-
A New Result on the Random Residue Sequence Algorithm
Authors:
Vamsi Sashank Kotagiri
Abstract:
Random residue sequences (RR) may be used in many random number applications including those related to multiple access in communications. This paper investigates variations on an algorithm to generate RR sequences that was proposed earlier by the author. This makes it possible to obtain many more random sequences than was possible to do by the previous algorithm. Experimental results are presente…
▽ More
Random residue sequences (RR) may be used in many random number applications including those related to multiple access in communications. This paper investigates variations on an algorithm to generate RR sequences that was proposed earlier by the author. This makes it possible to obtain many more random sequences than was possible to do by the previous algorithm. Experimental results are presented on a variety of sequences of length 16 and 24. To obtain a variety of RR sequences of a specific length can have obvious applications in cryptography.
△ Less
Submitted 11 June, 2014;
originally announced June 2014.
-
A Wireless System Using Random Residue Sequences
Authors:
Vamsi Sashank Kotagiri
Abstract:
This paper describes the architecture of wireless communication system using random residue sequences. The basic scheme is that of spread spectrum but instead of using PN sequences for coding, we use random residue sequences. Such a system can provide cryptographic security whose strength would depend on the number of code sequences being used.
This paper describes the architecture of wireless communication system using random residue sequences. The basic scheme is that of spread spectrum but instead of using PN sequences for coding, we use random residue sequences. Such a system can provide cryptographic security whose strength would depend on the number of code sequences being used.
△ Less
Submitted 26 April, 2014;
originally announced April 2014.
-
Memory Capacity of Neural Networks using a Circulant Weight Matrix
Authors:
Vamsi Sashank Kotagiri
Abstract:
This paper presents results on the memory capacity of a generalized feedback neural network using a circulant matrix. Children are capable of learning soon after birth which indicates that the neural networks of the brain have prior learnt capacity that is a consequence of the regular structures in the brain's organization. Motivated by this idea, we consider the capacity of circulant matrices as…
▽ More
This paper presents results on the memory capacity of a generalized feedback neural network using a circulant matrix. Children are capable of learning soon after birth which indicates that the neural networks of the brain have prior learnt capacity that is a consequence of the regular structures in the brain's organization. Motivated by this idea, we consider the capacity of circulant matrices as weight matrices in a feedback network.
△ Less
Submitted 12 March, 2014;
originally announced March 2014.
-
Random Residue Sequences and the Number Theoretic Hilbert Transform
Authors:
Vamsi Sashank Kotagiri
Abstract:
This paper presents random residue sequences derived from the number theoretic Hilbert (NHT) transform and their correlation properties. The autocorrelation of a NHT derived sequence is zero for all non-zero shifts which illustrates that these are self-orthogonal sequences. The cross correlation function between two sequences may be computed with respect to the moduli of the either sequence. There…
▽ More
This paper presents random residue sequences derived from the number theoretic Hilbert (NHT) transform and their correlation properties. The autocorrelation of a NHT derived sequence is zero for all non-zero shifts which illustrates that these are self-orthogonal sequences. The cross correlation function between two sequences may be computed with respect to the moduli of the either sequence. There appears to be some kind of an inverse qualitative relationship between these two different computations for many sets of residue sequences.
△ Less
Submitted 26 November, 2013;
originally announced November 2013.
-
New Results on the Number Theoretic Hilbert Transform
Authors:
Vamsi Sashank Kotagiri
Abstract:
This paper presents new results in the theory of number theoretic Hilbert (NHT) transforms. New polymorphic solutions have been found for the 14-point and 16-point transforms. Several transform pairs are computed and solutions found for which the sequence and the transform have the same shape. The multiplicity of solutions for the same moduli increases their applicability to cryptography.
This paper presents new results in the theory of number theoretic Hilbert (NHT) transforms. New polymorphic solutions have been found for the 14-point and 16-point transforms. Several transform pairs are computed and solutions found for which the sequence and the transform have the same shape. The multiplicity of solutions for the same moduli increases their applicability to cryptography.
△ Less
Submitted 24 October, 2013;
originally announced October 2013.
-
The 10-point and 12-point Number Theoretic Hilbert Transform
Authors:
Vamsi Sashank Kotagiri
Abstract:
This paper presents 10-point and 12-point versions of the recently introduced number theoretic Hilbert (NHT) transforms. Such transforms have applications in signal processing and scrambling. Polymorphic solutions with respect to different moduli for each of the two cases have been found. The multiplicity of solutions for the same moduli increases their applicability to cryptography.
This paper presents 10-point and 12-point versions of the recently introduced number theoretic Hilbert (NHT) transforms. Such transforms have applications in signal processing and scrambling. Polymorphic solutions with respect to different moduli for each of the two cases have been found. The multiplicity of solutions for the same moduli increases their applicability to cryptography.
△ Less
Submitted 11 October, 2013;
originally announced October 2013.
-
Cooperative Relaying with State Available Non-Causally at the Relay
Authors:
Abdellatif Zaidi,
Shiva Prasad Kotagiri,
J. Nicholas Laneman,
Luc Vandendorpe
Abstract:
We consider a three-terminal state-dependent relay channel with the channel state noncausally available at only the relay. Such a model may be useful for designing cooperative wireless networks with some terminals equipped with cognition capabilities, i.e., the relay in our setup. In the discrete memoryless (DM) case, we establish lower and upper bounds on channel capacity. The lower bound is ob…
▽ More
We consider a three-terminal state-dependent relay channel with the channel state noncausally available at only the relay. Such a model may be useful for designing cooperative wireless networks with some terminals equipped with cognition capabilities, i.e., the relay in our setup. In the discrete memoryless (DM) case, we establish lower and upper bounds on channel capacity. The lower bound is obtained by a coding scheme at the relay that uses a combination of codeword splitting, Gel'fand-Pinsker binning, and decode-and-forward relaying. The upper bound improves upon that obtained by assuming that the channel state is available at the source, the relay, and the destination. For the Gaussian case, we also derive lower and upper bounds on the capacity. The lower bound is obtained by a coding scheme at the relay that uses a combination of codeword splitting, generalized dirty paper coding, and decode-and-forward relaying; the upper bound is also better than that obtained by assuming that the channel state is available at the source, the relay, and the destination. In the case of degraded Gaussian channels, the lower bound meets with the upper bound for some special cases, and, so, the capacity is obtained for these cases. Furthermore, in the Gaussian case, we also extend the results to the case in which the relay operates in a half-duplex mode.
△ Less
Submitted 24 November, 2009;
originally announced November 2009.
-
Multiaccess Channels with State Known to One Encoder: Another Case of Degraded Message Sets
Authors:
Abdellatif Zaidi,
Shiva Prasad Kotagiri,
J. Nicholas Laneman,
Luc Vandendorpe
Abstract:
We consider a two-user state-dependent multiaccess channel in which only one of the encoders is informed, non-causally, of the channel states. Two independent messages are transmitted: a common message transmitted by both the informed and uninformed encoders, and an individual message transmitted by only the uninformed encoder. We derive inner and outer bounds on the capacity region of this mode…
▽ More
We consider a two-user state-dependent multiaccess channel in which only one of the encoders is informed, non-causally, of the channel states. Two independent messages are transmitted: a common message transmitted by both the informed and uninformed encoders, and an individual message transmitted by only the uninformed encoder. We derive inner and outer bounds on the capacity region of this model in the discrete memoryless case as well as the Gaussian case. Further, we show that the bounds for the Gaussian case are tight in some special cases.
△ Less
Submitted 8 June, 2009;
originally announced June 2009.
-
Cooperative Relaying with State Available at the Relay
Authors:
Abdellatif Zaidi,
Shivaprasad Kotagiri,
J. Nicholas Laneman,
Luc Vandendorpe
Abstract:
We consider a state-dependent full-duplex relay channel with the state of the channel non-causally available at only the relay. In the framework of cooperative wireless networks, some specific terminals can be equipped with cognition capabilities, i.e, the relay in our model. In the discrete memoryless (DM) case, we derive lower and upper bounds on channel capacity. The lower bound is obtained b…
▽ More
We consider a state-dependent full-duplex relay channel with the state of the channel non-causally available at only the relay. In the framework of cooperative wireless networks, some specific terminals can be equipped with cognition capabilities, i.e, the relay in our model. In the discrete memoryless (DM) case, we derive lower and upper bounds on channel capacity. The lower bound is obtained by a coding scheme at the relay that consists in a combination of codeword splitting, Gel'fand-Pinsker binning, and a decode-and-forward scheme. The upper bound is better than that obtained by assuming that the channel state is available at the source and the destination as well. For the Gaussian case, we also derive lower and upper bounds on channel capacity. The lower bound is obtained by a coding scheme which is based on a combination of codeword splitting and Generalized dirty paper coding. The upper bound is also better than that obtained by assuming that the channel state is available at the source, the relay, and the destination. The two bounds meet, and so give the capacity, in some special cases for the degraded Gaussian case.
△ Less
Submitted 8 September, 2008; v1 submitted 29 November, 2007;
originally announced November 2007.
-
Variations on Information Embedding in Multiple Access and Broadcast Channels
Authors:
ShivaPrasad Kotagiri,
J. Nicholas Laneman
Abstract:
Information embedding (IE) is the transmission of information within a host signal subject to a distortion constraint. There are two types of embedding methods, namely irreversible IE and reversible IE, depending upon whether or not the host, as well as the message, is recovered at the decoder. In irreversible IE, only the embedded message is recovered at the decoder, and in reversible IE, both…
▽ More
Information embedding (IE) is the transmission of information within a host signal subject to a distortion constraint. There are two types of embedding methods, namely irreversible IE and reversible IE, depending upon whether or not the host, as well as the message, is recovered at the decoder. In irreversible IE, only the embedded message is recovered at the decoder, and in reversible IE, both the message and the host are recovered at the decoder. This paper considers combinations of irreversible and reversible IE in multiple access channels (MAC) and physically degraded broadcast channels (BC).
△ Less
Submitted 17 November, 2007;
originally announced November 2007.
-
Outage-Efficient Downlink Transmission Without Transmit Channel State Information
Authors:
Wenyi Zhang,
Shivaprasad Kotagiri,
J. Nicholas Laneman
Abstract:
This paper investigates downlink transmission over a quasi-static fading Gaussian broadcast channel (BC), to model delay-sensitive applications over slowly time-varying fading channels. System performance is characterized by outage achievable rate regions. In contrast to most previous work, here the problem is studied under the key assumption that the transmitter only knows the probability distr…
▽ More
This paper investigates downlink transmission over a quasi-static fading Gaussian broadcast channel (BC), to model delay-sensitive applications over slowly time-varying fading channels. System performance is characterized by outage achievable rate regions. In contrast to most previous work, here the problem is studied under the key assumption that the transmitter only knows the probability distributions of the fading coefficients, but not their realizations. For scalar-input channels, two coding schemes are proposed. The first scheme is called blind dirty paper coding (B-DPC), which utilizes a robustness property of dirty paper coding to perform precoding at the transmitter. The second scheme is called statistical superposition coding (S-SC), in which each receiver adaptively performs successive decoding with the process statistically governed by the realized fading. Both B-DPC and S-SC schemes lead to the same outage achievable rate region, which always dominates that of time-sharing, irrespective of the particular fading distributions. The S-SC scheme can be extended to BCs with multiple transmit antennas.
△ Less
Submitted 10 November, 2007;
originally announced November 2007.
-
Writing on Dirty Paper with Resizing and its Application to Quasi-Static Fading Broadcast Channels
Authors:
Wenyi Zhang,
Shivaprasad Kotagiri,
J. Nicholas Laneman
Abstract:
This paper studies a variant of the classical problem of ``writing on dirty paper'' in which the sum of the input and the interference, or dirt, is multiplied by a random variable that models resizing, known to the decoder but not to the encoder. The achievable rate of Costa's dirty paper coding (DPC) scheme is calculated and compared to the case of the decoder's also knowing the dirt. In the er…
▽ More
This paper studies a variant of the classical problem of ``writing on dirty paper'' in which the sum of the input and the interference, or dirt, is multiplied by a random variable that models resizing, known to the decoder but not to the encoder. The achievable rate of Costa's dirty paper coding (DPC) scheme is calculated and compared to the case of the decoder's also knowing the dirt. In the ergodic case, the corresponding rate loss vanishes asymptotically in the limits of both high and low signal-to-noise ratio (SNR), and is small at all finite SNR for typical distributions like Rayleigh, Rician, and Nakagami. In the quasi-static case, the DPC scheme is lossless at all SNR in terms of outage probability. Quasi-static fading broadcast channels (BC) without transmit channel state information (CSI) are investigated as an application of the robustness properties. It is shown that the DPC scheme leads to an outage achievable rate region that strictly dominates that of time division.
△ Less
Submitted 20 April, 2007;
originally announced April 2007.
-
Multiaccess Channels with State Known to Some Encoders and Independent Messages
Authors:
Shiva Prasad Kotagiri,
J. Nicholas Laneman
Abstract:
We consider a state-dependent multiaccess channel (MAC) with state non-causally known to some encoders. We derive an inner bound for the capacity region in the general discrete memoryless case and specialize to a binary noiseless case. In the case of maximum entropy channel state, we obtain the capacity region for binary noiseless MAC with one informed encoder by deriving a non-trivial outer bou…
▽ More
We consider a state-dependent multiaccess channel (MAC) with state non-causally known to some encoders. We derive an inner bound for the capacity region in the general discrete memoryless case and specialize to a binary noiseless case. In the case of maximum entropy channel state, we obtain the capacity region for binary noiseless MAC with one informed encoder by deriving a non-trivial outer bound for this case. For a Gaussian state-dependent MAC with one encoder being informed of the channel state, we present an inner bound by applying a slightly generalized dirty paper coding (GDPC) at the informed encoder that allows for partial state cancellation, and a trivial outer bound by providing channel state to the decoder also. The uninformed encoders benefit from the state cancellation in terms of achievable rates, however, appears that GDPC cannot completely eliminate the effect of the channel state on the achievable rate region, in contrast to the case of all encoders being informed. In the case of infinite state variance, we analyze how the uninformed encoder benefits from the informed encoder's actions using the inner bound and also provide a non-trivial outer bound for this case which is better than the trivial outer bound.
△ Less
Submitted 30 March, 2008; v1 submitted 23 July, 2006;
originally announced July 2006.