Polar Codes for Arbitrary DMCs and Arbitrary MACs
|
|
- Charles Reed
- 5 years ago
- Views:
Transcription
1 Polar Codes for Arbitrary DMCs and Arbitrary MACs Rajai Nasser and Emre Telatar, Fellow, IEEE, School of Computer and Communication Sciences, EPFL Lausanne, Switzerland rajainasser, arxiv:333v [csit] 3 Nov 03 Abstract Polar codes are constructed for arbitrary channels by imposing an arbitrary quasigroup structure on the input alphabet Just as with usual polar codes, the block error probability under successive cancellation decoding is o N / ɛ, where N is the block length Encoding and decoding for these codes can be implemented with a complexity of ON log N It is shown that the same technique can be used to construct polar codes for arbitrary multiple access channels MAC by using an appropriate Abelian group structure Although the symmetric sum capacity is achieved by this coding scheme, some points in the symmetric capacity region may not be achieved In the case where the channel is a combination of linear channels, we provide a necessary and sufficient condition characterizing the channels whose symmetric capacity region is preserved by the polarization process We also provide a sufficient condition for having a maximal loss in the dominant face I INTRODUCTION Polar coding, invented by Arıkan [], is the first low complexity coding technique that achieves the capacity of binary-input symmetric memoryless channels Polar codes rely on a phenomenon called polarization, which is the process of converting a set of identical copies of a given single user binary-input channel, into a set of almost extremal channels, ie, either almost perfect channels, or almost useless channels The probability of error of successive cancellation decoding of polar codes was proven to be equal to o N / ɛ by Arıkan and Telatar [] Arıkan s technique was generalized by Şaşoğlu et al for channels with an input alphabet of prime size [3] Generalization to channels with arbitrary input alphabet size is not simple since it was shown in [3] that if we use a group operation in an Arıkan-like construction, it is not guaranteed that polarization will happen as usual to almost perfect channels or almost useless channels Şaşoğlu [4] used a special type of quasigroup operation to ensure polarization Park and Barg [5] showed that polar codes can be constructed using the group structure Z r Sahebi and Pradhan [6] showed that polar codes can be constructed using any Abelian group structure The polarization phenomenon described in [5] and [6] does not happen in the usual sense, indeed, it was previously proven by Şaşoğlu et al that it is not the case It is shown in [5] and [6] that while it is true that we don t always have polarization to almost perfect channels or almost useless channels if a general Abelian operation is used, we always have polarization to almost useful channels ie, channels that are easy to be used for communication The proofs in [5] and [6] rely mainly on the properties of Battacharyya parameters to derive polarization results In this paper, we adopt a different approach: we give a direct elementary proof of polarization for the more general case of quasigroups using only elementary information theoretic concepts namely, entropies and mutual information The Battacharyya parameter is used here only to derive the rate of polarization In the case of multiple access channels MAC, we find two main results in the literature: i Şaşoğlu et al constructed polar codes for the two-user MAC with an input alphabet of prime size [7], ii Abbe and Telatar used matroid theory to construct polar codes for the m-user MAC with binary input [8] The This paper was presented in part at the IEEE International Symposium on Information Theory, Istanbul, Turkey, July 03 This paper is submitted to the IEEE Transactions on Information Theory
2 generalization of the results in [8] to MACs with arbitrary input alphabet size is not trivial even in the case of prime size since there is no known characterization for non-binary matroids We have shown in [9] that the use of matroid theory is not necessary; we used elementary techniques to construct polar codes for the m-user MAC with input alphabet of prime size In this paper, we will see how we can construct polar codes for an arbitrary MAC where the input alphabet size is allowed to be arbitrary, and possibly different from one user to another In our construction, as well as in both constructions in [7] and [8], the symmetric sum capacity is preserved by the polarization process However, a part of the symmetric capacity region may be lost in the process We study this loss in the special case where the channel is a combination of linear channels this class of channels will be introduced in section 8 In section, we introduce the preliminaries for this paper We describe the polarization process in section 3 The rate of polarization is studied in section 4 Polar codes for arbitrary single user channels are constructed in section 5 The special case of group structures is discussed in section 6 We construct polar codes for arbitrary MAC in section 7 The problem of loss in the capacity region is studied in section 8 II PRELIMINARIES We first recall the definitions for multiple access channels in order to introduce the notation that will be used throughout this paper Since ordinary channels one transmitter and one receiver can be seen as a special case of multiple access channels, we will not provide definitions for ordinary channels A Multiple access channels Definition A discrete m-user multiple access channel MAC is an m + -tuple P = X, X,, X m, Y, f P where X,, X m are finite sets that are called the input alphabets of P, Y is a finite set that is called the output alphabet of P, and f P : X X X m Y [0, ] is a function satisfying x, x,, x m X X X m, f P x, x,, x m, y = y Y Notation We write P : X X X m Y to denote that P has m users, X, X,, X m as input alphabets, and Y as output alphabet We denote f P x, x,, x m, y by P y x, x,, x m which is interpreted as the conditional probability of receiving y at the output, given that x, x,, x m is the input Definition A code C of block length N and rate vector R, R,, R m is an m + -tuple C = f, f,, f m, g, where f k : W k =,,, e NR k } X N k is the encoding function of the k th user and g : Y n W W W m is the decoding function We denote f k w = f k w,, f k w N, where f k w n is the n th component of f k w The average probability of error of the code C is given by: P e w,, w m = P e w,, w m P e C = W W m, w,,w m W W m y,,y N Y N n= gy,,y N w,,w m N P y n f w n,, f m w m n Definition 3 A rate vector R = R,, R m is said to be achievable if there exists a sequence of codes C N of rate vector R ɛ,n, R ɛ,n,, R m ɛ m,n and of block length N such that the sequence P e C N } N and the sequences ɛ i,n } N for all i m tend to zero as N tends to infinity The capacity region of the MAC P is the set of all achievable rate vectors
3 Definition 4 Given a MAC P and a collection of independent random variables X,, X m taking values in X,, X m respectively, we define the polymatroid region J X,,X m P in R m by: J X,,X m P := R = R,, R m R m : 0 RS I X,,X m [S]P for all S,, m} }, where RS := l S k= R k, XS := X s,, X sls for S = s,, s ls } and I X,,X m [S]P := IXS; Y XS c The mutual information is computed for the probability distribution P y x,, x m P X,,X m x,, x m on X X m Y Theorem Theorem 536 [0] The capacity region of a MAC P is given by the closure of the convex hull of the union of all information theoretic capacity regions of P for all the input distributions, ie, ConvexHull J X,,X m P X,,X m are independent random variables in X,,X m resp Definition 5 I X,,X m P := I X,,X m [,, m}]p is called the sum capacity of P for the input distributions X,, X m It is equal to the maximum value of R + + R m when R,, R m belongs to the information theoretic capacity region for input distributions X,, X m The set of points of the information theoretic capacity region satisfying R + + R m = I X,,X m P is called the dominant face of this region Notation When X,, X m are independent and uniform random variables in X,, X m respectively, we will simply denote J X,,X m P, I X,,X m [S]P and I X,,X m P by J P, I[S]P and IP respectively J P is called the symmetric capacity region of P, and IP is called the symmetric sum capacity of P B Quasigroups Definition 6 A quasigrous a pair Q,, where is a binary operation on the set Q satisfying the following: For any two elements a, b Q, there exists a unique element c Q such that a = b c We denote this element c by b\ a For any two elements a, b Q, there exists a unique element d Q such that a = d b We denote this element d by a/ b Remark If Q, is a quasigroup, then Q, / and Q, \ are also quasigroups Notation 3 Let A and B be two subsets of a quasigroup Q, We define the set: A B := a b : a A, b B} If A and B are non-empty, then A B max A, B } Definition 7 Let Q be any set A partition H of Q is said to be a balanced partition if and only if all the elements of H have the same size We denote the common size of its elements by H The number of elements in H is denoted by H Clearly, Q = H H for such a partition Definition 8 Let H be a balanced partition of a set Q We define the projection onto H as the mapping Proj H : Q H, where Proj H x is the unique element H H such that x H Lemma Let H be a balanced partition of a quasigroup Q, Define: H := A B : A, B H}
4 3 If H is a balanced partition, then H H Proof: Let A, B H then A B H, we have: H = A B max A, B } = H Definition 9 Let Q, be a quasigroup A balanced partition H of Q is said to be a stable partition of period n of Q, if and only if there exist n different balanced partitions H,, H n of Q such that: H = H H i+ = H i = A B : A, B H i } for all i n H = H n It is easy to see that if H is a stable partition of period n, then H i = H for all i n from lemma, we have H = H H H n H Remark Stable partitions always exist Any quasigroup Q, admits at least the following two stable partitions of period : Q} and x} : x Q }, which are called the trivial stable partitions of Q, It is easy to see that when Q is prime, the only stable partitions are the trivial ones Example Let Q = Z n Z n, define x, y x, y = x +y +x +y, y +y For each j Z n and each i n, define H i,j = j + i k, k : k Z n } Let H i = H i,j : j Z n } for i n It is easy to see that H i = H i+ for i n and H n = H Therefore, H := H is a stable partition of Q, whose period is n Note that the operation in the last example is not a group operation when n > Lemma If H is a stable partition and A is an arbitrary element of H, then H = A A : A H} Proof: We have: Q = A Q = A A H A = A A Therefore, A A : A H} covers Q and is a subset of H which is a partition of Q that does not contain the empty set as an element We conclude that H = A A : A H} Definition 0 For any two partitions H and H, we define: A H H H = A B : A H, B H, A B ø} Lemma 3 If H and H are stable then H H is also a stable partition of Q,, and H H = H H Proof: Since H and H are two partitions of Q, it is easy to see that H H is also a partition of Q Now let A, A H and B, B H If A B ø and A B ø, we have: A B A B A A B B H H Let A H and B H be chosen such that A B is maximal Lemma implies that H = A A : A H } and H = B B : B H } Therefore, Q = A A B B, A,B H H
5 4 which implies that Q A A B B A,B H H A B ø A,B H H A B ø where 3 follows from Now if A B ø, we must have A B A B, 3 A B A B A B A B 4 Therefore, we have: A B A B A B A B 5 A,B H H A B ø A,B H H A B ø Now since H and H are two partitions of Q, we must have A,B H H A B ø A B = Q We conclude A,B H H A B ø that all the inequalities in, 3, 4 and 5 are in fact equalities Therefore, for all A H and B H such that A B ø, we have A B = A B ie, H H is a balanced partition, and A B A B = A A B B Now implies that A B A B = A A B B Therefore, H H = H H If H and H are of periods n and n respectively, then H H is a stable partition whose period is at most lcmn, n III POLARIZATION PROCESS In this section, we consider ordinary channels having a quasigroup structure on their input alphabet Definition Let Q, be an arbitrary quasigroup, and let P : Q Y be a single user channel We define the two channels P : Q Y Y and P + : Q Y Y Q as follows: P y, y u = P y u u P y u, Q u Q P + y, y, u u = Q P y u u P y u For any s = s,, s n, +} n, we define P s := P s s sn Remark 3 Let U and U be two independent random variables uniformly distributed in Q Set X = U U and X = U, then X and X are independent and uniform in Q since is a quasigroup operation Let Y and Y be the outputs of the channel P when X and X are the inputs respectively It is easy to see that IP = IU ; Y, Y and IP + = IU ; Y, Y, U We have: IP + IP + = IU ; Y, Y + IU ; Y, Y, U = IU, U ; Y, Y = IX, X ; Y, Y = IX ; Y + IX ; Y = IP It is clear that IP + = IU ; Y, Y, U IU ; Y = IX ; Y = IP We conclude that IP IP IP +
6 5 Definition Let H be a balanced partition of Q, /, we define the channel P [H] : H Y by: P [H]y H = P y x H x Q, Proj H x=h Remark 4 If X is a random variable uniformly distributed in Q and Y is the output of the channel P when X is the input, then it is easy to see that IP [H] = IProj H X; Y Definition 3 Let B n } n be iid uniform random variables in, +} We define the channel-valued process P n } n 0 by: P 0 := P, P n := P Bn n n The main result of this section is that almost surely P n becomes a channel where the output is almost equivalent to the projection of the input onto a stable partition of Q, / : Theorem Let Q, be a quasigroup and let P : Q Y be an arbitrary channel Then for any δ > 0, we have: s, +} n : H s a stable partition of Q, /, lim n IP s log H s < δ, IP s [H s ] log H s < δ } = Remark 5 Theorem can be interpreted as follows: in a polarized channel P s, we have IP s IP s [H s ] log H s for a certain stable partition H s of Q, / Let X s and Y s be the channel input and output of P s respectively IP s [H s ] log H s means that Y s almost determines Proj Hs X s On the other hand, IP s IP s [H s ] means that there is almost no information about X s other than Proj Hs X s which can be determined from Y s In order to prove theorem, we need several lemmas: Lemma 4 Let Q, be a quasigroup If A, B and C are three non-empty subsets of Q such that A = B = C = A C = B C, then either A B = ø or A = B Proof: Suppose that A B ø and let a A B The fact that A C = C implies that A C = a C Similarly, we also have B C = a C since a B Therefore, A B C = a C, and so A B C = C = A By noticing that A A B A B C = A, we conclude that A B = A, which implies that A = B since A = B Definition 4 Let Q be a set, and let A be a subset of Q, we define the distribution I A on Q as I A x = A if x A and I A x = 0 otherwise Lemma 5 Let X be a random variable on Q, and let A be a subset of Q Suppose that there exist δ > 0 and an element a A such that P X x P X a < δ for all x A and P X x < δ for all x / A Then P X I A < Q δ Proof: We have: A PX a = x A x Q P X x A P X a = PX x P X a + x A x Ac P X x P X a + P X x < Q δ x A c P X x
7 Therefore, P X a < Q δ Q δ Let x A, then A A P X x PX x P X a PX + a < Q δ A A On the other hand, if x / A we have P X x < δ Q δ Thus, P X I A < Q δ Definition 5 Let Q and Y be two arbitrary sets Let H be a set of subsets of Q Let X, Y be a pair of random variables in Q Y We define: } A H,δ X, Y = y Y : H y H, P X Y =y I Hy < δ, P H,δ X; Y = P Y AH,δ X, Y If P H,δ X; Y > δ for a small enough δ, then Y is almost equivalent to Proj H X The next lemma shows that if IP is close to IP, then the output Y of P is almost equivalent to Proj H X, where X is the input to the channel P and H is a certain balanced partition of Q Lemma 6 Let Q and Y be two arbitrary sets with Q Let X, Y be a pair of random variables in Q Y such that X is uniform Let H be a set of disjoint subsets of Q that have the same size If P H, X; Y >, then H is a balanced partition of Q Q Q Proof: We only need to show that H covers Q Suppose that there exists x Q such that there is no H in H such that x H Then for all y A H, X, Y, P Q X Y x y < We have: Q P X x = P X Y x yp Y y + P X Y X Y P Y Y y A H, X,Y y A Q H, X,Y c Q < Q P Y AH, Q X, Y + P Y AH, Q X, Y c < Q + Q = Q Q which is a contradiction since X is uniform in Q Therefore, H covers Q and so it is a balanced partition of Q Lemma 7 Let Q and Y be two arbitrary sets with Q, and let H and H be two balanced partitions of Q Let X, Y be a pair of random variables in Q Y such that X is uniform If P H, X; Y > Q Q and P H, X; Y >, then H = H Q Q Proof: Define H = H H Let y A H, X, Y A Q H, X, Y, choose H H and H H Q such that P X Y =y I H < and P Q X Y =y I H <, then Q which implies that H = H and y A H, I H I H < Q Q Q P H, X; Y P Q Y AH, X, Y Therefore, X, Y A Q H, X, Y > Q Q From lemma 6 we conclude that H is a balanced partition Therefore, H = H = H Lemma 8 Let Q, be a quasigroup with Q, and let Y be an arbitrary set For any δ > 0, there exists ɛ δ > 0 depending only on Q such that for any two pairs of random variables X, Y and X, Y that are independent and identically distributed in Q Y with X and X being uniform in Q, then HX X Y, Y < HX Y + ɛ δ implies the existence of a balanced partition H of Q such that P H,δ X ; Y > δ Moreover, H H = H = H for every H, H H 6
8 Proof: Choose δ > 0, and let δ = min δ, Q Q 4 } Define: p y x := P X Y x y and p y,x x := p y x/ x q y x := P X Y x y and q y,x x := q y x \ x Note that q y x = p y x since X, Y and X, Y are identically distributed Nevertheless, we choose to use q y x to denote P X Y x y for the sake of notational consistency We have: P X X Y,Y x y, y = x Q p y x q y,x x 6 7 = x Q q y x p y,x x 7 Due to the strict concavity of the entropy function, there exists ɛ δ > 0 such that: If x, x Q such that p y x δ, p y x δ and q y,x q y,x δ then see 6 HX X Y = y, Y = y HX Y = y + ɛ δ, 8 If x, x Q such that q y x δ, q y x δ and p y,x p y,x δ then HX X Y = y, Y = y HX Y = y + ɛ δ, 9 see 7 Define: C = y, y Y Y : x, x Q, p y x δ, p y x } δ q y,x q y,x < δ, C = From 8 we have: y, y Y Y : x, x Q, q y x δ, q y x δ p y,x p y,x < δ } HX X Y, Y HX Y + ɛ δ P Y,Y C c = HX Y + ɛ δ P Y,Y C c Similarly, from 9 we have Let ɛ δ = ɛ δ δ, and suppose that HX X Y, Y HX Y + ɛ δ P Y,Y C c HX X Y, Y < HX Y + ɛ δ, then we must have P Y,Y C c < δ and P Y,Y C c < δ, which imply that P Y,Y C > δ, where C = C C Now for each a, a, x Q, define: π a,a x := x a/ a, and γ a,a x := a \ a x And for each y, y Y Y, define: A y := x Q, p y x δ } B y := x Q, q y x δ } a y := arg max p y x b y := arg max q y x x x } H y,y = x Q : b, b, b, b,, b n, b n B y, x = π bn,b π n b,b a y } K y,y = x Q : a, a, a, a,, a n, a n A y, x = γ an,a γ n a,a b y
9 8 Suppose that y, y C Let x H y,y, and let n be minimal such that there exists b, b, b, b,, b n, b n B y satisfying x = π bn,b n π b,b a y Define a := a y, and for i n define a i+ = π bi,b i a i, so that a n+ = x We must have a i a j for i j since n was chosen to be minimal Therefore, n + Q For any i n, we have a i+ = a i b i / b i Let x = a i b i, then a i+ = x/ b i and a i = x/ b i We have y, y C, q y b i δ and q y b i δ, so we must have p y,b i p y,b i < δ, and p y,b i x p y,b i x < δ, which implies that p y a i+ p y a i < δ Therefore: p y x p y a y = p y a n+ p y a n p y a i+ p y a i i= < nδ Q δ Q Q 4 < Q Q 0 Since p y a y Q, we have p y x > Q > δ for every x H y,y Therefore, H y,y A y y, y C A similar argument yields K y,y B y y, y C Fix two elements b, b B y We have x b/ b H y,y and so x b H y,y b for any x H y,y Therefore, H y,y b H y,y b But this is true for any two elements b, b B y, so H y,y b = H y,y b b, b B y, and H y,y B y = H y,y Similarly, we have A y K y,y = K y,y If we also take into consideration the fact that H y,y A y and K y,y B y we conclude: B y H y,y B y = H y,y A y, A y A y K y,y = K y,y B y Therefore, A y = H y,y = B y = K y,y We conclude that H y,y = A y and K y,y = B y Moreover, we have A y B y = A y = B y Recall that p y x p y a y < Q δ for all x A y see 0 and p y x < δ Q δ for x / A y It is easy to deduce that p y I Ay < Q Q δ < Q δ Therefore, p y I Ay < δ and p y I Ay < Similarly, q Q y I By < δ and q y I By < Q Now define C Y = y Y : P Y y, Y C > δ }, and for each y C Y, define K y = } y Y : y, y C Then we have: δ < P Y,Y C P Y C Y δ + P Y C Y, from which we conclude that P Y C Y > δ And by definition, we also have P Y K y > δ for all y C Y Define H y = B y : y K y } Fix y C Y Since A y B = A y B = A y = B = B for every B, B H y, we conclude that the elements of H y are disjoint and have the same size lemma 4 Now since P Y K y > Q 4 and since X is uniform in Q, it is easy to see that H y covers Q and so it is a balanced partition of Q for all y C Y Moreover, since P Y K y >, we can also conclude that all the balanced partitions Q 4 H y are the same Let us denote this common balanced partition by H We have A B = A = B for all A H and all B H, where H = A y : y C Y } By using a similar argument as in the previous paragraph, we can deduce that H is a balanced partition of Q
10 9 Moreover, since X, Y and X, Y are identically distributed, we can see that H = H We conclude the existence of a balanced partition H of Q satisfying A B = A = B for all A, B H and P Y y Y : H y H, P X Y =y I Hy < δ} P Y C Y > δ > δ Lemma 9 Let X and X be two independent random variables in Q such that there exists two sets A, B Q satisfying P X I A < δ, P X I B < δ and A B = A = B, then P X X I A B < δ + Q δ Proof: The fact that A B = A = B implies that for every x A B, we have x/ b A for every b B, and x/ b A c for every b B c For every a Q define ɛ,a = P X a if a A, and ɛ A,a = P X a if a / A Similarly, for every b Q define ɛ,b = P X b if b B, and ɛ A,b = P X b if b / B Let x A B, we have: Therefore, Now let x / A B, we have: P X X x = b B = b B P X X x = b B P X x/ bp X b + b B c P X x/ bp X b = A + ɛ,x/ b A + ɛ,b + ɛ,x/ bɛ,b b B b B c = A + ɛ,x/ A b + ɛ,b + ɛ,x/ bɛ,b b Q P X x/ bp X b + b/ B ɛ,x/ b A + ɛ,b b B P X X x < δ + Q δ A x/ b A + b/ B x/ b A P X x/ bp X b + b/ B x/ b/ A P X x/ bp X b A + ɛ,x/ b ɛ,b + ɛ,x/ bɛ,b δ + Q δ b/ B x/ b/ A Lemma 0 Let Q, be a quasigroup with Q, and let Y be an arbitrary set For any δ > 0, there exists ɛδ > 0 depending only on Q and δ such that for any channel P : Q Y, IP IP < ɛδ implies the existence of a balanced partition H of Q such that H / = H/ H : H, H H} is also a balanced partition of Q, P H,δ X ; Y > δ, P H,δ U ; Y, Y, U > δ and P H /,δu ; Y, Y > δ Where U and U are two independent random variables uniformly distributed in Q, X = U U, X = U, and Y resp Y is the output of the channel P when X resp X is the input Proof: Let δ = minδ, δ, }, where δ > 0 is a small enough number that will be specified 6 Q later Let ɛδ = ɛ δ, where ɛ is given by lemma 8 Let P : Q Y be a channel as in the hypothesis Then from lemma 8 we conclude the existence of two balanced partitions H and H such that P H,δ X ; Y > δ and P H,δ U ; Y, Y > δ Moreover, we have H / H = H = H for every H, H H Given H H, define: } } A H = y Y : P X Y =y I H < δ = y Y : P X Y =y I H < δ,
11 0 note that X, Y and X, Y are identically distributed Let x H, we have: Q = P X x = P X Y x yp Y y + P X Y x yp Y y + P X Y x yp Y y y A H,δ X ;Y \A H y A h y / A H,δ X ;Y δ P H,δ X ; Y + H + δ P Y A h + P H,δ X ; Y < δ + P Y A H Therefore, 8 Q + P Y A H < Q + P Y A H P Y A H = P Y A H > 4 Q Now for each H, H H, define: A H,H = y,y Y Y : P U Y =y,y =y I H / H < } Q Let y, y A H A H, then P X Y =y I H < δ and P X Y =y I H < δ Lemma 9 implies that P U Y =y,y =y I H / H = P X / X Y =y,y =y I H / H < δ + Q δ 8 Q + Q 6 Q < 4 Q Therefore, A H A H A H,H and so P Y,Y A H,H P Y A H P Y A H > δ see We 6 Q recall that P Y,Y AH,δ U ; Y, Y = P H,δ U ; Y, Y > δ, so A H,δ U ; Y, Y A H,H ø Let y, y A H,δ U ; Y, Y A H,H, then there exists H H such that P U Y =y,y =y I H < δ < Now since y Q, y A H,H, we have P U Y =y,y =y I H / H <, so Q I H I H / H <, we conclude that Q H = H / H and H / H H But this is true for any H, H H Therefore, H / H, which implies that H / = H since both H and H / are partitions of Q whose all elements are non-empty Thus, P H,δ X ; Y P H,δ X ; Y > δ δ, P H /,δu ; Y, Y P H /,δ U ; Y, Y > δ δ It remains to prove that P H,δ U ; Y, Y, U > δ Define: K = A H /,δ U ; Y, Y A H,δ X ; Y A H,δ X ; Y We have: P Y A H,δ X ; Y = P Y A H,δ X ; Y = P H,δ X ; Y P H,δ X ; Y > δ δ Thus, P Y,Y A H,δ X ; Y A H,δ X ; Y > δ On the other hand, we have: P Y,Y A H /,δ U ; Y, Y = P H /,δ U ; Y, Y = P H,δ U ; Y, Y P H,δ U ; Y, Y > δ δ,
12 we conclude that P Y,Y K > 3δ Define: B = y, y, u Y Y Q : y, y K, and H H /, P U Y =y,y =y I H < δ and u H } If y, y K, then y, y A H /,δ U ; Y, Y and so there exists H y,y H / such that P U Y =y,y =y I Hy,y < δ, which implies that y, y, u B for all u H y,y Now since P U Y =y,y =y I Hy,y < δ, it is easy to see that P U Y =y,y =y H y,y H y,y δ Q δ Therefore, P Y,Y,U B > P Y,Y K Q δ > 3δ Q δ > Q + 3δ Therefore, if δ δ, then P Q +3 Y,Y,U B > δ Now let y, y, u B There exists H, H H and H H / such that: u H, P U Y =y,y =y I H < δ, P X Y =y I H < δ, P X Y =y I H < δ Since U = X / X, lemma 9 implies that P U Y =y,y =y I H / H < δ + Q δ, and I H I H / H < 3δ + Q δ Therefore, if δ, then I 4 Q H I H / H < and H = H Q / H Now we have: u H implies PU Y,Y u y, y H < δ, ie, H δ < P U Y,Y u y, y < + H δ If u H, then u u H which implies that PX Y u u y H < δ and PX Y u y < δ H If u / H, then u u / H, so P X Y u u y < δ and P X Y u y < δ By noticing that P U Y,Y,U u y, y, u = P U,U Y,Y u, u y, y P U Y,Y u y, y we conclude that: If u H, we have: If u / H, we have: δ H + < P U H δ Y,Y,U u y, y, u < P U Y,Y,U u y, y, u < Consequently, there exists βδ > 0 such that if δ βδ we get = P X Y u u y P X Y u y, P U Y,Y u y, y δ H δ H + δ H δ P U Y =y,y =y,u =u I H < δ By setting δ δ = min, },, βδ we get y Q +3 4 Q, y, u A H,δ U ; Y, Y, U for every y, y, u B, ie, B A H,δ U ; Y, Y, U and P H,δ U ; Y, Y, U P Y,Y,U B > δ Now we are ready to prove theorem In fact, we will prove a stronger theorem:
13 Theorem 3 Let Q, be a quasigroup and let P : Q Y be an arbitrary channel Then for any δ > 0, we have: lim s, +} n : H s a stable partition of Q, /, n IP s [H ] log H s H s H < δ for all stable partitions H of Q, / } H = Proof: Due to the continuity of the entropy function, there exists γδ > 0 depending only on Q such that if X, Y is a pair of random variables in Q Y where X is uniform, and if there exists a stable partition of H such that P H,γδ X; Y > γδ, then IX; Y log H < δ and I Proj H X; Y log H H H H < δ for all stable partitions H of Q, / remember that H H is a stable partition by lemma 3 Let P n be as in definition 3 From remark 3 we have: E IP n+ P n = IP n + IP n + = IP n This implies that the process IP n } n is a martingale, and so it converges almost surely Let m be the number of different balanced partitions of Q, choose l > m and let 0 i l + Almost surely, IP n l+i+ IP n l+i converges to zero Therefore, we have: where A n,l,i := lim n l+i A n,l,i = } s, s, +} n l, +} i : IP s,s, IP s,s < ɛδ, and ɛδ is given by lemma 0 Now for each s, +} i, define: } A n,l,s := s, +} n l : IP s,s, IP s,s < ɛδ It is easy to see that A n,l,i = A n,l,s Therefore, s,+} i ie, i s,+} i lim A n l n,l,s s,+} i lim = lim A n,l,i =, n l+i A n l n,l,s = i On the other hand, it is obvious that A n,l,s n l, and so lim A n l n,l,s for all s, +} i We can now use to conclude that lim A n l n,l,s for all s, +} i Therefore, we must have lim A n,l =, where n l A n,l : = = A n,l,s 0 i l+ s,+} i s, +} n l : IP s,s, IP s,s < ɛδ, s, +} i, 0 i l + }
14 3 Now define: C l := } s, +} l : s contains the sign at least m times, B n,l := A n,l C l = s = s, s, +} n l, +} l : s A n,l, s C l }, D n := s, +} n : H s a stable partition of Q, /, IP s [H ] log H s H s H } < δ for all stable partitions H of Q, / H 3 Now let s A n,l, let n l j n, let s = s, s, +} j for some s, +} j n+l, let X s be the input to the channel P s and Y s be the output of it Since j n+l l, both s and s, have lengths of at most l + Therefore, we have IP s,s, IP s,s < ɛδ and IP s,s,, IP s,s, < ɛδ Lemma 0 implies the existence of a balanced partitions H s such that P X Hs,δ s; Y s > δ, P / H X s,δ s, ; Y s, > δ and P X Hs,δ s,+; Y s,+ > δ for all s, +} j n l j n having s as a prefix Since δ <, lemma 7 implies that H Q s, = H s / and H s,+ = H s for all s, +} j n l j < n having s as a prefix Let s C l, and let l be the number of signs in s we have m l l, then there exist l + balanced partitions H i 0 i l such that H 0 = H s, H l = H s,s, and H i+ = H / i for each 0 i l Since m is the number of different balanced partitions of Q, there exist two indices i and j such that i < j l and H i = H j We conclude that H l = H s,s is a stable partition of Q, / Moreover, since δ γδ, s, s belongs to D n Therefore, B n,l D n for any l m Thus: lim inf But this is true for any l m, we conclude: which implies that D n lim n B n,l = lim n A n,l n l lim inf D n lim n l C l =, l lim n D n = l C = l C l l IV RATE OF POLARIZATION In this section, we are interested in the rate of polarization of P n to deterministic projection channels Definition 6 The Battacharyya parameter of an ordinary channel P with input alphabet X and output alphabet Y is defined as: ZP = P y xp y x X X x,x X X x x if X > And by convention, we take ZP = 0 if X = It s known that P e P X ZP see [3], where P e P is the probability of error of the maximum likelihood decoder of P y Y
15 4 Definition 7 Let Q, be a quasigroup with Q, and Y be an arbitrary set Let P : Q Y be an arbitrary channel, and H be a stable partition of Q, / We define the channels P [H] : H / Y Y and P [H] + : H Y Y H / by: P [H] + y, y, H H = H P [H]y H H P [H]y H, P [H] y, y H = H H H P [H]y H H P [H]y H Lemma P [H] + is degraded with respect to P + [H], and P [H] is equivalent to P [H / ] Proof: Let H, H, y, y H / H Y Y, we have: P [H] + y, y, H H = H P [H]y H H P [H]y H = P y x P y x Q H x Q x Q Proj H x =H H Proj H x =H = P y x x P y x Q H x Q x Q Proj H x =H = H = Proj H / x =H P x Q x Q Proj H / x =H Proj H x =H P x Q Proj H / x =H + [H]y, y, x H + y, y, x x Therefore, P [H] + is degraded with respect to P + [H] Now let H, y, y H / Y Y, we have: P [H] y, y H = P [H]y H H P [H]y H H H H = P y x P y x Q H H H x Q x Q Proj H x =H H Proj H x =H = Q H = Q H = H Therefore, P [H] is equivalent to P [H / ] H H x Q Proj H / x =H x Q x Q Proj H / x =H P x Q Proj H / x =H P y x x P y x x Q Proj H x =H P y x x P y x y, y x = P [H / ]y, y H Definition 8 Let H be a stable partition of Q, /, we define the stable partitions H and H +, by H / and H respectively
16 5 Lemma Let B n and P n be defined as in definition 3 For each stable partition H of Q, /, we define the stable partition-valued process H n by: H 0 := H, H n := H Bn n n Then IP n [H n ] converges almost surely to a number in L H := log d : d divides H } Proof: Since P n [H n ] is equivalent to Pn [H n / ] and P n [H n ] + is degraded with respect to P n + [H n ] lemma, we have: E IP n+ [H n+ ] P n = IP n [H n / ] + IP n + [H n ] IP n[h n ] + IP n[h n ] + = IP n [H n ] This implies that the process IP n [H n ] is a sub-martingale and therefore it converges almost surely Let δ > 0, and define D l,δ as in 3, we have shown that lim n D n,δ = It is easy to see that almost n surely, for every δ > 0 and for every n 0 > 0 there exists n > n 0 such that B,, B n D l,δ Let B n be a realization in which IP n [H n ] converges to a limit x, and in which for every δ > 0 and for every n 0 > 0 there exists n > n 0 such that B,, B n D n,δ Let δ > 0 and let n 0 > 0 be chosen such that IP n [H n ] x < δ for every n > n 0 Choose n > n 0 such that B,, B n D n,δ, this means that there exists a stable partition H of Q, / such that IP n [H n ] log H H H n < δ H n Therefore, x log H n H H n < δ, which implies that x log H H H n since Q = H H n H H = H n H n By noticing that Hn H H n divides H H n = H, we conclude that dx, L H < δ for every δ > 0 Therefore, x L H Lemma 3 Let P : Q Y be an ordinary channel where Q is a quasigroup with Q For any stable partition H of Q, /, we have: s, +} n : H a stable partition of Q, /, lim n for any 0 < ɛ < log and any 0 < β < IP s [H] > log H ɛ, ZP s [H] nβ} = 0, Proof: Let 0 < ɛ < log and 0 < β <, and let H be a stable partition of Q, / IP n [H n ] converges almost surely to an element in L H Due to the relations between the quantities IP and ZP see proposition 33 of [] we can see that ZP n [H n ] converges to 0 if and only if IP n [H n ] converges to log H, and there is a number z 0 > 0 such that lim inf ZP n [H] > z 0 whenever IP n [H] converges to a number in L H other than log H Therefore, we can say that almost surely, we have: lim ZP n [H n ] = 0 or lim inf ZP n [H] > z 0 ZP + n [H + n ] ZP n [H n ] + since P n [H n ] + is degraded with respect to P + n [H + n ], and ZP n [H n ] = ZP n [H n ] since P n [H n ] and P n [H n ] are equivalent see lemma From lemma 35 of [] we have: ZP n [H n ] H H + ZP n [H n ] ZP n [H n ] + H ZP n [H n ]
17 6 Therefore, we have ZP n [H n ] KZP n [H n ] and ZP + n [H n ] KZP n [H n ], where K is equal to H H + By applying exactly the same techniques that were used to prove theorem 35 of [] we get: lim Pr IP n [H n ] > log H ɛ, ZP n [H n ] nβ = 0 But this is true for all stable partitions H Therefore, s, +} n : H a stable partition of Q, /, lim n IP s [H s ] > log H ɛ, ZP s [H s ] nβ} = 0 By noticing that for each s, +} n, there exists a stable partition H s such that H = Hs, s we conclude: s, +} n : H a stable partition of Q, /, lim n IP s [H] > log H ɛ, ZP s [H] nβ} = 0 Theorem 4 The convergence of P n to projection channels is almost surely fast: s, +} n : H a stable partition of Q, /, lim n IP s log H < ɛ, IP s [H] log H < ɛ, ZP s [H] < βn } =, for any 0 < ɛ < log, and any 0 < β < Proof: Let 0 < ɛ < log, and 0 < β < Define: E 0 = s, +} n : H a stable partition of Q, /, IP s [H] > log H ɛ, ZP s [H] βn}, E = s, +} n : H a stable partition of Q, /, IP s log H < ɛ, IP s [H] log H < ɛ }, E = s, +} n : H a stable partition of Q, /, IP s log H < ɛ, IP s [H] log H < ɛ, ZP s [H] < βn } It is easy to see that E \ E 0 E and E E E 0 By theorem and lemma 3 we get: lim n E lim n E E 0 = 0 =
18 7 V POLAR CODE CONSTRUCTION Choose 0 < ɛ < log and 0 < β < β <, let n be an integer such that Q n β n < βn and E ɛ n > n log Q, where E n = s, +} n : H a stable partition of Q, /, IP s log H < ɛ, IP s [H] log H < ɛ }, ZP s [H] < β n Such an integer exists due to theorem 4 A polar code is constructed as follows: If s / E n, let U s be a frozen symbol, ie, we suppose that the receiver knows U s On the other hand, if s E n, there exists a stable partition H s of G, such that IP s log H s < ɛ, IP s [H s ] log H s < ɛ, and ZP s [H s ] < n β Let f s : H s G be a frozen mapping in the sense that the receiver knows f s such that f s H H for all H H s, we call such mapping a section mapping We choose U s uniformly in H s and we let U s = f s U s Note that if the receiver can determine Proj Hs U s = U s accurately, then he can also determine U s since he knows f s Since we are free to choose any value for the frozen symbols and for the section mappings, we will analyse the performance of the polar code averaged on all the possible choices of the frozen symbols and for the section mappings Therefore, U s are independent random variables, uniformly distributed in Q If s / E n, the receiver knows U s and there is nothing to decode, and if s E n, the receiver has to determine Proj Hs U s in order to successfully determine U s We associate the set, +} n with the strict total order < defined as s,, s n < s,, s n if and only if there exists i,, n} such that s i =, s i = + and s j = s j j > i A Encoding Let P s } s,+} n be a set of n independent copies of the channel P P s should not be confused with P s : P s is a copy of the channel P and P s is a polarized channel obtained from P as before Define U s,s for s, +} l, s, +} n l, 0 l n, inductively as: U ø,s = U s if l = 0, s, +} n U s ;,s = U s,s ;+ U s,s ; if l > 0, s, +} l, s, +} n l U s ;+,s = U s,s ;+ if l > 0, s, +} l, s, +} n l We send U s,ø through the channel P s for all s, +} n Let Y s be the output of the channel P s, and let Y = Y s } s,+} n We can prove by induction on l that the channel U s,s Ys } s has s as a prefix, U s,s } s <s is equivalent to the channel P s In particular, the channel U s Y, Us } s <s is equivalent to the channel P s Figure is an illustration of a polar code construction for n = ie, the block-length is N = = 4 B Decoding If s / E n then the receiver knows U s, there is nothing to decode Suppose that s E n, if we know U s } s <s then we can estimate Proj Hs U s from Y, U s } s <s by the maximum likelihood decoder of P s [H s ] After that, we estimate U s = f s Proj Hs U s This motivates the following successive cancellation decoder: Û s = U s if s / E n Û s = D s Y, Ûs } s <s if s E n Where D s Y, U s } s <s is the estimate of U s obtained from Y, U s } s <s by the above procedure
19 8 Fig : Polar code construction for n = C Performance of polar codes If s E n, the probability of error in estimating U s is the probability of error in estimating Proj Hs U s using the maximum likelihood decoder, which is upper bounded by H s ZP s [H s ] < Q β n Note that D s Y, U s } s <s = U s s E n D s Y, Ûs } s <s = U s s E n Therefore, the probability of error of the above successive cancellation decoder is upper bounded by P D s Y, U s } s <s U s < En Q β n Q n β n < βn s E n This upper bound was calculated on average over a random choice of the frozen symbols and of the section mappings Therefore, there exists at least one choice of the frozen symbols and of the section mappings for which the upper bound of the probability of error still holds We should note here that unlike the case of binary input symmetric memoryless channels where the frozen symbols can be chosen arbitrarily, the choice of the frozen symbols and section mappings in our construction of polar codes cannot be arbitrary The code designer should make sure that his choice of the frozen symbols and section mappings actually yields the desirable probability of error The last thing to discuss is the rate of polar codes The rate at which we are communicating is R = log H n s On the other hand, we have IP s log H s < ɛ for all s E n And since we have s E n IP s = n IP, we conclude: s,+} n IP = IP s = IP s + IP s < n n n n s,+} n s E n s E c n < R + n E n ɛ + ɛ log Q log Q R + ɛ + ɛ = R + ɛ s E n log H s + ɛ + n Ec n log Q To this end we have proven the following theorem which is the main result of this paper: Theorem 5 Let P : Q Y be a channel where the input alphabet has a quasigroup structure For every ɛ > 0 and for every 0 < β <, there exists a polar code of length N having a rate R > IP ɛ and a probability of error P e < N β VI THE CASE OF GROUPS Lemma 4 Let G, be a group, and let H be a stable partition of G, / There exists a normal subgroup of G such that H is the quotient group of G by H also denoted by G/H, and Proj H x = x mod H for all x G
20 9 Proof: Let H be the element of H containing the neutral element e of G For any H H, we have H = H / e H / H Now because of the stability of H, we have H / H = H and so H / H = H for all H H This implies that H / = H Now for any H H = H / and H H, there exists H 3 H such that H = H 3 / H, and so H H = H 3 H Therefore, we also have H = H Now for any H H, we have H = e H H H H, H = H e H H H, and H = H H = H H, from which we conclude that H H = H H = H This implies that H H = H, and k H = H k for any k G Therefore, H is a normal subgroup of G, and H is the quotient subgroup of G by H By combining the last lemma with theorem 4, we get: Theorem 6 Let P : G Y be a channel where the input alphabet G has a group structure P n converges almost surely to homomorphism channels Moreover, the convergence is almost surely fast: s, +} n : H a normal subgroup of G, lim n IP s log G/H < ɛ, IP s [H] log G/H < ɛ, ZP s [H] < βn } =, for any 0 < ɛ < log, and any 0 < β < Where P [H] : G/H Y is defined as: P [H]y a = P y x H x G x mod H=a VII POLAR CODES FOR ARBITRARY MULTIPLE ACCESS CHANNELS In this section, we construct polar codes for an arbitrary multiple access channel, where there is no constraint on the input alphabet sizes: they can be arbitrary, and possibly different from one user to another If we have X k = p r p r p rn k n k, where p,, p nk are prime numbers, we can assume that X k = F r p F r p F rn k p nk, and so we can replace the k th user by r +r + +r nk virtual users having F p, F p,, or F pnk as input alphabet respectively Therefore, we can assume without loss of generality that X k = F qk for all k, where q k is a prime number Let p, p,, p l be the distinct primes which appear in q,, q m, and for each i l let m i be the number of times appears in q,, q m We adopt two notations to indicate the users and their inputs: The first notation is the usual one: we have an index k taking value in,, m}, and the input of the k th user is denoted by X k F qk In the second notation, the m i users having their inputs in F pi will be indexed by i,,, i, j,, i, m i, where i l and j m i The input of the i, j th user is denoted by X i,j F pi The vector X i,,, X i,mi F m i is denoted by X i m m Definition 9 Let P : F qk Y be a discrete m-user MAC We define the two channels P : F qk Y and P + : k= m F qk Y k= P y, y u,, u m = m k= F qk q q m as: P + y, y, u,, u m u,, u m = u,,u m m k= Fq k k= P y u + u,, u m + u mp y u,, u m, q q m P y u + u,, u m + u mp y u,, u m,
21 0 where the addition u k + u k takes place in F q k P and P + can be constructed from two independent copies of P as follows: The k th user chooses independently and uniformly two symbols Uk and U k in F q k, then he calculates Xk = U k + U k and Xk = U k, and he finally sends X k through the first copy of P and X k through the second copy of P Let Y and Y be the output of the first and second copy of P respectively P is the conditional probability distribution of Y Y given U Um, and P + is the conditional probability distribution of Y Y U Um given U Um Note that the transformation U,, Um, U,, Um X,, Xm, X,, Xm is bijective and therefore it induces uniform and independent distributions for X,, Xm, X,, Xm which are the inputs of the P channels Definition 0 Let B n } n be iid uniform random variables on, +} We define the MAC-valued process P n } n 0 by: P 0 := P, P n := P Bn n n Proposition [7] [8] The process I[S]P n } n 0 is a bounded super-martingale for all S,, m} Moreover, it s a bounded martingale if S =,, m} Proof: I[S]P = I[S]P + I[S]P = IX S; Y X S c + IX S; Y X S c = IX SX S; Y Y X S c X S c = IU SU S; Y Y U S c U S c = IU S; Y Y U S c U S c + IU S; Y Y U S c U S c U S IU S; Y Y U S c + IU S; Y Y U U mu S c = I[S]P + I[S]P + Thus, E I[S]P n+ Pn = I[S]P n + I[S]P + n I[S]P n, and I[S]P n log q i for all i S S,, m}, which proves that I[S]P n } n 0 is a bounded super-martingale If S =,, m}, the inequality becomes equality, and I[S]P n } n 0 is a bounded martingale From the bounded super-martingale convergence theorem, we deduce that the sequences I[S]P n } n 0 converge almost surely for all S,, m} Since I[S]P + I[S]P + I[S]P S,, m}, then J P + J P + J P, but this subset relation can be strict if one of the inequalities is strict for a certain S,, m} Nevertheless, for S =,, m}, we have IP + IP + = IP, so at least one point of the dominant face of J P is present in J P + J P + since the capacity region is a polymatroid Therefore, the symmetric sum capacity is preserved, but the dominant face might lose some points Definition In order to simplify our notation, we will introduce the notion of generalized matrices: A generalized matrix A = A,, A l F m i l i is a collection of l matrices F m i l i denotes the i= set of m i l i matrices with coefficients in F pi If l i = 0 in A = A,, A l F m i l i, we write A i = ø In case A i = ø for all i, we write A = ø i= A generalized vector x = x,, x l i= F m i is a collection of l vectors Addition of generalized vectors is defined as component-wise addition
22 The transposition of a generalized matrix is obtained by transposing each matrix of it: A T = A T,, A T l A generalized matrix operates on a generalized vector component-wise: if A and x i= F m i, then y = A T x ø T x i = 0 i= F l i pi i= F m i l i is defined by y = A T x,, A T l x l By convention, we have A generalized matrix A is said to be full rank if and only if each matrix component of it is full rank l The rank of a generalized matrix A F m i l i is defined by: ranka = ranka i The logarithmic rank of a generalized matrix is defined by: lranka = i= i= l ranka i log If A is a generalized matrix satisfying A i ø and A j = ø for all j i, we say that A is an ordinary matrix and we identify A and A i Definition Let P : Y be an m-user MAC, let A be a full rank generalized i= F m i matrix We define the ranka-user MAC P [A] : P [A]y u = i= l i= pm i l i i i= F l i pi Y as follows: x l i= Fm i A T x= u F m i l i P y x The main result of this section is that, almost surely, P n becomes a channel where the output is almost determined by a generalized matrix, and the convergence is almost surely fast: Theorem 7 Let P : Y be an m-user MAC Then for every 0 < ɛ < log, and for every i= F m i 0 < β < we have: s, +} n : A s lim n i= F m i r i,s, A s is full rank, IP s lranka s < ɛ, IP s [A s ] lranka s < ɛ, ZP s [A s ] < βn} = i= Proof: Since G := i= F m i is an abelian group, we can view P as a channel from the Abelian group G to Y Note that any subgroup of an Abelian grous normal Therefore, from theorem 6 we have: s, +} n : H s subgroup of G, lim n IP s log G/H s < ɛ, IP s [H s ] log G/H s < ɛ, ZP s [H s ] < βn} = Let s, +} n such that that there exists a subgroup H s of G satisfying: IP s log G/H s < ɛ
23 IP s [H s ] log G/H s < ɛ ZP s [H s ] < βn From the properties of abelian groups, there exist l integers: r,s m,, and r l,s m l such that G/H s is isomorphic to Note that r i,s can be zero Therefore, there exists a surjective homomorphism f s : i= F m i vice versa i= i= F r i,s F r i,s, such that for any x For all i l, and all j m i, define the vector e i,j i= F m i, f s x can be determined from x mod H s and i= F m i as having all its components as zeros except the i, j th component which is equal to The order of e i,j is Let y i,j = y i,j, y i,j,, y i,j = f s e i,j F r i,s, if y i,j 0 then the order of y i,j must be equal to l i= If y i,j i 0 for a certain i i, then p i divides the order of y i,j which is a contradiction Therefore, we must have y i,j i = 0 for all i i l m i l m i Now for any x F m i, we have x = x i,j e i,j, therefore, f s x = x i,j y i,j Since y i,j i i= = 0 for all i i, then f s x = A T s x, where A s = A,s,, A l,s i= j= matrix whose components are given by A i,s = [ y i, i y i, i Moreover, we have: Recall that for any x lranka s = i= i= y i,m i i i= i= l r i,s log = log p r i,s i = log G/H s i= F m i r i,s j= is a generalized ] T A s is full rank since f s is surjective F m i, A T s x = f s x can be determined from x mod H s and vice versa, we conclude that P s [H s ] is equivalent to P s [A s ] Therefore: s, +} n : A s F m i r i,s, A s is full rank, lim n i= IP s lranka s < ɛ, IP s [A s ] lranka s < ɛ, ZP s [A s ] < βn} = A Polar code construction for MACs Choose 0 < ɛ < log, 0 < β < β <, and let n be an integer such that n β n < βn p m i i i= E n > n ɛ l m i log i=
24 3 where E n = s, +} n : A s i= F m i r i,s, A s is full rank, IP s lranka s < ɛ, IP s [A s ] lranka s < ɛ, ZP s [A s ] < β n Such an integer exists due to theorem 7 For each s, +} n, if s / E n set F s, i, j = i,, l} j,, m i }, and if s E n choose a generalized matrix A s = A,s,, A l,s that satisfies the conditions in E n For each i l choose a set of r i,s indices S i,s = j, j ri,s },, m i } such that the corresponding rows of A i,s are linearly independent, then set F s, i, j = if j / S i,s, and F s, i, j = 0 if j S i,s F s, i, j = indicates that the user i, j is frozen in the channel P s, ie, no useful information is being sent A polar code is constructed as follows: The user i, j sends a symbol U s,i,j through a channel equivalent to P s If F s, i, j = 0, U s,i,j is an information symbol, and if F s, i, j =, U s,i,j is a certain frozen symbol Since we are free to choose any value for the frozen symbols, we will analyse the performance of the polar code averaged on all the possible choices of the frozen symbols, so we will consider that U s,i,j are independent random variables, uniformly distributed in F pi s, +} n, i,, l}, j,, m i } However, the value of U s,i,j will be revealed to the receiver if F s, i, j =, and if F s, i, j = 0 the receiver has to estimate U s,i,j from the output of the channel We associate the set, +} n with the same strict total order < that we defined earlier Namely, s s n < s s n if and only if there exists i,, n} such that s i =, s i = + and s j = s j j > i Encoding: Let P s } s,+} n be a set of n independent copies of the channel P P s should not be confused with P s : P s is a copy of the channel P and P s is a polarized channel obtained from P as before Define U s,s,i,j for s, +} l, s, +} n l, 0 l n inductively as: U ø,s,i,j = U s,i,j if l = 0, s, +} n U s ;,s,i,j = U s,s ;+,i,j + U s,s ;,i,j if l > 0, s, +} l, s, +} n l U s ;+,s,i,j = U s,s ;+,i,j if l > 0, s, +} l, s, +} n l The user i, j sends U s,ø,i,j through the channel P s for all s, +} n Let Y s be the output of the channel P s, and let Y = Y s } s,+} n We can prove by induction on l that the channel U s,s Ys } s has s as a prefix, U s } s <s is equivalent to P s In particular, the channel U s Y, U s } s <s is equivalent to the channel P s Decoding: If s / E n then F s, i, j = for all i, j, and the receiver knows all U s,i,j, there is nothing to decode Suppose that s E n, if we know U s } s <s then we can estimate U s as follows: If F s, i, j = then we know U s,i,j We have F s, i, j = 0 for r i,s values of j corresponding to r i,s linearly independent rows of A i,s So if we know A T i,su s, we can recover U s,i,j for the indices j satisfying F s, i, j = 0 Since A T s U s Y, U s } s <s is equivalent to P s [A s ], we can estimate A T s U s using the maximum likelihood decoder of the channel P s [A s ] Let D s Y, U s } s <s be the estimate of U s obtained from Y, U s } s <s by the above procedure This motivates the following successive cancellation decoder: ˆ U s = U s if s / E n ˆ U s = D s Y, ˆ Us } s <s if s E n }
On the Polarization Levels of Automorphic-Symmetric Channels
On the Polarization Levels of Automorphic-Symmetric Channels Rajai Nasser Email: rajai.nasser@alumni.epfl.ch arxiv:8.05203v2 [cs.it] 5 Nov 208 Abstract It is known that if an Abelian group operation is
More informationPolar codes for the m-user MAC and matroids
Research Collection Conference Paper Polar codes for the m-user MAC and matroids Author(s): Abbe, Emmanuel; Telatar, Emre Publication Date: 2010 Permanent Link: https://doi.org/10.3929/ethz-a-005997169
More informationOn the Convergence of the Polarization Process in the Noisiness/Weak- Topology
1 On the Convergence of the Polarization Process in the Noisiness/Weak- Topology Rajai Nasser Email: rajai.nasser@alumni.epfl.ch arxiv:1810.10821v2 [cs.it] 26 Oct 2018 Abstract Let W be a channel where
More informationAn Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets
An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets Jing Guo University of Cambridge jg582@cam.ac.uk Jossy Sayir University of Cambridge j.sayir@ieee.org Minghai Qin
More informationMulti-Kernel Polar Codes: Proof of Polarization and Error Exponents
Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents Meryem Benammar, Valerio Bioglio, Frédéric Gabry, Ingmar Land Mathematical and Algorithmic Sciences Lab Paris Research Center, Huawei
More informationPolar Codes for Sources with Finite Reconstruction Alphabets
Polar Codes for Sources with Finite Reconstruction Alphabets Aria G. Sahebi and S. Sandeep Pradhan Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI 4809,
More informationEntropic and informatic matroids
Entropic and informatic matroids Emmanuel Abbe Abstract This paper studies dependencies between random variables by means of information theoretic functionals such as the entropy and the mutual information.
More informationGroups and Symmetries
Groups and Symmetries Definition: Symmetry A symmetry of a shape is a rigid motion that takes vertices to vertices, edges to edges. Note: A rigid motion preserves angles and distances. Definition: Group
More informationChapter 4. Data Transmission and Channel Capacity. Po-Ning Chen, Professor. Department of Communications Engineering. National Chiao Tung University
Chapter 4 Data Transmission and Channel Capacity Po-Ning Chen, Professor Department of Communications Engineering National Chiao Tung University Hsin Chu, Taiwan 30050, R.O.C. Principle of Data Transmission
More informationCompound Polar Codes
Compound Polar Codes Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang Mobile Solutions Lab, Samsung Information Systems America 4921 Directors Place, San Diego, CA 92121 {h.mahdavifar, mostafa.e,
More information0 Sets and Induction. Sets
0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set
More informationDefinitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations
Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of
More informationFINITE ABELIAN GROUPS Amin Witno
WON Series in Discrete Mathematics and Modern Algebra Volume 7 FINITE ABELIAN GROUPS Amin Witno Abstract We detail the proof of the fundamental theorem of finite abelian groups, which states that every
More informationPartial cubes: structures, characterizations, and constructions
Partial cubes: structures, characterizations, and constructions Sergei Ovchinnikov San Francisco State University, Mathematics Department, 1600 Holloway Ave., San Francisco, CA 94132 Abstract Partial cubes
More informationLecture 4 Noisy Channel Coding
Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem
More informationCourse 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra
Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra D. R. Wilkins Contents 3 Topics in Commutative Algebra 2 3.1 Rings and Fields......................... 2 3.2 Ideals...............................
More informationEE 4TM4: Digital Communications II. Channel Capacity
EE 4TM4: Digital Communications II 1 Channel Capacity I. CHANNEL CODING THEOREM Definition 1: A rater is said to be achievable if there exists a sequence of(2 nr,n) codes such thatlim n P (n) e (C) = 0.
More information(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute
ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6 (draft; 9/6/03. Error exponents for Discrete Memoryless Channels http://www.enee.umd.edu/ abarg/enee739c/course.html
More informationThe Compound Capacity of Polar Codes
The Compound Capacity of Polar Codes S. Hamed Hassani, Satish Babu Korada and Rüdiger Urbanke arxiv:97.329v [cs.it] 9 Jul 29 Abstract We consider the compound capacity of polar codes under successive cancellation
More informationLecture 6 I. CHANNEL CODING. X n (m) P Y X
6- Introduction to Information Theory Lecture 6 Lecturer: Haim Permuter Scribe: Yoav Eisenberg and Yakov Miron I. CHANNEL CODING We consider the following channel coding problem: m = {,2,..,2 nr} Encoder
More informationVariable Length Codes for Degraded Broadcast Channels
Variable Length Codes for Degraded Broadcast Channels Stéphane Musy School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland Email: stephane.musy@ep.ch Abstract This paper investigates
More informationSolutions to Assignment 4
1. Let G be a finite, abelian group written additively. Let x = g G g, and let G 2 be the subgroup of G defined by G 2 = {g G 2g = 0}. (a) Show that x = g G 2 g. (b) Show that x = 0 if G 2 = 2. If G 2
More informationAn instantaneous code (prefix code, tree code) with the codeword lengths l 1,..., l N exists if and only if. 2 l i. i=1
Kraft s inequality An instantaneous code (prefix code, tree code) with the codeword lengths l 1,..., l N exists if and only if N 2 l i 1 Proof: Suppose that we have a tree code. Let l max = max{l 1,...,
More information(1) A frac = b : a, b A, b 0. We can define addition and multiplication of fractions as we normally would. a b + c d
The Algebraic Method 0.1. Integral Domains. Emmy Noether and others quickly realized that the classical algebraic number theory of Dedekind could be abstracted completely. In particular, rings of integers
More information120A LECTURE OUTLINES
120A LECTURE OUTLINES RUI WANG CONTENTS 1. Lecture 1. Introduction 1 2 1.1. An algebraic object to study 2 1.2. Group 2 1.3. Isomorphic binary operations 2 2. Lecture 2. Introduction 2 3 2.1. The multiplication
More informationEE376A: Homework #3 Due by 11:59pm Saturday, February 10th, 2018
Please submit the solutions on Gradescope. EE376A: Homework #3 Due by 11:59pm Saturday, February 10th, 2018 1. Optimal codeword lengths. Although the codeword lengths of an optimal variable length code
More informationMath 121 Homework 5: Notes on Selected Problems
Math 121 Homework 5: Notes on Selected Problems 12.1.2. Let M be a module over the integral domain R. (a) Assume that M has rank n and that x 1,..., x n is any maximal set of linearly independent elements
More informationOn the Duality between Multiple-Access Codes and Computation Codes
On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch
More informationThe Least Degraded and the Least Upgraded Channel with respect to a Channel Family
The Least Degraded and the Least Upgraded Channel with respect to a Channel Family Wei Liu, S. Hamed Hassani, and Rüdiger Urbanke School of Computer and Communication Sciences EPFL, Switzerland Email:
More informationTensor Product of modules. MA499 Project II
Tensor Product of modules A Project Report Submitted for the Course MA499 Project II by Subhash Atal (Roll No. 07012321) to the DEPARTMENT OF MATHEMATICS INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI GUWAHATI
More informationCONTINUED FRACTIONS, PELL S EQUATION, AND TRANSCENDENTAL NUMBERS
CONTINUED FRACTIONS, PELL S EQUATION, AND TRANSCENDENTAL NUMBERS JEREMY BOOHER Continued fractions usually get short-changed at PROMYS, but they are interesting in their own right and useful in other areas
More informationConstructing c-ary Perfect Factors
Constructing c-ary Perfect Factors Chris J. Mitchell Computer Science Department Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX England. Tel.: +44 784 443423 Fax: +44 784 443420 Email:
More informationCodes for Partially Stuck-at Memory Cells
1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il
More informationCapacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel
Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel Jun Chen Dept. of Electrical and Computer Engr. McMaster University Hamilton, Ontario, Canada Chao Tian AT&T Labs-Research 80 Park
More informationA Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels
A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels Mehdi Mohseni Department of Electrical Engineering Stanford University Stanford, CA 94305, USA Email: mmohseni@stanford.edu
More informationCapacity of the Discrete Memoryless Energy Harvesting Channel with Side Information
204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener
More informationECE Information theory Final (Fall 2008)
ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1
More information2) e = e G G such that if a G 0 =0 G G such that if a G e a = a e = a. 0 +a = a+0 = a.
Chapter 2 Groups Groups are the central objects of algebra. In later chapters we will define rings and modules and see that they are special cases of groups. Also ring homomorphisms and module homomorphisms
More informationNational University of Singapore Department of Electrical & Computer Engineering. Examination for
National University of Singapore Department of Electrical & Computer Engineering Examination for EE5139R Information Theory for Communication Systems (Semester I, 2014/15) November/December 2014 Time Allowed:
More informationChapter 1. Sets and Mappings
Chapter 1. Sets and Mappings 1. Sets A set is considered to be a collection of objects (elements). If A is a set and x is an element of the set A, we say x is a member of A or x belongs to A, and we write
More informationHOMEWORK 3 LOUIS-PHILIPPE THIBAULT
HOMEWORK 3 LOUIS-PHILIPPE THIBAULT Problem 1 Let G be a group of order 56. We have that 56 = 2 3 7. Then, using Sylow s theorem, we have that the only possibilities for the number of Sylow-p subgroups
More informationDIHEDRAL GROUPS II KEITH CONRAD
DIHEDRAL GROUPS II KEITH CONRAD We will characterize dihedral groups in terms of generators and relations, and describe the subgroups of D n, including the normal subgroups. We will also introduce an infinite
More informationFILTERED RINGS AND MODULES. GRADINGS AND COMPLETIONS.
FILTERED RINGS AND MODULES. GRADINGS AND COMPLETIONS. Let A be a ring, for simplicity assumed commutative. A filtering, or filtration, of an A module M means a descending sequence of submodules M = M 0
More informationX 1 : X Table 1: Y = X X 2
ECE 534: Elements of Information Theory, Fall 200 Homework 3 Solutions (ALL DUE to Kenneth S. Palacio Baus) December, 200. Problem 5.20. Multiple access (a) Find the capacity region for the multiple-access
More informationCover Page. The handle holds various files of this Leiden University dissertation
Cover Page The handle http://hdl.handle.net/1887/54851 holds various files of this Leiden University dissertation Author: Stanojkovski, M. Title: Intense automorphisms of finite groups Issue Date: 2017-09-05
More informationAlphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach
ALPHABET SIZE REDUCTION FOR SECURE NETWORK CODING: A GRAPH THEORETIC APPROACH 1 Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach Xuan Guang, Member, IEEE, and Raymond W. Yeung,
More informationMultiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets
Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,
More informationMINIMAL GENERATING SETS OF GROUPS, RINGS, AND FIELDS
MINIMAL GENERATING SETS OF GROUPS, RINGS, AND FIELDS LORENZ HALBEISEN, MARTIN HAMILTON, AND PAVEL RŮŽIČKA Abstract. A subset X of a group (or a ring, or a field) is called generating, if the smallest subgroup
More informationEE/Stat 376B Handout #5 Network Information Theory October, 14, Homework Set #2 Solutions
EE/Stat 376B Handout #5 Network Information Theory October, 14, 014 1. Problem.4 parts (b) and (c). Homework Set # Solutions (b) Consider h(x + Y ) h(x + Y Y ) = h(x Y ) = h(x). (c) Let ay = Y 1 + Y, where
More informationReliable Computation over Multiple-Access Channels
Reliable Computation over Multiple-Access Channels Bobak Nazer and Michael Gastpar Dept. of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA, 94720-1770 {bobak,
More informationUpper Bounds on the Capacity of Binary Intermittent Communication
Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,
More informationThe Method of Types and Its Application to Information Hiding
The Method of Types and Its Application to Information Hiding Pierre Moulin University of Illinois at Urbana-Champaign www.ifp.uiuc.edu/ moulin/talks/eusipco05-slides.pdf EUSIPCO Antalya, September 7,
More informationFinite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal
Finite Mathematics Nik Ruškuc and Colva M. Roney-Dougal September 19, 2011 Contents 1 Introduction 3 1 About the course............................. 3 2 A review of some algebraic structures.................
More informationEE5139R: Problem Set 4 Assigned: 31/08/16, Due: 07/09/16
EE539R: Problem Set 4 Assigned: 3/08/6, Due: 07/09/6. Cover and Thomas: Problem 3.5 Sets defined by probabilities: Define the set C n (t = {x n : P X n(x n 2 nt } (a We have = P X n(x n P X n(x n 2 nt
More informationarxiv: v1 [math.co] 1 Oct 2013
Tiling in bipartite graphs with asymmetric minimum degrees Andrzej Czygrinow and Louis DeBiasio November 9, 018 arxiv:1310.0481v1 [math.co] 1 Oct 013 Abstract The problem of determining the optimal minimum
More informationShannon s Noisy-Channel Coding Theorem
Shannon s Noisy-Channel Coding Theorem Lucas Slot Sebastian Zur February 2015 Abstract In information theory, Shannon s Noisy-Channel Coding Theorem states that it is possible to communicate over a noisy
More informationPart 1. For any A-module, let M[x] denote the set of all polynomials in x with coefficients in M, that is to say expressions of the form
Commutative Algebra Homework 3 David Nichols Part 1 Exercise 2.6 For any A-module, let M[x] denote the set of all polynomials in x with coefficients in M, that is to say expressions of the form m 0 + m
More informationThe Capacity Region for Multi-source Multi-sink Network Coding
The Capacity Region for Multi-source Multi-sink Network Coding Xijin Yan Dept. of Electrical Eng. - Systems University of Southern California Los Angeles, CA, U.S.A. xyan@usc.edu Raymond W. Yeung Dept.
More informationINFINITE RINGS WITH PLANAR ZERO-DIVISOR GRAPHS
INFINITE RINGS WITH PLANAR ZERO-DIVISOR GRAPHS YONGWEI YAO Abstract. For any commutative ring R that is not a domain, there is a zerodivisor graph, denoted Γ(R), in which the vertices are the nonzero zero-divisors
More informationTopological properties
CHAPTER 4 Topological properties 1. Connectedness Definitions and examples Basic properties Connected components Connected versus path connected, again 2. Compactness Definition and first examples Topological
More informationElementary Algebra Chinese Remainder Theorem Euclidean Algorithm
Elementary Algebra Chinese Remainder Theorem Euclidean Algorithm April 11, 2010 1 Algebra We start by discussing algebraic structures and their properties. This is presented in more depth than what we
More informationLecture 11: Quantum Information III - Source Coding
CSCI5370 Quantum Computing November 25, 203 Lecture : Quantum Information III - Source Coding Lecturer: Shengyu Zhang Scribe: Hing Yin Tsang. Holevo s bound Suppose Alice has an information source X that
More informationThe Hamming Codes and Delsarte s Linear Programming Bound
The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the
More informationAn introduction to basic information theory. Hampus Wessman
An introduction to basic information theory Hampus Wessman Abstract We give a short and simple introduction to basic information theory, by stripping away all the non-essentials. Theoretical bounds on
More informationDISCRETE MATH (A LITTLE) & BASIC GROUP THEORY - PART 3/3. Contents
DISCRETE MATH (A LITTLE) & BASIC GROUP THEORY - PART 3/3 T.K.SUBRAHMONIAN MOOTHATHU Contents 1. Cayley s Theorem 1 2. The permutation group S n 2 3. Center of a group, and centralizers 4 4. Group actions
More informationGROUPS OF ORDER p 3 KEITH CONRAD
GROUPS OF ORDER p 3 KEITH CONRAD For any prime p, we want to describe the groups of order p 3 up to isomorphism. From the cyclic decomposition of finite abelian groups, there are three abelian groups of
More informationINVERSE LIMITS AND PROFINITE GROUPS
INVERSE LIMITS AND PROFINITE GROUPS BRIAN OSSERMAN We discuss the inverse limit construction, and consider the special case of inverse limits of finite groups, which should best be considered as topological
More informationMathematics Course 111: Algebra I Part I: Algebraic Structures, Sets and Permutations
Mathematics Course 111: Algebra I Part I: Algebraic Structures, Sets and Permutations D. R. Wilkins Academic Year 1996-7 1 Number Systems and Matrix Algebra Integers The whole numbers 0, ±1, ±2, ±3, ±4,...
More informationFoundations of Mathematics MATH 220 FALL 2017 Lecture Notes
Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes These notes form a brief summary of what has been covered during the lectures. All the definitions must be memorized and understood. Statements
More informationInformation Theory for Wireless Communications. Lecture 10 Discrete Memoryless Multiple Access Channel (DM-MAC): The Converse Theorem
Information Theory for Wireless Communications. Lecture 0 Discrete Memoryless Multiple Access Channel (DM-MAC: The Converse Theorem Instructor: Dr. Saif Khan Mohammed Scribe: Antonios Pitarokoilis I. THE
More informationSchool of Mathematics and Statistics. MT5824 Topics in Groups. Problem Sheet I: Revision and Re-Activation
MRQ 2009 School of Mathematics and Statistics MT5824 Topics in Groups Problem Sheet I: Revision and Re-Activation 1. Let H and K be subgroups of a group G. Define HK = {hk h H, k K }. (a) Show that HK
More informationEE376A - Information Theory Midterm, Tuesday February 10th. Please start answering each question on a new page of the answer booklet.
EE376A - Information Theory Midterm, Tuesday February 10th Instructions: You have two hours, 7PM - 9PM The exam has 3 questions, totaling 100 points. Please start answering each question on a new page
More informationCitation Osaka Journal of Mathematics. 43(2)
TitleIrreducible representations of the Author(s) Kosuda, Masashi Citation Osaka Journal of Mathematics. 43(2) Issue 2006-06 Date Text Version publisher URL http://hdl.handle.net/094/0396 DOI Rights Osaka
More informationWe are going to discuss what it means for a sequence to converge in three stages: First, we define what it means for a sequence to converge to zero
Chapter Limits of Sequences Calculus Student: lim s n = 0 means the s n are getting closer and closer to zero but never gets there. Instructor: ARGHHHHH! Exercise. Think of a better response for the instructor.
More informationShannon s noisy-channel theorem
Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for
More informationCourse 311: Abstract Algebra Academic year
Course 311: Abstract Algebra Academic year 2007-08 D. R. Wilkins Copyright c David R. Wilkins 1997 2007 Contents 1 Topics in Group Theory 1 1.1 Groups............................... 1 1.2 Examples of Groups.......................
More informationPractical Polar Code Construction Using Generalised Generator Matrices
Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:
More information= 1 2x. x 2 a ) 0 (mod p n ), (x 2 + 2a + a2. x a ) 2
8. p-adic numbers 8.1. Motivation: Solving x 2 a (mod p n ). Take an odd prime p, and ( an) integer a coprime to p. Then, as we know, x 2 a (mod p) has a solution x Z iff = 1. In this case we can suppose
More informationFoundations of Mathematics
Foundations of Mathematics L. Pedro Poitevin 1. Preliminaries 1.1. Sets We will naively think of a set as a collection of mathematical objects, called its elements or members. To indicate that an object
More informationKeyless authentication in the presence of a simultaneously transmitting adversary
Keyless authentication in the presence of a simultaneously transmitting adversary Eric Graves Army Research Lab Adelphi MD 20783 U.S.A. ericsgra@ufl.edu Paul Yu Army Research Lab Adelphi MD 20783 U.S.A.
More informationSuperposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels
Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:
More informationA NEW SET THEORY FOR ANALYSIS
Article A NEW SET THEORY FOR ANALYSIS Juan Pablo Ramírez 0000-0002-4912-2952 Abstract: We present the real number system as a generalization of the natural numbers. First, we prove the co-finite topology,
More information1 Adeles over Q. 1.1 Absolute values
1 Adeles over Q 1.1 Absolute values Definition 1.1.1 (Absolute value) An absolute value on a field F is a nonnegative real valued function on F which satisfies the conditions: (i) x = 0 if and only if
More informationPolar Codes for Some Multi-terminal Communications Problems
Polar Codes for ome Multi-terminal Communications Problems Aria G. ahebi and. andeep Pradhan Department of Electrical Engineering and Computer cience, niversity of Michigan, Ann Arbor, MI 48109, A. Email:
More informationDiscrete Memoryless Channels with Memoryless Output Sequences
Discrete Memoryless Channels with Memoryless utput Sequences Marcelo S Pinho Department of Electronic Engineering Instituto Tecnologico de Aeronautica Sao Jose dos Campos, SP 12228-900, Brazil Email: mpinho@ieeeorg
More informationA Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources
A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources Wei Kang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College
More informationCommutative Banach algebras 79
8. Commutative Banach algebras In this chapter, we analyze commutative Banach algebras in greater detail. So we always assume that xy = yx for all x, y A here. Definition 8.1. Let A be a (commutative)
More informationGROUP ACTIONS EMMANUEL KOWALSKI
GROUP ACTIONS EMMANUEL KOWALSKI Definition 1. Let G be a group and T a set. An action of G on T is a map a: G T T, that we denote a(g, t) = g t, such that (1) For all t T, we have e G t = t. (2) For all
More informationSolutions to Homework Set #3 Channel and Source coding
Solutions to Homework Set #3 Channel and Source coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits per channel use)
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Finite nilpotent metacyclic groups never violate the Ingleton inequality Author(s) Stancu, Radu; Oggier,
More information8 Complete fields and valuation rings
18.785 Number theory I Fall 2017 Lecture #8 10/02/2017 8 Complete fields and valuation rings In order to make further progress in our investigation of finite extensions L/K of the fraction field K of a
More informationSolutions to Homework Set #1 Sanov s Theorem, Rate distortion
st Semester 00/ Solutions to Homework Set # Sanov s Theorem, Rate distortion. Sanov s theorem: Prove the simple version of Sanov s theorem for the binary random variables, i.e., let X,X,...,X n be a sequence
More informationSpanning and Independence Properties of Finite Frames
Chapter 1 Spanning and Independence Properties of Finite Frames Peter G. Casazza and Darrin Speegle Abstract The fundamental notion of frame theory is redundancy. It is this property which makes frames
More informationAlgebraic Number Theory
TIFR VSRP Programme Project Report Algebraic Number Theory Milind Hegde Under the guidance of Prof. Sandeep Varma July 4, 2015 A C K N O W L E D G M E N T S I would like to express my thanks to TIFR for
More information1 Introduction to information theory
1 Introduction to information theory 1.1 Introduction In this chapter we present some of the basic concepts of information theory. The situations we have in mind involve the exchange of information through
More informationNumerical Sequences and Series
Numerical Sequences and Series Written by Men-Gen Tsai email: b89902089@ntu.edu.tw. Prove that the convergence of {s n } implies convergence of { s n }. Is the converse true? Solution: Since {s n } is
More informationWritten Homework # 2 Solution
Math 516 Fall 2006 Radford Written Homework # 2 Solution 10/09/06 Let G be a non-empty set with binary operation. For non-empty subsets S, T G we define the product of the sets S and T by If S = {s} is
More informationLecture Notes 1 Basic Concepts of Mathematics MATH 352
Lecture Notes 1 Basic Concepts of Mathematics MATH 352 Ivan Avramidi New Mexico Institute of Mining and Technology Socorro, NM 87801 June 3, 2004 Author: Ivan Avramidi; File: absmath.tex; Date: June 11,
More informationIntroduction to Arithmetic Geometry Fall 2013 Lecture #18 11/07/2013
18.782 Introduction to Arithmetic Geometry Fall 2013 Lecture #18 11/07/2013 As usual, all the rings we consider are commutative rings with an identity element. 18.1 Regular local rings Consider a local
More informationThe group (Z/nZ) February 17, In these notes we figure out the structure of the unit group (Z/nZ) where n > 1 is an integer.
The group (Z/nZ) February 17, 2016 1 Introduction In these notes we figure out the structure of the unit group (Z/nZ) where n > 1 is an integer. If we factor n = p e 1 1 pe, where the p i s are distinct
More information