Next Article in Journal
Function Analysis of the Euclidean Distance between Probability Distributions
Previous Article in Journal
Entropy-Based Structural Health Monitoring System for Damage Detection in Multi-Bay Three-Dimensional Structures
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Information-Theoretic Analysis of a Family of Improper Discrete Constellations

by
Ignacio Santamaria
1,*,
Pedro M. Crespo
2,
Christian Lameiro
3 and
Peter J. Schreier
3
1
Departamento de Ingeniería de Comunicaciones, Universidad de Cantabria, 39005 Santander, Spain
2
TECNUN, Universidad de Navarra, 20018 San Sebastián, Spain
3
Signal & System Theory Group, Paderborn University, 33098 Paderborn, Germany
*
Author to whom correspondence should be addressed.
Entropy 2018, 20(1), 45; https://doi.org/10.3390/e20010045
Submission received: 25 October 2017 / Revised: 5 January 2018 / Accepted: 8 January 2018 / Published: 11 January 2018
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
Non-circular or improper Gaussian signaling has proven beneficial in several interference-limited wireless networks. However, all implementable coding schemes are based on finite discrete constellations rather than Gaussian signals. In this paper, we propose a new family of improper constellations generated by widely linear processing of a square M-QAM (quadrature amplitude modulation) signal. This family of discrete constellations is parameterized by κ , the circularity coefficient and a phase ϕ . For uncoded communication systems, this phase should be optimized as ϕ * ( κ ) to maximize the minimum Euclidean distance between points of the improper constellation, therefore minimizing the bit error rate (BER). For the more relevant case of coded communications, where the coded symbols are constrained to be in this family of improper constellations using ϕ * ( κ ) , it is shown theoretically and further corroborated by simulations that, except for a shaping loss of 1.53 dB encountered at a high signal-to-noise ratio (snr), there is no rate loss with respect to the improper Gaussian capacity. In this sense, the proposed family of constellations can be viewed as the improper counterpart of the standard proper M-QAM constellations widely used in coded communication systems.

1. Introduction

In the theoretical analysis of wireless communication systems, the transmitted symbols are typically assumed to be proper complex Gaussian random variables, i.e., the transmitted symbols are complex Gaussian and uncorrelated with their complex conjugate. This is motivated by the fact that such an input distribution achieves the capacity of the point-to-point, broadcast and multiple-access channels [1]. In more complex interference-limited scenarios, such as the interference channel, transmitting proper Gaussian signals is in general suboptimal, so assuming this input distribution in such cases is not theoretically justified. As a matter of fact, recent works have shown that, when treating interference as noise, a higher transmitted rate may be achieved in interference-limited networks by transmitting improper Gaussian signals, which are correlated with their complex conjugate [2,3,4,5,6,7,8].
Improper signals are common in communications since many important digital modulation schemes yield improper signals. Examples are binary phase shift keying (BPSK) or Gaussian minimum shift keying (GMSK) [9]. Additionally, power imbalance between the in-phase and in-quadrature components also yields an improper signal. A substantial body of work has focused on the design of widely linear receivers to exploit the impropriety of a received improper signal (we refer the interested reader to [10,11,12,13] and the references therein). While these works devise techniques to deal with signals whose impropriety was not intentionally introduced, recent works consider the deliberate transmission of improper signals as a novel way to handle interference in a multiuser channel.
Cadambe et al. showed the benefits of improper signaling for the first time in their pioneering work [2]. They considered a single-antenna three-user interference channel with constant channel extensions and showed that the number of degrees of freedom (DoF), which is the number of interference-free signals that can be transmitted, was larger when users transmit improper signals as opposed to proper ones. Similar DoF results were derived for the four-user interference channel in [14]. After that, a number of new works has emerged, and the payoffs of improper signaling have been revealed for different multiuser scenarios such as the interference channel [3,4,5,15], Z-interference channel [6,16,17,18], broadcast channels with linear precoding [19,20], underlay and overlay cognitive radio networks [7,8,21] and relay channels [22,23]. More recently, in [24], the authors showed the advantages of improper signaling in a multiuser scenario where a point-to-point link coexists with a multiple access channel. Even though these works present new and intriguing results that pave the way for more efficient interference management schemes, the vast majority of them assume Gaussian codebooks (the only exception is [15], where the symbol error rate is minimized for arbitrary digital modulation schemes) and, hence, can never be realized in practice since practical codes use non-Gaussian finite signaling constellations.
It is well known that the penalty in signal-to-noise ratio ( snr ) paid by constraining the complex symbols to a uniform M-ary quadrature amplitude modulation (QAM) constellation is given by the shaping loss, which for large M is 1.53 dB in the proper case [25]. When dealing with proper signals, this shaping loss is due to enclosing the uniformly-transmitted codewords inside a hypercube rather than a hypersphere, which would be the optimal region that minimizes the transmitted power.
When using non-Gaussian improper signals, different questions arise: What is the optimal way to generate an improper constellation with a given circularity coefficient (i.e., degree of impropriety)? In coded communication systems, what is the reduction in rate compared to the improper Gaussian capacity when the coded channel symbols are constrained to be in a given discrete improper constellation? Is this rate reduction due only to a shaping loss? Should the channel encoder be modified for discrete improper constellations? In this paper, we address these questions and consider the design of improper discrete constellations for the additive white Gaussian noise channel (AWGN). We focus on coded communication systems, and therefore, our aim is the design of discrete improper constellations for the coded bits to approach the improper Gaussian capacity (i.e., maximize the throughput). Consequently, mutual information is the figure of merit to be optimized. The design of practical capacity-achieving encoders-decoders will be considered in a future work. Therefore, the main contribution of this paper is to propose a class of improper constellations and to show that, in terms of mutual information, this family of constellations behaves very similarly to the standard family of M-QAM proper constellations.
Starting with a proper M-QAM constellation, we analyze the design of a widely linear transformation that generates a family of improper M-QAM constellations with a prescribed circularity coefficient κ . The only free parameter of these improper M-ary constellations is a phase ϕ [ 0 , π / 2 ] . For uncoded communication systems, this phase should be optimized to maximize the minimum Euclidean distance between points of the improper constellation, so that the bit error rate (BER) is minimized. Note that for a given M (i.e., for a given spectral efficiency), maximizing d m i n is equivalent, at high snr , to maximizing the mutual information (MI) between the transmit and the received signals [26]. On the other hand, for coded improper communication systems with a circularity coefficient κ , one should find the ϕ that maximizes, for each snr and M, the envelope of the resulting family of mutual information values of these M-ary improper constellations. In this way, the rate gap compared to the improper Shannon capacity is minimized.
One of the main contributions of this paper is to show that except for a shaping loss of 1.53 dB encountered at high snr , there is no rate loss with respect to the improper Gaussian Shannon capacity when using this family of constellations. We conclude that the proposed family of improper constellations behaves much the same as the standard family of proper M-QAM constellations. Finally, note that as in the case of proper QAM constellations, the shaping loss can be reduced by designing codes that result in a Gaussian-like rather than uniform distribution of the coded symbols.
The rest of the paper is organized as follows. Section 2 provides preliminaries about improper random variables and introduces the considered model. The design of improper constellations is formulated in Section 3, and its information-theoretic analysis is done in Section 4. Section 5 provides some numerical examples. Finally, concluding remarks are presented in Section 6.

2. Background and System Model

2.1. Notation

Scalar random variables are denoted by uppercase letters X. Vectors and matrices are denoted by lowercase boldface letters, x , and uppercase boldface letters, X , respectively. The determinant and trace of a matrix A will be denoted as det ( A ) and tr ( A ) . I is the identity matrix. Probability density functions are denoted by p Y ( y ) . The superscript ( · ) * denotes complex conjugate, and ( · ) T denotes transpose. E [ · ] denotes mathematical expectation, and h ( Y ) denotes the differential entropy of a continuous random variable. x CN ( 0 , R ) indicates that x is a complex circular Gaussian random vector of zero mean and covariance R , while x CN ( 0 , R , R ˜ ) indicates that x is a complex non-circular Gaussian random vector of zero mean, covariance R and complementary covariance R ˜ .

2.2. Improper Random Variables

This section introduces some preliminaries about improper random variables that will be used throughout the paper. The interested reader is referred to [9] for a comprehensive treatment of the topic.
Definition 1
([9]). A complex-valued random variable X is said to be circular (or circularly symmetric) if e j θ X has the same probability distribution as X for all real θ.
Definition 2
([27]). A complex-valued random variable X is said to be proper if X is uncorrelated with its complex conjugate, i.e., E [ ( X E [ X ] ) 2 ] = 0 .
A circular X is proper, but the converse is not necessarily true. However, for complex Gaussian random variables, propriety implies circularity, so both terms can be used interchangeably. The next definitions characterize an improper random variable.
Definition 3
([9]). The complementary variance of a zero-mean complex random variable X is defined as σ ˜ X 2 = E [ X 2 ] .
Furthermore, σ X 2 and σ ˜ X 2 are a valid pair of variance and complementary variance if and only if σ X 2 0 and | σ ˜ X 2 | σ X 2 .
Definition 4
([9]). The circularity coefficient of a complex random variable X, which measures the degree of impropriety, is defined as:
κ = σ ˜ X 2 σ X 2 .
The circularity coefficient satisfies 0 κ 1 . If κ = 0 , then X is proper, otherwise improper. If κ = 1 , we call X maximally improper.
There are two models that are typically used to express an improper complex random variable X = X I + j X Q : the augmented complex model and the real composite model. The former defines the augmented random variable x = X X * T . This way, its covariance matrix (called the augmented covariance matrix) contains all the second-order information of X, i.e.,
R X = σ X 2 σ ˜ X 2 ( σ ˜ X 2 ) * σ X 2 .
Alternatively, the real composite model defines the real random vector x ˜ = X I X Q T , and its covariance matrix also contains the complete second-order information of X. We now present some well-known results about the differential entropy of a complex Gaussian random variable.
Theorem 1
([9]). The differential entropy of an improper complex Gaussian random variable X is:
h ( X ) = 1 2 log ( π e ) 2 det ( R X ) = log π e σ X 2 + 1 2 log 1 κ 2 .
Taking κ = 0 in the above expression yields the entropy of a proper Gaussian random variable [27]. Indeed, it is well known that the entropy of a complex random variable is maximized if it follows a proper complex Gaussian distribution [27].

2.3. A Motivating Example

In this subsection, we present a motivating example for the study conducted in this paper. Let us consider an underlay cognitive radio (UCR) system transmitting Gaussian codewords in which one single-antenna secondary user (SU) wishes to access the channel in the presence of a single-antenna primary user (PU) as shown in Figure 1, where the top and bottom links represent the PU and the SU, respectively. Without loss of generality, we consider the standard or canonical form of this scenario for which the direct channels are normalized to one, and the noise at both receivers is Gaussian and proper with zero mean and unit variance. This scenario is known in the information theory literature as the Z (or one-sided) interference channel [28].
In the UCR paradigm, the unlicensed SU is allowed to coexist with the PU as long as they ensure a minimum transmission rate R ¯ P U ξ log ( 1 + p ) for the PU, where ξ [ 0 , 1 ] is the loading factor. That is, the transmit power and signaling scheme of the SU must be selected to control the interference level at the primary receiver such that the PU’s rate requirement is guaranteed. Since the PU is typically unaware of the SU, it is also assumed that the PU always transmits proper Gaussian signals, whereas the SU may transmit either proper or improper Gaussian signals depending on which signaling scheme performs better. This problem has been analyzed in [7], where it has been proven that the SU improves its rate by transmitting Gaussian improper signals if and only if (cf. Theorem 1 in [7]):
a β = 1 p ( 1 + p ) 2 ξ 1 ,
where p is the power transmitted by the PU. Furthermore, Theorem 1 in [7] also gives us the optimal circularity coefficient κ s that must be used by the SU depending on its power budget.
For example, let us suppose that the cross-link channel is a = 4 ; the power budgets for the PU and SU are 100 and 20, respectively; and the loading factor is ξ = 0.4 . With these parameters β = 1.56 and, since a β , improper signaling with κ s = 0.96 (close to maximally improper) improves the rate of the SU. Specifically, the rate achieved by the SU using improper Gaussian codewords is R S U = 3.09 b/s/Hz, whereas using proper Gaussian codewords, the rate would be only R S U = 2.44 b/s/Hz.
As we have already argued, practical constraints dictate the use of discrete constellations instead of Gaussian signals. Nevertheless, the previous analysis with Gaussian signals is still valuable as an upper bound in the sense that any finite constellation with the same circularity coefficient will have lower differential entropy than a Gaussian and, consequently, will be less harmful for the PU. Therefore, in our example, for any improper discrete constellation, we might transmit with κ s = 0.96 , and the rate requirement of the PU would still be satisfied.
When the PU transmits Gaussian proper signals and the interference at the SU is treated as noise, the SU link is an AWGN channel over which we have to send improper digital signals with a given κ s . In a more realistic scenario, the PU would also transmit a discrete non-Gaussian constellation. In this case, the interference power tolerated by the PU could potentially vary with respect to Gaussian signaling, and the SU would receive non-Gaussian interference, as well. While all Gaussian signals with a given circularity coefficient are identical in terms of performance, this is not the case with our family of discrete constellations. As we will see shortly, with discrete improper constellations, we have one degree of freedom to optimize the SU performance. In this work, we study a family of improper constellations and design its parameters to maximize the mutual information over the SU link modeled as an AWGN channel. Obviously, if we maximize the mutual information, the SU will cause more harm to the PU, but still, this harm is upper bounded by the harm caused by a Gaussian signal with the same κ s , so the PU will sustain its rate.

2.4. Capacity Results for Gaussian Improper Signals

We consider a complex AWGN channel:
Y = g snr V + N ,
where N CN ( 0 , 1 ) is circular, V is the transmitted signal and the channel is a deterministic and known constant, which we take as g = 1 without loss of generality.
The capacity (in bits per channel use) of this channel is [1]:
C = sup p V ( v ) I ( Y ; V ) = sup p V ( v ) h ( Y ) h ( Y | V ) = sup p V ( v ) h ( Y ) log ( π e ) ,
where the supremum is taken over all possible input distributions of V with E [ | V | 2 ] = 1 , and the logarithms have base two. It is well known that the supremum is achieved when V CN ( 0 , 1 ) [27].
In this paper, we consider the case where the input signal is unit-power improper with circularity coefficient κ ; then, the channel output is also improper Gaussian with variance E [ | Y | 2 ] = 1 + snr and circularity coefficient κ y = κ snr / ( 1 + snr ) . By Theorem 1, the differential entropy of Y is:
h ( Y ) = log ( π e ( 1 + snr ) ) + 1 2 log ( 1 κ y 2 ) ,
and the capacity is:
C ( snr , κ ) = log ( 1 + snr ) + 1 2 log 1 κ 2 ( 1 + snr 1 ) 2 bits   per   complex   dimension .
Observe that for 0 < κ 1 , the second term in (8) is always negative, and therefore, there is a capacity loss with respect to proper Gaussian signaling. In Appendix A, we present a heuristic derivation of this formula based on a packing argument similar to [29].
Remark 1.
As snr , the term:
1 2 log 1 κ 2 ( 1 + snr 1 ) 2
in (8) accounts for the loss in capacity due to enclosing the codewords in a multidimensional ellipsoid rather than in a hypersphere (as proper Gaussian signaling does) [30].

3. A Family of Improper Constellations Generated by a Widely Linear Transformation

In this section, we propose a family of improper discrete constellations that are generated by a widely linear transformation of a standard M-QAM constellation, where M = 4 s 2 with s a positive integer. To this end, let X = X I + j X Q be a symbol in a proper M-QAM constellation of unit power ( E [ | X | 2 ] = 1 ). Then, we propose to generate the corresponding improper symbol as:
V = V I + j V Q = h 1 X + h 2 X * ,
where h 1 = h 1 I + j h 1 Q and h 2 = h 2 I + j h 2 Q are complex scalars such that | h 1 | 2 + | h 2 | 2 = 1 (to maintain unit transmit power). Alternatively, the widely linear precoding operation (9) can be expressed in terms of real variables as:
V I V Q = h 1 I + h 2 I h 2 Q h 1 Q h 1 Q + h 2 Q h 1 I h 2 I X I X Q .
Under the constraint | h 1 | 2 + | h 2 | 2 = 1 , the circularity coefficient of the generated symbol is:
κ = | E [ V 2 ] | E [ | V | 2 ] = 2 | h 1 | | h 2 | .
The question that now arises is: given κ , what is the simplest parametrization of this family of improper constellations in terms of the complex variables h 1 and h 2 ? All values of h 1 and h 2 producing a unit variance improper V with a given κ must satisfy:
| h 1 | 2 | h 2 | 2 = κ 2 4 , | h 1 | 2 + | h 2 | 2 = 1 .
The nonlinear system of equations in (12) has a unique solution for the squared modulus | h 1 | 2 and | h 2 | 2 , which can be written in terms of the variable α = 1 κ 2 as:
| h 1 | 2 = 1 2 ( 1 + α ) , | h 2 | 2 = 1 2 ( 1 α ) .
Since for the AWGN channel considered in (5), the noise is Gaussian and proper (circular), it is clear that the mutual information does not change when the constellation is rotated by an arbitrary angle. This means that we can always rotate the constellation V such that h 1 is a real and positive parameter, whereas h 2 is a complex value. With this restriction, h 1 and h 2 can be expressed as:
h 1 = 1 2 ( 1 + α ) ,
h 2 = 1 2 ( 1 α ) e j ϕ .
Furthermore, the original proper M-QAM constellation X has a rotational symmetry of ± n π / 2 for any integer n, which means that ϕ in (15) can be restricted to the interval ϕ [ 0 , π / 2 ] . Finally, the proposed family of improper constellations with circularity coefficient κ can be parameterized as:
V = 1 2 1 + α X + 1 2 1 α e j ϕ X * ,
where α = ( 1 κ 2 ) , 0 κ 1 and ϕ [ 0 , π / 2 ] . In what follows, to stress the dependency of the improper constellation on κ , ϕ and M, we will denote this family of constellations as A ( ϕ , κ , M ) .
In terms of real variables, the transformation in (16) can be written as:
V I V Q = 0.5 ( 1 + α ) + 0.5 ( 1 α ) cos ( ϕ ) 0.5 ( 1 α ) sin ( ϕ ) 0.5 ( 1 α ) sin ( ϕ ) 0.5 ( 1 + α ) 0.5 ( 1 α ) cos ( ϕ ) H ( ϕ , κ ) X I X Q ,
where H ( ϕ , κ ) denotes the 2 × 2 transformation matrix.
Observe that by setting ϕ = 0 in (16), one obtains a rather naive rectangular QAM improper constellation, where its real and imaginary components are independent and have a power imbalance determined by the required circularity coefficient κ . For any other ϕ 0 the constellation points are enclosed in a non-rectangular parallelogram. Figure 2 shows four improper constellations generated according to (16) for different values of κ and ϕ when X is proper QPSK ( M = 4 ). For κ = 1 (maximally improper signal), in the right bottom panel, the points of the constellation lie on a line. Similarly, Figure 3 shows the constellation A ( π / 2 , 0.7 , 256 ) , where the shape of the constellation, a parallelogram, can be more clearly observed.
We now provide an alternative geometric interpretation of the proposed improper constellations A ( ϕ , κ , M ) . Consider the 2D integer lattice Z 2 R 2 , consisting of all two-dimensional vectors z = ( a , b ) T with a and b integers. Then, the M-QAM constellation 1 2 [ ± 1 , ± 3 , , ± ( M 1 ) ] 2 can be obtained as the intersection of the translated lattice Z 2 + ( 1 2 , 1 2 ) T and the square region R = [ M 2 , M 2 ] 2 R 2 .
If we apply the linear transformation H ( ϕ , κ ) to the lattice Z 2 + ( 1 2 , 1 2 ) T , we obtain the new translated lattice Λ ( ϕ , κ ) + H ( ϕ , κ ) ( 1 2 , 1 2 ) T , where:
Λ ( ϕ , κ ) = { λ R 2 : λ = H ( ϕ , κ ) z , z Z 2 } .
Reasoning as before, the unnormalized family of improper constellations A ( ϕ , κ , M ) can be obtained as the intersection of the translated lattice Λ ( ϕ , κ ) + H ( ϕ , κ ) ( 1 2 , 1 2 ) T and the parallelogram region P R 2 that results from the H ( ϕ , κ ) -transformation of a centered square with side length M , that is,
A ( ϕ , κ , M ) = Λ ( ϕ , κ ) + H ( ϕ , κ ) 1 2 , 1 2 T P .
Note that by doing this, only M points of the lattice Λ ( ϕ , κ ) + H ( ϕ , κ ) ( 1 2 , 1 2 ) T are enclosed, and their average energy is ( M 1 ) / 6 . Since translation of a lattice does not affect its minimum distance between signal points, d m i n , we conclude that the minimum distance of the unnormalized family of constellations A ( ϕ , κ , M ) (19) is given by the minimum distance of the lattice Λ ( ϕ , κ ) . For a given κ , the optimal ϕ that maximizes d m i n ( Λ ( ϕ , κ ) ) can be obtained as:
ϕ * ( κ ) = arg max ϕ [ 0 , π / 2 ] d m i n ( Λ ( ϕ , κ ) ) .
This problem will be solved in Section 4. Taking into account that ϕ * ( κ ) does not depend on the scaling of the lattice Λ ( ϕ , κ ) , we arrive at the following proposition:
Proposition 1.
The angle ϕ * that maximizes the minimum distance of the family constellations μ × A ( ϕ , κ , M ) , where μ is an arbitrary normalization factor, only depends on the circularity coefficient κ and is given by (20), where Λ ( ϕ , κ ) in (18) is the lattice that results from the H ( ϕ , κ ) -transformation of the integer lattice Z 2 .

4. Information-Theoretic Analysis

4.1. Introduction

To assess the performance of the proposed family of improper constellations A ( ϕ , κ , M ) in coded communication systems, one has to check whether the maximum reliable communication rates achievable by channel encoders designed with coded symbols in these constellations are close to the rates dictated by the improper Gaussian capacity (8). To that end, let us define the mutual information envelope, denoted by I * ( snr , κ ) , as follows. Given κ and M, we obtain for each snr the optimal phase ϕ ^ ( κ , snr , M ) that maximizes the mutual information I ( Y , V ) . By repeating this optimization process for each M, a family of mutual information curves is obtained. I * ( snr , κ ) is now obtained as the envelope of these curves, that is,
I * ( snr , κ ) = max M { I ( Y ; V ) : V A ( ϕ ^ ( κ , snr , M ) , κ , M ) } .
The closer I * ( snr , κ ) is to the improper Gaussian capacity C ( κ , snr ) , the better the proposed family of constellations will be. A way of quantifying performance is to obtain the signal-to-noise ratio gap, Δ ( snr , κ ) :
C ( κ , snr ) = I * ( snr + Δ ( snr , κ ) , κ ) .
Although the analytical derivation of Δ ( snr , κ ) looks intractable, useful insights into the behavior of Δ ( snr , κ ) versus snr can be gained by analyzing in the high- and low- snr regimes the family of mutual information values, { I ( Y ; V ) : V A ( ϕ ^ ( κ , snr , M ) , κ , M ) , for   all   M   and   snr   values } . This is studied in the following sections.
Section 4.2 shows that at low snr , the behavior of C ( κ , snr ) and I * ( snr , κ ) is the same up to the second order in snr . In Section 4.3, we show that at high snr , the optimal phase ϕ ^ ( κ , snr , M ) that maximizes the mutual information I ( Y ; V ) with V A ( ϕ , κ , M ) does not depend on M and is given by ϕ * ( κ ) , i.e., the phase that maximizes the minimum distance of the lattice Λ ( ϕ , κ ) (refer to Proposition 1). Observe that maximizing the mutual information in this context is equivalent to minimizing the BER for uncoded systems.
In Section 4.4, we compute the shaping loss of the proposed family of constellations A ( ϕ , κ , M ) with respect to improper Gaussian signaling. It is shown that this loss is 1.53 dB, for all ϕ and κ . Although this result can easily be checked for rectangular QAM improper constellations (when ϕ = 0 ), it has to be proven for any other value of ϕ ( 0 , π / 2 ] , which generates non-rectangular constellations.
Section 5 shows by computer simulation that the gap, Δ ( snr , κ ) , increases monotonically with the snr up to a saturation value of 1.53 dB. Since at low snr , the value of Δ ( snr , κ ) is negligible, we conclude that the only loss in rate is due to shaping. In this sense, the proposed family of constellations can be viewed as the improper counterpart of the standard proper M-QAM constellations.

4.2. Asymptotic Results at Low SNR

The following theorem characterizes the mutual information at low snr up to the second order.
Theorem 2.
Let V be a discrete improper random variable with circularity coefficient 0 κ 1 taking values in A ( ϕ , κ , M ) and constructed as in (16) with X being a square proper M-QAM constellation. Then, the mutual information between Y and V in (5) admits the following second-order expansion around snr = 0 :
I ( snr V + N ; V ) = snr 1 2 ( 1 + κ 2 ) snr 2 + O ( snr 3 ) .
Proof. 
From Expression (17), the random variable V = V I + j V Q can be expressed in terms of real variables as:
V I V Q v = 0.5 ( 1 + α ) + 0.5 ( 1 α ) cos ( ϕ ) 0.5 ( 1 α ) sin ( ϕ ) 0.5 ( 1 α ) sin ( ϕ ) 0.5 ( 1 + α ) 0.5 ( 1 α ) cos ( ϕ ) H ( ϕ , κ ) X I X Q x ,
where α = 1 κ 2 and X I + j X Q is a proper uniformly-distributed M-QAM random variable. Then, the complex-valued AWGN channel reduces to the real-valued vector channel:
y = H ( ϕ , κ ) x + n ,
where y = ( Y I , Y Q ) T and n = ( N I , N Q ) T , with N I and N Q being independent real Gaussian random variables with zero mean and variance 1 2 .
We exploit the known relationship between mmse and mutual information (MI) [31], namely,
d d snr I ( snr ) = mmse ( snr ) ,
and use a result in [31] showing that the mmse of a real-valued vector channel can be expanded around snr = 0 up to the first order as (notice that the factor 1/2 in the expression is because, according to our formulation, E [ x x T ] = 1 2 I ):
mmse ( snr , ϕ , κ ) = 1 2 tr ( H ( ϕ , κ ) H ( ϕ , κ ) T ) 1 2 snr · tr ( ( H ( ϕ , κ ) H ( ϕ , κ ) T ) 2 ) + O ( snr 2 ) .
Since the matrix H ( ϕ , κ ) is real and symmetric, it is always diagonalizable as:
H ( ϕ , κ ) = Q Λ Q T ,
where Q is an orthogonal matrix ( QQ T = Q T Q = I ) and:
Λ = diag { λ 1 ( ϕ , κ ) , λ 2 ( ϕ , κ ) } ,
with λ j ( ϕ , κ ) , j = 1 , 2 , being its real eigenvalues. It is easy to check that:
λ 1 ( ϕ , κ ) = 0.5 ( 1 + α ) 0.5 ( 1 α ) ,
λ 2 ( ϕ , κ ) = 0.5 ( 1 + α ) + 0.5 ( 1 α ) .
Note that these eigenvalues do not depend on ϕ . By the properties of the trace operator tr ( H ( ϕ , κ ) H ( ϕ , κ ) T ) = λ 1 2 ( ϕ , κ ) + λ 2 2 ( ϕ , κ ) = 2 and tr ( ( H ( ϕ , κ ) H ( ϕ , κ ) T ) 2 ) = λ 1 4 ( ϕ , κ ) + λ 2 4 ( ϕ , κ ) = 2 ( 1 + κ 2 ) .
Therefore, Expression (25) reduces to:
mmse ( snr , κ ) = 1 ( 1 + κ 2 ) snr + O ( snr 2 ) ,
and using the relationship (24), we obtain:
I ( snr V + N ; V ) = snr 1 2 ( 1 + κ 2 ) snr 2 + O ( snr 3 ) ,
as we wanted to prove. ☐
Remark 2.
Theorem 2 is an extension to improper signaling (and up to the second-order term) of the well-known result that states that at low snr , the proper Gaussian capacity behaves linearly with snr .
Remark 3.
Equation (21) shows that at low snr , the behavior of the proposed family of improper constellations A ( ϕ , κ , M ) only depends on the circularity coefficient κ, but neither on the phase ϕ , nor on the cardinality M of V.
A more elaborate proof derived directly on the complex field gives us the MI third-order expansion around snr = 0 . This is stated in the next theorem, which is proven in Appendix B.
Theorem 3.
Let V be a discrete improper random variable with circularity coefficient 0 κ 1 taking values in A ( ϕ , κ , M ) and constructed as in (16) with X being a square proper M-QAM constellation. Then, the mutual information between Y and V in (5) admits the following third-order expansion around snr = 0 :
I ( snr V + N ; V ) = snr 1 2 ( 1 + κ 2 ) snr 2 + 1 3 ( 1 κ 2 ) snr 3 + O ( snr 4 ) .
Proof. 
See Appendix B. ☐
Remark 4.
The asymptotic expansion of the capacity (8) of the AWGN channel when transmitting improper Gaussian codewords is:
C ( snr , κ ) = snr 1 2 ( 1 + κ 2 ) snr 2 + 1 3 ( 1 + 3 κ 2 ) snr 3 + O ( snr 4 ) .
Comparing Equations (28) and (29), we see that at low snr , the behavior of the mutual information for the discrete improper constellation V and the improper Gaussian capacity is the same up to the second-order term.

4.3. Asymptotic Results at High SNR

The optimum ϕ ^ that maximizes I ( snr V + N ; V ) depends in general on M, κ and the snr . The analytical derivation of ϕ ^ ( snr , κ , M ) for all snr appears to be intractable in general. However, at high snr , the optimal phase depends only on κ and is given by the following theorem.
Theorem 4.
At high snr , the optimal ϕ ^ that maximizes I ( snr V + N ; V ) over 0 ϕ π 2 is equal to ϕ * ( κ ) in Expression (20) and is given by:
lim snr ϕ ^ ( snr , κ , M ) = ϕ * ( κ ) = π / 2 , 0 < κ 0.5 , ϕ * , 0.5 < κ 1 ,
where ϕ * is the solution of the equation 2 sin ( ϕ ) cos ( ϕ ) = 1 / κ .
Proof. 
In order to proceed, we use the fact [26] that for any discrete constellation, the mutual information, the minimum mean-squared error (mmse) and the symbol error probability all have an asymptotic behavior proportional to Q snr d m i n / 2 , where Q ( · ) denotes the Gaussian Q-function and d m i n is the minimum Euclidean distance of the constellation.
In Proposition 1, we showed that the value of ϕ * ( κ ) that maximizes the minimum distance of the family of constellations A ( ϕ , κ , M ) is given by:
ϕ * ( κ ) = arg max ϕ [ 0 , π / 2 ] d m i n ( Λ ( ϕ , κ ) )
where Λ ( ϕ , κ ) is the lattice that results from the H ( ϕ , κ ) -transformation of the integer lattice Z 2 (refer to (18)). From (18) and exploiting the fact that 0 ϕ π / 2 , it can be computed that:
d m i n 2 = min { 1 κ cos ( ϕ ) , 2 1 κ sin ( ϕ ) } ,
which can be obtained from the real representation given by (17) when the signal points of the original proper constellation belong to a regular square lattice. It is easy to check that 0 κ 0.5 1 κ cos ( ϕ ) 2 1 κ sin ( ϕ ) . This, in turn, means that the optimal solution of (31) when 0 κ 0.5 is ϕ * ( κ ) = π / 2 . On the other hand, when κ > 0.5 , the optimal phase satisfies the nonlinear equation:
1 κ cos ( ϕ ) = 2 1 κ sin ( ϕ ) 2 sin ( ϕ ) cos ( ϕ ) = 1 κ ,
which proves the theorem. ☐
Remark 5.
For κ = 1 (maximally improper, rectilinear, constellations), the optimal phase in Equation (30) is ϕ * 0.9273 . This value results in a rectilinear constellation with equidistant points, which would be equivalent to a rotated M-ary pulse amplitude modulation (PAM). As an example, starting from a standard QPSK constellation and using κ = 1 and ϕ * 0.9273 in (16), we obtain a unit-norm rectilinear constellation with equidistant signal points:
V = 1.2 + 0.6 i 0.4 + 0.2 i 0.4 0.2 i 1.2 0.6 i .

4.4. Shaping Loss

Next, we compute the shaping loss defined as the ratio of the powers required to achieve the same transmission rate when using symbols that are either uniformly distributed in A ( ϕ , κ , M ) (by assuming M to be an unbounded large number) or Gaussian distributed. The shaping loss in the improper case can also be interpreted as the power penalty due to using codewords uniformly distributed inside a multidimensional parallelogram rather than inside a multidimensional ellipsoid.
Theorem 5.
The shaping loss γ s of the proposed family of improper constellations with respect to improper Gaussian signaling is:
γ s = π e 6 ( 1.53 d B )
which is independent of κ and ϕ and coincides with the shaping loss of proper M-QAM constellations [25].
Proof. 
The shaping gain can be obtained as follows. Let us consider two memoryless complex sources. The first source generates discrete values V = V I + j V Q uniformly distributed over the constellation A ( ϕ , κ , M ) where M is assumed to be a very large number. Under this assumption, its uniform distribution can be approximated by the probability density function:
f V ( v I , v Q ) = 1 A ( P ) if   ( v I , v Q ) P ; 0 otherwise ,
where P denotes the parallelogram determined by the boundaries of the constellation A ( ϕ , κ , M ) and A ( P ) denotes its area. Based on the Jacobian of the transformation H ( ϕ , κ ) , this area can be computed as:
A ( P ) = det ( H ( ϕ , κ ) ) A ( R )
where A ( R ) = 1 denotes the area of the square R = [ 0.5 , 0.5 ] 2 . Note that the second-order moment of R is given by P R = 1 / 6 and so will be the second-order moment, P V , of the parallelogram P , since the transformation H ( ϕ , κ ) keeps its input-output power invariant. Therefore, A ( P ) can also be written as:
A ( P ) = det ( H ( ϕ , κ ) ) A ( R ) = 1 κ 2 6 P V .
The second source, G = G I + j G Q , generates continuous values in C , with the improper complex Gaussian distribution:
f G ( g I , g Q ) = N 0 , K G ,
where K G = diag P G 2 ( 1 + κ ) , P G 2 ( 1 κ ) and P G denotes the second-order moment of this Gaussian source.
Note that in order to generate the same number of bits per source symbol (i.e., the same information rate), the entropy of both sources should be the same. Since:
h V ( V I , V Q ) = A ( P ) log A ( P ) 1 A ( P ) d v I d v Q = log A ( P ) = log 1 κ 2 6 P V
and:
h G ( G I , G Q ) = log ( 2 π e ) det ( K G ) = log ( 2 π e ) P G 2 1 κ 2 ,
we find that γ s is:
γ s = P V P G = π e 6 ,
as we wanted to prove. ☐

5. Numerical Results

5.1. Mutual Information as a Function of ϕ

In this section, we present some numerical results that validate our findings. First, we compute numerically the MI of improper constellations generated according to (16) and study its behavior with respect to ϕ . Figure 4 plots the MI of an improper QPSK constellation with κ = 0.4 for increasing values of the snr . The MI always peaks at ϕ = π / 2 , which is the optimal value according to Theorem 4. Note the different scale of the y-axis for each subplot. Figure 5 shows the results for an improper QPSK signal with a higher circularity coefficient ( κ = 0.95 ). In this case, as the snr increases, the optimal phase decreases until reaching, for sufficiently high snr , the optimal ϕ * in Theorem 4. For κ = 0.95 , the optimal phase shown in Figure 5 is ϕ * = 0.9538 .
Finally, Figure 6 shows the value of ϕ that maximizes I ( Y ; V ) for different values of κ for an improper QPSK constellation. In the interval 0 κ 0.5 , the optimum value is π / 2 regardless of the snr. When κ > 0.5, π / 2 is still the optimum value for the low- snr regime, whereas at high snr the optimum value is ϕ o p t = ϕ * given by Equation (30), which depends only on κ . The curves in Figure 6 for κ > 0.5 are monotonically non-increasing. However, for high values of both κ and snr , the estimated curves present some small fluctuations, which are due to numerical errors in the simulation. These errors can be explained because the mutual information is computed by numerical integration over a finite region for a discrete grid of equally-spaced phases.

5.2. Capacity Curves

Figure 7 plots the mutual information achieved by improper M-QAM signals with κ = 0.95 when the optimum ϕ * = 0.9538 at high snr is used (black solid lines), in comparison to the case when we use fixed ϕ = π / 2 (dashed blue lines) or ϕ = 0 (red dashed lines). We consider three increasing values of the constellation size: M = 16, 64 and 144. The constellation with ϕ = 0 is a rectangular constellation with uncorrelated real and imaginary parts, but with a power imbalance to achieve the desired circularity coefficient. We observe that this naive family A ( ϕ = 0 , κ , M ) of constellations attains lower MI than using the optimum ϕ * = 0.9538 given by Theorem 4. This rectangular constellation is also outperformed by the constellation generated with ϕ = π / 2 .
The figure also depicts the Gaussian capacity curve with improper signaling and the envelope of the capacity curves with M-QAM constellations for M sufficiently large. The distance between both curves is the shaping gain, which as proven in Theorem 5 is 1.53 dB. It should be mentioned that, since the shaping loss does not depend on ϕ , the mutual information envelope I * ( snr , κ ) obtained from the set of constellations with ϕ = 0 , ϕ = π / 2 or with the optimum ϕ * are all the same as M increases. However, for a given snr and κ , the minimum M that makes I ( Y ; V ) I * ( snr , κ ) , will be smaller when ϕ = ϕ * ( κ ) than when ϕ = 0 . That is, ϕ = 0 needs a larger constellation expansion ratio [30] to achieve the same rate.
The situation is different for maximally improper signals ( κ = 1 ) (i.e., rectilinear constellations). In this case, using ϕ = π / 2 makes some signal points of the original proper constellation collapse into the same symbol, thus losing rate at high snr . This effect becomes evident in Figure 8, which plots the mutual information achieved by the proposed improper constellation with κ = 1 , and M = 4 and M = 16 signal points, for ϕ = π / 2 and for the optimal ϕ * = 0.9273 at high snr . From a practical point of view, we advocate the use of the optimal ϕ * given in (30), which maximizes the minimum distance between constellation points.
Finally, Figure 9 depicts the capacity curves for proper and improper (with κ = 0.95) M-QAM discrete constellations. For the improper M-QAM, the optimal ϕ * = 0.9538 at high snr is used. The proper and improper Gaussian capacity is also depicted for comparison.
From these results, the following conclusions are drawn:
  • For low-rate transmissions ( M = 4 or M = 16 ), there is no rate loss with respect to the improper Gaussian capacity when using coded symbols uniformly drawn from the proposed family of improper constellations. Therefore, like in the proper case, the proposed improper QPSK and 16-QAM constellations are optimal in the wideband regime [32].
  • For high-rate transmissions ( M > 16 ), the proposed family of improper constellations incurs a shaping loss of up to 1.53 dB. As in the case of proper M-QAM signaling, this snr loss can be reduced by designing codes with some shaping mechanism to make the coded symbols in A ( ϕ , κ , M ) more Gaussian-like distributed.
  • The optimal ϕ * , derived at high snr , can be safely used without any observable degradation in Δ ( snr , κ ) , independently of the value of M and snr .
Therefore, we arrive at the main conclusion of the paper, namely that the proposed family of improper constellations is a good candidate to be used in communication systems with improper signaling. In fact, it can be viewed as the improper counterpart of the standard proper M-QAM constellations.

6. Conclusions

In this paper, we have proposed a family of improper constellations constructed by widely linear processing of proper M-QAM signals. We have shown that, when the coded channel symbols are uniformly drawn from these constellations, the achievable transmission rates are close to the ones dictated by the improper Gaussian capacity. In particular, except for a shaping loss of 1.53 dB encountered at high snr , there is no rate loss of the proposed improper discrete constellations with respect to the improper Shannon capacity. In practice, we can select the optimal phase at high snr , ϕ * ( κ ) , obtained by minimizing the BER of the uncoded system without significant loss in performance at lower snr . Observe that this fact facilitates the practical implementation of these constellations since ϕ * ( κ ) does not depend on the snr and M.
These results are obtained by analyzing at the high- and low- snr regimes the family of mutual information, { I ( Y ; V ) : V A ( ϕ * ( κ , snr , M ) , κ , M ) , for   all   M   and   snr   values } , and by obtaining the shaping loss computed as the ratio of the normalized second moments of a multidimensional parallelogram and a multidimensional ellipsoid.
We conclude that the proposed family of improper constellations is a good candidate to be used in communication systems when improper signaling is required over the AWGN channel. In fact, it behaves like the standard family of proper M-QAM constellations and can be viewed as its improper counterpart. In perspective, these results extend the analysis of improper signaling in interference-limited scenarios to non-Gaussian discrete constellations with equiprobable symbols.

Acknowledgments

The work of Pedro M. Crespo and Ignacio Santamaria has been partially supported by the Ministerio de Economía y Competitividad (MINECO) of Spain and Agencia Estatal de Investigación (AEI)/(European Fund for Economic and Regional Development) FEDER funds of the E.U., under Grants TEC2013-47141-C4-R (RACHEL), TEC2016-75067-C4-4-R (CARMEN). The work of Christian Lameiro and Peter J. Schreier was supported by the German Research Foundation (DFG) under Grants LA 4107/1-1 and SCHR 1384/6-1.

Author Contributions

Ignacio Santamaria and Christian Lameiro conceived of the research question. Pedro M. Crespo, Ignacio Santamaria and Christian Lameiro proved the main results. Pedro M. Crespo, Ignacio Santamaria, Christian Lameiro and Peter J. Schreier wrote the paper. All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest. The funding sponsors had no role in the design of the study; in the collection, analyses or interpretation of data; in the writing of the manuscript; nor in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
AWGNAdditive white Gaussian noise
BPSKBinary phase shift keying
GMSKGaussian minimum shift keying
MIMutual information
MMSEMinimum mean-squared error
PAPRPeak-to-average-power ratio
PUPrimary user
QAMQuadrature amplitude modulation
QPSKQuadrature phase shift keying
SNRSignal-to-noise ratio
SUSecondary user
UCRUnderlay cognitive radio

Appendix A. Derivation of the Capacity for Improper Gaussian Signals by an Elliptic Packing Argument

We want to reliably transmit 2 N R uniformly-distributed messages across an AWGN channel. To that end, we associate with each message m { 1 , 2 , , 2 N R } a complex point x ( m ) belonging to some N-dimensional regular lattice with minimum Euclidean distance d m i n and enclosed in some region R C N . This region is such that the induced empirical distribution on each of the N complex components satisfies the improper circularity constraint:
| E [ X k , I 2 ] E [ X k , Q 2 ] | E [ X k , I 2 ] + E [ X k , Q 2 ] = κ , k = 1 , 2 , , N ,
where X k , I and X k , Q denote the real and complex components of symbol k. Without any loss of generality, we also assume E [ X k , I X k , Q ] = 0
The total average energy of such constellation for large N can be approximated as:
P T = 1 2 n R k = 1 2 n R x ( k ) 2 R r 2 d r Vol ( R ) ,
The region R that minimizes P T (i.e., the second moment of R ), under the constraint (A1), is the N-dimensional ellipsoid:
E X = r = ( r 1 , I , r 1 , Q , , r N , I , r N , Q ) T R 2 N : 1 σ I 2 r I 2 + 1 σ Q 2 r Q 2 = 2 N ( 1 + ϵ ) .
where E [ X k , I 2 ] = σ I 2 , E [ X k , Q 2 ] = σ Q 2 for all k = 1 , 2 , , N and σ Q 2 = σ I 2 1 κ 1 + κ .
By the law of large numbers, the N-dimensional received complex vector y = x + n will lie, with high probability, within the ellipsoid:
E Y = r = ( r 1 , I , r 1 , Q , , r N , I , r N , Q ) T R 2 N : 1 σ I 2 + N 0 / 2 r I 2 + 1 σ Q 2 + N 0 / 2 r Q 2 = 2 N ( 1 + ϵ ) ,
and hence, without loss of generality, we only need to focus on what happens inside this E Y ellipsoid. On the other hand,
lim N 1 N | N k | 2 = N 0 ,
again by the law of large numbers. That is, the noise realizations of the channel are with high probability, inside a sphere S N of radius N N 0 .
Therefore, when the codeword x ( m ) is sent, the received vector at the output of the channel will be contained with high probability in the sphere S N centered at x ( m ) . If we assign as the decision region for message m the region D m = x ( m ) + S N , an error will be produced only if the received vector falls outside D m , which has low probability. By choosing the other decision regions in the same way, i.e., D l = x ( l ) + S N , the overall probability of error will be negligible, as long as there is no intersection among the spheres. Therefore, the maximum number of possible messages, i.e., 2 n C is given by the ratio:
M = Vol ( E Y ) Vol ( S N ) .
The volumes of the E Y ellipsoid and the S N sphere are [33]:
Vol ( E Y ) = ( 2 N π ) N N ! ( σ Q 2 σ I 2 ) N 2 and Vol ( S N ) = ( 2 N π ) N N ! N 0 2 N ,
respectively.
Substituting (A5) into (A4) yields:
M = Vol ( E Y ) Vol ( S N ) = ( P ( 1 + κ ) + N 0 ) N 2 ( P ( 1 κ ) + N 0 ) N 2 N 0 N = 2 N 2 log ( ( 1 + snr ) 2 κ 2 snr 2 ) ,
where P = σ I 2 + σ Q 2 is the average power per complex dimension. Therefore,
C = log M N = 1 2 log { ( 1 + snr ) 2 κ 2 snr 2 } = log ( 1 + snr ) + 1 2 log 1 κ 2 1 + snr 1 2 ,
which is the capacity of the AWGN channel with improper Gaussian codewords in Equation (8).

Appendix B. Proof of Theorem 3

For the proof, we follow the technique used in [31,34]. Let us denote the standard complex Gaussian density as ψ ( y ) = 1 π e | y | 2 , and let us define the functions:
g 0 ( y ; snr ) = E ψ ( y snr V ) ,
g 1 ( y ; snr ) = E V ψ ( y snr V ) ,
where the expectation is taken over V. The conditional mean estimate can be expressed as [31]:
E [ V | Y = y ] = g 1 ( y ; snr ) g 0 ( y ; snr ) ,
and (taking into account that E [ | V | 2 ] = 1 ), the mmse can be calculated as [34]:
mmse ( snr ) = 1 | g 1 ( y ; snr ) | 2 g 0 ( y ; snr ) d y ,
where the integral is calculated over the complex field.
When snr 0 , the Gaussian complex density can be expanded as:
ψ ( y snr V ) = ψ ( y ) 1 + ( y * V + y V * ) snr + 1 2 ( ( y * V ) 2 + ( y V * ) 2 + 2 | V | 2 ( | y 2 | 1 ) ) snr + O ( snr 3 / 2 ) .
Using this Taylor series expansion, the functions g 0 ( y ; snr ) and g 1 ( y ; snr ) defined in (A6) and (A7), respectively, can be computed in terms of the moments of V as:
g 0 ( y ; snr ) = ψ ( y ) 1 + 1 2 ( y * ) 2 E [ V 2 ] + y 2 E [ V 2 ] * + 2 E [ | V | 2 ] ( | y 2 | 1 ) snr ,
g 1 ( y ; snr ) = ψ ( y ) y * E [ V 2 ] + y E [ | V | 2 ] snr + 1 2 ( y * ) 2 E [ V 3 ] snr ,
where in (A12), we have used E [ | V | 2 V * ] = 0 . We also have the expansion:
1 g 0 ( y ; snr ) = 1 ψ ( y ) 1 1 2 ( y * ) 2 E [ V 2 ] + y 2 E [ V 2 ] * + 2 E [ | V | 2 ] ( | y 2 | 1 ) snr .
We are assuming | E [ V 2 ] | 2 = 1 , and in addition, it is easy to check that E [ V 3 ] = 0 . Therefore, substituting these values in (A12) and (A13), we get:
g 1 ( y ; snr ) = ψ ( y ) y * E [ V 2 ] + y snr
and:
1 g 0 ( y ; snr ) = 1 ψ ( y ) 1 1 2 ( y * ) 2 E [ V 2 ] + y 2 E [ V 2 ] * + 2 ( | y 2 | 1 ) snr ,
which only depend on E [ V 2 ] .
Substituting (A14) and (A15) in (A9) and evaluating the resulting integral over y, we obtain the result:
mmse ( snr , κ ) = 1 ( 1 + κ 2 ) snr + ( 1 κ 2 ) snr 2 + O ( snr 3 ) .
Finally, by integrating Expression (A16), we obtain the expansion around snr = 0 of the mutual information as:
I ( snr , κ ) = snr ( 1 + κ 2 ) 2 snr 2 + ( 1 κ 2 ) 3 snr 3 + O ( snr 4 ) .
which completes the proof.

References

  1. Cover, T.M.; Thomas, J.A. Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing); John Wiley & Sons: New York, NY, USA, 2006. [Google Scholar]
  2. Cadambe, V.; Jafar, S.; Wang, C. Interference alignment with asymmetric complex signaling—Settling the Høst-Madsen-Nosratinia conjecture. IEEE Trans. Inf. Theory 2010, 56, 4552–4565. [Google Scholar] [CrossRef]
  3. Ho, Z.; Jorswieck, E. Improper Gaussian signaling on the two-user SISO interference channel. IEEE Trans. Wirel. Commun. 2012, 11, 3194–3203. [Google Scholar] [CrossRef]
  4. Zeng, Y.; Yetis, C.; Gunawan, E.; Guan, Y.; Zhang, R. Transmit optimization with improper Gaussian signaling for interference channels. IEEE Trans. Signal Process. 2013, 61, 2899–2913. [Google Scholar] [CrossRef]
  5. Lagen, S.; Agustin, A.; Vidal, J. Coexisting linear and widely linear transceivers in the MIMO interference channel. IEEE Trans. Signal Process. 2016, 64, 652–664. [Google Scholar] [CrossRef]
  6. Lameiro, C.; Santamaria, I.; Schreier, P.J. Rate region boundary of the SISO Z-interference channel with improper signaling. IEEE Trans. Commun. 2017, 65, 1022–1034. [Google Scholar] [CrossRef]
  7. Lameiro, C.; Santamaria, I.; Schreier, P.J. Benefits of improper signaling for underlay cognitive radio. IEEE Wirel. Commun. Lett. 2015, 4, 22–25. [Google Scholar] [CrossRef]
  8. Amin, O.; Abediseid, W.; Alouini, M.S. Underlay cognitive radio systems with improper Gaussian signaling: Outage performance analysis. IEEE Trans. Wirel. Commun. 2016, 15, 4875–4887. [Google Scholar] [CrossRef]
  9. Schreier, P.J.; Scharf, L.L. Statistical Signal Processing of Complex-Valued Data: The Theory of Improper and Noncircular Signals; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
  10. Gerstacker, W.; Schober, R.; Lampe, A. Receivers with widely linear processing for frequency-selective channels. IEEE Trans. Commun. 2003, 51, 1512–1523. [Google Scholar] [CrossRef]
  11. Buzzi, S.; Lops, M.; Sardellitti, S. Widely linear reception strategies for layered space-time wireless communications. IEEE Trans. Signal Process. 2006, 54, 2252–2262. [Google Scholar] [CrossRef]
  12. Chevalier, P.; Pipon, F. New insights into optimal widely linear array receivers for the demodulation of BPSK, MSK, and GMSK signals corrupted by noncircular interferences-application to SAIC. IEEE Trans. Signal Process. 2006, 54, 870–883. [Google Scholar] [CrossRef]
  13. Schober, R.; Gerstacker, W.; Lampe, L.J. Data-aided and blind stochastic gradient algorithms for widely linear MMSE MAI suppression for DS-CDMA. IEEE Trans. Signal Process. 2004, 52, 746–756. [Google Scholar] [CrossRef]
  14. Lameiro, C.; Santamaria, I. Degrees-of-freedom for the 4-user SISO interference channel with improper signaling. In Proceedings of the 2013 IEEE International Conference on Communications (ICC), Budapest, Hungary, 9–13 June 2013. [Google Scholar]
  15. Nguyen, H.; Zhang, R.; Sun, S. Improper signaling for symbol error rate minimization in K-user interference channel. IEEE Trans. Commun. 2015, 63, 857–869. [Google Scholar] [CrossRef]
  16. Kurniawan, E.; Sun, S. Improper Gaussian signaling scheme for the Z-interference channel. IEEE Trans. Wirel. Commun. 2015, 14, 3912–3923. [Google Scholar] [CrossRef]
  17. Lagen, S.; Agustin, A.; Vidal, J. Improper Gaussian signaling for the Z-interference channel. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, 4–9 May 2014; pp. 1145–1149. [Google Scholar]
  18. Lagen, S.; Agustin, A.; Vidal, J. On the superiority of improper Gaussian signaling in wireless interference MIMO scenarios. IEEE Trans. Commun. 2016, 64, 3350–3368. [Google Scholar] [CrossRef]
  19. Hellings, C.; Utschick, W. Performance gains due to improper signals in MIMO broadcast channels with widely linear receivers. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Vancouver, BC, Canada, 26–31 May 2013; pp. 4379–4383. [Google Scholar]
  20. Zeng, Y.; Zhang, R.; Gunawan, E.; Guan, Y.L. Optimized transmission with improper Gaussian signaling in the K-user MISO interference channel. IEEE Trans. Wirel. Commun. 2013, 12, 6303–6313. [Google Scholar] [CrossRef]
  21. Amin, O.; Abediseid, W.; Alouini, M.S. Overlay spectrum sharing using improper Gaussian signaling. IEEE J. Sel. Areas Commun. 2017, 35, 50–62. [Google Scholar] [CrossRef]
  22. Gaafar, M.; Khafagy, M.G.; Amin, O.; Alouini, M.S. Improper Gaussian signaling in full-duplex relay channels with residual self-interference. In Proceedings of the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–7. [Google Scholar]
  23. Gaafar, M.; Amin, O.; Ikhlef, A.; Chaaban, A.; Alouini, M.S. On alternate relaying with improper Gaussian signaling. IEEE Commun. Lett. 2016, 20, 1683–1686. [Google Scholar] [CrossRef]
  24. Kariminezhad, A.; Chaaban, A.; Sezgin, A. Improper signaling and symbol extensions: How far can we go with Gaussian P2P codebooks in the interfering MAC with TIN? arXiv, 2017; arXiv:1607.01995. [Google Scholar]
  25. Forney, G.; Ungerboek, G. Modulation and coding for linear Gaussian channels. IEEE Trans. Inf. Theory 1998, 44, 2384–2415. [Google Scholar] [CrossRef]
  26. Alvarado, A.; Brännström, F.; Agrell, E.; Koch, T. High-SNR asymptotics of mutual information for discrete constellations with applications to BICM. IEEE Trans. Inf. Theory 2014, 60, 1061–1076. [Google Scholar] [CrossRef]
  27. Neeser, F.D.; Massey, J.L. Proper complex random processes with applications to information theory. IEEE Trans. Inf. Theory 1993, 39, 1293–1302. [Google Scholar] [CrossRef]
  28. Costa, M. On the Gaussian interference channel. IEEE Trans. Inf. Theory 1985, 31, 607–615. [Google Scholar] [CrossRef]
  29. Tse, D.; Viswanath, P. Fundamentals of Wireless Communications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  30. Fisher, R.F.H. Precoding and Signal Shaping for Digital Transmissions; John Wiley & Sons: New York, NY, USA, 2002. [Google Scholar]
  31. Guo, D.; Shamai, S.; Verdu, S. Mutual information and minimum mean-square error in Gaussian channels. IEEE Trans. Inf. Theory 2005, 51, 1261–1282. [Google Scholar] [CrossRef]
  32. Verdu, S. Spectral efficiency in the wideband regime. IEEE Trans. Inf. Theory 2002, 48, 1319–1343. [Google Scholar] [CrossRef]
  33. Sykora, S. Volume Integrals over n-Dimensional Ellipsoids. Stan’s Library 2005, 1, 101–106. [Google Scholar]
  34. Guo, D.; Wu, Y.; Shitz, S.S.; Verdu, S. Estimation in Gaussian noise: Properties of the minimum mean-square error. IEEE Trans. Inf. Theory 2011, 57, 2371–2385. [Google Scholar]
Figure 1. Underlay cognitive radio scenario with a secondary user that may transmit improper Gaussian signals.
Figure 1. Underlay cognitive radio scenario with a secondary user that may transmit improper Gaussian signals.
Entropy 20 00045 g001
Figure 2. Improper constellations generated according to (16) for different values of κ and ϕ when X is proper Quadrature Phase Shift Keying (QPSK).
Figure 2. Improper constellations generated according to (16) for different values of κ and ϕ when X is proper Quadrature Phase Shift Keying (QPSK).
Entropy 20 00045 g002
Figure 3. Improper constellation generated according to (16) for κ = 0.7 and ϕ = π / 2 when X is proper 256-QAM (Quadrature Amplitude Modulation).
Figure 3. Improper constellation generated according to (16) for κ = 0.7 and ϕ = π / 2 when X is proper 256-QAM (Quadrature Amplitude Modulation).
Entropy 20 00045 g003
Figure 4. Mutual information of an improper QPSK constellation with κ = 0.4 as a function of ϕ , for three different signal-to-noise ratio ( snr ).
Figure 4. Mutual information of an improper QPSK constellation with κ = 0.4 as a function of ϕ , for three different signal-to-noise ratio ( snr ).
Entropy 20 00045 g004
Figure 5. Mutual information of an improper QPSK constellation with κ = 0.95 as a function of ϕ , for three different snr . The optimal phase is ϕ * = 0.9538 .
Figure 5. Mutual information of an improper QPSK constellation with κ = 0.95 as a function of ϕ , for three different snr . The optimal phase is ϕ * = 0.9538 .
Entropy 20 00045 g005
Figure 6. ϕ o p t versus snr in dBs for different values of κ .
Figure 6. ϕ o p t versus snr in dBs for different values of κ .
Entropy 20 00045 g006
Figure 7. Mutual information vs. snr when κ = 0.95 for ϕ = π / 2 (blue dashed lines), ϕ = 0 (red dashed lines) and ϕ * = 0.9538 (black solid lines) for improper M-QAM signals. The capacity of the improper Additive White Gaussian Noise (AWGN) channel using Gaussian codewords and the asymptotic envelope of the curves are also depicted.
Figure 7. Mutual information vs. snr when κ = 0.95 for ϕ = π / 2 (blue dashed lines), ϕ = 0 (red dashed lines) and ϕ * = 0.9538 (black solid lines) for improper M-QAM signals. The capacity of the improper Additive White Gaussian Noise (AWGN) channel using Gaussian codewords and the asymptotic envelope of the curves are also depicted.
Entropy 20 00045 g007
Figure 8. Mutual information vs. snr when κ = 1 (maximally improper) for ϕ = π / 2 and ϕ * for improper constellations with M = 4 and M = 16 signal points. The capacity of the improper AWGN channel using Gaussian codewords is also depicted.
Figure 8. Mutual information vs. snr when κ = 1 (maximally improper) for ϕ = π / 2 and ϕ * for improper constellations with M = 4 and M = 16 signal points. The capacity of the improper AWGN channel using Gaussian codewords is also depicted.
Entropy 20 00045 g008
Figure 9. Capacity comparison between proper and improper (with κ = 0.95) M-QAM discrete constellations. For the improper M-QAM, the optimal ϕ * = 0.9538 at high snr is used. The proper and improper Gaussian capacity is also depicted.
Figure 9. Capacity comparison between proper and improper (with κ = 0.95) M-QAM discrete constellations. For the improper M-QAM, the optimal ϕ * = 0.9538 at high snr is used. The proper and improper Gaussian capacity is also depicted.
Entropy 20 00045 g009

Share and Cite

MDPI and ACS Style

Santamaria, I.; Crespo, P.M.; Lameiro, C.; Schreier, P.J. Information-Theoretic Analysis of a Family of Improper Discrete Constellations. Entropy 2018, 20, 45. https://doi.org/10.3390/e20010045

AMA Style

Santamaria I, Crespo PM, Lameiro C, Schreier PJ. Information-Theoretic Analysis of a Family of Improper Discrete Constellations. Entropy. 2018; 20(1):45. https://doi.org/10.3390/e20010045

Chicago/Turabian Style

Santamaria, Ignacio, Pedro M. Crespo, Christian Lameiro, and Peter J. Schreier. 2018. "Information-Theoretic Analysis of a Family of Improper Discrete Constellations" Entropy 20, no. 1: 45. https://doi.org/10.3390/e20010045

APA Style

Santamaria, I., Crespo, P. M., Lameiro, C., & Schreier, P. J. (2018). Information-Theoretic Analysis of a Family of Improper Discrete Constellations. Entropy, 20(1), 45. https://doi.org/10.3390/e20010045

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop