

channel symbol user MSE and WSMSEs are expressed as

ξ I ks =tH

ksΓctks + tH ks∆kstks minus tH

ksHkvksζ ksminus

ζ ksvH ksH

H k tks + ζ ks (7)

ξ I k =trTH

k ΓcTk minus TH k HkVkζ k minus ζ kV

H k H

H k Tk + ζ k+

S k

991761s=1

tH ks∆kstks (8)

ξ I ws =

K 991761k=1

S k991761s=1

λksξ I ks = trλTH ΓcT minus λTH HVζ minus

λζ VH HH T + λζ +

K 991761k=1

S k991761s=1

λkstH ks∆kstks (9)

ξ I wu =

K 991761k=1

λkξ I k = trλTH ΓcT minus λTH HVζ minus

λζ VH HH T + λζ +K 991761

k=1

S k991761s=1

λktH ks∆kstks (10)

where ζ k = diag(ζ k1 middot middot middot ζ kS k) ζ = blkdiag(ζ 1 middot middot middot ζ K )

λ = diag(λ11 middot middot middot λ1S 1 middot middot middot λK 1 middot middot middot λKS K )

λ = blkdiag(λ1IS 1 middot middot middot λK IS K ) and Γc =sumK i=1

sumS ij=1 ζ ijHivijv

H ijH

H i with λks and λk are the

MSE weights of the kth user sth symbol and kth user

respectively

III PROBLEM F ORMULATION

The aforementioned MSE-based optimization problems

can be formulated as

P 1 minBkWkKk=1

K

991761k=1

S k

991761s=1 ηksξ

DL

ks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks (11)

P 2 minBkWk

Kk=1

K 991761k=1

ηkξ DLk

st [BBH ](nn) le ˘ pn trBH k Bk le ˆ pk foralln k (12)

P 3 minBkWkKk=1

max ρksξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks (13)

P 4 minBkWkKk=1

max ρkξ DLk

st [BBH

](nn) le ˘ pn trBH k Bk le ˆ pk foralln k (14)

where ρk(ˆ pk) and ρks(˘ pks) are the MSE balancing weights

(maximum available power) of the kth user and kth user sth

symbol respectively and ˘ pn denotes the maximum transmitted

power by the nth antenna

For both the WSMSE minimization and min max WMSE

problems different weights are given to different symbols

(users) However at optimality the solutions of these two

problems are not necessarily the same This is due to the

fact that the aim of the WSMSE minimization problem is

just to minimize the WSMSE of all symbols (users) (ie in

such a problem the minimized WMSE of each symbol (user)

depends on its corresponding channel gain) whereas the aim

of min max WMSE problem is to minimize and balance the

WMSE of each symbol (user) simultaneously (ie in such

a problem all symbols (users) achieve the same minimized

WMSE [13]) Moreover as will be clear later the solution ap-

proach of WSMSE minimization problem can not be extended

straightforwardly to solve the min max WMSE problem Due

to these facts we examine the WSMSE minimization and min

max WMSE problems separatelySince the problems P 1 - P 4 are not convex convex

optimization framework can not be applied to solve them To

the best of our knowledge duality based solutions for these

problems are not known In the following we present an MSE

downlink-interference duality based approach for solving each

of these problems which is shown in Algorithm I2

Algorithm I

Initialization For each problem initialize Bk = 0K k=1

such that the power constraint functions are satisfied3

Then update WkK k=1 by using minimum mean-

square-error (MMSE) receiver approach ie

Wk = (HH k BBH Hk + Rnk)minus1HH k Bk forallk (15)

Repeat Interference channel

1) Transfer the symbol-wise (user-wise) WSMSE or

WMSE from downlink to interference channel

2) Update the receivers of the interference channel

tks forallsK k=1 using MMSE receiver technique

Downlink channel

3) Transfer the symbol-wise (user-wise) WSMSE or

WMSE from interference to downlink channel

4) Update the receivers of the downlink channel WkK k=1

by MMSE receiver approach (15)

Until convergence

The above iterative algorithm is already known in [5] [8] and

[10] However the approaches of these papers can not ensure

the power constraints of P 1 - P 4 at step 3 of Algorithm I

Hence one can not apply the approaches of these papers to

solve P 1 - P 4 In the following sections we establish our

MSE downlink-interference duality

IV SYMBOL-WISE WSMSE DOWNLINK-INTERFERENCE

DUALITY

This duality is established to solve symbol-wise WSMSE-

based problems (for example P 1)

A Symbol-wise WSMSE transfer (From downlink to interfer-

ence channel)

In order to use this WSMSE transfer for solving P 1 we set

the interference channel precoder decoder noise covariance

input covariance and MSE weight matrices as

V = β W T = Bβ ζ = η λ = I ∆ks = Ψ + microksI

(16)

2As will be clear later in Section VIII to solve P 3 and P 4 (and moregeneral MSE-based problems) an additional power allocation step is requiredIn Algorithm I this step is omitted for clarity of presentation

3For the simulation we use Bk = [Hk](1Sk)Kk=1 followed by the

appropriate normalization of BkKk=1 to ensure the power constraints

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 515

5

where β ψnN n=1 and microks forallsK

k=1 are positive real

scalars that will be determined in the sequel and Ψ =diag(ψ1 middot middot middot ψN ) Substituting (16) into (9) and equating

ξ I ws = ξ DL

ws yields

trBH HWηWH HH B minus BH HWη minus ηWH HH B + η+

1

β 2

K

991761k=1

S k

991761s=1

bH

ks

(Ψ + microksIN )bks = trηWH HH BBH HW

+ ηWH RnW minus ηWH HH B minus ηBH HW + η

It follows

β 2τ =

N 991761n=1

ψn ˇ pn +

K 991761k=1

S k991761s=1

microks macr pks = pT ψ + pT micro (17)

where τ = trηWH RnW ψ = [ψ1 middot middot middot ψN ]T micro =

[micro11 middot middot middot micro1S 1 middot middot middot microK 1 middot middot middot microKS K ]T p = [ˇ p1 middot middot middot ˇ pN ]T

and p = [macr p11 middot middot middot macr p1S 1 middot middot middot macr pK 1 middot middot middot macr pKS K ]T with macr pks =bH

ksbks ˇ pn = bH n

bn and bH n is the nth row of B

The above equation shows that by choosing any ψnN n=1

and microks forallsK k=1 that satisfy (17) one can transfer thedownlink channel precoderdecoder to the interference channel

decoderprecoder ensuring ξ DLws = ξ I 1

ws where ξ I 1w is the

interference WSMSE at step 1 of Algorithm I However here

ψnN n=1 and microks forallsK

k=1 should be selected in a way that

P 1 can be solved by Algorithm I To this end we choose ψ

and micro as

β 2τ ge pT ψ + pT micro (18)

By doing so the interference channel symbol-wise WSMSE

is upper bounded by that of the downlink channel (ie ξ I 1ws le

ξ DLws ) As will be clear later to solve (11) with Algorithm

I macrβ ψ and micro should be selected as in (18) This shows

that step 1 of Algorithm I can be carried out with (16) To

perform step 2 of Algorithm I we update tks of (16) by using

the interference channel MMSE receiver approach which is

expressed as

tks =(Γc + ∆ks)minus1Hkvksζ ks

=β (HWηWH HH + Ψ + microksI)minus1Hkwksηks (19)

where the second equality is obtained from (16) The above

expression shows that by choosing microks gt 0 forallsK k=1 ψn gt

0N n=1 we ensure (HWηWH HH +Ψ+microksI)minus1 exists Next

we transfer the symbol-wise WSMSE from interference to

downlink channel by ensuring the power constraint of P 1 (iewe perform step 3 of Algorithm I)

B Symbol-wise WSMSE transfer (From interference to down-

link channel)

For a given symbol-wise WSMSE in the interference

channel with ζ = η and λ = I we can achieve the same

WSMSE in the downlink channel (with the MSE weighting

matrix η) using a nonzero scaling factor (β ) satisfying

B = β T W = Vβ (20)

In this precoderdecoder transformation we use the notations

B and W to differentiate from the precoder and decoder

matrices used in Section IV-A By substituting (20) into

ξ DLws (with B=B W=W) equating the resulting symbol-wise

WSMSE with that of the interference channel (9) and after

some simple manipulations we get

K 991761k=1

S k991761s=1

tH ks(Ψ + microksIN )tks =

1

β 2trηVH RnV

rArr β 2 = trηVH RnVsumK k=1

sumS ks=1 t

H ks(Ψ + microksIN )tks

=β 2τ sumN

n=1 ψntH n

tn +sumK

k=1

sumS ii=1 microkit

H kitki

(21)

where tH n is the nth row of the MMSE matrix T (19) and

the third equality follows from (16) The power constraints of

each BS antenna and symbol in the downlink channel are thus

given by

ˇ

b

H

bn =β 2tH

n tn (22)

=β 2τ tH

n

tnsumN

i=1 ψitH i

ti +sumK

i=1sumS i

j=1 microijtH ij tij

le ˘ pn foralln

bH ksbks =β 2tH

kstks (23)

=β 2τ tH

kstkssumN i=1 ψit

H i

ti +sumK

i=1

sumS ij=1 microijt

H ij tij

le ˘ pks forallk s

where bH

n is the nth row of B By multiplying both sides of

(22) and (23) with ψn foralln and microks forallk s we get

ψn ge f n and microks ge f ks forallnks (24)

where f n = β2τ ˘ pn

ψntHn tn

sumN

i=1 ψitH

iti+sum

K

i=1sum

Si

j=1 microijtH

ijtij

and f ks =

β2τ ˘ pks

microkstHkstkssum

N i=1 ψit

Hi ti+

sumKi=1

sumSij=1 microijtHijtij

Now for any given β

tH n

tnN n=1 and tH

kstks forallsK k=1 suppose that there exist

ψn gt 0N n=1 and microks gt 0 forallsK

k=1 that satisfy

ψn = f n and microks = f ks forallnks (25)

From the above equation one can also achieve ψn ˘ pn =f n ˘ pn microks ˘ pks = f ks ˘ pks forallnks Summing up these expres-

sions for all n k and s results

N

991761n=1

ψn ˘ pn +K

991761k=1

S k

991761s=1

microks ˘ pks =N

991761n=1

f n ˘ pn +K

991761k=1

S k

991761s=1

f ks ˘ pks

=β 2τ (26)

This equation shows that the solution of (25) satisfies (26)

Moreover as ˘ pn ge ˇ pnN n=1 and ˘ pks ge macr pks forallsK

k=1

the latter solution also ensures (18) Therefore by choosing

ψnN n=1 and microks forallsK

k=1 such that (25) is satisfied step 3

of Algorithm I can be performed Furthermore one can notice

from (26) that β 2 can be any positive value

Next we show that there exists at least a set of feasible

ψn gt 0N n=1 and microks gt 0 forallsK

k=1 that satisfy (25) To this

end we consider the following Theorem [14]

Theorem 1 Let (X ∥∥2) be a complete metric space We

say that X rarr X is an almost contraction if there exist

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 615

6

κ(κ) isin [0 1) and χ(χ) ge 0 such that

∥(x) minus (y)∥2 le κ∥x minus y∥2 + χ∥y minus (x)∥2 or (27)

∥(x) minus (y)∥2 le κ∥x minus y∥2 + χ∥x minus (y)∥2 forallxy isin X

If satisfies (27) then the following holds true

1) existx isin X x = (x)

2) For any initial x0 isin X the iteration xn+1 = (xn)

for n = 0 1 2 middot middot middot converges to some x⋆ isin X3) The solution x⋆ is not necessarily unique

Proof See Theorem 11 of [14] Note that according to

[15] (see (11) and (12) of [15]) the two inequalities of (27)

are dual to each other

Define x and as x [x1 middot middot middot xS +N ]T =

[ψ1 middot middot middot ψN micro11 middot middot middot micro1S 1 middot middot middot microK 1 middot middot middot microKS K ]T

(x) [ f 1 middot middot middot f N f 11 middot middot middot f 1S 1 middot middot middot f K 1 middot middot middot f KS K ]with xn = ψn isin [ϵ (β 2τ minus ϵ

sumN i=1 i=n pim)pnm]N

n=1

and xrS +N r=N +1 = microks =isin [ϵ (β 2τ minus

ϵsumK

i=1

sumS ij=1(ij)=(ks) pijm)pksm] forallsK

k=14 As we can

see from (27) when ∥(x1) minus(x2)∥2 = 0 with x1 = x2 or

x1 = x2 one can set κ(κ) = 0 and χ(χ) = 0 to satisfy thisinequality And when ∥(x1) minus(x2)∥2 gt 0 (ie x1 = x2)

one can select appropriate κ(κ) isin [0 1) and χ(χ) ge 0 such

that (27) is satisfied This is due to the fact that in the latter

case ∥x2 minus (x1)∥2 gt 0 andor ∥x1 minus (x2)∥2 gt 0 and

∥x1 minus x2∥2 gt 0 are positive and bounded This explanation

shows the existence of κ(κ) isin [0 1) and χ(χ) ge 0 ensuring

(27) for any ∥(x1) minus (x2)∥2 x1x2 isin X Consequently

(x) is an almost contraction which implies

xn+1 = (xn) x0 = [x01 x02 middot middot middot x0(S +N )]T ge ϵ1N +S

for n = 0 1 2 middot middot middot converges (28)

where 1N +S is an N + S length vector with each elementequal to unity Thus there exist ψn ge ϵN

n=1 and microks geϵ forallsK

k=1 that satisfy (25) and can be computed using (28)

For numerical simulation we initialize x0 as x01 = x02 =middot middot middot = x0(S +N ) However finding the optimal initialization

strategy is still an open research topic

Once the appropriate ψnN n=1 and microksforallsK

k=1 are ob-

tained step 4 of Algorithm I is immediate and hence P 1 can

be solved iteratively using this algorithm

C Extension of the current duality for P 1 with a total BS

power constraint

If the constraints of P 1 are modified to a total BS powerthe power constraint at step 3 of Algorithm I can be ensured

by applying the precoderdecoder transformation expression of

[5] The precoderdecoder transformation of [5] is performed

by computing S scaling factors These scaling factors are

obtained by solving S systems of equations which require

matrix inversion with complexity O(S 3) (see (23) of [5])

In the current paper if the constraints of P 1 are modified

to a total BS power one can ensure the power constraint at step

3 of Algorithm I just by assigning ∆ks of (16) as ∆ks = I

By doing so β 2 of (17) and β 2 of (21) can be expressed as

4For our simulation we use ϵ =

min(10minus6 βτpnmN n=1 βτpksm forallsKk=1)

β 2 =sumK

k=1

sumSks=1 b

Hksbks

τ = P max

τ and β 2 = trηVHRnV

sumKk=1

sumSks=1 t

Hkstks

where P max is the total BS power Now by employing (20)

the total BS power at step 3 of Algorithm I can thus be given

as trBBH = β 2trTTH = β 2τ = P max (ie the total

BS power constraint is satisfied) Thus for P 1 (with a total BS

power constraint) we do not need to use Theorem I Moreover

our duality requires only one scaling factor to perform the

precoderdecoder transformation (ie β 2(β 2)) This showsthat for this problem the proposed duality based algorithm

requires less computation compared to that of [5] Note that

the duality algorithm of [5] requires the same computation as

that of [8] and less computation than that of [1] and [4] Thus

it is sufficient to compare the current duality algorithm with

the duality algorithm of [5]

For other WSMSE-based problems with a total BS power

constraint function the computational advantage of the current

duality based algorithm over that of [5] can be analysed like

in this subsection

V USE R-WISE WSMSE DOWNLINK-INTERFERENCE

DUALITYThis duality is established to solve user-wise WSMSE-

based problems (for example P 2)

A User-wise WSMSE transfer (From downlink to interference

channel)

To apply this WSMSE transfer for solving P 2 we set the

precoder decoder and noise covariance matrices as

V = β W T = Bβ ζ = η λ = I∆ks = Ψ + microkI (29)

where β ψnN n=1 and microkK

k=1 are real positive scalars

Substituting (29) into (10) and equating ξ I wu = ξ DL

wu yields

β 2τ =

N 991761n=1

ψn ˇ pn +

K 991761k=1

microk pk = pT ψ + pT micro (30)

where τ = trηWH RnW micro = [micro1 middot middot middot microK ]T p =

[˜ p1 middot middot middot ˜ pK ]T with ˜ pk = trBkB

H k Like in Section IV-A

we perform step 1 of Algorithm I by choosing β 2 ψ and microas

β τ ge pT ψ + pT micro (31)

To perform step 2 of Algorithm I we update tks of (29)

using the interference channel MMSE receiver as

tks =β (HWηWH HH + Ψ + microkI)minus1Hkwksηk (32)

This expression shows that by choosing microk gt 0K k=1 ψn gt

0N n=1 we ensure that (HWηWH HH + Ψ+ microkI)minus1 exists

B User-wise WSMSE transfer (From interference to downlink

channel)

For a given user-wise WSMSE in the interference channel

with ζ = η and λ = I we can achieve the same WSMSE in

the downlink channel (with the weighting matrix η) by using

a nonzero scaling factor ( ˜β ) which satisfies

B = ˜β T W = V

˜β (33)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 715

7

In this precoderdecoder transformation we use the notationsB and W to differentiate from the precoder and decoder

matrices used in Section V-A By substituting (33) into ξ DLwu

(with B=B W=W) then equating the resulting user-wise

WSMSE with that of the interference channel (ξ I wu) and after

simple manipulations we get

˜β 2

=

β 2τ sumN n=1 ψntH

n tn +sumK

k=1 microktrTH k Tk (34)

where tH n is the nth row of the MMSE matrix T (32) The

power constraints of each BS antenna and user (ie step 3 of

Algorithm I) in the downlink channel can be expressed as

ψn ge ˇf n and microk ge f k forallk (35)

where

ˇf n =β 2τ

˘ pn

ψntH n

tnsumN i=1 ψit

H i

ti +sumK

i=1 microitrTH i Ti

(36)

f k =β 2τ

ˆ pk

microktrTH k Tk

sumN i=1 ψitH i ti +sumK

i=1 microitrTH i Ti

(37)

For given β tH n

tnN n=1 and trTH

k TkK k=1 one can show

that there exist ψnN n=1 and microkK

k=1 which satisfy

ψn = ˇf n and microk = f k forallnk (38)

The solution of (38) can be obtained exactly like that of (25)

As ˘ pn ge ˇ pnN n=1 and ˆ pk ge ˜ pkK

k=1 the latter solution also

satisfies (31) Thus P 2 can be solved using Algorithm I

V I SYMBOL-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

In this section we establish the symbol-wise MSE duality

between downlink and interference channels If all symbols

are active this duality can be applied to solve MSE based

problems However as will be clear later this duality requires

more computation compared to the duality of Sections IV and

V Thus we propose this duality to be employed for problems

like in P 3 since this problem maintains all symbols active and

can not be solved by the duality in Sections IV and V

A Symbol-wise MSE transfer (From downlink to interference

channel)

To apply this duality for P 3 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

vks = β kswks tks = bksβ ks ζ = I

∆ks = Ψ + microksIN forallks (39)

Substituting (39) into (7) and ξ DLks = ξ I

ks forallsK k=1 yields

wH ks(HH

k

K 991761i=1

S i991761j=1

bijbH ijHk + Rnk)wks minus wH

ksHH k bks

minus bH ksHkwks + 1 =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1

β 2ijHiwijwH ijH

H i +

Ψ + microksIN )bks minus bH

ksHkwks minus wH

ksHH

k bks + 1 forallks

It implies

wH ks(HH

k

K 991761i=1

S i991761j=1(ij)=(ks)

bijbH ijHk + Rnk)wks =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijHiwijwH ij H

H i + Ψ+

microksIN )bks forallks (40)

Collecting the above expression for all k and s gives

(Y + Θ)β2

=[a11 middot middot middot a1S 1 middot middot middot aK 1 middot middot middot aKS K ]T = ˜Px

rArr β2

=Θminus1(I + YΘminus1)minus1 ˜Px (41)

where β2

= [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T

Θ = diag(θ11 middot middot middot θ1K 1 middot middot middot θK 1 middot middot middot θKS K )

aks = bH ksΨbks + microksb

H ksbks ˜P = [ macrP P] and

Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

θks = wH ksRnkwks macrP isin realS timesN = |BH |2

P = diag(macr p11 middot middot middot macr p1S 1 middot middot middot macr pK 1 middot middot middot macr pKS K )

yks = [minus|bH ksH1w11|2 middot middot middot zks middot middot middot minus|bH

ksHK wK 1| middot middot middot minus |bH

ksHK wKS K |]T and zks =

wH ksH

H k

sumK i=1

sumS ij=1(ij)=(ks) bijb

H ijHkwks Next we

examine two important properties of (I + YΘminus1)minus1 To this

end we examine the following Theorem

Theorem 2 Let A isin realntimesn and A(ij)(i=j) le 0 1 lei( j) le n If the diagonal elements of A are A(ii) = 1 minussumn

j=1j=i A(ji) then

Property 1 Aminus1 ge 0 (42)

Property 2 |||Aminus1|||1 = 1 (43)

where () ge 0 and ||||||1 denote matrix non-negativity and

one norm respectively

Proof See Appendix A

According to the first property of Theorem 2 if θks gt0 forallsK

k=15 the inverse of (I + YΘminus1) exists and it has

nonnegative entries Consequently for any positive ψnN n=1

and microks forallsK k=1 β ks forallsK

k=1 of (41) are strictly positive6

Now by selecting ψnN n=1 and microks forallsK

k=1 such that (41) is

fulfilled we can transfer the MSE of each symbol from down-

link to interference channel ensuring ξ DLks = ξ I 1

ks forallsK k=1

where ξ I 1ks is the MSE of the kth user sth symbol at step 1

of Algorithm I Here we should also select ψnN n=1 and

microks forallsK k=1 such that the power constraint of P 3 at step 3

of Algorithm I is satisfied To this end we examine the steps(2) and (3) of this algorithm

Like in Section IV we perform step 2 of Algorithm 1 by

updating tks using MMSE receiver as

tks =(Γc + ∆ks)minus1Hkvksζ ks (44)

=(

K 991761i=1

S i991761j=1

β ijHiwijwH ijH

H i + Ψ + microksI)minus1Hkwksβ ks

where the second equality is obtained from (39) The above

expression shows that by choosing microks gt 0 forallsK k=1 ψn gt

5For P 3 wH ksRnkwks gt 0forallsK

k=1 is always true

6Note that the application of (43) will be clear in the sequel (see (55))

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 815

8

0N n=1 we ensure (

sumK i=1

sumS ij=1 β ijHiwijw

H ij H

H i + Ψ +

microksI)minus1 exists Next we transfer the symbol-wise MSE from

interference to downlink channel by satisfying the power

constraint of P 3 (ie we perform step 3)

B Symbol-wise MSE transfer (From interference to downlink

channel)

For a given symbol MSE in the interference channel with

ζ = I we can achieve the same symbol MSE in the downlink

channel by using a nonzero scaling factor (β ks) which satisfies

bks = β kstks wks = vksβ ks (45)

Here we use the notations B and W to differentiate with

the precoder and decoder matrices used in Section VI-A By

substituting (45) into ξ DLks (with B=B W=W) then equating

the resulting symbol MSE with that of the interference channel

(7) and after some straightforward steps we get

1β 2ksvH ks(HH k

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijtijtH ijHk + Rnk)vks =

tH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

HivijvH ij H

H i + Ψ + microksI)tks forallks

By collecting the above equalities for all k and s β ks forallsK k=1

can be determined by

(Y + Ω)β2 =[vH 11Rn1v11 middot middot middot vH

1S 1Rn1v1S 1

middot middot middot vH K 1RnK vK 1 middot middot middot vH

KS KRnK vKS K ]T

=Θβ2

= ΘΘminus1(I + YΘminus1)minus1 ˜Px

rArr β2 =(Y + Ω)minus1(I + YΘminus1)minus1 ˜Px

=Ωminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜Px (46)

where the third equality follows from (41)

β2 = [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T Ω =diag(tH

11Ψt11 middot middot middot tH 1S 1

Ψt1S 1 middot middot middot tH K 1ΨtK 1 middot middot middot

tH KS K

ΨtKS K ) Ω = diag(micro11tH 11t11 middot middot middot micro1S 1t

H 1S 1

t1S 1 middot middot middot

microK 1tH K 1tK 1 middot middot middot microKS Kt

H KS K

tKS K ) Ω = Ω + Ω

and Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

yks = [minus|tH 11H1vks|2 middot middot middot zks middot middot middot minus|tH

K 1HK vks|2 middot middot middot minus |tH

KS KHK vks|2]T and zks =

tH kssum

K i=1sum

S ij=1(ij)

=(ks)Hivijv

H ij H

H i tks By applying

Theorem 2 it can be shown that β ks forallsK k=1 are strictly

positive for ψn gt 0N n=1 and microks gt 0 forallsK

k=1 The power

constraints of the nth BS antenna and kth user sth symbol

are given by

bH

nbn = tH

n Υtn le ˘ pn foralln (47)bH ksbks = β 2kst

H kstks le ˘ pks forallk s (48)

where Υ = diag(β 211 middot middot middot β 1S 1 middot middot middot β 2K 1 middot middot middot β KS K ) Mul-

tiplying both sides of (47) by ψn and stacking the resulting

inequality for all n yields

˘Pψ ge

˜Ωβ

2

(49)

where P = diag(˘ p1 middot middot middot ˘ pN ) and Ω = Ψ|T|2 Like in the

above expression by multiplying both sides of (48) with microks

and collecting the resulting inequality for all k and s the

power constraints (48) can be expressed as

macrPmicro ge Ωβ2 (50)

where macrP = diag(˘ p11 middot middot middot ˘ p1S 1 middot middot middot ˘ pK 1 middot middot middot ˘ pKS K ) By

employing β2 of (46) (49) and (50) can be combined as

xprime ge ˜Ωβ2 = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1xprime

= (xprime)xprime (51)

where ˜P = blkdiag(P macrP) ˜Ω = [ΩT ΩT ]T xprime = ˜

P[ψ micro]T

and (xprime) = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1

Next we show that there exists xprime gt 0 such that (51) is

satisfied Towards this end we consider the following discrete-

time switched system [16]

xn+1 = Fσnxn for n = 0 1 2 middot middot middot (52)

where x isin realmtimes1 is a state Fσn isin realmtimesm is a switchingmatrix and σn isin 0 1 2 middot middot middot According to [16] (Remark 2

of [16]) the above system is marginally stable (convergent) if

maxσn

∥Fσn∥⋆ = 1 for n = 0 1 middot middot middot (53)

where ∥∥⋆ denotes an induced matrix norm

Let us consider the following iteration

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (54)

Now if we assume (xprimen) = Fσn foralln7 we can interpret (54)

as a discrete time switched system Consequently the above

iteration is guaranteed to converge if maxn ∥ (xprimen)∥⋆ = 1 It

is known that ||||||1 is an induced matrix norm [17] For any

xprime the matrix one norm of (xprime) is given by

||| (xprime)|||1

=||| ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1|||1

le||| ˇΩ|||1|||(I + YΩminus1)minus1|||1|||(I + YΘminus1)minus1|||1||| ˇP|||1

=||| ˇΩ|||1||| ˇP|||1 le 1 (55)

where ˇΩ = [ ˜ΩΩminus1 0(N +S )timesN ] ˇP = [ ˜P( ˜P)minus1 0N times(N +S )]

the second inequality is due to the fact that |||XY|||1 le|||X|||1|||Y|||1 [17] (page 290) the third equality is obtained

by applying Theorem 2 and the last inequality employs thefollowing facts Using the definition (73) (see Appendix A)

one can get ||| ˇΩ|||1 le 1 by applying (46) and (51) and

||| ˇP|||1 le 1 by applying (13) (41) and (51)

Thus maxn ∥ (xprimen)∥⋆ = 1 holds true and (54) is guar-

anteed to converge As we can see (54) is derived by using

(41) and (46) Thus the solution of (54) also satisfies (41)

and (46) Moreover for any initial xprime0 gt 0 since (xprimen) foralln is

positive the solution of (54) is strictly positive and [ψ micro]T =

( ˜P)minus1xprime gt 0 which is the desired result

7Since (xprimen) is the products of stochastic matrices (see the proof of Theorem 2) (xprimen) is a bounded matrix for any xprime gt 0 Thus the assumption

(xprimen) = Fσn foralln holds true

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 915

9

Once the feasible microks forallsK k=1 and λnN

n=1 are obtained

step 4 of Algorithm 1 is immediate As a result P 3 can be

solved using Algorithm I with an additional power allocation

step which will be detailed in Section VIII

C Extension of the current duality for P 3 with a total BS

power constraint

In this subsection we show the extension of the current

duality for P 3 with a total BS power constraint For this

problem we set ∆ks of (39) as ∆ks = I forallk s (ie like in

Section IV-B) Upon doing so β2 is computed directly from

the first equality of (46) (ie the bound (55) is not needed)

By summing the left and right hand sides of this equality one

can get trBBH = P max This shows that for P 3 with a

total BS power constraint problem the total BS power at step

3 of Algorithm I is satisfied Thus one can apply Algorithm

I (with the additional power allocation step) to solve the latter

problem by setting ∆ks of (39) as ∆ks = I forallk s

For other total BS power constrained WMSE-based prob-

lems the current duality based algorithm can be applied likein this subsection The details are omitted for conciseness

Note that for such problem types the duality algorithm of the

current paper has the same complexity as that of [5]

VII USE R-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

This section establishes user-wise MSE duality between

downlink and interference channels This duality is established

to solve the problems of type P 4

A User-wise MSE transfer (From downlink to interference

channel)

To apply this MSE transfer for P 4 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

Vk = β kWk Tk = Bkβ k ζ = I ∆ks = Ψ + microkI (56)

Like in Section VI substituting (56) into (8) equating ξ DLk =

ξ I k K

k=1 and after some straightforward steps we get the

following system of equations

(Y + Θ)β2

= ˜Px rArr β2

= Θminus1(I + YΘminus1)minus1 ˜Px (57)

where

Y(kl) =

983163 sumK i=1i=k ∥WH

k HH k Bi∥2F for k = l

minus∥WH l H

H l Bk∥2F for k = l

(58)

Θ = diag(θ1 middot middot middot θK ) β2

= [β 21 middot middot middot β 2K ]T

˜P = [ macrP P]

with θk = trWH k RnkWk macrP isin realS timesN = |BH |2 P =

diag(macr p1 middot middot middot macr pK ) By applying Theorem 2 it can be shown

that β kK k=1 of (57) are strictly positive Thus step 1 of

Algorithm I can be performed using (57) We perform step 2

of Algorithm I by updating tks using MMSE receiver as

tks =(K

991761i=1

β iHiWiWH i H

H i + Ψ + microkI)minus1Hkwksβ k (59)

B User-wise MSE transfer (From interference to downlink

channel)

For a given user MSE in the interference channel with

ζ = I we can achieve the same MSE in the downlink channel

by using nonzero scaling factors ( ˜β kK k=1) that satisfy

Bk = ˜β kTk

Wk = Vk ˜β k (60)

Here we also use the notations B and W to differentiate

with the precoder and decoder matrices used in Section VII-

A By substituting (60) into ξ DLk (with B=B W=W) and

then equating the resulting user-wise MSE with that of the

interference channel (7) and after some steps ˜β kK k=1 are

determined as

(I + ˇYˇΩminus1

) ˇΩ ˜β2

= [trVH 1 Rn1V1 middot middot middot trVH

K RnK VK ]T

rArr ˜β2

= ˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px (61)

where the second equality follows from

(57) ˜β2

= [ ˜β 21

middot middot middot ˜β 2K

]T Ωprime =diag(trTH

1 ΨT1 middot middot middot trTH K ΨTK ) Ω =

diag(micro1trTH 1 T1 middot middot middot microK trTH

K TK ) ˇΩ = Ωprime + Ω

By applying Theorem 2 it can be shown that ˜β kK k=1 are

strictly positive for ψn gt 0N n=1 and microk gt 0K

k=1 Like in

Section VI-B the power constraint of the nth BS antenna

and kth user can thus be expressed as

xprime ge ˆΩ ˜β2

= ˆΩˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px

= (xprime)xprime (62)

where P = diag(ˆ p1 middot middot middot ˆ pK ) ˆP = blkdiag(P ˆP) ˆΩ =

[ΩT

ΩT

]T

xprime

= ˜P[ψ micro]

T

and (xprime

) = ˆΩˇΩ

minus1

(I +ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜P( ˆP)minus1 Like in Section VI-B it

can be shown that there exists a feasible xprime gt 0 that satisfy

(62) and can be obtained iteratively by

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (63)

By initializing xprime0 gt 0 the solution of the above iteration

is always positive Consequently λn gt 0N n=1 and microk gt

0K k=1 holds true Once the feasible microkK

k=1 and λnN n=1

are obtained step 4 of Algorithm 1 is straightforward As a

result P 4 can be solved using Algorithm I with the additional

power allocation step of Section VIII

VIII GENERALIZED AND IMPROVED VERSION OF

Algorithm I

From the discussions of Sections IV - VII one can

understand that each iteration of Algorithm I gives a non

increasing sequence of symbol (user) WMSEWSMSE As can

be seen from Section III the objective of P 1(P 2) is just to

minimize the total WSMSE of all symbols (users) whereas

the objective of P 3(P 4) is to simultaneously minimize and

balance the WMSE of all symbols (users) Thus Algorithm

I is appropriate to solve P 1(P 2) of the current paper For

P 3(P 4) although each iteration of Algorithm I is able to

provide a non increasing sequence of symbol (user) WMSE

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1015

10

(ie minimizes the maximum WMSE of all symbols (users))

each iteration of this algorithm is not able to guarantee

balanced WMSEs of all symbols (users) On the other hand

for an MSE constrained total BS power minimization problem

(for example P 7 in Section IX) an iterative algorithm that

can provide a non increasing sequence of total BS power is

required This shows that Algorithm I also can not solve the

latter problem In the following we address the drawbacks of Algorithm I just by including a power allocation step into

Algorithm I as explained below

In [8] for fixed transmit and receive filters the power

allocation parts of total BS power constrained MSE-based

problems have been formulated as GPs by employing the

approach and system model of [1] under the assumption that

all symbols are strictly active8 For this assumption in [8] we

show that the system model of [1] is appropriate to solve any

kind of total BS power constrained MSE-based problems using

duality approach (alternating optimization) This motivates us

to utilize the system model of [1] in the downlink channel

only and then include the power allocation step (ie GP) into

Algorithm I Towards this end we decompose the precoders

and decoders of the downlink channel as

Bk =GkP12k Wk = UkαkP

minus12k forallk (64)

where Pk = diag( pk1 middot middot middot pkS k) isin realS ktimesS k Gk =[gk1 middot middot middot gkS k ] isin CN timesS k Uk = [uk1 middot middot middot ukS k ] isin CM ktimesS k

and αk = diag(αk1 middot middot middot αkS k) isin realS ktimesS k are the transmit

power unity norm transmit filter unity norm receive filter and

receiver scaling factor matrices of the kth user respectively

ie gH ksgks = uH

ksuks = 1 forallsK k=1

By employing (64) and stacking ξ = [ξ DL11 middot middot middot ξ DL

KS K]T

= [ξ DL1 middot middot middot ξ DL

S ]T = [ξ DLl S

l=1]T the l th downlink symbol

MSE can be expressed as (see [1] and [10] for more detailsabout (64) and the above descriptions)

ξ DLl = pminus1l [(D + α2ΦT )p]l + pminus1l α2

l uH l Rnul (65)

where

Φ(lj) =

983163 |gH

l Huj |2 for l = j0 for l = j

(66)

D(ll) =α2l |gH

l Hul|2 minus 2αlreal(uH l H

H gl) + 1 (67)

1 le l( j) le S P = blkdiag(P1 middot middot middot PK ) =diag( p1 middot middot middot pS ) p = [ p1 middot middot middot pS ]

T G = [G1 middot middot middot GK ] =[g1 middot middot middot gS ] U = blkdiag(U1 middot middot middot UK ) = [u1 middot middot middot uS ]

and α = blkdiag(α1 middot middot middot αK ) = diag(α1 middot middot middot αS ) with∥gl∥2 = ∥ul∥2 = 1 Using (65) for fixed GU and α the

power allocation part of P 1 can be formulated as

min plSl=1

S 991761l=1

ηlξ DLl st ς T

np le ˘ pn pl le ˘ pl foralln l (68)

where ς T n isin real1timesS = |[G(ni)|2S

i=1 [η1 middot middot middot ηS ]T =

[η11 middot middot middot ηKS K ]T and [ ˘ pl middot middot middot ˘ pS ]T = [ ˘ p11 middot middot middot ˘ pKS K ]T As

ξ DLl is a posynomial (where plS

l=1 are the variables) (68)

8Note that this assumption is not always true for all MSE-based problemsHowever as mentioned in [1] in practice replacing zero powers by a smallvalue will not affect the overall optimization Due to this reason we replace

zero powers by 10minus6 in the simulation section

is a GP for which global optimality is guaranteed Thus it

can be efficiently solved using interior point methods with a

worst-case polynomial-time complexity [18]

For fixed GU and α the power allocation parts of

P 2 minus P 4 can be formulated as GPs like in P 1 Our duality

based algorithm for each of these problems including the

power allocation step is summarized in Algorithm II

Algorithm II

Initialization Like in Algorithm I

Repeat Interference channel

1) For P 1 and P 2 set V = WT = B (ie β = β = 1)

then compute ψn microks forallksn and ψn microk forallk nusing (25) and (38) respectively For P 3 and P 4 first

compute ψn microks forallksn and ψn microk forallk n using

(54) and (63) respectively then transfer each symbol

and user MSE from downlink to interference channels

by (39) and (56) respectively

2) Update the MMSE receivers of the interference channel

for P 1 P 2 P 3 and P 4 using (19) (32) (44) and (59)

respectivelyDownlink channel

3) Transfer the MSE (weighted sum user or symbol MSE)

from interference to downlink channel using (20) (33)

(45) and (60) for P 1 P 2 P 3 and P 4 respectively

4) For each of the problems P 1 minus P 4 decompose the

precoder and decoder matrices of each user as in (64)

Then formulate and solve the GP power allocation part

For example the power allocation part of P 1 can be

expressed in GP form as (68)

5) For each of the problems P 1minusP 4 by keeping PkK k=1

constant update the receive filters UkK k=1 and scal-

ing factors αkK

k=1 by applying downlink MMSE

receiver approach ie Ukαk = (HH k GPGH Hk +

Rnk)minus1HH k GkPkK

k=1 Note that in these expressions

αkK k=1 are chosen such that each column of UkK

k=1

has unity norm Then compute BkWkK k=1 by (64)

Until convergence

Convergence It can be shown that at each iteration

of this algorithm the objective function of each of the

problems P 1 - P 4 is non-increasing [4] [7] [19] Thus

the above iterative algorithm is convergent However

since P 1 - P 4 are non-convex this iterative algorithm

is not guaranteed to converge to the global optimum

In this algorithm we stop iteration (ie our convergence

condition) when the difference between the objectivefunctions in two consecutive iterations is smaller than

some small value ϵ (we use ϵ = 10minus6 for the simulation)

Computational complexity As can be seen from this

algorithm when we increase the number of users andor

(BS andor MS antennas) the number and size of

optimization variables increase Because of this the

computational complexity of Algorithm II increases as

K andor N andor M increases However studying the

complexity of this algorithm as a function of K N and

M needs effort and time And such a task is beyond the

scope of this work and is an open research topic

The power allocation step of Algorithm II has thus the

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1115

11

following benefits (1) For BS power constrained WSMSE

minimization problems this step improves the convergence

speed of Algorithm II compared to that of Algorithm I9 (for

example in P 1 minus P 2) The degree of improvement depends on

different parameters (for example Hk ∆ks forallk s etc) Thus

the theoretical comparison of these two algorithms in terms of

convergence speed requires time and effort And this task is

beyond the scope of this work and it is an open research topic(2) For symbol-wise (user-wise) WMSE balancing problems

this step helps to balance the WMSE of all symbols (users)

(for example in P 3 minus P 4) (3) For MSE constrained total

BS power minimization problems this step ensures a non

increasing total BS power at each iteration of Algorithm II

IX APPLICATION OF THE PROPOSED DUALITY BASED

ALGORITHM FOR OTHER PROBLEMS

A MSE based problem with entry-wise power constraint

The symbol-wise WSMSE minimization constrained with

entry wise power ie bH

ksnb

ksn le macr p

ksn forallksn problem is

formulated as

P 5 minBkWkKk=1

K 991761k=1

S k991761s=1

ηksξ DLks st bH

ksnbksn le macr pksn (69)

It can be shown that this problem can be solved by Algorithm

II with ∆ks = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1

B Weighted sum rate optimization constrained with per an-

tenna and symbol power problem

By employing the approach of [11] (see (16) of [11]) one

can equivalently express the weighted sum rate maximizationconstrained with per antenna and symbol power problem as

P 6 (70)

minτ ksν ksbkswksforallsK

k=1

K 991761k=1

S k991761s=1

θks1

τ ksν γ ks

ks +K 991761

k=1

S k991761s=1

ηksξ DLks

st [BBH ](nn) le ˘ pnbH ksbks le ˘ pks

K prodk=1

S kprods=1

ν ks = 1 τ ks gt 0

where 0 lt ωks lt 1 forallsK k=1 are the rate weighting factors

for all symbols ηks = τ microksks γ ks = 11minusωks

microks = 1ωks

minus 1 and

macrθks = ωksmicro

(1minusωks)

ks For fixed τ ks ν ks foralls

K

k=1 the aboveoptimization problem has the same mathematical structure

as that of P 1 Thus by keeping τ ks ν ks forallsK k=1 constant

bkswks forallsK k=1 can be optimized by applying the MSE

duality discussed in Section IV Moreover τ ks ν ks forallsK k=1

and the power allocation part of the above problem can be

optimized by a GP method like in (25) of [20] Consequently

we can apply Algorithm II to solve (70) The detailed expla-

nations are omitted for conciseness The following problems

9This is at the expense of additional computation However as mentionedin [1] (see Appendix A of [1]) a small desktop computer can solve a GP of 100 variables and 10000 constraints by standard interior point method under aminute Thus we believe that the complexity of Algorithm I and Algorithm

II are almost the same

can also be solved by simple modification of Algorithm II

P 7 minBkWk

Kk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

SINRks ge ϱks forallnks

equiv minBkWkKk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

ξ DLks le (1 + ϱks)minus1 forallnks

P 8 maxBkWk

Kk=1

min Rks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

equiv minBkWkKk=1

max ξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

where SINRks(Rks) is the SINR (rate) of the kth user sth

symbol and we use the fact that Rks = log(1 + SINRks)and ξ DL

ks = (1 + SINRks)minus1 [1] It is clearly seen that the

application of Algorithm II is not limited to the problems of

this paper

Note that under imperfect channel state information (CSI)

condition the stochastic robust design versions of P 1 - P 5 can

be solved like in [10] However to the best of our knowledge

the relationship between rate (SINR) and MSE is not known

when the CSI is imperfect [7] Hence solving the rate (SINR)-

based robust design problems (for example robust versions of

P 6 - P 8) by our duality approach is an open problem

X SIMULATION R ESULTS

In this section we present simulation results for P 1 minus P 4

All of our simulation results are averaged over 100 randomly

chosen channel realizations We set K = 2 N = 4 and

M k = S k = 2 ηks = ρks = ηk = ρk = 1 forallsK k=1

It is assumed that Rn1 = σ21IM 1 Rn2 = σ2

2IM 2 and

σ22 = 2σ2

1 The maximum power of each BS antenna is set

to ˘ pn = 25mW N n=1 And the maximum power allocated

to each symbol and user are set to ˘ pks

= 25mW forallsK

k=1and ˆ pk = 5mW K k=1 respectively For better exposition we

define the Signal-to-noise ratio (SNR) as P maxKσ2av and it

is controlled by varying σ2av where P max = 10mW is the

total maximum BS power and σ2av = (σ2

1 + σ22)2 We also

compare Algorithm II and the algorithm in [2]10

Note that the algorithm in [2] is designed for coordinated

BS systems scenario And the iterative algorithm of [2] is

based on the per BS power constraint However according

to [2] and [21] B coordinated BS systems each with Z

10As will be clear in the sequel the proposed algorithm and the algorithmof [2] may not utilize the entire 10mW for all noise levels Thus the afore-mentioned SNR can be considered as the maximum SNR of the transmitted

signal

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1215

12

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

Fig 2 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of WSMSE for [top] P 1 [bottom] P 2

antennas can be treated as one multiuser MIMO system with

BZ antennas Thus when Z = 1 the considered problem has

exactly the same structure as that of [2] To the best of our

knowledge there is no other general linear algorithm that cansolve the problem types P 1 minus P 4 On the other hand in all

problems since there are more than one power constraints (ie

per antenna and symbol (user) powers) all power constraints

may not be active at the optimal solution Due to these reasons

we compare Algorithm II and the algorithm in [2] both in

terms of the achieved MSE (ie minimized MSE) and total

utilized BS power at the achieved MSE

A Simulation results for problems P 1 minus P 2

In this subsection we compare the performance of our

proposed algorithm with that of [2] As can be seen from Fig

2 the proposed algorithm and the algorithm in [2] achievethe same symbol-wise and user-wise WSMSEs Next we plot

the total utilized powers at the BS to achieve these WSMSEs

which is shown in Fig 3 From these two figures one can see

that to achieve the same WSMSE the proposed duality based

iterative algorithm requires less total BS power than that of

[2] This scenario fits to that of [10] and [19] where the sum

MSE minimization constrained with a per BS antenna power

problem has been examined by duality approach

B Simulation results for problems P 3 minus P 4

Like in the above subsection here we compare the per-

formance of our proposed algorithm with that of [2] For

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 3 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 1 [bottom] P 2

For this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

10 15 20 25 30 350

005

01

015

02

025

SNR (dB)

M a x i m u m s y m b o l M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

005

01

015

02

025

03

035

04

045

05

SNR (dB)

M a x i m u m u s e r M S E

Algorithm II

Algorithm in [2]

Fig 4 Comparison of the proposed algorithm (Algorithm II) and that of

in [2] in terms of maximum achieved MSE for [top] P 3 [bottom] P 4

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 4: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 415

4

channel symbol user MSE and WSMSEs are expressed as

ξ I ks =tH

ksΓctks + tH ks∆kstks minus tH

ksHkvksζ ksminus

ζ ksvH ksH

H k tks + ζ ks (7)

ξ I k =trTH

k ΓcTk minus TH k HkVkζ k minus ζ kV

H k H

H k Tk + ζ k+

S k

991761s=1

tH ks∆kstks (8)

ξ I ws =

K 991761k=1

S k991761s=1

λksξ I ks = trλTH ΓcT minus λTH HVζ minus

λζ VH HH T + λζ +

K 991761k=1

S k991761s=1

λkstH ks∆kstks (9)

ξ I wu =

K 991761k=1

λkξ I k = trλTH ΓcT minus λTH HVζ minus

λζ VH HH T + λζ +K 991761

k=1

S k991761s=1

λktH ks∆kstks (10)

where ζ k = diag(ζ k1 middot middot middot ζ kS k) ζ = blkdiag(ζ 1 middot middot middot ζ K )

λ = diag(λ11 middot middot middot λ1S 1 middot middot middot λK 1 middot middot middot λKS K )

λ = blkdiag(λ1IS 1 middot middot middot λK IS K ) and Γc =sumK i=1

sumS ij=1 ζ ijHivijv

H ijH

H i with λks and λk are the

MSE weights of the kth user sth symbol and kth user

respectively

III PROBLEM F ORMULATION

The aforementioned MSE-based optimization problems

can be formulated as

P 1 minBkWkKk=1

K

991761k=1

S k

991761s=1 ηksξ

DL

ks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks (11)

P 2 minBkWk

Kk=1

K 991761k=1

ηkξ DLk

st [BBH ](nn) le ˘ pn trBH k Bk le ˆ pk foralln k (12)

P 3 minBkWkKk=1

max ρksξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks (13)

P 4 minBkWkKk=1

max ρkξ DLk

st [BBH

](nn) le ˘ pn trBH k Bk le ˆ pk foralln k (14)

where ρk(ˆ pk) and ρks(˘ pks) are the MSE balancing weights

(maximum available power) of the kth user and kth user sth

symbol respectively and ˘ pn denotes the maximum transmitted

power by the nth antenna

For both the WSMSE minimization and min max WMSE

problems different weights are given to different symbols

(users) However at optimality the solutions of these two

problems are not necessarily the same This is due to the

fact that the aim of the WSMSE minimization problem is

just to minimize the WSMSE of all symbols (users) (ie in

such a problem the minimized WMSE of each symbol (user)

depends on its corresponding channel gain) whereas the aim

of min max WMSE problem is to minimize and balance the

WMSE of each symbol (user) simultaneously (ie in such

a problem all symbols (users) achieve the same minimized

WMSE [13]) Moreover as will be clear later the solution ap-

proach of WSMSE minimization problem can not be extended

straightforwardly to solve the min max WMSE problem Due

to these facts we examine the WSMSE minimization and min

max WMSE problems separatelySince the problems P 1 - P 4 are not convex convex

optimization framework can not be applied to solve them To

the best of our knowledge duality based solutions for these

problems are not known In the following we present an MSE

downlink-interference duality based approach for solving each

of these problems which is shown in Algorithm I2

Algorithm I

Initialization For each problem initialize Bk = 0K k=1

such that the power constraint functions are satisfied3

Then update WkK k=1 by using minimum mean-

square-error (MMSE) receiver approach ie

Wk = (HH k BBH Hk + Rnk)minus1HH k Bk forallk (15)

Repeat Interference channel

1) Transfer the symbol-wise (user-wise) WSMSE or

WMSE from downlink to interference channel

2) Update the receivers of the interference channel

tks forallsK k=1 using MMSE receiver technique

Downlink channel

3) Transfer the symbol-wise (user-wise) WSMSE or

WMSE from interference to downlink channel

4) Update the receivers of the downlink channel WkK k=1

by MMSE receiver approach (15)

Until convergence

The above iterative algorithm is already known in [5] [8] and

[10] However the approaches of these papers can not ensure

the power constraints of P 1 - P 4 at step 3 of Algorithm I

Hence one can not apply the approaches of these papers to

solve P 1 - P 4 In the following sections we establish our

MSE downlink-interference duality

IV SYMBOL-WISE WSMSE DOWNLINK-INTERFERENCE

DUALITY

This duality is established to solve symbol-wise WSMSE-

based problems (for example P 1)

A Symbol-wise WSMSE transfer (From downlink to interfer-

ence channel)

In order to use this WSMSE transfer for solving P 1 we set

the interference channel precoder decoder noise covariance

input covariance and MSE weight matrices as

V = β W T = Bβ ζ = η λ = I ∆ks = Ψ + microksI

(16)

2As will be clear later in Section VIII to solve P 3 and P 4 (and moregeneral MSE-based problems) an additional power allocation step is requiredIn Algorithm I this step is omitted for clarity of presentation

3For the simulation we use Bk = [Hk](1Sk)Kk=1 followed by the

appropriate normalization of BkKk=1 to ensure the power constraints

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 515

5

where β ψnN n=1 and microks forallsK

k=1 are positive real

scalars that will be determined in the sequel and Ψ =diag(ψ1 middot middot middot ψN ) Substituting (16) into (9) and equating

ξ I ws = ξ DL

ws yields

trBH HWηWH HH B minus BH HWη minus ηWH HH B + η+

1

β 2

K

991761k=1

S k

991761s=1

bH

ks

(Ψ + microksIN )bks = trηWH HH BBH HW

+ ηWH RnW minus ηWH HH B minus ηBH HW + η

It follows

β 2τ =

N 991761n=1

ψn ˇ pn +

K 991761k=1

S k991761s=1

microks macr pks = pT ψ + pT micro (17)

where τ = trηWH RnW ψ = [ψ1 middot middot middot ψN ]T micro =

[micro11 middot middot middot micro1S 1 middot middot middot microK 1 middot middot middot microKS K ]T p = [ˇ p1 middot middot middot ˇ pN ]T

and p = [macr p11 middot middot middot macr p1S 1 middot middot middot macr pK 1 middot middot middot macr pKS K ]T with macr pks =bH

ksbks ˇ pn = bH n

bn and bH n is the nth row of B

The above equation shows that by choosing any ψnN n=1

and microks forallsK k=1 that satisfy (17) one can transfer thedownlink channel precoderdecoder to the interference channel

decoderprecoder ensuring ξ DLws = ξ I 1

ws where ξ I 1w is the

interference WSMSE at step 1 of Algorithm I However here

ψnN n=1 and microks forallsK

k=1 should be selected in a way that

P 1 can be solved by Algorithm I To this end we choose ψ

and micro as

β 2τ ge pT ψ + pT micro (18)

By doing so the interference channel symbol-wise WSMSE

is upper bounded by that of the downlink channel (ie ξ I 1ws le

ξ DLws ) As will be clear later to solve (11) with Algorithm

I macrβ ψ and micro should be selected as in (18) This shows

that step 1 of Algorithm I can be carried out with (16) To

perform step 2 of Algorithm I we update tks of (16) by using

the interference channel MMSE receiver approach which is

expressed as

tks =(Γc + ∆ks)minus1Hkvksζ ks

=β (HWηWH HH + Ψ + microksI)minus1Hkwksηks (19)

where the second equality is obtained from (16) The above

expression shows that by choosing microks gt 0 forallsK k=1 ψn gt

0N n=1 we ensure (HWηWH HH +Ψ+microksI)minus1 exists Next

we transfer the symbol-wise WSMSE from interference to

downlink channel by ensuring the power constraint of P 1 (iewe perform step 3 of Algorithm I)

B Symbol-wise WSMSE transfer (From interference to down-

link channel)

For a given symbol-wise WSMSE in the interference

channel with ζ = η and λ = I we can achieve the same

WSMSE in the downlink channel (with the MSE weighting

matrix η) using a nonzero scaling factor (β ) satisfying

B = β T W = Vβ (20)

In this precoderdecoder transformation we use the notations

B and W to differentiate from the precoder and decoder

matrices used in Section IV-A By substituting (20) into

ξ DLws (with B=B W=W) equating the resulting symbol-wise

WSMSE with that of the interference channel (9) and after

some simple manipulations we get

K 991761k=1

S k991761s=1

tH ks(Ψ + microksIN )tks =

1

β 2trηVH RnV

rArr β 2 = trηVH RnVsumK k=1

sumS ks=1 t

H ks(Ψ + microksIN )tks

=β 2τ sumN

n=1 ψntH n

tn +sumK

k=1

sumS ii=1 microkit

H kitki

(21)

where tH n is the nth row of the MMSE matrix T (19) and

the third equality follows from (16) The power constraints of

each BS antenna and symbol in the downlink channel are thus

given by

ˇ

b

H

bn =β 2tH

n tn (22)

=β 2τ tH

n

tnsumN

i=1 ψitH i

ti +sumK

i=1sumS i

j=1 microijtH ij tij

le ˘ pn foralln

bH ksbks =β 2tH

kstks (23)

=β 2τ tH

kstkssumN i=1 ψit

H i

ti +sumK

i=1

sumS ij=1 microijt

H ij tij

le ˘ pks forallk s

where bH

n is the nth row of B By multiplying both sides of

(22) and (23) with ψn foralln and microks forallk s we get

ψn ge f n and microks ge f ks forallnks (24)

where f n = β2τ ˘ pn

ψntHn tn

sumN

i=1 ψitH

iti+sum

K

i=1sum

Si

j=1 microijtH

ijtij

and f ks =

β2τ ˘ pks

microkstHkstkssum

N i=1 ψit

Hi ti+

sumKi=1

sumSij=1 microijtHijtij

Now for any given β

tH n

tnN n=1 and tH

kstks forallsK k=1 suppose that there exist

ψn gt 0N n=1 and microks gt 0 forallsK

k=1 that satisfy

ψn = f n and microks = f ks forallnks (25)

From the above equation one can also achieve ψn ˘ pn =f n ˘ pn microks ˘ pks = f ks ˘ pks forallnks Summing up these expres-

sions for all n k and s results

N

991761n=1

ψn ˘ pn +K

991761k=1

S k

991761s=1

microks ˘ pks =N

991761n=1

f n ˘ pn +K

991761k=1

S k

991761s=1

f ks ˘ pks

=β 2τ (26)

This equation shows that the solution of (25) satisfies (26)

Moreover as ˘ pn ge ˇ pnN n=1 and ˘ pks ge macr pks forallsK

k=1

the latter solution also ensures (18) Therefore by choosing

ψnN n=1 and microks forallsK

k=1 such that (25) is satisfied step 3

of Algorithm I can be performed Furthermore one can notice

from (26) that β 2 can be any positive value

Next we show that there exists at least a set of feasible

ψn gt 0N n=1 and microks gt 0 forallsK

k=1 that satisfy (25) To this

end we consider the following Theorem [14]

Theorem 1 Let (X ∥∥2) be a complete metric space We

say that X rarr X is an almost contraction if there exist

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 615

6

κ(κ) isin [0 1) and χ(χ) ge 0 such that

∥(x) minus (y)∥2 le κ∥x minus y∥2 + χ∥y minus (x)∥2 or (27)

∥(x) minus (y)∥2 le κ∥x minus y∥2 + χ∥x minus (y)∥2 forallxy isin X

If satisfies (27) then the following holds true

1) existx isin X x = (x)

2) For any initial x0 isin X the iteration xn+1 = (xn)

for n = 0 1 2 middot middot middot converges to some x⋆ isin X3) The solution x⋆ is not necessarily unique

Proof See Theorem 11 of [14] Note that according to

[15] (see (11) and (12) of [15]) the two inequalities of (27)

are dual to each other

Define x and as x [x1 middot middot middot xS +N ]T =

[ψ1 middot middot middot ψN micro11 middot middot middot micro1S 1 middot middot middot microK 1 middot middot middot microKS K ]T

(x) [ f 1 middot middot middot f N f 11 middot middot middot f 1S 1 middot middot middot f K 1 middot middot middot f KS K ]with xn = ψn isin [ϵ (β 2τ minus ϵ

sumN i=1 i=n pim)pnm]N

n=1

and xrS +N r=N +1 = microks =isin [ϵ (β 2τ minus

ϵsumK

i=1

sumS ij=1(ij)=(ks) pijm)pksm] forallsK

k=14 As we can

see from (27) when ∥(x1) minus(x2)∥2 = 0 with x1 = x2 or

x1 = x2 one can set κ(κ) = 0 and χ(χ) = 0 to satisfy thisinequality And when ∥(x1) minus(x2)∥2 gt 0 (ie x1 = x2)

one can select appropriate κ(κ) isin [0 1) and χ(χ) ge 0 such

that (27) is satisfied This is due to the fact that in the latter

case ∥x2 minus (x1)∥2 gt 0 andor ∥x1 minus (x2)∥2 gt 0 and

∥x1 minus x2∥2 gt 0 are positive and bounded This explanation

shows the existence of κ(κ) isin [0 1) and χ(χ) ge 0 ensuring

(27) for any ∥(x1) minus (x2)∥2 x1x2 isin X Consequently

(x) is an almost contraction which implies

xn+1 = (xn) x0 = [x01 x02 middot middot middot x0(S +N )]T ge ϵ1N +S

for n = 0 1 2 middot middot middot converges (28)

where 1N +S is an N + S length vector with each elementequal to unity Thus there exist ψn ge ϵN

n=1 and microks geϵ forallsK

k=1 that satisfy (25) and can be computed using (28)

For numerical simulation we initialize x0 as x01 = x02 =middot middot middot = x0(S +N ) However finding the optimal initialization

strategy is still an open research topic

Once the appropriate ψnN n=1 and microksforallsK

k=1 are ob-

tained step 4 of Algorithm I is immediate and hence P 1 can

be solved iteratively using this algorithm

C Extension of the current duality for P 1 with a total BS

power constraint

If the constraints of P 1 are modified to a total BS powerthe power constraint at step 3 of Algorithm I can be ensured

by applying the precoderdecoder transformation expression of

[5] The precoderdecoder transformation of [5] is performed

by computing S scaling factors These scaling factors are

obtained by solving S systems of equations which require

matrix inversion with complexity O(S 3) (see (23) of [5])

In the current paper if the constraints of P 1 are modified

to a total BS power one can ensure the power constraint at step

3 of Algorithm I just by assigning ∆ks of (16) as ∆ks = I

By doing so β 2 of (17) and β 2 of (21) can be expressed as

4For our simulation we use ϵ =

min(10minus6 βτpnmN n=1 βτpksm forallsKk=1)

β 2 =sumK

k=1

sumSks=1 b

Hksbks

τ = P max

τ and β 2 = trηVHRnV

sumKk=1

sumSks=1 t

Hkstks

where P max is the total BS power Now by employing (20)

the total BS power at step 3 of Algorithm I can thus be given

as trBBH = β 2trTTH = β 2τ = P max (ie the total

BS power constraint is satisfied) Thus for P 1 (with a total BS

power constraint) we do not need to use Theorem I Moreover

our duality requires only one scaling factor to perform the

precoderdecoder transformation (ie β 2(β 2)) This showsthat for this problem the proposed duality based algorithm

requires less computation compared to that of [5] Note that

the duality algorithm of [5] requires the same computation as

that of [8] and less computation than that of [1] and [4] Thus

it is sufficient to compare the current duality algorithm with

the duality algorithm of [5]

For other WSMSE-based problems with a total BS power

constraint function the computational advantage of the current

duality based algorithm over that of [5] can be analysed like

in this subsection

V USE R-WISE WSMSE DOWNLINK-INTERFERENCE

DUALITYThis duality is established to solve user-wise WSMSE-

based problems (for example P 2)

A User-wise WSMSE transfer (From downlink to interference

channel)

To apply this WSMSE transfer for solving P 2 we set the

precoder decoder and noise covariance matrices as

V = β W T = Bβ ζ = η λ = I∆ks = Ψ + microkI (29)

where β ψnN n=1 and microkK

k=1 are real positive scalars

Substituting (29) into (10) and equating ξ I wu = ξ DL

wu yields

β 2τ =

N 991761n=1

ψn ˇ pn +

K 991761k=1

microk pk = pT ψ + pT micro (30)

where τ = trηWH RnW micro = [micro1 middot middot middot microK ]T p =

[˜ p1 middot middot middot ˜ pK ]T with ˜ pk = trBkB

H k Like in Section IV-A

we perform step 1 of Algorithm I by choosing β 2 ψ and microas

β τ ge pT ψ + pT micro (31)

To perform step 2 of Algorithm I we update tks of (29)

using the interference channel MMSE receiver as

tks =β (HWηWH HH + Ψ + microkI)minus1Hkwksηk (32)

This expression shows that by choosing microk gt 0K k=1 ψn gt

0N n=1 we ensure that (HWηWH HH + Ψ+ microkI)minus1 exists

B User-wise WSMSE transfer (From interference to downlink

channel)

For a given user-wise WSMSE in the interference channel

with ζ = η and λ = I we can achieve the same WSMSE in

the downlink channel (with the weighting matrix η) by using

a nonzero scaling factor ( ˜β ) which satisfies

B = ˜β T W = V

˜β (33)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 715

7

In this precoderdecoder transformation we use the notationsB and W to differentiate from the precoder and decoder

matrices used in Section V-A By substituting (33) into ξ DLwu

(with B=B W=W) then equating the resulting user-wise

WSMSE with that of the interference channel (ξ I wu) and after

simple manipulations we get

˜β 2

=

β 2τ sumN n=1 ψntH

n tn +sumK

k=1 microktrTH k Tk (34)

where tH n is the nth row of the MMSE matrix T (32) The

power constraints of each BS antenna and user (ie step 3 of

Algorithm I) in the downlink channel can be expressed as

ψn ge ˇf n and microk ge f k forallk (35)

where

ˇf n =β 2τ

˘ pn

ψntH n

tnsumN i=1 ψit

H i

ti +sumK

i=1 microitrTH i Ti

(36)

f k =β 2τ

ˆ pk

microktrTH k Tk

sumN i=1 ψitH i ti +sumK

i=1 microitrTH i Ti

(37)

For given β tH n

tnN n=1 and trTH

k TkK k=1 one can show

that there exist ψnN n=1 and microkK

k=1 which satisfy

ψn = ˇf n and microk = f k forallnk (38)

The solution of (38) can be obtained exactly like that of (25)

As ˘ pn ge ˇ pnN n=1 and ˆ pk ge ˜ pkK

k=1 the latter solution also

satisfies (31) Thus P 2 can be solved using Algorithm I

V I SYMBOL-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

In this section we establish the symbol-wise MSE duality

between downlink and interference channels If all symbols

are active this duality can be applied to solve MSE based

problems However as will be clear later this duality requires

more computation compared to the duality of Sections IV and

V Thus we propose this duality to be employed for problems

like in P 3 since this problem maintains all symbols active and

can not be solved by the duality in Sections IV and V

A Symbol-wise MSE transfer (From downlink to interference

channel)

To apply this duality for P 3 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

vks = β kswks tks = bksβ ks ζ = I

∆ks = Ψ + microksIN forallks (39)

Substituting (39) into (7) and ξ DLks = ξ I

ks forallsK k=1 yields

wH ks(HH

k

K 991761i=1

S i991761j=1

bijbH ijHk + Rnk)wks minus wH

ksHH k bks

minus bH ksHkwks + 1 =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1

β 2ijHiwijwH ijH

H i +

Ψ + microksIN )bks minus bH

ksHkwks minus wH

ksHH

k bks + 1 forallks

It implies

wH ks(HH

k

K 991761i=1

S i991761j=1(ij)=(ks)

bijbH ijHk + Rnk)wks =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijHiwijwH ij H

H i + Ψ+

microksIN )bks forallks (40)

Collecting the above expression for all k and s gives

(Y + Θ)β2

=[a11 middot middot middot a1S 1 middot middot middot aK 1 middot middot middot aKS K ]T = ˜Px

rArr β2

=Θminus1(I + YΘminus1)minus1 ˜Px (41)

where β2

= [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T

Θ = diag(θ11 middot middot middot θ1K 1 middot middot middot θK 1 middot middot middot θKS K )

aks = bH ksΨbks + microksb

H ksbks ˜P = [ macrP P] and

Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

θks = wH ksRnkwks macrP isin realS timesN = |BH |2

P = diag(macr p11 middot middot middot macr p1S 1 middot middot middot macr pK 1 middot middot middot macr pKS K )

yks = [minus|bH ksH1w11|2 middot middot middot zks middot middot middot minus|bH

ksHK wK 1| middot middot middot minus |bH

ksHK wKS K |]T and zks =

wH ksH

H k

sumK i=1

sumS ij=1(ij)=(ks) bijb

H ijHkwks Next we

examine two important properties of (I + YΘminus1)minus1 To this

end we examine the following Theorem

Theorem 2 Let A isin realntimesn and A(ij)(i=j) le 0 1 lei( j) le n If the diagonal elements of A are A(ii) = 1 minussumn

j=1j=i A(ji) then

Property 1 Aminus1 ge 0 (42)

Property 2 |||Aminus1|||1 = 1 (43)

where () ge 0 and ||||||1 denote matrix non-negativity and

one norm respectively

Proof See Appendix A

According to the first property of Theorem 2 if θks gt0 forallsK

k=15 the inverse of (I + YΘminus1) exists and it has

nonnegative entries Consequently for any positive ψnN n=1

and microks forallsK k=1 β ks forallsK

k=1 of (41) are strictly positive6

Now by selecting ψnN n=1 and microks forallsK

k=1 such that (41) is

fulfilled we can transfer the MSE of each symbol from down-

link to interference channel ensuring ξ DLks = ξ I 1

ks forallsK k=1

where ξ I 1ks is the MSE of the kth user sth symbol at step 1

of Algorithm I Here we should also select ψnN n=1 and

microks forallsK k=1 such that the power constraint of P 3 at step 3

of Algorithm I is satisfied To this end we examine the steps(2) and (3) of this algorithm

Like in Section IV we perform step 2 of Algorithm 1 by

updating tks using MMSE receiver as

tks =(Γc + ∆ks)minus1Hkvksζ ks (44)

=(

K 991761i=1

S i991761j=1

β ijHiwijwH ijH

H i + Ψ + microksI)minus1Hkwksβ ks

where the second equality is obtained from (39) The above

expression shows that by choosing microks gt 0 forallsK k=1 ψn gt

5For P 3 wH ksRnkwks gt 0forallsK

k=1 is always true

6Note that the application of (43) will be clear in the sequel (see (55))

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 815

8

0N n=1 we ensure (

sumK i=1

sumS ij=1 β ijHiwijw

H ij H

H i + Ψ +

microksI)minus1 exists Next we transfer the symbol-wise MSE from

interference to downlink channel by satisfying the power

constraint of P 3 (ie we perform step 3)

B Symbol-wise MSE transfer (From interference to downlink

channel)

For a given symbol MSE in the interference channel with

ζ = I we can achieve the same symbol MSE in the downlink

channel by using a nonzero scaling factor (β ks) which satisfies

bks = β kstks wks = vksβ ks (45)

Here we use the notations B and W to differentiate with

the precoder and decoder matrices used in Section VI-A By

substituting (45) into ξ DLks (with B=B W=W) then equating

the resulting symbol MSE with that of the interference channel

(7) and after some straightforward steps we get

1β 2ksvH ks(HH k

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijtijtH ijHk + Rnk)vks =

tH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

HivijvH ij H

H i + Ψ + microksI)tks forallks

By collecting the above equalities for all k and s β ks forallsK k=1

can be determined by

(Y + Ω)β2 =[vH 11Rn1v11 middot middot middot vH

1S 1Rn1v1S 1

middot middot middot vH K 1RnK vK 1 middot middot middot vH

KS KRnK vKS K ]T

=Θβ2

= ΘΘminus1(I + YΘminus1)minus1 ˜Px

rArr β2 =(Y + Ω)minus1(I + YΘminus1)minus1 ˜Px

=Ωminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜Px (46)

where the third equality follows from (41)

β2 = [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T Ω =diag(tH

11Ψt11 middot middot middot tH 1S 1

Ψt1S 1 middot middot middot tH K 1ΨtK 1 middot middot middot

tH KS K

ΨtKS K ) Ω = diag(micro11tH 11t11 middot middot middot micro1S 1t

H 1S 1

t1S 1 middot middot middot

microK 1tH K 1tK 1 middot middot middot microKS Kt

H KS K

tKS K ) Ω = Ω + Ω

and Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

yks = [minus|tH 11H1vks|2 middot middot middot zks middot middot middot minus|tH

K 1HK vks|2 middot middot middot minus |tH

KS KHK vks|2]T and zks =

tH kssum

K i=1sum

S ij=1(ij)

=(ks)Hivijv

H ij H

H i tks By applying

Theorem 2 it can be shown that β ks forallsK k=1 are strictly

positive for ψn gt 0N n=1 and microks gt 0 forallsK

k=1 The power

constraints of the nth BS antenna and kth user sth symbol

are given by

bH

nbn = tH

n Υtn le ˘ pn foralln (47)bH ksbks = β 2kst

H kstks le ˘ pks forallk s (48)

where Υ = diag(β 211 middot middot middot β 1S 1 middot middot middot β 2K 1 middot middot middot β KS K ) Mul-

tiplying both sides of (47) by ψn and stacking the resulting

inequality for all n yields

˘Pψ ge

˜Ωβ

2

(49)

where P = diag(˘ p1 middot middot middot ˘ pN ) and Ω = Ψ|T|2 Like in the

above expression by multiplying both sides of (48) with microks

and collecting the resulting inequality for all k and s the

power constraints (48) can be expressed as

macrPmicro ge Ωβ2 (50)

where macrP = diag(˘ p11 middot middot middot ˘ p1S 1 middot middot middot ˘ pK 1 middot middot middot ˘ pKS K ) By

employing β2 of (46) (49) and (50) can be combined as

xprime ge ˜Ωβ2 = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1xprime

= (xprime)xprime (51)

where ˜P = blkdiag(P macrP) ˜Ω = [ΩT ΩT ]T xprime = ˜

P[ψ micro]T

and (xprime) = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1

Next we show that there exists xprime gt 0 such that (51) is

satisfied Towards this end we consider the following discrete-

time switched system [16]

xn+1 = Fσnxn for n = 0 1 2 middot middot middot (52)

where x isin realmtimes1 is a state Fσn isin realmtimesm is a switchingmatrix and σn isin 0 1 2 middot middot middot According to [16] (Remark 2

of [16]) the above system is marginally stable (convergent) if

maxσn

∥Fσn∥⋆ = 1 for n = 0 1 middot middot middot (53)

where ∥∥⋆ denotes an induced matrix norm

Let us consider the following iteration

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (54)

Now if we assume (xprimen) = Fσn foralln7 we can interpret (54)

as a discrete time switched system Consequently the above

iteration is guaranteed to converge if maxn ∥ (xprimen)∥⋆ = 1 It

is known that ||||||1 is an induced matrix norm [17] For any

xprime the matrix one norm of (xprime) is given by

||| (xprime)|||1

=||| ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1|||1

le||| ˇΩ|||1|||(I + YΩminus1)minus1|||1|||(I + YΘminus1)minus1|||1||| ˇP|||1

=||| ˇΩ|||1||| ˇP|||1 le 1 (55)

where ˇΩ = [ ˜ΩΩminus1 0(N +S )timesN ] ˇP = [ ˜P( ˜P)minus1 0N times(N +S )]

the second inequality is due to the fact that |||XY|||1 le|||X|||1|||Y|||1 [17] (page 290) the third equality is obtained

by applying Theorem 2 and the last inequality employs thefollowing facts Using the definition (73) (see Appendix A)

one can get ||| ˇΩ|||1 le 1 by applying (46) and (51) and

||| ˇP|||1 le 1 by applying (13) (41) and (51)

Thus maxn ∥ (xprimen)∥⋆ = 1 holds true and (54) is guar-

anteed to converge As we can see (54) is derived by using

(41) and (46) Thus the solution of (54) also satisfies (41)

and (46) Moreover for any initial xprime0 gt 0 since (xprimen) foralln is

positive the solution of (54) is strictly positive and [ψ micro]T =

( ˜P)minus1xprime gt 0 which is the desired result

7Since (xprimen) is the products of stochastic matrices (see the proof of Theorem 2) (xprimen) is a bounded matrix for any xprime gt 0 Thus the assumption

(xprimen) = Fσn foralln holds true

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 915

9

Once the feasible microks forallsK k=1 and λnN

n=1 are obtained

step 4 of Algorithm 1 is immediate As a result P 3 can be

solved using Algorithm I with an additional power allocation

step which will be detailed in Section VIII

C Extension of the current duality for P 3 with a total BS

power constraint

In this subsection we show the extension of the current

duality for P 3 with a total BS power constraint For this

problem we set ∆ks of (39) as ∆ks = I forallk s (ie like in

Section IV-B) Upon doing so β2 is computed directly from

the first equality of (46) (ie the bound (55) is not needed)

By summing the left and right hand sides of this equality one

can get trBBH = P max This shows that for P 3 with a

total BS power constraint problem the total BS power at step

3 of Algorithm I is satisfied Thus one can apply Algorithm

I (with the additional power allocation step) to solve the latter

problem by setting ∆ks of (39) as ∆ks = I forallk s

For other total BS power constrained WMSE-based prob-

lems the current duality based algorithm can be applied likein this subsection The details are omitted for conciseness

Note that for such problem types the duality algorithm of the

current paper has the same complexity as that of [5]

VII USE R-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

This section establishes user-wise MSE duality between

downlink and interference channels This duality is established

to solve the problems of type P 4

A User-wise MSE transfer (From downlink to interference

channel)

To apply this MSE transfer for P 4 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

Vk = β kWk Tk = Bkβ k ζ = I ∆ks = Ψ + microkI (56)

Like in Section VI substituting (56) into (8) equating ξ DLk =

ξ I k K

k=1 and after some straightforward steps we get the

following system of equations

(Y + Θ)β2

= ˜Px rArr β2

= Θminus1(I + YΘminus1)minus1 ˜Px (57)

where

Y(kl) =

983163 sumK i=1i=k ∥WH

k HH k Bi∥2F for k = l

minus∥WH l H

H l Bk∥2F for k = l

(58)

Θ = diag(θ1 middot middot middot θK ) β2

= [β 21 middot middot middot β 2K ]T

˜P = [ macrP P]

with θk = trWH k RnkWk macrP isin realS timesN = |BH |2 P =

diag(macr p1 middot middot middot macr pK ) By applying Theorem 2 it can be shown

that β kK k=1 of (57) are strictly positive Thus step 1 of

Algorithm I can be performed using (57) We perform step 2

of Algorithm I by updating tks using MMSE receiver as

tks =(K

991761i=1

β iHiWiWH i H

H i + Ψ + microkI)minus1Hkwksβ k (59)

B User-wise MSE transfer (From interference to downlink

channel)

For a given user MSE in the interference channel with

ζ = I we can achieve the same MSE in the downlink channel

by using nonzero scaling factors ( ˜β kK k=1) that satisfy

Bk = ˜β kTk

Wk = Vk ˜β k (60)

Here we also use the notations B and W to differentiate

with the precoder and decoder matrices used in Section VII-

A By substituting (60) into ξ DLk (with B=B W=W) and

then equating the resulting user-wise MSE with that of the

interference channel (7) and after some steps ˜β kK k=1 are

determined as

(I + ˇYˇΩminus1

) ˇΩ ˜β2

= [trVH 1 Rn1V1 middot middot middot trVH

K RnK VK ]T

rArr ˜β2

= ˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px (61)

where the second equality follows from

(57) ˜β2

= [ ˜β 21

middot middot middot ˜β 2K

]T Ωprime =diag(trTH

1 ΨT1 middot middot middot trTH K ΨTK ) Ω =

diag(micro1trTH 1 T1 middot middot middot microK trTH

K TK ) ˇΩ = Ωprime + Ω

By applying Theorem 2 it can be shown that ˜β kK k=1 are

strictly positive for ψn gt 0N n=1 and microk gt 0K

k=1 Like in

Section VI-B the power constraint of the nth BS antenna

and kth user can thus be expressed as

xprime ge ˆΩ ˜β2

= ˆΩˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px

= (xprime)xprime (62)

where P = diag(ˆ p1 middot middot middot ˆ pK ) ˆP = blkdiag(P ˆP) ˆΩ =

[ΩT

ΩT

]T

xprime

= ˜P[ψ micro]

T

and (xprime

) = ˆΩˇΩ

minus1

(I +ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜P( ˆP)minus1 Like in Section VI-B it

can be shown that there exists a feasible xprime gt 0 that satisfy

(62) and can be obtained iteratively by

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (63)

By initializing xprime0 gt 0 the solution of the above iteration

is always positive Consequently λn gt 0N n=1 and microk gt

0K k=1 holds true Once the feasible microkK

k=1 and λnN n=1

are obtained step 4 of Algorithm 1 is straightforward As a

result P 4 can be solved using Algorithm I with the additional

power allocation step of Section VIII

VIII GENERALIZED AND IMPROVED VERSION OF

Algorithm I

From the discussions of Sections IV - VII one can

understand that each iteration of Algorithm I gives a non

increasing sequence of symbol (user) WMSEWSMSE As can

be seen from Section III the objective of P 1(P 2) is just to

minimize the total WSMSE of all symbols (users) whereas

the objective of P 3(P 4) is to simultaneously minimize and

balance the WMSE of all symbols (users) Thus Algorithm

I is appropriate to solve P 1(P 2) of the current paper For

P 3(P 4) although each iteration of Algorithm I is able to

provide a non increasing sequence of symbol (user) WMSE

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1015

10

(ie minimizes the maximum WMSE of all symbols (users))

each iteration of this algorithm is not able to guarantee

balanced WMSEs of all symbols (users) On the other hand

for an MSE constrained total BS power minimization problem

(for example P 7 in Section IX) an iterative algorithm that

can provide a non increasing sequence of total BS power is

required This shows that Algorithm I also can not solve the

latter problem In the following we address the drawbacks of Algorithm I just by including a power allocation step into

Algorithm I as explained below

In [8] for fixed transmit and receive filters the power

allocation parts of total BS power constrained MSE-based

problems have been formulated as GPs by employing the

approach and system model of [1] under the assumption that

all symbols are strictly active8 For this assumption in [8] we

show that the system model of [1] is appropriate to solve any

kind of total BS power constrained MSE-based problems using

duality approach (alternating optimization) This motivates us

to utilize the system model of [1] in the downlink channel

only and then include the power allocation step (ie GP) into

Algorithm I Towards this end we decompose the precoders

and decoders of the downlink channel as

Bk =GkP12k Wk = UkαkP

minus12k forallk (64)

where Pk = diag( pk1 middot middot middot pkS k) isin realS ktimesS k Gk =[gk1 middot middot middot gkS k ] isin CN timesS k Uk = [uk1 middot middot middot ukS k ] isin CM ktimesS k

and αk = diag(αk1 middot middot middot αkS k) isin realS ktimesS k are the transmit

power unity norm transmit filter unity norm receive filter and

receiver scaling factor matrices of the kth user respectively

ie gH ksgks = uH

ksuks = 1 forallsK k=1

By employing (64) and stacking ξ = [ξ DL11 middot middot middot ξ DL

KS K]T

= [ξ DL1 middot middot middot ξ DL

S ]T = [ξ DLl S

l=1]T the l th downlink symbol

MSE can be expressed as (see [1] and [10] for more detailsabout (64) and the above descriptions)

ξ DLl = pminus1l [(D + α2ΦT )p]l + pminus1l α2

l uH l Rnul (65)

where

Φ(lj) =

983163 |gH

l Huj |2 for l = j0 for l = j

(66)

D(ll) =α2l |gH

l Hul|2 minus 2αlreal(uH l H

H gl) + 1 (67)

1 le l( j) le S P = blkdiag(P1 middot middot middot PK ) =diag( p1 middot middot middot pS ) p = [ p1 middot middot middot pS ]

T G = [G1 middot middot middot GK ] =[g1 middot middot middot gS ] U = blkdiag(U1 middot middot middot UK ) = [u1 middot middot middot uS ]

and α = blkdiag(α1 middot middot middot αK ) = diag(α1 middot middot middot αS ) with∥gl∥2 = ∥ul∥2 = 1 Using (65) for fixed GU and α the

power allocation part of P 1 can be formulated as

min plSl=1

S 991761l=1

ηlξ DLl st ς T

np le ˘ pn pl le ˘ pl foralln l (68)

where ς T n isin real1timesS = |[G(ni)|2S

i=1 [η1 middot middot middot ηS ]T =

[η11 middot middot middot ηKS K ]T and [ ˘ pl middot middot middot ˘ pS ]T = [ ˘ p11 middot middot middot ˘ pKS K ]T As

ξ DLl is a posynomial (where plS

l=1 are the variables) (68)

8Note that this assumption is not always true for all MSE-based problemsHowever as mentioned in [1] in practice replacing zero powers by a smallvalue will not affect the overall optimization Due to this reason we replace

zero powers by 10minus6 in the simulation section

is a GP for which global optimality is guaranteed Thus it

can be efficiently solved using interior point methods with a

worst-case polynomial-time complexity [18]

For fixed GU and α the power allocation parts of

P 2 minus P 4 can be formulated as GPs like in P 1 Our duality

based algorithm for each of these problems including the

power allocation step is summarized in Algorithm II

Algorithm II

Initialization Like in Algorithm I

Repeat Interference channel

1) For P 1 and P 2 set V = WT = B (ie β = β = 1)

then compute ψn microks forallksn and ψn microk forallk nusing (25) and (38) respectively For P 3 and P 4 first

compute ψn microks forallksn and ψn microk forallk n using

(54) and (63) respectively then transfer each symbol

and user MSE from downlink to interference channels

by (39) and (56) respectively

2) Update the MMSE receivers of the interference channel

for P 1 P 2 P 3 and P 4 using (19) (32) (44) and (59)

respectivelyDownlink channel

3) Transfer the MSE (weighted sum user or symbol MSE)

from interference to downlink channel using (20) (33)

(45) and (60) for P 1 P 2 P 3 and P 4 respectively

4) For each of the problems P 1 minus P 4 decompose the

precoder and decoder matrices of each user as in (64)

Then formulate and solve the GP power allocation part

For example the power allocation part of P 1 can be

expressed in GP form as (68)

5) For each of the problems P 1minusP 4 by keeping PkK k=1

constant update the receive filters UkK k=1 and scal-

ing factors αkK

k=1 by applying downlink MMSE

receiver approach ie Ukαk = (HH k GPGH Hk +

Rnk)minus1HH k GkPkK

k=1 Note that in these expressions

αkK k=1 are chosen such that each column of UkK

k=1

has unity norm Then compute BkWkK k=1 by (64)

Until convergence

Convergence It can be shown that at each iteration

of this algorithm the objective function of each of the

problems P 1 - P 4 is non-increasing [4] [7] [19] Thus

the above iterative algorithm is convergent However

since P 1 - P 4 are non-convex this iterative algorithm

is not guaranteed to converge to the global optimum

In this algorithm we stop iteration (ie our convergence

condition) when the difference between the objectivefunctions in two consecutive iterations is smaller than

some small value ϵ (we use ϵ = 10minus6 for the simulation)

Computational complexity As can be seen from this

algorithm when we increase the number of users andor

(BS andor MS antennas) the number and size of

optimization variables increase Because of this the

computational complexity of Algorithm II increases as

K andor N andor M increases However studying the

complexity of this algorithm as a function of K N and

M needs effort and time And such a task is beyond the

scope of this work and is an open research topic

The power allocation step of Algorithm II has thus the

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1115

11

following benefits (1) For BS power constrained WSMSE

minimization problems this step improves the convergence

speed of Algorithm II compared to that of Algorithm I9 (for

example in P 1 minus P 2) The degree of improvement depends on

different parameters (for example Hk ∆ks forallk s etc) Thus

the theoretical comparison of these two algorithms in terms of

convergence speed requires time and effort And this task is

beyond the scope of this work and it is an open research topic(2) For symbol-wise (user-wise) WMSE balancing problems

this step helps to balance the WMSE of all symbols (users)

(for example in P 3 minus P 4) (3) For MSE constrained total

BS power minimization problems this step ensures a non

increasing total BS power at each iteration of Algorithm II

IX APPLICATION OF THE PROPOSED DUALITY BASED

ALGORITHM FOR OTHER PROBLEMS

A MSE based problem with entry-wise power constraint

The symbol-wise WSMSE minimization constrained with

entry wise power ie bH

ksnb

ksn le macr p

ksn forallksn problem is

formulated as

P 5 minBkWkKk=1

K 991761k=1

S k991761s=1

ηksξ DLks st bH

ksnbksn le macr pksn (69)

It can be shown that this problem can be solved by Algorithm

II with ∆ks = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1

B Weighted sum rate optimization constrained with per an-

tenna and symbol power problem

By employing the approach of [11] (see (16) of [11]) one

can equivalently express the weighted sum rate maximizationconstrained with per antenna and symbol power problem as

P 6 (70)

minτ ksν ksbkswksforallsK

k=1

K 991761k=1

S k991761s=1

θks1

τ ksν γ ks

ks +K 991761

k=1

S k991761s=1

ηksξ DLks

st [BBH ](nn) le ˘ pnbH ksbks le ˘ pks

K prodk=1

S kprods=1

ν ks = 1 τ ks gt 0

where 0 lt ωks lt 1 forallsK k=1 are the rate weighting factors

for all symbols ηks = τ microksks γ ks = 11minusωks

microks = 1ωks

minus 1 and

macrθks = ωksmicro

(1minusωks)

ks For fixed τ ks ν ks foralls

K

k=1 the aboveoptimization problem has the same mathematical structure

as that of P 1 Thus by keeping τ ks ν ks forallsK k=1 constant

bkswks forallsK k=1 can be optimized by applying the MSE

duality discussed in Section IV Moreover τ ks ν ks forallsK k=1

and the power allocation part of the above problem can be

optimized by a GP method like in (25) of [20] Consequently

we can apply Algorithm II to solve (70) The detailed expla-

nations are omitted for conciseness The following problems

9This is at the expense of additional computation However as mentionedin [1] (see Appendix A of [1]) a small desktop computer can solve a GP of 100 variables and 10000 constraints by standard interior point method under aminute Thus we believe that the complexity of Algorithm I and Algorithm

II are almost the same

can also be solved by simple modification of Algorithm II

P 7 minBkWk

Kk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

SINRks ge ϱks forallnks

equiv minBkWkKk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

ξ DLks le (1 + ϱks)minus1 forallnks

P 8 maxBkWk

Kk=1

min Rks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

equiv minBkWkKk=1

max ξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

where SINRks(Rks) is the SINR (rate) of the kth user sth

symbol and we use the fact that Rks = log(1 + SINRks)and ξ DL

ks = (1 + SINRks)minus1 [1] It is clearly seen that the

application of Algorithm II is not limited to the problems of

this paper

Note that under imperfect channel state information (CSI)

condition the stochastic robust design versions of P 1 - P 5 can

be solved like in [10] However to the best of our knowledge

the relationship between rate (SINR) and MSE is not known

when the CSI is imperfect [7] Hence solving the rate (SINR)-

based robust design problems (for example robust versions of

P 6 - P 8) by our duality approach is an open problem

X SIMULATION R ESULTS

In this section we present simulation results for P 1 minus P 4

All of our simulation results are averaged over 100 randomly

chosen channel realizations We set K = 2 N = 4 and

M k = S k = 2 ηks = ρks = ηk = ρk = 1 forallsK k=1

It is assumed that Rn1 = σ21IM 1 Rn2 = σ2

2IM 2 and

σ22 = 2σ2

1 The maximum power of each BS antenna is set

to ˘ pn = 25mW N n=1 And the maximum power allocated

to each symbol and user are set to ˘ pks

= 25mW forallsK

k=1and ˆ pk = 5mW K k=1 respectively For better exposition we

define the Signal-to-noise ratio (SNR) as P maxKσ2av and it

is controlled by varying σ2av where P max = 10mW is the

total maximum BS power and σ2av = (σ2

1 + σ22)2 We also

compare Algorithm II and the algorithm in [2]10

Note that the algorithm in [2] is designed for coordinated

BS systems scenario And the iterative algorithm of [2] is

based on the per BS power constraint However according

to [2] and [21] B coordinated BS systems each with Z

10As will be clear in the sequel the proposed algorithm and the algorithmof [2] may not utilize the entire 10mW for all noise levels Thus the afore-mentioned SNR can be considered as the maximum SNR of the transmitted

signal

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1215

12

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

Fig 2 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of WSMSE for [top] P 1 [bottom] P 2

antennas can be treated as one multiuser MIMO system with

BZ antennas Thus when Z = 1 the considered problem has

exactly the same structure as that of [2] To the best of our

knowledge there is no other general linear algorithm that cansolve the problem types P 1 minus P 4 On the other hand in all

problems since there are more than one power constraints (ie

per antenna and symbol (user) powers) all power constraints

may not be active at the optimal solution Due to these reasons

we compare Algorithm II and the algorithm in [2] both in

terms of the achieved MSE (ie minimized MSE) and total

utilized BS power at the achieved MSE

A Simulation results for problems P 1 minus P 2

In this subsection we compare the performance of our

proposed algorithm with that of [2] As can be seen from Fig

2 the proposed algorithm and the algorithm in [2] achievethe same symbol-wise and user-wise WSMSEs Next we plot

the total utilized powers at the BS to achieve these WSMSEs

which is shown in Fig 3 From these two figures one can see

that to achieve the same WSMSE the proposed duality based

iterative algorithm requires less total BS power than that of

[2] This scenario fits to that of [10] and [19] where the sum

MSE minimization constrained with a per BS antenna power

problem has been examined by duality approach

B Simulation results for problems P 3 minus P 4

Like in the above subsection here we compare the per-

formance of our proposed algorithm with that of [2] For

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 3 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 1 [bottom] P 2

For this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

10 15 20 25 30 350

005

01

015

02

025

SNR (dB)

M a x i m u m s y m b o l M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

005

01

015

02

025

03

035

04

045

05

SNR (dB)

M a x i m u m u s e r M S E

Algorithm II

Algorithm in [2]

Fig 4 Comparison of the proposed algorithm (Algorithm II) and that of

in [2] in terms of maximum achieved MSE for [top] P 3 [bottom] P 4

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 5: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 515

5

where β ψnN n=1 and microks forallsK

k=1 are positive real

scalars that will be determined in the sequel and Ψ =diag(ψ1 middot middot middot ψN ) Substituting (16) into (9) and equating

ξ I ws = ξ DL

ws yields

trBH HWηWH HH B minus BH HWη minus ηWH HH B + η+

1

β 2

K

991761k=1

S k

991761s=1

bH

ks

(Ψ + microksIN )bks = trηWH HH BBH HW

+ ηWH RnW minus ηWH HH B minus ηBH HW + η

It follows

β 2τ =

N 991761n=1

ψn ˇ pn +

K 991761k=1

S k991761s=1

microks macr pks = pT ψ + pT micro (17)

where τ = trηWH RnW ψ = [ψ1 middot middot middot ψN ]T micro =

[micro11 middot middot middot micro1S 1 middot middot middot microK 1 middot middot middot microKS K ]T p = [ˇ p1 middot middot middot ˇ pN ]T

and p = [macr p11 middot middot middot macr p1S 1 middot middot middot macr pK 1 middot middot middot macr pKS K ]T with macr pks =bH

ksbks ˇ pn = bH n

bn and bH n is the nth row of B

The above equation shows that by choosing any ψnN n=1

and microks forallsK k=1 that satisfy (17) one can transfer thedownlink channel precoderdecoder to the interference channel

decoderprecoder ensuring ξ DLws = ξ I 1

ws where ξ I 1w is the

interference WSMSE at step 1 of Algorithm I However here

ψnN n=1 and microks forallsK

k=1 should be selected in a way that

P 1 can be solved by Algorithm I To this end we choose ψ

and micro as

β 2τ ge pT ψ + pT micro (18)

By doing so the interference channel symbol-wise WSMSE

is upper bounded by that of the downlink channel (ie ξ I 1ws le

ξ DLws ) As will be clear later to solve (11) with Algorithm

I macrβ ψ and micro should be selected as in (18) This shows

that step 1 of Algorithm I can be carried out with (16) To

perform step 2 of Algorithm I we update tks of (16) by using

the interference channel MMSE receiver approach which is

expressed as

tks =(Γc + ∆ks)minus1Hkvksζ ks

=β (HWηWH HH + Ψ + microksI)minus1Hkwksηks (19)

where the second equality is obtained from (16) The above

expression shows that by choosing microks gt 0 forallsK k=1 ψn gt

0N n=1 we ensure (HWηWH HH +Ψ+microksI)minus1 exists Next

we transfer the symbol-wise WSMSE from interference to

downlink channel by ensuring the power constraint of P 1 (iewe perform step 3 of Algorithm I)

B Symbol-wise WSMSE transfer (From interference to down-

link channel)

For a given symbol-wise WSMSE in the interference

channel with ζ = η and λ = I we can achieve the same

WSMSE in the downlink channel (with the MSE weighting

matrix η) using a nonzero scaling factor (β ) satisfying

B = β T W = Vβ (20)

In this precoderdecoder transformation we use the notations

B and W to differentiate from the precoder and decoder

matrices used in Section IV-A By substituting (20) into

ξ DLws (with B=B W=W) equating the resulting symbol-wise

WSMSE with that of the interference channel (9) and after

some simple manipulations we get

K 991761k=1

S k991761s=1

tH ks(Ψ + microksIN )tks =

1

β 2trηVH RnV

rArr β 2 = trηVH RnVsumK k=1

sumS ks=1 t

H ks(Ψ + microksIN )tks

=β 2τ sumN

n=1 ψntH n

tn +sumK

k=1

sumS ii=1 microkit

H kitki

(21)

where tH n is the nth row of the MMSE matrix T (19) and

the third equality follows from (16) The power constraints of

each BS antenna and symbol in the downlink channel are thus

given by

ˇ

b

H

bn =β 2tH

n tn (22)

=β 2τ tH

n

tnsumN

i=1 ψitH i

ti +sumK

i=1sumS i

j=1 microijtH ij tij

le ˘ pn foralln

bH ksbks =β 2tH

kstks (23)

=β 2τ tH

kstkssumN i=1 ψit

H i

ti +sumK

i=1

sumS ij=1 microijt

H ij tij

le ˘ pks forallk s

where bH

n is the nth row of B By multiplying both sides of

(22) and (23) with ψn foralln and microks forallk s we get

ψn ge f n and microks ge f ks forallnks (24)

where f n = β2τ ˘ pn

ψntHn tn

sumN

i=1 ψitH

iti+sum

K

i=1sum

Si

j=1 microijtH

ijtij

and f ks =

β2τ ˘ pks

microkstHkstkssum

N i=1 ψit

Hi ti+

sumKi=1

sumSij=1 microijtHijtij

Now for any given β

tH n

tnN n=1 and tH

kstks forallsK k=1 suppose that there exist

ψn gt 0N n=1 and microks gt 0 forallsK

k=1 that satisfy

ψn = f n and microks = f ks forallnks (25)

From the above equation one can also achieve ψn ˘ pn =f n ˘ pn microks ˘ pks = f ks ˘ pks forallnks Summing up these expres-

sions for all n k and s results

N

991761n=1

ψn ˘ pn +K

991761k=1

S k

991761s=1

microks ˘ pks =N

991761n=1

f n ˘ pn +K

991761k=1

S k

991761s=1

f ks ˘ pks

=β 2τ (26)

This equation shows that the solution of (25) satisfies (26)

Moreover as ˘ pn ge ˇ pnN n=1 and ˘ pks ge macr pks forallsK

k=1

the latter solution also ensures (18) Therefore by choosing

ψnN n=1 and microks forallsK

k=1 such that (25) is satisfied step 3

of Algorithm I can be performed Furthermore one can notice

from (26) that β 2 can be any positive value

Next we show that there exists at least a set of feasible

ψn gt 0N n=1 and microks gt 0 forallsK

k=1 that satisfy (25) To this

end we consider the following Theorem [14]

Theorem 1 Let (X ∥∥2) be a complete metric space We

say that X rarr X is an almost contraction if there exist

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 615

6

κ(κ) isin [0 1) and χ(χ) ge 0 such that

∥(x) minus (y)∥2 le κ∥x minus y∥2 + χ∥y minus (x)∥2 or (27)

∥(x) minus (y)∥2 le κ∥x minus y∥2 + χ∥x minus (y)∥2 forallxy isin X

If satisfies (27) then the following holds true

1) existx isin X x = (x)

2) For any initial x0 isin X the iteration xn+1 = (xn)

for n = 0 1 2 middot middot middot converges to some x⋆ isin X3) The solution x⋆ is not necessarily unique

Proof See Theorem 11 of [14] Note that according to

[15] (see (11) and (12) of [15]) the two inequalities of (27)

are dual to each other

Define x and as x [x1 middot middot middot xS +N ]T =

[ψ1 middot middot middot ψN micro11 middot middot middot micro1S 1 middot middot middot microK 1 middot middot middot microKS K ]T

(x) [ f 1 middot middot middot f N f 11 middot middot middot f 1S 1 middot middot middot f K 1 middot middot middot f KS K ]with xn = ψn isin [ϵ (β 2τ minus ϵ

sumN i=1 i=n pim)pnm]N

n=1

and xrS +N r=N +1 = microks =isin [ϵ (β 2τ minus

ϵsumK

i=1

sumS ij=1(ij)=(ks) pijm)pksm] forallsK

k=14 As we can

see from (27) when ∥(x1) minus(x2)∥2 = 0 with x1 = x2 or

x1 = x2 one can set κ(κ) = 0 and χ(χ) = 0 to satisfy thisinequality And when ∥(x1) minus(x2)∥2 gt 0 (ie x1 = x2)

one can select appropriate κ(κ) isin [0 1) and χ(χ) ge 0 such

that (27) is satisfied This is due to the fact that in the latter

case ∥x2 minus (x1)∥2 gt 0 andor ∥x1 minus (x2)∥2 gt 0 and

∥x1 minus x2∥2 gt 0 are positive and bounded This explanation

shows the existence of κ(κ) isin [0 1) and χ(χ) ge 0 ensuring

(27) for any ∥(x1) minus (x2)∥2 x1x2 isin X Consequently

(x) is an almost contraction which implies

xn+1 = (xn) x0 = [x01 x02 middot middot middot x0(S +N )]T ge ϵ1N +S

for n = 0 1 2 middot middot middot converges (28)

where 1N +S is an N + S length vector with each elementequal to unity Thus there exist ψn ge ϵN

n=1 and microks geϵ forallsK

k=1 that satisfy (25) and can be computed using (28)

For numerical simulation we initialize x0 as x01 = x02 =middot middot middot = x0(S +N ) However finding the optimal initialization

strategy is still an open research topic

Once the appropriate ψnN n=1 and microksforallsK

k=1 are ob-

tained step 4 of Algorithm I is immediate and hence P 1 can

be solved iteratively using this algorithm

C Extension of the current duality for P 1 with a total BS

power constraint

If the constraints of P 1 are modified to a total BS powerthe power constraint at step 3 of Algorithm I can be ensured

by applying the precoderdecoder transformation expression of

[5] The precoderdecoder transformation of [5] is performed

by computing S scaling factors These scaling factors are

obtained by solving S systems of equations which require

matrix inversion with complexity O(S 3) (see (23) of [5])

In the current paper if the constraints of P 1 are modified

to a total BS power one can ensure the power constraint at step

3 of Algorithm I just by assigning ∆ks of (16) as ∆ks = I

By doing so β 2 of (17) and β 2 of (21) can be expressed as

4For our simulation we use ϵ =

min(10minus6 βτpnmN n=1 βτpksm forallsKk=1)

β 2 =sumK

k=1

sumSks=1 b

Hksbks

τ = P max

τ and β 2 = trηVHRnV

sumKk=1

sumSks=1 t

Hkstks

where P max is the total BS power Now by employing (20)

the total BS power at step 3 of Algorithm I can thus be given

as trBBH = β 2trTTH = β 2τ = P max (ie the total

BS power constraint is satisfied) Thus for P 1 (with a total BS

power constraint) we do not need to use Theorem I Moreover

our duality requires only one scaling factor to perform the

precoderdecoder transformation (ie β 2(β 2)) This showsthat for this problem the proposed duality based algorithm

requires less computation compared to that of [5] Note that

the duality algorithm of [5] requires the same computation as

that of [8] and less computation than that of [1] and [4] Thus

it is sufficient to compare the current duality algorithm with

the duality algorithm of [5]

For other WSMSE-based problems with a total BS power

constraint function the computational advantage of the current

duality based algorithm over that of [5] can be analysed like

in this subsection

V USE R-WISE WSMSE DOWNLINK-INTERFERENCE

DUALITYThis duality is established to solve user-wise WSMSE-

based problems (for example P 2)

A User-wise WSMSE transfer (From downlink to interference

channel)

To apply this WSMSE transfer for solving P 2 we set the

precoder decoder and noise covariance matrices as

V = β W T = Bβ ζ = η λ = I∆ks = Ψ + microkI (29)

where β ψnN n=1 and microkK

k=1 are real positive scalars

Substituting (29) into (10) and equating ξ I wu = ξ DL

wu yields

β 2τ =

N 991761n=1

ψn ˇ pn +

K 991761k=1

microk pk = pT ψ + pT micro (30)

where τ = trηWH RnW micro = [micro1 middot middot middot microK ]T p =

[˜ p1 middot middot middot ˜ pK ]T with ˜ pk = trBkB

H k Like in Section IV-A

we perform step 1 of Algorithm I by choosing β 2 ψ and microas

β τ ge pT ψ + pT micro (31)

To perform step 2 of Algorithm I we update tks of (29)

using the interference channel MMSE receiver as

tks =β (HWηWH HH + Ψ + microkI)minus1Hkwksηk (32)

This expression shows that by choosing microk gt 0K k=1 ψn gt

0N n=1 we ensure that (HWηWH HH + Ψ+ microkI)minus1 exists

B User-wise WSMSE transfer (From interference to downlink

channel)

For a given user-wise WSMSE in the interference channel

with ζ = η and λ = I we can achieve the same WSMSE in

the downlink channel (with the weighting matrix η) by using

a nonzero scaling factor ( ˜β ) which satisfies

B = ˜β T W = V

˜β (33)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 715

7

In this precoderdecoder transformation we use the notationsB and W to differentiate from the precoder and decoder

matrices used in Section V-A By substituting (33) into ξ DLwu

(with B=B W=W) then equating the resulting user-wise

WSMSE with that of the interference channel (ξ I wu) and after

simple manipulations we get

˜β 2

=

β 2τ sumN n=1 ψntH

n tn +sumK

k=1 microktrTH k Tk (34)

where tH n is the nth row of the MMSE matrix T (32) The

power constraints of each BS antenna and user (ie step 3 of

Algorithm I) in the downlink channel can be expressed as

ψn ge ˇf n and microk ge f k forallk (35)

where

ˇf n =β 2τ

˘ pn

ψntH n

tnsumN i=1 ψit

H i

ti +sumK

i=1 microitrTH i Ti

(36)

f k =β 2τ

ˆ pk

microktrTH k Tk

sumN i=1 ψitH i ti +sumK

i=1 microitrTH i Ti

(37)

For given β tH n

tnN n=1 and trTH

k TkK k=1 one can show

that there exist ψnN n=1 and microkK

k=1 which satisfy

ψn = ˇf n and microk = f k forallnk (38)

The solution of (38) can be obtained exactly like that of (25)

As ˘ pn ge ˇ pnN n=1 and ˆ pk ge ˜ pkK

k=1 the latter solution also

satisfies (31) Thus P 2 can be solved using Algorithm I

V I SYMBOL-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

In this section we establish the symbol-wise MSE duality

between downlink and interference channels If all symbols

are active this duality can be applied to solve MSE based

problems However as will be clear later this duality requires

more computation compared to the duality of Sections IV and

V Thus we propose this duality to be employed for problems

like in P 3 since this problem maintains all symbols active and

can not be solved by the duality in Sections IV and V

A Symbol-wise MSE transfer (From downlink to interference

channel)

To apply this duality for P 3 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

vks = β kswks tks = bksβ ks ζ = I

∆ks = Ψ + microksIN forallks (39)

Substituting (39) into (7) and ξ DLks = ξ I

ks forallsK k=1 yields

wH ks(HH

k

K 991761i=1

S i991761j=1

bijbH ijHk + Rnk)wks minus wH

ksHH k bks

minus bH ksHkwks + 1 =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1

β 2ijHiwijwH ijH

H i +

Ψ + microksIN )bks minus bH

ksHkwks minus wH

ksHH

k bks + 1 forallks

It implies

wH ks(HH

k

K 991761i=1

S i991761j=1(ij)=(ks)

bijbH ijHk + Rnk)wks =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijHiwijwH ij H

H i + Ψ+

microksIN )bks forallks (40)

Collecting the above expression for all k and s gives

(Y + Θ)β2

=[a11 middot middot middot a1S 1 middot middot middot aK 1 middot middot middot aKS K ]T = ˜Px

rArr β2

=Θminus1(I + YΘminus1)minus1 ˜Px (41)

where β2

= [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T

Θ = diag(θ11 middot middot middot θ1K 1 middot middot middot θK 1 middot middot middot θKS K )

aks = bH ksΨbks + microksb

H ksbks ˜P = [ macrP P] and

Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

θks = wH ksRnkwks macrP isin realS timesN = |BH |2

P = diag(macr p11 middot middot middot macr p1S 1 middot middot middot macr pK 1 middot middot middot macr pKS K )

yks = [minus|bH ksH1w11|2 middot middot middot zks middot middot middot minus|bH

ksHK wK 1| middot middot middot minus |bH

ksHK wKS K |]T and zks =

wH ksH

H k

sumK i=1

sumS ij=1(ij)=(ks) bijb

H ijHkwks Next we

examine two important properties of (I + YΘminus1)minus1 To this

end we examine the following Theorem

Theorem 2 Let A isin realntimesn and A(ij)(i=j) le 0 1 lei( j) le n If the diagonal elements of A are A(ii) = 1 minussumn

j=1j=i A(ji) then

Property 1 Aminus1 ge 0 (42)

Property 2 |||Aminus1|||1 = 1 (43)

where () ge 0 and ||||||1 denote matrix non-negativity and

one norm respectively

Proof See Appendix A

According to the first property of Theorem 2 if θks gt0 forallsK

k=15 the inverse of (I + YΘminus1) exists and it has

nonnegative entries Consequently for any positive ψnN n=1

and microks forallsK k=1 β ks forallsK

k=1 of (41) are strictly positive6

Now by selecting ψnN n=1 and microks forallsK

k=1 such that (41) is

fulfilled we can transfer the MSE of each symbol from down-

link to interference channel ensuring ξ DLks = ξ I 1

ks forallsK k=1

where ξ I 1ks is the MSE of the kth user sth symbol at step 1

of Algorithm I Here we should also select ψnN n=1 and

microks forallsK k=1 such that the power constraint of P 3 at step 3

of Algorithm I is satisfied To this end we examine the steps(2) and (3) of this algorithm

Like in Section IV we perform step 2 of Algorithm 1 by

updating tks using MMSE receiver as

tks =(Γc + ∆ks)minus1Hkvksζ ks (44)

=(

K 991761i=1

S i991761j=1

β ijHiwijwH ijH

H i + Ψ + microksI)minus1Hkwksβ ks

where the second equality is obtained from (39) The above

expression shows that by choosing microks gt 0 forallsK k=1 ψn gt

5For P 3 wH ksRnkwks gt 0forallsK

k=1 is always true

6Note that the application of (43) will be clear in the sequel (see (55))

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 815

8

0N n=1 we ensure (

sumK i=1

sumS ij=1 β ijHiwijw

H ij H

H i + Ψ +

microksI)minus1 exists Next we transfer the symbol-wise MSE from

interference to downlink channel by satisfying the power

constraint of P 3 (ie we perform step 3)

B Symbol-wise MSE transfer (From interference to downlink

channel)

For a given symbol MSE in the interference channel with

ζ = I we can achieve the same symbol MSE in the downlink

channel by using a nonzero scaling factor (β ks) which satisfies

bks = β kstks wks = vksβ ks (45)

Here we use the notations B and W to differentiate with

the precoder and decoder matrices used in Section VI-A By

substituting (45) into ξ DLks (with B=B W=W) then equating

the resulting symbol MSE with that of the interference channel

(7) and after some straightforward steps we get

1β 2ksvH ks(HH k

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijtijtH ijHk + Rnk)vks =

tH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

HivijvH ij H

H i + Ψ + microksI)tks forallks

By collecting the above equalities for all k and s β ks forallsK k=1

can be determined by

(Y + Ω)β2 =[vH 11Rn1v11 middot middot middot vH

1S 1Rn1v1S 1

middot middot middot vH K 1RnK vK 1 middot middot middot vH

KS KRnK vKS K ]T

=Θβ2

= ΘΘminus1(I + YΘminus1)minus1 ˜Px

rArr β2 =(Y + Ω)minus1(I + YΘminus1)minus1 ˜Px

=Ωminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜Px (46)

where the third equality follows from (41)

β2 = [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T Ω =diag(tH

11Ψt11 middot middot middot tH 1S 1

Ψt1S 1 middot middot middot tH K 1ΨtK 1 middot middot middot

tH KS K

ΨtKS K ) Ω = diag(micro11tH 11t11 middot middot middot micro1S 1t

H 1S 1

t1S 1 middot middot middot

microK 1tH K 1tK 1 middot middot middot microKS Kt

H KS K

tKS K ) Ω = Ω + Ω

and Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

yks = [minus|tH 11H1vks|2 middot middot middot zks middot middot middot minus|tH

K 1HK vks|2 middot middot middot minus |tH

KS KHK vks|2]T and zks =

tH kssum

K i=1sum

S ij=1(ij)

=(ks)Hivijv

H ij H

H i tks By applying

Theorem 2 it can be shown that β ks forallsK k=1 are strictly

positive for ψn gt 0N n=1 and microks gt 0 forallsK

k=1 The power

constraints of the nth BS antenna and kth user sth symbol

are given by

bH

nbn = tH

n Υtn le ˘ pn foralln (47)bH ksbks = β 2kst

H kstks le ˘ pks forallk s (48)

where Υ = diag(β 211 middot middot middot β 1S 1 middot middot middot β 2K 1 middot middot middot β KS K ) Mul-

tiplying both sides of (47) by ψn and stacking the resulting

inequality for all n yields

˘Pψ ge

˜Ωβ

2

(49)

where P = diag(˘ p1 middot middot middot ˘ pN ) and Ω = Ψ|T|2 Like in the

above expression by multiplying both sides of (48) with microks

and collecting the resulting inequality for all k and s the

power constraints (48) can be expressed as

macrPmicro ge Ωβ2 (50)

where macrP = diag(˘ p11 middot middot middot ˘ p1S 1 middot middot middot ˘ pK 1 middot middot middot ˘ pKS K ) By

employing β2 of (46) (49) and (50) can be combined as

xprime ge ˜Ωβ2 = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1xprime

= (xprime)xprime (51)

where ˜P = blkdiag(P macrP) ˜Ω = [ΩT ΩT ]T xprime = ˜

P[ψ micro]T

and (xprime) = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1

Next we show that there exists xprime gt 0 such that (51) is

satisfied Towards this end we consider the following discrete-

time switched system [16]

xn+1 = Fσnxn for n = 0 1 2 middot middot middot (52)

where x isin realmtimes1 is a state Fσn isin realmtimesm is a switchingmatrix and σn isin 0 1 2 middot middot middot According to [16] (Remark 2

of [16]) the above system is marginally stable (convergent) if

maxσn

∥Fσn∥⋆ = 1 for n = 0 1 middot middot middot (53)

where ∥∥⋆ denotes an induced matrix norm

Let us consider the following iteration

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (54)

Now if we assume (xprimen) = Fσn foralln7 we can interpret (54)

as a discrete time switched system Consequently the above

iteration is guaranteed to converge if maxn ∥ (xprimen)∥⋆ = 1 It

is known that ||||||1 is an induced matrix norm [17] For any

xprime the matrix one norm of (xprime) is given by

||| (xprime)|||1

=||| ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1|||1

le||| ˇΩ|||1|||(I + YΩminus1)minus1|||1|||(I + YΘminus1)minus1|||1||| ˇP|||1

=||| ˇΩ|||1||| ˇP|||1 le 1 (55)

where ˇΩ = [ ˜ΩΩminus1 0(N +S )timesN ] ˇP = [ ˜P( ˜P)minus1 0N times(N +S )]

the second inequality is due to the fact that |||XY|||1 le|||X|||1|||Y|||1 [17] (page 290) the third equality is obtained

by applying Theorem 2 and the last inequality employs thefollowing facts Using the definition (73) (see Appendix A)

one can get ||| ˇΩ|||1 le 1 by applying (46) and (51) and

||| ˇP|||1 le 1 by applying (13) (41) and (51)

Thus maxn ∥ (xprimen)∥⋆ = 1 holds true and (54) is guar-

anteed to converge As we can see (54) is derived by using

(41) and (46) Thus the solution of (54) also satisfies (41)

and (46) Moreover for any initial xprime0 gt 0 since (xprimen) foralln is

positive the solution of (54) is strictly positive and [ψ micro]T =

( ˜P)minus1xprime gt 0 which is the desired result

7Since (xprimen) is the products of stochastic matrices (see the proof of Theorem 2) (xprimen) is a bounded matrix for any xprime gt 0 Thus the assumption

(xprimen) = Fσn foralln holds true

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 915

9

Once the feasible microks forallsK k=1 and λnN

n=1 are obtained

step 4 of Algorithm 1 is immediate As a result P 3 can be

solved using Algorithm I with an additional power allocation

step which will be detailed in Section VIII

C Extension of the current duality for P 3 with a total BS

power constraint

In this subsection we show the extension of the current

duality for P 3 with a total BS power constraint For this

problem we set ∆ks of (39) as ∆ks = I forallk s (ie like in

Section IV-B) Upon doing so β2 is computed directly from

the first equality of (46) (ie the bound (55) is not needed)

By summing the left and right hand sides of this equality one

can get trBBH = P max This shows that for P 3 with a

total BS power constraint problem the total BS power at step

3 of Algorithm I is satisfied Thus one can apply Algorithm

I (with the additional power allocation step) to solve the latter

problem by setting ∆ks of (39) as ∆ks = I forallk s

For other total BS power constrained WMSE-based prob-

lems the current duality based algorithm can be applied likein this subsection The details are omitted for conciseness

Note that for such problem types the duality algorithm of the

current paper has the same complexity as that of [5]

VII USE R-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

This section establishes user-wise MSE duality between

downlink and interference channels This duality is established

to solve the problems of type P 4

A User-wise MSE transfer (From downlink to interference

channel)

To apply this MSE transfer for P 4 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

Vk = β kWk Tk = Bkβ k ζ = I ∆ks = Ψ + microkI (56)

Like in Section VI substituting (56) into (8) equating ξ DLk =

ξ I k K

k=1 and after some straightforward steps we get the

following system of equations

(Y + Θ)β2

= ˜Px rArr β2

= Θminus1(I + YΘminus1)minus1 ˜Px (57)

where

Y(kl) =

983163 sumK i=1i=k ∥WH

k HH k Bi∥2F for k = l

minus∥WH l H

H l Bk∥2F for k = l

(58)

Θ = diag(θ1 middot middot middot θK ) β2

= [β 21 middot middot middot β 2K ]T

˜P = [ macrP P]

with θk = trWH k RnkWk macrP isin realS timesN = |BH |2 P =

diag(macr p1 middot middot middot macr pK ) By applying Theorem 2 it can be shown

that β kK k=1 of (57) are strictly positive Thus step 1 of

Algorithm I can be performed using (57) We perform step 2

of Algorithm I by updating tks using MMSE receiver as

tks =(K

991761i=1

β iHiWiWH i H

H i + Ψ + microkI)minus1Hkwksβ k (59)

B User-wise MSE transfer (From interference to downlink

channel)

For a given user MSE in the interference channel with

ζ = I we can achieve the same MSE in the downlink channel

by using nonzero scaling factors ( ˜β kK k=1) that satisfy

Bk = ˜β kTk

Wk = Vk ˜β k (60)

Here we also use the notations B and W to differentiate

with the precoder and decoder matrices used in Section VII-

A By substituting (60) into ξ DLk (with B=B W=W) and

then equating the resulting user-wise MSE with that of the

interference channel (7) and after some steps ˜β kK k=1 are

determined as

(I + ˇYˇΩminus1

) ˇΩ ˜β2

= [trVH 1 Rn1V1 middot middot middot trVH

K RnK VK ]T

rArr ˜β2

= ˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px (61)

where the second equality follows from

(57) ˜β2

= [ ˜β 21

middot middot middot ˜β 2K

]T Ωprime =diag(trTH

1 ΨT1 middot middot middot trTH K ΨTK ) Ω =

diag(micro1trTH 1 T1 middot middot middot microK trTH

K TK ) ˇΩ = Ωprime + Ω

By applying Theorem 2 it can be shown that ˜β kK k=1 are

strictly positive for ψn gt 0N n=1 and microk gt 0K

k=1 Like in

Section VI-B the power constraint of the nth BS antenna

and kth user can thus be expressed as

xprime ge ˆΩ ˜β2

= ˆΩˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px

= (xprime)xprime (62)

where P = diag(ˆ p1 middot middot middot ˆ pK ) ˆP = blkdiag(P ˆP) ˆΩ =

[ΩT

ΩT

]T

xprime

= ˜P[ψ micro]

T

and (xprime

) = ˆΩˇΩ

minus1

(I +ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜P( ˆP)minus1 Like in Section VI-B it

can be shown that there exists a feasible xprime gt 0 that satisfy

(62) and can be obtained iteratively by

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (63)

By initializing xprime0 gt 0 the solution of the above iteration

is always positive Consequently λn gt 0N n=1 and microk gt

0K k=1 holds true Once the feasible microkK

k=1 and λnN n=1

are obtained step 4 of Algorithm 1 is straightforward As a

result P 4 can be solved using Algorithm I with the additional

power allocation step of Section VIII

VIII GENERALIZED AND IMPROVED VERSION OF

Algorithm I

From the discussions of Sections IV - VII one can

understand that each iteration of Algorithm I gives a non

increasing sequence of symbol (user) WMSEWSMSE As can

be seen from Section III the objective of P 1(P 2) is just to

minimize the total WSMSE of all symbols (users) whereas

the objective of P 3(P 4) is to simultaneously minimize and

balance the WMSE of all symbols (users) Thus Algorithm

I is appropriate to solve P 1(P 2) of the current paper For

P 3(P 4) although each iteration of Algorithm I is able to

provide a non increasing sequence of symbol (user) WMSE

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1015

10

(ie minimizes the maximum WMSE of all symbols (users))

each iteration of this algorithm is not able to guarantee

balanced WMSEs of all symbols (users) On the other hand

for an MSE constrained total BS power minimization problem

(for example P 7 in Section IX) an iterative algorithm that

can provide a non increasing sequence of total BS power is

required This shows that Algorithm I also can not solve the

latter problem In the following we address the drawbacks of Algorithm I just by including a power allocation step into

Algorithm I as explained below

In [8] for fixed transmit and receive filters the power

allocation parts of total BS power constrained MSE-based

problems have been formulated as GPs by employing the

approach and system model of [1] under the assumption that

all symbols are strictly active8 For this assumption in [8] we

show that the system model of [1] is appropriate to solve any

kind of total BS power constrained MSE-based problems using

duality approach (alternating optimization) This motivates us

to utilize the system model of [1] in the downlink channel

only and then include the power allocation step (ie GP) into

Algorithm I Towards this end we decompose the precoders

and decoders of the downlink channel as

Bk =GkP12k Wk = UkαkP

minus12k forallk (64)

where Pk = diag( pk1 middot middot middot pkS k) isin realS ktimesS k Gk =[gk1 middot middot middot gkS k ] isin CN timesS k Uk = [uk1 middot middot middot ukS k ] isin CM ktimesS k

and αk = diag(αk1 middot middot middot αkS k) isin realS ktimesS k are the transmit

power unity norm transmit filter unity norm receive filter and

receiver scaling factor matrices of the kth user respectively

ie gH ksgks = uH

ksuks = 1 forallsK k=1

By employing (64) and stacking ξ = [ξ DL11 middot middot middot ξ DL

KS K]T

= [ξ DL1 middot middot middot ξ DL

S ]T = [ξ DLl S

l=1]T the l th downlink symbol

MSE can be expressed as (see [1] and [10] for more detailsabout (64) and the above descriptions)

ξ DLl = pminus1l [(D + α2ΦT )p]l + pminus1l α2

l uH l Rnul (65)

where

Φ(lj) =

983163 |gH

l Huj |2 for l = j0 for l = j

(66)

D(ll) =α2l |gH

l Hul|2 minus 2αlreal(uH l H

H gl) + 1 (67)

1 le l( j) le S P = blkdiag(P1 middot middot middot PK ) =diag( p1 middot middot middot pS ) p = [ p1 middot middot middot pS ]

T G = [G1 middot middot middot GK ] =[g1 middot middot middot gS ] U = blkdiag(U1 middot middot middot UK ) = [u1 middot middot middot uS ]

and α = blkdiag(α1 middot middot middot αK ) = diag(α1 middot middot middot αS ) with∥gl∥2 = ∥ul∥2 = 1 Using (65) for fixed GU and α the

power allocation part of P 1 can be formulated as

min plSl=1

S 991761l=1

ηlξ DLl st ς T

np le ˘ pn pl le ˘ pl foralln l (68)

where ς T n isin real1timesS = |[G(ni)|2S

i=1 [η1 middot middot middot ηS ]T =

[η11 middot middot middot ηKS K ]T and [ ˘ pl middot middot middot ˘ pS ]T = [ ˘ p11 middot middot middot ˘ pKS K ]T As

ξ DLl is a posynomial (where plS

l=1 are the variables) (68)

8Note that this assumption is not always true for all MSE-based problemsHowever as mentioned in [1] in practice replacing zero powers by a smallvalue will not affect the overall optimization Due to this reason we replace

zero powers by 10minus6 in the simulation section

is a GP for which global optimality is guaranteed Thus it

can be efficiently solved using interior point methods with a

worst-case polynomial-time complexity [18]

For fixed GU and α the power allocation parts of

P 2 minus P 4 can be formulated as GPs like in P 1 Our duality

based algorithm for each of these problems including the

power allocation step is summarized in Algorithm II

Algorithm II

Initialization Like in Algorithm I

Repeat Interference channel

1) For P 1 and P 2 set V = WT = B (ie β = β = 1)

then compute ψn microks forallksn and ψn microk forallk nusing (25) and (38) respectively For P 3 and P 4 first

compute ψn microks forallksn and ψn microk forallk n using

(54) and (63) respectively then transfer each symbol

and user MSE from downlink to interference channels

by (39) and (56) respectively

2) Update the MMSE receivers of the interference channel

for P 1 P 2 P 3 and P 4 using (19) (32) (44) and (59)

respectivelyDownlink channel

3) Transfer the MSE (weighted sum user or symbol MSE)

from interference to downlink channel using (20) (33)

(45) and (60) for P 1 P 2 P 3 and P 4 respectively

4) For each of the problems P 1 minus P 4 decompose the

precoder and decoder matrices of each user as in (64)

Then formulate and solve the GP power allocation part

For example the power allocation part of P 1 can be

expressed in GP form as (68)

5) For each of the problems P 1minusP 4 by keeping PkK k=1

constant update the receive filters UkK k=1 and scal-

ing factors αkK

k=1 by applying downlink MMSE

receiver approach ie Ukαk = (HH k GPGH Hk +

Rnk)minus1HH k GkPkK

k=1 Note that in these expressions

αkK k=1 are chosen such that each column of UkK

k=1

has unity norm Then compute BkWkK k=1 by (64)

Until convergence

Convergence It can be shown that at each iteration

of this algorithm the objective function of each of the

problems P 1 - P 4 is non-increasing [4] [7] [19] Thus

the above iterative algorithm is convergent However

since P 1 - P 4 are non-convex this iterative algorithm

is not guaranteed to converge to the global optimum

In this algorithm we stop iteration (ie our convergence

condition) when the difference between the objectivefunctions in two consecutive iterations is smaller than

some small value ϵ (we use ϵ = 10minus6 for the simulation)

Computational complexity As can be seen from this

algorithm when we increase the number of users andor

(BS andor MS antennas) the number and size of

optimization variables increase Because of this the

computational complexity of Algorithm II increases as

K andor N andor M increases However studying the

complexity of this algorithm as a function of K N and

M needs effort and time And such a task is beyond the

scope of this work and is an open research topic

The power allocation step of Algorithm II has thus the

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1115

11

following benefits (1) For BS power constrained WSMSE

minimization problems this step improves the convergence

speed of Algorithm II compared to that of Algorithm I9 (for

example in P 1 minus P 2) The degree of improvement depends on

different parameters (for example Hk ∆ks forallk s etc) Thus

the theoretical comparison of these two algorithms in terms of

convergence speed requires time and effort And this task is

beyond the scope of this work and it is an open research topic(2) For symbol-wise (user-wise) WMSE balancing problems

this step helps to balance the WMSE of all symbols (users)

(for example in P 3 minus P 4) (3) For MSE constrained total

BS power minimization problems this step ensures a non

increasing total BS power at each iteration of Algorithm II

IX APPLICATION OF THE PROPOSED DUALITY BASED

ALGORITHM FOR OTHER PROBLEMS

A MSE based problem with entry-wise power constraint

The symbol-wise WSMSE minimization constrained with

entry wise power ie bH

ksnb

ksn le macr p

ksn forallksn problem is

formulated as

P 5 minBkWkKk=1

K 991761k=1

S k991761s=1

ηksξ DLks st bH

ksnbksn le macr pksn (69)

It can be shown that this problem can be solved by Algorithm

II with ∆ks = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1

B Weighted sum rate optimization constrained with per an-

tenna and symbol power problem

By employing the approach of [11] (see (16) of [11]) one

can equivalently express the weighted sum rate maximizationconstrained with per antenna and symbol power problem as

P 6 (70)

minτ ksν ksbkswksforallsK

k=1

K 991761k=1

S k991761s=1

θks1

τ ksν γ ks

ks +K 991761

k=1

S k991761s=1

ηksξ DLks

st [BBH ](nn) le ˘ pnbH ksbks le ˘ pks

K prodk=1

S kprods=1

ν ks = 1 τ ks gt 0

where 0 lt ωks lt 1 forallsK k=1 are the rate weighting factors

for all symbols ηks = τ microksks γ ks = 11minusωks

microks = 1ωks

minus 1 and

macrθks = ωksmicro

(1minusωks)

ks For fixed τ ks ν ks foralls

K

k=1 the aboveoptimization problem has the same mathematical structure

as that of P 1 Thus by keeping τ ks ν ks forallsK k=1 constant

bkswks forallsK k=1 can be optimized by applying the MSE

duality discussed in Section IV Moreover τ ks ν ks forallsK k=1

and the power allocation part of the above problem can be

optimized by a GP method like in (25) of [20] Consequently

we can apply Algorithm II to solve (70) The detailed expla-

nations are omitted for conciseness The following problems

9This is at the expense of additional computation However as mentionedin [1] (see Appendix A of [1]) a small desktop computer can solve a GP of 100 variables and 10000 constraints by standard interior point method under aminute Thus we believe that the complexity of Algorithm I and Algorithm

II are almost the same

can also be solved by simple modification of Algorithm II

P 7 minBkWk

Kk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

SINRks ge ϱks forallnks

equiv minBkWkKk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

ξ DLks le (1 + ϱks)minus1 forallnks

P 8 maxBkWk

Kk=1

min Rks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

equiv minBkWkKk=1

max ξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

where SINRks(Rks) is the SINR (rate) of the kth user sth

symbol and we use the fact that Rks = log(1 + SINRks)and ξ DL

ks = (1 + SINRks)minus1 [1] It is clearly seen that the

application of Algorithm II is not limited to the problems of

this paper

Note that under imperfect channel state information (CSI)

condition the stochastic robust design versions of P 1 - P 5 can

be solved like in [10] However to the best of our knowledge

the relationship between rate (SINR) and MSE is not known

when the CSI is imperfect [7] Hence solving the rate (SINR)-

based robust design problems (for example robust versions of

P 6 - P 8) by our duality approach is an open problem

X SIMULATION R ESULTS

In this section we present simulation results for P 1 minus P 4

All of our simulation results are averaged over 100 randomly

chosen channel realizations We set K = 2 N = 4 and

M k = S k = 2 ηks = ρks = ηk = ρk = 1 forallsK k=1

It is assumed that Rn1 = σ21IM 1 Rn2 = σ2

2IM 2 and

σ22 = 2σ2

1 The maximum power of each BS antenna is set

to ˘ pn = 25mW N n=1 And the maximum power allocated

to each symbol and user are set to ˘ pks

= 25mW forallsK

k=1and ˆ pk = 5mW K k=1 respectively For better exposition we

define the Signal-to-noise ratio (SNR) as P maxKσ2av and it

is controlled by varying σ2av where P max = 10mW is the

total maximum BS power and σ2av = (σ2

1 + σ22)2 We also

compare Algorithm II and the algorithm in [2]10

Note that the algorithm in [2] is designed for coordinated

BS systems scenario And the iterative algorithm of [2] is

based on the per BS power constraint However according

to [2] and [21] B coordinated BS systems each with Z

10As will be clear in the sequel the proposed algorithm and the algorithmof [2] may not utilize the entire 10mW for all noise levels Thus the afore-mentioned SNR can be considered as the maximum SNR of the transmitted

signal

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1215

12

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

Fig 2 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of WSMSE for [top] P 1 [bottom] P 2

antennas can be treated as one multiuser MIMO system with

BZ antennas Thus when Z = 1 the considered problem has

exactly the same structure as that of [2] To the best of our

knowledge there is no other general linear algorithm that cansolve the problem types P 1 minus P 4 On the other hand in all

problems since there are more than one power constraints (ie

per antenna and symbol (user) powers) all power constraints

may not be active at the optimal solution Due to these reasons

we compare Algorithm II and the algorithm in [2] both in

terms of the achieved MSE (ie minimized MSE) and total

utilized BS power at the achieved MSE

A Simulation results for problems P 1 minus P 2

In this subsection we compare the performance of our

proposed algorithm with that of [2] As can be seen from Fig

2 the proposed algorithm and the algorithm in [2] achievethe same symbol-wise and user-wise WSMSEs Next we plot

the total utilized powers at the BS to achieve these WSMSEs

which is shown in Fig 3 From these two figures one can see

that to achieve the same WSMSE the proposed duality based

iterative algorithm requires less total BS power than that of

[2] This scenario fits to that of [10] and [19] where the sum

MSE minimization constrained with a per BS antenna power

problem has been examined by duality approach

B Simulation results for problems P 3 minus P 4

Like in the above subsection here we compare the per-

formance of our proposed algorithm with that of [2] For

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 3 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 1 [bottom] P 2

For this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

10 15 20 25 30 350

005

01

015

02

025

SNR (dB)

M a x i m u m s y m b o l M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

005

01

015

02

025

03

035

04

045

05

SNR (dB)

M a x i m u m u s e r M S E

Algorithm II

Algorithm in [2]

Fig 4 Comparison of the proposed algorithm (Algorithm II) and that of

in [2] in terms of maximum achieved MSE for [top] P 3 [bottom] P 4

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 6: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 615

6

κ(κ) isin [0 1) and χ(χ) ge 0 such that

∥(x) minus (y)∥2 le κ∥x minus y∥2 + χ∥y minus (x)∥2 or (27)

∥(x) minus (y)∥2 le κ∥x minus y∥2 + χ∥x minus (y)∥2 forallxy isin X

If satisfies (27) then the following holds true

1) existx isin X x = (x)

2) For any initial x0 isin X the iteration xn+1 = (xn)

for n = 0 1 2 middot middot middot converges to some x⋆ isin X3) The solution x⋆ is not necessarily unique

Proof See Theorem 11 of [14] Note that according to

[15] (see (11) and (12) of [15]) the two inequalities of (27)

are dual to each other

Define x and as x [x1 middot middot middot xS +N ]T =

[ψ1 middot middot middot ψN micro11 middot middot middot micro1S 1 middot middot middot microK 1 middot middot middot microKS K ]T

(x) [ f 1 middot middot middot f N f 11 middot middot middot f 1S 1 middot middot middot f K 1 middot middot middot f KS K ]with xn = ψn isin [ϵ (β 2τ minus ϵ

sumN i=1 i=n pim)pnm]N

n=1

and xrS +N r=N +1 = microks =isin [ϵ (β 2τ minus

ϵsumK

i=1

sumS ij=1(ij)=(ks) pijm)pksm] forallsK

k=14 As we can

see from (27) when ∥(x1) minus(x2)∥2 = 0 with x1 = x2 or

x1 = x2 one can set κ(κ) = 0 and χ(χ) = 0 to satisfy thisinequality And when ∥(x1) minus(x2)∥2 gt 0 (ie x1 = x2)

one can select appropriate κ(κ) isin [0 1) and χ(χ) ge 0 such

that (27) is satisfied This is due to the fact that in the latter

case ∥x2 minus (x1)∥2 gt 0 andor ∥x1 minus (x2)∥2 gt 0 and

∥x1 minus x2∥2 gt 0 are positive and bounded This explanation

shows the existence of κ(κ) isin [0 1) and χ(χ) ge 0 ensuring

(27) for any ∥(x1) minus (x2)∥2 x1x2 isin X Consequently

(x) is an almost contraction which implies

xn+1 = (xn) x0 = [x01 x02 middot middot middot x0(S +N )]T ge ϵ1N +S

for n = 0 1 2 middot middot middot converges (28)

where 1N +S is an N + S length vector with each elementequal to unity Thus there exist ψn ge ϵN

n=1 and microks geϵ forallsK

k=1 that satisfy (25) and can be computed using (28)

For numerical simulation we initialize x0 as x01 = x02 =middot middot middot = x0(S +N ) However finding the optimal initialization

strategy is still an open research topic

Once the appropriate ψnN n=1 and microksforallsK

k=1 are ob-

tained step 4 of Algorithm I is immediate and hence P 1 can

be solved iteratively using this algorithm

C Extension of the current duality for P 1 with a total BS

power constraint

If the constraints of P 1 are modified to a total BS powerthe power constraint at step 3 of Algorithm I can be ensured

by applying the precoderdecoder transformation expression of

[5] The precoderdecoder transformation of [5] is performed

by computing S scaling factors These scaling factors are

obtained by solving S systems of equations which require

matrix inversion with complexity O(S 3) (see (23) of [5])

In the current paper if the constraints of P 1 are modified

to a total BS power one can ensure the power constraint at step

3 of Algorithm I just by assigning ∆ks of (16) as ∆ks = I

By doing so β 2 of (17) and β 2 of (21) can be expressed as

4For our simulation we use ϵ =

min(10minus6 βτpnmN n=1 βτpksm forallsKk=1)

β 2 =sumK

k=1

sumSks=1 b

Hksbks

τ = P max

τ and β 2 = trηVHRnV

sumKk=1

sumSks=1 t

Hkstks

where P max is the total BS power Now by employing (20)

the total BS power at step 3 of Algorithm I can thus be given

as trBBH = β 2trTTH = β 2τ = P max (ie the total

BS power constraint is satisfied) Thus for P 1 (with a total BS

power constraint) we do not need to use Theorem I Moreover

our duality requires only one scaling factor to perform the

precoderdecoder transformation (ie β 2(β 2)) This showsthat for this problem the proposed duality based algorithm

requires less computation compared to that of [5] Note that

the duality algorithm of [5] requires the same computation as

that of [8] and less computation than that of [1] and [4] Thus

it is sufficient to compare the current duality algorithm with

the duality algorithm of [5]

For other WSMSE-based problems with a total BS power

constraint function the computational advantage of the current

duality based algorithm over that of [5] can be analysed like

in this subsection

V USE R-WISE WSMSE DOWNLINK-INTERFERENCE

DUALITYThis duality is established to solve user-wise WSMSE-

based problems (for example P 2)

A User-wise WSMSE transfer (From downlink to interference

channel)

To apply this WSMSE transfer for solving P 2 we set the

precoder decoder and noise covariance matrices as

V = β W T = Bβ ζ = η λ = I∆ks = Ψ + microkI (29)

where β ψnN n=1 and microkK

k=1 are real positive scalars

Substituting (29) into (10) and equating ξ I wu = ξ DL

wu yields

β 2τ =

N 991761n=1

ψn ˇ pn +

K 991761k=1

microk pk = pT ψ + pT micro (30)

where τ = trηWH RnW micro = [micro1 middot middot middot microK ]T p =

[˜ p1 middot middot middot ˜ pK ]T with ˜ pk = trBkB

H k Like in Section IV-A

we perform step 1 of Algorithm I by choosing β 2 ψ and microas

β τ ge pT ψ + pT micro (31)

To perform step 2 of Algorithm I we update tks of (29)

using the interference channel MMSE receiver as

tks =β (HWηWH HH + Ψ + microkI)minus1Hkwksηk (32)

This expression shows that by choosing microk gt 0K k=1 ψn gt

0N n=1 we ensure that (HWηWH HH + Ψ+ microkI)minus1 exists

B User-wise WSMSE transfer (From interference to downlink

channel)

For a given user-wise WSMSE in the interference channel

with ζ = η and λ = I we can achieve the same WSMSE in

the downlink channel (with the weighting matrix η) by using

a nonzero scaling factor ( ˜β ) which satisfies

B = ˜β T W = V

˜β (33)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 715

7

In this precoderdecoder transformation we use the notationsB and W to differentiate from the precoder and decoder

matrices used in Section V-A By substituting (33) into ξ DLwu

(with B=B W=W) then equating the resulting user-wise

WSMSE with that of the interference channel (ξ I wu) and after

simple manipulations we get

˜β 2

=

β 2τ sumN n=1 ψntH

n tn +sumK

k=1 microktrTH k Tk (34)

where tH n is the nth row of the MMSE matrix T (32) The

power constraints of each BS antenna and user (ie step 3 of

Algorithm I) in the downlink channel can be expressed as

ψn ge ˇf n and microk ge f k forallk (35)

where

ˇf n =β 2τ

˘ pn

ψntH n

tnsumN i=1 ψit

H i

ti +sumK

i=1 microitrTH i Ti

(36)

f k =β 2τ

ˆ pk

microktrTH k Tk

sumN i=1 ψitH i ti +sumK

i=1 microitrTH i Ti

(37)

For given β tH n

tnN n=1 and trTH

k TkK k=1 one can show

that there exist ψnN n=1 and microkK

k=1 which satisfy

ψn = ˇf n and microk = f k forallnk (38)

The solution of (38) can be obtained exactly like that of (25)

As ˘ pn ge ˇ pnN n=1 and ˆ pk ge ˜ pkK

k=1 the latter solution also

satisfies (31) Thus P 2 can be solved using Algorithm I

V I SYMBOL-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

In this section we establish the symbol-wise MSE duality

between downlink and interference channels If all symbols

are active this duality can be applied to solve MSE based

problems However as will be clear later this duality requires

more computation compared to the duality of Sections IV and

V Thus we propose this duality to be employed for problems

like in P 3 since this problem maintains all symbols active and

can not be solved by the duality in Sections IV and V

A Symbol-wise MSE transfer (From downlink to interference

channel)

To apply this duality for P 3 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

vks = β kswks tks = bksβ ks ζ = I

∆ks = Ψ + microksIN forallks (39)

Substituting (39) into (7) and ξ DLks = ξ I

ks forallsK k=1 yields

wH ks(HH

k

K 991761i=1

S i991761j=1

bijbH ijHk + Rnk)wks minus wH

ksHH k bks

minus bH ksHkwks + 1 =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1

β 2ijHiwijwH ijH

H i +

Ψ + microksIN )bks minus bH

ksHkwks minus wH

ksHH

k bks + 1 forallks

It implies

wH ks(HH

k

K 991761i=1

S i991761j=1(ij)=(ks)

bijbH ijHk + Rnk)wks =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijHiwijwH ij H

H i + Ψ+

microksIN )bks forallks (40)

Collecting the above expression for all k and s gives

(Y + Θ)β2

=[a11 middot middot middot a1S 1 middot middot middot aK 1 middot middot middot aKS K ]T = ˜Px

rArr β2

=Θminus1(I + YΘminus1)minus1 ˜Px (41)

where β2

= [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T

Θ = diag(θ11 middot middot middot θ1K 1 middot middot middot θK 1 middot middot middot θKS K )

aks = bH ksΨbks + microksb

H ksbks ˜P = [ macrP P] and

Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

θks = wH ksRnkwks macrP isin realS timesN = |BH |2

P = diag(macr p11 middot middot middot macr p1S 1 middot middot middot macr pK 1 middot middot middot macr pKS K )

yks = [minus|bH ksH1w11|2 middot middot middot zks middot middot middot minus|bH

ksHK wK 1| middot middot middot minus |bH

ksHK wKS K |]T and zks =

wH ksH

H k

sumK i=1

sumS ij=1(ij)=(ks) bijb

H ijHkwks Next we

examine two important properties of (I + YΘminus1)minus1 To this

end we examine the following Theorem

Theorem 2 Let A isin realntimesn and A(ij)(i=j) le 0 1 lei( j) le n If the diagonal elements of A are A(ii) = 1 minussumn

j=1j=i A(ji) then

Property 1 Aminus1 ge 0 (42)

Property 2 |||Aminus1|||1 = 1 (43)

where () ge 0 and ||||||1 denote matrix non-negativity and

one norm respectively

Proof See Appendix A

According to the first property of Theorem 2 if θks gt0 forallsK

k=15 the inverse of (I + YΘminus1) exists and it has

nonnegative entries Consequently for any positive ψnN n=1

and microks forallsK k=1 β ks forallsK

k=1 of (41) are strictly positive6

Now by selecting ψnN n=1 and microks forallsK

k=1 such that (41) is

fulfilled we can transfer the MSE of each symbol from down-

link to interference channel ensuring ξ DLks = ξ I 1

ks forallsK k=1

where ξ I 1ks is the MSE of the kth user sth symbol at step 1

of Algorithm I Here we should also select ψnN n=1 and

microks forallsK k=1 such that the power constraint of P 3 at step 3

of Algorithm I is satisfied To this end we examine the steps(2) and (3) of this algorithm

Like in Section IV we perform step 2 of Algorithm 1 by

updating tks using MMSE receiver as

tks =(Γc + ∆ks)minus1Hkvksζ ks (44)

=(

K 991761i=1

S i991761j=1

β ijHiwijwH ijH

H i + Ψ + microksI)minus1Hkwksβ ks

where the second equality is obtained from (39) The above

expression shows that by choosing microks gt 0 forallsK k=1 ψn gt

5For P 3 wH ksRnkwks gt 0forallsK

k=1 is always true

6Note that the application of (43) will be clear in the sequel (see (55))

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 815

8

0N n=1 we ensure (

sumK i=1

sumS ij=1 β ijHiwijw

H ij H

H i + Ψ +

microksI)minus1 exists Next we transfer the symbol-wise MSE from

interference to downlink channel by satisfying the power

constraint of P 3 (ie we perform step 3)

B Symbol-wise MSE transfer (From interference to downlink

channel)

For a given symbol MSE in the interference channel with

ζ = I we can achieve the same symbol MSE in the downlink

channel by using a nonzero scaling factor (β ks) which satisfies

bks = β kstks wks = vksβ ks (45)

Here we use the notations B and W to differentiate with

the precoder and decoder matrices used in Section VI-A By

substituting (45) into ξ DLks (with B=B W=W) then equating

the resulting symbol MSE with that of the interference channel

(7) and after some straightforward steps we get

1β 2ksvH ks(HH k

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijtijtH ijHk + Rnk)vks =

tH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

HivijvH ij H

H i + Ψ + microksI)tks forallks

By collecting the above equalities for all k and s β ks forallsK k=1

can be determined by

(Y + Ω)β2 =[vH 11Rn1v11 middot middot middot vH

1S 1Rn1v1S 1

middot middot middot vH K 1RnK vK 1 middot middot middot vH

KS KRnK vKS K ]T

=Θβ2

= ΘΘminus1(I + YΘminus1)minus1 ˜Px

rArr β2 =(Y + Ω)minus1(I + YΘminus1)minus1 ˜Px

=Ωminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜Px (46)

where the third equality follows from (41)

β2 = [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T Ω =diag(tH

11Ψt11 middot middot middot tH 1S 1

Ψt1S 1 middot middot middot tH K 1ΨtK 1 middot middot middot

tH KS K

ΨtKS K ) Ω = diag(micro11tH 11t11 middot middot middot micro1S 1t

H 1S 1

t1S 1 middot middot middot

microK 1tH K 1tK 1 middot middot middot microKS Kt

H KS K

tKS K ) Ω = Ω + Ω

and Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

yks = [minus|tH 11H1vks|2 middot middot middot zks middot middot middot minus|tH

K 1HK vks|2 middot middot middot minus |tH

KS KHK vks|2]T and zks =

tH kssum

K i=1sum

S ij=1(ij)

=(ks)Hivijv

H ij H

H i tks By applying

Theorem 2 it can be shown that β ks forallsK k=1 are strictly

positive for ψn gt 0N n=1 and microks gt 0 forallsK

k=1 The power

constraints of the nth BS antenna and kth user sth symbol

are given by

bH

nbn = tH

n Υtn le ˘ pn foralln (47)bH ksbks = β 2kst

H kstks le ˘ pks forallk s (48)

where Υ = diag(β 211 middot middot middot β 1S 1 middot middot middot β 2K 1 middot middot middot β KS K ) Mul-

tiplying both sides of (47) by ψn and stacking the resulting

inequality for all n yields

˘Pψ ge

˜Ωβ

2

(49)

where P = diag(˘ p1 middot middot middot ˘ pN ) and Ω = Ψ|T|2 Like in the

above expression by multiplying both sides of (48) with microks

and collecting the resulting inequality for all k and s the

power constraints (48) can be expressed as

macrPmicro ge Ωβ2 (50)

where macrP = diag(˘ p11 middot middot middot ˘ p1S 1 middot middot middot ˘ pK 1 middot middot middot ˘ pKS K ) By

employing β2 of (46) (49) and (50) can be combined as

xprime ge ˜Ωβ2 = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1xprime

= (xprime)xprime (51)

where ˜P = blkdiag(P macrP) ˜Ω = [ΩT ΩT ]T xprime = ˜

P[ψ micro]T

and (xprime) = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1

Next we show that there exists xprime gt 0 such that (51) is

satisfied Towards this end we consider the following discrete-

time switched system [16]

xn+1 = Fσnxn for n = 0 1 2 middot middot middot (52)

where x isin realmtimes1 is a state Fσn isin realmtimesm is a switchingmatrix and σn isin 0 1 2 middot middot middot According to [16] (Remark 2

of [16]) the above system is marginally stable (convergent) if

maxσn

∥Fσn∥⋆ = 1 for n = 0 1 middot middot middot (53)

where ∥∥⋆ denotes an induced matrix norm

Let us consider the following iteration

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (54)

Now if we assume (xprimen) = Fσn foralln7 we can interpret (54)

as a discrete time switched system Consequently the above

iteration is guaranteed to converge if maxn ∥ (xprimen)∥⋆ = 1 It

is known that ||||||1 is an induced matrix norm [17] For any

xprime the matrix one norm of (xprime) is given by

||| (xprime)|||1

=||| ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1|||1

le||| ˇΩ|||1|||(I + YΩminus1)minus1|||1|||(I + YΘminus1)minus1|||1||| ˇP|||1

=||| ˇΩ|||1||| ˇP|||1 le 1 (55)

where ˇΩ = [ ˜ΩΩminus1 0(N +S )timesN ] ˇP = [ ˜P( ˜P)minus1 0N times(N +S )]

the second inequality is due to the fact that |||XY|||1 le|||X|||1|||Y|||1 [17] (page 290) the third equality is obtained

by applying Theorem 2 and the last inequality employs thefollowing facts Using the definition (73) (see Appendix A)

one can get ||| ˇΩ|||1 le 1 by applying (46) and (51) and

||| ˇP|||1 le 1 by applying (13) (41) and (51)

Thus maxn ∥ (xprimen)∥⋆ = 1 holds true and (54) is guar-

anteed to converge As we can see (54) is derived by using

(41) and (46) Thus the solution of (54) also satisfies (41)

and (46) Moreover for any initial xprime0 gt 0 since (xprimen) foralln is

positive the solution of (54) is strictly positive and [ψ micro]T =

( ˜P)minus1xprime gt 0 which is the desired result

7Since (xprimen) is the products of stochastic matrices (see the proof of Theorem 2) (xprimen) is a bounded matrix for any xprime gt 0 Thus the assumption

(xprimen) = Fσn foralln holds true

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 915

9

Once the feasible microks forallsK k=1 and λnN

n=1 are obtained

step 4 of Algorithm 1 is immediate As a result P 3 can be

solved using Algorithm I with an additional power allocation

step which will be detailed in Section VIII

C Extension of the current duality for P 3 with a total BS

power constraint

In this subsection we show the extension of the current

duality for P 3 with a total BS power constraint For this

problem we set ∆ks of (39) as ∆ks = I forallk s (ie like in

Section IV-B) Upon doing so β2 is computed directly from

the first equality of (46) (ie the bound (55) is not needed)

By summing the left and right hand sides of this equality one

can get trBBH = P max This shows that for P 3 with a

total BS power constraint problem the total BS power at step

3 of Algorithm I is satisfied Thus one can apply Algorithm

I (with the additional power allocation step) to solve the latter

problem by setting ∆ks of (39) as ∆ks = I forallk s

For other total BS power constrained WMSE-based prob-

lems the current duality based algorithm can be applied likein this subsection The details are omitted for conciseness

Note that for such problem types the duality algorithm of the

current paper has the same complexity as that of [5]

VII USE R-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

This section establishes user-wise MSE duality between

downlink and interference channels This duality is established

to solve the problems of type P 4

A User-wise MSE transfer (From downlink to interference

channel)

To apply this MSE transfer for P 4 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

Vk = β kWk Tk = Bkβ k ζ = I ∆ks = Ψ + microkI (56)

Like in Section VI substituting (56) into (8) equating ξ DLk =

ξ I k K

k=1 and after some straightforward steps we get the

following system of equations

(Y + Θ)β2

= ˜Px rArr β2

= Θminus1(I + YΘminus1)minus1 ˜Px (57)

where

Y(kl) =

983163 sumK i=1i=k ∥WH

k HH k Bi∥2F for k = l

minus∥WH l H

H l Bk∥2F for k = l

(58)

Θ = diag(θ1 middot middot middot θK ) β2

= [β 21 middot middot middot β 2K ]T

˜P = [ macrP P]

with θk = trWH k RnkWk macrP isin realS timesN = |BH |2 P =

diag(macr p1 middot middot middot macr pK ) By applying Theorem 2 it can be shown

that β kK k=1 of (57) are strictly positive Thus step 1 of

Algorithm I can be performed using (57) We perform step 2

of Algorithm I by updating tks using MMSE receiver as

tks =(K

991761i=1

β iHiWiWH i H

H i + Ψ + microkI)minus1Hkwksβ k (59)

B User-wise MSE transfer (From interference to downlink

channel)

For a given user MSE in the interference channel with

ζ = I we can achieve the same MSE in the downlink channel

by using nonzero scaling factors ( ˜β kK k=1) that satisfy

Bk = ˜β kTk

Wk = Vk ˜β k (60)

Here we also use the notations B and W to differentiate

with the precoder and decoder matrices used in Section VII-

A By substituting (60) into ξ DLk (with B=B W=W) and

then equating the resulting user-wise MSE with that of the

interference channel (7) and after some steps ˜β kK k=1 are

determined as

(I + ˇYˇΩminus1

) ˇΩ ˜β2

= [trVH 1 Rn1V1 middot middot middot trVH

K RnK VK ]T

rArr ˜β2

= ˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px (61)

where the second equality follows from

(57) ˜β2

= [ ˜β 21

middot middot middot ˜β 2K

]T Ωprime =diag(trTH

1 ΨT1 middot middot middot trTH K ΨTK ) Ω =

diag(micro1trTH 1 T1 middot middot middot microK trTH

K TK ) ˇΩ = Ωprime + Ω

By applying Theorem 2 it can be shown that ˜β kK k=1 are

strictly positive for ψn gt 0N n=1 and microk gt 0K

k=1 Like in

Section VI-B the power constraint of the nth BS antenna

and kth user can thus be expressed as

xprime ge ˆΩ ˜β2

= ˆΩˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px

= (xprime)xprime (62)

where P = diag(ˆ p1 middot middot middot ˆ pK ) ˆP = blkdiag(P ˆP) ˆΩ =

[ΩT

ΩT

]T

xprime

= ˜P[ψ micro]

T

and (xprime

) = ˆΩˇΩ

minus1

(I +ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜P( ˆP)minus1 Like in Section VI-B it

can be shown that there exists a feasible xprime gt 0 that satisfy

(62) and can be obtained iteratively by

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (63)

By initializing xprime0 gt 0 the solution of the above iteration

is always positive Consequently λn gt 0N n=1 and microk gt

0K k=1 holds true Once the feasible microkK

k=1 and λnN n=1

are obtained step 4 of Algorithm 1 is straightforward As a

result P 4 can be solved using Algorithm I with the additional

power allocation step of Section VIII

VIII GENERALIZED AND IMPROVED VERSION OF

Algorithm I

From the discussions of Sections IV - VII one can

understand that each iteration of Algorithm I gives a non

increasing sequence of symbol (user) WMSEWSMSE As can

be seen from Section III the objective of P 1(P 2) is just to

minimize the total WSMSE of all symbols (users) whereas

the objective of P 3(P 4) is to simultaneously minimize and

balance the WMSE of all symbols (users) Thus Algorithm

I is appropriate to solve P 1(P 2) of the current paper For

P 3(P 4) although each iteration of Algorithm I is able to

provide a non increasing sequence of symbol (user) WMSE

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1015

10

(ie minimizes the maximum WMSE of all symbols (users))

each iteration of this algorithm is not able to guarantee

balanced WMSEs of all symbols (users) On the other hand

for an MSE constrained total BS power minimization problem

(for example P 7 in Section IX) an iterative algorithm that

can provide a non increasing sequence of total BS power is

required This shows that Algorithm I also can not solve the

latter problem In the following we address the drawbacks of Algorithm I just by including a power allocation step into

Algorithm I as explained below

In [8] for fixed transmit and receive filters the power

allocation parts of total BS power constrained MSE-based

problems have been formulated as GPs by employing the

approach and system model of [1] under the assumption that

all symbols are strictly active8 For this assumption in [8] we

show that the system model of [1] is appropriate to solve any

kind of total BS power constrained MSE-based problems using

duality approach (alternating optimization) This motivates us

to utilize the system model of [1] in the downlink channel

only and then include the power allocation step (ie GP) into

Algorithm I Towards this end we decompose the precoders

and decoders of the downlink channel as

Bk =GkP12k Wk = UkαkP

minus12k forallk (64)

where Pk = diag( pk1 middot middot middot pkS k) isin realS ktimesS k Gk =[gk1 middot middot middot gkS k ] isin CN timesS k Uk = [uk1 middot middot middot ukS k ] isin CM ktimesS k

and αk = diag(αk1 middot middot middot αkS k) isin realS ktimesS k are the transmit

power unity norm transmit filter unity norm receive filter and

receiver scaling factor matrices of the kth user respectively

ie gH ksgks = uH

ksuks = 1 forallsK k=1

By employing (64) and stacking ξ = [ξ DL11 middot middot middot ξ DL

KS K]T

= [ξ DL1 middot middot middot ξ DL

S ]T = [ξ DLl S

l=1]T the l th downlink symbol

MSE can be expressed as (see [1] and [10] for more detailsabout (64) and the above descriptions)

ξ DLl = pminus1l [(D + α2ΦT )p]l + pminus1l α2

l uH l Rnul (65)

where

Φ(lj) =

983163 |gH

l Huj |2 for l = j0 for l = j

(66)

D(ll) =α2l |gH

l Hul|2 minus 2αlreal(uH l H

H gl) + 1 (67)

1 le l( j) le S P = blkdiag(P1 middot middot middot PK ) =diag( p1 middot middot middot pS ) p = [ p1 middot middot middot pS ]

T G = [G1 middot middot middot GK ] =[g1 middot middot middot gS ] U = blkdiag(U1 middot middot middot UK ) = [u1 middot middot middot uS ]

and α = blkdiag(α1 middot middot middot αK ) = diag(α1 middot middot middot αS ) with∥gl∥2 = ∥ul∥2 = 1 Using (65) for fixed GU and α the

power allocation part of P 1 can be formulated as

min plSl=1

S 991761l=1

ηlξ DLl st ς T

np le ˘ pn pl le ˘ pl foralln l (68)

where ς T n isin real1timesS = |[G(ni)|2S

i=1 [η1 middot middot middot ηS ]T =

[η11 middot middot middot ηKS K ]T and [ ˘ pl middot middot middot ˘ pS ]T = [ ˘ p11 middot middot middot ˘ pKS K ]T As

ξ DLl is a posynomial (where plS

l=1 are the variables) (68)

8Note that this assumption is not always true for all MSE-based problemsHowever as mentioned in [1] in practice replacing zero powers by a smallvalue will not affect the overall optimization Due to this reason we replace

zero powers by 10minus6 in the simulation section

is a GP for which global optimality is guaranteed Thus it

can be efficiently solved using interior point methods with a

worst-case polynomial-time complexity [18]

For fixed GU and α the power allocation parts of

P 2 minus P 4 can be formulated as GPs like in P 1 Our duality

based algorithm for each of these problems including the

power allocation step is summarized in Algorithm II

Algorithm II

Initialization Like in Algorithm I

Repeat Interference channel

1) For P 1 and P 2 set V = WT = B (ie β = β = 1)

then compute ψn microks forallksn and ψn microk forallk nusing (25) and (38) respectively For P 3 and P 4 first

compute ψn microks forallksn and ψn microk forallk n using

(54) and (63) respectively then transfer each symbol

and user MSE from downlink to interference channels

by (39) and (56) respectively

2) Update the MMSE receivers of the interference channel

for P 1 P 2 P 3 and P 4 using (19) (32) (44) and (59)

respectivelyDownlink channel

3) Transfer the MSE (weighted sum user or symbol MSE)

from interference to downlink channel using (20) (33)

(45) and (60) for P 1 P 2 P 3 and P 4 respectively

4) For each of the problems P 1 minus P 4 decompose the

precoder and decoder matrices of each user as in (64)

Then formulate and solve the GP power allocation part

For example the power allocation part of P 1 can be

expressed in GP form as (68)

5) For each of the problems P 1minusP 4 by keeping PkK k=1

constant update the receive filters UkK k=1 and scal-

ing factors αkK

k=1 by applying downlink MMSE

receiver approach ie Ukαk = (HH k GPGH Hk +

Rnk)minus1HH k GkPkK

k=1 Note that in these expressions

αkK k=1 are chosen such that each column of UkK

k=1

has unity norm Then compute BkWkK k=1 by (64)

Until convergence

Convergence It can be shown that at each iteration

of this algorithm the objective function of each of the

problems P 1 - P 4 is non-increasing [4] [7] [19] Thus

the above iterative algorithm is convergent However

since P 1 - P 4 are non-convex this iterative algorithm

is not guaranteed to converge to the global optimum

In this algorithm we stop iteration (ie our convergence

condition) when the difference between the objectivefunctions in two consecutive iterations is smaller than

some small value ϵ (we use ϵ = 10minus6 for the simulation)

Computational complexity As can be seen from this

algorithm when we increase the number of users andor

(BS andor MS antennas) the number and size of

optimization variables increase Because of this the

computational complexity of Algorithm II increases as

K andor N andor M increases However studying the

complexity of this algorithm as a function of K N and

M needs effort and time And such a task is beyond the

scope of this work and is an open research topic

The power allocation step of Algorithm II has thus the

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1115

11

following benefits (1) For BS power constrained WSMSE

minimization problems this step improves the convergence

speed of Algorithm II compared to that of Algorithm I9 (for

example in P 1 minus P 2) The degree of improvement depends on

different parameters (for example Hk ∆ks forallk s etc) Thus

the theoretical comparison of these two algorithms in terms of

convergence speed requires time and effort And this task is

beyond the scope of this work and it is an open research topic(2) For symbol-wise (user-wise) WMSE balancing problems

this step helps to balance the WMSE of all symbols (users)

(for example in P 3 minus P 4) (3) For MSE constrained total

BS power minimization problems this step ensures a non

increasing total BS power at each iteration of Algorithm II

IX APPLICATION OF THE PROPOSED DUALITY BASED

ALGORITHM FOR OTHER PROBLEMS

A MSE based problem with entry-wise power constraint

The symbol-wise WSMSE minimization constrained with

entry wise power ie bH

ksnb

ksn le macr p

ksn forallksn problem is

formulated as

P 5 minBkWkKk=1

K 991761k=1

S k991761s=1

ηksξ DLks st bH

ksnbksn le macr pksn (69)

It can be shown that this problem can be solved by Algorithm

II with ∆ks = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1

B Weighted sum rate optimization constrained with per an-

tenna and symbol power problem

By employing the approach of [11] (see (16) of [11]) one

can equivalently express the weighted sum rate maximizationconstrained with per antenna and symbol power problem as

P 6 (70)

minτ ksν ksbkswksforallsK

k=1

K 991761k=1

S k991761s=1

θks1

τ ksν γ ks

ks +K 991761

k=1

S k991761s=1

ηksξ DLks

st [BBH ](nn) le ˘ pnbH ksbks le ˘ pks

K prodk=1

S kprods=1

ν ks = 1 τ ks gt 0

where 0 lt ωks lt 1 forallsK k=1 are the rate weighting factors

for all symbols ηks = τ microksks γ ks = 11minusωks

microks = 1ωks

minus 1 and

macrθks = ωksmicro

(1minusωks)

ks For fixed τ ks ν ks foralls

K

k=1 the aboveoptimization problem has the same mathematical structure

as that of P 1 Thus by keeping τ ks ν ks forallsK k=1 constant

bkswks forallsK k=1 can be optimized by applying the MSE

duality discussed in Section IV Moreover τ ks ν ks forallsK k=1

and the power allocation part of the above problem can be

optimized by a GP method like in (25) of [20] Consequently

we can apply Algorithm II to solve (70) The detailed expla-

nations are omitted for conciseness The following problems

9This is at the expense of additional computation However as mentionedin [1] (see Appendix A of [1]) a small desktop computer can solve a GP of 100 variables and 10000 constraints by standard interior point method under aminute Thus we believe that the complexity of Algorithm I and Algorithm

II are almost the same

can also be solved by simple modification of Algorithm II

P 7 minBkWk

Kk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

SINRks ge ϱks forallnks

equiv minBkWkKk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

ξ DLks le (1 + ϱks)minus1 forallnks

P 8 maxBkWk

Kk=1

min Rks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

equiv minBkWkKk=1

max ξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

where SINRks(Rks) is the SINR (rate) of the kth user sth

symbol and we use the fact that Rks = log(1 + SINRks)and ξ DL

ks = (1 + SINRks)minus1 [1] It is clearly seen that the

application of Algorithm II is not limited to the problems of

this paper

Note that under imperfect channel state information (CSI)

condition the stochastic robust design versions of P 1 - P 5 can

be solved like in [10] However to the best of our knowledge

the relationship between rate (SINR) and MSE is not known

when the CSI is imperfect [7] Hence solving the rate (SINR)-

based robust design problems (for example robust versions of

P 6 - P 8) by our duality approach is an open problem

X SIMULATION R ESULTS

In this section we present simulation results for P 1 minus P 4

All of our simulation results are averaged over 100 randomly

chosen channel realizations We set K = 2 N = 4 and

M k = S k = 2 ηks = ρks = ηk = ρk = 1 forallsK k=1

It is assumed that Rn1 = σ21IM 1 Rn2 = σ2

2IM 2 and

σ22 = 2σ2

1 The maximum power of each BS antenna is set

to ˘ pn = 25mW N n=1 And the maximum power allocated

to each symbol and user are set to ˘ pks

= 25mW forallsK

k=1and ˆ pk = 5mW K k=1 respectively For better exposition we

define the Signal-to-noise ratio (SNR) as P maxKσ2av and it

is controlled by varying σ2av where P max = 10mW is the

total maximum BS power and σ2av = (σ2

1 + σ22)2 We also

compare Algorithm II and the algorithm in [2]10

Note that the algorithm in [2] is designed for coordinated

BS systems scenario And the iterative algorithm of [2] is

based on the per BS power constraint However according

to [2] and [21] B coordinated BS systems each with Z

10As will be clear in the sequel the proposed algorithm and the algorithmof [2] may not utilize the entire 10mW for all noise levels Thus the afore-mentioned SNR can be considered as the maximum SNR of the transmitted

signal

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1215

12

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

Fig 2 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of WSMSE for [top] P 1 [bottom] P 2

antennas can be treated as one multiuser MIMO system with

BZ antennas Thus when Z = 1 the considered problem has

exactly the same structure as that of [2] To the best of our

knowledge there is no other general linear algorithm that cansolve the problem types P 1 minus P 4 On the other hand in all

problems since there are more than one power constraints (ie

per antenna and symbol (user) powers) all power constraints

may not be active at the optimal solution Due to these reasons

we compare Algorithm II and the algorithm in [2] both in

terms of the achieved MSE (ie minimized MSE) and total

utilized BS power at the achieved MSE

A Simulation results for problems P 1 minus P 2

In this subsection we compare the performance of our

proposed algorithm with that of [2] As can be seen from Fig

2 the proposed algorithm and the algorithm in [2] achievethe same symbol-wise and user-wise WSMSEs Next we plot

the total utilized powers at the BS to achieve these WSMSEs

which is shown in Fig 3 From these two figures one can see

that to achieve the same WSMSE the proposed duality based

iterative algorithm requires less total BS power than that of

[2] This scenario fits to that of [10] and [19] where the sum

MSE minimization constrained with a per BS antenna power

problem has been examined by duality approach

B Simulation results for problems P 3 minus P 4

Like in the above subsection here we compare the per-

formance of our proposed algorithm with that of [2] For

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 3 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 1 [bottom] P 2

For this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

10 15 20 25 30 350

005

01

015

02

025

SNR (dB)

M a x i m u m s y m b o l M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

005

01

015

02

025

03

035

04

045

05

SNR (dB)

M a x i m u m u s e r M S E

Algorithm II

Algorithm in [2]

Fig 4 Comparison of the proposed algorithm (Algorithm II) and that of

in [2] in terms of maximum achieved MSE for [top] P 3 [bottom] P 4

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 7: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 715

7

In this precoderdecoder transformation we use the notationsB and W to differentiate from the precoder and decoder

matrices used in Section V-A By substituting (33) into ξ DLwu

(with B=B W=W) then equating the resulting user-wise

WSMSE with that of the interference channel (ξ I wu) and after

simple manipulations we get

˜β 2

=

β 2τ sumN n=1 ψntH

n tn +sumK

k=1 microktrTH k Tk (34)

where tH n is the nth row of the MMSE matrix T (32) The

power constraints of each BS antenna and user (ie step 3 of

Algorithm I) in the downlink channel can be expressed as

ψn ge ˇf n and microk ge f k forallk (35)

where

ˇf n =β 2τ

˘ pn

ψntH n

tnsumN i=1 ψit

H i

ti +sumK

i=1 microitrTH i Ti

(36)

f k =β 2τ

ˆ pk

microktrTH k Tk

sumN i=1 ψitH i ti +sumK

i=1 microitrTH i Ti

(37)

For given β tH n

tnN n=1 and trTH

k TkK k=1 one can show

that there exist ψnN n=1 and microkK

k=1 which satisfy

ψn = ˇf n and microk = f k forallnk (38)

The solution of (38) can be obtained exactly like that of (25)

As ˘ pn ge ˇ pnN n=1 and ˆ pk ge ˜ pkK

k=1 the latter solution also

satisfies (31) Thus P 2 can be solved using Algorithm I

V I SYMBOL-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

In this section we establish the symbol-wise MSE duality

between downlink and interference channels If all symbols

are active this duality can be applied to solve MSE based

problems However as will be clear later this duality requires

more computation compared to the duality of Sections IV and

V Thus we propose this duality to be employed for problems

like in P 3 since this problem maintains all symbols active and

can not be solved by the duality in Sections IV and V

A Symbol-wise MSE transfer (From downlink to interference

channel)

To apply this duality for P 3 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

vks = β kswks tks = bksβ ks ζ = I

∆ks = Ψ + microksIN forallks (39)

Substituting (39) into (7) and ξ DLks = ξ I

ks forallsK k=1 yields

wH ks(HH

k

K 991761i=1

S i991761j=1

bijbH ijHk + Rnk)wks minus wH

ksHH k bks

minus bH ksHkwks + 1 =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1

β 2ijHiwijwH ijH

H i +

Ψ + microksIN )bks minus bH

ksHkwks minus wH

ksHH

k bks + 1 forallks

It implies

wH ks(HH

k

K 991761i=1

S i991761j=1(ij)=(ks)

bijbH ijHk + Rnk)wks =

1

β 2ks

bH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijHiwijwH ij H

H i + Ψ+

microksIN )bks forallks (40)

Collecting the above expression for all k and s gives

(Y + Θ)β2

=[a11 middot middot middot a1S 1 middot middot middot aK 1 middot middot middot aKS K ]T = ˜Px

rArr β2

=Θminus1(I + YΘminus1)minus1 ˜Px (41)

where β2

= [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T

Θ = diag(θ11 middot middot middot θ1K 1 middot middot middot θK 1 middot middot middot θKS K )

aks = bH ksΨbks + microksb

H ksbks ˜P = [ macrP P] and

Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

θks = wH ksRnkwks macrP isin realS timesN = |BH |2

P = diag(macr p11 middot middot middot macr p1S 1 middot middot middot macr pK 1 middot middot middot macr pKS K )

yks = [minus|bH ksH1w11|2 middot middot middot zks middot middot middot minus|bH

ksHK wK 1| middot middot middot minus |bH

ksHK wKS K |]T and zks =

wH ksH

H k

sumK i=1

sumS ij=1(ij)=(ks) bijb

H ijHkwks Next we

examine two important properties of (I + YΘminus1)minus1 To this

end we examine the following Theorem

Theorem 2 Let A isin realntimesn and A(ij)(i=j) le 0 1 lei( j) le n If the diagonal elements of A are A(ii) = 1 minussumn

j=1j=i A(ji) then

Property 1 Aminus1 ge 0 (42)

Property 2 |||Aminus1|||1 = 1 (43)

where () ge 0 and ||||||1 denote matrix non-negativity and

one norm respectively

Proof See Appendix A

According to the first property of Theorem 2 if θks gt0 forallsK

k=15 the inverse of (I + YΘminus1) exists and it has

nonnegative entries Consequently for any positive ψnN n=1

and microks forallsK k=1 β ks forallsK

k=1 of (41) are strictly positive6

Now by selecting ψnN n=1 and microks forallsK

k=1 such that (41) is

fulfilled we can transfer the MSE of each symbol from down-

link to interference channel ensuring ξ DLks = ξ I 1

ks forallsK k=1

where ξ I 1ks is the MSE of the kth user sth symbol at step 1

of Algorithm I Here we should also select ψnN n=1 and

microks forallsK k=1 such that the power constraint of P 3 at step 3

of Algorithm I is satisfied To this end we examine the steps(2) and (3) of this algorithm

Like in Section IV we perform step 2 of Algorithm 1 by

updating tks using MMSE receiver as

tks =(Γc + ∆ks)minus1Hkvksζ ks (44)

=(

K 991761i=1

S i991761j=1

β ijHiwijwH ijH

H i + Ψ + microksI)minus1Hkwksβ ks

where the second equality is obtained from (39) The above

expression shows that by choosing microks gt 0 forallsK k=1 ψn gt

5For P 3 wH ksRnkwks gt 0forallsK

k=1 is always true

6Note that the application of (43) will be clear in the sequel (see (55))

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 815

8

0N n=1 we ensure (

sumK i=1

sumS ij=1 β ijHiwijw

H ij H

H i + Ψ +

microksI)minus1 exists Next we transfer the symbol-wise MSE from

interference to downlink channel by satisfying the power

constraint of P 3 (ie we perform step 3)

B Symbol-wise MSE transfer (From interference to downlink

channel)

For a given symbol MSE in the interference channel with

ζ = I we can achieve the same symbol MSE in the downlink

channel by using a nonzero scaling factor (β ks) which satisfies

bks = β kstks wks = vksβ ks (45)

Here we use the notations B and W to differentiate with

the precoder and decoder matrices used in Section VI-A By

substituting (45) into ξ DLks (with B=B W=W) then equating

the resulting symbol MSE with that of the interference channel

(7) and after some straightforward steps we get

1β 2ksvH ks(HH k

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijtijtH ijHk + Rnk)vks =

tH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

HivijvH ij H

H i + Ψ + microksI)tks forallks

By collecting the above equalities for all k and s β ks forallsK k=1

can be determined by

(Y + Ω)β2 =[vH 11Rn1v11 middot middot middot vH

1S 1Rn1v1S 1

middot middot middot vH K 1RnK vK 1 middot middot middot vH

KS KRnK vKS K ]T

=Θβ2

= ΘΘminus1(I + YΘminus1)minus1 ˜Px

rArr β2 =(Y + Ω)minus1(I + YΘminus1)minus1 ˜Px

=Ωminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜Px (46)

where the third equality follows from (41)

β2 = [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T Ω =diag(tH

11Ψt11 middot middot middot tH 1S 1

Ψt1S 1 middot middot middot tH K 1ΨtK 1 middot middot middot

tH KS K

ΨtKS K ) Ω = diag(micro11tH 11t11 middot middot middot micro1S 1t

H 1S 1

t1S 1 middot middot middot

microK 1tH K 1tK 1 middot middot middot microKS Kt

H KS K

tKS K ) Ω = Ω + Ω

and Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

yks = [minus|tH 11H1vks|2 middot middot middot zks middot middot middot minus|tH

K 1HK vks|2 middot middot middot minus |tH

KS KHK vks|2]T and zks =

tH kssum

K i=1sum

S ij=1(ij)

=(ks)Hivijv

H ij H

H i tks By applying

Theorem 2 it can be shown that β ks forallsK k=1 are strictly

positive for ψn gt 0N n=1 and microks gt 0 forallsK

k=1 The power

constraints of the nth BS antenna and kth user sth symbol

are given by

bH

nbn = tH

n Υtn le ˘ pn foralln (47)bH ksbks = β 2kst

H kstks le ˘ pks forallk s (48)

where Υ = diag(β 211 middot middot middot β 1S 1 middot middot middot β 2K 1 middot middot middot β KS K ) Mul-

tiplying both sides of (47) by ψn and stacking the resulting

inequality for all n yields

˘Pψ ge

˜Ωβ

2

(49)

where P = diag(˘ p1 middot middot middot ˘ pN ) and Ω = Ψ|T|2 Like in the

above expression by multiplying both sides of (48) with microks

and collecting the resulting inequality for all k and s the

power constraints (48) can be expressed as

macrPmicro ge Ωβ2 (50)

where macrP = diag(˘ p11 middot middot middot ˘ p1S 1 middot middot middot ˘ pK 1 middot middot middot ˘ pKS K ) By

employing β2 of (46) (49) and (50) can be combined as

xprime ge ˜Ωβ2 = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1xprime

= (xprime)xprime (51)

where ˜P = blkdiag(P macrP) ˜Ω = [ΩT ΩT ]T xprime = ˜

P[ψ micro]T

and (xprime) = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1

Next we show that there exists xprime gt 0 such that (51) is

satisfied Towards this end we consider the following discrete-

time switched system [16]

xn+1 = Fσnxn for n = 0 1 2 middot middot middot (52)

where x isin realmtimes1 is a state Fσn isin realmtimesm is a switchingmatrix and σn isin 0 1 2 middot middot middot According to [16] (Remark 2

of [16]) the above system is marginally stable (convergent) if

maxσn

∥Fσn∥⋆ = 1 for n = 0 1 middot middot middot (53)

where ∥∥⋆ denotes an induced matrix norm

Let us consider the following iteration

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (54)

Now if we assume (xprimen) = Fσn foralln7 we can interpret (54)

as a discrete time switched system Consequently the above

iteration is guaranteed to converge if maxn ∥ (xprimen)∥⋆ = 1 It

is known that ||||||1 is an induced matrix norm [17] For any

xprime the matrix one norm of (xprime) is given by

||| (xprime)|||1

=||| ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1|||1

le||| ˇΩ|||1|||(I + YΩminus1)minus1|||1|||(I + YΘminus1)minus1|||1||| ˇP|||1

=||| ˇΩ|||1||| ˇP|||1 le 1 (55)

where ˇΩ = [ ˜ΩΩminus1 0(N +S )timesN ] ˇP = [ ˜P( ˜P)minus1 0N times(N +S )]

the second inequality is due to the fact that |||XY|||1 le|||X|||1|||Y|||1 [17] (page 290) the third equality is obtained

by applying Theorem 2 and the last inequality employs thefollowing facts Using the definition (73) (see Appendix A)

one can get ||| ˇΩ|||1 le 1 by applying (46) and (51) and

||| ˇP|||1 le 1 by applying (13) (41) and (51)

Thus maxn ∥ (xprimen)∥⋆ = 1 holds true and (54) is guar-

anteed to converge As we can see (54) is derived by using

(41) and (46) Thus the solution of (54) also satisfies (41)

and (46) Moreover for any initial xprime0 gt 0 since (xprimen) foralln is

positive the solution of (54) is strictly positive and [ψ micro]T =

( ˜P)minus1xprime gt 0 which is the desired result

7Since (xprimen) is the products of stochastic matrices (see the proof of Theorem 2) (xprimen) is a bounded matrix for any xprime gt 0 Thus the assumption

(xprimen) = Fσn foralln holds true

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 915

9

Once the feasible microks forallsK k=1 and λnN

n=1 are obtained

step 4 of Algorithm 1 is immediate As a result P 3 can be

solved using Algorithm I with an additional power allocation

step which will be detailed in Section VIII

C Extension of the current duality for P 3 with a total BS

power constraint

In this subsection we show the extension of the current

duality for P 3 with a total BS power constraint For this

problem we set ∆ks of (39) as ∆ks = I forallk s (ie like in

Section IV-B) Upon doing so β2 is computed directly from

the first equality of (46) (ie the bound (55) is not needed)

By summing the left and right hand sides of this equality one

can get trBBH = P max This shows that for P 3 with a

total BS power constraint problem the total BS power at step

3 of Algorithm I is satisfied Thus one can apply Algorithm

I (with the additional power allocation step) to solve the latter

problem by setting ∆ks of (39) as ∆ks = I forallk s

For other total BS power constrained WMSE-based prob-

lems the current duality based algorithm can be applied likein this subsection The details are omitted for conciseness

Note that for such problem types the duality algorithm of the

current paper has the same complexity as that of [5]

VII USE R-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

This section establishes user-wise MSE duality between

downlink and interference channels This duality is established

to solve the problems of type P 4

A User-wise MSE transfer (From downlink to interference

channel)

To apply this MSE transfer for P 4 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

Vk = β kWk Tk = Bkβ k ζ = I ∆ks = Ψ + microkI (56)

Like in Section VI substituting (56) into (8) equating ξ DLk =

ξ I k K

k=1 and after some straightforward steps we get the

following system of equations

(Y + Θ)β2

= ˜Px rArr β2

= Θminus1(I + YΘminus1)minus1 ˜Px (57)

where

Y(kl) =

983163 sumK i=1i=k ∥WH

k HH k Bi∥2F for k = l

minus∥WH l H

H l Bk∥2F for k = l

(58)

Θ = diag(θ1 middot middot middot θK ) β2

= [β 21 middot middot middot β 2K ]T

˜P = [ macrP P]

with θk = trWH k RnkWk macrP isin realS timesN = |BH |2 P =

diag(macr p1 middot middot middot macr pK ) By applying Theorem 2 it can be shown

that β kK k=1 of (57) are strictly positive Thus step 1 of

Algorithm I can be performed using (57) We perform step 2

of Algorithm I by updating tks using MMSE receiver as

tks =(K

991761i=1

β iHiWiWH i H

H i + Ψ + microkI)minus1Hkwksβ k (59)

B User-wise MSE transfer (From interference to downlink

channel)

For a given user MSE in the interference channel with

ζ = I we can achieve the same MSE in the downlink channel

by using nonzero scaling factors ( ˜β kK k=1) that satisfy

Bk = ˜β kTk

Wk = Vk ˜β k (60)

Here we also use the notations B and W to differentiate

with the precoder and decoder matrices used in Section VII-

A By substituting (60) into ξ DLk (with B=B W=W) and

then equating the resulting user-wise MSE with that of the

interference channel (7) and after some steps ˜β kK k=1 are

determined as

(I + ˇYˇΩminus1

) ˇΩ ˜β2

= [trVH 1 Rn1V1 middot middot middot trVH

K RnK VK ]T

rArr ˜β2

= ˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px (61)

where the second equality follows from

(57) ˜β2

= [ ˜β 21

middot middot middot ˜β 2K

]T Ωprime =diag(trTH

1 ΨT1 middot middot middot trTH K ΨTK ) Ω =

diag(micro1trTH 1 T1 middot middot middot microK trTH

K TK ) ˇΩ = Ωprime + Ω

By applying Theorem 2 it can be shown that ˜β kK k=1 are

strictly positive for ψn gt 0N n=1 and microk gt 0K

k=1 Like in

Section VI-B the power constraint of the nth BS antenna

and kth user can thus be expressed as

xprime ge ˆΩ ˜β2

= ˆΩˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px

= (xprime)xprime (62)

where P = diag(ˆ p1 middot middot middot ˆ pK ) ˆP = blkdiag(P ˆP) ˆΩ =

[ΩT

ΩT

]T

xprime

= ˜P[ψ micro]

T

and (xprime

) = ˆΩˇΩ

minus1

(I +ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜P( ˆP)minus1 Like in Section VI-B it

can be shown that there exists a feasible xprime gt 0 that satisfy

(62) and can be obtained iteratively by

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (63)

By initializing xprime0 gt 0 the solution of the above iteration

is always positive Consequently λn gt 0N n=1 and microk gt

0K k=1 holds true Once the feasible microkK

k=1 and λnN n=1

are obtained step 4 of Algorithm 1 is straightforward As a

result P 4 can be solved using Algorithm I with the additional

power allocation step of Section VIII

VIII GENERALIZED AND IMPROVED VERSION OF

Algorithm I

From the discussions of Sections IV - VII one can

understand that each iteration of Algorithm I gives a non

increasing sequence of symbol (user) WMSEWSMSE As can

be seen from Section III the objective of P 1(P 2) is just to

minimize the total WSMSE of all symbols (users) whereas

the objective of P 3(P 4) is to simultaneously minimize and

balance the WMSE of all symbols (users) Thus Algorithm

I is appropriate to solve P 1(P 2) of the current paper For

P 3(P 4) although each iteration of Algorithm I is able to

provide a non increasing sequence of symbol (user) WMSE

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1015

10

(ie minimizes the maximum WMSE of all symbols (users))

each iteration of this algorithm is not able to guarantee

balanced WMSEs of all symbols (users) On the other hand

for an MSE constrained total BS power minimization problem

(for example P 7 in Section IX) an iterative algorithm that

can provide a non increasing sequence of total BS power is

required This shows that Algorithm I also can not solve the

latter problem In the following we address the drawbacks of Algorithm I just by including a power allocation step into

Algorithm I as explained below

In [8] for fixed transmit and receive filters the power

allocation parts of total BS power constrained MSE-based

problems have been formulated as GPs by employing the

approach and system model of [1] under the assumption that

all symbols are strictly active8 For this assumption in [8] we

show that the system model of [1] is appropriate to solve any

kind of total BS power constrained MSE-based problems using

duality approach (alternating optimization) This motivates us

to utilize the system model of [1] in the downlink channel

only and then include the power allocation step (ie GP) into

Algorithm I Towards this end we decompose the precoders

and decoders of the downlink channel as

Bk =GkP12k Wk = UkαkP

minus12k forallk (64)

where Pk = diag( pk1 middot middot middot pkS k) isin realS ktimesS k Gk =[gk1 middot middot middot gkS k ] isin CN timesS k Uk = [uk1 middot middot middot ukS k ] isin CM ktimesS k

and αk = diag(αk1 middot middot middot αkS k) isin realS ktimesS k are the transmit

power unity norm transmit filter unity norm receive filter and

receiver scaling factor matrices of the kth user respectively

ie gH ksgks = uH

ksuks = 1 forallsK k=1

By employing (64) and stacking ξ = [ξ DL11 middot middot middot ξ DL

KS K]T

= [ξ DL1 middot middot middot ξ DL

S ]T = [ξ DLl S

l=1]T the l th downlink symbol

MSE can be expressed as (see [1] and [10] for more detailsabout (64) and the above descriptions)

ξ DLl = pminus1l [(D + α2ΦT )p]l + pminus1l α2

l uH l Rnul (65)

where

Φ(lj) =

983163 |gH

l Huj |2 for l = j0 for l = j

(66)

D(ll) =α2l |gH

l Hul|2 minus 2αlreal(uH l H

H gl) + 1 (67)

1 le l( j) le S P = blkdiag(P1 middot middot middot PK ) =diag( p1 middot middot middot pS ) p = [ p1 middot middot middot pS ]

T G = [G1 middot middot middot GK ] =[g1 middot middot middot gS ] U = blkdiag(U1 middot middot middot UK ) = [u1 middot middot middot uS ]

and α = blkdiag(α1 middot middot middot αK ) = diag(α1 middot middot middot αS ) with∥gl∥2 = ∥ul∥2 = 1 Using (65) for fixed GU and α the

power allocation part of P 1 can be formulated as

min plSl=1

S 991761l=1

ηlξ DLl st ς T

np le ˘ pn pl le ˘ pl foralln l (68)

where ς T n isin real1timesS = |[G(ni)|2S

i=1 [η1 middot middot middot ηS ]T =

[η11 middot middot middot ηKS K ]T and [ ˘ pl middot middot middot ˘ pS ]T = [ ˘ p11 middot middot middot ˘ pKS K ]T As

ξ DLl is a posynomial (where plS

l=1 are the variables) (68)

8Note that this assumption is not always true for all MSE-based problemsHowever as mentioned in [1] in practice replacing zero powers by a smallvalue will not affect the overall optimization Due to this reason we replace

zero powers by 10minus6 in the simulation section

is a GP for which global optimality is guaranteed Thus it

can be efficiently solved using interior point methods with a

worst-case polynomial-time complexity [18]

For fixed GU and α the power allocation parts of

P 2 minus P 4 can be formulated as GPs like in P 1 Our duality

based algorithm for each of these problems including the

power allocation step is summarized in Algorithm II

Algorithm II

Initialization Like in Algorithm I

Repeat Interference channel

1) For P 1 and P 2 set V = WT = B (ie β = β = 1)

then compute ψn microks forallksn and ψn microk forallk nusing (25) and (38) respectively For P 3 and P 4 first

compute ψn microks forallksn and ψn microk forallk n using

(54) and (63) respectively then transfer each symbol

and user MSE from downlink to interference channels

by (39) and (56) respectively

2) Update the MMSE receivers of the interference channel

for P 1 P 2 P 3 and P 4 using (19) (32) (44) and (59)

respectivelyDownlink channel

3) Transfer the MSE (weighted sum user or symbol MSE)

from interference to downlink channel using (20) (33)

(45) and (60) for P 1 P 2 P 3 and P 4 respectively

4) For each of the problems P 1 minus P 4 decompose the

precoder and decoder matrices of each user as in (64)

Then formulate and solve the GP power allocation part

For example the power allocation part of P 1 can be

expressed in GP form as (68)

5) For each of the problems P 1minusP 4 by keeping PkK k=1

constant update the receive filters UkK k=1 and scal-

ing factors αkK

k=1 by applying downlink MMSE

receiver approach ie Ukαk = (HH k GPGH Hk +

Rnk)minus1HH k GkPkK

k=1 Note that in these expressions

αkK k=1 are chosen such that each column of UkK

k=1

has unity norm Then compute BkWkK k=1 by (64)

Until convergence

Convergence It can be shown that at each iteration

of this algorithm the objective function of each of the

problems P 1 - P 4 is non-increasing [4] [7] [19] Thus

the above iterative algorithm is convergent However

since P 1 - P 4 are non-convex this iterative algorithm

is not guaranteed to converge to the global optimum

In this algorithm we stop iteration (ie our convergence

condition) when the difference between the objectivefunctions in two consecutive iterations is smaller than

some small value ϵ (we use ϵ = 10minus6 for the simulation)

Computational complexity As can be seen from this

algorithm when we increase the number of users andor

(BS andor MS antennas) the number and size of

optimization variables increase Because of this the

computational complexity of Algorithm II increases as

K andor N andor M increases However studying the

complexity of this algorithm as a function of K N and

M needs effort and time And such a task is beyond the

scope of this work and is an open research topic

The power allocation step of Algorithm II has thus the

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1115

11

following benefits (1) For BS power constrained WSMSE

minimization problems this step improves the convergence

speed of Algorithm II compared to that of Algorithm I9 (for

example in P 1 minus P 2) The degree of improvement depends on

different parameters (for example Hk ∆ks forallk s etc) Thus

the theoretical comparison of these two algorithms in terms of

convergence speed requires time and effort And this task is

beyond the scope of this work and it is an open research topic(2) For symbol-wise (user-wise) WMSE balancing problems

this step helps to balance the WMSE of all symbols (users)

(for example in P 3 minus P 4) (3) For MSE constrained total

BS power minimization problems this step ensures a non

increasing total BS power at each iteration of Algorithm II

IX APPLICATION OF THE PROPOSED DUALITY BASED

ALGORITHM FOR OTHER PROBLEMS

A MSE based problem with entry-wise power constraint

The symbol-wise WSMSE minimization constrained with

entry wise power ie bH

ksnb

ksn le macr p

ksn forallksn problem is

formulated as

P 5 minBkWkKk=1

K 991761k=1

S k991761s=1

ηksξ DLks st bH

ksnbksn le macr pksn (69)

It can be shown that this problem can be solved by Algorithm

II with ∆ks = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1

B Weighted sum rate optimization constrained with per an-

tenna and symbol power problem

By employing the approach of [11] (see (16) of [11]) one

can equivalently express the weighted sum rate maximizationconstrained with per antenna and symbol power problem as

P 6 (70)

minτ ksν ksbkswksforallsK

k=1

K 991761k=1

S k991761s=1

θks1

τ ksν γ ks

ks +K 991761

k=1

S k991761s=1

ηksξ DLks

st [BBH ](nn) le ˘ pnbH ksbks le ˘ pks

K prodk=1

S kprods=1

ν ks = 1 τ ks gt 0

where 0 lt ωks lt 1 forallsK k=1 are the rate weighting factors

for all symbols ηks = τ microksks γ ks = 11minusωks

microks = 1ωks

minus 1 and

macrθks = ωksmicro

(1minusωks)

ks For fixed τ ks ν ks foralls

K

k=1 the aboveoptimization problem has the same mathematical structure

as that of P 1 Thus by keeping τ ks ν ks forallsK k=1 constant

bkswks forallsK k=1 can be optimized by applying the MSE

duality discussed in Section IV Moreover τ ks ν ks forallsK k=1

and the power allocation part of the above problem can be

optimized by a GP method like in (25) of [20] Consequently

we can apply Algorithm II to solve (70) The detailed expla-

nations are omitted for conciseness The following problems

9This is at the expense of additional computation However as mentionedin [1] (see Appendix A of [1]) a small desktop computer can solve a GP of 100 variables and 10000 constraints by standard interior point method under aminute Thus we believe that the complexity of Algorithm I and Algorithm

II are almost the same

can also be solved by simple modification of Algorithm II

P 7 minBkWk

Kk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

SINRks ge ϱks forallnks

equiv minBkWkKk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

ξ DLks le (1 + ϱks)minus1 forallnks

P 8 maxBkWk

Kk=1

min Rks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

equiv minBkWkKk=1

max ξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

where SINRks(Rks) is the SINR (rate) of the kth user sth

symbol and we use the fact that Rks = log(1 + SINRks)and ξ DL

ks = (1 + SINRks)minus1 [1] It is clearly seen that the

application of Algorithm II is not limited to the problems of

this paper

Note that under imperfect channel state information (CSI)

condition the stochastic robust design versions of P 1 - P 5 can

be solved like in [10] However to the best of our knowledge

the relationship between rate (SINR) and MSE is not known

when the CSI is imperfect [7] Hence solving the rate (SINR)-

based robust design problems (for example robust versions of

P 6 - P 8) by our duality approach is an open problem

X SIMULATION R ESULTS

In this section we present simulation results for P 1 minus P 4

All of our simulation results are averaged over 100 randomly

chosen channel realizations We set K = 2 N = 4 and

M k = S k = 2 ηks = ρks = ηk = ρk = 1 forallsK k=1

It is assumed that Rn1 = σ21IM 1 Rn2 = σ2

2IM 2 and

σ22 = 2σ2

1 The maximum power of each BS antenna is set

to ˘ pn = 25mW N n=1 And the maximum power allocated

to each symbol and user are set to ˘ pks

= 25mW forallsK

k=1and ˆ pk = 5mW K k=1 respectively For better exposition we

define the Signal-to-noise ratio (SNR) as P maxKσ2av and it

is controlled by varying σ2av where P max = 10mW is the

total maximum BS power and σ2av = (σ2

1 + σ22)2 We also

compare Algorithm II and the algorithm in [2]10

Note that the algorithm in [2] is designed for coordinated

BS systems scenario And the iterative algorithm of [2] is

based on the per BS power constraint However according

to [2] and [21] B coordinated BS systems each with Z

10As will be clear in the sequel the proposed algorithm and the algorithmof [2] may not utilize the entire 10mW for all noise levels Thus the afore-mentioned SNR can be considered as the maximum SNR of the transmitted

signal

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1215

12

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

Fig 2 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of WSMSE for [top] P 1 [bottom] P 2

antennas can be treated as one multiuser MIMO system with

BZ antennas Thus when Z = 1 the considered problem has

exactly the same structure as that of [2] To the best of our

knowledge there is no other general linear algorithm that cansolve the problem types P 1 minus P 4 On the other hand in all

problems since there are more than one power constraints (ie

per antenna and symbol (user) powers) all power constraints

may not be active at the optimal solution Due to these reasons

we compare Algorithm II and the algorithm in [2] both in

terms of the achieved MSE (ie minimized MSE) and total

utilized BS power at the achieved MSE

A Simulation results for problems P 1 minus P 2

In this subsection we compare the performance of our

proposed algorithm with that of [2] As can be seen from Fig

2 the proposed algorithm and the algorithm in [2] achievethe same symbol-wise and user-wise WSMSEs Next we plot

the total utilized powers at the BS to achieve these WSMSEs

which is shown in Fig 3 From these two figures one can see

that to achieve the same WSMSE the proposed duality based

iterative algorithm requires less total BS power than that of

[2] This scenario fits to that of [10] and [19] where the sum

MSE minimization constrained with a per BS antenna power

problem has been examined by duality approach

B Simulation results for problems P 3 minus P 4

Like in the above subsection here we compare the per-

formance of our proposed algorithm with that of [2] For

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 3 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 1 [bottom] P 2

For this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

10 15 20 25 30 350

005

01

015

02

025

SNR (dB)

M a x i m u m s y m b o l M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

005

01

015

02

025

03

035

04

045

05

SNR (dB)

M a x i m u m u s e r M S E

Algorithm II

Algorithm in [2]

Fig 4 Comparison of the proposed algorithm (Algorithm II) and that of

in [2] in terms of maximum achieved MSE for [top] P 3 [bottom] P 4

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 8: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 815

8

0N n=1 we ensure (

sumK i=1

sumS ij=1 β ijHiwijw

H ij H

H i + Ψ +

microksI)minus1 exists Next we transfer the symbol-wise MSE from

interference to downlink channel by satisfying the power

constraint of P 3 (ie we perform step 3)

B Symbol-wise MSE transfer (From interference to downlink

channel)

For a given symbol MSE in the interference channel with

ζ = I we can achieve the same symbol MSE in the downlink

channel by using a nonzero scaling factor (β ks) which satisfies

bks = β kstks wks = vksβ ks (45)

Here we use the notations B and W to differentiate with

the precoder and decoder matrices used in Section VI-A By

substituting (45) into ξ DLks (with B=B W=W) then equating

the resulting symbol MSE with that of the interference channel

(7) and after some straightforward steps we get

1β 2ksvH ks(HH k

K 991761i=1

S i991761j=1(ij)=(ks)

β 2ijtijtH ijHk + Rnk)vks =

tH ks(

K 991761i=1

S i991761j=1(ij)=(ks)

HivijvH ij H

H i + Ψ + microksI)tks forallks

By collecting the above equalities for all k and s β ks forallsK k=1

can be determined by

(Y + Ω)β2 =[vH 11Rn1v11 middot middot middot vH

1S 1Rn1v1S 1

middot middot middot vH K 1RnK vK 1 middot middot middot vH

KS KRnK vKS K ]T

=Θβ2

= ΘΘminus1(I + YΘminus1)minus1 ˜Px

rArr β2 =(Y + Ω)minus1(I + YΘminus1)minus1 ˜Px

=Ωminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜Px (46)

where the third equality follows from (41)

β2 = [β 211 middot middot middot β 21S 1 middot middot middot β 2K 1 middot middot middot β 2KS K

]T Ω =diag(tH

11Ψt11 middot middot middot tH 1S 1

Ψt1S 1 middot middot middot tH K 1ΨtK 1 middot middot middot

tH KS K

ΨtKS K ) Ω = diag(micro11tH 11t11 middot middot middot micro1S 1t

H 1S 1

t1S 1 middot middot middot

microK 1tH K 1tK 1 middot middot middot microKS Kt

H KS K

tKS K ) Ω = Ω + Ω

and Y = [y11 middot middot middot y1S 1 middot middot middot yK 1 middot middot middot yKS K ]T with

yks = [minus|tH 11H1vks|2 middot middot middot zks middot middot middot minus|tH

K 1HK vks|2 middot middot middot minus |tH

KS KHK vks|2]T and zks =

tH kssum

K i=1sum

S ij=1(ij)

=(ks)Hivijv

H ij H

H i tks By applying

Theorem 2 it can be shown that β ks forallsK k=1 are strictly

positive for ψn gt 0N n=1 and microks gt 0 forallsK

k=1 The power

constraints of the nth BS antenna and kth user sth symbol

are given by

bH

nbn = tH

n Υtn le ˘ pn foralln (47)bH ksbks = β 2kst

H kstks le ˘ pks forallk s (48)

where Υ = diag(β 211 middot middot middot β 1S 1 middot middot middot β 2K 1 middot middot middot β KS K ) Mul-

tiplying both sides of (47) by ψn and stacking the resulting

inequality for all n yields

˘Pψ ge

˜Ωβ

2

(49)

where P = diag(˘ p1 middot middot middot ˘ pN ) and Ω = Ψ|T|2 Like in the

above expression by multiplying both sides of (48) with microks

and collecting the resulting inequality for all k and s the

power constraints (48) can be expressed as

macrPmicro ge Ωβ2 (50)

where macrP = diag(˘ p11 middot middot middot ˘ p1S 1 middot middot middot ˘ pK 1 middot middot middot ˘ pKS K ) By

employing β2 of (46) (49) and (50) can be combined as

xprime ge ˜Ωβ2 = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1xprime

= (xprime)xprime (51)

where ˜P = blkdiag(P macrP) ˜Ω = [ΩT ΩT ]T xprime = ˜

P[ψ micro]T

and (xprime) = ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1

Next we show that there exists xprime gt 0 such that (51) is

satisfied Towards this end we consider the following discrete-

time switched system [16]

xn+1 = Fσnxn for n = 0 1 2 middot middot middot (52)

where x isin realmtimes1 is a state Fσn isin realmtimesm is a switchingmatrix and σn isin 0 1 2 middot middot middot According to [16] (Remark 2

of [16]) the above system is marginally stable (convergent) if

maxσn

∥Fσn∥⋆ = 1 for n = 0 1 middot middot middot (53)

where ∥∥⋆ denotes an induced matrix norm

Let us consider the following iteration

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (54)

Now if we assume (xprimen) = Fσn foralln7 we can interpret (54)

as a discrete time switched system Consequently the above

iteration is guaranteed to converge if maxn ∥ (xprimen)∥⋆ = 1 It

is known that ||||||1 is an induced matrix norm [17] For any

xprime the matrix one norm of (xprime) is given by

||| (xprime)|||1

=||| ˜ΩΩminus1(I + YΩminus1)minus1(I + YΘminus1)minus1 ˜P( ˜P)minus1|||1

le||| ˇΩ|||1|||(I + YΩminus1)minus1|||1|||(I + YΘminus1)minus1|||1||| ˇP|||1

=||| ˇΩ|||1||| ˇP|||1 le 1 (55)

where ˇΩ = [ ˜ΩΩminus1 0(N +S )timesN ] ˇP = [ ˜P( ˜P)minus1 0N times(N +S )]

the second inequality is due to the fact that |||XY|||1 le|||X|||1|||Y|||1 [17] (page 290) the third equality is obtained

by applying Theorem 2 and the last inequality employs thefollowing facts Using the definition (73) (see Appendix A)

one can get ||| ˇΩ|||1 le 1 by applying (46) and (51) and

||| ˇP|||1 le 1 by applying (13) (41) and (51)

Thus maxn ∥ (xprimen)∥⋆ = 1 holds true and (54) is guar-

anteed to converge As we can see (54) is derived by using

(41) and (46) Thus the solution of (54) also satisfies (41)

and (46) Moreover for any initial xprime0 gt 0 since (xprimen) foralln is

positive the solution of (54) is strictly positive and [ψ micro]T =

( ˜P)minus1xprime gt 0 which is the desired result

7Since (xprimen) is the products of stochastic matrices (see the proof of Theorem 2) (xprimen) is a bounded matrix for any xprime gt 0 Thus the assumption

(xprimen) = Fσn foralln holds true

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 915

9

Once the feasible microks forallsK k=1 and λnN

n=1 are obtained

step 4 of Algorithm 1 is immediate As a result P 3 can be

solved using Algorithm I with an additional power allocation

step which will be detailed in Section VIII

C Extension of the current duality for P 3 with a total BS

power constraint

In this subsection we show the extension of the current

duality for P 3 with a total BS power constraint For this

problem we set ∆ks of (39) as ∆ks = I forallk s (ie like in

Section IV-B) Upon doing so β2 is computed directly from

the first equality of (46) (ie the bound (55) is not needed)

By summing the left and right hand sides of this equality one

can get trBBH = P max This shows that for P 3 with a

total BS power constraint problem the total BS power at step

3 of Algorithm I is satisfied Thus one can apply Algorithm

I (with the additional power allocation step) to solve the latter

problem by setting ∆ks of (39) as ∆ks = I forallk s

For other total BS power constrained WMSE-based prob-

lems the current duality based algorithm can be applied likein this subsection The details are omitted for conciseness

Note that for such problem types the duality algorithm of the

current paper has the same complexity as that of [5]

VII USE R-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

This section establishes user-wise MSE duality between

downlink and interference channels This duality is established

to solve the problems of type P 4

A User-wise MSE transfer (From downlink to interference

channel)

To apply this MSE transfer for P 4 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

Vk = β kWk Tk = Bkβ k ζ = I ∆ks = Ψ + microkI (56)

Like in Section VI substituting (56) into (8) equating ξ DLk =

ξ I k K

k=1 and after some straightforward steps we get the

following system of equations

(Y + Θ)β2

= ˜Px rArr β2

= Θminus1(I + YΘminus1)minus1 ˜Px (57)

where

Y(kl) =

983163 sumK i=1i=k ∥WH

k HH k Bi∥2F for k = l

minus∥WH l H

H l Bk∥2F for k = l

(58)

Θ = diag(θ1 middot middot middot θK ) β2

= [β 21 middot middot middot β 2K ]T

˜P = [ macrP P]

with θk = trWH k RnkWk macrP isin realS timesN = |BH |2 P =

diag(macr p1 middot middot middot macr pK ) By applying Theorem 2 it can be shown

that β kK k=1 of (57) are strictly positive Thus step 1 of

Algorithm I can be performed using (57) We perform step 2

of Algorithm I by updating tks using MMSE receiver as

tks =(K

991761i=1

β iHiWiWH i H

H i + Ψ + microkI)minus1Hkwksβ k (59)

B User-wise MSE transfer (From interference to downlink

channel)

For a given user MSE in the interference channel with

ζ = I we can achieve the same MSE in the downlink channel

by using nonzero scaling factors ( ˜β kK k=1) that satisfy

Bk = ˜β kTk

Wk = Vk ˜β k (60)

Here we also use the notations B and W to differentiate

with the precoder and decoder matrices used in Section VII-

A By substituting (60) into ξ DLk (with B=B W=W) and

then equating the resulting user-wise MSE with that of the

interference channel (7) and after some steps ˜β kK k=1 are

determined as

(I + ˇYˇΩminus1

) ˇΩ ˜β2

= [trVH 1 Rn1V1 middot middot middot trVH

K RnK VK ]T

rArr ˜β2

= ˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px (61)

where the second equality follows from

(57) ˜β2

= [ ˜β 21

middot middot middot ˜β 2K

]T Ωprime =diag(trTH

1 ΨT1 middot middot middot trTH K ΨTK ) Ω =

diag(micro1trTH 1 T1 middot middot middot microK trTH

K TK ) ˇΩ = Ωprime + Ω

By applying Theorem 2 it can be shown that ˜β kK k=1 are

strictly positive for ψn gt 0N n=1 and microk gt 0K

k=1 Like in

Section VI-B the power constraint of the nth BS antenna

and kth user can thus be expressed as

xprime ge ˆΩ ˜β2

= ˆΩˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px

= (xprime)xprime (62)

where P = diag(ˆ p1 middot middot middot ˆ pK ) ˆP = blkdiag(P ˆP) ˆΩ =

[ΩT

ΩT

]T

xprime

= ˜P[ψ micro]

T

and (xprime

) = ˆΩˇΩ

minus1

(I +ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜P( ˆP)minus1 Like in Section VI-B it

can be shown that there exists a feasible xprime gt 0 that satisfy

(62) and can be obtained iteratively by

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (63)

By initializing xprime0 gt 0 the solution of the above iteration

is always positive Consequently λn gt 0N n=1 and microk gt

0K k=1 holds true Once the feasible microkK

k=1 and λnN n=1

are obtained step 4 of Algorithm 1 is straightforward As a

result P 4 can be solved using Algorithm I with the additional

power allocation step of Section VIII

VIII GENERALIZED AND IMPROVED VERSION OF

Algorithm I

From the discussions of Sections IV - VII one can

understand that each iteration of Algorithm I gives a non

increasing sequence of symbol (user) WMSEWSMSE As can

be seen from Section III the objective of P 1(P 2) is just to

minimize the total WSMSE of all symbols (users) whereas

the objective of P 3(P 4) is to simultaneously minimize and

balance the WMSE of all symbols (users) Thus Algorithm

I is appropriate to solve P 1(P 2) of the current paper For

P 3(P 4) although each iteration of Algorithm I is able to

provide a non increasing sequence of symbol (user) WMSE

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1015

10

(ie minimizes the maximum WMSE of all symbols (users))

each iteration of this algorithm is not able to guarantee

balanced WMSEs of all symbols (users) On the other hand

for an MSE constrained total BS power minimization problem

(for example P 7 in Section IX) an iterative algorithm that

can provide a non increasing sequence of total BS power is

required This shows that Algorithm I also can not solve the

latter problem In the following we address the drawbacks of Algorithm I just by including a power allocation step into

Algorithm I as explained below

In [8] for fixed transmit and receive filters the power

allocation parts of total BS power constrained MSE-based

problems have been formulated as GPs by employing the

approach and system model of [1] under the assumption that

all symbols are strictly active8 For this assumption in [8] we

show that the system model of [1] is appropriate to solve any

kind of total BS power constrained MSE-based problems using

duality approach (alternating optimization) This motivates us

to utilize the system model of [1] in the downlink channel

only and then include the power allocation step (ie GP) into

Algorithm I Towards this end we decompose the precoders

and decoders of the downlink channel as

Bk =GkP12k Wk = UkαkP

minus12k forallk (64)

where Pk = diag( pk1 middot middot middot pkS k) isin realS ktimesS k Gk =[gk1 middot middot middot gkS k ] isin CN timesS k Uk = [uk1 middot middot middot ukS k ] isin CM ktimesS k

and αk = diag(αk1 middot middot middot αkS k) isin realS ktimesS k are the transmit

power unity norm transmit filter unity norm receive filter and

receiver scaling factor matrices of the kth user respectively

ie gH ksgks = uH

ksuks = 1 forallsK k=1

By employing (64) and stacking ξ = [ξ DL11 middot middot middot ξ DL

KS K]T

= [ξ DL1 middot middot middot ξ DL

S ]T = [ξ DLl S

l=1]T the l th downlink symbol

MSE can be expressed as (see [1] and [10] for more detailsabout (64) and the above descriptions)

ξ DLl = pminus1l [(D + α2ΦT )p]l + pminus1l α2

l uH l Rnul (65)

where

Φ(lj) =

983163 |gH

l Huj |2 for l = j0 for l = j

(66)

D(ll) =α2l |gH

l Hul|2 minus 2αlreal(uH l H

H gl) + 1 (67)

1 le l( j) le S P = blkdiag(P1 middot middot middot PK ) =diag( p1 middot middot middot pS ) p = [ p1 middot middot middot pS ]

T G = [G1 middot middot middot GK ] =[g1 middot middot middot gS ] U = blkdiag(U1 middot middot middot UK ) = [u1 middot middot middot uS ]

and α = blkdiag(α1 middot middot middot αK ) = diag(α1 middot middot middot αS ) with∥gl∥2 = ∥ul∥2 = 1 Using (65) for fixed GU and α the

power allocation part of P 1 can be formulated as

min plSl=1

S 991761l=1

ηlξ DLl st ς T

np le ˘ pn pl le ˘ pl foralln l (68)

where ς T n isin real1timesS = |[G(ni)|2S

i=1 [η1 middot middot middot ηS ]T =

[η11 middot middot middot ηKS K ]T and [ ˘ pl middot middot middot ˘ pS ]T = [ ˘ p11 middot middot middot ˘ pKS K ]T As

ξ DLl is a posynomial (where plS

l=1 are the variables) (68)

8Note that this assumption is not always true for all MSE-based problemsHowever as mentioned in [1] in practice replacing zero powers by a smallvalue will not affect the overall optimization Due to this reason we replace

zero powers by 10minus6 in the simulation section

is a GP for which global optimality is guaranteed Thus it

can be efficiently solved using interior point methods with a

worst-case polynomial-time complexity [18]

For fixed GU and α the power allocation parts of

P 2 minus P 4 can be formulated as GPs like in P 1 Our duality

based algorithm for each of these problems including the

power allocation step is summarized in Algorithm II

Algorithm II

Initialization Like in Algorithm I

Repeat Interference channel

1) For P 1 and P 2 set V = WT = B (ie β = β = 1)

then compute ψn microks forallksn and ψn microk forallk nusing (25) and (38) respectively For P 3 and P 4 first

compute ψn microks forallksn and ψn microk forallk n using

(54) and (63) respectively then transfer each symbol

and user MSE from downlink to interference channels

by (39) and (56) respectively

2) Update the MMSE receivers of the interference channel

for P 1 P 2 P 3 and P 4 using (19) (32) (44) and (59)

respectivelyDownlink channel

3) Transfer the MSE (weighted sum user or symbol MSE)

from interference to downlink channel using (20) (33)

(45) and (60) for P 1 P 2 P 3 and P 4 respectively

4) For each of the problems P 1 minus P 4 decompose the

precoder and decoder matrices of each user as in (64)

Then formulate and solve the GP power allocation part

For example the power allocation part of P 1 can be

expressed in GP form as (68)

5) For each of the problems P 1minusP 4 by keeping PkK k=1

constant update the receive filters UkK k=1 and scal-

ing factors αkK

k=1 by applying downlink MMSE

receiver approach ie Ukαk = (HH k GPGH Hk +

Rnk)minus1HH k GkPkK

k=1 Note that in these expressions

αkK k=1 are chosen such that each column of UkK

k=1

has unity norm Then compute BkWkK k=1 by (64)

Until convergence

Convergence It can be shown that at each iteration

of this algorithm the objective function of each of the

problems P 1 - P 4 is non-increasing [4] [7] [19] Thus

the above iterative algorithm is convergent However

since P 1 - P 4 are non-convex this iterative algorithm

is not guaranteed to converge to the global optimum

In this algorithm we stop iteration (ie our convergence

condition) when the difference between the objectivefunctions in two consecutive iterations is smaller than

some small value ϵ (we use ϵ = 10minus6 for the simulation)

Computational complexity As can be seen from this

algorithm when we increase the number of users andor

(BS andor MS antennas) the number and size of

optimization variables increase Because of this the

computational complexity of Algorithm II increases as

K andor N andor M increases However studying the

complexity of this algorithm as a function of K N and

M needs effort and time And such a task is beyond the

scope of this work and is an open research topic

The power allocation step of Algorithm II has thus the

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1115

11

following benefits (1) For BS power constrained WSMSE

minimization problems this step improves the convergence

speed of Algorithm II compared to that of Algorithm I9 (for

example in P 1 minus P 2) The degree of improvement depends on

different parameters (for example Hk ∆ks forallk s etc) Thus

the theoretical comparison of these two algorithms in terms of

convergence speed requires time and effort And this task is

beyond the scope of this work and it is an open research topic(2) For symbol-wise (user-wise) WMSE balancing problems

this step helps to balance the WMSE of all symbols (users)

(for example in P 3 minus P 4) (3) For MSE constrained total

BS power minimization problems this step ensures a non

increasing total BS power at each iteration of Algorithm II

IX APPLICATION OF THE PROPOSED DUALITY BASED

ALGORITHM FOR OTHER PROBLEMS

A MSE based problem with entry-wise power constraint

The symbol-wise WSMSE minimization constrained with

entry wise power ie bH

ksnb

ksn le macr p

ksn forallksn problem is

formulated as

P 5 minBkWkKk=1

K 991761k=1

S k991761s=1

ηksξ DLks st bH

ksnbksn le macr pksn (69)

It can be shown that this problem can be solved by Algorithm

II with ∆ks = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1

B Weighted sum rate optimization constrained with per an-

tenna and symbol power problem

By employing the approach of [11] (see (16) of [11]) one

can equivalently express the weighted sum rate maximizationconstrained with per antenna and symbol power problem as

P 6 (70)

minτ ksν ksbkswksforallsK

k=1

K 991761k=1

S k991761s=1

θks1

τ ksν γ ks

ks +K 991761

k=1

S k991761s=1

ηksξ DLks

st [BBH ](nn) le ˘ pnbH ksbks le ˘ pks

K prodk=1

S kprods=1

ν ks = 1 τ ks gt 0

where 0 lt ωks lt 1 forallsK k=1 are the rate weighting factors

for all symbols ηks = τ microksks γ ks = 11minusωks

microks = 1ωks

minus 1 and

macrθks = ωksmicro

(1minusωks)

ks For fixed τ ks ν ks foralls

K

k=1 the aboveoptimization problem has the same mathematical structure

as that of P 1 Thus by keeping τ ks ν ks forallsK k=1 constant

bkswks forallsK k=1 can be optimized by applying the MSE

duality discussed in Section IV Moreover τ ks ν ks forallsK k=1

and the power allocation part of the above problem can be

optimized by a GP method like in (25) of [20] Consequently

we can apply Algorithm II to solve (70) The detailed expla-

nations are omitted for conciseness The following problems

9This is at the expense of additional computation However as mentionedin [1] (see Appendix A of [1]) a small desktop computer can solve a GP of 100 variables and 10000 constraints by standard interior point method under aminute Thus we believe that the complexity of Algorithm I and Algorithm

II are almost the same

can also be solved by simple modification of Algorithm II

P 7 minBkWk

Kk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

SINRks ge ϱks forallnks

equiv minBkWkKk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

ξ DLks le (1 + ϱks)minus1 forallnks

P 8 maxBkWk

Kk=1

min Rks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

equiv minBkWkKk=1

max ξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

where SINRks(Rks) is the SINR (rate) of the kth user sth

symbol and we use the fact that Rks = log(1 + SINRks)and ξ DL

ks = (1 + SINRks)minus1 [1] It is clearly seen that the

application of Algorithm II is not limited to the problems of

this paper

Note that under imperfect channel state information (CSI)

condition the stochastic robust design versions of P 1 - P 5 can

be solved like in [10] However to the best of our knowledge

the relationship between rate (SINR) and MSE is not known

when the CSI is imperfect [7] Hence solving the rate (SINR)-

based robust design problems (for example robust versions of

P 6 - P 8) by our duality approach is an open problem

X SIMULATION R ESULTS

In this section we present simulation results for P 1 minus P 4

All of our simulation results are averaged over 100 randomly

chosen channel realizations We set K = 2 N = 4 and

M k = S k = 2 ηks = ρks = ηk = ρk = 1 forallsK k=1

It is assumed that Rn1 = σ21IM 1 Rn2 = σ2

2IM 2 and

σ22 = 2σ2

1 The maximum power of each BS antenna is set

to ˘ pn = 25mW N n=1 And the maximum power allocated

to each symbol and user are set to ˘ pks

= 25mW forallsK

k=1and ˆ pk = 5mW K k=1 respectively For better exposition we

define the Signal-to-noise ratio (SNR) as P maxKσ2av and it

is controlled by varying σ2av where P max = 10mW is the

total maximum BS power and σ2av = (σ2

1 + σ22)2 We also

compare Algorithm II and the algorithm in [2]10

Note that the algorithm in [2] is designed for coordinated

BS systems scenario And the iterative algorithm of [2] is

based on the per BS power constraint However according

to [2] and [21] B coordinated BS systems each with Z

10As will be clear in the sequel the proposed algorithm and the algorithmof [2] may not utilize the entire 10mW for all noise levels Thus the afore-mentioned SNR can be considered as the maximum SNR of the transmitted

signal

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1215

12

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

Fig 2 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of WSMSE for [top] P 1 [bottom] P 2

antennas can be treated as one multiuser MIMO system with

BZ antennas Thus when Z = 1 the considered problem has

exactly the same structure as that of [2] To the best of our

knowledge there is no other general linear algorithm that cansolve the problem types P 1 minus P 4 On the other hand in all

problems since there are more than one power constraints (ie

per antenna and symbol (user) powers) all power constraints

may not be active at the optimal solution Due to these reasons

we compare Algorithm II and the algorithm in [2] both in

terms of the achieved MSE (ie minimized MSE) and total

utilized BS power at the achieved MSE

A Simulation results for problems P 1 minus P 2

In this subsection we compare the performance of our

proposed algorithm with that of [2] As can be seen from Fig

2 the proposed algorithm and the algorithm in [2] achievethe same symbol-wise and user-wise WSMSEs Next we plot

the total utilized powers at the BS to achieve these WSMSEs

which is shown in Fig 3 From these two figures one can see

that to achieve the same WSMSE the proposed duality based

iterative algorithm requires less total BS power than that of

[2] This scenario fits to that of [10] and [19] where the sum

MSE minimization constrained with a per BS antenna power

problem has been examined by duality approach

B Simulation results for problems P 3 minus P 4

Like in the above subsection here we compare the per-

formance of our proposed algorithm with that of [2] For

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 3 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 1 [bottom] P 2

For this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

10 15 20 25 30 350

005

01

015

02

025

SNR (dB)

M a x i m u m s y m b o l M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

005

01

015

02

025

03

035

04

045

05

SNR (dB)

M a x i m u m u s e r M S E

Algorithm II

Algorithm in [2]

Fig 4 Comparison of the proposed algorithm (Algorithm II) and that of

in [2] in terms of maximum achieved MSE for [top] P 3 [bottom] P 4

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 9: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 915

9

Once the feasible microks forallsK k=1 and λnN

n=1 are obtained

step 4 of Algorithm 1 is immediate As a result P 3 can be

solved using Algorithm I with an additional power allocation

step which will be detailed in Section VIII

C Extension of the current duality for P 3 with a total BS

power constraint

In this subsection we show the extension of the current

duality for P 3 with a total BS power constraint For this

problem we set ∆ks of (39) as ∆ks = I forallk s (ie like in

Section IV-B) Upon doing so β2 is computed directly from

the first equality of (46) (ie the bound (55) is not needed)

By summing the left and right hand sides of this equality one

can get trBBH = P max This shows that for P 3 with a

total BS power constraint problem the total BS power at step

3 of Algorithm I is satisfied Thus one can apply Algorithm

I (with the additional power allocation step) to solve the latter

problem by setting ∆ks of (39) as ∆ks = I forallk s

For other total BS power constrained WMSE-based prob-

lems the current duality based algorithm can be applied likein this subsection The details are omitted for conciseness

Note that for such problem types the duality algorithm of the

current paper has the same complexity as that of [5]

VII USE R-WISE M SE DOWNLINK-INTERFERENCE

DUALITY

This section establishes user-wise MSE duality between

downlink and interference channels This duality is established

to solve the problems of type P 4

A User-wise MSE transfer (From downlink to interference

channel)

To apply this MSE transfer for P 4 we set the interference

channel precoder decoder noise covariance input covariance

and MSE weight matrices as

Vk = β kWk Tk = Bkβ k ζ = I ∆ks = Ψ + microkI (56)

Like in Section VI substituting (56) into (8) equating ξ DLk =

ξ I k K

k=1 and after some straightforward steps we get the

following system of equations

(Y + Θ)β2

= ˜Px rArr β2

= Θminus1(I + YΘminus1)minus1 ˜Px (57)

where

Y(kl) =

983163 sumK i=1i=k ∥WH

k HH k Bi∥2F for k = l

minus∥WH l H

H l Bk∥2F for k = l

(58)

Θ = diag(θ1 middot middot middot θK ) β2

= [β 21 middot middot middot β 2K ]T

˜P = [ macrP P]

with θk = trWH k RnkWk macrP isin realS timesN = |BH |2 P =

diag(macr p1 middot middot middot macr pK ) By applying Theorem 2 it can be shown

that β kK k=1 of (57) are strictly positive Thus step 1 of

Algorithm I can be performed using (57) We perform step 2

of Algorithm I by updating tks using MMSE receiver as

tks =(K

991761i=1

β iHiWiWH i H

H i + Ψ + microkI)minus1Hkwksβ k (59)

B User-wise MSE transfer (From interference to downlink

channel)

For a given user MSE in the interference channel with

ζ = I we can achieve the same MSE in the downlink channel

by using nonzero scaling factors ( ˜β kK k=1) that satisfy

Bk = ˜β kTk

Wk = Vk ˜β k (60)

Here we also use the notations B and W to differentiate

with the precoder and decoder matrices used in Section VII-

A By substituting (60) into ξ DLk (with B=B W=W) and

then equating the resulting user-wise MSE with that of the

interference channel (7) and after some steps ˜β kK k=1 are

determined as

(I + ˇYˇΩminus1

) ˇΩ ˜β2

= [trVH 1 Rn1V1 middot middot middot trVH

K RnK VK ]T

rArr ˜β2

= ˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px (61)

where the second equality follows from

(57) ˜β2

= [ ˜β 21

middot middot middot ˜β 2K

]T Ωprime =diag(trTH

1 ΨT1 middot middot middot trTH K ΨTK ) Ω =

diag(micro1trTH 1 T1 middot middot middot microK trTH

K TK ) ˇΩ = Ωprime + Ω

By applying Theorem 2 it can be shown that ˜β kK k=1 are

strictly positive for ψn gt 0N n=1 and microk gt 0K

k=1 Like in

Section VI-B the power constraint of the nth BS antenna

and kth user can thus be expressed as

xprime ge ˆΩ ˜β2

= ˆΩˇΩminus1

(I + ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜Px

= (xprime)xprime (62)

where P = diag(ˆ p1 middot middot middot ˆ pK ) ˆP = blkdiag(P ˆP) ˆΩ =

[ΩT

ΩT

]T

xprime

= ˜P[ψ micro]

T

and (xprime

) = ˆΩˇΩ

minus1

(I +ˇYˇΩminus1

)minus1(I + YΘminus1

)minus1 ˜P( ˆP)minus1 Like in Section VI-B it

can be shown that there exists a feasible xprime gt 0 that satisfy

(62) and can be obtained iteratively by

xprimen+1 = (xprimen)xprimen for n = 0 1 2 middot middot middot (63)

By initializing xprime0 gt 0 the solution of the above iteration

is always positive Consequently λn gt 0N n=1 and microk gt

0K k=1 holds true Once the feasible microkK

k=1 and λnN n=1

are obtained step 4 of Algorithm 1 is straightforward As a

result P 4 can be solved using Algorithm I with the additional

power allocation step of Section VIII

VIII GENERALIZED AND IMPROVED VERSION OF

Algorithm I

From the discussions of Sections IV - VII one can

understand that each iteration of Algorithm I gives a non

increasing sequence of symbol (user) WMSEWSMSE As can

be seen from Section III the objective of P 1(P 2) is just to

minimize the total WSMSE of all symbols (users) whereas

the objective of P 3(P 4) is to simultaneously minimize and

balance the WMSE of all symbols (users) Thus Algorithm

I is appropriate to solve P 1(P 2) of the current paper For

P 3(P 4) although each iteration of Algorithm I is able to

provide a non increasing sequence of symbol (user) WMSE

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1015

10

(ie minimizes the maximum WMSE of all symbols (users))

each iteration of this algorithm is not able to guarantee

balanced WMSEs of all symbols (users) On the other hand

for an MSE constrained total BS power minimization problem

(for example P 7 in Section IX) an iterative algorithm that

can provide a non increasing sequence of total BS power is

required This shows that Algorithm I also can not solve the

latter problem In the following we address the drawbacks of Algorithm I just by including a power allocation step into

Algorithm I as explained below

In [8] for fixed transmit and receive filters the power

allocation parts of total BS power constrained MSE-based

problems have been formulated as GPs by employing the

approach and system model of [1] under the assumption that

all symbols are strictly active8 For this assumption in [8] we

show that the system model of [1] is appropriate to solve any

kind of total BS power constrained MSE-based problems using

duality approach (alternating optimization) This motivates us

to utilize the system model of [1] in the downlink channel

only and then include the power allocation step (ie GP) into

Algorithm I Towards this end we decompose the precoders

and decoders of the downlink channel as

Bk =GkP12k Wk = UkαkP

minus12k forallk (64)

where Pk = diag( pk1 middot middot middot pkS k) isin realS ktimesS k Gk =[gk1 middot middot middot gkS k ] isin CN timesS k Uk = [uk1 middot middot middot ukS k ] isin CM ktimesS k

and αk = diag(αk1 middot middot middot αkS k) isin realS ktimesS k are the transmit

power unity norm transmit filter unity norm receive filter and

receiver scaling factor matrices of the kth user respectively

ie gH ksgks = uH

ksuks = 1 forallsK k=1

By employing (64) and stacking ξ = [ξ DL11 middot middot middot ξ DL

KS K]T

= [ξ DL1 middot middot middot ξ DL

S ]T = [ξ DLl S

l=1]T the l th downlink symbol

MSE can be expressed as (see [1] and [10] for more detailsabout (64) and the above descriptions)

ξ DLl = pminus1l [(D + α2ΦT )p]l + pminus1l α2

l uH l Rnul (65)

where

Φ(lj) =

983163 |gH

l Huj |2 for l = j0 for l = j

(66)

D(ll) =α2l |gH

l Hul|2 minus 2αlreal(uH l H

H gl) + 1 (67)

1 le l( j) le S P = blkdiag(P1 middot middot middot PK ) =diag( p1 middot middot middot pS ) p = [ p1 middot middot middot pS ]

T G = [G1 middot middot middot GK ] =[g1 middot middot middot gS ] U = blkdiag(U1 middot middot middot UK ) = [u1 middot middot middot uS ]

and α = blkdiag(α1 middot middot middot αK ) = diag(α1 middot middot middot αS ) with∥gl∥2 = ∥ul∥2 = 1 Using (65) for fixed GU and α the

power allocation part of P 1 can be formulated as

min plSl=1

S 991761l=1

ηlξ DLl st ς T

np le ˘ pn pl le ˘ pl foralln l (68)

where ς T n isin real1timesS = |[G(ni)|2S

i=1 [η1 middot middot middot ηS ]T =

[η11 middot middot middot ηKS K ]T and [ ˘ pl middot middot middot ˘ pS ]T = [ ˘ p11 middot middot middot ˘ pKS K ]T As

ξ DLl is a posynomial (where plS

l=1 are the variables) (68)

8Note that this assumption is not always true for all MSE-based problemsHowever as mentioned in [1] in practice replacing zero powers by a smallvalue will not affect the overall optimization Due to this reason we replace

zero powers by 10minus6 in the simulation section

is a GP for which global optimality is guaranteed Thus it

can be efficiently solved using interior point methods with a

worst-case polynomial-time complexity [18]

For fixed GU and α the power allocation parts of

P 2 minus P 4 can be formulated as GPs like in P 1 Our duality

based algorithm for each of these problems including the

power allocation step is summarized in Algorithm II

Algorithm II

Initialization Like in Algorithm I

Repeat Interference channel

1) For P 1 and P 2 set V = WT = B (ie β = β = 1)

then compute ψn microks forallksn and ψn microk forallk nusing (25) and (38) respectively For P 3 and P 4 first

compute ψn microks forallksn and ψn microk forallk n using

(54) and (63) respectively then transfer each symbol

and user MSE from downlink to interference channels

by (39) and (56) respectively

2) Update the MMSE receivers of the interference channel

for P 1 P 2 P 3 and P 4 using (19) (32) (44) and (59)

respectivelyDownlink channel

3) Transfer the MSE (weighted sum user or symbol MSE)

from interference to downlink channel using (20) (33)

(45) and (60) for P 1 P 2 P 3 and P 4 respectively

4) For each of the problems P 1 minus P 4 decompose the

precoder and decoder matrices of each user as in (64)

Then formulate and solve the GP power allocation part

For example the power allocation part of P 1 can be

expressed in GP form as (68)

5) For each of the problems P 1minusP 4 by keeping PkK k=1

constant update the receive filters UkK k=1 and scal-

ing factors αkK

k=1 by applying downlink MMSE

receiver approach ie Ukαk = (HH k GPGH Hk +

Rnk)minus1HH k GkPkK

k=1 Note that in these expressions

αkK k=1 are chosen such that each column of UkK

k=1

has unity norm Then compute BkWkK k=1 by (64)

Until convergence

Convergence It can be shown that at each iteration

of this algorithm the objective function of each of the

problems P 1 - P 4 is non-increasing [4] [7] [19] Thus

the above iterative algorithm is convergent However

since P 1 - P 4 are non-convex this iterative algorithm

is not guaranteed to converge to the global optimum

In this algorithm we stop iteration (ie our convergence

condition) when the difference between the objectivefunctions in two consecutive iterations is smaller than

some small value ϵ (we use ϵ = 10minus6 for the simulation)

Computational complexity As can be seen from this

algorithm when we increase the number of users andor

(BS andor MS antennas) the number and size of

optimization variables increase Because of this the

computational complexity of Algorithm II increases as

K andor N andor M increases However studying the

complexity of this algorithm as a function of K N and

M needs effort and time And such a task is beyond the

scope of this work and is an open research topic

The power allocation step of Algorithm II has thus the

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1115

11

following benefits (1) For BS power constrained WSMSE

minimization problems this step improves the convergence

speed of Algorithm II compared to that of Algorithm I9 (for

example in P 1 minus P 2) The degree of improvement depends on

different parameters (for example Hk ∆ks forallk s etc) Thus

the theoretical comparison of these two algorithms in terms of

convergence speed requires time and effort And this task is

beyond the scope of this work and it is an open research topic(2) For symbol-wise (user-wise) WMSE balancing problems

this step helps to balance the WMSE of all symbols (users)

(for example in P 3 minus P 4) (3) For MSE constrained total

BS power minimization problems this step ensures a non

increasing total BS power at each iteration of Algorithm II

IX APPLICATION OF THE PROPOSED DUALITY BASED

ALGORITHM FOR OTHER PROBLEMS

A MSE based problem with entry-wise power constraint

The symbol-wise WSMSE minimization constrained with

entry wise power ie bH

ksnb

ksn le macr p

ksn forallksn problem is

formulated as

P 5 minBkWkKk=1

K 991761k=1

S k991761s=1

ηksξ DLks st bH

ksnbksn le macr pksn (69)

It can be shown that this problem can be solved by Algorithm

II with ∆ks = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1

B Weighted sum rate optimization constrained with per an-

tenna and symbol power problem

By employing the approach of [11] (see (16) of [11]) one

can equivalently express the weighted sum rate maximizationconstrained with per antenna and symbol power problem as

P 6 (70)

minτ ksν ksbkswksforallsK

k=1

K 991761k=1

S k991761s=1

θks1

τ ksν γ ks

ks +K 991761

k=1

S k991761s=1

ηksξ DLks

st [BBH ](nn) le ˘ pnbH ksbks le ˘ pks

K prodk=1

S kprods=1

ν ks = 1 τ ks gt 0

where 0 lt ωks lt 1 forallsK k=1 are the rate weighting factors

for all symbols ηks = τ microksks γ ks = 11minusωks

microks = 1ωks

minus 1 and

macrθks = ωksmicro

(1minusωks)

ks For fixed τ ks ν ks foralls

K

k=1 the aboveoptimization problem has the same mathematical structure

as that of P 1 Thus by keeping τ ks ν ks forallsK k=1 constant

bkswks forallsK k=1 can be optimized by applying the MSE

duality discussed in Section IV Moreover τ ks ν ks forallsK k=1

and the power allocation part of the above problem can be

optimized by a GP method like in (25) of [20] Consequently

we can apply Algorithm II to solve (70) The detailed expla-

nations are omitted for conciseness The following problems

9This is at the expense of additional computation However as mentionedin [1] (see Appendix A of [1]) a small desktop computer can solve a GP of 100 variables and 10000 constraints by standard interior point method under aminute Thus we believe that the complexity of Algorithm I and Algorithm

II are almost the same

can also be solved by simple modification of Algorithm II

P 7 minBkWk

Kk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

SINRks ge ϱks forallnks

equiv minBkWkKk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

ξ DLks le (1 + ϱks)minus1 forallnks

P 8 maxBkWk

Kk=1

min Rks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

equiv minBkWkKk=1

max ξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

where SINRks(Rks) is the SINR (rate) of the kth user sth

symbol and we use the fact that Rks = log(1 + SINRks)and ξ DL

ks = (1 + SINRks)minus1 [1] It is clearly seen that the

application of Algorithm II is not limited to the problems of

this paper

Note that under imperfect channel state information (CSI)

condition the stochastic robust design versions of P 1 - P 5 can

be solved like in [10] However to the best of our knowledge

the relationship between rate (SINR) and MSE is not known

when the CSI is imperfect [7] Hence solving the rate (SINR)-

based robust design problems (for example robust versions of

P 6 - P 8) by our duality approach is an open problem

X SIMULATION R ESULTS

In this section we present simulation results for P 1 minus P 4

All of our simulation results are averaged over 100 randomly

chosen channel realizations We set K = 2 N = 4 and

M k = S k = 2 ηks = ρks = ηk = ρk = 1 forallsK k=1

It is assumed that Rn1 = σ21IM 1 Rn2 = σ2

2IM 2 and

σ22 = 2σ2

1 The maximum power of each BS antenna is set

to ˘ pn = 25mW N n=1 And the maximum power allocated

to each symbol and user are set to ˘ pks

= 25mW forallsK

k=1and ˆ pk = 5mW K k=1 respectively For better exposition we

define the Signal-to-noise ratio (SNR) as P maxKσ2av and it

is controlled by varying σ2av where P max = 10mW is the

total maximum BS power and σ2av = (σ2

1 + σ22)2 We also

compare Algorithm II and the algorithm in [2]10

Note that the algorithm in [2] is designed for coordinated

BS systems scenario And the iterative algorithm of [2] is

based on the per BS power constraint However according

to [2] and [21] B coordinated BS systems each with Z

10As will be clear in the sequel the proposed algorithm and the algorithmof [2] may not utilize the entire 10mW for all noise levels Thus the afore-mentioned SNR can be considered as the maximum SNR of the transmitted

signal

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1215

12

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

Fig 2 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of WSMSE for [top] P 1 [bottom] P 2

antennas can be treated as one multiuser MIMO system with

BZ antennas Thus when Z = 1 the considered problem has

exactly the same structure as that of [2] To the best of our

knowledge there is no other general linear algorithm that cansolve the problem types P 1 minus P 4 On the other hand in all

problems since there are more than one power constraints (ie

per antenna and symbol (user) powers) all power constraints

may not be active at the optimal solution Due to these reasons

we compare Algorithm II and the algorithm in [2] both in

terms of the achieved MSE (ie minimized MSE) and total

utilized BS power at the achieved MSE

A Simulation results for problems P 1 minus P 2

In this subsection we compare the performance of our

proposed algorithm with that of [2] As can be seen from Fig

2 the proposed algorithm and the algorithm in [2] achievethe same symbol-wise and user-wise WSMSEs Next we plot

the total utilized powers at the BS to achieve these WSMSEs

which is shown in Fig 3 From these two figures one can see

that to achieve the same WSMSE the proposed duality based

iterative algorithm requires less total BS power than that of

[2] This scenario fits to that of [10] and [19] where the sum

MSE minimization constrained with a per BS antenna power

problem has been examined by duality approach

B Simulation results for problems P 3 minus P 4

Like in the above subsection here we compare the per-

formance of our proposed algorithm with that of [2] For

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 3 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 1 [bottom] P 2

For this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

10 15 20 25 30 350

005

01

015

02

025

SNR (dB)

M a x i m u m s y m b o l M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

005

01

015

02

025

03

035

04

045

05

SNR (dB)

M a x i m u m u s e r M S E

Algorithm II

Algorithm in [2]

Fig 4 Comparison of the proposed algorithm (Algorithm II) and that of

in [2] in terms of maximum achieved MSE for [top] P 3 [bottom] P 4

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 10: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1015

10

(ie minimizes the maximum WMSE of all symbols (users))

each iteration of this algorithm is not able to guarantee

balanced WMSEs of all symbols (users) On the other hand

for an MSE constrained total BS power minimization problem

(for example P 7 in Section IX) an iterative algorithm that

can provide a non increasing sequence of total BS power is

required This shows that Algorithm I also can not solve the

latter problem In the following we address the drawbacks of Algorithm I just by including a power allocation step into

Algorithm I as explained below

In [8] for fixed transmit and receive filters the power

allocation parts of total BS power constrained MSE-based

problems have been formulated as GPs by employing the

approach and system model of [1] under the assumption that

all symbols are strictly active8 For this assumption in [8] we

show that the system model of [1] is appropriate to solve any

kind of total BS power constrained MSE-based problems using

duality approach (alternating optimization) This motivates us

to utilize the system model of [1] in the downlink channel

only and then include the power allocation step (ie GP) into

Algorithm I Towards this end we decompose the precoders

and decoders of the downlink channel as

Bk =GkP12k Wk = UkαkP

minus12k forallk (64)

where Pk = diag( pk1 middot middot middot pkS k) isin realS ktimesS k Gk =[gk1 middot middot middot gkS k ] isin CN timesS k Uk = [uk1 middot middot middot ukS k ] isin CM ktimesS k

and αk = diag(αk1 middot middot middot αkS k) isin realS ktimesS k are the transmit

power unity norm transmit filter unity norm receive filter and

receiver scaling factor matrices of the kth user respectively

ie gH ksgks = uH

ksuks = 1 forallsK k=1

By employing (64) and stacking ξ = [ξ DL11 middot middot middot ξ DL

KS K]T

= [ξ DL1 middot middot middot ξ DL

S ]T = [ξ DLl S

l=1]T the l th downlink symbol

MSE can be expressed as (see [1] and [10] for more detailsabout (64) and the above descriptions)

ξ DLl = pminus1l [(D + α2ΦT )p]l + pminus1l α2

l uH l Rnul (65)

where

Φ(lj) =

983163 |gH

l Huj |2 for l = j0 for l = j

(66)

D(ll) =α2l |gH

l Hul|2 minus 2αlreal(uH l H

H gl) + 1 (67)

1 le l( j) le S P = blkdiag(P1 middot middot middot PK ) =diag( p1 middot middot middot pS ) p = [ p1 middot middot middot pS ]

T G = [G1 middot middot middot GK ] =[g1 middot middot middot gS ] U = blkdiag(U1 middot middot middot UK ) = [u1 middot middot middot uS ]

and α = blkdiag(α1 middot middot middot αK ) = diag(α1 middot middot middot αS ) with∥gl∥2 = ∥ul∥2 = 1 Using (65) for fixed GU and α the

power allocation part of P 1 can be formulated as

min plSl=1

S 991761l=1

ηlξ DLl st ς T

np le ˘ pn pl le ˘ pl foralln l (68)

where ς T n isin real1timesS = |[G(ni)|2S

i=1 [η1 middot middot middot ηS ]T =

[η11 middot middot middot ηKS K ]T and [ ˘ pl middot middot middot ˘ pS ]T = [ ˘ p11 middot middot middot ˘ pKS K ]T As

ξ DLl is a posynomial (where plS

l=1 are the variables) (68)

8Note that this assumption is not always true for all MSE-based problemsHowever as mentioned in [1] in practice replacing zero powers by a smallvalue will not affect the overall optimization Due to this reason we replace

zero powers by 10minus6 in the simulation section

is a GP for which global optimality is guaranteed Thus it

can be efficiently solved using interior point methods with a

worst-case polynomial-time complexity [18]

For fixed GU and α the power allocation parts of

P 2 minus P 4 can be formulated as GPs like in P 1 Our duality

based algorithm for each of these problems including the

power allocation step is summarized in Algorithm II

Algorithm II

Initialization Like in Algorithm I

Repeat Interference channel

1) For P 1 and P 2 set V = WT = B (ie β = β = 1)

then compute ψn microks forallksn and ψn microk forallk nusing (25) and (38) respectively For P 3 and P 4 first

compute ψn microks forallksn and ψn microk forallk n using

(54) and (63) respectively then transfer each symbol

and user MSE from downlink to interference channels

by (39) and (56) respectively

2) Update the MMSE receivers of the interference channel

for P 1 P 2 P 3 and P 4 using (19) (32) (44) and (59)

respectivelyDownlink channel

3) Transfer the MSE (weighted sum user or symbol MSE)

from interference to downlink channel using (20) (33)

(45) and (60) for P 1 P 2 P 3 and P 4 respectively

4) For each of the problems P 1 minus P 4 decompose the

precoder and decoder matrices of each user as in (64)

Then formulate and solve the GP power allocation part

For example the power allocation part of P 1 can be

expressed in GP form as (68)

5) For each of the problems P 1minusP 4 by keeping PkK k=1

constant update the receive filters UkK k=1 and scal-

ing factors αkK

k=1 by applying downlink MMSE

receiver approach ie Ukαk = (HH k GPGH Hk +

Rnk)minus1HH k GkPkK

k=1 Note that in these expressions

αkK k=1 are chosen such that each column of UkK

k=1

has unity norm Then compute BkWkK k=1 by (64)

Until convergence

Convergence It can be shown that at each iteration

of this algorithm the objective function of each of the

problems P 1 - P 4 is non-increasing [4] [7] [19] Thus

the above iterative algorithm is convergent However

since P 1 - P 4 are non-convex this iterative algorithm

is not guaranteed to converge to the global optimum

In this algorithm we stop iteration (ie our convergence

condition) when the difference between the objectivefunctions in two consecutive iterations is smaller than

some small value ϵ (we use ϵ = 10minus6 for the simulation)

Computational complexity As can be seen from this

algorithm when we increase the number of users andor

(BS andor MS antennas) the number and size of

optimization variables increase Because of this the

computational complexity of Algorithm II increases as

K andor N andor M increases However studying the

complexity of this algorithm as a function of K N and

M needs effort and time And such a task is beyond the

scope of this work and is an open research topic

The power allocation step of Algorithm II has thus the

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1115

11

following benefits (1) For BS power constrained WSMSE

minimization problems this step improves the convergence

speed of Algorithm II compared to that of Algorithm I9 (for

example in P 1 minus P 2) The degree of improvement depends on

different parameters (for example Hk ∆ks forallk s etc) Thus

the theoretical comparison of these two algorithms in terms of

convergence speed requires time and effort And this task is

beyond the scope of this work and it is an open research topic(2) For symbol-wise (user-wise) WMSE balancing problems

this step helps to balance the WMSE of all symbols (users)

(for example in P 3 minus P 4) (3) For MSE constrained total

BS power minimization problems this step ensures a non

increasing total BS power at each iteration of Algorithm II

IX APPLICATION OF THE PROPOSED DUALITY BASED

ALGORITHM FOR OTHER PROBLEMS

A MSE based problem with entry-wise power constraint

The symbol-wise WSMSE minimization constrained with

entry wise power ie bH

ksnb

ksn le macr p

ksn forallksn problem is

formulated as

P 5 minBkWkKk=1

K 991761k=1

S k991761s=1

ηksξ DLks st bH

ksnbksn le macr pksn (69)

It can be shown that this problem can be solved by Algorithm

II with ∆ks = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1

B Weighted sum rate optimization constrained with per an-

tenna and symbol power problem

By employing the approach of [11] (see (16) of [11]) one

can equivalently express the weighted sum rate maximizationconstrained with per antenna and symbol power problem as

P 6 (70)

minτ ksν ksbkswksforallsK

k=1

K 991761k=1

S k991761s=1

θks1

τ ksν γ ks

ks +K 991761

k=1

S k991761s=1

ηksξ DLks

st [BBH ](nn) le ˘ pnbH ksbks le ˘ pks

K prodk=1

S kprods=1

ν ks = 1 τ ks gt 0

where 0 lt ωks lt 1 forallsK k=1 are the rate weighting factors

for all symbols ηks = τ microksks γ ks = 11minusωks

microks = 1ωks

minus 1 and

macrθks = ωksmicro

(1minusωks)

ks For fixed τ ks ν ks foralls

K

k=1 the aboveoptimization problem has the same mathematical structure

as that of P 1 Thus by keeping τ ks ν ks forallsK k=1 constant

bkswks forallsK k=1 can be optimized by applying the MSE

duality discussed in Section IV Moreover τ ks ν ks forallsK k=1

and the power allocation part of the above problem can be

optimized by a GP method like in (25) of [20] Consequently

we can apply Algorithm II to solve (70) The detailed expla-

nations are omitted for conciseness The following problems

9This is at the expense of additional computation However as mentionedin [1] (see Appendix A of [1]) a small desktop computer can solve a GP of 100 variables and 10000 constraints by standard interior point method under aminute Thus we believe that the complexity of Algorithm I and Algorithm

II are almost the same

can also be solved by simple modification of Algorithm II

P 7 minBkWk

Kk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

SINRks ge ϱks forallnks

equiv minBkWkKk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

ξ DLks le (1 + ϱks)minus1 forallnks

P 8 maxBkWk

Kk=1

min Rks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

equiv minBkWkKk=1

max ξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

where SINRks(Rks) is the SINR (rate) of the kth user sth

symbol and we use the fact that Rks = log(1 + SINRks)and ξ DL

ks = (1 + SINRks)minus1 [1] It is clearly seen that the

application of Algorithm II is not limited to the problems of

this paper

Note that under imperfect channel state information (CSI)

condition the stochastic robust design versions of P 1 - P 5 can

be solved like in [10] However to the best of our knowledge

the relationship between rate (SINR) and MSE is not known

when the CSI is imperfect [7] Hence solving the rate (SINR)-

based robust design problems (for example robust versions of

P 6 - P 8) by our duality approach is an open problem

X SIMULATION R ESULTS

In this section we present simulation results for P 1 minus P 4

All of our simulation results are averaged over 100 randomly

chosen channel realizations We set K = 2 N = 4 and

M k = S k = 2 ηks = ρks = ηk = ρk = 1 forallsK k=1

It is assumed that Rn1 = σ21IM 1 Rn2 = σ2

2IM 2 and

σ22 = 2σ2

1 The maximum power of each BS antenna is set

to ˘ pn = 25mW N n=1 And the maximum power allocated

to each symbol and user are set to ˘ pks

= 25mW forallsK

k=1and ˆ pk = 5mW K k=1 respectively For better exposition we

define the Signal-to-noise ratio (SNR) as P maxKσ2av and it

is controlled by varying σ2av where P max = 10mW is the

total maximum BS power and σ2av = (σ2

1 + σ22)2 We also

compare Algorithm II and the algorithm in [2]10

Note that the algorithm in [2] is designed for coordinated

BS systems scenario And the iterative algorithm of [2] is

based on the per BS power constraint However according

to [2] and [21] B coordinated BS systems each with Z

10As will be clear in the sequel the proposed algorithm and the algorithmof [2] may not utilize the entire 10mW for all noise levels Thus the afore-mentioned SNR can be considered as the maximum SNR of the transmitted

signal

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1215

12

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

Fig 2 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of WSMSE for [top] P 1 [bottom] P 2

antennas can be treated as one multiuser MIMO system with

BZ antennas Thus when Z = 1 the considered problem has

exactly the same structure as that of [2] To the best of our

knowledge there is no other general linear algorithm that cansolve the problem types P 1 minus P 4 On the other hand in all

problems since there are more than one power constraints (ie

per antenna and symbol (user) powers) all power constraints

may not be active at the optimal solution Due to these reasons

we compare Algorithm II and the algorithm in [2] both in

terms of the achieved MSE (ie minimized MSE) and total

utilized BS power at the achieved MSE

A Simulation results for problems P 1 minus P 2

In this subsection we compare the performance of our

proposed algorithm with that of [2] As can be seen from Fig

2 the proposed algorithm and the algorithm in [2] achievethe same symbol-wise and user-wise WSMSEs Next we plot

the total utilized powers at the BS to achieve these WSMSEs

which is shown in Fig 3 From these two figures one can see

that to achieve the same WSMSE the proposed duality based

iterative algorithm requires less total BS power than that of

[2] This scenario fits to that of [10] and [19] where the sum

MSE minimization constrained with a per BS antenna power

problem has been examined by duality approach

B Simulation results for problems P 3 minus P 4

Like in the above subsection here we compare the per-

formance of our proposed algorithm with that of [2] For

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 3 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 1 [bottom] P 2

For this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

10 15 20 25 30 350

005

01

015

02

025

SNR (dB)

M a x i m u m s y m b o l M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

005

01

015

02

025

03

035

04

045

05

SNR (dB)

M a x i m u m u s e r M S E

Algorithm II

Algorithm in [2]

Fig 4 Comparison of the proposed algorithm (Algorithm II) and that of

in [2] in terms of maximum achieved MSE for [top] P 3 [bottom] P 4

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 11: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1115

11

following benefits (1) For BS power constrained WSMSE

minimization problems this step improves the convergence

speed of Algorithm II compared to that of Algorithm I9 (for

example in P 1 minus P 2) The degree of improvement depends on

different parameters (for example Hk ∆ks forallk s etc) Thus

the theoretical comparison of these two algorithms in terms of

convergence speed requires time and effort And this task is

beyond the scope of this work and it is an open research topic(2) For symbol-wise (user-wise) WMSE balancing problems

this step helps to balance the WMSE of all symbols (users)

(for example in P 3 minus P 4) (3) For MSE constrained total

BS power minimization problems this step ensures a non

increasing total BS power at each iteration of Algorithm II

IX APPLICATION OF THE PROPOSED DUALITY BASED

ALGORITHM FOR OTHER PROBLEMS

A MSE based problem with entry-wise power constraint

The symbol-wise WSMSE minimization constrained with

entry wise power ie bH

ksnb

ksn le macr p

ksn forallksn problem is

formulated as

P 5 minBkWkKk=1

K 991761k=1

S k991761s=1

ηksξ DLks st bH

ksnbksn le macr pksn (69)

It can be shown that this problem can be solved by Algorithm

II with ∆ks = diag(δ ks1 middot middot middot δ ksN ) forallsK k=1

B Weighted sum rate optimization constrained with per an-

tenna and symbol power problem

By employing the approach of [11] (see (16) of [11]) one

can equivalently express the weighted sum rate maximizationconstrained with per antenna and symbol power problem as

P 6 (70)

minτ ksν ksbkswksforallsK

k=1

K 991761k=1

S k991761s=1

θks1

τ ksν γ ks

ks +K 991761

k=1

S k991761s=1

ηksξ DLks

st [BBH ](nn) le ˘ pnbH ksbks le ˘ pks

K prodk=1

S kprods=1

ν ks = 1 τ ks gt 0

where 0 lt ωks lt 1 forallsK k=1 are the rate weighting factors

for all symbols ηks = τ microksks γ ks = 11minusωks

microks = 1ωks

minus 1 and

macrθks = ωksmicro

(1minusωks)

ks For fixed τ ks ν ks foralls

K

k=1 the aboveoptimization problem has the same mathematical structure

as that of P 1 Thus by keeping τ ks ν ks forallsK k=1 constant

bkswks forallsK k=1 can be optimized by applying the MSE

duality discussed in Section IV Moreover τ ks ν ks forallsK k=1

and the power allocation part of the above problem can be

optimized by a GP method like in (25) of [20] Consequently

we can apply Algorithm II to solve (70) The detailed expla-

nations are omitted for conciseness The following problems

9This is at the expense of additional computation However as mentionedin [1] (see Appendix A of [1]) a small desktop computer can solve a GP of 100 variables and 10000 constraints by standard interior point method under aminute Thus we believe that the complexity of Algorithm I and Algorithm

II are almost the same

can also be solved by simple modification of Algorithm II

P 7 minBkWk

Kk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

SINRks ge ϱks forallnks

equiv minBkWkKk=1

K 991761k=1

trBkBH k

st [BBH ](nn) le ˘ pn

trBH k Bk le ˆ pk

ξ DLks le (1 + ϱks)minus1 forallnks

P 8 maxBkWk

Kk=1

min Rks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

equiv minBkWkKk=1

max ξ DLks

st [BBH ](nn) le ˘ pn bH ksbks le ˘ pks forallnks

where SINRks(Rks) is the SINR (rate) of the kth user sth

symbol and we use the fact that Rks = log(1 + SINRks)and ξ DL

ks = (1 + SINRks)minus1 [1] It is clearly seen that the

application of Algorithm II is not limited to the problems of

this paper

Note that under imperfect channel state information (CSI)

condition the stochastic robust design versions of P 1 - P 5 can

be solved like in [10] However to the best of our knowledge

the relationship between rate (SINR) and MSE is not known

when the CSI is imperfect [7] Hence solving the rate (SINR)-

based robust design problems (for example robust versions of

P 6 - P 8) by our duality approach is an open problem

X SIMULATION R ESULTS

In this section we present simulation results for P 1 minus P 4

All of our simulation results are averaged over 100 randomly

chosen channel realizations We set K = 2 N = 4 and

M k = S k = 2 ηks = ρks = ηk = ρk = 1 forallsK k=1

It is assumed that Rn1 = σ21IM 1 Rn2 = σ2

2IM 2 and

σ22 = 2σ2

1 The maximum power of each BS antenna is set

to ˘ pn = 25mW N n=1 And the maximum power allocated

to each symbol and user are set to ˘ pks

= 25mW forallsK

k=1and ˆ pk = 5mW K k=1 respectively For better exposition we

define the Signal-to-noise ratio (SNR) as P maxKσ2av and it

is controlled by varying σ2av where P max = 10mW is the

total maximum BS power and σ2av = (σ2

1 + σ22)2 We also

compare Algorithm II and the algorithm in [2]10

Note that the algorithm in [2] is designed for coordinated

BS systems scenario And the iterative algorithm of [2] is

based on the per BS power constraint However according

to [2] and [21] B coordinated BS systems each with Z

10As will be clear in the sequel the proposed algorithm and the algorithmof [2] may not utilize the entire 10mW for all noise levels Thus the afore-mentioned SNR can be considered as the maximum SNR of the transmitted

signal

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1215

12

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

Fig 2 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of WSMSE for [top] P 1 [bottom] P 2

antennas can be treated as one multiuser MIMO system with

BZ antennas Thus when Z = 1 the considered problem has

exactly the same structure as that of [2] To the best of our

knowledge there is no other general linear algorithm that cansolve the problem types P 1 minus P 4 On the other hand in all

problems since there are more than one power constraints (ie

per antenna and symbol (user) powers) all power constraints

may not be active at the optimal solution Due to these reasons

we compare Algorithm II and the algorithm in [2] both in

terms of the achieved MSE (ie minimized MSE) and total

utilized BS power at the achieved MSE

A Simulation results for problems P 1 minus P 2

In this subsection we compare the performance of our

proposed algorithm with that of [2] As can be seen from Fig

2 the proposed algorithm and the algorithm in [2] achievethe same symbol-wise and user-wise WSMSEs Next we plot

the total utilized powers at the BS to achieve these WSMSEs

which is shown in Fig 3 From these two figures one can see

that to achieve the same WSMSE the proposed duality based

iterative algorithm requires less total BS power than that of

[2] This scenario fits to that of [10] and [19] where the sum

MSE minimization constrained with a per BS antenna power

problem has been examined by duality approach

B Simulation results for problems P 3 minus P 4

Like in the above subsection here we compare the per-

formance of our proposed algorithm with that of [2] For

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 3 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 1 [bottom] P 2

For this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

10 15 20 25 30 350

005

01

015

02

025

SNR (dB)

M a x i m u m s y m b o l M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

005

01

015

02

025

03

035

04

045

05

SNR (dB)

M a x i m u m u s e r M S E

Algorithm II

Algorithm in [2]

Fig 4 Comparison of the proposed algorithm (Algorithm II) and that of

in [2] in terms of maximum achieved MSE for [top] P 3 [bottom] P 4

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 12: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1215

12

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

01

02

03

04

05

06

07

08

09

1

SNR (dB)

W e i g h t e d s u m M S E

Algorithm II

Algorithm in [2]

Fig 2 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of WSMSE for [top] P 1 [bottom] P 2

antennas can be treated as one multiuser MIMO system with

BZ antennas Thus when Z = 1 the considered problem has

exactly the same structure as that of [2] To the best of our

knowledge there is no other general linear algorithm that cansolve the problem types P 1 minus P 4 On the other hand in all

problems since there are more than one power constraints (ie

per antenna and symbol (user) powers) all power constraints

may not be active at the optimal solution Due to these reasons

we compare Algorithm II and the algorithm in [2] both in

terms of the achieved MSE (ie minimized MSE) and total

utilized BS power at the achieved MSE

A Simulation results for problems P 1 minus P 2

In this subsection we compare the performance of our

proposed algorithm with that of [2] As can be seen from Fig

2 the proposed algorithm and the algorithm in [2] achievethe same symbol-wise and user-wise WSMSEs Next we plot

the total utilized powers at the BS to achieve these WSMSEs

which is shown in Fig 3 From these two figures one can see

that to achieve the same WSMSE the proposed duality based

iterative algorithm requires less total BS power than that of

[2] This scenario fits to that of [10] and [19] where the sum

MSE minimization constrained with a per BS antenna power

problem has been examined by duality approach

B Simulation results for problems P 3 minus P 4

Like in the above subsection here we compare the per-

formance of our proposed algorithm with that of [2] For

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 075

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 3 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 1 [bottom] P 2

For this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

10 15 20 25 30 350

005

01

015

02

025

SNR (dB)

M a x i m u m s y m b o l M S E

Algorithm II

Algorithm in [2]

10 15 20 25 30 350

005

01

015

02

025

03

035

04

045

05

SNR (dB)

M a x i m u m u s e r M S E

Algorithm II

Algorithm in [2]

Fig 4 Comparison of the proposed algorithm (Algorithm II) and that of

in [2] in terms of maximum achieved MSE for [top] P 3 [bottom] P 4

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 13: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1315

13

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T

o t a l B S p o w e r

Algorithm II

Algorithm in [2]

minus25 minus20 minus15 minus10 minus5 07

75

8

85

9

95

10

σav

2 (dB)

T o

t a l B S p o w e r

Algorithm II

Algorithm in [2]

Fig 5 Comparison of the proposed algorithm (Algorithm II) and thealgorithm of [2] in terms of total BS power for [top] P 3 [bottom] P 4

In this figure we compute σ2av(dB) as σ2

av(dB)=10log σ2av1mW

these problems we also observe from Fig 4 that the proposed

algorithm and the algorithm in [2] achieve the same maximumsymbol and user MSEs And from Fig 5 the proposed duality

based algorithms utilize less total BS power compared to that

of [2] For all of our problems we observe that to achieve

the same MSE the proposed duality based iterative algorithm

utilizes less total BS power compared to the algorithm of [2]

This scenario has also been observed for other MSE and rate

based problems in [10] [19] [20]

Note that the problems of [2] are examined directly in the

downlink channel According to [5] [13] in general duality

approach of solving downlink transceiver design problems has

easier to handle mathematical structure (lower complexity)

compared to that of the direct approach in [2] For this reason

we believe that the computational complexity of the proposedduality algorithm is not higher than that of [2]

C Convergence speed of Algorithm II

As can be seen from Section VIII the overall computa-

tional complexity of Algorithm II depends on the number of

iterations to achieve convergence In general the number of

iterations to achieve convergence may not be the same for all

problems On the other hand for each problem getting the

exact number of iterations to achieve convergence analytically

is very difficult Due to these reasons we provide numerical

simulations to demonstrate the convergence speed of Algo-

rithm II for P 1 As can be seen from Fig 6 the proposed

algorithm converges within few iterations in low medium and

high SNR regions

2 4 6 8 10 12 14 16 18 200

025

05

075

1

125

15

175

2

225

25

Number of iterations

S y m b o l minus w i s e W S M S

E

Convergence Speed of Algorithm II

Algorithm II SNR = 0dB

Algorithm II SNR = 10dB

Algorithm II SNR = 20dB

Fig 6 Convergence speed of Algorithm II for P 1

X I CONCLUSIONS

In this paper we examine different transceiver design prob-

lems for multiuser MIMO systems under generalized linear

power constraints The problems are solved for the practically

relevant scenario where the noise vector of each MS is a

ZMCSCG random variable with arbitrary covariance matrix

For all of our problems we propose new downlink-interference

duality based iterative solutions The current duality are estab-

lished by formulating the noise covariance matrices of the dual

interference channels as fixed point functions and marginally

stable (convergent) discrete-time-switched systems We showthat the proposed duality based iterative algorithms can be

extended straightforwardly to solve several practically relevant

linear transceiver design problems We also show that our new

MSE downlink-interference duality unify all existing MSE

duality Our simulation results demonstrate that the proposed

duality based algorithms utilize less total BS power than that

of existing algorithms

APPENDIX A

PROOF OF T HEOREM 2

Proof Define D diag(A11 middot middot middot Ann) and A

D minus A It follows

A = D minus A rArr Aminus1 = Dminus1(I minus A)minus1

where A = ADminus1 Since (Iminus A) is strictly diagonally dom-

inant matrix (I minus A)minus1 exists [17] (page 349) Furthermore

if ρ(A) lt 1 (I minus A)minus1 can be expressed as

(I minus A)minus1 =

infin991761k=0

Ak (71)

It follows

Aminus1 =Dminus1(I minus A)minus1 = Dminus1infin

991761k=0

Ak ge 0 (72)

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 14: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1415

14

From this equation we can see that if ρ(A) lt 1 the

nonnegativity of Aminus1 can be ensured Next we show that ρ(A)is indeed less than 1 For any n times n matrix X we have [17]

(pages 294 and 297 of [17])

ρ(X) le|||X||| |||X||1 max1lejlen

n991761i=1

|xij | (73)

where |||||| is any matrix norm and ||||||1 is a matrix onenorm By using (73) we get the following bound [17]

ρ(A) le |||A|||1 lt 1 (74)

Since Aminus1 has nonnegative elements A is also an M-matrix

[22] By defining S Aminus1 and e 1ntimes1 we get

eT A = eT rArr eT = eT S =[n991761

j=1

Sj1 middot middot middot n991761

j=1

Sjn]

rArr |||S|||1 =1 (75)

where the third equality follows from the fact that S is a

nonnegative matrix

REFERENCES

[1] S Shi M Schubert and H Boche ldquoRate optimization for multiuserMIMO systems with linear processingrdquo IEEE Tran Sig Proc vol 56no 8 pp 4020 ndash 4030 Aug 2008

[2] S Shi M Schubert N Vucic and H Boche ldquoMMSE optimizationwith per-base-station power constraints for network MIMO systemsrdquoin Proc IEEE International Conference on Communications (ICC)Beijing China 19 ndash 23 May 2008 pp 4106 ndash 4110

[3] P Ubaidulla and A Chockalingam ldquoRobust transceiver design formultiuser MIMO downlinkrdquo in Proc IEEE Global Telecommunications

Conference (GLOBECOM) Nov 30 ndash Dec 4 2008 pp 1 ndash 5[4] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiver

optimization for multiuser MIMO systems Duality and sum-MSEminimizationrdquo IEEE Tran Sig Proc vol 55 no 11 pp 5436 ndash 5446

Nov 2007[5] R Hunger M Joham and W Utschick ldquoOn the MSE-duality of the

broadcast channel and the multiple access channelrdquo IEEE Tran Sig

Proc vol 57 no 2 pp 698 ndash 713 Feb 2009[6] M Schubert S Shi E A Jorswieck and H Boche ldquoDownlink sum-

MSE transceiver optimization for linear multi-user MIMO systemsrdquo inConference Record of the Thirty-Ninth Asilomar Conference on Signals

Systems and Computers Oct 28 ndash Nov 1 2005 pp 1424 ndash 1428[7] T E Bogale B K Chalise and L Vandendorpe ldquoRobust transceiver

optimization for downlink multiuser MIMO systemsrdquo IEEE Tran Sig

Proc vol 59 no 1 pp 446 ndash 453 Jan 2011[8] T E Bogale and L Vandendorpe ldquoMSE uplink-downlink duality of

MIMO systems with arbitrary noise covariance matricesrdquo in 45th Annual

conference on Information Sciences and Systems (CISS) Baltimore MDUSA 23 ndash 25 Mar 2011

[9] W Yu and T Lan ldquoTransmitter optimization for the multi-antenna

downlink with per-antenna power constraintsrdquo IEEE Trans Sig Procvol 55 no 6 pp 2646 ndash 2660 Jun 2007[10] T E Bogale and L Vandendorpe ldquoRobust sum MSE optimization

for downlink multiuser MIMO systems with arbitrary power constraintGeneralized duality approachrdquo IEEE Tran Sig Proc Dec 2011

[11] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO coordinated base station systems Centralizedand distributed algorithmsrdquo IEEE Tran Sig Proc Dec 2011

[12] H Sampath P Stoica and A Paulraj ldquoGeneralized linear precoderand decoder design for MIMO channels using the weighted MMSEcriterionrdquo IEEE Tran Sig Proc vol 49 no 12 pp 2198 ndash 2206 Dec2001

[13] S Shi M Schubert and H Boche ldquoDownlink MMSE transceiveroptimization for multiuser MIMO systems MMSE balancingrdquo IEEE

Tran Sig Proc vol 56 no 8 pp 3702 ndash 3712 Aug 2008[14] V Berinde ldquoGeneral constructive fixed point theorems for Ciric-type

almost contractions in metric spacesrdquo Carpathian J Math vol 24 no

2 pp 10 ndash 19 2008

[15] V Berinde ldquoApproximation fixed points of weak contractions using thePicard iterationrdquo Nonlinear Analysis Forum vol 9 no 1 pp 43 ndash 532004

[16] Z Sun ldquoA note on marginal stability of switched systemsrdquo IEEE Tran

Auto Cont vol 53 no 2 pp 625 ndash 631 2008[17] R H Horn and C R Johnson Matrix Analysis Cambridge University

Press Cambridge 1985[18] S Boyd and L Vandenberghe Convex optimization Cambridge

University Press Cambridge 2004[19] T E Bogale and L Vandendorpe ldquoSum MSE optimization for downlink

multiuser MIMO systems with per antenna power constraint Downlink-uplink duality approachrdquo in 22nd IEEE International Symposium on

Personal Indoor and Mobile Radio Communications (PIMRC) TorontoCanada 11 ndash 14 Sep 2011

[20] T E Bogale and L Vandendorpe ldquoWeighted sum rate optimization fordownlink multiuser MIMO systems with per antenna power constraintDownlink-uplink duality approachrdquo in IEEE International Conference

On Acuostics Speech and Signal Processing (ICASSP) Kyoto Japan25 ndash 30 Mar 2012

[21] T Tamaki K Seong and J M Cioffi ldquoDownlink MIMO systems usingcooperation among base stations in a slow fading channelrdquo in Proc

IEEE International Conference on Communications (ICC) GlasgowUK 24 ndash 28 Jun 2007 pp 4728 ndash 4733

[22] G Poole and T Boullion ldquoA survey on M-matricesrdquo Society for

Industrial and Applied Mathematics (SIAM) vol 16 no 4 pp 419ndash 427 1974

Tadilo Endeshaw Bogale was born in GondarEthiopia He received his BSc and MSc degreein Electrical Engineering from Jimma UniversityJimma Ethiopia and Karlstad University KarlstadSweden in 2004 and 2008 respectively From 2004-2007 he was working in Ethiopian Telecommuni-cations Corporation (ETC) in mobile project depart-ment

Since 2009 he has been working towards his PhDdegree and as an assistant researcher at the ICTEAMinstitute University Catholique de Louvain (UCL)

Louvain-la-Neuve Belgium His reasearch interests include robust (non-robust) transceiver design for multiuser MIMO systems centralized anddistributed algorithms and convex optimization techniques for multiuser

systems

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE

Page 15: Linear Transceiver design for Downlink Multiuser  MIMO Systems: Downlink-Interference Duality  Approach

8142019 Linear Transceiver design for Downlink Multiuser MIMO Systems Downlink-Interference Duality Approach

httpslidepdfcomreaderfulllinear-transceiver-design-for-downlink-multiuser-mimo-systems-downlink-interference 1515

15

Luc Vandendorpe (Mrsquo93-SMrsquo99-Frsquo06) was bornin Mouscron Belgium in 1962 He received theElectrical Engineering degree (summa cum laude)and the PhD degree from the Universit Catholiquede Louvain (UCL) Louvain-la-Neuve Belgium in1985 and 1991 respectively Since 1985 he has beenwith the Communications and Remote Sensing Lab-oratory of UCL where he first worked in the fieldof bit rate reduction techniques for video coding In1992 he was a Visiting Scientist and Research Fel-low at the Telecommunications and Traffic Control

Systems Group of the Delft Technical University The Netherlands where heworked on spread spectrum techniques for personal communications systemsFrom October 1992 to August 1997 he was Senior Research Associate of the Belgian NSF at UCL and invited Assistant Professor He is currentlya Professor and head of the Institute for Information and CommunicationTechnologies Electronics and Applied Mathematics

His current interest is in digital communication systems and more pre-cisely resource allocation for OFDM(A)-based multicell systems MIMO anddistributed MIMO sensor networks turbo-based communications systemsphysical layer security and UWB based positioning

Dr Vandendorpe was corecipient of the 1990 Biennal Alcatel-Bell Awardfrom the Belgian NSF for a contribution in the field of image coding In2000 he was corecipient (with J Louveaux and F Deryck) of the BiennalSiemens Award from the Belgian NSF for a contribution about filter-bank-based multicarrier transmission In 2004 he was co-winner (with J Czyz)

of the Face Authentication Competition FAC 2004 He is or has beenTPC member for numerous IEEE conferences (VTC Globecom SPAWCICC PIMRC WCNC) and for the Turbo Symposium He was Co-TechnicalChair (with P Duhamel) for the IEEE ICASSP 2006 He was an Editorfor Synchronization and Equalization of the IEEE TRANSACTIONS ONCOMMUNICATIONS between 2000 and 2002 Associate Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS between 2003 and2005 and Associate Editor of the IEEE TRANSACTIONS ON SIGNALPROCESSING between 2004 and 2006 He was Chair of the IEEE Benelux

joint chapter on Communications and Vehicular Technology between 1999 and2003 He was an elected member of the Signal Processing for Communicationscommittee between 2000 and 2005 and an elected member of the SensorArray and Multichannel Signal Processing committee of the Signal ProcessingSociety between 2006 and 2008 Currently he is an elected member of theSignal Processing for Communications committee He is the Editor-in-Chief for the EURASIP Journal on Wireless Communications and Networking LVandendorpe is a Fellow of the IEEE


Recommended