- Cooperative Communication and Network Coding
- Wireless Communication Security Techniques
- Advanced MIMO Systems Optimization
- Error Correcting Code Techniques
- Cognitive Radio Networks and Spectrum Sensing
- Sparse and Compressive Sensing Techniques
- Blind Source Separation Techniques
- Advanced Wireless Communication Technologies
- Game Theory and Applications
- Gene Regulatory Network Analysis
- Distributed Sensor Networks and Detection Algorithms
- Ultrasound Imaging and Elastography
- Opinion Dynamics and Social Influence
- Microwave Imaging and Scattering Analysis
- Full-Duplex Wireless Communications
- Computability, Logic, AI Algorithms
KTH Royal Institute of Technology
2010-2014
Ericsson (Sweden)
2014
We consider the symmetric discrete memoryless relay channel with orthogonal receiver components and show that polar codes are suitable for decode-and-forward compress-and-forward relaying. In first case we prove capacity achieving physically degraded channel; stochastically channels our construction provides an achievable rate. second construct sequences of achieve rate by nesting source compression into coding. both cases constructions inherit most properties codes. particular, encoding...
We consider an extension of the cognitive radio channel model in which secondary transmitter has to obtain (``learn") primary message a first phase rather than having non-causal knowledge it. propose achievable rate region that combines elements decode--and--forward relaying w
We consider the coexistence of a multiple-input multiple-output secondary system with single-output primary link different degrees coordination between systems. First, for uncoordinated underlay cognitive radio scenario, we fully characterize optimal parameters that maximize rate subject to constraint transmission strategy combines splitting and interference cancellation. Second, establish model coordinated overlay scenario consists message-learning phase followed by communication phase....
In this paper we consider the coexistence of a single-input single-output (SISO) primary link with multiple-input (MISO) secondary user pair that has non-causal knowledge message. We study an achievable rate region exploits by combining selfless relaying to maintain supported dirty coding pre-cancel interference at receiver. find optimal choice power allocation between these operating modes transmitter as well beamforming vectors. Moreover, address robustness solution uncertainties in...
We construct polar codes for binary relay channels with orthogonal receiver components. show that achieve the cut-set bound when are symmetric and relay-destination link supports compress-and-forward relaying based on Slepian-Wolf coding. More generally, we a particular version of rate is achievable using Wyner-Ziv In both cases block error probability can be bounded as O(2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">-(Nβ)</sup> ) 0 <; β 1/2...
We consider coordination in cascade networks and construct sequences of polar codes that achieve any point a special region the empirical capacity region. Our design combines ele ...
We propose a new compress-and-forward implementation for the relay channel based on joint source-channel coding techniques. The performs scalar quantization of its observation in combination with redundant index mapping. Our system utilizes correlation between quantized signal and direct-link transmitted symbols as redundancy error protection relay-to-destination link. In order to fully exploit this destination requires iterative decoding recover sent by relay. Once regenerated, is optimally...
We propose a new code design for compress-and-forward relaying over bandlimited relay-to-destination channels. The main contribution of this paper is based on joint (source-channel) coding and modulation that uses the correlation between observations at relay destination as protection against channel errors. This allows nodes with reduced complexity, shifting most processing requirements to node. Moreover, by using scalar quantizers an entropy constraint our system provides remarkable...
In this work, the coexistence of a single-input single-output (SISO) primary link and multiple-input (MISO) secondary is considered, where transmitter has non-causal knowledge message transmits both messages. The optimal beamforming vectors power allocation at are derived to maximize achievable rate while satisfying requirement. Moreover, linear precoding obtained by semidefinite relaxation rank-one decomposition, when number antennas larger than two. Finally, performance proposed scheme...
We study the problem of controlling interference created to an external observer by a communication processes. model in terms its type (empirical distribution), and we analyze consequences placing constraints on admissible type. Considering single interfering link, characterize communication-interference capacity region. Then, look at scenario where is jointly two users allowed coordinate their actions prior transmission. In this case, tradeoff involves as well coordination. establish...
The coexistence of a single-input single-output (SISO) primary link and multiple-input (MISO) secondary is considered in an extended cognitive radio channel setup, where the transmitter has to obtain ("learn") message first phase rather than having non-causal knowledge it. An achievable rate region derived that combines decode-and-forward relaying with linear precoding second phase. optimal transmission strategy found maximizes requirement. performance proposed compared, dirty-paper coding...
We consider the problem of estimating sparse vectors from noisy linear measurements in high dimensionality regime. For a fixed number k nonzero entries, we study fundamental relationship between two relevant quantities: measurement rate, which characterizes asymptotic behavior dimensions matrix terms ratio m/log n (with m being and dimension vector), estimation mean square error. First, use an information-theoretic approach to derive sufficient conditions on rate reliably recover part...
For compressive sensing, we derive achievable performance guarantees for recovering partial support sets of sparse vectors. The are determined in terms the fraction signal power to be detected and measurement rate, defined as a relation between dimensions matrix. Based on this result tradeoff rate mean square error, illustrate it by numerical example.
In this paper the problem of sum-rate maximization for secondary cognitive users (SU) in presence a primary user (PU) transmission is considered. We assume that all are equipped with multiple transmit/receive antennas and must not induce more interference to than it defined permissive policy expressed terms spectrum mask or temperature constraint. employ game-theory find so-called correlated equilibrium corresponds playing strategy definitions users. Actually, Vickrey-Clarke-Groves theory...
We study the problem of controlling interference created to an external observer by a communication processes. model in terms its type (empirical distribution), and we analyze consequences placing constraints on admissible type. Considering single interfering link, characterize communication-interference capacity region. Then, look at scenario where is jointly two users allowed coordinate their actions prior transmission. In this case, trade-off involves as well coordination. establish...