-
Retrieving sinusoids from nonuniformly sampled data using recursive formulation
Authors:
Ivan Maric
Abstract:
A heuristic procedure based on novel recursive formulation of sinusoid (RFS) and on regression with predictive least-squares (LS) enables to decompose both uniformly and nonuniformly sampled 1-d signals into a sparse set of sinusoids (SSS). An optimal SSS is found by Levenberg-Marquardt (LM) optimization of RFS parameters of near-optimal sinusoids combined with common criteria for the estimation o…
▽ More
A heuristic procedure based on novel recursive formulation of sinusoid (RFS) and on regression with predictive least-squares (LS) enables to decompose both uniformly and nonuniformly sampled 1-d signals into a sparse set of sinusoids (SSS). An optimal SSS is found by Levenberg-Marquardt (LM) optimization of RFS parameters of near-optimal sinusoids combined with common criteria for the estimation of the number of sinusoids embedded in noise. The procedure estimates both the cardinality and the parameters of SSS. The proposed algorithm enables to identify the RFS parameters of a sinusoid from a data sequence containing only a fraction of its cycle. In extreme cases when the frequency of a sinusoid approaches zero the algorithm is able to detect a linear trend in data. Also, an irregular sampling pattern enables the algorithm to correctly reconstruct the under-sampled sinusoid. Parsimonious nature of the obtaining models opens the possibilities of using the proposed method in machine learning and in expert and intelligent systems needing analysis and simple representation of 1-d signals. The properties of the proposed algorithm are evaluated on examples of irregularly sampled artificial signals in noise and are compared with high accuracy frequency estimation algorithms based on linear prediction (LP) approach, particularly with respect to Cramer-Rao Bound (CRB).
△ Less
Submitted 12 April, 2017; v1 submitted 14 December, 2016;
originally announced December 2016.
-
Capacity-Achieving Rate-Compatible Polar Codes for General Channels
Authors:
Marco Mondelli,
S. Hamed Hassani,
Ivana Marić,
Dennis Hui,
Song-Nam Hong
Abstract:
We present a rate-compatible polar coding scheme that achieves the capacity of any family of channels. Our solution generalizes the previous results [1], [2] that provide capacity-achieving rate-compatible polar codes for a degraded family of channels. The motivation for our extension comes from the fact that in many practical scenarios, e.g., MIMO systems and non-Gaussian interference, the channe…
▽ More
We present a rate-compatible polar coding scheme that achieves the capacity of any family of channels. Our solution generalizes the previous results [1], [2] that provide capacity-achieving rate-compatible polar codes for a degraded family of channels. The motivation for our extension comes from the fact that in many practical scenarios, e.g., MIMO systems and non-Gaussian interference, the channels cannot be ordered by degradation. The main technical contribution of this paper consists in removing the degradation condition. To do so, we exploit the ideas coming from the construction of universal polar codes.
Our scheme possesses the usual attractive features of polar codes: low complexity code construction, encoding, and decoding; super-polynomial scaling of the error probability with the block length; and absence of error floors. On the negative side, the scaling of the gap to capacity with the block length is slower than in standard polar codes, and we prove an upper bound on the scaling exponent.
△ Less
Submitted 20 January, 2017; v1 submitted 3 November, 2016;
originally announced November 2016.
-
Capacity-Achieving Rate-Compatible Polar Codes
Authors:
Song-Nam Hong,
Dennis Hui,
Ivana Marić
Abstract:
We present a method of constructing rate-compatible polar codes that are capacity-achieving with low-complexity sequential decoders. The proposed code construction allows for incremental retransmissions at different rates in order to adapt to channel conditions. The main idea of the construction exploits the common characteristics of polar codes optimized for a sequence of successively degraded ch…
▽ More
We present a method of constructing rate-compatible polar codes that are capacity-achieving with low-complexity sequential decoders. The proposed code construction allows for incremental retransmissions at different rates in order to adapt to channel conditions. The main idea of the construction exploits the common characteristics of polar codes optimized for a sequence of successively degraded channels. The proposed approach allows for an optimized polar code to be used at every transmission thereby achieving capacity.
△ Less
Submitted 27 January, 2016; v1 submitted 6 October, 2015;
originally announced October 2015.
-
A Novel Cooperative Strategy for Wireless Multihop Backhaul Networks
Authors:
Song-Nam Hong,
Ivana Maric,
Dennis Hui
Abstract:
The 5G wireless network architecture will bring dense deployments of base stations called {\em small cells} for both outdoors and indoors traffic. The feasibility of their dense deployments depends on the existence of a high data-rate transport network that can provide high-data backhaul from an aggregation node where data traffic originates and terminates, to every such small cell. Due to the lim…
▽ More
The 5G wireless network architecture will bring dense deployments of base stations called {\em small cells} for both outdoors and indoors traffic. The feasibility of their dense deployments depends on the existence of a high data-rate transport network that can provide high-data backhaul from an aggregation node where data traffic originates and terminates, to every such small cell. Due to the limited range of radio signals in the high frequency bands, multihop wireless connection may need to be established between each access node and an aggregation node. In this paper, we present a novel transmission scheme for wireless multihop backhaul for 5G networks. The scheme consists of 1) {\em group successive relaying} that established a relay schedule to efficiently exploit half-duplex relays and 2) an optimized quantize-map-and-forward (QMF) coding scheme that improves the performance of QMF and reduces the decoding complexity and the delay. We derive an achievable rate region of the proposed scheme and attain a closed-form expression in the asymptotic case for several network models of interests. It is shown that the proposed scheme provides a significant gain over multihop routing (based on decode-and-forward), which is a solution currently proposed for wireless multihop backhaul network. Furthermore, the performance gap increases as a network becomes denser. For the proposed scheme, we then develop energy-efficient routing that determines {\em groups} of participating relays for every hop. To reflect the metric used in the routing algorithm, we refer to it as {\em interference-harnessing} routing. By turning interference into a useful signal, each relay requires a lower transmission power to achieve a desired performance compared to other routing schemes. Finally, we present a low-complexity successive decoder, which makes it feasible to use the proposed scheme in practice.
△ Less
Submitted 1 August, 2015;
originally announced August 2015.
-
On the Achievable Rates of Multihop Virtual Full-Duplex Relay Channels
Authors:
Song-Nam Hong,
Ivana Maric,
Dennis Hui,
Giuseppe Caire
Abstract:
We study a multihop "virtual" full-duplex relay channel as a special case of a general multiple multicast relay network. For such channel, quantize-map-and-forward (QMF) (or noisy network coding (NNC)) achieves the cut-set upper bound within a constant gap where the gap grows {\em linearly} with the number of relay stages $K$. However, this gap may not be negligible for the systems with multihop t…
▽ More
We study a multihop "virtual" full-duplex relay channel as a special case of a general multiple multicast relay network. For such channel, quantize-map-and-forward (QMF) (or noisy network coding (NNC)) achieves the cut-set upper bound within a constant gap where the gap grows {\em linearly} with the number of relay stages $K$. However, this gap may not be negligible for the systems with multihop transmissions (i.e., a wireless backhaul operating at higher frequencies). We have recently attained an improved result to the capacity scaling where the gap grows {\em logarithmically} as $\log{K}$, by using an optimal quantization at relays and by exploiting relays' messages (decoded in the previous time slot) as side-information. In this paper, we further improve the performance of this network by presenting a mixed scheme where each relay can perform either decode-and-forward (DF) or QMF with possibly rate-splitting. We derive the achievable rate and show that the proposed scheme outperforms the QMF-optimized scheme. Furthermore, we demonstrate that this performance improvement increases with $K$.
△ Less
Submitted 23 April, 2015; v1 submitted 26 January, 2015;
originally announced January 2015.
-
Diversity-Multiplexing Tradeoff for the Interference Channel with a Relay
Authors:
Daniel Zahavi,
Lili Zhang,
Ivana Maric,
Ron Dabora,
Andrea J. Goldsmith,
Shuguang Cui
Abstract:
We study the diversity-multiplexing tradeoff (DMT) for the slow fading interference channel with a relay (ICR). We derive four inner bounds on the DMT region: the first is based on the compress-and-forward (CF) relaying scheme, the second is based on the decode-and-forward (DF) relaying scheme, and the last two bounds are based on the half-duplex (HD) and full-duplex (FD) amplify-and-forward (AF)…
▽ More
We study the diversity-multiplexing tradeoff (DMT) for the slow fading interference channel with a relay (ICR). We derive four inner bounds on the DMT region: the first is based on the compress-and-forward (CF) relaying scheme, the second is based on the decode-and-forward (DF) relaying scheme, and the last two bounds are based on the half-duplex (HD) and full-duplex (FD) amplify-and-forward (AF) schemes. For the CF and DF schemes, we find conditions on the channel parameters and the multiplexing gains, under which the corresponding inner bound achieves the optimal DMT region. We also identify cases in which the DMT region of the ICR corresponds to that of two parallel slow fading relay channels, implying that interference does not decrease the DMT for each pair, and that a single relay can be DMT-optimal for two pairs simultaneously. For the HD-AF scheme we derive conditions on the channel coefficients under which the proposed scheme achieves the optimal DMT for the AF-based relay channel. Lastly, we identify conditions under which adding a relay strictly enlarges the DMT region relative to the interference channel without a relay.
△ Less
Submitted 15 December, 2014;
originally announced December 2014.
-
Short Message Noisy Network Coding with Rate Splitting
Authors:
Ivana Maric,
Dennis Hui
Abstract:
Short message noisy network coding with rate splitting (SNNC-RS) encoding strategy is presented. It has been shown by Hou and Kramer that mixed cooperative strategies in which relays in favorable positions perform decode-and-forward (DF) and the rest of the relays perform short message noisy network coding (SNNC) can outperform noisy network coding (NNC). Our proposed strategy further improves the…
▽ More
Short message noisy network coding with rate splitting (SNNC-RS) encoding strategy is presented. It has been shown by Hou and Kramer that mixed cooperative strategies in which relays in favorable positions perform decode-and-forward (DF) and the rest of the relays perform short message noisy network coding (SNNC) can outperform noisy network coding (NNC). Our proposed strategy further improves the rate performance of such mixed SNNC-DF cooperative strategy. In the proposed scheme, superposition coding is incorporated into the SNNC encoding in order to facilitate partial interference cancellation at DF relays, thereby increasing the overall rate. To demonstrate gains of the proposed SNNC-RS strategy, the achievable rate is analyzed for the discrete memoryless two-relay network with one DF relay and one SNNC-RS relay and compared to the case without rate-splitting. The obtained rate is evaluated in the Gaussian two-relay network and gains over the rate achieved without rate splitting are demonstrated.
△ Less
Submitted 18 December, 2014; v1 submitted 31 March, 2014;
originally announced April 2014.
-
Low Latency Communications
Authors:
Ivana Maric
Abstract:
Numerous applications demand communication schemes that minimize the transmission delay while achieving a given level of reliability. An extreme case is high-frequency trading whereby saving a fraction of millisecond over a route between Chicago and New York can be a game-changer. While such communications are often carried by fiber, microwave links can reduce transmission delays over large distan…
▽ More
Numerous applications demand communication schemes that minimize the transmission delay while achieving a given level of reliability. An extreme case is high-frequency trading whereby saving a fraction of millisecond over a route between Chicago and New York can be a game-changer. While such communications are often carried by fiber, microwave links can reduce transmission delays over large distances due to more direct routes and faster wave propagation. In order to bridge large distances, information is sent over a multihop relay network.
Motivated by these applications, this papers present an information-theoretic approach to the design of optimal multihop microwave networks that minimizes end-to-end transmission delay. To characterize the delay introduced by coding, we derive error exponents achievable in multihop networks. We formulate and solve an optimization problem that determines optimal selection of amplify-and-forward and decode-and-forward relays. We present the optimal solution for several examples of networks. We prove that in high SNR the optimum transmission scheme is for all relays to perform amplify-and-forward. We then analyze the impact of deploying noisy feedback
△ Less
Submitted 22 February, 2013;
originally announced February 2013.
-
Capacity Bounds and Exact Results for the Cognitive Z-interference Channel
Authors:
Nan Liu,
Ivana Maric,
Yinghui Cheng,
Andrea J. Goldsmith,
Shlomo Shamai
Abstract:
We study the discrete memoryless Z-interference channel (ZIC) where the transmitter of the pair that suffers from interference is cognitive. We first provide an upper bound on the capacity of this channel. We then show that, when the channel of the transmitter-receiver pair that does not experience interference is deterministic, our proposed upper bound matches the known lower bound provided by Ca…
▽ More
We study the discrete memoryless Z-interference channel (ZIC) where the transmitter of the pair that suffers from interference is cognitive. We first provide an upper bound on the capacity of this channel. We then show that, when the channel of the transmitter-receiver pair that does not experience interference is deterministic, our proposed upper bound matches the known lower bound provided by Cao and Chen in 2008. The obtained results imply that, unlike in the Gaussian cognitive ZIC, in the considered channel superposition encoding at the non-cognitive transmitter as well as Gel'fand-Pinsker encoding at the cognitive transmitter are needed in order to minimize the impact of interference. As a byproduct of the obtained capacity region, we obtain the capacity under the generalized Gel'fand-Pinsker conditions where a transmitter-receiver pair communicates in the presence of interference noncausally known at the encoder.
△ Less
Submitted 15 February, 2012; v1 submitted 12 December, 2011;
originally announced December 2011.
-
On the Capacity of a Class of Cognitive Z-interference Channels
Authors:
**hua Jiang,
Ivana Maric,
Andrea Goldsmith,
Shlomo Shamai,
Shuguang Cui
Abstract:
We study a special class of the cognitive radio channel in which the receiver of the cognitive pair does not suffer interference from the primary user. Previously developed general encoding schemes for this channel are complex as they attempt to cope with arbitrary channel conditions, which leads to rate regions that are difficult to evaluate. The focus of our work is to derive simple rate regions…
▽ More
We study a special class of the cognitive radio channel in which the receiver of the cognitive pair does not suffer interference from the primary user. Previously developed general encoding schemes for this channel are complex as they attempt to cope with arbitrary channel conditions, which leads to rate regions that are difficult to evaluate. The focus of our work is to derive simple rate regions that are easily computable, thereby providing more insights into achievable rates and good coding strategies under different channel conditions. We first present several explicit achievable regions for the general discrete memoryless case. We also present an improved outer bound on the capacity region for the case of high interference. We then extend these regions to Gaussian channels. With a simple outer bound we establish a new capacity region in the high-interference regime. Lastly, we provide numerical comparisons between the derived achievable rate regions and the outer bounds.
△ Less
Submitted 20 September, 2010; v1 submitted 11 July, 2010;
originally announced July 2010.
-
The Capacity Region of the Cognitive Z-interference Channel with One Noiseless Component
Authors:
Nan Liu,
Ivana Maric,
Andrea Goldsmith,
Shlomo Shamai
Abstract:
We study the discrete memoryless Z-interference channel (ZIC) where the transmitter of the pair that suffers from interference is cognitive. We first provide upper and lower bounds on the capacity of this channel. We then show that, when the channel of the transmitter-receiver pair that does not face interference is noiseless, the two bounds coincide and therefore yield the capacity region. The…
▽ More
We study the discrete memoryless Z-interference channel (ZIC) where the transmitter of the pair that suffers from interference is cognitive. We first provide upper and lower bounds on the capacity of this channel. We then show that, when the channel of the transmitter-receiver pair that does not face interference is noiseless, the two bounds coincide and therefore yield the capacity region. The obtained results imply that, unlike in the Gaussian cognitive ZIC, in the considered channel superposition encoding at the non-cognitive transmitter as well as Gel'fand-Pinsker encoding at the cognitive transmitter are needed in order to minimize the impact of interference. As a byproduct of the obtained capacity region, we obtain the capacity result for a generalized Gel'fand-Pinsker problem.
△ Less
Submitted 2 December, 2008;
originally announced December 2008.
-
On the Capacity of Interference Channels with One Cooperating Transmitter
Authors:
I. Maric,
A. Goldsmith,
G. Kramer,
S. Shamai
Abstract:
Inner and outer bounds are established on the capacity region of two-sender, two-receiver interference channels where one transmitter knows both messages. The transmitter with extra knowledge is referred to as being cognitive. The inner bound is based on strategies that generalize prior work, and include rate-splitting, Gel'fand-Pinsker coding and cooperative transmission. A general outer bound…
▽ More
Inner and outer bounds are established on the capacity region of two-sender, two-receiver interference channels where one transmitter knows both messages. The transmitter with extra knowledge is referred to as being cognitive. The inner bound is based on strategies that generalize prior work, and include rate-splitting, Gel'fand-Pinsker coding and cooperative transmission. A general outer bound is based on the Nair-El Gamal outer bound for broadcast channels. A simpler bound is presented for the case in which one of the decoders can decode both messages. The bounds are evaluated and compared for Gaussian channels.
△ Less
Submitted 21 October, 2007; v1 submitted 17 October, 2007;
originally announced October 2007.
-
Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions
Authors:
Ruoheng Liu,
Ivana Maric,
Predrag Spasojevic,
Roy D. Yates
Abstract:
We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers with information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is…
▽ More
We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers with information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is measured by the equivocation rate at the eavesdrop** receiver. In this paper, we present inner and outer bounds on secrecy capacity regions for these two communication systems. The derived outer bounds have an identical mutual information expression that applies to both channel models. The difference is in the input distributions over which the expression is optimized. The inner bound rate regions are achieved by random binning techniques. For the broadcast channel, a double-binning coding scheme allows for both joint encoding and preserving of confidentiality. Furthermore, we show that, for a special case of the interference channel, referred to as the switch channel, the two bound bounds meet. Finally, we describe several transmission schemes for Gaussian interference channels and derive their achievable rate regions while ensuring mutual information-theoretic secrecy. An encoding scheme in which transmitters dedicate some of their power to create artificial noise is proposed and shown to outperform both time-sharing and simple multiplexed transmission of the confidential messages.
△ Less
Submitted 11 December, 2007; v1 submitted 17 February, 2007;
originally announced February 2007.
-
The Discrete Memoryless Multiple Access Channel with Confidential Messages
Authors:
Ruoheng Liu,
Ivana Maric,
Roy D. Yates,
Predrag Spasojevic
Abstract:
A multiple-access channel is considered in which messages from one encoder are confidential. Confidential messages are to be transmitted with perfect secrecy, as measured by equivocation at the other encoder. The upper bounds and the achievable rates for this communication situation are determined.
A multiple-access channel is considered in which messages from one encoder are confidential. Confidential messages are to be transmitted with perfect secrecy, as measured by equivocation at the other encoder. The upper bounds and the achievable rates for this communication situation are determined.
△ Less
Submitted 17 February, 2007; v1 submitted 1 May, 2006;
originally announced May 2006.