SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017
DOI: 10.5121/ijcnc.2017.9108 71
Bounds on the Achievable Rates of Faded Dirty
Paper Channel
Zouhair Al-qudah1
, Wael Abu Shehab2
1
Department of Communication Engineering, Al-Hussein Bin Talal University, Ma’an,
Jordan
2
Department of Electrical Engineering, Al-Hussein Bin Talal University, Ma’an, Jordan
ABSTRACT
Bounds on the achievable rate of a Gaussian channel in the case that the transmitter knows the
interference signal but not its fading coefficients are given. We generalize the analysis which were studied
in [1] and [4] so that their results are special cases of our analysis. We enforce our bounds by simulations
in which many numerical examples are drawn and investigated under different cases.
KEYWORDS
Dirty paper coding, lattice encoding and decoding, fading channel, Viterbi Algorithm.
1. INTRODUCTION
Dirty paper coding (DPC) is a communication model deals with Gaussian noise non-causally
known at the transmitter. In this communication model, an encoding technique is used with such a
noise such that its effects can be cancelled completely as Costa showed in his valued paper. The
received signal, Y , is decribed as
ZSXY ++= (1)
where is the transmitted signal and its average power is constrained by XPXE ≤][ 2
. Further,
is the interference non-causally known signal at the transmitter and with power constrained by
SPSE ≤][ 2
. In addition, is the additive white Gaussian noise vector (AWGN), with average
power ZP . DPC has a wide variety of applications includes MIMO broadcast channel where a
perfect knowledge of the interference is available, information hiding and digital watermarking.
In [6], Costa showed that the capacity for this channel doesn’t change when the interference is
non-causally known at the transmitter, and later in [9], they generalize this result for an arbitrary
interference distribution if the noise is Gaussian that is,
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017
72






+=
Z
X
P
P
C 1log
2
1
2 (2)
In [1], the authors studied the channel model in the case that a lack of interference phase
knowledge at the transmitter, that is where is quasi static and random. In
[theorem (1),[1]], the authors derived an upper bound of the capacity when the phase takes one
of the two values . That is the transmitter does not know the interference in perfect,
instead, it has to select between two points. In [7], they showed that in such a situation, the
system is equivalent to a transmitter wants to send a message simultaneously to two receivers
where each channel add a different interference. Also, the authors in [1] derived an upper bound
on the outage capacity (corollary 1) when the interferer signal has constant magnitude fading.
In [4], the autors followed [1] and studied the compound channel formulation instead of outage
probabilities. In particular, they derived lower and upper bounds on the achievable bounds when
the interference phase is unknown at the transmitter. Their derivation based on an adaption of the
nested lattice approach that is described in [5] for the classic non fading channel and in [3] for the
case of magnitude fading.
In [2], the authors generalized Costa’s formulation, by multiplying and by random fading
coefficients and , respectively, in which the realizations are known only to the receiver.
In addition, they modelled the coefficients as quasi static and assumed that these coefficients are
real valued Rician random variables. (The power inflation factor becomes zero when the fading
coefficients have zero mean, so, they consider the Rician fading channel). They studied the
achievable outage probabilities when the interference signal is known to the transmitter but not
the fading coefficients.
In [3], the authors considered a similar formulation where was constant and was real
valued and random. That is where . Further, a lower bound
is given when the power inflation factor is deterministic and an upper bound is given when the
power inflation factor at the transmitter is random under the following conditions ,
, that is noise free channel, their analysis based on lattice based coding
scheme. In their work, they showed that proactively injecting randomness into the transmission
strategy can produce substantial benefits.
In this paper, we generalize the results of [1,3,4] where we assume that the transmitter has lack of
magnitude and phase knowledge. We refer to such a situation as the faded dirty paper channel(F-
DPC). In this case, the received signal can be modelled as follows
ZhSXY ++= (3)
where h is a random quasi static fading parameter, and it is given by φ
γ j
eh = . The channel has
to support different transmission rates depending on how the fading parameter h varies, where h
can vary in magnitude or phase or both. We extend the lower bound derived in [4] and generalize
the upper bound that were firstly proposed in [1] for a predetermined values of φ and then
generalized to an arbitrary value of φ in [4].
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017
73
The rest of this paper is organized as follows, we review the principles of lattice dirty paper
coding in Section 2. Lower bounds and upper bounds are presented in Section 3. Bounds are
simulated and discussed in Section 4. Finally, we conclude our paper in Section 5.
2. LATTICE DIRTY PAPER CODING: DEFINITIONS AND PRELIMINARIES
Lattices are firstly used in [5] to achieve the capacity of dirty paper channel. Let Λ be a k-
dimensional lattice with fundamental Voronoi region υ with average second moment
XPP =Λ)( and normalized second moment
k
V
P
G 1
)(
)(
Λ
=Λ where )(υVolV = , then the lattice
transmission procedure is as follows, [5,8]. At first, the sender generates the signal
Λ−−= mod][ dScX α where the input alphabet X is restricted to υ . Further, the Λmod is
defined as )(mod uQuu Λ−=Λ where )(uQΛ is the lattice vector that is nearest to
u inters of the Euclidean distance. At the receiver, the destination computes
Λ+= mod]['
dYY α such that the received signal is reduced to
Λ+= mod][ ''
ZcY where the total noise at the destination is described by
Λ+−= mod])1[('
ZdZ αα .
3. BOUNDS OF FADED DIRTY PAPER CHANNEL
In this section, a lower bound and an upper bound on the achievable rates are derived when the
transmitter knows the interference non-causally but not the fading coefficients, that is the channel
adds faded interference.
3.1. Lower Bound
We follow [4] in which the signal has a block of n bits long. Then, each block is divided into k
blocks where every block contains kn bits. A k dimensional lattice is used to construct the
transmitted signal at each time block, the lattice is defined over complex number field. The
encoding and decoding procedures are as follows. In this procedure, by using modulo lattice
channel encoding scheme, the phase faded AWGN noise channel is converted such that it
contains only the transmitted codeword and the total noise over this channel. In this case, the
transmitted signal is given by
Λ−−= mod][ iiiii dscx α (4)
for knii ,,1, L= . In addition, ic , is and id are the symbols of codeword covers the intended
signal, interference signal and the dither signal at time i , respectively. The minimization factor
α can be selected randomly as in [4] or to be selected as )( ZXX PPP +=α [3,5,8]. This is
because the encoder does not have knowledge of the realizations h and φ . The destination
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017
74
computes Λ+= mod]['
iiii dyy β where iβ is the noise minimization factor computed at the
receiver and differs than iα and it will be determined later. Here, '
iy is evaluated as follows:
Λ+= mod]['
iiii dyy β
Λ+++= mod][ iii
j
iii dzex βγββ φ
Λ−+++−−+= mod][ iiii
j
iiiiii sdzedxcx αβγββ φ
Λ+−+−−= mod])()1([ iii
j
iiii zsexc βαγββ φ
(5)
In (5), the received signal contains i) the transmitted codeword ic at time i , and ii) the total
noise iii
j
iiii zsexz βαγββ φ
+−+−−= )()1( . This total noise is independent of ic . In
addition, the components ix , is , and iz are assumed to be independent of ic due to the
dither signal. So, for a given values of γα, and φ , the variance of the total noise is given by




 +−+−= ZS
j
iXiZ PPePP
222'
1 βαγββ φ
(6)
where iβ is selected to minimize the variance of the effective noise. Then, '
ZP is minimized by
selecting iβ as
ZSX
S
j
X
i
PPP
PeP
++
+
=
−
2
γ
γα
β
φ
(7)
We denote ),,,('
φγβαZP the value of '
ZP in (6) computed at the value of iβ from (7). The
lower bound on the capacity for such a construction is given in [4] for phase faded dirty paper and
we extend to faded dirty paper channel. This lower bound is given by
















Λ−





=
+
))((log
),,,(
log),,,( 2'2 eG
P
P
ER
Z
X
LB π
φγβα
φγβα α (8)
Where α is selected randomly with distribution known to the encoder and for any real value x ,
where [ ] ),0max( xx =
+
. A similar formulae was given in [3] for magnitude faded interference
when the value of α is constant and equal to )( ZXX PPP + . A lower bound ( )eG π1)( ≥Λ was
shown in [12,13] . This means that the second term in (11) is almost negative and its maximum
value is zero.
Remarks (1):
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017
75
1. We note that the formulae in (10) can be reduced to that given in [4] in the case of
1=γ for phase faded. In addition, the formulae in (10) can be reduced to that given in
[3] for magnitude fading and 0=φ or to the case that the channel adds a perfect
interference without fading, that is βα = .
2. In the case of strong interference, the minimization factor is selected to cancel the
interference effects, that is φ
γαβ j
e−
= )( , and so the effective noise is reduced to
( )ZXiZ PPP
22'
1 ββ +−= .
3.2. Upper Bounds
We now analyze the achievable upper bound over faded dirty paper channel. Our bound is valid
for arbitrary h , where φ
γ j
eh −
= can vary in magnitude and phase. Further, we generalize
theorem (1,[4]) which was given for phase faded dirty paper channel. Our bound is given in the
following lemma
Lemma1: The capacity of the compound faded dirty paper channel is upper bounded by







≤













+−
>





+
=
υγγφφ
υ
γγφφ
S
Z
X
ZSX
S
Z
X
UB
P
P
P
PPPJ
P
P
P
R
1log
2
1
),,,,,,(min
1log
2
1
),,,(
22112
2
2121
(9)
where
( )( )














−−+













 −
++
+
+
=−
1221
2
2
2
1
2
12
2
2
2
1
22112
cos2
2
cos2
2
log
2
1
),,,,,(
φφγγγγ
φφγγ
γγφφ
SZ
SXZSX
ZSX
PP
PPPPP
PPPJ
This bound is defined over arbitrary fading parameters iγ and iφ . In addition, this bound is
achieved by time sharing for the values of interference power such as υ>SP , where υ is a
parameter determined so that the bound is not an ascending function of SP . Also, the upper
bound can’t be larger than the AWGN channel capacity. The proof of this lemma is a direct
generalization of ( Theorem1, [4] ) and is omitted.
Remarks (2):
1. In the case that 121 == γγ , then, the formula in [4], which was derived for phase
faded dirty paper channel, is obtained.
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017
76
2. In the case that 121 == γγ , and o
18012 =−φφ , then, we obtain Eq(8) in [1].
4. SIMULATIONS AND DISCUSSIONS
We start our discussion by comparing the upper bound and lower bound for faded (magnitude,
phase, or combined) dirty paper channel. The following values dBPX 12= and dBPZ 0= are
used. In addition, the bounds are plotted as a function of .SP
Figure.1 compares among magnitude, phase and combined of both for a choice of
( )πφφ == 21 ,0 and 2.121 == γγ . It shows that for values of dBPS 9≤ , the achievable rate
of the phase faded performs better than faded (magnitude and phase). For values of dBPS 9> ,
both bounds are achieved by time sharing, that is the channel capacity is achieved by time sharing
. We note also that the upper and lower bounds for magnitude fading coincide (for range under
consideration) and achieved by the time sharing. For lower bound with constant α , it was found
to be calculated as 0
^
φ
α j
e [4], where
^
α is determined by exhaustive search over a fine grid.
Further, 0φ is set to the mean of 1φ and 2φ . In addition γ is set to the mean of 1γ and 2γ .
For the lower bound with variable α , 0φ has a distribution that is independent ofφ . In addition,
this figure shows that for low values of SP , lower bound with constant α doing better than
variable α . These bounds coincide when SP increases and finally they reach their final values
where the lower bound is achieved by time sharing.
Figure 1. Bounds for dirty paper channel.
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017
77
In an another example, Figure.2 shows the same bounds when the magnitude fading parameters
are changed to 2.11 =γ and 22 =γ . It shows that the gap between the upper bounds for phase
faded and faded interference is larger than the previous case due magnitude fading parameter. It
shows also that the gap between the lower and upper bounds is slightly less than the previous
case. Lower bound with variableα is better than with constant α . Again for values of
dBPS 9> , the bounds can coincide and the channel capacity is achieved by time sharing. Again
for only magnitude fading, the bounds coincide and are achieved by time sharing and so the
channel capacity.
Figure.3 shows the same bounds for )
3
2
,0( 21 πφφ == , and 221 == γγ . It shows that the gap
between the upper bounds with phase faded and faded dirty paper channel larger than the
previous cases due to increasing the magnitude of the fading parameter. Lower bound is achieved
by time sharing for values of dBPS 0> while the upper bound is higher. Discussion of lower
bounds as in the first case just the point of achieving this bound by time sharing is changing from
a case to another as we mentioned in section III.B .
Figure 2. Bounds for dirty paper channel.
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017
78
Figure 3. Bounds for dirty paper channel.
5. CONCLUSİONS
The faded dirty paper channels with arbitrary coefficients have been studied. The results in [1]
and [4] have been generalized. We show our bounds by simulations for different cases. We have
studied also the performance of faded dirty paper channel and we have showed how the system
performance changed when the interference is faded.
REFERENCES
[1] P. Grover and A. Sahai,(2007) “What is needed to exploit knowledge of primary transmissions?,”
available at arXiv:cs/0702071.
[2] P.Mitran,N.Devroye and V.Tarokh, (2006) “ On Compound Channels with Side Information at the
Transmitter”, IEEE Trans. on Info. Theory, vol. 52, no. 4, pp. 1745-1755.
[3] A.Khina and U.Erez, (2010)“On the Robustness of Dirty Paper Coding”, IEEE Trans. on Comm.,
vol. 58, no. 5, pp. 1437-1446.
[4] A.Bennatan,V.Aggarwal,Y.Wu,A.R.Calderbank,J.Hoydis ,and A.Chindapol, (2007) “Bounds and
Lattice-Based Transmission Strategies for the Phase-Faded Dirty-Paper Channel”, IEEE Trans.
on Wireless Comm., vol. 8, no. 7, pp. 3620-3627.
[5] U. Erez, S. Shamai and R. Zamir, (2005) “Capacity and Lattice-Strategies for Cancelling Known
Interference,” IEEE Trans. on Inform. Theory, vol. 51, no. 11, pp. 3820-3833.
[6] M.Costa, (1983) “Writing on Dirty Paper”,IEEE Trans. On Information theory,vol 29,no.3,pp 439-
441.
[7] A.Cohen and A.Lapidoth, (2002) “The Gaussian watermarking game”,IEEE Trans. Info. Theory
vol.48, pp.1639-1667.
[8] A.Cohen and A.Lapidoth, (2002) “The Gaussian watermarking game”,IEEE Trans. Info. Theory
vol.48 ,pp.1639-1667
[9] U. Erez, S. Shamai (Shitz), and R. Zamir,(2005) “Capacity and lattice strategies for cancelling known
interference,” IEEE Trans. Information. Theory, vol. 51, pp. 3820–3833.
[10] G.D.Forney, (1988) “Coset Codes-Part I:Introduction and Geometrical Clasifications”, IEEE Trans.
On Information Theory , vol. 34, no. 5, pp. 1123-1151
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017
79
[11] R. Zamir, (2009) "Lattices are Everywhere'', Information Theory and Applications (ITA09),
University of California at San Diego, pp. 392-421.
[12] R.Zamir,S.Shamai and U.Erez, (2002) ”Nested Linear /Lattice codes for structured multidimensional
binning”,IEEE Trans. On Information Theory, vol. 48, no. 6, pp. 1250-1276.
[13] R.Zamir and M.Ferder, (1996) ”On lattice quantization noise “, IEEE Trans. On Information
Theory,vol 42,no.4,pp1152-1159.
[14] U.Erez and S.t,Brink, (2005) “A close-to-capacity Dirty Paper Coding Scheme”, IEEE Trans. on
Information Theory, vol. 51, no. 10, pp. 3417-3432.
[15] M.Mzaaotti and M.Chiani, (2006)“A simple rate ½ co-decoding scheme for Writing on Dirty
Paper”, IEEE International Conference on Communications, Istanbul, pp. 1622-1627.
[16] G.B.Kyung and C. Wang, (2009) “On the Design and Challenges of Practical Binary Dirty Paper
Coding”, on the proceeding of 2009 IEEE Wireless Communications and Networking
Conference, Budapest, pp. 1-6..
[17] J.Chen and M.Fossorier, (2002)“Near optimum Universal Belief propogation Based Decoding of
Low-Density Parity Check Codes”, IEEE Trans. on Communications, vol. 50, no. 3, pp. 406-414.

More Related Content

What's hot

Joint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDMJoint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDMidescitation
 
Thesis : "IBBET : In Band Bandwidth Estimation for LAN"
Thesis : "IBBET : In Band Bandwidth Estimation for LAN"Thesis : "IBBET : In Band Bandwidth Estimation for LAN"
Thesis : "IBBET : In Band Bandwidth Estimation for LAN"Vishalkumarec
 
Singular Value Decomposition: Principles and Applications in Multiple Input M...
Singular Value Decomposition: Principles and Applications in Multiple Input M...Singular Value Decomposition: Principles and Applications in Multiple Input M...
Singular Value Decomposition: Principles and Applications in Multiple Input M...IJCNCJournal
 
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...ijwmn
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channeleSAT Publishing House
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderRSIS International
 
Wondimu mobility increases_capacity
Wondimu mobility increases_capacityWondimu mobility increases_capacity
Wondimu mobility increases_capacityWondimu K. Zegeye
 
Comparative Analysis of Distortive and Non-Distortive Techniques for PAPR Red...
Comparative Analysis of Distortive and Non-Distortive Techniques for PAPR Red...Comparative Analysis of Distortive and Non-Distortive Techniques for PAPR Red...
Comparative Analysis of Distortive and Non-Distortive Techniques for PAPR Red...IDES Editor
 
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...IJECEIAES
 
Matrix Padding Method for Sparse Signal Reconstruction
Matrix Padding Method for Sparse Signal ReconstructionMatrix Padding Method for Sparse Signal Reconstruction
Matrix Padding Method for Sparse Signal ReconstructionCSCJournals
 
A New Approach for Speech Enhancement Based On Eigenvalue Spectral Subtraction
A New Approach for Speech Enhancement Based On Eigenvalue Spectral SubtractionA New Approach for Speech Enhancement Based On Eigenvalue Spectral Subtraction
A New Approach for Speech Enhancement Based On Eigenvalue Spectral SubtractionCSCJournals
 
A Subspace Method for Blind Channel Estimation in CP-free OFDM Systems
A Subspace Method for Blind Channel Estimation in CP-free OFDM SystemsA Subspace Method for Blind Channel Estimation in CP-free OFDM Systems
A Subspace Method for Blind Channel Estimation in CP-free OFDM SystemsCSCJournals
 
Mobile radio chaneel matlab kostov
Mobile radio chaneel matlab kostovMobile radio chaneel matlab kostov
Mobile radio chaneel matlab kostovDwi Putra Asana
 
Simultaneous_VTC_Qian
Simultaneous_VTC_QianSimultaneous_VTC_Qian
Simultaneous_VTC_QianQian Han
 
An improved dft based channel estimation
An improved dft based channel estimationAn improved dft based channel estimation
An improved dft based channel estimationsakru naik
 

What's hot (20)

Joint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDMJoint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDM
 
Performance of cooperative spectrum sensing for different number of cr users ...
Performance of cooperative spectrum sensing for different number of cr users ...Performance of cooperative spectrum sensing for different number of cr users ...
Performance of cooperative spectrum sensing for different number of cr users ...
 
Thesis : "IBBET : In Band Bandwidth Estimation for LAN"
Thesis : "IBBET : In Band Bandwidth Estimation for LAN"Thesis : "IBBET : In Band Bandwidth Estimation for LAN"
Thesis : "IBBET : In Band Bandwidth Estimation for LAN"
 
Singular Value Decomposition: Principles and Applications in Multiple Input M...
Singular Value Decomposition: Principles and Applications in Multiple Input M...Singular Value Decomposition: Principles and Applications in Multiple Input M...
Singular Value Decomposition: Principles and Applications in Multiple Input M...
 
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...
 
wcnc05
wcnc05wcnc05
wcnc05
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channel
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar Decoder
 
Wondimu mobility increases_capacity
Wondimu mobility increases_capacityWondimu mobility increases_capacity
Wondimu mobility increases_capacity
 
Comparative Analysis of Distortive and Non-Distortive Techniques for PAPR Red...
Comparative Analysis of Distortive and Non-Distortive Techniques for PAPR Red...Comparative Analysis of Distortive and Non-Distortive Techniques for PAPR Red...
Comparative Analysis of Distortive and Non-Distortive Techniques for PAPR Red...
 
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
 
Matrix Padding Method for Sparse Signal Reconstruction
Matrix Padding Method for Sparse Signal ReconstructionMatrix Padding Method for Sparse Signal Reconstruction
Matrix Padding Method for Sparse Signal Reconstruction
 
Source coding theorem
Source coding theoremSource coding theorem
Source coding theorem
 
A New Approach for Speech Enhancement Based On Eigenvalue Spectral Subtraction
A New Approach for Speech Enhancement Based On Eigenvalue Spectral SubtractionA New Approach for Speech Enhancement Based On Eigenvalue Spectral Subtraction
A New Approach for Speech Enhancement Based On Eigenvalue Spectral Subtraction
 
A Subspace Method for Blind Channel Estimation in CP-free OFDM Systems
A Subspace Method for Blind Channel Estimation in CP-free OFDM SystemsA Subspace Method for Blind Channel Estimation in CP-free OFDM Systems
A Subspace Method for Blind Channel Estimation in CP-free OFDM Systems
 
Mobile radio chaneel matlab kostov
Mobile radio chaneel matlab kostovMobile radio chaneel matlab kostov
Mobile radio chaneel matlab kostov
 
Paper1
Paper1Paper1
Paper1
 
Simultaneous_VTC_Qian
Simultaneous_VTC_QianSimultaneous_VTC_Qian
Simultaneous_VTC_Qian
 
40120140501016
4012014050101640120140501016
40120140501016
 
An improved dft based channel estimation
An improved dft based channel estimationAn improved dft based channel estimation
An improved dft based channel estimation
 

Viewers also liked

No Mas Violencia
No Mas ViolenciaNo Mas Violencia
No Mas Violenciaajrrul
 
Newsletter 07/2014
Newsletter 07/2014Newsletter 07/2014
Newsletter 07/2014Peace Nguyen
 
Newsletter Tet 2015 version E
Newsletter Tet 2015 version ENewsletter Tet 2015 version E
Newsletter Tet 2015 version EPeace Nguyen
 
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...IJDKP
 
Объединение компьютеров в локальную сеть
Объединение компьютеров в локальную сетьОбъединение компьютеров в локальную сеть
Объединение компьютеров в локальную сетьmaripet012
 
Educacion como personalizacion
Educacion como personalizacionEducacion como personalizacion
Educacion como personalizacionsabinna19
 
Signposts_Overview
Signposts_OverviewSignposts_Overview
Signposts_OverviewLois Barker
 
Capacitacion Md Tiqq
Capacitacion Md TiqqCapacitacion Md Tiqq
Capacitacion Md Tiqqajrrul
 
torneo de caras raras
torneo de caras rarastorneo de caras raras
torneo de caras raraselcanga
 
Herramientas de internet
Herramientas  de internetHerramientas  de internet
Herramientas de internetJhony Dominguez
 
ARP: Anuncio Uso De Teclados (Mouse)
ARP: Anuncio Uso De Teclados (Mouse)ARP: Anuncio Uso De Teclados (Mouse)
ARP: Anuncio Uso De Teclados (Mouse)Unmaya
 
New Branding denison_model_overview
New Branding denison_model_overviewNew Branding denison_model_overview
New Branding denison_model_overviewKaren Jones
 
EchecuadroquevacanoessercosteñO
EchecuadroquevacanoessercosteñOEchecuadroquevacanoessercosteñO
EchecuadroquevacanoessercosteñOUnmaya
 

Viewers also liked (20)

No Mas Violencia
No Mas ViolenciaNo Mas Violencia
No Mas Violencia
 
Bibliografia
BibliografiaBibliografia
Bibliografia
 
Newsletter 07/2014
Newsletter 07/2014Newsletter 07/2014
Newsletter 07/2014
 
Recreación
RecreaciónRecreación
Recreación
 
Newsletter Tet 2015 version E
Newsletter Tet 2015 version ENewsletter Tet 2015 version E
Newsletter Tet 2015 version E
 
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
INTEGRATION OF MACHINE LEARNING TECHNIQUES TO EVALUATE DYNAMIC CUSTOMER SEGME...
 
Sistema de cuentas por pagar
Sistema de  cuentas por pagarSistema de  cuentas por pagar
Sistema de cuentas por pagar
 
Объединение компьютеров в локальную сеть
Объединение компьютеров в локальную сетьОбъединение компьютеров в локальную сеть
Объединение компьютеров в локальную сеть
 
C w gluck_de_profundis
C w gluck_de_profundisC w gluck_de_profundis
C w gluck_de_profundis
 
Educacion como personalizacion
Educacion como personalizacionEducacion como personalizacion
Educacion como personalizacion
 
Signposts_Overview
Signposts_OverviewSignposts_Overview
Signposts_Overview
 
Capacitacion Md Tiqq
Capacitacion Md TiqqCapacitacion Md Tiqq
Capacitacion Md Tiqq
 
torneo de caras raras
torneo de caras rarastorneo de caras raras
torneo de caras raras
 
Grafica de encuestas 21 de mayo administracion
Grafica de encuestas 21 de mayo administracionGrafica de encuestas 21 de mayo administracion
Grafica de encuestas 21 de mayo administracion
 
Herramientas de internet
Herramientas  de internetHerramientas  de internet
Herramientas de internet
 
ARP: Anuncio Uso De Teclados (Mouse)
ARP: Anuncio Uso De Teclados (Mouse)ARP: Anuncio Uso De Teclados (Mouse)
ARP: Anuncio Uso De Teclados (Mouse)
 
New Branding denison_model_overview
New Branding denison_model_overviewNew Branding denison_model_overview
New Branding denison_model_overview
 
EchecuadroquevacanoessercosteñO
EchecuadroquevacanoessercosteñOEchecuadroquevacanoessercosteñO
EchecuadroquevacanoessercosteñO
 
La revolucion rusa
La revolucion rusaLa revolucion rusa
La revolucion rusa
 
Credentials slides
Credentials slidesCredentials slides
Credentials slides
 

Similar to Bounds on the Achievable Rates of Faded Dirty Paper Channel

Turbo Detection in Rayleigh flat fading channel with unknown statistics
Turbo Detection in Rayleigh flat fading channel with unknown statisticsTurbo Detection in Rayleigh flat fading channel with unknown statistics
Turbo Detection in Rayleigh flat fading channel with unknown statisticsijwmn
 
Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...Polytechnique Montreal
 
PhD Summary (isprateno)
PhD Summary (isprateno)PhD Summary (isprateno)
PhD Summary (isprateno)Jovan Stosic
 
Paper id 22201419
Paper id 22201419Paper id 22201419
Paper id 22201419IJRAT
 
Analysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesAnalysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesIOSR Journals
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingIJEEE
 
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...IJNSA Journal
 
14 a blind edit ms word (edit tyas)2
14 a blind edit ms word (edit tyas)214 a blind edit ms word (edit tyas)2
14 a blind edit ms word (edit tyas)2IAESIJEECS
 
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Editor Jacotech
 
Channel and clipping level estimation for ofdm in io t –based networks a review
Channel and clipping level estimation for ofdm in io t –based networks a reviewChannel and clipping level estimation for ofdm in io t –based networks a review
Channel and clipping level estimation for ofdm in io t –based networks a reviewIJARIIT
 
Iterative Soft Decision Based Complex K-best MIMO Decoder
Iterative Soft Decision Based Complex K-best MIMO DecoderIterative Soft Decision Based Complex K-best MIMO Decoder
Iterative Soft Decision Based Complex K-best MIMO DecoderCSCJournals
 
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay SelectionAn Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selectioninventy
 
Multi-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdfMulti-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdfYAAKOVSOLOMON1
 
A new look on performance of small-cell network with design of multiple anten...
A new look on performance of small-cell network with design of multiple anten...A new look on performance of small-cell network with design of multiple anten...
A new look on performance of small-cell network with design of multiple anten...journalBEEI
 
BER Analysis for Downlink MIMO-NOMA Systems over Rayleigh Fading Channels
BER Analysis for Downlink MIMO-NOMA Systems over Rayleigh Fading ChannelsBER Analysis for Downlink MIMO-NOMA Systems over Rayleigh Fading Channels
BER Analysis for Downlink MIMO-NOMA Systems over Rayleigh Fading ChannelsIJCNCJournal
 
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSBER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSIJCNCJournal
 
Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...Pvrtechnologies Nellore
 

Similar to Bounds on the Achievable Rates of Faded Dirty Paper Channel (20)

Turbo Detection in Rayleigh flat fading channel with unknown statistics
Turbo Detection in Rayleigh flat fading channel with unknown statisticsTurbo Detection in Rayleigh flat fading channel with unknown statistics
Turbo Detection in Rayleigh flat fading channel with unknown statistics
 
Hg3413361339
Hg3413361339Hg3413361339
Hg3413361339
 
Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...
 
PhD Summary (isprateno)
PhD Summary (isprateno)PhD Summary (isprateno)
PhD Summary (isprateno)
 
Paper id 22201419
Paper id 22201419Paper id 22201419
Paper id 22201419
 
Analysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesAnalysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation Techniques
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper Coding
 
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
 
14 a blind edit ms word (edit tyas)2
14 a blind edit ms word (edit tyas)214 a blind edit ms word (edit tyas)2
14 a blind edit ms word (edit tyas)2
 
9517cnc05
9517cnc059517cnc05
9517cnc05
 
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
 
Channel and clipping level estimation for ofdm in io t –based networks a review
Channel and clipping level estimation for ofdm in io t –based networks a reviewChannel and clipping level estimation for ofdm in io t –based networks a review
Channel and clipping level estimation for ofdm in io t –based networks a review
 
Iterative Soft Decision Based Complex K-best MIMO Decoder
Iterative Soft Decision Based Complex K-best MIMO DecoderIterative Soft Decision Based Complex K-best MIMO Decoder
Iterative Soft Decision Based Complex K-best MIMO Decoder
 
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay SelectionAn Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
 
Multi-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdfMulti-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdf
 
A new look on performance of small-cell network with design of multiple anten...
A new look on performance of small-cell network with design of multiple anten...A new look on performance of small-cell network with design of multiple anten...
A new look on performance of small-cell network with design of multiple anten...
 
BER Analysis for Downlink MIMO-NOMA Systems over Rayleigh Fading Channels
BER Analysis for Downlink MIMO-NOMA Systems over Rayleigh Fading ChannelsBER Analysis for Downlink MIMO-NOMA Systems over Rayleigh Fading Channels
BER Analysis for Downlink MIMO-NOMA Systems over Rayleigh Fading Channels
 
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSBER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
 
Dq24746750
Dq24746750Dq24746750
Dq24746750
 
Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...
 

More from IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 

More from IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

Bounds on the Achievable Rates of Faded Dirty Paper Channel

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017 DOI: 10.5121/ijcnc.2017.9108 71 Bounds on the Achievable Rates of Faded Dirty Paper Channel Zouhair Al-qudah1 , Wael Abu Shehab2 1 Department of Communication Engineering, Al-Hussein Bin Talal University, Ma’an, Jordan 2 Department of Electrical Engineering, Al-Hussein Bin Talal University, Ma’an, Jordan ABSTRACT Bounds on the achievable rate of a Gaussian channel in the case that the transmitter knows the interference signal but not its fading coefficients are given. We generalize the analysis which were studied in [1] and [4] so that their results are special cases of our analysis. We enforce our bounds by simulations in which many numerical examples are drawn and investigated under different cases. KEYWORDS Dirty paper coding, lattice encoding and decoding, fading channel, Viterbi Algorithm. 1. INTRODUCTION Dirty paper coding (DPC) is a communication model deals with Gaussian noise non-causally known at the transmitter. In this communication model, an encoding technique is used with such a noise such that its effects can be cancelled completely as Costa showed in his valued paper. The received signal, Y , is decribed as ZSXY ++= (1) where is the transmitted signal and its average power is constrained by XPXE ≤][ 2 . Further, is the interference non-causally known signal at the transmitter and with power constrained by SPSE ≤][ 2 . In addition, is the additive white Gaussian noise vector (AWGN), with average power ZP . DPC has a wide variety of applications includes MIMO broadcast channel where a perfect knowledge of the interference is available, information hiding and digital watermarking. In [6], Costa showed that the capacity for this channel doesn’t change when the interference is non-causally known at the transmitter, and later in [9], they generalize this result for an arbitrary interference distribution if the noise is Gaussian that is,
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017 72       += Z X P P C 1log 2 1 2 (2) In [1], the authors studied the channel model in the case that a lack of interference phase knowledge at the transmitter, that is where is quasi static and random. In [theorem (1),[1]], the authors derived an upper bound of the capacity when the phase takes one of the two values . That is the transmitter does not know the interference in perfect, instead, it has to select between two points. In [7], they showed that in such a situation, the system is equivalent to a transmitter wants to send a message simultaneously to two receivers where each channel add a different interference. Also, the authors in [1] derived an upper bound on the outage capacity (corollary 1) when the interferer signal has constant magnitude fading. In [4], the autors followed [1] and studied the compound channel formulation instead of outage probabilities. In particular, they derived lower and upper bounds on the achievable bounds when the interference phase is unknown at the transmitter. Their derivation based on an adaption of the nested lattice approach that is described in [5] for the classic non fading channel and in [3] for the case of magnitude fading. In [2], the authors generalized Costa’s formulation, by multiplying and by random fading coefficients and , respectively, in which the realizations are known only to the receiver. In addition, they modelled the coefficients as quasi static and assumed that these coefficients are real valued Rician random variables. (The power inflation factor becomes zero when the fading coefficients have zero mean, so, they consider the Rician fading channel). They studied the achievable outage probabilities when the interference signal is known to the transmitter but not the fading coefficients. In [3], the authors considered a similar formulation where was constant and was real valued and random. That is where . Further, a lower bound is given when the power inflation factor is deterministic and an upper bound is given when the power inflation factor at the transmitter is random under the following conditions , , that is noise free channel, their analysis based on lattice based coding scheme. In their work, they showed that proactively injecting randomness into the transmission strategy can produce substantial benefits. In this paper, we generalize the results of [1,3,4] where we assume that the transmitter has lack of magnitude and phase knowledge. We refer to such a situation as the faded dirty paper channel(F- DPC). In this case, the received signal can be modelled as follows ZhSXY ++= (3) where h is a random quasi static fading parameter, and it is given by φ γ j eh = . The channel has to support different transmission rates depending on how the fading parameter h varies, where h can vary in magnitude or phase or both. We extend the lower bound derived in [4] and generalize the upper bound that were firstly proposed in [1] for a predetermined values of φ and then generalized to an arbitrary value of φ in [4].
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017 73 The rest of this paper is organized as follows, we review the principles of lattice dirty paper coding in Section 2. Lower bounds and upper bounds are presented in Section 3. Bounds are simulated and discussed in Section 4. Finally, we conclude our paper in Section 5. 2. LATTICE DIRTY PAPER CODING: DEFINITIONS AND PRELIMINARIES Lattices are firstly used in [5] to achieve the capacity of dirty paper channel. Let Λ be a k- dimensional lattice with fundamental Voronoi region υ with average second moment XPP =Λ)( and normalized second moment k V P G 1 )( )( Λ =Λ where )(υVolV = , then the lattice transmission procedure is as follows, [5,8]. At first, the sender generates the signal Λ−−= mod][ dScX α where the input alphabet X is restricted to υ . Further, the Λmod is defined as )(mod uQuu Λ−=Λ where )(uQΛ is the lattice vector that is nearest to u inters of the Euclidean distance. At the receiver, the destination computes Λ+= mod][' dYY α such that the received signal is reduced to Λ+= mod][ '' ZcY where the total noise at the destination is described by Λ+−= mod])1[(' ZdZ αα . 3. BOUNDS OF FADED DIRTY PAPER CHANNEL In this section, a lower bound and an upper bound on the achievable rates are derived when the transmitter knows the interference non-causally but not the fading coefficients, that is the channel adds faded interference. 3.1. Lower Bound We follow [4] in which the signal has a block of n bits long. Then, each block is divided into k blocks where every block contains kn bits. A k dimensional lattice is used to construct the transmitted signal at each time block, the lattice is defined over complex number field. The encoding and decoding procedures are as follows. In this procedure, by using modulo lattice channel encoding scheme, the phase faded AWGN noise channel is converted such that it contains only the transmitted codeword and the total noise over this channel. In this case, the transmitted signal is given by Λ−−= mod][ iiiii dscx α (4) for knii ,,1, L= . In addition, ic , is and id are the symbols of codeword covers the intended signal, interference signal and the dither signal at time i , respectively. The minimization factor α can be selected randomly as in [4] or to be selected as )( ZXX PPP +=α [3,5,8]. This is because the encoder does not have knowledge of the realizations h and φ . The destination
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017 74 computes Λ+= mod][' iiii dyy β where iβ is the noise minimization factor computed at the receiver and differs than iα and it will be determined later. Here, ' iy is evaluated as follows: Λ+= mod][' iiii dyy β Λ+++= mod][ iii j iii dzex βγββ φ Λ−+++−−+= mod][ iiii j iiiiii sdzedxcx αβγββ φ Λ+−+−−= mod])()1([ iii j iiii zsexc βαγββ φ (5) In (5), the received signal contains i) the transmitted codeword ic at time i , and ii) the total noise iii j iiii zsexz βαγββ φ +−+−−= )()1( . This total noise is independent of ic . In addition, the components ix , is , and iz are assumed to be independent of ic due to the dither signal. So, for a given values of γα, and φ , the variance of the total noise is given by      +−+−= ZS j iXiZ PPePP 222' 1 βαγββ φ (6) where iβ is selected to minimize the variance of the effective noise. Then, ' ZP is minimized by selecting iβ as ZSX S j X i PPP PeP ++ + = − 2 γ γα β φ (7) We denote ),,,(' φγβαZP the value of ' ZP in (6) computed at the value of iβ from (7). The lower bound on the capacity for such a construction is given in [4] for phase faded dirty paper and we extend to faded dirty paper channel. This lower bound is given by                 Λ−      = + ))((log ),,,( log),,,( 2'2 eG P P ER Z X LB π φγβα φγβα α (8) Where α is selected randomly with distribution known to the encoder and for any real value x , where [ ] ),0max( xx = + . A similar formulae was given in [3] for magnitude faded interference when the value of α is constant and equal to )( ZXX PPP + . A lower bound ( )eG π1)( ≥Λ was shown in [12,13] . This means that the second term in (11) is almost negative and its maximum value is zero. Remarks (1):
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017 75 1. We note that the formulae in (10) can be reduced to that given in [4] in the case of 1=γ for phase faded. In addition, the formulae in (10) can be reduced to that given in [3] for magnitude fading and 0=φ or to the case that the channel adds a perfect interference without fading, that is βα = . 2. In the case of strong interference, the minimization factor is selected to cancel the interference effects, that is φ γαβ j e− = )( , and so the effective noise is reduced to ( )ZXiZ PPP 22' 1 ββ +−= . 3.2. Upper Bounds We now analyze the achievable upper bound over faded dirty paper channel. Our bound is valid for arbitrary h , where φ γ j eh − = can vary in magnitude and phase. Further, we generalize theorem (1,[4]) which was given for phase faded dirty paper channel. Our bound is given in the following lemma Lemma1: The capacity of the compound faded dirty paper channel is upper bounded by        ≤              +− >      + = υγγφφ υ γγφφ S Z X ZSX S Z X UB P P P PPPJ P P P R 1log 2 1 ),,,,,,(min 1log 2 1 ),,,( 22112 2 2121 (9) where ( )( )               −−+               − ++ + + =− 1221 2 2 2 1 2 12 2 2 2 1 22112 cos2 2 cos2 2 log 2 1 ),,,,,( φφγγγγ φφγγ γγφφ SZ SXZSX ZSX PP PPPPP PPPJ This bound is defined over arbitrary fading parameters iγ and iφ . In addition, this bound is achieved by time sharing for the values of interference power such as υ>SP , where υ is a parameter determined so that the bound is not an ascending function of SP . Also, the upper bound can’t be larger than the AWGN channel capacity. The proof of this lemma is a direct generalization of ( Theorem1, [4] ) and is omitted. Remarks (2): 1. In the case that 121 == γγ , then, the formula in [4], which was derived for phase faded dirty paper channel, is obtained.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017 76 2. In the case that 121 == γγ , and o 18012 =−φφ , then, we obtain Eq(8) in [1]. 4. SIMULATIONS AND DISCUSSIONS We start our discussion by comparing the upper bound and lower bound for faded (magnitude, phase, or combined) dirty paper channel. The following values dBPX 12= and dBPZ 0= are used. In addition, the bounds are plotted as a function of .SP Figure.1 compares among magnitude, phase and combined of both for a choice of ( )πφφ == 21 ,0 and 2.121 == γγ . It shows that for values of dBPS 9≤ , the achievable rate of the phase faded performs better than faded (magnitude and phase). For values of dBPS 9> , both bounds are achieved by time sharing, that is the channel capacity is achieved by time sharing . We note also that the upper and lower bounds for magnitude fading coincide (for range under consideration) and achieved by the time sharing. For lower bound with constant α , it was found to be calculated as 0 ^ φ α j e [4], where ^ α is determined by exhaustive search over a fine grid. Further, 0φ is set to the mean of 1φ and 2φ . In addition γ is set to the mean of 1γ and 2γ . For the lower bound with variable α , 0φ has a distribution that is independent ofφ . In addition, this figure shows that for low values of SP , lower bound with constant α doing better than variable α . These bounds coincide when SP increases and finally they reach their final values where the lower bound is achieved by time sharing. Figure 1. Bounds for dirty paper channel.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017 77 In an another example, Figure.2 shows the same bounds when the magnitude fading parameters are changed to 2.11 =γ and 22 =γ . It shows that the gap between the upper bounds for phase faded and faded interference is larger than the previous case due magnitude fading parameter. It shows also that the gap between the lower and upper bounds is slightly less than the previous case. Lower bound with variableα is better than with constant α . Again for values of dBPS 9> , the bounds can coincide and the channel capacity is achieved by time sharing. Again for only magnitude fading, the bounds coincide and are achieved by time sharing and so the channel capacity. Figure.3 shows the same bounds for ) 3 2 ,0( 21 πφφ == , and 221 == γγ . It shows that the gap between the upper bounds with phase faded and faded dirty paper channel larger than the previous cases due to increasing the magnitude of the fading parameter. Lower bound is achieved by time sharing for values of dBPS 0> while the upper bound is higher. Discussion of lower bounds as in the first case just the point of achieving this bound by time sharing is changing from a case to another as we mentioned in section III.B . Figure 2. Bounds for dirty paper channel.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017 78 Figure 3. Bounds for dirty paper channel. 5. CONCLUSİONS The faded dirty paper channels with arbitrary coefficients have been studied. The results in [1] and [4] have been generalized. We show our bounds by simulations for different cases. We have studied also the performance of faded dirty paper channel and we have showed how the system performance changed when the interference is faded. REFERENCES [1] P. Grover and A. Sahai,(2007) “What is needed to exploit knowledge of primary transmissions?,” available at arXiv:cs/0702071. [2] P.Mitran,N.Devroye and V.Tarokh, (2006) “ On Compound Channels with Side Information at the Transmitter”, IEEE Trans. on Info. Theory, vol. 52, no. 4, pp. 1745-1755. [3] A.Khina and U.Erez, (2010)“On the Robustness of Dirty Paper Coding”, IEEE Trans. on Comm., vol. 58, no. 5, pp. 1437-1446. [4] A.Bennatan,V.Aggarwal,Y.Wu,A.R.Calderbank,J.Hoydis ,and A.Chindapol, (2007) “Bounds and Lattice-Based Transmission Strategies for the Phase-Faded Dirty-Paper Channel”, IEEE Trans. on Wireless Comm., vol. 8, no. 7, pp. 3620-3627. [5] U. Erez, S. Shamai and R. Zamir, (2005) “Capacity and Lattice-Strategies for Cancelling Known Interference,” IEEE Trans. on Inform. Theory, vol. 51, no. 11, pp. 3820-3833. [6] M.Costa, (1983) “Writing on Dirty Paper”,IEEE Trans. On Information theory,vol 29,no.3,pp 439- 441. [7] A.Cohen and A.Lapidoth, (2002) “The Gaussian watermarking game”,IEEE Trans. Info. Theory vol.48, pp.1639-1667. [8] A.Cohen and A.Lapidoth, (2002) “The Gaussian watermarking game”,IEEE Trans. Info. Theory vol.48 ,pp.1639-1667 [9] U. Erez, S. Shamai (Shitz), and R. Zamir,(2005) “Capacity and lattice strategies for cancelling known interference,” IEEE Trans. Information. Theory, vol. 51, pp. 3820–3833. [10] G.D.Forney, (1988) “Coset Codes-Part I:Introduction and Geometrical Clasifications”, IEEE Trans. On Information Theory , vol. 34, no. 5, pp. 1123-1151
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.1, January 2017 79 [11] R. Zamir, (2009) "Lattices are Everywhere'', Information Theory and Applications (ITA09), University of California at San Diego, pp. 392-421. [12] R.Zamir,S.Shamai and U.Erez, (2002) ”Nested Linear /Lattice codes for structured multidimensional binning”,IEEE Trans. On Information Theory, vol. 48, no. 6, pp. 1250-1276. [13] R.Zamir and M.Ferder, (1996) ”On lattice quantization noise “, IEEE Trans. On Information Theory,vol 42,no.4,pp1152-1159. [14] U.Erez and S.t,Brink, (2005) “A close-to-capacity Dirty Paper Coding Scheme”, IEEE Trans. on Information Theory, vol. 51, no. 10, pp. 3417-3432. [15] M.Mzaaotti and M.Chiani, (2006)“A simple rate ½ co-decoding scheme for Writing on Dirty Paper”, IEEE International Conference on Communications, Istanbul, pp. 1622-1627. [16] G.B.Kyung and C. Wang, (2009) “On the Design and Challenges of Practical Binary Dirty Paper Coding”, on the proceeding of 2009 IEEE Wireless Communications and Networking Conference, Budapest, pp. 1-6.. [17] J.Chen and M.Fossorier, (2002)“Near optimum Universal Belief propogation Based Decoding of Low-Density Parity Check Codes”, IEEE Trans. on Communications, vol. 50, no. 3, pp. 406-414.