1. The document presents a technique called "rotated and scaled Alamouti coding" that improves upon ordinary repetition-based retransmission for 2x2 MIMO systems.
2. It introduces the concept of "scaled repetition" which maps symbols differently during retransmission compared to ordinary repetition, improving performance. For 4-PAM modulation, scaled repetition maps symbols by scaling them and compensating to remain within the symbol set.
3. Simulation results show that the maximum transmission rate achieved with scaled repetition is only slightly smaller than the channel capacity, whereas ordinary repetition performs significantly worse when SNR is not low. The rotated and scaled Alamouti code can be decoded with reasonable complexity unlike codes like the Golden code.
This document reports on a cryptanalysis project to analyze the RSA cryptosystem used in smartcards. It begins by introducing RSA and describing its key generation, encryption, and decryption processes. It then discusses three attacks that could be used against the smartcard RSA system: Fermat factorization, Wiener's continued fraction method, and the quadratic sieve algorithm. The document outlines the implementation details of these attacks and provides analysis of test cases. It concludes that the main goal is to find the secret key corresponding to a given 1024-bit public key and ciphertext.
This document discusses several topics related to Fourier transforms including:
1) Representing polynomials in value representation by evaluating them at roots of unity allows for faster multiplication using the Discrete Fourier Transform (DFT).
2) The DFT reduces the complexity of the Discrete Fourier Transform (DFT) from O(n2) to O(n log n) by formulating it recursively.
3) Converting images from the spatial to frequency domain using techniques like the Discrete Cosine Transform (DCT) allows for image compression by retaining only low frequency components with large coefficients.
This document proposes a concatenated coding scheme with iterative decoding for a bit-shift channel. Specifically, it considers the serial concatenation of an outer error-correcting code and an inner modulation code, possibly preceded by an accumulator. It searches for optimal encoder mappings from an iterative decoding perspective for the inner code, which has been designed to correct single bit-shift errors and have large average power. This is important for inductively coupled channels, as the receiver gets its power from the received signal and the information should maximize the power transferred.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The document summarizes digital modulation and detection theory. It discusses the error probability analysis for various memoryless modulation schemes including PAM, PSK, and QAM. Key points covered include:
1) The symbol error probability expressions for M-ary PAM and PSK based on the minimum distance between signal points and the Q-function.
2) The distribution of the phase of the received signal for PSK modulation and how this relates to the error probability.
3) How QAM signal constellations are represented and the dominance of error probability by the minimum distance between signal points.
4) Expressions for the symbol error probability of rectangular QAM schemes with even
This document presents a new DFT-based approach for detecting and correcting gain mismatch in time-interleaved ADCs. It introduces the gain mismatch problem in TI-ADCs and how it reduces the spurious free dynamic range. The proposed method uses the discrete Fourier transform to detect the gain mismatch between ADC sub-channels based on the difference between the ideal DFT and actual DFT. It then introduces a feedback system using this difference signal to iteratively correct the gain mismatch. Simulation results show the approach improves SFDR by more than 30dB by correcting a ±2% gain mismatch in a two-channel TI-ADC.
Error control codes are necessary for transmission and storage of large volumes of date sensitive to errors. BCH codes and Reed Solomon codes are the most important class of multiple error correcting codes for binary and non-binary channels respectively. Peterson and later Berlekamp and Massey discovered powerful algorithms which became viable with the help of new digital technology. Use of Galois fields gave a structured approach to designing of these codes. This presentation deals with above in a very structured and systematic manner.
This document discusses various topics related to sphere packings, lattices, spherical codes, and energy minimization on the sphere. It defines sphere packings, lattices, and spherical codes. It describes problems like finding the densest sphere packing in each dimension, determining optimal spherical codes, and minimizing potential energy on the sphere. Linear programming bounds are introduced as a technique for proving optimality of codes. Properties of positive definite kernels and Gegenbauer polynomials are also summarized.
This document reports on a cryptanalysis project to analyze the RSA cryptosystem used in smartcards. It begins by introducing RSA and describing its key generation, encryption, and decryption processes. It then discusses three attacks that could be used against the smartcard RSA system: Fermat factorization, Wiener's continued fraction method, and the quadratic sieve algorithm. The document outlines the implementation details of these attacks and provides analysis of test cases. It concludes that the main goal is to find the secret key corresponding to a given 1024-bit public key and ciphertext.
This document discusses several topics related to Fourier transforms including:
1) Representing polynomials in value representation by evaluating them at roots of unity allows for faster multiplication using the Discrete Fourier Transform (DFT).
2) The DFT reduces the complexity of the Discrete Fourier Transform (DFT) from O(n2) to O(n log n) by formulating it recursively.
3) Converting images from the spatial to frequency domain using techniques like the Discrete Cosine Transform (DCT) allows for image compression by retaining only low frequency components with large coefficients.
This document proposes a concatenated coding scheme with iterative decoding for a bit-shift channel. Specifically, it considers the serial concatenation of an outer error-correcting code and an inner modulation code, possibly preceded by an accumulator. It searches for optimal encoder mappings from an iterative decoding perspective for the inner code, which has been designed to correct single bit-shift errors and have large average power. This is important for inductively coupled channels, as the receiver gets its power from the received signal and the information should maximize the power transferred.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The document summarizes digital modulation and detection theory. It discusses the error probability analysis for various memoryless modulation schemes including PAM, PSK, and QAM. Key points covered include:
1) The symbol error probability expressions for M-ary PAM and PSK based on the minimum distance between signal points and the Q-function.
2) The distribution of the phase of the received signal for PSK modulation and how this relates to the error probability.
3) How QAM signal constellations are represented and the dominance of error probability by the minimum distance between signal points.
4) Expressions for the symbol error probability of rectangular QAM schemes with even
This document presents a new DFT-based approach for detecting and correcting gain mismatch in time-interleaved ADCs. It introduces the gain mismatch problem in TI-ADCs and how it reduces the spurious free dynamic range. The proposed method uses the discrete Fourier transform to detect the gain mismatch between ADC sub-channels based on the difference between the ideal DFT and actual DFT. It then introduces a feedback system using this difference signal to iteratively correct the gain mismatch. Simulation results show the approach improves SFDR by more than 30dB by correcting a ±2% gain mismatch in a two-channel TI-ADC.
Error control codes are necessary for transmission and storage of large volumes of date sensitive to errors. BCH codes and Reed Solomon codes are the most important class of multiple error correcting codes for binary and non-binary channels respectively. Peterson and later Berlekamp and Massey discovered powerful algorithms which became viable with the help of new digital technology. Use of Galois fields gave a structured approach to designing of these codes. This presentation deals with above in a very structured and systematic manner.
This document discusses various topics related to sphere packings, lattices, spherical codes, and energy minimization on the sphere. It defines sphere packings, lattices, and spherical codes. It describes problems like finding the densest sphere packing in each dimension, determining optimal spherical codes, and minimizing potential energy on the sphere. Linear programming bounds are introduced as a technique for proving optimality of codes. Properties of positive definite kernels and Gegenbauer polynomials are also summarized.
The document describes structured aspect extraction (SAE), a technique for extracting hierarchical aspects from unstructured text. SAE involves several steps: normalizing text, identifying noun phrases (NPs), clustering NPs to identify aspect terms, segmenting NPs to identify modifiers and multi-word expressions, and generalizing patterns while maintaining types. Scoring is used to evaluate patterns without labeled data by using cluster heads as surrogate labels and measuring discrimination between correct and incorrect extractions. The technique is unsupervised and aims to handle complex, hierarchical aspects in noisy text.
The document describes a method called WADaR for repairing wrappers and the structured data they extract from web pages. WADaR first analyzes the extracted data to identify errors made by the wrapper, such as incorrectly segmented or misplaced values. It then uses techniques like sequence labeling and max-flow algorithms on a constructed network to identify the underlying correct structure of the data. Regular expressions are induced from the correctly structured data and used to repair both the extracted relations and the original wrappers. An evaluation on real-world datasets found the approach improved precision, recall, and F1-score of several existing wrapper generation systems by up to 30% across different domains.
TD-SCDMA uses equivalent baseband signaling to represent real-valued bandpass signals as complex-valued lowpass signals, simplifying calculations. Uplink channel estimation in TD-SCDMA uses a midamble sequence and maximum likelihood estimation. A circulant matrix representation allows the channel estimation problem to be solved efficiently using fast Fourier transforms.
This document discusses Fermat's and Euler's theorems regarding prime numbers and their applications in cryptography. It begins by defining prime numbers, prime factorization, and greatest common divisors. It then explains Fermat's theorem that any integer to the power of a prime number minus one is congruent to one modulo that prime number. Next, it defines Euler's totient function and proves Euler's theorem, which generalizes Fermat's theorem. It concludes by providing an example of how these theorems can be applied to encrypt and decrypt messages in a public-key cryptography system.
This document provides an overview of number theory and its applications to asymmetric key cryptography. It begins with definitions of prime numbers, relatively prime numbers, and modular arithmetic. It then covers the Euclidean algorithm for finding the greatest common divisor of two numbers, Fermat's and Euler's theorems, and the Chinese Remainder Theorem. The document concludes with an introduction to public key cryptography, including the basic principles, requirements, and the RSA algorithm as a widely used example of an asymmetric encryption scheme.
This document introduces channel models and channel capacity. It defines a binary symmetric channel (BSC) as a channel with input and output sets of {0,1} and a crossover probability p that an input bit is flipped. A discrete memoryless channel is characterized by a conditional probability matrix relating discrete inputs to outputs. Channel types include single-input single-output, single-input multiple-output, multiple-input single-output, and multiple-input multiple-output. Channel capacity is the maximum mutual information between input and output, achieved by optimizing the input distribution. Capacity examples include relay channels and multiple access channels. The BSC capacity is 1-H(p) where H(p) is the entropy function
This document discusses finding the maximum and minimum values of functions. It introduces the Extreme Value Theorem, which states that if a function is continuous on a closed interval, then it attains both a maximum and minimum value on that interval. It also discusses Fermat's Theorem, which relates local extrema of a differentiable function to its derivative. Examples are provided to illustrate these concepts.
We define what it means for a function to have a maximum or minimum value, and explain the Extreme Value Theorem, which indicates these maxima and minima must be there under certain conditions.
Fermat's Theorem says that at differentiable extreme points, the derivative should be zero, and thus we arrive at a technique for finding extrema: look among the endpoints of the domain of definition and the critical points of the function.
There's also a little digression on Fermat's Last theorem, which is not related to calculus but is a big deal in recent mathematical history.
The document contains 7 questions related to probability and statistics. Question 1 asks about computing a 95% confidence interval for a population mean and reducing the error in estimating the population mean. Question 2 asks about the number of amplifiers needed to achieve 95% reliability for a concert lasting 2 hours. Question 3 asks about the probability of a system meeting certain tolerance limits on diameters and the probability of none among randomly selected systems violating tolerances.
- The document discusses asymptotic analysis and Big-O, Big-Omega, and Big-Theta notation for analyzing the runtime complexity of algorithms.
- It provides examples of using these notations to classify functions as upper or lower bounds of other functions, and explains how to determine if a function is O(g(n)), Ω(g(n)), or Θ(g(n)).
- It also introduces little-o and little-omega notations for strict asymptotic bounds, and discusses properties and caveats of asymptotic analysis.
This document introduces Reed-Solomon codes. It describes Reed-Solomon codes as word-oriented, non-binary BCH codes that are simple, robust, and perform well for burst errors. It explains that a Reed-Solomon code block length is N=2m-1, with a capacity to correct t errors using 2t parity check words. The document outlines the generator polynomial, encoding, decoding procedures including syndrome calculation, Berlekamp-Massey algorithm, Chien search, and Forney algorithm. It concludes with potential future tasks related to Reed-Solomon codes.
This document summarizes adaptive delta modulation, a method for digitally encoding analog signals for efficient transmission or storage. It works by approximating the signal as a step function that is adjusted up or down at each time step by a fixed amount ("delta") based on whether the real signal value is above or below the current step value. The document describes how the delta and time step can be adapted based on the signal's characteristics to improve the approximation. Pseudocode is provided for encoding and decoding adaptive delta modulation signals.
From L to N: Nonlinear Predictors in Generalized Modelshtstatistics
1) Generalized nonlinear models (GNM) extend generalized linear models (GLM) by allowing the predictor to be a nonlinear function of the parameters. This allows for more parsimonious and interpretable models.
2) Estimating GNMs can be challenging due to difficulties generating starting values and the potential for multiple optima in the likelihood. The gnm package in R uses random starting values and a one-parameter-at-a-time Newton method.
3) The stereotype model is a special case of the multinomial logistic model that is suitable for ordered categorical data where only the scale of the relationship with covariates varies between categories. It can be fit as a GNM using a "Po
This document is the final exam for ENGR 371 - Probability and Statistics given on April 29, 2010 at Concordia University. It contains 6 questions testing concepts like probability, confidence intervals, hypothesis testing, and distributions. Formulas relevant to the exam questions are also provided.
This document describes the POTFIT algorithm for approximating multi-dimensional arrays as products of lower-dimensional matrices. It uses POTFIT to approximate a photo (represented as a 3D tensor of pixel color values) using single particle potentials. Approximating a dark photo requires fewer SPPs than a colorful photo, as errors are more obvious in colorful areas. The document shows approximations using different numbers of SPPs and the resulting file sizes.
Multiplicative Interaction Models in Rhtstatistics
The document discusses multiplicative interaction models and the gnm R package for fitting these models. The gnm package allows fitting of generalized nonlinear models, including models with standard multiplicative interactions. It uses an over-parameterized representation and a two-stage procedure involving a one-parameter-at-a-time Newton method and full Newton-Raphson to estimate model parameters. The document provides an example analysis fitting a homogeneous row-column association model to occupational status data.
The document discusses multiobjective optimization and evolutionary algorithms. It defines multiobjective optimization problems as having multiple objective functions to minimize subject to constraints. Pareto optimal solutions are those that are not dominated by any other solutions in terms of all objectives. Evolutionary algorithms are used to approximate the Pareto front and find Pareto optimal solutions. Non-dominated sorting and crowding distance are used to select the next population in NSGA-II. The hypervolume indicator measures the size of the space covered by the Pareto front approximations.
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...IDES Editor
Orthogonal Frequency Division Multiplexing
(OFDM) systems are very sensitive to carrier frequency offset
(CFO), caused by either frequency differences between
transmitter and receiver local oscillators or by frequency
selective channels. The CFO disturbs the orthogonality among
subcarriers of OFDM system and results intercarrier
interference (ICI), which degrades the bit error rate (BER)
performance of the system. This paper presents a new blind
CFO estimation scheme for single-input single-output (SISO)
OFDM systems. The presented scheme is based on the
assumption that the channel frequency response changes
slowly in frequency domain. In this scheme an excellent tradeoff
between complexity and performance, as compared to
existing estimation schemes, is obtained. The improved
performance of the present scheme is confirmed through
extensive simulations.
gnm: a Package for Generalized Nonlinear Modelshtstatistics
The gnm package provides functions for fitting generalized nonlinear models in R. It allows specification of models with multiplicative and other nonlinear terms. Models are fitted using maximum likelihood, with standard arguments that make gnm behave similarly to glm. The package handles over-parameterized representations of models and provides tools for estimating identifiable parameter combinations. An example analysis fits row-column association and homogeneous association models to occupational mobility data.
1) The document describes an experiment on amplitude modulation where different signals are generated and plotted in the time and frequency domains.
2) Signals like the message signal, carrier signal, modulated signal, and integrated message signal are generated and their representations are shown.
3) The experiment compares amplitude modulation (AM) and frequency modulation (FM) by generating AM and FM signals and observing the differences between their time domain and frequency domain representations.
Space time coding is used in MIMO wireless systems to improve communication performance by exploiting spatial diversity. It uses multiple transmit and receive antennas. The Alamouti code is a simple and effective space time block code that achieves full transmit diversity without requiring channel state information at the transmitter. It transmits symbols from two transmit antennas in two time slots so that the receiver can recover the symbols with low complexity decoding. MIMO combined with space time coding can provide high data rates, minimize errors, and increase capacity for wireless applications such as 4G networks.
Comparison and analysis of combining techniques for spatial multiplexing spac...IAEME Publication
This document compares different combining techniques for space-time block coded systems in Rayleigh fading channels. It finds that maximum ratio combining outperforms other techniques like equal gain combining and selection combining for any space-time block code configuration, providing the best bit error rate. The document provides background on space-time block codes, describes the Alamouti space-time code, and discusses various receive diversity combining techniques.
The document describes structured aspect extraction (SAE), a technique for extracting hierarchical aspects from unstructured text. SAE involves several steps: normalizing text, identifying noun phrases (NPs), clustering NPs to identify aspect terms, segmenting NPs to identify modifiers and multi-word expressions, and generalizing patterns while maintaining types. Scoring is used to evaluate patterns without labeled data by using cluster heads as surrogate labels and measuring discrimination between correct and incorrect extractions. The technique is unsupervised and aims to handle complex, hierarchical aspects in noisy text.
The document describes a method called WADaR for repairing wrappers and the structured data they extract from web pages. WADaR first analyzes the extracted data to identify errors made by the wrapper, such as incorrectly segmented or misplaced values. It then uses techniques like sequence labeling and max-flow algorithms on a constructed network to identify the underlying correct structure of the data. Regular expressions are induced from the correctly structured data and used to repair both the extracted relations and the original wrappers. An evaluation on real-world datasets found the approach improved precision, recall, and F1-score of several existing wrapper generation systems by up to 30% across different domains.
TD-SCDMA uses equivalent baseband signaling to represent real-valued bandpass signals as complex-valued lowpass signals, simplifying calculations. Uplink channel estimation in TD-SCDMA uses a midamble sequence and maximum likelihood estimation. A circulant matrix representation allows the channel estimation problem to be solved efficiently using fast Fourier transforms.
This document discusses Fermat's and Euler's theorems regarding prime numbers and their applications in cryptography. It begins by defining prime numbers, prime factorization, and greatest common divisors. It then explains Fermat's theorem that any integer to the power of a prime number minus one is congruent to one modulo that prime number. Next, it defines Euler's totient function and proves Euler's theorem, which generalizes Fermat's theorem. It concludes by providing an example of how these theorems can be applied to encrypt and decrypt messages in a public-key cryptography system.
This document provides an overview of number theory and its applications to asymmetric key cryptography. It begins with definitions of prime numbers, relatively prime numbers, and modular arithmetic. It then covers the Euclidean algorithm for finding the greatest common divisor of two numbers, Fermat's and Euler's theorems, and the Chinese Remainder Theorem. The document concludes with an introduction to public key cryptography, including the basic principles, requirements, and the RSA algorithm as a widely used example of an asymmetric encryption scheme.
This document introduces channel models and channel capacity. It defines a binary symmetric channel (BSC) as a channel with input and output sets of {0,1} and a crossover probability p that an input bit is flipped. A discrete memoryless channel is characterized by a conditional probability matrix relating discrete inputs to outputs. Channel types include single-input single-output, single-input multiple-output, multiple-input single-output, and multiple-input multiple-output. Channel capacity is the maximum mutual information between input and output, achieved by optimizing the input distribution. Capacity examples include relay channels and multiple access channels. The BSC capacity is 1-H(p) where H(p) is the entropy function
This document discusses finding the maximum and minimum values of functions. It introduces the Extreme Value Theorem, which states that if a function is continuous on a closed interval, then it attains both a maximum and minimum value on that interval. It also discusses Fermat's Theorem, which relates local extrema of a differentiable function to its derivative. Examples are provided to illustrate these concepts.
We define what it means for a function to have a maximum or minimum value, and explain the Extreme Value Theorem, which indicates these maxima and minima must be there under certain conditions.
Fermat's Theorem says that at differentiable extreme points, the derivative should be zero, and thus we arrive at a technique for finding extrema: look among the endpoints of the domain of definition and the critical points of the function.
There's also a little digression on Fermat's Last theorem, which is not related to calculus but is a big deal in recent mathematical history.
The document contains 7 questions related to probability and statistics. Question 1 asks about computing a 95% confidence interval for a population mean and reducing the error in estimating the population mean. Question 2 asks about the number of amplifiers needed to achieve 95% reliability for a concert lasting 2 hours. Question 3 asks about the probability of a system meeting certain tolerance limits on diameters and the probability of none among randomly selected systems violating tolerances.
- The document discusses asymptotic analysis and Big-O, Big-Omega, and Big-Theta notation for analyzing the runtime complexity of algorithms.
- It provides examples of using these notations to classify functions as upper or lower bounds of other functions, and explains how to determine if a function is O(g(n)), Ω(g(n)), or Θ(g(n)).
- It also introduces little-o and little-omega notations for strict asymptotic bounds, and discusses properties and caveats of asymptotic analysis.
This document introduces Reed-Solomon codes. It describes Reed-Solomon codes as word-oriented, non-binary BCH codes that are simple, robust, and perform well for burst errors. It explains that a Reed-Solomon code block length is N=2m-1, with a capacity to correct t errors using 2t parity check words. The document outlines the generator polynomial, encoding, decoding procedures including syndrome calculation, Berlekamp-Massey algorithm, Chien search, and Forney algorithm. It concludes with potential future tasks related to Reed-Solomon codes.
This document summarizes adaptive delta modulation, a method for digitally encoding analog signals for efficient transmission or storage. It works by approximating the signal as a step function that is adjusted up or down at each time step by a fixed amount ("delta") based on whether the real signal value is above or below the current step value. The document describes how the delta and time step can be adapted based on the signal's characteristics to improve the approximation. Pseudocode is provided for encoding and decoding adaptive delta modulation signals.
From L to N: Nonlinear Predictors in Generalized Modelshtstatistics
1) Generalized nonlinear models (GNM) extend generalized linear models (GLM) by allowing the predictor to be a nonlinear function of the parameters. This allows for more parsimonious and interpretable models.
2) Estimating GNMs can be challenging due to difficulties generating starting values and the potential for multiple optima in the likelihood. The gnm package in R uses random starting values and a one-parameter-at-a-time Newton method.
3) The stereotype model is a special case of the multinomial logistic model that is suitable for ordered categorical data where only the scale of the relationship with covariates varies between categories. It can be fit as a GNM using a "Po
This document is the final exam for ENGR 371 - Probability and Statistics given on April 29, 2010 at Concordia University. It contains 6 questions testing concepts like probability, confidence intervals, hypothesis testing, and distributions. Formulas relevant to the exam questions are also provided.
This document describes the POTFIT algorithm for approximating multi-dimensional arrays as products of lower-dimensional matrices. It uses POTFIT to approximate a photo (represented as a 3D tensor of pixel color values) using single particle potentials. Approximating a dark photo requires fewer SPPs than a colorful photo, as errors are more obvious in colorful areas. The document shows approximations using different numbers of SPPs and the resulting file sizes.
Multiplicative Interaction Models in Rhtstatistics
The document discusses multiplicative interaction models and the gnm R package for fitting these models. The gnm package allows fitting of generalized nonlinear models, including models with standard multiplicative interactions. It uses an over-parameterized representation and a two-stage procedure involving a one-parameter-at-a-time Newton method and full Newton-Raphson to estimate model parameters. The document provides an example analysis fitting a homogeneous row-column association model to occupational status data.
The document discusses multiobjective optimization and evolutionary algorithms. It defines multiobjective optimization problems as having multiple objective functions to minimize subject to constraints. Pareto optimal solutions are those that are not dominated by any other solutions in terms of all objectives. Evolutionary algorithms are used to approximate the Pareto front and find Pareto optimal solutions. Non-dominated sorting and crowding distance are used to select the next population in NSGA-II. The hypervolume indicator measures the size of the space covered by the Pareto front approximations.
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...IDES Editor
Orthogonal Frequency Division Multiplexing
(OFDM) systems are very sensitive to carrier frequency offset
(CFO), caused by either frequency differences between
transmitter and receiver local oscillators or by frequency
selective channels. The CFO disturbs the orthogonality among
subcarriers of OFDM system and results intercarrier
interference (ICI), which degrades the bit error rate (BER)
performance of the system. This paper presents a new blind
CFO estimation scheme for single-input single-output (SISO)
OFDM systems. The presented scheme is based on the
assumption that the channel frequency response changes
slowly in frequency domain. In this scheme an excellent tradeoff
between complexity and performance, as compared to
existing estimation schemes, is obtained. The improved
performance of the present scheme is confirmed through
extensive simulations.
gnm: a Package for Generalized Nonlinear Modelshtstatistics
The gnm package provides functions for fitting generalized nonlinear models in R. It allows specification of models with multiplicative and other nonlinear terms. Models are fitted using maximum likelihood, with standard arguments that make gnm behave similarly to glm. The package handles over-parameterized representations of models and provides tools for estimating identifiable parameter combinations. An example analysis fits row-column association and homogeneous association models to occupational mobility data.
1) The document describes an experiment on amplitude modulation where different signals are generated and plotted in the time and frequency domains.
2) Signals like the message signal, carrier signal, modulated signal, and integrated message signal are generated and their representations are shown.
3) The experiment compares amplitude modulation (AM) and frequency modulation (FM) by generating AM and FM signals and observing the differences between their time domain and frequency domain representations.
Space time coding is used in MIMO wireless systems to improve communication performance by exploiting spatial diversity. It uses multiple transmit and receive antennas. The Alamouti code is a simple and effective space time block code that achieves full transmit diversity without requiring channel state information at the transmitter. It transmits symbols from two transmit antennas in two time slots so that the receiver can recover the symbols with low complexity decoding. MIMO combined with space time coding can provide high data rates, minimize errors, and increase capacity for wireless applications such as 4G networks.
Comparison and analysis of combining techniques for spatial multiplexing spac...IAEME Publication
This document compares different combining techniques for space-time block coded systems in Rayleigh fading channels. It finds that maximum ratio combining outperforms other techniques like equal gain combining and selection combining for any space-time block code configuration, providing the best bit error rate. The document provides background on space-time block codes, describes the Alamouti space-time code, and discusses various receive diversity combining techniques.
This document outlines and describes space-time coding techniques for MIMO wireless systems. It introduces MIMO system models and derives MIMO capacity. It then discusses space-time coding performance analysis, including diversity-multiplexing tradeoffs and error analysis. Finally, it describes specific space-time coding schemes, including Alamouti codes, space-time block codes, and space-time trellis codes.
This document discusses various techniques used to improve mobile radio link performance including equalization, diversity, and channel coding. It describes equalization techniques that compensate for intersymbol interference caused by multipath. It explains different types of diversity including spatial, time, and frequency diversity that are used to mitigate fading. Specifically, it outlines four common spatial diversity techniques: selection diversity, maximal ratio combining, equal gain diversity, and scanning diversity. The document also discusses time diversity and RAKE receivers used in code division multiple access systems to exploit multipath for additional time diversity gain.
This document provides an overview of various video compression techniques and standards. It discusses fundamentals of digital video including frame rate, color resolution, spatial resolution, and image quality. It describes different compression techniques like intraframe, interframe, and lossy vs lossless. Key video compression standards discussed include MPEG-1, MPEG-2, MPEG-4, H.261, H.263 and JPEG for still image compression. Factors that impact compression like compression ratio, bit rate control, and real-time vs non-real-time are also summarized.
Compression: Video Compression (MPEG and others)danishrafiq
This document provides an overview of video compression techniques used in standards like MPEG and H.261. It discusses how uncompressed video data requires huge storage and bandwidth that compression aims to address. It explains that lossy compression methods are needed to achieve sufficient compression ratios. The key techniques discussed are intra-frame coding using DCT and quantization similar to JPEG, and inter-frame coding using motion estimation and compensation to remove temporal redundancy between frames. Motion vectors are found using techniques like block matching and sum of absolute differences. MPEG and other standards use a combination of these intra and inter-frame coding techniques to efficiently compress video for storage and transmission.
Diversity Techniques in mobile communicationsDiwaker Pant
The document discusses diversity techniques in wireless communication. It introduces different types of diversity including frequency diversity and time diversity. Frequency diversity involves transmitting the same information over multiple carrier frequencies separated by more than the coherence bandwidth. Time diversity involves repeated transmission of information with time spacing exceeding the channel coherence time. The document provides examples of how techniques like frequency division multiplexing and rake receivers implement frequency and time diversity respectively.
Basic concepts and how to measure price volatility
Presented by Carlos Martins-Filho at the AGRODEP Workshop on Analytical Tools for Food Prices
and Price Volatility
June 6-7, 2011 • Dakar, Senegal
For more information on the workshop or to see the latest version of this presentation visit: http://www.agrodep.org/first-annual-workshop
The document summarizes a lecture on packet routing algorithms for hypercubes, including analyzing the expected time for a random routing algorithm to route packets from source to destination in two phases. It then discusses primal-dual algorithms for solving multi-commodity flow problems on networks and how they maintain constraints for both the primal and dual optimization problems through an iterative process of adjusting primal and dual variables.
This document shows how to compute and graph the Fourier series coefficients for a square wave signal using a TI-89 calculator. It defines the Fourier series and integral used to calculate the complex coefficients. For a square wave example, it evaluates the integral to find the coefficients, plots the coefficients, and reconstructs the original square wave signal from the coefficients. Increasing the number of terms in the summation improves the approximation of the square wave.
This document contains instructions and questions for a mathematics exam. It provides information about the exam such as the date, time allowed, materials permitted, and instructions for completing and submitting the exam. The exam contains 7 multi-part questions testing a variety of mathematics concepts including algebra, geometry, trigonometry, statistics, and matrix operations.
This document discusses techniques for evaluating integrals involving exponential functions. It introduces the formulas for integrating exponentials and differentiating them. Several important definite integrals are evaluated, such as the integral from 0 to infinity of e^-ax dx = 1/a. Graphs are used to visualize these integrals. The document then evaluates the more complex integral from negative infinity to positive infinity of e^-ax^2 dx using a change of variables technique. Finally, it discusses how these integrals can be used in kinetic theory and derives an important ratio and normalization factor for Maxwell's velocity distribution.
1. The document is a mathematics exam for Secondary 4 students consisting of 23 questions testing topics like algebra, trigonometry, geometry, and statistics.
2. The exam is 80 marks and students are instructed to show working, use a calculator, and answer in the spaces provided on the question paper.
3. The questions cover topics such as solving equations, factorizing expressions, finding probabilities, sketching graphs, proving geometric statements, and interpreting data from tables and graphs.
This document provides an overview of indices and logarithms in elementary mathematics. It begins by defining integer indices and establishing laws for integer indices. It then extends the definition of indices to rational numbers by defining qth roots. Laws of indices are generalized to apply to rational exponents. Examples are provided to illustrate working with rational exponents. The chapter then introduces exponential functions, defining them as continuous functions that pass through the points (k, ak) for rational k. Laws for exponential functions are stated for real exponents.
This document discusses efficient implementation of cryptographic pairings. It begins by introducing pairings and their properties like bilinearity. It describes the hard computational problems that pairings are based on and how suitable elliptic curves and algorithms like the Tate pairing can be used to implement pairings securely. The document then discusses optimizations to the basic Tate pairing algorithm as well as other pairing-friendly curves and pairings like the Ate pairing. It also covers efficient arithmetic in extension fields and techniques for fast final exponentiation.
This document summarizes the BTW sandpile model on a square lattice and defines relevant concepts. It describes how sandpiles are represented as height functions on the lattice, stable configurations, toppling rules, addition of sandpiles, and the group structure of recurrent sandpiles. Algorithms to find the identity of this group are developed in later sections.
This document discusses scale changes and periodic functions. It defines key concepts like amplitude, period, and frequency. It provides examples of how changing the scale (a) or frequency (b) affects the amplitude and period of trigonometric functions like sine, cosine, and tangent. The concluding examples give the period, amplitude, and frequency for specific trigonometric equations.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses integrals involving exponential functions. It shows that integrating the exponential function results in dividing the constant in the exponent. It evaluates the important definite integral from 0 to infinity of e^-ax, which equals 1/a. It also evaluates the double integral from -infinity to infinity of e^-a(x^2+y^2), which equals sqrt(pi/a). Taking derivatives of these integrals generates related integrals involving x and x^4 that are useful in kinetic theory of gases.
This document is the first paper of the Secondary 4 Express / 5 Normal Mathematics Preliminary Examination from 2009. It consists of 16 printed pages and has 10 questions. The questions cover a range of mathematics topics including calculations, simultaneous equations, rates of change, sets and probabilities. Students are instructed to show their working, use calculators appropriately, and express their answers to a given degree of accuracy. They must answer all questions and ensure their work is securely fastened together at the end. The total number of marks for the paper is 80.
This document discusses frequency-response based design methods for lead and lag compensation networks to improve stability margins of closed-loop control systems. It describes proportional-derivative (PD) and proportional-integral-derivative (PID) compensation networks and their effects on the magnitude and phase responses. Design methods are presented for selecting the parameters of lead compensation networks to meet specifications for phase margin, steady-state error, and closed-loop bandwidth. Examples are provided to illustrate the design process.
Slides of a talk at CMU Theory lunch (http://www.cs.cmu.edu/~theorylunch/20111116.html) and Capital Area Theory seminar (http://www.cs.umd.edu/areas/Theory/CATS/#Grigory).
This document provides an overview of advanced power system protection topics including definitions, objectives of power system protection, relay characteristics, methods of discrimination, distance protection, current balance protection, phase comparison protection, fault detection techniques using zero sequence systems, sequence filters, general relay equations, fuses, and time-current characteristics. It discusses concepts such as discrimination, stability, sensitivity, repeatability and provides examples to illustrate relay equations and characteristics.
Robust Repositioning in Large-scale NetworksAlan Erera
This document discusses robust optimization models for empty trailer repositioning in large-scale freight consolidation networks. It presents a two-stage robust optimization model that minimizes costs of planned trailer movements while ensuring the existence of feasible recovery movements for uncertain future demand scenarios. The model considers recovery flows and bounds the vulnerability of subsets of nodes to address future feasibility. Challenges include controlling model conservatism and appropriately applying the two-stage model in large, dynamic networks with rolling horizons.
Quantifying the call blending balance in two way communication retrial queues...wrogiest
This document describes research into distinguishing between two models (A and B) of call sequences in a call center using a single server. Model A uses a classical retrial rate, while Model B uses a constant retrial rate. The key difference studied is the short-term correlation between incoming and outgoing call types, quantified by the correlation coefficient γ. Numerical examples calculating γ under Model B demonstrate it can be positive when outgoing call activity is limited, positive when the time share of incoming/outgoing calls is matched, and strictly negative when call durations are strongly mismatched. The goal is to compare γ between Models A and B to distinguish the two models.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
2. ISIT 2008, Toronto, Canada, July 6 - 11, 2008
σ 2 (per two dimensions). Noise variable pairs in different
1.5
transmissions are independent.
We assume that the four channel coefficients H11 , H12 , H21 ,
1 and H22 are independent zero-mean circularly symmetric com-
plex Gaussians, each having variance 1 (per two dimensions).
The channel coefficients are chosen prior to a block of K
transmissions and remain constant over that block.
0.5
The complex transmitted symbols (Xk1 , Xk2 ) must satisfy
a power constraint, i.e.
∗ ∗
E[Xk1 Xk1 + Xk2 Xk2 ] ≤ P. (8)
0
−15 −10 −5 0 5 10 15
B. Telatar capacity
Fig. 3. Basic capacity C (black curve) and repetition capacity Cr (blue)
in bit/transm. as a function of SNR = P/σ 2 in dB (horizontally). Also
If the channel input variables are independent zero-mean
the maximum transmission rates achievable with 4-PAM in the ordinary- circularly symmetric complex Gaussians both having variance
repetition case (blue *’s). In red *’s the maximum rates achievable using P/2, then the resulting mutual information (called Telatar
scaled-repetition mapping.
capacity here, see [6]) is
P/2
CTelatar (H) = log2 det(I2 + HH † ), (9)
C. Demodulation complexity σ2
Scaled repetition outperforms ordinary repetition, but also h11 h12
where H = , i.e. the actual channel-coefficient
has a disadvantage. In an ordinary-repetition system the output h21 h22
yk = (yk1 + yk2 )/2 is simply sliced. In a system that uses matrix and I2 the 2 × 2 identity matrix. Also in the 2 × 2
scaled repetition we can only slice after having distinguished MIMO case we define the signal-to-niose ratio as
between two cases. More precisely note that xk2 = M2 (xk ) = Δ
SNR = P/σ 2 . (10)
2xk − D2 (xk ), where D2 (α) = 5 if α 0 and D2 (α) = −5
if α 0. Now we can use a slicer for yk1 + 2yk2 = xk + It can be shown (see e.g. Yao ([7], p. 36) that for fixed R
nk1 + 2(2xk − D2 (xk ) + nk2 ) = 5xk − 2D2 (xk ) + nk1 + 2nk2 . and SNR large enough Pr{CTelatar(H) R} ≈ γ · SNR−4 , for
Assuming that xk ∈ {−3, −1} we get that D2 (xk ) = −5 and some constant γ.
this implies that we should put a threshold at 0 to distinguish C. Worst-case error-probabilities
between −3 and −1. Similarly assuming that xk ∈ {+1, +3}
Consider M (one for each message) K × 2 code-matrices
we get D2 (xk ) = 5 and we must slice yk1 + 2yk2 again with
c1 , c2 , · · · , cM resulting in a unit average energy code. Then
a threshold at 0. Then the best overall candidate xk is found
ˆ
Tarokh, Seshadri and Calderbank [5] showed that for large
by minimizing (yk1 − xk )2 + (yk2 − M2 (xk ))2 over the two
ˆ ˆ
SNR
candidates.
Pr{c → c } ≈ γ (det((c − c)(c − c)† )−2 SNR−4 . (11)
II. F UNDAMENTAL P ROPERTIES FOR THE 2 × 2 MIMO
C HANNEL for some γ if the√ of the difference matrices c−c is 2, and
rank
we transmit x = P c. If this holds for all difference matrices
A. Model description
we say that the diversity order is 4. Therefore it makes sense
n1
x1 c
to maximize the minimum modulus of the determinant over
h11 E all code-matrix differences.
r ¨ +
rr 21
h ¨¨ 1
y
Tr. r¨¨ n2 Rec. III. A LAMOUTI : O RDINARY R EPETITION
¨r
¨ ¨ 12 rr 2
h c y Alamouti [1] proposed a modulation scheme (space-time
¨ r +
r E code) for the 2 × 2 MIMO cannel which allows for a very
x2 h22 simple detector. Two complex symbols s1 and s2 are trans-
mitted in the first transmission (an odd transmission) and in
Fig. 4. Model of a 2 × 2 MIMO channel.
the second transmission (the next even transmission) these
Next consider a 2 × 2 MIMO channel (see Fig. 4). Both symbols are more or less repeated. More precisely
the transmitter and the receiver use two antennas. The output x11 x12 s1 −s∗
2
vector (y1k , y2k ) at transmission k relates to the corresponding = . (12)
x21 x22 s2 s∗
1
input vector (x1k , x2k ) as given by
The received signal is now
y1k h11 h12 x1k n1k ⎛ ⎞ ⎛ ⎞ ⎛ ⎞
= + (7) y11 h11 h12 n11
y2k h21 h22 x2k n2k ⎜ y21 ⎟ ⎜ h21 h22 ⎟ ⎜ n ⎟
⎜ ∗ ⎟=⎜ ∗ ⎟ s1
⎝ y12 ⎠ ⎝ h12 −h∗ ⎠ + ⎜ 21 ⎟ , (13)
⎝ n∗ ⎠
where (N1k , N2k ) is a pair of independent zero-mean cir- 11 s2 12
∗
cularly symmetric complex Gaussians, both having variance y22 h∗ −h∗
22 21 n∗
22
1289
Authorized licensed use limited to: Eindhoven University of Technology. Downloaded on March 09,2010 at 04:35:07 EST from IEEE Xplore. Restrictions apply.
3. ISIT 2008, Toronto, Canada, July 6 - 11, 2008
Minimum Determinant, 16QAM−codesymbols, R=4 bits/transm.
or more compactly 8
7
y = s1 a + s2 b + n, with
∗ ∗
= (y11 , y21 , y12 , y22 )T ,
6
y
a = (h11 , h21 , h∗ , h∗ )T ,
12 22
5
b = (h12 , h22 , −h∗ , −h∗ )T , and
11 21
4
n = (n11 , n21 , n∗ , n∗ )T .
12 22 (14) 3
2
Since a and b are orthogonal the symbol estimates s1 andˆ
s2 can be determined by simply slicing (a† y)/(a† a) and
ˆ 1
(y † b)/(b† b) respectively. 0
0 0.5 1 1.5
Another advantage of the Alamouti method is that the
densities of a† a and b† b are (identical and) chi-square with Fig. 5. Minimum modulus of the determinant for rotated and scaled Alamouti
as a function of θ horizontally.
8 degrees of freedom. This results in a diversity order 4, i.e.
Pr{(S1 , S2 ) = (S1 , S2 )} ≈ γ · SNR−4 , (15)
B. Hard-decision Performance
for fixed rate and large enough SNR. We have compared the message-error-rate for several R = 4
A disadvantage of the Alamouti method is that only two space-time codes in Fig. 6. By message-error-rate we mean the
complex symbols are transmitted every two transmissions, but probability Pr{X = X}. Note that for each ”test” we generate
more-importantly that the symbols transmitted in the second a new message (8-bit) and a new channel matrix. The decoder
transmission are more or less repetitions of the symbols in is optimal for all codes, it performs M L-decoding (exhaustive
the first transmission. Section I however suggests that we can search). The methods that we have considered are:
improve upon ordinary repetition.
1) Uncoded, in green. We transmit
IV. T HE ROTATED AND SCALED A LAMOUTI METHOD x11 x12
X= , (19)
A. Method description x21 x22
Having seen in section I that scaled-repetition improves where x11 , x12 , x21 , and x22 are symbols from A4-QAM .
upon ordinary repetition in the SISO case, we use this concept 2) Alamouti, in blue, see (12), where s1 and s2 are
to improve upon the standard Alamouti scheme for MIMO symbols from A16-QAM .
transmission. Instead of just repeating the symbols in the 3) Tilted QAM, in cyan. Proposed by Yao and Wornell
second transmission we scale them. More precisely, when s1 [8]. Let sa , sb , sc , and sd symbols from A4-QAM . Then
Δ
and s2 are elements of A16-QAM = {a + jb|a ∈ A4-PAM , b ∈ we transmit
A4-PAM }, we could transmit for some value of θ the signals x11 cos(θ1 ) − sin(θ1 ) sa
= ,
x11 x12 s1 · exp(jθ) −s∗ x22 sin(θ1 ) cos(θ1 ) sb
2
= (16) cos(θ2 ) − sin(θ2 )
x21 x22 M2 (s2 ) M2 (s∗ )
1
x21
=
sc
,
(20)
s1 · exp(jθ) −s∗ 0 0 x12 sin(θ2 ) cos(θ2 ) sd
2
= − ,
2s2 2s∗1 D2 (s2 ) D2 (s∗ )
1 for θ1 = 1 arctan( 1 ) and θ2 = 1 arctan(2).
2 2 2
where M2 (α) = 2α − D2 (α) with D2 (α) = 5β when β is the 4) Rotated and scaled Alamouti, in red, see (16) for θ =
complex sign of α. 1.028, and with s1 and s2 from A16-QAM .
A first question is to determine a good value for θ. Therefore 5) Golden code, in magenta. Proposed by Belfiore et al.
we determine for 0 ≤ θ ≤ π/2 the minimum modulus of the [2]. Now
determinant mindet(θ) 1 α(z1 + z2 θ) α(z3 + z4 θ)
X= √ , (21)
5 j · α(z3 + z4 θ) α(z1 + z2 θ)
mindet(θ) = min | det(X(s1 , s2 , θ) − X(s1 , s2 , θ))|,
(s1 ,s2 ),(s1 ,s2 ) √ √
(17) with θ = 1+2 5 , θ = 1−2 5 , α = 1 + j − jθ, and α =
x11 x12 1 + j − jθ and where z1 , z2 , z3 , and z4 are A4-QAM -
where X = is the code matrix. The minimum
x21 x22 symbols.
modulus of the determinant as a function of θ can be found 6) Telatar, in black. This is the probability that the Telatar
in Fig. 5. The maximum value of the minimum determinant capacity of the channel is smaller than 4.
(i.e. 7.613) occurs for Clearly it follows from Fig. 6 that the winner is the Golden
θopt. = 1.028. (18) code. However rotated and scaled Alamouti is only slightly
worse, roughly 0.2 dB. Important is that Alamouti coding is
We will use this value for θ in what follows. roughly 2 dB worse than the Golden code.
1290
Authorized licensed use limited to: Eindhoven University of Technology. Downloaded on March 09,2010 at 04:35:07 EST from IEEE Xplore. Restrictions apply.
4. ISIT 2008, Toronto, Canada, July 6 - 11, 2008
MER, 16QAM code−symbols, R=4 bits/transm., 1000 errors
we rewrite (16) and obtain
Telatar
uncoded
Alamouti x11 x12 −M2 (t1 )Θ M2 (t∗ )
2
= (24)
−1
10
Rot.Scal.Rep.
Tilted QAM
x21 x22 t2 t∗1
−2t1 Θ 2t∗ −D2 (t1 )Θ D2 (t∗ )
Golden Code
2 2
= − ,
t2 t∗
1 0 0
since t = M2 (s) implies that s = −M2 (t). Now
−2 ⎛ ⎞ ⎛ ⎞
−2h11 Θ h12
10
y11
⎜ y21 ⎟ ⎜ −2h21 Θ h22 ⎟ t1
⎜ ∗ ⎟=⎜ ⎟ (25)
⎝ y12 ⎠ ⎝ h∗
12 2h∗ ⎠ t2
11
∗
y22 h∗ 2h∗
⎛ ⎞22 21
⎛ ⎞ ⎛ ⎞
−3
10
−h11 Θ 0 n11
⎜ −h21 Θ ⎟ ⎜ ⎟ ⎜ n21 ⎟
− ⎜ ⎟ D2 (t1 ) − ⎜ 0 ⎟ D2 (t2 ) + ⎜ ⎟.
⎝ 0 ⎠ ⎝ h∗ ⎠
11
⎝ n∗ ⎠
12
10 11 12 13 14 15 16 17 18 19 20
0 h∗
21 n∗
22
Fig. 6. Message error rate for several R=4 space-time codes. We can write this as
y = t1 a + t2 b − D2 (t1 )c − D2 (t2 )d + n,
V. D ECODING COMPLEXITY a = (−2h11 Θ, −2h21 Θ, h∗ , h∗ )T ,
12 22
b = (h12 , h22 , 2h∗ , 2h∗ )T ,
11 21
Clearly the Golden code is better than rotated and scaled
Alamouti. However the Golden code requires the decoder to c = (−h11 Θ, −h21 Θ, 0, 0)T , and
check all 256 alternative codewords, since sphere-decoding d = (0, 0, h∗ , h∗ , 0, 0)T ,
11 21
is not a good alternative now. Here we will investigate the
complexity and performance of a suboptimal rotated and
scaled Alamouti decoder. Denote Θ = exp(jθopt. ). and for the ”cos(φ )” of the angle between a and b we can
A. In the rotated and scaled Alamouti case the received write
vector is |2(Θ − 1)(h11 h∗ + h21 h∗ )|
12 22
⎛ ⎞ ⎛ ⎞ cos(φ ) = . (26)
y11 h11 Θ 2h12 4|h11 |2 + 4|h21 |2 + |h12 |2 + |h22 |2
⎜ y21 ⎟ ⎜ h21 Θ 2h22 ⎟ s1 2 2
⎜ ∗ ⎟=⎜ ⎟ (22) C. It now follows from the inequality 2r1 r2 ≤ r1 + r2 (where
⎝ y12 ⎠ ⎝ 2h∗ 12 −h∗ ⎠ s2
11
∗ ∗ ∗
r1 and r2 are reals), that
y22 2h −h21
⎛ ⎞ 22 ⎛ ⎞ ⎛ ⎞ |h11 |2 + |h12 |2 + |h21 |2 + |h22 |2
0 h12 n11 cos(φ) ≤ |Θ − 1| · ,
⎜ 0 ⎟ ⎜ h ⎟ ⎜ n ⎟ |h11 |2 + |h21 |2 + 4|h12 |2 + 4|h22 |2
− ⎜ ∗ ⎟ D2 (s1 ) − ⎜ 22 ⎟ D2 (s2 ) + ⎜ 21 ⎟ .
⎝ h12 ⎠ ⎝ 0 ⎠ ⎝ n∗ ⎠ |h11 |2 + |h12 |2 + |h21 |2 + |h22 |2
∗
12 cos(φ ) ≤ |Θ − 1| · .
(27)
h22 0 n∗
22 4|h11 |2 + 4|h21 |2 + |h12 |2 + |h22 |2
We can write this as If
|h12 |2 + |h22 |2 ≥ |h11 |2 + |h21 |2 , (28)
y = s1 a + s2 b − D2 (s1 )c − D2 (s2 )d + n,
∗ ∗ then cos(φ) ≤ 2|Θ−1| = 0.393, else cos(φ ) ≤ 2|Θ−1| =
5 5
y = (y11 , y21 , y12 , y22 )T ,
0.393. Therefore it makes sense to decode (s1 , s2 ) when
a = (h11 Θ, h21 Θ, 2h∗ , 2h∗ )T ,
12 22 (28) holds and (t1 , t2 ) when (28) does not hold. Using zero-
b = (2h12 , 2h22 , −h∗ , −h∗ )T ,
11 21
forcing to decode, the noise enhancement is then at most
c = (0, 0, h∗ , h∗ )T , 1/(1 − 0.3932 ) = 1.183 which is 0.729 dB. We shall see
12 22
later that noise enhancement is un-noticeable in practise.
d = (h12 , h22 , 0, 0)T , and
D. The decoding procedure is straightforward. Focus on
n = (n11 , n21 , n∗ , n∗ )T .
12 22 the case where we decode (s1 , s2 ) for a moment. For all 16
alternatives of (D2 (s1 ), D2 (s2 )) the vector
For the ”cos(φ)” of the angle between a and b we can write
z = y + D2 (s1 )c + D2 (s2 )d = s1 a + s2 b + n (29)
|2(Θ − 1)(h11 h∗ + h21 h∗ )]
12 22
cos(φ) = . (23)
|h11 |2 + |h21 |2 + 4|h12 |2 + 4|h22 |2 and is determined. Then compute the sufficient statistic
B. Instead of decoding (s1 , s2 ) we can also decode (t1 , t2 ) = a† z a† a a† b s1 a† n
= + . (30)
(M2 (s1 ), M2 (s2 )) which is equivalent to (s1 , s2 ). Therefore b† z b† a b† b s2 b† n
1291
Authorized licensed use limited to: Eindhoven University of Technology. Downloaded on March 09,2010 at 04:35:07 EST from IEEE Xplore. Restrictions apply.
5. ISIT 2008, Toronto, Canada, July 6 - 11, 2008
MER, Rot.Scal.Alam., 16QAM code−symbols, R=4 bits/transm., 1000 errors Av.nr. slicings, Rot.Scal.Alam., 16QAM code−symbols, R=4 bits/transm., 1000 errors
8
full search method 1
method 1 method2
method2
−1
7
10
6
5
−2
10
4
3
2
−3
10
1
10 11 12 13 14 15 16 17 18 19 20 0
10 11 12 13 14 15 16 17 18 19 20
Fig. 7. Message error rate for three Rotated Scaled Alamouti decoders Fig. 8. Number of slicings for two Rotated Sclaed Alamouti decoders (R =
(R = 4), horizontally SNR. 4), horizontally SNR.
M3 (x)
b† b −a† b £
¢¡ +8
Use inverted matrix M = /D where D =
−b† a a† a £
s1
˜ a† z
+6
¢¡
(a† a)(b† b) − (b† a)(a† b) to obtain = M . £
s2
˜ b† z +4
¢¡
Next both s1 and s2 are sliced under the restriction that only
˜ ˜ £
¢¡ +2
alternatives that match the assumed values D2 (s1 ) and D2 (s2 )
£
¢¡
x
are possible outcomes. This is done for all 16 alternatives -8 -6 -4 -2 +2 +4 +6 +8
(D2 (s1 ), D2 (s2 )). The best result in terms of Euclidean dis- -2 £
¢¡
tance is now chosen. £
¢¡ -4
In considering all alternatives (D2 (s1 ), D2 (s2 )) we only
£
¢¡
need to slice when the length of z − s1 a − s2 b is smaller than
-6
˜ ˜
the closest distance we have observed so far. This reduces the -8 £
¢¡
number of slicing steps. We call this approach METHOD 1.
E. The number of slicing steps can even be further de- Fig. 9. The mapping M3 (·).
creased if we start slicing with the most promising alterna-
code, but can be decoded with an acceptable complexity. We
tive (D2 (s1 ), D2 (s2 )). This approach is called METHOD 2.
have obtained similar results for codes based on mapping
Therefore we note that the ”direct” s1 -signal-component in X
s1 Θ 0 M3 (·) for 9-PAM, see Fig. 9. Recently also Sezginer and Sari
is . Therefore we can slice (e† y)/(e† e1 ) [4] investigated complexity reducing methods for alternatives
0 −s∗ /2
1
1 1
in order to find a good guess for D2 (s1 ). Similarly we slice to the Golden code.
(e† y)/(e† e2 ) to find a good first guess for D2 (s2 ). Here
2 2 R EFERENCES
e1 = (h11 Θ, h21 Θ, −h∗ /2, −h∗ /2)T ,
12 22
[1] S.M. Alamouti, ”A simple transmit diversity technique for wireless
communications,” IEEE J. Sel. Areas. Comm. vol. 16, pp. 1451-1458,
e2 = (−h12 /2, −h22 /2, −h∗ , −h∗ )T .
11 21 (31) October 1998.
[2] J.-C. Belfiore, G. Rekaya, E. Viterbo, ”The golden code: A 2×2 full-rate
Then we consider the other 15 alternatives and only slice if space-time code with nonvanishin determinants,” IEEE Trans. Inform.
necessary. Similar methods apply if we want to decode (t1 , t2 ). Theory, vol. IT-51, No. 4, pp. 1432 - 1436, April 2005.
[3] G. Benelli, ”A new method for the integration of modulation and channel
F. We have carried out simulations, first to find out what the coding in an ARQ protocol,” IEEE Trans. Commun., vol. COM-40, pp.
degradation of the suboptimal decoders according to method 1594 - 1606, October 1992.
[4] S. Sezginer and H. Sari, ”Full-rate full-diversity 2 × 2 space-time codes
1 and method2 is relative to ML-decoding. The result is of reduced decoder complexity,” IEEE Comm. Letters, vol. 11, pp. 973
shown in Fig. 7. Conclusion is that the suboptimal decoders - 975, December 2007.
do not demonstrate a performance degradation. We have also [5] V. Tarokh, N. Seshadri, and A.R. Calderbank, ”Space-time codes for
high data rate wireless communication: performance criterion and code
considered the number of slicings for both method 1 and construction,” IEEE Trans. Inform. Theory, Vol. 44, pp. 744- 765, March
method 2. This is shown in Fig. 8. It can be observed that 1998.
method 1 leads to roughly 7 slicings (as opposed to 16). [6] I.E. Telatar, ”Capacity of multi-antenna Gaussian channels” European
Trans. Telecommunications, vol. 10, pp. 585-595, 1999. (Originally
Method 1 further decreases the number of slicing to roughly published as ATT Technical Memorandum, 1995).
3.5. [7] H. Yao, Efficient Signal, Code, and Receiver Designs for MIMO Com-
munication Systems,Ph.D. thesis, M.I.T., June 2003.
VI. C ONCLUSION [8] H. Yao and G.W. Wornell, ”Achieving the full MIMO diversity-
multiplexing frontier with rotation-based space-time codes,” in Proc.
Rotated and scaled Alamouti has a hard-decision perfor- Allerton Conf. Commun. Control, and Comput., Monticello, IL, Oct.
mance which is only slightly worse than that of the Golden 2003.
1292
Authorized licensed use limited to: Eindhoven University of Technology. Downloaded on March 09,2010 at 04:35:07 EST from IEEE Xplore. Restrictions apply.