-
MICROSIM: A high performance phase-field solver based on CPU and GPU implementations
Authors:
Tanmay Dutta,
Dasari Mohan,
Saurav Shenoy,
Nasir Attar,
Abhikshek Kalokhe,
Ajay Sagar,
Swapnil Bhure,
Swaroop . S. Pradhan,
Jitendriya Praharaj,
Subham Mridha,
Anshika Kushwaha,
Vaishali Shah,
M. P. Gururajan,
V. Venkatesh Shenoi,
Gandham Phanikumar,
Saswata Bhattacharyya,
Abhik Choudhury
Abstract:
The phase-field method has become a useful tool for the simulation of classical metallurgical phase transformations as well as other phenomena related to materials science. The thermodynamic consistency that forms the basis of these formulations lends to its strong predictive capabilities and utility. However, a strong impediment to the usage of the method for typical applied problems of industria…
▽ More
The phase-field method has become a useful tool for the simulation of classical metallurgical phase transformations as well as other phenomena related to materials science. The thermodynamic consistency that forms the basis of these formulations lends to its strong predictive capabilities and utility. However, a strong impediment to the usage of the method for typical applied problems of industrial and academic relevance is the significant overhead with regard to the code development and know-how required for quantitative model formulations. In this paper, we report the development of an open-source phase-field software stack that contains generic formulations for the simulation of multi-phase and multi-component phase transformations. The solvers incorporate thermodynamic coupling that allows the realization of simulations with real alloys in scenarios directly relevant to the materials industry. Further, the solvers utilize parallelization strategies using either multiple CPUs or GPUs to provide cross-platform portability and usability on available supercomputing machines. Finally, the solver stack also contains a graphical user interface to gradually introduce the usage of the software. The user interface also provides a collection of post-processing tools that allow the estimation of useful metrics related to microstructural evolution.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
Quantum Soft Covering and Decoupling with Relative Entropy Criterion
Authors:
Xingyi He,
Touheed Anwar Atif,
S. Sandeep Pradhan
Abstract:
We propose quantum soft covering problems for fully quantum channels and classical-quantum (CQ) channels using relative entropy as a criterion of operator closeness. We prove covering lemmas by deriving one-shot bounds on the rates in terms of smooth min-entropies and smooth max-divergences, respectively. In the asymptotic regime, we show that for quantum channels, the rate infimum defined as the…
▽ More
We propose quantum soft covering problems for fully quantum channels and classical-quantum (CQ) channels using relative entropy as a criterion of operator closeness. We prove covering lemmas by deriving one-shot bounds on the rates in terms of smooth min-entropies and smooth max-divergences, respectively. In the asymptotic regime, we show that for quantum channels, the rate infimum defined as the logarithm of the minimum rank of the input state is the coherent information between the reference and output state; for CQ channels, the rate infimum defined as the logarithm of the minimum number of input codewords is the Helovo information between the input and output state. Furthermore, we present a one-shot quantum decoupling theorem with relative entropy criterion. Our results based on the relative-entropy criterion are tighter than the corresponding results based on the trace norm considered in the literature due to the Pinsker inequality.
△ Less
Submitted 16 February, 2024;
originally announced February 2024.
-
Quantum Advantage in Non-Interactive Source Simulation
Authors:
Hojat Allah Salehi,
Farhad Shirani,
S. Sandeep Pradhan
Abstract:
This work considers the non-interactive source simulation problem (NISS). In the standard NISS scenario, a pair of distributed agents, Alice and Bob, observe a distributed binary memoryless source $(X^d,Y^d)$ generated based on joint distribution $P_{X,Y}$. The agents wish to produce a pair of discrete random variables $(U_d,V_d)$ with joint distribution $P_{U_d,V_d}$, such that $P_{U_d,V_d}$ conv…
▽ More
This work considers the non-interactive source simulation problem (NISS). In the standard NISS scenario, a pair of distributed agents, Alice and Bob, observe a distributed binary memoryless source $(X^d,Y^d)$ generated based on joint distribution $P_{X,Y}$. The agents wish to produce a pair of discrete random variables $(U_d,V_d)$ with joint distribution $P_{U_d,V_d}$, such that $P_{U_d,V_d}$ converges in total variation distance to a target distribution $Q_{U,V}$. Two variations of the standard NISS scenario are considered. In the first variation, in addition to $(X^d,Y^d)$ the agents have access to a shared Bell state. The agents each measure their respective state, using a measurement of their choice, and use its classical output along with $(X^d,Y^d)$ to simulate the target distribution. This scenario is called the entanglement-assisted NISS (EA-NISS). In the second variation, the agents have access to a classical common random bit $Z$, in addition to $(X^d,Y^d)$. This scenario is called the classical common randomness NISS (CR-NISS). It is shown that for binary-output NISS scenarios, the set of feasible distributions for EA-NISS and CR-NISS are equal with each other. Hence, there is not quantum advantage in these EA-NISS scenarios. For non-binary output NISS scenarios, it is shown through an example that there are distributions that are feasible in EA-NISS but not in CR-NISS. This shows that there is a quantum advantage in non-binary output EA-NISS.
△ Less
Submitted 2 May, 2024; v1 submitted 31 January, 2024;
originally announced February 2024.
-
Youth WellTech: A Global Remote Co-Design Sprint for Youth Mental Health Technology
Authors:
Kenji Phang,
Siddharth Saarathi Pradhan,
Chino Ikwuegbu,
Gonzalo Ramos,
Denae Ford,
Ebele Okoli,
Salman Muin Kayser Chishti,
**a Suh
Abstract:
Mental health is a pressing concern in today's digital age, particularly among youth who are deeply intertwined with technology. Despite the influx of technology solutions addressing mental health issues, youth often remain sidelined during the design process. While co-design methods have been employed to improve participation by youth, many such initiatives are limited to design activities and la…
▽ More
Mental health is a pressing concern in today's digital age, particularly among youth who are deeply intertwined with technology. Despite the influx of technology solutions addressing mental health issues, youth often remain sidelined during the design process. While co-design methods have been employed to improve participation by youth, many such initiatives are limited to design activities and lack training for youth to research and develop solutions for themselves. In this case study, we detail our 8-week remote, collaborative research initiative called Youth WellTech, designed to facilitate remote co-design sprints aimed at equip** youth with the tools and knowledge to envision and design tech futures for their own communities. We pilot this initiative with 12 student technology evangelists across 8 countries globally to foster the sharing of mental health challenges and diverse perspectives. We highlight insights from our experiences running this global program remotely, its structure, and recommendations for co-research.
△ Less
Submitted 11 January, 2024;
originally announced January 2024.
-
My Science Tutor (MyST) -- A Large Corpus of Children's Conversational Speech
Authors:
Sameer S. Pradhan,
Ronald A. Cole,
Wayne H. Ward
Abstract:
This article describes the MyST corpus developed as part of the My Science Tutor project -- one of the largest collections of children's conversational speech comprising approximately 400 hours, spanning some 230K utterances across about 10.5K virtual tutor sessions by around 1.3K third, fourth and fifth grade students. 100K of all utterances have been transcribed thus far. The corpus is freely av…
▽ More
This article describes the MyST corpus developed as part of the My Science Tutor project -- one of the largest collections of children's conversational speech comprising approximately 400 hours, spanning some 230K utterances across about 10.5K virtual tutor sessions by around 1.3K third, fourth and fifth grade students. 100K of all utterances have been transcribed thus far. The corpus is freely available (https://myst.cemantix.org) for non-commercial use using a creative commons license. It is also available for commercial use (https://boulderlearning.com/resources/myst-corpus/). To date, ten organizations have licensed the corpus for commercial use, and approximately 40 university and other not-for-profit research groups have downloaded the corpus. It is our hope that the corpus can be used to improve automatic speech recognition algorithms, build and evaluate conversational AI agents for education, and together help accelerate development of multimodal applications to improve children's excitement and learning about science, and help them learn remotely.
△ Less
Submitted 23 September, 2023;
originally announced September 2023.
-
Quantum soft-covering lemma with applications to rate-distortion coding, resolvability and identification via quantum channels
Authors:
Touheed Anwar Atif,
S. Sandeep Pradhan,
Andreas Winter
Abstract:
We propose a quantum soft-covering problem for a given general quantum channel and one of its output states, which consists in finding the minimum rank of an input state needed to approximate the given channel output. We then prove a one-shot quantum covering lemma in terms of smooth min-entropies by leveraging decoupling techniques from quantum Shannon theory. This covering result is shown to be…
▽ More
We propose a quantum soft-covering problem for a given general quantum channel and one of its output states, which consists in finding the minimum rank of an input state needed to approximate the given channel output. We then prove a one-shot quantum covering lemma in terms of smooth min-entropies by leveraging decoupling techniques from quantum Shannon theory. This covering result is shown to be equivalent to a coding theorem for rate distortion under a posterior (reverse) channel distortion criterion by two of the present authors. Both one-shot results directly yield corollaries about the i.i.d. asymptotics, in terms of the coherent information of the channel.
The power of our quantum covering lemma is demonstrated by two additional applications: first, we formulate a quantum channel resolvability problem, and provide one-shot as well as asymptotic upper and lower bounds. Secondly, we provide new upper bounds on the unrestricted and simultaneous identification capacities of quantum channels, in particular separating for the first time the simultaneous identification capacity from the unrestricted one, proving a long-standing conjecture of the last author.
△ Less
Submitted 26 April, 2024; v1 submitted 21 June, 2023;
originally announced June 2023.
-
On The Reliability Function of Discrete Memoryless Multiple-Access Channel with Feedback
Authors:
Mohsen Heidari,
Achilleas Anastasopoulos,
S. Sandeep Pradhan
Abstract:
The reliability function of a channel is the maximum achievable exponential rate of decay of the error probability as a function of the transmission rate. In this work, we derive bounds on the reliability function of discrete memoryless multiple-access channels (MAC) with noiseless feedback. We show that our bounds are tight for a variety of MACs, such as $m$-ary additive and two independent point…
▽ More
The reliability function of a channel is the maximum achievable exponential rate of decay of the error probability as a function of the transmission rate. In this work, we derive bounds on the reliability function of discrete memoryless multiple-access channels (MAC) with noiseless feedback. We show that our bounds are tight for a variety of MACs, such as $m$-ary additive and two independent point-to-point channels. The bounds are expressed in terms of a new information measure called ``variable-length directed information". The upper bound is proved by analyzing stochastic processes defined based on the entropy of the message, given the past channel's outputs. Our method relies on tools from the theory of martingales, variable-length information measures, and a new technique called time pruning. We further propose a variable-length achievable scheme consisting of three phases: (i) data transmission, (ii) hybrid data-confirmation, and (iii) full confirmation. We show that two-phase-type schemes are strictly suboptimal in achieving the MAC's reliability function. Moreover, we study the shape of the lower-bound and show that it increases linearly with respect to a specific Euclidean distance measure defined between the transmission rate pair and the capacity boundary. As side results, we derive an upper bound on the capacity of MAC with noiseless feedback and study a new problem involving a hybrid of hypothesis testing and data transmission.
△ Less
Submitted 11 June, 2023;
originally announced June 2023.
-
Rate-Limited Quantum-to-Classical Optimal Transport in Finite and Continuous-Variable Quantum Systems
Authors:
Hafez M. Garmaroudi,
S. Sandeep Pradhan,
Jun Chen
Abstract:
We consider the rate-limited quantum-to-classical optimal transport in terms of output-constrained rate-distortion coding for both finite-dimensional and continuous-variable quantum-to-classical systems with limited classical common randomness. The main coding theorem provides a single-letter characterization of the achievable rate region of a lossy quantum measurement source coding for an exact c…
▽ More
We consider the rate-limited quantum-to-classical optimal transport in terms of output-constrained rate-distortion coding for both finite-dimensional and continuous-variable quantum-to-classical systems with limited classical common randomness. The main coding theorem provides a single-letter characterization of the achievable rate region of a lossy quantum measurement source coding for an exact construction of the destination distribution (or the equivalent quantum state) while maintaining a threshold of distortion from the source state according to a generally defined distortion observable. The constraint on the output space fixes the output distribution to an IID predefined probability mass function. Therefore, this problem can also be viewed as information-constrained optimal transport which finds the optimal cost of transporting the source quantum state to the destination classical distribution via a quantum measurement with limited communication rate and common randomness.
We develop a coding framework for continuous-variable quantum systems by employing a clip** projection and a dequantization block and using our finite-dimensional coding theorem. Moreover, for the Gaussian quantum systems, we derive an analytical solution for rate-limited Wasserstein distance of order 2, along with a Gaussian optimality theorem, showing that Gaussian measurement optimizes the rate in a system with Gaussian quantum source and Gaussian destination distribution. The results further show that in contrast to the classical Wasserstein distance of Gaussian distributions, which corresponds to an infinite transmission rate, in the Quantum Gaussian measurement system, the optimal transport is achieved with a finite transmission rate due to the inherent noise of the quantum measurement imposed by Heisenberg's uncertainty principle.
△ Less
Submitted 28 November, 2023; v1 submitted 17 May, 2023;
originally announced May 2023.
-
Capacity-achieving Polar-based Codes with Sparsity Constraints on the Generator Matrices
Authors:
James Chin-Jen Pang,
Hessam Mahdavifar,
S. Sandeep Pradhan
Abstract:
In this paper, we leverage polar codes and the well-established channel polarization to design capacity-achieving codes with a certain constraint on the weights of all the columns in the generator matrix (GM) while having a low-complexity decoding algorithm. We first show that given a binary-input memoryless symmetric (BMS) channel $W$ and a constant $s \in (0, 1]$, there exists a polarization ker…
▽ More
In this paper, we leverage polar codes and the well-established channel polarization to design capacity-achieving codes with a certain constraint on the weights of all the columns in the generator matrix (GM) while having a low-complexity decoding algorithm. We first show that given a binary-input memoryless symmetric (BMS) channel $W$ and a constant $s \in (0, 1]$, there exists a polarization kernel such that the corresponding polar code is capacity-achieving with the \textit{rate of polarization} $s/2$, and the GM column weights being bounded from above by $N^s$. To improve the sparsity versus error rate trade-off, we devise a column-splitting algorithm and two coding schemes for BEC and then for general BMS channels. The \textit{polar-based} codes generated by the two schemes inherit several fundamental properties of polar codes with the original $2 \times 2$ kernel including the decay in error probability, decoding complexity, and the capacity-achieving property. Furthermore, they demonstrate the additional property that their GM column weights are bounded from above sublinearly in $N$, while the original polar codes have some column weights that are linear in $N$. In particular, for any BEC and $β<0.5$, the existence of a sequence of capacity-achieving polar-based codes where all the GM column weights are bounded from above by $N^λ$ with $λ\approx 0.585$, and with the error probability bounded by $O(2^{-N^β} )$ under a decoder with complexity $O(N\log N)$, is shown. The existence of similar capacity-achieving polar-based codes with the same decoding complexity is shown for any BMS channel and $β<0.5$ with $λ\approx 0.631$.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
Lossy Quantum Source Coding with a Global Error Criterion based on a Posterior Reference Map
Authors:
Touheed Anwar Atif,
Mohammad Aamir Sohail,
S. Sandeep Pradhan
Abstract:
We consider the lossy quantum source coding problem where the task is to compress a given quantum source below its von Neumann entropy. Inspired by the duality connections between the rate-distortion and channel coding problems in the classical setting, we propose a new formulation for the lossy quantum source coding problem. This formulation differs from the existing quantum rate-distortion theor…
▽ More
We consider the lossy quantum source coding problem where the task is to compress a given quantum source below its von Neumann entropy. Inspired by the duality connections between the rate-distortion and channel coding problems in the classical setting, we propose a new formulation for the lossy quantum source coding problem. This formulation differs from the existing quantum rate-distortion theory in two aspects. Firstly, we require that the reconstruction of the compressed quantum source fulfill a global error constraint as opposed to the sample-wise local error criterion used in the standard rate-distortion setting. Secondly, instead of a distortion observable, we employ the notion of a backward quantum channel, which we refer to as a "posterior reference map", to measure the reconstruction error. Using these, we characterize the asymptotic performance limit of the lossy quantum source coding problem in terms of single-letter coherent information of the given posterior reference map. We demonstrate a protocol to encode (at the specified rate) and decode, with the reconstruction satisfying the provided global error criterion, and therefore achieving the asymptotic performance limit. The protocol is constructed by decomposing coherent information as a difference of two Holevo information quantities, inspired from prior works in quantum communication problems. To further support the findings, we develop analogous formulations for the quantum-classical and classical variants and express the asymptotic performance limit in terms of single-letter mutual information quantities with respect to appropriately defined channels analogous to posterior reference maps. We also provide various examples for the three formulations, and shed light on their connection to the standard rate-distortion formulation wherever possible.
△ Less
Submitted 1 February, 2023;
originally announced February 2023.
-
On the dimension of non-abelian tensor square of Lie superalgebras
Authors:
Rudra Narayan Padhan,
Ibrahem Yakzan Hasan,
Sushree Sangeeta Pradhan
Abstract:
In this paper, we determine upper bound for the non-abelian tensor product of finite dimensional Lie superalgebra. More precisely, if $L$ is a non-abelian nilpotent Lie superalgebra of dimension $(k \mid l)$ and its derived subalgebra has dimension $(r \mid s)$, then $ \dim (L\otimes L) \leq (k+l-(r+s))(k+l-1)+2$. We discuss the conditions when the equality holds for $r=1, s=0$ explicitly.
In this paper, we determine upper bound for the non-abelian tensor product of finite dimensional Lie superalgebra. More precisely, if $L$ is a non-abelian nilpotent Lie superalgebra of dimension $(k \mid l)$ and its derived subalgebra has dimension $(r \mid s)$, then $ \dim (L\otimes L) \leq (k+l-(r+s))(k+l-1)+2$. We discuss the conditions when the equality holds for $r=1, s=0$ explicitly.
△ Less
Submitted 20 September, 2022;
originally announced September 2022.
-
Multi-Party Quantum Purity Distillation with Bounded Classical Communication
Authors:
Touheed Anwar Atif,
S. Sandeep Pradhan
Abstract:
We consider the task of distilling local purity from a noisy quantum state $ρ^{ABC}$, wherein we provide a protocol for three parties, Alice, Bob and Charlie, to distill local purity (at a rate $P$) from many independent copies of a given quantum state $ρ^{ABC}$. The three parties have access to their respective subsystems of $ρ^{ABC}$, and are provided with pure ancilla catalytically, i.e., with…
▽ More
We consider the task of distilling local purity from a noisy quantum state $ρ^{ABC}$, wherein we provide a protocol for three parties, Alice, Bob and Charlie, to distill local purity (at a rate $P$) from many independent copies of a given quantum state $ρ^{ABC}$. The three parties have access to their respective subsystems of $ρ^{ABC}$, and are provided with pure ancilla catalytically, i.e., with the promise of returning them unaltered after the end of the protocol. In addition, Alice and Bob can communicate with Charlie using a one-way multiple-access dephasing channel of link rates $R_1$ and $R_2$, respectively. The objective of the protocol is to minimize the usage of the dephasing channel (in terms of rates $R_1$ and $R_2$) while maximizing the asymptotic purity that can be jointly distilled from $ρ^{ABC}$. To achieve this, we employ ideas from distributed measurement compression protocols, and in turn, characterize a set of sufficient conditions on $(P,R_1,R_2)$ in terms of quantum information theoretic quantities such that $P$ amount of purity can be distilled using rates $R_1$ and $R_2$. Finally, we also incorporate the technique of asymptotic algebraic structured coding, and provide a unified approach of characterizing the performance limits.
△ Less
Submitted 10 March, 2022;
originally announced March 2022.
-
Lattices from Linear Codes: Source and Channel Networks
Authors:
Farhad Shirani,
S. Sandeep Pradhan
Abstract:
In this paper, we consider the information-theoretic characterization of the set of achievable rates and distortions in a broad class of multiterminal communication scenarios with general continuous-valued sources and channels. A framework is presented which involves fine discretization of the source and channel variables followed by communication over the resulting discretized network. In order t…
▽ More
In this paper, we consider the information-theoretic characterization of the set of achievable rates and distortions in a broad class of multiterminal communication scenarios with general continuous-valued sources and channels. A framework is presented which involves fine discretization of the source and channel variables followed by communication over the resulting discretized network. In order to evaluate fundamental performance limits, convergence results for information measures are provided under the proposed discretization process. Using this framework, we consider point-to-point source coding and channel coding with side-information, distributed source coding with distortion constraints, the function reconstruction problems (two-help-one), computation over multiple access channel, the interference channel, and the multiple-descriptions source coding problem. We construct lattice-like codes for general sources and channels, and derive inner-bounds to set of achievable rates and distortions in these communication scenarios.
△ Less
Submitted 22 February, 2022;
originally announced February 2022.
-
Unified approach for computing sum of sources over CQ-MAC
Authors:
Mohammad Aamir Sohail,
Touheed Anwar Atif,
S. Sandeep Pradhan,
Arun Padakandla
Abstract:
We consider the task of communicating a generic bivariate function of two classical sources over a Classical-Quantum Multiple Access Channel (CQ-MAC). The two sources are observed at the encoders of the CQ-MAC, and the decoder aims at reconstructing a bivariate function from the received quantum state. Inspired by the techniques developed for the analogous classical setting, and employing the tech…
▽ More
We consider the task of communicating a generic bivariate function of two classical sources over a Classical-Quantum Multiple Access Channel (CQ-MAC). The two sources are observed at the encoders of the CQ-MAC, and the decoder aims at reconstructing a bivariate function from the received quantum state. Inspired by the techniques developed for the analogous classical setting, and employing the technique of simultaneous (joint) decoding developed for the classical-quantum setting, we propose and analyze a coding scheme based on a fusion of algebraic structured and unstructured codes. This coding scheme allows exploiting both the symmetric structure common amongst the sources and the asymmetries. We derive a new set of sufficient conditions that strictly enlarges the largest known set of sources (capable of communicating the bivariate function) for any given CQ-MAC. We provide these conditions in terms of single-letter quantum information-theoretic quantities.
△ Less
Submitted 23 February, 2022; v1 submitted 21 February, 2022;
originally announced February 2022.
-
Upper Bounds on the Feedback Error Exponent of Channels With States and Memory
Authors:
Mohsen Heidari,
Achilleas Anastasopoulos,
S. Sandeep Pradhan
Abstract:
As a class of state-dependent channels, Markov channels have been long studied in information theory for characterizing the feedback capacity and error exponent. This paper studies a more general variant of such channels where the state evolves via a general stochastic process, not necessarily Markov or ergodic. The states are assumed to be unknown to the transmitter and the receiver, but the unde…
▽ More
As a class of state-dependent channels, Markov channels have been long studied in information theory for characterizing the feedback capacity and error exponent. This paper studies a more general variant of such channels where the state evolves via a general stochastic process, not necessarily Markov or ergodic. The states are assumed to be unknown to the transmitter and the receiver, but the underlying probability distributions are known. For this setup, we derive an upper bound on the feedback error exponent and the feedback capacity with variable-length codes. The bounds are expressed in terms of the directed mutual information and directed relative entropy. The bounds on the error exponent are simplified to Burnashev's expression for discrete memoryless channels. Our method relies on tools from the theory of martingales to analyze a stochastic process defined based on the entropy of the message given the past channel's outputs.
△ Less
Submitted 20 February, 2022;
originally announced February 2022.
-
New Bounds on the Size of Binary Codes with Large Minimum Distance
Authors:
James Chin-Jen Pang,
Hessam Mahdavifar,
S. Sandeep Pradhan
Abstract:
Let $A(n, d)$ denote the maximum size of a binary code of length $n$ and minimum Hamming distance $d$. Studying $A(n, d)$, including efforts to determine it as well to derive bounds on $A(n, d)$ for large $n$'s, is one of the most fundamental subjects in coding theory. In this paper, we explore new lower and upper bounds on $A(n, d)$ in the large-minimum distance regime, in particular, when…
▽ More
Let $A(n, d)$ denote the maximum size of a binary code of length $n$ and minimum Hamming distance $d$. Studying $A(n, d)$, including efforts to determine it as well to derive bounds on $A(n, d)$ for large $n$'s, is one of the most fundamental subjects in coding theory. In this paper, we explore new lower and upper bounds on $A(n, d)$ in the large-minimum distance regime, in particular, when $d = n/2 - Ω(\sqrt{n})$. We first provide a new construction of cyclic codes, by carefully selecting specific roots in the binary extension field for the check polynomial, with length $n= 2^m -1$, distance $d \geq n/2 - 2^{c-1}\sqrt{n}$, and size $n^{c+1/2}$, for any $m\geq 4$ and any integer $c$ with $0 \leq c \leq m/2 - 1$. These code parameters are slightly worse than those of the Delsarte--Goethals (DG) codes that provide the previously known best lower bound in the large-minimum distance regime. However, using a similar and extended code construction technique we show a sequence of cyclic codes that improve upon DG codes and provide the best lower bound in a narrower range of the minimum distance $d$, in particular, when $d = n/2 - Ω(n^{2/3})$. Furthermore, by leveraging a Fourier-analytic view of Delsarte's linear program, upper bounds on $A(n, n/2 - ρ\sqrt{n})$ with $ρ\in (0.5, 9.5)$ are obtained that scale polynomially in $n$. To the best of authors' knowledge, the upper bound due to Barg and Nogin \cite{barg2006spectral} is the only previously known upper bound that scale polynomially in $n$ in this regime. We numerically demonstrate that our upper bound improves upon the Barg-Nogin upper bound in the specified high-minimum distance regime.
△ Less
Submitted 23 May, 2023; v1 submitted 7 February, 2022;
originally announced February 2022.
-
On the Vanishing Criterion for the Cohomology Groups of the Automorphism Group of a finite Abelian $p$-Group
Authors:
Chudamani Pranesachar Anil Kumar,
Soham Swadhin Pradhan
Abstract:
For a partition $\underlineλ = (λ_{1}^{ρ_1}>λ_{2}^{ρ_2}>λ_{3}^{ρ_3}>\ldots>λ_{k}^{ρ_k})$ and its associated finite abelian $p$-group $\mathcal{A}_{\underlineλ}=\underset{i=1}{\overset{k}{\oplus}} (\mathbb{Z}/p^{λ_i}\mathbb{Z})^{ρ_i}$, where $p$ is a prime, we consider two actions of its automorphism group $\mathcal{G}_{\underlineλ}$ on $\mathcal{A}_{\underlineλ}$. The first action is the natural a…
▽ More
For a partition $\underlineλ = (λ_{1}^{ρ_1}>λ_{2}^{ρ_2}>λ_{3}^{ρ_3}>\ldots>λ_{k}^{ρ_k})$ and its associated finite abelian $p$-group $\mathcal{A}_{\underlineλ}=\underset{i=1}{\overset{k}{\oplus}} (\mathbb{Z}/p^{λ_i}\mathbb{Z})^{ρ_i}$, where $p$ is a prime, we consider two actions of its automorphism group $\mathcal{G}_{\underlineλ}$ on $\mathcal{A}_{\underlineλ}$. The first action is the natural action $g\bullet a=\ ^ga$ for all $g\in\mathcal{G}_{\underlineλ}$ and $a\in\mathcal{A}_{\underlineλ}$ where the action map is denoted by $Λ_1=Id_{\mathcal{G}_{\underlineλ}}:\mathcal{G}_{\underlineλ}\longrightarrow \mathcal{G}_{\underlineλ}$ and the second action is the trivial action $g\bullet a=a$ for all $g\in\mathcal{G}_{\underlineλ}$ and $a\in\mathcal{A}_{\underlineλ}$ where the action map is denoted by $Λ_2:\mathcal{G}_{\underlineλ}\longrightarrow \{e\}\subset\mathcal{G}_{\underlineλ}$ the trivial map. For the natural action $Λ_1$, we show that the first and second cohomology groups $H_{Λ_1}^i(\mathcal{G}_{\underlineλ},\mathcal{A}_{\underlineλ}),i=1,2$ vanish for any partition $\underlineλ$ for an odd prime $p$. For the trivial action $Λ_2$ we show that, for an odd prime $p$, the first cohomology group $H_{Λ_2}^1(\mathcal{G}_{\underlineλ},\mathcal{A}_{\underlineλ})$ and for an odd prime $p\neq 3$, the second cohomology group $H_{Λ_2}^2(\mathcal{G}_{\underlineλ},\mathcal{A}_{\underlineλ})$ vanish if and only if the difference between two successive parts of the partition $\underlineλ$ is at most one. This is done by using the $mod\ p$ cohomologies $H^i(\mathcal{G}_{\underlineλ},\mathbb{Z}/p\mathbb{Z}),i=1,2$.
△ Less
Submitted 17 December, 2021;
originally announced December 2021.
-
Degrees of Faithful Irreducible Representations of Certain Metabelian Groups and a Question of Sim
Authors:
Soham Swadhin Pradhan,
B. Sury
Abstract:
In this paper, we answer affirmatively a question of H S Sim on representations in characteristic $0$, for a class of metabelian groups. Moreover, we provide examples to point out that the analogous answer is no longer valid if the solvable group has derived length larger than 2. Let $F$ be a field of characteristic $0$ and $\overline{F}$ be its algebraic closure. We prove that if $G$ is a finite…
▽ More
In this paper, we answer affirmatively a question of H S Sim on representations in characteristic $0$, for a class of metabelian groups. Moreover, we provide examples to point out that the analogous answer is no longer valid if the solvable group has derived length larger than 2. Let $F$ be a field of characteristic $0$ and $\overline{F}$ be its algebraic closure. We prove that if $G$ is a finite metabelian group containing a maximal abelian normal subgroup which is a p-group with abelian quotient, all possible faithful irreducible representations over $F$ have the same degree and that the Schur index of any faithful irreducible $\overline{F}$-representation with respect to $F$ is always $1$ or $2$. H S Sim had proven such a result for metacyclic groups when the characteristic of $F$ is positive and posed the question in characteristic $0$. Our result answers this question for the above class of metabelian groups affirmatively. We also determine explicitly the Wedderburn component corresponding to any faithful irreducible $\overline{F}$-representation in the group algebra $F[G]$.
△ Less
Submitted 27 June, 2021;
originally announced June 2021.
-
Rational and Quasi-Permutation Representations of Holomorph of Cyclic p-Groups
Authors:
Soham Swadhin Pradhan,
B. Sury
Abstract:
For a finite group $G$, let $p(G)$ denote the minimal degree of a faithful permutation representation of $G$. The minimal degree of a faithful representation of $G$ by quasi-permutation matrices over the fields $\mathbb{C}$ and $\mathbb{Q}$ are denoted by $c(G)$ and $q(G)$ respectively. In general $c(G)\leq q(G)\leq p(G)$ and either inequality may be strict. In this paper, we study the representat…
▽ More
For a finite group $G$, let $p(G)$ denote the minimal degree of a faithful permutation representation of $G$. The minimal degree of a faithful representation of $G$ by quasi-permutation matrices over the fields $\mathbb{C}$ and $\mathbb{Q}$ are denoted by $c(G)$ and $q(G)$ respectively. In general $c(G)\leq q(G)\leq p(G)$ and either inequality may be strict. In this paper, we study the representation theory of the group $G =$ Hol$(C_{p^{n}})$, which is the holomorph of a cyclic group of order $p^n$, $p$ a prime. This group is metacyclic when $p$ is odd and metabelian but not metacyclic when $p=2$ and $n \geq 3$. We explicitly describe the set of all isomorphism types of irreducible representations of $G$ over the field of complex numbers $\mathbb{C}$ as well as the isomorphism types over the field of rational numbers $\mathbb{Q}$. We compute the Wedderburn decomposition of the rational group algebra of $G$. Using the descriptions of the irreducible representations of $G$ over $\mathbb{C}$ and over $\mathbb{Q}$, we show that $c(G) = q(G) = p(G) = p^n$ for any prime $p$. The proofs are often different for the case of $p$ odd and $p=2$.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
Synthesizing Correlated Randomness using Algebraic Structured Codes
Authors:
Touheed Anwar Atif,
Arun Padakandla,
S. Sandeep Pradhan
Abstract:
In this problem, Alice and Bob, are provided $X_{1}^{n}$ and $X_{2}^{n}$ that are IID $p_{X_1 X_2}$. Alice and Bob can communicate to Charles over (noiseless) links of rate $R_1$ and $R_2$, respectively. Their goal is to enable Charles generate samples $Y^{n}$ such that the triple $(X_{1}^{n},X_{2}^{n},Y^{n})$ has a PMF that is close, in total variation, to $\prod p_{X_1 X_2 Y}$. In addition, the…
▽ More
In this problem, Alice and Bob, are provided $X_{1}^{n}$ and $X_{2}^{n}$ that are IID $p_{X_1 X_2}$. Alice and Bob can communicate to Charles over (noiseless) links of rate $R_1$ and $R_2$, respectively. Their goal is to enable Charles generate samples $Y^{n}$ such that the triple $(X_{1}^{n},X_{2}^{n},Y^{n})$ has a PMF that is close, in total variation, to $\prod p_{X_1 X_2 Y}$. In addition, the three parties may posses shared common randomness at rate $C$. We address the problem of characterizing the set of rate triples $(R_1,R_2,C)$ for which the above goal can be accomplished. We build on our recent findings and propose a new coding scheme based on coset codes. We analyze its information-theoretic performance and derive a new inner bound. We identify examples for which the derived inner bound is analytically proven to contain rate triples that are not achievable via any known unstructured code based coding techniques. Our findings build on a variant of soft-covering which generalizes its applicability to the algebraic structured code ensembles. This adds to the advancement of the use structured codes in network information theory.
△ Less
Submitted 12 March, 2021;
originally announced March 2021.
-
Achievable rate-region for $3-$User Classical-Quantum Interference Channel using Structured Codes
Authors:
Touheed Anwar Atif,
Arun Padakandla,
S. Sandeep Pradhan
Abstract:
We consider the problem of characterizing an inner bound to the capacity region of a $3-$user classical-quantum interference channel ($3-$CQIC). The best known coding scheme for communicating over CQICs is based on unstructured random codes and employs the techniques of message splitting and superposition coding. For classical $3-$user interference channels (ICs), it has been proven that coding te…
▽ More
We consider the problem of characterizing an inner bound to the capacity region of a $3-$user classical-quantum interference channel ($3-$CQIC). The best known coding scheme for communicating over CQICs is based on unstructured random codes and employs the techniques of message splitting and superposition coding. For classical $3-$user interference channels (ICs), it has been proven that coding techniques based on coset codes - codes possessing algebraic closure properties - strictly outperform all coding techniques based on unstructured codes. In this work, we develop analogous techniques based on coset codes for $3$to$1-$CQICs - a subclass of $3-$user CQICs. We analyze its performance and derive a new inner bound to the capacity region of $3$to$1-$CQICs that subsume the current known largest and strictly enlarges the same for identified examples.
△ Less
Submitted 5 March, 2021;
originally announced March 2021.
-
Computing Sum of Sources over a Classical-Quantum MAC
Authors:
Touheed Anwar Atif,
Arun Padakandla,
S. Sandeep Pradhan
Abstract:
We consider the problem of communicating a general bivariate function of two classical sources observed at the encoders of a classical-quantum multiple access channel. Building on the techniques developed for the case of a classical channel, we propose and analyze a coding scheme based on coset codes. The proposed technique enables the decoder recover the desired function without recovering the so…
▽ More
We consider the problem of communicating a general bivariate function of two classical sources observed at the encoders of a classical-quantum multiple access channel. Building on the techniques developed for the case of a classical channel, we propose and analyze a coding scheme based on coset codes. The proposed technique enables the decoder recover the desired function without recovering the sources themselves. We derive a new set of sufficient conditions that are weaker than the current known for identified examples. This work is based on a new ensemble of coset codes that are proven to achieve the capacity of a classical-quantum point-to-point channel.
△ Less
Submitted 2 March, 2021;
originally announced March 2021.
-
Distributed Quantum Faithful Simulation and Function Computation Using Algebraic Structured Measurements
Authors:
Touheed Anwar Atif,
S. Sandeep Pradhan
Abstract:
In this work, we consider the task of faithfully simulating a quantum measurement, acting on a joint bipartite quantum state, in a distributed manner. In the distributed setup, the constituent sub-systems of the joint quantum state are measured by two agents, Alice and Bob. A third agent, Charlie receives the measurement outcomes sent by Alice and Bob. Charlie uses local and pairwise shared random…
▽ More
In this work, we consider the task of faithfully simulating a quantum measurement, acting on a joint bipartite quantum state, in a distributed manner. In the distributed setup, the constituent sub-systems of the joint quantum state are measured by two agents, Alice and Bob. A third agent, Charlie receives the measurement outcomes sent by Alice and Bob. Charlie uses local and pairwise shared randomness to compute a bivariate function of the measurement outcomes. The objective of three agents is to faithfully simulate the given distributed quantum measurement acting on the given quantum state while minimizing the communication and shared randomness rates. We demonstrate a new achievable information-theoretic rate-region that exploits the bivariate function using random structured POVMs based on asymptotically good algebraic codes. The algebraic structure of these codes is matched to that of the bivariate function that models the action of Charlie. The conventional approach for this class of problems has been to reconstruct individual measurement outcomes corresponding to Alice and Bob, at Charlie, and then compute the bivariate function, achieved using mutually independent approximating POVMs based on random unstructured codes. In the present approach, using algebraic structured POVMs, the computation is performed on the fly, thus obviating the need to reconstruct individual measurement outcomes at Charlie. Using this, we show that a strictly larger rate region can be achieved. One of the challenges in analyzing these structured POVMs is that they exhibit only pairwise independence and induce only uniform single-letter distributions. To address this, we use nesting of algebraic codes and develop a covering lemma applicable to pairwise-independent POVM ensembles. Combining these techniques, we provide a multi-party distributed faithful simulation and function computation protocol.
△ Less
Submitted 14 October, 2021; v1 submitted 6 January, 2021;
originally announced January 2021.
-
Capacity-achieving Polar-based LDGM Codes
Authors:
James Chin-Jen Pang,
Hessam Mahdavifar,
S. Sandeep Pradhan
Abstract:
In this paper, we study codes with sparse generator matrices. More specifically, low-density generator matrix (LDGM) codes with a certain constraint on the weight of the columns in the generator matrix are considered. In this paper, it is first shown that when a BMS channel W and a constant s>0 are given, there exists a polarization kernel such that the corresponding polar code is capacity-achievi…
▽ More
In this paper, we study codes with sparse generator matrices. More specifically, low-density generator matrix (LDGM) codes with a certain constraint on the weight of the columns in the generator matrix are considered. In this paper, it is first shown that when a BMS channel W and a constant s>0 are given, there exists a polarization kernel such that the corresponding polar code is capacity-achieving and the column weights of the generator matrix (GM) are bounded from above by $N^s$. Then, a general construction based on a concatenation of polar codes and a rate-$1$ code, and a new column-splitting algorithm that guarantees a much sparser GM, is given. More specifically, for any BMS channel and any $ε> 2ε^*$, where $ε^* \approx 0.085$, an existence of a sequence of capacity-achieving codes with all the GM column weights upper bounded by $(\log N)^{1+ε}$ is shown. Furthermore, two coding schemes for BEC and BMS channels, based on a second column-splitting algorithm, are devised with low-complexity decoding that uses successive-cancellation. The second splitting algorithm allows for the use of a low-complexity decoder by preserving the reliability of the bit-channels observed by the source bits, and by increasing the code block length. The concatenation-based construction can also be applied to the random linear code ensemble to yield capacity-achieving codes with all the GM column weights being $O(\log N)$ and with (large-degree) polynomial decoding complexity.
△ Less
Submitted 27 June, 2022; v1 submitted 27 December, 2020;
originally announced December 2020.
-
Schur Index and Extensions of Witt-Berman's Theorems
Authors:
Ravindra Shripad Kulkarni,
Soham Swadhin Pradhan
Abstract:
Let $G$ be a finite group, and $F$ a field of characteristic $0$ or prime to the order of $G$. In $1952$, Witt and in $1956$, Berman independently proved that the number of inequivalent irreducible $F$-representations of $G$ is equal to the number of $F$-conjugacy classes of the elements of $G$, where "$F$-conjugacy" was defined in a certain way. In this paper, we define $F$-conjugacy on $G$ in a…
▽ More
Let $G$ be a finite group, and $F$ a field of characteristic $0$ or prime to the order of $G$. In $1952$, Witt and in $1956$, Berman independently proved that the number of inequivalent irreducible $F$-representations of $G$ is equal to the number of $F$-conjugacy classes of the elements of $G$, where "$F$-conjugacy" was defined in a certain way. In this paper, we define $F$-conjugacy on $G$ in a natural way and give a proof of the above Witt-Berman theorem. In addition, we give an explicit formula for computing a primitive central idempotent (pci) of the group algebra $F[G]$ corresponding to an irreducible $F$-representation of $G$, which can be obtained from the "$F$-character table" of $G$.
Let $G$ be a finite group with a normal subgroup $H$ of index $p$, a prime. In $1955$, in case $F$ is algebraically closed, Berman computed the primitive central idempotent (pci) of $F[G]$ corresponding to an irreducible $F$-representation of $G$, in terms of pci's of $F[H]$. In this paper, we give a complete proof of this Berman's theorem, and extend this result when $F$ is not necessarily algebraically closed. Also, using classical Schur's theory and Wedderburn's theory, we work out decomposition of induced representation of an irreducible $F$-representation of $H$, into irreducible components.
△ Less
Submitted 5 July, 2021; v1 submitted 20 December, 2020;
originally announced December 2020.
-
Source Coding for Synthesizing Correlated Randomness
Authors:
Touheed Anwar Atif,
Arun Padakandla,
S. Sandeep Pradhan
Abstract:
We consider a scenario wherein two parties Alice and Bob are provided $X_{1}^{n}$ and $X_{2}^{n}$ -- samples that are IID from a PMF $P_{X_1 X_2}$. Alice and Bob can communicate to Charles over (noiseless) communication links of rate $R_1$ and $R_2$ respectively. Their goal is to enable Charles generate samples $Y^{n}$ such that the triple $(X_{1}^{n},X_{2}^{n},Y^{n})$ has a PMF that is close, in…
▽ More
We consider a scenario wherein two parties Alice and Bob are provided $X_{1}^{n}$ and $X_{2}^{n}$ -- samples that are IID from a PMF $P_{X_1 X_2}$. Alice and Bob can communicate to Charles over (noiseless) communication links of rate $R_1$ and $R_2$ respectively. Their goal is to enable Charles generate samples $Y^{n}$ such that the triple $(X_{1}^{n},X_{2}^{n},Y^{n})$ has a PMF that is close, in total variation, to $\prod P_{X_1 X_2 Y}$. In addition, the three parties may posses pairwise shared common randomness at rates $C_1$ and $C_2$. We address the problem of characterizing the set of rate quadruples $(R_1,R_2,C_1,C_2)$ for which the above goal can be accomplished. We provide a set of sufficient conditions, i.e. an inner bound to the achievable rate region, and necessary conditions, i.e. an outer bound to the rate region for this three party setup. We provide a joint-typicality based random coding argument involving encoding and decoding operations to perform soft covering and a pertinent relaxation of the PMF requirement for the encoders.
△ Less
Submitted 29 April, 2021; v1 submitted 7 April, 2020;
originally announced April 2020.
-
Capacity-achieving Polar-based LDGM Codes with Crowdsourcing Applications
Authors:
James Chin-Jen Pang,
Hessam Mahdavifar,
S. Sandeep Pradhan
Abstract:
In this paper we study codes with sparse generator matrices. More specifically, codes with a certain constraint on the weight of all the columns in the generator matrix are considered. The end result is the following. For any binary-input memoryless symmetric (BMS) channel and any epsilon > 2 epsilon*, where epsilon^* = \frac{1}{6}-\frac{5}{3}\log{\frac{4}{3}} \approx 0.085, we show an explicit se…
▽ More
In this paper we study codes with sparse generator matrices. More specifically, codes with a certain constraint on the weight of all the columns in the generator matrix are considered. The end result is the following. For any binary-input memoryless symmetric (BMS) channel and any epsilon > 2 epsilon*, where epsilon^* = \frac{1}{6}-\frac{5}{3}\log{\frac{4}{3}} \approx 0.085, we show an explicit sequence of capacity-achieving codes with all the column wights of the generator matrix upper bounded by (\log N)^{1+epsilon}, where N is the code block length. The constructions are based on polar codes. Applications to crowdsourcing are also shown.
△ Less
Submitted 31 January, 2020;
originally announced January 2020.
-
Supertranslation Hair of Schwarzschild Black Hole: A Wilson Line Perspective
Authors:
Sangmin Choi,
S. Sandeep Pradhan,
Ratindranath Akhoury
Abstract:
We demonstrate within the quantum field theoretical framework that an asymptotic particle falling into the black hole implants soft graviton hair on the horizon, conforming with the classical proposal of Hawking, Perry and Strominger. A key ingredient to this result is the construction of gravitational Wilson line dressings of an infalling scalar field, carrying a definite horizon supertranslation…
▽ More
We demonstrate within the quantum field theoretical framework that an asymptotic particle falling into the black hole implants soft graviton hair on the horizon, conforming with the classical proposal of Hawking, Perry and Strominger. A key ingredient to this result is the construction of gravitational Wilson line dressings of an infalling scalar field, carrying a definite horizon supertranslation charge. It is shown that a typical Schwarzschild state is degenerate, and can be labeled by different soft supertranslation hairs parametrized for radial trajectories by the mass and energy of the infalling particle and its asymptotic point of contact with the horizon. The supertranslation zero modes are also obtained in terms of zero-frequency graviton operators, and are shown to be the expected canonical partners of the linearized horizon charge that enlarge the horizon Hilbert space.
△ Less
Submitted 13 October, 2019;
originally announced October 2019.
-
On the Endomorphism Semigroups of Extra-special $p$-groups and Automorphism Orbits
Authors:
C P Anil Kumar,
Soham Swadhin Pradhan
Abstract:
For an odd prime $p$ and a positive integer $n$, it is well known that there are two types of extra-special $p$-groups of order $p^{2n+1}$, first one is the Heisenberg group which has exponent $p$ and the second one is of exponent $p^2$. In this article, a new way of representing the extra-special $p$-group of exponent $p^2$ is given. These representations facilitate an explicit way of finding for…
▽ More
For an odd prime $p$ and a positive integer $n$, it is well known that there are two types of extra-special $p$-groups of order $p^{2n+1}$, first one is the Heisenberg group which has exponent $p$ and the second one is of exponent $p^2$. In this article, a new way of representing the extra-special $p$-group of exponent $p^2$ is given. These representations facilitate an explicit way of finding formulae for any endomorphism and any automorphism of an extra-special $p$-group $G$ for both the types. Based on these formulae, the endomorphism semigroup $End(G)$ and the automorphism group $Aut(G)$ are described. The endomorphism semigroup image of any element in $G$ is found and the orbits under the action of the automorphism group $Aut(G)$ are determined. As a consequence it is deduced that, under the notion of degeneration of elements in $G$, the endomorphism semigroup $End(G)$ induces a partial order on the automorphism orbits when $G$ is the Heisenberg group and does not induce when $G$ is the extra-special $p$-group of exponent $p^2$. Finally we prove that the cardinality of isotropic subspaces of any fixed dimension in a non-degenerate symplectic space is a polynomial in $p$ with non-negative integer coefficients. Using this fact we compute the cardinality of $End(G)$.
△ Less
Submitted 3 October, 2019; v1 submitted 1 August, 2019;
originally announced August 2019.
-
Coding for Crowdsourced Classification with XOR Queries
Authors:
James Chin-Jen Pang,
Hessam Mahdavifar,
S. Sandeep Pradhan
Abstract:
This paper models the crowdsourced labeling/classification problem as a sparsely encoded source coding problem, where each query answer, regarded as a code bit, is the XOR of a small number of labels, as source information bits. In this paper we leverage the connections between this problem and well-studied codes with sparse representations for the channel coding problem to provide querying scheme…
▽ More
This paper models the crowdsourced labeling/classification problem as a sparsely encoded source coding problem, where each query answer, regarded as a code bit, is the XOR of a small number of labels, as source information bits. In this paper we leverage the connections between this problem and well-studied codes with sparse representations for the channel coding problem to provide querying schemes with almost optimal number of queries, each of which involving only a constant number of labels. We also extend this scenario to the case where some workers can be unresponsive. For this case, we propose querying schemes where each query involves only log n items, where n is the total number of items to be labeled. Furthermore, we consider classification of two correlated labeling systems and provide two-stage querying schemes with almost optimal number of queries each involving a constant number of labels.
△ Less
Submitted 31 January, 2020; v1 submitted 25 June, 2019;
originally announced June 2019.
-
A New Achievable Rate-Distortion Region for Distributed Source Coding
Authors:
Farhad Shirani,
S. Sandeep Pradhan
Abstract:
In this work, lossy distributed compression of pairs of correlated sources is considered. Conventionally, Shannon's random coding arguments -- using randomly generated unstructured codebooks whose blocklength is taken to be asymptotically large -- are used to derive achievability results. However, it was recently observed that in various multi-terminal communications scenarios, using random codes…
▽ More
In this work, lossy distributed compression of pairs of correlated sources is considered. Conventionally, Shannon's random coding arguments -- using randomly generated unstructured codebooks whose blocklength is taken to be asymptotically large -- are used to derive achievability results. However, it was recently observed that in various multi-terminal communications scenarios, using random codes with constant finite blocklength may lead to improved achievable regions compared to the conventional approach. In other words, in some network communication scenarios, there is a finite optimal value in the blocklength of the randomly generated code used for distributed processing of information sources. Motivated by this, a coding scheme is proposed which consists of two codebook layers: i) the primary codebook which has constant finite blocklength, and ii) the secondary codebook whose blocklength is taken to be asymptotically large. The achievable region is analyzed in two steps. In the first step, a characterization of the achievable region is derived using information measures which are functions of multi-letter probability distributions. In the next step, a computable single-letter inner-bound to the achievable region is derived. It is shown through several examples that the resulting rate-distortion region is strictly larger than the Berger Tung achievable region.
△ Less
Submitted 19 October, 2020; v1 submitted 20 June, 2019;
originally announced June 2019.
-
Structured Map**s and Conferencing Common Information for Multiple-access Channels
Authors:
Mohsen Heidari,
S. Sandeep Pradhan
Abstract:
In this work, we study two problems: three-user Multiple-Access Channel (MAC) with correlated sources, and MAC with Feedback (MAC-FB) with independent messages. For the first problem, we identify a structure in the joint probability distribution of discrete memoryless sources, and define a new common information called ``conferencing common information". We develop a multi-user joint-source channe…
▽ More
In this work, we study two problems: three-user Multiple-Access Channel (MAC) with correlated sources, and MAC with Feedback (MAC-FB) with independent messages. For the first problem, we identify a structure in the joint probability distribution of discrete memoryless sources, and define a new common information called ``conferencing common information". We develop a multi-user joint-source channel coding methodology based on structured map**s to encode this common information efficiently and to transmit it over a MAC. We derive a new set of sufficient conditions for this coding strategy using single-letter information quantities for arbitrary sources and channel distributions. Next, we make a fundamental connection between this problem and the problem of communication of independent messages over three-user MAC-FB. In the latter problem, although the messages are independent to begin with, they become progressively correlated given the channel output feedback. Subsequent communication can be modeled as transmission of correlated sources over MAC. Exploiting this connection, we develop a new coding scheme for the problem. We characterize its performance using single-letter information quantities, and derive an inner bound to the capacity region. For both problems, we provide a set of examples where these rate regions are shown to be optimal. Moreover, we analytically prove that this performance is not achievable using random unstructured random map**s/codes.
△ Less
Submitted 12 May, 2019;
originally announced May 2019.
-
Boolean Functions with Biased Inputs: Approximation and Noise Sensitivity
Authors:
Mohsen Heidari,
S. Sandeep Pradhan,
Ramji Venkataramanan
Abstract:
This paper considers the problem of approximating a Boolean function $f$ using another Boolean function from a specified class. Two classes of approximating functions are considered: $k$-juntas, and linear Boolean functions. The $n$ input bits of the function are assumed to be independently drawn from a distribution that may be biased. The quality of approximation is measured by the mismatch proba…
▽ More
This paper considers the problem of approximating a Boolean function $f$ using another Boolean function from a specified class. Two classes of approximating functions are considered: $k$-juntas, and linear Boolean functions. The $n$ input bits of the function are assumed to be independently drawn from a distribution that may be biased. The quality of approximation is measured by the mismatch probability between $f$ and the approximating function $g$. For each class, the optimal approximation and the associated mismatch probability is characterized in terms of the biased Fourier expansion of $f$. The technique used to analyze the mismatch probability also yields an expression for the noise sensitivity of $f$ in terms of the biased Fourier coefficients, under a general i.i.d. input perturbation model.
△ Less
Submitted 8 July, 2019; v1 submitted 29 January, 2019;
originally announced January 2019.
-
Faithful Simulation of Distributed Quantum Measurements with Applications in Distributed Rate-Distortion Theory
Authors:
Touheed Anwar Atif,
Mohsen Heidari,
S. Sandeep Pradhan
Abstract:
We consider the task of faithfully simulating a distributed quantum measurement, wherein we provide a protocol for the three parties, Alice, Bob and Eve, to simulate a repeated action of a distributed quantum measurement using a pair of non-product approximating measurements by Alice and Bob, followed by a stochastic map** at Eve. The objective of the protocol is to utilize minimum resources, in…
▽ More
We consider the task of faithfully simulating a distributed quantum measurement, wherein we provide a protocol for the three parties, Alice, Bob and Eve, to simulate a repeated action of a distributed quantum measurement using a pair of non-product approximating measurements by Alice and Bob, followed by a stochastic map** at Eve. The objective of the protocol is to utilize minimum resources, in terms of classical bits needed by Alice and Bob to communicate their measurement outcomes to Eve, and the common randomness shared among the three parties, while faithfully simulating independent repeated instances of the original measurement. To achieve this, we develop a mutual covering lemma and a technique for random binning of distributed quantum measurements, and, in turn, characterize a set of sufficient communication and common randomness rates required for asymptotic simulatability in terms of single-letter quantum information quantities. Furthermore, using these results we address a distributed quantum rate-distortion problem, where we characterize the achievable rate-distortion region through a single-letter inner bound. Finally, via a technique of single-letterization of multi-letter quantum information quantities, we provide an outer bound for the rate-distortion region.
△ Less
Submitted 14 August, 2020; v1 submitted 20 January, 2019;
originally announced January 2019.
-
Representations induced from a normal subgroup of prime index
Authors:
Soham Swadhin Pradhan
Abstract:
Let $G$ be a finite group, $H$ be a normal subgroup of prime index $p$. Let $F$ be a field of either characteristic $0$ or prime to $|G|$. Let $η$ be an irreducible $F$-representation of $H$. If $F$ is an algebraically closed field of characteristic either $0$ or prime to $|G|$, then the induced representation $η\uparrow^{G}_{H}$ is either irreducible or a direct sum of $p$ pairwise inequivalent i…
▽ More
Let $G$ be a finite group, $H$ be a normal subgroup of prime index $p$. Let $F$ be a field of either characteristic $0$ or prime to $|G|$. Let $η$ be an irreducible $F$-representation of $H$. If $F$ is an algebraically closed field of characteristic either $0$ or prime to $|G|$, then the induced representation $η\uparrow^{G}_{H}$ is either irreducible or a direct sum of $p$ pairwise inequivalent irreducible representations. In this paper, we show that if $F$ is not assumed algebraically closed field, then there are five possibilities in the decomposition of induced representation into irreducible representations.
△ Less
Submitted 6 October, 2018;
originally announced October 2018.
-
Representations and primitive central idempotents of a finite solvable group
Authors:
Ravi S. Kulkarni,
Soham Swadhin Pradhan
Abstract:
Let $G$ be a finite solvable group. Then $G$ always has a useful presentation, which we call a "long presentation". Using a "long presentation" of $G$, we present an inductive method of constructing the irreducible representations of $G$ over $\mathbb{C}$ and computing the primitive central idempotents of the complex group algebra $\mathbb{C}[G]$. For a finite abelian group, we present a systemati…
▽ More
Let $G$ be a finite solvable group. Then $G$ always has a useful presentation, which we call a "long presentation". Using a "long presentation" of $G$, we present an inductive method of constructing the irreducible representations of $G$ over $\mathbb{C}$ and computing the primitive central idempotents of the complex group algebra $\mathbb{C}[G]$. For a finite abelian group, we present a systematic method of constructing the irreducible representations over a field of characteristic either $0$ or prime to order of the group and also a systematic method of computing the primitive central idempotents of the semisimple abelian group algebra.
△ Less
Submitted 9 October, 2018;
originally announced October 2018.
-
Algorithmic construction of representations of finite solvable groups
Authors:
Soham Swadhin Pradhan
Abstract:
The dominant theme of this thesis is the construction of matrix representations of finite solvable groups using a suitable system of generators. For a finite solvable group $G$ of order $N = p_{1}p_{2}\dots p_{n}$, where $p_{i}$'s are primes, there always exists a subnormal series: $\langle {e} \rangle = G_{o} < G_{1} < \dots < G_{n} = G$ such that $G_{i}/G_{i-1}$ is isomorphic to a cyclic group o…
▽ More
The dominant theme of this thesis is the construction of matrix representations of finite solvable groups using a suitable system of generators. For a finite solvable group $G$ of order $N = p_{1}p_{2}\dots p_{n}$, where $p_{i}$'s are primes, there always exists a subnormal series: $\langle {e} \rangle = G_{o} < G_{1} < \dots < G_{n} = G$ such that $G_{i}/G_{i-1}$ is isomorphic to a cyclic group of order $p_{i}$, $i = 1,2,\dots,n$. Associated with this series, there exists a system of generators consisting $n$ elements $x_{1}, x_{2}, \dots, x_{n}$ (say), such that $G_{i} = \langle x_{1}, x_{2}, \dots, x_{i} \rangle$, $i = 1,2,\dots,n$, which is called a "long system of generators". In terms of this system of generators and conjugacy class sum of $x_{i}$ in $G_{i}$, $i = 1,2, \dots, n$, we present an algorithm for constructing the irreducible matrix representations of $G$ over $\mathbb{C}$ within the group algebra $\mathbb{C}[G]$. This algorithmic construction needs the knowledge of primitive central idempotents, a well defined set of primitive (not necessarily central) idempotents and the "diagonal subalgebra" of $\mathbb{C}[G]$. In terms of this system of generators, we give simple expressions for the primitive central idempotents, a well defined system of primitive (not necessarily central) idempotents and a convenient set of generators of the "diagonal subalgebra" of $\mathbb{C}[G]$.
For a finite abelian group, we present an algorithm for constructing the inequivalent irreducible matrix representations over a field of characteristic $0$ or prime to the order of the group and a systematic way of computing the primitive central idempotents of the group algebra. Besides that, we give simple expressions of the primitive central idempotents of the rational group algebra of a finite abelian group using a "long presentation" and it's Wedderburn decomposition.
△ Less
Submitted 6 October, 2018;
originally announced October 2018.
-
On The Reliability Function of Discrete Memoryless Multiple-Access Channel with Feedback
Authors:
Mohsen Heidari,
Achilleas Anastasopoulos,
S. Sandeep Pradhan
Abstract:
We derive a lower and upper bound on the reliability function of discrete memoryless multiple-access channel (MAC) with noiseless feedback and variable-length codes (VLCs). For the upper-bound, we use proof techniques of Burnashev for the point-to-point case. Also, we adopt the techniques used to prove the converse for the feedback-capacity of MAC. For the lower-bound on the error exponent, we pre…
▽ More
We derive a lower and upper bound on the reliability function of discrete memoryless multiple-access channel (MAC) with noiseless feedback and variable-length codes (VLCs). For the upper-bound, we use proof techniques of Burnashev for the point-to-point case. Also, we adopt the techniques used to prove the converse for the feedback-capacity of MAC. For the lower-bound on the error exponent, we present a coding scheme consisting of a data and a confirmation stage. In the data stage, any arbitrary feedback capacity-achieving code is used. In the confirmation stage, each transmitter sends one bit of information to the receiver using a pair of codebooks of size two, one for each transmitter. The codewords at this stage are selected randomly according to an appropriately optimized joint probability distribution. The bounds increase linearly with respect to a specific Euclidean distance measure defined between the transmission rate pair and the capacity boundary. The lower and upper bounds match for a class of MACs.
△ Less
Submitted 29 June, 2018; v1 submitted 23 January, 2018;
originally announced January 2018.
-
Bounds on the Effective-length of Optimal Codes for Interference Channel with Feedback
Authors:
Mohsen Heidari,
Farhad Shirani,
S. Sandeep Pradhan
Abstract:
In this paper, we investigate the necessity of finite blocklength codes in distributed transmission of independent message sets over channels with feedback. Previously, it was shown that finite effective length codes are necessary in distributed transmission and compression of sources. We provide two examples of three user interference channels with feedback where codes with asymptotically large e…
▽ More
In this paper, we investigate the necessity of finite blocklength codes in distributed transmission of independent message sets over channels with feedback. Previously, it was shown that finite effective length codes are necessary in distributed transmission and compression of sources. We provide two examples of three user interference channels with feedback where codes with asymptotically large effective lengths are sub-optimal. As a result, we conclude that coded transmission using finite effective length codes is necessary to achieve optimality. We argue that the sub-optimal performance of large effective length codes is due to their inefficiency in preserving the correlation between the inputs to the distributed terminals in the communication system. This correlation is made available by the presence of feedback at the terminals and is used as a means for coordination between the terminals when using finite effective length coding strategies.
△ Less
Submitted 16 January, 2018;
originally announced January 2018.
-
On the Sub-optimality of Single-Letter Coding over Networks
Authors:
Farhad Shirani,
S. Sandeep Pradhan
Abstract:
In this paper, we establish a new bound tying together the effective length and the maximum correlation between the outputs of an arbitrary pair of Boolean functions which operate on two sequences of correlated random variables. We derive a new upper bound on the correlation between the outputs of these functions. The upper bound may find applications in problems in many areas which deal with comm…
▽ More
In this paper, we establish a new bound tying together the effective length and the maximum correlation between the outputs of an arbitrary pair of Boolean functions which operate on two sequences of correlated random variables. We derive a new upper bound on the correlation between the outputs of these functions. The upper bound may find applications in problems in many areas which deal with common information. We build upon Witsenhausen's result on maximum correlation. The present upper bound takes into account the effective length of the Boolean functions in characterizing the correlation.
We use the new bound to characterize the communication-cooperation tradeoff in multi-terminal communications. We investigate binary block-codes (BBC). A BBC is defined as a vector of Boolean functions. We consider an ensemble of BBCs which is randomly generated using single-letter distributions. We characterize the vector of dependency spectrums of these BBCs. We use this vector to bound the correlation between the outputs of two distributed BBCs. Finally, the upper bound is used to show that the large blocklength single-letter coding schemes studied in the literature are sub-optimal in various multi-terminal communication settings.
△ Less
Submitted 30 April, 2017;
originally announced May 2017.
-
On the Necessity of Structured Codes for Communications over MAC with Feedback
Authors:
Mohsen Heidari,
Farhad Shirani,
S. Sandeep Pradhan
Abstract:
The problem of three-user multiple-access channel (MAC) with noiseless feedback is investigated. A new coding strategy is presented. The coding scheme builds upon the natural extension of the Cover-Leung (CL) scheme; and uses quasi-linear codes. A new single-letter achievable rate region is derived. The new achievable region strictly contains the CL region. This is shown through an example. In thi…
▽ More
The problem of three-user multiple-access channel (MAC) with noiseless feedback is investigated. A new coding strategy is presented. The coding scheme builds upon the natural extension of the Cover-Leung (CL) scheme; and uses quasi-linear codes. A new single-letter achievable rate region is derived. The new achievable region strictly contains the CL region. This is shown through an example. In this example, the coding scheme achieves optimality in terms of transmission rates. It is shown that any optimality achieving scheme for this example must have a specific algebraic structure. Particularly, the codebooks must be closed under binary addition.
△ Less
Submitted 17 February, 2017;
originally announced February 2017.
-
A New Achievable Rate Region for Multiple-Access Channel with States
Authors:
Mohsen Heidari,
Farhad Shirani,
S. Sandeep Pradhan
Abstract:
The problem of reliable communication over the multiple-access channel (MAC) with states is investigated. We propose a new coding scheme for this problem which uses quasi-group codes (QGC). We derive a new computable single-letter characterization of the achievable rate region. As an example, we investigate the problem of doubly-dirty MAC with modulo-$4$ addition. It is shown that the sum-rate…
▽ More
The problem of reliable communication over the multiple-access channel (MAC) with states is investigated. We propose a new coding scheme for this problem which uses quasi-group codes (QGC). We derive a new computable single-letter characterization of the achievable rate region. As an example, we investigate the problem of doubly-dirty MAC with modulo-$4$ addition. It is shown that the sum-rate $R_1+R_2=1$ bits per channel use is achievable using the new scheme. Whereas, the natural extension of the Gel'fand-Pinsker scheme, sum-rates greater than $0.32$ are not achievable.
△ Less
Submitted 8 February, 2017;
originally announced February 2017.
-
On the Sub-optimality of Single-letter Coding in Multi-terminal Communications
Authors:
Farhad Shirani,
S. Sandeep Pradhan
Abstract:
We investigate binary block-codes (BBC). A BBC is defined as a vector of Boolean functions. We consider BBCs which are generated randomly, and using single-letter distributions. We characterize the vector of dependency spectrums of these BBCs. We use this vector to upper-bound the correlation between the outputs of two distributed BBCs. Finally, the upper-bound is used to show that the large block…
▽ More
We investigate binary block-codes (BBC). A BBC is defined as a vector of Boolean functions. We consider BBCs which are generated randomly, and using single-letter distributions. We characterize the vector of dependency spectrums of these BBCs. We use this vector to upper-bound the correlation between the outputs of two distributed BBCs. Finally, the upper-bound is used to show that the large blocklength single-letter coding schemes in the literature are sub-optimal in some multiterminal communication settings.
△ Less
Submitted 5 February, 2017;
originally announced February 2017.
-
On the Correlation between Boolean Functions of Sequences of Random Variables
Authors:
Farhad Shirani,
S. Sandeep Pradhan
Abstract:
In this paper, we establish a new inequality tying together the effective length and the maximum correlation between the outputs of an arbitrary pair of Boolean functions which operate on two sequences of correlated random variables. We derive a new upper-bound on the correlation between the outputs of these functions. The upper-bound is useful in various disciplines which deal with common-informa…
▽ More
In this paper, we establish a new inequality tying together the effective length and the maximum correlation between the outputs of an arbitrary pair of Boolean functions which operate on two sequences of correlated random variables. We derive a new upper-bound on the correlation between the outputs of these functions. The upper-bound is useful in various disciplines which deal with common-information. We build upon Witsenhausen's bound on maximum-correlation. The previous upper-bound did not take the effective length of the Boolean functions into account.
△ Less
Submitted 4 February, 2017;
originally announced February 2017.
-
How to Compute Modulo Prime-Power Sums
Authors:
Mohsen Heidari,
S. Sandeep Pradhan
Abstract:
The problem of computing modulo prime-power sums is investigated in distributed source coding as well as computation over Multiple-Access Channel (MAC). We build upon group codes and present a new class of codes called Quasi Group Codes (QGC). A QGC is a subset of a group code. These codes are not closed under the group addition. We investigate some properties of QGC's, and provide a packing and a…
▽ More
The problem of computing modulo prime-power sums is investigated in distributed source coding as well as computation over Multiple-Access Channel (MAC). We build upon group codes and present a new class of codes called Quasi Group Codes (QGC). A QGC is a subset of a group code. These codes are not closed under the group addition. We investigate some properties of QGC's, and provide a packing and a covering bound. Next, we use these bounds to derived achievable rates for distributed source coding as well as computation over MAC. We show that strict improvements over the previously known schemes can be obtained using QGC's.
△ Less
Submitted 14 September, 2016;
originally announced September 2016.
-
New Sufficient Conditions for Multiple-Access Channel with Correlated Sources
Authors:
Mohsen Heidari,
Farhad Shirani,
S. Sandeep Pradhan
Abstract:
The problem of three-user Multiple-Access Channel (MAC) with correlated sources is investigated. An extension to the Cover-El Gamal-Salehi (CES) scheme is introduced. We use a combination of this scheme with linear codes and propose a new coding strategy. We derive new sufficient conditions to transmit correlated sources reliably. We consider an example of three-user MAC with binary inputs. Using…
▽ More
The problem of three-user Multiple-Access Channel (MAC) with correlated sources is investigated. An extension to the Cover-El Gamal-Salehi (CES) scheme is introduced. We use a combination of this scheme with linear codes and propose a new coding strategy. We derive new sufficient conditions to transmit correlated sources reliably. We consider an example of three-user MAC with binary inputs. Using this example, we show strict improvements over the CES scheme.
△ Less
Submitted 16 March, 2016;
originally announced March 2016.
-
Trade-off between Communication and Cooperation in the Interference Channel
Authors:
F. Shirani,
S. S. Pradhan
Abstract:
We consider the problem of coding over the multi-user Interference Channel (IC). It is well-known that aligning the interfering signals results in improved achievable rates in certain setups involving more than two users. We argue that in the general interference problem, senders face a tradeoff between communicating their message to their corresponding decoder or cooperating with other users by a…
▽ More
We consider the problem of coding over the multi-user Interference Channel (IC). It is well-known that aligning the interfering signals results in improved achievable rates in certain setups involving more than two users. We argue that in the general interference problem, senders face a tradeoff between communicating their message to their corresponding decoder or cooperating with other users by aligning their signals. Traditionally, interference alignment is carried out using structured codes such as linear codes and group codes. We show through an example that the usual structured coding schemes used for interference neutralization lack the necessary flexibility to optimize this tradeoff. Based on this intuition, we propose a new class of codes for this problem. We use the example to show that the application of these codes gives strict improvements in terms of achievable rates. Finally, we derive a new achievable region for the three user IC which strictly improves upon the previously known inner bounds for this problem.
△ Less
Submitted 16 February, 2016;
originally announced February 2016.
-
Quasi Linear Codes: Application to Point-to-Point and Multi-Terminal Source Coding
Authors:
F. Shirani,
M. Heidari,
S. S. Pradhan
Abstract:
A new ensemble of structured codes is introduced. These codes are called Quasi Linear Codes (QLC). The QLC's are constructed by taking subsets of linear codes. They have a looser structure compared to linear codes and are not closed under addition. We argue that these codes provide gains in terms of achievable Rate-Distortions (RD) in different multi-terminal source coding problems. We derive the…
▽ More
A new ensemble of structured codes is introduced. These codes are called Quasi Linear Codes (QLC). The QLC's are constructed by taking subsets of linear codes. They have a looser structure compared to linear codes and are not closed under addition. We argue that these codes provide gains in terms of achievable Rate-Distortions (RD) in different multi-terminal source coding problems. We derive the necessary covering bounds for analyzing the performance of QLC's. We then consider the Multiple-Descriptions (MD) problem, and prove through an example that the application of QLC's gives an improved achievable RD region for this problem. Finally, we derive an inner bound to the achievable RD region for the general MD problem which strictly contains all of the previous known achievable regions.
△ Less
Submitted 14 February, 2016;
originally announced February 2016.
-
An Achievable Rate-Distortion Region for Multiple Descriptions Source Coding Based on Coset Codes
Authors:
Farhad Shirani,
S. Sandeep Pradhan
Abstract:
We consider the problem of multiple descriptions (MD) source coding and propose new coding strategies involving both unstructured and structured coding layers. Previously, the most general achievable rate-distortion (RD) region for the $l$-descriptions problem was the Combinatorial Message Sharing with Binning (CMSB) region. The CMSB scheme utilizes unstructured quantizers and unstructured binning…
▽ More
We consider the problem of multiple descriptions (MD) source coding and propose new coding strategies involving both unstructured and structured coding layers. Previously, the most general achievable rate-distortion (RD) region for the $l$-descriptions problem was the Combinatorial Message Sharing with Binning (CMSB) region. The CMSB scheme utilizes unstructured quantizers and unstructured binning. In the first part of the paper, we show that this strategy can be improved upon using more general unstructured quantizers and a more general unstructured binning method. In the second part, structured coding strategies are considered. First, structured coding strategies are developed by considering specific MD examples involving three or more descriptions. We show that application of structured quantizers results in strict RD improvements when there are more than two descriptions. Furthermore, we show that structured binning also yields improvements. These improvements are in addition to the ones derived in the first part of the paper. This suggests that structured coding is essential when coding over more than two descriptions. Using the ideas developed through these examples we provide a new unified coding strategy by considering several structured coding layers. Finally, we characterize its performance in the form of an inner bound to the optimal rate-distortion region using computable single-letter information quantities. The new RD region strictly contains all of the previous known achievable regions.
△ Less
Submitted 4 February, 2016;
originally announced February 2016.
-
Primitive Central idempotents and the Wedderburn Decomposition of a Rational Abelian Group Algebra
Authors:
Ravi S. Kulkarni,
Soham S. Pradhan
Abstract:
In this paper we give an explicit description of primitive central idempotents of rational group algebras of finite abelian groups using long presentation, and determine their Wedderburn decompositions.
In this paper we give an explicit description of primitive central idempotents of rational group algebras of finite abelian groups using long presentation, and determine their Wedderburn decompositions.
△ Less
Submitted 8 September, 2015;
originally announced September 2015.