On the Optimal Phase Control in MIMO Systems with Phase Quantization
|
|
- Gregory Morris
- 5 years ago
- Views:
Transcription
1 On the Optimal hase Control in MIMO Systems with hase Quantization Majid Khabbazian, Kin-Kwong Leung and Mohammad A. Safari Department of Electrical and Computer Engineering University of British Columbia, Vancouver, BC V6T 1Z4, Canada {majidk, Department of Computer Science University of British Columbia, Vancouver, BC V6T 1Z4, Canada Abstract We consider the optimal phase control problem in wireless MIMO systems with quantized phases. We show that the problem is N-hard when number of receive antennas grows linearly with the number of transmit antennas. For the case where the number of receive antennas is constant, we show that the problem is no longer N-hard by providing a polynomial time algorithm. I. INTRODUCTION Transmit diversity is a key technology to improve the performance of a wireless communication system in a fading environment [1]. It is classified as open loop or closed loop, depending on whether there is any feedback information sent from the receiver to the transmitter [2]. Closed-loop diversity was first proposed by Gerlach and aulraj [4]. Based on the estimated channel gain matrix, the receiver calculates the optimal antenna weight vector and then sends it back to the transmitter. Since the feedback channel is usually of limited data rate, the optimal antenna weight vector has to be quantized before being sent back. If the quantization level is sufficiently dense, one may simply choose a quantized point that is closest in Euclidean distance to the optimal vector. In practice, however, the allowed feedback information is rather limited. To maximize the performance gain, a combinatorial optimization is needed. To find the optimal quantized vector, the brute force approach has computational complexity increasing exponentially with n T, which is the number of transmit antennas. To reduce the complexity, the Lloyd algorithm is used in [6]. However, it is suitable only when the number of transmit antennas is small, since its computational cost still grows rapidly with n T. In this paper, we consider the phase control problem, where all the feedback bits are used to adjust the transmission phases of the transmit antennas. Suboptimal solutions for this problem have been proposed in the literature. One example is the Co-phase Algorithm, which is of complexity O(n T [5]. Since its performance is far from optimal, a near-optimal solution approach called Local Search is proposed in [7]. Its complexity is O(n 2 T, which is higher than that of the Cophase algorithm. When the number of transmit antennas grows, whether efficient algorithm exists for optimal solution is still unknown. We will answer this question in this paper. Our results are summarized as follows: When the numbers of receive antennas grows linearly with transmit antennas, the problem is N-hard. When either the number of receive or transmit antennas is constant, polynomial time algorithm exists. The paper is organized as follows. The next section is the problem definition. The N-hardness of the first case is proved in Section III, by reducing the maximum cut, which is a wellknown N-complete problem in graph theory. In Section IV, we show the existence of polynomial time algorithm for the second case by construction. Simulation result is presented in Section V to show the performance differences between the optimal solution and the suboptimal solutions. The paper is concluded in Section VI. For readability, some proofs are omitted. II. ROBLEM DEFINITION We consider the phase control problem in a single user multiple-input multiple-output (MIMO system, with N transmit and M receive antennas. Let G be an M N complex matrix with entry g m,n representing the link gain between transmit antenna n and receive antenna m, and u =(u 1,...,u N be an N-dim complex column vector representing the transmit signal. Therefore the receive signal is v = Gu. (1 The phase control problem assumes that each component u n has a constant amplitude and the system is allowed to control the transmit signal phases through a feedback channel. Since the feedback channel has limited bandwidth, the phase of u n is quantized into L n discrete values, i.e., u n {exp(jθ 1 n,...,exp(jθ Ln n }, where 0 = θn 1 < < θn Ln < 2π. Letu l n = exp(jθn, l U n = {u 1,...,u 2 } and U = U 1 U N. Also let V = {Gu : U}, i.e., v V. Our goal is to maximize the /06/$20.00 (c 2006 IEEE
2 receive signal v = M m=1 v m 2, given the link gain matrix G and quantization set U. Together with (1, the phase control problem can be expressed as maximize subject to Gu u U. We denote f(u = Gu. To simplify our model and improve readability, we assume L n = L for all n {1,...,N}. However, all our results apply to the general model with different L n s. III. N-HARDNESS OF THE HASE CONTROL ROBLEM In this section, we will prove that when the number of receive antennas grows linearly with number of transmit antennas, the phase control problem is N-Hard. We will show the N-hardness by reducing the maximum cut (MAX CUT problem [3] to the phase control problem with two quantized phases, i.e., U n = {+1, 1} for all n {1,...,N}. Let g n be the n-th column of G and define the function { 1, if x =0; δ(x = (3 0, otherwise. Then we have Gu = = (2 N u n g n (4 n=1 N n=1 u n g n + m<n u m u n [g H mg n + g H n g m ](5 = C 2 m<n δ(u m + u n [g H mg n + g H n g m ] (6 = C +4 m<n δ(u m + u n Re { g H mg n }, (7 where x H is the Hermitian transpose of x, C = N n=1 u ng n + m<n [gh mg n + g H n g m ] and Re {z} is the real part of the complex number z. Given the link gain matrix G, the phase control problem (2 can be expressed as maximize m<n δ(u m + u n Re { } g H mg n (8 subject to u U. Therefore, any algorithm A that solves the phase control problem (2 solves (8. On the other hand, consider an undirected graph with the vertex set N = {1,...,N}.LetW be a real symmetric matrix where the entry W mn represnts the weight between vertices m and n. The MAX CUT problem is to find a subset S N such that W mn (9 m S,n S is maximized, where S = N S. We define { +1, if n S; u n = 1, if n S. The MAX CUT problem can be written as maximize m<n δ(u m + u n w mn subject to u U. (10 (11 Since W is a symmetric matrix, we can diagonalize it such that W = D H, where is a real orthonormal matrix composed of the eigenvectors of W and D is a real diagonal matrix. Any MAX CUT problem with N vertices can be transformed to the optimal phase control problem in an N N MIMO system with link gain matrix G = D H, U n = { 1, +1}. Note that some entries of D may be negative and hence G is a complex matrix in general. With the above reduction, any algorithm A that solves such a phase control problem can solve the MAX CUT problem and we have the following theorem: Theorem 1: The optimal phase control problem in an N N MIMO system is N-hard. Corollary 2: The optimal phase control problem in an N M MIMO system is N-hard when M grows linearly with N. roof: The case of M N is trivial. For M < N, consider that only M of the receive antennas are active. The link gains are represented by an αn αn matrix and the problem is at least as difficult as MAX CUT problem with αn vertices. Hence the problem is still N-hard. IV. OLYNOMIAL TIME ALGORITHM FOR SECIAL CASES We proved in the previous section that when M grows linearly with N, we do not have any efficient algorithms to solve the maximization problem (2. In this section, we investigate the cases of M or N being constant. The latter case, N being constant, is simple since we can exhaustively calculate all L N possible combinations and choose the optimal one. The complexity is O(M. However, for the other case, where M is fixed while N grows, whether polynomial time algorithms exist is still unknown. In the literature, some algorithms for suboptimal solutions were proposed, like [5], [7]. We will show by construction that polynomial time algorithm for optimal solution does exist. Before introducing the algorithm, we look at some properties of the discrete phase control algorithm. Since U is finite, we immediately have the following existence theorem: Theorem 3: An optimal transmit vector u = (u 1,...,u N U exists. That is, f(u f(u for all u U. Let v = (v 1,...,v M = Gu be the optimal receive vector and recall that g n is the n-th column of G. Define d(x, y =Re { x H y }. We remark that for unit vectors x, y, d(x, y measures how close they are. d(x, y =1if and only if x = y whereas d(x, y = 1 if and only if x = y, which means x and y are farthest apart. Lemma 4: d(u ng n, v >d(u n g n, v for all u n n n, u n U n, n {1,...,N}. 4273
3 The idea of Lemma 4 is that if there were another u n u n closer to v than u n,thisu n would produce another a greater v, which contradicts to the assumption v being optimal. Let E l n be the set {v V: d(u l ng n, v >d(u n g n, v, u n U n }. So v E l n implies that u n u l n. From the definition of E l n, we immediately have the following lemma. Lemma 5: E l n E l n = φ for any l l. For convenience in notation, we extend the sets of {θn} l and {u l n} for l beyond L with θn l+l = θn l and un l+l = u l n for all n, l. For each n {1,...,N},l {1,...,L}, letr l n is an M- dim row vector defined as r l n =(u l n u l 1 n g H n. (12 Let R n be an L M matrix, with r l n as the l-th row, and R be a block matrix: R 1 R =.. (13 R N Therefore, R is an M matrix. Define the sign function for matrices as follows: if Y = sign(x, (14 then Y is a matrix with the same dimension as X and the (i, j-th entry of Y is defined as 1, Re {X ij } > 0; Y ij = 0, Re {X ij } =0; (15 1, Re {X ij } < 0. Let For any v V, consider the vector σ v = sign(rv. (16 Σ={σ v : v V}. (17 Lemma 6: If v E l n, v E l n and l l, then sign(rv sign(rv. From Lemma 5 and 6, we see that if u u, then σ v σ v,where v = Gu and v = Gu. Therefore the function that maps u to the corresponding σ v is injective and we can define a function ξ :Σ U as ξ(σ(v = (u l1 1,...,ulN N (18 where v En ln for all n {1,...,N}. Although σ(v is an -dim vector, we will see later that Σ has only O(( 2M elements, among which are the ones corresponding to the optimal transmit phase u, namely ξ 1 (u 1. Therefore, we can find out u by comparing f(u 1 ξ 1 is a point to set function. for some potential candidates ξ 1 (u Σ, and the complexity is polynomial in N. To figure out the potential candidates in Σ, we need the following two theorems. The notation ρ 0 means that all components of the matrix ρ are non-zero. Lemma 7: There exists v V such that σ v 0 and ξ(σ v =u. Definition 1: Let rspan(φ be the set of vectors that are linear combinations of the rows of Φ. Definition 2: Let Φ be a p q matrix and A be a subset of {1,...,p}, A = p p. We construct a row submatrix of Φ, written as Φ[A], by taking the w-th row from Φ for all w A. Therefore, Φ[A] is a p q matrix. Lemma 8: For any p q real matrix Φ with rank-k and q-dim column real vector x, there are a subset A {1,...,p} and x rspan(φ such that sign(φ[ā]x =sign(φ[ā]x (19 and Φ[A]x =0, (20 where Ā = {1,...,p} A and Φ[A] has rank k 1. Moreover, the choice of x is unique for each A, up to scalar multiples. Lemma 7 ensures that the optimal solution is in Σ = {v Σ:v 0} and we will see that Lemma 8 is useful in figuring out all elements of Σ. While Lemma 8 applies to real matrices, R is a M complex matrix. However since the operation sign(rv only considers the real part of the product, we can view R in (16 as a 2M real matrix. In this sense, the effective rank of R can be 2M. We will interprete the rank of a complex matrix in this sense in the rest of the paper. i.e., a 2n n complex matrix can have rank at most 2n. Before going into the general optimal phase control algorithm, we look at a special case, which gives us more insight on how the general algorithm works. A. A Special Case If we assume that any 2M rows of R are linearly independent, we can solve our maximization problem (2 as follows. 1 Evaluate All v(i s: ( From Lemma 8, find out all by solving the equation 2M 1 possible v A s R[A]v A =0 (21 for each of the subset A with 2M 1 elements. Label them as v(i, and the corresponding ( subset as A(i, for i {1,...,N v }, where N v = 2M 1. 2 Define Σ (i: For i {1,...,N v }, define subset Σ (i of Σ as follows: Σ (i ={σ v Σ : σ v [Ā(i] = σv(i[ā(i] 0 and σ v [A(i] = 0.} (
4 Since {A(i} i {1,...,Nv} are all the possible subset with cardinality 2M 1, N v i=1 Σ (i =Σ. (23 3 Evaluate the Elements in Σ (i s: For each of i {1,...,N v }, the j-th entries of all elements in Σ (i are the same, which equal to the j- th entry of σ v(i, for all j Ā. These components can hence be determined since v(i is known from Step 1. Each of the remaining 2M 1 components can only be +1 or 1, implying that Σ (i 2 2M 1. We find out all 2 2M 1 possible elements of Σ (i. 4 Find Out the Optimal Transmit hase: Totally, we have ( 2M 1 2 2M 1 σ v s, which is polynomial in N. The solution to the maximization problem (2 can be obtained by comparing f(ξ(σ v for all these candidates σ v and this algorithm has a complexity polynomial to N. B. General Cases The above conclusion is obtained under the assumption that any 2M rows of R are linearly independent. If this assumption does ( not hold, the above algorithm may end up with more than 2M 1 2 2M 1 possible σ v s. For example, if there are set A with N/2 elements and R[A] has rank 2M 1, then in Step 3, we can determine only N/2 components of σ v(i and the rest would produce 2 N/2 different cases. The complexity of the algorithm then becomes exponential in N. In the discussion above, we note that in Step 3 of the algorithm, the number of undetermined components for the elements in Σ (i is actually 2 α, where α = A(i. Also, Lemma 8 is used to reduce a rank 2M matrix, R, to a set of rank 2M 1 matrices, R[A(i]. We see that we can do the operation again to yield a set of rank (2M 2 matrices, R[A(i 1,i 2 ]. When we do the operation recursively for 2M times, we end up with a set of rank-0 matrices, R[A(i 1,...,i 2M ]. In other words, A(i 1,...,i 2M s are empty sets and each of the corresponding Σ (i 1,...,i 2M has only one element. Therefore, the exponential term in the discussion disappears. Before proceeding to the general algorithm, we have to introduce the following lemma, which makes sure that we only have polynomial number of Σ (i 1,...,i 2M s. Lemma 9: Let R[A] be a rank-k matrix and R[A]v =0. Then there exists a subset B A such that B has exactly k elements, R[B] has rank k and R[B]v =0. When the linear independence assumption is not satisfied, the number of elements of the subset A in Lemma 8 may range from K 1 to. However, Lemma 9 ensures there ( are no more than K 1 distinct v A s since there are only ( K 1 choices of subset B. This will ensure that number of Σ (i 1,...,i 2M is polynomial. The general algorithm for solving the maximization problem (2 follows. Optimal hase Control Algorithm GivenalinkgainmatrixG and the phase quantizations set U, we construct matrix R from (12 and (13. Let K be the rank of R, where K 2M. The algorithm is composed of K levels. In each level, the ranks of R[A] is reduced by 1. 1 At level 1, we want to find out all possible v A. Each v A corresponds to a subset ( A {1,...,}. By Lemma 9 there are at most K 1 distinct v A s. We label each distinct v A as v(i 1, the corresponding A as A(i 1, and define Σ (i as in (22. For each σ v Σ (i 1,thewth component, w Ā(i 1, can be determined since it equals to the w-th component of σ v(ii. The rest of the components will be determined in the succeeding levels. Note that Σ (i =Σ. (24 all i i 2 At level k, k 2. For any σ v Σ (i 1,...,i k 1, Lemma 8 states that there are A(i 1,...,i k A(i 1,...,i k 1 and v(i 1,...,i k rspan(a(i 1,...,i k 1 such that and σ v(i1,...,i k [Ã] =σ v[ã(i 1,...,i k ] 0 (25 R[A(i 1,...,i k ]v(i 1,...,i k =0, (26 where Ã(i 1,...,i k =A(i 1,...,i k 1 A(i 1,...,i k and R[A(i 1,...,i k ] has rank K k. Therefore, for each A(i 1,...,i k 1, we have the following: Let = A(i 1,...,i k 1. We consider all the subsets of A(i 1,...,i k 1 with cardinality K k and then a set of distinct v(i 1,...,i k rspan(r[a(i 1,...,i k 1 ] are obtained. We also have A(i 1,...,i k A(i 1,...,i k 1 and Σ (i 1,...,i k Σ (i 1,...,i k 1, defined in a similar way as (22. As Step 3 in the algorithm for the special case, for any σ v Σ (i 1,...,i k,thej-th component of σ v equals to the j-th component of σ v(i1,...,i k, j Ã(i 1,...,i k. Moreover, since σ v Σ (i 1,...,i k Σ (i 1,...,i k 1, components belonging to A(i 1,...,i k 1 have been obtained in the preceding levels. The remaining unknown components are those in A(i 1,...,i k, and they will be ( determined in the succeeding levels. Since there are K k possible subsets of A(i 1,...,i k 1,wehave N v i k =1 ( where N v = Σ (i 1,...,i k =Σ (i 1,...,i k 1, (27 K k. 4275
5 3 At level K, R[A(i 1,...,i K ] has rank 0, which implies that A(i 1,...,i K is an empty set. All components of σ v has been determined. (There is only one element in every Σ (i 1,...,i K. Moreover, by induction, we have all i 1,...,i K Σ (i 1,...,i K =Σ. (28 Then Lemma 7 implies that the maximization problem 2 can be solved by comparing all f(ξ(σ v s, where σ v s are given by the algorithm at level K. Complexity Analysis Obviously, the construction of R and the evaluation of its rank can be done in O(M 2 computations. The complexity of level 1 follows. We decompose level 1 into different steps. The first step is to( find out all distinct v(i 1. There are at most N v = 2M 1 choices of subset B (refer to Lemma 9. For each of them, evaluation of v requires solving a system of 2M 1 equations, which has complexity of O(M 3. To label distinct v s as v(i 1, we do a sorting on all v s. This requires O(N v log N v computations. Hence, the overall complexity in this step is O(N v log N v. Since different A s may correspond to the same v(i 1, we have to find out the corresponding A(i 1 for each v(i 1, we need to figure out which row r i of R satisfies the equation r i v(i 1 0. This requires O( computations. Since {v(i 1 } mayhaveat most N v members, this step requires O(N v computations. To determine the components of σ v Σ (i 1,we need O( computations for each i 1.Thisstep requires O(N v computations in total. ( Since N v = 2M 1 ( 2M 1 and M is assumed to be constant, the overall complexity of level 1 is O(( 2M. When we apply the above arguments to level 2, all the complexity upper bounds are satisfied except that the cardinality of {v(i 1,i 2 } is higher than {v(i 1 }. To find out a suitable upper bound, we focus on a particular v(i 1. Let A(i 1 = K 1. Note that any subset B A(i 1 with rank of B equal K 1 would have yielded the same v(i 1, up to a scalar, by solving the equation R[B]v =0 (29 ( for v. At level 1, we have at most evaluated ( K 1 subsets of {1,...,} and K 1 of them have produced v(i 1. To ( evaluate vector v(i 1,i 2 at level 2, there are at most K 2 subsets of A(i 1. Since this relation holds for any other v(i 1, the ratio between the number of distinct A(i 1,i 2 to the number of A(i 1 must average output power optimal co phase number of antennas Fig. 1. solutions. The differences between the optimal solution and suboptimal be bounded by ( max 2M 1 N v /( K 2 K 1 (30 K 1 (K (31 < K (32 2M. (33 Therefore the number of v(i 1,i 2 is less than 2MN v, and the overall complexity of level 2 can be proved to be O(M( 2M. Similarly the complexity of level k is O(M k 1 ( 2M for k {1,...,K}. Since the number of levels is less than 2M, the overall complexity of the algorithm is O((1+ +M 2M 1 ( 2M O((M 2M. Keeping M to be constant, the complexity is O(( 2M, which is polynomial in N and L. V. SIMULATION In this section, we give the readers some idea about the performance difference between the optimal solution and suboptimal solution given by Co-phase[5] algorithm. We run a simple simulation with different numbers of transmit antennas. The number of receive antenna is 4. Different transmit-receive antenna pairs are subject to independent Rayleigh fadings. We generate 1000 fading scenarios. For each of them, we compute the receive signal strengths given by Co-phase algorithm and the optimal algorithm. Figure 1 shows that there is significant difference between the two when the number of transmit antennas is high. VI. CONCLUSION We consider the problem of phase control for closed-loop transmit diversity with limited feedback. The consideration of quantized antenna phase is of practical importance, since 4276
6 the bandwidth of the feedback channel is limited and the control commands need to be sent faster than the rate of change of the channel. We show that the problem is N-hard in general. For the cases of constant number of transmit or receive antennas, polynomial time algorithms for the optimal solution are proposed. REFERENCES [1] S. M. Alamouti, A simple transmit diversity technique for wireless communications, J. Select. Commun. vol. 16, no 8, pp , Oct [2] R. T. Derryberry, S. D. Gray, D. M. Ionescu, G. Mandyam and B. Raghothaman, Transmit diversity in 3G CDMA systems, IEEE Commun. Mag., pp , vol. 40, no. 4, Apr [3] M. R. Garey and D. S. Johnson, Computers and intractability. A guide to the theory of N-completeness, W.H. Freeman and Company, New York-San Francisco, [4] D. Gerlach and A. aulraj, Adaptive transmitting antenna arrays with feedback, IEEE Sig. roc. Lett., pp , vol. 1, no. 10, Oct [5] J. Hämäläinen, R. Wichman, erformance analysis of closed-loop transmit diversity in the presence of feedback errors, IEEE roc. IMRC, pp , [6] A. Narula, M. J. Lopez, M. D. Trott and G. W. Wornell, Efficient use of side information in multiple-antenna data transmission over fading channels, IEEE J. Select Commun., vol. 16, no. 8, Oct [7] C. W. Sung, S. C. Ip and K. K. Leung, A simple algorithm for closed-loop transmit diversity with a low-data-rate feedback channel, IEEE roc. acific Rim Conf. Communications, Computers, and Signal rocessing, Victoria, B.C., Canada, Aug
Optimal Phase Control for Equal-Gain Transmission in MIMO Systems With Scalar Quantization: Complexity and Algorithms
Optimal Phase Control for Equal-Gain Transmission in MIMO Systems With Scalar Quantization: Complexity Algorithms The MIT Faculty has made this article openly available. Please share how this access benefits
More informationCHANNEL FEEDBACK QUANTIZATION METHODS FOR MISO AND MIMO SYSTEMS
CHANNEL FEEDBACK QUANTIZATION METHODS FOR MISO AND MIMO SYSTEMS June Chul Roh and Bhaskar D Rao Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA 9293 47,
More informationNotes on the Matrix-Tree theorem and Cayley s tree enumerator
Notes on the Matrix-Tree theorem and Cayley s tree enumerator 1 Cayley s tree enumerator Recall that the degree of a vertex in a tree (or in any graph) is the number of edges emanating from it We will
More informationA Polynomial-Time Algorithm for Pliable Index Coding
1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n
More informationInteractive Interference Alignment
Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationFeasibility Conditions for Interference Alignment
Feasibility Conditions for Interference Alignment Cenk M. Yetis Istanbul Technical University Informatics Inst. Maslak, Istanbul, TURKEY Email: cenkmyetis@yahoo.com Tiangao Gou, Syed A. Jafar University
More informationMATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix.
MATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix. Basis Definition. Let V be a vector space. A linearly independent spanning set for V is called a basis.
More informationJoint Power Control and Beamforming Codebook Design for MISO Channels with Limited Feedback
Joint Power Control and Beamforming Codebook Design for MISO Channels with Limited Feedback Behrouz Khoshnevis and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto,
More informationLimited Feedback in Wireless Communication Systems
Limited Feedback in Wireless Communication Systems - Summary of An Overview of Limited Feedback in Wireless Communication Systems Gwanmo Ku May 14, 17, and 21, 2013 Outline Transmitter Ant. 1 Channel N
More informationThe Optimality of Beamforming: A Unified View
The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,
More informationDiversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with Partial CSIT
1 Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with artial CSIT Kaushi Josiam, Dinesh Rajan and Mandyam Srinath, Department of Electrical Engineering, Southern Methodist
More informationOn the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation
On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation Mikael Fallgren Royal Institute of Technology December, 2009 Abstract
More informationOn the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling
On the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling Ruben de Francisco and Dirk T.M. Slock Eurecom Institute Sophia-Antipolis, France Email: {defranci, slock}@eurecom.fr Abstract
More informationTitle. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels
Title Equal Gain Beamforming in Rayleigh Fading Channels Author(s)Tsai, Shang-Ho Proceedings : APSIPA ASC 29 : Asia-Pacific Signal Citationand Conference: 688-691 Issue Date 29-1-4 Doc URL http://hdl.handle.net/2115/39789
More informationTransmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1
2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 6 8, 2005 Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters Alkan
More informationDimension. Eigenvalue and eigenvector
Dimension. Eigenvalue and eigenvector Math 112, week 9 Goals: Bases, dimension, rank-nullity theorem. Eigenvalue and eigenvector. Suggested Textbook Readings: Sections 4.5, 4.6, 5.1, 5.2 Week 9: Dimension,
More informationj=1 u 1jv 1j. 1/ 2 Lemma 1. An orthogonal set of vectors must be linearly independent.
Lecture Notes: Orthogonal and Symmetric Matrices Yufei Tao Department of Computer Science and Engineering Chinese University of Hong Kong taoyf@cse.cuhk.edu.hk Orthogonal Matrix Definition. Let u = [u
More informationLecture 7 MIMO Communica2ons
Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10
More informationMTH 309 Supplemental Lecture Notes Based on Robert Messer, Linear Algebra Gateway to Mathematics
MTH 309 Supplemental Lecture Notes Based on Robert Messer, Linear Algebra Gateway to Mathematics Ulrich Meierfrankenfeld Department of Mathematics Michigan State University East Lansing MI 48824 meier@math.msu.edu
More informationPerformance Analysis of Multiple Antenna Systems with VQ-Based Feedback
Performance Analysis of Multiple Antenna Systems with VQ-Based Feedback June Chul Roh and Bhaskar D. Rao Department of Electrical and Computer Engineering University of California, San Diego La Jolla,
More informationNP-hardness of the stable matrix in unit interval family problem in discrete time
Systems & Control Letters 42 21 261 265 www.elsevier.com/locate/sysconle NP-hardness of the stable matrix in unit interval family problem in discrete time Alejandra Mercado, K.J. Ray Liu Electrical and
More informationVECTOR QUANTIZATION TECHNIQUES FOR MULTIPLE-ANTENNA CHANNEL INFORMATION FEEDBACK
VECTOR QUANTIZATION TECHNIQUES FOR MULTIPLE-ANTENNA CHANNEL INFORMATION FEEDBACK June Chul Roh and Bhaskar D. Rao Department of Electrical and Computer Engineering University of California, San Diego La
More informationACI-matrices all of whose completions have the same rank
ACI-matrices all of whose completions have the same rank Zejun Huang, Xingzhi Zhan Department of Mathematics East China Normal University Shanghai 200241, China Abstract We characterize the ACI-matrices
More information(II.B) Basis and dimension
(II.B) Basis and dimension How would you explain that a plane has two dimensions? Well, you can go in two independent directions, and no more. To make this idea precise, we formulate the DEFINITION 1.
More informationElementary maths for GMT
Elementary maths for GMT Linear Algebra Part 2: Matrices, Elimination and Determinant m n matrices The system of m linear equations in n variables x 1, x 2,, x n a 11 x 1 + a 12 x 2 + + a 1n x n = b 1
More informationDS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra.
DS-GA 1002 Lecture notes 0 Fall 2016 Linear Algebra These notes provide a review of basic concepts in linear algebra. 1 Vector spaces You are no doubt familiar with vectors in R 2 or R 3, i.e. [ ] 1.1
More informationLectures on Linear Algebra for IT
Lectures on Linear Algebra for IT by Mgr. Tereza Kovářová, Ph.D. following content of lectures by Ing. Petr Beremlijski, Ph.D. Department of Applied Mathematics, VSB - TU Ostrava Czech Republic 11. Determinants
More informationK-center Hardness and Max-Coverage (Greedy)
IOE 691: Approximation Algorithms Date: 01/11/2017 Lecture Notes: -center Hardness and Max-Coverage (Greedy) Instructor: Viswanath Nagarajan Scribe: Sentao Miao 1 Overview In this lecture, we will talk
More informationMinimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading
Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider
More informationMAT 242 CHAPTER 4: SUBSPACES OF R n
MAT 242 CHAPTER 4: SUBSPACES OF R n JOHN QUIGG 1. Subspaces Recall that R n is the set of n 1 matrices, also called vectors, and satisfies the following properties: x + y = y + x x + (y + z) = (x + y)
More informationOn the Performance of Random Vector Quantization Limited Feedback Beamforming in a MISO System
1 On the Performance of Random Vector Quantization Limited Feedback Beamforming in a MISO System Chun Kin Au-Yeung, Student Member, IEEE, and David J. Love, Member, IEEE Abstract In multiple antenna wireless
More informationEIGENVALUES AND EIGENVECTORS 3
EIGENVALUES AND EIGENVECTORS 3 1. Motivation 1.1. Diagonal matrices. Perhaps the simplest type of linear transformations are those whose matrix is diagonal (in some basis). Consider for example the matrices
More informationELEC E7210: Communication Theory. Lecture 10: MIMO systems
ELEC E7210: Communication Theory Lecture 10: MIMO systems Matrix Definitions, Operations, and Properties (1) NxM matrix a rectangular array of elements a A. an 11 1....... a a 1M. NM B D C E ermitian transpose
More informationON THE COMPLEXITY OF SOLVING THE GENERALIZED SET PACKING PROBLEM APPROXIMATELY. Nimrod Megiddoy
ON THE COMPLEXITY OF SOLVING THE GENERALIZED SET PACKING PROBLEM APPROXIMATELY Nimrod Megiddoy Abstract. The generalized set packing problem (GSP ) is as follows. Given a family F of subsets of M = f mg
More informationLinear Algebra M1 - FIB. Contents: 5. Matrices, systems of linear equations and determinants 6. Vector space 7. Linear maps 8.
Linear Algebra M1 - FIB Contents: 5 Matrices, systems of linear equations and determinants 6 Vector space 7 Linear maps 8 Diagonalization Anna de Mier Montserrat Maureso Dept Matemàtica Aplicada II Translation:
More informationVector Spaces and Dimension. Subspaces of. R n. addition and scalar mutiplication. That is, if u, v in V and alpha in R then ( u + v) Exercise: x
Vector Spaces and Dimension Subspaces of Definition: A non-empty subset V is a subspace of if V is closed under addition and scalar mutiplication. That is, if u, v in V and alpha in R then ( u + v) V and
More informationChapter 1 Vector Spaces
Chapter 1 Vector Spaces Per-Olof Persson persson@berkeley.edu Department of Mathematics University of California, Berkeley Math 110 Linear Algebra Vector Spaces Definition A vector space V over a field
More information4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Pranav Dayal, Member, IEEE, and Mahesh K. Varanasi, Senior Member, IEEE
4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER 2005 An Algebraic Family of Complex Lattices for Fading Channels With Application to Space Time Codes Pranav Dayal, Member, IEEE,
More informationNew lower bounds for hypergraph Ramsey numbers
New lower bounds for hypergraph Ramsey numbers Dhruv Mubayi Andrew Suk Abstract The Ramsey number r k (s, n) is the minimum N such that for every red-blue coloring of the k-tuples of {1,..., N}, there
More informationKnowledge Discovery and Data Mining 1 (VO) ( )
Knowledge Discovery and Data Mining 1 (VO) (707.003) Review of Linear Algebra Denis Helic KTI, TU Graz Oct 9, 2014 Denis Helic (KTI, TU Graz) KDDM1 Oct 9, 2014 1 / 74 Big picture: KDDM Probability Theory
More information1 Adjacency matrix and eigenvalues
CSC 5170: Theory of Computational Complexity Lecture 7 The Chinese University of Hong Kong 1 March 2010 Our objective of study today is the random walk algorithm for deciding if two vertices in an undirected
More informationResolving infeasibility in extremal algebras 1
ELSEVIER Linear Algebra and its Applications 290 (1999) 267-273 LINEAR ALGEBRA AND ITS APPLICATIONS Resolving infeasibility in extremal algebras 1 Katar/na Cechlfirov4 2 Pavel Diko 3 Department of Geometry
More informationDeciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point
Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point Gérard Cornuéjols 1 and Yanjun Li 2 1 Tepper School of Business, Carnegie Mellon
More informationLecture Notes 1: Vector spaces
Optimization-based data analysis Fall 2017 Lecture Notes 1: Vector spaces In this chapter we review certain basic concepts of linear algebra, highlighting their application to signal processing. 1 Vector
More informationVector Channel Capacity with Quantized Feedback
Vector Channel Capacity with Quantized Feedback Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 9697-65 Email: syed@ece.uci.edu,
More informationUsing Laplacian Eigenvalues and Eigenvectors in the Analysis of Frequency Assignment Problems
Using Laplacian Eigenvalues and Eigenvectors in the Analysis of Frequency Assignment Problems Jan van den Heuvel and Snežana Pejić Department of Mathematics London School of Economics Houghton Street,
More informationThe Sorted-QR Chase Detector for Multiple-Input Multiple-Output Channels
The Sorted-QR Chase Detector for Multiple-Input Multiple-Output Channels Deric W. Waters and John R. Barry School of ECE Georgia Institute of Technology Atlanta, GA 30332-0250 USA {deric, barry}@ece.gatech.edu
More informationKernel and range. Definition: A homogeneous linear equation is an equation of the form A v = 0
Kernel and range Definition: The kernel (or null-space) of A is ker A { v V : A v = 0 ( U)}. Theorem 5.3. ker A is a subspace of V. (In particular, it always contains 0 V.) Definition: A is one-to-one
More informationIEEE C80216m-09/0079r1
Project IEEE 802.16 Broadband Wireless Access Working Group Title Efficient Demodulators for the DSTTD Scheme Date 2009-01-05 Submitted M. A. Khojastepour Ron Porat Source(s) NEC
More informationQUALITATIVE CONTROLLABILITY AND UNCONTROLLABILITY BY A SINGLE ENTRY
QUALITATIVE CONTROLLABILITY AND UNCONTROLLABILITY BY A SINGLE ENTRY D.D. Olesky 1 Department of Computer Science University of Victoria Victoria, B.C. V8W 3P6 Michael Tsatsomeros Department of Mathematics
More informationSpanning and Independence Properties of Finite Frames
Chapter 1 Spanning and Independence Properties of Finite Frames Peter G. Casazza and Darrin Speegle Abstract The fundamental notion of frame theory is redundancy. It is this property which makes frames
More informationLimited Feedback-based Unitary Precoder Design in Rician MIMO Channel via Trellis Exploration Algorithm
Limited Feedback-based Unitary Precoder Design in Rician MIMO Channel via Trellis Exploration Algorithm Dalin Zhu Department of Wireless Communications NEC Laboratories China NLC) 11F Bld.A Innovation
More informationOVER the past ten years, research (see the references in
766 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 2, FEBRUARY 2006 Duplex Distortion Models for Limited Feedback MIMO Communication David J. Love, Member, IEEE Abstract The use of limited feedback
More informationAlternative Characterization of Ergodicity for Doubly Stochastic Chains
Alternative Characterization of Ergodicity for Doubly Stochastic Chains Behrouz Touri and Angelia Nedić Abstract In this paper we discuss the ergodicity of stochastic and doubly stochastic chains. We define
More informationDirty Paper Coding vs. TDMA for MIMO Broadcast Channels
TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University
More informationLinear algebra and applications to graphs Part 1
Linear algebra and applications to graphs Part 1 Written up by Mikhail Belkin and Moon Duchin Instructor: Laszlo Babai June 17, 2001 1 Basic Linear Algebra Exercise 1.1 Let V and W be linear subspaces
More informationApplications of Lattices in Telecommunications
Applications of Lattices in Telecommunications Dept of Electrical and Computer Systems Engineering Monash University amin.sakzad@monash.edu Oct. 2013 1 Sphere Decoder Algorithm Rotated Signal Constellations
More informationAlgebraic Methods in Combinatorics
Algebraic Methods in Combinatorics Po-Shen Loh 27 June 2008 1 Warm-up 1. (A result of Bourbaki on finite geometries, from Răzvan) Let X be a finite set, and let F be a family of distinct proper subsets
More informationDept. of Computer Science, University of British Columbia, Vancouver, BC, Canada.
EuroComb 2005 DMTCS proc. AE, 2005, 67 72 Directed One-Trees William Evans and Mohammad Ali Safari Dept. of Computer Science, University of British Columbia, Vancouver, BC, Canada. {will,safari}@cs.ubc.ca
More informationSemicontinuity of rank and nullity and some consequences
Semicontinuity of rank and nullity and some consequences Andrew D Lewis 2009/01/19 Upper and lower semicontinuity Let us first define what we mean by the two versions of semicontinuity 1 Definition: (Upper
More informationMath Camp Lecture 4: Linear Algebra. Xiao Yu Wang. Aug 2010 MIT. Xiao Yu Wang (MIT) Math Camp /10 1 / 88
Math Camp 2010 Lecture 4: Linear Algebra Xiao Yu Wang MIT Aug 2010 Xiao Yu Wang (MIT) Math Camp 2010 08/10 1 / 88 Linear Algebra Game Plan Vector Spaces Linear Transformations and Matrices Determinant
More informationEfficient Inverse Cholesky Factorization for Alamouti Matrices in G-STBC and Alamouti-like Matrices in OMP
Efficient Inverse Cholesky Factorization for Alamouti Matrices in G-STBC and Alamouti-like Matrices in OMP Hufei Zhu, Ganghua Yang Communications Technology Laboratory Huawei Technologies Co Ltd, P R China
More information6 Permutations Very little of this section comes from PJE.
6 Permutations Very little of this section comes from PJE Definition A permutation (p147 of a set A is a bijection ρ : A A Notation If A = {a b c } and ρ is a permutation on A we can express the action
More informationFoundations of Matrix Analysis
1 Foundations of Matrix Analysis In this chapter we recall the basic elements of linear algebra which will be employed in the remainder of the text For most of the proofs as well as for the details, the
More informationMath113: Linear Algebra. Beifang Chen
Math3: Linear Algebra Beifang Chen Spring 26 Contents Systems of Linear Equations 3 Systems of Linear Equations 3 Linear Systems 3 2 Geometric Interpretation 3 3 Matrices of Linear Systems 4 4 Elementary
More informationMatrix Arithmetic. a 11 a. A + B = + a m1 a mn. + b. a 11 + b 11 a 1n + b 1n = a m1. b m1 b mn. and scalar multiplication for matrices via.
Matrix Arithmetic There is an arithmetic for matrices that can be viewed as extending the arithmetic we have developed for vectors to the more general setting of rectangular arrays: if A and B are m n
More informationLecture 1 : Probabilistic Method
IITM-CS6845: Theory Jan 04, 01 Lecturer: N.S.Narayanaswamy Lecture 1 : Probabilistic Method Scribe: R.Krithika The probabilistic method is a technique to deal with combinatorial problems by introducing
More informationAn Algorithmic Framework for Wireless Information Flow
An Algorithmic Framework for Wireless Information Flow The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher
More informationChannel. Feedback. Channel
Space-time Transmit Precoding with Imperfect Feedback Eugene Visotsky Upamanyu Madhow y Abstract The use of channel feedback from receiver to transmitter is standard in wireline communications. While knowledge
More informationCharacterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems
2382 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 59, NO 5, MAY 2011 Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems Holger Boche, Fellow, IEEE,
More informationMinimum Repair Bandwidth for Exact Regeneration in Distributed Storage
1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,
More informationOn Linear Subspace Codes Closed under Intersection
On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F
More informationMa/CS 6b Class 23: Eigenvalues in Regular Graphs
Ma/CS 6b Class 3: Eigenvalues in Regular Graphs By Adam Sheffer Recall: The Spectrum of a Graph Consider a graph G = V, E and let A be the adjacency matrix of G. The eigenvalues of G are the eigenvalues
More informationThe Maximum Dimension of a Subspace of Nilpotent Matrices of Index 2
The Maximum Dimension of a Subspace of Nilpotent Matrices of Index L G Sweet Department of Mathematics and Statistics, University of Prince Edward Island Charlottetown, PEI C1A4P, Canada sweet@upeica J
More informationIndex coding with side information
Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated
More informationKevin James. MTHSC 3110 Section 2.1 Matrix Operations
MTHSC 3110 Section 2.1 Matrix Operations Notation Let A be an m n matrix, that is, m rows and n columns. We ll refer to the entries of A by their row and column indices. The entry in the i th row and j
More informationMatrix Arithmetic. j=1
An m n matrix is an array A = Matrix Arithmetic a 11 a 12 a 1n a 21 a 22 a 2n a m1 a m2 a mn of real numbers a ij An m n matrix has m rows and n columns a ij is the entry in the i-th row and j-th column
More informationZ-Pencils. November 20, Abstract
Z-Pencils J. J. McDonald D. D. Olesky H. Schneider M. J. Tsatsomeros P. van den Driessche November 20, 2006 Abstract The matrix pencil (A, B) = {tb A t C} is considered under the assumptions that A is
More informationError Correcting Index Codes and Matroids
Error Correcting Index Codes and Matroids Anoop Thomas and B Sundar Rajan Dept of ECE, IISc, Bangalore 5612, India, Email: {anoopt,bsrajan}@eceiiscernetin arxiv:15156v1 [csit 21 Jan 215 Abstract The connection
More informationn n matrices The system of m linear equations in n variables x 1, x 2,..., x n can be written as a matrix equation by Ax = b, or in full
n n matrices Matrices Definitions Diagonal, Identity, and zero matrices Addition Multiplication Transpose and inverse The system of m linear equations in n variables x 1, x 2,..., x n a 11 x 1 + a 12 x
More informationVector spaces. DS-GA 1013 / MATH-GA 2824 Optimization-based Data Analysis.
Vector spaces DS-GA 1013 / MATH-GA 2824 Optimization-based Data Analysis http://www.cims.nyu.edu/~cfgranda/pages/obda_fall17/index.html Carlos Fernandez-Granda Vector space Consists of: A set V A scalar
More informationCentral Groupoids, Central Digraphs, and Zero-One Matrices A Satisfying A 2 = J
Central Groupoids, Central Digraphs, and Zero-One Matrices A Satisfying A 2 = J Frank Curtis, John Drew, Chi-Kwong Li, and Daniel Pragel September 25, 2003 Abstract We study central groupoids, central
More informationSign Patterns with a Nest of Positive Principal Minors
Sign Patterns with a Nest of Positive Principal Minors D. D. Olesky 1 M. J. Tsatsomeros 2 P. van den Driessche 3 March 11, 2011 Abstract A matrix A M n (R) has a nest of positive principal minors if P
More informationarxiv:cs/ v1 [cs.it] 11 Sep 2006
0 High Date-Rate Single-Symbol ML Decodable Distributed STBCs for Cooperative Networks arxiv:cs/0609054v1 [cs.it] 11 Sep 2006 Zhihang Yi and Il-Min Kim Department of Electrical and Computer Engineering
More informationANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3
ANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3 ISSUED 24 FEBRUARY 2018 1 Gaussian elimination Let A be an (m n)-matrix Consider the following row operations on A (1) Swap the positions any
More informationMATHEMATICS 217 NOTES
MATHEMATICS 27 NOTES PART I THE JORDAN CANONICAL FORM The characteristic polynomial of an n n matrix A is the polynomial χ A (λ) = det(λi A), a monic polynomial of degree n; a monic polynomial in the variable
More informationBlind Channel Identification in (2 1) Alamouti Coded Systems Based on Maximizing the Eigenvalue Spread of Cumulant Matrices
Blind Channel Identification in (2 1) Alamouti Coded Systems Based on Maximizing the Eigenvalue Spread of Cumulant Matrices Héctor J. Pérez-Iglesias 1, Daniel Iglesia 1, Adriana Dapena 1, and Vicente Zarzoso
More informationMATH 20F: LINEAR ALGEBRA LECTURE B00 (T. KEMP)
MATH 20F: LINEAR ALGEBRA LECTURE B00 (T KEMP) Definition 01 If T (x) = Ax is a linear transformation from R n to R m then Nul (T ) = {x R n : T (x) = 0} = Nul (A) Ran (T ) = {Ax R m : x R n } = {b R m
More informationLecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH
: Antenna Diversity and Theoretical Foundations of Wireless Communications Wednesday, May 4, 206 9:00-2:00, Conference Room SIP Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication
More informationLecture 7. Econ August 18
Lecture 7 Econ 2001 2015 August 18 Lecture 7 Outline First, the theorem of the maximum, an amazing result about continuity in optimization problems. Then, we start linear algebra, mostly looking at familiar
More informationOn the Degrees of Freedom of the Finite State Compound MISO Broadcast Channel
On the Degrees of Freedom of the Finite State Compound MISO Broadcast Channel Invited Paper Chenwei Wang, Tiangao Gou, Syed A. Jafar Electrical Engineering and Computer Science University of California,
More informationON ORTHOGONAL REDUCTION TO HESSENBERG FORM WITH SMALL BANDWIDTH
ON ORTHOGONAL REDUCTION TO HESSENBERG FORM WITH SMALL BANDWIDTH V. FABER, J. LIESEN, AND P. TICHÝ Abstract. Numerous algorithms in numerical linear algebra are based on the reduction of a given matrix
More informationOn the Robustness of Algebraic STBCs to Coefficient Quantization
212 Australian Communications Theory Workshop (AusCTW) On the Robustness of Algebraic STBCs to Coefficient Quantization J. Harshan Dept. of Electrical and Computer Systems Engg., Monash University Clayton,
More informationConsecutive ones Block for Symmetric Matrices
Consecutive ones Block for Symmetric Matrices Rui Wang, FrancisCM Lau Department of Computer Science and Information Systems The University of Hong Kong, Hong Kong, PR China Abstract We show that a cubic
More information3. Vector spaces 3.1 Linear dependence and independence 3.2 Basis and dimension. 5. Extreme points and basic feasible solutions
A. LINEAR ALGEBRA. CONVEX SETS 1. Matrices and vectors 1.1 Matrix operations 1.2 The rank of a matrix 2. Systems of linear equations 2.1 Basic solutions 3. Vector spaces 3.1 Linear dependence and independence
More information. The following is a 3 3 orthogonal matrix: 2/3 1/3 2/3 2/3 2/3 1/3 1/3 2/3 2/3
Lecture Notes: Orthogonal and Symmetric Matrices Yufei Tao Department of Computer Science and Engineering Chinese University of Hong Kong taoyf@cse.cuhk.edu.hk Orthogonal Matrix Definition. An n n matrix
More informationSpace-Time Coding for Multi-Antenna Systems
Space-Time Coding for Multi-Antenna Systems ECE 559VV Class Project Sreekanth Annapureddy vannapu2@uiuc.edu Dec 3rd 2007 MIMO: Diversity vs Multiplexing Multiplexing Diversity Pictures taken from lectures
More informationChain Independence and Common Information
1 Chain Independence and Common Information Konstantin Makarychev and Yury Makarychev Abstract We present a new proof of a celebrated result of Gács and Körner that the common information is far less than
More informationThe doubly negative matrix completion problem
The doubly negative matrix completion problem C Mendes Araújo, Juan R Torregrosa and Ana M Urbano CMAT - Centro de Matemática / Dpto de Matemática Aplicada Universidade do Minho / Universidad Politécnica
More information