首页 > 最新文献

2015 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Instances of the relay-broadcast channel and cooperation strategies 中继广播频道和合作策略的实例
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282937
Y. Steinberg
It is well known that cooperation between users in a communication network can lead to significant performance gains relative to the same network without cooperation. One common model which has been studied recently is the two users degraded broadcast channel (BC) with cooperating decoders. It can be viewed as a special case of the relay-broadcast channel (RBC), where the link from the relay to the other user is a noiseless channel (bit-pipe), that does not interact with the main channel. In this work two extensions of this basic model are suggested and studied: the BC with conferencing and degraded message sets, and the degraded BC with parallel conferencing, where there are parallel relays whose data streams are received by all the users in the channel. Since the data stream of each relay is also received by the other, one relay can allocate part of its rate to help the other relay to distribute its data stream. The capacity region is characterized for the two models.
众所周知,通信网络中用户之间的合作可以导致相对于没有合作的相同网络的显著性能提升。目前研究的一种常用模型是双用户退化广播信道(BC)与协同解码器。它可以看作是中继广播信道(RBC)的一种特殊情况,其中从中继到另一个用户的链路是一个无噪声信道(位管),它不与主信道交互。本文提出并研究了该基本模型的两种扩展:带会议和降级消息集的降级BC,以及带并行会议的降级BC,其中存在并行中继,其数据流被信道中的所有用户接收。由于每个中继的数据流也被另一个中继接收,因此一个中继可以分配自己的部分速率来帮助另一个中继分发自己的数据流。对两种模型的容量区域进行了表征。
{"title":"Instances of the relay-broadcast channel and cooperation strategies","authors":"Y. Steinberg","doi":"10.1109/ISIT.2015.7282937","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282937","url":null,"abstract":"It is well known that cooperation between users in a communication network can lead to significant performance gains relative to the same network without cooperation. One common model which has been studied recently is the two users degraded broadcast channel (BC) with cooperating decoders. It can be viewed as a special case of the relay-broadcast channel (RBC), where the link from the relay to the other user is a noiseless channel (bit-pipe), that does not interact with the main channel. In this work two extensions of this basic model are suggested and studied: the BC with conferencing and degraded message sets, and the degraded BC with parallel conferencing, where there are parallel relays whose data streams are received by all the users in the channel. Since the data stream of each relay is also received by the other, one relay can allocate part of its rate to help the other relay to distribute its data stream. The capacity region is characterized for the two models.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129621550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Quickest linear search over correlated sequences 在相关序列上最快的线性搜索
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282558
Javad Heydari, A. Tajer
Linear search arises in many application domains. The problem of linear search over multiple sequences in order to identify one sequence with a desired statistical feature is considered. The quickest linear search optimizes a balance between two opposing performance measures, one being the delay in detecting a desirable sequence, and the other one being the quality of the decision. The existing approaches in the quickest search literature rely on the assumption that the sequences are statistically independent. In many applications, however, due to the underlying physical couplings, generations of available sequences are not necessarily independent. Driven by such underlying couplings, this paper considers searching over correlated sequences, in which the distribution of each sequence depends on the distribution of its preceding one. The closed-form characterization of the sampling process for the optimal search is delineated. The analysis reveals that depending on the correlation structure, the optimal search strategy can be similar to (in spirit) or dramatically different from the optimal search strategy over independent sequences.
线性搜索出现在许多应用领域。考虑了在多个序列上进行线性搜索以识别具有所需统计特征的序列的问题。最快的线性搜索优化了两个相反的性能度量之间的平衡,一个是检测理想序列的延迟,另一个是决策的质量。现有的最快搜索文献中的方法依赖于序列在统计上独立的假设。然而,在许多应用中,由于潜在的物理耦合,可用序列的代不一定是独立的。在这种潜在耦合的驱动下,本文考虑对相关序列的搜索,其中每个序列的分布依赖于其前一个序列的分布。描述了最优搜索的采样过程的封闭形式特征。分析表明,根据关联结构的不同,最优搜索策略可能与独立序列上的最优搜索策略在本质上相似,也可能存在显著差异。
{"title":"Quickest linear search over correlated sequences","authors":"Javad Heydari, A. Tajer","doi":"10.1109/ISIT.2015.7282558","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282558","url":null,"abstract":"Linear search arises in many application domains. The problem of linear search over multiple sequences in order to identify one sequence with a desired statistical feature is considered. The quickest linear search optimizes a balance between two opposing performance measures, one being the delay in detecting a desirable sequence, and the other one being the quality of the decision. The existing approaches in the quickest search literature rely on the assumption that the sequences are statistically independent. In many applications, however, due to the underlying physical couplings, generations of available sequences are not necessarily independent. Driven by such underlying couplings, this paper considers searching over correlated sequences, in which the distribution of each sequence depends on the distribution of its preceding one. The closed-form characterization of the sampling process for the optimal search is delineated. The analysis reveals that depending on the correlation structure, the optimal search strategy can be similar to (in spirit) or dramatically different from the optimal search strategy over independent sequences.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129039663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Low-rank matrix completion via Riemannian pursuit for topological interference management 基于黎曼追求的低秩矩阵补全拓扑干涉管理
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282772
Yuanming Shi, Jun Zhang, K. Letaief
This paper considers the topological interference management problem in a partially connected K-user interference channel, where no channel state information at transmitters (CSIT) is available beyond the network topology knowledge. Due to the practical CSI assumption, this problem has recently received enough attention. In particular, it has been established that the topological interference management problem, in terms of degrees of freedom (DoF), is equivalent to the index coding problem with linear schemes. However, so far only a few index coding problems have been solved, and thus there is a lack of a systematic way to characterize optimal DoF of an arbitrary network topology. In this paper, we present a low-rank matrix completion (LRMC) approach to find linear solutions to maximize the achievable symmetric DoF for any given network topology. To decode the desired messages at each receiver, we also propose an LRMC based channel acquisition scheme, which can obtain interference-free measurements of the desired channel at each receiver while minimizing the pilot training length. To address the NP-hardness of the non-convex rank objective function in the resulting LRMC problem, we further present a Riemannian pursuit (RP) algorithm to solve it efficiently. This algorithm alternatively performs fixed-rank optimization using Riemannian optimization and rank increase by exploiting the manifold structure of the fixed-rank matrices. The LRMC approach aided by the RP algorithms not only recovers the existing optimal DoF results but also provides insights for general network topologies.
本文研究了部分连接的k用户干扰信道中的拓扑干扰管理问题,在这种信道中,除了网络拓扑知识之外,发射机的信道状态信息(CSIT)是不可用的。由于实际的CSI假设,这个问题最近受到了足够的关注。特别地,我们已经建立了拓扑干扰管理问题,在自由度(DoF)方面等价于具有线性格式的索引编码问题。然而,到目前为止,仅解决了少数索引编码问题,因此缺乏一种系统的方法来表征任意网络拓扑的最优自由度。在本文中,我们提出了一种低秩矩阵补全(LRMC)方法来寻找线性解,以最大化任何给定网络拓扑的可实现对称自由度。为了在每个接收器上解码所需的信息,我们还提出了一种基于LRMC的信道获取方案,该方案可以在最小化飞行员训练长度的同时获得每个接收器上所需信道的无干扰测量。为了解决LRMC问题中非凸秩目标函数的np -硬度问题,我们进一步提出了一种riemanian pursuit (RP)算法来有效地求解该问题。该算法使用黎曼优化和利用固定秩矩阵的流形结构进行秩增加来替代固定秩优化。在RP算法的辅助下,LRMC方法不仅恢复了现有的最优DoF结果,而且提供了对一般网络拓扑的见解。
{"title":"Low-rank matrix completion via Riemannian pursuit for topological interference management","authors":"Yuanming Shi, Jun Zhang, K. Letaief","doi":"10.1109/ISIT.2015.7282772","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282772","url":null,"abstract":"This paper considers the topological interference management problem in a partially connected K-user interference channel, where no channel state information at transmitters (CSIT) is available beyond the network topology knowledge. Due to the practical CSI assumption, this problem has recently received enough attention. In particular, it has been established that the topological interference management problem, in terms of degrees of freedom (DoF), is equivalent to the index coding problem with linear schemes. However, so far only a few index coding problems have been solved, and thus there is a lack of a systematic way to characterize optimal DoF of an arbitrary network topology. In this paper, we present a low-rank matrix completion (LRMC) approach to find linear solutions to maximize the achievable symmetric DoF for any given network topology. To decode the desired messages at each receiver, we also propose an LRMC based channel acquisition scheme, which can obtain interference-free measurements of the desired channel at each receiver while minimizing the pilot training length. To address the NP-hardness of the non-convex rank objective function in the resulting LRMC problem, we further present a Riemannian pursuit (RP) algorithm to solve it efficiently. This algorithm alternatively performs fixed-rank optimization using Riemannian optimization and rank increase by exploiting the manifold structure of the fixed-rank matrices. The LRMC approach aided by the RP algorithms not only recovers the existing optimal DoF results but also provides insights for general network topologies.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"46 45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132403367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Distributed transmit beamforming with one bit feedback revisited: How noise limits scaling 重新审视一比特反馈的分布式发射波束形成:噪声如何限制缩放
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282814
Muhammed Faruk Gencel, M. Rasekh, Upamanyu Madhow
Distributed transmit beamforming with N cooperating nodes, each with fixed transmit power, provides a received power scaling with N2, corresponding to a “power pooling” gain of N and a beamforming gain of N. Prior work has shown that the optimal beamforming solution can be attained using a decentralized, iterative algorithm based on one bit (per iteration) feedback broadcast from the receiver to the transmitters. The algorithm is provably convergent in a noiseless setting, and is the basis for several successful prototypes. In this paper, we develop a framework for providing analytical insight into the effect of receiver noise, with the following key question in mind: can we bootstrap the algorithm from the incoherent power-pooled solution to operate in a regime in which the received SNR per node can be made arbitrarily small as we scale up the number of nodes N? Our analytical computations, validated by simulations, yield a somewhat negative answer: while the power-pooling gain guarantees a linear increase in received power with N, the per-node SNR cannot be scaled down with N if we wish to attain a quadratic increase in received power. Specifically, the fraction of the ideal beamforming gain attained using the one-bit algorithm is asymptotically independent of N, and depends only on the per-node SNR. However, the one-bit algorithm provides significant performance gains in practical regimes with a moderate number of cooperating nodes: the per-node SNR required for attaining a substantial fraction of the beamforming gain is low enough (e.g., - 5dB for 65% of the beamforming gain) to provide significant extension in operation regimes, while providing aggregate SNRs which permit reliable communication at high spectral efficiency: for example, starting from -5 dB per-node SNR, we obtain about 11 dB aggregate SNR with 10 cooperating nodes, and 17 dB SNR with 20 cooperating nodes.
具有N个合作节点的分布式发射波束形成,每个节点具有固定的发射功率,提供以N2为比例的接收功率,对应于“功率池”增益N和波束形成增益N。先前的工作表明,使用基于从接收器到发射器的每迭代1位反馈广播的分散迭代算法可以获得最佳波束形成解决方案。该算法在无噪声环境下是收敛的,是若干成功原型的基础。在本文中,我们开发了一个框架,用于提供对接收器噪声影响的分析性洞察,并考虑到以下关键问题:我们能否从非相干功率池解决方案中引导算法,使其在随着节点数量N的增加,每个节点的接收信噪比可以任意减小的情况下运行?我们的分析计算,通过模拟验证,得出了一个有点负面的答案:虽然功率池增益保证接收功率随N线性增加,但如果我们希望获得接收功率的二次增长,则每个节点的信噪比不能随N缩放。具体来说,使用一比特算法获得的理想波束形成增益的分数与N渐近无关,仅取决于每个节点的信噪比。然而,1位算法在具有中等数量的合作节点的实际体制中提供了显着的性能增益:获得相当一部分波束形成增益所需的每节点信噪比足够低(例如,- 5dB为65%的波束形成增益),可以在操作体制中提供显着的扩展,同时提供聚合信噪比,允许在高频谱效率下可靠通信。例如,从每个节点的信噪比为-5 dB开始,我们在10个合作节点下获得约11 dB的总信噪比,在20个合作节点下获得约17 dB的总信噪比。
{"title":"Distributed transmit beamforming with one bit feedback revisited: How noise limits scaling","authors":"Muhammed Faruk Gencel, M. Rasekh, Upamanyu Madhow","doi":"10.1109/ISIT.2015.7282814","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282814","url":null,"abstract":"Distributed transmit beamforming with N cooperating nodes, each with fixed transmit power, provides a received power scaling with N2, corresponding to a “power pooling” gain of N and a beamforming gain of N. Prior work has shown that the optimal beamforming solution can be attained using a decentralized, iterative algorithm based on one bit (per iteration) feedback broadcast from the receiver to the transmitters. The algorithm is provably convergent in a noiseless setting, and is the basis for several successful prototypes. In this paper, we develop a framework for providing analytical insight into the effect of receiver noise, with the following key question in mind: can we bootstrap the algorithm from the incoherent power-pooled solution to operate in a regime in which the received SNR per node can be made arbitrarily small as we scale up the number of nodes N? Our analytical computations, validated by simulations, yield a somewhat negative answer: while the power-pooling gain guarantees a linear increase in received power with N, the per-node SNR cannot be scaled down with N if we wish to attain a quadratic increase in received power. Specifically, the fraction of the ideal beamforming gain attained using the one-bit algorithm is asymptotically independent of N, and depends only on the per-node SNR. However, the one-bit algorithm provides significant performance gains in practical regimes with a moderate number of cooperating nodes: the per-node SNR required for attaining a substantial fraction of the beamforming gain is low enough (e.g., - 5dB for 65% of the beamforming gain) to provide significant extension in operation regimes, while providing aggregate SNRs which permit reliable communication at high spectral efficiency: for example, starting from -5 dB per-node SNR, we obtain about 11 dB aggregate SNR with 10 cooperating nodes, and 17 dB SNR with 20 cooperating nodes.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the separating redundancy of extended Hamming codes 扩展汉明码的分离冗余
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282887
Haiyang Liu, Daeyeoul Kim, Yang Li, A. Z. Jia
Separating redundancy, proposed by Abdel-Ghaffar and Weber, is an important concept in the analysis of the error and erasure decoding of a linear block code using a parity-check matrix of the code. In this paper, we investigate the second and third separating redundancies of extended Hamming codes. For an extended Hamming code, we establish two binary integer linear program problems, the optima of which give lower and upper bounds on the second/third separating redundancy of the code. Numerical results suggest that our bounds might improve the known bounds of the second and third separating redundancies of extended Hamming codes.
Abdel-Ghaffar和Weber提出的分离冗余是利用码的奇偶校验矩阵分析线性分组码的错误和擦除译码的一个重要概念。本文研究了扩展汉明码的第二次和第三次分离冗余。对于一个扩展的Hamming码,我们建立了两个二进制整数线性规划问题,其最优解给出了码的第2 / 3分离冗余的下界和上界。数值结果表明,我们的边界可以改进已知的扩展汉明码的第二次和第三次分离冗余的边界。
{"title":"On the separating redundancy of extended Hamming codes","authors":"Haiyang Liu, Daeyeoul Kim, Yang Li, A. Z. Jia","doi":"10.1109/ISIT.2015.7282887","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282887","url":null,"abstract":"Separating redundancy, proposed by Abdel-Ghaffar and Weber, is an important concept in the analysis of the error and erasure decoding of a linear block code using a parity-check matrix of the code. In this paper, we investigate the second and third separating redundancies of extended Hamming codes. For an extended Hamming code, we establish two binary integer linear program problems, the optima of which give lower and upper bounds on the second/third separating redundancy of the code. Numerical results suggest that our bounds might improve the known bounds of the second and third separating redundancies of extended Hamming codes.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115254465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fast and robust compressive phase retrieval with sparse-graph codes 基于稀疏图码的快速鲁棒压缩相位检索
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282923
Dong Yin, Kangwook Lee, Ramtin Pedarsani, K. Ramchandran
In this paper, we tackle the compressive phase retrieval problem in the presence of noise. The noisy compressive phase retrieval problem is to recover a K-sparse complex signal s ∈ ℂn, from a set of m noisy quadratic measurements: yi = |aiHs|2 + wi; where aiH ∈ ℂn is the ith row of the measurement matrix A ∈ ℂm×n, and wi is the additive noise to the ith measurement. We consider the regime where K = βnδ, δ ∈ (0; 1). We use the architecture of PhaseCode algorithm [1], and robustify it using two schemes: the almost-linear scheme and the sublinear scheme. We prove that with high probability, the almost-linear scheme recovers s with sample complexity1 Θ(K log(n)) and computational complexity Θ(n log(n)), and the sublinear scheme recovers s with sample complexity Θ(K log3(n)) and computational complexity Θ(K log3(n)). To the best of our knowledge, this is the first scheme that achieves sublinear computational complexity for compressive phase retrieval problem. Finally, we provide simulation results that support our theoretical contributions.
在本文中,我们解决了存在噪声的压缩相位恢复问题。噪声压缩相位恢复问题是从一组m个噪声二次测量值中恢复一个k稀疏复信号s∈n: yi = |aiHs|2 + wi;式中aiH∈n为测量矩阵A∈m×n的第i行,wi为第i次测量的加性噪声。我们考虑K = βnδ, δ∈(0;1).我们使用PhaseCode算法的架构[1],并使用两种方案:近线性方案和次线性方案对其进行鲁棒。我们高概率地证明了近线性方案以样本复杂度1 Θ(K log(n))和计算复杂度Θ(n log(n))恢复s,亚线性方案以样本复杂度Θ(K log3(n))和计算复杂度Θ(K log3(n))恢复s。据我们所知,这是第一个实现压缩相位检索问题亚线性计算复杂度的方案。最后,我们提供了模拟结果来支持我们的理论贡献。
{"title":"Fast and robust compressive phase retrieval with sparse-graph codes","authors":"Dong Yin, Kangwook Lee, Ramtin Pedarsani, K. Ramchandran","doi":"10.1109/ISIT.2015.7282923","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282923","url":null,"abstract":"In this paper, we tackle the compressive phase retrieval problem in the presence of noise. The noisy compressive phase retrieval problem is to recover a K-sparse complex signal s ∈ ℂ<sup>n</sup>, from a set of m noisy quadratic measurements: y<sub>i</sub> = |a<sub>i</sub><sup>H</sup>s|<sup>2</sup> + w<sub>i</sub>; where a<sub>i</sub><sup>H</sup> ∈ ℂ<sup>n</sup> is the ith row of the measurement matrix A ∈ ℂ<sup>m×n</sup>, and w<sub>i</sub> is the additive noise to the ith measurement. We consider the regime where K = βn<sup>δ</sup>, δ ∈ (0; 1). We use the architecture of PhaseCode algorithm [1], and robustify it using two schemes: the almost-linear scheme and the sublinear scheme. We prove that with high probability, the almost-linear scheme recovers s with sample complexity<sup>1</sup> Θ(K log(n)) and computational complexity Θ(n log(n)), and the sublinear scheme recovers s with sample complexity Θ(K log<sup>3</sup>(n)) and computational complexity Θ(K log<sup>3</sup>(n)). To the best of our knowledge, this is the first scheme that achieves sublinear computational complexity for compressive phase retrieval problem. Finally, we provide simulation results that support our theoretical contributions.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125020606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Effect of channel aging on the sum rate of uplink massive MIMO systems 信道老化对上行海量MIMO系统和速率的影响
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282650
Chuili Kong, C. Zhong, Anastasios K. Papazafeiropoulos, M. Matthaiou, Zhaoyang Zhang
This paper investigates the achievable sum-rate of uplink massive multiple-input multiple-output (MIMO) systems considering a practical channel impairment, namely, aged channel state information (CSI). Taking into account both maximum ratio combining (MRC) and zero-forcing (ZF) receivers at the base station, we present tight closed-form lower bounds on the sum-rate for both receivers, which provide efficient means to evaluate the sum-rate of the system. More importantly, we characterize the impact of channel aging on the power scaling law. Specifically, we show that the transmit power of each user can be scaled down by 1/√(M), which indicates that aged CSI does not affect the power scaling law; instead, it causes only a reduction on the sum rate by reducing the effective signal-to-interference-and-noise ratio (SINR).
本文研究了考虑实际信道损伤(即信道状态信息老化)的上行海量多输入多输出(MIMO)系统的可实现和速率。考虑最大比组合(MRC)和零强迫(ZF)两种接收机,给出了两种接收机和速率的严密封闭下界,为评估系统和速率提供了有效的手段。更重要的是,我们描述了信道老化对功率标度律的影响。具体来说,我们证明了每个用户的发射功率可以按1/√(M)的比例缩小,这表明老化的CSI不影响功率缩放规律;相反,它只是通过降低有效信噪比(SINR)来降低和速率。
{"title":"Effect of channel aging on the sum rate of uplink massive MIMO systems","authors":"Chuili Kong, C. Zhong, Anastasios K. Papazafeiropoulos, M. Matthaiou, Zhaoyang Zhang","doi":"10.1109/ISIT.2015.7282650","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282650","url":null,"abstract":"This paper investigates the achievable sum-rate of uplink massive multiple-input multiple-output (MIMO) systems considering a practical channel impairment, namely, aged channel state information (CSI). Taking into account both maximum ratio combining (MRC) and zero-forcing (ZF) receivers at the base station, we present tight closed-form lower bounds on the sum-rate for both receivers, which provide efficient means to evaluate the sum-rate of the system. More importantly, we characterize the impact of channel aging on the power scaling law. Specifically, we show that the transmit power of each user can be scaled down by 1/√(M), which indicates that aged CSI does not affect the power scaling law; instead, it causes only a reduction on the sum rate by reducing the effective signal-to-interference-and-noise ratio (SINR).","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121353162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A stochastic model for genomic interspersed duplication 基因组穿插复制的随机模型
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282586
Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck
Mutation processes such as point mutation, insertion, deletion, and duplication (including tandem and interspersed duplication) have an important role in evolution, as they lead to genomic diversity, and thus to phenotypic variation. In this work, we study the expressive power of interspersed duplication, i.e., its ability to generate diversity, via a simple but fundamental stochastic model, where the length and the location of the substring that is duplicated and the point of insertion of the copy are chosen randomly. We investigate the properties of the set of high-probability sequences in these stochastic systems. In particular we provide results regarding the asymptotic behavior of frequencies of symbols and strings in a sequence evolving through interspersed duplication. The study of such systems is an important step towards the design and analysis of more realistic and sophisticated models of genomic mutation processes.
突变过程,如点突变、插入、缺失和重复(包括串联和穿插重复)在进化中起着重要作用,因为它们导致基因组多样性,从而导致表型变异。在这项工作中,我们通过一个简单但基本的随机模型研究了分散复制的表达能力,即它产生多样性的能力,其中复制的子串的长度和位置以及副本的插入点是随机选择的。我们研究了这些随机系统中高概率序列集的性质。特别地,我们提供了关于符号和字符串的频率的渐近行为的结果在一个序列演变通过穿插重复。对这些系统的研究是朝着设计和分析更现实和复杂的基因组突变过程模型迈出的重要一步。
{"title":"A stochastic model for genomic interspersed duplication","authors":"Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck","doi":"10.1109/ISIT.2015.7282586","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282586","url":null,"abstract":"Mutation processes such as point mutation, insertion, deletion, and duplication (including tandem and interspersed duplication) have an important role in evolution, as they lead to genomic diversity, and thus to phenotypic variation. In this work, we study the expressive power of interspersed duplication, i.e., its ability to generate diversity, via a simple but fundamental stochastic model, where the length and the location of the substring that is duplicated and the point of insertion of the copy are chosen randomly. We investigate the properties of the set of high-probability sequences in these stochastic systems. In particular we provide results regarding the asymptotic behavior of frequencies of symbols and strings in a sequence evolving through interspersed duplication. The study of such systems is an important step towards the design and analysis of more realistic and sophisticated models of genomic mutation processes.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133575472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Constructions of symmetric-key encryption with guessing secrecy 具有猜测保密的对称密钥加密构造
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282550
Mitsugu Iwamoto, Junji Shikata
Constructions of symmetric-key encryption with guessing secrecy are discussed. In the previous works, only a construction of symmetric-key encryption with average guessing secrecy is proposed for one-bit plaintexts. In this paper, we analyze a symmetric-key encryption with average guessing secrecy through OTP (one-time pad) constructions for a wide class of probability distributions of plaintexts and keys. As a result, we show a necessary and sufficient condition that such class of distributions satisfies average guessing secrecy in OTP constructions. On the other hand, we prove that optimal guessing secrecy is essentially equivalent to perfect secrecy under several natural restrictions. Therefore, only average guessing secrecy is meaningful for considering guessing secrecy other than perfect secrecy.
讨论了具有猜测保密的对称密钥加密的构造。在以往的工作中,只针对1位明文提出了一种平均猜测保密的对称密钥加密构造。在本文中,我们分析了一种具有平均猜测保密性的对称密钥加密算法,该算法采用OTP(一次性密码垫)结构,适用于各种概率分布的明文和密钥。结果证明了该类分布在OTP结构中满足平均猜测保密的充分必要条件。另一方面,我们证明了在几种自然约束条件下,最优猜测保密本质上等同于完全保密。因此,只有平均猜测保密才有意义考虑猜测保密而非完全保密。
{"title":"Constructions of symmetric-key encryption with guessing secrecy","authors":"Mitsugu Iwamoto, Junji Shikata","doi":"10.1109/ISIT.2015.7282550","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282550","url":null,"abstract":"Constructions of symmetric-key encryption with guessing secrecy are discussed. In the previous works, only a construction of symmetric-key encryption with average guessing secrecy is proposed for one-bit plaintexts. In this paper, we analyze a symmetric-key encryption with average guessing secrecy through OTP (one-time pad) constructions for a wide class of probability distributions of plaintexts and keys. As a result, we show a necessary and sufficient condition that such class of distributions satisfies average guessing secrecy in OTP constructions. On the other hand, we prove that optimal guessing secrecy is essentially equivalent to perfect secrecy under several natural restrictions. Therefore, only average guessing secrecy is meaningful for considering guessing secrecy other than perfect secrecy.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121798596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Strong large deviations for Rao test score and GLRT in exponential families Rao测试分数和GLRT在指数族中存在较大的偏差
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282561
P. Moulin, Patrick R. Johnstone
Exact asymptotics are derived for composite hypothesis testing between two product probability measures Pn vs Qn, subject to a type-I error-probability constraint ε. Here P is known but Q is an unknown element of a given d-dimensional regular exponential family. We study the Rao score test, which is a quadratic approximation to the GLRT. The type-II error probability is shown to vanish as equation where D and V are respectively the Kullback-Leibler divergence and the variance of information divergence between P and Q; τ(ε; d) is the 1 - ε quantile for the χd2 distribution; and the constants βd > 0 and γd are explicitly identified. The asymptotic regret relative to the Neyman-Pearson test (which knows Q) is reflected in the coefficient τ(ε; d), as is the cost of dimensionality. Looser asymptotics (with O(1) in place of εd) are obtained for the GLRT.
对于两个乘积概率度量Pn vs Qn之间的复合假设检验,导出了精确渐近性,并受到i型误差概率约束ε的约束。这里P是已知的,而Q是给定的d维正则指数族的未知元素。我们研究了Rao分数检验,它是GLRT的二次逼近。ii型误差概率以方程形式消失,其中D和V分别为Kullback-Leibler散度和P与Q之间的信息散度方差;τ(ε;D)为χd2分布的1 - ε分位数;常数βd > 0和γd是明确确定的。相对于Neyman-Pearson检验(它知道Q)的渐近后悔反映在系数τ(ε;D)维度的成本也是如此。对于GLRT,得到了更宽松的渐近性(用O(1)代替εd)。
{"title":"Strong large deviations for Rao test score and GLRT in exponential families","authors":"P. Moulin, Patrick R. Johnstone","doi":"10.1109/ISIT.2015.7282561","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282561","url":null,"abstract":"Exact asymptotics are derived for composite hypothesis testing between two product probability measures P<sup>n</sup> vs Q<sup>n</sup>, subject to a type-I error-probability constraint ε. Here P is known but Q is an unknown element of a given d-dimensional regular exponential family. We study the Rao score test, which is a quadratic approximation to the GLRT. The type-II error probability is shown to vanish as equation where D and V are respectively the Kullback-Leibler divergence and the variance of information divergence between P and Q; τ(ε; d) is the 1 - ε quantile for the χ<sub>d</sub><sup>2</sup> distribution; and the constants β<sub>d</sub> > 0 and γ<sub>d</sub> are explicitly identified. The asymptotic regret relative to the Neyman-Pearson test (which knows Q) is reflected in the coefficient τ(ε; d), as is the cost of dimensionality. Looser asymptotics (with O(1) in place of ε<sub>d</sub>) are obtained for the GLRT.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128035075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1