1,385 results
Search Results
2. Optimal beamforming in MISO cognitive channels with degraded message sets
- Author
-
Jing Lv, Adrian Kliks, Ragnar Thobaben, Eduard A. Jorswieck, and Ricardo Blasco-Serrano
- Subjects
Beamforming ,Mathematical optimization ,business.industry ,Computer science ,Transmitter ,Cognition ,Computer simulation ,Telekommunikation ,Cognitive radio ,Telecommunications ,Wireless telecommunication systems ,Dirty paper coding ,business ,Communication channel - Abstract
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with a multiple-input single-output (MISO) secondary user pair that has non-causal knowledge of the primary message. We study an achievable rate region that exploits this knowledge by combining selfless relaying to maintain the rate supported by the primary link with dirty paper coding to pre-cancel the interference at the secondary receiver. We find the optimal choice of power allocation between these operating modes at the secondary transmitter as well as the optimal beamforming vectors. Moreover, we address the robustness of the solution to uncertainties in the channel knowledge. Finally, we show by numerical evaluation the gains obtained due to the additional knowledge of the primary message. QC 20120905
- Published
- 2012
3. Modulation for interference avoidance on the AWGN channel
- Author
-
Du, Jinfeng
- Subjects
interference avoidance ,dirty paper coding ,Costa precoding ,Data_CODINGANDINFORMATIONTHEORY ,Tomlinson-Harashima precoding ,Electrical Engineering, Electronic Engineering, Information Engineering ,Elektroteknik och elektronik ,Computer Science::Information Theory - Abstract
Theoretic results have shown that the capacity of a channel does not decrease if the receiver observes the transmitted signal in the presence of interference, provided that the transmitter knows this interference non-causally. That is, if the transmitter has non-causal access to the interference, by using proper precoding this interference could be “avoided” (as if it were not present) under the same transmit power constraint. It indicates that lossless (in the sense of capacity) precoding is theoretically possible at any signal-to-noise-ratio (SNR). This is of special interest in digital watermarking, transmission for ISI channels as well as for MIMO broadcast channels. Recent research has elegantly demonstrated the (near) achievability of this “existence-type” result, while the complexity is notable. An interesting question is what one can do when very little extra complexity is permitted. This thesis treats such special cases of this problem in order to shed some light on this question. In the AWGN channel with additive interference, an optimum modulator is designed under the constraint of a binary signaling alphabet with binary interference.Tomlinson-Harashima precoding (THP), which is originally proposed for ISI channels, is improved by picking up optimized parameters and then taken as a benchmark. Simulation results show that the Optimum Modulator always outperforms the THP with optimized parameters. The difference in performance, in terms of mutual information between channel input and output as well as coded bit error rate with Turbo codes, is significant in many scenarios.
- Published
- 2006
4. An investigation on mutual information for the linear predictive system and the extrapolation of speech signals
- Abstract
Mutual information (MI) is an important information theoretic concept which has many applications in telecommunications, in blind source separation, and in machine learning. More recently, it has been also employed for the instrumental assessment of speech intelligibility where traditionally correlation based measures are used. In this paper, we address the difference between MI and correlation from the viewpoint of discovering dependencies between variables in the context of speech signals. We perform our investigation by considering the linear predictive approximation and the extrapolation of speech signals as examples. We compare a parametric MI estimation approach based on a Gaussian mixture model (GMM) with the k-nearest neighbor (KNN) approach which is a well-known non-parametric method available to estimate the MI. We show that the GMM-based MI estimator leads to more consistent results. © 2020 Sprachkommunikation - 10. ITG-Fachtagung. All rights reserved., QC 20201202
- Published
- 2020
5. Delay and Stability Analysis of Caching in Heterogeneous Cellular Networks
- Abstract
In this paper, we propose a general delay and stability performance analysis in Heterogeneous Cellular Caching Networks (HCCNs), based on queuing theory. We introduce new performance metrics in HCCNs and propose an optimization problem which minimizes the average experienced delay for users by ensuring the stability of the network. In addition, from the design perspective, we address the problem of finding the minimum cache size for the small cell base stations (SBSs) for having a tolerable average delay and also a stable network. Finally, the analytic expressions derived in this paper are validated through real trace-driven experiments on traffic of YouTube video requests., QC 20161209
- Published
- 2016
- Full Text
- View/download PDF
6. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
7. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
8. Statistical methods for inter-view depth enhancement
- Abstract
This paper briefly presents and evaluates recent advances in statistical methods for improving inter-view inconsistency in multiview depth imagery. View synthesis is vital in free-viewpoint television in order to allow viewers to move freely in a dynamic scene. Here, depth image-based rendering plays a pivotal role by synthesizing an arbitrary number of novel views by using a subset of captured views and corresponding depth maps only. Usually, each depth map is estimated individually at different viewpoints by stereo matching and, hence, shows lack of inter-view consistency. This lack of consistency affects the quality of view synthesis negatively. This paper discusses two different approaches to enhance the inter-view depth consistency. The first one uses generative models based on multiview color and depth classification to assign a probabilistic weight to each depth pixel. The weighted depth pixels are utilized to enhance depth maps. The second one performs inter-view consistency testing in depth difference space to enhance the depth maps at multiple viewpoints. We comparatively evaluate these two methods and discuss their pros and cons for future work., QC 20150109
- Published
- 2014
- Full Text
- View/download PDF
9. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
10. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
11. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
12. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
13. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
14. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
15. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
16. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
17. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
18. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
19. Dynamic decode-and-forward relaying with rate-compatible LDPC convolutional codes
- Abstract
Dynamic decode-and-forward (DDF) is an improved decode-and-forward (DF) protocol under which the relay decides based on its received channel-state information (CSI) when to switch from listening mode to transmission mode without knowing the CSI of other links. In this paper we propose to apply rate-compatible LDPC convolutional (RC-LDPCC) codes to the DDF relay channel. The RC-LDPCC codes are constructed by successive graph extensions, and they have been proved analytically to be capacity achieving over the binary erasure channel. In this paper we show that the RC-LDPCC codes fit well with the DDF relaying, and the regularity of degree distributions simplifies the code optimization. Numerical results in terms of bit erasure rate and achievable rate are provided to evaluate the performance of the system. The results show that the RC-LDPCC codes are able to provide high achievable rates for the DDF relay channel., QC 20120831
- Published
- 2012
- Full Text
- View/download PDF
20. Optimal beamforming in MISO cognitive channels with degraded message sets
- Abstract
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with a multiple-input single-output (MISO) secondary user pair that has non-causal knowledge of the primary message. We study an achievable rate region that exploits this knowledge by combining selfless relaying to maintain the rate supported by the primary link with dirty paper coding to pre-cancel the interference at the secondary receiver. We find the optimal choice of power allocation between these operating modes at the secondary transmitter as well as the optimal beamforming vectors. Moreover, we address the robustness of the solution to uncertainties in the channel knowledge. Finally, we show by numerical evaluation the gains obtained due to the additional knowledge of the primary message., QC 20120905
- Published
- 2012
- Full Text
- View/download PDF
21. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
22. Computing polynomial functions of correlated sources : Inner bounds
- Abstract
This paper considers the problem of source coding for computing functions of correlated i.i.d. random sources. The approach of combining standard and linear random coding for this problem was first introduced by Ahlswede and Han, in the special case of computing the modulo-two sum. In this paper, making use of an adapted version of that method, we generalize their result to more sophisticated scenarios, where the functions to be computed are polynomial functions. Since all discrete functions are fundamentally restrictions of polynomial functions, our results are universally applied., QC 20130109
- Published
- 2012
23. Impact of mobility in cooperative spectrum sensing : Theory vs. simulation
- Abstract
This work addresses the problem of cooperative spectrum sensing in cognitive radio networks, focusing on the impact of mobility on performance of cooperative sensing. First, a review of the most recent results on cooperative spectrum sensing is provided, resulting in the identification of measurement correlation and frame error rate in the reporting channel as the main parameters influencing the performance of cooperative sensing schemes. Next, the paper discusses the extension of the analysis to the case of mobile sensors, and determines the set of assumptions made in existing literature when taking into account mobility in sensing. The paper moves then to remove some of such assumptions, by presenting simulation results obtained in presence of realistic models for propagation in the considered area, as well as of a realistic mobility model. A comparison between theoretical derivation and simulation results shows that correlation among measurements taken by different sensors and the selected mobility model may significantly affect the sensing performance., QC 20130128
- Published
- 2012
- Full Text
- View/download PDF
24. Power Allocation for Multi-Hop Decode-and-Forward Cognitive Radio Networks with Line Topology
- Abstract
In the present paper we study the power allocation for multi-hop underlay cognitive radio networks (CRNs) with line topology. That is, we consider a scenario, where a CRN operates in parallel to the primary network provided that the interference created to the primary network is limited by an acceptable threshold. The CNR is assumed to be a multi-hop relay network and hence before reaching the destination information from the source node may pass several hops from node to node. At each hop, the information is decoded and forwarded to the following node. It is further assumed that transmissions can be overheard by neighboring nodes, thereby creating interference. The power at each node can be optimally adjusted so that the end-to-end throughput of the CRN is maximized, while the constraint on interference towards the primary network is satisfied. In this paper, we show that for line CRNs the optimal power allocation is achieved when capacities of all intermediate links are equal and the interference constraint of the most disturbed primary user is fulfilled with equality. To simplify the computation of the optimal power allocation we derive two approximate solutions as well as several distributed power allocation schemes. The numerical results illustrate the interplay between the proposed solutions and the optimal power allocation., QC 20130111
- Published
- 2012
- Full Text
- View/download PDF
25. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
26. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
27. Optimal beamforming in MISO cognitive channels with degraded message sets
- Abstract
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with a multiple-input single-output (MISO) secondary user pair that has non-causal knowledge of the primary message. We study an achievable rate region that exploits this knowledge by combining selfless relaying to maintain the rate supported by the primary link with dirty paper coding to pre-cancel the interference at the secondary receiver. We find the optimal choice of power allocation between these operating modes at the secondary transmitter as well as the optimal beamforming vectors. Moreover, we address the robustness of the solution to uncertainties in the channel knowledge. Finally, we show by numerical evaluation the gains obtained due to the additional knowledge of the primary message., QC 20120905
- Published
- 2012
- Full Text
- View/download PDF
28. Computing polynomial functions of correlated sources : Inner bounds
- Abstract
This paper considers the problem of source coding for computing functions of correlated i.i.d. random sources. The approach of combining standard and linear random coding for this problem was first introduced by Ahlswede and Han, in the special case of computing the modulo-two sum. In this paper, making use of an adapted version of that method, we generalize their result to more sophisticated scenarios, where the functions to be computed are polynomial functions. Since all discrete functions are fundamentally restrictions of polynomial functions, our results are universally applied., QC 20130109
- Published
- 2012
29. Optimal beamforming in MISO cognitive channels with degraded message sets
- Abstract
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with a multiple-input single-output (MISO) secondary user pair that has non-causal knowledge of the primary message. We study an achievable rate region that exploits this knowledge by combining selfless relaying to maintain the rate supported by the primary link with dirty paper coding to pre-cancel the interference at the secondary receiver. We find the optimal choice of power allocation between these operating modes at the secondary transmitter as well as the optimal beamforming vectors. Moreover, we address the robustness of the solution to uncertainties in the channel knowledge. Finally, we show by numerical evaluation the gains obtained due to the additional knowledge of the primary message., QC 20120905
- Published
- 2012
- Full Text
- View/download PDF
30. Optimal beamforming in MISO cognitive channels with degraded message sets
- Abstract
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with a multiple-input single-output (MISO) secondary user pair that has non-causal knowledge of the primary message. We study an achievable rate region that exploits this knowledge by combining selfless relaying to maintain the rate supported by the primary link with dirty paper coding to pre-cancel the interference at the secondary receiver. We find the optimal choice of power allocation between these operating modes at the secondary transmitter as well as the optimal beamforming vectors. Moreover, we address the robustness of the solution to uncertainties in the channel knowledge. Finally, we show by numerical evaluation the gains obtained due to the additional knowledge of the primary message., QC 20120905
- Published
- 2012
- Full Text
- View/download PDF
31. Computing polynomial functions of correlated sources : Inner bounds
- Abstract
This paper considers the problem of source coding for computing functions of correlated i.i.d. random sources. The approach of combining standard and linear random coding for this problem was first introduced by Ahlswede and Han, in the special case of computing the modulo-two sum. In this paper, making use of an adapted version of that method, we generalize their result to more sophisticated scenarios, where the functions to be computed are polynomial functions. Since all discrete functions are fundamentally restrictions of polynomial functions, our results are universally applied., QC 20130109
- Published
- 2012
32. Computing polynomial functions of correlated sources : Inner bounds
- Abstract
This paper considers the problem of source coding for computing functions of correlated i.i.d. random sources. The approach of combining standard and linear random coding for this problem was first introduced by Ahlswede and Han, in the special case of computing the modulo-two sum. In this paper, making use of an adapted version of that method, we generalize their result to more sophisticated scenarios, where the functions to be computed are polynomial functions. Since all discrete functions are fundamentally restrictions of polynomial functions, our results are universally applied., QC 20130109
- Published
- 2012
33. Computing polynomial functions of correlated sources : Inner bounds
- Abstract
This paper considers the problem of source coding for computing functions of correlated i.i.d. random sources. The approach of combining standard and linear random coding for this problem was first introduced by Ahlswede and Han, in the special case of computing the modulo-two sum. In this paper, making use of an adapted version of that method, we generalize their result to more sophisticated scenarios, where the functions to be computed are polynomial functions. Since all discrete functions are fundamentally restrictions of polynomial functions, our results are universally applied., QC 20130109
- Published
- 2012
34. Optimal beamforming in MISO cognitive channels with degraded message sets
- Abstract
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with a multiple-input single-output (MISO) secondary user pair that has non-causal knowledge of the primary message. We study an achievable rate region that exploits this knowledge by combining selfless relaying to maintain the rate supported by the primary link with dirty paper coding to pre-cancel the interference at the secondary receiver. We find the optimal choice of power allocation between these operating modes at the secondary transmitter as well as the optimal beamforming vectors. Moreover, we address the robustness of the solution to uncertainties in the channel knowledge. Finally, we show by numerical evaluation the gains obtained due to the additional knowledge of the primary message., QC 20120905
- Published
- 2012
- Full Text
- View/download PDF
35. Distortion Bounds on Anytime Source Transmission Using UEP Channel Coding
- Abstract
In this paper, we study the design of causal anytime codes for transmission over symmetric discrete memoryless channel. In our earlier work, we proposed an anytime transmission scheme which is based on unequal error protection using Luby transform codes (UEP-LT) and sequential belief propagation (BP) decoding. In this paper we extend our previous result by providing an analysis on the proposed scheme. In particular, an upperbound on the end-to-end distortion of the anytime transmission scheme is derived., QC 20111213
- Published
- 2011
36. Half-duplex relaying based on quantize-and-forward
- Abstract
The original compress-and-forward relaying scheme uses the technique of random binning at the relay node and successive decoding at the destination node. Recently, a scheme (termed the quantize-and-forward scheme in this paper) without binning and using joint decoding at the destination node has been proposed, which has been shown to achieve the same rate as the original compress-and-forward scheme. Since the previous work focuses on the so-called full duplex relay network, in this paper, an adaption of it for relay networks with a half-duplex relay is provided. Coding schemes and achievable rate results are presented for discrete memoryless half-duplex relay channels and half-duplex additive white Gaussian noise (AWGN) relay channels. Moreover, slow fading channels are considered, for which outage-related performance measures are evaluated. Specifically, the outage probability and the expected rate of the quantize-and-forward scheme are derived and compared with other well-known schemes. Furthermore, the diversity-multiplexing tradeoff is derived. It is shown that the quantize-and-forward scheme is a more suitable scheme than the compress-and-forward scheme over slow fading channels and it achieves the optimal diversity-multiplexing trade-off of a half-duplex relay channel., QC 20120131
- Published
- 2011
- Full Text
- View/download PDF
37. Distortion Bounds on Anytime Source Transmission Using UEP Channel Coding
- Abstract
In this paper, we study the design of causal anytime codes for transmission over symmetric discrete memoryless channel. In our earlier work, we proposed an anytime transmission scheme which is based on unequal error protection using Luby transform codes (UEP-LT) and sequential belief propagation (BP) decoding. In this paper we extend our previous result by providing an analysis on the proposed scheme. In particular, an upperbound on the end-to-end distortion of the anytime transmission scheme is derived., QC 20111213
- Published
- 2011
38. Distortion Bounds on Anytime Source Transmission Using UEP Channel Coding
- Abstract
In this paper, we study the design of causal anytime codes for transmission over symmetric discrete memoryless channel. In our earlier work, we proposed an anytime transmission scheme which is based on unequal error protection using Luby transform codes (UEP-LT) and sequential belief propagation (BP) decoding. In this paper we extend our previous result by providing an analysis on the proposed scheme. In particular, an upperbound on the end-to-end distortion of the anytime transmission scheme is derived., QC 20111213
- Published
- 2011
39. Distortion Bounds on Anytime Source Transmission Using UEP Channel Coding
- Abstract
In this paper, we study the design of causal anytime codes for transmission over symmetric discrete memoryless channel. In our earlier work, we proposed an anytime transmission scheme which is based on unequal error protection using Luby transform codes (UEP-LT) and sequential belief propagation (BP) decoding. In this paper we extend our previous result by providing an analysis on the proposed scheme. In particular, an upperbound on the end-to-end distortion of the anytime transmission scheme is derived., QC 20111213
- Published
- 2011
40. Distortion Bounds on Anytime Source Transmission Using UEP Channel Coding
- Abstract
In this paper, we study the design of causal anytime codes for transmission over symmetric discrete memoryless channel. In our earlier work, we proposed an anytime transmission scheme which is based on unequal error protection using Luby transform codes (UEP-LT) and sequential belief propagation (BP) decoding. In this paper we extend our previous result by providing an analysis on the proposed scheme. In particular, an upperbound on the end-to-end distortion of the anytime transmission scheme is derived., QC 20111213
- Published
- 2011
41. Iterative encoder-controller design based on approximate dynamic programming
- Abstract
In this paper, we study the iterative optimization of the encoder-controller pair for closed-loop control of a multi-dimensional plant over a noisy discrete memoryless channel. With the objective to minimize the expected linear quadratic cost over a finite horizon, we propose a joint design of the sensor measurement quantization, channel error protection, and optimal controller actuation. It was shown in our previous work that despite this optimization problem is known to be hard in general, an iterative design procedure can be derived to obtain a local optimal solution. However, in the vector case, optimizing the encoder for a fixed controller is in general not practically feasible due to the curse of dimensionality. In this paper, we propose a novel approach that uses the approximate dynamic programming (ADP) to implement a computationally feasible encoder updating policy with promising performance. Especially, we introduce encoder updating rules adopting the rollout approach. Numerical experiments are carried out to demonstrate the performance obtained by employing the proposed iterative design procedure and to compare it with other relevant schemes., QC 20111205
- Published
- 2010
- Full Text
- View/download PDF
42. The influence of error propagation on the capacity of wireless networks
- Abstract
In this paper, it is shown that the achievable throughput capacity of wireless networks suffers from a fundamental limitation under finite node resource constraints. It is shown that this reduction results from a fundamental lower bound on the error performance of the wireless-channel model. In particular, the problem is addressed for the classic parallel-unicast problem introduced by Gupta-Kumar (2000). Under an AWGN channel-model assumption and for a pathloss exponent of α > 2, it is shown that the best available scheme for this setup achieves a throughput-capacity scaling of only Θ(n-1/2(log n)-1) per node. This is significant since an upper bound on asymptotic throughput capacity, scaling as Θ(n-1/2), was earlier shown to have been achieved by a scheme introduced by Franceschetti et. al. in 2006. The gap between achievability and the upper bound did not figure in past work on this problem, mainly due to transmission models that implicitly assume wireless nodes to have unlimited storage and encoding/decoding capabilities. Under the assumption of finite node memory, it is shown that such transmission models are unjustified in a strict information-theoretic sense. The new reduction in capacity scaling occurs from a necessity to modify the schemes used for showing achievability, in order to ensure that the failure probability is arbitrarily small. The analysis presented in this paper employs well-known sphere-packing bounds on the error probability of any block code in terms of the channel-error exponent. The result shows that for wireless networks with resource-constrained nodes, (a) the tightness of the best-known upper bound on capacity scaling still needs to be investigated, and (b) perhaps a better scheme that achieves higher capacity-scaling can be devised, but it is still an open problem., QC 20120124
- Published
- 2010
- Full Text
- View/download PDF
43. Encoder-controller design for control over the binary-input Gaussian channel
- Abstract
In this paper, we consider the problem of the joint optimization of encoder-controller for closed-loop control with state feedback over a binary-input Gaussian channel (BGC). The objective is to minimize the expected linear quadratic cost over a finite horizon. Thisencoder-controller optimization problem is hard in general, mostly because of the curse of dimensionality. The result of this paper is a synthesis technique for a computationally feasible suboptimal controller which exploits both the soft and hard information of thechannel outputs. The proposed controller is efficient in the sense that it embraces measurement quantization, error protection and control over a finite-input infinite-output noisy channel. How to effectively implement this controller is also addressed in the paper. In particular, this is done by using Hadamard techniques. Numerical experiments are carried out to verify the promising gain offered by the combined controller, in comparison to the hard-information-based controller., QC 20120124
- Published
- 2010
- Full Text
- View/download PDF
44. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
45. Coding for the Z Channel With a Digital Relay Link
- Abstract
This paper considers a discrete memoryless four-node network where two nodes want to send three independent messages to the other two nodes. The two receiving nodes are allowed to cooperate by means of a unidirectional noiseless link with finite capacity. A coding scheme is proposed which combines rate splitting, block Markov multi-level superposition coding with binning and joint decoding. The general achievable rates are then specialized to degraded channel and Gaussian channel, where it is shown that the sum capacity for the Gaussian channel is achieved under certain conditions. Results in this paper recover and unify previously known results for the discrete memoryless Z channel without cooperation, and results for the Gaussian Z-interference channel with a digital relay link., QC 20111114
- Published
- 2010
- Full Text
- View/download PDF
46. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
47. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
48. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
49. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
50. Binary weight distribution of non-binary LDPC codes
- Abstract
This paper is the first part of an investigation if the capacity of a binary-input memoryless symmetric channel under ML decoding can be achieved asymptotically by using non-binary LDPC codes. We consider (l.r)-regular LDPC codes both over finite fields and over the general linear group and compute their asymptotic binary weight distributions in the limit of large blocklength and of large alphabet size. A surprising fact, the average binary weight distributions that we obtain do not tend to the binomial one for values of normalized binary weights ω smaller than 1-2-l/r. However, it does not mean that non-binary codes do not achieve the capacity asymptotically, but rather that there exists some exponentially small fraction of codes in the ensemble, which contains an exponentially large number of codewords of poor weight. The justification of this fact is beyond the scope of this paper and will be given in [1]., QC 20141010
- Published
- 2009
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.