-
Divide, Conquer, Combine Bayesian Decision Tree Sampling
Authors:
Jodie A. Cochrane,
Adrian Wills,
Sarah J. Johnson
Abstract:
Decision trees are commonly used predictive models due to their flexibility and interpretability. This paper is directed at quantifying the uncertainty of decision tree predictions by employing a Bayesian inference approach. This is challenging because these approaches need to explore both the tree structure space and the space of decision parameters associated with each tree structure. This has b…
▽ More
Decision trees are commonly used predictive models due to their flexibility and interpretability. This paper is directed at quantifying the uncertainty of decision tree predictions by employing a Bayesian inference approach. This is challenging because these approaches need to explore both the tree structure space and the space of decision parameters associated with each tree structure. This has been handled by using Markov Chain Monte Carlo (MCMC) methods, where a Markov Chain is constructed to provide samples from the desired Bayesian estimate. Importantly, the structure and the decision parameters are tightly coupled; small changes in the tree structure can demand vastly different decision parameters to provide accurate predictions. A challenge for existing MCMC approaches is proposing joint changes in both the tree structure and the decision parameters that result in efficient sampling. This paper takes a different approach, where each distinct tree structure is associated with a unique set of decision parameters. The proposed approach, entitled DCC-Tree, is inspired by the work in Zhou et al. [23] for probabilistic programs and Cochrane et al. [4] for Hamiltonian Monte Carlo (HMC) based sampling for decision trees. Results show that DCC-Tree performs comparably to other HMC-based methods and better than existing Bayesian tree methods while improving on consistency and reducing the per-proposal complexity.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
RJHMC-Tree for Exploration of the Bayesian Decision Tree Posterior
Authors:
Jodie A. Cochrane,
Adrian G. Wills,
Sarah J. Johnson
Abstract:
Decision trees have found widespread application within the machine learning community due to their flexibility and interpretability. This paper is directed towards learning decision trees from data using a Bayesian approach, which is challenging due to the potentially enormous parameter space required to span all tree models. Several approaches have been proposed to combat this challenge, with on…
▽ More
Decision trees have found widespread application within the machine learning community due to their flexibility and interpretability. This paper is directed towards learning decision trees from data using a Bayesian approach, which is challenging due to the potentially enormous parameter space required to span all tree models. Several approaches have been proposed to combat this challenge, with one of the more successful being Markov chain Monte Carlo (MCMC) methods. The efficacy and efficiency of MCMC methods fundamentally rely on the quality of the so-called proposals, which is the focus of this paper. In particular, this paper investigates using a Hamiltonian Monte Carlo (HMC) approach to explore the posterior of Bayesian decision trees more efficiently by exploiting the geometry of the likelihood within a global update scheme. Two implementations of the novel algorithm are developed and compared to existing methods by testing against standard datasets in the machine learning and Bayesian decision tree literature. HMC-based methods are shown to perform favourably with respect to predictive test accuracy, acceptance rate, and tree complexity.
△ Less
Submitted 3 December, 2023;
originally announced December 2023.
-
Joint User and Data Detection in Grant-Free NOMA with Attention-based BiLSTM Network
Authors:
Saud Khan,
Salman Durrani,
Muhammad Basit Shahab,
Sarah J. Johnson,
Seyit Camtepe
Abstract:
We consider the multi-user detection (MUD) problem in uplink grant-free non-orthogonal multiple access (NOMA), where the access point has to identify the total number and correct identity of the active Internet of Things (IoT) devices and decode their transmitted data. We assume that IoT devices use complex spreading sequences and transmit information in a random-access manner following the burst-…
▽ More
We consider the multi-user detection (MUD) problem in uplink grant-free non-orthogonal multiple access (NOMA), where the access point has to identify the total number and correct identity of the active Internet of Things (IoT) devices and decode their transmitted data. We assume that IoT devices use complex spreading sequences and transmit information in a random-access manner following the burst-sparsity model, where some IoT devices transmit their data in multiple adjacent time slots with a high probability, while others transmit only once during a frame. Exploiting the temporal correlation, we propose an attention-based bidirectional long short-term memory (BiLSTM) network to solve the MUD problem. The BiLSTM network creates a pattern of the device activation history using forward and reverse pass LSTMs, whereas the attention mechanism provides essential context to the device activation points. By doing so, a hierarchical pathway is followed for detecting active devices in a grant-free scenario. Then, by utilising the complex spreading sequences, blind data detection for the estimated active devices is performed. The proposed framework does not require prior knowledge of device sparsity levels and channels for performing MUD. The results show that the proposed network achieves better performance compared to existing benchmark schemes.
△ Less
Submitted 12 July, 2023; v1 submitted 13 September, 2022;
originally announced September 2022.
-
Protograph LDPC Code Design for Asynchronous Random Access
Authors:
Federico Clazzer,
Balazs Matuz,
Sachini Jayasooriya,
Mahyar Shirvanimoghaddam,
Sarah J. Johnson
Abstract:
This work addresses the physical layer channel code design for an uncoordinated, frame- and slot-asynchronous random access protocol. Starting from the observation that collisions between two users yield very specific interference patterns, we define a surrogate channel model and propose different protograph low-density parity-check code designs. The proposed codes are both tested in a setup where…
▽ More
This work addresses the physical layer channel code design for an uncoordinated, frame- and slot-asynchronous random access protocol. Starting from the observation that collisions between two users yield very specific interference patterns, we define a surrogate channel model and propose different protograph low-density parity-check code designs. The proposed codes are both tested in a setup where the physical layer is abstracted, as well as on a more realistic channel model, where finite-length physical layer simulations of the entire asynchronous random access scheme, including decoding are carried out. We find that the abstracted physical layer model overestimates the performance when short blocks are considered. Additionally, the optimized codes show gains in supported channel traffic - a measure of the number of terminals that can be concurrently accommodated on the channel - of around 17% at a packet loss rate of 10^{-2} w.r.t. off-the-shelf codes.
△ Less
Submitted 5 August, 2019;
originally announced August 2019.
-
Centralized Caching with Unequal Cache Sizes
Authors:
Behzad Asadi,
Lawrence Ong,
Sarah J. Johnson
Abstract:
We address a centralized caching problem with unequal cache sizes. We consider a system with a server of files connected through a shared error-free link to a group of cache-enabled users where one subgroup has a larger cache size than the other. We propose an explicit caching scheme for the considered system aimed at minimizing the load of worst-case demands over the shared link. As suggested by…
▽ More
We address a centralized caching problem with unequal cache sizes. We consider a system with a server of files connected through a shared error-free link to a group of cache-enabled users where one subgroup has a larger cache size than the other. We propose an explicit caching scheme for the considered system aimed at minimizing the load of worst-case demands over the shared link. As suggested by numerical evaluations, our scheme improves upon the best existing explicit scheme by having a lower worst-case load; also, our scheme performs within a multiplicative factor of 1.11 from the scheme that can be obtained by solving an optimisation problem in which the number of parameters grows exponentially with the number of users.
△ Less
Submitted 14 May, 2018; v1 submitted 19 March, 2018;
originally announced March 2018.
-
Structural Characteristics of Two-Sender Index Coding
Authors:
Chandra Thapa,
Lawrence Ong,
Sarah J. Johnson,
Min Li
Abstract:
This paper studies index coding with two senders. In this setup, source messages are distributed among the senders possibly with common messages. In addition, there are multiple receivers, with each receiver having some messages a priori, known as side-information, and requesting one unique message such that each message is requested by only one receiver. Index coding in this setup is called two-s…
▽ More
This paper studies index coding with two senders. In this setup, source messages are distributed among the senders possibly with common messages. In addition, there are multiple receivers, with each receiver having some messages a priori, known as side-information, and requesting one unique message such that each message is requested by only one receiver. Index coding in this setup is called two-sender unicast index coding (TSUIC). The main goal is to find the shortest aggregate normalized codelength, which is expressed as the optimal broadcast rate. In this work, firstly, for a given TSUIC problem, we form three independent sub-problems each consisting of the only subset of the messages, based on whether the messages are available only in one of the senders or in both senders. Then we express the optimal broadcast rate of the TSUIC problem as a function of the optimal broadcast rates of those independent sub-problems. In this way, we discover the structural characteristics of TSUIC. For the proofs of our results, we utilize confusion graphs and coding techniques used in single-sender index coding. To adapt the confusion graph technique in TSUIC, we introduce a new graph-coloring approach that is different from the normal graph coloring, which we call two-sender graph coloring, and propose a way of grouping the vertices to analyze the number of colors used. We further determine a class of TSUIC instances where a certain type of side-information can be removed without affecting their optimal broadcast rates. Finally, we generalize the results of a class of TSUIC problems to multiple senders.
△ Less
Submitted 19 June, 2019; v1 submitted 22 November, 2017;
originally announced November 2017.
-
Raptor Codes for Higher-Order Modulation Using a Multi-Edge Framework
Authors:
Sachini Jayasooriya,
Mahyar Shirvanimoghaddam,
Lawrence Ong,
Sarah J. Johnson
Abstract:
In this paper, we represent Raptor codes as multi-edge type low-density parity-check (MET-LDPC) codes, which gives a general framework to design them for higher-order modulation using MET density evolution. We then propose an efficient Raptor code design method for higher-order modulation, where we design distinct degree distributions for distinct bit levels. We consider a joint decoding scheme ba…
▽ More
In this paper, we represent Raptor codes as multi-edge type low-density parity-check (MET-LDPC) codes, which gives a general framework to design them for higher-order modulation using MET density evolution. We then propose an efficient Raptor code design method for higher-order modulation, where we design distinct degree distributions for distinct bit levels. We consider a joint decoding scheme based on belief propagation for Raptor codes and also derive an exact expression for the stability condition. In several examples, we demonstrate that the higher-order modulated Raptor codes designed using the multi-edge framework outperform previously reported higher-order modulation codes in literature.
△ Less
Submitted 13 January, 2017;
originally announced January 2017.
-
Cooperative Multi-Sender Index Coding
Authors:
Min Li,
Lawrence Ong,
Sarah J. Johnson
Abstract:
In this paper, we propose a new coding scheme and establish new bounds on the capacity region for the multi-sender unicast index-coding problem. We revisit existing partitioned Distributed Composite Coding (DCC) proposed by Sadeghi et al. and identify its limitations in the implementation of multi-sender composite coding and in the strategy of sender partitioning. We then propose two new coding co…
▽ More
In this paper, we propose a new coding scheme and establish new bounds on the capacity region for the multi-sender unicast index-coding problem. We revisit existing partitioned Distributed Composite Coding (DCC) proposed by Sadeghi et al. and identify its limitations in the implementation of multi-sender composite coding and in the strategy of sender partitioning. We then propose two new coding components to overcome these limitations and develop a multi-sender Cooperative Composite Coding (CCC). We show that CCC can strictly improve upon partitioned DCC, and is the key to achieve optimality for a number of index-coding instances. The usefulness of CCC and its special cases is illuminated via non-trivial examples, and the capacity region is established for each example. Comparisons between CCC and other non-cooperative schemes in recent works are also provided to further demonstrate the advantage of CCC.
△ Less
Submitted 5 September, 2018; v1 submitted 13 January, 2017;
originally announced January 2017.
-
Analysis and design of Raptor codes using a multi-edge framework
Authors:
Sachini Jayasooriya,
Mahyar Shirvanimoghaddam,
Lawrence Ong,
Sarah J. Johnson
Abstract:
The focus of this paper is on the analysis and design of Raptor codes using a multi-edge framework. In this regard, we first represent the Raptor code as a multi-edge type low-density parity-check (METLDPC) code. This MET representation gives a general framework to analyze and design Raptor codes over a binary input additive white Gaussian noise channel using MET density evolution (MET-DE). We con…
▽ More
The focus of this paper is on the analysis and design of Raptor codes using a multi-edge framework. In this regard, we first represent the Raptor code as a multi-edge type low-density parity-check (METLDPC) code. This MET representation gives a general framework to analyze and design Raptor codes over a binary input additive white Gaussian noise channel using MET density evolution (MET-DE). We consider a joint decoding scheme based on the belief propagation (BP) decoding for Raptor codes in the multi-edge framework, and analyze the convergence behavior of the BP decoder using MET-DE. In joint decoding of Raptor codes, the component codes correspond to inner code and precode are decoded in parallel and provide information to each other. We also derive an exact expression for the stability of Raptor codes with joint decoding. We then propose an efficient Raptor code design method using the multi-edge framework, where we simultaneously optimize the inner code and the precode. Finally we consider performance-complexity trade-offs of Raptor codes using the multi-edge framework. Through density evolution analysis we show that the designed Raptor codes using the multi-edge framework outperform the existing Raptor codes in literature in terms of the realized rate.
△ Less
Submitted 9 January, 2017;
originally announced January 2017.
-
Graph-Theoretic Approaches to Two-Sender Index Coding
Authors:
Chandra Thapa,
Lawrence Ong,
Sarah J. Johnson
Abstract:
Consider a communication scenario over a noiseless channel where a sender is required to broadcast messages to multiple receivers, each having side information about some messages. In this scenario, the sender can leverage the receivers' side information during the encoding of messages in order to reduce the required transmissions. This type of encoding is called index coding. In this paper, we st…
▽ More
Consider a communication scenario over a noiseless channel where a sender is required to broadcast messages to multiple receivers, each having side information about some messages. In this scenario, the sender can leverage the receivers' side information during the encoding of messages in order to reduce the required transmissions. This type of encoding is called index coding. In this paper, we study index coding with two cooperative senders, each with some subset of messages, and multiple receivers, each requesting one unique message. The index coding in this setup is called two-sender unicast index coding (TSUIC). The main aim of TSUIC is to minimize the total number of transmissions required by the two senders. Based on graph-theoretic approaches, we prove that TSUIC is equivalent to single-sender unicast index coding (SSUIC) for some special cases. Moreover, we extend the existing schemes for SSUIC, viz., the cycle-cover scheme, the clique-cover scheme, and the local-chromatic scheme to the corresponding schemes for TSUIC.
△ Less
Submitted 28 September, 2016;
originally announced September 2016.
-
The DoF Region of the Three-Receiver MIMO Broadcast Channel with Side Information and Its Relation to Index Coding Capacity
Authors:
Behzad Asadi,
Lawrence Ong,
Sarah J. Johnson
Abstract:
We consider the three-receiver Gaussian multiple-input multiple-output (MIMO) broadcast channel with an arbitrary number of antennas at each of the transmitter and the receivers. We investigate the degrees-of-freedom (DoF) region of the channel when each receiver requests a private message, and may know some of the messages requested by the other receivers as receiver message side information (RMS…
▽ More
We consider the three-receiver Gaussian multiple-input multiple-output (MIMO) broadcast channel with an arbitrary number of antennas at each of the transmitter and the receivers. We investigate the degrees-of-freedom (DoF) region of the channel when each receiver requests a private message, and may know some of the messages requested by the other receivers as receiver message side information (RMSI). We establish the DoF region of the channel for all 16 possible non-isomorphic RMSI configurations by deriving tight inner and outer bounds on the region. To derive the inner bounds, we first propose a scheme for each RMSI configuration which exploits both the null space and the side information of the receivers. We then use these schemes in conjunction with time sharing for 15 RMSI configurations, and with time sharing and two-symbol extension for the remaining one. To derive the outer bounds, we construct enhanced versions of the channel for each RMSI configuration, and upper bound their DoF region. After establishing the DoF region, in the case where all the nodes have the same number of antennas, we introduce some common properties of the DoF region, and the capacity region of the index coding problem.
△ Less
Submitted 11 August, 2016;
originally announced August 2016.
-
New Density Evolution Approximation for LDPC and Multi-Edge Type LDPC Codes
Authors:
Sachini Jayasooriya,
Mahyar Shirvanimoghaddam,
Lawrence Ong,
Gottfried Lechner,
Sarah J. Johnson
Abstract:
This paper considers density evolution for lowdensity parity-check (LDPC) and multi-edge type low-density parity-check (MET-LDPC) codes over the binary input additive white Gaussian noise channel. We first analyze three singleparameter Gaussian approximations for density evolution and discuss their accuracy under several conditions, namely at low rates, with punctured and degree-one variable nodes…
▽ More
This paper considers density evolution for lowdensity parity-check (LDPC) and multi-edge type low-density parity-check (MET-LDPC) codes over the binary input additive white Gaussian noise channel. We first analyze three singleparameter Gaussian approximations for density evolution and discuss their accuracy under several conditions, namely at low rates, with punctured and degree-one variable nodes. We observe that the assumption of symmetric Gaussian distribution for the density-evolution messages is not accurate in the early decoding iterations, particularly at low rates and with punctured variable nodes. Thus single-parameter Gaussian approximation methods produce very poor results in these cases. Based on these observations, we then introduce a new density evolution approximation algorithm for LDPC and MET-LDPC codes. Our method is a combination of full density evolution and a single-parameter Gaussian approximation, where we assume a symmetric Gaussian distribution only after density-evolution messages closely follow a symmetric Gaussian distribution. Our method significantly improves the accuracy of the code threshold estimation. Additionally, the proposed method significantly reduces the computational time of evaluating the code threshold compared to full density evolution thereby making it more suitable for code design.
△ Less
Submitted 16 May, 2016;
originally announced May 2016.
-
A Joint Optimization Technique for Multi-Edge Type LDPC Codes
Authors:
Sachini Jayasooriya,
Mahyar Shirvanimoghaddam,
Lawrence Ong,
Sarah J. Johnson
Abstract:
This paper considers the optimization of multi-edge type low-density parity-check (METLDPC) codes to maximize the decoding threshold. We propose an algorithm to jointly optimize the node degree distribution and the multi-edge structure of MET-LDPC codes for given values of the maximum number of edge-types and maximum node degrees. This joint optimization is particularly important for MET-LDPC code…
▽ More
This paper considers the optimization of multi-edge type low-density parity-check (METLDPC) codes to maximize the decoding threshold. We propose an algorithm to jointly optimize the node degree distribution and the multi-edge structure of MET-LDPC codes for given values of the maximum number of edge-types and maximum node degrees. This joint optimization is particularly important for MET-LDPC codes as it is not clear a priori which structures will be good. Using several examples, we demonstrate that the MET-LDPC codes designed by the proposed joint optimization algorithm exhibit improved decoding thresholds compared to previously reported MET-LDPC codes.
△ Less
Submitted 16 May, 2016;
originally announced May 2016.
-
Optimization of Graph Based Codes for Belief Propagation Decoding
Authors:
Sachini Jayasooriya,
Sarah J. Johnson,
Lawrence Ong,
Regina Berretta
Abstract:
A low-density parity-check (LDPC) code is a linear block code described by a sparse parity-check matrix, which can be efficiently represented by a bipartite Tanner graph. The standard iterative decoding algorithm, known as belief propagation, passes messages along the edges of this Tanner graph. Density evolution is an efficient method to analyze the performance of the belief propagation decoding…
▽ More
A low-density parity-check (LDPC) code is a linear block code described by a sparse parity-check matrix, which can be efficiently represented by a bipartite Tanner graph. The standard iterative decoding algorithm, known as belief propagation, passes messages along the edges of this Tanner graph. Density evolution is an efficient method to analyze the performance of the belief propagation decoding algorithm for a particular LDPC code ensemble, enabling the determination of a decoding threshold. The basic problem addressed in this work is how to optimize the Tanner graph so that the decoding threshold is as large as possible. We introduce a new code optimization technique which involves the search space range which can be thought of as minimizing randomness in differential evolution or limiting the search range in exhaustive search. This technique is applied to the design of good irregular LDPC codes and multiedge type LDPC codes.
△ Less
Submitted 16 May, 2016;
originally announced May 2016.
-
Interlinked Cycles for Index Coding: Generalizing Cycles and Cliques
Authors:
Chandra Thapa,
Lawrence Ong,
Sarah J. Johnson
Abstract:
We consider a graphical approach to index coding. While cycles have been shown to provide coding gain, only disjoint cycles and cliques (a specific type of overlapping cycles) have been exploited in existing literature. In this paper, we define a more general form of overlapping cycles, called the interlinked-cycle (IC) structure, that generalizes cycles and cliques. We propose a scheme, called th…
▽ More
We consider a graphical approach to index coding. While cycles have been shown to provide coding gain, only disjoint cycles and cliques (a specific type of overlapping cycles) have been exploited in existing literature. In this paper, we define a more general form of overlapping cycles, called the interlinked-cycle (IC) structure, that generalizes cycles and cliques. We propose a scheme, called the interlinked-cycle-cover (ICC) scheme, that leverages IC structures in digraphs to construct scalar linear index codes. We characterize a class of infinitely many digraphs where our proposed scheme is optimal over all linear and non-linear index codes. Consequently, for this class of digraphs, we indirectly prove that scalar linear index codes are optimal. Furthermore, we show that the ICC scheme can outperform all existing graph-based schemes (including partial-clique-cover and fractional-local-chromatic number schemes), and a random-coding scheme (namely, composite coding) for certain graphs.
△ Less
Submitted 24 February, 2018; v1 submitted 29 February, 2016;
originally announced March 2016.
-
Massive Multiple Access Based on Superposition Raptor Codes for M2M Communications
Authors:
Mahyar Shirvanimoghaddam,
Mischa Dohler,
Sarah J. Johnson
Abstract:
Machine-to-machine (M2M) wireless systems aim to provide ubiquitous connectivity between machine type communication (MTC) devices without any human intervention. Given the exponential growth of MTC traffic, it is of utmost importance to ensure that future wireless standards are capable of handling this traffic. In this paper, we focus on the design of a very efficient massive access strategy for h…
▽ More
Machine-to-machine (M2M) wireless systems aim to provide ubiquitous connectivity between machine type communication (MTC) devices without any human intervention. Given the exponential growth of MTC traffic, it is of utmost importance to ensure that future wireless standards are capable of handling this traffic. In this paper, we focus on the design of a very efficient massive access strategy for highly dense cellular networks with M2M communications. Several MTC devices are allowed to simultaneously transmit at the same resource block by incorporating Raptor codes and superposition modulation. This significantly reduces the access delay and improves the achievable system throughput. A simple yet efficient random access strategy is proposed to only detect the selected preambles and the number of devices which have chosen them. No device identification is needed in the random access phase which significantly reduces the signalling overhead. The proposed scheme is analyzed and the maximum number of MTC devices that can be supported in a resource block is characterized as a function of the message length, number of available resources, and the number of preambles. Simulation results show that the proposed scheme can effectively support a massive number of MTC devices for a limited number of available resources, when the message size is small.
△ Less
Submitted 17 February, 2016;
originally announced February 2016.
-
A Unified Inner Bound for the Two-Receiver Memoryless Broadcast Channel with Channel State and Message Side Information
Authors:
Behzad Asadi,
Lawrence Ong,
Sarah J. Johnson
Abstract:
We consider the two-receiver memoryless broadcast channel with states where each receiver requests both common and private messages, and may know part of the private message requested by the other receiver as receiver message side information (RMSI). We address two categories of the channel (i) channel with states known causally to the transmitter, and (ii) channel with states known non-causally t…
▽ More
We consider the two-receiver memoryless broadcast channel with states where each receiver requests both common and private messages, and may know part of the private message requested by the other receiver as receiver message side information (RMSI). We address two categories of the channel (i) channel with states known causally to the transmitter, and (ii) channel with states known non-causally to the transmitter. Starting with the channel without RMSI, we first propose a transmission scheme and derive an inner bound for the causal category. We then unify our inner bound for the causal category and the best-known inner bound for the non-causal category, although their transmission schemes are different. Moving on to the channel with RMSI, we first apply a pre-coding to the transmission schemes of the causal and non-causal categories without RMSI. We then derive a unified inner bound as a result of having a unified inner bound when there is no RMSI, and applying the same pre-coding to both categories. We show that our inner bound is tight for some new cases as well as the cases whose capacity region was known previously.
△ Less
Submitted 12 January, 2016;
originally announced January 2016.
-
Raptor Codes in the Low SNR Regime
Authors:
Mahyar Shirvanimoghaddam,
Sarah J. Johnson
Abstract:
In this paper, we revisit the design of Raptor codes for binary input additive white Gaussian noise (BIAWGN) channels, where we are interested in very low signal to noise ratios (SNRs). A linear programming degree distribution optimization problem is defined for Raptor codes in the low SNR regime through several approximations. We also provide an exact expression for the polynomial representation…
▽ More
In this paper, we revisit the design of Raptor codes for binary input additive white Gaussian noise (BIAWGN) channels, where we are interested in very low signal to noise ratios (SNRs). A linear programming degree distribution optimization problem is defined for Raptor codes in the low SNR regime through several approximations. We also provide an exact expression for the polynomial representation of the degree distribution with infinite maximum degree in the low SNR regime, which enables us to calculate the exact value of the fractions of output nodes of small degrees. A more practical degree distribution design is also proposed for Raptor codes in the low SNR regime, where we include the rate efficiency and the decoding complexity in the optimization problem, and an upper bound on the maximum rate efficiency is derived for given design parameters. Simulation results show that the Raptor code with the designed degree distributions can approach rate efficiencies larger than 0.95 in the low SNR regime.
△ Less
Submitted 27 October, 2015;
originally announced October 2015.
-
Design of Raptor Codes in the Low SNR Regime with Applications in Quantum Key Distribution
Authors:
Mahyar Shirvanimoghaddam,
Sarah J. Johnson,
Andrew M. Lance
Abstract:
The focus of this work is on the design of Raptor codes for continuous variable Quantum key distribution (CV-QKD) systems. We design a highly efficient Raptor code for very low signal to noise ratios (SNRs), which enables CV-QKD systems to operate over long distances with a significantly higher secret key rate compared to conventional fixed rate codes. The degree distribution design of Raptor code…
▽ More
The focus of this work is on the design of Raptor codes for continuous variable Quantum key distribution (CV-QKD) systems. We design a highly efficient Raptor code for very low signal to noise ratios (SNRs), which enables CV-QKD systems to operate over long distances with a significantly higher secret key rate compared to conventional fixed rate codes. The degree distribution design of Raptor codes in the low SNR regime is formulated as a linear program, where a set of optimized degree distributions are also obtained through linear programming. Simulation results show that the designed code achieves efficiencies higher than 94\% for SNRs as low as -20 dB and -30 dB. We further propose a new error reconciliation protocol for CV-QKD systems by using Raptor codes and show that it can achieve higher secret key rates over long distances compared to existing protocols.
△ Less
Submitted 26 October, 2015;
originally announced October 2015.
-
Repeat-Accumulate Codes for Reconciliation in Continuous Variable Quantum Key Distribution
Authors:
Sarah J. Johnson,
Vikram A. Chandrasetty,
Andrew M. Lance
Abstract:
This paper investigates the design of low-complexity error correction codes for the verification step in continuous variable quantum key distribution (CVQKD) systems. We design new coding schemes based on quasi-cyclic repeat-accumulate codes which demonstrate good performances for CVQKD reconciliation.
This paper investigates the design of low-complexity error correction codes for the verification step in continuous variable quantum key distribution (CVQKD) systems. We design new coding schemes based on quasi-cyclic repeat-accumulate codes which demonstrate good performances for CVQKD reconciliation.
△ Less
Submitted 12 October, 2015;
originally announced October 2015.
-
Generalized Interlinked Cycle Cover for Index Coding
Authors:
Chandra Thapa,
Lawrence Ong,
Sarah J. Johnson
Abstract:
A source coding problem over a noiseless broadcast channel where the source is pre-informed about the contents of the cache of all receivers, is an index coding problem. Furthermore, if each message is requested by one receiver, then we call this an index coding problem with a unicast message setting. This problem can be represented by a directed graph. In this paper, we first define a structure (…
▽ More
A source coding problem over a noiseless broadcast channel where the source is pre-informed about the contents of the cache of all receivers, is an index coding problem. Furthermore, if each message is requested by one receiver, then we call this an index coding problem with a unicast message setting. This problem can be represented by a directed graph. In this paper, we first define a structure (we call generalized interlinked cycles (GIC)) in directed graphs. A GIC consists of cycles which are interlinked in some manner (i.e., not disjoint), and it turns out that the GIC is a generalization of cliques and cycles. We then propose a simple scalar linear encoding scheme with linear time encoding complexity. This scheme exploits GICs in the digraph. We prove that our scheme is optimal for a class of digraphs with message packets of any length. Moreover, we show that our scheme can outperform existing techniques, e.g., partial clique cover, local chromatic number, composite-coding, and interlinked cycle cover.
△ Less
Submitted 20 July, 2015; v1 submitted 19 April, 2015;
originally announced April 2015.
-
A New Index Coding Scheme Exploiting Interlinked Cycles
Authors:
Chandra Thapa,
Lawrence Ong,
Sarah J. Johnson
Abstract:
We study the index coding problem in the unicast message setting, i.e., where each message is requested by one unique receiver. This problem can be modeled by a directed graph. We propose a new scheme called interlinked cycle cover, which exploits interlinked cycles in the directed graph, for designing index codes. This new scheme generalizes the existing clique cover and cycle cover schemes. We p…
▽ More
We study the index coding problem in the unicast message setting, i.e., where each message is requested by one unique receiver. This problem can be modeled by a directed graph. We propose a new scheme called interlinked cycle cover, which exploits interlinked cycles in the directed graph, for designing index codes. This new scheme generalizes the existing clique cover and cycle cover schemes. We prove that for a class of infinitely many digraphs with messages of any length, interlinked cycle cover provides an optimal index code. Furthermore, the index code is linear with linear time encoding complexity.
△ Less
Submitted 8 April, 2015;
originally announced April 2015.
-
A Unified Scheme for Two-Receiver Broadcast Channels with Receiver Message Side Information
Authors:
Behzad Asadi,
Lawrence Ong,
Sarah J. Johnson
Abstract:
This paper investigates the capacity regions of two-receiver broadcast channels where each receiver (i) has both common and private-message requests, and (ii) knows part of the private message requested by the other receiver as side information. We first propose a transmission scheme and derive an inner bound for the two-receiver memoryless broadcast channel. We next prove that this inner bound is…
▽ More
This paper investigates the capacity regions of two-receiver broadcast channels where each receiver (i) has both common and private-message requests, and (ii) knows part of the private message requested by the other receiver as side information. We first propose a transmission scheme and derive an inner bound for the two-receiver memoryless broadcast channel. We next prove that this inner bound is tight for the deterministic channel and the more capable channel, thereby establishing their capacity regions. We show that this inner bound is also tight for all classes of two-receiver broadcast channels whose capacity regions were known prior to this work. Our proposed scheme is consequently a unified capacity-achieving scheme for these classes of broadcast channels.
△ Less
Submitted 15 April, 2015; v1 submitted 31 March, 2015;
originally announced April 2015.
-
Optimal Coding Schemes for the Three-Receiver AWGN Broadcast Channel with Receiver Message Side Information
Authors:
Behzad Asadi,
Lawrence Ong,
Sarah J. Johnson
Abstract:
This paper investigates the capacity region of the three-receiver AWGN broadcast channel where the receivers (i) have private-message requests and (ii) may know some of the messages requested by other receivers as side information. We first classify all 64 possible side information configurations into eight groups, each consisting of eight members. We next construct transmission schemes, and deriv…
▽ More
This paper investigates the capacity region of the three-receiver AWGN broadcast channel where the receivers (i) have private-message requests and (ii) may know some of the messages requested by other receivers as side information. We first classify all 64 possible side information configurations into eight groups, each consisting of eight members. We next construct transmission schemes, and derive new inner and outer bounds for the groups. This establishes the capacity region for 52 out of 64 possible side information configurations. For six groups (i.e., groups 1, 2, 3, 5, 6, and 8 in our terminology), we establish the capacity region for all their members, and show that it tightens both the best known inner and outer bounds. For group 4, our inner and outer bounds tighten the best known inner bound and/or outer bound for all the group members. Moreover, our bounds coincide at certain regions, which can be characterized by two thresholds. For group 7, our inner and outer bounds coincide for four members, thereby establishing the capacity region. For the remaining four members, our bounds tighten both the best known inner and outer bounds.
△ Less
Submitted 28 July, 2015; v1 submitted 20 November, 2014;
originally announced November 2014.
-
Coding Schemes for a Class of Receiver Message Side Information in AWGN Broadcast Channels
Authors:
Behzad Asadi,
Lawrence Ong,
Sarah J. Johnson
Abstract:
This paper considers the three-receiver AWGN broadcast channel where the receivers (i) have private-message requests and (ii) know some of the messages requested by other receivers as side information. For this setup, all possible side information configurations have been recently classified into eight groups and the capacity of the channel has been established for six groups (Asadi et al., ISIT 2…
▽ More
This paper considers the three-receiver AWGN broadcast channel where the receivers (i) have private-message requests and (ii) know some of the messages requested by other receivers as side information. For this setup, all possible side information configurations have been recently classified into eight groups and the capacity of the channel has been established for six groups (Asadi et al., ISIT 2014). We propose inner and outer bounds for the two remaining groups, groups 4 and 7. A distinguishing feature of these two groups is that the weakest receiver knows the requested message of the strongest receiver as side information while the in-between receiver does not. For group 4, the inner and outer bounds coincide at certain regions. For group 7, the inner and outer bounds coincide, thereby establishing the capacity, for four members out of all eight members of the group; for the remaining four members, the proposed bounds reduce the gap between the best known inner and outer bounds.
△ Less
Submitted 26 August, 2014;
originally announced August 2014.
-
On Index Coding in Noisy Broadcast Channels with Receiver Message Side Information
Authors:
Behzad Asadi,
Lawrence Ong,
Sarah J. Johnson
Abstract:
This letter investigates the role of index coding in the capacity of AWGN broadcast channels with receiver message side information. We first show that index coding is unnecessary where there are two receivers; multiplexing coding and superposition coding are sufficient to achieve the capacity region. We next show that, for more than two receivers, multiplexing coding and superposition coding alon…
▽ More
This letter investigates the role of index coding in the capacity of AWGN broadcast channels with receiver message side information. We first show that index coding is unnecessary where there are two receivers; multiplexing coding and superposition coding are sufficient to achieve the capacity region. We next show that, for more than two receivers, multiplexing coding and superposition coding alone can be suboptimal. We give an example where these two coding schemes alone cannot achieve the capacity region, but adding index coding can. This demonstrates that, in contrast to the two-receiver case, multiplexing coding cannot fulfill the function of index coding where there are three or more receivers.
△ Less
Submitted 28 January, 2014;
originally announced January 2014.
-
The Capacity of Three-Receiver AWGN Broadcast Channels with Receiver Message Side Information
Authors:
Behzad Asadi,
Lawrence Ong,
Sarah J. Johnson
Abstract:
This paper investigates the capacity region of three-receiver AWGN broadcast channels where the receivers (i) have private-message requests and (ii) know the messages requested by some other receivers as side information. We classify these channels based on their side information into eight groups, and construct different transmission schemes for the groups. For six groups, we characterize the cap…
▽ More
This paper investigates the capacity region of three-receiver AWGN broadcast channels where the receivers (i) have private-message requests and (ii) know the messages requested by some other receivers as side information. We classify these channels based on their side information into eight groups, and construct different transmission schemes for the groups. For six groups, we characterize the capacity region, and show that it improves both the best known inner and outer bounds. For the remaining two groups, we improve the best known inner bound by using side information during channel decoding at the receivers.
△ Less
Submitted 6 January, 2014;
originally announced January 2014.
-
Memory Efficient Decoders using Spatially Coupled Quasi-Cyclic LDPC Codes
Authors:
Vikram Arkalgud Chandrasetty,
Sarah J. Johnson,
Gottfried Lechner
Abstract:
In this paper we propose the construction of Spatially Coupled Low-Density Parity-Check (SC-LDPC) codes using a periodic time-variant Quasi-Cyclic (QC) algorithm. The QC based approach is optimized to obtain memory efficiency in storing the parity-check matrix in the decoders. A hardware model of the parity-check storage units has been designed for Xilinx FPGA to compare the logic and memory requi…
▽ More
In this paper we propose the construction of Spatially Coupled Low-Density Parity-Check (SC-LDPC) codes using a periodic time-variant Quasi-Cyclic (QC) algorithm. The QC based approach is optimized to obtain memory efficiency in storing the parity-check matrix in the decoders. A hardware model of the parity-check storage units has been designed for Xilinx FPGA to compare the logic and memory requirements for various approaches. It is shown that the proposed QC SC-LDPC code (with optimization) can be stored with reasonable logic resources and without the need of block memory in the FPGA. In addition, a significant improvement in the processing speed is also achieved.
△ Less
Submitted 17 October, 2013; v1 submitted 24 May, 2013;
originally announced May 2013.
-
Optimal Coding Functions for Pairwise Message Sharing on Finite-Field Multi-Way Relay Channels
Authors:
Lawrence Ong,
Sarah J. Johnson,
Christopher M. Kellett
Abstract:
This paper considers the finite-field multi-way relay channel with pairwise message sharing, where multiple users exchange messages through a single relay and where the users may share parts of their source messages (meaning that some message parts are known/common to more than one user). In this paper, we design an optimal functional-decode-forward coding scheme that takes the shared messages int…
▽ More
This paper considers the finite-field multi-way relay channel with pairwise message sharing, where multiple users exchange messages through a single relay and where the users may share parts of their source messages (meaning that some message parts are known/common to more than one user). In this paper, we design an optimal functional-decode-forward coding scheme that takes the shared messages into account. More specifically, we design an optimal function for the relay to decode (from the users on the uplink) and forward (back to the users on the downlink). We then show that this proposed function-decode-forward coding scheme can achieve the capacity region of the finite-field multi-way relay channel with pairwise message sharing. This paper generalizes our previous result for the case of three users to any number of users.
△ Less
Submitted 5 February, 2014; v1 submitted 20 January, 2013;
originally announced January 2013.
-
Multi-Way Relay Networks: Orthogonal Uplink, Source-Channel Separation and Code Design
Authors:
Roy Timo,
Gottfried Lechner,
Lawrence Ong,
Sarah J. Johnson
Abstract:
We consider a multi-way relay network with an orthogonal uplink and correlated sources, and we characterise reliable communication (in the usual Shannon sense) with a single-letter expression. The characterisation is obtained using a joint source-channel random-coding argument, which is based on a combination of Wyner et al.'s "Cascaded Slepian-Wolf Source Coding" and Tuncel's "Slepian-Wolf Coding…
▽ More
We consider a multi-way relay network with an orthogonal uplink and correlated sources, and we characterise reliable communication (in the usual Shannon sense) with a single-letter expression. The characterisation is obtained using a joint source-channel random-coding argument, which is based on a combination of Wyner et al.'s "Cascaded Slepian-Wolf Source Coding" and Tuncel's "Slepian-Wolf Coding over Broadcast Channels". We prove a separation theorem for the special case of two nodes; that is, we show that a modular code architecture with separate source and channel coding functions is (asymptotically) optimal. Finally, we propose a practical coding scheme based on low-density parity-check codes, and we analyse its performance using multi-edge density evolution.
△ Less
Submitted 30 September, 2012;
originally announced October 2012.
-
On Capacity and Optimal Scheduling for the Half-Duplex Multiple-Relay Channel
Authors:
Lawrence Ong,
Mehul Motani,
Sarah J. Johnson
Abstract:
We study the half-duplex multiple-relay channel (HD-MRC) where every node can either transmit or listen but cannot do both at the same time. We obtain a capacity upper bound based on a max-flow min-cut argument and achievable transmission rates based on the decode-forward (DF) coding strategy, for both the discrete memoryless HD-MRC and the phase-fading HD-MRC. We discover that both the upper boun…
▽ More
We study the half-duplex multiple-relay channel (HD-MRC) where every node can either transmit or listen but cannot do both at the same time. We obtain a capacity upper bound based on a max-flow min-cut argument and achievable transmission rates based on the decode-forward (DF) coding strategy, for both the discrete memoryless HD-MRC and the phase-fading HD-MRC. We discover that both the upper bound and the achievable rates are functions of the transmit/listen state (a description of which nodes transmit and which receive). More precisely, they are functions of the time fraction of the different states, which we term a schedule. We formulate the optimal scheduling problem to find an optimal schedule that maximizes the DF rate. The optimal scheduling problem turns out to be a maximin optimization, for which we propose an algorithmic solution. We demonstrate our approach on a four-node multiple-relay channel, obtaining closed-form solutions in certain scenarios. Furthermore, we show that for the received signal-to-noise ratio degraded phase-fading HD-MRC, the optimal scheduling problem can be simplified to a max optimization.
△ Less
Submitted 16 July, 2012;
originally announced July 2012.
-
On the Capacity of the Binary-Symmetric Parallel-Relay Network
Authors:
Lawrence Ong,
Sarah J. Johnson,
Christopher M. Kellett
Abstract:
We investigate the binary-symmetric parallel-relay network where there is one source, one destination, and multiple relays in parallel. We show that forwarding relays, where the relays merely transmit their received signals, achieve the capacity in two ways: with coded transmission at the source and a finite number of relays, or uncoded transmission at the source and a sufficiently large number of…
▽ More
We investigate the binary-symmetric parallel-relay network where there is one source, one destination, and multiple relays in parallel. We show that forwarding relays, where the relays merely transmit their received signals, achieve the capacity in two ways: with coded transmission at the source and a finite number of relays, or uncoded transmission at the source and a sufficiently large number of relays. On the other hand, decoding relays, where the relays decode the source message, re-encode, and forward it to the destination, achieve the capacity when the number of relays is small. In addition, we show that any coding scheme that requires decoding at any relay is suboptimal in large parallel-relay networks, where forwarding relays achieve strictly higher rates.
△ Less
Submitted 16 July, 2012;
originally announced July 2012.
-
On the Equal-Rate Capacity of the AWGN Multiway Relay Channel
Authors:
Lawrence Ong,
Christopher M. Kellett,
Sarah J. Johnson
Abstract:
The L-user additive white Gaussian noise multiway relay channel is investigated, where L users exchange information at the same rate through a single relay. A new achievable rate region, based on the functional-decode-forward coding strategy, is derived. For the case where there are three or more users, and all nodes transmit at the same power, the capacity is obtained. For the case where the rela…
▽ More
The L-user additive white Gaussian noise multiway relay channel is investigated, where L users exchange information at the same rate through a single relay. A new achievable rate region, based on the functional-decode-forward coding strategy, is derived. For the case where there are three or more users, and all nodes transmit at the same power, the capacity is obtained. For the case where the relay power scales with the number of users, it is shown that both compress-forward and functional-decode-forward achieve rates within a constant number of bits of the capacity at all SNR levels; in addition, functional-decode-forward outperforms compress-forward and complete-decode-forward at high SNR levels.
△ Less
Submitted 16 July, 2012;
originally announced July 2012.
-
The Finite Field Multi-Way Relay Channel with Correlated Sources: Beyond Three Users
Authors:
Lawrence Ong,
Roy Timo,
Sarah J. Johnson
Abstract:
The multi-way relay channel (MWRC) models cooperative communication networks in which many users exchange messages via a relay. In this paper, we consider the finite field MWRC with correlated messages. The problem is to find all achievable rates, defined as the number of channel uses required per reliable exchange of message tuple. For the case of three users, we have previously established that…
▽ More
The multi-way relay channel (MWRC) models cooperative communication networks in which many users exchange messages via a relay. In this paper, we consider the finite field MWRC with correlated messages. The problem is to find all achievable rates, defined as the number of channel uses required per reliable exchange of message tuple. For the case of three users, we have previously established that for a special class of source distributions, the set of all achievable rates can be found [Ong et al., ISIT 2010]. The class is specified by an almost balanced conditional mutual information (ABCMI) condition. In this paper, we first generalize the ABCMI condition to the case of more than three users. We then show that if the sources satisfy the ABCMI condition, then the set of all achievable rates is found and can be attained using a separate source-channel coding architecture.
△ Less
Submitted 24 May, 2012;
originally announced May 2012.
-
The Capacity Region of Restricted Multi-Way Relay Channels with Deterministic Uplinks
Authors:
Lawrence Ong,
Sarah J. Johnson
Abstract:
This paper considers the multi-way relay channel (MWRC) where multiple users exchange messages via a single relay. The capacity region is derived for a special class of MWRCs where (i) the uplink and the downlink are separated in the sense that there is no direct user-to-user links, (ii) the channel is restricted in the sense that each user's transmitted channel symbols can depend on only its own…
▽ More
This paper considers the multi-way relay channel (MWRC) where multiple users exchange messages via a single relay. The capacity region is derived for a special class of MWRCs where (i) the uplink and the downlink are separated in the sense that there is no direct user-to-user links, (ii) the channel is restricted in the sense that each user's transmitted channel symbols can depend on only its own message, but not on its received channel symbols, and (iii) the uplink is any deterministic function.
△ Less
Submitted 24 May, 2012;
originally announced May 2012.
-
The Three-User Finite-Field Multi-Way Relay Channel with Correlated Sources
Authors:
Lawrence Ong,
Gottfried Lechner,
Sarah J. Johnson,
Christopher M. Kellett
Abstract:
This paper studies the three-user finite-field multi-way relay channel, where the users exchange messages via a relay. The messages are arbitrarily correlated, and the finite-field channel is linear and is subject to additive noise of arbitrary distribution. The problem is to determine the minimum achievable source-channel rate, defined as channel uses per source symbol needed for reliable communi…
▽ More
This paper studies the three-user finite-field multi-way relay channel, where the users exchange messages via a relay. The messages are arbitrarily correlated, and the finite-field channel is linear and is subject to additive noise of arbitrary distribution. The problem is to determine the minimum achievable source-channel rate, defined as channel uses per source symbol needed for reliable communication. We combine Slepian-Wolf source coding and functional-decode-forward channel coding to obtain the solution for two classes of source and channel combinations. Furthermore, for correlated sources that have their common information equal their mutual information, we propose a new coding scheme to achieve the minimum source-channel rate.
△ Less
Submitted 16 June, 2013; v1 submitted 8 January, 2012;
originally announced January 2012.
-
Functional-Decode-Forward for the General Discrete Memoryless Two-Way Relay Channel
Authors:
Lawrence Ong,
Christopher M. Kellett,
Sarah J. Johnson
Abstract:
We consider the general discrete memoryless two-way relay channel, where two users exchange messages via a relay, and propose two functional-decode-forward coding strategies for this channel. Functional-decode-forward involves the relay decoding a function of the users' messages rather than the individual messages themselves. This function is then broadcast back to the users, which can be used in…
▽ More
We consider the general discrete memoryless two-way relay channel, where two users exchange messages via a relay, and propose two functional-decode-forward coding strategies for this channel. Functional-decode-forward involves the relay decoding a function of the users' messages rather than the individual messages themselves. This function is then broadcast back to the users, which can be used in conjunction with the user's own message to decode the other user's message. Via a numerical example, we show that functional-decode-forward with linear codes is capable of achieving strictly larger sum rates than those achievable by other strategies.
△ Less
Submitted 14 November, 2011;
originally announced November 2011.
-
The Capacity of a Class of Multi-Way Relay Channels
Authors:
Lawrence Ong,
Sarah J. Johnson,
Christopher M. Kellett
Abstract:
The capacity of a class of multi-way relay channels, where L users communicate via a relay (at possibly different rates), is derived for the case where the channel outputs are modular sums of the channel inputs and the receiver noise. The cut-set upper bound to the capacity is shown to be achievable. More specifically, the capacity is achieved using (i) rate splitting, (ii) functional-decode-forwa…
▽ More
The capacity of a class of multi-way relay channels, where L users communicate via a relay (at possibly different rates), is derived for the case where the channel outputs are modular sums of the channel inputs and the receiver noise. The cut-set upper bound to the capacity is shown to be achievable. More specifically, the capacity is achieved using (i) rate splitting, (ii) functional-decode-forward, and (iii) joint source-channel coding. We note that while separate source-channel coding can achieve the common-rate capacity, joint source-channel coding is used to achieve the capacity for the general case where the users are transmitting at different rates.
△ Less
Submitted 14 November, 2011;
originally announced November 2011.
-
The Capacity Region of the Restricted Two-Way Relay Channel with Any Deterministic Uplink
Authors:
Lawrence Ong,
Sarah J. Johnson
Abstract:
This paper considers the two-way relay channel (TWRC) where two users communicate via a relay. For the restricted TWRC where the uplink from the users to the relay is any deterministic function and the downlink from the relay to the users is any arbitrary channel, the capacity region is obtained. The TWRC considered is restricted in the sense that each user can only transmit a function of its mess…
▽ More
This paper considers the two-way relay channel (TWRC) where two users communicate via a relay. For the restricted TWRC where the uplink from the users to the relay is any deterministic function and the downlink from the relay to the users is any arbitrary channel, the capacity region is obtained. The TWRC considered is restricted in the sense that each user can only transmit a function of its message.
△ Less
Submitted 10 January, 2012; v1 submitted 8 November, 2011;
originally announced November 2011.
-
The Half-Duplex AWGN Single-Relay Channel: Full Decoding or Partial Decoding?
Authors:
Lawrence Ong,
Sarah J. Johnson,
Christopher M. Kellett
Abstract:
This paper compares the partial-decode-forward and the complete-decode-forward coding strategies for the half-duplex Gaussian single-relay channel. We analytically show that the rate achievable by partial-decode-forward outperforms that of the more straightforward complete-decode-forward by at most 12.5%. Furthermore, in the following asymptotic cases, the gap between the partial-decode-forward an…
▽ More
This paper compares the partial-decode-forward and the complete-decode-forward coding strategies for the half-duplex Gaussian single-relay channel. We analytically show that the rate achievable by partial-decode-forward outperforms that of the more straightforward complete-decode-forward by at most 12.5%. Furthermore, in the following asymptotic cases, the gap between the partial-decode-forward and the complete-decode-forward rates diminishes: (i) when the relay is close to the source, (ii) when the relay is close to the destination, and (iii) when the SNR is low. In addition, when the SNR increases, this gap, when normalized to the complete-decode-forward rate, also diminishes. Consequently, significant performance improvements are not achieved by optimizing the fraction of data the relay should decode and forward, over simply decoding the entire source message.
△ Less
Submitted 30 July, 2012; v1 submitted 8 November, 2011;
originally announced November 2011.
-
Spatially Coupled Repeat-Accumulate Codes
Authors:
Sarah J. Johnson,
Gottfried Lechner
Abstract:
In this paper we propose a new class of spatially coupled codes based on repeat-accumulate protographs. We show that spatially coupled repeat-accumulate codes have several advantages over spatially coupled low-density parity-check codes including simpler encoders and slightly higher code rates than spatially coupled low-density parity-check codes with similar thresholds and decoding complexity (as…
▽ More
In this paper we propose a new class of spatially coupled codes based on repeat-accumulate protographs. We show that spatially coupled repeat-accumulate codes have several advantages over spatially coupled low-density parity-check codes including simpler encoders and slightly higher code rates than spatially coupled low-density parity-check codes with similar thresholds and decoding complexity (as measured by the Tanner graph edge density).
△ Less
Submitted 31 October, 2011;
originally announced October 2011.
-
Joint Channel-Network Coding Strategies for Networks with Low Complexity Relays
Authors:
Sarah J. Johnson,
Lawrence Ong,
Christopher M. Kellett
Abstract:
We investigate joint network and channel coding schemes for networks when relay nodes are not capable of performing channel coding operations. Rather, channel encoding is performed at the source node while channel decoding is done only at the destination nodes. We examine three different decoding strategies: independent network-then-channel decoding, serial network and channel decoding, and joint…
▽ More
We investigate joint network and channel coding schemes for networks when relay nodes are not capable of performing channel coding operations. Rather, channel encoding is performed at the source node while channel decoding is done only at the destination nodes. We examine three different decoding strategies: independent network-then-channel decoding, serial network and channel decoding, and joint network and channel decoding. Furthermore, we describe how to implement such joint network and channel decoding using iteratively decodable error correction codes. Using simple networks as a model, we derive achievable rate regions and use simulations to demonstrate the effectiveness of the three decoders.
△ Less
Submitted 24 October, 2011;
originally announced October 2011.
-
On Achievable Rate Regions of the Asymmetric AWGN Two-Way Relay Channel
Authors:
Lawrence Ong,
Christopher M. Kellett,
Sarah J. Johnson
Abstract:
This paper investigates the additive white Gaussian noise two-way relay channel, where two users exchange messages through a relay. Asymmetrical channels are considered where the users can transmit data at different rates and at different power levels. We modify and improve existing coding schemes to obtain three new achievable rate regions. Comparing four downlink-optimal coding schemes, we show…
▽ More
This paper investigates the additive white Gaussian noise two-way relay channel, where two users exchange messages through a relay. Asymmetrical channels are considered where the users can transmit data at different rates and at different power levels. We modify and improve existing coding schemes to obtain three new achievable rate regions. Comparing four downlink-optimal coding schemes, we show that the scheme that gives the best sum-rate performance is (i) complete-decode-forward, when both users transmit at low signal-to-noise ratio (SNR); (ii) functional-decode-forward with nested lattice codes, when both users transmit at high SNR; (iii) functional-decode-forward with rate splitting and time-division multiplexing, when one user transmits at low SNR and another user at medium--high SNR.
△ Less
Submitted 15 June, 2011;
originally announced June 2011.
-
The Finite Field Multi-Way Relay Channel with Correlated Sources: The Three-User Case
Authors:
Lawrence Ong,
Roy Timo,
Gottfried Lechner,
Sarah J. Johnson,
Christopher M. Kellett
Abstract:
The three-user finite field multi-way relay channel with correlated sources is considered. The three users generate possibly correlated messages, and each user is to transmit its message to the two other users reliably in the Shannon sense. As there is no direct link among the users, communication is carried out via a relay, and the link from the users to the relay and those from the relay to the…
▽ More
The three-user finite field multi-way relay channel with correlated sources is considered. The three users generate possibly correlated messages, and each user is to transmit its message to the two other users reliably in the Shannon sense. As there is no direct link among the users, communication is carried out via a relay, and the link from the users to the relay and those from the relay to the users are finite field adder channels with additive noise of arbitrary distribution. The problem is to determine the set of all possible achievable rates, defined as channel uses per source symbol for reliable communication. For two classes of source/channel combinations, the solution is obtained using Slepian-Wolf source coding combined with functional-decode-forward channel coding.
△ Less
Submitted 15 June, 2011;
originally announced June 2011.
-
The Capacity Region of Multiway Relay Channels Over Finite Fields with Full Data Exchange
Authors:
Lawrence Ong,
Sarah J. Johnson,
Christopher M. Kellett
Abstract:
The multi-way relay channel is a multicast network where L users exchange data through a relay. In this paper, the capacity region of a class of multi-way relay channels is derived, where the channel inputs and outputs take values over finite fields. The cut-set upper bound to the capacity region is derived and is shown to be achievable by our proposed functional-decode-forward coding strategy. Mo…
▽ More
The multi-way relay channel is a multicast network where L users exchange data through a relay. In this paper, the capacity region of a class of multi-way relay channels is derived, where the channel inputs and outputs take values over finite fields. The cut-set upper bound to the capacity region is derived and is shown to be achievable by our proposed functional-decode-forward coding strategy. More specifically, for the general case where the users can transmit at possibly different rates, functional-decode-forward, combined with rate splitting and joint source-channel decoding, is proved to achieve the capacity region; while for the case where all users transmit at a common rate, rate splitting and joint source-channel decoding are not required to achieve the capacity. That the capacity-achieving coding strategies do not utilize the users' received signals in the users' encoding functions implies that feedback does not increase the capacity region of this class of multi-way relay channels.
△ Less
Submitted 10 June, 2011;
originally announced June 2011.
-
The Binary-Symmetric Parallel-Relay Network
Authors:
Lawrence Ong,
Sarah J. Johnson,
Christopher M. Kellett
Abstract:
We present capacity results of the binary-symmetric parallel-relay network, where there is one source, one destination, and K relays in parallel. We show that forwarding relays, where the relays merely transmit their received signals, achieve the capacity in two ways: with coded transmission at the source and a finite number of relays, or uncoded transmission at the source and a sufficiently large…
▽ More
We present capacity results of the binary-symmetric parallel-relay network, where there is one source, one destination, and K relays in parallel. We show that forwarding relays, where the relays merely transmit their received signals, achieve the capacity in two ways: with coded transmission at the source and a finite number of relays, or uncoded transmission at the source and a sufficiently large number of relays. On the other hand, decoding relays, where the relays decode the source message, re-encode, and forward it to the destination, achieve the capacity when the number of relays is small.
△ Less
Submitted 13 April, 2010;
originally announced April 2010.
-
Capacity Theorems for the AWGN Multi-Way Relay Channel
Authors:
Lawrence Ong,
Christopher M. Kellett,
Sarah J. Johnson
Abstract:
The L-user additive white Gaussian noise multi-way relay channel is considered, where multiple users exchange information through a single relay at a common rate. Existing coding strategies, i.e., complete-decode-forward and compress-forward are shown to be bounded away from the cut-set upper bound at high signal-to-noise ratios (SNR). It is known that the gap between the compress-forward rate and…
▽ More
The L-user additive white Gaussian noise multi-way relay channel is considered, where multiple users exchange information through a single relay at a common rate. Existing coding strategies, i.e., complete-decode-forward and compress-forward are shown to be bounded away from the cut-set upper bound at high signal-to-noise ratios (SNR). It is known that the gap between the compress-forward rate and the capacity upper bound is a constant at high SNR, and that between the complete-decode-forward rate and the upper bound increases with SNR at high SNR. In this paper, a functional-decode-forward coding strategy is proposed. It is shown that for L >= 3, complete-decode-forward achieves the capacity when SNR <= 0 dB, and functional-decode-forward achieves the capacity when SNR >= 0 dB. For L=$, functional-decode-forward achieves the capacity asymptotically as SNR increases.
△ Less
Submitted 13 April, 2010;
originally announced April 2010.
-
An Optimal Coding Strategy for the Binary Multi-Way Relay Channel
Authors:
Lawrence Ong,
Sarah J. Johnson,
Christopher M. Kellett
Abstract:
We derive the capacity of the binary multi-way relay channel, in which multiple users exchange messages at a common rate through a relay. The capacity is achieved using a novel functional-decode-forward coding strategy. In the functional-decode-forward coding strategy, the relay decodes functions of the users' messages without needing to decode individual messages. The functions to be decoded by t…
▽ More
We derive the capacity of the binary multi-way relay channel, in which multiple users exchange messages at a common rate through a relay. The capacity is achieved using a novel functional-decode-forward coding strategy. In the functional-decode-forward coding strategy, the relay decodes functions of the users' messages without needing to decode individual messages. The functions to be decoded by the relay are defined such that when the relay broadcasts the functions back to the users, every user is able to decode the messages of all other users.
△ Less
Submitted 13 April, 2010;
originally announced April 2010.