Improving on the Cutset Bound via a Geometric Analysis of Typical Sets

Size: px
Start display at page:

Download "Improving on the Cutset Bound via a Geometric Analysis of Typical Sets"

Transcription

1 Imroving on the Cutset Bound via a Geometric Analysis of Tyical Sets Ayfer Özgür Stanford University CUHK, May 28, 2016 Joint work with Xiugang Wu (Stanford). Ayfer Özgür (Stanford) March 16 1 / 33

2 Gaussian Relay Channel Z = X + W 1 Y = X + X r + W 2 Caacity is the largest achievable end-to-end reliable communication rate between the source and the destination. Ayfer Özgür (Stanford) March 16 2 / 33

3 Early work One of the central roblems in information theory: Introduced by van der Meulen in Seminal work by Cover and El Gamal in Two achievable Schemes: Decode-Forward, Comress-Forward. A general uer bound: Cutset Bound. Ayfer Özgür (Stanford) March 16 3 / 33

4 Over the Following 35 Years Major research effort over the last two decades however the roblem remains oen. Ayfer Özgür (Stanford) March 16 4 / 33

5 Over the Following 35 Years Major research effort over the last two decades however the roblem remains oen. Decode-Forward and Comress-Forward have been extended to multi-relay networks (Xie-Kumar 05,Kramer-Gastar-Guta 05) and unified (Wu-Xie 14). Ayfer Özgür (Stanford) March 16 4 / 33

6 Over the Following 35 Years Major research effort over the last two decades however the roblem remains oen. Decode-Forward and Comress-Forward have been extended to multi-relay networks (Xie-Kumar 05,Kramer-Gastar-Guta 05) and unified (Wu-Xie 14). Many new relaying strategies have been discovered: e.g., Amlify-Forward (Schein-Gallager 00), Hash-Forward (Kim 08), Comute-Forward (Nazer-Gastar 11), Quantize-Ma-Forward (Avestimehr-Diggavi-Tse 11), Noisy Network Coding (Lim-Kim-El Gamal-Chung 11). Ayfer Özgür (Stanford) March 16 4 / 33

7 Over the Following 35 Years Major research effort over the last two decades however the roblem remains oen. Decode-Forward and Comress-Forward have been extended to multi-relay networks (Xie-Kumar 05,Kramer-Gastar-Guta 05) and unified (Wu-Xie 14). Many new relaying strategies have been discovered: e.g., Amlify-Forward (Schein-Gallager 00), Hash-Forward (Kim 08), Comute-Forward (Nazer-Gastar 11), Quantize-Ma-Forward (Avestimehr-Diggavi-Tse 11), Noisy Network Coding (Lim-Kim-El Gamal-Chung 11). Cutset bound remains as the only uer bound on caacity of the Gaussian Relay Channel. Consistently used as a benchmark for erformance. It is not known if this bound is indeed achievable or not. Ayfer Özgür (Stanford) March 16 4 / 33

8 Gaussian Primitive Relay Channel W 1 N(0,N) W 2 N(0,N) Z Relay R 0 Source X Y Destination Cutset Bound: (Cover-El Gamal 79) If R achievable, some X with E[X 2 ] P such that: R I (X ; Y, Z) R I (X ; Y ) + R 0 Broadcast Bound Multile Access Bound Ayfer Özgür (Stanford) March 16 5 / 33

9 Gaussian Primitive Relay Channel W 1 N(0,N) W 2 N(0,N) Z Relay R 0 Source X Y Destination Cutset Bound: (Cover-El Gamal 79) If R achievable, some X with E[X 2 ] P such that: R I (X ; Y, Z) R I (X ; Y ) + R 0 Broadcast Bound Multile Access Bound Ayfer Özgür (Stanford) March 16 5 / 33

10 Gaussian Primitive Relay Channel W 1 N(0,N) W 2 N(0,N) Z Relay R 0 Source X Y Destination Cutset Bound: (Cover-El Gamal 79) If R achievable, then R 1 ( 2 log 1 + 2P ) N R 1 ( 2 log 1 + P ) + R 0 N Ayfer Özgür (Stanford) March 16 6 / 33

11 Cutset Bound is not Tight W 1 N(0,N) W 2 N(0,N) Z Relay R 0 Source X Y Destination Theorem: (Wu-Ozgur 15) If R achievable, then some X with E[X 2 ] P and a 0 such that R I (X ; Y, Z) R I (X ; Y ) + R 0 a R I (X ; Y ) + a + 2a ln 2 log e Broadcast Bound Modified Multile Access Bound New constraint involving a Ayfer Özgür (Stanford) March 16 7 / 33

12 Cutset Bound is not Tight W 1 N(0,N) W 2 N(0,N) Z Relay R 0 Source X Y Destination Theorem: (Wu-Ozgur 15) If R achievable, then some a 0 such that R 1 ( 2 log 1 + 2P ) N R 1 ( 2 log 1 + P ) + R 0 a N R 1 ( 2 log 1 + P ) + a + 2a ln 2 log e N Ayfer Özgür (Stanford) March 16 8 / 33

13 Cutset Bound is not Tight W 1 N(0,N) W 2 N(0,N) Z Relay R 0 Source X Theorem: (Wu-Ozgur 15) If R achievable, then R 1 ( 2 log 1 + 2P ) N R 1 ( 2 log 1 + P ) + R 0 a N Y Destination where a is such that R 0 = 2a + 2a ln 2 log e New bound is strictly tighter than the cutset bound. Ayfer Özgür (Stanford) March 16 9 / 33

14 Ga to the Cutset Bound Cut-set bound New bound ale 0.5 X-Y single-user caacity Largest ga among all ( P N, R 0) : Ayfer Özgür (Stanford) March / 33

15 Caacity Aroximation for Gaussian Relay Networks N relays Source Destination Theorem: (Avestimehr-Diggavi-Tse 11) The caacity of any Gaussian relay network can be aroximated with the cutset bound within a ga that is indeendent of the channel configurations and deends on the network toology only through the number of nodes. Aroximation ga: Ga 7.5N 1.5N 0.6N 0.5N (Avestimehr-Diggavi-Tse 11) (Ozgur-Diggavi 13) (Lim-Kim-El Gamal-Chung 13) (Lim-Kim-Kim 15) Ayfer Özgür (Stanford) Can we do better? March / 33

16 The Gaussian N-Relay Diamond Network 1 h 1s h 1d 2 S h 2s. h 2d D h Ns N h Nd Chern and Ozgur 12 We can aroximate the caacity of any Gaussian N-Relay Diamond network with its cutset bound within a Ga log N indeendent of the channel coefficients and the SNR s. Ayfer Özgür (Stanford) March / 33

17 Sublinear ga to the cut-set bound? N relays Source Destination Theorem:(Courtade-Ozgur 15) Sublinear ga is achievable iff cutset bound is tight for all Gaussian relay networks. Linear ga to the cutset bound is order-otimal: 0.5N Ga 0.01N. Ayfer Özgür (Stanford) March / 33

18 A Tensorization Argument Ga Source Destination M Ayfer Özgür (Stanford) March / 33

19 A Tensorization Argument 1 Ga M 0.01N Source Destination M Ayfer Özgür (Stanford) March / 33

20 Derivation of the Cutset Bound W 1 N(0,N) W 2 N(0,N) Z n Relay R 0 I n = f(z n ) Source X n Destination Y n Ste 1) Aly Fano s inequality: nr I (X n ; Y n, I n ) + nɛ n Ste 2) Bound with single-letter exressions. Ayfer Özgür (Stanford) March / 33

21 Derivation of the Cutset Bound BC Constraint: nr I (X n ; Y n, I n ) + nɛ n I (X n ; Y n, Z n ) + nɛ n n(i (X ; Y, Z) + ɛ n ) Source X n W 1 N(0,N) W 2 N(0,N) Z n Relay R I n = f(z n 0 ) Destination Y n MAC Constraint: nr I (X n ; Y n, I n ) + nɛ n I (X n ; Y n ) + I (X n ; I n Y n ) + nɛ n I (X n ; Y n ) + H(I n Y n ) H(I }{{} n Y n, X n ) +nɛ }{{} n nr 0 0 n(i (X ; Y ) + R 0 + ɛ n ) Ayfer Özgür (Stanford) March / 33

22 Derivation of the New Bound BC Constraint: nr I (X n ; Y n, I n ) + nɛ n Z n Relay I (X n ; Y n, Z n ) + nɛ n n(i (X ; Y, Z) + ɛ n ) Source X n W 1 N(0,N) W 2 N(0,N) R 0 I n = f(z n ) Destination Y n MAC Constraint: nr I (X n ; Y n, I n ) + nɛ n I (X n ; Y n ) + I (X n ; I n Y n ) + nɛ n I (X n ; Y n ) + H(I n Y n ) H(I }{{} n Y n, X n ) +nɛ }{{} n nr 0 n(i (X ; Y ) + R 0 a + ɛ n ) Need a lower bound on a. =H(I n X n )=na Ayfer Özgür (Stanford) March / 33

23 a cannot be arbitrarily small Y n X n nn Z n W 1 N(0,N) W 2 N(0,N) Z n Relay R I n = f(z n 0 ) Source X n Destination Y n Tyical set of Z n /Y n I n -th bin If H(I n X n ) = na = 0, Ayfer Özgür (Stanford) March / 33

24 a cannot be arbitrarily small Y n X n nn Z n W 1 N(0,N) W 2 N(0,N) Z n Relay R I n = f(z n 0 ) Source X n Destination Y n Tyical set of Z n /Y n I n -th bin If H(I n X n ) = na = 0, then H(I n Y n ) = 0 R I (X n ; Y n ) + H(I n Y n ) H(I }{{} n X n ) +nɛ }{{} n =0 =0 n(i (X ; Y ) + ɛ n ) Ayfer Özgür (Stanford) March / 33

25 In general W 1 N(0,N) W 2 N(0,N) Z n Relay R I n = f(z n 0 ) Source X n Destination Y n I n = f (Z n ) Z n X n Y n, and Y n and Z n are i.i.d. given X n. R I (X n ; Y n ) + H(I n Y n ) H(I }{{} n X n ) +nɛ }{{} n? =na I (X n ; Y n ) + I (I n ; X n ) I (I }{{} n ; Y n ) +nɛ }{{} n =n(r 0 a)? Ayfer Özgür (Stanford) March / 33

26 In general W 1 N(0,N) W 2 N(0,N) Z n Relay R I n = f(z n 0 ) Source X n Destination Y n I n = f (Z n ) Z n X n Y n, and Y n and Z n are i.i.d. given X n. R I (X n ; Y n ) + H(I n Y n ) H(I }{{} n X n ) +nɛ }{{} n? =na I (X n ; Y n ) + I (I n ; X n ) I (I }{{} n ; Y n ) +nɛ }{{} n =n(r 0 a)? Strong Data Processing: Let U X Y. Fix I (U; X ) and bound I (U; Y ). Ayfer Özgür (Stanford) March / 33

27 H(I n X n ) = na and a > 0 Tyical set of Z n nn X n Multile bins # of bins =? P(each bin) =? Ayfer Özgür (Stanford) March / 33

28 From n- to nb- Dimensional Sace B-length i.i.d. extension {(X n (b), Y n (b), Z n (b), I n (b))} B b=1. Signals in nb-dimensional sace: X, Y, Z, I. Law of Large Numbers: n dimensional sace: H(In X n ) = na. nb dimensional sace: For any tyical (x, i), P(Z i th bin x) =. 2 nba. Tyical set of Z/Y nbnx ith Pr =2. bin nba Ayfer Özgür (Stanford) March / 33

29 Gaussian Measure Concentration Theorem (Functional) If X N (0, I k ), and Z = f (X ) such that f : R k R is L-Lischitz, i.e. f (x) f (y) L x y 2, x, y then P(Z E[Z] > t) e t2 /(2L 2), t > 0. Ayfer Özgür (Stanford) March / 33

30 Gaussian Measure Concentration Theorem (Functional) If X N (0, I k ), and Z = f (X ) such that f : R k R is L-Lischitz, i.e. f (x) f (y) L x y 2, x, y then Theorem (Geometric) P(Z E[Z] > t) e t2 /(2L 2), t > 0. If X N (0, I k ), and let B t = {x R k : y B s.t. y x 2 t} for B R k, then ( ) 2 P(X / B t ) e 1 t 2 log P(B) 2. Ayfer Özgür (Stanford) March / 33

31 Gaussian Measure Concentration Theorem (Functional) If X N (0, I k ), and Z = f (X ) such that f : R k R is L-Lischitz, i.e. f (x) f (y) L x y 2, x, y then Theorem (Geometric) P(Z E[Z] > t) e t2 /(2L 2), t > 0. If X N (0, I k ), and let B t = {x R k : y B s.t. y x 2 t} for B R k, then ( ) 2 P(X / B t ) e 1 t 2 log P(B) 2. If P(B) = e kb, blow u by a radius t = k( 2b + ɛ), then P(X / B t ) e kɛ2. Ayfer Özgür (Stanford) March / 33

32 Gaussian Measure Concentration Tyical set of Z/Y nbnx ith Pr =2. bin nba Ayfer Özgür (Stanford) March / 33

33 Gaussian Measure Concentration nb 2Naln 2 nbnx nbnx Tyical set of Z/Y ith Pr =2. bin nba Tyical set of Z/Y blown-u set of i-th bin Pr 1 Ayfer Özgür (Stanford) March / 33

34 Gaussian Measure Concentration nb 2Naln 2 nbnx nbnx Tyical set of Z/Y ith Pr =2. bin nba Tyical set of Z/Y blown-u set of i-th bin Pr 1 P(Z blown-u set of i th bin x) 1. P(Y blown-u set of i th bin x) 1. Ayfer Özgür (Stanford) March / 33

35 Geometry of Tyical Sets n-dimensional sace: Tyical (X n, Y n, Z n, I n ) nb-dimensional sace: Tyical (x, y, i) Y n y nbn nb 2Naln 2 z! i X n nn Z n! I n x Ayfer Özgür (Stanford) March / 33

36 Geometry of Tyical Sets n-dimensional sace: Tyical (X n, Y n, Z n, I n ) nb-dimensional sace: Tyical (x, y, i) Y n y nbn nb 2Naln 2 z! i X n nn Z n! I n x Ayfer Özgür (Stanford) March / 33

37 Translating Geometry to Information Inequalities Assume y, z were discrete: B(r): Ball of radius r around y. B(r) : number of z sequences. H(I Y) log B( 2nBNa log 2). y nbn x nb 2Naln 2 z! i If I (I n ; X n ) = n(r 0 a), I (I n ; Y n ) nr 0 1 B log B( 2nBNa log 2). Ayfer Özgür (Stanford) March / 33

38 Bounding f (y i) for a tyical (y, i) x 2 A(X z) y nb 2Naln 2 f(y x) z 2 ith bin nbn d(x, y) ale d(x, z)+d(z, y) ale nb( N + 2Naln 2) f (y i) (x i)f (y x) x A(X n z) A(X n z). = 2 BH(X n Z n ) (x i). = 2 BH(X n I n) f (y x) 1 nb( N+ 2Na ln 2) 2 e 2N (2πN) nb/2 Ayfer Özgür (Stanford) March / 33

39 Bounding f (y i) For a tyical (y, i): 1. f (y i) 2 B(H(X n I n) H(X n Z n )+h(y n X n )+n(a+ 2a ln 2 log e)) 2. f (y i). = 2 Bh(Y n I n) A new entroy inequality: h(y n I n ) H(X n I n ) H(X n Z n )+h(y n X n )+n(a+ 2a ln 2 log e). Ayfer Özgür (Stanford) March / 33

40 Bounding f (y i) For a tyical (y, i): 1. f (y i) 2 B(H(X n I n) H(X n Z n )+h(y n X n )+n(a+ 2a ln 2 log e)) 2. f (y i). = 2 Bh(Y n I n) A new entroy inequality: h(y n I n ) H(X n I n ) H(X n Z n )+h(y n X n )+n(a+ 2a ln 2 log e). Equivalently: I (I n ; X n ) I (I n ; Y n ) n(a + 2a ln 2 log e). Ayfer Özgür (Stanford) March / 33

41 Bounding f (y i) For a tyical (y, i): 1. f (y i) 2 B(H(X n I n) H(X n Z n )+h(y n X n )+n(a+ 2a ln 2 log e)) 2. f (y i). = 2 Bh(Y n I n) A new entroy inequality: h(y n I n ) H(X n I n ) H(X n Z n )+h(y n X n )+n(a+ 2a ln 2 log e). Equivalently: I (I n ; X n ) I (I n ; Y n ) n(a + 2a ln 2 log e). A new constraint: R I (X ; Y ) + I (I n ; X n ) I (I n ; Y n ) I (X ; Y ) + a + 2a ln 2 log e. Ayfer Özgür (Stanford) March / 33

42 Discrete Memoryless Primitive Relay Channel Y and Z are conditionally I.I.D. given X. Joint work with Liang-Liang Xie. Ayfer Özgür (Stanford) March / 33

43 An Oen Problem Cover, Oen roblems in Communication and Comutation, 1987 What is the minimum R 0 (denoted by R0 ) needed to achieve C XYZ = max (x) I (X ; Y, Z)? For examle, when the channel from X to Y and Z is BSC(), R 0 1. Ayfer Özgür (Stanford) March / 33

44 Bounds on R 0 (BSC) Lower bound on R Hash-Forward Cut-Set Bound A striking dichotomy when 0.5 C XYZ 0: Achievable schemes require R 0 1. Uer bounds allow for R 0 0. Ayfer Özgür (Stanford) March / 33

45 Bounds on R 0 (BSC) Lower bound on R Hash-Forward Cut-Set Bound New Bound Strictly ositive R 0 needed to achieve C XYZ 0! Ayfer Özgür (Stanford) March / 33

46 Conclusion We develoed new uer bounds on the caacity of the relay channel that are tighter than the cutset bound. Our roof used ideas from tyicality and measure concentration. It would be interesting to see if the aroach we develo in this aer, i.e. deriving information inequalities by studying the geometry of tyical sets, in articular using measure concentration, can be used to make rogress on other long-standing oen roblems in network information theory. Ayfer Özgür (Stanford) March / 33

Cover s Open Problem: The Capacity of the Relay Channel

Cover s Open Problem: The Capacity of the Relay Channel Cover s Open Problem: The Capacity of the Relay Channel Ayfer Özgür Stanford University Advanced Networks Colloquia Series University of Maryland, March 2017 Joint work with Xiugang Wu and Leighton Pate

More information

Interactive Hypothesis Testing Against Independence

Interactive Hypothesis Testing Against Independence 013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

II. THE TWO-WAY TWO-RELAY CHANNEL

II. THE TWO-WAY TWO-RELAY CHANNEL An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable

More information

HetNets: what tools for analysis?

HetNets: what tools for analysis? HetNets: what tools for analysis? Daniela Tuninetti (Ph.D.) Email: danielat@uic.edu Motivation Seven Ways that HetNets are a Cellular Paradigm Shift, by J. Andrews, IEEE Communications Magazine, March

More information

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract

More information

An Achievable Rate for the Multiple Level Relay Channel

An Achievable Rate for the Multiple Level Relay Channel An Achievable Rate for the Multiple Level Relay Channel Liang-Liang Xie and P. R. Kumar Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University of Illinois, Urbana-Champaign

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

The Role of Directed Information in Network Capacity

The Role of Directed Information in Network Capacity The Role of Directed Information in Network Capacity Sudeep Kamath 1 and Young-Han Kim 2 1 Department of Electrical Engineering Princeton University 2 Department of Electrical and Computer Engineering

More information

On the Duality between Multiple-Access Codes and Computation Codes

On the Duality between Multiple-Access Codes and Computation Codes On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch

More information

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications;

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications; Formal Modeling in Cognitive Science Lecture 9: and ; ; Frank Keller School of Informatics University of Edinburgh keller@inf.ed.ac.uk Proerties of 3 March, 6 Frank Keller Formal Modeling in Cognitive

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

On Multiple User Channels with State Information at the Transmitters

On Multiple User Channels with State Information at the Transmitters On Multiple User Channels with State Information at the Transmitters Styrmir Sigurjónsson and Young-Han Kim* Information Systems Laboratory Stanford University Stanford, CA 94305, USA Email: {styrmir,yhk}@stanford.edu

More information

On the Capacity Region of the Gaussian Z-channel

On the Capacity Region of the Gaussian Z-channel On the Capacity Region of the Gaussian Z-channel Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@eng.umd.edu ulukus@eng.umd.edu

More information

Coding Along Hermite Polynomials for Gaussian Noise Channels

Coding Along Hermite Polynomials for Gaussian Noise Channels Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

The Gallager Converse

The Gallager Converse The Gallager Converse Abbas El Gamal Director, Information Systems Laboratory Department of Electrical Engineering Stanford University Gallager s 75th Birthday 1 Information Theoretic Limits Establishing

More information

Approximate Capacity of the MIMO Relay Channel

Approximate Capacity of the MIMO Relay Channel 04 IEEE International Symposium on Information Theory Approximate Capacity of the MIMO Relay Channel Xianglan Jin Department of Electrical and Computer Engineering Pusan National University Busan 609-735

More information

Two Applications of the Gaussian Poincaré Inequality in the Shannon Theory

Two Applications of the Gaussian Poincaré Inequality in the Shannon Theory Two Applications of the Gaussian Poincaré Inequality in the Shannon Theory Vincent Y. F. Tan (Joint work with Silas L. Fong) National University of Singapore (NUS) 2016 International Zurich Seminar on

More information

Feedback Capacity of the Gaussian Interference Channel to Within Bits: the Symmetric Case

Feedback Capacity of the Gaussian Interference Channel to Within Bits: the Symmetric Case 1 arxiv:0901.3580v1 [cs.it] 23 Jan 2009 Feedback Capacity of the Gaussian Interference Channel to Within 1.7075 Bits: the Symmetric Case Changho Suh and David Tse Wireless Foundations in the Department

More information

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,

More information

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code. Convolutional Codes Goals Lecture Be able to encode using a convolutional code Be able to decode a convolutional code received over a binary symmetric channel or an additive white Gaussian channel Convolutional

More information

Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach

Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Silas Fong (Joint work with Vincent Tan) Department of Electrical & Computer Engineering National University

More information

Relay Networks With Delays

Relay Networks With Delays Relay Networks With Delays Abbas El Gamal, Navid Hassanpour, and James Mammen Department of Electrical Engineering Stanford University, Stanford, CA 94305-9510 Email: {abbas, navid, jmammen}@stanford.edu

More information

Round-off Errors and Computer Arithmetic - (1.2)

Round-off Errors and Computer Arithmetic - (1.2) Round-off Errors and Comuter Arithmetic - (.). Round-off Errors: Round-off errors is roduced when a calculator or comuter is used to erform real number calculations. That is because the arithmetic erformed

More information

Approximately achieving Gaussian relay. network capacity with lattice-based QMF codes

Approximately achieving Gaussian relay. network capacity with lattice-based QMF codes Approximately achieving Gaussian relay 1 network capacity with lattice-based QMF codes Ayfer Özgür and Suhas Diggavi Abstract In [1], a new relaying strategy, quantize-map-and-forward QMF scheme, has been

More information

On the Capacity of the Interference Channel with a Relay

On the Capacity of the Interference Channel with a Relay On the Capacity of the Interference Channel with a Relay Ivana Marić, Ron Dabora and Andrea Goldsmith Stanford University, Stanford, CA {ivanam,ron,andrea}@wsl.stanford.edu Abstract Capacity gains due

More information

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel

More information

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca

More information

Lecture 3: Channel Capacity

Lecture 3: Channel Capacity Lecture 3: Channel Capacity 1 Definitions Channel capacity is a measure of maximum information per channel usage one can get through a channel. This one of the fundamental concepts in information theory.

More information

National University of Singapore Department of Electrical & Computer Engineering. Examination for

National University of Singapore Department of Electrical & Computer Engineering. Examination for National University of Singapore Department of Electrical & Computer Engineering Examination for EE5139R Information Theory for Communication Systems (Semester I, 2014/15) November/December 2014 Time Allowed:

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

IET Commun., 2009, Vol. 3, Iss. 4, pp doi: /iet-com & The Institution of Engineering and Technology 2009

IET Commun., 2009, Vol. 3, Iss. 4, pp doi: /iet-com & The Institution of Engineering and Technology 2009 Published in IET Communications Received on 10th March 2008 Revised on 10th July 2008 ISSN 1751-8628 Comprehensive partial decoding approach for two-level relay networks L. Ghabeli M.R. Aref Information

More information

On Z p -norms of random vectors

On Z p -norms of random vectors On Z -norms of random vectors Rafa l Lata la Abstract To any n-dimensional random vector X we may associate its L -centroid body Z X and the corresonding norm. We formulate a conjecture concerning the

More information

Capacity Theorems for Relay Channels

Capacity Theorems for Relay Channels Capacity Theorems for Relay Channels Abbas El Gamal Department of Electrical Engineering Stanford University April, 2006 MSRI-06 Relay Channel Discrete-memoryless relay channel [vm 7] Relay Encoder Y n

More information

EE/Stats 376A: Information theory Winter Lecture 5 Jan 24. Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B.

EE/Stats 376A: Information theory Winter Lecture 5 Jan 24. Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B. EE/Stats 376A: Information theory Winter 207 Lecture 5 Jan 24 Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B. 5. Outline Markov chains and stationary distributions Prefix codes

More information

LDPC codes for the Cascaded BSC-BAWGN channel

LDPC codes for the Cascaded BSC-BAWGN channel LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 email:aravind,siegel,jwolf@ucsd.edu

More information

A Coordinate System for Gaussian Networks

A Coordinate System for Gaussian Networks A Coordinate System for Gaussian Networs The MIT Faculty has made this article oenly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Abbe, Emmanuel,

More information

Mixed Noisy Network Coding

Mixed Noisy Network Coding Mixed Noisy Networ Coding Arash Behboodi Dept of elecommunication Systems, U Berlin 10587 Berlin, Germany Email: behboodi@tntu-berlinde Pablo Piantanida Dept of elecommunications, SUPELEC 9119 Gif-sur-Yvette,

More information

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department

More information

1 Probability Spaces and Random Variables

1 Probability Spaces and Random Variables 1 Probability Saces and Random Variables 1.1 Probability saces Ω: samle sace consisting of elementary events (or samle oints). F : the set of events P: robability 1.2 Kolmogorov s axioms Definition 1.2.1

More information

THE fundamental architecture of most of today s

THE fundamental architecture of most of today s IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 4, APRIL 2015 1509 A Unified Approach to Hybrid Coding Paolo Minero, Member, IEEE, Sung Hoon Lim, Member, IEEE, and Young-Han Kim, Fellow, IEEE Abstract

More information

Interactive Decoding of a Broadcast Message

Interactive Decoding of a Broadcast Message In Proc. Allerton Conf. Commun., Contr., Computing, (Illinois), Oct. 2003 Interactive Decoding of a Broadcast Message Stark C. Draper Brendan J. Frey Frank R. Kschischang University of Toronto Toronto,

More information

Simultaneous Nonunique Decoding Is Rate-Optimal

Simultaneous Nonunique Decoding Is Rate-Optimal Fiftieth Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 1-5, 2012 Simultaneous Nonunique Decoding Is Rate-Optimal Bernd Bandemer University of California, San Diego La Jolla, CA

More information

Graph-based Codes for Quantize-Map-and-Forward Relaying

Graph-based Codes for Quantize-Map-and-Forward Relaying 20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

2-user 2-hop Networks

2-user 2-hop Networks 2012 IEEE International Symposium on Information Theory roceedings Approximate Ergodic Capacity of a Class of Fading 2-user 2-hop Networks Sang-Woon Jeon, Chien-Yi Wang, and Michael Gastpar School of Computer

More information

Lecture 14 February 28

Lecture 14 February 28 EE/Stats 376A: Information Theory Winter 07 Lecture 4 February 8 Lecturer: David Tse Scribe: Sagnik M, Vivek B 4 Outline Gaussian channel and capacity Information measures for continuous random variables

More information

Information Theory Meets Game Theory on The Interference Channel

Information Theory Meets Game Theory on The Interference Channel Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University

More information

Bounds on Achievable Rates for General Multi-terminal Networks with Practical Constraints

Bounds on Achievable Rates for General Multi-terminal Networks with Practical Constraints Bounds on Achievable Rates for General Multi-terminal Networs with Practical Constraints Mohammad Ali Khojastepour, Ashutosh Sabharwal, and Behnaam Aazhang Department of Electrical and Computer Engineering

More information

Some Results on the Generalized Gaussian Distribution

Some Results on the Generalized Gaussian Distribution Some Results on the Generalized Gaussian Distribution Alex Dytso, Ronit Bustin, H. Vincent Poor, Daniela Tuninetti 3, Natasha Devroye 3, and Shlomo Shamai (Shitz) Abstract The aer considers information-theoretic

More information

EE/Stat 376B Handout #5 Network Information Theory October, 14, Homework Set #2 Solutions

EE/Stat 376B Handout #5 Network Information Theory October, 14, Homework Set #2 Solutions EE/Stat 376B Handout #5 Network Information Theory October, 14, 014 1. Problem.4 parts (b) and (c). Homework Set # Solutions (b) Consider h(x + Y ) h(x + Y Y ) = h(x Y ) = h(x). (c) Let ay = Y 1 + Y, where

More information

MATH 250: THE DISTRIBUTION OF PRIMES. ζ(s) = n s,

MATH 250: THE DISTRIBUTION OF PRIMES. ζ(s) = n s, MATH 50: THE DISTRIBUTION OF PRIMES ROBERT J. LEMKE OLIVER For s R, define the function ζs) by. Euler s work on rimes ζs) = which converges if s > and diverges if s. In fact, though we will not exloit

More information

On the Capacity of the Binary-Symmetric Parallel-Relay Network

On the Capacity of the Binary-Symmetric Parallel-Relay Network On the Capacity of the Binary-Symmetric Parallel-Relay Network Lawrence Ong, Sarah J. Johnson, and Christopher M. Kellett arxiv:207.3574v [cs.it] 6 Jul 202 Abstract We investigate the binary-symmetric

More information

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material Robustness of classifiers to uniform l and Gaussian noise Sulementary material Jean-Yves Franceschi Ecole Normale Suérieure de Lyon LIP UMR 5668 Omar Fawzi Ecole Normale Suérieure de Lyon LIP UMR 5668

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

Multicoding Schemes for Interference Channels

Multicoding Schemes for Interference Channels Multicoding Schemes for Interference Channels 1 Ritesh Kolte, Ayfer Özgür, Haim Permuter Abstract arxiv:1502.04273v1 [cs.it] 15 Feb 2015 The best known inner bound for the 2-user discrete memoryless interference

More information

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels Mehdi Mohseni Department of Electrical Engineering Stanford University Stanford, CA 94305, USA Email: mmohseni@stanford.edu

More information

Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel

Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel Jun Chen Dept. of Electrical and Computer Engr. McMaster University Hamilton, Ontario, Canada Chao Tian AT&T Labs-Research 80 Park

More information

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen

More information

An Outer Bound for the Gaussian. Interference channel with a relay.

An Outer Bound for the Gaussian. Interference channel with a relay. An Outer Bound for the Gaussian Interference Channel with a Relay Ivana Marić Stanford University Stanford, CA ivanam@wsl.stanford.edu Ron Dabora Ben-Gurion University Be er-sheva, Israel ron@ee.bgu.ac.il

More information

Capacity Bounds for Diamond Networks

Capacity Bounds for Diamond Networks Technische Universität München Capacity Bounds for Diamond Networks Gerhard Kramer (TUM) joint work with Shirin Saeedi Bidokhti (TUM & Stanford) DIMACS Workshop on Network Coding Rutgers University, NJ

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

ECE Information theory Final

ECE Information theory Final ECE 776 - Information theory Final Q1 (1 point) We would like to compress a Gaussian source with zero mean and variance 1 We consider two strategies In the first, we quantize with a step size so that the

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

Lecture 22: Final Review

Lecture 22: Final Review Lecture 22: Final Review Nuts and bolts Fundamental questions and limits Tools Practical algorithms Future topics Dr Yao Xie, ECE587, Information Theory, Duke University Basics Dr Yao Xie, ECE587, Information

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

Can Feedback Increase the Capacity of the Energy Harvesting Channel?

Can Feedback Increase the Capacity of the Energy Harvesting Channel? Can Feedback Increase the Capacity of the Energy Harvesting Channel? Dor Shaviv EE Dept., Stanford University shaviv@stanford.edu Ayfer Özgür EE Dept., Stanford University aozgur@stanford.edu Haim Permuter

More information

Interference Decoding for Deterministic Channels Bernd Bandemer, Student Member, IEEE, and Abbas El Gamal, Fellow, IEEE

Interference Decoding for Deterministic Channels Bernd Bandemer, Student Member, IEEE, and Abbas El Gamal, Fellow, IEEE 2966 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 Interference Decoding for Deterministic Channels Bernd Bemer, Student Member, IEEE, Abbas El Gamal, Fellow, IEEE Abstract An inner

More information

Approximate capacity region of the two-pair bidirectional Gaussian relay network

Approximate capacity region of the two-pair bidirectional Gaussian relay network Approximate capacity region of the two-pair bidirectional Gaussian relay network Aydin Sezgin UC Irvine CA USA asezgin@uci.edu M. Amin Khajehnejad Caltech Pasadena CA USA amin@caltech.edu A. Salman Avestimehr

More information

THE relay channel, whereby point-to-point communication

THE relay channel, whereby point-to-point communication IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 63, NO., FEBRUARY 017 1167 The Approximate Capacity of the MIMO Relay Channel Xianglan Jin, Member, IEEE, Young-Han Kim, Fellow, IEEE Abstract Capacity bounds

More information

Published: 14 October 2013

Published: 14 October 2013 Electronic Journal of Alied Statistical Analysis EJASA, Electron. J. A. Stat. Anal. htt://siba-ese.unisalento.it/index.h/ejasa/index e-issn: 27-5948 DOI: 1.1285/i275948v6n213 Estimation of Parameters of

More information

A Comparison of Superposition Coding Schemes

A Comparison of Superposition Coding Schemes A Comparison of Superposition Coding Schemes Lele Wang, Eren Şaşoğlu, Bernd Bandemer, and Young-Han Kim Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA

More information

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law On Isoerimetric Functions of Probability Measures Having Log-Concave Densities with Resect to the Standard Normal Law Sergey G. Bobkov Abstract Isoerimetric inequalities are discussed for one-dimensional

More information

Extension of Minimax to Infinite Matrices

Extension of Minimax to Infinite Matrices Extension of Minimax to Infinite Matrices Chris Calabro June 21, 2004 Abstract Von Neumann s minimax theorem is tyically alied to a finite ayoff matrix A R m n. Here we show that (i) if m, n are both inite,

More information

Sharp gradient estimate and spectral rigidity for p-laplacian

Sharp gradient estimate and spectral rigidity for p-laplacian Shar gradient estimate and sectral rigidity for -Lalacian Chiung-Jue Anna Sung and Jiaing Wang To aear in ath. Research Letters. Abstract We derive a shar gradient estimate for ositive eigenfunctions of

More information

Interference Channel aided by an Infrastructure Relay

Interference Channel aided by an Infrastructure Relay Interference Channel aided by an Infrastructure Relay Onur Sahin, Osvaldo Simeone, and Elza Erkip *Department of Electrical and Computer Engineering, Polytechnic Institute of New York University, Department

More information

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check

More information

Arithmetic and Metric Properties of p-adic Alternating Engel Series Expansions

Arithmetic and Metric Properties of p-adic Alternating Engel Series Expansions International Journal of Algebra, Vol 2, 2008, no 8, 383-393 Arithmetic and Metric Proerties of -Adic Alternating Engel Series Exansions Yue-Hua Liu and Lu-Ming Shen Science College of Hunan Agriculture

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Twelfth Problem Assignment

Twelfth Problem Assignment EECS 401 Not Graded PROBLEM 1 Let X 1, X 2,... be a sequence of independent random variables that are uniformly distributed between 0 and 1. Consider a sequence defined by (a) Y n = max(x 1, X 2,..., X

More information

On the minimax inequality and its application to existence of three solutions for elliptic equations with Dirichlet boundary condition

On the minimax inequality and its application to existence of three solutions for elliptic equations with Dirichlet boundary condition ISSN 1 746-7233 England UK World Journal of Modelling and Simulation Vol. 3 (2007) No. 2. 83-89 On the minimax inequality and its alication to existence of three solutions for ellitic equations with Dirichlet

More information

Network coding for multicast relation to compression and generalization of Slepian-Wolf

Network coding for multicast relation to compression and generalization of Slepian-Wolf Network coding for multicast relation to compression and generalization of Slepian-Wolf 1 Overview Review of Slepian-Wolf Distributed network compression Error exponents Source-channel separation issues

More information

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Achaleshwar Sahai Department of ECE, Rice University, Houston, TX 775. as27@rice.edu Vaneet Aggarwal Department of

More information

Variable Length Codes for Degraded Broadcast Channels

Variable Length Codes for Degraded Broadcast Channels Variable Length Codes for Degraded Broadcast Channels Stéphane Musy School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland Email: stephane.musy@ep.ch Abstract This paper investigates

More information

δq T = nr ln(v B/V A )

δq T = nr ln(v B/V A ) hysical Chemistry 007 Homework assignment, solutions roblem 1: An ideal gas undergoes the following reversible, cyclic rocess It first exands isothermally from state A to state B It is then comressed adiabatically

More information

Lane-Emden problems: symmetries of low energy solutions

Lane-Emden problems: symmetries of low energy solutions Lane-Emden roblems: symmetries of low energy solutions Ch. Grumiau Institut de Mathématique Université de Mons Mons, Belgium June 2012 Flagstaff, Arizona (USA) Joint work with M. Grossi and F. Pacella

More information

On Two-user Fading Gaussian Broadcast Channels. with Perfect Channel State Information at the Receivers. Daniela Tuninetti

On Two-user Fading Gaussian Broadcast Channels. with Perfect Channel State Information at the Receivers. Daniela Tuninetti DIMACS Workshop on Network Information Theory - March 2003 Daniela Tuninetti 1 On Two-user Fading Gaussian Broadcast Channels with Perfect Channel State Information at the Receivers Daniela Tuninetti Mobile

More information

p-adic Measures and Bernoulli Numbers

p-adic Measures and Bernoulli Numbers -Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,

More information

Implementation and Validation of Finite Volume C++ Codes for Plane Stress Analysis

Implementation and Validation of Finite Volume C++ Codes for Plane Stress Analysis CST0 191 October, 011, Krabi Imlementation and Validation of Finite Volume C++ Codes for Plane Stress Analysis Chakrit Suvanjumrat and Ekachai Chaichanasiri* Deartment of Mechanical Engineering, Faculty

More information

UCSD ECE 255C Handout #14 Prof. Young-Han Kim Thursday, March 9, Solutions to Homework Set #5

UCSD ECE 255C Handout #14 Prof. Young-Han Kim Thursday, March 9, Solutions to Homework Set #5 UCSD ECE 255C Handout #14 Prof. Young-Han Kim Thursday, March 9, 2017 Solutions to Homework Set #5 3.18 Bounds on the quadratic rate distortion function. Recall that R(D) = inf F(ˆx x):e(x ˆX)2 DI(X; ˆX).

More information

Deformation Effect Simulation and Optimization for Double Front Axle Steering Mechanism

Deformation Effect Simulation and Optimization for Double Front Axle Steering Mechanism 0 4th International Conference on Comuter Modeling and Simulation (ICCMS 0) IPCSIT vol. (0) (0) IACSIT Press, Singaore Deformation Effect Simulation and Otimization for Double Front Axle Steering Mechanism

More information

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:

More information

Electrical and Information Technology. Information Theory. Problems and Solutions. Contents. Problems... 1 Solutions...7

Electrical and Information Technology. Information Theory. Problems and Solutions. Contents. Problems... 1 Solutions...7 Electrical and Information Technology Information Theory Problems and Solutions Contents Problems.......... Solutions...........7 Problems 3. In Problem?? the binomial coefficent was estimated with Stirling

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

ON SETS OF INTEGERS WHICH CONTAIN NO THREE TERMS IN GEOMETRIC PROGRESSION

ON SETS OF INTEGERS WHICH CONTAIN NO THREE TERMS IN GEOMETRIC PROGRESSION ON SETS OF INTEGERS WHICH CONTAIN NO THREE TERMS IN GEOMETRIC PROGRESSION NATHAN MCNEW Abstract The roblem of looing for subsets of the natural numbers which contain no 3-term arithmetic rogressions has

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information