entropy-logo

Journal Browser

Journal Browser

Multiuser Information Theory

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".

Deadline for manuscript submissions: closed (30 June 2017) | Viewed by 30087

Special Issue Editor


E-Mail Website
Guest Editor
Department of Electrical Engineering and Computer Science, University of Michigan, 1301 Beal Avenue, Ann Arbor, MI 48103, USA
Interests: distributed compression in sensor networks; multiple description source coding; multi-user channel coding; group codes for network communication; network capacity problems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In the recent past, several application scenarios have emerged that require large-scale deployment of communication network infrastructure. The purpose of this Special Issue is to develop new fundamental and analytical approaches to efficient, reliable and robust transmission of information in multiuser systems. The research work coming out of this special issue contributes toward solving some of the fundamental problems in the mathematical discipline of Multiuser Information Theory. Information theory has had a major impact on information sciences by giving fundamental insights into the structure of optimal coding systems for communication networks. It has also had major impact on other fields, such as ergodic theory, probability theory, combinatorics, and physics.

We intend to address the following topics in this Special Issue: New analytical techniques, non-asymptotic characterizations, duality between source networks and channel networks, networks with large number of nodes, new models of communication, and new applications. Successful completion of this Special Issue will have an impact on the evolution of the fundamental science and technology of reliable and efficient information coding, processing and transmission in networks. One of the goals of this issue is to develop new bridges between information theory and other fields, such as abstract algebra, theory of random graphs, theory of communication complexity, information geometry, and additive combinatorics, and thereby contribute to furthering collaborations between researchers working in these communities.

Prof. Dr. S. Sandeep Pradhan
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (8 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

311 KiB  
Article
Multilevel Coding for the Full-Duplex Decode-Compress-Forward Relay Channel
by Ahmed Attia Abotabl and Aria Nosratinia
Entropy 2017, 19(11), 611; https://doi.org/10.3390/e19110611 - 14 Nov 2017
Viewed by 3833
Abstract
The Decode-Compress-Forward (DCF) is a generalization of Decode-Forward (DF) and Compress-Forward (CF). This paper investigates conditions under which DCF offers gains over DF and CF, addresses the problem of coded modulation for DCF, and evaluates the performance of DCF coded modulation implemented via [...] Read more.
The Decode-Compress-Forward (DCF) is a generalization of Decode-Forward (DF) and Compress-Forward (CF). This paper investigates conditions under which DCF offers gains over DF and CF, addresses the problem of coded modulation for DCF, and evaluates the performance of DCF coded modulation implemented via low-density parity-check (LDPC) codes and polar codes. We begin by revisiting the achievable rate of DCF in discrete memoryless channels under backward decoding. We then study coded modulation for the decode-compress-forward via multi-level coding. We show that the proposed multilevel coding approaches the known achievable rates of DCF. The proposed multilevel coding is implemented (and its performance verified) via a combination of standard DVB-S2 LDPC codes, and polar codes whose design follows the method of Blasco-Serrano. Full article
(This article belongs to the Special Issue Multiuser Information Theory)
Show Figures

Figure 1

1699 KiB  
Article
Sum Capacity for Single-Cell Multi-User Systems with M-Ary Inputs
by Pei Yang, Yue Wu, Liqiang Jin and Hongwen Yang
Entropy 2017, 19(9), 497; https://doi.org/10.3390/e19090497 - 15 Sep 2017
Cited by 5 | Viewed by 4228
Abstract
This paper investigates the sum capacity of a single-cell multi-user system under the constraint that the transmitted signal is adopted from M-ary two-dimensional constellation with equal probability for both uplink, i.e., multiple access channel (MAC), and downlink, i.e., broadcast channel (BC) scenarios. [...] Read more.
This paper investigates the sum capacity of a single-cell multi-user system under the constraint that the transmitted signal is adopted from M-ary two-dimensional constellation with equal probability for both uplink, i.e., multiple access channel (MAC), and downlink, i.e., broadcast channel (BC) scenarios. Based on the successive interference cancellation (SIC) and the entropy power Gaussian approximation, it is shown that both the multi-user MAC and BC can be approximated to a bank of parallel channels with the channel gains being modified by an extra attenuate factor that equals to the negative exponential of the capacity of interfering users. With this result, the capacity of MAC and BC with arbitrary number of users and arbitrary constellations can be easily calculated which in sharp contrast with using traditional Monte Carlo simulation that the calculating amount increases exponentially with the increase of the number of users. Further, the sum capacity of multi-user under different power allocation strategies including equal power allocation, equal capacity power allocation and maximum capacity power allocation is also investigated. For the equal capacity power allocation, a recursive relation for the solution of power allocation is derived. For the maximum capacity power allocation, the necessary condition for optimal power allocation is obtained and an optimal algorithm for the power allocation optimization problem is proposed based on the necessary condition. Full article
(This article belongs to the Special Issue Multiuser Information Theory)
Show Figures

Figure 1

632 KiB  
Article
On the Capacity and the Optimal Sum-Rate of a Class of Dual-Band Interference Channels
by Subhajit Majhi and Patrick Mitran
Entropy 2017, 19(9), 495; https://doi.org/10.3390/e19090495 - 14 Sep 2017
Cited by 2 | Viewed by 3301
Abstract
We study a class of two-transmitter two-receiver dual-band Gaussian interference channels (GIC) which operates over the conventional microwave and the unconventional millimeter-wave (mm-wave) bands. This study is motivated by future 5G networks where additional spectrum in the mm-wave band complements transmission in the [...] Read more.
We study a class of two-transmitter two-receiver dual-band Gaussian interference channels (GIC) which operates over the conventional microwave and the unconventional millimeter-wave (mm-wave) bands. This study is motivated by future 5G networks where additional spectrum in the mm-wave band complements transmission in the incumbent microwave band. The mm-wave band has a key modeling feature: due to severe path loss and relatively small wavelength, a transmitter must employ highly directional antenna arrays to reach its desired receiver. This feature causes the mm-wave channels to become highly directional, and thus can be used by a transmitter to transmit to its designated receiver or the other receiver. We consider two classes of such channels, where the underlying GIC in the microwave band has weak and strong interference, and obtain sufficient channel conditions under which the capacity is characterized. Moreover, we assess the impact of the additional mm-wave band spectrum on the performance, by characterizing the transmit power allocation for the direct and cross channels that maximizes the sum-rate of this dual-band channel. The solution reveals conditions under which different power allocations, such as allocating the power budget only to direct or only to cross channels, or sharing it among them, becomes optimal. Full article
(This article belongs to the Special Issue Multiuser Information Theory)
Show Figures

Graphical abstract

1092 KiB  
Article
Channel Coding and Source Coding With Increased Partial Side Information
by Avihay Sadeh-Shirazi, Uria Basher and Haim Permuter
Entropy 2017, 19(9), 467; https://doi.org/10.3390/e19090467 - 02 Sep 2017
Viewed by 4012
Abstract
Let ( S 1 , i , S 2 , i ) i . i . d p ( s 1 , s 2 ) , i = 1 , 2 , be a memoryless, correlated partial side information sequence. In [...] Read more.
Let ( S 1 , i , S 2 , i ) i . i . d p ( s 1 , s 2 ) , i = 1 , 2 , be a memoryless, correlated partial side information sequence. In this work, we study channel coding and source coding problems where the partial side information ( S 1 , S 2 ) is available at the encoder and the decoder, respectively, and, additionally, either the encoder’s or the decoder’s side information is increased by a limited-rate description of the other’s partial side information. We derive six special cases of channel coding and source coding problems and we characterize the capacity and the rate-distortion functions for the different cases. We present a duality between the channel capacity and the rate-distortion cases we study. In order to find numerical solutions for our channel capacity and rate-distortion problems, we use the Blahut-Arimoto algorithm and convex optimization tools. Finally, we provide several examples corresponding to the channel capacity and the rate-distortion cases we presented. Full article
(This article belongs to the Special Issue Multiuser Information Theory)
Show Figures

Figure 1

934 KiB  
Article
On the Reliability Function of Variable-Rate Slepian-Wolf Coding
by Jun Chen, Da-ke He, Ashish Jagmohan and Luis A. Lastras-Montaño
Entropy 2017, 19(8), 389; https://doi.org/10.3390/e19080389 - 28 Jul 2017
Cited by 15 | Viewed by 3334
Abstract
The reliability function of variable-rate Slepian-Wolf coding is linked to the reliability function of channel coding with constant composition codes, through which computable lower and upper bounds are derived. The bounds coincide at rates close to the Slepian-Wolf limit, yielding a complete characterization [...] Read more.
The reliability function of variable-rate Slepian-Wolf coding is linked to the reliability function of channel coding with constant composition codes, through which computable lower and upper bounds are derived. The bounds coincide at rates close to the Slepian-Wolf limit, yielding a complete characterization of the reliability function in that rate region. It is shown that variable-rate Slepian-Wolf codes can significantly outperform fixed-rate Slepian-Wolf codes in terms of rate-error tradeoff. Variable-rate Slepian-Wolf coding with rate below the Slepian-Wolf limit is also analyzed. In sharp contrast with fixed-rate Slepian-Wolf codes for which the correct decoding probability decays to zero exponentially fast if the rate is below the Slepian-Wolf limit, the correct decoding probability of variable-rate Slepian-Wolf codes can be bounded away from zero. Full article
(This article belongs to the Special Issue Multiuser Information Theory)
Show Figures

Figure 1

846 KiB  
Article
Scaling Exponent and Moderate Deviations Asymptotics of Polar Codes for the AWGN Channel
by Silas L. Fong and Vincent Y. F. Tan
Entropy 2017, 19(7), 364; https://doi.org/10.3390/e19070364 - 15 Jul 2017
Cited by 6 | Viewed by 3514
Abstract
This paper investigates polar codes for the additive white Gaussian noise (AWGN) channel. The scaling exponent μ of polar codes for a memoryless channel q Y | X with capacity I ( q Y | X ) characterizes the closest gap between the [...] Read more.
This paper investigates polar codes for the additive white Gaussian noise (AWGN) channel. The scaling exponent μ of polar codes for a memoryless channel q Y | X with capacity I ( q Y | X ) characterizes the closest gap between the capacity and non-asymptotic achievable rates as follows: For a fixed ε ( 0 , 1 ) , the gap between the capacity I ( q Y | X ) and the maximum non-asymptotic rate R n * achieved by a length-n polar code with average error probability ε scales as n - 1 / μ , i.e., I ( q Y | X ) - R n * = Θ ( n - 1 / μ ) . It is well known that the scaling exponent μ for any binary-input memoryless channel (BMC) with I ( q Y | X ) ( 0 , 1 ) is bounded above by 4 . 714 . Our main result shows that 4 . 714 remains a valid upper bound on the scaling exponent for the AWGN channel. Our proof technique involves the following two ideas: (i) The capacity of the AWGN channel can be achieved within a gap of O ( n - 1 / μ log n ) by using an input alphabet consisting of n constellations and restricting the input distribution to be uniform; (ii) The capacity of a multiple access channel (MAC) with an input alphabet consisting of n constellations can be achieved within a gap of O ( n - 1 / μ log n ) by using a superposition of log n binary-input polar codes. In addition, we investigate the performance of polar codes in the moderate deviations regime where both the gap to capacity and the error probability vanish as n grows. An explicit construction of polar codes is proposed to obey a certain tradeoff between the gap to capacity and the decay rate of the error probability for the AWGN channel. Full article
(This article belongs to the Special Issue Multiuser Information Theory)
1623 KiB  
Article
Multi-User Detection for Sporadic IDMA Transmission Based on Compressed Sensing
by Bo Li, Rui Du, Wenjing Kang and Gongliang Liu
Entropy 2017, 19(7), 334; https://doi.org/10.3390/e19070334 - 05 Jul 2017
Cited by 7 | Viewed by 3803
Abstract
The Internet of Things (IoT) is placing new demands on existing communication systems. The limited orthogonal resources do not meet the demands of massive connectivity of future IoT systems that require efficient multiple access. Interleave-division multiple access (IDMA) is a promising method of [...] Read more.
The Internet of Things (IoT) is placing new demands on existing communication systems. The limited orthogonal resources do not meet the demands of massive connectivity of future IoT systems that require efficient multiple access. Interleave-division multiple access (IDMA) is a promising method of improving spectral efficiency and supporting massive connectivity for IoT networks. In a given time, not all sensors signal information to an aggregation node, but each node transmits a short frame on occasion, e.g., time-controlled or event-driven. The sporadic nature of the uplink transmission, low data rates, and massive connectivity in IoT scenarios necessitates minimal control overhead communication schemes. Therefore, sensor activity and data detection should be implemented on the receiver side. However, the current chip-by-chip (CBC) iterative multi-user detection (MUD) assumes that sensor activity is precisely known at the receiver. In this paper, we propose three schemes to solve the MUD problem in a sporadic IDMA uplink transmission system. Firstly, inspired by the observation of sensor sparsity, we incorporate compressed sensing (CS) to MUD in order to jointly perform activity and data detection. Secondly, as CS detection could provide reliable activity detection, we combine CS and CBC and propose a CS-CBC detector. In addition, a CBC-based MUD named CBC-AD is proposed to provide a comparable baseline scheme. Full article
(This article belongs to the Special Issue Multiuser Information Theory)
Show Figures

Figure 1

607 KiB  
Article
An Information-Spectrum Approach to the Capacity Region of the Interference Channel
by Lei Lin, Xiao Ma, Chulong Liang, Xiujie Huang and Baoming Bai
Entropy 2017, 19(6), 270; https://doi.org/10.3390/e19060270 - 13 Jun 2017
Cited by 4 | Viewed by 3673
Abstract
In this paper, a general formula for the capacity region of a general interference channel with two pairs of users is derived, which reveals that the capacity region is the union of a family of rectangles. In the region, each rectangle is determined [...] Read more.
In this paper, a general formula for the capacity region of a general interference channel with two pairs of users is derived, which reveals that the capacity region is the union of a family of rectangles. In the region, each rectangle is determined by a pair of spectral inf-mutual information rates. The presented formula provides us with useful insights into the interference channels in spite of the difficulty of computing it. Specially, when the inputs are discrete, ergodic Markov processes and the channel is stationary memoryless, the formula can be evaluated by the BCJR (Bahl-Cocke-Jelinek-Raviv) algorithm. Also the formula suggests that considering the structure of the interference processes contributes to obtaining tighter inner bounds than the simplest one (obtained by treating the interference as noise). This is verified numerically by calculating the mutual information rates for Gaussian interference channels with embedded convolutional codes. Moreover, we present a coding scheme to approach the theoretical achievable rate pairs. Numerical results show that the decoding gains can be achieved by considering the structure of the interference. Full article
(This article belongs to the Special Issue Multiuser Information Theory)
Show Figures

Figure 1

Back to TopTop