Overview of Gaussian MIMO (Vector) BC
|
|
- Domenic Lyons
- 5 years ago
- Views:
Transcription
1 Overview of Gaussia MIMO (Vector) BC Gwamo Ku Adaptive Sigal Processig ad Iformatio Theory Research Group Nov. 30, 2012
2 Outlie / Capacity Regio of Gaussia MIMO BC System Structure Kow Capacity Regios - Aliged ad Icosistetly Degraded MIMO BC Superpositio - Aliged MIMO BC without Commo Message Writig o Dirty Paper - Degraded Message Sets (A Commo & Oe Private Message) Duality of Gaussia MIMO BC & MAC Gaussia MIMO MAC Gaussia MIMO BC & MAC
3 Gaussia MIMO (Vector) BC 3/11 System Structure M 0, M 1, M 2 M 0 : A Commo Message M 1 : A Private Message to Rx. 1 M 2 : A Private Message to Rx. 2 Z 1 t : # Tx. At. G 1 X dim G Ecoder 1 dim G dim x 2 1 = t 1 G 2 Z 2 dim z 1 = r 1 Y 1 = r t = r t Y 2 Decoder 1 r : # Rx. At. dim y 1 = r 1 dim y 2 = r 1 r : # Rx. At. Decoder 2 dim z 2 = r 1 M 01, M 1 M 02, M 2 1 i=1 Power Costrait x T m 0, m 1, m 2, i x(m 0, m 1, m 2, i ) P m 0, m 1, m 2 1: 2 R 0 1: 2 R 1 [1: 2 R 2] chael Y 1 = G 1 X + Z 1 Y 2 = G 2 X + Z 2 Z 1 N(0, I r ) Z 2 N(0, I r )
4 Capacity Regio of Gaussia MIMO BC 3/11 Special Cases Kow Capacity Regio Aliged ad Icosistetly Degraded MIMO BC t = r, diagoal G 1, G 2 (G T 1 G 1 ad G T 2 G 2 have the same set of Eigevalue) : A Product of Gaussia BC Superpositio Codig Aliged MIMO BC (M 0 = 0) Oly Private Messages without a Commo Message Vector Writig o Dirty Paper Degraded a Private Message ad a Commo Message Either M 0 = 0 or M 0 = 0 Degraded Message Set Superpositio Codig
5 Case 1 : Gaussia Product BC Parallel Gaussia BCs Y 1k = X k + Z 1k Y 2k = X k + Z 2k k [1: r] Z jk N(0, N jk ) j = 1,2 M. I. Not Degraded, but Icosistetly Degraded BC Z 1 l N(0, N 1 ) Z 2 l N(0, N 2 N 1 ) X 1 l + Y 1 l + Y 2 l N 1k N 2k k [1: l] r Z 2,l+1 N(0, N 2 ) r Z 1,l+1 N(0, N 1 N 2 ) r X l+1 + r Y 2,l+1 + r Y 1,l+1 N 2k > N 1k k [l + 1: r]
6 Case 1 : Gaussia Product BC Capacity Regio R 0 + R 1 C β kp l k=1 N 1k r + C( k=l+1 α k β k P 1 α k β k P + N 1k ) R 0 + R 2 l k=1 C α k β k P 1 α k β k P + N 2k r + C β kp k=l+1 N 2k R 0 + R 1 + R 2 C β kp R 0 + R 1 + R 2 l k=1 l k=1 [C N 1k r + [C k=l+1 α k β k P + C β kp ] 1 α k β k P + N 2k N 1k α k β k P + C( 1 α k β k P )] 1 α k β k P + N 1k N 2k r + C( β kp ) N 2k k=l+1 For some α k, β k [0,1], k [1: r], with r k=1 β k = 1
7 Case 1 : Gaussia Product BC Rate Regio R 0 + R 1 I X 1 ; Y 11 + I(U 2 ; Y 12 ) R 0 + R 2 I X 2 ; Y 22 + I(U 1 ; Y 21 ) R 0 + R 1 + R 2 I X 1 ; Y 11 + I U 2 ; Y 12 + I X 2 ; Y 22 U 2 ) R 0 + R 1 + R 2 I X 2 ; Y 22 + I U 1 ; Y 21 + I X 1 ; Y 11 U 1 ) For some pmf p u 1, x 1 p( u 2, x 2 ) Achievability & Coverse Proof Superpositio Codig (Degraded Gaussia BC)
8 Case 1 : Gaussia Product BC Achievability Proof (X 1, p y 11 x 1 p y 21 y 11, Y 11 Y 21 ) X 1 p(y 11 x 1 ) Y 11 p(y 21 y 11 ) Y 21 X 2 p(y 22 x 2 ) Y 22 p(y 12 y 22 ) Y 12 (X 2, p y 22 x 2 p y 12 y 22, Y 12 Y 22 ) Rate Splittig Divide M j, j = 1,2 ito two idep. Messages : M j0 at rate R j0, M jj at rate R jj
9 Case 1 : Gaussia Product BC Codebook Geeratio Fix a pmf p u 1, x 1 p(u 2, x 2 ). Radomly ad idep. Geerate 2 (R 0+R 10 +R 20 ) sequece pairs u 1, u 2 m 0, m 10, m 20 accordig to i=1 p U1 u 1i p U2 (u 2i ) m 0, m 10, m 20 1: 2 R 0 1: 2 R 10 [1: 2 R 20] For m 0, m 10, m 20, radomly ad coditioally idep. Geerate 2 R jj sequeces Ecodig x j (m 0, m 10, m 20, m jj ) accordig to i=1 p Xj U j (x ji u ji (m 0, m 10, m 20 ) m jj [1: 2 R jj], j = 1,2 To sed the message triple m 0, m 1, m 2 = (m 0, m 10, m 11, m 20, m 22 ) Trasmit (x 1 m 0, m 10, m 20, m 11, x 2 m 0, m 10, m 20, m 22 )
10 Case 1 : Gaussia Product BC Decodig ad aalysis of the probability of error Decoder 1 : fid uique triple (m 01, m 10, m 11 ) such that ((u 1, u 2 )(m 01, m 10, m 11 ),x 1 m 01, m 10, m 20, m 11 ), y 1, y 2 T ε () For some m 10. Probability error for decoder 1 R 0 + R 1 + R 20 < I U 1, U 2, X 1 ; Y 11, Y 12 δ(ε) = I X 1 ; Y 11 + I U 2 ; Y 12 δ(ε) R 11 < I X 1 ; Y 11 U 1 Probability error for decoder 2 δ(ε) R 0 + R 10 + R 2 < I(X 2 ; Y 22 ) + I(U 1 ; Y 21 ) δ(ε) R 22 < I X 2 ; Y 22 U 2 δ(ε)
11 Case 2 : Private Messages Capacity Regio C = R WDP = co(r 1 R 2 ) R 1 : DPC with No-causal State X 2 R 1 < 1 2 log G 1K 1 G 1 T + I r R 2 < 1 2 log G 2K 2 G T 2 + G 2 K 1 G T 2 + I r G 2 K 1 G T 2 + I r R 2 : DPC with No-causal State X 1 R 1 < 1 2 log G 1K 1 G 1 T + G 1 K 2 G 1 T + I r G 1 K 2 G 1 T + I r R 2 < 1 2 log G 2K 2 G 2 T + I r
12 Vector Writig o Dirty Paper (1) Vector Writig o Dirty Paper S S N(0, K S ) Secod oise chael (AWGN) Z N(0, I r ) M Y W Ecoder Decoder Average power costrait P X C = Y = GX + S + Z max tr K X P 1 2 log G K XG T + I r
13 Vector Writig o Dirty Paper (2) Proof of Capacity C = 1 max tr K X P 2 log G K XG T + I r C = sup [ I U; Y I U; S ] p u s,x u s :E X T X P Let U = X + AS, where X N(0, K X ) is idepedet of S A = K X G T G K X G T + I r 1 I U; Y I U; S = h U S h(u Y) = h X + AS S h(x + AS Y) = h(x) h(x GX + Z) = I(X; GX + Z) = 1 2 log I r + G K X G T h X + AS Y = h(x + AS AY Y) = h(x + A(S Y) Y) = h(x + A(GX + Z) Y) = h(x + A(GX + Z)) = h(x + A(GX + Z) GX + Z) = h(x GX + Z)
14 Vector Writig o Dirty Paper (3) 3/11 R 1 M 1 M 1 - Ecoder X 1 M 2 M 2 -Ecoder X 2 X R 1 < I X 1 ; G 1 X 1 + Z 1 = 1 2 log G 1K 1 G 1 T + I r G 1 G 2 Z 1 Z 2 Y 1 Y 1 = G 1 X 1 + G 1 X 2 + Z 1 Y 2 = G 2 X 2 + G 2 X 1 + Z 2 Y 2 R 2 < I X 2 ; G 2 X 1 + G 2 X 2 + Z 2 = 1 2 log G 2K 1 G 2 T + G 2 K 2 G 2 T + I r G 2 K 1 G 2 T + I r
15 Vector Writig o Dirty Paper 3/11 R 2 M 1 M 2 M 1 -Ecoder M 2 - Ecoder X 1 X 2 X G 1 G 2 Z 1 Z 2 Y 1 Y 1 = G 1 X 1 + G 1 X 2 + Z 1 Y 2 = G 2 X 2 + G 2 X 1 + Z 2 Y 2 R 1 < I X 1 ; G 1 X 1 + G 1 X 2 + Z 1 = 1 2 log G 1K 1 G 1 T + G 1 K 2 G 1 T + I r G 1 K 2 G 1 T + I r R 2 < I X 2 ; G 2 X 2 + Z 2 = 1 2 log G 2K 2 G 2 T + I r
16 Capacity Regio of Gaussia MIMO BC
17 BC-MAC Duality Z 1 N(0, I r ) X G 1 Y 1 X 1 G 1 T Z N(0, I t ) Y G 2 G 2 T Y 2 X 2 Z 2 N(0, I r ) C DP BC P; G 1, G 2 = C MAC (P 1, P 2 ; G T 1, G T 2 ) 2 i=1 tr P i P
18 MIMO Multiple Access Chael 3/11 System Structure M 1 Ecoder 1 X 1 G 1 Z N(0, I r ) Y Decoder M 2 Ecoder 2 X 2 G 2 1 i=1 Power Costrait x T j m j, i x j (m j, i ) P m j 1: 2 R j, j = 1,2 chael Y = G 1 X 1 + G 2 X 2 + Z Z N(0, I r )
19 MIMO MAC Capacity Regio R log G 1K 1 G 1 T + I r R log G 2K 2 G 2 T + I r R 1 + R log G 1K 1 G 1 T + G 2 K 2 G 2 T + I r Boudary Poit R R 1 = 1 2 log G 1K 1 G 1 T + I r R 2 = 1 2 log G 1K 1 G 1 T + G 2 K 2 G 2 T + I r 1 2 log G 1K 1 G 1 T + I r = 1 2 log G 1K 1 G 1 T + G 2 K 2 G 2 T + I r G 1 K 1 G 1 T + I r
20 Achievability Proof : DPC Capacity Regio / Usig Dual MAC R WDP = C DMAC = R(K 1, K 2 ) K 1,K 2 0:tr K 1 +tr K 2 P R 1, R 2 of C DMAC lies o the boudary of (K 1, K 2 ) max [αr 1 + αr 2 ] α 0,1, R 1,R 2 C DMAC max α 0,1,tr K 1 +tr K 2 P,K 1,K 2 0} [α 2 log G 1K 1 G 1 T + G 2 K 2 G 2 T + I r + α α 2 log G 2 K 2 G 2 T + I r ] Itroducig Dual Variables tr K 1 + tr K 2 P K 1, K 2 0 λ 0 γ 1, γ 2 0
21 Achievability Proof : DPC Capacity Regio L K 1, K 2, γ 1, γ 2, λ = α 2 log G 1K 1 G 1 T + G 2 K 2 G 2 T + I r + α α 2 log G 2 K 2 G 2 T + I r +tr γ 1 K 1 + tr γ 2 K 2 λ[tr K 1 + tr K 2 P) Applyig KKT λ G 1 S 1 G 1 T + γ 1 λ I r = 0 λ G 2 S 2 G 2 T + γ 2 λ I r = 0 λ tr K 1 + tr K 2 P = 0 tr γ 1 K 1 = tr(γ 2 K 2 ) = 0 S 1 = α 2λ G 1 T K 1 G 1 + G T 2 K 2 G 2 + I 1 r S 2 = α 2λ G 1 T K 1 G 1 + G T 2 K 2 G 2 + I 1 α α r + 2λ G T 2 K 2 G 2 + I 1 r K 1 = α 2λ G 2 T K 2 G 2 + I 1 r S 1 K 2 = α 2λ I r K 1 S 2
A Partial Decode-Forward Scheme For A Network with N relays
A Partial Decode-Forward Scheme For A etwork with relays Yao Tag ECE Departmet, McGill Uiversity Motreal, QC, Caada Email: yaotag2@mailmcgillca Mai Vu ECE Departmet, Tufts Uiversity Medford, MA, USA Email:
More informationSUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL
Joural of Theoretical ad Applied Iformatio Techology 31 st December 212 Vol 46 No2 25-212 JATIT & LLS All rights reserved ISSN: 1992-8645 wwwatitorg E-ISSN: 1817-3195 SCCESSIVE INTERFERENCE CANCELLATION
More informationInformation Theory and Coding
Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power
More informationCooperative Communication Fundamentals & Coding Techniques
3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial
More informationLecture 7: Channel coding theorem for discrete-time continuous memoryless channel
Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first
More informationEntropies & Information Theory
Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory
More informationThe Capacity Region of the Degraded Finite-State Broadcast Channel
The Capacity Regio of the Degraded Fiite-State Broadcast Chael Ro Dabora ad Adrea Goldsmith Dept. of Electrical Egieerig, Staford Uiversity, Staford, CA Abstract We cosider the discrete, time-varyig broadcast
More informationA New Achievability Scheme for the Relay Channel
A New Achievability Scheme for the Relay Chael Wei Kag Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 20742 wkag@umd.edu ulukus@umd.edu October 4, 2007
More informationECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220
ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part
More informationThe Maximum-Likelihood Decoding Performance of Error-Correcting Codes
The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,
More informationChannel coding, linear block codes, Hamming and cyclic codes Lecture - 8
Digital Commuicatio Chael codig, liear block codes, Hammig ad cyclic codes Lecture - 8 Ir. Muhamad Asial, MSc., PhD Ceter for Iformatio ad Commuicatio Egieerig Research (CICER) Electrical Egieerig Departmet
More informationCovert Communication with Noncausal Channel-State Information at the Transmitter
Covert Commuicatio with Nocausal Chael-State Iformatio at the Trasmitter Si-Hyeo Lee, Ligog Wag, Ashish Khisti, ad Gregory W. Worell POSTECH, Pohag, South Korea (e-mail:sihyeo@postech.ac.kr ETIS Uiversité
More informationAsymptotic Coupling and Its Applications in Information Theory
Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM
More informationCapacity Theorems for the Finite-State Broadcast Channel with Feedback
Capacity Theorems for the Fiite-State Broadcast Chael with Feedback Ro abora ad Adrea Goldsmith ept of Electrical Egieerig, Staford Uiversity Abstract We cosider the discrete, time-varyig broadcast chael
More informationHybrid Coding for Gaussian Broadcast Channels with Gaussian Sources
Hybrid Codig for Gaussia Broadcast Chaels with Gaussia Sources Rajiv Soudararaja Departmet of Electrical & Computer Egieerig Uiversity of Texas at Austi Austi, TX 7871, USA Email: rajivs@mailutexasedu
More informationIET Commun., 2009, Vol. 3, Iss. 1, pp doi: /iet-com: & The Institution of Engineering and Technology 2009
Published i IET Commuicatios Received o 4th Jue 28 Revised o 3th July 28 doi: 1.149/iet-com:28373 ISSN 1751-8628 Symmetric relayig based o partial decodig ad the capacity of a class of relay etworks L.
More informationDistortion Bounds for Source Broadcast. Problem
Distortio Bouds for Source Broadcast 1 Problem Lei Yu, Houqiag Li, Seior Member, IEEE, ad Weipig Li, Fellow, IEEE Abstract This paper ivestigates the joit source-chael codig problem of sedig a memoryless
More informationThe Capacity Region of the. Degraded Finite-State Broadcast Channel
Submitted to the IEEE Trasactios o Iformatio Theory, 2008. The Capacity Regio of the Degraded Fiite-State Broadcast Chael Ro Dabora ad Adrea Goldsmith Wireless Systems Lab Departmet of Electrical Egieerig
More informationInformation Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame
Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for
More informationSymmetric Two-User Gaussian Interference Channel with Common Messages
Symmetric Two-User Gaussia Iterferece Chael with Commo Messages Qua Geg CSL ad Dept. of ECE UIUC, IL 680 Email: geg5@illiois.edu Tie Liu Dept. of Electrical ad Computer Egieerig Texas A&M Uiversity, TX
More informationLecture 6: Source coding, Typicality, and Noisy channels and capacity
15-859: Iformatio Theory ad Applicatios i TCS CMU: Sprig 2013 Lecture 6: Source codig, Typicality, ad Noisy chaels ad capacity Jauary 31, 2013 Lecturer: Mahdi Cheraghchi Scribe: Togbo Huag 1 Recap Uiversal
More informationDaniela Tuninetti University of Illinois, Chicago, IL (USA),
1 The IterFerece Chael with Geeralized Feedback IFC-GF) Daiela Tuietti Uiversity of Illiois, Chicago, IL USA), daiela@ece.uic.edu Abstract This work itroduces cooperative commuicatio strategies for IterFerece
More informationLecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound
Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee
More informationTHE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication
Trade-off betwee Commuicatio ad Cooperatio i the Iterferece Chael Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umich.edu S. Sadeep Pradha EECS Departmet Uiversity of Michiga
More informationConsider the n-dimensional additive white Gaussian noise (AWGN) channel
8. Lattice codes (by O. Ordetlich) Cosider the -dimesioal additive white Gaussia oise (AWGN) chael Y = X + Z where Z N (0, I ) is statistically idepedet of the iput X. Our goal is to commuicate reliably
More informationLinear Sum Capacity for Gaussian Multiple Access Channel with Feedback
Liear Sum Capacity for Gaussia Multiple Access Chael with Feedback Ehsa Ardestaizadeh, Michèle A Wigger, Youg-Ha Kim, Tara Javidi ISIT 00, Austi, Texas, USA, Jue 3-8, 00 Abstract This paper studies the
More informationFinite Block-Length Gains in Distributed Source Coding
Decoder Fiite Block-Legth Gais i Distributed Source Codig Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umichedu S Sadeep Pradha EECS Departmet Uiversity of Michiga A Arbor,USA
More informationMultiterminal Source Coding with an Entropy-Based Distortion Measure
20 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Multitermial Source Codig with a Etropy-Based Distortio Measure Thomas A. Courtade ad Richard D. Wesel Departmet of Electrical Egieerig Uiversity
More informationOn the Dispersions of the Gel fand-pinsker Channel and Dirty Paper Coding
O the Dispersios of the Gel fad-isker Chael ad Dirty aper Codig Joatha Scarlett Abstract This paper studies secod-order codig rates for memoryless chaels with a state sequece kow o-causally at the ecoder.
More informationMultiterminal source coding with complementary delivery
Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2006 Seoul, Korea, October 29 November 1, 2006 Multitermial source codig with complemetary delivery Akisato Kimura ad Tomohiko Uyematsu
More informationPosterior Matching Scheme for Gaussian Multiple Access Channel with Feedback
1 Posterior Matchig Scheme for Gaussia Multiple Access Chael with Feedback La V. Truog, Member, IEEE, Iformatio Techology Specializatio Departmet ITS, FPT Uiversity, Haoi, Vietam E-mail: latv@fpt.edu.v
More informationInseparability of the Multiple Access Wiretap Channel
Iseparability of the Multiple Access Wiretap Chael Jiawei Xie Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 074 xiejw@umd.edu ulukus@umd.edu Abstract We
More informationLecture 14: Graph Entropy
15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number
More informationMultiple-Access Channels with Distributed Channel State Information
ISIT2007, Nice, Frace, Jue 24 - Jue 29, 2007 Multiple-ccess Chaels with Distributed Chael State Iformatio Cha-Soo Hwag Electrical Egieerig Staford Uiversity Email: cshwag @ staford.edu Moshe Malki Electrical
More informationbounds and in which F (n k) n q s.t. HG T = 0.
6. Liear codes. Chael capacity Recall that last time we showed the followig achievability bouds: Shao s: P e P [i(x; Y ) log M + τ] + exp{ τ} M DT: P e E [ exp { (i( X; Y ) log ) + }] Feistei s: P e,max
More informationThe Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints
IIT 6, eattle, UA, July 9-4, 6 The Gaussia Multiple Access Wire-Tap Chael with Collective ecrecy Costraits Eder Tei tei@psu.edu Ayli Yeer yeer@ee.psu.edu Wireless Commuicatios ad Networig Laboratory Electrical
More informationOn the Dispersions of the Discrete Memoryless Interference Channel
O the Dispersios of the Discrete Memoryless Iterferece Chael Sy-Quoc Le, Vicet Y. F. Ta,2, ad Mehul Motai Departmet of ECE, Natioal Uiversity of Sigapore, Sigapore 2 Istitute for Ifocomm Research (I 2
More informationLecture 11: Channel Coding Theorem: Converse Part
EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig
More information17.1 Channel coding with input constraints
7. Chaels with iput costraits. Gaussia chaels. 7. Chael codig with iput costraits Motivatios: Let us look at the additive Gaussia oise. The the Shao capacity is ifiite, sice sup P I(X; X + Z) = achieved
More informationRelay Channel With Private Messages
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3777 Relay Chael With Private Messages Ramy Taious, Studet Member, IEEE, ad Aria Nosratiia, Seior Member, IEEE Abstract The relay
More informationarxiv: v1 [cs.it] 13 Jul 2012
O the Sum Capacity of the Discrete Memoryless Iterferece Chael with Oe-Sided Weak Iterferece ad Mixed Iterferece Fagfag Zhu ad Biao Che Syracuse Uiversity Departmet of EECS Syracuse, NY 3244 Email: fazhu{biche}@syr.edu
More informationOn the Capacity of Symmetric Gaussian Interference Channels with Feedback
O the Capacity of Symmetric Gaussia Iterferece Chaels with Feedback La V Truog Iformatio Techology Specializatio Departmet ITS FPT Uiversity, Haoi, Vietam E-mail: latv@fpteduv Hirosuke Yamamoto Dept of
More informationCapacity of Compound State-Dependent Channels with States Known at the Transmitter
Capacity of Compoud State-Depedet Chaels with States Kow at the Trasmitter Pablo Piataida Departmet of Telecommuicatios SUPELEC Plateau de Moulo, 992 Gif-sur-Yvette, Frace Email: pablo.piataida@supelec.fr
More informationLinear Algebra Issues in Wireless Communications
Rome-Moscow school of Matrix Methods ad Applied Liear Algebra August 0 September 18, 016 Liear Algebra Issues i Wireless Commuicatios Russia Research Ceter [vladimir.lyashev@huawei.com] About me ead of
More informationA meta-converse for private communication over quantum channels
A meta-coverse for private commuicatio over quatum chaels Mario Berta with Mark M. Wilde ad Marco Tomamichel IEEE Trasactios o Iformatio Theory, 63(3), 1792 1817 (2017) Beyod IID Sigapore - July 17, 2017
More informationBinary Fading Interference Channel with No CSIT
Biary Fadig Iterferece Chael with No CSIT Alireza Vahid, Mohammad Ali Maddah-Ali, A. Salma Avestimehr, ad Ya Zhu arxiv:405.003v3 [cs.it] 4 Mar 07 Abstract We study the capacity regio of the two-user Biary
More informationThe Likelihood Encoder with Applications to Lossy Compression and Secrecy
The Likelihood Ecoder with Applicatios to Lossy Compressio ad Secrecy Eva C. Sog Paul Cuff H. Vicet Poor Dept. of Electrical Eg., Priceto Uiversity, NJ 8544 {csog, cuff, poor}@priceto.edu Abstract A likelihood
More informationA Non-Asymptotic Achievable Rate for the AWGN Energy-Harvesting Channel using Save-and-Transmit
016 IEEE Iteratioal Symposium o Iformatio Theory A No-Asymptotic Achievable Rate for the AWGN Eergy-Harvestig Chael usig Save-ad-Trasmit Silas L. Fog, Vicet Y. F. Ta, ad Jig Yag Departmet of Electrical
More informationMathematics 116 HWK 21 Solutions 8.2 p580
Mathematics 6 HWK Solutios 8. p580 A abbreviatio: iff is a abbreviatio for if ad oly if. Geometric Series: Several of these problems use what we worked out i class cocerig the geometric series, which I
More informationOn the Finite Blocklength Performance of Lossy Multi-Connectivity
O the Fiite Blocklegth Performace of Lossy Multi-Coectivity Li Zhou Departmet of ECE, Natioal Uiversity of Sigapore, Email: lzhou@u.us.edu Albrecht Wolf Vodafoe Chair Mobile Commuicatio Systems, Techical
More informationOn Successive Refinement for the Wyner-Ziv Problem with Partially Cooperating Decoders
ISIT 2008, Toroto, Caada, July 6-11, 2008 O Successive Refiemet for the Wyer-Ziv Problem with Partially Cooperatig Decoders Shraga I. Bross ad Tsachy Weissma, School of Egieerig, Bar-Ila Uiversity, Ramat-Ga
More informationLecture 7: MIMO Architectures Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH
: Theoretical Foudatios of Wireless Commuicatios 1 Thursday, May 19, 2016 12:30-15:30, Coferece Room SIP 1 Textbook: D. Tse ad P. Viswaath, Fudametals of Wireless Commuicatio 1 / 1 Overview Lecture 6:
More informationLossy Compression with Near-uniform Encoder Outputs
016 IEEE Iteratioal Symposium o Iformatio Theory Lossy Compressio with Near-uiform Ecoder Outputs Badri N. Vellambi, Jörg Kliewer New Jersey Istitute of Techology, Newar, NJ 0710 Email: badri..vellambi@ieee.org,
More informationNon-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit
No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L. Fog, Jig Yag, ad Ayli Yeer arxiv:805.089v [cs.it] 30 May 08 Abstract A additive white Gaussia
More informationProbability and Information Theory for Language Modeling. Statistical Linguistics. Statistical Linguistics: Adult Monolingual Speaker
Probability ad Iformatio Theory for Laguage Modelig Statistical vs. Symbolic NLP Elemetary Probability Theory Laguage Modelig Iformatio Theory Statistical Liguistics Statistical approaches are clearly
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 3, MARCH
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 3, MARCH 08 48 Lattice Codes Achieve the Capacity of Commo Message Gaussia Broadcast Chaels With Coded Side Iformatio Lakshmi Nataraja, Yi Hog, Seior
More informationApplications in Linear Algebra and Uses of Technology
1 TI-89: Let A 1 4 5 6 7 8 10 Applicatios i Liear Algebra ad Uses of Techology,adB 4 1 1 4 type i: [1,,;4,5,6;7,8,10] press: STO type i: A type i: [4,-1;-1,4] press: STO (1) Row Echelo Form: MATH/matrix
More informationSolutions to HW Assignment 1
Solutios to HW: 1 Course: Theory of Probability II Page: 1 of 6 Uiversity of Texas at Austi Solutios to HW Assigmet 1 Problem 1.1. Let Ω, F, {F } 0, P) be a filtered probability space ad T a stoppig time.
More informationUC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170
UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was
More informationOn Routing-Optimal Network for Multiple Unicasts
O Routig-Optimal Network for Multiple Uicasts Chu Meg, Athia Markopoulou Abstract I this paper, we cosider etworks with multiple uicast sessios. Geerally, o-liear etwork codig is eeded to achieve the whole
More informationA Study of Capacity and Spectral Efficiency of Fiber Channels
A Study of Capacity ad Spectral Efficiecy of Fiber Chaels Gerhard Kramer (TUM) based o joit work with Masoor Yousefi (TUM) ad Frak Kschischag (Uiv. Toroto) MIO Workshop Muich, Germay December 8, 2015 Istitute
More informationAre Slepian-Wolf Rates Necessary for Distributed Parameter Estimation?
Are Slepia-Wolf Rates Necessary for Distributed Parameter Estimatio? Mostafa El Gamal ad Lifeg Lai Departmet of Electrical ad Computer Egieerig Worcester Polytechic Istitute {melgamal, llai}@wpi.edu arxiv:1508.02765v2
More informationKeyless Authentication and Authenticated Capacity
Keyless Autheticatio ad Autheticated Capacity Wewe Tu ad Lifeg Lai Abstract We cosider the problem of keyless message autheticatio over oisy chaels i the presece of a active adversary. Differet from the
More informationThe picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled
1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how
More informationSecond-Order Asymptotics for the Discrete Memoryless MAC with Degraded Message Sets
Secod-Order Asymptotics for the Discrete Memoryless MAC with Degraded Message Sets Joatha Scarlett Laboratory for Iformatio ad Iferece Systems École Polytechique Fédérale de Lausae Email: jmscarlett@gmail.com
More informationLossy Coding of Correlated Sources Over a Multiple Access Channel: Necessary Conditions and Separation Results
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 9, SETEMBER 08 608 Lossy Codig of Correlated Sources Over a Multiple Access Chael: Necessary Coditios ad Separatio Results Başak Güler, Member, IEEE,
More informationHomework Set #3 - Solutions
EE 15 - Applicatios of Covex Optimizatio i Sigal Processig ad Commuicatios Dr. Adre Tkaceko JPL Third Term 11-1 Homework Set #3 - Solutios 1. a) Note that x is closer to x tha to x l i the Euclidea orm
More informationPolynomials with Rational Roots that Differ by a Non-zero Constant. Generalities
Polyomials with Ratioal Roots that Differ by a No-zero Costat Philip Gibbs The problem of fidig two polyomials P(x) ad Q(x) of a give degree i a sigle variable x that have all ratioal roots ad differ by
More informationIntroduction to Optimization Techniques. How to Solve Equations
Itroductio to Optimizatio Techiques How to Solve Equatios Iterative Methods of Optimizatio Iterative methods of optimizatio Solutio of the oliear equatios resultig form a optimizatio problem is usually
More informationSequential Decoding: Computational Complexity and the Cutoff Rate
Sequetial Decodig: Computatioal Complexity ad the Cutoff Rate Ley Grokop May 13, 2005 Abstract Sequetial decodig algorithms decode covolutioal codes by guessig their way through the expadig tree of possible
More informationSecond-Order Rate of Constant-Composition Codes for the Gel fand-pinsker Channel
Research Collectio Coferece aper Secod-Order Rate of Costat-Compositio Codes for the Gel fad-isker Chael Author(s: Scarlett, Joatha ublicatio Date: 204 ermaet ik: https://doi.org/0.3929/ethz-a-0009456
More informationThe z-transform. 7.1 Introduction. 7.2 The z-transform Derivation of the z-transform: x[n] = z n LTI system, h[n] z = re j
The -Trasform 7. Itroductio Geeralie the complex siusoidal represetatio offered by DTFT to a represetatio of complex expoetial sigals. Obtai more geeral characteristics for discrete-time LTI systems. 7.
More informationRun-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE
Geeral e Image Coder Structure Motio Video (s 1,s 2,t) or (s 1,s 2 ) Natural Image Samplig A form of data compressio; usually lossless, but ca be lossy Redudacy Removal Lossless compressio: predictive
More informationLecture 19: Convergence
Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may
More informationInverse Matrix. A meaning that matrix B is an inverse of matrix A.
Iverse Matrix Two square matrices A ad B of dimesios are called iverses to oe aother if the followig holds, AB BA I (11) The otio is dual but we ofte write 1 B A meaig that matrix B is a iverse of matrix
More informationChapter 7: The z-transform. Chih-Wei Liu
Chapter 7: The -Trasform Chih-Wei Liu Outlie Itroductio The -Trasform Properties of the Regio of Covergece Properties of the -Trasform Iversio of the -Trasform The Trasfer Fuctio Causality ad Stability
More informationLecture 15: Strong, Conditional, & Joint Typicality
EE376A/STATS376A Iformatio Theory Lecture 15-02/27/2018 Lecture 15: Strog, Coditioal, & Joit Typicality Lecturer: Tsachy Weissma Scribe: Nimit Sohoi, William McCloskey, Halwest Mohammad I this lecture,
More informationCapacity of Steganographic Channels
SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY Capacity of Stegaographic Chaels Jeremiah J. Harmse, Member, IEEE, William A. Pearlma, Fellow, IEEE, Abstract This work ivestigates a cetral problem
More informationResilient Source Coding
Resiliet Source Codig Maël Le Treust Laboratoire des Sigaux et Systèmes CNRS - Supélec - Uiv. Paris Sud 11 91191, Gif-sur-Yvette, Frace Email: mael.letreust@lss.supelec.fr Samso Lasaulce Laboratoire des
More informationIncreasing timing capacity using packet coloring
003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:
More informationDaniel Lee Muhammad Naeem Chingyu Hsu
omplexity Aalysis of Optimal Statioary all Admissio Policy ad Fixed Set Partitioig Policy for OVSF-DMA ellular Systems Daiel Lee Muhammad Naeem higyu Hsu Backgroud Presetatio Outlie System Model all Admissio
More informationNon-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit
08 IEEE Iteratioal Symposium o Iformatio Theory ISIT No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L Fog Departmet of Electrical ad Computer Egieerig
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013 Fuctioal Law of Large Numbers. Costructio of the Wieer Measure Cotet. 1. Additioal techical results o weak covergece
More informationLecture 4: Grassmannians, Finite and Affine Morphisms
18.725 Algebraic Geometry I Lecture 4 Lecture 4: Grassmaias, Fiite ad Affie Morphisms Remarks o last time 1. Last time, we proved the Noether ormalizatio lemma: If A is a fiitely geerated k-algebra, the,
More informationLecture 3. Digital Signal Processing. Chapter 3. z-transforms. Mikael Swartling Nedelko Grbic Bengt Mandersson. rev. 2016
Lecture 3 Digital Sigal Processig Chapter 3 z-trasforms Mikael Swartlig Nedelko Grbic Begt Madersso rev. 06 Departmet of Electrical ad Iformatio Techology Lud Uiversity z-trasforms We defie the z-trasform
More informationNew Results in Coding and Communication Theory. Communication Systems Laboratory. Rick Wesel
New Results i Codig ad Commuicatio Theory http://www.ee.ucla.edu/~csl/ Rick Wesel At the Aerospace Corporatio August, 008 Miguel Griot Bike ie Yua-Mao Chag Tom Courtade Jiadog Wag Recet Results A more
More informationLecture 5. Power properties of EL and EL for vectors
Stats 34 Empirical Likelihood Oct.8 Lecture 5. Power properties of EL ad EL for vectors Istructor: Art B. Owe, Staford Uiversity. Scribe: Jigshu Wag Power properties of empirical likelihood Power of the
More informationAdditional Notes on Power Series
Additioal Notes o Power Series Mauela Girotti MATH 37-0 Advaced Calculus of oe variable Cotets Quick recall 2 Abel s Theorem 2 3 Differetiatio ad Itegratio of Power series 4 Quick recall We recall here
More informationMultiaccess Communication in the Finite Blocklength Regime
Multiaccess Commuicatio i the Fiite Blocklegth Regime Ebrahim MolaviaJazi ad J. Nicholas Laema Departmet of Electrical Egierrig Uiversity of Notre Dame Notre Dame IN 46556 USA Email: {emolaviajl}@d.edu
More informationThe Three-Terminal Interactive. Lossy Source Coding Problem
The Three-Termial Iteractive 1 Lossy Source Codig Problem Leoardo Rey Vega, Pablo Piataida ad Alfred O. Hero III arxiv:1502.01359v3 cs.it] 18 Ja 2016 Abstract The three-ode multitermial lossy source codig
More informationA Rate-Distortion Based Secrecy System with Side Information at the Decoders
A Rate-Distortio Based Secrecy System with Side Iformatio at the Decoders Eva C. Sog Paul Cuff H. Vicet Poor Dept. of Electrical Eg., Priceto Uiversity, NJ 8544 {csog, cuff, poor}@priceto.edu arxiv:4.2v
More informationInformation Hiding Problems: Hiding Capacity and Key Design
Iformatio Hidig Problems: Hidig Capacity ad Key Desig Joseph. O Sulliva Electroic Systems ad Sigals Research Laboratory Departmet of Electrical Egieerig Washigto Uiversity i St. Louis Iformatio Hidig Problems
More informationMath 5311 Problem Set #5 Solutions
Math 5311 Problem Set #5 Solutios March 9, 009 Problem 1 O&S 11.1.3 Part (a) Solve with boudary coditios u = 1 0 x < L/ 1 L/ < x L u (0) = u (L) = 0. Let s refer to [0, L/) as regio 1 ad (L/, L] as regio.
More informationModule 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur
Module 5 EMBEDDED WAVELET CODING Versio ECE IIT, Kharagpur Lesso 4 SPIHT algorithm Versio ECE IIT, Kharagpur Istructioal Objectives At the ed of this lesso, the studets should be able to:. State the limitatios
More informationThe method of types. PhD short course Information Theory and Statistics Siena, September, Mauro Barni University of Siena
PhD short course Iformatio Theory ad Statistics Siea, 15-19 September, 2014 The method of types Mauro Bari Uiversity of Siea Outlie of the course Part 1: Iformatio theory i a utshell Part 2: The method
More informationIncremental Relaying for the Gaussian Interference Channel with a Degraded Broadcasting Relay
TO APPEAR IN IEEE TRANSACTIONS ON INFORMATION THEORY Icremetal Relayig for the Gaussia Iterferece Chael with a Degraded Broadcastig Relay Lei Zhou, Studet Member, IEEE ad Wei Yu, Seior Member, IEEE arxiv:09.540v4
More informationRelaying via Hybrid Coding
011 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Relayig via Hybrid Codig Youg-Ha Kim Departmet of ECE UCSD La Jolla CA 9093 USA yhk@ucsd.edu Sug Hoo Lim Departmet of EE KAIST Daejeo Korea sughlim@kaist.ac.kr
More informationThe multiplicative structure of finite field and a construction of LRC
IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio
More informationA Rank Ratio Inequality and Its Applications
A Rak Ratio Iequality ad Its Applicatios Salma Avestimehr I collaboratio with Sia Lashgari (Corell) ad Chagho Suh (KAIST) Allerto Coferece October 2013 Motivatio If the chaels are -me- varyig ad the trasmi5ers
More informationEllipsoid Method for Linear Programming made simple
Ellipsoid Method for Liear Programmig made simple Sajeev Saxea Dept. of Computer Sciece ad Egieerig, Idia Istitute of Techology, Kapur, INDIA-08 06 December 3, 07 Abstract I this paper, ellipsoid method
More information