National University of Singapore. Ralf R. Müller

Size: px
Start display at page:

Download "National University of Singapore. Ralf R. Müller"

Transcription

1 Ê ÔÐ Å Ø Ó Ò Ï Ö Ð ÓÑÑÙÒ Ø ÓÒ Ì National University of Singapore March 006 Ralf R. Müller Professor for Wireless Networks Norwegian University of Science & Technology

2 Ê ÔÐ Å Ø Ó Ò ÅÙÐØ Ø Ø Ø ÓÒ Ì Ï Ö Ð ÓÑÑÙÒ Ø ÓÒ Ò National University of Singapore March 006 Ralf R. Müller Professor for Wireless Networks Norwegian University of Science & Technology

3 The Replica Method 1 Part I: The Replica Method

4 The Replica Method Thermodynamics vs. Wireless Communications Since Boltzmann, physicists have studied the behavior of systems with interactions of many particles. Particular correspondences can be drawn between spin glasses (amorph magnetic materials, e.g. the magnetic surface of a hard disk drive) and communication systems. The binary nature of the bits corresponds to the quantum-mechanical constraints of electron spins to ± 1. Spin glass theory is both very rich and very complicated. Various methods have been proposed by physicists to analyze them: The replica method The cavity method... The TAP approach Gauge Theory This course will be restricted in scope to the replica method.

5 The Replica Method 3 Spin Glasses

6 The Replica Method 3 Spin Glasses

7 The Replica Method 3 Spin Glasses

8 The Replica Method 3 Spin Glasses Energy function (Hamiltonian): i r ij x i x j i j<i h i x i

9 The Replica Method 3 Spin Glasses h external magnetic field Energy function (Hamiltonian): i r ij x i x j i j<i h i x i

10 The Replica Method 4 Optimal Detection of Vector Channel y = Sx + n

11 The Replica Method 4 Optimal Detection of Vector Channel Best estimate for transmitted data: ˆx = argmin x {±1} K y Sx y = Sx + n argmin x {±1} K 1 x Rx h x + y y with R = S S h = S y

12 The Replica Method 4 Optimal Detection of Vector Channel Best estimate for transmitted data: ˆx = argmin x {±1} K y Sx y = Sx + n = argmin x {±1} K 1 x Rx h x + y y with R = S S h = S y

13 The Replica Method 4 Optimal Detection of Vector Channel Best estimate for transmitted data: y = Sx + n ˆx = argmin x {±1} K y Sx = argmin 1 x {±1} K x Rx h x + y y = argmin r ij x i x j x {±1} K i j<i i with h i x i 1 R = S S h = S y r ii x i i

14 The Replica Method 4 Optimal Detection of Vector Channel Best estimate for transmitted data: y = Sx + n ˆx = argmin x {±1} K y Sx = argmin 1 x {±1} K x Rx h x + y y = argmin r ij x i x j x {±1} K i j<i i with h i x i 1 R = S S h = S y r ii x i i Minimization of the energy function of a spin glass!

15 The Replica Method 5 A Phase Transition in Random CDMA optimal detection K = N 1 bit error probability without interference signal to noise ratio [db]

16 The Replica Method 6 Large Systems C K K O ( K ) interactions C C K O(K) microscopic objects O(1) macroscopic variables Macroscopic variables are self-averaging.

17 The Replica Method 7 Boltzmann Distribution The Thermodynamic Equilibrium maximizes the entropy for given constant energy H(X) = i E(X) = i Pr(x i ) log Pr(x i ) x i Pr(x i ) yielding the Boltzmann distribution Pr(x i ) = e 1 T x i e. T 1 x i i

18 The Replica Method 8 Free Energy Since the energy is constant, we can minimize the free energy F(X) = E(X) TH(X) instead of maximizing entropy. This is often less complicated. With the Boltzmann distribution, the free energy is given by [ ] F(X) = T log. It depends only on the partition function. i e 1 T x i The free energy is self-averaging.

19 The Replica Method 9 Energy vs. Entropy The following two tasks are dual: Minimize the energy for fixed entropy Maximize the entropy for fixed energy Consider free energy F(X) = E(X) TH(X) and read the temperature (or its inverse) as Lagrange multiplier. For the dual problem have 1 T F(X) = H(X) 1 T E(X)

20 The Replica Method 10 The Meaning of the Energy Function In physics, the energy function varies with the force causing the potential. Theoretically speaking, the choice of the energy function is arbitrary as long as it is uniformly bounded from below. Nature maximizes entropy for a given energy. In communications engineering, the energy function is the metric used by the decoder. The decoder does the dual job of nature, to minimize the metric for a given output entropy. Since the decoder dictates the thermodynamics of our toy universe, the same holds true if the decoder uses a suboptimal (wrong) or insufficient metric, perhaps due to lack of knowledge about the channel state. The free choice of the energy function allows to analyze mismatched receivers.

21 The Replica Method 11 LMMSE Detector with Mismatched Powers Theorem: Let (U 1,...,U K ) be an arbitrary sequence of non-negative numbers such that, as K, the empirical joint cdf of the pairs {(U k, P k ) : k = 1,...,K} converges weakly to a given non-random cdf F(u, p). Moreover, let the P k s are uniformly bounded above and the U k s are uniformly bounded below by a positive number for all K. Then, the output SINR of the mismatched LMMSE detector assuming powers {U k } instead of the true powers {P k } in the standard random spreading model converges as K = βn almost surely to ηp k 1 + β 1 + β u df(u, p) (1 + uη) where η = p (1 + uη) df(u, p) ( 1 + β u 1 + uη ) 1 df(u, p) is the multiuser efficiency of an LMMSE detector of a virtual channel having powers given by {U k } instead of {P k }.

22 The Replica Method 1 Average Free Energy When analyzing a random system, we evaluate the average free energy as Shannon analyzed the average performance of all codes.

23 The Replica Method 1 Average Free Energy When analyzing a random system, we evaluate the average free energy as Shannon analyzed the average performance of all codes.

24 The Replica Method 13 Free Energy for a Random Parameter Consider a self-averaging random parameter, e.g. a spreading matrix. F(X y j ) = E F(X Y ) Y [ = T E log Y i e 1 T x i ] The energy function depends on the random parameter y j. The expectation of a logarithm is a hard problem.

25 The Replica Method 13 Free Energy for a Random Parameter Consider a self-averaging random parameter, e.g. a spreading matrix. F(X y j ) = E F(X Y ) Y [ = T E log Y i e 1 T x i ] The energy function depends on the random parameter y j. The expectation of a logarithm is a hard problem.

26 The Replica Method 14 Replica Continuity E log(y ) = lim Y n 0 n E Y Y n Evalute n th moments for integer n and assume analytic continuity for the limit. More general, we have E log Y f(x, Y )dx = lim n 0 n E Y f(x, Y )dx n Ê Ê

27 The Replica Method 14 Replica Continuity E log(y ) = lim Y n 0 n E Y Y n Evalute n th moments for integer n and assume analytic continuity for the limit. More general, we have E log Y f(x, Y )dx = lim n 0 n E Y f(x, Y )dx n Ê Ê

28 The Replica Method 14 Replica Continuity E log Y f(x, Y )dx = lim n 0 n E Y f(x, Y )dx n Ê Ê With we finally get E log Y Ê g(x)dx n = n a=1 f(x, Y )dx = lim n 0 n E Y Ê g(x a )dx a n a=1 f(x a, Y )dx a Ê Ê

29 The Replica Method 14 Replica Continuity E log Y f(x, Y )dx = lim n 0 n E Y f(x, Y )dx n Ê Ê With we finally get E log Y Ê g(x)dx n = n a=1 f(x, Y )dx = lim n 0 n E Y Ê g(x a )dx a n a=1 f(x a, Y )dx a Ê Ê

30 The Replica Method 14 Replica Continuity E log Y f(x, Y )dx = lim n 0 n E Y f(x, Y )dx n Ê Ê With we finally get E log Y Ê g(x)dx n = n a=1 f(x, Y )dx = lim n 0 n E Y Ê g(x a )dx a n a=1 f(x a, Y )dx a Ê Ê

31 The Replica Method 15 Replica Symmetry Throughout the calaculations, we solve integrals of the form I = 1 K log Kf(x 1,x ) dx 1 dx maxf(x 1,x ) x 1,x for K by saddle point integration. Ê e If the maximization is too tedious, we assume replica symmetry: maxf(x 1,x ) = maxf(x, x) x 1,x x Replica symmetry is a strong assumption and not always valid.

32 The Replica Method 15 Replica Symmetry Throughout the calaculations, we solve integrals of the form I = 1 K log Kf(x 1,x ) dx 1 dx maxf(x 1,x ) x 1,x for K by saddle point integration. Ê e If the maximization is too tedious, we assume replica symmetry: maxf(x 1,x ) = maxf(x, x) x 1,x x Replica symmetry is a strong assumption and not always valid.

33 The Replica Method 15 Replica Symmetry Throughout the calculations, we solve integrals of the form I = 1 K log Kf(x 1,x ) dx 1 dx maxf(x 1,x ) x 1,x for K by saddle point integration. Ê e If the maximization is too tedious, we assume replica symmetry: maxf(x 1,x ) = maxf(x, x) x 1,x x Replica symmetry is a strong assumption and not always valid.

34 The Replica Method 16 A Counterexample to Replica Symmetry f(x 1,x ) = sin(x 1 x )e x 1 x 0. f(x 1,x ) x 0 0 x However, f(x 1,x ) is replica symmetric.

35 The Replica Method 17 Phase Transitions If the final equations allow for multiple solutions, the correct solution is identified by minimizing the free energy.

36 The Replica Method 18 Phase Transitions and Neural Networks 10 0 bit error probability a) b) load β

37 The Replica Method 19 Individually Optimum Maximum Likelihood Detector Let A = {+1; 1}, the chips of any user be i.i.d. random variables with finite variance and vanishing odd moments, the powers of all users identical, and N,K, but β = K/N fixed. Then, the multiuser efficiency is a solution to the fixed point equation 1 η IO = 1 + β σ n 1 ηio πσ n Ê tanh ( ηio σ n ) x exp ( η IO(x 1) ) dx. In case the fixed point equation has multiple solutions, the correct one is that solution for which the term η IO + η [ ( )] IO log η IO ηio ηio log cosh x exp ( η IO(x 1) ) dx σn β πσn σn σn σ n is smallest. Ê

38 The Replica Method 0 Example for Replica Calculations Consider the analysis of an asymptotically large CDMA systems with arbitrary joint distribution of the variances of the random chips. It includes the practically imporant case of multi-carrier CDMA transmission with users of arbitrary powers in frequencyselective fading as a special case. The vector-valued, real additive white Gaussian noise channel is characterized by the conditional pdf p y x,h (y, x, H) = e 1 σ 0 (y Hx) T (y Hx). (1) (πσ0 )N Moreover, let the detector be characterized by the assumed conditional probability distribution p y x,h (y,x,h) = e 1 σ (y Hx)T (y Hx) and the assumed prior distribution p x (x). (πσ ) N

39 The Replica Method 1 Let the entries of H be independent zero-mean with vanishing odd order moments and variances wck /N for row c and column k. Applying Bayes law, we find 1 p x y,h (x, y,h) = e σ (y Hx)T (y Hx)+log p x (x). e 1 σ (y Hx)T (y Hx) d P x (x) Since the Boltzmann distribution holds for any temperature T, we set w.l.o.g. T = 1 and find the appropriate energy function to be x = 1 σ (y Hx)T (y Hx) log p x (x). () This choice of the energy function ensures that the thermodynamic equilibrium models the detector defined by the assumed conditional and prior distributions.

40 The Replica Method With (1) and (), the definition of free energy, and replica continuity, we find for the free energy per user F(x) K = 1 ( K E log H N Ê = 1 K lim n 0 = 1 K lim n 0 n log E H N Ê e 1 σ 0 (y Hx) T (y Hx) (πσ0 )N n log ) 1 e 1 σ (y Hx)T (y Hx) e σ (y Hx) T (y Hx) 0 d P x (x) (πσ0 )N ( E H N a=0 Ê ) n e 1 σ (y Hx)T (y Hx) d P x (x) dydp x (x) n e 1 σ a(y Hx a ) T (y Hx a ) dy n dp a (x a ) } (πσ0 )N {{ a=0 } =Ξ n with σ a = σ, a 1, P 0 (x) = P x (x), and P a (x) = P x (x), a 1. dydp x (x) (3)

41 The Replica Method 3 The integral in (3) is given by n E exp 1 N H a=0 Ê Ξ n = c=1 σ a ( y c πσ0 K k=1 ) h ck x ak dy c n dp a (x a ), (4) with y c, x ak, and h ck denoting the c th component of y, the k th component of x a, and the (c,k) th entry of H, respectively. The integrand depends on x a only through v ac = 1 β K k=1 h ck x ak, a = 0,...,n. These quantities v ac can be regarded, in the limit K as jointly Gaussian random variables with zero mean and covariances a=0 Q ab [c] = E v ac v bc = 1 H K x (c) a x b (5) where the parametric inner products are defined by x a (c) x b = K k=1 x ak x bk w ck.

42 The Replica Method 4 In order to perform the integration in (4), the K(n + 1)-dimensional space spanned by the replicas and the vector x 0 is split into subshells { } S{Q[ ]} = (c) x 0,...,x n x a x b = KQ ab [c] where the inner product of two different vectors x a and x b is constant. 1 The splitting of the K(n+1)-dimensional space is depending on the chip time c. With this splitting of the space, we find N KI{Q[ ]} Ξ n = e G{Q[c]} dq ab [c], (6) a b with appropriate choices of the function I{Q[ ]} and G {Q[c]}. Ê N(n+1)(n+)/ e c=1 1 The notation f{q[ ]} expresses the dependency of the function f( ) on all Q ab [c], 0 a b n, 1 c N. The notation a b is used as shortcut for n a=0 n b=a.

43 The Replica Method 5 In (6), e KI{Q[ ]} = a=0 a b N δ x a N c=1 (c) x b βq ab[c] denotes the probability weight of the subshell and [ e G{Q[c]} 1 n = E exp β ( ) ] yc v πσ0 H σa ac {Q[c]} β n dp a (x a ) a=0 dy c + O(K 1 ). Ê This procedure is a change of integration variables in multiple dimensions where the integration of an exponential function over the replicas has been replaced by integration over the variables Q ab [ ]. In the following the blue and green terms in (6) are evaluated separately.

44 The Replica Method 6 First, we calculate the measure e KI{Q[ ]} Ê. As for some t, we have the Fourier expansion of the Dirac measure δ x (c) a x b N βq ab[c] = 1 exp Qab [c] x (c) a x b πj N βq ab[c] d Q ab [c] J with J = (t j ; t + j ), the measure e KI{Q[ ]} can be expressed as N Q ab [c] x a (c) x b e KI{Q[ ]} N = βq ab[c] d Q ab [c] n e πj dp a (x a ) with = c=1 a b J β N e J N(n+)(n+1)/ M k { Q[ ] } = c=1 a b exp 1 N a=0 ( Q ab [c]q ab [c] K { } ) N M k Q[ ] a b N c=1 k=1 Q ab [c]x ak x bk wck c=1 a b n dp a (x ak ). a=0 d Q ab [c] πj (7)

45 The Replica Method 7 In the limit of K one of the exponential terms in (6) will dominate over all others. Only the maximum value of the correlation Q ab [c] is relevant for calculation of the integral. We assume that the replicas within the dominant subshell are symmetric (replica symmetry). Thus, the maximum values of the correlations Q ab [c] are identical for all positive a b. The same applies to the the correlations Q a0 [c]. Hereby, we reduce the number of different correlation variables from (n + 1)(n + )/ to four per chip time and set Q 00 [c] = p 0c, Q 0a [c] = m c, a 0, Q aa [c] = p c, a 0, Q ab [c] = q c, 0 a b 0. We apply the same idea to the correlation variables in the Fourier domain and set Q 00 [c] = G 0c /, Qaa [c] = G c /, a 0, Q0a [c] = E c, a 0, and Q ab [c] = F c, 0 a b 0. At this point the crucial benefit of the replica method becomes obvious. Assuming replica continuity, we have managed to reduce the evaluation of a continuous function to sampling it at integer points. Assuming replica symmetry we have reduced the task of evaluating infinitely many integer points to calculating 8 different correlations (4 of them in the original and 4 of them in the Fourier domain).

46 The Replica Method 8 The assumption of replica symmetry leads to n(n 1) Q ab [c]q ab [c] = ne c m c + and a b M k {E, F,G, G 0 } = where = N 1 N wck c=1 e n+1 Ê Ê n+1 e Ẽ k = 1 N G k = 1 N F c q c + G 0cp 0c ( ) G 0c x 0k + n E c x 0k x ak + G c x ak + n F c x ak x bk a=1 b=a+1 G 0k x 0k + n Ẽ k x 0k x ak + G k x ak + n a=1 b=a+1 N c=1 N c=1 E c w ck, Fk = 1 N G c w ck, G0k = 1 N F k x ak x bk + n G cp c (8) n dp a (x ak ) a=0 n dp a (x ak ) (9) a=0 N F c wck (10) c=1 N G 0c wck. (11) (9) cannot be simplified further for a general prior distribution dp a (x ak ). c=1

47 The Replica Method 9 Second, we evaluate e G{Q[c]} in (6). We use the replica symmetry to construct the correlated Gaussian random variables v ac out of independent zero-mean, unit-variance Gaussian random variables u c,t c,z ac by v 0c = u c p 0c m c m c t c q c qc With that substitution, we get e G(m c,q c,p c,p 0c ) = = v ac = z ac pc q c t c qc, a > 0. 1 πσ0 Ê Ê Ê exp exp [ β σ0 β σ u c p 0c m c t cm c y c Du c q c qc β ( z c pc q c t c qc y c (1 + β σ (p c q c )) 1 n ) ] Dz c β n Dt c dy c 1 + β σ (p c q c ) + n β σ ( σ 0 β + p 0c m c + q c ) (1) with the Gaussian measure Dz = exp( z /) dz/ π.

48 The Replica Method 30 Since the integral in (6) is dominated by the maximum argument of the exponential function, the derivatives of 1 N G{Q[c]} β Q ab [c]q ab [c] (13) N c=1 a b with respect to m c, q c, p c and p 0c must vanish as N. Taking derivatives after plugging (8) and (1) into (13), solving for E c, F c,g c, and G 0c and letting n 0 yields for all c E c = 1 σ + β(p c q c ) (14) F c = σ 0 + β (p 0c m c + q c ) [σ + β(p c q c )] G c = F c E c (15) G 0c = 0. (16) In order to proceed with the calculations, a prior distribution needs to be specified.

49 The Replica Method 31 Gaussian Prior Distribution Assume the Gaussian prior p a (x ak ) = 1 π e x ak / a. The integration in (9) can be performed explicitly and we find ( M k (Ẽk, F k, G k, G ) 0k = 1 + Fk G ) 1 n k ( )( ) (17) 1 G 0k 1 + F k G k n F k nẽ k. In the large system limit, the integral in (7) is dominated by that value of the integration variable which maximizes the argument of the exponential function. Thus, partial derivations of log K ) N M k (Ẽk, F k, G k, G 0k β k=1 c=1 n(n 1) ne c m c + F c q c + G 0cp 0c with respect to E c,f c,g c,g 0c must vanish for all c as N. + n G cp c (18)

50 The Replica Method 3 An explicit calculation of these derivatives yields m c = 1 K w Ẽ k ck K 1 + Ẽ k=1 k (19) q c = 1 K w Ẽk + F k ck ( ) K 1 + Ẽk (0) p c = 1 K p 0c = 1 K k=1 K k=1 w ck Ẽ k + Ẽ k + F k + 1 ( 1 + Ẽk ) (1) K wck () k=1 in the limit n 0 with (15) and (16). Surprisingly, if we let the true prior to be binary and only the replicas to be Gaussian we also find (19) to (). Note from Chapter 1 that this setting corresponds to linear MMSE detection.

51 The Replica Method 33 Collecting our previous results to evaluate the free energy, we find 1 K n log Ξ n= 1 N [ G(m c, q c, p c, p 0c ) + βne c m c + K n c=1 K log M k (Ẽk, F k, G k, 0 ) = 1 K n 0 1 K k=1 [ N log c=1 βn(n 1) F c q c + βn ] G cp c ( 1 + β ) σ (p c q c ) + βe c m c + β(n 1)F c q c + βg c p c ] σ0 + + β(p 0c m c + q c ) σ + β(p c q c ) + nσ0 + nβ(p 0c m c + q c ) + 1 K log ( ) Ẽ 1 + K Ẽk k + F k 1 + k=1 Ẽk nẽ k n F k [ N ( log 1 + β ) σ (p c q c ) + 1 K = F(x) K. c=1 K k=1 log ( ) Ẽ 1 + Ẽk k + F k 1 + Ẽk + E c F c + βe c m c βf c q c + βg c p c ]

52 The Replica Method 34 This is the final result for the mismatched detector. The six macroscopic parameters E c, F c,g c,m c, q c, p c are implicitly given by the simultaneous solution of the system of equations (14) to (15) and (19) to (1) with the definitions (10) to (11) for all chip times c. This system of equations can only be solved numerically. Specializing our result to the matched detector by letting σ σ 0, we have F c E c, G c G 0c, q c m c, p c p 0c. This makes the free energy simplify to with F(x) K = 1 K = 1 K [ N log c=1 [ N c=1 ( 1 + β σ 0(p 0c m c ) σ 0E c log ( σ 0E c ) ] + 1 K E c = ) βe c m c ] K k=1 σ 0 + β K + 1 K log ( ) 1 + Ẽk 1 K k=1 w ck 1+Ẽk K log ( 1 + Ẽk) Ẽ k k=1. (3) This result is more compact and it requires only to solve (3) numerically which is conveniently done by fixed-point iteration.

53 The Replica Method 35 Girko s Law Let the N K random matrix H be composed of independent entries (H) ij with zero-mean and variances w ij /N such that all w ij are uniformly bounded from above. Assume that the empirical joint distribution of variances w : [0, 1] [0, β] Ê defined by w(x,y) = w ij for i,j satisfying i N x i + 1 j and N N y j + 1 N converges to a bounded joint limit distribution w(x,y) as K = βn. Then, for each a,b [0, 1],a < b, and I(s) > 0 1 N bn i= an ( HH H si ) 1 ii b a u(x, s)dx

54 The Replica Method 36 where convergence is in probability and u(x, s) satisfies the fixed point equation u(x,s) = s + β w(x,y) dy u(x, s)w(x, y) dx for every x [0, 1]. The solution always exists and is unique in the class of functions u(x, s) 0, analytic for I(s) > 0 and continuous on x [0, 1]. Moreover, almost surely, the empirical eigenvalue distribution of HH H converges weakly to a limiting distribution whose Stieltjes transform is given by G HH H(s) = 1 0 u(x,s) dx. 1

55 The Replica Method 37 Comparing (3) to Girko s law, Ẽ k is recognized as the signal-to-interference and noise ratio of user k. Using the similarity of free energy and the entropy of the channel output allows for the simple relationship I(x, y) K = F(x) K 1 (4) β between the (normalized) free energy and the (normalized) mutual information between channel input signal x and channel output signal y given the channel matrix H. Assuming that the channel is perfectly known to the receiver, but totally unknown to the transmitter, (4) gives the channel capacity per user.

56 The Replica Method 38 Consider a non-uniform binary prior Binary Prior Distribution p a (x ak ) = 1 + t k δ(x ak 1) + 1 t k δ(x ak + 1). (5) Plugging the prior distribution into (9), we find M k (Ẽk, F k, G k, G 0k ) = G 0k +n G k + n Ẽ k x 0k x ak + n F k x ak x bk e a=1 b=a+1 n+1 Ê = e 1 ( G 0k +n G k ) {x ak,a=1,...,n} { 1+t k exp n dp a (x ak ) a=0 [ n Ẽ k x ak + a=1 n b=a+1 F k x ak x bk ] [ n ]} + 1 t k exp Ẽkx ak + n n F k x ak x bk Pr(x ak ) a=1 b=a+1 a=1 { [ ( = e( 1 G 0k +n G k n F k ) n ) ] 1+t k F exp k n x ak + Ẽk x ak {x ak,a=1,...,n} a=1 a=1 [ ( n ) ]} + 1 t k F exp k n n x ak Ẽk x ak Pr(x ak ). (6) a=1 a=1 a=1

57 The Replica Method 39 We can use the following property of the Gaussian measure ( S exp F ) ( ) k = exp ± F k zs Dz to linearize the exponents M k (Ẽk, F k, G k, G 0k ) = e 1 ( G 0k +n G k n F k ) + 1 t k exp {x ak,a=1,...,n} [ ( z Fk + Ẽk S Ê ( 1+tk exp[ z ) n ] Fk + Ẽk x ak a=1 ) n ] x ak Dz n Pr(x ak ). a=1 a=1 Since f n = = x kn {x ka,a=1,...,n} = f n 1 cosh ( ) n exp[ z F k + Ẽk Pr(x kn )f n 1 exp a=1 [( ) ] z F k + Ẽk x kn [ λ k / + z ] Fk + Ẽk cosh (λ k /) = x ka ] n a=1 Pr(x ka ) cosh n [ λ k / + z Fk + Ẽk cosh n (λ k /) ]

58 The Replica Method 40 with t k = tanh(λk /), we find ( 1+tk M k (Ẽk, F k, G k, G ) cosh n z ) Fk + Ẽk + λ k 0k = cosh n ( λ k ) exp + 1 t k ( cosh n z ) Fk + Ẽk λ k Dz ). ( n Fk G 0k n G k In the large system limit, the integral in (7) is dominated by that value of the integration variable which maximizes the argument of the exponential function. Thus, partial derivations of log K M k (Ẽk, F k, G k, G ) N 0k β ne c m c + k=1 c=1 n(n 1) with respect to E c,f c,g c,g 0c must vanish for all c as N. F c q c + G 0cp 0c + n G cp c

59 The Replica Method 41 An explicit calculation of these derivatives gives m c = 1 K q c = 1 K K k=1 K k=1 p c = p 0c = 1 K w ck w ck K k=1 in the limit n 0. ( 1+t k tanh z ) ( Fk + Ẽk + λ k + 1 t k tanh z ) Fk + Ẽk λ k Dz (7) ( 1+t k tanh z ) ( Fk + Ẽk + λ k + 1 t k tanh z ) Fk + Ẽk λ k Dz (8) w ck In order to obtain (8), note from (6) that the first order derivative of M k exp(n F k /) with respect to F k is identical to half of the second order derivative of M k exp(n F k /) with respect to Ẽk. (9)

60 The Replica Method 4 Collecting our previous results to evaluate the free energy, we find 1 K n log Ξ n= 1 N [ G(m c, q c, p c, p 0c ) + βne c m c + K n c=1 K log M k (Ẽk, F k, G k, 0 ) n 0 1 K k=1 + 1 t k βn(n 1) F c q c + βn ] G cp c N [ ( log 1 + β ) σ (p c q c ) + E ] c + βe c m c βf c q c + βg c p c F c=1 c 1 K ( 1 + tk log cosh z F k + K Ẽk + λ ) k k=1 ( log cosh z F k + Ẽk λ ) k Dz + 1 log ( ) 1 t Fk + G k k = F(x) K. This is the final result for the free energy of the mismatched detector. The six macroscopic parameters E c,f c, G c, m c,q c, p c are implicitly given by the simultaneous solution of the system of equations (14) to (15) and (7) to (9) with the definitions (10) to (11) for all chip times c. This system of equations can only be solved numerically. In case of multiple solutions, the correct solution is that one which minimizes the free energy.

61 The Replica Method 43 Specializing our result to the matched detector by letting σ σ 0, we have F c E c, G c G 0c, q c m c. This makes the free energy simplify to F(x) K = 1 K + = 1 K + N c=1 1+t k [ log ) ] βe c m c 1 K log 1 t k K Ẽk k=1 ( z ) ( Ẽ k + Ẽk + λ k + 1 t k log cosh z ) Ẽ k + Ẽk λ k Dz ( 1 + β σ 0(p 0c m c ) log cosh N [ σ 0 E c log ( σ0 E 1 c)] K c=1 1+t k log cosh K log k=1 1 t k Ẽk ( z ) Ẽ k + Ẽk + λ k + 1 t k log cosh where the macroscopic parameters E c are given by 1 E c = σ 0 + β K + 1 t k = σ 0 + β K K k=1 tanh K k=1 w ck [ tk ( z Ẽ k + Ẽk λ k w ck ( 1 t k ) 1 tanh ( z Ẽ k + Ẽk λ k ) Dz ( tanh z Ẽ k + Ẽk + λ ) k ) ] Dz ( z Ẽ k + Ẽk ) 1 t k tanh ( z Ẽ k + Ẽk ) Dz.

62 The Replica Method 44 Similar to the case of Gaussian priors, Ẽ k can be shown to be a kind of signal-tointerference and noise ratio, in the sense that the bit error probability of user k is given by Pr(ˆx k x k ) = Ẽk Dz. An equivalent additive white Gaussian noise channel can be defined to model the multiuser interference for any prior. For any input alphabet to the channel mutual information is given by (4) with the free energy corresponding to that input alphabet.

63 The Replica Method 45 MC-CDMA in Multipath Fading Equivalent baseband vector channel in frequency domain: y = ( W S ) x + n N 1 N K N K K 1 N 1 frequency channel Hadamard spreading users noise chips matrix product matrix data vector The noise n has i.i.d. Gaussian entries with zero-mean and unit variance. The columns of S are the random spreading sequences of the users. The columns of W are the random frequency responses of the users.

64 The Replica Method 46 Minimum Probability of Error for MAP Detector Maximum a-posteriori detector: ˆx k = arg max x k Pr(x k y, W ) In the large system limit, there is an equivalent AWGN channel with SINR Ẽ k such that ) Pr(ˆx k x k W ) = Dz = Q ( Ẽ k Ẽk and ) Pr(ˆx k x k ) = E Pr(ˆx k x k W ) = E Q ( Ẽ k W W

65 The Replica Method 47 SINR of Equivalent AWGN Channel For N,K large, solve the fixed-point system of equations N Ẽ k = 1 N E c = c=1 σ n + β K E c w ck K (1 t k ) wck k=1 1 1 tanh (z ) Ẽ k + Ẽ k ( 1 t k tanh z ) Dz Ẽ k + Ẽ k In practice, the fading statistics obey some structure: Asymptotic frequency-invariance on the uplink (reverse link) Rank-1 statistics on the downlink (forward link)

66 The Replica Method 48 Asymptotic Frequency Invariance (Uplink) E c = E c The fading is ergodic across the user population for each frequency c. Ẽ k = σ n + β K P k K 1 tanh (z ) Ẽ n + Ẽ n (1 t n ) P ( n 1 t n tanh z ) Dz Ẽ n + Ẽ n n=1 with N P k = 1 N w ck c=1 The spectrum of the received signal is white (frequency-invariant). Full diversity is achieved.

67 The Replica Method 49 Rank 1 Statistics (Downlink) W = fu T w ck = f c u k All users experience the same fading channel except for a scalar factor u k. Ẽ k = u k N N c=1 σ n f c + β K K (1 t n ) u n n=1 1 ( 1 tanh z ) Ẽ n ( + Ẽn 1 t n tanh z ) Dz Ẽ n + Ẽ n Full diversity is achieved. The spectrum of the received signal is colored = degradation.

68 The Replica Method 50 Uplink vs. Downlink 10 1 L= L=4 Uniform priors Bit error probability L=6 L equal power paths K N = SNR [db] «Ö Ò

69 The Replica Method 50 Uplink vs. Downlink 10 1 L= L=4 Uniform priors Bit error probability L=6 L equal power paths K N = SNR [db] «Ö Ò

70 Multistage Detection 51 Part II: Multistage Detection

71 Multistage Detection 5 Matrix Inversion Let R be non singular. Let λ i denote the eigenvalues of R. Then, K ( ) R λ k I = 0 = I + K α k R k = 0 k=1 k=1 Cayley Hamilton Theorem with appropriate α k s. Solution to matrix inversion problem given the eigenvalues: R 1 = K α k R k 1 k=1

72 Multistage Detection 53 Linear Multistage Detection Linear MMSE filter: L MMSE = ( ) 1 R + σni Approximation by power series: Cayley Hamilton theorem yields: ( R + σ n I ) K 1 1 = i=0 D 1 w i R i w i R i for D < K. i=0 For random spreading the optimum weights converge almost surely, as K, N with β = K N, and can be given in closed form.

73 Multistage Detection 54 Semi-Universal Weights Filter shall be independent from the realization of the random matrix S, but may use its statistics. For most large random matrices, as K = βn, many finite dimensional functions of the eigenvalues, e.g. the filter coefficients, freeze. The asymptotic limits depend only on parts of the statistics of the random matrix. The weights can be calculated off-line with the help of random matrix and free probability theory.

74 Multistage Detection 55 Weight Design is given by Yule Walker equations: m 1 m. = m + σ m 1 m 3 + σ m... m D+ + σ m D+1 m 3 + σ m m 4 + σ m 3... m D+3 + σ m D w 0 w 1. m D+1 m D+ + σ m D+1 m D+3 + σ m D+... m D+ + σ m D+1 w D with the total moments m n = E {λ n } = Tr ( S H S ) n

75 Multistage Detection 56 Example for Asymptotic Weight Design Random matrix with i.i.d. entries: D = w 0 = σ w β w 1 = 1 w 0 = σ w β + 3β D = 3 w 1 = σ w 3 3β w = 1 m n = 1 n ( )( n n n i=1 i i 1 ) β i. D = 4 w 0 = σ w β + 6β + 4β 3 w 1 = σ w 6 9β 6β w = σ w β w 3 = 1 w 0 = σ w β + 9β + 8β 3 + 5β 4 w 1 = σ w 10 18β 18β 10β 3 D = 5 w = σ w β + 10β w 3 = σ w 4 5 5β w 4 = 1

76 Multistage Detection 57 Rate of Convergence Theorem 1 Let A = I and the chips of any user be i.i.d. zero mean random variables with finite fourth moment and the sequences of all users jointly independent. Then, the multi user efficiencies of all users converge almost surely, as N,K but β = K N fixed, to 1 η WLPIC,D+1 = β 1 + σn + η WLPIC,D with η 0 = 0 for optimally chosen weights. The approximation converges to the exact MMSE performance as a continued fraction. For optimal coefficients w i, the approximation error ǫ decreases exponentially with the number of stages D: There are even tighter bounds. ǫ < const. (1 + SNR) D

77 Multistage Detection 58 Individual Weight Design Allow for different weights for different users ( R + σ n I ) K 1 1 = i=0 D 1 w i R i W i R i for D < K and allw i diagonal. i=0 Weight design by the same Yule-Walker equations, but with the k-partial moments [ (S m (k) n = H S ) ] n. kk For users with different powers, individual weight design is better. Do the k-partial moments convergence asymptotically?

78 Multistage Detection 59 Convergence of Partial Moments Let the random matrix H fufill the same conditions as needed for the deformed quarter circle law. Let A be an K K diagonal matrix such that its singular value distribution converges almost surely, as K to a non-random limit distribution. Let R = A H H H HA. Then, ( R l) kk, the kth diagonal element of R l converges, conditioned on a kk, the k th diagonal element of A, almost surely, as K = βn to l R (l) kk = a kk β R (q 1) kk m (R) l q, l > 1 with m (R) q = Tr(R q ). The total moments of R are conveniently given by the recursion m (R) l = β l q=1 q=1 m (R) l q lim K 1 K K k=1 a kk R (q 1) kk.

79 Multistage Detection 60 Let Structure of Proof R = A H H H HA, T = HAA H H H Bound the difference between the quadratic form and the trace as Silverstein and Bai did. Use Lyapunov inequality to bound the forth moment of the entries of the random matrix H. Recursively proof convergence of the diagonal elements of (R) k and the traces of (T ) k flipping between the two.

80 Multistage Detection 61 Multipath Fading Channels Let the path differences be only a few chip intervals. Approximate the linear time shift by a cyclic shift modulo N. For large N this becomes more and more accurate. paths: All odd column of the N K matrix H are i.i.d. Each even column of H is a cyclically shifted version of the adjacent column to the left. E { [ ] bb H} 1 1 = I 1 1 and (A) kk are independent zero-mean and complex Gaussian. This setting is equivalent to the full i.i.d. setting in all asymptotic aspects if the users powers follow the same distribution. Equivalence holds for an arbitrary number of paths.

81 Multistage Detection 6 Asynchronous Users S n y n y n+1 y n+ y n+3 S n+1 S n+ A n A n+1 A n+ b n b n+ Convergence of k-partial moments proven. Recursive expressions to construct them known. Proof follows the same lines. Y = SA }{{} B + N H

82 Multistage Detection 63 Detector Structure for Asynchronous Users y(n+1) D D Matched Re- Matched Re- Matched Filtering Spreading Filtering Spreading Filtering H H (n) H(n) D H(n 1) H H(n M+1) D H(n M) H D M-1 D D M- D D W 0 W 1 W M 1st Stage M-th Stage ˆb n M H H Y H H HH H Y H H (HH H ) M Y No truncation effects.

83 Multistage Detection 64 Chip-Asynchronous Users Convergence of k-partial moments proven. Recursive expressions to construct them known. Proof follows the same lines, but makes use of properties of circulant matrices to cope with shifted bandlimited chip waveforms. For non-zero roll-off factor, chip-asynchronicity gives significant improvements at high SNR.

84 Multistage Detection 65 CDMA with Dual Antenna Arrays The system is described by the virtual NR K spreading matrix h 11 s 1 h 1 s... h 1K s K S = h 1 s 1 h s... h K s K h R1 s 1 h R s... h RK s K Note that with the Kronecker product : s k = h k s k Note also that the entries of S are not jointly independent even if those ones of S and H are.

85 Multistage Detection 66 A Resource Pooling Result Theorem Let the chips of any user be i.i.d. zero mean random variables with finite 6th moment, the sequences of all users jointly independent, and the antenna array channel h rk follow the i.i.d. complex Gaussian model. Then, the multi user efficiency of the linear MMSE detector converges for all users almost surely, as N, K but β = K N and R fixed, to the deterministic unique positive solution of the fixed point equation 1 = 1 + β x η MMSE R σn + η MMSE x dp à (x), if the powers of the users converge weakly to the limit distribution PÃ(x) with R Ãk = A k h rk. r=1

86 Multistage Detection 67 Resource Pooling for Correlated MIMO Channels Theorem 3 Let the chips of any user be i.i.d. zero mean random variables with finite 6th moment, the sequences of all users jointly independent, and the empirical distributions of the channel gains h rk across the users converge, jointly for all receive antennas r to an R-dimensional joint limit distribution P H (x). Then, with linear MMSE detection, the SINR of user k converges, as N,K but β = K and R fixed, conditioned N on the channel gains of user k to h H k Ah k σ where A is the deterministic unique positive definite solution of the matrix-valued fixed point equation A 1 xx H = I + β σn + x H Ax dp H(x), Asymptotic performance is characterized by an R R matrix.

87 Multistage Detection 68 MS Detection for Correlated Resource Pooling Let S = [ s 1, s,..., s K ] with s k = h k s k where S is i.i.d. the entries of H may be arbitrarily dependent as long as the rows have a joint limit distribution and are finite in number. Then, as the dimensions of S grow the k-partial moments conditioned on h k converge, recursive expressions for them are known, the proof follows along the same lines as before.

Design of MMSE Multiuser Detectors using Random Matrix Techniques

Design of MMSE Multiuser Detectors using Random Matrix Techniques Design of MMSE Multiuser Detectors using Random Matrix Techniques Linbo Li and Antonia M Tulino and Sergio Verdú Department of Electrical Engineering Princeton University Princeton, New Jersey 08544 Email:

More information

On the Optimum Asymptotic Multiuser Efficiency of Randomly Spread CDMA

On the Optimum Asymptotic Multiuser Efficiency of Randomly Spread CDMA On the Optimum Asymptotic Multiuser Efficiency of Randomly Spread CDMA Ralf R. Müller Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU) Lehrstuhl für Digitale Übertragung 13 December 2014 1. Introduction

More information

Minimization of Quadratic Forms in Wireless Communications

Minimization of Quadratic Forms in Wireless Communications Minimization of Quadratic Forms in Wireless Communications Ralf R. Müller Department of Electronics & Telecommunications Norwegian University of Science & Technology, Trondheim, Norway mueller@iet.ntnu.no

More information

Decoupling of CDMA Multiuser Detection via the Replica Method

Decoupling of CDMA Multiuser Detection via the Replica Method Decoupling of CDMA Multiuser Detection via the Replica Method Dongning Guo and Sergio Verdú Dept. of Electrical Engineering Princeton University Princeton, NJ 08544, USA email: {dguo,verdu}@princeton.edu

More information

Appendix B Information theory from first principles

Appendix B Information theory from first principles Appendix B Information theory from first principles This appendix discusses the information theory behind the capacity expressions used in the book. Section 8.3.4 is the only part of the book that supposes

More information

LECTURE 18. Lecture outline Gaussian channels: parallel colored noise inter-symbol interference general case: multiple inputs and outputs

LECTURE 18. Lecture outline Gaussian channels: parallel colored noise inter-symbol interference general case: multiple inputs and outputs LECTURE 18 Last time: White Gaussian noise Bandlimited WGN Additive White Gaussian Noise (AWGN) channel Capacity of AWGN channel Application: DS-CDMA systems Spreading Coding theorem Lecture outline Gaussian

More information

Interactions of Information Theory and Estimation in Single- and Multi-user Communications

Interactions of Information Theory and Estimation in Single- and Multi-user Communications Interactions of Information Theory and Estimation in Single- and Multi-user Communications Dongning Guo Department of Electrical Engineering Princeton University March 8, 2004 p 1 Dongning Guo Communications

More information

Random Matrix Theory Lecture 1 Introduction, Ensembles and Basic Laws. Symeon Chatzinotas February 11, 2013 Luxembourg

Random Matrix Theory Lecture 1 Introduction, Ensembles and Basic Laws. Symeon Chatzinotas February 11, 2013 Luxembourg Random Matrix Theory Lecture 1 Introduction, Ensembles and Basic Laws Symeon Chatzinotas February 11, 2013 Luxembourg Outline 1. Random Matrix Theory 1. Definition 2. Applications 3. Asymptotics 2. Ensembles

More information

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH MIMO : MIMO Theoretical Foundations of Wireless Communications 1 Wednesday, May 25, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication 1 / 20 Overview MIMO

More information

Lecture 6: Gaussian Channels. Copyright G. Caire (Sample Lectures) 157

Lecture 6: Gaussian Channels. Copyright G. Caire (Sample Lectures) 157 Lecture 6: Gaussian Channels Copyright G. Caire (Sample Lectures) 157 Differential entropy (1) Definition 18. The (joint) differential entropy of a continuous random vector X n p X n(x) over R is: Z h(x

More information

ELEC546 Review of Information Theory

ELEC546 Review of Information Theory ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random

More information

Direct-Sequence Spread-Spectrum

Direct-Sequence Spread-Spectrum Chapter 3 Direct-Sequence Spread-Spectrum In this chapter we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously.

More information

Capacity of multiple-input multiple-output (MIMO) systems in wireless communications

Capacity of multiple-input multiple-output (MIMO) systems in wireless communications 15/11/02 Capacity of multiple-input multiple-output (MIMO) systems in wireless communications Bengt Holter Department of Telecommunications Norwegian University of Science and Technology 1 Outline 15/11/02

More information

Spectral Efficiency of CDMA Cellular Networks

Spectral Efficiency of CDMA Cellular Networks Spectral Efficiency of CDMA Cellular Networks N. Bonneau, M. Debbah, E. Altman and G. Caire INRIA Eurecom Institute nicolas.bonneau@sophia.inria.fr Outline 2 Outline Uplink CDMA Model: Single cell case

More information

1 Solutions to selected problems

1 Solutions to selected problems Solutions to selected problems Section., #a,c,d. a. p x = n for i = n : 0 p x = xp x + i end b. z = x, y = x for i = : n y = y + x i z = zy end c. y = (t x ), p t = a for i = : n y = y(t x i ) p t = p

More information

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques EE6604 Personal & Mobile Communications Week 13 Multi-antenna Techniques 1 Diversity Methods Diversity combats fading by providing the receiver with multiple uncorrelated replicas of the same information

More information

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway

More information

Supelec Randomness in Wireless Networks: how to deal with it?

Supelec Randomness in Wireless Networks: how to deal with it? Supelec Randomness in Wireless Networks: how to deal with it? Mérouane Debbah Alcatel-Lucent Chair on Flexible Radio merouane.debbah@supelec.fr The performance dilemma... La théorie, c est quand on sait

More information

Random Matrices and Wireless Communications

Random Matrices and Wireless Communications Random Matrices and Wireless Communications Jamie Evans Centre for Ultra-Broadband Information Networks (CUBIN) Department of Electrical and Electronic Engineering University of Melbourne 3.5 1 3 0.8 2.5

More information

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University

More information

Chapter 4: Continuous channel and its capacity

Chapter 4: Continuous channel and its capacity meghdadi@ensil.unilim.fr Reference : Elements of Information Theory by Cover and Thomas Continuous random variable Gaussian multivariate random variable AWGN Band limited channel Parallel channels Flat

More information

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Lecture - 19 Multi-User CDMA Uplink and Asynchronous CDMA

More information

A Combinatorial Optimization Problem in Wireless Communications and Its Analysis

A Combinatorial Optimization Problem in Wireless Communications and Its Analysis A Combinatorial Optimization Problem in Wireless Communications and Its Analysis Ralf R. Müller EE Dept, NTNU Benjamin Zaidel Tel Aviv Rodrigo de Miguel SINTEF, Trondheim Vesna Gardašević EE Dept, NTNU

More information

INVERSE EIGENVALUE STATISTICS FOR RAYLEIGH AND RICIAN MIMO CHANNELS

INVERSE EIGENVALUE STATISTICS FOR RAYLEIGH AND RICIAN MIMO CHANNELS INVERSE EIGENVALUE STATISTICS FOR RAYLEIGH AND RICIAN MIMO CHANNELS E. Jorswieck, G. Wunder, V. Jungnickel, T. Haustein Abstract Recently reclaimed importance of the empirical distribution function of

More information

ELEC546 MIMO Channel Capacity

ELEC546 MIMO Channel Capacity ELEC546 MIMO Channel Capacity Vincent Lau Simplified Version.0 //2004 MIMO System Model Transmitter with t antennas & receiver with r antennas. X Transmitted Symbol, received symbol Channel Matrix (Flat

More information

Lecture 2. Capacity of the Gaussian channel

Lecture 2. Capacity of the Gaussian channel Spring, 207 5237S, Wireless Communications II 2. Lecture 2 Capacity of the Gaussian channel Review on basic concepts in inf. theory ( Cover&Thomas: Elements of Inf. Theory, Tse&Viswanath: Appendix B) AWGN

More information

BASICS OF DETECTION AND ESTIMATION THEORY

BASICS OF DETECTION AND ESTIMATION THEORY BASICS OF DETECTION AND ESTIMATION THEORY 83050E/158 In this chapter we discuss how the transmitted symbols are detected optimally from a noisy received signal (observation). Based on these results, optimal

More information

. Find E(V ) and var(v ).

. Find E(V ) and var(v ). Math 6382/6383: Probability Models and Mathematical Statistics Sample Preliminary Exam Questions 1. A person tosses a fair coin until she obtains 2 heads in a row. She then tosses a fair die the same number

More information

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications Professor M. Chiang Electrical Engineering Department, Princeton University March

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

The Effect of Spatial Correlations on MIMO Capacity: A (not so) Large N Analytical Approach: Aris Moustakas 1, Steven Simon 1 & Anirvan Sengupta 1,2

The Effect of Spatial Correlations on MIMO Capacity: A (not so) Large N Analytical Approach: Aris Moustakas 1, Steven Simon 1 & Anirvan Sengupta 1,2 The Effect of Spatial Correlations on MIMO Capacity: A (not so) Large N Analytical Approach: Aris Moustakas 1, Steven Simon 1 & Anirvan Sengupta 1, 1, Rutgers University Outline Aim: Calculate statistics

More information

Eigenvalues and Singular Values of Random Matrices: A Tutorial Introduction

Eigenvalues and Singular Values of Random Matrices: A Tutorial Introduction Random Matrix Theory and its applications to Statistics and Wireless Communications Eigenvalues and Singular Values of Random Matrices: A Tutorial Introduction Sergio Verdú Princeton University National

More information

x log x, which is strictly convex, and use Jensen s Inequality:

x log x, which is strictly convex, and use Jensen s Inequality: 2. Information measures: mutual information 2.1 Divergence: main inequality Theorem 2.1 (Information Inequality). D(P Q) 0 ; D(P Q) = 0 iff P = Q Proof. Let ϕ(x) x log x, which is strictly convex, and

More information

ELEC E7210: Communication Theory. Lecture 10: MIMO systems

ELEC E7210: Communication Theory. Lecture 10: MIMO systems ELEC E7210: Communication Theory Lecture 10: MIMO systems Matrix Definitions, Operations, and Properties (1) NxM matrix a rectangular array of elements a A. an 11 1....... a a 1M. NM B D C E ermitian transpose

More information

Lecture 7 MIMO Communica2ons

Lecture 7 MIMO Communica2ons Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10

More information

Linear and Nonlinear Iterative Multiuser Detection

Linear and Nonlinear Iterative Multiuser Detection 1 Linear and Nonlinear Iterative Multiuser Detection Alex Grant and Lars Rasmussen University of South Australia October 2011 Outline 1 Introduction 2 System Model 3 Multiuser Detection 4 Interference

More information

National Sun Yat-Sen University CSE Course: Information Theory. Maximum Entropy and Spectral Estimation

National Sun Yat-Sen University CSE Course: Information Theory. Maximum Entropy and Spectral Estimation Maximum Entropy and Spectral Estimation 1 Introduction What is the distribution of velocities in the gas at a given temperature? It is the Maxwell-Boltzmann distribution. The maximum entropy distribution

More information

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 : Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Friday, May 25, 2018 09:00-11:30, Kansliet 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless

More information

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

CHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz.

CHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz. CHAPTER 4 Problem 4. : Based on the info about the scattering function we know that the multipath spread is T m =ms, and the Doppler spread is B d =. Hz. (a) (i) T m = 3 sec (ii) B d =. Hz (iii) ( t) c

More information

ECE 4400:693 - Information Theory

ECE 4400:693 - Information Theory ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 8: Differential Entropy Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Lecture 1 / 43 Outline 1 Review: Entropy of discrete RVs 2 Differential

More information

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH : Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Wednesday, June 1, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

Information Theory for Wireless Communications, Part II:

Information Theory for Wireless Communications, Part II: Information Theory for Wireless Communications, Part II: Lecture 5: Multiuser Gaussian MIMO Multiple-Access Channel Instructor: Dr Saif K Mohammed Scribe: Johannes Lindblom In this lecture, we give the

More information

Wideband Fading Channel Capacity with Training and Partial Feedback

Wideband Fading Channel Capacity with Training and Partial Feedback Wideband Fading Channel Capacity with Training and Partial Feedback Manish Agarwal, Michael L. Honig ECE Department, Northwestern University 145 Sheridan Road, Evanston, IL 6008 USA {m-agarwal,mh}@northwestern.edu

More information

MULTICARRIER code-division multiple access (MC-

MULTICARRIER code-division multiple access (MC- IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 479 Spectral Efficiency of Multicarrier CDMA Antonia M. Tulino, Member, IEEE, Linbo Li, and Sergio Verdú, Fellow, IEEE Abstract We

More information

Parallel Additive Gaussian Channels

Parallel Additive Gaussian Channels Parallel Additive Gaussian Channels Let us assume that we have N parallel one-dimensional channels disturbed by noise sources with variances σ 2,,σ 2 N. N 0,σ 2 x x N N 0,σ 2 N y y N Energy Constraint:

More information

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH : Antenna Diversity and Theoretical Foundations of Wireless Communications Wednesday, May 4, 206 9:00-2:00, Conference Room SIP Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2)

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2) IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 361 Uplink Downlink Duality Via Minimax Duality Wei Yu, Member, IEEE Abstract The sum capacity of a Gaussian vector broadcast channel

More information

Lecture 8: Channel Capacity, Continuous Random Variables

Lecture 8: Channel Capacity, Continuous Random Variables EE376A/STATS376A Information Theory Lecture 8-02/0/208 Lecture 8: Channel Capacity, Continuous Random Variables Lecturer: Tsachy Weissman Scribe: Augustine Chemparathy, Adithya Ganesh, Philip Hwang Channel

More information

ECE 650 Lecture 4. Intro to Estimation Theory Random Vectors. ECE 650 D. Van Alphen 1

ECE 650 Lecture 4. Intro to Estimation Theory Random Vectors. ECE 650 D. Van Alphen 1 EE 650 Lecture 4 Intro to Estimation Theory Random Vectors EE 650 D. Van Alphen 1 Lecture Overview: Random Variables & Estimation Theory Functions of RV s (5.9) Introduction to Estimation Theory MMSE Estimation

More information

12.4 Known Channel (Water-Filling Solution)

12.4 Known Channel (Water-Filling Solution) ECEn 665: Antennas and Propagation for Wireless Communications 54 2.4 Known Channel (Water-Filling Solution) The channel scenarios we have looed at above represent special cases for which the capacity

More information

IEEE C80216m-09/0079r1

IEEE C80216m-09/0079r1 Project IEEE 802.16 Broadband Wireless Access Working Group Title Efficient Demodulators for the DSTTD Scheme Date 2009-01-05 Submitted M. A. Khojastepour Ron Porat Source(s) NEC

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

Estimation techniques

Estimation techniques Estimation techniques March 2, 2006 Contents 1 Problem Statement 2 2 Bayesian Estimation Techniques 2 2.1 Minimum Mean Squared Error (MMSE) estimation........................ 2 2.1.1 General formulation......................................

More information

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm HongSun An Student Member IEEE he Graduate School of I & Incheon Korea ahs3179@gmail.com Manar Mohaisen Student Member IEEE

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 6 8, 2005 Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters Alkan

More information

6.1 Matrices. Definition: A Matrix A is a rectangular array of the form. A 11 A 12 A 1n A 21. A 2n. A m1 A m2 A mn A 22.

6.1 Matrices. Definition: A Matrix A is a rectangular array of the form. A 11 A 12 A 1n A 21. A 2n. A m1 A m2 A mn A 22. 61 Matrices Definition: A Matrix A is a rectangular array of the form A 11 A 12 A 1n A 21 A 22 A 2n A m1 A m2 A mn The size of A is m n, where m is the number of rows and n is the number of columns The

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Asymptotic Eigenvalue Moments for Linear Multiuser Detection

Asymptotic Eigenvalue Moments for Linear Multiuser Detection Asymptotic Eigenvalue Moments for Linear Multiuser Detection Linbo Li and Antonia M Tulino and Sergio Verdú Department of Electrical Engineering Princeton University Princeton, NJ 08544, USA flinbo, atulino,

More information

Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming

Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming Master Universitario en Ingeniería de Telecomunicación I. Santamaría Universidad de Cantabria Contents Introduction Multiplexing,

More information

Capacity of AWGN channels

Capacity of AWGN channels Chapter 3 Capacity of AWGN channels In this chapter we prove that the capacity of an AWGN channel with bandwidth W and signal-tonoise ratio SNR is W log 2 (1+SNR) bits per second (b/s). The proof that

More information

Applications and fundamental results on random Vandermon

Applications and fundamental results on random Vandermon Applications and fundamental results on random Vandermonde matrices May 2008 Some important concepts from classical probability Random variables are functions (i.e. they commute w.r.t. multiplication)

More information

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:

More information

Gaussian, Markov and stationary processes

Gaussian, Markov and stationary processes Gaussian, Markov and stationary processes Gonzalo Mateos Dept. of ECE and Goergen Institute for Data Science University of Rochester gmateosb@ece.rochester.edu http://www.ece.rochester.edu/~gmateosb/ November

More information

The Maximum Entropy Principle and Applications to MIMO Channel Modeling

The Maximum Entropy Principle and Applications to MIMO Channel Modeling The Maximum Entropy Principle and Applications to MIMO Channel Modeling Eurecom CM Talk, 16/02/2006 Maxime Guillaud maxime.guillaud@eurecom.fr (Joint work with Mérouane Debbah) The Maximum Entropy Principle

More information

Least-Squares Performance of Analog Product Codes

Least-Squares Performance of Analog Product Codes Copyright 004 IEEE Published in the Proceedings of the Asilomar Conference on Signals, Systems and Computers, 7-0 ovember 004, Pacific Grove, California, USA Least-Squares Performance of Analog Product

More information

APPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2.

APPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2. APPENDIX A Background Mathematics A. Linear Algebra A.. Vector algebra Let x denote the n-dimensional column vector with components 0 x x 2 B C @. A x n Definition 6 (scalar product). The scalar product

More information

Simultaneous SDR Optimality via a Joint Matrix Decomp.

Simultaneous SDR Optimality via a Joint Matrix Decomp. Simultaneous SDR Optimality via a Joint Matrix Decomposition Joint work with: Yuval Kochman, MIT Uri Erez, Tel Aviv Uni. May 26, 2011 Model: Source Multicasting over MIMO Channels z 1 H 1 y 1 Rx1 ŝ 1 s

More information

Chapter 2. Linear Algebra. rather simple and learning them will eventually allow us to explain the strange results of

Chapter 2. Linear Algebra. rather simple and learning them will eventually allow us to explain the strange results of Chapter 2 Linear Algebra In this chapter, we study the formal structure that provides the background for quantum mechanics. The basic ideas of the mathematical machinery, linear algebra, are rather simple

More information

Perhaps the simplest way of modeling two (discrete) random variables is by means of a joint PMF, defined as follows.

Perhaps the simplest way of modeling two (discrete) random variables is by means of a joint PMF, defined as follows. Chapter 5 Two Random Variables In a practical engineering problem, there is almost always causal relationship between different events. Some relationships are determined by physical laws, e.g., voltage

More information

Performance of DS-CDMA Systems With Optimal Hard-Decision Parallel Interference Cancellation

Performance of DS-CDMA Systems With Optimal Hard-Decision Parallel Interference Cancellation 2918 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 11, NOVEMBER 2003 Performance of DS-CDMA Systems With Optimal Hard-Decision Parallel Interference Cancellation Remco van der Hofstad Marten J.

More information

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:

More information

Received Signal, Interference and Noise

Received Signal, Interference and Noise Optimum Combining Maximum ratio combining (MRC) maximizes the output signal-to-noise ratio (SNR) and is the optimal combining method in a maximum likelihood sense for channels where the additive impairment

More information

Power Control in Multi-Carrier CDMA Systems

Power Control in Multi-Carrier CDMA Systems A Game-Theoretic Approach to Energy-Efficient ower Control in Multi-Carrier CDMA Systems Farhad Meshkati, Student Member, IEEE, Mung Chiang, Member, IEEE, H. Vincent oor, Fellow, IEEE, and Stuart C. Schwartz,

More information

Multiple Antennas in Wireless Communications

Multiple Antennas in Wireless Communications Multiple Antennas in Wireless Communications Luca Sanguinetti Department of Information Engineering Pisa University luca.sanguinetti@iet.unipi.it April, 2009 Luca Sanguinetti (IET) MIMO April, 2009 1 /

More information

EE 5407 Part II: Spatial Based Wireless Communications

EE 5407 Part II: Spatial Based Wireless Communications EE 5407 Part II: Spatial Based Wireless Communications Instructor: Prof. Rui Zhang E-mail: rzhang@i2r.a-star.edu.sg Website: http://www.ece.nus.edu.sg/stfpage/elezhang/ Lecture II: Receive Beamforming

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 3, MARCH

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 3, MARCH IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 3, MARCH 2012 1413 Vector Precoding for Gaussian MIMO Broadcast Channels: Impact of Replica Symmetry Breaking Benjamin M. Zaidel, Member, IEEE, Ralf

More information

Estimation of the Capacity of Multipath Infrared Channels

Estimation of the Capacity of Multipath Infrared Channels Estimation of the Capacity of Multipath Infrared Channels Jeffrey B. Carruthers Department of Electrical and Computer Engineering Boston University jbc@bu.edu Sachin Padma Department of Electrical and

More information

Parameter Estimation

Parameter Estimation 1 / 44 Parameter Estimation Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay October 25, 2012 Motivation System Model used to Derive

More information

MATH 205C: STATIONARY PHASE LEMMA

MATH 205C: STATIONARY PHASE LEMMA MATH 205C: STATIONARY PHASE LEMMA For ω, consider an integral of the form I(ω) = e iωf(x) u(x) dx, where u Cc (R n ) complex valued, with support in a compact set K, and f C (R n ) real valued. Thus, I(ω)

More information

EE 4TM4: Digital Communications II Scalar Gaussian Channel

EE 4TM4: Digital Communications II Scalar Gaussian Channel EE 4TM4: Digital Communications II Scalar Gaussian Channel I. DIFFERENTIAL ENTROPY Let X be a continuous random variable with probability density function (pdf) f(x) (in short X f(x)). The differential

More information

for Multi-Hop Amplify-and-Forward MIMO Relaying Systems

for Multi-Hop Amplify-and-Forward MIMO Relaying Systems A General Robust Linear Transceiver Design 1 for Multi-Hop Amplify-and-Forward MIMO Relaying Systems Chengwen Xing, Shaodan Ma, Zesong Fei, Yik-Chung Wu and H. Vincent Poor Abstract In this paper, linear

More information

DETECTION theory deals primarily with techniques for

DETECTION theory deals primarily with techniques for ADVANCED SIGNAL PROCESSING SE Optimum Detection of Deterministic and Random Signals Stefan Tertinek Graz University of Technology turtle@sbox.tugraz.at Abstract This paper introduces various methods for

More information

1 Solutions to selected problems

1 Solutions to selected problems Solutions to selected problems Section., #a,c,d. a. p x = n for i = n : 0 p x = xp x + i end b. z = x, y = x for i = : n y = y + x i z = zy end c. y = (t x ), p t = a for i = : n y = y(t x i ) p t = p

More information

Multiuser Capacity in Block Fading Channel

Multiuser Capacity in Block Fading Channel Multiuser Capacity in Block Fading Channel April 2003 1 Introduction and Model We use a block-fading model, with coherence interval T where M independent users simultaneously transmit to a single receiver

More information

Chapter 2 Signal Processing at Receivers: Detection Theory

Chapter 2 Signal Processing at Receivers: Detection Theory Chapter Signal Processing at Receivers: Detection Theory As an application of the statistical hypothesis testing, signal detection plays a key role in signal processing at receivers of wireless communication

More information

Vector Channel Capacity with Quantized Feedback

Vector Channel Capacity with Quantized Feedback Vector Channel Capacity with Quantized Feedback Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 9697-65 Email: syed@ece.uci.edu,

More information

EE376A - Information Theory Final, Monday March 14th 2016 Solutions. Please start answering each question on a new page of the answer booklet.

EE376A - Information Theory Final, Monday March 14th 2016 Solutions. Please start answering each question on a new page of the answer booklet. EE376A - Information Theory Final, Monday March 14th 216 Solutions Instructions: You have three hours, 3.3PM - 6.3PM The exam has 4 questions, totaling 12 points. Please start answering each question on

More information

Applications of Lattices in Telecommunications

Applications of Lattices in Telecommunications Applications of Lattices in Telecommunications Dept of Electrical and Computer Systems Engineering Monash University amin.sakzad@monash.edu Oct. 2013 1 Sphere Decoder Algorithm Rotated Signal Constellations

More information

Advanced Topics in Digital Communications Spezielle Methoden der digitalen Datenübertragung

Advanced Topics in Digital Communications Spezielle Methoden der digitalen Datenübertragung Advanced Topics in Digital Communications Spezielle Methoden der digitalen Datenübertragung Dr.-Ing. Carsten Bockelmann Institute for Telecommunications and High-Frequency Techniques Department of Communications

More information

Lecture 1: The Multiple Access Channel. Copyright G. Caire 12

Lecture 1: The Multiple Access Channel. Copyright G. Caire 12 Lecture 1: The Multiple Access Channel Copyright G. Caire 12 Outline Two-user MAC. The Gaussian case. The K-user case. Polymatroid structure and resource allocation problems. Copyright G. Caire 13 Two-user

More information

UC Berkeley Department of Electrical Engineering and Computer Sciences. EECS 126: Probability and Random Processes

UC Berkeley Department of Electrical Engineering and Computer Sciences. EECS 126: Probability and Random Processes UC Berkeley Department of Electrical Engineering and Computer Sciences EECS 6: Probability and Random Processes Problem Set 3 Spring 9 Self-Graded Scores Due: February 8, 9 Submit your self-graded scores

More information

Asynchronous CDMA Systems with Random Spreading Part I: Fundamental Limits

Asynchronous CDMA Systems with Random Spreading Part I: Fundamental Limits SUBMITTED MANUSCRIPT TO IEEE TRANSACTIONS ON INFORMATION THEORY 1 Asynchronous CDMA Systems with Random Spreading Part I: Fundamental Limits Laura Cottatellucci, Ralf R. Müller, and Mérouane Debbah Abstract

More information

Optimal Data and Training Symbol Ratio for Communication over Uncertain Channels

Optimal Data and Training Symbol Ratio for Communication over Uncertain Channels Optimal Data and Training Symbol Ratio for Communication over Uncertain Channels Ather Gattami Ericsson Research Stockholm, Sweden Email: athergattami@ericssoncom arxiv:50502997v [csit] 2 May 205 Abstract

More information

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information

More information

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider

More information

Introduction to Information Entropy Adapted from Papoulis (1991)

Introduction to Information Entropy Adapted from Papoulis (1991) Introduction to Information Entropy Adapted from Papoulis (1991) Federico Lombardo Papoulis, A., Probability, Random Variables and Stochastic Processes, 3rd edition, McGraw ill, 1991. 1 1. INTRODUCTION

More information

Multiuser Receivers, Random Matrices and Free Probability

Multiuser Receivers, Random Matrices and Free Probability Multiuser Receivers, Random Matrices and Free Probability David N.C. Tse Department of Electrical Engineering and Computer Sciences University of California Berkeley, CA 94720, USA dtse@eecs.berkeley.edu

More information

A6523 Signal Modeling, Statistical Inference and Data Mining in Astrophysics Spring 2011

A6523 Signal Modeling, Statistical Inference and Data Mining in Astrophysics Spring 2011 A6523 Signal Modeling, Statistical Inference and Data Mining in Astrophysics Spring 2011 Reading Chapter 5 (continued) Lecture 8 Key points in probability CLT CLT examples Prior vs Likelihood Box & Tiao

More information