Probabilistic constrained multicast beamforming in cognitive relay systems
 Shengyu Li^{1},
 Wenjun Xu^{1}Email author,
 Xiaomei Lu^{1} and
 Jiaru Lin^{1}
https://doi.org/10.1186/s1363801502531
© Li et al.; licensee Springer. 2015
Received: 8 August 2014
Accepted: 7 January 2015
Published: 31 January 2015
Abstract
In this paper, multicast beamforming in cognitive relay systems is investigated with the consideration of imperfect channel state information at the transmitter (CSIT). We focus at the design of the optimal signal forwarding matrix at the cognitive relay in both centralized relay mode (CRM) and distributed relay mode (DRM). The problem is formulated aiming at minimizing the total consumed power at the relay node with suitable QoS guarantee for secondary users and strict interference control for primary users. Due to the uncertainty of transmission channel gains, constraints for QoS guarantee and interference control cannot be expressed in closed forms, making it extremely difficult to solve the problem directly. To circumvent this, we first employ the Bernsteintype inequality to convert the probabilistic constraints into closedform expressions and then present both the semidefinite relaxation (SDR) algorithm and the penalty function (PenFun) algorithm to accomplish the nonconvex problem optimization. Simulation results show that CRM is more resource efficient than DRM, and the PenFun algorithm can achieve a much better solution than the SDR algorithm at the cost of complexity. Meanwhile, compared with existing schemes which do not consider the CSIT error, the proposed schemes can support a much lower outage probability and enjoy perfect interference control for primary users.
Keywords
1 Introduction
In recent years, along with the development of wireless communication technologies and the proliferation of multimedia services, multicast transmission has become an indispensable part of mobile communication systems, e.g., Multimedia Broadcast/Multicast Service (MBMS) in 3GPP [1], Broadcast and Multicast Service (BCMCS) in 3GPP2 [2], and Multicast and Broadcast Service (MBS) in IEEE 802.16 [3]. As a result, large amounts of effort has been made to design resourceefficient multicast schemes, among which cooperative multicast with the help of multiantenna relay nodes has attracted many researchers’ attention [47].
In the cooperative multicast scheme, multiantenna relay nodes may operate in either the distributed or the centralized manner. When operating in the distributed manner, each antenna forwards its own received signal with a respective amplification factor. For example, aiming at minimizing the total transmit power, the authors in [4,5] have studied the amplification factor optimization for a single multicast session and multiple multicast sessions, respectively. The model is superior when information exchange among different antennas is difficult, e.g., cooperative multicast in wireless sensor networks. By contrast, when the relay node operates in the centralized manner, each antenna forwards a combination of all received signals. In other words, joint signal processing across different antennas is executed in this manner. Although the implementation complexity increases, the supported throughput is much higher due to more optimization degrees of freedom [6,7].
Meanwhile, cognitive radio (CR), allowing secondary users to access the authorized spectrum bands with suitable interference control, is able to significantly improve the spectrum utilization and has been acknowledged as one of the most potential technologies in the next communication system [8]. Although cognitive beamforming has been well developed for several years, existing researches mainly focus on beamformer design at cognitive base stations, either for secondary users’ data transmission with restricted transmit power [9,10] or for primarysecondary cooperation with careful designed cooperation protocols [11,12]. There are also some works paying attention to the combination of multicast transmission and CR technology [1315]. However, as far as we know, most of those researches concentrate on onehop transmission, with few papers concerning cooperative multicast, especially multicast transmission via multiantenna relays.
In this paper, the CR technology and the cooperative multicast are jointly considered, and the multicast beamforming problem in cognitive relay systems is investigated. As mentioned above, the relay node can operate in either the centralized manner or the distributed manner, and these two relay modes, denoted as centralized relay mode (CRM) and distributed relay mode (DRM) respectively, have their own strong points and weakness. Hence, both CRM and DRM are included in our problem formulation. Furthermore, due to the channel feedback error and the feedback delay, perfect channel state information at the transmitter (CSIT) is always unavailable in practice. Unfortunately, to the best of our knowledge, most of the existing researches [47,1315] only apply to perfect CSIT feedback model. Therefore, imperfect CSIT feedback is also considered in our research model to enhance the practicability of our study.
More specially, we pay attention to the design of the optimal multicast signal forwarding matrix at the multiantenna cognitive relay. The formulated problem aims at minimizing the total consumed power at the relay node, subject to the constraints that the minimum received signaltointerferenceplusnoise ratio (SINR) requirement at each cognitive destination and the maximum received interference requirement at each primary user are satisfied with a prescribed, usually very high, probability. Different from the model of perfect CSIT feedback, constraints for the SINR guarantee and the interference control are in probabilistic forms, instead of closed forms. This characteristic makes it difficult to solve the formulated problem as we cannot compute the probability directly.
In this paper, a safe approximation is presented to solve the question, and detailed algorithms for both DRM and CRM are carefully designed. In DRM, the optimal forwarding matrix is a diagonal matrix. To optimize the diagonal vector, the Bernsteintype inequality is utilized to transform the probabilistic constraints into closedform expressions, making the problem easy to tackle. Thereafter, the semidefinite relaxation (SDR) method and the penalty function (PenFun) method are adopted to solve the problem efficiently. In CRM, we first prove that the optimal forwarding matrix is the combination of a matchedfilter receiver and an adaptive beamformer and then jointly exploit the Bernsteintype inequality and the PenFun method to accomplish the adaptive beamformer design.
2 Notation
Throughout this paper, the following notations are defined. \(\mathbb {C}^{N\times M}\) and \(\mathbb {D}^{N}\) denote the set of all N×M complex matrices and the set of all N×N diagonal complex matrices, respectively. I is the identity matrix with a suitable dimension. \(\mathcal {CN}(\mu,\sigma ^{2})\) is the complex Gaussian distribution with mean value μ and variance σ ^{2}, and Pr{θ} is the probability that case θ occurs. A≽0 means that matrix A is positive semidefinite, and A ^{⊥} is the orthonormal basis for the null space of A. A ^{ H }, ∥A∥, Re[A], Tr[A], Rank[A] and λ _{max}(A) mean the conjugate transpose, the Frobenius norm, the real part, the trace, the rank and the maximal eigenvalue of matrix A, respectively.
3 System model and problem formulation
3.1 Imperfect CSIT feedback model
For the sake of convenience, some symbols are predefined here. \(\mathbf {f}\in \mathbb {C}^{N\times 1}\) is the transmission channel vector from the cognitive source to the cognitive relay. \(\mathbf {h}_{\mathrm {c},k}\in \mathbb {C}^{N\times 1}\) and \(\mathbf {h}_{\mathrm {p},l} \in \mathbb {C}^{N\times 1}\) are the transmission channel vectors from the cognitive relay to destination k and primary user l, respectively.
This paper concerns how to select the optimal forwarding matrix W at the cognitive relay (shown in the next subsection). Hence, f is assumed to be perfectly known since it can be obtained by channel estimation at the cognitive relay. By contrast, h _{c,k } and h _{p,l }, which are obtained by channel feedback from cognitive destinations and primary users, are imperfectly known at the cognitive relay.
where \(\hat {\mathbf {h}}_{\mathrm {c},k}\) and \(\hat {\mathbf {h}}_{\mathrm {p},l}\) are the presumed CSIT at the cognitive relay for destination k and primary user l, respectively, and e _{c,k } and e _{p,l } are the corresponding CSIT feedback errors.
Similar to [17], it is assumed that the CSIT feedback errors are complex Gaussian distributed, i.e., \(\mathbf {e}_{\mathrm {c},k}\sim \mathcal {CN}\left (\mathbf {0}, \mathbf {C}_{\mathrm {c},k}\right)\), \(\mathbf {e}_{\mathrm {p},l}\sim \mathcal {CN}\left (\mathbf {0},\mathbf {C}_{\mathrm {p},l}\right)\). For brevity, C _{c,k } and C _{p,l } are simplified as \(\mathbf {C}_{\mathrm {c},k} = \sigma _{\mathrm {c},k}^{2}\mathbf {I}\), \(\mathbf {C}_{\mathrm {p},l} = \sigma _{\mathrm {p},l}^{2} \mathbf {I}\). This simplification is to facilitate our description below and does not change the overall analysis of our problem.
3.2 Transmission model and problem formulation
where \(\mathbf {z}_{\mathrm {R}}\sim \mathcal {CN}\left (\mathbf {0},{\sigma _{z}^{2}}\mathbf {I}\right)\) is the the received noise at the cognitive relay.
where \(z_{k}\sim \mathcal {CN}\left (0,{\sigma _{z}^{2}}\right)\) is the received interference plus noise.
where p _{s} is the transmit power of the cognitive source.

Centralized relay mode (CRM): In this mode, joint signal processing is allowed. Therefore, each antenna forwards a combination of the received signals [7], and W can be chosen as any N×N complex matrix, i.e.,$$\begin{array}{@{}rcl@{}} \mathbf{W}\in \mathbb{C}^{N\times N}. \end{array} $$(9)
This mode is preferable when antennas are deployed together and information exchange is available.

Distributed relay mode (DRM): In this mode, each antenna forwards its own received signal independently [4,5], and as a result, W should be a diagonal matrix, i.e.,$$\begin{array}{@{}rcl@{}} \mathbf{W}= \text{Diag}(\mathbf{w}) \in \mathbb{D}^{N}. \end{array} $$(10)
This mode is suited for the case where relay antennas are far apart from each other and large amounts of information exchange is difficult, except for channel state information.
where γ _{th} is the minimum required transmission SINR of the broadcast message, I _{th,l } is the interference threshold for primary user l, and P _{th} is the maximum transmit power at the cognitive relay. \(\mathcal {C}_{1}\) implies that the maximum outage probability for any cognitive destination should be no more than ρ _{c}. \(\mathcal {C}_{2}\) restricts that the probability that primary user l’s received interference exceeds the prescribed threshold I _{th,l } should be less than ρ _{p}. Throughout this paper, \(\mathcal {C}_{1}\) and \(\mathcal {C}_{2}\) are also named as the maximum outage probability constraint for each cognitive destination and the maximum overinterference probability constraint for each primary user for short.
Remark 1.

To make a better understanding on these investigated two relay modes, we compare CRM and DRM to Joint Processing (JP) and Coordinated Beamforming (CB) in Coordinated MultiPoint transmission (CoMP) [18], where transmit antennas in our model correspond to transmit points in CoMP. In JP, both transmission data and channel information need to be shared among different transmit points, and a joint signal processing is required, while in CB, only channel information exchange is necessary and each point optimizes its own beamformer in a distributed manner.

Meanwhile, perfect synchronization among antennas is assumed in this paper, for both CRM and DRM. In CRM, synchronization could be simply achieved as antennas are deployed together. In DRM, although antennas are deployed apart from each other, a necessary backhaul link, either wired or wireless, is required to bear the channel information exchange, which could also be responsible for the antenna synchronization. This is similar to the case of CB, where a limited backhaul link is established to take charge of the channel information exchange and the point synchronization.
4 Algorithm design for DRM
In this section, the optimal forwarding matrix design problem for DRM is handled, which is indeed to optimize its diagonal vector. Toward this end, the Bernsteintype inequality and the SDR/PenFun method are jointly employed to solve the complex problem. In the next section, we prove that the optimal forwarding matrix W in CRM should be a rankone matrix. Based on this observation, the optimization of the forwarding matrix is transformed into the beamformer design, which can also be efficiently solved with the PenFun method.
4.1 Problem transformation
4.2 Closedform expressions for constraints \(\mathcal {C}_{1}\) and \(\mathcal {C}_{2}\)
where \(\mathbf {A}_{\mathrm {c}}= \frac {p_{\mathrm {s}}}{\gamma _{\text {th}}}\mathbf {F}\mathbf {X}\mathbf {F}^{H}  {\sigma _{z}^{2}} \mathbf {X}\), and the last step is obtained due to that A _{c} is a Hermitian matrix.
where β _{c}=− lnρ _{c}, and x _{c,k }≥0, y _{c,k }≥0 are some new added variables. Here, β _{c} could be deemed as a penalty factor for the uncertainty of \(\tilde {\mathbf {e}}_{\mathrm {c},k}\). Note that if constraint \(\mathcal {C}_{1}'\) is satisfied, then constraint \(\mathcal {C}_{1}\) is satisfied. Proof for detailed derivation could be found in Lemma 2 in [19]. In this sense, we state that the constraint transformation is safe.
where \(\mathbf {A}_{\mathrm {p}}=p_{\mathrm {s}}\mathbf {F}\mathbf {X}\mathbf {F}^{H} + {\sigma _{z}^{2}}\mathbf {X}\).
Remark 2.

As constraints \(\mathcal {C}_{1}'\) and \(\mathcal {C}_{2}'\) are only sufficient conditions for \(\mathcal {C}_{1}\) and \(\mathcal {C}_{2}\), the optimal value of \(\mathcal {Q}^{\text {DRM}}_{1}\) is only an upper bound of the minimum power consumption of the original problem \(\mathcal {Q}^{\text {DRM}}\).

Since the maximum outage probability constraint \(\mathcal {C}_{1}'\) and the maximum overinterference probability constraint \(\mathcal {C}_{2}'\) provide a lower bound and an upper bound for the power consumption Tr(B X) respectively, problem \(\mathcal {Q}^{\text {DRM}}_{1}\) is not always feasible.
4.3 Detailed algorithm design
Problem \(\mathcal {Q}^{\text {DRM}}_{1}\) is nonconvex due to the rankone constraint, i.e., Rank(X)=1. Fortunately, some effective methods have been proposed to cope with this kind of multicast beamforming problem with rankone constraints, including semidefinite relaxation (SDR) [17,20], secondorder cone programming (SOCP) [5,21], PenFun method [13,15] and so on.
As the most frequently used method, the SDR method is simple to implement and the complexity is relatively low. By comparison, the PenFun method can approximate the optimal solution better with an increased complexity. Therefore, in the following, we first analyze the SDR algorithm briefly as a benchmark algorithm and then present the PenFun algorithm in detail as an advanced algorithm.
4.3.1 SDR algorithm
In the SDR algorithm, we first relax the problem and solve the relaxed problem to obtain a relaxed optimal solution. As the relaxed solution is always close to the original optimal solution for the nonrelaxed problem, we can generate feasible solutions around the relaxed solution and select the best one. With regard to the formulated problem \(\mathcal {Q}^{\text {DRM}}_{1}\), the following two successive steps are executed to acquire a suboptimal solution.
In the first step, the rankone constraint is dropped, after which problem \(\mathcal {Q}^{\text {DRM}}_{1}\) turns to be a convex problem and could be solved by the frequently used convex optimization methods, for example, the interior point algorithm. In this paper, the semidefinite programming (SDP) [17] is adopted to solve the relaxed problem. The detailed algorithm procedure is omitted as it is not the focus of this paper, and the optimal solution obtained from SDP is denoted as X _{opt}.
Finally, from those feasible candidates obtained in the randomization process, select the optimal w(i) with the minimum power consumption P _{c}(i) at the cognitive relay.
4.3.2 PenFun algorithm
The most related work concerning the PenFun method is [13], in which the authors transform the rankone constraint into a concave penalty in the objective function and then handle the transformed problem with the convexconcave processing (CCP). However, this work only applies to perfect CSIT models, and in our paper, the algorithm is extended to the imperfect CSIT model.
where μ>0 is a large enough weight to result in small Tr(X)−λ _{max}(X). As f _{ o }(X) is concave, problem \(\mathcal {Q}^{\text {DRM}}_{2}\) is minimization of a concave function over a convex set, which can be efficiently solved with CCP [13,15].
where x _{max} is the normalized principal eigenvector of X ^{(t)}, i.e., the eigenvector corresponding to the maximal eigenvalue λ _{max}(X ^{(t)}).
Problem \(\mathcal {Q}^{\text {DRM}}_{3}\) is convex and can be efficiently solved by the SDP method [17]. The whole process of the PenFun algorithm for problem \(\mathcal {Q}^{\text {DRM}}_{1}\) is summarized as follows.
Input:
1: μ, t=0, X ^{(0)}, ε _{ d }, ε _{ Δ }.
Initialization:
2: Calculate d=Tr(X ^{(t)})−λ _{max}(X ^{(t)}). If d≤ε _{ d }, terminate the initialization stage.
3: Calculate λ _{max}(X ^{(t)}), x _{max} and solve problem \(\mathcal {Q}^{\text {DRM}}_{3}\), acquiring the optimal X ^{(t+1)}.
4: Calculate Δ=∥X ^{(t+1)}−X ^{(t)}∥. If Δ≤ε _{ Δ }, let μ=2μ.
5: Set t=t+1, and go back to step 2.
Iteration:
6: Calculate λ _{max}(X ^{(t)}), x _{max} and solve problem \(\mathcal {Q}^{\text {DRM}}_{3}\), acquiring the optimal solution X ^{(t+1)}.
7: Calculate Δ=∥X ^{(t+1)}−X ^{(t)}∥. If Δ≤ε _{ Δ }, terminate the Iteration stage.
8: Set t=t+1, and go back to step 6.
5 Algorithm design for CRM
In this section, Lemma 1 is presented to show that the optimal W in CRM is a rankone matrix. Specially, W is the combination of the matchedfilter receiver f ^{ H } and the adaptive beamformer w. Based on this lemma, the matrix optimization is transformed into the beamformer design, which is similar to the problem in DRM. Finally, the Bernsteintype inequality and the PenFun method are jointly employed to solve the beamformer design problem.
5.1 Optimal structure of the forwarding matrix W
Lemma 1.
Proof.
See Appendix A.
This is because the achieved transmission SINR is limited by the channel gain from the cognitive source to the cognitive relay.
5.2 Closedform expressions for constraints \(\mathcal {C}_{1}\) and \(\mathcal {C}_{2}\)
where β _{c}=− lnρ _{c}, and x _{c,k }≥0, y _{c,k }≥0 are some new added variables.
Similar to the analysis in Remark 2, \(\mathcal {Q}^{\text {CRM}}_{1}\) only gives an upper bound of the original problem \(\mathcal {Q}^{\text {CRM}}\) as constraints \(\mathcal {C}_{1}'\) and \(\mathcal {C}_{2}'\) are sufficient but not necessary conditions for \(\mathcal {C}_{1}\) and \(\mathcal {C}_{2}\). Meanwhile, problem \(\mathcal {Q}^{\text {CRM}}_{1}\) is also not always feasible.
5.3 Detailed algorithm design
Similarly, both SDR and PenFun methods can be employed to solve problem \(\mathcal {Q}^{\text {CRM}}_{1}\). For brevity, the detailed explanation for the SDR algorithm is omitted, and in the following, we explain the PenFun algorithm simply.
Then, the CCP method is adopted to solve the nonconvex optimization problem \(\mathcal {Q}^{\text {CRM}}_{2}\), in which the optimization of problem \(\mathcal {Q}^{\text {CRM}}_{2}\) is decomposed into the iterative optimization of a series of convex problems.
Problem \(\mathcal {Q}^{\text {CRM}}_{3}\) can be solved with the SDP method. The detailed process of the PenFun algorithm for \(\mathcal {Q}^{\text {CRM}}_{1}\) is similar to the one for \(\mathcal {Q}^{\text {DRM}}_{1}\) and is omitted due to space limitation.
6 Performance evaluation
In this paper, the channel gain between any antenna pair is modeled as h=d ^{−c/2} e ^{ j θ } [12], where d is transmission distance, c, chosen as 3.5, is the path loss exponent, and θ is uniformly distributed in [ 0,2π). The distance between the cognitive source and the cognitive relay is set as 1, and the distance between the cognitive relay and cognitive destinations ranges from 1 to 2 uniformly. Meanwhile, for brevity, the distance from the cognitive relay to primary users is fixed as 3.
The CSIT errors for the Rayleigh channel are σ _{c,k }=0.1 and σ _{p,l }=0.2 by default. While calculating the overall CSIT errors, the path loss d ^{−c/2} should be multiplied. The prescribed maximum outage probability threshold and the maximum overinterference probability threshold are set as ρ _{c}=ρ _{p}=0.1.
Other simulation parameters which are fixed throughout the following simulations include: N=4, K=8, L=2, p _{s}=1 W, \({\sigma _{z}^{2}}=30\) dBW.

Processor: Intel(R) Core(TM) i32130 CPU@ 3.40 GHz;

RAM: 2 GHz (1.8 GHz available);

System type: a 32bit operation system.
It is shown that no matter in DRM or CRM, the successful transmission probability of the PenFun algorithm is much higher than that of the SDR algorithm. Meanwhile, for the SDR algorithm, CRM can sustain a higher successful transmission probability than DRM. It is also found that along with the increase of the required transmission SINR γ _{th}, the average consumed power of all four schemes increases correspondingly. Moreover, CRM with the PenFun algorithm consumes the least transmit power, and DRM with the SDR method consumes the most transmit power. In addition, compared to DRM with the SDR algorithm, improving the optimization algorithm (employing the PenFun algorithm) is able to reduce more power consumption than improving the relay mode (employing CRM). In other words, during the observed range of γ _{th}, the performance gain obtained from the algorithm improvement is larger than that from the mode improvement.
Figures 5 and 6 are the comparison of the average outage probability of cognitive destinations and the average overinterference probability of primary users. To be fair, only outage probability and overinterference probability in the channel realization with successful transmission are averaged in simulations.
It is observed that when the formulated problem is feasible, all these four schemes can provide robust data reception for destinations. The maximum outage probability is about 0.006, much lower than the prescribed threshold ρ _{c}=0.1. However, it is easy to prove that the maximum outage probability constraint \(\mathcal {C}_{1}\) in problem should be satisfied tightly, indicating an achieved outage probability equal to ρ _{c}. The achieved results do not agree with our analysis. This is because that constraint \(\mathcal {C}_{1}\) is conservatively transformed into \(\mathcal {C}_{1}'\) in problems \(\mathcal {Q}^{\text {DRM}}_{1}\) and \(\mathcal {Q}^{\text {CRM}}_{1}\), and hence the achieved outage probabilities in these two transformed problems become much lower than the prescribed thresholds.
Similarly, all these schemes support perfect interference control for primary users, with the maximum overinterference probability less than 0.015. The achieved overinterference probability is much lower than the prescribed threshold ρ _{p}=0.1 because the maximum overinterference probability constraint \(\mathcal {C}_{2}\) is strengthened in the transformed problems \(\mathcal {Q}^{\text {DRM}}_{1}\) and \(\mathcal {Q}^{\text {CRM}}_{1}\).
Figure 7 shows the average computation time of different schemes. We can observe that the average computation time of the PenFun algorithm is about 3 (7.5) times higher than that of the SDR algorithm for DRM (CRM). And moreover, DRM consumes more computation time than CRM does.

1) As the optimization degree of freedom of CRM is larger than that of DRM, CRM provides better resource utilization, resulting in higher successful transmission probability and less consumed power.

2) No matter in DRM or CRM, the PenFun algorithm can achieve a much better solution than the SDR algorithm, i.e., the PenFun algorithm supports higher successful transmission probability and consumes less transmit power. However, an iterative optimization is required as shown in Sections 3.3.2 and 4.3, leading to a much higher computation complexity.

3) With respect to the successful transmission probability and the total consumed power, improving the optimization algorithm results in larger performance gain than improving the relay mode.

3) The achieved outage probability and overinterference probability in the proposed schemes are much lower than the prescribed thresholds. To approximate the original constraints and reduce the power consumption, β _{c}=− lnρ _{c}/ε _{c} (β _{p}=− lnρ _{p}/ε _{p}) can be adopted in the constraint transformation, where ε _{c}>1 (ε _{p}>1) is the adjustment parameter, and can be obtained by the training process and the bisection search [16].
Moreover, the performance of relaying schemes which do not consider CSIT error is also simulated. In the following figures, the proposed relaying schemes are denoted as ‘DRM w.c. CSIT error’ and ‘CRM w.c. CSIT error’, where the PenFun algorithm is adopted in the simulations. By contrast, ‘DRM w/o.c. CSIT error’ and ‘CRM w/o.c. CSIT error’ denote the relaying schemes which do not consider CSIT error, and the adopted algorithms are mainly modified from [5,7] respectively.
In contrast, the proposed schemes can guarantee the maximum outage probability constraint and the maximum overinterference probability constraint perfectly no matter what value I _{th,l } is set. The guarantee for the maximum outage probability and the maximum overinterference probability is achieved at the cost of lower successful transmission probability and larger power consumption.
7 Conclusion
This paper investigates the optimal forwarding strategy design for multicast transmission in cognitive relay systems with both DRM and CRM. Meanwhile, to improve the practicability of our research, imperfect CSIT feedback is considered. For DRM, we employ the Bernsteintype inequality to transform the probabilistic constraints into closedform expressions and then utilize the SDR/PenFun method to optimize the diagonal vector. For CRM, we first derive the optimal structure of the forwarding matrix and then jointly exploit the Bernsteintype inequality and the PenFun method to solve the transformed problem. Simulation results show that CRM provides higher resource utilization, and the PenFun algorithm can achieve better solution than the SDR algorithm at the cost of increased complexity. Moreover, compared with the existing schemes, which concentrate on perfect CSIT feedback model, the proposed scheme can provide a superior user experience for secondary users and protect the communications of primary users better by keeping both the outage probability for secondary users and the overinterference probability for primary users below the prescribed thresholds. However, only one multicast session and one relay node are considered in this paper. In our future work, the research will be extended to multiple mulicast sessions and multiple relay nodes.
8 Appendix A: Proof of Lemma 1
Let H=[h _{c,1},…,h _{c,K },h _{p,1},…,h _{p,L }], and the optimal structure of W is analyzed in the following two different cases.
where \(\mathbf {a}\in \mathbb {C}^{(K+L)\times 1}\), \(\mathbf {B}\in \mathbb {C}^{(K+L)\times (N1)}\).
where \(\mathbf {c}\in \mathbb {C}^{(NKL)\times 1}\), \(\mathbf {D}\in \mathbb {C}^{(NKL)\times (N1)}\).
In conclusion, the optimal structure of the forwarding matrix W in Lemma 1 is acquired.
Declarations
Acknowledgements
This work is supported by National Natural Science Foundation of China (61471059), the 863 Project No.2014AA01A701, fundamental Research Funds for the Central Universities (2014ZD0301), Special Youth Science Foundation of Jiangxi (20133ACB21007).
Authors’ Affiliations
References
 3GPP, Improvement of the Multimedia Broadcast Multicast Service (MBMS) in UTRAN,3GPP TR 25.905 (2007).Google Scholar
 GPP, 2, CDMA2000 High Rate BroadcastMulticast Packet Data Air Interface Specification,2GPP2 Std. C.S0054, Rev. 1.0 (2005).Google Scholar
 IEEE, Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment2 : Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum 1. IEEE Std 802. 16e (2005).Google Scholar
 A Abdelkader, M Pesavento, AB Gershman. IEEE International. Workshop Compun. Adv. MultiSensor Adaptive Process. San Juan, (2011), pp. 225–228.Google Scholar
 N Bornhorst, M Pesavento, AB Gershman, Distributed beamforming for multigroup multicasting relay networks. IEEE Trans. Signal Process. 60(1), 221–232 (2012).View ArticleMathSciNetGoogle Scholar
 V HavaryNassab, S Shahbazpanahi, A Grami, Joint receivetransmit beamforming for multiantenna relaying schemes. IEEE Trans. Signal Process. 58(9), 4966–4972 (2010).View ArticleMathSciNetGoogle Scholar
 M Dong, B Liang, in IEEE International Workshop on Compun. Adv. MultiSensor Adaptive Process., St. Martin. Multicast Relay Beamforming through Dual Approach, (2013), pp. 492–495.Google Scholar
 A Goldsmith, SA Jafar, I Maric, I Maric, S Srinivasa, Breaking spectrum gridlock with cognitive radios: an information theoretic perspective. Proc. IEEE. 97(5), 894–914 (2009).View ArticleGoogle Scholar
 L Zhang, YC Liang, Y Xin, HV Poor, Robust cognitive beamforming with partial channel state information. IEEE Trans. Wireless Commun. 8(8), 4143–4153 (2009).View ArticleGoogle Scholar
 R Zhang, Y Liang, S Cui, Dynamic resource allocation in cognitive radio networks. IEEE Signal Process Mag. 27(3), 102–114 (2010).View ArticleMathSciNetGoogle Scholar
 SH Song, MO Hasna, KB Letaief, Prior zero forcing for cognitive relaying. IEEE Trans. Wireless Commun. 12(2), 938–947 (2013).View ArticleGoogle Scholar
 G Zheng, S Song, K Wong, B Ottersten, Cooperative cognitive networks : optimal, distributed and lowcomplexity algorithms. IEEE Trans. Signal Process. 61(11), 2778–2790 (2013).View ArticleMathSciNetGoogle Scholar
 AH Phan, HD Toan, HH Kha, DT Ngo, in IEEE Int. Conf. Commun. Electron., Nha Trang. A reverse convex programming for beamforming in cognitive multicast transmission, (2010), pp. 211–215.Google Scholar
 M Beko, Efficient beamforming in cognitive radio multicast transmission. IEEE Trans. Wirelesss Commun. 11(11), 4108–4117 (2012).View ArticleGoogle Scholar
 AH Phan, HD Tuan, HH Kha, DT Ngo, Nonsmooth optimization for efficient beamforming in cognitive radio multicast transmission. IEEE Trans. Signal Process. 60(6), 2941–2951 (2012).View ArticleMathSciNetGoogle Scholar
 K Wang, T Chang, W Ma, AM So, C Chi, in IEEE ICASSP, Prague. Probabilistic SINR constrained robust transmit beamforming A Bernsteintype inequality based conservative approach, (2011), pp. 3080–3083.Google Scholar
 C Shen, TH Chang, KY Wang, Z Qiu, CT Chi, in IEEE Global Conference on Communications, Anaheim, CA. Chanceconstrained robust beamforming for multicell coordinated downlink, (2012), pp. 4957–4962.Google Scholar
 P Marsch, G Fettweis, Coordinated MultiPoint in Mobile Communications (Cambridge University Press, 2011).Google Scholar
 I Bechar, A Bernsteintype Inequality for Stochastic Processes of Quadratic Forms of Gaussian Variables,. ArXiv eprints (2009). arxiv.org/pdf/0909.3595.pdf.
 E Karipidis, ND Sidiropoulos, ZQ Luo, Quality of service and maxmin fair transmit beamforming to multiple cochannel multicast groups. IEEE Trans. Signal Process. 56(3), 1268–1279 (2008).View ArticleMathSciNetGoogle Scholar
 X Liu, H Li, H Wang, in IEEE International Conference on Communications and Networking in China, Guilin. Probability constrained robust multicast beamforming in cognitive radio network, (2013), pp. 708–712.Google Scholar
 Z Luo, W Ma, A So, Y Ye, S Zhang, Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag. 27(3), 20–34 (2010).View ArticleGoogle Scholar
Copyright
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.