210 research outputs found
Physical-layer Network Coding: A Random Coding Error Exponent Perspective
In this work, we derive the random coding error exponent for the uplink phase
of a two-way relay system where physical layer network coding (PNC) is
employed. The error exponent is derived for the practical (yet sub-optimum) XOR
channel decoding setting. We show that the random coding error exponent under
optimum (i.e., maximum likelihood) PNC channel decoding can be achieved even
under the sub-optimal XOR channel decoding. The derived achievability bounds
provide us with valuable insight and can be used as a benchmark for the
performance of practical channel-coded PNC systems employing low complexity
decoders when finite-length codewords are used.Comment: Submitted to IEEE International Symposium on Information Theory
(ISIT), 201
Channel Detection in Coded Communication
We consider the problem of block-coded communication, where in each block,
the channel law belongs to one of two disjoint sets. The decoder is aimed to
decode only messages that have undergone a channel from one of the sets, and
thus has to detect the set which contains the prevailing channel. We begin with
the simplified case where each of the sets is a singleton. For any given code,
we derive the optimum detection/decoding rule in the sense of the best
trade-off among the probabilities of decoding error, false alarm, and
misdetection, and also introduce sub-optimal detection/decoding rules which are
simpler to implement. Then, various achievable bounds on the error exponents
are derived, including the exact single-letter characterization of the random
coding exponents for the optimal detector/decoder. We then extend the random
coding analysis to general sets of channels, and show that there exists a
universal detector/decoder which performs asymptotically as well as the optimal
detector/decoder, when tuned to detect a channel from a specific pair of
channels. The case of a pair of binary symmetric channels is discussed in
detail.Comment: Submitted to IEEE Transactions on Information Theor
The Strongly Asynchronous Massive Access Channel
This paper considers a Strongly Asynchronous and Slotted Massive Access
Channel (SAS-MAC) where different users transmit a randomly
selected message among ones within a strong asynchronous window
of length blocks, where each block lasts channel uses. A
global probability of error is enforced, ensuring that all the users'
identities and messages are correctly identified and decoded. Achievability
bounds are derived for the case that different users have similar channels, the
case that users' channels can be chosen from a set which has polynomially many
elements in the blocklength , and the case with no restriction on the users'
channels. A general converse bound on the capacity region and a converse bound
on the maximum growth rate of the number of users are derived.Comment: under submissio
Low-Complexity Approaches to Slepian–Wolf Near-Lossless Distributed Data Compression
This paper discusses the Slepian–Wolf problem of distributed near-lossless compression of correlated sources. We introduce practical new tools for communicating at all rates in the achievable region. The technique employs a simple “source-splitting” strategy that does not require common sources of randomness at the encoders and decoders. This approach allows for pipelined encoding and decoding so that the system operates with the complexity of a single user encoder and decoder. Moreover, when this splitting approach is used in conjunction with iterative decoding methods, it produces a significant simplification of the decoding process. We demonstrate this approach for synthetically generated data. Finally, we consider the Slepian–Wolf problem when linear codes are used as syndrome-formers and consider a linear programming relaxation to maximum-likelihood (ML) sequence decoding. We note that the fractional vertices of the relaxed polytope compete with the optimal solution in a manner analogous to that observed when the “min-sum” iterative decoding algorithm is applied. This relaxation exhibits the ML-certificate property: if an integral solution is found, it is the ML solution. For symmetric binary joint distributions, we show that selecting easily constructable “expander”-style low-density parity check codes (LDPCs) as syndrome-formers admits a positive error exponent and therefore provably good performance
On some new approaches to practical Slepian-Wolf compression inspired by channel coding
This paper considers the problem, first introduced by Ahlswede and Körner in 1975, of lossless source coding with coded side information. Specifically, let X and Y be two random variables such that X is desired losslessly at the decoder while Y serves as side information. The random variables are encoded independently, and both descriptions are used by the decoder to reconstruct X. Ahlswede and Körner describe the achievable rate region in terms of an auxiliary random variable. This paper gives a partial solution for the optimal auxiliary random variable, thereby describing part of the rate region explicitly in terms of the distribution of X and Y
Fingerprinting with Minimum Distance Decoding
This work adopts an information theoretic framework for the design of
collusion-resistant coding/decoding schemes for digital fingerprinting. More
specifically, the minimum distance decision rule is used to identify 1 out of t
pirates. Achievable rates, under this detection rule, are characterized in two
distinct scenarios. First, we consider the averaging attack where a random
coding argument is used to show that the rate 1/2 is achievable with t=2
pirates. Our study is then extended to the general case of arbitrary
highlighting the underlying complexity-performance tradeoff. Overall, these
results establish the significant performance gains offered by minimum distance
decoding as compared to other approaches based on orthogonal codes and
correlation detectors. In the second scenario, we characterize the achievable
rates, with minimum distance decoding, under any collusion attack that
satisfies the marking assumption. For t=2 pirates, we show that the rate
is achievable using an ensemble of random linear
codes. For , the existence of a non-resolvable collusion attack, with
minimum distance decoding, for any non-zero rate is established. Inspired by
our theoretical analysis, we then construct coding/decoding schemes for
fingerprinting based on the celebrated Belief-Propagation framework. Using an
explicit repeat-accumulate code, we obtain a vanishingly small probability of
misidentification at rate 1/3 under averaging attack with t=2. For collusion
attacks which satisfy the marking assumption, we use a more sophisticated
accumulate repeat accumulate code to obtain a vanishingly small
misidentification probability at rate 1/9 with t=2. These results represent a
marked improvement over the best available designs in the literature.Comment: 26 pages, 6 figures, submitted to IEEE Transactions on Information
Forensics and Securit
Interference Cancellation at the Relay for Multi-User Wireless Cooperative Networks
We study multi-user transmission and detection schemes for a multi-access
relay network (MARN) with linear constraints at all nodes. In a MARN, sources, each equipped with antennas, communicate to one
-antenna destination through one -antenna relay. A new protocol called
IC-Relay-TDMA is proposed which takes two phases. During the first phase,
symbols of different sources are transmitted concurrently to the relay. At the
relay, interference cancellation (IC) techniques, previously proposed for
systems with direct transmission, are applied to decouple the information of
different sources without decoding. During the second phase, symbols of
different sources are forwarded to the destination in a time division
multi-access (TDMA) fashion. At the destination, the maximum-likelihood (ML)
decoding is performed source-by-source. The protocol of IC-Relay-TDMA requires
the number of relay antennas no less than the number of sources, i.e., . Through outage analysis, the achievable diversity gain of the proposed
scheme is shown to be . When {\small}, the proposed scheme achieves the maximum
interference-free (int-free) diversity gain . Since concurrent
transmission is allowed during the first phase, compared to full TDMA
transmission, the proposed scheme achieves the same diversity, but with a
higher symbol rate.Comment: submitted to IEEE Transaction on Wireless Communicatio
Is Synchronization a Bottleneck for Pilot-Assisted URLLC Links?
We propose a framework to evaluate the random-coding union bound with
parameter on the achievable error probability in the finite-blocklength
regime for a pilot-assisted transmission scheme operating over an imperfectly
synchronized and memoryless block-fading waveform channel. Unlike previous
results, which disregard the effects of imperfect synchronization, our
framework utilizes pilots for both synchronization and channel estimation.
Specifically, we provide an algorithm to perform joint synchronization and
channel estimation and verify its accuracy by observing its tightness in
comparison with the Cramer-Rao bound. Then, we develop an RCUs bound on the
error probability, which applies for a receiver that treats the estimates
provided by the algorithm as accurate. Additionally, we utilize the saddlepoint
approximation to provide a numerically efficient method for evaluating the RCUs
bound in this scenario. Our numerical experiments verify the accuracy of the
proposed approximation. Moreover, when transmission blocks are received
synchronously, numerical results indicate that the number of pilot symbols
needed to estimate the fading channel gains to the level of accuracy required
in ultra-reliable low-latency communication is also sufficient to acquire
sufficiently good synchronization. However, when the blocks are received
asynchronously, synchronization becomes the bottleneck for the system
performance
- …