Construction of MIMO MAC Codes Achieving the Pigeon Hole Bound

Size: px
Start display at page:

Download "Construction of MIMO MAC Codes Achieving the Pigeon Hole Bound"

Transcription

1 Construction of MIMO MAC Codes Achieving the Pigeon Hole Bound Toni Ernvall and Roope Vehkalahti Turku Center for Computer Science and Department of Mathematics, University of Turku, Finland s: {tmernv, arxiv:100675v1 [mathra] 3 Feb 01 Abstract This paper provides a general construction method for multiple-input multiple-output multiple access channel codes (MIMO MAC codes) that have so called generalized full rank property The achieved constructions give a positive answer to the question whether it is generally possible to reach the so called pigeon hole bound, that is an upper bound for the decay of determinants of MIMO-MAC channel codes I INTRODUCTION In MIMO MAC the DMT optimality criteria can be given by splitting the whole error probability space to separate error events and then giving a criteria for each event separately In the case where each user is in error, the criteria given in [] closely resembles that of the classical NVD condition used in single user case This criteria would give us a natural goal if we would like to build DMT achieving codes Unfortunately in [5] it was proved that this criteria is too tight in the case where the codes of the single users are lattice space-time codes The pigeon hole bound in [5] proves that, irrespective of the code design, the determinants of the overall code matrices will decay with a polynomial speed In [3] it was proved that the two user single antenna code (BB-code) given in [9] do achieve the pigeon hole bound In this paper we are giving a wast generalization of BB-code to general MAC-MIMO The codes we will build fulfill the so called generalized rank criteria and do reach the pigeon hole bound The single user codes we are using are based on the multiblock codes from division algebras [6] This approach has been taken in several recent papers on MIMO-MAC However, in these papers the full rank criteria has been achieved by using either transcendental elements [9] or algebraic elements with high degree [4] Both of these methods make it extremely difficult to measure the decay of the codes and likely lead to bad decay Instead of the usual algebraic independence strategy we will use valuation theory to achieve the full rank condition This technical tool allows us to use algebraic elements with low degree By applying Galois theoretic method of Lu et al [5] and methods from Diophantine approximation, originally introduced by Lahtonen et al in [3], we will prove that our codes achieve good decay and in particular reach the pigeon hole bound As a warm up we discuss, when it is possible to achieve the generalized full rank condition for two users, each having a single transmit antenna In particular these results clarify the construction of BB-code in [9] Then in Section IV we will give our general construction and state that such an construction always exists and that each code does fulfill the generalized rank criteria In Section V we analyze the decay of the constructed codes In particular Theorem 54 gives a general lower bound and Corollary 55 shows that our codes achieves the pigeon hole bound In the last section we give few explicit examples of our codes II DECAY FUNCTION, MULTIUSER CODE, AND OTHER DEFINITIONS In this paper we are considering MIMO MAC code design in the Rayleigh flat fading channel We suppose that we have U users, each having n t antennas and that the receiver has n r antennas and complete channels state information We also suppose that the fading for each user stays stable for Un t time units Let us refer to the channel matrix of the ith user with H i M nr n t and let us suppose that each of these have iid complex Gaussian random variables with zero mean and unit variance as coefficients In this scenario the base station receives U Y = H i X i +N, i=1 where, X i M nt Un t (C), is the transmitted codeword from the ith user, and N M nr n tu(c) presents the noise having iid complex Gaussian random variables as coefficients In this scenario multiuser MIMO signal is a Un t Un t matrix where the rows (j 1)n t +1,(j 1)n t +,,(j 1)n t +n t represent jth user s signal (j = 1,,U) We suppose that each user applies a lattice space-time code L j M nt Un t,j = 1,,U We also assume that each user s lattice is of full rank r = Un t, and denote the basis of the lattice L j by B j,1,,b j,r Now the code associated with the jth user is a restriction of lattice L j { r } L j (N j ) = b i B j,i b i Z, N j b i N j, i=1 where N j is a given positive number Using these definitions the U-user MIMO MAC code is (L 1 (N 1 ), L (N ),,L U (N U )) For a matrix M(X 1,,X U ) = (X T 1,X T,,X T U )T where X j L j (N j ) that jth user has sent, we define D(N 1,,N U ) = min detm(x 1,,X U ) X j L j(n j)\{0}

2 This is called the decay function In the special case N 1 = = N U = N we write D(N) = D(N 1 = N,,N U = N) If we have a U-user code with decay function D(N 1,,N n ), such that D(N 1,,N n ) 0 for all N 1,,N U Z +, we say that the code satisfies (generalized) rank criterion III -USER CODE In [9] Badr and Belfiore introduced a -user single antenna MAC code where the matrix coefficients were from the field Q(i, 5) In the following we give a complete characterization of when their construction method leads to codes with generalized full rank property Theorem 31: Let /Q and L/ be two field extensions of degree and a,b,c,d L Let also σ be the non-trivial element in the Galois group Gal(L/) Define C = {( ax bσ(x) ) } x,y OL There exists a matrix in C with zero determinant if and only if N(a) N(b) N(c) N(d) = 0, (1) where the function N = N L/ denotes the norm of extension L/ Proof: Assume first that we have a matrix ( ) ax bσ(x) with zero determinant This means that adxσ(y) = bcσ(x)y, which gives N(a)N(d)N(x)N(σ(y)) = N(b)N(c)N(σ(x))N(y) Continuing we get N(a)N(d) = N(b)N(c) ie N(a)N(d) N(b)N(c) = 0 Assume then that N(a)N(d) N(b)N(c) = 0 If b or c is zero then N(a)N(d) = 0 ie a or d is zero and then for all x,y O L we have ax bσ(x) = 0 Otherwise N( ad bc ) = 1 Then by Hilbert 90 we have some z L such that ad bc = σ(z) z Then write z = w n with w O L and n Z This gives ad This means that the determinant of ( aw bσ(w) c1 dσ(1) is zero bc = σ(w) w ie adw bcσ(w) = 0 ) IV MULTI ACCESS CODE WITH SEVERAL TRANSMISSION ANTENNAS A Construction of U-user code for n t transmission antennas From now on we concentrate on the scenario where we have U Z + users and each user has n t Z + transmission antennas Throughout this section we assume to be an imaginary quadratic extension of Q with class number 1, L is a cyclic Galois extension of of degree Un t, such that L = (α) with α R, σ a generating element in Gal(L/) and p O an inert prime in L/ We also define τ = σ U and F to be the fixed field of τ So we have [L : F] = n t, [F : ] = U, Gal(L/F) =< τ >, and Gal(F/) =< σ F > where σ F is a restriction of σ in F Let v = v p be the p- adic valuation of the field L In this section, when we say that L/, p, and σ are suitable we mean that they are as above Due to the space limitations, we skip the proof of the following proposition Proposition 41: For every complex quadratic field, having class number 1, and for any U and for any n t we have a suitable degree n t U extension L/, prime p O and automorphism σ Gal(L/) Now we are ready for our construction Let x j O L for all j = 1,,n t Define M = M(x 1,x,,x nt ) to be x 1 pτ(x nt ) pτ (x nt 1) pτ nt 1 (x ) x τ(x 1 ) pτ (x nt ) pτ nt 1 (x 3 ) x 3 τ(x ) τ (x 1 ) pτ n 1 (x 4 ) x nt 1 τ(x nt ) τ (x nt 3) pτ nt 1 (x nt ) x nt τ(x nt 1) τ (x nt ) τ nt 1 (x 1 ) ie a matrix representation of an element in the cyclic algebra (L/F,τ,p) The following lemma proofs that (L/F,τ,p) is a division algebra Lemma 4: Let x j O L for all j = 1,,n t such that x l 0 for some l and min(v(x 1 ),,v(x nt )) = 0 Then we have det(m(x 1,x,,x nt )) 0 and v(det(m(x 1,x,,x nt ))) n t 1 Proof: Write M = M(x 1,x,,x nt ) and N = N L/F Assume first that v(x 1 ) = 0 Then the determinant is N(x 1 ) + py for some y O L and hence we have v(det(m)) = min(v(n(x 1 )),v(py)) = 0 Assume then that v(x 1 ),v(x ),,v(x l 1 ) > 0 andv(x l ) = 0 with1 < l n t Notice that in this case all the other elements a of matrix M than those in the left lower corner block of side length n t l + 1 have v(a) > 0 Either they have coefficient p or they are automorphic images of elements x 1,x,,x l 1 Now det(m) = ±p l 1 N(x l ) + p l z for some z O L since all the other terms except ±p l 1 N(x l ) have at most n t l factors from this left lower corner and hence at least n t (n t l) = l terms have factor p This gives that v(det(m)) = min(v(p l 1 N(x l )),v(p l z)) = l 1 n t 1

3 Definition 41: Define M j = M(x j,1,x j,,,x j,nt ) for all j = 1,,U In our multi access system the code C j of jth user consists of n t Un t matrices B j = ( Mj,σ(M j ),σ (M j ),,p k σ j 1 (M j ),,σ (M j ) ) where k is any rational integer strictly greater than U(nt 1) and x j,l 0 for some l Here k is same for all users The the whole code C U,nt consists of matrices A = B 1 B B U, where B j C j for all i = 1,,U This means that the matrices A C U,nt have form p k M 1 σ(m 1 ) σ (M 1 ) M p k σ(m ) σ (M ) M U σ(m U ) p k σ (M U ) We will skip the proof of the following proposition, stating that each of the single user codes satisfies the NVD condition and are therefore DMT optimal Proposition 43: Let C U,nt C U,nt and C j be the jth users code in the system C U,nt for some j 1,,U Then the code C j is a Un t -dimensional lattice code with the NVD property The code depends on how we did choose L/, p, σ, and k, so to be precise, we can also refer to C U,nt with C U,nt (L/,p,σ,k) Let us call the family of all such codes C U,nt (L/,p,σ,k) (ie codes constructed with any suitable L/, p, σ, and k) by C U,nt That is C U,nt = {C U,nt (L/,p,σ,k)} L/,p,σ,k where L/, p, σ, and k are any suitable ones According to Proposition 41 we can always find suitable L/, p, σ, and k for any U Z + and n t Z + We therefore have the following theorem Theorem 44: For any choice of U Z + and n t Z + we have C U,n Note that the code C U,1 = C U,1 (L/,p,σ,1) C U,1, a code for U users each having one transmission antenna, consists of matrices of form p 1 x 1 σ(x 1 ) σ (x 1 ) σ (x 1 ) x p 1 σ(x ) σ (x ) σ (x ) x 3 σ(x 3 ) p 1 σ (x 3 ) σ (x 3 ) x U σ(x U ) σ (x U ) p 1 σ (x U ) Note also that the code C 1,nt = C 1,nt (L/,p,σ,k) C 1,nt is a usual single user code multiplied by p k Theorem 45: Let C U,nt C U,nt The code C U,nt is a full rate code and satisfies the generalized rank criterion Proof: Let A C U,nt = C U,nt (L/,p,σ,k) We may assume that min(v(x j,1 ),,v(x j,nt )) = 0, for all j = 1,,U, because otherwise we can divide extra p s off That does not have any impact on whether det(a) = 0 or not The determinant of A is U p kunt det(σ l 1 (M l ))+y where v(y) k(un t ) We know that v(σ l 1 (det(m l ))) = v(det(m l )) because p is from, ie from the fixed field of σ, and det(m l ) 0 for all l Therefore U U v(p kunt det(σ l 1 (M l ))) = kun+ v(det(m l )) that is less or equal than kun t +U(n t 1) = U(n t 1 kn t ) by 4 But if we would have det(a) = 0 then U v(y) = v(p kunt det(σ l 1 (M l ))) and hence v(y) U(n t 1 kn t ) implying k(un t ) U(n t 1 kn t ) This gives k U(n t 1) ie k U(nt 1) a contradiction Remark 41: Using multiblock codes from division algebras as single user codes in the MIMO MAC scenario has been used before for example in [9], [4] and [5] In [9] the full rank condition for codes with n t > 1 is achieved by using transcendental elements In [4] the same effect is achieved with algebraic elements of high degree V ON THE DECAY FUNCTION OF CODES IN C U,nt In this chapter we will prove an asymptotic lower bound for the decay function of codes from C U,nt In [3] the authors give a general asymptotic upper bound for a decay function in the case that only one user is properly using the code ie N 1 can be anything but N = = N U = 1 are restricted We will see that in this special case our codes have asymptotically the best possible decay Lemma 51: Let C U,nt = C U,nt (L/,p,σ,k) C U,nt, A C U,nt, and let F be the fixed field of τ = σ U Then det(a) F Proof: As F is the fixed field of τ it is enough to prove that τ(det(a)) = det(a) Write again M j = M(x j,1,x j,,,x j,nt ) and notice thatτ(m j ), after switching first and last column and first and last row, is x j,1 τ(x j,nt ) τ (x j,nt 1) τ nt 1 (x j, ) px j, τ(x j,1 ) pτ (x j,nt ) pτ nt 1 (x j,3 ) px j,3 τ(x j, ) τ (x j,1 ) pτ nt 1 (x j,4 ) px j,nt τ(x j,nt 1) τ (x j,nt ) τ nt 1 (x j,1 )

4 Here we did an even number of row and column changes so The ring O L has a Z-basis {γ 1,,γ Unt } Each of these when calling the above matrix M j we see that τ(det(a)) is basis elements can be presented as p k M 1 σ(m 1) σ (M 1) σ n 1 (M 1) γ M p k σ(m ) σ (M ) σn 1 (M ) l = s l,a a, M 3 σ(m 3 ) p k σ (M 3 ) σn 1 (M 3 ) where s l,a Q for all l = 1,,Un t and a S 1 S Let A C U,n be M U σ(m U ) σ (M U ) p k σ n 1 (M U ) p k M 1 σ(m 1 ) σ (M 1 ) M p k σ(m ) σ (M ) M U σ(m U ) p k σ (M U ) Let us call the above matrix A We notice that matrices A and A are exactly similar apart from the fact that in M j elements in places (1,),(1,3),,(1,n t ) have coefficient p k and elements in places (,1),(3,1),,(n t,1) have not coefficient p k and in M j these are vice versa But this does not change the value of the determinant because in the expansion of the determinant each summand include a product of same number of elements from columns that are congruent to 1 modulo n t and from rows that are congruent to 1 modulo n t Theorem 5: [7] For any full-rateu-user lattice code, each user transmitting with n t antennas there exists a constant k > 0 such that D(N 1 = N,N = N 3 = = N U = 1) k N ()nt For the next theorem we need few definitions Let p(x) = p 0 + p 1 x + + p m x m Z[x] be a polynomial Then we say that H(p(x)) = max{ p j } is the height of the polynomial p(x) and for an algebraic number α we define H(α) = H(φ α ) where φ α is the minimal polynomial of α The next generalization of Liouville s theorem can be found from [8, p 31] Theorem 53: Let α R be an algebraic number of degree κ, H(α) h, H(P) H and deg(p(x)) = m Z + Then either P(α) = 0 or P(α) cm H κ 1 with c = 1 3 κ 1 h κ Now we are ready to give a lower bound for the decay function of our codes The proof can be seen as an extension to the analysis given for BB-code in [3] Theorem 54: For a code C U,nt C U,nt there exists constant > 0 such that Especially D(N 1,N,,N U ) D(N) (N 1 N N U ) ()nt N U()nt Proof: Let C U,nt = C U,nt (L/,p,σ,k) Field extension L/Q has a basis S 1 S where S 1 = {1,δ,δ,,δ,β,βδ,βδ,,βδ } is a basis of F/Q with δ R, = Q(β) and β = w for some positive integer w Notice that if L = F then S = and M j = M(x j,1,x j,,,x j,nt ) be x j,1 pτ(x j,nt ) pτ (x j,nt 1) pτ nt 1 (x j, ) x j, τ(x j,1 ) pτ (x j,nt ) pτ nt 1 (x j,3 ) x j,3 τ(x j, ) τ (x j,1 ) pτ nt 1 (x j,4 ) x j,nt τ(x j,nt 1) τ (x j,nt ) τ nt 1 (x j,1 ) as usual Now for any j = 0,,Un t 1 we have σ j (x m,h ) = Un t u m,h,l σ j (γ l ) where u m,h,l Z and u m,h,l N m for all m, h and l Then the determinant det(a) is a sum consisting of Un t! elements of form Un t Un t Un t p f σ j (x mj,h j ) = p f ( u mj,h j,lσ j (γ l )) where f kun t and m j gets exactly n t times all the values 1,,U and h j gets values from {1,,n t } Now substituting γ l = s l,a a gives that the determinant is a sum consisting of elements of form p f Un t We also write Un t ( u mj,h j,l σ j (a) = s l,a σ j (a)) t j,a a where t j,a Q for all j,a and find that p f Un t ( Un t u m j,h j,l s l,a σ j (a)) can be written as a sum of elements of form 1 p f u a a where 1 Q is some constant, u a Z, and u a = O((N 1 N U ) nt ) Writing also p using basis S 1 S we see that the whole determinant det(a) can be written as a sum of elements of form u a a

5 multiplied by some constant and here we have u a Z, and u a = O((N 1N U ) nt ) On the other hand we know that det(a) F so by uniqueness of basis representation we know that det(a) is a sum consisting of elements of form and hence a S 1 u a a = m=0 u δ mδm +β m=0 u δ m β δm det(a) = H l δ l +β J l δ l, where H l,j l Z and H l, J l are of size O((N 1 N U ) nt ) for all l = 0,,U 1 Using the fact that δ is real we get det(a) ( H l δ l + J l δ l ) Now using 53 and noticing that deg(δ) = U we have det(a) where is some positive constant (N 1 N U ) ()nt, Corollary 55: For a code C U,nt C U,nt there exists constants k > 0 and > 0 such that k D(N 1 = N,N = = N U = 1) N ()nt N ()nt VI EXAMPLES Let us now give few examples of our general code constructions In table Table 1 we have collected some examples of suitable fields and L and inert primes p, fulfilling the conditions of Proposition 41 If = Q(i) then p i O refers to the inert prime and if = Q( 3) then p 3 O is inert The inert primes and fields L are found by looking at totally real subfields of Q(ζ m )/Q and then composing them with the field TABLE I [L : ] L p i p 3 3 (ζ 7 +ζ 1 7 ) +i 3 4 (ζ 17 +ζ17 4 +ζ ζ 1 17 ) +i 3 5 (ζ 11 +ζ 1 11 ) 1+i (ζ 13 +ζ 1 13 ) 1+i (ζ 9 +ζ9 1 +ζ 1 9 +ζ 1 9 ) 1+i 3 A Actual examples We get a code C 3,1 = C 3,1 (Q(i,ζ 7 +ζ7 1 ),+i,σ,1) ie 3-user code with each user having 1 antenna by setting L = (ζ 7 +ζ7 1 ), = Q(i), p = +i, and Gal(L/) =< σ > Now the actual code consists of matrices p 1 x σ(x) σ (x) y p 1 σ(y) σ (y) z σ(z) p 1 σ (z) where x,y,z OL We get a code C, = C, (Q( 3,ζ 17 + ζ ζ 4 ζ ), 3,σ,) ie -user code with each user having antennas by setting L = (ζ 17 + ζ ζ ζ 1 17 ), = Q( 3), p = 3, k = > U(nt 1), and Gal(L/) =< σ > Now the actual code consists of matrices p x 1 p 1 σ (x ) σ(x 1 ) pσ 3 (x ) p x p σ (x 1 ) σ(x ) σ 3 (x 1 ) y 1 pσ (y ) p σ(y 1 ) p 1 σ 3 (y ) y σ (y 1 ) p σ(y ) p σ 3 (y 1 ) where x 1,x,y 1,y O L and x 1 0 or x 0 and y 1 0 or y 0 VII CONCLUSION We gave a general construction for MIMO MAC codes satisfying the generalized rank criteria and gave a lower bound for their decay As a corollary we got that all our codes do achieve the pigeon hole bound ACNOWLEDGEMENT The research of T Ernvall is supported in part by the Academy of Finland grant The research of R Vehkalahti is supported by the Academy of Finland grants and 5457 The authors would like to thank Jyrki Lahtonen for suggesting this problem REFERENCES [1] D Tse, P Viswanath, and L Zheng, Diversity and multiplexing tradeoff in multiple-access channels, IEEE Trans Inf Theory, vol 50, no 9, pp , 004 [] P Coronel, M Gärtner, and H Bölcskei, Selective-fading multiple-access MIMO channels, Diversity-multiplexing tradeoff and dominant outage event regions, preprint available at [3] J Lahtonen, R Vehkalahti, H-F Lu, C Hollanti, and E Viterbo, On the Decay of the Determinants of Multiuser MIMO Lattice Codes, Proc 010 IEEE Inf Theory Workshop, Cairo, Egypt, Jan 010 [4] H-F Lu, R Vehkalahti, C Hollanti, J Lahtonen, Y Hong, and E Viterbo, New Space-Time Code Constructions for Two-User Multiple Access Channels, IEEE J Selected Topics in Signal Processing: Managing Complexity in Multiuser MIMO System, vol 3, no 6, pp , Dec 009 [5] H F Lu, C Hollanti, R Vehkalahti, J Lahtonen, DMT Optimal Code Constructions for Multiple-Access MIMO Channel, IEEE Trans Inform Theory, vol 57, no 6, pp , Jun 011 [6] H F Lu, Constructions of multi-block space-time coding schemes that achieve the diversity-multiplexing tradeoff, IEEE Trans Inform Theory, vol 54, no 8, pp , Aug 008 [7] H-F Lu, J Lahtonen, R Vehkalahti, and C Hollanti, Remarks on the criteria of constructing MAC-DMT optimal codes, Proc 010 IEEE Inf Theory Workshop, Cairo, Egypt, Jan 010 [8] Andrei B Shidlovskii, Transcendental numbers, Studies in mathematics, vol 1, Walter de Gruyter, Berlin, New York, 1989 [9] M Badr and JC Belfiore, Distributed space-time block codes for the non-cooperative multiple-access channel, Proc 008 International Zurich Seminar on Communication, Zurich, Germany, Mar 008, pp

Probability Bounds for Two-Dimensional Algebraic Lattice Codes

Probability Bounds for Two-Dimensional Algebraic Lattice Codes Probability Bounds for Two-Dimensional Algebraic Lattice Codes David Karpuk Aalto University April 16, 2013 (Joint work with C. Hollanti and E. Viterbo) David Karpuk (Aalto University) Probability Bounds

More information

FULL rate and full diversity codes for the coherent

FULL rate and full diversity codes for the coherent 1432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 4, APRIL 2005 The Golden Code: A 2 2 Full-Rate Space Time Code With Nonvanishing Determinants Jean-Claude Belfiore, Member, IEEE, Ghaya Rekaya,

More information

Probability Bounds for Two-Dimensional Algebraic Lattice Codes

Probability Bounds for Two-Dimensional Algebraic Lattice Codes Noname manuscript No. (will be inserted by the editor) Probability Bounds for Two-Dimensional Algebraic Lattice Codes David A. Karpuk, Member, IEEE Camilla Hollanti, Member, IEEE Emanuele Viterbo, Fellow,

More information

Algebraic Methods for Wireless Coding

Algebraic Methods for Wireless Coding Algebraic Methods for Wireless Coding Frédérique Oggier frederique@systems.caltech.edu California Institute of Technology UC Davis, Mathematics Department, January 31st 2007 Outline The Rayleigh fading

More information

Space-Time Codes that are Approximately Universal for the Parallel, Multi-Block and Cooperative DDF Channels

Space-Time Codes that are Approximately Universal for the Parallel, Multi-Block and Cooperative DDF Channels Space-Time Codes that are Approximately Universal for the Parallel, Multi-lock and Cooperative DDF Channels Petros Elia Mobile Communications Department, EURECOM F-06904 Sophia Antipolis cedex, France

More information

Algebraic Multiuser Space Time Block Codes for 2 2 MIMO

Algebraic Multiuser Space Time Block Codes for 2 2 MIMO Algebraic Multiuser Space Time Bloc Codes for 2 2 MIMO Yi Hong Institute of Advanced Telecom. University of Wales, Swansea, UK y.hong@swansea.ac.u Emanuele Viterbo DEIS - Università della Calabria via

More information

Algebraic function fields

Algebraic function fields Algebraic function fields 1 Places Definition An algebraic function field F/K of one variable over K is an extension field F K such that F is a finite algebraic extension of K(x) for some element x F which

More information

On the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels

On the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels On the Performance of 1 Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels arxiv:0711.1295v1 [cs.it] 8 Nov 2007 Emanuele Viterbo and Yi Hong Abstract The Golden space-time trellis

More information

Fuchsian codes with arbitrary rates. Iván Blanco Chacón, Aalto University

Fuchsian codes with arbitrary rates. Iván Blanco Chacón, Aalto University 20-09-2013 Summary Basic concepts in wireless channels Arithmetic Fuchsian groups: the rational case Arithmetic Fuchsian groups: the general case Fundamental domains and point reduction Fuchsian codes

More information

ON THE EQUATION X n 1 = BZ n. 1. Introduction

ON THE EQUATION X n 1 = BZ n. 1. Introduction ON THE EQUATION X n 1 = BZ n PREDA MIHĂILESCU Abstract. We consider the Diophantine equation X n 1 = BZ n ; here B Z is understood as a parameter. We give new conditions for existence of solutions to this

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title A family of fast-decodable MIDO codes from crossedproduct algebras over Authors Luzzi, Laura; Oggier,

More information

On the Use of Division Algebras for Wireless Communication

On the Use of Division Algebras for Wireless Communication On the Use of Division Algebras for Wireless Communication frederique@systems.caltech.edu California Institute of Technology AMS meeting, Davidson, March 3rd 2007 Outline A few wireless coding problems

More information

EVER since Alamouti s work [1] a decade ago, division

EVER since Alamouti s work [1] a decade ago, division 1 Quadratic Forms and Space-Time Block Codes from Generalized Quaternion and Biquaternion Algebras Thomas Unger and Nadya Markin arxiv:0807.0199v4 [cs.it] 11 Apr 2011 Abstract In the context of space-time

More information

18.S34 linear algebra problems (2007)

18.S34 linear algebra problems (2007) 18.S34 linear algebra problems (2007) Useful ideas for evaluating determinants 1. Row reduction, expanding by minors, or combinations thereof; sometimes these are useful in combination with an induction

More information

Algebraic number theory

Algebraic number theory Algebraic number theory F.Beukers February 2011 1 Algebraic Number Theory, a crash course 1.1 Number fields Let K be a field which contains Q. Then K is a Q-vector space. We call K a number field if dim

More information

Inverse Determinant Sums and Connections. Between Fading Channel Information Theory and Algebra

Inverse Determinant Sums and Connections. Between Fading Channel Information Theory and Algebra Inverse Determinant Sums and Connections Between Fading Channel Information Theory and Algebra Roope Vehkalahti, Hsiao-feng (Francis) Lu, Member, IEEE, Laura Luzzi, Member, IEEE arxiv:.6289v4 [cs.it] 0

More information

USING multiple antennas has been shown to increase the

USING multiple antennas has been shown to increase the IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 1, JANUARY 2007 11 A Comparison of Time-Sharing, DPC, and Beamforming for MIMO Broadcast Channels With Many Users Masoud Sharif, Member, IEEE, and Babak

More information

THE JOHNS HOPKINS UNIVERSITY Faculty of Arts and Sciences FINAL EXAM - SPRING SESSION ADVANCED ALGEBRA II.

THE JOHNS HOPKINS UNIVERSITY Faculty of Arts and Sciences FINAL EXAM - SPRING SESSION ADVANCED ALGEBRA II. THE JOHNS HOPKINS UNIVERSITY Faculty of Arts and Sciences FINAL EXAM - SPRING SESSION 2006 110.402 - ADVANCED ALGEBRA II. Examiner: Professor C. Consani Duration: 3 HOURS (9am-12:00pm), May 15, 2006. No

More information

Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes

Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes Huan Yao Lincoln Laboratory Massachusetts Institute of Technology Lexington, MA 02420 yaohuan@ll.mit.edu Gregory

More information

Algebra Qualifying Exam Solutions. Thomas Goller

Algebra Qualifying Exam Solutions. Thomas Goller Algebra Qualifying Exam Solutions Thomas Goller September 4, 2 Contents Spring 2 2 2 Fall 2 8 3 Spring 2 3 4 Fall 29 7 5 Spring 29 2 6 Fall 28 25 Chapter Spring 2. The claim as stated is false. The identity

More information

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract

More information

Precoded Integer-Forcing Universally Achieves the MIMO Capacity to Within a Constant Gap

Precoded Integer-Forcing Universally Achieves the MIMO Capacity to Within a Constant Gap Precoded Integer-Forcing Universally Achieves the MIMO Capacity to Within a Constant Gap Or Ordentlich Dept EE-Systems, TAU Tel Aviv, Israel Email: ordent@engtauacil Uri Erez Dept EE-Systems, TAU Tel Aviv,

More information

Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007

Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007 Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT ECE 559 Presentation Hoa Pham Dec 3, 2007 Introduction MIMO systems provide two types of gains Diversity Gain: each path from a transmitter

More information

Defining Valuation Rings

Defining Valuation Rings East Carolina University, Greenville, North Carolina, USA June 8, 2018 Outline 1 What? Valuations and Valuation Rings Definability Questions in Number Theory 2 Why? Some Questions and Answers Becoming

More information

Improved Perfect Space-Time Block Codes

Improved Perfect Space-Time Block Codes Improved Perfect Space-Time Block Codes K. Pavan Srinath and B. Sundar Rajan, Senior Member, IEEE Dept of ECE, The Indian Institute of Science, Bangalore-500, India Email:pavan,bsrajan}@ece.iisc.ernet.in

More information

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH : Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Wednesday, June 1, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

Small Data, Mid data, Big Data vs. Algebra, Analysis, and Topology

Small Data, Mid data, Big Data vs. Algebra, Analysis, and Topology Small Data, Mid data, Big Data vs. Algebra, Analysis, and Topology Xiang-Gen Xia I have been thinking about big data in the last a few years since it has become a hot topic. On most of the time I have

More information

Perfect Space Time Block Codes

Perfect Space Time Block Codes Perfect Space Time Block Codes Frédérique Oggier, Ghaya Rekaya, Student Member IEEE, Jean-Claude Belfiore, Member IEEE and Emanuele Viterbo, Member IEEE Abstract arxiv:cs/0604093v1 [cs.it] 24 Apr 2006

More information

GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2)

GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2) GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2) KEITH CONRAD We will describe a procedure for figuring out the Galois groups of separable irreducible polynomials in degrees 3 and 4 over

More information

Chapter 8. P-adic numbers. 8.1 Absolute values

Chapter 8. P-adic numbers. 8.1 Absolute values Chapter 8 P-adic numbers Literature: N. Koblitz, p-adic Numbers, p-adic Analysis, and Zeta-Functions, 2nd edition, Graduate Texts in Mathematics 58, Springer Verlag 1984, corrected 2nd printing 1996, Chap.

More information

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH : Antenna Diversity and Theoretical Foundations of Wireless Communications Wednesday, May 4, 206 9:00-2:00, Conference Room SIP Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

Contradiction. Theorem 1.9. (Artin) Let G be a finite group of automorphisms of E and F = E G the fixed field of G. Then [E : F ] G.

Contradiction. Theorem 1.9. (Artin) Let G be a finite group of automorphisms of E and F = E G the fixed field of G. Then [E : F ] G. 1. Galois Theory 1.1. A homomorphism of fields F F is simply a homomorphism of rings. Such a homomorphism is always injective, because its kernel is a proper ideal (it doesnt contain 1), which must therefore

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

p-adic fields Chapter 7

p-adic fields Chapter 7 Chapter 7 p-adic fields In this chapter, we study completions of number fields, and their ramification (in particular in the Galois case). We then look at extensions of the p-adic numbers Q p and classify

More information

PROBLEMS ON LINEAR ALGEBRA

PROBLEMS ON LINEAR ALGEBRA 1 Basic Linear Algebra PROBLEMS ON LINEAR ALGEBRA 1. Let M n be the (2n + 1) (2n + 1) for which 0, i = j (M n ) ij = 1, i j 1,..., n (mod 2n + 1) 1, i j n + 1,..., 2n (mod 2n + 1). Find the rank of M n.

More information

FIELD THEORY. Contents

FIELD THEORY. Contents FIELD THEORY MATH 552 Contents 1. Algebraic Extensions 1 1.1. Finite and Algebraic Extensions 1 1.2. Algebraic Closure 5 1.3. Splitting Fields 7 1.4. Separable Extensions 8 1.5. Inseparable Extensions

More information

Some algebraic number theory and the reciprocity map

Some algebraic number theory and the reciprocity map Some algebraic number theory and the reciprocity map Ervin Thiagalingam September 28, 2015 Motivation In Weinstein s paper, the main problem is to find a rule (reciprocity law) for when an irreducible

More information

Material covered: Class numbers of quadratic fields, Valuations, Completions of fields.

Material covered: Class numbers of quadratic fields, Valuations, Completions of fields. ALGEBRAIC NUMBER THEORY LECTURE 6 NOTES Material covered: Class numbers of quadratic fields, Valuations, Completions of fields. 1. Ideal class groups of quadratic fields These are the ideal class groups

More information

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 : Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Friday, May 25, 2018 09:00-11:30, Kansliet 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless

More information

Definability in fields Lecture 2: Defining valuations

Definability in fields Lecture 2: Defining valuations Definability in fields Lecture 2: Defining valuations 6 February 2007 Model Theory and Computable Model Theory Gainesville, Florida Defining Z in Q Theorem (J. Robinson) Th(Q) is undecidable. Defining

More information

Part 1. For any A-module, let M[x] denote the set of all polynomials in x with coefficients in M, that is to say expressions of the form

Part 1. For any A-module, let M[x] denote the set of all polynomials in x with coefficients in M, that is to say expressions of the form Commutative Algebra Homework 3 David Nichols Part 1 Exercise 2.6 For any A-module, let M[x] denote the set of all polynomials in x with coefficients in M, that is to say expressions of the form m 0 + m

More information

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints Upper Bounds on IO Channel Capacity with Channel Frobenius Norm Constraints Zukang Shen, Jeffrey G. Andrews, Brian L. Evans Wireless Networking Communications Group Department of Electrical Computer Engineering

More information

THE P-ADIC NUMBERS AND FINITE FIELD EXTENSIONS OF Q p

THE P-ADIC NUMBERS AND FINITE FIELD EXTENSIONS OF Q p THE P-ADIC NUMBERS AND FINITE FIELD EXTENSIONS OF Q p EVAN TURNER Abstract. This paper will focus on the p-adic numbers and their properties. First, we will examine the p-adic norm and look at some of

More information

Information Theory for Wireless Communications, Part II:

Information Theory for Wireless Communications, Part II: Information Theory for Wireless Communications, Part II: Lecture 5: Multiuser Gaussian MIMO Multiple-Access Channel Instructor: Dr Saif K Mohammed Scribe: Johannes Lindblom In this lecture, we give the

More information

ABSOLUTE VALUES AND VALUATIONS

ABSOLUTE VALUES AND VALUATIONS ABSOLUTE VALUES AND VALUATIONS YIFAN WU, wuyifan@umich.edu Abstract. We introduce the basis notions, properties and results of absolute values, valuations, discrete valuation rings and higher unit groups.

More information

Math 201C Homework. Edward Burkard. g 1 (u) v + f 2(u) g 2 (u) v2 + + f n(u) a 2,k u k v a 1,k u k v + k=0. k=0 d

Math 201C Homework. Edward Burkard. g 1 (u) v + f 2(u) g 2 (u) v2 + + f n(u) a 2,k u k v a 1,k u k v + k=0. k=0 d Math 201C Homework Edward Burkard 5.1. Field Extensions. 5. Fields and Galois Theory Exercise 5.1.7. If v is algebraic over K(u) for some u F and v is transcendental over K, then u is algebraic over K(v).

More information

Phase Precoded Compute-and-Forward with Partial Feedback

Phase Precoded Compute-and-Forward with Partial Feedback Phase Precoded Compute-and-Forward with Partial Feedback Amin Sakzad, Emanuele Viterbo Dept. Elec. & Comp. Sys. Monash University, Australia amin.sakzad,emanuele.viterbo@monash.edu Joseph Boutros, Dept.

More information

Page Points Possible Points. Total 200

Page Points Possible Points. Total 200 Instructions: 1. The point value of each exercise occurs adjacent to the problem. 2. No books or notes or calculators are allowed. Page Points Possible Points 2 20 3 20 4 18 5 18 6 24 7 18 8 24 9 20 10

More information

Pilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems

Pilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems 1 Pilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems Tadilo Endeshaw Bogale and Long Bao Le Institute National de la Recherche Scientifique (INRS) Université de Québec, Montréal,

More information

IN this paper, we show that the scalar Gaussian multiple-access

IN this paper, we show that the scalar Gaussian multiple-access 768 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 5, MAY 2004 On the Duality of Gaussian Multiple-Access and Broadcast Channels Nihar Jindal, Student Member, IEEE, Sriram Vishwanath, and Andrea

More information

Number Theory Fall 2016 Problem Set #6

Number Theory Fall 2016 Problem Set #6 18.785 Number Theory Fall 2016 Problem Set #6 Description These problems are related to the material covered in Lectures 10-12. Your solutions are to be written up in latex (you can use the latex source

More information

MAT 535 Problem Set 5 Solutions

MAT 535 Problem Set 5 Solutions Final Exam, Tues 5/11, :15pm-4:45pm Spring 010 MAT 535 Problem Set 5 Solutions Selected Problems (1) Exercise 9, p 617 Determine the Galois group of the splitting field E over F = Q of the polynomial f(x)

More information

Introduction to Number Theory

Introduction to Number Theory INTRODUCTION Definition: Natural Numbers, Integers Natural numbers: N={0,1,, }. Integers: Z={0,±1,±, }. Definition: Divisor If a Z can be writeen as a=bc where b, c Z, then we say a is divisible by b or,

More information

Igusa Class Polynomials

Igusa Class Polynomials Genus 2 day, Intercity Number Theory Seminar Utrecht, April 18th 2008 Overview Igusa class polynomials are the genus 2 analogue of the classical Hilbert class polynomial. For each notion, I will 1. tell

More information

Lecture Notes. Advanced Discrete Structures COT S

Lecture Notes. Advanced Discrete Structures COT S Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-13 Recap Divisibility Prime Number Theorem Euclid s Lemma Fundamental Theorem of Arithmetic Euclidean Algorithm Basic Notions - Section

More information

DETERMINANTS. , x 2 = a 11b 2 a 21 b 1

DETERMINANTS. , x 2 = a 11b 2 a 21 b 1 DETERMINANTS 1 Solving linear equations The simplest type of equations are linear The equation (1) ax = b is a linear equation, in the sense that the function f(x) = ax is linear 1 and it is equated to

More information

Selected exercises from Abstract Algebra by Dummit and Foote (3rd edition).

Selected exercises from Abstract Algebra by Dummit and Foote (3rd edition). Selected exercises from Abstract Algebra by Dummit and Foote (3rd edition). Bryan Félix Abril 12, 2017 Section 14.2 Exercise 3. Determine the Galois group of (x 2 2)(x 2 3)(x 2 5). Determine all the subfields

More information

On the Fluctuation of Mutual Information in Double Scattering MIMO Channels

On the Fluctuation of Mutual Information in Double Scattering MIMO Channels Research Collection Conference Paper On the Fluctuation of Mutual Information in Double Scattering MIMO Channels Author(s): Zheng, Zhong; Wei, Lu; Speicher, Roland; Müller, Ralf; Hämäläinen, Jyri; Corander,

More information

On the Robustness of Algebraic STBCs to Coefficient Quantization

On the Robustness of Algebraic STBCs to Coefficient Quantization 212 Australian Communications Theory Workshop (AusCTW) On the Robustness of Algebraic STBCs to Coefficient Quantization J. Harshan Dept. of Electrical and Computer Systems Engg., Monash University Clayton,

More information

Section VI.33. Finite Fields

Section VI.33. Finite Fields VI.33 Finite Fields 1 Section VI.33. Finite Fields Note. In this section, finite fields are completely classified. For every prime p and n N, there is exactly one (up to isomorphism) field of order p n,

More information

A Course in Computational Algebraic Number Theory

A Course in Computational Algebraic Number Theory Henri Cohen 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. A Course in Computational Algebraic Number Theory Springer

More information

Perfect Space-Time Codes for Any Number of Antennas

Perfect Space-Time Codes for Any Number of Antennas TO APPEAR IN THE IEEE TRANSACTIONS ON INFORMATION THEORY 1 Perfect Space-Time Codes for Any Number of Antennas Petros Elia, B A Sethuraman and P Vijay Kumar Abstract In a recent paper, perfect (n n) space-time

More information

MATH 131B: ALGEBRA II PART B: COMMUTATIVE ALGEBRA

MATH 131B: ALGEBRA II PART B: COMMUTATIVE ALGEBRA MATH 131B: ALGEBRA II PART B: COMMUTATIVE ALGEBRA I want to cover Chapters VIII,IX,X,XII. But it is a lot of material. Here is a list of some of the particular topics that I will try to cover. Maybe I

More information

Accelerated Advanced Algebra. Chapter 1 Patterns and Recursion Homework List and Objectives

Accelerated Advanced Algebra. Chapter 1 Patterns and Recursion Homework List and Objectives Chapter 1 Patterns and Recursion Use recursive formulas for generating arithmetic, geometric, and shifted geometric sequences and be able to identify each type from their equations and graphs Write and

More information

1 The Galois Group of a Quadratic

1 The Galois Group of a Quadratic Algebra Prelim Notes The Galois Group of a Polynomial Jason B. Hill University of Colorado at Boulder Throughout this set of notes, K will be the desired base field (usually Q or a finite field) and F

More information

Diversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels

Diversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels Diversity-Fidelity Tradeo in Transmission o Analog Sources over MIMO Fading Channels Mahmoud Taherzadeh, Kamyar Moshksar and Amir K. Khandani Coding & Signal Transmission Laboratory www.cst.uwaterloo.ca

More information

GRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory.

GRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory. GRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory. Linear Algebra Standard matrix manipulation to compute the kernel, intersection of subspaces, column spaces,

More information

MATH 101A: ALGEBRA I, PART D: GALOIS THEORY 11

MATH 101A: ALGEBRA I, PART D: GALOIS THEORY 11 MATH 101A: ALGEBRA I, PART D: GALOIS THEORY 11 3. Examples I did some examples and explained the theory at the same time. 3.1. roots of unity. Let L = Q(ζ) where ζ = e 2πi/5 is a primitive 5th root of

More information

Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers

Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers Johannes Lindblom, Eleftherios Karipidis and Erik G. Larsson Linköping

More information

Thus, the integral closure A i of A in F i is a finitely generated (and torsion-free) A-module. It is not a priori clear if the A i s are locally

Thus, the integral closure A i of A in F i is a finitely generated (and torsion-free) A-module. It is not a priori clear if the A i s are locally Math 248A. Discriminants and étale algebras Let A be a noetherian domain with fraction field F. Let B be an A-algebra that is finitely generated and torsion-free as an A-module with B also locally free

More information

5.1 Monomials. Algebra 2

5.1 Monomials. Algebra 2 . Monomials Algebra Goal : A..: Add, subtract, multiply, and simplify polynomials and rational expressions (e.g., multiply (x ) ( x + ); simplify 9x x. x Goal : Write numbers in scientific notation. Scientific

More information

NOTES ON DIOPHANTINE APPROXIMATION

NOTES ON DIOPHANTINE APPROXIMATION NOTES ON DIOPHANTINE APPROXIMATION Jan-Hendrik Evertse December 11, 2007 8 Approximation of algebraic numbers Literature: W.M. Schmidt, Diophantine approximation, Lecture Notes in Mathematics 785, Springer

More information

Additional Practice Lessons 2.02 and 2.03

Additional Practice Lessons 2.02 and 2.03 Additional Practice Lessons 2.02 and 2.03 1. There are two numbers n that satisfy the following equations. Find both numbers. a. n(n 1) 306 b. n(n 1) 462 c. (n 1)(n) 182 2. The following function is defined

More information

Linear Programming Decoding of Binary Linear Codes for Symbol-Pair Read Channels

Linear Programming Decoding of Binary Linear Codes for Symbol-Pair Read Channels 1 Linear Programming Decoding of Binary Linear Codes for Symbol-Pair Read Channels Shunsuke Horii, Toshiyasu Matsushima, and Shigeichi Hirasawa arxiv:1508.01640v2 [cs.it] 29 Sep 2015 Abstract In this paper,

More information

Timing errors in distributed space-time communications

Timing errors in distributed space-time communications Timing errors in distributed space-time communications Emanuele Viterbo Dipartimento di Elettronica Politecnico di Torino Torino, Italy viterbo@polito.it Yi Hong Institute for Telecom. Research University

More information

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,

More information

A Construction of a Space Time Code Based on Number Theory

A Construction of a Space Time Code Based on Number Theory IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 3, MARCH 00 753 A Construction of a Space Time Code Based on Number Theory Mohamed Oussama Damen, Associate Member, IEEE, Ahmed Tewfik, Fellow, IEEE,

More information

MA 254 notes: Diophantine Geometry

MA 254 notes: Diophantine Geometry MA 254 notes: Diophantine Geometry (Distilled from [Hindry-Silverman]) Dan Abramovich Brown University January 29, 2016 Abramovich MA 254 notes: Diophantine Geometry 1 / 14 Height on P n (k) Let P = (x

More information

Necessary and Sufficient Conditions for the Central Norm to Equal 2 h in the Simple Continued Fraction Expansion of 2 h c for Any Odd Non-Square c > 1

Necessary and Sufficient Conditions for the Central Norm to Equal 2 h in the Simple Continued Fraction Expansion of 2 h c for Any Odd Non-Square c > 1 Necessary and Sufficient Conditions for the Central Norm to Equal 2 h in the Simple Continued Fraction Expansion of 2 h c for Any Odd Non-Square c > 1 R.A. Mollin Abstract We look at the simple continued

More information

Multiuser Downlink Beamforming: Rank-Constrained SDP

Multiuser Downlink Beamforming: Rank-Constrained SDP Multiuser Downlink Beamforming: Rank-Constrained SDP Daniel P. Palomar Hong Kong University of Science and Technology (HKUST) ELEC5470 - Convex Optimization Fall 2018-19, HKUST, Hong Kong Outline of Lecture

More information

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH MIMO : MIMO Theoretical Foundations of Wireless Communications 1 Wednesday, May 25, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication 1 / 20 Overview MIMO

More information

arxiv: v3 [math.nt] 15 Dec 2016

arxiv: v3 [math.nt] 15 Dec 2016 Lehmer s totient problem over F q [x] arxiv:1312.3107v3 [math.nt] 15 Dec 2016 Qingzhong Ji and Hourong Qin Department of Mathematics, Nanjing University, Nanjing 210093, P.R.China Abstract: In this paper,

More information

1. Group Theory Permutations.

1. Group Theory Permutations. 1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

SOLVING SOLVABLE QUINTICS. D. S. Dummit

SOLVING SOLVABLE QUINTICS. D. S. Dummit D. S. Dummit Abstract. Let f(x) = x 5 + px 3 + qx + rx + s be an irreducible polynomial of degree 5 with rational coefficients. An explicit resolvent sextic is constructed which has a rational root if

More information

Notes on QE for ACVF

Notes on QE for ACVF Notes on QE for ACVF Fall 2016 1 Preliminaries on Valuations We begin with some very basic definitions and examples. An excellent survey of this material with can be found in van den Dries [3]. Engler

More information

Hermitian modular forms congruent to 1 modulo p.

Hermitian modular forms congruent to 1 modulo p. Hermitian modular forms congruent to 1 modulo p. arxiv:0810.5310v1 [math.nt] 29 Oct 2008 Michael Hentschel Lehrstuhl A für Mathematik, RWTH Aachen University, 52056 Aachen, Germany, hentschel@matha.rwth-aachen.de

More information

Multiuser Capacity in Block Fading Channel

Multiuser Capacity in Block Fading Channel Multiuser Capacity in Block Fading Channel April 2003 1 Introduction and Model We use a block-fading model, with coherence interval T where M independent users simultaneously transmit to a single receiver

More information

Adaptive Successive Transmission in Virtual Full-Duplex Cooperative NOMA

Adaptive Successive Transmission in Virtual Full-Duplex Cooperative NOMA Adaptive Successive Transmission in Virtual Full-Duplex Cooperative NOMA Young-bin Kim Future Access Network Division KDDI Research, Inc Fujimino-shi, Japan yo-kim@kddi-researchjp Kosuke Yamazaki Future

More information

ALGEBRA PH.D. QUALIFYING EXAM September 27, 2008

ALGEBRA PH.D. QUALIFYING EXAM September 27, 2008 ALGEBRA PH.D. QUALIFYING EXAM September 27, 2008 A passing paper consists of four problems solved completely plus significant progress on two other problems; moreover, the set of problems solved completely

More information

Abstract Algebra, Second Edition, by John A. Beachy and William D. Blair. Corrections and clarifications

Abstract Algebra, Second Edition, by John A. Beachy and William D. Blair. Corrections and clarifications 1 Abstract Algebra, Second Edition, by John A. Beachy and William D. Blair Corrections and clarifications Note: Some corrections were made after the first printing of the text. page 9, line 8 For of the

More information

Solutions of exercise sheet 11

Solutions of exercise sheet 11 D-MATH Algebra I HS 14 Prof Emmanuel Kowalski Solutions of exercise sheet 11 The content of the marked exercises (*) should be known for the exam 1 For the following values of α C, find the minimal polynomial

More information

A BRIEF INTRODUCTION TO LOCAL FIELDS

A BRIEF INTRODUCTION TO LOCAL FIELDS A BRIEF INTRODUCTION TO LOCAL FIELDS TOM WESTON The purpose of these notes is to give a survey of the basic Galois theory of local fields and number fields. We cover much of the same material as [2, Chapters

More information

Introduction to Arithmetic Geometry Fall 2013 Lecture #5 09/19/2013

Introduction to Arithmetic Geometry Fall 2013 Lecture #5 09/19/2013 18.782 Introduction to Arithmetic Geometry Fall 2013 Lecture #5 09/19/2013 5.1 The field of p-adic numbers Definition 5.1. The field of p-adic numbers Q p is the fraction field of Z p. As a fraction field,

More information

Decomposition of a recursive family of polynomials

Decomposition of a recursive family of polynomials Decomposition of a recursive family of polynomials Andrej Dujella and Ivica Gusić Abstract We describe decomposition of polynomials f n := f n,b,a defined by f 0 := B, f 1 (x := x, f n+1 (x = xf n (x af

More information

φ(xy) = (xy) n = x n y n = φ(x)φ(y)

φ(xy) = (xy) n = x n y n = φ(x)φ(y) Groups 1. (Algebra Comp S03) Let A, B and C be normal subgroups of a group G with A B. If A C = B C and AC = BC then prove that A = B. Let b B. Since b = b1 BC = AC, there are a A and c C such that b =

More information

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer?

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer? Chapter 3: Theory of Modular Arithmetic 25 SECTION C Solving Linear Congruences By the end of this section you will be able to solve congruence equations determine the number of solutions find the multiplicative

More information

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels Mehdi Mohseni Department of Electrical Engineering Stanford University Stanford, CA 94305, USA Email: mmohseni@stanford.edu

More information

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm HongSun An Student Member IEEE he Graduate School of I & Incheon Korea ahs3179@gmail.com Manar Mohaisen Student Member IEEE

More information

Space-Time Block Codes from Cyclic Division Algebras: An Introduction

Space-Time Block Codes from Cyclic Division Algebras: An Introduction Space-Time Block Codes from Cyclic Division Algebras: An Introduction Anders OF Hendrickson December 15, 2004 Coding theory addresses the problem of transmitting information accurately across noisy channels

More information