Overview of Gaussian MIMO (Vector) BC

Size: px
Start display at page:

Download "Overview of Gaussian MIMO (Vector) BC"

Transcription

1 Overview of Gaussia MIMO (Vector) BC Gwamo Ku Adaptive Sigal Processig ad Iformatio Theory Research Group Nov. 30, 2012

2 Outlie / Capacity Regio of Gaussia MIMO BC System Structure Kow Capacity Regios - Aliged ad Icosistetly Degraded MIMO BC Superpositio - Aliged MIMO BC without Commo Message Writig o Dirty Paper - Degraded Message Sets (A Commo & Oe Private Message) Duality of Gaussia MIMO BC & MAC Gaussia MIMO MAC Gaussia MIMO BC & MAC

3 Gaussia MIMO (Vector) BC 3/11 System Structure M 0, M 1, M 2 M 0 : A Commo Message M 1 : A Private Message to Rx. 1 M 2 : A Private Message to Rx. 2 Z 1 t : # Tx. At. G 1 X dim G Ecoder 1 dim G dim x 2 1 = t 1 G 2 Z 2 dim z 1 = r 1 Y 1 = r t = r t Y 2 Decoder 1 r : # Rx. At. dim y 1 = r 1 dim y 2 = r 1 r : # Rx. At. Decoder 2 dim z 2 = r 1 M 01, M 1 M 02, M 2 1 i=1 Power Costrait x T m 0, m 1, m 2, i x(m 0, m 1, m 2, i ) P m 0, m 1, m 2 1: 2 R 0 1: 2 R 1 [1: 2 R 2] chael Y 1 = G 1 X + Z 1 Y 2 = G 2 X + Z 2 Z 1 N(0, I r ) Z 2 N(0, I r )

4 Capacity Regio of Gaussia MIMO BC 3/11 Special Cases Kow Capacity Regio Aliged ad Icosistetly Degraded MIMO BC t = r, diagoal G 1, G 2 (G T 1 G 1 ad G T 2 G 2 have the same set of Eigevalue) : A Product of Gaussia BC Superpositio Codig Aliged MIMO BC (M 0 = 0) Oly Private Messages without a Commo Message Vector Writig o Dirty Paper Degraded a Private Message ad a Commo Message Either M 0 = 0 or M 0 = 0 Degraded Message Set Superpositio Codig

5 Case 1 : Gaussia Product BC Parallel Gaussia BCs Y 1k = X k + Z 1k Y 2k = X k + Z 2k k [1: r] Z jk N(0, N jk ) j = 1,2 M. I. Not Degraded, but Icosistetly Degraded BC Z 1 l N(0, N 1 ) Z 2 l N(0, N 2 N 1 ) X 1 l + Y 1 l + Y 2 l N 1k N 2k k [1: l] r Z 2,l+1 N(0, N 2 ) r Z 1,l+1 N(0, N 1 N 2 ) r X l+1 + r Y 2,l+1 + r Y 1,l+1 N 2k > N 1k k [l + 1: r]

6 Case 1 : Gaussia Product BC Capacity Regio R 0 + R 1 C β kp l k=1 N 1k r + C( k=l+1 α k β k P 1 α k β k P + N 1k ) R 0 + R 2 l k=1 C α k β k P 1 α k β k P + N 2k r + C β kp k=l+1 N 2k R 0 + R 1 + R 2 C β kp R 0 + R 1 + R 2 l k=1 l k=1 [C N 1k r + [C k=l+1 α k β k P + C β kp ] 1 α k β k P + N 2k N 1k α k β k P + C( 1 α k β k P )] 1 α k β k P + N 1k N 2k r + C( β kp ) N 2k k=l+1 For some α k, β k [0,1], k [1: r], with r k=1 β k = 1

7 Case 1 : Gaussia Product BC Rate Regio R 0 + R 1 I X 1 ; Y 11 + I(U 2 ; Y 12 ) R 0 + R 2 I X 2 ; Y 22 + I(U 1 ; Y 21 ) R 0 + R 1 + R 2 I X 1 ; Y 11 + I U 2 ; Y 12 + I X 2 ; Y 22 U 2 ) R 0 + R 1 + R 2 I X 2 ; Y 22 + I U 1 ; Y 21 + I X 1 ; Y 11 U 1 ) For some pmf p u 1, x 1 p( u 2, x 2 ) Achievability & Coverse Proof Superpositio Codig (Degraded Gaussia BC)

8 Case 1 : Gaussia Product BC Achievability Proof (X 1, p y 11 x 1 p y 21 y 11, Y 11 Y 21 ) X 1 p(y 11 x 1 ) Y 11 p(y 21 y 11 ) Y 21 X 2 p(y 22 x 2 ) Y 22 p(y 12 y 22 ) Y 12 (X 2, p y 22 x 2 p y 12 y 22, Y 12 Y 22 ) Rate Splittig Divide M j, j = 1,2 ito two idep. Messages : M j0 at rate R j0, M jj at rate R jj

9 Case 1 : Gaussia Product BC Codebook Geeratio Fix a pmf p u 1, x 1 p(u 2, x 2 ). Radomly ad idep. Geerate 2 (R 0+R 10 +R 20 ) sequece pairs u 1, u 2 m 0, m 10, m 20 accordig to i=1 p U1 u 1i p U2 (u 2i ) m 0, m 10, m 20 1: 2 R 0 1: 2 R 10 [1: 2 R 20] For m 0, m 10, m 20, radomly ad coditioally idep. Geerate 2 R jj sequeces Ecodig x j (m 0, m 10, m 20, m jj ) accordig to i=1 p Xj U j (x ji u ji (m 0, m 10, m 20 ) m jj [1: 2 R jj], j = 1,2 To sed the message triple m 0, m 1, m 2 = (m 0, m 10, m 11, m 20, m 22 ) Trasmit (x 1 m 0, m 10, m 20, m 11, x 2 m 0, m 10, m 20, m 22 )

10 Case 1 : Gaussia Product BC Decodig ad aalysis of the probability of error Decoder 1 : fid uique triple (m 01, m 10, m 11 ) such that ((u 1, u 2 )(m 01, m 10, m 11 ),x 1 m 01, m 10, m 20, m 11 ), y 1, y 2 T ε () For some m 10. Probability error for decoder 1 R 0 + R 1 + R 20 < I U 1, U 2, X 1 ; Y 11, Y 12 δ(ε) = I X 1 ; Y 11 + I U 2 ; Y 12 δ(ε) R 11 < I X 1 ; Y 11 U 1 Probability error for decoder 2 δ(ε) R 0 + R 10 + R 2 < I(X 2 ; Y 22 ) + I(U 1 ; Y 21 ) δ(ε) R 22 < I X 2 ; Y 22 U 2 δ(ε)

11 Case 2 : Private Messages Capacity Regio C = R WDP = co(r 1 R 2 ) R 1 : DPC with No-causal State X 2 R 1 < 1 2 log G 1K 1 G 1 T + I r R 2 < 1 2 log G 2K 2 G T 2 + G 2 K 1 G T 2 + I r G 2 K 1 G T 2 + I r R 2 : DPC with No-causal State X 1 R 1 < 1 2 log G 1K 1 G 1 T + G 1 K 2 G 1 T + I r G 1 K 2 G 1 T + I r R 2 < 1 2 log G 2K 2 G 2 T + I r

12 Vector Writig o Dirty Paper (1) Vector Writig o Dirty Paper S S N(0, K S ) Secod oise chael (AWGN) Z N(0, I r ) M Y W Ecoder Decoder Average power costrait P X C = Y = GX + S + Z max tr K X P 1 2 log G K XG T + I r

13 Vector Writig o Dirty Paper (2) Proof of Capacity C = 1 max tr K X P 2 log G K XG T + I r C = sup [ I U; Y I U; S ] p u s,x u s :E X T X P Let U = X + AS, where X N(0, K X ) is idepedet of S A = K X G T G K X G T + I r 1 I U; Y I U; S = h U S h(u Y) = h X + AS S h(x + AS Y) = h(x) h(x GX + Z) = I(X; GX + Z) = 1 2 log I r + G K X G T h X + AS Y = h(x + AS AY Y) = h(x + A(S Y) Y) = h(x + A(GX + Z) Y) = h(x + A(GX + Z)) = h(x + A(GX + Z) GX + Z) = h(x GX + Z)

14 Vector Writig o Dirty Paper (3) 3/11 R 1 M 1 M 1 - Ecoder X 1 M 2 M 2 -Ecoder X 2 X R 1 < I X 1 ; G 1 X 1 + Z 1 = 1 2 log G 1K 1 G 1 T + I r G 1 G 2 Z 1 Z 2 Y 1 Y 1 = G 1 X 1 + G 1 X 2 + Z 1 Y 2 = G 2 X 2 + G 2 X 1 + Z 2 Y 2 R 2 < I X 2 ; G 2 X 1 + G 2 X 2 + Z 2 = 1 2 log G 2K 1 G 2 T + G 2 K 2 G 2 T + I r G 2 K 1 G 2 T + I r

15 Vector Writig o Dirty Paper 3/11 R 2 M 1 M 2 M 1 -Ecoder M 2 - Ecoder X 1 X 2 X G 1 G 2 Z 1 Z 2 Y 1 Y 1 = G 1 X 1 + G 1 X 2 + Z 1 Y 2 = G 2 X 2 + G 2 X 1 + Z 2 Y 2 R 1 < I X 1 ; G 1 X 1 + G 1 X 2 + Z 1 = 1 2 log G 1K 1 G 1 T + G 1 K 2 G 1 T + I r G 1 K 2 G 1 T + I r R 2 < I X 2 ; G 2 X 2 + Z 2 = 1 2 log G 2K 2 G 2 T + I r

16 Capacity Regio of Gaussia MIMO BC

17 BC-MAC Duality Z 1 N(0, I r ) X G 1 Y 1 X 1 G 1 T Z N(0, I t ) Y G 2 G 2 T Y 2 X 2 Z 2 N(0, I r ) C DP BC P; G 1, G 2 = C MAC (P 1, P 2 ; G T 1, G T 2 ) 2 i=1 tr P i P

18 MIMO Multiple Access Chael 3/11 System Structure M 1 Ecoder 1 X 1 G 1 Z N(0, I r ) Y Decoder M 2 Ecoder 2 X 2 G 2 1 i=1 Power Costrait x T j m j, i x j (m j, i ) P m j 1: 2 R j, j = 1,2 chael Y = G 1 X 1 + G 2 X 2 + Z Z N(0, I r )

19 MIMO MAC Capacity Regio R log G 1K 1 G 1 T + I r R log G 2K 2 G 2 T + I r R 1 + R log G 1K 1 G 1 T + G 2 K 2 G 2 T + I r Boudary Poit R R 1 = 1 2 log G 1K 1 G 1 T + I r R 2 = 1 2 log G 1K 1 G 1 T + G 2 K 2 G 2 T + I r 1 2 log G 1K 1 G 1 T + I r = 1 2 log G 1K 1 G 1 T + G 2 K 2 G 2 T + I r G 1 K 1 G 1 T + I r

20 Achievability Proof : DPC Capacity Regio / Usig Dual MAC R WDP = C DMAC = R(K 1, K 2 ) K 1,K 2 0:tr K 1 +tr K 2 P R 1, R 2 of C DMAC lies o the boudary of (K 1, K 2 ) max [αr 1 + αr 2 ] α 0,1, R 1,R 2 C DMAC max α 0,1,tr K 1 +tr K 2 P,K 1,K 2 0} [α 2 log G 1K 1 G 1 T + G 2 K 2 G 2 T + I r + α α 2 log G 2 K 2 G 2 T + I r ] Itroducig Dual Variables tr K 1 + tr K 2 P K 1, K 2 0 λ 0 γ 1, γ 2 0

21 Achievability Proof : DPC Capacity Regio L K 1, K 2, γ 1, γ 2, λ = α 2 log G 1K 1 G 1 T + G 2 K 2 G 2 T + I r + α α 2 log G 2 K 2 G 2 T + I r +tr γ 1 K 1 + tr γ 2 K 2 λ[tr K 1 + tr K 2 P) Applyig KKT λ G 1 S 1 G 1 T + γ 1 λ I r = 0 λ G 2 S 2 G 2 T + γ 2 λ I r = 0 λ tr K 1 + tr K 2 P = 0 tr γ 1 K 1 = tr(γ 2 K 2 ) = 0 S 1 = α 2λ G 1 T K 1 G 1 + G T 2 K 2 G 2 + I 1 r S 2 = α 2λ G 1 T K 1 G 1 + G T 2 K 2 G 2 + I 1 α α r + 2λ G T 2 K 2 G 2 + I 1 r K 1 = α 2λ G 2 T K 2 G 2 + I 1 r S 1 K 2 = α 2λ I r K 1 S 2

A Partial Decode-Forward Scheme For A Network with N relays

A Partial Decode-Forward Scheme For A Network with N relays A Partial Decode-Forward Scheme For A etwork with relays Yao Tag ECE Departmet, McGill Uiversity Motreal, QC, Caada Email: yaotag2@mailmcgillca Mai Vu ECE Departmet, Tufts Uiversity Medford, MA, USA Email:

More information

SUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL

SUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL Joural of Theoretical ad Applied Iformatio Techology 31 st December 212 Vol 46 No2 25-212 JATIT & LLS All rights reserved ISSN: 1992-8645 wwwatitorg E-ISSN: 1817-3195 SCCESSIVE INTERFERENCE CANCELLATION

More information

Information Theory and Coding

Information Theory and Coding Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power

More information

Cooperative Communication Fundamentals & Coding Techniques

Cooperative Communication Fundamentals & Coding Techniques 3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial

More information

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first

More information

Entropies & Information Theory

Entropies & Information Theory Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory

More information

The Capacity Region of the Degraded Finite-State Broadcast Channel

The Capacity Region of the Degraded Finite-State Broadcast Channel The Capacity Regio of the Degraded Fiite-State Broadcast Chael Ro Dabora ad Adrea Goldsmith Dept. of Electrical Egieerig, Staford Uiversity, Staford, CA Abstract We cosider the discrete, time-varyig broadcast

More information

A New Achievability Scheme for the Relay Channel

A New Achievability Scheme for the Relay Channel A New Achievability Scheme for the Relay Chael Wei Kag Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 20742 wkag@umd.edu ulukus@umd.edu October 4, 2007

More information

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220 ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

Channel coding, linear block codes, Hamming and cyclic codes Lecture - 8

Channel coding, linear block codes, Hamming and cyclic codes Lecture - 8 Digital Commuicatio Chael codig, liear block codes, Hammig ad cyclic codes Lecture - 8 Ir. Muhamad Asial, MSc., PhD Ceter for Iformatio ad Commuicatio Egieerig Research (CICER) Electrical Egieerig Departmet

More information

Covert Communication with Noncausal Channel-State Information at the Transmitter

Covert Communication with Noncausal Channel-State Information at the Transmitter Covert Commuicatio with Nocausal Chael-State Iformatio at the Trasmitter Si-Hyeo Lee, Ligog Wag, Ashish Khisti, ad Gregory W. Worell POSTECH, Pohag, South Korea (e-mail:sihyeo@postech.ac.kr ETIS Uiversité

More information

Asymptotic Coupling and Its Applications in Information Theory

Asymptotic Coupling and Its Applications in Information Theory Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM

More information

Capacity Theorems for the Finite-State Broadcast Channel with Feedback

Capacity Theorems for the Finite-State Broadcast Channel with Feedback Capacity Theorems for the Fiite-State Broadcast Chael with Feedback Ro abora ad Adrea Goldsmith ept of Electrical Egieerig, Staford Uiversity Abstract We cosider the discrete, time-varyig broadcast chael

More information

Hybrid Coding for Gaussian Broadcast Channels with Gaussian Sources

Hybrid Coding for Gaussian Broadcast Channels with Gaussian Sources Hybrid Codig for Gaussia Broadcast Chaels with Gaussia Sources Rajiv Soudararaja Departmet of Electrical & Computer Egieerig Uiversity of Texas at Austi Austi, TX 7871, USA Email: rajivs@mailutexasedu

More information

IET Commun., 2009, Vol. 3, Iss. 1, pp doi: /iet-com: & The Institution of Engineering and Technology 2009

IET Commun., 2009, Vol. 3, Iss. 1, pp doi: /iet-com: & The Institution of Engineering and Technology 2009 Published i IET Commuicatios Received o 4th Jue 28 Revised o 3th July 28 doi: 1.149/iet-com:28373 ISSN 1751-8628 Symmetric relayig based o partial decodig ad the capacity of a class of relay etworks L.

More information

Distortion Bounds for Source Broadcast. Problem

Distortion Bounds for Source Broadcast. Problem Distortio Bouds for Source Broadcast 1 Problem Lei Yu, Houqiag Li, Seior Member, IEEE, ad Weipig Li, Fellow, IEEE Abstract This paper ivestigates the joit source-chael codig problem of sedig a memoryless

More information

The Capacity Region of the. Degraded Finite-State Broadcast Channel

The Capacity Region of the. Degraded Finite-State Broadcast Channel Submitted to the IEEE Trasactios o Iformatio Theory, 2008. The Capacity Regio of the Degraded Fiite-State Broadcast Chael Ro Dabora ad Adrea Goldsmith Wireless Systems Lab Departmet of Electrical Egieerig

More information

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for

More information

Symmetric Two-User Gaussian Interference Channel with Common Messages

Symmetric Two-User Gaussian Interference Channel with Common Messages Symmetric Two-User Gaussia Iterferece Chael with Commo Messages Qua Geg CSL ad Dept. of ECE UIUC, IL 680 Email: geg5@illiois.edu Tie Liu Dept. of Electrical ad Computer Egieerig Texas A&M Uiversity, TX

More information

Lecture 6: Source coding, Typicality, and Noisy channels and capacity

Lecture 6: Source coding, Typicality, and Noisy channels and capacity 15-859: Iformatio Theory ad Applicatios i TCS CMU: Sprig 2013 Lecture 6: Source codig, Typicality, ad Noisy chaels ad capacity Jauary 31, 2013 Lecturer: Mahdi Cheraghchi Scribe: Togbo Huag 1 Recap Uiversal

More information

Daniela Tuninetti University of Illinois, Chicago, IL (USA),

Daniela Tuninetti University of Illinois, Chicago, IL (USA), 1 The IterFerece Chael with Geeralized Feedback IFC-GF) Daiela Tuietti Uiversity of Illiois, Chicago, IL USA), daiela@ece.uic.edu Abstract This work itroduces cooperative commuicatio strategies for IterFerece

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication

THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication Trade-off betwee Commuicatio ad Cooperatio i the Iterferece Chael Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umich.edu S. Sadeep Pradha EECS Departmet Uiversity of Michiga

More information

Consider the n-dimensional additive white Gaussian noise (AWGN) channel

Consider the n-dimensional additive white Gaussian noise (AWGN) channel 8. Lattice codes (by O. Ordetlich) Cosider the -dimesioal additive white Gaussia oise (AWGN) chael Y = X + Z where Z N (0, I ) is statistically idepedet of the iput X. Our goal is to commuicate reliably

More information

Linear Sum Capacity for Gaussian Multiple Access Channel with Feedback

Linear Sum Capacity for Gaussian Multiple Access Channel with Feedback Liear Sum Capacity for Gaussia Multiple Access Chael with Feedback Ehsa Ardestaizadeh, Michèle A Wigger, Youg-Ha Kim, Tara Javidi ISIT 00, Austi, Texas, USA, Jue 3-8, 00 Abstract This paper studies the

More information

Finite Block-Length Gains in Distributed Source Coding

Finite Block-Length Gains in Distributed Source Coding Decoder Fiite Block-Legth Gais i Distributed Source Codig Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umichedu S Sadeep Pradha EECS Departmet Uiversity of Michiga A Arbor,USA

More information

Multiterminal Source Coding with an Entropy-Based Distortion Measure

Multiterminal Source Coding with an Entropy-Based Distortion Measure 20 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Multitermial Source Codig with a Etropy-Based Distortio Measure Thomas A. Courtade ad Richard D. Wesel Departmet of Electrical Egieerig Uiversity

More information

On the Dispersions of the Gel fand-pinsker Channel and Dirty Paper Coding

On the Dispersions of the Gel fand-pinsker Channel and Dirty Paper Coding O the Dispersios of the Gel fad-isker Chael ad Dirty aper Codig Joatha Scarlett Abstract This paper studies secod-order codig rates for memoryless chaels with a state sequece kow o-causally at the ecoder.

More information

Multiterminal source coding with complementary delivery

Multiterminal source coding with complementary delivery Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2006 Seoul, Korea, October 29 November 1, 2006 Multitermial source codig with complemetary delivery Akisato Kimura ad Tomohiko Uyematsu

More information

Posterior Matching Scheme for Gaussian Multiple Access Channel with Feedback

Posterior Matching Scheme for Gaussian Multiple Access Channel with Feedback 1 Posterior Matchig Scheme for Gaussia Multiple Access Chael with Feedback La V. Truog, Member, IEEE, Iformatio Techology Specializatio Departmet ITS, FPT Uiversity, Haoi, Vietam E-mail: latv@fpt.edu.v

More information

Inseparability of the Multiple Access Wiretap Channel

Inseparability of the Multiple Access Wiretap Channel Iseparability of the Multiple Access Wiretap Chael Jiawei Xie Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 074 xiejw@umd.edu ulukus@umd.edu Abstract We

More information

Lecture 14: Graph Entropy

Lecture 14: Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number

More information

Multiple-Access Channels with Distributed Channel State Information

Multiple-Access Channels with Distributed Channel State Information ISIT2007, Nice, Frace, Jue 24 - Jue 29, 2007 Multiple-ccess Chaels with Distributed Chael State Iformatio Cha-Soo Hwag Electrical Egieerig Staford Uiversity Email: cshwag @ staford.edu Moshe Malki Electrical

More information

bounds and in which F (n k) n q s.t. HG T = 0.

bounds and in which F (n k) n q s.t. HG T = 0. 6. Liear codes. Chael capacity Recall that last time we showed the followig achievability bouds: Shao s: P e P [i(x; Y ) log M + τ] + exp{ τ} M DT: P e E [ exp { (i( X; Y ) log ) + }] Feistei s: P e,max

More information

The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints

The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints IIT 6, eattle, UA, July 9-4, 6 The Gaussia Multiple Access Wire-Tap Chael with Collective ecrecy Costraits Eder Tei tei@psu.edu Ayli Yeer yeer@ee.psu.edu Wireless Commuicatios ad Networig Laboratory Electrical

More information

On the Dispersions of the Discrete Memoryless Interference Channel

On the Dispersions of the Discrete Memoryless Interference Channel O the Dispersios of the Discrete Memoryless Iterferece Chael Sy-Quoc Le, Vicet Y. F. Ta,2, ad Mehul Motai Departmet of ECE, Natioal Uiversity of Sigapore, Sigapore 2 Istitute for Ifocomm Research (I 2

More information

Lecture 11: Channel Coding Theorem: Converse Part

Lecture 11: Channel Coding Theorem: Converse Part EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig

More information

17.1 Channel coding with input constraints

17.1 Channel coding with input constraints 7. Chaels with iput costraits. Gaussia chaels. 7. Chael codig with iput costraits Motivatios: Let us look at the additive Gaussia oise. The the Shao capacity is ifiite, sice sup P I(X; X + Z) = achieved

More information

Relay Channel With Private Messages

Relay Channel With Private Messages IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3777 Relay Chael With Private Messages Ramy Taious, Studet Member, IEEE, ad Aria Nosratiia, Seior Member, IEEE Abstract The relay

More information

arxiv: v1 [cs.it] 13 Jul 2012

arxiv: v1 [cs.it] 13 Jul 2012 O the Sum Capacity of the Discrete Memoryless Iterferece Chael with Oe-Sided Weak Iterferece ad Mixed Iterferece Fagfag Zhu ad Biao Che Syracuse Uiversity Departmet of EECS Syracuse, NY 3244 Email: fazhu{biche}@syr.edu

More information

On the Capacity of Symmetric Gaussian Interference Channels with Feedback

On the Capacity of Symmetric Gaussian Interference Channels with Feedback O the Capacity of Symmetric Gaussia Iterferece Chaels with Feedback La V Truog Iformatio Techology Specializatio Departmet ITS FPT Uiversity, Haoi, Vietam E-mail: latv@fpteduv Hirosuke Yamamoto Dept of

More information

Capacity of Compound State-Dependent Channels with States Known at the Transmitter

Capacity of Compound State-Dependent Channels with States Known at the Transmitter Capacity of Compoud State-Depedet Chaels with States Kow at the Trasmitter Pablo Piataida Departmet of Telecommuicatios SUPELEC Plateau de Moulo, 992 Gif-sur-Yvette, Frace Email: pablo.piataida@supelec.fr

More information

Linear Algebra Issues in Wireless Communications

Linear Algebra Issues in Wireless Communications Rome-Moscow school of Matrix Methods ad Applied Liear Algebra August 0 September 18, 016 Liear Algebra Issues i Wireless Commuicatios Russia Research Ceter [vladimir.lyashev@huawei.com] About me ead of

More information

A meta-converse for private communication over quantum channels

A meta-converse for private communication over quantum channels A meta-coverse for private commuicatio over quatum chaels Mario Berta with Mark M. Wilde ad Marco Tomamichel IEEE Trasactios o Iformatio Theory, 63(3), 1792 1817 (2017) Beyod IID Sigapore - July 17, 2017

More information

Binary Fading Interference Channel with No CSIT

Binary Fading Interference Channel with No CSIT Biary Fadig Iterferece Chael with No CSIT Alireza Vahid, Mohammad Ali Maddah-Ali, A. Salma Avestimehr, ad Ya Zhu arxiv:405.003v3 [cs.it] 4 Mar 07 Abstract We study the capacity regio of the two-user Biary

More information

The Likelihood Encoder with Applications to Lossy Compression and Secrecy

The Likelihood Encoder with Applications to Lossy Compression and Secrecy The Likelihood Ecoder with Applicatios to Lossy Compressio ad Secrecy Eva C. Sog Paul Cuff H. Vicet Poor Dept. of Electrical Eg., Priceto Uiversity, NJ 8544 {csog, cuff, poor}@priceto.edu Abstract A likelihood

More information

A Non-Asymptotic Achievable Rate for the AWGN Energy-Harvesting Channel using Save-and-Transmit

A Non-Asymptotic Achievable Rate for the AWGN Energy-Harvesting Channel using Save-and-Transmit 016 IEEE Iteratioal Symposium o Iformatio Theory A No-Asymptotic Achievable Rate for the AWGN Eergy-Harvestig Chael usig Save-ad-Trasmit Silas L. Fog, Vicet Y. F. Ta, ad Jig Yag Departmet of Electrical

More information

Mathematics 116 HWK 21 Solutions 8.2 p580

Mathematics 116 HWK 21 Solutions 8.2 p580 Mathematics 6 HWK Solutios 8. p580 A abbreviatio: iff is a abbreviatio for if ad oly if. Geometric Series: Several of these problems use what we worked out i class cocerig the geometric series, which I

More information

On the Finite Blocklength Performance of Lossy Multi-Connectivity

On the Finite Blocklength Performance of Lossy Multi-Connectivity O the Fiite Blocklegth Performace of Lossy Multi-Coectivity Li Zhou Departmet of ECE, Natioal Uiversity of Sigapore, Email: lzhou@u.us.edu Albrecht Wolf Vodafoe Chair Mobile Commuicatio Systems, Techical

More information

On Successive Refinement for the Wyner-Ziv Problem with Partially Cooperating Decoders

On Successive Refinement for the Wyner-Ziv Problem with Partially Cooperating Decoders ISIT 2008, Toroto, Caada, July 6-11, 2008 O Successive Refiemet for the Wyer-Ziv Problem with Partially Cooperatig Decoders Shraga I. Bross ad Tsachy Weissma, School of Egieerig, Bar-Ila Uiversity, Ramat-Ga

More information

Lecture 7: MIMO Architectures Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH

Lecture 7: MIMO Architectures Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH : Theoretical Foudatios of Wireless Commuicatios 1 Thursday, May 19, 2016 12:30-15:30, Coferece Room SIP 1 Textbook: D. Tse ad P. Viswaath, Fudametals of Wireless Commuicatio 1 / 1 Overview Lecture 6:

More information

Lossy Compression with Near-uniform Encoder Outputs

Lossy Compression with Near-uniform Encoder Outputs 016 IEEE Iteratioal Symposium o Iformatio Theory Lossy Compressio with Near-uiform Ecoder Outputs Badri N. Vellambi, Jörg Kliewer New Jersey Istitute of Techology, Newar, NJ 0710 Email: badri..vellambi@ieee.org,

More information

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L. Fog, Jig Yag, ad Ayli Yeer arxiv:805.089v [cs.it] 30 May 08 Abstract A additive white Gaussia

More information

Probability and Information Theory for Language Modeling. Statistical Linguistics. Statistical Linguistics: Adult Monolingual Speaker

Probability and Information Theory for Language Modeling. Statistical Linguistics. Statistical Linguistics: Adult Monolingual Speaker Probability ad Iformatio Theory for Laguage Modelig Statistical vs. Symbolic NLP Elemetary Probability Theory Laguage Modelig Iformatio Theory Statistical Liguistics Statistical approaches are clearly

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 3, MARCH

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 3, MARCH IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 3, MARCH 08 48 Lattice Codes Achieve the Capacity of Commo Message Gaussia Broadcast Chaels With Coded Side Iformatio Lakshmi Nataraja, Yi Hog, Seior

More information

Applications in Linear Algebra and Uses of Technology

Applications in Linear Algebra and Uses of Technology 1 TI-89: Let A 1 4 5 6 7 8 10 Applicatios i Liear Algebra ad Uses of Techology,adB 4 1 1 4 type i: [1,,;4,5,6;7,8,10] press: STO type i: A type i: [4,-1;-1,4] press: STO (1) Row Echelo Form: MATH/matrix

More information

Solutions to HW Assignment 1

Solutions to HW Assignment 1 Solutios to HW: 1 Course: Theory of Probability II Page: 1 of 6 Uiversity of Texas at Austi Solutios to HW Assigmet 1 Problem 1.1. Let Ω, F, {F } 0, P) be a filtered probability space ad T a stoppig time.

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170 UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was

More information

On Routing-Optimal Network for Multiple Unicasts

On Routing-Optimal Network for Multiple Unicasts O Routig-Optimal Network for Multiple Uicasts Chu Meg, Athia Markopoulou Abstract I this paper, we cosider etworks with multiple uicast sessios. Geerally, o-liear etwork codig is eeded to achieve the whole

More information

A Study of Capacity and Spectral Efficiency of Fiber Channels

A Study of Capacity and Spectral Efficiency of Fiber Channels A Study of Capacity ad Spectral Efficiecy of Fiber Chaels Gerhard Kramer (TUM) based o joit work with Masoor Yousefi (TUM) ad Frak Kschischag (Uiv. Toroto) MIO Workshop Muich, Germay December 8, 2015 Istitute

More information

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation?

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation? Are Slepia-Wolf Rates Necessary for Distributed Parameter Estimatio? Mostafa El Gamal ad Lifeg Lai Departmet of Electrical ad Computer Egieerig Worcester Polytechic Istitute {melgamal, llai}@wpi.edu arxiv:1508.02765v2

More information

Keyless Authentication and Authenticated Capacity

Keyless Authentication and Authenticated Capacity Keyless Autheticatio ad Autheticated Capacity Wewe Tu ad Lifeg Lai Abstract We cosider the problem of keyless message autheticatio over oisy chaels i the presece of a active adversary. Differet from the

More information

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled 1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how

More information

Second-Order Asymptotics for the Discrete Memoryless MAC with Degraded Message Sets

Second-Order Asymptotics for the Discrete Memoryless MAC with Degraded Message Sets Secod-Order Asymptotics for the Discrete Memoryless MAC with Degraded Message Sets Joatha Scarlett Laboratory for Iformatio ad Iferece Systems École Polytechique Fédérale de Lausae Email: jmscarlett@gmail.com

More information

Lossy Coding of Correlated Sources Over a Multiple Access Channel: Necessary Conditions and Separation Results

Lossy Coding of Correlated Sources Over a Multiple Access Channel: Necessary Conditions and Separation Results IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 9, SETEMBER 08 608 Lossy Codig of Correlated Sources Over a Multiple Access Chael: Necessary Coditios ad Separatio Results Başak Güler, Member, IEEE,

More information

Homework Set #3 - Solutions

Homework Set #3 - Solutions EE 15 - Applicatios of Covex Optimizatio i Sigal Processig ad Commuicatios Dr. Adre Tkaceko JPL Third Term 11-1 Homework Set #3 - Solutios 1. a) Note that x is closer to x tha to x l i the Euclidea orm

More information

Polynomials with Rational Roots that Differ by a Non-zero Constant. Generalities

Polynomials with Rational Roots that Differ by a Non-zero Constant. Generalities Polyomials with Ratioal Roots that Differ by a No-zero Costat Philip Gibbs The problem of fidig two polyomials P(x) ad Q(x) of a give degree i a sigle variable x that have all ratioal roots ad differ by

More information

Introduction to Optimization Techniques. How to Solve Equations

Introduction to Optimization Techniques. How to Solve Equations Itroductio to Optimizatio Techiques How to Solve Equatios Iterative Methods of Optimizatio Iterative methods of optimizatio Solutio of the oliear equatios resultig form a optimizatio problem is usually

More information

Sequential Decoding: Computational Complexity and the Cutoff Rate

Sequential Decoding: Computational Complexity and the Cutoff Rate Sequetial Decodig: Computatioal Complexity ad the Cutoff Rate Ley Grokop May 13, 2005 Abstract Sequetial decodig algorithms decode covolutioal codes by guessig their way through the expadig tree of possible

More information

Second-Order Rate of Constant-Composition Codes for the Gel fand-pinsker Channel

Second-Order Rate of Constant-Composition Codes for the Gel fand-pinsker Channel Research Collectio Coferece aper Secod-Order Rate of Costat-Compositio Codes for the Gel fad-isker Chael Author(s: Scarlett, Joatha ublicatio Date: 204 ermaet ik: https://doi.org/0.3929/ethz-a-0009456

More information

The z-transform. 7.1 Introduction. 7.2 The z-transform Derivation of the z-transform: x[n] = z n LTI system, h[n] z = re j

The z-transform. 7.1 Introduction. 7.2 The z-transform Derivation of the z-transform: x[n] = z n LTI system, h[n] z = re j The -Trasform 7. Itroductio Geeralie the complex siusoidal represetatio offered by DTFT to a represetatio of complex expoetial sigals. Obtai more geeral characteristics for discrete-time LTI systems. 7.

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE Geeral e Image Coder Structure Motio Video (s 1,s 2,t) or (s 1,s 2 ) Natural Image Samplig A form of data compressio; usually lossless, but ca be lossy Redudacy Removal Lossless compressio: predictive

More information

Lecture 19: Convergence

Lecture 19: Convergence Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may

More information

Inverse Matrix. A meaning that matrix B is an inverse of matrix A.

Inverse Matrix. A meaning that matrix B is an inverse of matrix A. Iverse Matrix Two square matrices A ad B of dimesios are called iverses to oe aother if the followig holds, AB BA I (11) The otio is dual but we ofte write 1 B A meaig that matrix B is a iverse of matrix

More information

Chapter 7: The z-transform. Chih-Wei Liu

Chapter 7: The z-transform. Chih-Wei Liu Chapter 7: The -Trasform Chih-Wei Liu Outlie Itroductio The -Trasform Properties of the Regio of Covergece Properties of the -Trasform Iversio of the -Trasform The Trasfer Fuctio Causality ad Stability

More information

Lecture 15: Strong, Conditional, & Joint Typicality

Lecture 15: Strong, Conditional, & Joint Typicality EE376A/STATS376A Iformatio Theory Lecture 15-02/27/2018 Lecture 15: Strog, Coditioal, & Joit Typicality Lecturer: Tsachy Weissma Scribe: Nimit Sohoi, William McCloskey, Halwest Mohammad I this lecture,

More information

Capacity of Steganographic Channels

Capacity of Steganographic Channels SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY Capacity of Stegaographic Chaels Jeremiah J. Harmse, Member, IEEE, William A. Pearlma, Fellow, IEEE, Abstract This work ivestigates a cetral problem

More information

Resilient Source Coding

Resilient Source Coding Resiliet Source Codig Maël Le Treust Laboratoire des Sigaux et Systèmes CNRS - Supélec - Uiv. Paris Sud 11 91191, Gif-sur-Yvette, Frace Email: mael.letreust@lss.supelec.fr Samso Lasaulce Laboratoire des

More information

Increasing timing capacity using packet coloring

Increasing timing capacity using packet coloring 003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:

More information

Daniel Lee Muhammad Naeem Chingyu Hsu

Daniel Lee Muhammad Naeem Chingyu Hsu omplexity Aalysis of Optimal Statioary all Admissio Policy ad Fixed Set Partitioig Policy for OVSF-DMA ellular Systems Daiel Lee Muhammad Naeem higyu Hsu Backgroud Presetatio Outlie System Model all Admissio

More information

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit 08 IEEE Iteratioal Symposium o Iformatio Theory ISIT No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L Fog Departmet of Electrical ad Computer Egieerig

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013 MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013 Fuctioal Law of Large Numbers. Costructio of the Wieer Measure Cotet. 1. Additioal techical results o weak covergece

More information

Lecture 4: Grassmannians, Finite and Affine Morphisms

Lecture 4: Grassmannians, Finite and Affine Morphisms 18.725 Algebraic Geometry I Lecture 4 Lecture 4: Grassmaias, Fiite ad Affie Morphisms Remarks o last time 1. Last time, we proved the Noether ormalizatio lemma: If A is a fiitely geerated k-algebra, the,

More information

Lecture 3. Digital Signal Processing. Chapter 3. z-transforms. Mikael Swartling Nedelko Grbic Bengt Mandersson. rev. 2016

Lecture 3. Digital Signal Processing. Chapter 3. z-transforms. Mikael Swartling Nedelko Grbic Bengt Mandersson. rev. 2016 Lecture 3 Digital Sigal Processig Chapter 3 z-trasforms Mikael Swartlig Nedelko Grbic Begt Madersso rev. 06 Departmet of Electrical ad Iformatio Techology Lud Uiversity z-trasforms We defie the z-trasform

More information

New Results in Coding and Communication Theory. Communication Systems Laboratory. Rick Wesel

New Results in Coding and Communication Theory. Communication Systems Laboratory.  Rick Wesel New Results i Codig ad Commuicatio Theory http://www.ee.ucla.edu/~csl/ Rick Wesel At the Aerospace Corporatio August, 008 Miguel Griot Bike ie Yua-Mao Chag Tom Courtade Jiadog Wag Recet Results A more

More information

Lecture 5. Power properties of EL and EL for vectors

Lecture 5. Power properties of EL and EL for vectors Stats 34 Empirical Likelihood Oct.8 Lecture 5. Power properties of EL ad EL for vectors Istructor: Art B. Owe, Staford Uiversity. Scribe: Jigshu Wag Power properties of empirical likelihood Power of the

More information

Additional Notes on Power Series

Additional Notes on Power Series Additioal Notes o Power Series Mauela Girotti MATH 37-0 Advaced Calculus of oe variable Cotets Quick recall 2 Abel s Theorem 2 3 Differetiatio ad Itegratio of Power series 4 Quick recall We recall here

More information

Multiaccess Communication in the Finite Blocklength Regime

Multiaccess Communication in the Finite Blocklength Regime Multiaccess Commuicatio i the Fiite Blocklegth Regime Ebrahim MolaviaJazi ad J. Nicholas Laema Departmet of Electrical Egierrig Uiversity of Notre Dame Notre Dame IN 46556 USA Email: {emolaviajl}@d.edu

More information

The Three-Terminal Interactive. Lossy Source Coding Problem

The Three-Terminal Interactive. Lossy Source Coding Problem The Three-Termial Iteractive 1 Lossy Source Codig Problem Leoardo Rey Vega, Pablo Piataida ad Alfred O. Hero III arxiv:1502.01359v3 cs.it] 18 Ja 2016 Abstract The three-ode multitermial lossy source codig

More information

A Rate-Distortion Based Secrecy System with Side Information at the Decoders

A Rate-Distortion Based Secrecy System with Side Information at the Decoders A Rate-Distortio Based Secrecy System with Side Iformatio at the Decoders Eva C. Sog Paul Cuff H. Vicet Poor Dept. of Electrical Eg., Priceto Uiversity, NJ 8544 {csog, cuff, poor}@priceto.edu arxiv:4.2v

More information

Information Hiding Problems: Hiding Capacity and Key Design

Information Hiding Problems: Hiding Capacity and Key Design Iformatio Hidig Problems: Hidig Capacity ad Key Desig Joseph. O Sulliva Electroic Systems ad Sigals Research Laboratory Departmet of Electrical Egieerig Washigto Uiversity i St. Louis Iformatio Hidig Problems

More information

Math 5311 Problem Set #5 Solutions

Math 5311 Problem Set #5 Solutions Math 5311 Problem Set #5 Solutios March 9, 009 Problem 1 O&S 11.1.3 Part (a) Solve with boudary coditios u = 1 0 x < L/ 1 L/ < x L u (0) = u (L) = 0. Let s refer to [0, L/) as regio 1 ad (L/, L] as regio.

More information

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur Module 5 EMBEDDED WAVELET CODING Versio ECE IIT, Kharagpur Lesso 4 SPIHT algorithm Versio ECE IIT, Kharagpur Istructioal Objectives At the ed of this lesso, the studets should be able to:. State the limitatios

More information

The method of types. PhD short course Information Theory and Statistics Siena, September, Mauro Barni University of Siena

The method of types. PhD short course Information Theory and Statistics Siena, September, Mauro Barni University of Siena PhD short course Iformatio Theory ad Statistics Siea, 15-19 September, 2014 The method of types Mauro Bari Uiversity of Siea Outlie of the course Part 1: Iformatio theory i a utshell Part 2: The method

More information

Incremental Relaying for the Gaussian Interference Channel with a Degraded Broadcasting Relay

Incremental Relaying for the Gaussian Interference Channel with a Degraded Broadcasting Relay TO APPEAR IN IEEE TRANSACTIONS ON INFORMATION THEORY Icremetal Relayig for the Gaussia Iterferece Chael with a Degraded Broadcastig Relay Lei Zhou, Studet Member, IEEE ad Wei Yu, Seior Member, IEEE arxiv:09.540v4

More information

Relaying via Hybrid Coding

Relaying via Hybrid Coding 011 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Relayig via Hybrid Codig Youg-Ha Kim Departmet of ECE UCSD La Jolla CA 9093 USA yhk@ucsd.edu Sug Hoo Lim Departmet of EE KAIST Daejeo Korea sughlim@kaist.ac.kr

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

A Rank Ratio Inequality and Its Applications

A Rank Ratio Inequality and Its Applications A Rak Ratio Iequality ad Its Applicatios Salma Avestimehr I collaboratio with Sia Lashgari (Corell) ad Chagho Suh (KAIST) Allerto Coferece October 2013 Motivatio If the chaels are -me- varyig ad the trasmi5ers

More information

Ellipsoid Method for Linear Programming made simple

Ellipsoid Method for Linear Programming made simple Ellipsoid Method for Liear Programmig made simple Sajeev Saxea Dept. of Computer Sciece ad Egieerig, Idia Istitute of Techology, Kapur, INDIA-08 06 December 3, 07 Abstract I this paper, ellipsoid method

More information