Structured Codes in Information Theory: MIMO and Network Applications
نویسنده
چکیده
Structured Codes in Information Theory: MIMO and Network Applications by Jiening Zhan Doctor of Philosophy in Engineering-Electrical Engineering & Computer Sciences University of California, Berkeley Professor Michael Gastpar, Chair Though random codes are shown to be optimal for point-to-point channels, codes with algebraic structure are found to be useful in many network scenarios. This thesis demonstrates the role of structured codes in several network and MIMO settings. In MIMO channels, structured codes can be used to improve receiver design. Traditional receiver architectures decorrelate the mixed data streams and recover each of them individually. Although optimal when the channel matrix is orthogonal, this can be highly sub-optimal when the channel is near singular. To overcome this limitation, a new architecture that recovers linear combinations of the data streams instead of the data streams individually is proposed. The proposed integer-forcing receiver outperforms traditional linear architectures and achieves the optimal diversity-multiplexing tradeoff. In network information theory, it has been shown that structured codes are useful for computation over multiple-access channels. This thesis considers function computation across general relay networks and proposes a scheme that decouples the physical and network layers. By using lattice codes in the physical layer and network codes in the network layer, the proposed scheme achieves the optimal distortion to within a constant factor. Finally, structured codes can be used to efficiently transmit channel state information when global channel state information is absent in networks. It is shown that sending a function of the channel state information is sufficient and can be much more efficient than sending the full information.
منابع مشابه
Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملQualitative Study of Students' Information Sharing Behavior in Social Network Sites
Aim: The main purpose was to investigate the students’ information sharing behavior in social network sites with a qualitative approach. Methodology: An applied research with qualitative approach - A Thematic Analysis method was used. Population consisted of all the students at the Universities in South Khorasan Province affiliated with the Ministry of Science, Research and Technology who had ...
متن کاملNested linear/Lattice codes for structured multiterminal binning
Network information theory promises high gains over simple point-to-point communication techniques, at the cost of higher complexity. However, lack of structured coding schemes limited the practical application of these concepts so far. One of the basic elements of a network code is the binning scheme. Wyner and other researchers proposed various forms of coset codes for efficient binning, yet ...
متن کاملAdaptive Neural Network Method for Consensus Tracking of High-Order Mimo Nonlinear Multi-Agent Systems
This paper is concerned with the consensus tracking problem of high order MIMO nonlinear multi-agent systems. The agents must follow a leader node in presence of unknown dynamics and uncertain external disturbances. The communication network topology of agents is assumed to be a fixed undirected graph. A distributed adaptive control method is proposed to solve the consensus problem utilizing re...
متن کاملDeveloping Coping Strategies with the Threats to Mental Health and the Family Structure of the Oil Company's Satellite Staff: a focus on the third type of change
Purpose: The aim of this study was to develop a strategic model in relation to the factors threatening the mental health and family structure of satellite employees of the oil company with emphasis on the focus of the third type of change. Method: In this study, a qualitative approach and a grounded theory method were used. The statistical population included all satellite personnel of South Za...
متن کامل