each pair of constellation points. The binary symbol error that corresponds to an edge is its edge label. For a constellation with 2 n points, each bi
|
|
- David Cannon
- 5 years ago
- Views:
Transcription
1 36th Annual Allerton Conference on Communication, Control, and Computing, September 23-2, 1998 Prole Optimal 8-QAM and 32-QAM Constellations Xueting Liu and Richard D. Wesel Electrical Engineering Department University of California, Los Angeles Los Angeles, CA and Abstract For low-rate trellis codes that do not utilize uncoded bits, a new approach to constellation labeling which maximizes the constellation edge prole can provide improved metrics. We investigate the edge prole optimality for 8-QAM and 32- QAM constellations. The labeling structures that achieve the optimal edge proles for 8-QAM and 32-QAM are presented. Explicit proofs of the optimal edge proles for each case are demonstrated. Also several other quasi-gray labelings for 32-QAM that are not prole optimal are given. 1 Introduction For low-rate trellis codes that do not utilize uncoded bits, the standard techniques of set-partitioning and Gray labeling are not well motivated. A new approach to constellation labeling maximizes the constellations edge prole [1], [2]. This approach produces better trellis codes (in the sense of the broadcast code design metrics) than the standard techniques. A low-rate 32-QAM trellis code design example in [2] shows how the new approach can yield improved metrics at low rates. This paper investigates 8-QAM and 32-QAM labeling strategies, identifying prole optimal labelings for each and proving their optimality. We also classify all quasi-gray labelings for 32-QAM into prole optimal and non-prole optimal labelings. Section 2 reviews the denition of the edge prole and some basic labeling lemmas [1] [2]. Section 3 presents the optimal edge prole 8-QAM constellation. Section 4 gives the structure and proof of optimal 32-QAM constellation. Section provides quasi-gray labelings for 32-QAM that are not prole superior. Conclusion is given in section 6, followed by an appendix containing proofs of several lemmas used in the paper. 2 Denition of the edge prole and basic labeling lemmas The denition of the edge prole and three lemmas about labeled constellations appear in [2], [1]. Consider the constellation to be a fully connected graph with an edge between This research is supported with a grant from Pacic Bell in conjunction with UC Micro grant
2 each pair of constellation points. The binary symbol error that corresponds to an edge is its edge label. For a constellation with 2 n points, each binary symbol error labels 2 n?1 edges. The edges with a given binary symbol error may not all have the same Euclidean distance. We are interested in the smallest distance associated with each edge label. We list denitions and basic lemmas below on which our following discussion are based. Denition 1 The edge prole of a labeled constellation is thonotonically increasing list of minimum squared distances, one for each nonzero edge label [2]. Denition 2 C 1 is prole superior to C 2 if the edge prole for C 1 is element by element greater than or equal to the edge prole for C 2, with at least one strict inequality [2]. Lemma 1 All the edges emanating from a given point must have dierent labels [1]. Lemma 2 Two dierent paths emanating from the same initial constellation point end at the same nal constellation point and form a cycle i they have the same edge label sum, i.e., the two dierent paths emanating from the same initial constellation point can't have the same edge label sum i they form a new path instead of a cycle [1], [3]. Lemma 3 If all points in a constellation are connected by paths consisting only of edges with thinimum edge length, then the set of edge labels of thinimum length edges must contain a basis for the set of all edge labels [1]. Another labeling lemma can be directly derived from Lemma 1 and Lemma 3. Lemma 4 If a basis has n distinct minimum-distance edge labels, then these basis vectors can label at most 2 n dierent constellation points. 3 Optimal edge prole of 8-QAM For the 8-QAM and 32-QAM constellations, since Gray codings are impossible [1], there are at least four distinct minimum-distance edge labels in 8-QAM and at least six distinct minimum-distance edge labels in 32-QAM. We refer to 8-QAM or 32-QAM constellation labelings with exactly four or six distinct minimum-distance edge labels as quasi-gray coded. For convenience, we denote thinimum-distance as one unit-distance in the rest of the paper. Figur shows how to construct an edge prole upper bound for 8-QAM. By starting from a central constellation point and drawing an edge to every other constellation point, an upper bound can be formed by these edges since all these edges are distinct and the edge labels appear exactly once among them. Figur gives the obtained upper bound for 8-QAM. The labeling structures that achieve this bound are given in Figure 2 where, and are linearly independent three-bit labels and e 4 must be either e 4 = (possible only in ) or e 4 = (possible in, and (c)). 4 Structure and proof of optimal 32-QAM For the 32-QAM constellation, an upper bound and the best known achievable prole are given in Tabl [2]. This upper bound is obtained by starting with the six distinct minimum distance edge labels and then using the same technique as 8-QAM. 2
3 E i d 2 min (E i) Figur: Edges for prole bound in 8-QAM. Edge prole bound for 8-QAM. e 4 e 4 e 4 e 4 e 4 (c) Figure 2: The optimal 8-QAM constellation labelings. In this paper, the tightness of this upper bound is investigated and a tighter bound which is the same as the best known edge prole is given. We begin with a lemma that partially characterizes the labeling structure imposed by six distinct minimum-distance edge labels. Lemma In any valid quasi-gray coded 32-QAM constellation labeling, one distinct minimum-distance edge label is equal to the XOR summation of three other distinct minimum-distance edge labels. Proof: In any valid quasi-gray coded 32-QAM constellation labeling, there are six distinct minimum-distance edge labels. Call these labels, e 2, e 3, e 4, e and e 6 where through e are the basis vectors. Then e 6 is some linear combination of these basis vectors, e 6 = k 1 k 2 e 2 k 3 e 3 k 4 e 4 k e ; fk i g 2 f0; 1g: (1) According to labeling lemmas 1 and 2, the valid edge labels for a unit-distance square are shown in Figure 3 where fi; j; l; mg 2 f1; 2; 3; 4; ; 6g. We will show that it is impossie i e i e i e l e i and are distinct. One is e 6. Figure 3: Valid edge labels in quasi-gray coded 32-QAM. ble to label a 32-QAM constellation only as in Figure 3. In other words, the structure shown in Figure 3 must appear in any valid 32-QAM constellation labeling. 3
4 Bound Best known Tabl: An upper bound for 32-QAM edge proles and the best known achievable prole. For a 32-QAM constellation, each row or column with six constellation points is labeled with at least three distinct unit-distance edge labels by Lemma 4. Now assuming we label 32-QAM only as in Figure 3 (denoted as Assumption 1), then all the horizontal edges in any column share the same label. Similarly, all the vertical edges in any row share the same label. Under Assumption 1, there arany types of labelings. In any such labeling, assume a minimum distance edge label to be a linear combination of any other vinimum distance edge labels. For any linear combination, a path (not a cycle) consisting of the edge label and its linear combination of edge labels can be found, which means this edge label is not equal to the corresponding linear combination by Lemma 2. This contradicts the fact that one of the six minimum-distance edge labels must be some linear combination of the basis vectors. Thus all such types of labeling structures under Assumption 1 are invalid, and therefore Figure 3 must appear in any valid quasi-gray coded 32-QAM labeling, i.e., e 6 = ; fx; y; zg 2 f1; 2; 3; 4; g: (2) Without loss of generality, we let, e 2, e 3, e 4, e and e 6 be the six distinct minimumdistance edge labels where through e are the basis vectors and e 6 = e 3 e 4 e : (3) Under these assumptions, according to lemmas 1 and 2, (e 2 ) can only label as Figure 3. If let one label rows, then will be used down each row. If also use one to label columns, then will be used across each column. Thus invalid subconstellation labelings as Figure 4 would then appear in 32-QAM labeling, in contradiction to Lemma 1. Thus we obtain another labeling lemma. e1 Figure 4: Invalid subconstellation labeling if labels both rows and columns. Lemma 6 In any valid quasi-gray coded 32-QAM, (e 2 ) can't be used to label both rows and columns. From Lemma, we can derive additional lemmas that characterize the structure of edge proles of quasi-gray coded 32-QAM constellation labelings. Lemma 7 In any valid quasi-gray coded 32-QAM constellation labeling, the structure of the edge prolust conform to Table 2, assuming thinimum-distance is one unit-distance (The proof is given in the Appendix). 4
5 The number of minimum-distance Possible The number of basis vectors in edge labels d 2 min edge labels? 1 1? 1 = 2, 4 2, 4, 8, 10? 2 +? 4 = 1 3, 1,, 9, 13? 3 + = 11 * 1 only possible here for the edge label e 6 = e 3 e 4 e Table 2: The edge prole structure of a valid quasi-gray coded 32-QAM constellation labeling. Lemma 8 In any valid quasi-gray coded 32-QAM, and e 2 can't both be used to label columns or both be used to label rows. (The proof is given in the Appendix). Lemma 9 When two or two e 2 appear in a horizontal or vertical path, an equivalent collapsed version of the subconstellation (i.e., treating the two points connected by or e 2 as one point) contains all labeling information as the original subconstellation. (The proof is given in the Appendix). Lemma 10 In a valid quasi-gray coded 32-QAM, if (e 2 ) appears once in a six-point row (column), then (e 2 ) must appear in the central position, and (e 2 ) can't appear twice in a six-point row (column). (The proof is given in the Appendix). Without loss of generality, let label rows and e 2 label columns. We now prove that the edge length prole in the second row of Tabl is the optimal edge prole. Theorem 1 The edge prole in the second row of Tabl is the optimal edge prole for quasi-gray coded 32-QAM. Proof: In any valid quasi-gray coded 32-QAM constellation, according to Lemmas 1, 2, 6, 8 and 10, is used to label rows and can appear once or three times in a six-point row; e 2 is used to label columns and can appear once or three times in a six-point column. Thus there are four cases we need to investigate: 1) one in a six-point row and one e 2 in a six-point column, 2) one in a six-point row and three e 2 in a six-point column, 3) three in a six-point row and one e 2 in a six-point column, 4) three in a six-point row and three e 2 in a six-point column. Using the symmetry of and e 2, we only need to consider the cases of 1), 2) and 4). Cas: appears once in a six-point row and e 2 appears once in a six-point column. The structure of 32-QAM for Cas is shown in Figure. First consider the labelings of the subconstellation circled by dotted lines in Figure where 6=, 6=, 6= and fx; y; j; kg 2 f3; 4; ; 6g by Lemma 1. According to Lemma 4, at least three distinct basis vectors must be from,, and. By Equation 3,,, and can't be four distinct basis vectors and among,, and, one of them must be equal to another one. By following the labeling lemmas, the three possible types of labeling for the subconstellation are shown in Figure -(d). Using the symmetry of and e 2, gures (c) and (d) are isomorphic. Thus we only need to consider the case of gures and (c). Figure 6 shows the two possible labeling structures for Cas, where,, and are distinct, fj, k, y, mg 2 f3, 4,, 6g and =. From gures 6 and, we can obtain Table 3 which represents the upper bound of edge prole of Cas.
6 ej e 2 e 2 ej (c) (d) Figure : 32QAM labeling structure of Cas., (c), (d) Subconstellation labelings of Cas. / e 2 e 2 e 2 e 2 / Figure 6: Two possiblinds of labeling structures for Cas. Case 2: appears once in a six-point row and e 2 appears three times in a six-point column. For this case, the labeling structure of 32-QAM is shown in Figure 7 where 6= 6=. First consider the labelings of the subconstellation inside the dotted rectangular box. ey (c) (d) e 2 e 2 em (e) (f) (g) Figure 7: 32QAM labeling structure of Case 2. -(g) six possible labelings for the subconstellation of Case 2. Six possible labelings for this subconstellation are shown in gures 7-(g) where,, and are distinct, fj, x, y, mg 2 f3, 4,, 6g and =. Correspondingly there are six possible constellation labelings which are shown in gures 8-(f). Using the labeling lemmas, from gures 8-(f), we obtain Table 4, which represents the upper bound of the constellation labelings respectively where gures 8(c) are isomorphic and so are gures 8(d). Using Lemma 7, Table 3 and Table 4, the upper bound of the edge proles of Case 1and Case 2-(f) can be obtained. We put the upper bound of Cas and Case 2 in Table where all these upper bounds of edge proles are dominated by Cas. 6
7 E in Cas d 2 min(e) E in Cas d 2 min(e) e 2 2 e e 2 2 e 2 2 e 2 2 e e 2 4 e 2 4 e 2 8 e e 2 8 e 2 8 e 2 8 e 2 8 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 Table 3: The upper bound of edge prole of Cas (Figure 6) and Cas (Figure 6). All these upper bounds of edge proles are achievable. The labelings which achieve these upper bounds will be discussed in the next section. Case 4: appears three times in a six-point row and e 2 appears three times in a six-point column. Figure 9 shows the 32-QAM labeling structure for Case 4. We apply Lemma 9 to get the equivalent subconstellation. All other blank edges must be labeled by using e 3 through e 6. In Figure 9, we need to label 9 dierent points by using e 3 through e 6, which have only three basis vectors. By Lemma 4, it is impossible to label Figure 9. Correspondingly it is not possible to label Figure 9. Therefore Case 4 can't appear in any valid quasi-gray coded 32-QAM. In conclusion, the edge prole bound for a quasi-gray coded 32-QAM constellation is the rst row of Table which is the same as the second row of Tabl. All valid quasi-gray coded 32-QAM constellation labelings which achieve this edge prole bound have an optimal edge prole. Further note that only Cas can achieve this edge prole bound. Six distinct classes of Quasi-Gray labeled 32-QAM The labeling [2] which achieves the optimal edge prole is shown below in octal ( on the left-hand-side). All other labelings which achieve the optimal edge prole are isomorphic and have the same labeling structure as Cas (illustrated in Figure 6). Several other quasi-gray labelings that are not prole optimal exist. Corresponding to the labeling structure of Cas (illustrated in Figure 6 ), one labeling which achieves this prole bound is shown below in octal (on the right hand side). All other labelings 7
8 e 2 e 2 e 2 e 2 e 2 e 2 (c) e 2 e 2 e 2 e 2 e 2 e 2 (d) (e) (f) Figure 8: Six possible labelings for Case 2. e 2 e 2 Figure 9: The labeling structure for Case 4. labeling structure for Case 4. The equivalent subconstellation achieving this prole are isomorphic and have the same labeling structure as Cas Corresponding to Case 2(c), Case 2(d), Case 2(e) and Case 2(f), the labelings which achieve their respective upper bounds of edge proles are given below from left hand side to right hand side. Furthermore they have isomorphic labelings and share the same labeling structures given in our proof
9 E in Case 2 (c) d 2 min(e) E in Case 2 (d) d 2 min(e) E in Case 2 (e) d 2 min(e) E in Case 2 (f) d 2 min(e) e 2 2 e 2 2 e 2 2 e e 2 2 e 2 2 e 2 2 e 2 2 e 2 2 e 2 2 e 2 2 e 2 2 e 2 2 e 2 2 e 2 2 e e 2 2 e e e 2 4 e 2 8 e 2 8 e 2 8 e 2 8 e 2 8 e 2 8 e 2 8 e 2 8 e 2 8 e 2 8 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e 2 e Table 4: The upper bound of edge prole of Case 2. Cas Cas Case 2, (c) Case 2, (d) Case 2 (e) Case 2 (f) Table : The upper bounds for 32-QAM edge proles of Cas and Case 2. 6 Conclusion We have identied the optimal edge prole structures for both 8-QAM and Quasi-Gray coded 32-QAM constellations. Several other quasi-gray labeling structures for 32-QAM that are not prole optimal also have been given. For low rate codes, a better edge prole provides larger Euclidean distance which is demonstrated in a code design example by wesel [2]. We also conjecture that even high rate trellis codes benit from a superior edge prole when the number of states is large enough. But this is a moot point, since considering the level of complexity, it is more worthwhile to use turbo codes than trellis codes. Appendix Proof of Lemma 7 Proof: By Equation 3, some edge labels having two minimum-distance edge labels can be treated as having four minimum-distance edge labels and vice versa. Similarly some edge labels having threinimum-distance edge labels can be treated as having vinimumdistance edge labels and vice versa. Thus we group the cases of having two or four minimum-distance basis vectors in edge labels together and group the cases of having 9
10 REFERENCES Prole Optimal 8-QAM and 32-QAM Constellations three or vinimum-distance basis vectors in edge labels together. Since no edge label has the squared distance greater than 13 in 32-QAM edge proles shown in the bound, we only need to consider possible paths of edge labels with the squared distances less or equal to 13. For the case of two or four minimum-distance basis vectors in edge labels, there are six possible paths, which have d 2 min(e) equal to 2 or 4 or 8 or 10. The number of such edge labels is?? = 1. For the case of three or vinimum-distance basis vectors in edge labels, there are also six possible paths, which have d 2 min(e) equal to 1 or or 9 or 13. The number of such edge labels is?? 3 + = 11. Proof of Lemma 8 Proof: Using the symmetry of rows and columns, we only need to show that and e 2 can't both label columns. Assume both and e 2 label columns in 32-QAM, then they can't be used to label rows according to Lemma 6. Since each column with six constellation points must be labeled with at least three distinct minimum-distance edge labels by Lemma 4, then there is at least one column that is not labeled with either or e 2. Therefore we have to label the subconstellations with 12 points or 10 points by using e 3, e 4, e and e 6 (only three of them form a basis and can label at most 8 points), which is impossible. Proof of Lemma 9 Proof: This lemma is true because, e 2 can only be labeled as in Figure 3. So by applying the collapse rule and Lemma 2, the labeling information would not get lost in the collapsed version. Proof of Lemma 10 Proof: Using the symmetry of and e 2, rows and columns, we only need to consider the case of appearing in rows. If labels only one edge label and does not appear in the central position, then we have to label subconstellations with 28 or 22 points by using e 2, e 3, e 4, e and e 6 (only four of them form a basis and can label at most 16 points), which is impossible. Thus must appear in the central position if appears only once. If appears twice in a six-point row, there are ve possible labeling structures. Among these ve possible labeling structures, we have to label either subconstellations with 18 or 24 points or collapsed subconstellations with 18 or 20 points all by using e 2 through e 6 (only four of them form a basis and can label at most 16 points), which is impossible. Therefore can't appear twice in a six-point row in a valid quasi-gray coded 32-QAM. References [1] R. D. Wesel. Trellis Code Design for Correlated Fading and Achievable Rates for Tomlinson Harashima Precoding. PhD thesis, Stanford University, Aug [2] R. D. Wesel, C. Komninakis, and X. Liu. Towards Optimality in Constellation Labeling. In Proc. of Globecom '97, Phoenix, AZ, November [3] F. Harary. Graph Theory. Addison Wesley Longman, Incorporated,
Constellation Labeling for Linear Encoders
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 6, SEPTEMBER 2001 2417 Constellation Labeling for Linear Encoders Richard D. Wesel, Senior Member, IEEE, Xueting Liu, Member, IEEE, John M. Cioffi,
More informationDEGRADED broadcast channels were first studied by
4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,
More informationMULTIPATH fading could severely degrade the performance
1986 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 53, NO. 12, DECEMBER 2005 Rate-One Space Time Block Codes With Full Diversity Liang Xian and Huaping Liu, Member, IEEE Abstract Orthogonal space time block
More informationNon-overlapping permutation patterns
PU. M. A. Vol. 22 (2011), No.2, pp. 99 105 Non-overlapping permutation patterns Miklós Bóna Department of Mathematics University of Florida 358 Little Hall, PO Box 118105 Gainesville, FL 326118105 (USA)
More informationPerformance Analysis of Maximum Likelihood Detection in a MIMO Antenna System
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 50, NO. 2, FEBRUARY 2002 187 Performance Analysis of Maximum Likelihood Detection in a MIMO Antenna System Xu Zhu Ross D. Murch, Senior Member, IEEE Abstract In
More informationEdge-disjoint tree representation of three tree degree sequences
Edge-disjoint tree representation of three tree degree sequences Ian Min Gyu Seong Carleton College seongi@carleton.edu October 2, 208 Ian Min Gyu Seong (Carleton College) Trees October 2, 208 / 65 Trees
More informationInputs. Outputs. Outputs. Inputs. Outputs. Inputs
Permutation Admissibility in Shue-Exchange Networks with Arbitrary Number of Stages Nabanita Das Bhargab B. Bhattacharya Rekha Menon Indian Statistical Institute Calcutta, India ndas@isical.ac.in Sergei
More informationA Complete Characterization of Maximal Symmetric Difference-Free families on {1, n}.
East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations 8-2006 A Complete Characterization of Maximal Symmetric Difference-Free families on
More informationOn Drawn K-In-A-Row Games
On Drawn K-In-A-Row Games Sheng-Hao Chiang, I-Chen Wu 2 and Ping-Hung Lin 2 National Experimental High School at Hsinchu Science Park, Hsinchu, Taiwan jiang555@ms37.hinet.net 2 Department of Computer Science,
More informationFast Sorting and Pattern-Avoiding Permutations
Fast Sorting and Pattern-Avoiding Permutations David Arthur Stanford University darthur@cs.stanford.edu Abstract We say a permutation π avoids a pattern σ if no length σ subsequence of π is ordered in
More informationSTRATEGY AND COMPLEXITY OF THE GAME OF SQUARES
STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES FLORIAN BREUER and JOHN MICHAEL ROBSON Abstract We introduce a game called Squares where the single player is presented with a pattern of black and white
More informationGraphs of Tilings. Patrick Callahan, University of California Office of the President, Oakland, CA
Graphs of Tilings Patrick Callahan, University of California Office of the President, Oakland, CA Phyllis Chinn, Department of Mathematics Humboldt State University, Arcata, CA Silvia Heubach, Department
More informationBinary Continued! November 27, 2013
Binary Tree: 1 Binary Continued! November 27, 2013 1. Label the vertices of the bottom row of your Binary Tree with the numbers 0 through 7 (going from left to right). (You may put numbers inside of the
More informationNON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday
NON-OVERLAPPING PERMUTATION PATTERNS MIKLÓS BÓNA Abstract. We show a way to compute, to a high level of precision, the probability that a randomly selected permutation of length n is nonoverlapping. As
More informationIndex Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization.
3798 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels Yue Zhao, Member, IEEE, Chee Wei Tan, Member,
More informationLower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings
ÂÓÙÖÒÐ Ó ÖÔ ÐÓÖØÑ Ò ÔÔÐØÓÒ ØØÔ»»ÛÛÛº ºÖÓÛÒºÙ»ÔÙÐØÓÒ»» vol.?, no.?, pp. 1 44 (????) Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings David R. Wood School of Computer Science
More informationPermutation group and determinants. (Dated: September 19, 2018)
Permutation group and determinants (Dated: September 19, 2018) 1 I. SYMMETRIES OF MANY-PARTICLE FUNCTIONS Since electrons are fermions, the electronic wave functions have to be antisymmetric. This chapter
More informationAdaptive Bit-Interleaved Coded Modulation
1572 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 9, SEPTEMBER 2001 Adaptive Bit-Interleaved Coded Modulation Pınar Örmeci, Xueting Liu, Dennis L. Goeckel, and Richard D. Wesel, Member, IEEE Abstract
More informationCircular Nim Games. S. Heubach 1 M. Dufour 2. May 7, 2010 Math Colloquium, Cal Poly San Luis Obispo
Circular Nim Games S. Heubach 1 M. Dufour 2 1 Dept. of Mathematics, California State University Los Angeles 2 Dept. of Mathematics, University of Quebeq, Montreal May 7, 2010 Math Colloquium, Cal Poly
More informationHow (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationORTHOGONAL space time block codes (OSTBC) from
1104 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 3, MARCH 2009 On Optimal Quasi-Orthogonal Space Time Block Codes With Minimum Decoding Complexity Haiquan Wang, Member, IEEE, Dong Wang, Member,
More informationTilings with T and Skew Tetrominoes
Quercus: Linfield Journal of Undergraduate Research Volume 1 Article 3 10-8-2012 Tilings with T and Skew Tetrominoes Cynthia Lester Linfield College Follow this and additional works at: http://digitalcommons.linfield.edu/quercus
More informationLecture 19 - Partial Derivatives and Extrema of Functions of Two Variables
Lecture 19 - Partial Derivatives and Extrema of Functions of Two Variables 19.1 Partial Derivatives We wish to maximize functions of two variables. This will involve taking derivatives. Example: Consider
More informationPhysical-Layer Network Coding Using GF(q) Forward Error Correction Codes
Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Weimin Liu, Rui Yang, and Philip Pietraski InterDigital Communications, LLC. King of Prussia, PA, and Melville, NY, USA Abstract
More informationContents. MA 327/ECO 327 Introduction to Game Theory Fall 2017 Notes. 1 Wednesday, August Friday, August Monday, August 28 6
MA 327/ECO 327 Introduction to Game Theory Fall 2017 Notes Contents 1 Wednesday, August 23 4 2 Friday, August 25 5 3 Monday, August 28 6 4 Wednesday, August 30 8 5 Friday, September 1 9 6 Wednesday, September
More informationCongruence properties of the binary partition function
Congruence properties of the binary partition function 1. Introduction. We denote by b(n) the number of binary partitions of n, that is the number of partitions of n as the sum of powers of 2. As usual,
More informationCharacterization of Domino Tilings of. Squares with Prescribed Number of. Nonoverlapping 2 2 Squares. Evangelos Kranakis y.
Characterization of Domino Tilings of Squares with Prescribed Number of Nonoverlapping 2 2 Squares Evangelos Kranakis y (kranakis@scs.carleton.ca) Abstract For k = 1; 2; 3 we characterize the domino tilings
More informationChapter 2: Signal Representation
Chapter 2: Signal Representation Aveek Dutta Assistant Professor Department of Electrical and Computer Engineering University at Albany Spring 2018 Images and equations adopted from: Digital Communications
More informationGeneralized Game Trees
Generalized Game Trees Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, Ca. 90024 Abstract We consider two generalizations of the standard two-player game
More informationEC O4 403 DIGITAL ELECTRONICS
EC O4 403 DIGITAL ELECTRONICS Asynchronous Sequential Circuits - II 6/3/2010 P. Suresh Nair AMIE, ME(AE), (PhD) AP & Head, ECE Department DEPT. OF ELECTONICS AND COMMUNICATION MEA ENGINEERING COLLEGE Page2
More informationNotes for Recitation 3
6.042/18.062J Mathematics for Computer Science September 17, 2010 Tom Leighton, Marten van Dijk Notes for Recitation 3 1 State Machines Recall from Lecture 3 (9/16) that an invariant is a property of a
More informationSolutions to Exercises Chapter 6: Latin squares and SDRs
Solutions to Exercises Chapter 6: Latin squares and SDRs 1 Show that the number of n n Latin squares is 1, 2, 12, 576 for n = 1, 2, 3, 4 respectively. (b) Prove that, up to permutations of the rows, columns,
More informationZhan Chen and Israel Koren. University of Massachusetts, Amherst, MA 01003, USA. Abstract
Layer Assignment for Yield Enhancement Zhan Chen and Israel Koren Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA 0003, USA Abstract In this paper, two algorithms
More informationCapacity-Approaching Bandwidth-Efficient Coded Modulation Schemes Based on Low-Density Parity-Check Codes
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 9, SEPTEMBER 2003 2141 Capacity-Approaching Bandwidth-Efficient Coded Modulation Schemes Based on Low-Density Parity-Check Codes Jilei Hou, Student
More informationTransformation of graphs by greatest integer function
OpenStax-CNX module: m17290 1 Transformation of graphs by greatest integer function Sunil Kumar Singh This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 2.0
More informationHamming Codes as Error-Reducing Codes
Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.
More informationA Graph Theory of Rook Placements
A Graph Theory of Rook Placements Kenneth Barrese December 4, 2018 arxiv:1812.00533v1 [math.co] 3 Dec 2018 Abstract Two boards are rook equivalent if they have the same number of non-attacking rook placements
More informationPattern Avoidance in Unimodal and V-unimodal Permutations
Pattern Avoidance in Unimodal and V-unimodal Permutations Dido Salazar-Torres May 16, 2009 Abstract A characterization of unimodal, [321]-avoiding permutations and an enumeration shall be given.there is
More informationRAINBOW COLORINGS OF SOME GEOMETRICALLY DEFINED UNIFORM HYPERGRAPHS IN THE PLANE
1 RAINBOW COLORINGS OF SOME GEOMETRICALLY DEFINED UNIFORM HYPERGRAPHS IN THE PLANE 1 Introduction Brent Holmes* Christian Brothers University Memphis, TN 38104, USA email: bholmes1@cbu.edu A hypergraph
More information37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game
37 Game Theory Game theory is one of the most interesting topics of discrete mathematics. The principal theorem of game theory is sublime and wonderful. We will merely assume this theorem and use it to
More informationChameleon Coins arxiv: v1 [math.ho] 23 Dec 2015
Chameleon Coins arxiv:1512.07338v1 [math.ho] 23 Dec 2015 Tanya Khovanova Konstantin Knop Oleg Polubasov December 24, 2015 Abstract We discuss coin-weighing problems with a new type of coin: a chameleon.
More informationReflections on the N + k Queens Problem
Integre Technical Publishing Co., Inc. College Mathematics Journal 40:3 March 12, 2009 2:02 p.m. chatham.tex page 204 Reflections on the N + k Queens Problem R. Douglas Chatham R. Douglas Chatham (d.chatham@moreheadstate.edu)
More informationEFFECTS OF PHASE AND AMPLITUDE ERRORS ON QAM SYSTEMS WITH ERROR- CONTROL CODING AND SOFT DECISION DECODING
Clemson University TigerPrints All Theses Theses 8-2009 EFFECTS OF PHASE AND AMPLITUDE ERRORS ON QAM SYSTEMS WITH ERROR- CONTROL CODING AND SOFT DECISION DECODING Jason Ellis Clemson University, jellis@clemson.edu
More informationMultilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting
IEEE TRANSACTIONS ON BROADCASTING, VOL. 46, NO. 1, MARCH 2000 49 Multilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting Sae-Young Chung and Hui-Ling Lou Abstract Bandwidth efficient
More informationarxiv: v2 [math.gt] 21 Mar 2018
Tile Number and Space-Efficient Knot Mosaics arxiv:1702.06462v2 [math.gt] 21 Mar 2018 Aaron Heap and Douglas Knowles March 22, 2018 Abstract In this paper we introduce the concept of a space-efficient
More informationRosen, Discrete Mathematics and Its Applications, 6th edition Extra Examples
Rosen, Discrete Mathematics and Its Applications, 6th edition Extra Examples Section 1.7 Proof Methods and Strategy Page references correspond to locations of Extra Examples icons in the textbook. p.87,
More informationNoisy Index Coding with Quadrature Amplitude Modulation (QAM)
Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Anjana A. Mahesh and B Sundar Rajan, arxiv:1510.08803v1 [cs.it] 29 Oct 2015 Abstract This paper discusses noisy index coding problem over Gaussian
More informationAsymptotic Results for the Queen Packing Problem
Asymptotic Results for the Queen Packing Problem Daniel M. Kane March 13, 2017 1 Introduction A classic chess problem is that of placing 8 queens on a standard board so that no two attack each other. This
More informationKnots in a Cubic Lattice
Knots in a Cubic Lattice Marta Kobiela August 23, 2002 Abstract In this paper, we discuss the composition of knots on the cubic lattice. One main theorem deals with finding a better upper bound for the
More informationOn the Capacity Region of the Vector Fading Broadcast Channel with no CSIT
On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,
More informationStanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011
Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow
More information5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010
5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 Interference Channels With Correlated Receiver Side Information Nan Liu, Member, IEEE, Deniz Gündüz, Member, IEEE, Andrea J.
More informationAn Integer linear programming formulation for tiling large rectangles using 4 x 6 and 5 x 7 tiles
Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 5-27-2010 An Integer linear programming formulation for tiling large rectangles using 4 x 6 and 5 x 7 tiles Grant
More informationMATHEMATICS ON THE CHESSBOARD
MATHEMATICS ON THE CHESSBOARD Problem 1. Consider a 8 8 chessboard and remove two diametrically opposite corner unit squares. Is it possible to cover (without overlapping) the remaining 62 unit squares
More information12. 6 jokes are minimal.
Pigeonhole Principle Pigeonhole Principle: When you organize n things into k categories, one of the categories has at least n/k things in it. Proof: If each category had fewer than n/k things in it then
More informationFeedback via Message Passing in Interference Channels
Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of
More information"Este material foi fornecido pelo CICT e devido a restrições do Direito Autoral, lei 9.610/98 que rege sobre a propriedade intelectual, não pode ser
"Este material foi fornecido pelo CICT e devido a restrições do Direito Autoral, lei 9610/98 que rege sobre a propriedade intelectual, não pode ser distribuído para outros não pertencentes a instituição"
More informationGame Theory. Chapter 2 Solution Methods for Matrix Games. Instructor: Chih-Wen Chang. Chih-Wen NCKU. Game Theory, Ch2 1
Game Theory Chapter 2 Solution Methods for Matrix Games Instructor: Chih-Wen Chang Chih-Wen Chang @ NCKU Game Theory, Ch2 1 Contents 2.1 Solution of some special games 2.2 Invertible matrix games 2.3 Symmetric
More informationBit-Interleaved Coded Modulation: Low Complexity Decoding
Bit-Interleaved Coded Modulation: Low Complexity Decoding Enis Aay and Ender Ayanoglu Center for Pervasive Communications and Computing Department of Electrical Engineering and Computer Science The Henry
More informationRecovery and Characterization of Non-Planar Resistor Networks
Recovery and Characterization of Non-Planar Resistor Networks Julie Rowlett August 14, 1998 1 Introduction In this paper we consider non-planar conductor networks. A conductor is a two-sided object which
More informationPATTERN AVOIDANCE IN PERMUTATIONS ON THE BOOLEAN LATTICE
PATTERN AVOIDANCE IN PERMUTATIONS ON THE BOOLEAN LATTICE SAM HOPKINS AND MORGAN WEILER Abstract. We extend the concept of pattern avoidance in permutations on a totally ordered set to pattern avoidance
More informationPermutation Tableaux and the Dashed Permutation Pattern 32 1
Permutation Tableaux and the Dashed Permutation Pattern William Y.C. Chen, Lewis H. Liu, Center for Combinatorics, LPMC-TJKLC Nankai University, Tianjin 7, P.R. China chen@nankai.edu.cn, lewis@cfc.nankai.edu.cn
More information12th Bay Area Mathematical Olympiad
2th Bay Area Mathematical Olympiad February 2, 200 Problems (with Solutions) We write {a,b,c} for the set of three different positive integers a, b, and c. By choosing some or all of the numbers a, b and
More information8.1 Geometric Representation of Signal Waveforms
Haberlesme Sistemlerine Giris (ELE 361) 30 Ekim 2017 TOBB Ekonomi ve Teknoloji Universitesi, GÃ 1 4 z 2017-18 Dr. A. Melda Yuksel Turgut & Tolga Girici Lecture Notes Chapter 8 Digital Modulation Methods
More informationDegrees of Freedom of the MIMO X Channel
Degrees of Freedom of the MIMO X Channel Syed A. Jafar Electrical Engineering and Computer Science University of California Irvine Irvine California 9697 USA Email: syed@uci.edu Shlomo Shamai (Shitz) Department
More informationOptimal Results in Staged Self-Assembly of Wang Tiles
Optimal Results in Staged Self-Assembly of Wang Tiles Rohil Prasad Jonathan Tidor January 22, 2013 Abstract The subject of self-assembly deals with the spontaneous creation of ordered systems from simple
More informationIMOK Maclaurin Paper 2014
IMOK Maclaurin Paper 2014 1. What is the largest three-digit prime number whose digits, and are different prime numbers? We know that, and must be three of,, and. Let denote the largest of the three digits,
More informationCapacity and Optimal Resource Allocation for Fading Broadcast Channels Part I: Ergodic Capacity
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 1083 Capacity Optimal Resource Allocation for Fading Broadcast Channels Part I: Ergodic Capacity Lang Li, Member, IEEE, Andrea J. Goldsmith,
More informationON THE ENUMERATION OF MAGIC CUBES*
1934-1 ENUMERATION OF MAGIC CUBES 833 ON THE ENUMERATION OF MAGIC CUBES* BY D. N. LEHMER 1. Introduction. Assume the cube with one corner at the origin and the three edges at that corner as axes of reference.
More informationOnline Computation and Competitive Analysis
Online Computation and Competitive Analysis Allan Borodin University of Toronto Ran El-Yaniv Technion - Israel Institute of Technology I CAMBRIDGE UNIVERSITY PRESS Contents Preface page xiii 1 Introduction
More information3542 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011
3542 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 MIMO Precoding With X- and Y-Codes Saif Khan Mohammed, Student Member, IEEE, Emanuele Viterbo, Fellow, IEEE, Yi Hong, Senior Member,
More informationarxiv: v2 [math.ho] 23 Aug 2018
Mathematics of a Sudo-Kurve arxiv:1808.06713v2 [math.ho] 23 Aug 2018 Tanya Khovanova Abstract Wayne Zhao We investigate a type of a Sudoku variant called Sudo-Kurve, which allows bent rows and columns,
More informationTHE rapid growth of the laptop and handheld computer
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 5, NO. 4, APRIL 004 643 Trellis-Coded Multiple-Pulse-Position Modulation for Wireless Infrared Communications Hyuncheol Park, Member, IEEE, and John R. Barry Abstract
More informationConnected Identifying Codes
Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu
More informationRecursive Construction of 16-QAM Super-Golay codes for OFDM systems
Recursive Construction of 16-QAM Super-Golay codes for OFDM systems Masoud Olfat and K. J. Ray Liu Dept. of Electrical and Computer Engineering Univ. of Maryland, College Park, MD 074 Abstract In this
More informationEcient Multichip Partial Concentrator Switches. Thomas H. Cormen. Laboratory for Computer Science. Massachusetts Institute of Technology
Ecient Multichip Partial Concentrator Switches Thomas H. Cormen Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, Massachusetts 02139 Abstract Due to chip area and pin count
More informationLECTURE 19 - LAGRANGE MULTIPLIERS
LECTURE 9 - LAGRANGE MULTIPLIERS CHRIS JOHNSON Abstract. In this lecture we ll describe a way of solving certain optimization problems subject to constraints. This method, known as Lagrange multipliers,
More information3.5 Marginal Distributions
STAT 421 Lecture Notes 52 3.5 Marginal Distributions Definition 3.5.1 Suppose that X and Y have a joint distribution. The c.d.f. of X derived by integrating (or summing) over the support of Y is called
More informationSome results on Su Doku
Some results on Su Doku Sourendu Gupta March 2, 2006 1 Proofs of widely known facts Definition 1. A Su Doku grid contains M M cells laid out in a square with M cells to each side. Definition 2. For every
More informationBulgarian Solitaire in Three Dimensions
Bulgarian Solitaire in Three Dimensions Anton Grensjö antongrensjo@gmail.com under the direction of Henrik Eriksson School of Computer Science and Communication Royal Institute of Technology Research Academy
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationA theorem on the cores of partitions
A theorem on the cores of partitions Jørn B. Olsson Department of Mathematical Sciences, University of Copenhagen Universitetsparken 5,DK-2100 Copenhagen Ø, Denmark August 9, 2008 Abstract: If s and t
More informationChapter 1. The alternating groups. 1.1 Introduction. 1.2 Permutations
Chapter 1 The alternating groups 1.1 Introduction The most familiar of the finite (non-abelian) simple groups are the alternating groups A n, which are subgroups of index 2 in the symmetric groups S n.
More informationReceived: 10/24/14, Revised: 12/8/14, Accepted: 4/11/15, Published: 5/8/15
#G3 INTEGERS 15 (2015) PARTIZAN KAYLES AND MISÈRE INVERTIBILITY Rebecca Milley Computational Mathematics, Grenfell Campus, Memorial University of Newfoundland, Corner Brook, Newfoundland, Canada rmilley@grenfell.mun.ca
More informationPermutations P-seuences n = 4 n = 5 n = 4 n =
Generating Alternating Permutations Lexicographically Bruce Bauslaugh and Frank Ruskey Department of Computer Science University of Victoria, Victoria, B.C. V8W 2Y2, Canada Abstract A permutation 1 2 n
More informationGame Theory and Algorithms Lecture 19: Nim & Impartial Combinatorial Games
Game Theory and Algorithms Lecture 19: Nim & Impartial Combinatorial Games May 17, 2011 Summary: We give a winning strategy for the counter-taking game called Nim; surprisingly, it involves computations
More informationSPACE-TIME coding techniques are widely discussed to
1214 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 4, NO. 3, MAY 2005 Some Super-Orthogonal Space-Time Trellis Codes Based on Non-PSK MTCM Aijun Song, Student Member, IEEE, Genyuan Wang, and Xiang-Gen
More informationThe Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA
The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,
More informationInterference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, and David N. C.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 5, MAY 2011 2941 Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, David N C Tse, Fellow, IEEE Abstract
More informationPermutation Groups. Definition and Notation
5 Permutation Groups Wigner s discovery about the electron permutation group was just the beginning. He and others found many similar applications and nowadays group theoretical methods especially those
More informationTile Number and Space-Efficient Knot Mosaics
Tile Number and Space-Efficient Knot Mosaics Aaron Heap and Douglas Knowles arxiv:1702.06462v1 [math.gt] 21 Feb 2017 February 22, 2017 Abstract In this paper we introduce the concept of a space-efficient
More informationPartizan Kayles and Misère Invertibility
Partizan Kayles and Misère Invertibility arxiv:1309.1631v1 [math.co] 6 Sep 2013 Rebecca Milley Grenfell Campus Memorial University of Newfoundland Corner Brook, NL, Canada May 11, 2014 Abstract The impartial
More informationConstructions of Coverings of the Integers: Exploring an Erdős Problem
Constructions of Coverings of the Integers: Exploring an Erdős Problem Kelly Bickel, Michael Firrisa, Juan Ortiz, and Kristen Pueschel August 20, 2008 Abstract In this paper, we study necessary conditions
More informationSOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 8 (2008), #G04 SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS Vincent D. Blondel Department of Mathematical Engineering, Université catholique
More informationClosed Almost Knight s Tours on 2D and 3D Chessboards
Closed Almost Knight s Tours on 2D and 3D Chessboards Michael Firstein 1, Anja Fischer 2, and Philipp Hungerländer 1 1 Alpen-Adria-Universität Klagenfurt, Austria, michaelfir@edu.aau.at, philipp.hungerlaender@aau.at
More informationSolutions to the problems from Written assignment 2 Math 222 Winter 2015
Solutions to the problems from Written assignment 2 Math 222 Winter 2015 1. Determine if the following limits exist, and if a limit exists, find its value. x2 y (a) The limit of f(x, y) = x 4 as (x, y)
More informationLossy Compression of Permutations
204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin
More informationInteger Compositions Applied to the Probability Analysis of Blackjack and the Infinite Deck Assumption
arxiv:14038081v1 [mathco] 18 Mar 2014 Integer Compositions Applied to the Probability Analysis of Blackjack and the Infinite Deck Assumption Jonathan Marino and David G Taylor Abstract Composition theory
More informationLecture 2. 1 Nondeterministic Communication Complexity
Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols
More informationTheory of Telecommunications Networks
TT S KE M T Theory of Telecommunications Networks Anton Čižmár Ján Papaj Department of electronics and multimedia telecommunications CONTENTS Preface... 5 1 Introduction... 6 1.1 Mathematical models for
More information