A Partial Decode-Forward Scheme For A Network with N relays

Size: px
Start display at page:

Download "A Partial Decode-Forward Scheme For A Network with N relays"

Transcription

1 A Partial Decode-Forward Scheme For A etwork with relays Yao Tag ECE Departmet, McGill Uiversity Motreal, QC, Caada yaotag2@mailmcgillca Mai Vu ECE Departmet, Tufts Uiversity Medford, MA, USA maivu@ecetuftsedu Abstract We study a discrete-memoryless relay etwork cosistig of oe source, oe destiatio ad relays, ad desig a scheme based o partial decode-forward relayig The source splits its message ito oe commo ad 1 private parts, oe iteded for each relay It ecodes these message parts usig th-order block Markov codig, i which each private message part is idepedetly superimposed o the commo parts of the curret ad previous blocks Usig simultaeous slidig widow decodig, each relay fully recovers the commo message ad its iteded private message with the same block idex, the forwards them to the followig odes i the ext block This scheme ca be applied to ay etwork topology We derive its achievable rate i a compact form The result reduces to a kow decode-forward lower boud for a -relay etwork ad partial decode-forward lower boud for a two-level relay etwork We the apply the scheme to a Gaussia two-level relay etwork ad obtai its capacity lower boud cosiderig power costraits at the trasmittig odes I ITRODUCTIO The relay chael first itroduced by va der Meule [1] cosists of a source aimig to commuicate with a destiatio with the help of a relay I [2], Cover ad El Gamal itroduce the cut-set boud ad two codig strategies, amely decodeforward ad compress-forward, for the basic three-ode relay chael By allowig the relay to decode oly a part of the trasmitted message, partial decode-forward ca be cosidered as the geeralizatio of decode-forward [2], [3] I the past few years, substatial research activities have bee dedicated to extedig the classical oe-relay chael to a geeral relay etwork cosistig of commuicatig parties I [4], Gastpar ad Vetterli discuss the asymptotic capacity i the limit as the umber of relays teds to ifiity ad the scalig behavior of capacity for a large class of Gaussia relay etworks Recetly, Lim, Kim, El Gamal ad Chug propose a compress-forward based scheme oisy etwork codig) [5] for the geeral multi-source multicast oisy etwork, which icludes etwork codig [6] as a special case However, it is still uclear how to geeralize decodeforward relayig to the multi-source multicast etwork I [7], Xie ad Kumar aalyze a multiple-level relay chael with oe source ad oe destiatio ad give a achievable rate based o full decode-forward This scheme is exteded i [8], i which all relays successively decode oly part of the messages of the previous relay, ad obtais the capacity of semi-determiistic ad orthogoal relay etworks I [9] ad [1], Ghabeli ad Aref geeralize partial decode-forward M source Fig 1 cloud p y, y,, y x, x,, x ) Geeral discrete memoryless relay etwork Mˆ 1 destiatio i a two-level relay etwork, cosiderig all possible partial decodig coditios that ca occur amog differet message parts of at the source ad the relays There are three commo approaches for the decode-forward strategy, amely: a) irregular ecodig/sequetial decodig; b) regular ecodig/simultaeous slidig widow decodig; c) regular ecodig/backward decodig [11] For semidetermiistic relay etworks [12], the secod ad the third approaches ca achieve the same rate, which is greater tha that of the first approach Furthermore, the secod approach creates less delay tha the third oe I this paper, we propose a ovel trasmissio scheme for a sigle-source sigle-destiatio etwork with relays based o regular ecodig ad simultaeous slidig widow decodig The source splits its message ito oe commo ad 1 private parts ad performs block Markov codig Each relay helps forward the commo part ad the private message part iteded for itself We derive the achievable rate i a compact form ad show that this scheme ca reduce to the etwork decode-forward scheme of [2] ad partial decode-forward for two-level relay etwork i [1] Fially, we aalyze a two-level relay etwork i AWG eviromets ad provide the achievable rate II PRELIMIARIES A Discrete Memoryless etworks Cosider a discrete memoryless relay etwork DM- R) with 2 odes X X 1 X, py 1, y 2,, y x, x 1,, x ), Y 1 Y 2 Y ), where source ode wats to sed a message M to the destiatio ode 1 with the help of relay odes 1,,,

2 U1, Source Ecoder Ecoder Ecoder W1, X1 W2, X2 1 2 U2, U, W U,, U, X, W 1 W1, X1 Ecoder W, X 2 2 W, X Destiatio Decoder Fig 2 The proposed private message scheme for a sigle-source sigledestiatio etwork with relays as show i Figure 1 A 2 R, ) code for this DM-R cosists of: A message set M = [1 : 2 R ] A source ecoder that assigs a codeword x m) to each message m [1 : 2 R ] A set of relay ecoders k [1 : ], which assigs a symbol x ki y i 1 k ) to each received sequece y i 1 k for i [1 : ] A destiatio decoder, which assigs a estimate ˆm to each received sequece y Y, or declares a error message e Defiitios for the average error probability, achievable rate ad capacity follow the stadard oes i [13] B Defiitios ad otatio To make the followig aalysis more cocise ad readable, we itroduce some defiitios ad clarify otatio i this sectio Defie T = {1,, } as the complete set of all relays Defie S to be a subset of T, that is S T ad S c = T S Either S or S c ca be empty ad the largest S is T Deote M j i = {M i, M i1,, M j }, where j i For example, U2 1 meas {U 2, U 3,, U 1 }, where 3 Give oempty set L ad variable M, let M L = {M i } i L = {M a, M b, M c, }, where a, b, c, L ad are differet from each other L sigifies the cardiality of L III A ETWORK PARTIAL DECODE-FORWARD SCHEME Cosider a etwork cosistig of a sigle source, sigle destiatio ad relays as i Figure 2 The source has direct liks to all relays ad to the destiatio, ad coectios amog the relays ad the destiatio are arbitrary We desig a ovel codig scheme for this relay etwork based o partial decode-forward relayig Let all relay odes be ordered i a arbitrary order permutatio π ) I each order, we assume that the kth relay decodes iformatio from all odes below it, ie order {1,, k 1}) ad forwards iformatio to odes above it ie order {k 1,, }) ext, we will describe the scheme for the omial order π = [1, 2,, ] to simplify the otatio, keepig i mid that it ca also be applied to ay other order π The ew idea i this scheme is the way it performs rate splittig At each block trasmissio, the source splits its message ito 2 parts: a commo message ad 1 private messages, oe iteded for each relay ad oe for the destiatio These messages are the ecoded usig th order block Markov codig Each relay fully recovers the commo message ad its iteded private message with same block idex as the commo message, the forwards them together i the ext block Specifically, let the source message i block j be split as m j = m j, m 1j,, m )j ), where m deotes the commo message that is forwarded amog all relays, m k deotes the message iteded to be decoded at relay k, but ot at other relays, ad m deotes the message iteded to be decoded oly at the destiatio The rate is R = i= R i Block Markov superpositio codig is used to geerate the idepedet codewords i each block as follows for simpler otatio we suppress block idex i codewords here, but will iclude it i the detailed proof later) W k, k {} T, carries commo message m,j k of differet blocks W k are successively superimposed o each other as i block Markov ecodig {U k }, k T, carries private message m k to be decoded at relay k ad ot decoded at other relays Each U k is superimposed o all W k X k, k T, is the codeword set by relay k which supports the forwardig of the message i U k of the previous block) ad all W l l k) X is the codeword set by the source which carries all messages icludig the remaiig message m to be decoded oly at the destiatio X is superimposed o all { }, {U1 } ad {X1 } At each block j, the source seds X which cotais all { }, {U1 } ad {X1 } Each relay k decodes {,, W k 1 } from all previous odes ad U k from the source The i block j 1, it trasmits X k which carries its private message of block j k m k,j k ) superimposed o all previous-block commo messages The destiatio uses joit decodig simultaeously over all blocks Specifically, it waits util the ed of the last block to decode all messages carried by { }, {U1 } ad {X } simultaeously usig sigals received i the last blocks This codig scheme is illustrated i Figure 2 Theorem 1 For a sigle-source sigle-destiatio etwork with relays X X 1 X, py 1, y 2,, y x, x 1,, x ), Y 1 Y 2 Y ), by usig partial decode-forward, the capacity C is lower bouded by 1), where π ) deotes a permutatio order for the relay odes Proof: We use a block codig scheme i which each user seds b messages over b blocks of symbols Each relay ad the destiatio employ simultaeous decodig A Codebook geeratio Fix the joit distributio i 2) where the meaig of each compoet is as follows: pw k Wk1 ): at relay k, the curret commo message is superimposed o previous commo messages

3 I ) U1, X, ; Y, C sup sup mi mi I X, X S, U S ; Y X S c, U S c, πt ) p π S πt ) π I ) j S U c πj ; Y πj, X πj where T = {1, 2,, }, πt ) is a permutatio order of T, S is a subset of πt ), ad p π = pu 1, W, X ) = px U 1, W, X 1 ) π π k =π 1 pu πk W, X πk )p W 1 ), j, j x m 1, j m1, j, m, j, mk, jk ) ) miπj S W c I, Wπ πj 1 1 ; Y πj X πj, W π π j k[1: ] π px πk Wπ π k π k =π 1 1) )pw πk W π π k1 ) 2) u m m m, 1 1, j, j 1, j 1 j, j, j, u2 m2, j m, j, m2, j2 u m, j m, j, m, j w m m, j 1, j, j x m m, j 1 1 1, j1, j x m m, j 2 2 2, j2, j x m m, j, j Fig 3 w m m, j 2 1, j1, j w m m, j 3 2, j2, j w m, j Ecodig diagram of a sigle-source sigle-destiatio etwork with relays arrows deote superpositio structure) px k Wk ): at relay k, the curret private message is superimposed o the curret ad previous commo messages p W1 ): at the source, the curret commo message is superimposed o the commo messages of all previous blocks pu k, X k ): at the source, the private message for a specific relay is superimposed o all commo messages ad the previous private message for that relay px U1,, X1 ): at the source, the private message for the destiatio is superimposed o all commo messages ad all private messages for all relays Figure 3 illustrates the superpositio codig structure I block j, the source splits its message as m j = [m,j, m,j,, m 1,j, m,j ] For every relay ode k =,, 1 ad every message set {m,j,, m,j k, m k,j k }: Radomly ad idepedetly geerate 2 R sequeces wk m,j k m,j k 1,j ) for all m,j k [1 : 2 R ], each accordig to i=1 p W k Wk1 w ki w,i k1,i ), Radomly ad idepedetly geerate 2 R k sequeces x k m k,j k m,j k,j ) for all m k,j k [1 : 2 R k ], each accordig to i=1 p X k Wk x ki w,i k,i ) For source ode k = ad each message set m,j,j For all sequece wk m,j k m,j k 1,j ) with k T, radomly ad idepedetly geerate 2 R sequeces w m,j m,j 1,j ) for m,j [1 : 2 R ], each accordig to i=1 p W1 w,i w,i 1,i ), For each k T, radomly ad idepedetly geerate 2 R k sequeces u k m k,j m,j,j, m k,j k) for all m k,j k [1 : 2 R k ], each accordig to i=1 p U k,x u k ki w,i,i, x k,i), Radomly ad idepedetly geerate 2 R sequeces x m,j m,j 1,j, m,j,j, {m k,j k} k T ) for all m,j [1 : 2 R ], each accordig to i=1 p X U1, x i u,i,x 1 1,i, w,i,i, x,i 1,i ) The codebook is idepedetly geerated i each block as above ad the is revealed to all the parties B Ecodig To sed {m,j,, m j } i block j, the source trasmits x m,j m,j 1,j, m,j,j, {m k,j k} k T ) from codebook C j At the ed of block j, each relay k T has a estimate m k,j k1 of message m k,j k1 ad m,j k1 of message m,j k1 I the block j 1, each relay k T trasmits x k m k,j k1, m,j k1,j ) from codebook C j1 C Decodig 1) Simultaeous decodig at the first relay: At the ed of block j, by kowig m,j 1,j ad m 2,j 1, the first relay k = 1 decodes m 1,j ad m,j such that: u 1 m 1,j m,j,j, m 1,j 1), w m,j m,j 1,j ), w 1 m,j 1 m,j 2,j ), x 1 m 1,j 1 m,j 1,j ), w 2, w 3,, w, y 1 j)) T ) ɛ 3)

4 The decodig error probability goes to as, if R 1 < IU 1 ; Y 2 W, X 1 ), 4) R 1 R < IU 1, ; Y 2 X 1, W 1 ) 5) 2) Simultaeous slidig widow decodig at other relays k [2 : ]: At the ed of block j, by kowig m,j k,j k1 ad m k,j k, the relay ode k will decode m k,j k1 ad m,j k1 such that the followig coditios hold simultaeously: wk 1m,j k1 m,j k,j ), w k m,j k m,j k 1,j ), x km k,j k m,j k,j ), w k1, w k2,, w, y k j) ) T ) ɛ w1 m,j k1 m,j k,j k 2 ), w 2,, wk 1, wk, x k, w k1,, w, y k j k 2) ) T ) ɛ u km k,j k1 m,j k1,j k1, m k,j 2k1), w m,j k1 m,j k u,j k1 ), w 1, w 2,, w k 1, x k, w k, w k1,, w, y k j k 1) ) T ) ɛ 6) Therefore, there are k decodig rules to be satisfied simultaeously at relay k The decodig error probability goes to, as, if R k < IU k ; Y k W, X k ), 7) R k R < IU k, W k 1 ; Y k X k, W k ) 8) Detailed error aalysis at relay k is i Appedix A 3) Simultaeous slidig widow decodig at destiatio ode 1: At the ed of block j, the destiatio ode 1 will decode m k,j for all k T { 1} ad m,j such that the followig coditios hold simultaeously: x m,j m,j ), w m,j ), yj) ) T ɛ ) x i1m i1,j m,j,j i ), w i1m,j m,j,j i ), x i1, w i1,, x, w, yj i 1) ) T ɛ ) x 1 m 1,j m,j,j 2 ), w 1 m,j m,j 1,j 2 ), Ad, x 2, w 2,, x, w, y j 1) ) T ) ɛ {u km k,j m,j,j 2, m k,j k)} k T, x m,j m,j 1,j, m,j,j 2, {m k,j k } k T ), w m,j m,j 1,j 2 ), x 1, w 1, x 2, w 2,, x, w, y j ) ) T ) ɛ 9) We have 1 decodig rules to be satisfied simultaeously The decodig error probability goes to, as, if i= R i < IU 1, X, W ; Y ), 1) R i R < IX, X S, U S ; Y X S c, U S c, ), 11) i S R < IX ; Y U 1, X 1, W ), 12) i=1 R i < IU 1, X ; Y W ), 13) where S is a subset of T that cotais wrogly decoded messages at the relay Detailed error aalysis at the destiatio is i Appedix B D Combiatio Process From 1), we ca directly get that: R < IU 1, X, W ; Y ) 14) From 11), 7) ad 8), we get R = R i S ) R i mi R j R ) j S c i S c,i j < IX, X S, U S ; Y X S c, U S c, W ) 15) j 1 mi IW j Sc ; Y j X j, Wj ) IU i ; Y i, X i ), i S c for all S T From 7), 8), 12) ad 13), we get 2R < i=1 mi i,j T R i R R i R ) R j R ) l T,l i,j < IU 1, X ; Y W ) IX ; Y U 1, X 1, W ) j 1 2 mi I ; Y j X j, Wj ) j T 2 i T R l R i IU i ; Y i W, X i ), 16) However, if we let S = i 15) ad double the right-hadside RHS) expressio, the we ca get a smaller expressio tha the RHS of 16) Thus, 16) is redudat After this combiatio process, we get the rate i 1) E Special etworks If = 2, we have the partial decode-ad-forward lower boud for a two-level relay etwork as show i Figure 4, which coicides with the result i [1] For a geeral, if we set private parts U1 = ad m =, we ca get Xie ad Kumar s [7] etwork decodeforward lower boud as show i Figure 5 Furthermore, if = 1, it reduces to the decode-forward lower boud [2] for the discrete-memoryless relay chael DM-RC)

5 Fig 4 U1, Source Ecoder Ecoder Ecoder W 1 Ecoder 1 2 U2, X1, W1 U1, U2, U3, X2, W2 3 Destiatio Decoder Two-level relay etwork with partial-decode-forward Ecoder W W 2 W 1 W 2 Ecoder W where I 1 = log g 2 1φ 2 ) 1 g1 2 β2 2 φ2 2 φ2 3 ) 1, I 4 = 1 2 log 1 g2 2α φ 2 ) 2 g 2 α 1 g 12 α 11 ) 2 ) g 2 β 1 g 12 β 11 ) 2 g2 2 φ2 1 φ2 3 ) 1, g2φ 2 2 ) 2, I 3 = log g 2 β 1 g 12 β 11 ) 2 g2 2 φ2 1 φ2 3 ) 1 I 2 = log g 2 1α 2 φ 2 ) 1) g1 2 β2 2 φ2 2 φ2 3 ) 1, I 5 = 1 2 log 1 g 2 3φ 2 3), W 1 I 6 = 1 2 log 1 g 3 β 1 g 13 β 11 ) 2 g 2 3φ 2 1 φ 2 3) ), Source Ecoder Fig 5 Decode-forward relay etwork Destiatio Decoder I 7 = 1 2 log 1 g 3 β 2 g 23 β 22 ) 2 g 2 3φ 2 2 φ 2 3) ), IV GAUSSIA RELAY ETWORKS The Gaussia relay etwork ca be modeled as k 1 Y k = g ik X i Z k, 17) i= where k T { 1}, g ik is the coefficiet of the lik from ode i to ode j, ad Z k is oise at the decoder with Gaussia distributio, 1) There is a power costrait at each trasmittig ode as P k As show i Figure 4, the Gaussia two-level relay etwork ca be modeled as Y 3 = g 3 X g 13 X 1 g 23 X 2 Z 3, Y 2 = g 2 X g 12 X 1 Z 2, Y 1 = g 1 X Z 1, 18) where Z 3, Z 2 ad Z 1 are idepedet AWG oise accordig to the ormal distributio, 1) The sigalig at each ode ca be writte as x 2 = α 22 W 2 w,j 2 ) β 22 V 2 w 2,j 2 ), x 1 = α 11 W 1 w,j 1 ) α 12 W 2 w,j 2 ) β 11 V 1 w 1,j 1 ), x = α w,j ) α 1 W 1 w,j 1 ) α 2 W 2 w,j 2 ) β 1 V 1 w 1,j 1 ) β 2 V 2 w 2,j 2 ) φ 1 U 1 w 1,j ) φ 2 U 2 w 2,j ) φ 3 U 3 w 3,j ), 19) where W 2, V 2, W 1, V 1,, U 1, U 2, U 3 are idepedet, ormalized Gaussia radom variables, 1); {α, β, φ } are power allocatios satisfyig the followig costraits: α 2 22 β 2 22 = P 2, α 2 11 α 2 12 β 2 11 = P 1, α 2 α 2 1 α 2 2 β 2 1 β 2 2 φ 2 1 φ 2 2 φ 2 3 = P, 2) where P, P 1 ad P 2 are power costraits at the correspodig ode, which ca be set equal to each other without loss of geerality Corollary 1 The capacity for a Gaussia two-level relay etwork i 18) is lower bouded by: C mi {I 1 I 4 I 5, I 2 I 3 I 5, I 2 I 7, I 4 I 6, I 8 }, 21) I 8 = 1 2 log 1 g 2 3P g 2 13P 1 g 2 23P 2 2g 3 g 13 α 1 α 11 α 2 α 12 β 1 β 11 ) 2g 3 g 23 α 2 α 22 β 2 β 22 ) 2g 13 g 23 α 12 α 22 ), ad α ij, β ij, φ ij i {, 1, 2},j {, 1, 2, 3}) are power allocatios satisfyig 2) Proof: Applyig the sigalig i 19) to the rate regio i Theorem 1, we obtai 21) V COCLUSIO I this paper, we cosider partial decode-forward relayig i a sigle-source sigle-destiatio etwork with relays We desig a scheme i which each relay forwards the commo message part ad a specific private part to the followig odes The proof is based o block Markov ecodig ad simultaeous slidig widow decodig The key poit is that each relay decodes ad forwards its private part oly whe the last commo part with the same block idex arrives We the obtai the achievable rate for this scheme, which ca be expressed i a compact form over all cutsets ad permutatios of relays We show that this scheme cotais existig results for a -relay etwork with decode-forward ad a two-level relay etwork with partial decode-forward cosiderig all message splittig cases We the study the Gaussia two-level relay etwork ad derive the achievable rate by the proposed scheme APPEDIX A ERROR AALYSIS AT RELAY k Assume without loss of geerality that m k,j k1, m,j k1 ) = 1, 1) is set i block j We first defie the followig evets: E i m k,j k1, m,j k1 ), for i [1 : k], is whe oly the ith decodig rule is satisfied We simplify the otatio as E i i the followig aalysis Em k,j k1, m,j k1 ) as the evet that all decodig rules are satisfied simultaeously

6 P e P c E c {1}, 1)) P c E{m i,j } i T, m,j, m,j )) m,j 1,{m i,j } i T,m,j P c E{m i,j } i S, {1} Sc, m,j )) 22) m,j =1,{m i,j } i S 1,{m i,j 2 } i S c =1,m,j The, by the uio bouds, the probability of error is bouded as P e P c E c 1, 1)) m,j k1 =1,m k,j k1 1 P c Em k,j k1, 1)) m,j k1 1,m k,j k1 P c Em k,j k1, m,j k1 )), where P c is the coditioal probability give that 1, 1) was set By the law of large umber, P c E c 1, 1)) as By the joit typicality lemma, we have P c Em k,j k1, 1)) m,j k1 =1,m k,j k1 1 2 R k 2 IU k;y k W,X k) δɛ)), which goes to as, if R k < IU k ; Y k W, X k ) δɛ) Accordig to the idepedece of the codebooks ad the joit typicality lemma, m,j k1 1,m k,j k1 P c Em k,j k1, m,j k1 )) = P c mk,j k1 m,j k1 1 E 1 E 2 E k )) P E 1 ) P E 2 ) P E k ) m,j k1 1 m k,j k1 2 R k 2 R 2 IW k 1;Y k X k,w k ) δɛ)) 2 IW k 2;Y k X k,w k 1 ) δɛ)) 2 IW2;Y k X k,w 3 ) δɛ)) 2 IU k,w 1;Y k X k,w 2 ) δɛ)), which teds to as if R k R < IU k, W k 1 1 ; Y k X k, W k ) kδɛ) APPEDIX B ERROR AALYSIS AT DESTIATIO 1 Assume without loss of geerality that {m k,j } k T, m,j, m,j ) = 1, 1,, 1) was set i block j We first defie the followig evets: E i {m k,j } k T, m,j, m,j ), i [1 : 1], as the evet that oly the ith decodig rule is satisfied We simplify the otatio as E i i the followig aalysis E{m k,j } k T, m,j, m,j ) as the evet that all 1 decodig rules are satisfied simultaeously We defie set S to be the set of wrogly decoded private messages ad S c as the set of correctly decoded private messages at the destiatio The, by the uio of evets boud, the probability of error is bouded as i 22), where P c is the coditioal probability give that {m k,j } k T, m,j, m,j ) = 1, 1,, 1) was set By the law of large umber, P c E c {1}, 1)) as It is impossible to correctly decode m,j if ay of {m k,j } k T is t decoded correctly Accordig to the idepedece of codebooks ad the joit typicality lemma, the third term i 22) teds to as if R i R <IX, {X i, U i } i S ; Y {X j, U j } j S c, ) i S S 1)δɛ) Similarly, accordig to the idepedece of codebooks ad the joit typicality lemma, the secod term i 22) teds to as if i=1 R i R < IU 1, X, W ; Y ) 1)δɛ) REFERECES [1] E va der Meule, Three-termial commuicatio chaels, Advaces i Applied Probability, vol 3, o 1, pp , 1971 [2] T Cover ad A El Gamal, Capacity theorems for the relay chael, IEEE Tras o Ifo Theory, vol 25, o 5, pp , 1979 [3] A E Gamal ad M R Aref, The capacity of the semidetermiistic relay chael, IEEE Tras o Ifo Theory, vol 28, o 3, p 536, 1982 [4] M Gastpar ad M Vetterli, O the capacity of large Gaussia relay etworks, IEEE Tras o Ifo Theory, vol 51, o 3, pp , March 25 [5] S H Lim, Y-H Kim, A El Gamal, ad S-Y Chug, oisy etwork codig, IEEE Tras o Ifo Theory, vol 57, o 5, pp , May 211 [6] S-Y R L R Ahlswede, Cai ad R W Yeug, etwork iformatio flow, IEEE Tras o Ifo Theory, vol 46, o 4, pp , July 2 [7] L-L Xie ad P R Kumar, A achievable rate for the multiple level relay chael, IEEE Tras o Ifo Theory, vol 51, o 4, pp , April 25 [8] L Ghabeli ad M R Aref, A ew achievable rate ad the capacity of a class of semidetermiistic relay etworks, i IEEE It l Symp o Ifo Theory ISIT), Jue 27 [9], Simultaeous partial ad backward decodig approach for twolevel relay etworks, i IEEE It l Symp o Ifo Theory ISIT), Jue 29 [1], O achievable rate for relay etworks based o partial decodead-forward, i IEEE It l Symp o Ifo Theory ISIT), Jue 21 [11] G Kramer, M Gastpar, ad P Gupta, Cooperative strategies ad capacity theorems for relay etworks, IEEE Tras o Ifo Theory, vol 51, o 9, pp , Sept 25 [12] L Ghabeli ad M R Aref, Symmertric semidetermiistic relay etworks with o iterferece at the relays, IEEE Tras o Ifo Theory, vol 57, o 9, pp , September 211 [13] A E Gamal ad Y-H Kim, etwork iformatio theory Cambridge Uiversity Press, 211

SUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL

SUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL Joural of Theoretical ad Applied Iformatio Techology 31 st December 212 Vol 46 No2 25-212 JATIT & LLS All rights reserved ISSN: 1992-8645 wwwatitorg E-ISSN: 1817-3195 SCCESSIVE INTERFERENCE CANCELLATION

More information

Overview of Gaussian MIMO (Vector) BC

Overview of Gaussian MIMO (Vector) BC Overview of Gaussia MIMO (Vector) BC Gwamo Ku Adaptive Sigal Processig ad Iformatio Theory Research Group Nov. 30, 2012 Outlie / Capacity Regio of Gaussia MIMO BC System Structure Kow Capacity Regios -

More information

IET Commun., 2009, Vol. 3, Iss. 1, pp doi: /iet-com: & The Institution of Engineering and Technology 2009

IET Commun., 2009, Vol. 3, Iss. 1, pp doi: /iet-com: & The Institution of Engineering and Technology 2009 Published i IET Commuicatios Received o 4th Jue 28 Revised o 3th July 28 doi: 1.149/iet-com:28373 ISSN 1751-8628 Symmetric relayig based o partial decodig ad the capacity of a class of relay etworks L.

More information

A New Achievability Scheme for the Relay Channel

A New Achievability Scheme for the Relay Channel A New Achievability Scheme for the Relay Chael Wei Kag Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 20742 wkag@umd.edu ulukus@umd.edu October 4, 2007

More information

Asymptotic Coupling and Its Applications in Information Theory

Asymptotic Coupling and Its Applications in Information Theory Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM

More information

Cooperative Communication Fundamentals & Coding Techniques

Cooperative Communication Fundamentals & Coding Techniques 3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial

More information

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first

More information

Multiterminal source coding with complementary delivery

Multiterminal source coding with complementary delivery Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2006 Seoul, Korea, October 29 November 1, 2006 Multitermial source codig with complemetary delivery Akisato Kimura ad Tomohiko Uyematsu

More information

Relaying via Hybrid Coding

Relaying via Hybrid Coding 011 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Relayig via Hybrid Codig Youg-Ha Kim Departmet of ECE UCSD La Jolla CA 9093 USA yhk@ucsd.edu Sug Hoo Lim Departmet of EE KAIST Daejeo Korea sughlim@kaist.ac.kr

More information

Hybrid Coding for Gaussian Broadcast Channels with Gaussian Sources

Hybrid Coding for Gaussian Broadcast Channels with Gaussian Sources Hybrid Codig for Gaussia Broadcast Chaels with Gaussia Sources Rajiv Soudararaja Departmet of Electrical & Computer Egieerig Uiversity of Texas at Austi Austi, TX 7871, USA Email: rajivs@mailutexasedu

More information

Entropies & Information Theory

Entropies & Information Theory Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

Information Theory and Coding

Information Theory and Coding Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power

More information

Symmetric Two-User Gaussian Interference Channel with Common Messages

Symmetric Two-User Gaussian Interference Channel with Common Messages Symmetric Two-User Gaussia Iterferece Chael with Commo Messages Qua Geg CSL ad Dept. of ECE UIUC, IL 680 Email: geg5@illiois.edu Tie Liu Dept. of Electrical ad Computer Egieerig Texas A&M Uiversity, TX

More information

Finite Block-Length Gains in Distributed Source Coding

Finite Block-Length Gains in Distributed Source Coding Decoder Fiite Block-Legth Gais i Distributed Source Codig Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umichedu S Sadeep Pradha EECS Departmet Uiversity of Michiga A Arbor,USA

More information

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for

More information

Distortion Bounds for Source Broadcast. Problem

Distortion Bounds for Source Broadcast. Problem Distortio Bouds for Source Broadcast 1 Problem Lei Yu, Houqiag Li, Seior Member, IEEE, ad Weipig Li, Fellow, IEEE Abstract This paper ivestigates the joit source-chael codig problem of sedig a memoryless

More information

Lecture 14: Graph Entropy

Lecture 14: Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number

More information

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit 08 IEEE Iteratioal Symposium o Iformatio Theory ISIT No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L Fog Departmet of Electrical ad Computer Egieerig

More information

Resilient Source Coding

Resilient Source Coding Resiliet Source Codig Maël Le Treust Laboratoire des Sigaux et Systèmes CNRS - Supélec - Uiv. Paris Sud 11 91191, Gif-sur-Yvette, Frace Email: mael.letreust@lss.supelec.fr Samso Lasaulce Laboratoire des

More information

Increasing timing capacity using packet coloring

Increasing timing capacity using packet coloring 003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:

More information

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L. Fog, Jig Yag, ad Ayli Yeer arxiv:805.089v [cs.it] 30 May 08 Abstract A additive white Gaussia

More information

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220 ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part

More information

Daniela Tuninetti University of Illinois, Chicago, IL (USA),

Daniela Tuninetti University of Illinois, Chicago, IL (USA), 1 The IterFerece Chael with Geeralized Feedback IFC-GF) Daiela Tuietti Uiversity of Illiois, Chicago, IL USA), daiela@ece.uic.edu Abstract This work itroduces cooperative commuicatio strategies for IterFerece

More information

arxiv: v1 [cs.it] 13 Jul 2012

arxiv: v1 [cs.it] 13 Jul 2012 O the Sum Capacity of the Discrete Memoryless Iterferece Chael with Oe-Sided Weak Iterferece ad Mixed Iterferece Fagfag Zhu ad Biao Che Syracuse Uiversity Departmet of EECS Syracuse, NY 3244 Email: fazhu{biche}@syr.edu

More information

Lecture 11: Channel Coding Theorem: Converse Part

Lecture 11: Channel Coding Theorem: Converse Part EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig

More information

THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication

THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication Trade-off betwee Commuicatio ad Cooperatio i the Iterferece Chael Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umich.edu S. Sadeep Pradha EECS Departmet Uiversity of Michiga

More information

On Routing-Optimal Network for Multiple Unicasts

On Routing-Optimal Network for Multiple Unicasts O Routig-Optimal Network for Multiple Uicasts Chu Meg, Athia Markopoulou Abstract I this paper, we cosider etworks with multiple uicast sessios. Geerally, o-liear etwork codig is eeded to achieve the whole

More information

The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints

The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints IIT 6, eattle, UA, July 9-4, 6 The Gaussia Multiple Access Wire-Tap Chael with Collective ecrecy Costraits Eder Tei tei@psu.edu Ayli Yeer yeer@ee.psu.edu Wireless Commuicatios ad Networig Laboratory Electrical

More information

Lecture 5: April 17, 2013

Lecture 5: April 17, 2013 TTIC/CMSC 350 Mathematical Toolkit Sprig 203 Madhur Tulsiai Lecture 5: April 7, 203 Scribe: Somaye Hashemifar Cheroff bouds recap We recall the Cheroff/Hoeffdig bouds we derived i the last lecture idepedet

More information

The Three-Terminal Interactive. Lossy Source Coding Problem

The Three-Terminal Interactive. Lossy Source Coding Problem The Three-Termial Iteractive 1 Lossy Source Codig Problem Leoardo Rey Vega, Pablo Piataida ad Alfred O. Hero III arxiv:1502.01359v3 cs.it] 18 Ja 2016 Abstract The three-ode multitermial lossy source codig

More information

The Capacity Per Unit Energy of Large Wireless Networks

The Capacity Per Unit Energy of Large Wireless Networks The Capacity Per Uit Eergy of Large Wireless Networks Sudeep Kamath EECS Departmet, UC Berkeley Berkeley, CA 9470 sudeep@eecs.berkeley.edu Urs Niese Bell Laboratories, Alcatel-Lucet Murray Hill, NJ 07974

More information

On Successive Refinement for the Wyner-Ziv Problem with Partially Cooperating Decoders

On Successive Refinement for the Wyner-Ziv Problem with Partially Cooperating Decoders ISIT 2008, Toroto, Caada, July 6-11, 2008 O Successive Refiemet for the Wyer-Ziv Problem with Partially Cooperatig Decoders Shraga I. Bross ad Tsachy Weissma, School of Egieerig, Bar-Ila Uiversity, Ramat-Ga

More information

Lecture 15: Strong, Conditional, & Joint Typicality

Lecture 15: Strong, Conditional, & Joint Typicality EE376A/STATS376A Iformatio Theory Lecture 15-02/27/2018 Lecture 15: Strog, Coditioal, & Joit Typicality Lecturer: Tsachy Weissma Scribe: Nimit Sohoi, William McCloskey, Halwest Mohammad I this lecture,

More information

BIRKHOFF ERGODIC THEOREM

BIRKHOFF ERGODIC THEOREM BIRKHOFF ERGODIC THEOREM Abstract. We will give a proof of the poitwise ergodic theorem, which was first proved by Birkhoff. May improvemets have bee made sice Birkhoff s orgial proof. The versio we give

More information

On the Optimality of Colour-and-Forward Relaying for a Class of Zero-error Primitive Relay Channels

On the Optimality of Colour-and-Forward Relaying for a Class of Zero-error Primitive Relay Channels O the Optimality of Colour-ad-Forward elayig for a Class of Zero-error Primitive elay Chaels Yayig Che, Natasha Devroye Uiversity of Illiois at Chicago, Chicago IL 60607, USA Email: yche90, devroye @ uic.edu

More information

Generalized Semi- Markov Processes (GSMP)

Generalized Semi- Markov Processes (GSMP) Geeralized Semi- Markov Processes (GSMP) Summary Some Defiitios Markov ad Semi-Markov Processes The Poisso Process Properties of the Poisso Process Iterarrival times Memoryless property ad the residual

More information

Inseparability of the Multiple Access Wiretap Channel

Inseparability of the Multiple Access Wiretap Channel Iseparability of the Multiple Access Wiretap Chael Jiawei Xie Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 074 xiejw@umd.edu ulukus@umd.edu Abstract We

More information

Definitions and Theorems. where x are the decision variables. c, b, and a are constant coefficients.

Definitions and Theorems. where x are the decision variables. c, b, and a are constant coefficients. Defiitios ad Theorems Remember the scalar form of the liear programmig problem, Miimize, Subject to, f(x) = c i x i a 1i x i = b 1 a mi x i = b m x i 0 i = 1,2,, where x are the decisio variables. c, b,

More information

Relay Channel With Private Messages

Relay Channel With Private Messages IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3777 Relay Chael With Private Messages Ramy Taious, Studet Member, IEEE, ad Aria Nosratiia, Seior Member, IEEE Abstract The relay

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

Covert Communication with Noncausal Channel-State Information at the Transmitter

Covert Communication with Noncausal Channel-State Information at the Transmitter Covert Commuicatio with Nocausal Chael-State Iformatio at the Trasmitter Si-Hyeo Lee, Ligog Wag, Ashish Khisti, ad Gregory W. Worell POSTECH, Pohag, South Korea (e-mail:sihyeo@postech.ac.kr ETIS Uiversité

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170 UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was

More information

Channel coding, linear block codes, Hamming and cyclic codes Lecture - 8

Channel coding, linear block codes, Hamming and cyclic codes Lecture - 8 Digital Commuicatio Chael codig, liear block codes, Hammig ad cyclic codes Lecture - 8 Ir. Muhamad Asial, MSc., PhD Ceter for Iformatio ad Commuicatio Egieerig Research (CICER) Electrical Egieerig Departmet

More information

Keyless Authentication and Authenticated Capacity

Keyless Authentication and Authenticated Capacity Keyless Autheticatio ad Autheticated Capacity Wewe Tu ad Lifeg Lai Abstract We cosider the problem of keyless message autheticatio over oisy chaels i the presece of a active adversary. Differet from the

More information

Introducing a Novel Bivariate Generalized Skew-Symmetric Normal Distribution

Introducing a Novel Bivariate Generalized Skew-Symmetric Normal Distribution Joural of mathematics ad computer Sciece 7 (03) 66-7 Article history: Received April 03 Accepted May 03 Available olie Jue 03 Itroducig a Novel Bivariate Geeralized Skew-Symmetric Normal Distributio Behrouz

More information

Lecture 6: Source coding, Typicality, and Noisy channels and capacity

Lecture 6: Source coding, Typicality, and Noisy channels and capacity 15-859: Iformatio Theory ad Applicatios i TCS CMU: Sprig 2013 Lecture 6: Source codig, Typicality, ad Noisy chaels ad capacity Jauary 31, 2013 Lecturer: Mahdi Cheraghchi Scribe: Togbo Huag 1 Recap Uiversal

More information

Capacity Theorems for the Finite-State Broadcast Channel with Feedback

Capacity Theorems for the Finite-State Broadcast Channel with Feedback Capacity Theorems for the Fiite-State Broadcast Chael with Feedback Ro abora ad Adrea Goldsmith ept of Electrical Egieerig, Staford Uiversity Abstract We cosider the discrete, time-varyig broadcast chael

More information

The Capacity Region of the Degraded Finite-State Broadcast Channel

The Capacity Region of the Degraded Finite-State Broadcast Channel The Capacity Regio of the Degraded Fiite-State Broadcast Chael Ro Dabora ad Adrea Goldsmith Dept. of Electrical Egieerig, Staford Uiversity, Staford, CA Abstract We cosider the discrete, time-varyig broadcast

More information

The Likelihood Encoder with Applications to Lossy Compression and Secrecy

The Likelihood Encoder with Applications to Lossy Compression and Secrecy The Likelihood Ecoder with Applicatios to Lossy Compressio ad Secrecy Eva C. Sog Paul Cuff H. Vicet Poor Dept. of Electrical Eg., Priceto Uiversity, NJ 8544 {csog, cuff, poor}@priceto.edu Abstract A likelihood

More information

The Capacity Region of the. Degraded Finite-State Broadcast Channel

The Capacity Region of the. Degraded Finite-State Broadcast Channel Submitted to the IEEE Trasactios o Iformatio Theory, 2008. The Capacity Regio of the Degraded Fiite-State Broadcast Chael Ro Dabora ad Adrea Goldsmith Wireless Systems Lab Departmet of Electrical Egieerig

More information

Lecture 2: Concentration Bounds

Lecture 2: Concentration Bounds CSE 52: Desig ad Aalysis of Algorithms I Sprig 206 Lecture 2: Cocetratio Bouds Lecturer: Shaya Oveis Ghara March 30th Scribe: Syuzaa Sargsya Disclaimer: These otes have ot bee subjected to the usual scrutiy

More information

Fixed-Threshold Polar Codes

Fixed-Threshold Polar Codes Fixed-Threshold Polar Codes Jig Guo Uiversity of Cambridge jg582@cam.ac.uk Albert Guillé i Fàbregas ICREA & Uiversitat Pompeu Fabra Uiversity of Cambridge guille@ieee.org Jossy Sayir Uiversity of Cambridge

More information

On the Dispersions of the Discrete Memoryless Interference Channel

On the Dispersions of the Discrete Memoryless Interference Channel O the Dispersios of the Discrete Memoryless Iterferece Chael Sy-Quoc Le, Vicet Y. F. Ta,2, ad Mehul Motai Departmet of ECE, Natioal Uiversity of Sigapore, Sigapore 2 Istitute for Ifocomm Research (I 2

More information

Advanced Stochastic Processes.

Advanced Stochastic Processes. Advaced Stochastic Processes. David Gamarik LECTURE 2 Radom variables ad measurable fuctios. Strog Law of Large Numbers (SLLN). Scary stuff cotiued... Outlie of Lecture Radom variables ad measurable fuctios.

More information

Randomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018)

Randomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018) Radomized Algorithms I, Sprig 08, Departmet of Computer Sciece, Uiversity of Helsiki Homework : Solutios Discussed Jauary 5, 08). Exercise.: Cosider the followig balls-ad-bi game. We start with oe black

More information

The Choquet Integral with Respect to Fuzzy-Valued Set Functions

The Choquet Integral with Respect to Fuzzy-Valued Set Functions The Choquet Itegral with Respect to Fuzzy-Valued Set Fuctios Weiwei Zhag Abstract The Choquet itegral with respect to real-valued oadditive set fuctios, such as siged efficiecy measures, has bee used i

More information

Lecture 19: Convergence

Lecture 19: Convergence Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may

More information

Optimally Sparse SVMs

Optimally Sparse SVMs A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but

More information

Capacity Bounds for Networks of Broadcast Channels

Capacity Bounds for Networks of Broadcast Channels Capacity Bouds for Networks of Broadcast Chaels Michelle Effros Departmet of Electrical Egieerig Califoria Istitute of Techology Abstract This paper derives ew outer bouds o the capacities of etworks comprised

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

Multiterminal Source Coding with an Entropy-Based Distortion Measure

Multiterminal Source Coding with an Entropy-Based Distortion Measure 20 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Multitermial Source Codig with a Etropy-Based Distortio Measure Thomas A. Courtade ad Richard D. Wesel Departmet of Electrical Egieerig Uiversity

More information

Arithmetic Distribution Matching

Arithmetic Distribution Matching Arithmetic Distributio Matchig Sebastia Baur ad Georg Böcherer Istitute for Commuicatios Egieerig Techische Uiversität Müche, Germay Email: baursebastia@mytum.de,georg.boecherer@tum.de arxiv:48.393v [cs.it]

More information

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2004 Parma, Italy, October 10 13, 2004 Vector Permutatio Code Desig Algorithm Dailo SILVA ad Weiler A. FINAMORE Cetro de Estudos em Telecomuicações

More information

Shannon s noiseless coding theorem

Shannon s noiseless coding theorem 18.310 lecture otes May 4, 2015 Shao s oiseless codig theorem Lecturer: Michel Goemas I these otes we discuss Shao s oiseless codig theorem, which is oe of the foudig results of the field of iformatio

More information

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation?

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation? Are Slepia-Wolf Rates Necessary for Distributed Parameter Estimatio? Mostafa El Gamal ad Lifeg Lai Departmet of Electrical ad Computer Egieerig Worcester Polytechic Istitute {melgamal, llai}@wpi.edu arxiv:1508.02765v2

More information

Convergence of random variables. (telegram style notes) P.J.C. Spreij

Convergence of random variables. (telegram style notes) P.J.C. Spreij Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space

More information

Multiple-Access Channels with Distributed Channel State Information

Multiple-Access Channels with Distributed Channel State Information ISIT2007, Nice, Frace, Jue 24 - Jue 29, 2007 Multiple-ccess Chaels with Distributed Chael State Iformatio Cha-Soo Hwag Electrical Egieerig Staford Uiversity Email: cshwag @ staford.edu Moshe Malki Electrical

More information

Summary and Discussion on Simultaneous Analysis of Lasso and Dantzig Selector

Summary and Discussion on Simultaneous Analysis of Lasso and Dantzig Selector Summary ad Discussio o Simultaeous Aalysis of Lasso ad Datzig Selector STAT732, Sprig 28 Duzhe Wag May 4, 28 Abstract This is a discussio o the work i Bickel, Ritov ad Tsybakov (29). We begi with a short

More information

Simultaneous Energy and Information Transmission in Gaussian Multiple Access Channels

Simultaneous Energy and Information Transmission in Gaussian Multiple Access Channels Simultaeous Eergy ad Iformatio Trasmissio i Gaussia Multiple Access Chaels Selma Belhadj Amor, Samir M. Perlaza, Ioais Krikidis To cite this versio: Selma Belhadj Amor, Samir M. Perlaza, Ioais Krikidis.

More information

HOMEWORK 2 SOLUTIONS

HOMEWORK 2 SOLUTIONS HOMEWORK SOLUTIONS CSE 55 RANDOMIZED AND APPROXIMATION ALGORITHMS 1. Questio 1. a) The larger the value of k is, the smaller the expected umber of days util we get all the coupos we eed. I fact if = k

More information

Disjoint Systems. Abstract

Disjoint Systems. Abstract Disjoit Systems Noga Alo ad Bey Sudaov Departmet of Mathematics Raymod ad Beverly Sacler Faculty of Exact Scieces Tel Aviv Uiversity, Tel Aviv, Israel Abstract A disjoit system of type (,,, ) is a collectio

More information

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014.

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014. Product measures, Toelli s ad Fubii s theorems For use i MAT3400/4400, autum 2014 Nadia S. Larse Versio of 13 October 2014. 1. Costructio of the product measure The purpose of these otes is to preset the

More information

A Non-Asymptotic Achievable Rate for the AWGN Energy-Harvesting Channel using Save-and-Transmit

A Non-Asymptotic Achievable Rate for the AWGN Energy-Harvesting Channel using Save-and-Transmit 016 IEEE Iteratioal Symposium o Iformatio Theory A No-Asymptotic Achievable Rate for the AWGN Eergy-Harvestig Chael usig Save-ad-Trasmit Silas L. Fog, Vicet Y. F. Ta, ad Jig Yag Departmet of Electrical

More information

Confidence interval for the two-parameter exponentiated Gumbel distribution based on record values

Confidence interval for the two-parameter exponentiated Gumbel distribution based on record values Iteratioal Joural of Applied Operatioal Research Vol. 4 No. 1 pp. 61-68 Witer 2014 Joural homepage: www.ijorlu.ir Cofidece iterval for the two-parameter expoetiated Gumbel distributio based o record values

More information

Lecture 3 : Random variables and their distributions

Lecture 3 : Random variables and their distributions Lecture 3 : Radom variables ad their distributios 3.1 Radom variables Let (Ω, F) ad (S, S) be two measurable spaces. A map X : Ω S is measurable or a radom variable (deoted r.v.) if X 1 (A) {ω : X(ω) A}

More information

Lecture 2: April 3, 2013

Lecture 2: April 3, 2013 TTIC/CMSC 350 Mathematical Toolkit Sprig 203 Madhur Tulsiai Lecture 2: April 3, 203 Scribe: Shubhedu Trivedi Coi tosses cotiued We retur to the coi tossig example from the last lecture agai: Example. Give,

More information

Universal source coding for complementary delivery

Universal source coding for complementary delivery SITA2006 i Hakodate 2005.2. p. Uiversal source codig for complemetary delivery Akisato Kimura, 2, Tomohiko Uyematsu 2, Shigeaki Kuzuoka 2 Media Iformatio Laboratory, NTT Commuicatio Sciece Laboratories,

More information

On Random Line Segments in the Unit Square

On Random Line Segments in the Unit Square O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,

More information

A class of spectral bounds for Max k-cut

A class of spectral bounds for Max k-cut A class of spectral bouds for Max k-cut Miguel F. Ajos, José Neto December 07 Abstract Let G be a udirected ad edge-weighted simple graph. I this paper we itroduce a class of bouds for the maximum k-cut

More information

Sequences and Series of Functions

Sequences and Series of Functions Chapter 6 Sequeces ad Series of Fuctios 6.1. Covergece of a Sequece of Fuctios Poitwise Covergece. Defiitio 6.1. Let, for each N, fuctio f : A R be defied. If, for each x A, the sequece (f (x)) coverges

More information

Oblivious Transfer using Elliptic Curves

Oblivious Transfer using Elliptic Curves Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset

More information

Sequences. Notation. Convergence of a Sequence

Sequences. Notation. Convergence of a Sequence Sequeces A sequece is essetially just a list. Defiitio (Sequece of Real Numbers). A sequece of real umbers is a fuctio Z (, ) R for some real umber. Do t let the descriptio of the domai cofuse you; it

More information

Posterior Matching Scheme for Gaussian Multiple Access Channel with Feedback

Posterior Matching Scheme for Gaussian Multiple Access Channel with Feedback 1 Posterior Matchig Scheme for Gaussia Multiple Access Chael with Feedback La V. Truog, Member, IEEE, Iformatio Techology Specializatio Departmet ITS, FPT Uiversity, Haoi, Vietam E-mail: latv@fpt.edu.v

More information

On Evaluating the Rate-Distortion Function of Sources with Feed-Forward and the Capacity of Channels with Feedback.

On Evaluating the Rate-Distortion Function of Sources with Feed-Forward and the Capacity of Channels with Feedback. O Evaluatig the Rate-Distortio Fuctio of Sources with Feed-Forward ad the Capacity of Chaels with Feedback. Ramji Vekataramaa ad S. Sadeep Pradha Departmet of EECS, Uiversity of Michiga, A Arbor, MI 4805

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS MASSACHUSTTS INSTITUT OF TCHNOLOGY 6.436J/5.085J Fall 2008 Lecture 9 /7/2008 LAWS OF LARG NUMBRS II Cotets. The strog law of large umbers 2. The Cheroff boud TH STRONG LAW OF LARG NUMBRS While the weak

More information

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled 1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how

More information

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function.

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function. MATH 532 Measurable Fuctios Dr. Neal, WKU Throughout, let ( X, F, µ) be a measure space ad let (!, F, P ) deote the special case of a probability space. We shall ow begi to study real-valued fuctios defied

More information

Properties and Hypothesis Testing

Properties and Hypothesis Testing Chapter 3 Properties ad Hypothesis Testig 3.1 Types of data The regressio techiques developed i previous chapters ca be applied to three differet kids of data. 1. Cross-sectioal data. 2. Time series data.

More information

Some Tauberian theorems for weighted means of bounded double sequences

Some Tauberian theorems for weighted means of bounded double sequences A. Ştiiţ. Uiv. Al. I. Cuza Iaşi. Mat. N.S. Tomul LXIII, 207, f. Some Tauberia theorems for weighted meas of bouded double sequeces Cemal Bele Received: 22.XII.202 / Revised: 24.VII.203/ Accepted: 3.VII.203

More information

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution EEL5: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we begi our mathematical treatmet of discrete-time s. As show i Figure, a discrete-time operates or trasforms some iput sequece x [

More information

Supplementary Material for Fast Stochastic AUC Maximization with O(1/n)-Convergence Rate

Supplementary Material for Fast Stochastic AUC Maximization with O(1/n)-Convergence Rate Supplemetary Material for Fast Stochastic AUC Maximizatio with O/-Covergece Rate Migrui Liu Xiaoxua Zhag Zaiyi Che Xiaoyu Wag 3 iabao Yag echical Lemmas ized versio of Hoeffdig s iequality, ote that We

More information

Econ 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1.

Econ 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1. Eco 325/327 Notes o Sample Mea, Sample Proportio, Cetral Limit Theorem, Chi-square Distributio, Studet s t distributio 1 Sample Mea By Hiro Kasahara We cosider a radom sample from a populatio. Defiitio

More information

Vector Quantization: a Limiting Case of EM

Vector Quantization: a Limiting Case of EM . Itroductio & defiitios Assume that you are give a data set X = { x j }, j { 2,,, }, of d -dimesioal vectors. The vector quatizatio (VQ) problem requires that we fid a set of prototype vectors Z = { z

More information

STAT Homework 1 - Solutions

STAT Homework 1 - Solutions STAT-36700 Homework 1 - Solutios Fall 018 September 11, 018 This cotais solutios for Homework 1. Please ote that we have icluded several additioal commets ad approaches to the problems to give you better

More information

SOME TRIBONACCI IDENTITIES

SOME TRIBONACCI IDENTITIES Mathematics Today Vol.7(Dec-011) 1-9 ISSN 0976-38 Abstract: SOME TRIBONACCI IDENTITIES Shah Devbhadra V. Sir P.T.Sarvajaik College of Sciece, Athwalies, Surat 395001. e-mail : drdvshah@yahoo.com The sequece

More information

Cooperative Network Coding Strategies for Wireless Relay Networks with Backhaul

Cooperative Network Coding Strategies for Wireless Relay Networks with Backhaul Cooperative Network Codig Strategies for Wireless Relay Networks with Backhaul IEEE Trasactios o Commuicatios, vol. 59, pp. 5 54, Sep.. c IEEE. Persoal use of this material is permitted. However, permissio

More information

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + 62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of

More information

Some Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding

Some Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding Vol.7, No.6 (01, pp.69-74 http://dx.doi.org/10.1457/ijsia.01.7.6.7 Some Explicit Formulae of NAF ad its Left-to-Right Aalogue Based o Booth Ecodig Dog-Guk Ha, Okyeo Yi, ad Tsuyoshi Takagi Kookmi Uiversity,

More information