Uncoordinated Multiple Access Schemes for Visible Light Communications and Positioning

Size: px
Start display at page:

Download "Uncoordinated Multiple Access Schemes for Visible Light Communications and Positioning"

Transcription

1 06 IEEE International Symposium on Information heory Uncoordinated Multiple Access Schemes for Visible Light Communications Positioning Siu-Wai Ho Institute for elecommunications Research University of South Australia Adelaide, SA 5095, Australia Chi Wan Sung Dept of Electronic Engineering City University of Hong Kong Hong Kong Abstract In visible light communication (VLC) systems, information are conveyed by visible light instead of radio-frequency electromagnetic waves Based on received signal strength, accurate indoor positioning systems can also be built Since a receiver obtains the superposition of signals from all light sources within line of sight together with ambient light, a multiple access scheme is necessary for the receiver to distinguish the received symbol signal strength from each light source his paper proposes two multiple access schemes for VLC he first scheme supports information broadcast positioning By using N timeslots, N transmitters transmit N symbols in total he second scheme supports positioning only but places emphasis on minimizing the required timeslots In each N timeslots for an odd integer N, the channel gains of 3N transmitters can be estimated I INRODUCION Visible light communications (VLC), which uses visible light instead of radio-frequency (RF) electromagnetic waves for communications, has attracted much attention in recent years Lighting devices are undergoing a revolution, from fluorescent lamps tubes to light emitting diodes (LEDs) Most smartphones tablets today contain built-in sensors such as photodiodes (PDs) VLC systems using LEDs as transmitters PDs as receivers are energy efficient have low deployment cost Since visible light does not interfere RF signals, VLC systems will be compatible with other RF systems, with the potential to form powerful hybrid systems Some of the promising applications of these systems include information broadcast indoor positioning For information broadcast using VLC, there are different techniques proposed in the literature including expurgated pulse position modulation [], optical code division multiple access (OCDMA) [][3] an adaptive modulation scheme based on power control [4] Precoding techniques for RF systems are adapted for VLC in [5][6] Note that all these techniques require a central unit to coordinate the transmissions among the LEDs through an extra infrastructure in a VLC system he disadvantages of using central unit will be explained after some positioning systems are introduced Visible light positioning systems can provide highly accurate indoor positioning [7][8] Experimental results show that positioning error can be less than 0 centimetres on average Since the positioning algorithms in these systems are based on the received light intensity or estimated channel gain from each LED, any interference among the signals from different LEDs would severely degrade the accuracy Furthermore, it is common to have ambient light sources which give extra energy in each measurement ime division multiple access (DMA) was used in [7], [8] o implement DMA, a central unit is again required to coordinate the transmissions among LEDs It is important to know a multiple access scheme for VLC systems without using central unit Such scheme allows us to build an information broadcast system with positioning capability by simply replacing the existing light sources by st-alone LED transmitters Without the need of extra infrastructure to control the LEDs, the installation cost is reduced o get rid of central unit, we need to solve a few technical problems Intensity modulation/direction detection (IM/DD) is used in VLC systems herefore, the transmitted signals are always positive real Multiple receivers may use the system at rom time at rom locations with arbitrary orientation in a 3-dimensional space As a result, the transmitted signals suffer rom channel gains which are unknown to the receiver Since the transmitters are also light sources, they may be controlled by different switches be switched on at different time So the transmitters the receiver are asynchronous It is also preferable to consider simple transmitter design that no communication link presents among transmitters We begin with the introduction of channel model notations in Section II In Section III, we will propose an efficient scheme in which a receiver obtains N symbols from N transmitters one estimate of ambient light intensity in N timeslots Section IV explores another scheme which can reduce the required timeslots by supporting only positioning II CHANNEL MODEL AND NOAIONS Suppose there are N transmitters in the system where a subset of them are active within the line-of-sight (LoS) of the receiver (see Fig ) Let S be this subset so that S,, N For i S, let a ik 0,,, M be the k-th message that ransmitter i wants to deliver since it is activated Let X i [n] 0 be the n-th symbol transmitted by ransmitter i Suppose ransmitter i has transmitted δ i symbols before the receiver starts to detect signals Let Φ be the background light intensity which is not negligible Receiver detects the superposition of the signals from the transmitters together with /6/$ IEEE 350

2 06 IEEE International Symposium on Information heory + Fig ransmitters want to broadcast different messages hey are suffering from rom delays due to the different activation time he superposition of ambient light the transmitted signals is received by the receiver the background light Let Y [n] be the n-th symbol received at the receiver So Y [n] = i S g i X i [n + δ i ] + Φ, () where g i is the channel gain which depends on the distance between ransmitter i the receiver, angle of irradiance of the LED, angle of incidence of the PD, etc Since these parameters depend on the receiver s location which is rom, we assume without lost of generality that the cumulative distribution function (cdf) of g i is continuous if i S We further assume that the cdf of g i given g k with i k is continuous Here, g i is considered as invariant over a short period of time like block fading channels his is justified by that it is common to achieve transmission rate over 0 6 samples per second in VLC [9] If the receiver s displacement is negligible within 0 3 seconds, the gain g i can be seen as invariant for more than 0 3 symbols In general, noise should be considered in () his paper considers the noiseless case as the starting point of this problem to illustrate what can be achieved Note that our proposed scheme has potential to be extended to noisy scenarios Notations: L(S, δ) means the cyclic shift of the sequence S to the left by δ steps L(S, δ)[n] means the n-th symbol after shift For example, if S = (s, s, s 3 ), then L(S, ) = (s, s 3, s ) L(S, )[3] = s he complex conjugate of W is denoted by W he imaginary number is j = III POSIIONING AND COMMUNICAIONS IN VLC Our goal of this section is to design a coding scheme such that if ransmitter i is within LoS, the receiver can determine i) the channel gain g i for positioning ii) the broadcasted messages a ik In this section, a ik is assumed to be independent uniformly distributed in 0,,, M Scheme for Positioning with Comms Capability: ) For i N, ransmitter i outputs i consecutive a ik followed by i consecutive 0 o be specific, for k 0, the n-th output from ransmitter i is a ik for + k i n < + (k + ) i X i [n] = 0 otherwise () ) Let a row vector S i ( ) be the first symbols from a periodic sequence with a repeating pattern of i consecutive s followed by i consecutive s So S i ( ) = [ ] (3) Let Y( ) = [Y [] Y [] Y [ ]] be a column vector 3) Let ˆδ i ( ) = argmax 0 δ< i L(S i ( ), δ) Y( ) 4) ransmitter i is considered as inactive if lim Y [n]l(s i ( ), ˆδ i )[n] = 0 (4) 5) According to (4), let Ŝ be the estimated set of active transmitters 6) Set Ŝ Ŝ Construct a (0, ) matrix A by concatenating the row vector ( + L(S i( ), ˆδ i )) for i Ŝ in an increasing order of i he positions of s in A represent the timeslots when ransmitter i sends positive X[n] 7) here must exist a zero column vector in A suppose it is the i-th column he estimated background intensity is ˆΦ = Y [i] Set Y [i] Y [i] ˆΦ for all i 8) Set i = maxk : k Ŝ 9) here must exist columns in A with the form [0 0 ] Let Ω be the position of those columns For n Ω, Y [n] = g i X i [n + ˆδ i ] which is kept in a set M i 0) For n Ω, let L n n be the set of consecutive s in the last row of A Update Y [l] Y [l] Y [n] for all n Ω l L n ) Remove the last row of A set Ŝ Ŝ \ i ) Go to Step 8 if Ŝ is non-empty 3) For i Ŝ, the receiver has collected a set M i = g i a ik where the range of k depends on δ i 4) If maxµ : µ M i minµ > 0 : µ M i < M (5) for any i, set go back Step 5) he estimated g i is given by ĝ i = minµ > 0 : µ M i herefore, a ik can be estimated from ĝ i M i he scheme ends here heorem : If a ik for all i k are independent uniformly distributed on 0,,, M, then lim Pr ˆδ i ( ) = δ i = (6) Proof: Note that L(S i ( ), δ i )[n] = if only if X i [n + δ i ] > 0 herefore, from () Y [n] = i S g i X i [n + δ i ]L(S i ( ), δ i )[n] + Φ (7) Now consider L(S i ( ), δ i )[n]l(s k ( ), δ)[n] for n Firstly, suppose i < k Consecutive s with length k repeatedly appear inside L(S k ( ), δ)[n] Let I + be the positions of those consecutive s so that L(S k ( ), δ)[n] = for n I + I + is an integer multiple of k On the other h, consecutive s with length i repeatedly appear inside L(S i ( ), δ i )[n] Since k is divisible by i, the number of consecutive s in L(S i ( ), δ i )[n] for n I + is 35

3 06 IEEE International Symposium on Information heory equal to I+ Similarly, let I be the positions of consecutive s with length k in L(S k ( ), δ) For n I, the number of consecutive s in L(S i ( ), δ i )[n] is equal to I Without lost of generality, we consider that is an integer multiple of k so that I + = I hus, for arbitrarily ɛ > 0, ( ) Pr g i X i [n + δ i ] g i X i [n + δ i ] > ɛ < ɛ n I + n I for sufficiently large ogether with lim g i X i [n + δ i ]L(S i ( ), δ i )[n]l(s k ( ), δ)[n] (9) k lim g i X i [n + δ i ] + g i X i [n + δ i ] (0) n I + g i X i [n + δ i ] + g i X i [n + δ i ] () n I n= k + ( ) = lim g i X i [n + δ i ] g i X i [n + δ i ], () n I + n I we have Pr g i X i [n + δ i ]L(S i ( ), δ i )[n]l(s k ( ), δ)[n] > ɛ < ɛ (3) for any ɛ > 0 sufficiently large Secondly, suppose i > k We can still prove (3) by swapping the roles of i k in the above argument So we do not repeat the argument here Finally, consider i = k It is easy to verify that g i X i [n + δ i ]L(S i ( ), δ i )[n]l(s i ( ), δ)[n] (4) < (8) g i X i [n + δ i ]L(S i ( ), δ i )[n]l(s i ( ), δ i )[n] (5) for δ δ i ogether with lim ΦL(S k ( ), δ)[n] = 0, (6) for finite Φ, (6) is verified heorem : If ransmitter k is inactive, the probability that the receiver considers it as active is arbitrarily small because Pr Y [n]l(s k ( ), ˆδ k )[n] > ɛ < ɛ (7) for any ɛ > 0 sufficiently large Proof: If ransmitter k is inactive, X k [n] = 0 for all n Since (3) holds for i k, the theorem is proved Lemma : For k, if ransmitter i is active for all i k, there exists k < k such that for all integer l 0, k X i [l k + k ] = 0 (8) i= Proof: We are going to prove the lemma by mathematical induction When k =, k i= X i[n] = X [n] By taking n = l + δ, (8) is verified to be true for k = Assume that (8) is true for k hen = k+ X i [l k+ + k+ ] (9) i= k X i [(l) k + k+ ] + X k+ [l k+ + k+ ] (0) i= If X k+ [ k ] = 0, then X k+ [l k+ + k ] = 0 for all l due to (), hence take k+ = k If X k+ [ k ] > 0, then X k+ [ k + k ] = 0 hence, X k+ [l k+ +( k + k )] = 0 for all l In this case, k+ = k + k herefore, the lemma is verified by mathematical induction heorem 3: If Ŝ = S ˆδ i = δ i for all i, then the column vectors described in Steps 7 9 must exist Proof: Let S be the set of active transmitters let k = maxi : i S Note that L(S i ( ), δ i )[n] = if only if X i [n + δ i ] > 0 By Lemma, the column vectors described in Step 6 exist Similarly, applying Lemma with k replaced by k shows that for all l, k X i [l k + k ] = 0 () i= Since either X k [l k + k ] > 0 or X k [(l + ) k + k ] > 0, the column vectors described in Step 9 exist Remarks: ) From heorems 3, we conclude that the receiver can successfully recover g i a ik for i S with arbitrarily small error probability when is sufficiently large ) When all transmitters are active within the LoS of the receiver, the receiver can obtain an estimate of Φ together with N N i = N () i= symbols in N timeslots his is better than [0] where only N symbols can be transmitted in N timeslots Example : Suppose N = 3 = 8 ables I III demonstrate some possible transmitted patterns Receiver receives the summation of each column together with Φ Assume that the receiver first correctly estimates δ i by considering >> 8 according to Step 3 he receiver can construct A in Step 6 which is similar to the tables except that all g i a ik s are replaced by In Step 7, the background light intensity is estimated by Y [8], Y [8], Y [6] in ables I III, respectively, according to the positions of zero column vectors Now, we focus on only able III After the effect due to Φ is removed from Y [n] in Step 7, g 3 a 3 is obtained from Y [] In Step 0, let L =, 3, 4, 5 set Y [l] Y [l] Y [] 35

4 06 IEEE International Symposium on Information heory ABLE I SCENARIO : δ = δ = δ 3 = 0 g a 0 g a 0 g a 3 0 g a 4 0 g a g a 0 0 g a g a 0 0 g 3 a 3 g 3 a 3 g 3 a 3 g 3 a ABLE II SCENARIO : δ = 0; δ = ; δ 3 = 0 g a 0 g a 0 g a 3 0 g a g a g a 0 0 g a g a 0 g 3 a 3 g 3 a 3 g 3 a 3 g 3 a ABLE III SCENARIO 3: δ = 0; δ = 3; δ 3 = g a 0 g a 0 g a 3 0 g a 4 0 g a g a g a 0 0 g a 0 g 3 a 3 g 3 a 3 g 3 a 3 g 3 a for all l L to remove the effect due to a 3 After removing the last row in A, we follow Step 9 find two positions (Ω = 4, 8) match the condition herefore, g a g a are obtained from Y [4] Y [8], respectively In Step 0, let L 4 = 4, 5 L 8 = 8 After setting Y [l] Y [l] Y [4] for all l L 4 Y [l] Y [l] Y [8] for all l L 8, the last row in A is removed go back to Step 8 We do not repeat the details here At the end, the receiver obtains g a, g a 3, g a 4, g a, g a g 3 a 3 If >>, these sets will be large contain both g i g i (M ) hen Step 5 is reached where g i a ik are determined IV VISIBLE LIGH POSIIONING his section investigates visible light positioning systems without communication capability Our focus is to minimise the number of symbols required for finding channel gain g i for i S Smaller number of symbols takes shorter transmission time; this improves the sensitivity to the changes in channel gains is important for delicate positioning systems Compared with wireless communications using radio frequency, one of the major differences in VLC is that the transmitted signals are required to be positive real Under this requirement, suppose ransmitter i outputs periodic signals X i [n] with period Here, if the transmitters output signals with different periods, we can take as the least common multiple of the periods Since X i [n] is positive real, the Fourier transform of X i denoted by W i must satisfy W i [n] = W i [ n] As a result, only half of the elements in the Fourier transform of the received signal Y [n] are useful In order to support N transmitters by using N timeslots, we can use the following simple scheme to decide the values of X i [n] Let C i [n] be the inverse Fourier transform of the i-th row in a N N matrix B = (3) For i N n N, let C i [n] = C i [n] + (4) Let X i [n + k N] = C i [n] for k 0 By considering the Fourier transform of the received N symbols at the receiver denoted by Ỹ [n] for 0 n N, the structure of B ensures: ) there is no interference among the transmitters in frequency domain ) C i [n] are positive real for all i n According to (), Ỹ [i] = g ie jiπ N δi where δ i causes a phase shift in frequency domain Although δ i is unknown, g i can be determined by Ỹ [i] he interesting question is: If the transmitted signal is required to be positive real the delay δ i is unknown, can we design a scheme which can support more than N transmitters by using N timeslots? We are going to reveal that it is possible by using the property that g i is positive real while Ỹ [n] is complex Definition : For an odd integer N, let C = C i, i 3N where C i is defined in (4) for i N For N + i 3N k = 0 or, let φ k (i) = (i N) + k, (5) ( Z i,k = (4 k) + exp jφ ) k(i)π, (6) N θ i,k = arg (Z i,k ), (7) C i = Z i,0 (4 C φ0(i) + L(C φ0(i), ))+ Z i, (3 C φ(i) + L(C φ(i), )) (8) Note that if C i is sent alone, Ỹ [φ k (i)] = Z i,k Z i,k for k = 0, N Lemma : Both θ i,k π θ i,0 θ i, N π are not integers he proof is omitted due to the limited space Lemma gives a property which will be frequently used in this section Instead of combining C φ0(i) C φ(i) as the way shown in (8), it is possible to use other weightings as long as Lemma still holds Hence, we cannot replace both 4 3 in (8) by Multiple Access Scheme for Visible Light Positioning: ) For i 3N, ransmitter i repeatedly sends C i ) Let Ỹ = [Ỹ (0), Ỹ (),, Ỹ (N )] be the discrete Fourier transform of Y which is a vector of N consecutive symbols received at the receiver 3) he estimate of g N is given by ĝ N = Ỹ [N] 4) For i > N, g φ0(i), g φ(i) g i are estimated together from (Ỹ [φ 0(i)], Ỹ [φ (i)]) as follows 5) For integers l, r 0,,, N k 0,, let 6) Suppose Ỹ [φ k(i)] = ρ x + jρ y Let µ l = θ i,k lπφ k(i) N, (9) ν r = rπφ k(i) N (30) γ x (i, k, r, l) = ρ y ρ x tan(µ l ) tan(ν r ) tan(µ l ) (3) 353

5 06 IEEE International Symposium on Information heory Fig he complex plane used in Lemma 3 (a) Step 6 finds (γ x, γ y) put the distances between (γ x, γ y) (ρ x, ρ y) into A(i, k) (b) he slopes of the green lines are µ l the slopes of the blue lines are ν r he line ξ connects the ending points of any two green lines with length g i Fig 3 he slopes of the short green line short red line are µ l the slopes of the long blue lines are ν r with k = in (9) (30) We first consider the probability of that two elements at positions (r, l) (r, l ) in A(i, k) are equal to g i his is equivalent to require that the triangle in Fig (a) is an isosceles triangle By writing the two angles in terms of µ l, µ l ν r, an isosceles triangle is formed only if π θ i,k = κ (37) N for certain integer κ that contradicts Lemma Now suppose the two elements in A(i, k) are the same at positions (r, l) (r, l ) where r r l l his is equivalent to require that the line ξ touches the axes Γ r Γ r in Fig (b) Consider a fixed g i hen the length the slope of ξ are fixed for given (l, l ) herefore, it can be verified that there are only a finite number of g φk (i) such that ξ touches the axes Γ r Γ r Since the cdf of g φk (i) given g i is continuous, the lemma is proved if g φk (i) > 0 Finally, if g φk (i) = 0, the lemma follows from that ξ cannot be parallel to any Γ r due to Lemma Lemma 4: For N + i 3N, if g i > 0, then A(i, 0) A(i, ) = almost surely Proof: Due to the limited space, the detail is omitted here γ y (i, k, r, l) = tan(ν r )γ x (i, k, r, l); (3) Note that tan(ν r ) because N is odd Define A(i, k) = ((γ x ρ x ) + (γ y ρ y ) ) r, l 7) For i > N, if A(i, 0) A(i, ) =, let (33) ĝ i = A(i, 0) A(i, ) (34) Let (r i,k, l i,k ) be the position of ĝ i in A(i, k) the estimate of g φk (i) is given by ĝ φk (i) = (γ x(i, k, r i,k, l i,k) + γ y(i, k, r i,k, l i,k)) (35) 8) For i > N, if A(i, 0) A(i, ) >, let ĝ i = 0 ĝ φk (i) = Ỹ [φ k(i)] he scheme ends here Now, we prove the robustness of the proposed scheme explain the rationale in the proofs Lemma 3: We can always find g i A(i, k) If g i > 0, then g i appears only once in A(i, k) almost surely Proof: Due to the definition of (ρ x, ρ y ), (4) (8), ρ x + jρ y = Ỹ [φ k(i)] = g φk (i) exp(jν r ) + g i exp(jµ l ), (36) where r = δ φk (i) l = δ i Due to Lemma, a nonorthogonal basis on the complex plane can be formed by using the arguments of exp(jν r ) exp(jµ l ) hus projecting Ỹ [φ k (i)] on the right basis with correct (r, l) gives g i By exhaustively trying all possible values of r l, g i must appear in A(i, k) heorem 4: he scheme generates ĝ i = g i almost surely for i 3N Proof: It is easy to verify the case that g i = 0 Suppose g i > 0 From Lemma 4, g i can be identified by considering A(i, 0) A(i, ) Only one pair (ri,k, l i,k ) can give g i due to Lemma 3 so that g φk (i) can be calculated from (35) herefore, we conclude that the receiver can estimate g i almost surely for i 3N by receiving N symbols REFERENCES [] M Noshad, M Brt-Pearce, Application of Expurgated PPM to Indoor Visible Light Communications-Part II: Access Networks, J of Lightwave echnology, vol3, no5, pp , March 04 [] Y Chen, Y Chang, Y seng Y Chen, A Framework for Simultaneous Message Broadcasting Using CDMA-Based Visible Light Communications, IEEE Sensors Journal, vol 5, no, Aug 05 [3] MH Shoreh, A Fallahpour JA Salehi, Design concepts performance analysis of multicarrier CDMA for indoor visible light communications, IEEE/OSA J of Opt Comm Netw, Jun 05 [4] A A Saed, S-W Ho C W Sung, Adaptive Modulation for wo users in VLC, in IEEE GlobeCom Workshop, Dec 05 [5] Y Hong, J Chen C Yu, Performance improvement of the precoded multi-user MIMO indoor visible light communication system, Int Symp on Comm Systems, Networks & Dig Signal Proc, Jul 04 [6] M Hao, L Lampe S Hranilovic, Coordinated Broadcasting for Multiuser Indoor Visible Light Communication Systems, IEEE ransactions on Communications, vol 63, no 9, pp , Sept 05 [7] Y Hou, S Xiao, H Zheng, W Hu, Multiple Access Scheme Based on Block Encoding ime Division Multiplexing in an Indoor Positioning System Using Visible Light, IEEE/OSA Journal of Optical Communications Networking,, vol 7, no 5, pp , May 05 [8] M Yasir, S-W Ho B N Vellambi, Indoor Position racking Using Multiple Optical Receivers, in IEEE/OSA Journal of Lightwave echnology, vol 34, no 4, pp 66-76, Feb 06 [9] S Rajagopal, RD Roberts, S-K Lim, IEEE 8057 visible light communication: modulation schemes dimming support, in IEEE Communications Magazine, vol50, no3, pp 7-8, Mar 0 [0] M Yasir, A A Saed S-W Ho, Uncoordinated multiple access scheme for VLC systems with positioning capability, 06 Australian Communications heory Workshop (AusCW), pp 8-3, Jan

A Comparison of Two Achievable Rate Regions for the Interference Channel

A Comparison of Two Achievable Rate Regions for the Interference Channel A Comparison of Two Achievable Rate Regions for the Interference Channel Hon-Fah Chong, Mehul Motani, and Hari Krishna Garg Electrical & Computer Engineering National University of Singapore Email: {g030596,motani,eleghk}@nus.edu.sg

More information

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm HongSun An Student Member IEEE he Graduate School of I & Incheon Korea ahs3179@gmail.com Manar Mohaisen Student Member IEEE

More information

Joint Source-Channel Coding for the Multiple-Access Relay Channel

Joint Source-Channel Coding for the Multiple-Access Relay Channel Joint Source-Channel Coding for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora Department of Electrical and Computer Engineering Ben-Gurion University, Israel Email: moriny@bgu.ac.il, ron@ee.bgu.ac.il

More information

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong Multi-User Gain Maximum Eigenmode Beamforming, and IDMA Peng Wang and Li Ping City University of Hong Kong 1 Contents Introduction Multi-user gain (MUG) Maximum eigenmode beamforming (MEB) MEB performance

More information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information SUBMIED O IEEE INERNAIONAL SYMPOSIUM ON INFORMAION HEORY, DE. 23 1 Optimal Power Allocation for Parallel Gaussian Broadcast hannels with Independent and ommon Information Nihar Jindal and Andrea Goldsmith

More information

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Michael R. Souryal and Huiqing You National Institute of Standards and Technology Advanced Network Technologies Division Gaithersburg,

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

A Polynomial-Time Algorithm for Pliable Index Coding

A Polynomial-Time Algorithm for Pliable Index Coding 1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n

More information

Optimal Natural Encoding Scheme for Discrete Multiplicative Degraded Broadcast Channels

Optimal Natural Encoding Scheme for Discrete Multiplicative Degraded Broadcast Channels Optimal Natural Encoding Scheme for Discrete Multiplicative Degraded Broadcast Channels Bike ie, Student Member, IEEE and Richard D. Wesel, Senior Member, IEEE Abstract Certain degraded broadcast channels

More information

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information

More information

Direct-Sequence Spread-Spectrum

Direct-Sequence Spread-Spectrum Chapter 3 Direct-Sequence Spread-Spectrum In this chapter we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously.

More information

Estimation of the Capacity of Multipath Infrared Channels

Estimation of the Capacity of Multipath Infrared Channels Estimation of the Capacity of Multipath Infrared Channels Jeffrey B. Carruthers Department of Electrical and Computer Engineering Boston University jbc@bu.edu Sachin Padma Department of Electrical and

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Stefano Rini, Ernest Kurniawan and Andrea Goldsmith Technische Universität München, Munich, Germany, Stanford University,

More information

2012 IEEE International Symposium on Information Theory Proceedings

2012 IEEE International Symposium on Information Theory Proceedings Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical

More information

Achievable Rate Region of the Zero-Forcing Precoder in a 2 2 MU-MISO Broadcast VLC Channel with Per-LED Peak Power Constraint and Dimming Control

Achievable Rate Region of the Zero-Forcing Precoder in a 2 2 MU-MISO Broadcast VLC Channel with Per-LED Peak Power Constraint and Dimming Control 1 Achievable Rate Region of the Zero-Forcing Precoder in a 2 2 MU-MISO Broadcast VLC Channel with Per-LED Peak Power Constraint and Dimming Control Amit Agarwal and Saif Khan Mohammed arxiv:1701.03253v1

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

STATISTICAL MODELING OF ASYNCHRONOUS IMPULSIVE NOISE IN POWERLINE COMMUNICATION NETWORKS

STATISTICAL MODELING OF ASYNCHRONOUS IMPULSIVE NOISE IN POWERLINE COMMUNICATION NETWORKS STATISTICAL MODELING OF ASYNCHRONOUS IMPULSIVE NOISE IN POWERLINE COMMUNICATION NETWORKS Marcel Nassar, Kapil Gulati, Yousof Mortazavi, and Brian L. Evans Department of Electrical and Computer Engineering

More information

Phase Precoded Compute-and-Forward with Partial Feedback

Phase Precoded Compute-and-Forward with Partial Feedback Phase Precoded Compute-and-Forward with Partial Feedback Amin Sakzad, Emanuele Viterbo Dept. Elec. & Comp. Sys. Monash University, Australia amin.sakzad,emanuele.viterbo@monash.edu Joseph Boutros, Dept.

More information

Design and Construction of Protocol Sequences: Shift Invariance and User Irrepressibility

Design and Construction of Protocol Sequences: Shift Invariance and User Irrepressibility Design and Construction of Protocol Sequences: Shift Invariance and User Irrepressibility Kenneth W. Shum, Wing Shing Wong Dept. of Information Engineering The Chinese University of Hong Kong Shatin, Hong

More information

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels 1 Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels Ain-ul-Aisha, Lifeng Lai, Yingbin Liang and Shlomo Shamai (Shitz Abstract In this paper, we analyze the sum-rate capacity of two-user Poisson

More information

Capacity-achieving Feedback Scheme for Flat Fading Channels with Channel State Information

Capacity-achieving Feedback Scheme for Flat Fading Channels with Channel State Information Capacity-achieving Feedback Scheme for Flat Fading Channels with Channel State Information Jialing Liu liujl@iastate.edu Sekhar Tatikonda sekhar.tatikonda@yale.edu Nicola Elia nelia@iastate.edu Dept. of

More information

Title. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels

Title. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels Title Equal Gain Beamforming in Rayleigh Fading Channels Author(s)Tsai, Shang-Ho Proceedings : APSIPA ASC 29 : Asia-Pacific Signal Citationand Conference: 688-691 Issue Date 29-1-4 Doc URL http://hdl.handle.net/2115/39789

More information

Minimum Mean Squared Error Interference Alignment

Minimum Mean Squared Error Interference Alignment Minimum Mean Squared Error Interference Alignment David A. Schmidt, Changxin Shi, Randall A. Berry, Michael L. Honig and Wolfgang Utschick Associate Institute for Signal Processing Technische Universität

More information

Towards control over fading channels

Towards control over fading channels Towards control over fading channels Paolo Minero, Massimo Franceschetti Advanced Network Science University of California San Diego, CA, USA mail: {minero,massimo}@ucsd.edu Invited Paper) Subhrakanti

More information

State Estimation and Motion Tracking for Spatially Diverse VLC Networks

State Estimation and Motion Tracking for Spatially Diverse VLC Networks State Estimation and Motion Tracking for Spatially Diverse VLC Networks GLOBECOM Optical Wireless Communications Workshop December 3, 2012 Anaheim, CA Michael Rahaim mrahaim@bu.edu Gregary Prince gbprince@bu.edu

More information

Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages

Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages Degrees of Freedom Region of the Gaussian MIMO Broadcast hannel with ommon and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and omputer Engineering University of Maryland, ollege

More information

Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences

Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences Guang Gong 1 Fei Huo 1 and Yang Yang 2,3 1 Department of Electrical and Computer Engineering University of

More information

Cooperative Communication with Feedback via Stochastic Approximation

Cooperative Communication with Feedback via Stochastic Approximation Cooperative Communication with Feedback via Stochastic Approximation Utsaw Kumar J Nicholas Laneman and Vijay Gupta Department of Electrical Engineering University of Notre Dame Email: {ukumar jnl vgupta}@ndedu

More information

II. THE TWO-WAY TWO-RELAY CHANNEL

II. THE TWO-WAY TWO-RELAY CHANNEL An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable

More information

Limited Feedback in Wireless Communication Systems

Limited Feedback in Wireless Communication Systems Limited Feedback in Wireless Communication Systems - Summary of An Overview of Limited Feedback in Wireless Communication Systems Gwanmo Ku May 14, 17, and 21, 2013 Outline Transmitter Ant. 1 Channel N

More information

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:

More information

ONE of the main applications of wireless sensor networks

ONE of the main applications of wireless sensor networks 2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 Coverage by Romly Deployed Wireless Sensor Networks Peng-Jun Wan, Member, IEEE, Chih-Wei Yi, Member, IEEE Abstract One of the main

More information

On joint CFO and channel estimation in single-user and multi-user OFDM systems

On joint CFO and channel estimation in single-user and multi-user OFDM systems On joint CFO and channel estimation in single-user and multi-user OFDM systems Yik-Chung Wu The University of ong Kong Email: ycwu@eee.hku.hk, Webpage: www.eee.hku.hk/~ycwu 1 OFDM basics exp(j2pt/t) exp(j2p(2t)/t)

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

On the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling

On the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling On the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling Ruben de Francisco and Dirk T.M. Slock Eurecom Institute Sophia-Antipolis, France Email: {defranci, slock}@eurecom.fr Abstract

More information

Lecture 4: Proof of Shannon s theorem and an explicit code

Lecture 4: Proof of Shannon s theorem and an explicit code CSE 533: Error-Correcting Codes (Autumn 006 Lecture 4: Proof of Shannon s theorem and an explicit code October 11, 006 Lecturer: Venkatesan Guruswami Scribe: Atri Rudra 1 Overview Last lecture we stated

More information

Polar Codes for Some Multi-terminal Communications Problems

Polar Codes for Some Multi-terminal Communications Problems Polar Codes for ome Multi-terminal Communications Problems Aria G. ahebi and. andeep Pradhan Department of Electrical Engineering and Computer cience, niversity of Michigan, Ann Arbor, MI 48109, A. Email:

More information

On the Capacity Region of the Gaussian Z-channel

On the Capacity Region of the Gaussian Z-channel On the Capacity Region of the Gaussian Z-channel Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@eng.umd.edu ulukus@eng.umd.edu

More information

USING multiple antennas has been shown to increase the

USING multiple antennas has been shown to increase the IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 1, JANUARY 2007 11 A Comparison of Time-Sharing, DPC, and Beamforming for MIMO Broadcast Channels With Many Users Masoud Sharif, Member, IEEE, and Babak

More information

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Junyu Chen Department of Information Engineering The Chinese University of Hong Kong Email: cj0@alumniiecuhkeduhk Kenneth W Shum

More information

I. Introduction. Index Terms Multiuser MIMO, feedback, precoding, beamforming, codebook, quantization, OFDM, OFDMA.

I. Introduction. Index Terms Multiuser MIMO, feedback, precoding, beamforming, codebook, quantization, OFDM, OFDMA. Zero-Forcing Beamforming Codebook Design for MU- MIMO OFDM Systems Erdem Bala, Member, IEEE, yle Jung-Lin Pan, Member, IEEE, Robert Olesen, Member, IEEE, Donald Grieco, Senior Member, IEEE InterDigital

More information

Cognitive Multiple Access Networks

Cognitive Multiple Access Networks Cognitive Multiple Access Networks Natasha Devroye Email: ndevroye@deas.harvard.edu Patrick Mitran Email: mitran@deas.harvard.edu Vahid Tarokh Email: vahid@deas.harvard.edu Abstract A cognitive radio can

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

Multiuser Capacity Analysis of WDM in Nonlinear Fiber Optics

Multiuser Capacity Analysis of WDM in Nonlinear Fiber Optics Multiuser Capacity Analysis of WDM in Nonlinear Fiber Optics Mohammad H. Taghavi N., George C. Papen, and Paul H. Siegel Dept. of ECE, UCSD, La Jolla, CA 92093 Email: {mtaghavi, gpapen, psiegel}@ucsd.edu

More information

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel /33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,

More information

Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System

Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System Aravind Kailas UMTS Systems Performance Team QUALCOMM Inc San Diego, CA 911 Email: akailas@qualcommcom John A Gubner Department

More information

On the Optimal Phase Control in MIMO Systems with Phase Quantization

On the Optimal Phase Control in MIMO Systems with Phase Quantization On the Optimal hase Control in MIMO Systems with hase Quantization Majid Khabbazian, Kin-Kwong Leung and Mohammad A. Safari Department of Electrical and Computer Engineering University of British Columbia,

More information

A Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel

A Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel A Simple Memoryless Proof of the Capacity of the Exponential Server iming Channel odd P. Coleman ECE Department Coordinated Science Laboratory University of Illinois colemant@illinois.edu Abstract his

More information

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints Upper Bounds on IO Channel Capacity with Channel Frobenius Norm Constraints Zukang Shen, Jeffrey G. Andrews, Brian L. Evans Wireless Networking Communications Group Department of Electrical Computer Engineering

More information

Outage-Efficient Downlink Transmission Without Transmit Channel State Information

Outage-Efficient Downlink Transmission Without Transmit Channel State Information 1 Outage-Efficient Downlink Transmission Without Transmit Channel State Information Wenyi Zhang, Member, IEEE, Shivaprasad Kotagiri, Student Member, IEEE, and J. Nicholas Laneman, Senior Member, IEEE arxiv:0711.1573v1

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Behrouz Khoshnevis and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario,

More information

On the Capacity of the Interference Channel with a Relay

On the Capacity of the Interference Channel with a Relay On the Capacity of the Interference Channel with a Relay Ivana Marić, Ron Dabora and Andrea Goldsmith Stanford University, Stanford, CA {ivanam,ron,andrea}@wsl.stanford.edu Abstract Capacity gains due

More information

Comparisons of Performance of Various Transmission Schemes of MIMO System Operating under Rician Channel Conditions

Comparisons of Performance of Various Transmission Schemes of MIMO System Operating under Rician Channel Conditions Comparisons of Performance of Various ransmission Schemes of MIMO System Operating under ician Channel Conditions Peerapong Uthansakul and Marek E. Bialkowski School of Information echnology and Electrical

More information

Signal Designs for Non-negative Channels

Signal Designs for Non-negative Channels Signal Designs for Non-negative Channels SIGNAL DESIGNS FOR NON-NEGATIVE CHANNELS BY WEI ZHAO, B.Eng. a thesis submitted to the department of electrical & computer engineering and the school of graduate

More information

Spectrum Sensing via Event-triggered Sampling

Spectrum Sensing via Event-triggered Sampling Spectrum Sensing via Event-triggered Sampling Yasin Yilmaz Electrical Engineering Department Columbia University New Yor, NY 0027 Email: yasin@ee.columbia.edu George Moustaides Dept. of Electrical & Computer

More information

On the Duality of Gaussian Multiple-Access and Broadcast Channels

On the Duality of Gaussian Multiple-Access and Broadcast Channels On the Duality of Gaussian ultiple-access and Broadcast Channels Xiaowei Jin I. INTODUCTION Although T. Cover has been pointed out in [] that one would have expected a duality between the broadcast channel(bc)

More information

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract

More information

Streaming Algorithms for Optimal Generation of Random Bits

Streaming Algorithms for Optimal Generation of Random Bits Streaming Algorithms for Optimal Generation of Random Bits ongchao Zhou Electrical Engineering Department California Institute of echnology Pasadena, CA 925 Email: hzhou@caltech.edu Jehoshua Bruck Electrical

More information

Index Coding With Erroneous Side Information

Index Coding With Erroneous Side Information Index Coding With Erroneous Side Information Jae-Won Kim and Jong-Seon No, Fellow, IEEE 1 Abstract arxiv:1703.09361v1 [cs.it] 28 Mar 2017 In this paper, new index coding problems are studied, where each

More information

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National

More information

Equivalence for Networks with Adversarial State

Equivalence for Networks with Adversarial State Equivalence for Networks with Adversarial State Oliver Kosut Department of Electrical, Computer and Energy Engineering Arizona State University Tempe, AZ 85287 Email: okosut@asu.edu Jörg Kliewer Department

More information

A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model

A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model M. Anand, Student Member, IEEE, and P. R. Kumar, Fellow, IEEE Abstract For every Gaussian

More information

Random Access Protocols for Massive MIMO

Random Access Protocols for Massive MIMO Random Access Protocols for Massive MIMO Elisabeth de Carvalho Jesper H. Sørensen Petar Popovski Aalborg University Denmark Emil Björnson Erik G. Larsson Linköping University Sweden 2016 Tyrrhenian International

More information

Interference Channels with Source Cooperation

Interference Channels with Source Cooperation Interference Channels with Source Cooperation arxiv:95.319v1 [cs.it] 19 May 29 Vinod Prabhakaran and Pramod Viswanath Coordinated Science Laboratory University of Illinois, Urbana-Champaign Urbana, IL

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

On the Duality between Multiple-Access Codes and Computation Codes

On the Duality between Multiple-Access Codes and Computation Codes On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Game Theoretic Solutions for Precoding Strategies over the Interference Channel

Game Theoretic Solutions for Precoding Strategies over the Interference Channel Game Theoretic Solutions for Precoding Strategies over the Interference Channel Jie Gao, Sergiy A. Vorobyov, and Hai Jiang Department of Electrical & Computer Engineering, University of Alberta, Canada

More information

Power Control via Stackelberg Game for Small-Cell Networks

Power Control via Stackelberg Game for Small-Cell Networks 1 Power Control via Stacelberg Game for Small-Cell Networs Yanxiang Jiang, Member, IEEE, Hui Ge, Mehdi Bennis, Senior Member, IEEE, Fu-Chun Zheng, Senior Member, IEEE, and Xiaohu You, Fellow, IEEE arxiv:1802.04775v1

More information

An Outer Bound for the Gaussian. Interference channel with a relay.

An Outer Bound for the Gaussian. Interference channel with a relay. An Outer Bound for the Gaussian Interference Channel with a Relay Ivana Marić Stanford University Stanford, CA ivanam@wsl.stanford.edu Ron Dabora Ben-Gurion University Be er-sheva, Israel ron@ee.bgu.ac.il

More information

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

Approximate Ergodic Capacity of a Class of Fading Networks

Approximate Ergodic Capacity of a Class of Fading Networks Approximate Ergodic Capacity of a Class of Fading Networks Sang-Woon Jeon, Chien-Yi Wang, and Michael Gastpar School of Computer and Communication Sciences EPFL Lausanne, Switzerland {sangwoon.jeon, chien-yi.wang,

More information

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:

More information

Recursions for the Trapdoor Channel and an Upper Bound on its Capacity

Recursions for the Trapdoor Channel and an Upper Bound on its Capacity 4 IEEE International Symposium on Information heory Recursions for the rapdoor Channel an Upper Bound on its Capacity obias Lutz Institute for Communications Engineering echnische Universität München Munich,

More information

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Rui Wang, Jun Zhang, S.H. Song and K. B. Letaief, Fellow, IEEE Dept. of ECE, The Hong Kong University of Science

More information

Constellation Shaping for Communication Channels with Quantized Outputs

Constellation Shaping for Communication Channels with Quantized Outputs Constellation Shaping for Communication Channels with Quantized Outputs Chandana Nannapaneni, Matthew C. Valenti, and Xingyu Xiang Lane Department of Computer Science and Electrical Engineering West Virginia

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Multiuser Downlink Beamforming: Rank-Constrained SDP

Multiuser Downlink Beamforming: Rank-Constrained SDP Multiuser Downlink Beamforming: Rank-Constrained SDP Daniel P. Palomar Hong Kong University of Science and Technology (HKUST) ELEC5470 - Convex Optimization Fall 2018-19, HKUST, Hong Kong Outline of Lecture

More information

Linear and Nonlinear Iterative Multiuser Detection

Linear and Nonlinear Iterative Multiuser Detection 1 Linear and Nonlinear Iterative Multiuser Detection Alex Grant and Lars Rasmussen University of South Australia October 2011 Outline 1 Introduction 2 System Model 3 Multiuser Detection 4 Interference

More information

Linear Programming Bounds for Robust Locally Repairable Storage Codes

Linear Programming Bounds for Robust Locally Repairable Storage Codes Linear Programming Bounds for Robust Locally Repairable Storage Codes M. Ali Tebbi, Terence H. Chan, Chi Wan Sung Institute for Telecommunications Research, University of South Australia Email: {ali.tebbi,

More information

Wireless Communication Technologies 16:332:559 (Advanced Topics in Communications) Lecture #17 and #18 (April 1, April 3, 2002)

Wireless Communication Technologies 16:332:559 (Advanced Topics in Communications) Lecture #17 and #18 (April 1, April 3, 2002) Wireless Communication echnologies Lecture 7 & 8 Wireless Communication echnologies 6:33:559 (Advanced opics in Communications) Lecture #7 and #8 (April, April 3, ) Instructor rof. arayan Mandayam Summarized

More information

An introduction to basic information theory. Hampus Wessman

An introduction to basic information theory. Hampus Wessman An introduction to basic information theory Hampus Wessman Abstract We give a short and simple introduction to basic information theory, by stripping away all the non-essentials. Theoretical bounds on

More information

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of

More information

Asymptotic Distribution of The Number of Isolated Nodes in Wireless Ad Hoc Networks with Unreliable Nodes and Links

Asymptotic Distribution of The Number of Isolated Nodes in Wireless Ad Hoc Networks with Unreliable Nodes and Links Asymptotic Distribution of The Number of Isolated Nodes in Wireless Ad Hoc Networs with Unreliable Nodes and Lins Chih-Wei Yi, Peng-Jun Wan, Kuo-Wei Lin and Chih-Hao Huang Department of Computer Science

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia

More information

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels Feedback Capacity of a Class of Symmetric Finite-State Markov Channels Nevroz Şen, Fady Alajaji and Serdar Yüksel Department of Mathematics and Statistics Queen s University Kingston, ON K7L 3N6, Canada

More information

Two-Way Training: Optimal Power Allocation for Pilot and Data Transmission

Two-Way Training: Optimal Power Allocation for Pilot and Data Transmission 564 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 2, FEBRUARY 200 Two-Way Training: Optimal Power Allocation for Pilot and Data Transmission Xiangyun Zhou, Student Member, IEEE, Tharaka A.

More information

A Comparison of Superposition Coding Schemes

A Comparison of Superposition Coding Schemes A Comparison of Superposition Coding Schemes Lele Wang, Eren Şaşoğlu, Bernd Bandemer, and Young-Han Kim Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA

More information

Mode Selection for Multi-Antenna Broadcast Channels

Mode Selection for Multi-Antenna Broadcast Channels Mode Selection for Multi-Antenna Broadcast Channels Gill November 22, 2011 Gill (University of Delaware) November 22, 2011 1 / 25 Part I Mode Selection for MISO BC with Perfect/Imperfect CSI [1]-[3] Gill

More information

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems Department of Electrical Engineering, College of Engineering, Basrah University Basrah Iraq,

More information

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Chunhua Sun, Wei Zhang, and haled Ben Letaief, Fellow, IEEE Department of Electronic and Computer Engineering The Hong ong

More information

Timing errors in distributed space-time communications

Timing errors in distributed space-time communications Timing errors in distributed space-time communications Emanuele Viterbo Dipartimento di Elettronica Politecnico di Torino Torino, Italy viterbo@polito.it Yi Hong Institute for Telecom. Research University

More information

Mixed Noisy Network Coding

Mixed Noisy Network Coding Mixed Noisy Networ Coding Arash Behboodi Dept of elecommunication Systems, U Berlin 10587 Berlin, Germany Email: behboodi@tntu-berlinde Pablo Piantanida Dept of elecommunications, SUPELEC 9119 Gif-sur-Yvette,

More information

Data-aided and blind synchronization

Data-aided and blind synchronization PHYDYAS Review Meeting 2009-03-02 Data-aided and blind synchronization Mario Tanda Università di Napoli Federico II Dipartimento di Ingegneria Biomedica, Elettronicae delle Telecomunicazioni Via Claudio

More information

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012 Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information