Abstract
This paper investigates polar codes for the additive white Gaussian noise (AWGN) channel. The scaling exponent of polar codes for a memoryless channel with capacity characterizes the closest gap between the capacity and non-asymptotic achievable rates as follows: For a fixed , the gap between the capacity and the maximum non-asymptotic rate achieved by a length-n polar code with average error probability scales as , i.e., . It is well known that the scaling exponent for any binary-input memoryless channel (BMC) with is bounded above by . Our main result shows that remains a valid upper bound on the scaling exponent for the AWGN channel. Our proof technique involves the following two ideas: (i) The capacity of the AWGN channel can be achieved within a gap of by using an input alphabet consisting of n constellations and restricting the input distribution to be uniform; (ii) The capacity of a multiple access channel (MAC) with an input alphabet consisting of n constellations can be achieved within a gap of by using a superposition of binary-input polar codes. In addition, we investigate the performance of polar codes in the moderate deviations regime where both the gap to capacity and the error probability vanish as n grows. An explicit construction of polar codes is proposed to obey a certain tradeoff between the gap to capacity and the decay rate of the error probability for the AWGN channel.
1. Introduction
1.1. The Additive White Gaussian Noise Channel
This paper investigates low-complexity codes over the classical additive white Gaussian noise (AWGN) channel ([1], Chapter 9), where a source wants to transmit information to a destination and each received symbol is the sum of the transmitted symbol and an independent Gaussian random variable. More specifically, if denotes the symbol transmitted by the source in the kth time slot, then the corresponding symbol received by the destination is
where is the standard normal random variable. When the transmission lasts for n time slots, i.e., each transmitted codeword consists of n symbols, it is assumed that are independent and each transmitted codeword must satisfy the peak power constraint
where is a constant which denotes the permissible power. For transmitting a uniformly distributed message across this channel, Shannon [2] shows that the limit of the maximum coding rate R as n approaches infinity (i.e., capacity) is
1.2. Polar Codes
In 1948, in his groundbreaking paper Shannon [2] proposed a systematic framework for studying the fundamental limits for transmitting information over noisy channels and provided a single-letter formula for the capacity of a memoryless channel. For decades, information and coding theorists sought to achieve these fundamental limits via low-complexity and capacity-achieving codes. In 2009, in his breakthrough paper Arıkan [3] proposed a class of codes—known as polar codes—whose encoding and decoding complexities are and provably achieve the capacity of any binary-input memoryless symmetric channel (BMSC).
The scaling exponent of polar codes for a memoryless channel with capacity
characterizes the closest gap between the channel capacity and non-asymptotic achievable rates as follows: For a fixed , the gap between the capacity and the maximum non-asymptotic rate achieved by a length-n polar code with average error probability scales as , i.e., . It has been shown in [4,5,6] that the scaling exponent for any BMSC with lies between and . Indeed, the upper bound remains valid for any general binary-input memoryless channel (BMC) ([7], Lemma 4). The scaling exponent of polar codes for a non-stationary channel has been recently studied in [8].
It is well known that polar codes are capacity-achieving for BMCs [9,10,11,12], and appropriately chosen ones are also capacity-achieving for the AWGN channel [13]. In particular, for any and any , polar codes operated at rate R can be constructed for the AWGN channel such that the decay rate of the error probability is [13] and the encoding and decoding complexities are . However, the scaling exponent of polar codes for the AWGN channel has not been investigated yet.
In this paper, we construct polar codes for the AWGN channel and show that remains a valid upper bound on the scaling exponent. Our construction of polar codes involves the following two ideas:(i) By using an input alphabet consisting of n constellations and restricting the input distribution to be uniform as suggested in [13], we can achieve the capacity of the AWGN channel within a gap of ; (ii) By using a superposition of binary-input polar codes (in this paper, n is always a power of 2) as suggested in [14], we can achieve the capacity of the corresponding multiple access channel (MAC) within a gap of where the input alphabet of the MAC has n constellations (i.e., the size of the Cartesian product of the input alphabets corresponding to the input terminals is n). The encoding and decoding complexities of our constructed polar codes are . On the other hand, the lower bound holds trivially for the constructed polar codes because the polar codes are constructed by superposing binary-input polar codes whose scaling exponents are bounded below by [5].
In addition, Mondelli et al. ([4], Section IV) provided an explicit construction of polar codes for any BMSC which obeys a certain tradeoff between the gap to capacity and the decay rate of the error probability. More specifically, if the gap to capacity is set to vanish at a rate of for some , then a length-n polar code can be constructed such that the error probability is where denotes the binary entropy function. This tradeoff was developed under the moderate deviations regime [15] where both the gap to capacity and the error probability vanish as n grows. For the AWGN channel, we develop a similar tradeoff under the moderate deviations regime by using our constructed polar codes described above.
1.3. Paper Outline
This paper is organized as follows. The notation used in this paper is described in the next subsection. Section 2 presents the background of this work, which includes existing polarization results for the BMC which are used in this work. Section 3.1, Section 3.2 and Section 3.3 state the formulation of the binary-input MAC and present new polarization results for the binary-input MAC. Section 4.1–Section 4.2 state the formulation of the AWGN channel and present new polarization results for the AWGN channel. Section 5 establishes the definition of the scaling exponent for the AWGN channel and establishes the main result—4.714 is an upper bound on the scaling exponent of polar codes for the AWGN channel. Section 6 presents an explicit construction of polar codes for the AWGN channel which obey a certain tradeoff between the gap to capacity and the decay rate of the error probability under the moderate deviations regime. Concluding remarks are provided in Section 7.
1.4. Notation
The set of natural numbers, real numbers and non-negative real numbers are denoted by , and respectively. For any sets and and any mapping , we let denote the set for any . We let be the indicator function of the set . An arbitrary (discrete or continuous) random variable is denoted by an upper-case letter (e.g., X), and the realization and the alphabet of the random variable are denoted by the corresponding lower-case letter (e.g., x) and calligraphic letter (e.g., ) respectively. We use to denote the random tuple where each has the same alphabet . We will take all logarithms to base 2 throughout this paper.
The following notations are used for any of the arbitrary X and Y random variables and any real-valued function g with domain . We let and denote the conditional probability distribution of Y given X and the probability distribution of respectively. We let and be the evaluations of and respectively at . To make the dependence on the distribution explicit, we let denote for any set . The expectation of is denoted as . For any distributed according to some , the entropy of X and the conditional mutual information between X and Y given Z are denoted by and respectively. For simplicity, we sometimes omit the subscript of a notation if it causes no confusion. The relative entropy between and is denoted by
The 2-Wasserstein distance between and is denoted by
We let denote the probability density function of a Gaussian random variable whose mean and variance are and respectively, i.e.,
2. Background: Point-to-Point Channels and Existing Polarization Results
In this section, we will review important polarization results related to the scaling exponent of polar codes for binary-input memoryless channels (BMCs).
2.1. Point-to-Point Memoryless Channels
Consider a point-to-point channel which consists of one source and one destination, denoted by and respectively. Suppose node transmits information to node in n time slots. Before any transmission begins, node chooses message W destined for node , where W is uniformly distributed over the alphabet
which consists of M elements. For each , node transmits based on W and node receives in time slot k where and denote respectively the input and output alphabets of the channel. After n time slots, node declares to be the transmitted W based on . Formally, we define a length-n code as follows.
Definition 1.
An code consists of the following:
- An encoding function for each , where is used by node for encoding such that .
- A decoding function used by node for producing the message estimate .
Definition 2.
The point-to-point memoryless channel is characterized by an input alphabet , an output alphabet and a conditional distribution such that the following holds for any code: For each , where for all and .
For any code defined on the point-to-point memoryless channel, let be the joint distribution induced by the code. By Definitions 1 and 2, we can factorize as,
2.2. Polarization for Binary-Input Memoryless Channels
Definition 3.
A point-to-point memoryless channel characterized by is called a binary-input memoryless channel (BMC) if .
We follow the formulation of polar coding in [11]. Consider any BMC characterized by . Let be the probability distribution of a Bernoulli random variable X, and let be the distribution of n independent copies of , i.e., for all . For each where , the polarization mapping of a length-n polar code is given by
where ⊗ denotes the Kronecker power. Define such that
where the addition and product operations are performed over GF(2), define
for each and each where characterizes the BMC (cf. (2)), and define
In addition, for each , define the Bhattacharyya parameter associated with time k as
where the distributions in (14) and (15) are marginal distributions of defined in (13). To simplify notation, let
in the rest of this paper. The following lemma is based on Section III of [4] and it is a restatement of Lemma 2 of [7], which has been used in [7] to show that is an upper bound on the scaling exponent for any BMC (including non-symmetric ones).
Lemma 1.
([7], Lemma 2) There exists a universal constant such that the following holds. Fix any BMC characterized by and any . Then for any and , we have
This lemma continues to hold if the quantity is replaced by for any . The main result of this paper continues to hold if the quantity in this lemma is replaced by for any .
3. Problem Formulation of Binary-Input MACs and New Polarization Results
Polar codes have been proposed and investigated for achieving any rate tuple inside the capacity region of a binary-input multiple access channel (MAC) [14,16]. The goal of this section is to use the polar codes proposed in [14] to achieve the symmetric sum-capacity of a binary-input MAC.
3.1. Binary-Input Multiple Access Channels
Consider a MAC ([1], Section 15.3) which consists of N sources and one destination. Let be the index set of the N sources and let denote the destination. Suppose the sources transmit information to node in n time slots. Before any transmission begins, node i chooses message destined for node for each , where is uniformly distributed over
which consists of elements. For each , node i transmits based on for each and node receives in time slot k where denotes the input alphabet for node i and denotes the output alphabet. After n time slots, node declares to be the transmitted based on for each .
To simplify notation, we use the following convention for any . For any random tuple , we let be the corresponding subtuple, whose realization and alphabet are denoted by and respectively. Similarly, for each and each random tuple , we let denote the corresponding random subtuple, and let and denote respectively the realization and the alphabet of . Formally, we define a length-n code for the binary-input MAC as follows.
Definition 4.
An -code, where , consists of the following:
- An encoding function for each and each , where is used by node i for encoding such that .
- A decoding function used by node for producing the message estimate .
Definition 5.
The multiple access channel (MAC) is characterized by N input alphabets specified by , an output alphabet specified by and a conditional distribution such that the following holds for any code: For each ,
where for all and .
3.2. Polarization for Binary-Input MACs
Definition 6.
A MAC characterized by is called a binary-input MAC if .
Consider any binary-input MAC characterized by . For each , let be the probability distribution of a Bernoulli random variable , and let be the distribution of n independent copies of , i.e., for all . Recall the polarization mapping defined in (10). For each , define such that
where the addition and product operations are performed over GF(2), and define
In addition, for each and each , define and define the Bhattacharyya parameter associated with node i and time k as
where the distributions in (22) are marginal distributions of defined in (21). The following lemma is a direct consequence of Lemma 1.
Lemma 2.
There exists a universal constant such that the following holds. Fix any binary-input MAC characterized by and any . Then for any and , we have
for each . This lemma continues to hold if the quantity is replaced by for any . The main result of this paper continues to hold if the quantity in this lemma is replaced by for any .
Proof.
Fix any . Construct by marginalizing and view as the conditional distribution that characterizes a BMC. The lemma then follows directly from Lemma 1. ☐
3.3. Polar Codes That Achieve the Symmetric Sum-Capacity of a Binary-Input MAC
Throughout this paper, let denote the uniform distribution on for each and define , i.e.,
for any .
Definition 7.
For a binary-input MAC characterized by , the symmetric sum-capacity is defined to be .
The following definition summarizes the polar codes for the binary-input MAC proposed in Section IV of [14].
Definition 8.
([14], Section IV) Fix an where . For each , let be a subset of , define , and let be a binary tuple. An polar code, where and , consists of the following:
- An index set for information bits transmitted by node i denoted by for each . The set is referred to as the index set for frozen bits transmitted by node i.
- A message set for each , where is uniform on .
- An encoding bijection for encoding into information bits denoted by for each such thatwhere and are defined as and respectively. Since message is uniform on , is a sequence of independent and identically distributed (i.i.d.) uniform bits such thatfor all , where the bits are transmitted through the polarized channels indexed by . For each and each , letbe the frozen bit to be transmitted by node i in time slot k. After has been determined, node i transmits where
- A sequence of successive cancellation decoding functions for each and each such that the recursively generated , and ,…, are produced as follows. For each and each , given that , and have been constructed before the construction of , node constructs the estimate of through computingwhereAfter obtaining , node constructs the estimate of through computingand declares thatis the transmitted where denotes the inverse function of .
Remark 1.
By inspecting Definition 4 and Definition 8, we see that every polar code is also an code.
Definition 9.
The uniform-input polar code is defined as an polar code where consists of i.i.d. uniform bits that are independent of the message .
Definition 10.
For the uniform-input polar code defined for the MAC, the probability of decoding error is defined as
where the error is averaged over the random messages and the frozen bits. The code is also called a uniform-input polar code if the probability of decoding error is no larger than ε.
The following proposition bounds the error probability in terms of Bhattacharyya parameters, and it is a generalization of the well-known result for the special case (e.g., see [3], Proposition 2). The proof of Proposition 1 can be deduced from Section IV of [14], and is contained in Appendix A for completeness.
Proposition 1.
For the uniform-input polar code defined for the MAC , we have
The following proposition follows from combining Lemma 2, Definition 7 and Proposition 1.
Proposition 2.
There exists a universal constant such that the following holds. Fix any N-source binary-input MAC characterized by . Fix any , let and define
for each , where is the uniform distribution as defined in (24) and the superscript “SE" stands for “scaling exponent". Then, the corresponding uniform-input polar code satisfies
and
Proof.
Let be the universal constant specified in Lemma 2 and fix an n. For each , it follows from Lemma 2 and Proposition 1 that
and
for the uniform-input polar code. Since , it follows that
holds for each , which implies that
Consequently, (35) follows from (37), (40) and Definition 7, and (36) follows from (38). ☐
Remark 2.
Proposition 2 shows that the sum-capacity of a binary-input MAC with N sources can be achieved within a gap of by using a superposition of N binary-input polar codes.
4. Problem Formulation of the AWGN Channel and New Polarization Results
4.1. The AWGN Channel
It is well known that appropriately designed polar codes are capacity-achieving for the AWGN channel [13]. The main contribution of this paper is proving an upper bound on the scaling exponent of polar codes for the AWGN channel by using uniform-input polar codes for binary-input MACs described in Definition 8. The following two definitions formally define the AWGN channel and length-n codes for the channel.
Definition 11.
An code is an code described in Definition 1 subject to the additional assumptions that and the peak power constraint
is satisfied.
Definition 12.
The AWGN channel is a point-to-point memoryless channel described in Definition 2 subject to the additional assumption that and for all and .
Definition 13.
For an code defined on the AWGN channel, we can calculate according to (9) the average probability of error defined as . We call an code with average probability of error no larger than ε an code.
4.2. Uniform-Input Polar Codes for the AWGN Channel
Recall that we would like to use uniform-input polar codes for binary-input MACs described in Definition 8 to achieve the capacity of the AWGN channel, i.e., in (3). The following definition describes the basic structure of such uniform-input polar codes.
Definition 14.
Fix an where . An polar code with average power P and input alphabet consists of the following:
- An input alphabet with such thatwhere can be viewed as a line with 2 origins. Introducing the symbol allows us to create a set of cardinality n which consists of non-zero real numbers and 2 origins 0 and . We index each element of by a unique length-m binary tupleand let be the bijection that maps the indices to the elements of such that denotes the element in indexed by .
- A binary-input MAC induced by as defined through Definitions 5 and 6 with the identifications and .
- A message set for each , where is the message alphabet of the uniform-input polar code for the binary-input MAC as defined through Definitions 8 and 9 such thatIn addition, is uniform on . We view the uniform-input polar code as an code (cf. Remark 1) and let and denote the corresponding set of encoding functions and the decoding function respectively (cf. Definition 4).
- An encoding function defined asfor each , where is used for encoding into such thatNote that both the encoded symbols 0 and in result in the same transmitted symbol according to (46). By construction, , , …, are i.i.d. random variables that are uniformly distributed on and hence , , …, are i.i.d. real-valued random variables (but not necessarily uniform).
- A decoding function defined assuch that
Remark 3.
For an polar code, the flexibility of allowing to contain 2 origins is crucial to proving the main result of this paper. This is because the input distribution which we will use to establish scaling results for the AWGN channel in Theorem 1 can be viewed as the uniform distribution over some set that contains 2 origins, although the input distribution in the real domain as specified in (52) to follow is not uniform.
Proposition 3.
There exists a universal constant such that the following holds. Suppose we are given an polar code defined for the AWGN channel with a 2-origin (i.e., . Define where contains 1 origin and non-zero real numbers. Then, the polar code is an -code (cf. Definition 1) which satisfies
and
for all where is the distribution on defined as
Proof.
The proposition follows from inspecting Proposition 2 and Definition 14 with the identifications and . ☐
The following lemma, a strengthened version of Theorem 6 of [13], provides a construction of a good which leads to a controllable gap between and for the corresponding polar code. Although the following lemma is intuitive, the proof is technical and hence relegated to Appendix B.
Lemma 3.
Let be the conditional distribution that characterizes the AWGN channel, and fix any . For each where , define
define
for all , define to be the cumulative distribution function (cdf) of , and define
Note that contains 1 origin and non-zero real numbers, and we let be the distribution on as defined in (52). In addition, define the distribution . Then, there exists a constant that depends on P and γ but not n such that the following statements hold for each :
and
A shortcoming of Proposition 3 is that the polar code may not satisfy the peak power constraint (41) and hence it may not qualify as an code (cf. Definition 11). Therefore, we describe in the following definition a slight modification of an polar code so that the modified polar code always satisfies the peak power constraint (41).
Definition 15.
The 0-power-outage version of an polar code is an code which follows identical encoding and decoding operations of the polar code except that the source will modify the input symbol in a time slot k if the following scenario occurs: Let be the desired codeword generated by the source according to the encoding operation of the polar code, where the randomness of originates from the information bits and the frozen bits . If transmitting the desired symbol at time k results in violating the power constraint , the source will transmit the symbol 0 at time k instead. An code is called an polar code if it is the 0-power-outage version of some polar code.
By Definition 15, every polar code satisfies the peak power constraint (41) and hence achieves zero power outage, i.e., . Using Definition 15, we obtain the following corollary which states the obvious fact that the probability of power outage of an polar code can be viewed as part of the probability of error of the 0-power-outage version of the code.
Corollary 1.
Given an -polar code, define
and
Then, the 0-power-outage version of the polar code is an polar code that satisfies the peak power constraint (41).
5. Scaling Exponents and Main Result
5.1. Scaling Exponent of Uniform-Input Polar Codes for MACs
We define scaling exponent of uniform-input polar codes for the binary-input MAC as follows.
Definition 16.
Fix an and an N-source binary-input MAC with symmetric sum-capacity (cf. Definition 7). The scaling exponent of uniform-input polar codes for the MAC is defined as
Definition 16 formalizes the notion that we are seeking the smallest such that holds where denotes the rate of an polar code. Using the existing results in Section IV-C of [5] and Theorem 2 of [4], we know that
for the special case where the binary-input MAC is a BMSC. We note from Theorem 48 of [17] (and also [18,19]) that the optimal scaling exponent (optimized over all codes) for any non-degenerate discrete memoryless channel (DMC) as well as BMC is equal to 2 for all .
Using Proposition 1 and Definition 16, we obtain the following corollary, which shows that 4.714, the upper bound on in (62) for BMSCs, remains a valid upper bound on the scaling exponent for binary-input MACs.
Corollary 2.
Fix any and any binary-input MAC . Then,
5.2. Scaling Exponent of Uniform-Input Polar Codes for the AWGN Channel
Definition 17.
Fix a and an . The scaling exponent of uniform-input polar codes for the AWGN channel is defined as
Definition 17 formalizes the notion that we are seeking the smallest such that holds where denotes the rate of an polar code. We note from Theorem 54 of [17] and Theorem 5 of [19] that that the optimal scaling exponent of the optimal code for the AWGN channel is equal to 2 for any . The following theorem is the main result of this paper, which shows that is a valid upper bound on the scaling exponent of polar codes for the AWGN channel.
Theorem 1.
Fix any and any . There exists a constant that does not depend on n such that the following holds. For any where , there exists an such that the corresponding polar code defined for the AWGN channel satisfies
and
In particular, we have,
Proof.
Fix a , an and an where . Combining Proposition 3 and Lemma 3, we conclude that there exists a constant that does not depend on n and an such that the corresponding polar code defined for the AWGN channel satisfies (64),
and
Using (67), (68) and Corollary 1, we conclude that the polar code is an polar code that satisfies (64) and (65). Since
for all sufficiently large n, it follows from (64), (65) and Definition 17 that (66) holds. ☐
6. Moderate Deviations Regime
6.1. Polar Codes That Achieve the Symmetric Capacity of a BMC
The following result is based on Section IV of [4], which developed a tradeoff between the gap to capacity and the decay rate of the error probability for a BMC under the moderate deviations regime [15] where both the gap to capacity and the error probability vanish as n grows.
Lemma 4.
([4], Section IV) There exists a universal constant such that the following holds. Fix any and any BMC characterized by . Recall that denotes the uniform distribution on . Then for any where , we have
where denotes the binary entropy function.
6.2. Polar Codes that Achieve the Symmetric Sum-Capacity of a Binary-Input MAC
The following lemma, whose proof is omitted because it is analogous to the proof of Lemma 2, is a direct consequence of Lemma 4.
Lemma 5.
There exists a universal constant such that the following holds. Fix any and any binary-input MAC characterized by . Recall that . Then for any where , we have
for each .
Combining Lemma 5, Definition 7 and Proposition 1, we obtain the following proposition, whose proof is analogous to the proof of Proposition 2 and hence omitted.
Proposition 4.
There exists a universal constant such that the following holds. Fix any and any N-source binary-input MAC characterized by . In addition, fix any , let and define
for each where the superscript “MD” stands for “moderate deviations”. Then, the corresponding uniform-input polar code described in Definition 9 satisfies
and
6.3. Uniform-Input Polar Codes for the AWGN Channel
Proposition 5.
There exists a universal constant such that the following holds. Fix any . Suppose we are given an polar code (cf. Definition 14) defined for the AWGN channel with a 2-origin (i.e., . Define where contains 1 origin and non-zero real numbers. Then, the polar code is an -code (cf. Definition 1) which satisfies
and
for all where is the distribution on as defined in (52).
Proof.
The proposition follows from inspecting Proposition 4 and Definition 14 with the identifications and . ☐
The following theorem develops the tradeoff between the gap to capacity and the decay rate of the error probability for polar codes defined for the AWGN channel.
Theorem 2.
Fix a . There exists a constant that depends on P and γ but not n such that the following holds for any where . There exists an polar code defined for the AWGN channel that satisfies,
and,
Proof.
By Proposition 5 and Lemma 3, there exists a constant that depends on P and γ but not n such that for any where , there exists an and the corresponding polar code that satisfies (78),
and
Remark 4.
A candidate of in Theorem 2 can been explicitly constructed according to Lemma 3 with the identification .
7. Concluding Remarks
In this paper, we provided an upper bound on the scaling exponent of polar codes for the AWGN channel (Theorem 1). In addition, in Theorem 2 we have shown a moderate deviations result—namely, the existence of polar codes which obey a certain tradeoff between the gap to capacity and the decay rate of the error probability for the AWGN channel.
Since the encoding and decoding complexities of the binary-input polar code for a BMC are as long as we allow pseudorandom numbers to be shared between the encoder and the decoder for encoding and decoding the randomized frozen bits (e.g., see [3], Section IX), the encoding and decoding complexities of the polar codes for the AWGN channel defined in Definition 14 and Definition 15 are . By a standard probabilistic argument, there must exist a deterministic encoder for the frozen bits such that the decoding error of the polar code for the AWGN channel with the deterministic encoder is no worse than the polar code with randomized frozen bits. In the future, it may be fruitful to develop low-complexity algorithms for finding a good deterministic encoder for encoding the frozen bits. Another interesting direction for future research is to compare the empirical performance between our polar codes in Definitions 14 and 15 and the state-of-the-art polar codes. One may also explore various techniques (e.g., list decoding, cyclic redundancy check (CRC), etc.) to improve the empirical performance of the polar codes constructed herein.
Author Contributions
S. L. Fong carried out the research and wrote the paper. V. Y. F. Tan proposed the research topic, suggested and improved the flow of the presentation in the paper, and verified the correctness of the results.
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A. Proof of Proposition 1
Unless specified otherwise, all the probabilities in this proof are evaluated according to the distribution induced by the uniform-input polar code. Consider
where (A2) is due to Definition 8 where and . For each and each , we have
where (A4) follows from (30). In addition, it follows from (27) and (30) that
for each and each . Combining (A3), (A6) and (A7), we obtain (33).
Appendix B. Proof of Lemma 3
Let be the conditional distribution that characterizes the AWGN channel and fix a . Recall the definitions of and in (52) and (54) respectively and recall that is the cdf of . Fix a sufficiently large that satisfies
and
In addition, recall the definition of in (55) and let be a quantization function such that,
where is the unique integer that satisfies
In words, g quantizes every to its nearest point in whose magnitude is smaller than . Let
be the quantized version of X. By construction,
and
for all . It follows from (A15) and the definition of in (52) that
and
where . Consequently, in order to show (56) and (57), it suffices to show
and
respectively. Using (A13) and the definition of in (54), we obtain (A18). In order to show (A19), we consider the following chain of inequalities:
where
- (A20) is due to (A13).
- (A23) is due to Markov’s inequality.
- (A25) is due to the fact that for all .
- (A27) is due to the assumption that .
Equation (58) remains to be shown. To this end, we let denote the distribution of the standard normal random variable (cf. (1)) and consider
where (A29) is due to the definition of in (54). In order to simplify the right hand side of (A29), we invoke Corollary 4 of [20] and obtain
After some tedious calculations which will be elaborated after this proof, it can be shown that the Wasserstein distance in (A30) satisfies
where
On the other hand, since
for each by Taylor’s theorem and by (A8), we have
Using (A29), (A30), (A31) and (A34), we obtain
Consequently, (58) holds for some constant that does not depend on n.
Derivation of (A31)
Consider the distribution (coupling) defined as
and simplify the Wasserstein distance in (A30) as follows:
where
- (A37) follows from the definition of in (6) and the fact due to (A36) that and .
- (A38) follows from the fact due to (A36) that .
- (A39) is due to (A36).
Following (A39), we define to be the positive number that satisfies
and consider
where (A42) follows from the fact due to (A10) that for all . In order to bound the first term in (A43), we let
and consider
where
- (A45) follows from integration by parts.
- (A46) is due to the simple fact that
- (A47) is due to (A40) and (A44).
In order to bound the term in (A47), we note that
by (A9) and (A40) and would like to obtain an upper bound on through the following chain of inequalities:
where
- (A51) is due to (A40).
- (A52) is due to (A50).
Since
by (A55) and , it follows from (A47) that
In order to bound the second term in (A43), we consider
where
- (A60) is due to (A14), the mean value theorem and the fact that the derivative of Φ is always positive and uniformly bounded below by on the interval .
- (A61) is due to (A53).Combining (A39), (A43), (A58) and (A62) and recalling the definition of κ in (A32), we obtain (A31).
References
- Cover, T.M.; Thomas, J.A. Elements of Information Theory; John Wiley and Sons Inc.: Hoboken, NJ, USA, 2006. [Google Scholar]
- Shannon, C.E. A Mathematical Theory of Communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
- Arıkan, E. Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Trans. Inf. Theory 2009, 55, 1–23. [Google Scholar]
- Mondelli, M.; Hassani, S.H.; Urbanke, R. Unified scaling of polar codes: Error exponent, scaling exponent, moderate deviations, and error floors. IEEE Trans. Inf. Theory 2016, 62, 6698–6712. [Google Scholar] [CrossRef]
- Hassani, S.H.; Alishahi, K.; Urbanke, R. Finite-length scaling for polar codes. IEEE Trans. Inf. Theory 2014, 60, 5875–5898. [Google Scholar] [CrossRef]
- Goldin, D.; Burshtein, D. Improved Bounds on the Finite Length Scaling of Polar Codes. IEEE Trans. Inf. Theory 2014, 60, 6966–6978. [Google Scholar] [CrossRef]
- Fong, S.L.; Tan, V.Y.F. On the Scaling Exponent of Polar Codes for Binary-Input Energy-Harvesting Channels. IEEE J. Sel. Areas Commun. 2016, 34, 3540–3551. [Google Scholar] [CrossRef]
- Mahdavifar, H. Fast Polarization and Finite-Length Scaling for Non-Stationary Channels. arXiv, 2016; arXiv:1611.04203. [Google Scholar]
- Şaşoğlu, E.; Telatar, I.; Arıkan, E. Polarization of arbitrary discrete memoryless channels. In Proceedings of the 2009 IEEE Information Theory Workshop, Taormina, Italy, 11–16 October 2009; pp. 114–118. [Google Scholar]
- Sutter, D.; Renes, J.M.; Dupuis, F.; Renner, R. Achieving the capacity of any DMC using only polar codes. In Proceedings of the 2012 IEEE Information Theory Workshop, Lausanne, Switzerland, 3–7 September 2012; pp. 114–118. [Google Scholar]
- Honda, J.; Yamamoto, H. Polar coding without alphabet extension for asymmetric models. IEEE Trans. Inf. Theory 2013, 59, 7829–7838. [Google Scholar] [CrossRef]
- Mondelli, M.; Urbanke, R.; Hassani, S.H. How to Achieve the Capacity of Asymmetric Channels. In Proceedings of the 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 30 September–3 October 2014; pp. 789–796. [Google Scholar]
- Abbe, E.; Barron, A. Polar coding schemes for the AWGN channel. In Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, St. Petersburg, Russia, 31 July–5 August 2011; pp. 194–198. [Google Scholar]
- Abbe, E.; Telatar, E. Polar Codes for the m-User Multiple Access Channel. IEEE Trans. Inf. Theory 2012, 58, 5437–5448. [Google Scholar] [CrossRef]
- Altuğ, Y.; Wagner, A.B. Moderate Deviations in Channel Coding. IEEE Trans. Inf. Theory 2014, 20, 4417–4426. [Google Scholar]
- Mahdavifar, H.; El-Khamy, M.; Lee, J.; Kang, I. Achieving the Uniform Rate Region of General Multiple Access Channels by Polar Coding. IEEE Trans. Commun. 2016, 64, 467–478. [Google Scholar] [CrossRef]
- Polyanskiy, Y.; Poor, H.V.; Verdú, S. Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Theory 2010, 56, 2307–2359. [Google Scholar] [CrossRef]
- Strassen, V. Asymptotische Abschätzungen in Shannons Informationstheorie. Trans. Third Prague Conf. Inf. Theory 1962, 689–723. [Google Scholar]
- Hayashi, M. Information spectrum approach to second-order coding rate in channel coding. IEEE Trans. Inf. Theory 2009, 55, 4947–4966. [Google Scholar] [CrossRef]
- Polyanskiy, Y.; Wu, Y. Wasserstein Continuity of Entropy and Outer Bounds for Interference Channels. IEEE Trans. Inf. Theory 2016, 62, 3992–4002. [Google Scholar] [CrossRef]
© 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).