On the Symbol Asynchronous Gaussian Multiple-Access Channel

Size: px
Start display at page:

Download "On the Symbol Asynchronous Gaussian Multiple-Access Channel"

Transcription

1 On the Symbol Asynchronous Gaussian Multiple-Access Channel Hon-Fah Chong and Mehul Motani Department of Electrical and Computer Engineering ational University of Singapore, Singapore Abstract We consider the symbol asynchronous Gaussian multiple access channel in which each user is allowed to linearly modulate a set of orthogonal waveforms and the symbol periods for each user are not aligned at the receiver This models the case in which asynchronous users may employ quadrature signaling in a multiple access scenario The case in which each user is only allowed to linearly modulate a fixed waveform in each symbol period was considered by Verdu He explicitly evaluated the capacity region of this class of multiple access channels for the case the transmitters know the symbol period offset and also extended it to the case the transmitters have no knowledge of the offset In this paper, we characterize the capacity region for the scenario in which each user is allowed to modulate K orthogonal waveforms and the users know the symbol period offset We note that the orthogonal waveforms need not be identical for both users Similar to the case each user is allowed to modulate a fixed waveform, the result holds regardless of whether or not the transmitters are frameasynchronous I ITRODUCTIO In the information-theoretic study of multiple access channels MAC, there are two types of asynchronism that may occur, namely, frame asynchronism and symbol asynchronism In discrete MAC, frame asynchronism occurs when the codewords for the different users are not aligned at the receiver as shown in Fig The frame offset is an integer satisfying <, is the frame/block length For continuous-time waveform MAC, besides the possibility of frame asynchronism, symbol asynchronism may also occur when the symbol periods for the different users are not aligned at the receiver A two-user MAC is said to be frame synchronous and symbol asynchronous if the offset between the two frames is less than a symbol period see Fig The capacity region of the discrete memoryless MAC DM- MAC with frame synchronism was completely characterized by Ahlswede ] and Liao ] in the early 97s and is given by the following: Theorem : The capacity region of a DMMAC X X, p y x, x, Y is the closure of the convex hull of all R, R satisfying R < I X ; Y X R < I X ; Y X R R < I X X ; Y 3 for some product distribution p x p x on X X Fig Frame asynchronous discrete MAC roof: Refer to proof of 3, Theorem 53] Cover 4] and Wyner 5] gave an explicit expression for the capacity region of the memoryless Gaussian MAC with both frame and symbol synchronism The capacity region is given by the pentagon satisfying R < log 4 R < log 5 R R < log 6 is the power constraint on sender and is the power constraint on sender The restriction of frame synchronism was first removed for the DMMAC by Cover, McEliece and osner 6] They determined the capacity region of the two-user frame asynchronous DMMAC for the case the offset between the two frames as a fraction of the frame length goes to zero as the frame length increases, ie, as They showed that the capacity region remains unchanged in this case and is given by Theorem oltyrev 7], and Hui and Humblet 8] determined the capacity region of the totally frame asynchronous DMMAC They showed that the effect on the capacity region in this case is the removal of the convex hull operation from Theorem Verdu considered the continuous-time waveform memoryless Gaussian MAC with symbol asynchronism 9] each transmitter is allowed to linearly modulate a fixed signature waveform User j, j {, }, transmits a codeword b j, b j,,b j ] R by sending the signal b j ns j t nt 7 n=

2 Fig Frame synchronous symbol asynchronous continuous-time waveform MAC Fig 3 Quadrature Amplitude Modulation s j t is a fixed signature waveform in the interval, T The channel output is given by y t = b ns t τ nt n= b ns t τ nt n t 8 n= τ, τ, T and n t is white Gaussian noise with power spectral density equal to Verdu first considered the case the transmitters have knowledge of the symbol period offset before extending the result to the case the transmitters have no knowledge of the offset In this paper, we extend the result, the transmitters have knowledge of the symbol period offset at the receiver, to the case each user is allowed to modulate K orthogonal waveforms, instead of only one signature waveform This allows us to model a larger class of asynchronous Gaussian MAC For example, this encompasses the situation each Fig 4 Dual Channel Direct Sequence Spread Spectrum user is allowed to linearly modulate two phase-quadrature carriers in each symbol period and the carrier frequency for each user may be different see Fig 3 This may also encompass the dual channel direct-sequence spread spectrum system In this system, each user has two data streams that linearly modulate two phase-quadrature signals and each stream uses a different spreading code see Fig 4 Even though the two spreading codes for each user may not be orthogonal, from Lemma, the dual channel direct-sequence spread spectrum system is equivalent to the continuous-time waveform MAC each user linearly modulates two orthogonal waveforms Our extension closely follows the approach of Verdu In 9], an explicit expression for the capacity region relied on the evaluation of the eigenvalues of Toeplitz matrices In our case, the extension relies on the evaluation of the eigenvalues of block Toeplitz matrices rather than Toeplitz matrices Hence, we will also give some relevant background information on the spectrum of Hermitian block Toeplitz matrices The paper is organized as follows: In Section II, we first introduce some of the mathematical preinaries necessary to understand the paper In Section III, we review some of the results in 9] In Section IV, we describe the channel model and also the equivalent channel model with discrete time outputs In Section V, we describe the main result, Theorem 4, for the case transmitters have knowledge of the mutual offset In Section VI, we show that the capacity region given in Theorem 4 is obtained with stationary inputs Hence, the same capacity region also holds for the case the transmitters are frame-asynchronous In Section VII, we give the main details of the proof of our main result II MATHEMATICAL RELIMIARIES In this section, we give a brief review of some results on the spectrum of Hermitian block Toeplitz matrices ] A otation and preinary considerations We denote by R the set of real numbers, by C the set of complex numbers and by H K K the set of Hermitian matrices of size K K In the following, we will only consider Lebesgue-integrable Hermitian matrix-valued functions defined almost every over the interval Q =, π If A is a square matrix, we denote by A F its Frobenius norm In addition, if A H K K, we indicate by λ k A, k =,,, K, all the eigenvalues of A, counted with their multiplicities, numbered in non-decreasing order We also indicate by σ A the spectrum of A, ie, the set of eigenvalues of A It is again understood that each eigenvalue is counted according to its multiplicity For p, we denote by L p Q, H K K the Banach space of all K K Hermitian matrix-valued functions which are p-integrable on Q, that is, f L p Q, H K K f θ H K K and f p L = p π Q f θ p F dθ < We also denote

3 by L Q, H K K the Banach space of Hermitian matrixvalued functions which are essentially bounded over Q, ie, f is measurable and f L = inf {y R : f θ F < y for ae θ Q} < 9 B Asymptotic spectra of Hermitian block Toeplitz matrices A Hermitian matrix T has a block Toeplitz structure with K K blocks if A A A T = A A CK K A A A with A n C K K, A n = A n We consider the case the blocks A n are the Fourier coefficients of a K K Hermitian matrix-valued function f : Q H K K, which is integrable on Q, that is f L Q, H K K and A n = π f θe înθ dθ, n =, ±, ±, î is the imaginary unit The integration is understood to be carried out on each entry of the K K matrix For every natural number, we associate the block Toeplitz matrix with the Hermitian matrix-valued function f, and we say that {T } is the set of block Toeplitz matrices generated by f Each matrix T has a block Toeplitz structure and each block is a K K matrix with complex entries no structure is imposed upon these blocks If f : Q H K K is a Hermitian matrix-valued measurable function such that f θ has real eigenvalues, for Q Q, we set inf f = Q sup {y R : λ f θ > y for almost every θ Q } 3 sup f = Q { inf y R : λ K f θ < y for almost every θ Q } 4 Theorem : Suppose that f L Q, H K K, and let {T } be the set of Hermitian block Toeplitz matrices generated by f Then, for any natural number, if λ is an eigenvalue of T, it holds that inf f λ sup f 5 Q roof: Refer to proof of, Theorem 3] Q Theorem 3: Suppose that f L Q, H K K and that {T } is the set of block Toeplitz matrices generated by f; then for any function F, continuous on the interval inf f, supf], the following holds: K K l= F λ l T = π K K F λ k f θdθ roof: Refer to proof of, Theorem 33] III A REVIEW OF AST RESULTS Verdu first considered the frame synchronous and symbol asynchronous Gaussian MAC each user knows the symbol period offset In addition, each user is allowed to linearly modulate a fixed waveform s j t, j {, }, of unit energy defined on the interval, T Hence, the channel output is given by 8 subject to the power constraint n= b j n j, j {, } 6 n= ext, Verdu obtained a discrete channel model with an equivalent channel capacity by considering the projection of the channel output y t along the direction of the signals s j t, j {, }, and their T -shifts, ie, y j n = ntτj ntτ j y ts j t nt τ j dt 7 By defining the cross correlations between the assigned waveforms as follows assuming without loss of generality that τ τ : ρ = ρ = T T s ts t τ τ dt 8 s ts t T τ τ dt 9 the equivalent discrete MAC can be expressed as b n b n b n Y = R b n b n b n R is given by ρ ρ ρ R = ρ ρ ρ ρ ρ ρ

4 and the noise vector is Gaussian with zero-mean and covariance matrix R Verdu then made use of the iting characterization of the discrete MAC with memory, Theorem 3] to characterize the capacity of this channel The channel capacity of the frame synchronous and symbol asynchronous Gaussian MAC is given by C = R, R R R R R S R jθ, θ Q π π Sjθdθ=j j {,} log S θ σ log S θ σ log S θ dθ 3 dθ 4 S θ S θs θ ρ ρ ρ ρ cosθ σ 4 dθ 5 Finally, Verdu extended the result to the case each user does not know the symbol period offset Each user only knows that the cross correlation coefficients belong to an uncertainty set Ψ = {ρ, ρ }, ρ, ρ depends on the symbol period offset and on the fixed waveform chosen by each user In this case, the capacity region is given by C = R, R 6 S R jθ, θ Q π π Sjθdθ=j j {,} R log S θ dθ 7 R log S θ dθ 8 π R R inf log S θ ρ,ρ Ψ S θ S θs θ ρ ρ ρ ρ cosθ dθ σ 4 9 For both cases the transmitters know the symbol period offset and the transmitters only have knowledge of the uncertainty set Ψ, the channel capacities are achieved with stationary inputs Hence, the channel capacities for both cases also hold regardless of whether the transmitters are frame asynchronous or not In this paper, we will only consider the case the transmitters know the symbol period offset However, each user is allowed to modulate K orthogonal waveforms instead of only one fixed waveform and the set of K waveforms need Fig 5 Cross correlation coefficients between waveform k for first user and waveform k for the second user not be identical for both users Our proof follows along the lines of the proof of Verdu and we will give the relevant extensions necessary IV CHAEL MODEL For simplicity of notation, we denote n as an element taking values in the set {,,, }, j as an element taking values in the set {, }, and k and k as elements taking values in the set {,,, K} In this paper, we assume the two-user scenario in which user j linearly modulates each of its K orthogonal waveforms s jk t The waveforms occupy the symbol period, T and are assumed to be of unit energy The symbol periods for the K orthogonal waveforms are also assumed to be aligned for each user Hence, we can write the channel output as follows: y t = n= k=k n= n= k=k n= b k ns k t nt τ b k ns k t nt τ n t 3 τ, τ, T, n t is white Gaussian noise with power spectral density equal to and b k n, b k n R satisfying K n= n= k=k b jk n j 3 We obtain an equivalent model with discrete time outputs by passing the received waveform through a matched filter for each of the signals s jk t as follows: ntτj y jk n = y ts jk t nt τ j dt 3 ntτ j { } n= The discrete outputs obtained, {y k n} k=k and { } n= n= {y k n} k=k, are sufficient statistics for the transmitted messages See 9, g 735] or ] Since the K assigned n= waveforms for each user are assumed to be orthogonal, we only need to define the cross correlations between assigned waveforms for different users Referring to Fig 5, we may define the cross correlation coefficients as follows assume that τ τ : α kk = T s k ts k t τ τ dt 33

5 T ρ kk = s k ts k t T τ τ dt 34 For compactness of description, let us define the matrices, α = α kk ] and ρ = ρ kk ], in R K K We also denote X n, X n, n, n, Y n and Y n as column vectors in R K We define X n, X n, Y n and Y n as follows: X n = b n,b n,, b K n] T 35 X n = b n,b n,, b K n] T 36 Y n = y n,y n,, y K n] T 37 Y n = y n,y n,, y K n] T 38 It is easy to verify that the -block asynchronous Gaussian MAC, Y = Y T, Y T,, Y T, Y T] T, can be written as follows: X X X Y = M X 39 X X I K denotes the identity matrix of size K and the noise vector is Gaussian with zero-mean and covariance matrix M and M is given by I K α α T I K ρ ρ T I K α M = α T I K ρ I K α T 4 α We note that the noise sequence thus obtained is correlated However, to invoke, Theorem 3] for the iting characterization for capacity regions of discrete MAC with memory, we need the outputs to be conditionally independent given the inputs Following the Gram-Schmidt orthonormalization procedure, we can obtain an equivalent discrete MAC Refer to Appendix A, with the same capacity region and the noise process is independent Hence, we can directly make use of coding theorems the outputs are conditionally independent given the inputs V CAACITY REGIO Theorem 4: When the transmitters know the mutual offset, the capacity region of the energy-constrained asynchronous Gaussian MAC, each user has K orthogonal waveforms I K to transmit, is given by C = R R R R S jk θ, θ Q R π K π K S jk θdθ= j j {,} K K R, R 4 log S k θ dθ 4 log S k θ dθ 43 K log S k θ S k θ S k θ S k θ d k θ σ 4 dθ 44 d k θ, k = {,,, K} and θ Q are the eigenvalues of the following Hermitian matrix: Γθ = αα T ρρ T αρ T eîθ ρα T e îθ 45 Remark : We note that Γ is a Hermitian matrix-valued function Γ : Q H K K Hence, for every, there is an associated block Toeplitz matrix generated by Γ See Section II VI ACHIEVABILITY OF THE CAACITY REGIO BY STATIOARY IUTS We assume that the inputs to channel 39 are stationary Gaussian processes the power spectral density matrices S j θ, j {, }, are non-negative definite Hermitian matrices satisfying π π The mutual information rates are given by K trs j θ] dθ j 46 I X ; Y X = log det I K σ S θ ] dθ 47 I X ; Y X = log det I K σ S θ ] dθ 48 I X X ; Y = log det I K ] ] S θ O K B θ dθ O K S θ 49

6 B θ = I K α T ρ T eîθ ] α ρe îθ I K 5 and O K denotes the zero matrix of size K K We note that it is difficult to obtain a closed form expression directly as in 9, 39] However, we may perform singular value decomposition to α T ρ T eîθ as follows: α T ρ T eîθ = UθDθV θ 5 Dθ is the diagonal matrix of the square roots of the eigenvalues of Γθ Using the orthogonality of Uθ and V θ, we can express the determinant in the rate-sum constraint as det I K ] ]] Λ θ O K IK Dθ 5 Λ θ Dθ I K O K we have set Λ θ = V θs θvθ and Λ θ = U θs θuθ As singular value decomposition is a continuous and wellbehaved function of its matrix argument see 3, Section 3], we note that S j θ is a continuous function of θ as long as Λ j θ is a continuous function of θ In addition, S j θ for a fixed θ is a non-negative definite matrix if and only if Λ j θ is a non-negative definite matrix Finally, 46 is satisfied if and only if π π K trλ j θ] dθ j 53 is satisfied Hence, for a real and non-negative diagonal matrix Λ j θ satisfying 53, j {, } and θ Q, we have = = = I X ; Y X K log I X ; Y X K log I X X ; Y K log Λ k θ Λ k θ Λ k θ dθ 54 dθ 55 Λ k θ Λ k θ Λ k θ d k θ σ 4 d k θ are the eigenvalues of Γθ and π dθ 56 k=k Λ jk θdθ j 57 K Since the capacity region is achieved with stationary inputs, Theorem 4 holds also for the case the transmitters are frame asynchronous VII ROOF OF THE CAACITY REGIO The transmitters know the actual symbol period offset at the receiver and hence, the exact cross-correlation matrices α and ρ ext, let us define the following vectors: X = X T, X T,, X T] T 58 X = X T, X T,, X T] T 59 X = X T, X T,, X T, X T] T 6 As the capacity region of the asynchronous Gaussian MAC is equivalent to a discrete MAC with memory the outputs are conditionally independent given the inputs,, Theorem 3] is applicable in evaluating the capacity region of the asynchronous Gaussian MAC Hence, a iting characterization for the capacity region of the asynchronous Gaussian MAC is given by C = closure inf C 6 with C = R R I X ; Y X, R : R I X ; Y X X R,X R I X X ; Y 6 X and X are independent random variables satisfying E ] Xj T Xj j We can bound the first two terms in 6 as follows: 63 I X ; Y X I X ; Y X log det I K σ ] Σ log det I K σ ] Σ 64 Σ and Σ represents the covariance matrices of X and X, respectively We note from 39 that the output covariance matrix is given by ME X X T] M M Hence, we can also bound the third term as follows: I X X ; Y log det I K σ E X X T] M ] = log det I K ] ]] Σ O K IK S T O K Σ S I K 65 S is given by S = I α ρ 66 and denotes the Kronecker product The equality above follows along the lines of the proof of the identity in 9,

7 Lemma ] Refer to Lemma in Appendix B for the proof that the equality still holds true in our present case by replacing the scalars ρ and ρ in 9, Lemma ] with their equivalent K K matrices α and ρ, respectively ext, we can perform singular value decomposition to the matrix S = UDV, U and V are orthogonal matrices and D is a diagonal matrix of the singular values {d l } l=k l= of S T S, which is given by αα T αρ T ρα T αα T ρρ T αρ T αρ T 67 ρα T αα T ρρ T After obtaining 65, we can proceed exactly as follows in 9, g ] to obtain C = R, R 68 R R K φ jl, l={,,,k} l=k K l= φ jl j j {,} R K R l= log l= K l= log φ l log φ l φ l φ l φ lφ l σ 4 d l 69 We note that the imization over all matrices of size K is now reduced to a imization over all diagonal matrices of size K Since C is convex, each of the areto-optimal rate pairs rate pairs on the boundary of the region in C satisfy αr α R = R,R C φ jl l=k K l= φ jl j j {,}, l={,,,k} φ jl l=k K l= φ jl j j {,}, l={,,,k} l=k l= l=k l= f φ l,φ l,d l, if α f φ l,φ l,d l, if α 7 f z, z, d = α log z αlog z z z z d 7 f z, z, d = αlog z α log z z z z d 7 If we fix α, following the -dimensional optimization in 9, Appendix IV], we have φ jl, l={,,,k} l=k K l= φ jl j j {,} l= l=k f φ l, φ l, d l l= = l=k f γ d l, β, β,γ d l, β, β, d l = l=k g d l, β, β 73 l= β j, j {, }, are scalar positives Lagrange multipliers in the K-dimensional optimization problem and γ j d l, β, β are continuous functions of d l such that See proof of 9, Lemma 3] l=k γ j d l, β, β = j K 74 l= Following the same approach with the convex set C, given in Theorem 4, for every α, each of its areto-optimal pair attains R,R C αr αr = Φ jk θ R K π Q K Φ jk θdθ j j {,}, θ Q k=k Q f Φ k θ, Φ k θ,d k θdθ 75 and for every α, each of its areto-optimal pair attains R,R C αr αr = Φ jk θ R K π Q K Φ jk θdθ j j {,}, θ Q k=k Q f Φ k θ, Φ k θ,d k θdθ 76 d k θ, k = {,,, K}, are the eigenvalues of the Hermitian matrix Γθ By fixing α, and proceeding as in the Kdimensional optimization, we have αr αr R,R C = d σγθ g d, β, β dθ 77

8 β, and β are positive scalars Lagrange multipliers of the infinite-dimensional optimization problem such that π γ j d, β, β dθ = j, j = {, } π K σ d σγθ 78 ext, instead of considering the singular values of S T S, we can consider { } the singular values of the block Toeplitz matrix l=k T, ˆdl, obtained by substituting the first K K l= entries with αα T ρρ T It is indeed valid to carry this replacement because T and S T S differ only in the first K K entries Thus, they are equivalent asymptotically and since g, β, β and γ j, β, β are continuous functions, { } l=k their averages evaluated at {d l } l=k l= and ˆdl coincide l= as 4, Corollary ] We note that the sequence of symmetric, block Toeplitz matrices, {T }, can be generated by the K K Hermitian matrix-valued function Γ We can readily check that the functions Γ, γ j and g satisfy the conditions of Theorem 3 Hence, for every fixed positive pair β, β, we have the following: = = π g d l, β, β d l σt π g d, β, β dθ 79 d σγθ γ j d l, β, β K d l σt π γ j d, β, β dθ, j = {, } K d σγθ This completes the proof of the capacity region 8 AEDIX A EQUIVALET DISCRETE MAC WITH IDEEDET OISE ROCESS We first state the following theorem necessary to obtain the equivalent discrete MAC model with independent noise process: Lemma : Given K finite-energy functions {s k t} k=k, ie, T s k t dt <, defined on, T, there exists M K orthonormal functions {φ m t} m= defined on, T, ie, { T, k m φ k tφ m tdt = δ km = 8, k = m such that every function in the set {s k t} k=k can be represented in the form s k t = m= s km φ m t, k {,,, K} 8 for each k and m, s km = T s k tφ m tdt roof: Refer to 5, g 63] ext, we define the following waveforms: s L k t = { s k t, t, τ τ, t τ τ, T s R k t = {, t, τ τ s k t, t τ τ, T s L k t = { s k t T τ τ, t, τ τ, t τ τ, T s R k t = {, t, τ τ s k t τ τ, t τ τ, T k {,,, K} see also Fig 5 From Lemma, there exists M L orthonormal functions { φ L m t } L m= defined on, T such that every function in the set { { } } j= k=k s L jk t can be represented in the form j= L s L jk t = m= s L jkm φl m t, j {, }; k {,,, K} 87 for each j, k and m, s L jkm = T sl jk tφl m tdt Similarly, there exists M R orthonormal functions } m {φ Rm t =MR defined on, T such that every m = { { } } j= k=k function in the set s R jk t can be represented j= in the form s R jk t = m =M R m = s R jkm φr t, j {, }; k {,,, K} m 88 for each j, k and m, s R = T jkm sr jk tφr tdt m The channel output can then be written as y t = n= k=k n= n= k=k n= n= k=k n= n= k=k n= L b k n m= L b k n m= L b k n L b k n m= s L km φl m t nt τ s R km φr m t nt τ m= s L km φl m t nt τ s R kmφ R m t nt τ n t 89 We then obtain an equivalent model with discrete time outputs by passing the received waveform through a matched filter for

9 each of the signals φ L m t and φ R t as follows: m y L m n = ntτ ntτ y tφ L m t nt τ dt, m {,,, M L } 9 ntτ y R m n = y tφ R m t nt τ dt, ntτ m {,,, M R } 9 It is easy to verify that the noise process thus obtained is conditionally independent given the inputs Lemma : AEDIX B ROOF OF LEMMA det I K σ E X X T] M ] ] ]] = det I K σ Σ O K IK S T O K Σ S I K 9 roof: Let us assume that A, B, C, D are matrices with elements in R K K and is a matrix with elements in R K K If we assume that the Kronecker product is carried out entry by entry and that the multiplication of the elements is taken to be the matrix multiplication of the elements, it is then straightforward see also 9, Appendix II] to check that A ] IK O K B O K O K D ] OK I K O K O K ] OK O K = I K O K ] OK O C K O K I K ] A B C D T 93 is the permutation matrix whose only non-o K entries are n = I K, n =,, 94 j n = I K, n =,, 95 Therefore, we have E X X T] ] ] IK O = Σ K OK O Σ O K O K K O K I K ] Σ O = K O K Σ T ] ] IK O M = J K OK O J O K O K K O K I K ] ] S T OK O K OK I S K I K O K O K O K ] IK S = T S I T 96 K O K We note that is also unitary in our present case and we obtain det I K σ E X X T] M ] ] ] ] = det I K σ Σ O K IK S T O K Σ S I T K ] ]] = det I K σ T Σ O K IK S T O K Σ S I K ] ]] = det I K σ Σ O K IK S T O K Σ S I K REFERECES 97 ] R Ahlswede, The capacity region of a channel with two senders and two receivers, Annals robabil, vol, no 5, pp 85 84, 974 ] H Liao, Multiple access channels, hd dissertation 3] T M Cover and J A Thomas, Elements of Information Theory Wiley Interscience, 6 4] T M Cover, Some advances in broadcast channels, Advances in Communication Systems, vol 4, pp 9 6, 975 5] A D Wyner, Recent results in the Shannon Theory, IEEE Trans Inform Theory, vol, no, pp, Jan 974 6] T Cover, R McEliece and E osner, Asynchronous multiple-access channel capacity, IEEE Trans Inform Theory, vol 7, no 4, pp 49 43, July 98 7] G S oltyrev, Coding in an asynchronous multiple-access channel, roblems Inform Transmission, pp, July-Sept 983 8] J Hui and Humblet, The capacity region of the totally asynchronous multiple-access channel, IEEE Trans Inform Theory, vol 3, no, pp 7 6, Mar 985 9] S Verdu, The Capacity Region of the Symbol-Asynchronous Gaussian Multiple-Access Channel, IEEE Trans Inform Theory, vol 35, no 4, pp , July 989 ] M Miranda and Tilli, Asymptotic Spectra of Hermitian Block Toeplitz Matrices and reconditioning Results, SIAM J Matrix Anal Appl, vol, no 3, pp , Feb ] S Verdu, Multiple-Access Channels with Memory with and without Frame-Synchronism, IEEE Trans Inform Theory, vol 35, no 3, pp 65 69, May 989 ] E L Lehmann, Testing Statistical Hypothesis ew York: Wiley, 959 3] A A Maciejewski and C A Klein, The singular value decomposition: Computation and applications to robotics, The Int l Journ Robotics Res, vol 8, no 6, pp 63 79, Dec 989 4] R M Gray, On the Asymptotic Eigenvalue Distribution of Toeplitz Matrices, IEEE Trans Inform Theory, vol IT-8, no 6, pp 75 73, ov 97 5] J G roakis, Digital Communications McGraw-Hill International Edition, J is a matrix with entries in R K K all the diagonal entries are I K and the rest of the entries are

A Comparison of Two Achievable Rate Regions for the Interference Channel

A Comparison of Two Achievable Rate Regions for the Interference Channel A Comparison of Two Achievable Rate Regions for the Interference Channel Hon-Fah Chong, Mehul Motani, and Hari Krishna Garg Electrical & Computer Engineering National University of Singapore Email: {g030596,motani,eleghk}@nus.edu.sg

More information

Lecture 7 MIMO Communica2ons

Lecture 7 MIMO Communica2ons Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10

More information

Transmitter optimization for distributed Gaussian MIMO channels

Transmitter optimization for distributed Gaussian MIMO channels Transmitter optimization for distributed Gaussian MIMO channels Hon-Fah Chong Electrical & Computer Eng Dept National University of Singapore Email: chonghonfah@ieeeorg Mehul Motani Electrical & Computer

More information

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Pramod Viswanath and Venkat Anantharam {pvi, ananth}@eecs.berkeley.edu EECS Department, U C Berkeley CA 9470 Abstract The sum capacity of

More information

Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages

Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages Degrees of Freedom Region of the Gaussian MIMO Broadcast hannel with ommon and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and omputer Engineering University of Maryland, ollege

More information

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels Mehdi Mohseni Department of Electrical Engineering Stanford University Stanford, CA 94305, USA Email: mmohseni@stanford.edu

More information

A Summary of Multiple Access Channels

A Summary of Multiple Access Channels A Summary of Multiple Access Channels Wenyi Zhang February 24, 2003 Abstract In this summary we attempt to present a brief overview of the classical results on the information-theoretic aspects of multiple

More information

Multiuser Capacity in Block Fading Channel

Multiuser Capacity in Block Fading Channel Multiuser Capacity in Block Fading Channel April 2003 1 Introduction and Model We use a block-fading model, with coherence interval T where M independent users simultaneously transmit to a single receiver

More information

FRAMES IN QUANTUM AND CLASSICAL INFORMATION THEORY

FRAMES IN QUANTUM AND CLASSICAL INFORMATION THEORY FRAMES IN QUANTUM AND CLASSICAL INFORMATION THEORY Emina Soljanin Mathematical Sciences Research Center, Bell Labs April 16, 23 A FRAME 1 A sequence {x i } of vectors in a Hilbert space with the property

More information

The following definition is fundamental.

The following definition is fundamental. 1. Some Basics from Linear Algebra With these notes, I will try and clarify certain topics that I only quickly mention in class. First and foremost, I will assume that you are familiar with many basic

More information

Shannon meets Wiener II: On MMSE estimation in successive decoding schemes

Shannon meets Wiener II: On MMSE estimation in successive decoding schemes Shannon meets Wiener II: On MMSE estimation in successive decoding schemes G. David Forney, Jr. MIT Cambridge, MA 0239 USA forneyd@comcast.net Abstract We continue to discuss why MMSE estimation arises

More information

The Poisson Channel with Side Information

The Poisson Channel with Side Information The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH

More information

Diagonalizing Matrices

Diagonalizing Matrices Diagonalizing Matrices Massoud Malek A A Let A = A k be an n n non-singular matrix and let B = A = [B, B,, B k,, B n ] Then A n A B = A A 0 0 A k [B, B,, B k,, B n ] = 0 0 = I n 0 A n Notice that A i B

More information

12.4 Known Channel (Water-Filling Solution)

12.4 Known Channel (Water-Filling Solution) ECEn 665: Antennas and Propagation for Wireless Communications 54 2.4 Known Channel (Water-Filling Solution) The channel scenarios we have looed at above represent special cases for which the capacity

More information

Optimal Natural Encoding Scheme for Discrete Multiplicative Degraded Broadcast Channels

Optimal Natural Encoding Scheme for Discrete Multiplicative Degraded Broadcast Channels Optimal Natural Encoding Scheme for Discrete Multiplicative Degraded Broadcast Channels Bike ie, Student Member, IEEE and Richard D. Wesel, Senior Member, IEEE Abstract Certain degraded broadcast channels

More information

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Pramod Viswanath, Venkat Anantharam and David.C. Tse {pvi, ananth, dtse}@eecs.berkeley.edu

More information

A Formulation of the Channel Capacity of Multiple-Access Channel

A Formulation of the Channel Capacity of Multiple-Access Channel 1 A Formulation of the Channel Capacity of Multiple-Access Channel Yoichiro Watanabe, Member, IEEE and Koichi Kamoi, Member, IEEE arxiv:07081037v1 [csit] 8 Aug 2007 Abstract The necessary and sufficient

More information

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 6 8, 2005 Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters Alkan

More information

Multiplicativity of Maximal p Norms in Werner Holevo Channels for 1 < p 2

Multiplicativity of Maximal p Norms in Werner Holevo Channels for 1 < p 2 Multiplicativity of Maximal p Norms in Werner Holevo Channels for 1 < p 2 arxiv:quant-ph/0410063v1 8 Oct 2004 Nilanjana Datta Statistical Laboratory Centre for Mathematical Sciences University of Cambridge

More information

Lecture 1: The Multiple Access Channel. Copyright G. Caire 12

Lecture 1: The Multiple Access Channel. Copyright G. Caire 12 Lecture 1: The Multiple Access Channel Copyright G. Caire 12 Outline Two-user MAC. The Gaussian case. The K-user case. Polymatroid structure and resource allocation problems. Copyright G. Caire 13 Two-user

More information

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012 Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications

More information

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:

More information

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints Upper Bounds on IO Channel Capacity with Channel Frobenius Norm Constraints Zukang Shen, Jeffrey G. Andrews, Brian L. Evans Wireless Networking Communications Group Department of Electrical Computer Engineering

More information

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway

More information

When does vectored Multiple Access Channels (MAC) optimal power allocation converge to an FDMA solution?

When does vectored Multiple Access Channels (MAC) optimal power allocation converge to an FDMA solution? When does vectored Multiple Access Channels MAC optimal power allocation converge to an FDMA solution? Vincent Le Nir, Marc Moonen, Jan Verlinden, Mamoun Guenach Abstract Vectored Multiple Access Channels

More information

Recursions for the Trapdoor Channel and an Upper Bound on its Capacity

Recursions for the Trapdoor Channel and an Upper Bound on its Capacity 4 IEEE International Symposium on Information heory Recursions for the rapdoor Channel an Upper Bound on its Capacity obias Lutz Institute for Communications Engineering echnische Universität München Munich,

More information

Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels

Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels 2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 49, NO 10, OCTOBER 2003 Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels Sriram Vishwanath, Student Member, IEEE, Nihar

More information

Advanced Digital Signal Processing -Introduction

Advanced Digital Signal Processing -Introduction Advanced Digital Signal Processing -Introduction LECTURE-2 1 AP9211- ADVANCED DIGITAL SIGNAL PROCESSING UNIT I DISCRETE RANDOM SIGNAL PROCESSING Discrete Random Processes- Ensemble Averages, Stationary

More information

REPRESENTATION THEORY WEEK 7

REPRESENTATION THEORY WEEK 7 REPRESENTATION THEORY WEEK 7 1. Characters of L k and S n A character of an irreducible representation of L k is a polynomial function constant on every conjugacy class. Since the set of diagonalizable

More information

Multi User Detection I

Multi User Detection I January 12, 2005 Outline Overview Multiple Access Communication Motivation: What is MU Detection? Overview of DS/CDMA systems Concept and Codes used in CDMA CDMA Channels Models Synchronous and Asynchronous

More information

A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources

A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources Wei Kang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College

More information

Appendix B Information theory from first principles

Appendix B Information theory from first principles Appendix B Information theory from first principles This appendix discusses the information theory behind the capacity expressions used in the book. Section 8.3.4 is the only part of the book that supposes

More information

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels Representation of Correlated s into Graphs for Transmission over Broadcast s Suhan Choi Department of Electrical Eng. and Computer Science University of Michigan, Ann Arbor, MI 80, USA Email: suhanc@eecs.umich.edu

More information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information SUBMIED O IEEE INERNAIONAL SYMPOSIUM ON INFORMAION HEORY, DE. 23 1 Optimal Power Allocation for Parallel Gaussian Broadcast hannels with Independent and ommon Information Nihar Jindal and Andrea Goldsmith

More information

Lecture 3: QR-Factorization

Lecture 3: QR-Factorization Lecture 3: QR-Factorization This lecture introduces the Gram Schmidt orthonormalization process and the associated QR-factorization of matrices It also outlines some applications of this factorization

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 4, APRIL

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 4, APRIL IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 4, APRIL 2006 1545 Bounds on Capacity Minimum EnergyPerBit for AWGN Relay Channels Abbas El Gamal, Fellow, IEEE, Mehdi Mohseni, Student Member, IEEE,

More information

1 Math 241A-B Homework Problem List for F2015 and W2016

1 Math 241A-B Homework Problem List for F2015 and W2016 1 Math 241A-B Homework Problem List for F2015 W2016 1.1 Homework 1. Due Wednesday, October 7, 2015 Notation 1.1 Let U be any set, g be a positive function on U, Y be a normed space. For any f : U Y let

More information

On Comparability of Multiple Antenna Channels

On Comparability of Multiple Antenna Channels On Comparability of Multiple Antenna Channels Majid Fozunbal, Steven W. McLaughlin, and Ronald W. Schafer School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA 30332-0250

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Direct-Sequence Spread-Spectrum

Direct-Sequence Spread-Spectrum Chapter 3 Direct-Sequence Spread-Spectrum In this chapter we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously.

More information

Discrete Simulation of Power Law Noise

Discrete Simulation of Power Law Noise Discrete Simulation of Power Law Noise Neil Ashby 1,2 1 University of Colorado, Boulder, CO 80309-0390 USA 2 National Institute of Standards and Technology, Boulder, CO 80305 USA ashby@boulder.nist.gov

More information

Non Orthogonal Multiple Access for 5G and beyond

Non Orthogonal Multiple Access for 5G and beyond Non Orthogonal Multiple Access for 5G and beyond DIET- Sapienza University of Rome mai.le.it@ieee.org November 23, 2018 Outline 1 5G Era Concept of NOMA Classification of NOMA CDM-NOMA in 5G-NR Low-density

More information

Bounds on fast decodability of space-time block codes, skew-hermitian matrices, and Azumaya algebras

Bounds on fast decodability of space-time block codes, skew-hermitian matrices, and Azumaya algebras Bounds on fast decodability of space-time block codes, skew-hermitian matrices, and Azumaya algebras Grégory Berhuy, Nadya Markin, and B. A. Sethuraman 1 Abstract We study fast lattice decodability of

More information

Chapter 3 Transformations

Chapter 3 Transformations Chapter 3 Transformations An Introduction to Optimization Spring, 2014 Wei-Ta Chu 1 Linear Transformations A function is called a linear transformation if 1. for every and 2. for every If we fix the bases

More information

On Gaussian MIMO Broadcast Channels with Common and Private Messages

On Gaussian MIMO Broadcast Channels with Common and Private Messages On Gaussian MIMO Broadcast Channels with Common and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 ersen@umd.edu

More information

Toeplitz matrices. Niranjan U N. May 12, NITK, Surathkal. Definition Toeplitz theory Computational aspects References

Toeplitz matrices. Niranjan U N. May 12, NITK, Surathkal. Definition Toeplitz theory Computational aspects References Toeplitz matrices Niranjan U N NITK, Surathkal May 12, 2010 Niranjan U N (NITK, Surathkal) Linear Algebra May 12, 2010 1 / 15 1 Definition Toeplitz matrix Circulant matrix 2 Toeplitz theory Boundedness

More information

Cognitive Multiple Access Networks

Cognitive Multiple Access Networks Cognitive Multiple Access Networks Natasha Devroye Email: ndevroye@deas.harvard.edu Patrick Mitran Email: mitran@deas.harvard.edu Vahid Tarokh Email: vahid@deas.harvard.edu Abstract A cognitive radio can

More information

Linear Algebra (Review) Volker Tresp 2018

Linear Algebra (Review) Volker Tresp 2018 Linear Algebra (Review) Volker Tresp 2018 1 Vectors k, M, N are scalars A one-dimensional array c is a column vector. Thus in two dimensions, ( ) c1 c = c 2 c i is the i-th component of c c T = (c 1, c

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,

More information

On Riesz-Fischer sequences and lower frame bounds

On Riesz-Fischer sequences and lower frame bounds On Riesz-Fischer sequences and lower frame bounds P. Casazza, O. Christensen, S. Li, A. Lindner Abstract We investigate the consequences of the lower frame condition and the lower Riesz basis condition

More information

Linear Algebra Massoud Malek

Linear Algebra Massoud Malek CSUEB Linear Algebra Massoud Malek Inner Product and Normed Space In all that follows, the n n identity matrix is denoted by I n, the n n zero matrix by Z n, and the zero vector by θ n An inner product

More information

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications Professor M. Chiang Electrical Engineering Department, Princeton University March

More information

WE study the capacity of peak-power limited, single-antenna,

WE study the capacity of peak-power limited, single-antenna, 1158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 3, MARCH 2010 Gaussian Fading Is the Worst Fading Tobias Koch, Member, IEEE, and Amos Lapidoth, Fellow, IEEE Abstract The capacity of peak-power

More information

5958 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010

5958 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 5958 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 Capacity Theorems for Discrete, Finite-State Broadcast Channels With Feedback and Unidirectional Receiver Cooperation Ron Dabora

More information

IN this paper, we show that the scalar Gaussian multiple-access

IN this paper, we show that the scalar Gaussian multiple-access 768 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 5, MAY 2004 On the Duality of Gaussian Multiple-Access and Broadcast Channels Nihar Jindal, Student Member, IEEE, Sriram Vishwanath, and Andrea

More information

An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel

An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 8-3, An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel Invited Paper Bernd Bandemer and

More information

Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels

Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels Özgür Oyman ), Rohit U. Nabar ), Helmut Bölcskei 2), and Arogyaswami J. Paulraj ) ) Information Systems Laboratory, Stanford

More information

MATHEMATICS 217 NOTES

MATHEMATICS 217 NOTES MATHEMATICS 27 NOTES PART I THE JORDAN CANONICAL FORM The characteristic polynomial of an n n matrix A is the polynomial χ A (λ) = det(λi A), a monic polynomial of degree n; a monic polynomial in the variable

More information

Lecture Notes 1: Vector spaces

Lecture Notes 1: Vector spaces Optimization-based data analysis Fall 2017 Lecture Notes 1: Vector spaces In this chapter we review certain basic concepts of linear algebra, highlighting their application to signal processing. 1 Vector

More information

TOEPLITZ OPERATORS. Toeplitz studied infinite matrices with NW-SE diagonals constant. f e C :

TOEPLITZ OPERATORS. Toeplitz studied infinite matrices with NW-SE diagonals constant. f e C : TOEPLITZ OPERATORS EFTON PARK 1. Introduction to Toeplitz Operators Otto Toeplitz lived from 1881-1940 in Goettingen, and it was pretty rough there, so he eventually went to Palestine and eventually contracted

More information

Degrees of Freedom of a Communication Channel: Using Generalised Singular Values

Degrees of Freedom of a Communication Channel: Using Generalised Singular Values Degrees of Freedom of a Communication Channel: Using Generalised Singular Values Ram Somaraju and Jochen Trumpf Abstract arxiv:0901.1694v1 [cs.it] 13 Jan 2009 A fundamental problem in any communication

More information

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of

More information

EE 574 Detection and Estimation Theory Lecture Presentation 8

EE 574 Detection and Estimation Theory Lecture Presentation 8 Lecture Presentation 8 Aykut HOCANIN Dept. of Electrical and Electronic Engineering 1/14 Chapter 3: Representation of Random Processes 3.2 Deterministic Functions:Orthogonal Representations For a finite-energy

More information

Math 396. An application of Gram-Schmidt to prove connectedness

Math 396. An application of Gram-Schmidt to prove connectedness Math 396. An application of Gram-Schmidt to prove connectedness 1. Motivation and background Let V be an n-dimensional vector space over R, and define GL(V ) to be the set of invertible linear maps V V

More information

A First Course in Digital Communications

A First Course in Digital Communications A First Course in Digital Communications Ha H. Nguyen and E. Shwedyk February 9 A First Course in Digital Communications 1/46 Introduction There are benefits to be gained when M-ary (M = 4 signaling methods

More information

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels Feedback Capacity of a Class of Symmetric Finite-State Markov Channels Nevroz Şen, Fady Alajaji and Serdar Yüksel Department of Mathematics and Statistics Queen s University Kingston, ON K7L 3N6, Canada

More information

arxiv: v1 [cs.na] 6 Jan 2017

arxiv: v1 [cs.na] 6 Jan 2017 SPECTRAL STATISTICS OF LATTICE GRAPH STRUCTURED, O-UIFORM PERCOLATIOS Stephen Kruzick and José M. F. Moura 2 Carnegie Mellon University, Department of Electrical Engineering 5000 Forbes Avenue, Pittsburgh,

More information

Preliminary/Qualifying Exam in Numerical Analysis (Math 502a) Spring 2012

Preliminary/Qualifying Exam in Numerical Analysis (Math 502a) Spring 2012 Instructions Preliminary/Qualifying Exam in Numerical Analysis (Math 502a) Spring 2012 The exam consists of four problems, each having multiple parts. You should attempt to solve all four problems. 1.

More information

Information Theory for Wireless Communications, Part II:

Information Theory for Wireless Communications, Part II: Information Theory for Wireless Communications, Part II: Lecture 5: Multiuser Gaussian MIMO Multiple-Access Channel Instructor: Dr Saif K Mohammed Scribe: Johannes Lindblom In this lecture, we give the

More information

Random Access: An Information-Theoretic Perspective

Random Access: An Information-Theoretic Perspective Random Access: An Information-Theoretic Perspective Paolo Minero, Massimo Franceschetti, and David N. C. Tse Abstract This paper considers a random access system where each sender can be in two modes of

More information

Math 102, Winter Final Exam Review. Chapter 1. Matrices and Gaussian Elimination

Math 102, Winter Final Exam Review. Chapter 1. Matrices and Gaussian Elimination Math 0, Winter 07 Final Exam Review Chapter. Matrices and Gaussian Elimination { x + x =,. Different forms of a system of linear equations. Example: The x + 4x = 4. [ ] [ ] [ ] vector form (or the column

More information

INFORMATION-THEORETIC BOUNDS OF EVOLUTIONARY PROCESSES MODELED AS A PROTEIN COMMUNICATION SYSTEM. Liuling Gong, Nidhal Bouaynaya and Dan Schonfeld

INFORMATION-THEORETIC BOUNDS OF EVOLUTIONARY PROCESSES MODELED AS A PROTEIN COMMUNICATION SYSTEM. Liuling Gong, Nidhal Bouaynaya and Dan Schonfeld INFORMATION-THEORETIC BOUNDS OF EVOLUTIONARY PROCESSES MODELED AS A PROTEIN COMMUNICATION SYSTEM Liuling Gong, Nidhal Bouaynaya and Dan Schonfeld University of Illinois at Chicago, Dept. of Electrical

More information

Digital Image Processing

Digital Image Processing Digital Image Processing 2D SYSTEMS & PRELIMINARIES Hamid R. Rabiee Fall 2015 Outline 2 Two Dimensional Fourier & Z-transform Toeplitz & Circulant Matrices Orthogonal & Unitary Matrices Block Matrices

More information

Review of some mathematical tools

Review of some mathematical tools MATHEMATICAL FOUNDATIONS OF SIGNAL PROCESSING Fall 2016 Benjamín Béjar Haro, Mihailo Kolundžija, Reza Parhizkar, Adam Scholefield Teaching assistants: Golnoosh Elhami, Hanjie Pan Review of some mathematical

More information

1 Coherent-Mode Representation of Optical Fields and Sources

1 Coherent-Mode Representation of Optical Fields and Sources 1 Coherent-Mode Representation of Optical Fields and Sources 1.1 Introduction In the 1980s, E. Wolf proposed a new theory of partial coherence formulated in the space-frequency domain. 1,2 The fundamental

More information

5.6. PSEUDOINVERSES 101. A H w.

5.6. PSEUDOINVERSES 101. A H w. 5.6. PSEUDOINVERSES 0 Corollary 5.6.4. If A is a matrix such that A H A is invertible, then the least-squares solution to Av = w is v = A H A ) A H w. The matrix A H A ) A H is the left inverse of A and

More information

Sobolev Duals of Random Frames

Sobolev Duals of Random Frames Sobolev Duals of Random Frames C. Sinan Güntürk, Mark Lammers, 2 Alex Powell, 3 Rayan Saab, 4 Özgür Yılmaz 4 Courant Institute of Mathematical Sciences, New York University, NY, USA. 2 University of North

More information

Cooperative Communication with Feedback via Stochastic Approximation

Cooperative Communication with Feedback via Stochastic Approximation Cooperative Communication with Feedback via Stochastic Approximation Utsaw Kumar J Nicholas Laneman and Vijay Gupta Department of Electrical Engineering University of Notre Dame Email: {ukumar jnl vgupta}@ndedu

More information

Simultaneous SDR Optimality via a Joint Matrix Decomp.

Simultaneous SDR Optimality via a Joint Matrix Decomp. Simultaneous SDR Optimality via a Joint Matrix Decomposition Joint work with: Yuval Kochman, MIT Uri Erez, Tel Aviv Uni. May 26, 2011 Model: Source Multicasting over MIMO Channels z 1 H 1 y 1 Rx1 ŝ 1 s

More information

The Optimality of Beamforming: A Unified View

The Optimality of Beamforming: A Unified View The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,

More information

which arises when we compute the orthogonal projection of a vector y in a subspace with an orthogonal basis. Hence assume that P y = A ij = x j, x i

which arises when we compute the orthogonal projection of a vector y in a subspace with an orthogonal basis. Hence assume that P y = A ij = x j, x i MODULE 6 Topics: Gram-Schmidt orthogonalization process We begin by observing that if the vectors {x j } N are mutually orthogonal in an inner product space V then they are necessarily linearly independent.

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,

More information

Modulation & Coding for the Gaussian Channel

Modulation & Coding for the Gaussian Channel Modulation & Coding for the Gaussian Channel Trivandrum School on Communication, Coding & Networking January 27 30, 2017 Lakshmi Prasad Natarajan Dept. of Electrical Engineering Indian Institute of Technology

More information

Applied Linear Algebra in Geoscience Using MATLAB

Applied Linear Algebra in Geoscience Using MATLAB Applied Linear Algebra in Geoscience Using MATLAB Contents Getting Started Creating Arrays Mathematical Operations with Arrays Using Script Files and Managing Data Two-Dimensional Plots Programming in

More information

On the Capacity Region of the Gaussian Z-channel

On the Capacity Region of the Gaussian Z-channel On the Capacity Region of the Gaussian Z-channel Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@eng.umd.edu ulukus@eng.umd.edu

More information

08a. Operators on Hilbert spaces. 1. Boundedness, continuity, operator norms

08a. Operators on Hilbert spaces. 1. Boundedness, continuity, operator norms (February 24, 2017) 08a. Operators on Hilbert spaces Paul Garrett garrett@math.umn.edu http://www.math.umn.edu/ garrett/ [This document is http://www.math.umn.edu/ garrett/m/real/notes 2016-17/08a-ops

More information

Power Spectral Density of Digital Modulation Schemes

Power Spectral Density of Digital Modulation Schemes Digital Communication, Continuation Course Power Spectral Density of Digital Modulation Schemes Mikael Olofsson Emil Björnson Department of Electrical Engineering ISY) Linköping University, SE-581 83 Linköping,

More information

Vector spaces. DS-GA 1013 / MATH-GA 2824 Optimization-based Data Analysis.

Vector spaces. DS-GA 1013 / MATH-GA 2824 Optimization-based Data Analysis. Vector spaces DS-GA 1013 / MATH-GA 2824 Optimization-based Data Analysis http://www.cims.nyu.edu/~cfgranda/pages/obda_fall17/index.html Carlos Fernandez-Granda Vector space Consists of: A set V A scalar

More information

On the Low-SNR Capacity of Phase-Shift Keying with Hard-Decision Detection

On the Low-SNR Capacity of Phase-Shift Keying with Hard-Decision Detection On the Low-SNR Capacity of Phase-Shift Keying with Hard-Decision Detection ustafa Cenk Gursoy Department of Electrical Engineering University of Nebraska-Lincoln, Lincoln, NE 68588 Email: gursoy@engr.unl.edu

More information

Matrix Factorization and Analysis

Matrix Factorization and Analysis Chapter 7 Matrix Factorization and Analysis Matrix factorizations are an important part of the practice and analysis of signal processing. They are at the heart of many signal-processing algorithms. Their

More information

Parallel Additive Gaussian Channels

Parallel Additive Gaussian Channels Parallel Additive Gaussian Channels Let us assume that we have N parallel one-dimensional channels disturbed by noise sources with variances σ 2,,σ 2 N. N 0,σ 2 x x N N 0,σ 2 N y y N Energy Constraint:

More information

APPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2.

APPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2. APPENDIX A Background Mathematics A. Linear Algebra A.. Vector algebra Let x denote the n-dimensional column vector with components 0 x x 2 B C @. A x n Definition 6 (scalar product). The scalar product

More information

Constellation Shaping for Communication Channels with Quantized Outputs

Constellation Shaping for Communication Channels with Quantized Outputs Constellation Shaping for Communication Channels with Quantized Outputs Chandana Nannapaneni, Matthew C. Valenti, and Xingyu Xiang Lane Department of Computer Science and Electrical Engineering West Virginia

More information

Chapter 8 Integral Operators

Chapter 8 Integral Operators Chapter 8 Integral Operators In our development of metrics, norms, inner products, and operator theory in Chapters 1 7 we only tangentially considered topics that involved the use of Lebesgue measure,

More information

Review problems for MA 54, Fall 2004.

Review problems for MA 54, Fall 2004. Review problems for MA 54, Fall 2004. Below are the review problems for the final. They are mostly homework problems, or very similar. If you are comfortable doing these problems, you should be fine on

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

MULTI-INPUT multi-output (MIMO) channels, usually

MULTI-INPUT multi-output (MIMO) channels, usually 3086 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 57, NO. 8, AUGUST 2009 Worst-Case Robust MIMO Transmission With Imperfect Channel Knowledge Jiaheng Wang, Student Member, IEEE, and Daniel P. Palomar,

More information