{"title":"Wideband localization via range likelihood based on reduced dataset","authors":"Stefania Bartoletti, Wenhan Dai, A. Conti, M. Win","doi":"10.1109/CWIT.2015.7255160","DOIUrl":"https://doi.org/10.1109/CWIT.2015.7255160","url":null,"abstract":"Wideband localization commonly relies on accurate range information extracted from received waveforms, which can be obtained via hard-decision or soft-decision ranging. While hard-decision ranging based on energy samples has received much attention because of its low-complexity, soft-decision ranging based on waveform samples can significantly improve the localization accuracy at the cost of higher complexity. This paper proposes new soft-decision ranging techniques with low complexity for wideband localization. The proposed techniques adopt range likelihood functions obtained from a reduced dataset of the received waveform samples. Results show that the proposed soft-decision techniques enable localization with higher accuracy compared to hard-decision ranging.","PeriodicalId":426245,"journal":{"name":"2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116028336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive erasure code based distributed storage systems","authors":"B. K. Rai","doi":"10.1109/CWIT.2015.7255179","DOIUrl":"https://doi.org/10.1109/CWIT.2015.7255179","url":null,"abstract":"Consider the following scenario: A data storage service provider provides an erasure code based distributed storage system (DSS). For the same data, the service provider gives several options: an (n<sub>i</sub>, k<sub>i</sub>) erasure code based DSS for i = 1,2, ..., m. The service provider charges differently for different options (say dollar Pi for an (n<sub>i</sub>, k<sub>i</sub>) erasure code based DSS for the data B of size |B|). A client had initially chosen for an (n<sub>i</sub>, k<sub>i</sub>) erasure code based DSS. At some point of time, the client wants to change for another option, say for an (n<sub>j</sub>, k<sub>j</sub>) erasure code based DSS for the same data, where 1≤ i, j ≤ m, i ≠ j. Thus, service provider would require to convert the (n<sub>i</sub>, k<sub>i</sub>) erasure code based DSS into an (n<sub>j</sub>, k<sub>j</sub>) erasure code based DSS. The service provider has the following problem: How to design an erasure code based DSS so that the conversion of an (n<sub>i</sub>, k<sub>i</sub>) erasure code based DSS into an (n<sub>j</sub>, k<sub>j</sub>) erasure code based DSS, for 1 ≤ i, j ≤ m, i ≠ j, can be done by downloading the minimum amount of data? In this paper, we present an adaptive coding scheme which requires to download the minimum amount of data while converting an (n<sub>i</sub>, k<sub>i</sub>) erasure code based DSS to an (n<sub>j</sub>, k<sub>j</sub>) erasure code based DSS, where 1 ≤ i, j ≤ m, i ≠ j.","PeriodicalId":426245,"journal":{"name":"2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)","volume":"3 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114112494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel non-parametric method for blind identification of STBC codes","authors":"Mostafa Mohammadkarimi, O. Dobre","doi":"10.1109/CWIT.2015.7255161","DOIUrl":"https://doi.org/10.1109/CWIT.2015.7255161","url":null,"abstract":"In this paper, a method for blind identification of linear space-time block codes is presented. This relies on a binary tree for decision making, with features based on the empirical cumulative distribution functions of received signal statistics employed at each node. The proposed method avoids estimation of the channel and noise statistics, and modulation format, and is robust to the carrier frequency offset. Simulation results show that when compared with the existing methods, such as the fourth-order lag product and second-order cyclostationarity-based methods, the proposed non-parametric method exhibits a superior performance.","PeriodicalId":426245,"journal":{"name":"2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116690966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fernando Reátegui del Águila, M. Z. Shakir, M. Imran, R. Tafazolli, K. Qaraqe, T. Ngatched
{"title":"On bounds for the cognitive multiple access Z-Interference Channel","authors":"Fernando Reátegui del Águila, M. Z. Shakir, M. Imran, R. Tafazolli, K. Qaraqe, T. Ngatched","doi":"10.1109/CWIT.2015.7255149","DOIUrl":"https://doi.org/10.1109/CWIT.2015.7255149","url":null,"abstract":"The Cognitive Multiple Access Z-Interference Channel consists of a MAC channel that receives interference from an external transmitter. In a previous work we studied this model where both MAC users are cognitive and showed that an encoding scheme based on Dirty Paper coding attains the capacity region for the Gaussian case. In this work we assume that only one MAC user is cognitive and show that the non-cognitive MAC user can still benefit from the cognition of the other MAC user compared to the case where none of the MAC users are cognitive. We compare the achievable rate region obtained for our model with those for the cases where interference is treated as noise and where part of the primary user's message is decodable at the MAC receiver.","PeriodicalId":426245,"journal":{"name":"2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved training and training power allocation schemes for multi-relay AF networks","authors":"Dan Wang, Y. Jing","doi":"10.1109/CWIT.2015.7255185","DOIUrl":"https://doi.org/10.1109/CWIT.2015.7255185","url":null,"abstract":"For a multi-relay amplify-and-forward (AF) network, an improved training scheme is proposed and the corresponding training power allocation problem is investigated for the individual channel estimation at the destination. Compared with a previous scheme where the training of the source-relay channels is conducted sequentially, the proposed scheme exploits the broadcast nature of the source-relay links to save training time and power. By analyzing the total mean square error (MSE) of all channel estimates and with the help of approximations, we derive a training power allocation solution among the source and the relays. Simulation results demonstrate that our improved training scheme and power allocation solution obtain lower total MSE than the existing schemes.","PeriodicalId":426245,"journal":{"name":"2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122747306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Higher dimensional varieties in coding theory","authors":"I. Blake, V. Murty, Hamid Usefi","doi":"10.1109/CWIT.2015.7255139","DOIUrl":"https://doi.org/10.1109/CWIT.2015.7255139","url":null,"abstract":"We consider enumeration and construction of points on diagonal and Hermitian surfaces. We give a recursive construction technique for the set of rational points of Hermitian surfaces. Then we apply this recursive enumeration of rational points to construct codes on Hermitian surfaces.","PeriodicalId":426245,"journal":{"name":"2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122592129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving transmission rate for the two-way relay channel by user cooperation","authors":"Ahmad Abu Al Haija, M. Vu","doi":"10.1109/CWIT.2015.7255184","DOIUrl":"https://doi.org/10.1109/CWIT.2015.7255184","url":null,"abstract":"We analyze the impact of user cooperation in the two-way relay channel (TWRC) by letting each user send a quantized version of its received signal in addition to its own message. The proposed scheme is based on quantize-forward (QF) and partial decode-forward (PDF) relaying with sliding window decoding at the relay, and QF relaying with backward decodings at each user. For Gaussian channels, examples show that although there is no improvement on the sum rate, the individual rate can be significantly increased. Moreover, as the power of one user approaches infinity, the transmission rate of the other user asymptotically achieves the capacity by reaching the cut-set bound. Hence, such user cooperation may be useful in networks where users have different priorities.","PeriodicalId":426245,"journal":{"name":"2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117245888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the secrecy capacity of fading Gaussian wiretap channel","authors":"M. K. Hossan, Sanjay Karmakar, Anirban Ghosh","doi":"10.1109/CWIT.2015.7255147","DOIUrl":"https://doi.org/10.1109/CWIT.2015.7255147","url":null,"abstract":"We consider the fast-fading Gaussian wiretap channel with single antenna nodes and without channel state information at the transmitter (CSIT), where the fading processes of the two links are arbitrary and independent of each other. We derive an upper bound to the secrecy capacity for this channel and an achievable rate as well. Subsequently, we identify a class of channel statistics for which the outer bound and the achievable rates are identical thereby characterizes the exact secrecy capacity of the channel. The class of channels with such channel statistics are called stochastically degraded in this paper. Many practical wireless settings including the Rayleigh fading environment fall under this stochastically degraded class. We illustrate our results by computing explicit expression for the secrecy capacity for Rayleigh distributed wiretap channels.","PeriodicalId":426245,"journal":{"name":"2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134445834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Uplink scheduling in multi-cell MU-MIMO systems with ZF post-processing and diversity combining","authors":"Aasem N. Alyahya, J. Ilow","doi":"10.1109/CWIT.2015.7255158","DOIUrl":"https://doi.org/10.1109/CWIT.2015.7255158","url":null,"abstract":"This paper considers the selection of users and corresponding uplink decoding in multi-user multiple-input multiple-output (MU-MIMO) multi-cell systems, applicable to future wireless networks with centralized processing at the wireless controller (WC). Two-layer decoding is proposed. First, for all active mobile stations (MSs) the spatial streams are decoupled at the pre-assigned base stations (BSs) by using a zero-forcing (ZF) type algorithm. Second, for MSs with strong signals, hard-decision decoding is performed at the BSs; while for other MSs, especially those at the edge of the cells, soft decisions from multiple BSs are passed to the WC, where maximum ratio combining (MRC) is performed. When deploying MRC, two strategies are considered to deal with the inter-cell interference (ICI). Assuming access at the WC to hard-decoded user data, or the lack of it, MRC with successive interference cancellation (SIC) and conventional MRC are investigated, respectively. Simulation results are provided to demonstrate the potential of the technique developed in terms of total system sum rate performance.","PeriodicalId":426245,"journal":{"name":"2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132637132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingwen Zhu, O. Omomukuyo, R. Venkatesan, Cheng Li, O. Dobre
{"title":"Rf-pilot phase noise compensation for long-haul coherent optical OFDM systems","authors":"Jingwen Zhu, O. Omomukuyo, R. Venkatesan, Cheng Li, O. Dobre","doi":"10.1109/CWIT.2015.7255168","DOIUrl":"https://doi.org/10.1109/CWIT.2015.7255168","url":null,"abstract":"Long-haul optical transmission systems employing coherent optical orthogonal frequency division multiplexing (CO-OFDM) are sensitive to laser phase noise. This causes a common phase rotation and inter-carrier interference. An effective method to compensate for the phase noise is to insert an RF-pilot tone in the middle of the OFDM signal. This RF-pilot is used to reverse the phase distortion at the receiver. This paper presents a performance analysis of the RF-pilot phase noise compensation scheme in a simulated 64 Gb/s CO-OFDM system. The effects of various parameters including laser linewidth, Mach-Zehnder modulator drive power, pilot-to-signal ratio, and fiber launch power are investigated. A comparison with the pilot-aided common phase error compensation method is provided to show the differences in the BER performance with respect to the required overhead.","PeriodicalId":426245,"journal":{"name":"2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123417628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}