On the Optimum Asymptotic Multiuser Efficiency of Randomly Spread CDMA

Size: px
Start display at page:

Download "On the Optimum Asymptotic Multiuser Efficiency of Randomly Spread CDMA"

Transcription

1 On the Optimum Asymptotic Multiuser Efficiency of Randomly Spread CDMA Ralf R. Müller Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU) Lehrstuhl für Digitale Übertragung 13 December 2014

2 1. Introduction Linear Vector Channel Consider a linear vector channel y = 1 N Hb + n with b {±1} K n N(0, σ 2 I) and H being an N K random matrix with iid entries of unit variance and vanishing odd moments. 1 / 21

3 1. Introduction Multiuser Efficiency Bit error probability without interference with interference η Multiuser efficiency measures bitwise error probability. η [0; 1] Signal to noise ratio 2 / 21

4 1. Introduction More on Multiuser Efficiency For unit variance Gaussian data, the multiuser efficiency is trivially related to the Stieltjes transform G(s) in the large matrix limit: η(σ 2 ) = lim s σ 2 sg( s). 3 / 21

5 1. Introduction More on Multiuser Efficiency For unit variance Gaussian data, the multiuser efficiency is trivially related to the Stieltjes transform G(s) in the large matrix limit: η(σ 2 ) = lim s σ 2 sg( s). In general, the multiuser efficiency depends on both the eigenvalue spectrum of the random matrix HH and the distribution of the data. 3 / 21

6 2. Results from Literature Large System Result Let N, K, but β = K/N fixed. Then, the multiuser efficiency with optimal detection is a solution to the fixed point equation 1 η = 1+ β σ 2 1 η 2πσ 2 R ( η ) tanh σ 2 x exp ( ) η(x 1)2 2σ 2 dx. In case the fixed point equation has multiple solutions, the correct one is that solution for which the term η σ 2 + η log η [ η ( η ) ] ) 2β 2πσ 2 log cosh σ 2 x η(x 1)2 exp ( 2σ 2 dx is smallest (Tanaka 2002). R 4 / 21

7 2. Results from Literature A Phase Transition in CDMA optimal detection K = 2N without interference bit error probability signal to noise ratio [db] For large SNR, i.e. σ 2 0, we have η 1. 5 / 21

8 2. Results from Literature Asymptotic Multiuser Efficiency The asymptotic multiuser efficiency is given by η = lim η = min x H Hx σ 2 0 x {±1,0} K \{0} N (Verdú 1986). 6 / 21

9 2. Results from Literature Asymptotic Multiuser Efficiency The asymptotic multiuser efficiency is given by η = lim η = min x H Hx σ 2 0 x {±1,0} K \{0} N (Verdú 1986). Theorem: The optimum asymptotic multiuser efficiency converges to 1 almost surely as N, K, but fixed (Tse & Verdú 2000). β = K N < 6 / 21

10 2. Results from Literature Asymptotic Multiuser Efficiency The asymptotic multiuser efficiency is given by η = lim η = min x H Hx σ 2 0 x {±1,0} K \{0} N (Verdú 1986). Theorem: The optimum asymptotic multiuser efficiency converges to 1 almost surely as N, K, but fixed (Tse & Verdú 2000). β = K N < What about β? 6 / 21

11 2. Results from Literature Uniquely Detecting Matrices Definition An N K matrix H is called uniquely detecting for an alphabet B, iff for all b 1 B K b 2. Hb 1 = Hb 2 b 1 = b 2 7 / 21

12 2. Results from Literature Logarithmically Infinite Overload Theorem: Let N, K, but ζ = K N log 3 K fixed. Then, there does not exist any H {±1} N K such that it is uniquely detecting for binary data, iff multiuser efficiency is greater, ζ > log (Lindström 1966). 8 / 21

13 2. Results from Literature Logarithmically Infinite Overload Theorem: Let N, K, but ζ = K N log 3 K fixed. Then, there does not exist any H {±1} N K such that the optimum asymptotic multiuser efficiency is greater than zero, if ζ > log (Lindström 1966). 8 / 21

14 2. Results from Literature An Existence Result Theorem: Let N, K, but ζ = K N log 3 K fixed. Let H {±1} N K. Then, the probability that H is uniquely detecting for binary data is 1, if (Erdős & Rényi 1963). ζ < / 21

15 2. Results from Literature An Existence Result Theorem: Let N, K, but ζ = K N log 3 K fixed. Let H {±1} N K. Then, the optimum asymptotic multiuser efficiency converges to a nonzero value almost surely, if (Erdős & Rényi 1963). ζ < / 21

16 2. Results from Literature Summary of Known Results 1 η Tse-Verdú Lindström 0 Erdös-Rényi 0 ζ / 21

17 3. New Results A New Binary Existence Result Theorem: Let N, K, but ζ = K N log 3 K fixed. Let H {±1} N K. Then, the optimum asymptotic multiuser efficiency converges to 1 almost surely if ζ < 3 8 (Sedaghat, RRM, Marvasti 2013). 11 / 21

18 3. New Results Generalization of the Binary Existence Result Theorem: Let N, K, but ζ = K N log 3 K fixed. Let H {±1} N K. Then, the optimum asymptotic multiuser efficiency converges to value which is greater or equal to min{1, 4 8ζ} (Sedaghat, RRM, Marvasti 2013). 12 / 21

19 3. New Results Summary of Results 1 η Tse-Verdú Lindström 0 Erdös-Rényi 0 ζ / 21

20 3. New Results Summary of Results 1 Sedaghat-RRM-Marvasti η Lindström 0 0 ζ / 21

21 3. New Results Minimum Distance By Erdős and Rényi, the minimum distance is non-zero almost surely as long as ζ < 1 2 (despite logarithmically infinite overload). By the new result, the minimum distance is almost surely at least as big as in an hypercube downscaled by a factor of β as long as ζ < 3 8 (despite logarithmically infinite overload). 14 / 21

22 3. New Results Minimum Distance By Erdős and Rényi, the minimum distance is non-zero almost surely as long as ζ < 1 2 (despite logarithmically infinite overload). By the new result, the minimum distance is almost surely at least as big as in an hypercube downscaled by a factor of β as long as ζ < 3 8 (despite logarithmically infinite overload). The projection reduces the noise variance from K to N. 14 / 21

23 3. New Results Minimum Distance By Erdős and Rényi, the minimum distance is non-zero almost surely as long as ζ < 1 2 (despite logarithmically infinite overload). By the new result, the minimum distance is almost surely at least as big as in an hypercube downscaled by a factor of β as long as ζ < 3 8 (despite logarithmically infinite overload). The projection reduces the noise variance from K to N. In a hypercube the kissing number (number of nearest neighbors is linear in K. After the projection it could eventually be exponential in K degrading the asymptotic multiuser efficiency. 14 / 21

24 3. New Results A Gaussian Existence Result Theorem: Let N, K, but ζ = K N log 3 K fixed. Let H have Gaussian entries. Then, the optimum asymptotic multiuser efficiency converges to 1 almost surely if ζ < 1 2 (Sedaghat, RRM, Marvasti 2013). 15 / 21

25 4. Proofs Sketch of Proof We define R = H H/N and start from Verdú 1986 ( ) Pr(η < 1) = Pr min x {±1,0} K \{0} x Rx < 1. The union bound gives Pr(η < 1) x {±1,0} K \{0} ( ) Pr x Rx < 1 We split the summation into shells of equal Hamming weight (zero norm): x {±1,0} K \{0} ( ) = K w=1 x {±1,0} K : x 0 =w ( ) 16 / 21

26 4. Proofs Lemma on Odd Weights Lemma 1: For any vector x {±1, 0} K with odd weight, Proof: x Rx = 1 N x Rx 1. N K H ij x j i=1 j=1 2 } {{ } 1 The squared bracket is a positive integer, since the sum contains an odd number of binary antipodal (+1, 1) terms. 17 / 21

27 4. Proofs Lemma on Odd Weights Lemma 1: For any vector x {±1, 0} K with odd weight, Proof: x Rx = 1 N x Rx 1. N K H ij x j i=1 j=1 2 } {{ } 1 The squared bracket is a positive integer, since the sum contains an odd number of binary antipodal (+1, 1) terms. W. l. o. g., we can consider vectors with even weights. 17 / 21

28 4. Proofs Lemma on Even Weights Lemma 2: For any vector x {±1, 0} K with even weight and we have x Rx < 1, Hx 0 < N 4 Proof: x Rx = 1 N N K H ij x j i=1 j=1 2 } {{ } / {1,2,3} 18 / 21

29 4. Proofs Lemma on Even Weights Lemma 2: For any vector x {±1, 0} K with even weight and we have Proof: x Rx = 1 N x Rx < 1, Hx 0 < N 4 N K H ij x j i=1 j=1 2 } {{ } / {1,2,3} If the empirical average is less then 1, the number of terms which are 4 or more must be less than N/4. 18 / 21

30 4. Proofs Subshell Uniformity Lemma 3: For any vectors x, y {±1, 0} K with we have Proof: x 0 = y 0, ( ) ( ) Pr x Rx < 1 = Pr y Ry < 1 x Rx = 1 N ( N K H ij x j i=1 j=1 } {{ } =:u i ) 2 19 / 21

31 4. Proofs Subshell Uniformity Lemma 3: For any vectors x, y {±1, 0} K with we have Proof: x 0 = y 0, ( ) ( ) Pr x Rx < 1 = Pr y Ry < 1 ( x Rx = 1 N K ) 2 H ij x j N i=1 j=1 }{{} =:u i Characteristic function: K φ ui (t) = φ Hij x j (t) = [φ H11 (t)] x 0 j=1 19 / 21

32 4. Proofs Back to the Main Proof After splitting into subshells, we had: K Pr(η < 1) Pr ( x Rx < 1 ) w=1 x {±1,0} K : x 0=w 20 / 21

33 4. Proofs Back to the Main Proof After splitting into subshells, we had: Pr(η < 1) K w=1 x {±1,0} K : x 0=w With the three lemmas, we get Pr(η < 1) K/2 w=1 ( K 2w Pr ( x Rx < 1 ) ) ( 2 2w x 0 Pr Hx 0 < N ) =2w 4 20 / 21

34 4. Proofs Back to the Main Proof After splitting into subshells, we had: Pr(η < 1) K w=1 x {±1,0} K : x 0=w With the three lemmas, we get with Pr(η < 1) = K/2 w=1 K/2 w=1 ( K 2w ( K 2w p w = Pr 2w j=1 Pr ( x Rx < 1 ) ) ( 2 2w x 0 Pr Hx 0 < N ) =2w 4 ) 2 2w N/4 1 i=0 H 1j = 0 = ( N i ( 2w w ) p N i w (1 p w ) i ) 2 2w. A few more bounds lead to the desired result. 20 / 21

35 5. References References Erdős & Rényi On two problems of information theory, Magyar Tud. Akad. Mat. Kutató Int. Közl, vol. 8, pp , Lindström On a combinatorial detection problem II, Studia Scientiarum Mathematicarum Hungarica, vol. 1, pp , Tse & Verdú Optimum asymptotic multiuser efficiency of randomly spread CDMA, IEEE Trans. Inform. Theory, vol. 46, no. 7, Tanaka A statistical mechanics approach to large-system analysis of CDMA multiuser detectors, IEEE Trans. Inform. Theory, vol. 48, no. 11, Sedaghat, RRM, Marvasti On Optimum Asymptotic Multiuser Efficiency of Randomly Spread CDMA, arxiv: v1. 21 / 21

36 On the Optimum Asymptotic Multiuser Efficiency of Randomly Spread CDMA Ralf R. Müller Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU) Lehrstuhl für Digitale Übertragung 13 December 2014

Decoupling of CDMA Multiuser Detection via the Replica Method

Decoupling of CDMA Multiuser Detection via the Replica Method Decoupling of CDMA Multiuser Detection via the Replica Method Dongning Guo and Sergio Verdú Dept. of Electrical Engineering Princeton University Princeton, NJ 08544, USA email: {dguo,verdu}@princeton.edu

More information

National University of Singapore. Ralf R. Müller

National University of Singapore. Ralf R. Müller Ê ÔÐ Å Ø Ó Ò Ï Ö Ð ÓÑÑÙÒ Ø ÓÒ Ì National University of Singapore March 006 Ralf R. Müller Professor for Wireless Networks Norwegian University of Science & Technology mueller@iet.ntnu.no Ê ÔÐ Å Ø Ó Ò ÅÙÐØ

More information

Design of MMSE Multiuser Detectors using Random Matrix Techniques

Design of MMSE Multiuser Detectors using Random Matrix Techniques Design of MMSE Multiuser Detectors using Random Matrix Techniques Linbo Li and Antonia M Tulino and Sergio Verdú Department of Electrical Engineering Princeton University Princeton, New Jersey 08544 Email:

More information

Random Matrices and Wireless Communications

Random Matrices and Wireless Communications Random Matrices and Wireless Communications Jamie Evans Centre for Ultra-Broadband Information Networks (CUBIN) Department of Electrical and Electronic Engineering University of Melbourne 3.5 1 3 0.8 2.5

More information

392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6. Problem Set 2 Solutions

392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6. Problem Set 2 Solutions 392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6 Problem Set 2 Solutions Problem 2.1 (Cartesian-product constellations) (a) Show that if A is a K-fold Cartesian

More information

Single-letter Characterization of Signal Estimation from Linear Measurements

Single-letter Characterization of Signal Estimation from Linear Measurements Single-letter Characterization of Signal Estimation from Linear Measurements Dongning Guo Dror Baron Shlomo Shamai The work has been supported by the European Commission in the framework of the FP7 Network

More information

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:

More information

Linear and Nonlinear Iterative Multiuser Detection

Linear and Nonlinear Iterative Multiuser Detection 1 Linear and Nonlinear Iterative Multiuser Detection Alex Grant and Lars Rasmussen University of South Australia October 2011 Outline 1 Introduction 2 System Model 3 Multiuser Detection 4 Interference

More information

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway

More information

Communication Over MIMO Broadcast Channels Using Lattice-Basis Reduction 1

Communication Over MIMO Broadcast Channels Using Lattice-Basis Reduction 1 Communication Over MIMO Broadcast Channels Using Lattice-Basis Reduction 1 Mahmoud Taherzadeh, Amin Mobasher, and Amir K. Khandani Coding & Signal Transmission Laboratory Department of Electrical & Computer

More information

Spectral Efficiency of CDMA Cellular Networks

Spectral Efficiency of CDMA Cellular Networks Spectral Efficiency of CDMA Cellular Networks N. Bonneau, M. Debbah, E. Altman and G. Caire INRIA Eurecom Institute nicolas.bonneau@sophia.inria.fr Outline 2 Outline Uplink CDMA Model: Single cell case

More information

INVERSE EIGENVALUE STATISTICS FOR RAYLEIGH AND RICIAN MIMO CHANNELS

INVERSE EIGENVALUE STATISTICS FOR RAYLEIGH AND RICIAN MIMO CHANNELS INVERSE EIGENVALUE STATISTICS FOR RAYLEIGH AND RICIAN MIMO CHANNELS E. Jorswieck, G. Wunder, V. Jungnickel, T. Haustein Abstract Recently reclaimed importance of the empirical distribution function of

More information

Interactions of Information Theory and Estimation in Single- and Multi-user Communications

Interactions of Information Theory and Estimation in Single- and Multi-user Communications Interactions of Information Theory and Estimation in Single- and Multi-user Communications Dongning Guo Department of Electrical Engineering Princeton University March 8, 2004 p 1 Dongning Guo Communications

More information

Output MAI Distributions of Linear MMSE Multiuser Receivers in DS-CDMA Systems

Output MAI Distributions of Linear MMSE Multiuser Receivers in DS-CDMA Systems 1128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Output MAI Distributions of Linear MMSE Multiuser Receivers in DS-CDMA Systems Junshan Zhang, Member, IEEE, Edwin K. P. Chong, Senior

More information

Minimization of Quadratic Forms in Wireless Communications

Minimization of Quadratic Forms in Wireless Communications Minimization of Quadratic Forms in Wireless Communications Ralf R. Müller Department of Electronics & Telecommunications Norwegian University of Science & Technology, Trondheim, Norway mueller@iet.ntnu.no

More information

Random Geometric Graphs

Random Geometric Graphs Random Geometric Graphs Mathew D. Penrose University of Bath, UK SAMBa Symposium (Talk 2) University of Bath November 2014 1 MODELS of RANDOM GRAPHS Erdos-Renyi G(n, p): start with the complete n-graph,

More information

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering

More information

Asymptotic Eigenvalue Moments for Linear Multiuser Detection

Asymptotic Eigenvalue Moments for Linear Multiuser Detection Asymptotic Eigenvalue Moments for Linear Multiuser Detection Linbo Li and Antonia M Tulino and Sergio Verdú Department of Electrical Engineering Princeton University Princeton, NJ 08544, USA flinbo, atulino,

More information

Performance Regions in Compressed Sensing from Noisy Measurements

Performance Regions in Compressed Sensing from Noisy Measurements Performance egions in Compressed Sensing from Noisy Measurements Junan Zhu and Dror Baron Department of Electrical and Computer Engineering North Carolina State University; aleigh, NC 27695, USA Email:

More information

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications Professor M. Chiang Electrical Engineering Department, Princeton University March

More information

Approximate Minimum Bit-Error Rate Multiuser Detection

Approximate Minimum Bit-Error Rate Multiuser Detection Approximate Minimum Bit-Error Rate Multiuser Detection Chen-Chu Yeh, Renato R. opes, and John R. Barry School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 30332-0250

More information

DETECTION theory deals primarily with techniques for

DETECTION theory deals primarily with techniques for ADVANCED SIGNAL PROCESSING SE Optimum Detection of Deterministic and Random Signals Stefan Tertinek Graz University of Technology turtle@sbox.tugraz.at Abstract This paper introduces various methods for

More information

Explosive Percolation in Erdős-Rényi-Like Random Graph Processes

Explosive Percolation in Erdős-Rényi-Like Random Graph Processes Explosive Percolation in Erdős-Rényi-Like Random Graph Processes Konstantinos Panagiotou a,1 Reto Spöhel a,1,4 Angelika Steger b,2 Henning Thomas b,2,3 a Max Planck Institute for Informatics, 66123 Saarbrücken,

More information

Performance of Reduced-Rank Linear Interference Suppression

Performance of Reduced-Rank Linear Interference Suppression 1928 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 5, JULY 2001 Performance of Reduced-Rank Linear Interference Suppression Michael L. Honig, Fellow, IEEE, Weimin Xiao, Member, IEEE Abstract The

More information

Performance of DS-CDMA Systems With Optimal Hard-Decision Parallel Interference Cancellation

Performance of DS-CDMA Systems With Optimal Hard-Decision Parallel Interference Cancellation 2918 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 11, NOVEMBER 2003 Performance of DS-CDMA Systems With Optimal Hard-Decision Parallel Interference Cancellation Remco van der Hofstad Marten J.

More information

Supelec Randomness in Wireless Networks: how to deal with it?

Supelec Randomness in Wireless Networks: how to deal with it? Supelec Randomness in Wireless Networks: how to deal with it? Mérouane Debbah Alcatel-Lucent Chair on Flexible Radio merouane.debbah@supelec.fr The performance dilemma... La théorie, c est quand on sait

More information

On the Optimality of Treating Interference as Noise in Competitive Scenarios

On the Optimality of Treating Interference as Noise in Competitive Scenarios On the Optimality of Treating Interference as Noise in Competitive Scenarios A. DYTSO, D. TUNINETTI, N. DEVROYE WORK PARTIALLY FUNDED BY NSF UNDER AWARD 1017436 OUTLINE CHANNEL MODEL AND PAST WORK ADVANTAGES

More information

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

A simple branching process approach to the phase transition in G n,p

A simple branching process approach to the phase transition in G n,p A simple branching process approach to the phase transition in G n,p Béla Bollobás Department of Pure Mathematics and Mathematical Statistics Wilberforce Road, Cambridge CB3 0WB, UK b.bollobas@dpmms.cam.ac.uk

More information

Almost giant clusters for percolation on large trees

Almost giant clusters for percolation on large trees for percolation on large trees Institut für Mathematik Universität Zürich Erdős-Rényi random graph model in supercritical regime G n = complete graph with n vertices Bond percolation with parameter p(n)

More information

Eigenvalues and Singular Values of Random Matrices: A Tutorial Introduction

Eigenvalues and Singular Values of Random Matrices: A Tutorial Introduction Random Matrix Theory and its applications to Statistics and Wireless Communications Eigenvalues and Singular Values of Random Matrices: A Tutorial Introduction Sergio Verdú Princeton University National

More information

Lecture I: Asymptotics for large GUE random matrices

Lecture I: Asymptotics for large GUE random matrices Lecture I: Asymptotics for large GUE random matrices Steen Thorbjørnsen, University of Aarhus andom Matrices Definition. Let (Ω, F, P) be a probability space and let n be a positive integer. Then a random

More information

Diversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels

Diversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels Diversity-Fidelity Tradeo in Transmission o Analog Sources over MIMO Fading Channels Mahmoud Taherzadeh, Kamyar Moshksar and Amir K. Khandani Coding & Signal Transmission Laboratory www.cst.uwaterloo.ca

More information

Introduction to binary block codes

Introduction to binary block codes 58 Chapter 6 Introduction to binary block codes In this chapter we begin to study binary signal constellations, which are the Euclidean-space images of binary block codes. Such constellations have nominal

More information

Graph-Based Decoding in the Presence of ISI

Graph-Based Decoding in the Presence of ISI 1 Graph-Based Decoding in the Presence of ISI Mohammad H. Taghavi and Paul H. Siegel Center for Magnetic Recording Research University of California, San Diego La Jolla, CA 92093-0401, USA Email: (mtaghavi,

More information

MULTICARRIER code-division multiple access (MC-

MULTICARRIER code-division multiple access (MC- IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 479 Spectral Efficiency of Multicarrier CDMA Antonia M. Tulino, Member, IEEE, Linbo Li, and Sergio Verdú, Fellow, IEEE Abstract We

More information

Multi User Detection I

Multi User Detection I January 12, 2005 Outline Overview Multiple Access Communication Motivation: What is MU Detection? Overview of DS/CDMA systems Concept and Codes used in CDMA CDMA Channels Models Synchronous and Asynchronous

More information

BASICS OF DETECTION AND ESTIMATION THEORY

BASICS OF DETECTION AND ESTIMATION THEORY BASICS OF DETECTION AND ESTIMATION THEORY 83050E/158 In this chapter we discuss how the transmitted symbols are detected optimally from a noisy received signal (observation). Based on these results, optimal

More information

Near-Optimal Detection in MIMO Systems using Gibbs Sampling

Near-Optimal Detection in MIMO Systems using Gibbs Sampling ear-optimal Detection in MIMO Systems using Gibbs Sampling Morten Hansen, Babak Hassibi, Alexandros G. Dimakis, and Weiyu Xu arxiv:090.6v [cs.it] 8 Oct 009 Technical University of Denmark, Informatics

More information

Modulation & Coding for the Gaussian Channel

Modulation & Coding for the Gaussian Channel Modulation & Coding for the Gaussian Channel Trivandrum School on Communication, Coding & Networking January 27 30, 2017 Lakshmi Prasad Natarajan Dept. of Electrical Engineering Indian Institute of Technology

More information

Maximum union-free subfamilies

Maximum union-free subfamilies Maximum union-free subfamilies Jacob Fox Choongbum Lee Benny Sudakov Abstract An old problem of Moser asks: how large of a union-free subfamily does every family of m sets have? A family of sets is called

More information

Direct-Sequence Spread-Spectrum

Direct-Sequence Spread-Spectrum Chapter 3 Direct-Sequence Spread-Spectrum In this chapter we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously.

More information

Multiuser Receivers, Random Matrices and Free Probability

Multiuser Receivers, Random Matrices and Free Probability Multiuser Receivers, Random Matrices and Free Probability David N.C. Tse Department of Electrical Engineering and Computer Sciences University of California Berkeley, CA 94720, USA dtse@eecs.berkeley.edu

More information

Random Geometric Graphs

Random Geometric Graphs Random Geometric Graphs Mathew D. Penrose University of Bath, UK Networks: stochastic models for populations and epidemics ICMS, Edinburgh September 2011 1 MODELS of RANDOM GRAPHS Erdos-Renyi G(n, p):

More information

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Michael R. Souryal and Huiqing You National Institute of Standards and Technology Advanced Network Technologies Division Gaithersburg,

More information

2. As we shall see, we choose to write in terms of σ x because ( X ) 2 = σ 2 x.

2. As we shall see, we choose to write in terms of σ x because ( X ) 2 = σ 2 x. Section 5.1 Simple One-Dimensional Problems: The Free Particle Page 9 The Free Particle Gaussian Wave Packets The Gaussian wave packet initial state is one of the few states for which both the { x } and

More information

Multiuser Detection of Sparsely Spread CDMA

Multiuser Detection of Sparsely Spread CDMA SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS Multiuser Detection of Sparsely Spread CDMA Dongning Guo, Member, IEEE, and Chih-Chun Wang, Member, IEEE Abstract Code-division multiple access

More information

A Combinatorial Optimization Problem in Wireless Communications and Its Analysis

A Combinatorial Optimization Problem in Wireless Communications and Its Analysis A Combinatorial Optimization Problem in Wireless Communications and Its Analysis Ralf R. Müller EE Dept, NTNU Benjamin Zaidel Tel Aviv Rodrigo de Miguel SINTEF, Trondheim Vesna Gardašević EE Dept, NTNU

More information

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:

More information

MMSE Dimension. snr. 1 We use the following asymptotic notation: f(x) = O (g(x)) if and only

MMSE Dimension. snr. 1 We use the following asymptotic notation: f(x) = O (g(x)) if and only MMSE Dimension Yihong Wu Department of Electrical Engineering Princeton University Princeton, NJ 08544, USA Email: yihongwu@princeton.edu Sergio Verdú Department of Electrical Engineering Princeton University

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

arxiv: v4 [cs.it] 17 Oct 2015

arxiv: v4 [cs.it] 17 Oct 2015 Upper Bounds on the Relative Entropy and Rényi Divergence as a Function of Total Variation Distance for Finite Alphabets Igal Sason Department of Electrical Engineering Technion Israel Institute of Technology

More information

18.2 Continuous Alphabet (discrete-time, memoryless) Channel

18.2 Continuous Alphabet (discrete-time, memoryless) Channel 0-704: Information Processing and Learning Spring 0 Lecture 8: Gaussian channel, Parallel channels and Rate-distortion theory Lecturer: Aarti Singh Scribe: Danai Koutra Disclaimer: These notes have not

More information

The Least Degraded and the Least Upgraded Channel with respect to a Channel Family

The Least Degraded and the Least Upgraded Channel with respect to a Channel Family The Least Degraded and the Least Upgraded Channel with respect to a Channel Family Wei Liu, S. Hamed Hassani, and Rüdiger Urbanke School of Computer and Communication Sciences EPFL, Switzerland Email:

More information

: Error Correcting Codes. December 2017 Lecture 10

: Error Correcting Codes. December 2017 Lecture 10 0368307: Error Correcting Codes. December 017 Lecture 10 The Linear-Programming Bound Amnon Ta-Shma and Dean Doron 1 The LP-bound We will prove the Linear-Programming bound due to [, 1], which gives an

More information

Large System Analysis of Projection Based Algorithms for the MIMO Broadcast Channel

Large System Analysis of Projection Based Algorithms for the MIMO Broadcast Channel Large System Analysis of Projection Based Algorithms for the MIMO Broadcast Channel Christian Guthy and Wolfgang Utschick Associate Institute for Signal Processing, Technische Universität München Joint

More information

Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems!

Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Steven J. Miller (MC 96) http://www.williams.edu/mathematics/sjmiller/public_html Yale University, April 14, 2014 Introduction Goals of the

More information

On the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels

On the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels On the Performance of 1 Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels arxiv:0711.1295v1 [cs.it] 8 Nov 2007 Emanuele Viterbo and Yi Hong Abstract The Golden space-time trellis

More information

Computing Probability of Symbol Error

Computing Probability of Symbol Error Computing Probability of Symbol Error I When decision boundaries intersect at right angles, then it is possible to compute the error probability exactly in closed form. I The result will be in terms of

More information

Computational Learning Theory. CS534 - Machine Learning

Computational Learning Theory. CS534 - Machine Learning Computational Learning Theory CS534 Machine Learning Introduction Computational learning theory Provides a theoretical analysis of learning Shows when a learning algorithm can be expected to succeed Shows

More information

Performance of small signal sets

Performance of small signal sets 42 Chapter 5 Performance of small signal sets In this chapter, we show how to estimate the performance of small-to-moderate-sized signal constellations on the discrete-time AWGN channel. With equiprobable

More information

A quantum walk based search algorithm, and its optical realisation

A quantum walk based search algorithm, and its optical realisation A quantum walk based search algorithm, and its optical realisation Aurél Gábris FJFI, Czech Technical University in Prague with Tamás Kiss and Igor Jex Prague, Budapest Student Colloquium and School on

More information

List Decoding: Geometrical Aspects and Performance Bounds

List Decoding: Geometrical Aspects and Performance Bounds List Decoding: Geometrical Aspects and Performance Bounds Maja Lončar Department of Information Technology Lund University, Sweden Summer Academy: Progress in Mathematics for Communication Systems Bremen,

More information

Induced subgraphs with many repeated degrees

Induced subgraphs with many repeated degrees Induced subgraphs with many repeated degrees Yair Caro Raphael Yuster arxiv:1811.071v1 [math.co] 17 Nov 018 Abstract Erdős, Fajtlowicz and Staton asked for the least integer f(k such that every graph with

More information

Statistical Mechanics of MAP Estimation: General Replica Ansatz

Statistical Mechanics of MAP Estimation: General Replica Ansatz 1 Statistical Mechanics of MAP Estimation: General Replica Ansatz Ali Bereyhi, Ralf R. Müller, and Hermann Schulz-Baldes arxiv:1612.01980v2 [cs.it 23 Oct 2017 Abstract The large-system performance of maximum-a-posterior

More information

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract

More information

Two Applications of the Gaussian Poincaré Inequality in the Shannon Theory

Two Applications of the Gaussian Poincaré Inequality in the Shannon Theory Two Applications of the Gaussian Poincaré Inequality in the Shannon Theory Vincent Y. F. Tan (Joint work with Silas L. Fong) National University of Singapore (NUS) 2016 International Zurich Seminar on

More information

Random Matrix Theory Lecture 1 Introduction, Ensembles and Basic Laws. Symeon Chatzinotas February 11, 2013 Luxembourg

Random Matrix Theory Lecture 1 Introduction, Ensembles and Basic Laws. Symeon Chatzinotas February 11, 2013 Luxembourg Random Matrix Theory Lecture 1 Introduction, Ensembles and Basic Laws Symeon Chatzinotas February 11, 2013 Luxembourg Outline 1. Random Matrix Theory 1. Definition 2. Applications 3. Asymptotics 2. Ensembles

More information

Non-Repetitive Binary Sequences

Non-Repetitive Binary Sequences Reset reproduction of a 1975 paper presented Saturday, October 25, 1975 at the 727th Meeting of the American Mathematical Society, held at the Massachusetts Institute of Technology in Cambridge, Massachusetts.

More information

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Lecture - 19 Multi-User CDMA Uplink and Asynchronous CDMA

More information

A Relation between Conditional and Unconditional Soft Bit Densities of Binary Input Memoryless Symmetric Channels

A Relation between Conditional and Unconditional Soft Bit Densities of Binary Input Memoryless Symmetric Channels A Relation between Conditional and Unconditional Soft Bit Densities of Binary Input Memoryless Symmetric Channels Wolfgang Rave Vodafone Chair Mobile Communications Systems, Technische Universität Dresden

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Supervised Learning: Non-parametric Estimation

Supervised Learning: Non-parametric Estimation Supervised Learning: Non-parametric Estimation Edmondo Trentin March 18, 2018 Non-parametric Estimates No assumptions are made on the form of the pdfs 1. There are 3 major instances of non-parametric estimates:

More information

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider

More information

IInstitute for. Using Power Line Modems Measurements for Degradation Detection on Power Lines

IInstitute for. Using Power Line Modems Measurements for Degradation Detection on Power Lines Using Power Line Modems Measurements for Degradation Detection on Power Lines Florian Gruber, Andreas M. Lehmann, Johannes B. Huber, Ralf Müller Friedrich-Alexander-Universität Erlangen-Nürnberg Institute

More information

Interleave Division Multiple Access. Li Ping, Department of Electronic Engineering City University of Hong Kong

Interleave Division Multiple Access. Li Ping, Department of Electronic Engineering City University of Hong Kong Interleave Division Multiple Access Li Ping, Department of Electronic Engineering City University of Hong Kong 1 Outline! Introduction! IDMA! Chip-by-chip multiuser detection! Analysis and optimization!

More information

Random graphs: Random geometric graphs

Random graphs: Random geometric graphs Random graphs: Random geometric graphs Mathew Penrose (University of Bath) Oberwolfach workshop Stochastic analysis for Poisson point processes February 2013 athew Penrose (Bath), Oberwolfach February

More information

Linear Codes and Syndrome Decoding

Linear Codes and Syndrome Decoding Linear Codes and Syndrome Decoding These notes are intended to be used as supplementary reading to Sections 6.7 9 of Grimaldi s Discrete and Combinatorial Mathematics. The proofs of the theorems are left

More information

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH : Antenna Diversity and Theoretical Foundations of Wireless Communications Wednesday, May 4, 206 9:00-2:00, Conference Room SIP Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes

Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes Huan Yao Lincoln Laboratory Massachusetts Institute of Technology Lexington, MA 02420 yaohuan@ll.mit.edu Gregory

More information

Open Issues on the Statistical Spectrum Characterization of Random Vandermonde Matrices

Open Issues on the Statistical Spectrum Characterization of Random Vandermonde Matrices Open Issues on the Statistical Spectrum Characterization of Random Vandermonde Matrices Giusi Alfano, Mérouane Debbah, Oyvind Ryan Abstract Recently, analytical methods for finding moments of random Vandermonde

More information

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control 962 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control Junshan Zhang, Student Member, IEEE, and Edwin

More information

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random Susceptible-Infective-Removed Epidemics and Erdős-Rényi random graphs MSR-Inria Joint Centre October 13, 2015 SIR epidemics: the Reed-Frost model Individuals i [n] when infected, attempt to infect all

More information

Random Matrices: Beyond Wigner and Marchenko-Pastur Laws

Random Matrices: Beyond Wigner and Marchenko-Pastur Laws Random Matrices: Beyond Wigner and Marchenko-Pastur Laws Nathan Noiry Modal X, Université Paris Nanterre May 3, 2018 Wigner s Matrices Wishart s Matrices Generalizations Wigner s Matrices ij, (n, i, j

More information

On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels

On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels Giuseppe Caire University of Southern California Los Angeles, CA, USA Email: caire@usc.edu Nihar

More information

Capacity of AWGN channels

Capacity of AWGN channels Chapter 3 Capacity of AWGN channels In this chapter we prove that the capacity of an AWGN channel with bandwidth W and signal-tonoise ratio SNR is W log 2 (1+SNR) bits per second (b/s). The proof that

More information

Optimal matching in wireless sensor networks

Optimal matching in wireless sensor networks Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network

More information

ADDITIVE noise is most often represented by a fixed

ADDITIVE noise is most often represented by a fixed IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 947 Maximin Performance of Binary-Input Channels with Uncertain Noise Distributions Andrew L. McKellips, Student Member, IEEE, Sergio Verdú,

More information

A = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1

A = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1 Lecture I jacques@ucsd.edu Notation: Throughout, P denotes probability and E denotes expectation. Denote (X) (r) = X(X 1)... (X r + 1) and let G n,p denote the Erdős-Rényi model of random graphs. 10 Random

More information

arxiv: v1 [math.pr] 24 Sep 2009

arxiv: v1 [math.pr] 24 Sep 2009 A NOTE ABOUT CRITICAL PERCOLATION ON FINITE GRAPHS GADY KOZMA AND ASAF NACHMIAS arxiv:0909.4351v1 [math.pr] 24 Sep 2009 Abstract. In this note we study the the geometry of the largest component C 1 of

More information

ELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals

ELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals ELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals Jingxian Wu Department of Electrical Engineering University of Arkansas Outline Matched Filter Generalized Matched Filter Signal

More information

UC Riverside UC Riverside Previously Published Works

UC Riverside UC Riverside Previously Published Works UC Riverside UC Riverside Previously Published Works Title Soft-decision decoding of Reed-Muller codes: A simplied algorithm Permalink https://escholarship.org/uc/item/5v71z6zr Journal IEEE Transactions

More information

Coding over Interference Channels: An Information-Estimation View

Coding over Interference Channels: An Information-Estimation View Coding over Interference Channels: An Information-Estimation View Shlomo Shamai Department of Electrical Engineering Technion - Israel Institute of Technology Information Systems Laboratory Colloquium

More information

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Pramod Viswanath and Venkat Anantharam {pvi, ananth}@eecs.berkeley.edu EECS Department, U C Berkeley CA 9470 Abstract The sum capacity of

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 6, JUNE Or equivalently, the Welch Bound Equality (WBE) [19] codes.

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 6, JUNE Or equivalently, the Welch Bound Equality (WBE) [19] codes. IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 6, JUNE 2009 2705 A Class of Errorless Codes for Overloaded Synchronous Wireless and Optical CDMA Systems Pedram Pad, Student Member, IEEE, Farokh Marvasti,

More information

GRAPHS CONTAINING TRIANGLES ARE NOT 3-COMMON

GRAPHS CONTAINING TRIANGLES ARE NOT 3-COMMON GRAPHS CONTAINING TRIANGLES ARE NOT 3-COMMON JAMES CUMMINGS AND MICHAEL YOUNG Abstract. A finite graph G is k-common if the minimum (over all k- colourings of the edges of K n) of the number of monochromatic

More information

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble 1 Average Coset Weight Distributions of Gallager s LDPC Code Ensemble Tadashi Wadayama Abstract In this correspondence, the average coset eight distributions of Gallager s LDPC code ensemble are investigated.

More information

Phase Transitions of Random Codes and GV-Bounds

Phase Transitions of Random Codes and GV-Bounds Phase Transitions of Random Codes and GV-Bounds Yun Fan Math Dept, CCNU A joint work with Ling, Liu, Xing Oct 2011 Y. Fan (CCNU) Phase Transitions of Random Codes and GV-Bounds Oct 2011 1 / 36 Phase Transitions

More information

Multiuser Capacity in Block Fading Channel

Multiuser Capacity in Block Fading Channel Multiuser Capacity in Block Fading Channel April 2003 1 Introduction and Model We use a block-fading model, with coherence interval T where M independent users simultaneously transmit to a single receiver

More information