Improved Capacity Bounds for the Binary Energy Harvesting Channel

Similar documents
Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

The Binary Energy Harvesting Channel. with a Unit-Sized Battery

Energy State Amplification in an Energy Harvesting Communication System

Convex Optimization methods for Computing Channel Capacity

On Code Design for Simultaneous Energy and Information Transfer

On the capacity of the general trapdoor channel with feedback

Anytime communication over the Gilbert-Eliot channel with noiseless feedback

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

ECE 534 Information Theory - Midterm 2

Interactive Hypothesis Testing Against Independence

Universal Finite Memory Coding of Binary Sequences

Coding Along Hermite Polynomials for Gaussian Noise Channels

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

LDPC codes for the Cascaded BSC-BAWGN channel

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Broadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

1 Gambler s Ruin Problem

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Analysis of some entrance probabilities for killed birth-death processes

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

On Dependence Balance Bounds for Two Way Channels

Analysis of M/M/n/K Queue with Multiple Priorities

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Inequalities for the L 1 Deviation of the Empirical Distribution

Event-triggering stabilization of complex linear systems with disturbances over digital channels

MATH 2710: NOTES FOR ANALYSIS

Probability Estimates for Multi-class Classification by Pairwise Coupling

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

PROFIT MAXIMIZATION. π = p y Σ n i=1 w i x i (2)

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals

State Estimation with ARMarkov Models

Can Feedback Increase the Capacity of the Energy Harvesting Channel?

The non-stochastic multi-armed bandit problem

An Introduction to Information Theory: Notes

A Coordinate System for Gaussian Networks

I - Information theory basics

Homework 2: Solution

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications;

arxiv:cond-mat/ v2 25 Sep 2002

A MONOTONICITY RESULT FOR A G/GI/c QUEUE WITH BALKING OR RENEGING

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

arxiv: v1 [physics.data-an] 26 Oct 2012

VARIANTS OF ENTROPY POWER INEQUALITY

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Distributed Rule-Based Inference in the Presence of Redundant Information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Training sequence optimization for frequency selective channels with MAP equalization

On the Rate-Limited Gelfand-Pinsker Problem

q-ary Symmetric Channel for Large q

GIVEN an input sequence x 0,..., x n 1 and the

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

HetNets: what tools for analysis?

EE/Stats 376A: Information theory Winter Lecture 5 Jan 24. Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B.

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach

Delay characterization of multi-hop transmission in a Poisson field of interference

An Analysis of Reliable Classifiers through ROC Isometrics

Improving on the Cutset Bound via a Geometric Analysis of Typical Sets

COMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Trading OTC and Incentives to Clear Centrally

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application

CSE 599d - Quantum Computing When Quantum Computers Fall Apart

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

A note on the random greedy triangle-packing algorithm

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics

Approximating min-max k-clustering

4. Score normalization technical details We now discuss the technical details of the score normalization method.

On the Capacity of Energy Harvesting Communication Link Mehdi Ashraphijuo, Vaneet Aggarwal, Senior Member, IEEE, and Xiaodong Wang, Fellow, IEEE

A continuous review inventory model with the controllable production rate of the manufacturer

Spatial Outage Capacity of Poisson Bipolar Networks

Radial Basis Function Networks: Algorithms

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

On the Toppling of a Sand Pile

substantial literature on emirical likelihood indicating that it is widely viewed as a desirable and natural aroach to statistical inference in a vari

arxiv: v1 [cs.gt] 2 Nov 2018

ECE Information theory Final (Fall 2008)

Beyond Worst-Case Reconstruction in Deterministic Compressed Sensing

Some Results on the Generalized Gaussian Distribution

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding

8 STOCHASTIC PROCESSES

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

Round-off Errors and Computer Arithmetic - (1.2)

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels

An Analysis of TCP over Random Access Satellite Links

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Feedback-error control

The decision-feedback equalizer optimization for Gaussian noise

Elementary Analysis in Q p

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Applicable Analysis and Discrete Mathematics available online at HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS

Linear diophantine equations for discrete tomography

Transcription:

Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University, University Park, PA 16802 2 Deartment of Electrical and Comuter Engineering, University of Maryland, College Park, MD 20742 Abstract We consider a binary energy harvesting channel (BEHC where the encoder has unit energy storage caacity. We first show that an encoding scheme based on block indexing is asymtotically otimal for small energy harvesting rates. We then resent a novel uer bounding technique, which uer bounds the rate by lower-bounding the rate of information leakage to the receiver regarding the energy harvesting rocess. Finally, we roose a timing based hybrid encoding scheme that achieves rates within 0.03 bits/channel use of the uer bound; hence determining the caacity to within 0.03 bits/channel use. I. INTRODUCTION The binary energy harvesting channel (BEHC with finite energy storage is introduced in [1], where an energy harvesting encoder with a finite battery communicates with a receiver over a binary channel using only the harvested energy. It was shown in [1] that this channel model is analogous to a finite queue which communicates with the receiver by timing the deartures of the arriving ackets, where arriving ackets are the harvested energy units. Even in its simlest form, i.e., with a unit-size battery and a noiseless binary channel, the exact caacity of this channel is still unknown, as the singleletter caacity exression found in [1] involves an auxiliary variable. In this aer, we resent an encoding scheme that is asymtotically otimal at low harvesting rates, develo a tighter uer bound by quantifying and minimizing the information leakage from the transmitter to the receiver regarding the energy harvesting rocess, and roose a timing based hybrid encoding scheme that yields achievable rates within 0.03 bits/channel use of the uer bound; hence determining the caacity of this channel to within 0.03 bits/channel use. The caacity of additive white Gaussian noise (AWGN energy harvesting channel was studied in [2] with an infinitesized battery, and in [3] with no battery. Reference [2] showed that the caacity with an infinite-sized battery is equal to the caacity of an average ower constrained channel with average ower constraint equal to the average energy harvesting rate. With no energy storage, the roblem is a time-varying stochastic amlitude constrained communication roblem with causally known amlitude constraints, which was treated in [3] by combining Shannon strategies for channels with causally known states [4] and Smith s aroach to constant amlitude constrained channels [5]. Concurrent to [1], reference [6] This work was suorted by NSF Grants CNS 09-64364 and CNS 09-64632. W Fig. 1. E i Encoder E X i Channel Y i Decoder The binary energy harvesting channel (BEHC model. considered a finite-storage energy harvesting communication roblem and secified a multi-letter caacity exression for a general discrete memoryless channel. This exression required n-letter Shannon strategies, where each channel inut deends on the entire energy harvesting history, thus making evaluation difficult. It was conjectured in [6] that instantaneous strategies, where only the current energy state is considered in each channel use, are sufficient to achieve the caacity. A related work where similar discrete channel/discrete energy abstraction is also used for communication can be found in [7]. II. CHANNEL MODEL AND PREVIOUS RESULTS We consider the binary energy harvesting channel in [1], [6] shown in Fig. 1. The model consists of an energy harvesting encoder which harvests energy into its finite-sized battery, and a conventional decoder. In each channel use, the encoder first sends a binary symbol X i, which is 0 or 1, subject to the energy available in its battery, and then harvests a unit of energy with robability q and saves it in the battery if there is sace. Energy harvests over time are i.i.d. A channel inut of X i = 1 consumes one unit of stored energy, while X i = 0 does not require any energy. As in [1], we focus on the case of unit-sized battery, i.e., E = 1. Hence, the encoder can only send a 1 by consuming the unit of energy in its battery. The communication channel is noiseless, i.e., Y i = X i. Battery state and energy arrivals are naturally causally known to the transmitter, but unknown to the receiver. Battery state determines the set of feasible channel inuts at any given channel use. Even when energy arrivals are i.i.d., the battery state is correlated over time due to energy storage, and is also affected by the ast transmitted symbols. Although the channel is noiseless, finding the caacity of this channel model is difficult, as the battery state is unknown to the receiver, it is correlated over time, and also is affected by Ŵ

the ast channel inuts. For the case of E = 1, reference [1] shows the equivalence of this channel model to a timing channel model where the information is conveyed through the distances between consecutive 1s. In articular, [1, Lemma 1] shows that BEHC is equivalent to the timing channel: T i = V i + Z i (1 where T i {1, 2,...} is the number of channel uses between the (i 1st and the ith 1s, Z i {0, 1,...} is the number of channel uses the encoder has to wait for the next energy arrival, and V i {1, 2,...} is the number of channel uses the encoder chooses to wait after receiving the energy, and thus after observing Z i. Since energy harvests are i.i.d. Bernoulli with q, Z i are i.i.d. geometric with arameter q, and thus the channel model in (1 is memoryless. Every timing channel use costs T i channel uses in the BEHC. This equivalence yields the caacity as follows as found in [1, Theorem 1] C = (u,v(u,z I(U; T where U is an auxiliary variable with distribution (u, and v(u, z is a maing from the message carrying signal U and state for the timing channel Z which is causally known to the transmitter, to the channel inut. This result is a hybrid of Shannon s channel with causal state information [4] and Anantharam-Verdu s bits through queues [8]. However, although single-letterized, the caacity in (2 is still difficult to evaluate due to the infinite cardinalities of U, V and Z. III. ASYMPTOTICALLY OPTIMAL ENCODING In [1], an achievable scheme based on block indexing is roosed for the timing channel reresentation of the roblem. The transmission duration is divided into blocks of length N, and indexed within blocks in mod N. The channel inut is chosen in terms of U {0, 1,..., N 1} and Z as follows (2 V = (U Z mod N + 1 (3 The achievable rate with the v(u, z selection in (2 is R A = N (u H(U E[V ] + E[Z] which involves otimization with resect to (u and the block size N. In addition, the following is an uer bound that was obtained in [1] by giving Z information to the receiver = qh( q + (1 q In the following theorem, we show that this encoding scheme is asymtotically otimal as q goes to zero, i.e., when the harvesting rate is small. We establish this by roosing secific encoding arameters (u and N which yield achievable rates that asymtotically equal the uer bound in (5. Theorem 1 The encoding scheme for the timing channel with auxiliary U {0, 1,..., N 1} and the channel inut given (4 (5 in (3 is asymtotically otimal as energy harvest rate q 0, R A = 1 (6 Proof: For a given q, the objective in (5 is a continuous, differentiable and concave in. This can be verified by observing that the second derivative is always negative. Therefore, imizing (5 satisfies or equivalently for q > 0, q(log(1 q log( ( + q q 2 = 0 (7 q = log(1 log( As a result of (8, we observe that there exists a feasible 0 < 0.5 for all 0 < q 1, and that it satisfies = 0 (9 1 At harvesting rate q, we choose N =, and U uniformly distributed over {0, 1,..., N 1}, i.e., (u = 1/N for 0 u N 1. Note that N 2. Substituting these selections into (4, the rate achievable with this scheme becomes R A = H(U E[V ] + E[Z] = log(n N+1 2 + 1 q q q log(n Nq + 1 q (8 (10 where E[Z] = (1 q/q and E[V ] = (N + 1/2 follows from U being indeendent of Z and uniform on {0, 1,..., N 1}. The last term in (10 is increasing in N within the interval [ 1, 1 ], which allows us to further lower bound R A as R A q log(n Nq + 1 q q log( q + (1 q = R A (11 We are now ready to show (6 as follows: R A R A (12 qh( = q + (1 q q + (1 q q log( (13 (1 log(1 = 1 + 0 log( (14 = 1 (15 In addition, R A by the definition of an uer bound, concluding the roof of the theorem. The asymtotically otimal encoding scheme in Theorem 1 can be interreted as sending a uniformly distributed symbol in {1,..., N} with each harvested energy. In this case, the frame length N oses a trade-off between sending more bits er symbol and vacating the battery quickly to increase chances of caturing more energy. The asymtotically otimal choice for N in the roof of Theorem 1 gives us a rovably otimal encoding scheme, which is also simle to imlement, for low energy harvesting scenarios.

IV. A TIGHTER UPPER BOUND With every timing symbol T i conveyed to the receiver, some information about the energy arrival, Z i, is also leaked to the receiver. Since Z and the message-carrying signal U are indeendent, this imlies that some of the information caacity of the binary noiseless channel is occuied by information about the energy arrival sequence. As an insightful examle to this henomenon, we oint to [9], which considers communication through a queue with unit acket buffer. In [9], the deartures from the buffer are random, and the encoder chooses the arrival sequence to convey its message to the receiver. In a similar manner, we may consider energy harvested from nature to be encoded in some way, achieving some ositive rate between the nature and the receiver. Clearly, the sum of the nature s rate and the message rate cannot exceed the entroy of the channel outut. We make use of this insight to obtain a tractable and tighter uer bound for the caacity of the BEHC. We begin with the following lemma, which rovides an uer bound for the conditional entroy H(Z T = t, U = u, which is the amount of uncertainty in Z at the receiver uon observing T = t and successfully decoding U = u (message. This bound will be useful in lower bounding the amount of information leaked to the receiver about the Z n sequence. Lemma 1 For the timing channel T = V + Z, where Z is geometric with q, and V = v(u, Z with U indeendent of Z, H(Z T = t, U = u H(Z t (16 where Z t is a truncated geometric random variable distributed on {0, 1,..., t 1} with arameter q, i.e., Zt (z = { q(1 q z 1 (1 q, t if z < t 0, otherwise (17 Proof: We first examine the joint distribution (z, t u. We deict this discrete distribution as a two-dimensional matrix in Fig. 2. First, observe that given z and u, the outut of the channel is deterministic, i.e., T = v(u, z + z. Hence, for any given z and u, (z, t u can be non-zero only for a single value of t, and consequently each row of the matrix in Fig. 2 consists of a single non-zero entry. Next, we write (z = (z u (18 = (z, t u (19 = (z, t = v(u, z + z u (20 where (18 is due to the indeendence of Z and U. This imlies that the single non-zero entry in each row of (z, t u is equal to (z. Also note that (z, t u = 0, z t (21 by the definition of the channel. Let A {0, 1,..., t 1} be the set of indices z A for which (z, t u = (z. This allows us to write A (z = Fig. 2. The joint robability matrix (z, t u for a fixed strategy u. There is only one non-zero term in each row, and the rows sum u to (z. Shaded area corresonds to t z, which is not ossible by definition. When calculating H(Z T = t, U = u, only the values in the bold rectangle are relevant. (z t, u as (z, t u A (z = (z, t u (22 { q(1 q z, if z A = a A q(1 qa (23 0, otherwise We next rove that H(Z T = t, U = u is imized when A = {0, 1,..., t 1}, i.e., when all terms in the bold rectangle in Fig. 2 are non-zero. We do this by showing that the distribution A (z is majorized by A (z for all index sets A = {a 0, a 1,..., a k 1 } {0, 1,..., t 1}, k t. Without loss of generality, we assume that a 0 < a 1 <... < a k 1, which yields the decreasing ordering A (a 0 > A (a 1 >... > A (a k 1 (24 for all A. For 0 n k 1 we write n q(1 qai A (a i = k 1 q(1 (25 qai n (1 qan+i n n (1 qan+i n + k 1 i=n+1 (1 qai (26 n (1 qan+i n k 1 (1 (27 qan+i n n (1 qi t 1 = A (i (28 (1 qi where we obtain (26 by subtracting δ 1 = (1 q ai (1 q an+i n (29 from both the numerator and the denominator, and (27 is obtained by adding δ 2 = k 1 i=n+1 (1 q an+i n k 1 i=n+1 (1 q ai (30

to the denominator. Note that both δ 1 and δ 2 are ositive since a n a i n i for n i. Finally, (28 follows from k t. The concavity of f(x = x log(x and the majorization shown in (25-(28 imlies that H(Z T = t, U = u is imized at A = {0, 1,..., t 1}. This yields the uer bound H(Z t, with Z t in (17; concluding the roof. Next, we resent an uer bound for the BEHC by using the result of Lemma 1 in the following theorem. Theorem 2 The caacity of the BEHC is uer bounded by C T (t P H(T H((1 q t 1 (1 q (t t where { } P = T (t (t 1 (1 q n, n = 1, 2,... and H(a is the binary entroy function. (31 (32 Proof: Since T = v(u, Z + Z is a deterministic function of U and Z, we rewrite the numerator of the caacity in (2 as I(U; T = I(U, Z; T I(Z; T U (33 = H(T H(T U, Z I(Z; T U (34 = H(T I(Z; T U (35 Note that the second term in (35 reresents the information leaked to the receiver about the energy harvesting rocess Z after U is decoded. We lower bound this term as I(Z; T U = H(Z U H(Z T, U (36 = H(Z H(Z T, U (37 = (t, u [H(Z H(Z T = t, U = u] u (38 [H(Z H(Z t ] (t, u (39 u = [H(Z H(Z t ] (t (40 where (37 follows from the indeendence of Z and U, and (39 follows from Lemma 1. Substituting (35 and (40 in (2, C H(T [H(Z H(Z t](t (u,v(u,z (41 The objective in (41 is only a function of T (t. Hence, we can erform the imization over distributions T (t that are achievable by some auxiliary U (u and function v(u, Z. Note that since T = V + Z, we have T > Z, and therefore n 1 (t (z = 1 (1 q n, n = 1, 2,... (42 z=0 Hence, the set of distributions P in (32 contains all T (t that can be generated by some U (u and v(u, Z. We note that relaxing the constraint T (t P gives an uer bound as well, though it is strictly looser than that in the theorem. We also note that for the geometrically distributed Z we have, H(Z H(Z t = H((1 qt 1 (1 q t (43 Substituting (42 and (43 in (41, we obtain the uer bound in (31; comleting the roof of the theorem. V. COMPUTING THE UPPER BOUND We can rewrite the imization roblem in (31 as C β 1 β H(T t (t (44 T (t P, β where we have defined t = H((1 qt 1 (1 q. Note that the inner t objective is the sum of a concave and a linear function, and the constraints are linear. Hence, the inner roblem is convex, for which we write the KKT otimality conditions as ( t (t = ex µt t + λ t γ n η 1, t = 1, 2,... (45 where λ t 0, γ n 0, µ 0 and η are the Lagrange multiliers for the constraints (t 0, n (t 1 (1 qn, β, and (t = 1, resectively. The comlementary slackness and dual feasibility conditions are λ t (t = 0, λ t 0 (46 ( t γ t T (n 1 + (1 q t = 0, γ t 0 (47 µ ( β = 0, µ 0 (48 ( η T (n 1 = 0 (49 We note that for t with (t = 0, we need the exonent term in (45 to go to. In that case, the value of λ t is redundant in (45. Thus, without loss of generality, we assign λ t = 0 for all t, and rewrite the solution as ( t (t = A ex µt t γ n (50 where A = e η 1. For all µ 0 and γ i, using (49, we find ( 1 A = e µt t t γn (51 The remaining arameters can be searched numerically, observing that due to (47, γ t > 0 only when t T (n = 1 (1 q t. In articular, for each µ > 0, there exists a unique set of multiliers {γ t } which satisfies (47 when substituted in (50. Due to (48, each µ > 0 gives the solution of the second imization in (44 for a secific β =. Hence, we solve (44 by tracing µ in [0, and finding the corresonding {γ t } and β in each case.

1 0.9 0.8 [1] Uer bound of [1] ( New uer bound ( New achievable rate (R A Achievable rate of [1] (R A [1] Rate with 1st order Markov strategies (R M1 Rate with i.i.d. strategies (R IID Fig. 3. Encoding in the BEHC for N = 4. Circles indicate energy harvests and triangles indicate a transmission of 1 using the harvested energy. VI. AN IMPROVED ENCODING STRATEGY As a new encoding strategy, we roose choosing U {0, 1,...} with distribution U (u, and calculating the channel inut V = v(u, Z as { U Z + 1, U Z V = (52 (U Z mod N + 1, U < Z The interretation of this scheme in the BEHC is demonstrated in Fig. 3 for N = 4. If ossible, the transmitter waits for V = U Z + 1 channel uses, so that T = U + 1, and U is decoded erfectly, as in the case for U 1 in the figure. However, if Z > U, then the encoder immediately dearts the energy within N channel uses, making the battery available for new energy harvests while roviding artial information on U via (T 1 mod N = U mod N (53 as seen in the figure for U 2. The rates achievable with this scheme are calculated by searching for N and U (u that imize R = I(U; T /. Note that this scheme is a hybrid between the block indexing scheme in [1] and choosing T as close to a desired value as ossible. Moreover, in this scheme, U is not ited to {0, 1,..., N 1}. If we restrict the suort set of U as U < N, then the new achievable scheme reduces to that in [1], and therefore it erforms at least as good as the one in [1], as will be verified next. VII. NUMERICAL RESULTS Fig. 4 comares the achievable rate (4 and uer bound (5 of [1], the rates achieved by the instantaneous Shannon strategies roosed in [6], and the uer bound and achievable rate found in Sections IV and VI of this aer. The imroved uer and lower bounds on the caacity of the BEHC are significantly tighter than revious results. In articular, the roosed uer bound, which considers the information leaked to the receiver regarding the harvesting rocess, is esecially tight for large harvest rates q. The roosed achievable scheme which erforms encoding over the equivalent timing channel, erforms better than that of [6] with instantaneous Shannon strategies for the zeroth and first order Markov cases. The scheme roosed in [6] only observes the current battery state in each channel use, while allowing a Markovian deendence over time in the strategy. Our results show that at least in the noiseless channel and with unit-sized battery, the history of the battery state that our scheme is able to exloit is helful. Rate (bits/ch. use 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.65 0.62 0.59 0 0.49 0.53 0.57 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Energy arrival robability (q Fig. 4. Uer bounds and achievable rates for the BEHC. VIII. CONCLUSION We considered the noiseless BEHC with unit-sized battery. We resented an achievable scheme which is asymtotically otimal for small energy harvesting rates. We then develoed an uer bound by quantifying the information leakage to the receiver regarding the energy harvesting random rocess at the transmitter and by lower bounding it. Finally, we roosed a new achievable scheme which outerforms the revious achievable scheme in [1], and also the one in [6] for the zeroth and first order Markovian inuts. The roosed achievable scheme achieves rates within 0.03 bits/channel use of the roosed uer bound, therefore, determining the caacity of this channel to within 0.03 bits/channel use. REFERENCES [1] K. Tutuncuoglu, O. Ozel, A. Yener, and S. Ulukus. Binary energy harvesting channel with finite energy storage. In IEEE ISIT, July 2013. [2] O. Ozel and S. Ulukus. Achieving AWGN caacity under stochastic energy harvesting. IEEE Trans. on Information Theory, 58(10:6471 6483, October 2012. [3] O. Ozel and S. Ulukus. AWGN channel under time-varying amlitude constraints with causal information at the transmitter. In Asilomar Conference, November 2011. [4] C. E. Shannon. Channels with side information at the transmitter. IBM Journal of Research and Develoment, 2(4:289 293, 1958. [5] J. G. Smith. The information caacity of amlitude and varianceconstrained scalar Gaussian channels. Information and Control, 18:203 219, Aril 1971. [6] W. Mao and B. Hassibi. On the caacity of a communication system with energy harvesting and a ited battery. In IEEE ISIT, July 2013. [7] P. Poovski, A. M. Fouladgar, and O. Simeone. Interactive joint transfer of energy and information. IEEE Trans. on Comm., 61(5:2086 2097, May 2013. [8] V. Anantharam and S. Verdu. Bits through queues. IEEE Trans. on Information Theory, 42(1:4 18, January 1996. [9] M. Tavan, R. D. Yates, and W. U. Bajwa. Bits through bufferless queues. In Allerton Conference, October 2013.