-
DeepExtremeCubes: Integrating Earth system spatio-temporal data for impact assessment of climate extremes
Authors:
Chaonan Ji,
Tonio Fincke,
Vitus Benson,
Gustau Camps-Valls,
Miguel-Angel Fernandez-Torres,
Fabian Gans,
Guido Kraemer,
Francesco Martinuzzi,
David Montero,
Karin Mora,
Oscar J. Pellicer-Valero,
Claire Robin,
Maximilian Soechting,
Melanie Weynants,
Miguel D. Mahecha
Abstract:
With climate extremes' rising frequency and intensity, robust analytical tools are crucial to predict their impacts on terrestrial ecosystems. Machine learning techniques show promise but require well-structured, high-quality, and curated analysis-ready datasets. Earth observation datasets comprehensively monitor ecosystem dynamics and responses to climatic extremes, yet the data complexity can ch…
▽ More
With climate extremes' rising frequency and intensity, robust analytical tools are crucial to predict their impacts on terrestrial ecosystems. Machine learning techniques show promise but require well-structured, high-quality, and curated analysis-ready datasets. Earth observation datasets comprehensively monitor ecosystem dynamics and responses to climatic extremes, yet the data complexity can challenge the effectiveness of machine learning models. Despite recent progress in deep learning to ecosystem monitoring, there is a need for datasets specifically designed to analyse compound heatwave and drought extreme impact. Here, we introduce the DeepExtremeCubes database, tailored to map around these extremes, focusing on persistent natural vegetation. It comprises over 40,000 spatially sampled small data cubes (i.e. minicubes) globally, with a spatial coverage of 2.5 by 2.5 km. Each minicube includes (i) Sentinel-2 L2A images, (ii) ERA5-Land variables and generated extreme event cube covering 2016 to 2022, and (iii) ancillary land cover and topography maps. The paper aims to (1) streamline data accessibility, structuring, pre-processing, and enhance scientific reproducibility, and (2) facilitate biosphere dynamics forecasting in response to compound extremes.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
Successive Interference Cancellation for Optical Fiber Using Discrete Constellations
Authors:
Alex Jäger,
Gerhard Kramer
Abstract:
Successive interference cancellation is used to detect discrete modulation symbols transmitted over a 1000 km fiber-optic link. A transmitter and receiver are presented that have linear complexity in the number of transmitted symbols and achieve the information rates of previous studies that use continuous modulations.
Successive interference cancellation is used to detect discrete modulation symbols transmitted over a 1000 km fiber-optic link. A transmitter and receiver are presented that have linear complexity in the number of transmitted symbols and achieve the information rates of previous studies that use continuous modulations.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Stability of the Ghurye-Olkin Characterization of Vector Gaussian Distributions
Authors:
Mahdi Mahvari,
Gerhard Kramer
Abstract:
The stability of the Ghurye-Olkin (GO) characterization of Gaussian vectors is analyzed using a partition of the vectors into equivalence classes defined by their matrix factors. The sum of the vectors in each class is near-Gaussian in the characteristic function (c.f.) domain if the GO independence condition is approximately met in the c.f. domain. All vectors have the property that any vector pr…
▽ More
The stability of the Ghurye-Olkin (GO) characterization of Gaussian vectors is analyzed using a partition of the vectors into equivalence classes defined by their matrix factors. The sum of the vectors in each class is near-Gaussian in the characteristic function (c.f.) domain if the GO independence condition is approximately met in the c.f. domain. All vectors have the property that any vector projection is near-Gaussian in the distribution function (d.f.) domain. The proofs of these c.f. and d.f. stabilities use tools that establish the stabilities of theorems by Kac-Bernstein and Cramér, respectively. The results are used to prove stability theorems for differential entropies of Gaussian vectors and blind source separation of non-Gaussian sources.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
On-Demand Earth System Data Cubes
Authors:
David Montero,
César Aybar,
Chaonan Ji,
Guido Kraemer,
Maximilian Söchting,
Khalil Teber,
Miguel D. Mahecha
Abstract:
Advancements in Earth system science have seen a surge in diverse datasets. Earth System Data Cubes (ESDCs) have been introduced to efficiently handle this influx of high-dimensional data. ESDCs offer a structured, intuitive framework for data analysis, organising information within spatio-temporal grids. The structured nature of ESDCs unlocks significant opportunities for Artificial Intelligence…
▽ More
Advancements in Earth system science have seen a surge in diverse datasets. Earth System Data Cubes (ESDCs) have been introduced to efficiently handle this influx of high-dimensional data. ESDCs offer a structured, intuitive framework for data analysis, organising information within spatio-temporal grids. The structured nature of ESDCs unlocks significant opportunities for Artificial Intelligence (AI) applications. By providing well-organised data, ESDCs are ideally suited for a wide range of sophisticated AI-driven tasks. An automated framework for creating AI-focused ESDCs with minimal user input could significantly accelerate the generation of task-specific training data. Here we introduce cubo, an open-source Python tool designed for easy generation of AI-focused ESDCs. Utilising collections in SpatioTemporal Asset Catalogs (STAC) that are stored as Cloud Optimised GeoTIFFs (COGs), cubo efficiently creates ESDCs, requiring only central coordinates, spatial resolution, edge size, and time range.
△ Less
Submitted 19 April, 2024;
originally announced April 2024.
-
Information Rates of Successive Interference Cancellation for Optical Fiber
Authors:
Alex Jäger,
Gerhard Kramer
Abstract:
Successive interference cancellation (SIC) is used to approach the achievable information rates (AIRs) of joint detection and decoding for long-haul optical fiber links. The AIRs of memoryless ring constellations are compared to those of circularly symmetric complex Gaussian modulation for surrogate channel models with correlated phase noise. Simulations are performed for 1000 km of standard singl…
▽ More
Successive interference cancellation (SIC) is used to approach the achievable information rates (AIRs) of joint detection and decoding for long-haul optical fiber links. The AIRs of memoryless ring constellations are compared to those of circularly symmetric complex Gaussian modulation for surrogate channel models with correlated phase noise. Simulations are performed for 1000 km of standard single-mode fiber with ideal Raman amplification. In this setup, 32 rings and 16 SIC-stages with Gaussian message-passing receivers achieve the AIR peaks of previous work. The computational complexity scales in proportion to the number of SIC-stages, where one stage has the complexity of separate detection and decoding.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Achieving Gaussian Vector Broadcast Channel Capacity with Scalar Lattices
Authors:
M. Yusuf Şener,
Gerhard Kramer,
Shlomo Shamai,
Ronald Böhnke,
Wen Xu
Abstract:
A coding scheme with scalar lattices is applied to K-receiver, Gaussian, vector broadcast channels with K independent messages, one for each receiver. The method decomposes each receiver channel into parallel scalar channels with known interference and applies dirty paper coding with a modulo interval, amplitude shift keying (ASK), and probabilistic sha** to each scalar channel. The achievable r…
▽ More
A coding scheme with scalar lattices is applied to K-receiver, Gaussian, vector broadcast channels with K independent messages, one for each receiver. The method decomposes each receiver channel into parallel scalar channels with known interference and applies dirty paper coding with a modulo interval, amplitude shift keying (ASK), and probabilistic sha** to each scalar channel. The achievable rate tuples include all points inside the capacity region by choosing truncated Gaussian sha**, large ASK alphabets, and large modulo intervals.
△ Less
Submitted 24 April, 2024; v1 submitted 7 February, 2024;
originally announced February 2024.
-
On $2 \times 2$ MIMO Gaussian Channels with a Small Discrete-Time Peak-Power Constraint
Authors:
Alex Dytso,
Luca Barletta,
Gerhard Kramer
Abstract:
A multi-input multi-output (MIMO) Gaussian channel with two transmit antennas and two receive antennas is studied that is subject to an input peak-power constraint. The capacity and the capacity-achieving input distribution are unknown in general. The problem is shown to be equivalent to a channel with an identity matrix but where the input lies inside and on an ellipse with principal axis length…
▽ More
A multi-input multi-output (MIMO) Gaussian channel with two transmit antennas and two receive antennas is studied that is subject to an input peak-power constraint. The capacity and the capacity-achieving input distribution are unknown in general. The problem is shown to be equivalent to a channel with an identity matrix but where the input lies inside and on an ellipse with principal axis length $r_p$ and minor axis length $r_m$. If $r_p \le \sqrt{2}$, then the capacity-achieving input has support on the ellipse. A sufficient condition is derived under which a two-point distribution is optimal. Finally, if $r_m < r_p \le \sqrt{2}$, then the capacity-achieving distribution is discrete.
△ Less
Submitted 30 January, 2024;
originally announced January 2024.
-
Neural Network Equalizers and Successive Interference Cancellation for Bandlimited Channels with a Nonlinearity
Authors:
Daniel Plabst,
Tobias Prinz,
Francesca Diedolo,
Thomas Wiegart,
Georg Böcherer,
Norbert Hanik,
Gerhard Kramer
Abstract:
Neural networks (NNs) inspired by the forward-backward algorithm (FBA) are used as equalizers for bandlimited channels with a memoryless nonlinearity. The NN-equalizers are combined with successive interference cancellation (SIC) to approach the information rates of joint detection and decoding (JDD) with considerably less complexity than JDD and other existing equalizers. Simulations for short-ha…
▽ More
Neural networks (NNs) inspired by the forward-backward algorithm (FBA) are used as equalizers for bandlimited channels with a memoryless nonlinearity. The NN-equalizers are combined with successive interference cancellation (SIC) to approach the information rates of joint detection and decoding (JDD) with considerably less complexity than JDD and other existing equalizers. Simulations for short-haul optical fiber links with square-law detection illustrate the gains of NNs as compared to the complexity-limited FBA and Gibbs sampling.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
Information Rates for Channels with Fading, Side Information and Adaptive Codewords
Authors:
Gerhard Kramer
Abstract:
Generalized mutual information (GMI) is used to compute achievable rates for fading channels with various types of channel state information at the transmitter (CSIT) and receiver (CSIR). The GMI is based on variations of auxiliary channel models with additive white Gaussian noise (AWGN) and circularly-symmetric complex Gaussian inputs. One variation uses reverse channel models with minimum mean s…
▽ More
Generalized mutual information (GMI) is used to compute achievable rates for fading channels with various types of channel state information at the transmitter (CSIT) and receiver (CSIR). The GMI is based on variations of auxiliary channel models with additive white Gaussian noise (AWGN) and circularly-symmetric complex Gaussian inputs. One variation uses reverse channel models with minimum mean square error (MMSE) estimates that give the largest rates but are challenging to optimize. A second variation uses forward channel models with linear MMSE estimates that are easier to optimize. Both model classes are applied to channels where the receiver is unaware of the CSIT and for which adaptive codewords achieve capacity. The forward model inputs are chosen as linear functions of the adaptive codeword's entries to simplify the analysis. For scalar channels, the maximum GMI is then achieved by a conventional codebook, where the amplitude and phase of each channel symbol are modified based on the CSIT. The GMI increases by partitioning the channel output alphabet and using a different auxiliary model for each partition subset. The partitioning also helps to determine the capacity scaling at high and low signal-to-noise ratios. A class of power control policies is described for partial CSIR, including a MMSE policy for full CSIT. Several examples of fading channels with AWGN illustrate the theory, focusing on on-off fading and Rayleigh fading. The capacity results generalize to block fading channels with in-block feedback, including capacity expressions in terms of mutual and directed information.
△ Less
Submitted 20 May, 2023; v1 submitted 6 February, 2023;
originally announced February 2023.
-
Concatenated Forward Error Correction with KP4 and Single Parity Check Codes
Authors:
Diego Lentner,
Emna Ben Yacoub,
Stefano Calabrò,
Georg Böcherer,
Nebojša Stojanović,
Gerhard Kramer
Abstract:
Concatenated forward error correction is studied using an outer KP4 Reed-Solomon code with hard-decision decoding and inner single parity check (SPC) codes with Chase/Wagner soft-decision decoding. Analytical expressions are derived for the end-to-end frame and bit error rates for transmission over additive white Gaussian noise channels with binary phase-shift keying (BPSK) and quaternary amplitud…
▽ More
Concatenated forward error correction is studied using an outer KP4 Reed-Solomon code with hard-decision decoding and inner single parity check (SPC) codes with Chase/Wagner soft-decision decoding. Analytical expressions are derived for the end-to-end frame and bit error rates for transmission over additive white Gaussian noise channels with binary phase-shift keying (BPSK) and quaternary amplitude shift keying (4-ASK), as well as with symbol interleavers and quantized channel outputs. The BPSK error rates are compared to those of two other inner codes: a two-dimensional product code with SPC component codes and an extended Hamming code. Simulation results for unit-memory inter-symbol interference channels and 4-ASK are also presented. The results show that the coding schemes achieve similar error rates, but SPC codes have the lowest complexity and permit flexible rate adaptation.
△ Less
Submitted 17 May, 2023; v1 submitted 20 December, 2022;
originally announced December 2022.
-
Successive Interference Cancellation for Bandlimited Channels with Direct Detection
Authors:
Tobias Prinz,
Daniel Plabst,
Thomas Wiegart,
Stefano Calabrò,
Norbert Hanik,
Gerhard Kramer
Abstract:
The maximum information rates for bandlimited channels with direct detection are achieved with joint detection and decoding (JDD), but JDD is often too complex to implement. Two receiver structures are studied to reduce complexity: separate detection and decoding (SDD) and successive interference cancellation (SIC). For bipolar modulation, frequency-domain raised-cosine pulse sha**, and fiber-op…
▽ More
The maximum information rates for bandlimited channels with direct detection are achieved with joint detection and decoding (JDD), but JDD is often too complex to implement. Two receiver structures are studied to reduce complexity: separate detection and decoding (SDD) and successive interference cancellation (SIC). For bipolar modulation, frequency-domain raised-cosine pulse sha**, and fiber-optic channels with chromatic dispersion, SIC achieves rates close to those of JDD, thereby attaining significant energy gains over SDD and intensity modulation. Gibbs sampling further reduces the detector complexity and achieves rates close to those of the forward-backward algorithm at low to intermediate signal-to-noise ratio (SNR) but stalls at high SNR. Simulations with polar codes, higher-order modulation, and multi-level coding confirm the predicted gains.
△ Less
Submitted 19 December, 2023; v1 submitted 15 December, 2022;
originally announced December 2022.
-
Stability of Bernstein's Theorem and Soft Doubling for Vector Gaussian Channels
Authors:
Mohammad Mahdi Mahvari,
Gerhard Kramer
Abstract:
The stability of Bernstein's characterization of Gaussian distributions is extended to vectors by utilizing characteristic functions. Stability is used to develop a soft doubling argument that establishes the optimality of Gaussian vectors for certain communications channels with additive Gaussian noise, including two-receiver broadcast channels. One novelty is that the argument does not require t…
▽ More
The stability of Bernstein's characterization of Gaussian distributions is extended to vectors by utilizing characteristic functions. Stability is used to develop a soft doubling argument that establishes the optimality of Gaussian vectors for certain communications channels with additive Gaussian noise, including two-receiver broadcast channels. One novelty is that the argument does not require the existence of distributions that achieve capacity.
△ Less
Submitted 14 August, 2023; v1 submitted 8 December, 2022;
originally announced December 2022.
-
Weight Set Decomposition for Weighted Rank Aggregation: An interpretable and visual decision support tool
Authors:
Tyler Perini,
Amy Langville,
Glenn Kramer,
Jeff Shrager,
Mark Shapiro
Abstract:
The problem of interpreting or aggregating multiple rankings is common to many real-world applications. Perhaps the simplest and most common approach is a weighted rank aggregation, wherein a (convex) weight is applied to each input ranking and then ordered. This paper describes a new tool for visualizing and displaying ranking information for the weighted rank aggregation method. Traditionally, t…
▽ More
The problem of interpreting or aggregating multiple rankings is common to many real-world applications. Perhaps the simplest and most common approach is a weighted rank aggregation, wherein a (convex) weight is applied to each input ranking and then ordered. This paper describes a new tool for visualizing and displaying ranking information for the weighted rank aggregation method. Traditionally, the aim of rank aggregation is to summarize the information from the input rankings and provide one final ranking that hopefully represents a more accurate or truthful result than any one input ranking. While such an aggregated ranking is, and clearly has been, useful to many applications, it also obscures information. In this paper, we show the wealth of information that is available for the weighted rank aggregation problem due to its structure. We apply weight set decomposition to the set of convex multipliers, study the properties useful for understanding this decomposition, and visualize the indifference regions. This methodology reveals information--that is otherwise collapsed by the aggregated ranking--into a useful, interpretable, and intuitive decision support tool. Included are multiple illustrative examples, along with heuristic and exact algorithms for computing the weight set decomposition.
△ Less
Submitted 31 May, 2022;
originally announced June 2022.
-
Comparison of PAM-6 Modulations for Short-Reach Fiber-Optic Links with Intensity Modulation and Direct Detection
Authors:
Tobias Prinz,
Thomas Wiegart,
Daniel Plabst,
Talha Rahman,
Md Sabbir-Bin Hossain,
Nebojša Stojanović,
Stefano Calabrò,
Norbert Hanik,
Gerhard Kramer
Abstract:
PAM-6 transmission is considered for short-reach fiber-optic links with intensity modulation and direct detection. Experiments show that probabilistically-shaped PAM-6 and a framed-cross QAM-32 constellation outperform conventional cross QAM-32 under a peak power constraint.
PAM-6 transmission is considered for short-reach fiber-optic links with intensity modulation and direct detection. Experiments show that probabilistically-shaped PAM-6 and a framed-cross QAM-32 constellation outperform conventional cross QAM-32 under a peak power constraint.
△ Less
Submitted 11 May, 2022;
originally announced May 2022.
-
Experiments on Bipolar Transmission with Direct Detection
Authors:
Thomas Wiegart,
Daniel Plabst,
Tobias Prinz,
Talha Rahman,
Maximilian Schädler,
Nebojša Stojanović,
Stefano Calabrò,
Norbert Hanik,
Gerhard Kramer
Abstract:
Achievable information rates of bipolar 4- and 8-ary constellations are experimentally compared to those of intensity modulation (IM) when using an oversampled direct detection receiver. The bipolar constellations gain up to 1.8 dB over their IM counterparts.
Achievable information rates of bipolar 4- and 8-ary constellations are experimentally compared to those of intensity modulation (IM) when using an oversampled direct detection receiver. The bipolar constellations gain up to 1.8 dB over their IM counterparts.
△ Less
Submitted 11 May, 2022;
originally announced May 2022.
-
Low-Resolution Precoding for Multi-Antenna Downlink Channels and OFDM
Authors:
Andrei Stefan Nedelcu,
Fabian Steiner,
Gerhard Kramer
Abstract:
Downlink precoding is considered for multi-path multi-input single-output channels where the base station uses orthogonal frequency-division multiplexing and low-resolution signaling. A quantized coordinate minimization (QCM) algorithm is proposed and its performance is compared to other precoding algorithms including squared infinity-norm relaxation (SQUID), multi-antenna greedy iterative quantiz…
▽ More
Downlink precoding is considered for multi-path multi-input single-output channels where the base station uses orthogonal frequency-division multiplexing and low-resolution signaling. A quantized coordinate minimization (QCM) algorithm is proposed and its performance is compared to other precoding algorithms including squared infinity-norm relaxation (SQUID), multi-antenna greedy iterative quantization (MAGIQ), and maximum safety margin precoding. MAGIQ and QCM achieve the highest information rates and QCM has the lowest complexity measured in the number of multiplications. The information rates are computed for pilot-aided channel estimation and data-aided channel estimation. Bit error rates for a 5G low-density parity-check code confirm the information-theoretic calculations. Simulations with imperfect channel knowledge at the transmitter show that the performance of QCM and SQUID degrades in a similar fashion as zero-forcing precoding with high resolution quantizers.
△ Less
Submitted 29 August, 2022; v1 submitted 26 January, 2022;
originally announced January 2022.
-
Achievable Rates for Short-Reach Fiber-Optic Channels with Direct Detection
Authors:
Daniel Plabst,
Tobias Prinz,
Thomas Wiegart,
Talha Rahman,
Nebojša Stojanović,
Stefano Calabrò,
Norbert Hanik,
Gerhard Kramer
Abstract:
Spectrally efficient communication is studied for short-reach fiber-optic links with chromatic dispersion (CD) and receivers that employ direction-detection and oversampling. Achievable rates and symbol error probabilities are computed by using auxiliary channels that account for memory in the sampled symbol strings. Real-alphabet bipolar and complex-alphabet symmetric modulations are shown to ach…
▽ More
Spectrally efficient communication is studied for short-reach fiber-optic links with chromatic dispersion (CD) and receivers that employ direction-detection and oversampling. Achievable rates and symbol error probabilities are computed by using auxiliary channels that account for memory in the sampled symbol strings. Real-alphabet bipolar and complex-alphabet symmetric modulations are shown to achieve significant energy gains over classic intensity modulation. Moreover, frequency-domain raised-cosine (FD-RC) pulses outperform time-domain RC (TD-RC) pulses in terms of spectral efficiency for two scenarios. First, if one shares the spectrum with other users then inter-channel interference significantly reduces the TD-RC rates. Second, if there is a transmit filter to avoid interference then the detection complexity of FD-RC and TD-RC pulses is similar but FD-RC achieves higher rates.
△ Less
Submitted 17 March, 2022; v1 submitted 15 November, 2021;
originally announced November 2021.
-
Regular Perturbation and Achievable Rates of Space-Division Multiplexed Optical Channels
Authors:
Francisco Javier García-Gómez,
Gerhard Kramer
Abstract:
Regular perturbation is applied to space-division multiplexing (SDM) on optical fibers and motivates a correlated rotation-and-additive noise (CRAN) model. For S spatial modes, or 2S complex-alphabet channels, the model has 4S(S+1) hidden independent real Gauss-Markov processes, of which 2S model phase noise, 2S(2S-1) model spatial mode rotation, and 4S model additive noise. Achievable information…
▽ More
Regular perturbation is applied to space-division multiplexing (SDM) on optical fibers and motivates a correlated rotation-and-additive noise (CRAN) model. For S spatial modes, or 2S complex-alphabet channels, the model has 4S(S+1) hidden independent real Gauss-Markov processes, of which 2S model phase noise, 2S(2S-1) model spatial mode rotation, and 4S model additive noise. Achievable information rates of multi-carrier communication are computed by using particle filters. For S=2 spatial modes with strong coupling and a 1000 km link, joint processing of the spatial modes gains 0.5 bits/s/Hz/channel in rate and 1.4 dB in power with respect to separate processing of 2S complex-alphabet channels without considering CRAN.
△ Less
Submitted 27 September, 2021; v1 submitted 19 July, 2021;
originally announced July 2021.
-
Feedback Gains for Gaussian Massive Multiple-Access Channels
Authors:
Gerhard Kramer
Abstract:
Feedback is shown to increase the sum-rate capacity of K-user Gaussian multiple-access channels by at most a factor of approximately 1.54, improving Thomas' doubling bound (1987). The new bound is the best possible in the sense that it can be approached as closely as desired for a massive number of users. Moreover, feedback provides unbounded power gain in K for a fixed transmit power per user.
Feedback is shown to increase the sum-rate capacity of K-user Gaussian multiple-access channels by at most a factor of approximately 1.54, improving Thomas' doubling bound (1987). The new bound is the best possible in the sense that it can be approached as closely as desired for a massive number of users. Moreover, feedback provides unbounded power gain in K for a fixed transmit power per user.
△ Less
Submitted 23 August, 2021; v1 submitted 9 May, 2021;
originally announced May 2021.
-
Divergence Scaling for Distribution Matching
Authors:
Gerhard Kramer
Abstract:
Distribution matchers for finite alphabets are shown to have informational divergences that grow logarithmically with the block length, generalizing a basic result for binary strings.
Distribution matchers for finite alphabets are shown to have informational divergences that grow logarithmically with the block length, generalizing a basic result for binary strings.
△ Less
Submitted 2 May, 2021;
originally announced May 2021.
-
Mismatched Models to Lower Bound the Capacity of Dual-Polarization Optical Fiber Channels
Authors:
Francisco Javier Garcia-Gomez,
Gerhard Kramer
Abstract:
Regular perturbation is applied to the Manakov equation and motivates a generalized correlated phase-and-additive noise model for wavelength-division multiplexing over dual-polarization optical fiber channels. The model includes three hidden Gauss-Markov processes: phase noise, polarization rotation, and additive noise. Particle filtering is used to compute lower bounds on the capacity of multi-ca…
▽ More
Regular perturbation is applied to the Manakov equation and motivates a generalized correlated phase-and-additive noise model for wavelength-division multiplexing over dual-polarization optical fiber channels. The model includes three hidden Gauss-Markov processes: phase noise, polarization rotation, and additive noise. Particle filtering is used to compute lower bounds on the capacity of multi-carrier communication with frequency-dependent powers and delays. A gain of 0.17 bits/s/Hz/pol in spectral efficiency or 0.8 dB in power efficiency is achieved with respect to existing models at their peak data rate. Frequency-dependent delays also increase the spectral efficiency of single-polarization channels.
△ Less
Submitted 16 April, 2021;
originally announced April 2021.
-
Polar-Coded Non-Coherent Communication
Authors:
Peihong Yuan,
Mustafa Cemil Coşkun,
Gerhard Kramer
Abstract:
A polar-coded transmission (PCT) scheme with joint channel estimation and decoding is proposed for channels with unknown channel state information (CSI). The CSI is estimated via successive cancellation (SC) decoding and the constraints imposed by the frozen bits. SC list decoding with an outer code improves performance, including resolving a phase ambiguity when using quadrature phase-shift keyin…
▽ More
A polar-coded transmission (PCT) scheme with joint channel estimation and decoding is proposed for channels with unknown channel state information (CSI). The CSI is estimated via successive cancellation (SC) decoding and the constraints imposed by the frozen bits. SC list decoding with an outer code improves performance, including resolving a phase ambiguity when using quadrature phase-shift keying (QPSK) and Gray labeling. Simulations with 5G polar codes and QPSK show gains of up to $2$~dB at a frame error rate (FER) of $10^{-4}$ over pilot-assisted transmission for various non-coherent models. Moreover, PCT performs within a few tenths of a dB to a coherent receiver with perfect CSI. For Rayleigh block-fading channels, PCT outperforms an FER upper bound based on random coding and within one dB of a lower bound.
△ Less
Submitted 21 February, 2021;
originally announced February 2021.
-
On Skew Convolutional and Trellis Codes
Authors:
Vladimir Sidorenko,
Wenhui Li,
Onur Günlü,
Gerhard Kramer
Abstract:
Two new classes of skew codes over a finite field $\F$ are proposed, called skew convolutional codes and skew trellis codes. These two classes are defined by, respectively, left or right sub-modules over the skew fields of fractions of skew polynomials over $\F$. The skew convolutional codes can be represented as periodic time-varying ordinary convolutional codes. The skew trellis codes are in gen…
▽ More
Two new classes of skew codes over a finite field $\F$ are proposed, called skew convolutional codes and skew trellis codes. These two classes are defined by, respectively, left or right sub-modules over the skew fields of fractions of skew polynomials over $\F$. The skew convolutional codes can be represented as periodic time-varying ordinary convolutional codes. The skew trellis codes are in general nonlinear over $\F$. Every code from both classes has a code trellis and can be decoded by Viterbi or BCJR algorithms.
△ Less
Submitted 2 February, 2021;
originally announced February 2021.
-
Invertible Low-Divergence Coding
Authors:
Patrick Schulte,
Rana Ali Amjad,
Thomas Wiegart,
Gerhard Kramer
Abstract:
Several applications in communication, control, and learning require approximating target distributions to within small informational divergence (I-divergence). The additional requirement of invertibility usually leads to using encoders that are one-to-one map**s, also known as distribution matchers. However, even the best one-to-one encoders have I-divergences that grow logarithmically with the…
▽ More
Several applications in communication, control, and learning require approximating target distributions to within small informational divergence (I-divergence). The additional requirement of invertibility usually leads to using encoders that are one-to-one map**s, also known as distribution matchers. However, even the best one-to-one encoders have I-divergences that grow logarithmically with the block length in general. To improve performance, an encoder is proposed that has an invertible one-to-many map** and a low-rate resolution code. Two algorithms are developed to design the map** by assigning strings in either a most-likely first or least-likely first order. Both algorithms give information rates approaching the entropy of the target distribution with exponentially decreasing I-divergence and with vanishing resolution rate in the block length.
△ Less
Submitted 20 October, 2020;
originally announced October 2020.
-
An Upper Bound on Secret Key Rates for General Multiterminal Wiretap Channels
Authors:
Amin Gohari,
Gerhard Kramer
Abstract:
An upper bound is derived on the secret key rates of a general multiterminal wiretap channel. The bound unifies and generalizes some of the previously known bounds. Additionally, a multivariate dependence balance bound is introduced that is of independent interest.
An upper bound is derived on the secret key rates of a general multiterminal wiretap channel. The bound unifies and generalizes some of the previously known bounds. Additionally, a multivariate dependence balance bound is introduced that is of independent interest.
△ Less
Submitted 6 February, 2023; v1 submitted 30 September, 2020;
originally announced September 2020.
-
Stealth Communication with Vanishing Power over Binary Symmetric Channels
Authors:
Diego Lentner,
Gerhard Kramer
Abstract:
A framework for stealth communication with vanishing power (VP) is presented by studying binary symmetric channels. Coding theorems are proved by modifying Gallager's error exponents for VP and by applying resolvability exponents. The analysis unifies and generalizes existing rate bounds for covert and stealth communication.
A framework for stealth communication with vanishing power (VP) is presented by studying binary symmetric channels. Coding theorems are proved by modifying Gallager's error exponents for VP and by applying resolvability exponents. The analysis unifies and generalizes existing rate bounds for covert and stealth communication.
△ Less
Submitted 16 June, 2020; v1 submitted 13 May, 2020;
originally announced May 2020.
-
Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage
Authors:
Thomas Jerkovits,
Onur Günlü,
Vladimir Sidorenko,
Gerhard Kramer
Abstract:
A key agreement problem is considered that has a biometric or physical identifier, a terminal for key enrollment, and a terminal for reconstruction. A nested convolutional code design is proposed that performs vector quantization during enrollment and error control during reconstruction. Physical identifiers with small bit error probability illustrate the gains of the design. One variant of the ne…
▽ More
A key agreement problem is considered that has a biometric or physical identifier, a terminal for key enrollment, and a terminal for reconstruction. A nested convolutional code design is proposed that performs vector quantization during enrollment and error control during reconstruction. Physical identifiers with small bit error probability illustrate the gains of the design. One variant of the nested convolutional codes improves on the best known key vs. storage rate ratio but it has high complexity. A second variant with lower complexity performs similar to nested polar codes. The results suggest that the choice of code for key agreement with identifiers depends primarily on the complexity constraint.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
Mismatched Models to Lower Bound the Capacity of Optical Fiber Channels
Authors:
Francisco Javier Garcia-Gomez,
Gerhard Kramer
Abstract:
A correlated phase-and-additive-noise (CPAN) mismatched model is developed for wavelength division multiplexing over optical fiber channels governed by the nonlinear Schrödinger equation. Both the phase and additive noise processes of the CPAN model are Gauss-Markov whereas previous work uses Wiener phase noise and white additive noise. Second order statistics are derived and lower bounds on the c…
▽ More
A correlated phase-and-additive-noise (CPAN) mismatched model is developed for wavelength division multiplexing over optical fiber channels governed by the nonlinear Schrödinger equation. Both the phase and additive noise processes of the CPAN model are Gauss-Markov whereas previous work uses Wiener phase noise and white additive noise. Second order statistics are derived and lower bounds on the capacity are computed by simulations. The CPAN model characterizes nonlinearities better than existing models in the sense that it achieves better information rates. For example, the model gains 0.35 dB in power at the peak data rate when using a single carrier per wavelength. For multiple carriers per wavelength, the model combined with frequency-dependent power allocation gains 0.14 bits/s/Hz in rate and 0.8 dB in power at the peak data rate.
△ Less
Submitted 15 September, 2020; v1 submitted 8 April, 2020;
originally announced April 2020.
-
Secure and Reliable Key Agreement with Physical Unclonable Functions
Authors:
Onur Günlü,
Tasnad Kernetzky,
Onurcan İşcan,
Vladimir Sidorenko,
Gerhard Kramer,
Rafael F. Schaefer
Abstract:
Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the dec…
▽ More
Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the uniqueness and reliability of extracted bit sequences, to reduce the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length. Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods. A reference hardware implementation is also provided to demonstrate that the transform-coding approach occupies a small hardware area.
△ Less
Submitted 27 February, 2020; v1 submitted 26 February, 2020;
originally announced February 2020.
-
Finite-Precision Implementation of Arithmetic Coding Based Distribution Matchers
Authors:
Marcin Pikus,
Wen Xu,
Gerhard Kramer
Abstract:
A distribution matcher (DM) encodes a binary input data sequence into a sequence of symbols with a desired target probability distribution. Several DMs, including shell map** and constant-composition distribution matcher (CCDM), have been successfully employed for signal sha**, e.g., in optical-fiber or 5G. The CCDM, like many other DMs, is typically implemented by arithmetic coding (AC). In t…
▽ More
A distribution matcher (DM) encodes a binary input data sequence into a sequence of symbols with a desired target probability distribution. Several DMs, including shell map** and constant-composition distribution matcher (CCDM), have been successfully employed for signal sha**, e.g., in optical-fiber or 5G. The CCDM, like many other DMs, is typically implemented by arithmetic coding (AC). In this work we implement AC based DMs using finite-precision arithmetic (FPA). An analysis of the implementation shows that FPA results in a rate-loss that shrinks exponentially with the number of precision bits. Moreover, a relationship between the CCDM rate and the number of precision bits is derived.
△ Less
Submitted 28 July, 2019;
originally announced July 2019.
-
Private Authentication with Physical Identifiers Through Broadcast Channel Measurements
Authors:
Onur Günlü,
Rafael F. Schaefer,
Gerhard Kramer
Abstract:
A basic model for key agreement with biometric or physical identifiers is extended to include measurements of a hidden source through a general broadcast channel (BC). An inner bound for strong secrecy, maximum key rate, and minimum privacy-leakage and database-storage rates is proposed. The inner bound is shown to be tight for physically-degraded and less-noisy BCs.
A basic model for key agreement with biometric or physical identifiers is extended to include measurements of a hidden source through a general broadcast channel (BC). An inner bound for strong secrecy, maximum key rate, and minimum privacy-leakage and database-storage rates is proposed. The inner bound is shown to be tight for physically-degraded and less-noisy BCs.
△ Less
Submitted 4 March, 2020; v1 submitted 1 July, 2019;
originally announced July 2019.
-
Joint State Sensing and Communication over Memoryless Multiple Access Channels
Authors:
Mari Kobayashi,
Hassan Hamad,
Gerhard Kramer,
Giuseppe Caire
Abstract:
A memoryless state-dependent multiple access channel (MAC) is considered where two transmitters wish to convey a respective message to a receiver while simultaneously estimating the respective channel state via generalized feedback. The scenario is motivated by a joint radar and communication system where the radar and data applications share the same bandwidth. An achievable capacity-distortion t…
▽ More
A memoryless state-dependent multiple access channel (MAC) is considered where two transmitters wish to convey a respective message to a receiver while simultaneously estimating the respective channel state via generalized feedback. The scenario is motivated by a joint radar and communication system where the radar and data applications share the same bandwidth. An achievable capacity-distortion tradeoff region is derived that outperforms a resource-sharing scheme through a binary erasure MAC with binary states.
△ Less
Submitted 11 February, 2019;
originally announced February 2019.
-
Sum-Rate Capacity for Symmetric Gaussian Multiple Access Channels with Feedback
Authors:
Erixhen Sula,
Michael Gastpar,
Gerhard Kramer
Abstract:
The feedback sum-rate capacity is established for the symmetric $J$-user Gaussian multiple-access channel (GMAC). The main contribution is a converse bound that combines the dependence-balance argument of Hekstra and Willems (1989) with a variant of the factorization of a convex envelope of Geng and Nair (2014). The converse bound matches the achievable sum-rate of the Fourier-Modulated Estimate C…
▽ More
The feedback sum-rate capacity is established for the symmetric $J$-user Gaussian multiple-access channel (GMAC). The main contribution is a converse bound that combines the dependence-balance argument of Hekstra and Willems (1989) with a variant of the factorization of a convex envelope of Geng and Nair (2014). The converse bound matches the achievable sum-rate of the Fourier-Modulated Estimate Correction strategy of Kramer (2002).
△ Less
Submitted 23 November, 2018;
originally announced November 2018.
-
Optimization of Bit Map** and Quantized Decoding for Off-the-Shelf Protograph LDPC Codes with Application to IEEE 802.3ca
Authors:
Fabian Steiner,
Gerhard Kramer
Abstract:
Protograph-based, off-the-shelf low-density parity-check (LDPC) codes are optimized for higher-order modulation and quantized sum-product decoders. As an example, for the recently proposed LDPC code from the upcoming IEEE 802.3ca standard for passive optical networks (PONs), an optimized map** of the bit channels originating from bit-metric decoding to the protograph variable nodes gains 0.4 dB…
▽ More
Protograph-based, off-the-shelf low-density parity-check (LDPC) codes are optimized for higher-order modulation and quantized sum-product decoders. As an example, for the recently proposed LDPC code from the upcoming IEEE 802.3ca standard for passive optical networks (PONs), an optimized map** of the bit channels originating from bit-metric decoding to the protograph variable nodes gains 0.4 dB and 0.3 dB at a bit-error rate of 1e-6 for shaped and uniform signaling, respectively. Furthermore, the clip** value for a quantized sum-product LDPC decoder is optimized via discretized density evolution.
△ Less
Submitted 30 September, 2018;
originally announced October 2018.
-
Joint State Sensing and Communication: Optimal Tradeoff for a Memoryless Case
Authors:
Mari Kobayashi,
Giuseppe Caire,
Gerhard Kramer
Abstract:
A communication setup is considered where a transmitter wishes to simultaneously sense its channel state and convey a message to a receiver. The state is estimated at the transmitter by means of generalized feedback, i.e. a strictly causal channel output that is observed at the transmitter. The scenario is motivated by a joint radar and communication system where the radar and data applications sh…
▽ More
A communication setup is considered where a transmitter wishes to simultaneously sense its channel state and convey a message to a receiver. The state is estimated at the transmitter by means of generalized feedback, i.e. a strictly causal channel output that is observed at the transmitter. The scenario is motivated by a joint radar and communication system where the radar and data applications share the same frequency band. For the case of a memoryless channel with i.i.d. state sequences, we characterize the capacity-distortion tradeoff, defined as the best achievable rate below which a message can be conveyed reliably while satisfying some distortion constraint on state sensing. An iterative algorithm is proposed to optimize the input probability distribution. Examples demonstrate the benefits of joint sensing and communication as compared to a separation-based approach.
△ Less
Submitted 15 May, 2018;
originally announced May 2018.
-
Experimental Verification of Rate Flexibility and Probabilistic Sha** by 4D Signaling
Authors:
Fabian Steiner,
Francesco Da Ros,
Metodi Plamenov Yankov,
Georg Böcherer,
Patrick Schulte,
Søren Forchhammer,
Gerhard Kramer
Abstract:
The rate flexibility and probabilistic sha** gain of $4$-dimensional signaling is experimentally tested for short-reach, unrepeated transmission. A rate granularity of 0.5 bits/QAM symbol is achieved with a distribution matcher based on a simple look-up table.
The rate flexibility and probabilistic sha** gain of $4$-dimensional signaling is experimentally tested for short-reach, unrepeated transmission. A rate granularity of 0.5 bits/QAM symbol is achieved with a distribution matcher based on a simple look-up table.
△ Less
Submitted 18 March, 2018;
originally announced March 2018.
-
Analysis of Massive MIMO and Base Station Cooperation in an Indoor Scenario
Authors:
Stefan Dierks,
Gerhard Kramer,
Berthold Panzner,
Wolfgang Zirwas
Abstract:
The performance of centralized and distributed massive MIMO deployments are analyzed for indoor office scenarios. The distributed deployments use one of the following precoding methods: (1) local precoding with local channel state information (CSI) to the user equipments (UEs) that it serves; (2) large-scale MIMO with local CSI to all UEs in the network; (3) network MIMO with global CSI. For the d…
▽ More
The performance of centralized and distributed massive MIMO deployments are analyzed for indoor office scenarios. The distributed deployments use one of the following precoding methods: (1) local precoding with local channel state information (CSI) to the user equipments (UEs) that it serves; (2) large-scale MIMO with local CSI to all UEs in the network; (3) network MIMO with global CSI. For the distributed deployments (2) and (3), it is shown that using twice as many base station antennas as data streams provides many of the massive MIMO benefits in terms of spectral efficiency and fairness. This is in contrast to the centralized deployment and the distributed deployment (1) where more antennas are needed. Two of the main conclusions are that distributing base stations helps to overcome wall penetration loss; however, a backhaul is required to mitigate inter-cell interference. The effect of estimation errors on the performance is also quantified.
△ Less
Submitted 10 January, 2018; v1 submitted 9 January, 2018;
originally announced January 2018.
-
Quantized Precoding for Multi-Antenna Downlink Channels with MAGIQ
Authors:
Andrei Nedelcu,
Fabian Steiner,
Markus Staudacher,
Gerhard Kramer,
Wolfgang Zirwas,
Rakash Sivasiva Ganesan,
Paolo Baracca,
Stefan Wesemann
Abstract:
A multi-antenna, greedy, iterative, and quantized (MAGIQ) precoding algorithm is proposed for downlink channels. MAGIQ allows a straightforward integration with orthogonal frequency-division multiplexing (OFDM). MAGIQ is compared to three existing algorithms in terms of information rates and complexity: quantized linear precoding (QLP), SQUID, and an ADMM-based algorithm. The information rate is m…
▽ More
A multi-antenna, greedy, iterative, and quantized (MAGIQ) precoding algorithm is proposed for downlink channels. MAGIQ allows a straightforward integration with orthogonal frequency-division multiplexing (OFDM). MAGIQ is compared to three existing algorithms in terms of information rates and complexity: quantized linear precoding (QLP), SQUID, and an ADMM-based algorithm. The information rate is measured by using a lower bound for finite modulation sets, and the complexity is measured by the number of multiplications and comparisons. MAGIQ and ADMM achieve similar information rates with similar complexity for Rayleigh flat-fading channels and one-bit quantization per real dimension, and they outperform QLP and SQUID for higher order modulation.
△ Less
Submitted 2 March, 2018; v1 submitted 23 December, 2017;
originally announced December 2017.
-
Coding for Positive Rate in the Source Model Key Agreement Problem
Authors:
Amin Gohari,
Onur Günlü,
Gerhard Kramer
Abstract:
A two-party key agreement problem with public discussion, known as the source model problem, is considered. By relating key agreement to hypothesis testing, a new coding scheme is developed that yields a sufficient condition to achieve a positive secret-key (SK) rate in terms of Rényi divergence. The merits of this coding scheme are illustrated by applying it to an erasure model for Eve's side inf…
▽ More
A two-party key agreement problem with public discussion, known as the source model problem, is considered. By relating key agreement to hypothesis testing, a new coding scheme is developed that yields a sufficient condition to achieve a positive secret-key (SK) rate in terms of Rényi divergence. The merits of this coding scheme are illustrated by applying it to an erasure model for Eve's side information, and by deriving an upper bound on Eve's erasure probabilities for which the SK capacity is zero. This bound strictly improves on the best known single-letter lower bound on the SK capacity. Moreover, the bound is tight when Alice's or Bob's source is binary, which extends a previous result for a doubly symmetric binary source. The results motivate a new measure for the correlation between two random variables, which is of independent interest.
△ Less
Submitted 22 July, 2020; v1 submitted 15 September, 2017;
originally announced September 2017.
-
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Authors:
Onur Günlü,
Onurcan İşcan,
Vladimir Sidorenko,
Gerhard Kramer
Abstract:
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-storage regions of the generated-secret and chosen-secret models. The second construction uses nested polar codes for vector quantization during…
▽ More
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-storage regions of the generated-secret and chosen-secret models. The second construction uses nested polar codes for vector quantization during enrollment and for error correction during reconstruction. Simulations show that the nested polar codes achieve privacy-leakage and storage rates that improve on existing code designs. One proposed code achieves a rate tuple that cannot be achieved by existing methods.
△ Less
Submitted 3 April, 2019; v1 submitted 1 September, 2017;
originally announced September 2017.
-
Energy Conservation in Optical Fibers with Distributed Brick-Walls Filters
Authors:
Javier Garcia,
Hassan Ghozlan,
Gerhard Kramer
Abstract:
A band-pass filtering scheme is proposed to mitigate spectral broadening and channel coupling in the Nonlinear Schrödinger (NLS) fiber optic channel. The scheme is modeled by modifying the NLS Equation to include an attenuation profile with multiple brick-wall filters centered at different frequencies. It is shown that this brick-walls profile conserves the total in-band energy of the launch signa…
▽ More
A band-pass filtering scheme is proposed to mitigate spectral broadening and channel coupling in the Nonlinear Schrödinger (NLS) fiber optic channel. The scheme is modeled by modifying the NLS Equation to include an attenuation profile with multiple brick-wall filters centered at different frequencies. It is shown that this brick-walls profile conserves the total in-band energy of the launch signal. Furthermore, energy fluctuations between the filtered channels are characterized, and conditions on the channel spacings are derived that ensure energy conservation in each channel. The maximum spectral efficiency of such a system is derived, and a constructive rule for achieving it using Sidon sequences is provided.
△ Less
Submitted 29 December, 2017; v1 submitted 17 July, 2017;
originally announced July 2017.
-
Autocorrelation Function for Dispersion-Free Fiber Channels with Distributed Amplification
Authors:
Gerhard Kramer
Abstract:
Optical fiber signals with high power exhibit spectral broadening that seems to limit capacity. To study spectral broadening, the autocorrelation function of the output signal given the input signal is derived for a simplified fiber model that has zero dispersion, distributed optical amplification (OA), and idealized spatial noise processes. The autocorrelation function is used to upper bound the…
▽ More
Optical fiber signals with high power exhibit spectral broadening that seems to limit capacity. To study spectral broadening, the autocorrelation function of the output signal given the input signal is derived for a simplified fiber model that has zero dispersion, distributed optical amplification (OA), and idealized spatial noise processes. The autocorrelation function is used to upper bound the output power of bandlimited or time-resolution limited receivers, and thereby to bound spectral broadening and the capacity of receivers with thermal noise. The output power scales at most as the square-root of the launch power, and thus capacity scales at most as one-half the logarithm of the launch power. The propagating signal bandwidth scales at least as the square-root of the launch power. However, in practice the OA bandwidth should exceed the signal bandwidth to compensate attenuation. Hence, there is a launch power threshold beyond which the fiber model loses practical relevance. Nevertheless, for the mathematical model an upper bound on capacity is developed when the OA bandwidth scales as the square-root of the launch power, in which case capacity scales at most as the inverse fourth root of the launch power.
△ Less
Submitted 1 January, 2018; v1 submitted 1 May, 2017;
originally announced May 2017.
-
Constructing Receiver Signal Points using Constrained Massive MIMO Arrays
Authors:
Markus Staudacher,
Gerhard Kramer,
Wolfgang Zirwas,
Berthold Panzner,
Rakash Sivasiva Ganesan
Abstract:
A low cost solution for constructing receiver signal points is investigated that combines a large number of constrained radio frequency (RF) frontends with a limited number of full RF chains. The constrained RF front ends have low cost and are limited to on/off switching of antenna elements and a small number of phases. Severe degradations are typically observed for multi-user MIMO for these simpl…
▽ More
A low cost solution for constructing receiver signal points is investigated that combines a large number of constrained radio frequency (RF) frontends with a limited number of full RF chains. The constrained RF front ends have low cost and are limited to on/off switching of antenna elements and a small number of phases. Severe degradations are typically observed for multi-user MIMO for these simple on/off antenna arrays. A few full RF frontends are shown to compensate for the signal errors of the high number of constrained RF frontends for various scenarios. An algorithm for such a hybrid RF (HRF) system is developed that achieves performance close to that of exhaustive search with respect to the mean square error of the constructed receiver signals for Rayleigh fading and the WINNER 2 Urban Macro channel model.
△ Less
Submitted 8 February, 2017;
originally announced February 2017.
-
Capacity Bounds on the Downlink of Symmetric, Multi-Relay, Single Receiver C-RAN Networks
Authors:
Shirin Saeedi Bidokhti,
Gerhard Kramer,
Shlomo Shamai
Abstract:
The downlink of symmetric Cloud Radio Access Networks (C-RANs) with multiple relays and a single receiver is studied. Lower and upper bounds are derived on the capacity. The lower bound is achieved by Marton's coding which facilitates dependence among the multiple-access channel inputs. The upper bound uses Ozarow's technique to augment the system with an auxiliary random variable. The bounds are…
▽ More
The downlink of symmetric Cloud Radio Access Networks (C-RANs) with multiple relays and a single receiver is studied. Lower and upper bounds are derived on the capacity. The lower bound is achieved by Marton's coding which facilitates dependence among the multiple-access channel inputs. The upper bound uses Ozarow's technique to augment the system with an auxiliary random variable. The bounds are studied over scalar Gaussian C-RANs and are shown to meet and characterize the capacity for interesting regimes of operation.
△ Less
Submitted 22 February, 2017; v1 submitted 6 February, 2017;
originally announced February 2017.
-
Privacy, Secrecy, and Storage with Multiple Noisy Measurements of Identifiers
Authors:
Onur Günlü,
Gerhard Kramer
Abstract:
The key-leakage-storage region is derived for a generalization of a classic two-terminal key agreement model. The additions to the model are that the encoder observes a hidden, or noisy, version of the identifier, and that the encoder and decoder can perform multiple measurements. To illustrate the behavior of the region, the theory is applied to binary identifiers and noise modeled via binary sym…
▽ More
The key-leakage-storage region is derived for a generalization of a classic two-terminal key agreement model. The additions to the model are that the encoder observes a hidden, or noisy, version of the identifier, and that the encoder and decoder can perform multiple measurements. To illustrate the behavior of the region, the theory is applied to binary identifiers and noise modeled via binary symmetric channels. In particular, the key-leakage-storage region is simplified by applying Mrs. Gerber's lemma twice in different directions to a Markov chain. The growth in the region as the number of measurements increases is quantified. The amount by which the privacy-leakage rate reduces for a hidden identifier as compared to a noise-free (visible) identifier at the encoder is also given. If the encoder incorrectly models the source as visible, it is shown that substantial secrecy leakage may occur and the reliability of the reconstructed key might decrease.
△ Less
Submitted 30 April, 2018; v1 submitted 25 January, 2016;
originally announced January 2016.
-
Strong Secrecy for Cooperative Broadcast Channels
Authors:
Ziv Goldfeld,
Gerhard Kramer,
Haim H. Permuter,
Paul Cuff
Abstract:
A broadcast channel (BC) where the decoders cooperate via a one-sided link is considered. One common and two private messages are transmitted and the private message to the cooperative user should be kept secret from the cooperation-aided user. The secrecy level is measured in terms of strong secrecy, i.e., a vanishing information leakage. An inner bound on the capacity region is derived by using…
▽ More
A broadcast channel (BC) where the decoders cooperate via a one-sided link is considered. One common and two private messages are transmitted and the private message to the cooperative user should be kept secret from the cooperation-aided user. The secrecy level is measured in terms of strong secrecy, i.e., a vanishing information leakage. An inner bound on the capacity region is derived by using a channel-resolvability-based code that double-bins the codebook of the secret message, and by using a likelihood encoder to choose the transmitted codeword. The inner bound is shown to be tight for semi-deterministic and physically degraded BCs and the results are compared to those of the corresponding BCs without a secrecy constraint. Blackwell and Gaussian BC examples illustrate the impact of secrecy on the rate regions. Unlike the case without secrecy, where sharing information about both private messages via the cooperative link is optimal, our protocol conveys parts of the common and non-confidential messages only. This restriction reduces the transmission rates more than the usual rate loss due to secrecy requirements. An example that illustrates this loss is provided.
△ Less
Submitted 28 May, 2019; v1 submitted 6 January, 2016;
originally announced January 2016.
-
Capacity Bounds for Discrete-Time, Amplitude-Constrained, Additive White Gaussian Noise Channels
Authors:
Andrew Thangaraj,
Gerhard Kramer,
Georg Bocherer
Abstract:
The capacity-achieving input distribution of the discrete-time, additive white Gaussian noise (AWGN) channel with an amplitude constraint is discrete and seems difficult to characterize explicitly. A dual capacity expression is used to derive analytic capacity upper bounds for scalar and vector AWGN channels. The scalar bound improves on McKellips' bound and is within 0.1 bits of capacity for all…
▽ More
The capacity-achieving input distribution of the discrete-time, additive white Gaussian noise (AWGN) channel with an amplitude constraint is discrete and seems difficult to characterize explicitly. A dual capacity expression is used to derive analytic capacity upper bounds for scalar and vector AWGN channels. The scalar bound improves on McKellips' bound and is within 0.1 bits of capacity for all signal-to-noise ratios (SNRs). The two-dimensional bound is within 0.15 bits of capacity provably up to 4.5 dB, and numerical evidence suggests a similar gap for all SNRs.
△ Less
Submitted 27 November, 2015;
originally announced November 2015.
-
Capacity Bounds for Diamond Networks with an Orthogonal Broadcast Channel
Authors:
Shirin Saeedi Bidokhti,
Gerhard Kramer
Abstract:
A class of diamond networks is studied where the broadcast component is orthogonal and modeled by two independent bit-pipes. New upper and lower bounds on the capacity are derived. The proof technique for the upper bound generalizes bounding techniques of Ozarow for the Gaussian multiple description problem (1981) and Kang and Liu for the Gaussian diamond network (2011). The lower bound is based o…
▽ More
A class of diamond networks is studied where the broadcast component is orthogonal and modeled by two independent bit-pipes. New upper and lower bounds on the capacity are derived. The proof technique for the upper bound generalizes bounding techniques of Ozarow for the Gaussian multiple description problem (1981) and Kang and Liu for the Gaussian diamond network (2011). The lower bound is based on Marton's coding technique and superposition coding. The bounds are evaluated for Gaussian and binary adder multiple access channels (MACs). For Gaussian MACs, both the lower and upper bounds strengthen the Kang-Liu bounds and establish capacity for interesting ranges of bit-pipe capacities. For binary adder MACs, the capacity is established for all ranges of bit-pipe capacities.
△ Less
Submitted 4 October, 2015;
originally announced October 2015.
-
Quasi-Concavity for Gaussian Multicast Relay Channels
Authors:
Mohit Thakur,
Gerhard Kramer
Abstract:
Standard upper and lower bounds on the capacity of relay channels are cut-set (CS), decode-forward (DF), and quantize-forward (QF) rates. For real additive white Gaussian noise (AWGN) multicast relay channels with one source node and one relay node, these bounds are shown to be quasi-concave in the receiver signal-to-noise ratios and the squared source-relay correlation coefficient. Furthermore, t…
▽ More
Standard upper and lower bounds on the capacity of relay channels are cut-set (CS), decode-forward (DF), and quantize-forward (QF) rates. For real additive white Gaussian noise (AWGN) multicast relay channels with one source node and one relay node, these bounds are shown to be quasi-concave in the receiver signal-to-noise ratios and the squared source-relay correlation coefficient. Furthermore, the CS rates are shown to be quasi-concave in the relay position for a fixed correlation coefficient, and the DF rates are shown to be quasi-concave in the relay position. The latter property characterizes the optimal relay position when using DF.
△ Less
Submitted 24 January, 2019; v1 submitted 8 June, 2015;
originally announced June 2015.
-
Broadcast Channels with Privacy Leakage Constraints
Authors:
Ziv Goldfeld,
Gerhard Kramer,
Haim H. Permuter
Abstract:
The broadcast channel (BC) with one common and two private messages with leakage constraints is studied, where leakage rate refers to the normalized mutual information between a message and a channel symbol string. Each private message is destined for a different user and the leakage rate to the other receiver must satisfy a constraint. This model captures several scenarios concerning secrecy, i.e…
▽ More
The broadcast channel (BC) with one common and two private messages with leakage constraints is studied, where leakage rate refers to the normalized mutual information between a message and a channel symbol string. Each private message is destined for a different user and the leakage rate to the other receiver must satisfy a constraint. This model captures several scenarios concerning secrecy, i.e., when both, either or neither of the private messages are secret. Inner and outer bounds on the leakage-capacity region are derived when the eavesdropper knows the codebook. The inner bound relies on a Marton-like code construction and the likelihood encoder. A Uniform Approximation Lemma is established that states that the marginal distribution induced by the encoder on each of the bins in the Marton codebook is approximately uniform. Without leakage constraints the inner bound recovers Marton's region and the outer bound reduces to the UVW-outer bound. The bounds match for semi-deterministic (SD) and physically degraded (PD) BCs, as well as for BCs with a degraded message set. The leakage-capacity regions of the SD-BC and the BC with a degraded message set recover past results for different secrecy scenarios. A Blackwell BC example illustrates the results and shows how its leakage-capacity region changes from the capacity region without secrecy to the secrecy-capacity regions for different secrecy scenarios.
△ Less
Submitted 28 May, 2017; v1 submitted 23 April, 2015;
originally announced April 2015.