{"title":"An achievability proof for the lossy coding of Markov sources with feed-forward","authors":"S. Asoodeh, F. Alajaji, T. Linder","doi":"10.1109/CWIT.2013.6621594","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621594","url":null,"abstract":"The lossy source coding problem with feed-forward link was recently introduced in [1] and the corresponding rate-distortion function was derived in [2] and [3] for stationary and ergodic sources and for arbitrary sources with memory, respectively. The achievability schemes of [2] and [3] are mainly based on codetrees. In this work, we give an alternative proof of achievability for binary asymmetric Markov sources via a simple coding scheme that utilizes optimal lossy coding for Bernoulli sources. We then generalize this coding scheme for m-ary Markov sources and show its optimality for the distortion region where the Shannon lower bound is tight.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115360548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the achievability of the degrees of freedom for the three-cell MIMO interfering broadcast channel with minimum spatial dimensions","authors":"Ahmed Medra, T. Davidson","doi":"10.1109/CWIT.2013.6621598","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621598","url":null,"abstract":"We consider the three-cell MIMO interfering broadcast channel (IBC) with K users assigned to each base station. Each base station has M = 2K + 1 antennas and each user has N antennas. We propose two different linear precoding schemes to achieve the optimal degrees of freedom (DoF) for the case in which each user receives only one data stream. The first scheme finds the transmit precoders and receive beamformers using a sequence of closed-form steps that is initiated by the solution of an optimization problem on the Grassmannian manifold. One advantage of this scheme is the ability to achieve the optimal DoF with the minimum possible number of transmit and receive antennas. In the second scheme, the users in one cell will have additional K - 1 antennas, but we have been able a closed-form solution for each step of the generation of the transmit precoders and receive beamformers.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"36 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114281135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-way lossy communication of correlated Gaussian sources with amplify-and-forward relaying","authors":"H. E. Saffar, M. B. Khuzani, P. Mitran","doi":"10.1109/CWIT.2013.6621606","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621606","url":null,"abstract":"We consider the problem of two-way lossy communication in an amplify-and-forward (AF) relay channel. Particularly, we study the problem in the case of communication between users with correlated Gaussian sources. First, we prove necessary conditions for achievability of a distortion tuple under a two-phase communication protocol. Then we study achievable schemes thorough separate source-channel coding and uncoded transmission. We derive the achievable distortion region and show that the separation scheme is optimal. In contrast to point-to-point communication where both schemes are optimal, here we further show that uncoded transmission fails to be optimal for correlated sources. However, for the special case of independent sources, uncoded transmission is also optimal. Eventually, we establish similar results for achievability of a distortion tuple in a three-phase communication protocol.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121371967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On achieving optimal degrees of freedom of MIMO cellular networks using decomposition","authors":"G. Sridharan, Wei Yu","doi":"10.1109/CWIT.2013.6621602","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621602","url":null,"abstract":"This paper investigates the significance of decomposition-based schemes in achieving the optimal degrees of freedom (DoF) of multiple-input multiple-output (MIMO) cellular networks. We consider MIMO cellular networks with G cells, K users/cell with M antennas at each user, and N antennas at each base-station (BS). We assume all channels to be generic and time varying. We show that KMN over KM + N DoF/cell can be achieved through one-sided decomposition of a MIMO cellular network (on the user side), followed by the use of an asymptotic interference alignment scheme. We then prove that such an approach achieves the optimal DoF whenever M over N = 1 over q, where equation. The optimality is proved using a new set of outer bounds on the DoF of a MIMO cellular network. Finally, we comment on the DoF achieved using two-sided decomposition, and the optimal DoF of cellular networks with single-antenna users and cellular networks with two cells.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125810608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security enhancement in cooperative jamming using compromised secrecy region minimization","authors":"Hao Li, Xianbin Wang, Weikun Hou","doi":"10.1109/CWIT.2013.6621623","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621623","url":null,"abstract":"A cooperative jamming system is investigated to enhance security of wireless communications in the presence of eavesdroppers. Different from traditional wireless security strategies that maximize secrecy capacity, a novel strategy based on the minimization of compromised secrecy region (CSR) is proposed. The secrecy region with a given secrecy outage probability is derived by considering path-loss and fading channel effects. Through numerical approximation of the outage probability, the optimal location and allocated power of the jammer are calculated to minimize the CSR which exhibits high secrecy outage probability. Without knowing the exact location of the randomly-distributed eavesdropper, our proposed scheme provides a new optimization criterion based on this compromised area minimization, thereby increasing the security level in cooperative jamming systems. Numerical results further validate the proposed CSR minimization scheme for cooperative jamming.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130264546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When are maximum likelihood and minimum distance decoding equivalent for binary contagion channels?","authors":"Ghady Azar, F. Alajaji","doi":"10.1109/CWIT.2013.6621584","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621584","url":null,"abstract":"We study optimal maximum likelihood block decoding of binary codes sent over binary contagion channels with infinite and finite memory. We derive conditions on the codes and channels parameters under which maximum likelihood and minimum Hamming distance are equivalent. We also note that under these conditions, minimum distance decoding can perform better without the use of channel interleaving.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130449877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power allocation schemes for relay-based heterogeneous networks","authors":"R. Devarajan, Shankhanaad Mallick, V. Bhargava","doi":"10.1109/CWIT.2013.6621605","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621605","url":null,"abstract":"We consider an interference limited heterogeneous cellular network, where co-channel macro and femto cells coexist. We focus on the downlink transmission, where a macro base station (MBS) communicates with a macro user equipment (MUE) via a macro relay station (MRS), whereas femto base stations (FBS) communicate with femto user equipments (FUE) directly. We propose centralized power allocation schemes to optimally allocate power among the MBS, MRS and FBSs. The power allocation schemes consider the difference in the significance of macro and femto networks by assigning different importance levels. Then, we discuss a distributed approach, where each cell can independently and separately optimize its own downlink transmission power. Numerical results indicate the effectiveness and performance of our schemes.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117262011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of MIMO adaptive subcarrier QAM intensity modulation in Gamma-Gamma turbulence","authors":"Md. Zoheb Hassan, Md. Jahangir Hossain, Julian Cheng","doi":"10.1109/CWIT.2013.6621619","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621619","url":null,"abstract":"We investigate a constant-power, variable-rate multiple-input multiple-output adaptive subcarrier intensity modulation employing rectangular quadrature amplitude modulation for optical wireless communication over the Gamma-Gamma turbulence channels. The adaptive scheme is implemented by adapting the modulation order according to the received signal-to-noise ratio and a pre-defined target bit-error rate requirement. Novel closed-form expressions for the achievable spectral efficiency, average bit-error rate, and outage probability are presented in terms of a fast convergent infinite series. In addition, asymptotic bit-error rate and outage probability analyses are presented. Our asymptotic analysis reveals that the diversity order of the considered multiple-input multiple-output system depends on the number of transmit and receive apertures, and on the smaller channel parameter of the Gamma-Gamma turbulence.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115440182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Index assignment capable of detecting one bit errors for multiple description scalar quantizers","authors":"Yinghan Wan, S. Dumitrescu","doi":"10.1109/CWIT.2013.6621592","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621592","url":null,"abstract":"This work is concerned with increasing the error resilience of two description scalar quantizers by applying a permutation to the index of each description, for an m-diagonal initial index assignment. First we address the existence of permutations achieving a minimum Hamming distance of at least 2. Such permutations allow the central decoder to detect any 1 bit error pattern. We establish the connection with the hypercube antibandwidth problem, connection which allows us to determine the highest value of m for which such a permutation exists and to show its construction. Further, we highlight the relation between the error robustness at the side decoders and the bandwidth of the hypercube labeling associated to the permutation. To ensure error resilience at both the central and side decoders we are interested in labelings with the lowest bandwidth given that the antibandwidth is larger or equal to m. We make some progress toward the solution of this problem by constructing a class of hypercube labelings trading the increase in antibandwidth for the decrease in bandwidth.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122415472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential dual-hop relaying over time-varying Rayleigh-fading channels","authors":"M. R. Avendi, Ha H. Nguyen","doi":"10.1109/CWIT.2013.6621607","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621607","url":null,"abstract":"This paper studies dual-hop amplify-and-forward relaying over time-varying Rayleigh fading channels with differential M-PSK modulation and non-coherent detection. For the case of “two-symbol” detection, a first order time-series model is utilized to characterize the time-varying nature of the cascaded channel. Based on this model, an exact bit error rate (BER) expression is derived and confirmed with simulation results. The obtained expression shows that the BER is related to the auto-correlation of the cascaded channel and an irreducible error floor exists at high transmit power. To overcome the error floor experienced with fast-fading, a nearly optimal “multiple-symbol” differential sphere detection (MSDSD) is also developed. The error performance of MSDSD is illustrated with simulation results under different fading scenarios.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127882476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}