Next Article in Journal
Characterizing the Complexity of Weighted Networks via Graph Embedding and Point Pattern Analysis
Next Article in Special Issue
Multi-Class Cost-Constrained Random Coding for Correlated Sources over the Multiple-Access Channel
Previous Article in Journal
An Efficient Algorithm to Count Tree-Like Graphs with a Given Number of Vertices and Self-Loops
Previous Article in Special Issue
Finite-Length Analyses for Source and Channel Coding on Markov Chains
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Time-Limited Codewords over Band-Limited Channels: Data Rates and the Dimension of the W-T Space

by
Youssef Jaffal
* and
Ibrahim Abou-Faycal
Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(9), 924; https://doi.org/10.3390/e22090924
Submission received: 6 July 2020 / Revised: 10 August 2020 / Accepted: 19 August 2020 / Published: 23 August 2020
(This article belongs to the Special Issue Finite-Length Information Theory)

Abstract

:
We consider a communication system whereby T-seconds time-limited codewords are transmitted over a W-Hz band-limited additive white Gaussian noise channel. In the asymptotic regime as W T , it is known that the maximal achievable rates with such a scheme converge to Shannon’s capacity with the presence of 2 W T degrees of freedom. In this work we study the degrees of freedom and the achievable information rates for finite values of W T . We use prolate spheroidal wave functions to obtain an information lossless equivalent discrete formulation and then we apply Polyanskiy’s results on coding in the finite block-length regime. We derive upper and lower bounds on the achievable rates and the corresponding degrees of freedom and we numerically evaluate them for sample values of 2 W T . The bounds are asymptotically tight and numerical computations show the gap between them decreases as 2 W T increases. Additionally, the possible decrease from 2 W T in the available degrees of freedom is upper-bounded by a logarithmic function of 2 W T .

1. Introduction

Wireless communication technologies that use radio waves impose tight requirements on the used spectrum as adjacent radio bands may be used by other users or technologies. A specific transmit spectral mask is usually required, a mask that allows the communication system to transmit data within a specific radio band while guaranteeing an acceptable level of interference on the other users or technologies. It is therefore reasonable to consider that in a wireless communication system the transmitter confines its transmitted data within its radio band, and the receiver looks for the transmitted data in this band. The allocated band, the corresponding channel statistics and the available transmit power determine the maximal reliable possible data rate. In his pioneering work, Shannon [1] derived the capacity of band-limited real additive white Gaussian noise (AWGN) channels, which for the complex channel is
C S h a n n o n = 2 W log 2 1 + P 2 N 0 W bits per seconds ,
where W is the bandwidth of the baseband channel, P is the average transmit power and N 0 is the spectrum of the additive circularly symmetric complex white Gaussian noise. Shannon derived first the channel capacity for the discrete time channel as the block length of the codewords grows towards infinity. He then used the sampling theorem which provides a one-to-one relation between the continuous time and discrete time signals: For W-Hz band-limited signals when sampled at a rate of 2 W samples per second, the operation is invertible and information lossless making use of the “sinc” function defined in this manuscript as
sinc ( 2 W t ) = def sin 2 π W t 2 π W t .
While the derived results are mathematically rigorous, some of the made assumptions do not hold in practical settings.
First: the conversion from discrete time to continuous time and vice versa is not practical since the “sinc” function needs an infinite time support. Moreover, the use of any band-limited function with non-zero finite energy is not possible in practice. In the literature, Wyner [2,3] and Gallager [4] tackled this issue and considered the use of T-seconds time-limited codewords. However, they derived asymptotic results as T and reached the same formula (1) derived by Shannon.
In [2], Wyner considered four different physical models and derived the asymptotic channel capacity for each model. Wyner stated that the first two models suffer from some physical difficulties; the assumed noise in the first model results in an infinite noise power at the receiver, and the use of strictly band-limited signals in the second model is not practical and may produce interference between consecutive codewords. On the other hand, he proved that using a noise model with finite power results in infinite capacity. Wyner made some assumptions to avoid these issues in [3] and in the third and fourth models in [2]. He derived the channel capacity of the different models by relating the continuous time to discrete time models as Shannon did in [1], but by using the prolate spheroidal wave functions (PSWFs) and their property that as 2 W T , the first 2 W T PSWFs form asymptotically a complete orthonormal (CON) set for the time-limited and approximately band-limited signals.
Gallager [4] Section 8.5 considered transmitting time-limited signals over an additive real Gaussian noise channel with impulse response h ( t ) . He used an arbitrary power spectral density (PSD) for the noise S N ( f ) and arbitrary filter h ( t ) . As T , he derived the channel capacity to be
C = max p ( f ) 1 2 log 2 1 + p ( f ) | H ( f ) | 2 S N ( f ) d f ,
where H ( f ) is the Fourier transform of the filter h ( t ) and p ( f ) is the transmit spectrum at frequency f subject to
p ( f ) d f P .
In [4] Section 8.3 he considered the special case where H ( f ) is the ideal low pass filter and the noise is white and found the capacity to be the same as the one derived by Shannon, while avoiding the issues of infinite noise power and infinite capacity. In that special case (where H ( f ) is the ideal low pass filter) the transformation between continuous time and discrete time was also done through the use of the PSWFs [4] Sections 8.4 and 8.5. Finally, Gallager provided an intuitive argument regarding inter-codeword interference [4] Section 8.5; one can introduce a large guard time, say T 1 ϵ for some ϵ > 0 . Asymptotically, inter-codeword interference is avoided without affecting the data rates since T 1 ϵ / T 0 as T .
A related question is that of determining the degrees of freedom when using T-seconds time-limited codewords over a W-Hz band-limited channel. The space of finite-energy functions that are band-limited and time-limited contains only the zero function. It is nevertheless commonly accepted in the literature that the dimension of the W-T space is approximately 2 W T . This argument is supported by results in [5,6,7,8,9] that were also derived in the asymptotic regime as W T , something that we intend to relax hereafter.
Recently, in [10,11], we studied the use of T-seconds time-limited pulses over W-Hz real band-limited Gaussian channels, and derived the channel capacity by allowing the time duration of the codewords to grow towards infinity. In [10], we considered a pulse amplitude modulation (PAM) system and we studied optimal signaling; we showed that one can approach Shannon’s capacity by signaling at faster than the Nyquist rate. In [11], we considered a combined PAM-orthogonal multi-pulse modulation scheme (PAM-OMM) and derived the achievable rates and evaluated them numerically. We showed that these rates can be made arbitrarily close to the Shannon’s capacity by using a finite number of parallel filters. We also established that there are 2 W T degrees of freedom when using such system.
Second: the second questionable assumption in practical settings is the use of infinite block-length codewords which is not feasible. In [12], Polyanskiy derived an approximation for the maximal data rates when given a target probability of error in the finite block-length regime, where only discrete time channels are considered.
In this work, we consider transmitting continuous time and finite duration codewords over a band-limited Gaussian channel. We use the ideal low pass filter as a model for the channel to force the transmitter to confine its transmitted information and energy in the allocated band and also model good receiver designs: Given any practical low pass filter, one can implement a sharper low pass filter that is closer to the ideal one. In such a model, there are no issues when it comes to infinite noise power and/or infinite capacity, however inter-codeword interference is inevitable.
Our main goal is to investigate the degrees of freedom and the achievable pairs of data rates and probability of error. We use a similar approach to [2,3,4] (using the PSWFs) to transform the problem from continuous time to discrete time and vice versa, and then we apply the adapted results by Polyanskiy for parallel discrete time AWGN channels.
Recently, in [13], we investigated the ‘dual’ problem where we derived an upper bound and a lower bound on the rates of source coding a T-seconds finite duration piece from a W-Hz band-limited real white Gaussian process.
The paper is organized as follows: in Section 2, we provide a brief overview of the PSWFs, some relevant properties in addition to some numerical computations. In Section 3, we present our system model and formulate the problem. We derive upper and lower bounds for the data rates and the corresponding degrees of freedom in Section 4. In Section 5, we present the results of our numerical computations. In Section 6, we present some possible enhancements on the bounds, and we summarize the results and conclude in Section 7.

2. Preliminaries: The Prolate Spheroidal Wave Functions

In [14], Slepian and Pollak showed that the PSWFs possess properties that make them useful in the Fourier analysis of band-limited functions and time-limited functions. For any c = π W T > 0 , they defined the PSWFs as an infinitely countable set of real functions φ c , l ( t ) l , normalized solutions of the integral equation where for every l ,
λ c , l φ c , l ( t ) = T 2 T 2 sin 2 π W ( t s ) π ( t s ) φ c , l ( s ) d s , t .
The PSWFs form a CON set for band-limited functions [14] with
φ c , l ( t ) φ c , m ( t ) d t = δ l m , l , m × ,
where δ l m is the Kronecker delta. Additionally, these functions are orthogonal over the time window T:
T 2 T 2 φ c , l ( t ) φ c , m ( t ) d t = λ c , l δ l m , l , m × ,
where λ c , l l are the eigenvalues that are all in the range 0 < λ c , l < 1 and decreasing in l [14]. The eigenvalue λ c , l may be hence viewed as the energy concentration of φ c , l ( t ) in the time interval T 2 , T 2 and φ c , 0 ( t ) has the highest energy concentration. Additionally, the PSWFs are real continuous functions that are even when l is even and odd when l is odd.
In his book [4] Section 8.4, Gallager proved that the PSWFs are the desirable functions when sending time-limited signals over a band-limited channel. He made use of one important property of the PSWFs, namely the Fourier transform Φ c , l ( f ) of the PSWF φ c , l ( t ) is a scaled version of a time-limited PSWF:
Φ c , l ( f ) = j l T 2 W λ c , l φ c , l T 2 W f for f W , W 0 otherwise = j l T 2 W λ c , l φ c , l T 2 W f rect f 2 W
where j = def 1 .
In this paper we define c = def 2 W T as index for the PSWFs, which is different from the one used by Slepian and Pollak. More specifically φ 1 , l ( t ) here is the same as φ π 2 , l ( t ) in [14]. We also denote here by “ D φ c , l ( t ) ” the T-seconds time-limited version of a PSWF. More specifically,
D φ c , l ( t ) = def φ c , l ( t ) rect t T ,
and since λ c , l is its energy, the normalized time-limited PSWF is D φ c , l ( t ) λ c , l . We denote by Φ c , l D ( f ) the Fourier transform of D φ c , l ( t ) λ c , l which is equal to
Φ c , l D ( f ) = j l T 2 W φ c , l T 2 W f , f .
Based on (2)–(4), when D φ c , l ( t ) λ c , l is passed through an ideal low pass filter with transfer function f 2 W , the output is λ c , l φ c , l ( t ) :
D φ c , l ( t ) λ c , l 2 W sinc 2 W t = λ c , l φ c , l ( t ) .
We have used a debugged version of the software package by Adelman et al. [15] to compute the eigenvalues of the PSWFs. While it is known [4] Section 8.4 that for any ϵ > 0
lim c λ c , ( 1 + ϵ ) c = 0 & lim c λ c , ( 1 ϵ ) c = 1 ,
Figure 1 shows the eigenvalues λ c , l of the PSWFs for c = 100 and 84 l 116 . Note that
λ 100 , l < 10 5 for l > 107 , & λ 100 , l > 1 10 5 for l < 92 .
This transition region between the “extreme” eigenvalues (very close to 1 or 0) is known to have a length proportional to the logarithm of c [4] Section 8.4. For example, for c = 2000 , λ 2000 , l is between 10 5 and 1 10 5 only in the range 1988 < l < 2011 .
In this manuscript, shifted (in time and frequency) PSWFs will come in handy. Denote by α c , l , m k , h the inner product between the l t h normalized time-limited PSWF already shifted in time and frequency by k T -seconds and h 2 W -Hz, respectively, and the band-limited version of the m t h normalized time-limited PSWF. By Equation (5) and using Parseval,
α c , l , m k , h = def D φ c , l ( t k T ) λ c , l e j 2 π h 2 W ( t k T ) , λ c , m φ c , m ( t ) = Φ c , l D ( f h 2 W ) e j 2 π k T f , Φ c , m D ( f ) rect f 2 W = Φ c , l D ( f h 2 W ) e j 2 π k T f rect f 2 W Φ c , m D ( f ) ,
which can be interpreted as the inner product between the bandlimited shifted normalized l t h PSWF and the m t h normalized time-limited PSWF. In Appendix A, we study the magnitude of α c , l , m k , h and derive various bounds that are used throughout this document.

3. System Model and Problem Formulation

We consider a system model where a T-seconds time-limited codeword is transmitted over a linear Gaussian channel with transfer function H ( f ) —assumed to be an ideal W-Hz low-pass filter, and an additive complex Gaussian noise N ( t ) , assumed to be a stationary W-Hz band-limited “white” process with mean zero and PSD S N ( f ) = N o for f [ W , W ] . With a system in mind whereby other codewords may be transmitted—possibly by other users—consecutively and/or in neighboring bands, we denote by C 0 , 0 ( t ) the codeword carrying the data packet of interest, and by { C k , h ( t ) } ( k , h ) 2 \ { ( 0 , 0 ) } those carrying other data packets, possibly transmitted by other devices and interfering with the message of interest as illustrated in Figure 2. Our model is based on the reasonable assumption that all codewords follow the same modulation techniques, since every frequency band is usually allocated to a unique technology which abides by specific standards, and the neighboring bands are more likely to be used by the same technology.
In what follows, we consider various scenarios where some or all of those interfering codewords are present and we denote by I 2 \ { ( 0 , 0 ) } the set of other present codewords. The overall signal going through the channel can hence be written as the sum of the codeword of interest and the other interfering codewords:
x ( t ) = C 0 , 0 ( t ) + ( k , h ) I C k , h ( t ) ,
where C k , h ( t ) is non-zero only over t [ T / 2 + k T , T / 2 + k T ] . On the receiver side, the data packet of interest is to be recovered from y ( t ) , t [ T / 2 , T / 2 ] , a T-seconds time-limited version of the output of the channel r ( t ) .
We assume that, whenever present, a transmitted codeword satisfies the power constraint,
1 T T 2 T 2 | C k , h ( t + k T ) | 2 d t P .
As Gallager proved that the PSWFs are the desirable CON set when sending a time-limited codeword over a band-limited channel [4] Section 8.4, we use the normalized time-limited PSWF as orthogonal pulses to send the data symbols. Hence the codewords can be written as
C k , h ( t ) = l = 0 a k , h , l D φ c , l ( t k T ) λ c , l e j 2 π h 2 W ( t k T ) - non-zero only on t T 2 + k T , T 2 + k T ,
where c = 2 W T . Representing the continuous time signal C k , h ( t ) by the symbols { a k , h , l } is known as “signal space representation” in the context of digital communications. The { a k , h , l } ’s are chosen from a given complex signal constellation and by Plancherel and (7) they satisfy
1 T l = 0 | a k , h , l | 2 = 1 T T 2 T 2 | C k , h ( t + k T ) | 2 d t P .
When it comes to the noise, N ( t ) is band-limited and can be hence decomposed as
N ( t ) = l = 0 n l φ c , l ( t ) ,
where { n l } l are independent zero-mean complex circular Gaussian random variables with variance N 0 .
At the receiver, sufficient statistics are clearly obtained by projecting y ( t ) on the set of normalized time-limited PSWF to extract the data symbols. It is worth noting that since r ( t ) is band-limited and has finite energy, it is necessarily analytic and it is therefore sufficient to know r ( t ) over any open interval to determine it fully. As a consequence, from an information-theoretic perspective, whether r ( t ) as whole is available or only y ( t ) , the information rates are identical.
The problem at hand is to maximize the information rates given a maximal probability of error. This is naturally related to the available degrees of freedom when sending time-limited codewords over a band-limited channel, which is the maximal number of independent data symbols that can be transmitted to the receiver.
In the following section, we consider various scenarios and derive upper and lower bounds for the data rates and the degrees of freedom.

4. Bounds on the Data Rates

4.1. An Upper Bound

To derive an upper bound, we consider the case where only C 0 , 0 ( t ) is transmitted over the channel. By ignoring the other transmitted codewords we ignore the effect of inter-codeword interference, and we obtain upper bounds on the rates and the degrees of freedom since interference can only be harmful. In this scenario, the input to the channel can be written as
x ( t ) = m = 0 a 0 , 0 , m D φ c , m ( t ) λ c , m ,
and the received signal r ( t ) is band-limited and can be written as
r ( t ) = m = 0 a 0 , 0 , m λ c , m φ c , m ( t ) + N ( t ) = m = 0 a 0 , 0 , m λ c , m + n m φ c , m ( t ) y ( t ) = r ( t ) rect t T = m = 0 a 0 , 0 , m λ c , m + n m D φ c , m ( t ) = m = 0 y m D φ c , m ( t ) ,
where y m = λ c , m a 0 , 0 , m + n m . From an information theoretic perspective, the considered system model is equivalent to the discrete time system model in Figure 3 where r m = y m / λ c , m = a 0 , 0 , m + n m / λ c , m .
The noise components { n m / λ c , m } are independent, zero-mean complex circular Gaussian random variables and each complex channel is equivalent to two usages of independent real (real and imaginary) channels with additive Gaussian noise with variance N 0 / 2 λ c , m per dimension. If 𝖤 | a 0 , 0 , m | 2 = 2 P m T (where P m T is the second moment per dimension), the power constraint in (8) can be written as 2 m = 0 P m P and the signal to noise ratio per dimension for r m is 2 λ c , m P m T N 0 .
One can notice that it is possible to send infinitely many independent symbols in such a system. However, only a finite number of them, say L, is useful because the energy per symbol is finite and the noise energy of the m th channel is increasing towards infinity as m increases to infinity ( λ c , m tends to 0 as m tends to as shown in Section 2). Note that L depends on c = 2 W T since there are approximately c eigenvalues λ c , m that are close to 1, and naturally L grows to infinity with c.
Polyanskiy [12] derived upper and lower bounds and an approximation for the achievable rates at a given probability of error in the finite block-length regime. In [16], he studied the parallel Gaussian channel set-up where N memoryless parallel channels of different noise power are used each n times. Following the methodology in [12] and applying the Berry–Esseen inequality [12] Lemma 14 over n × N real independent variables shows that the maximal number of bits that can be transmitted is
n 2 m = 0 N 1 log 2 1 + 2 λ c , m P m T N 0 n m = 0 N 1 V 1 2 λ c , m P m T N 0 Q 1 ( ϵ ) + O ( log 2 ( n L ) ) bits ,
where
  • ϵ ( 0 , 1 ) is the probability of error,
  • V 1 [ θ ] = θ 2 θ + 2 ( θ + 1 ) 2 log 2 2 e ,
  • { P m } is the water-filling solution such that P m = μ N 0 2 λ c , m T + and n m = 0 N 1 P m = P ,
  • and L is the number of non-zero { P m } ’s, which is less or equal N.
In Polyanskiy’s work [16] N is constant and n grows towards infinity and hence [16] Theorem 4 shows an O ( log 2 n ) term instead of the O ( log 2 n L ) term here in (9). In our setup, each channel m in Figure 3 has a different noise power, but each has two dimensions with the same noise power. In our scenario therefore n = 2 , L is of the order of (and grows with) c and the term O ( log 2 n L ) becomes O ( log 2 L ) as n is constant and equal to 2. These derivations yield the following lemma:
Lemma 1.
An upper bound on the data rates is given by,
R U B ( ϵ , P , c ) = 1 T m = 0 log 2 1 + 2 λ c , m P m T N 0 1 T 2 m = 0 V 1 2 λ c , m P m T N 0 Q 1 ( ϵ ) + 1 T O ( log 2 ( L ) ) b / s . = 1 T m = 0 L 1 log 2 1 + 2 λ c , m P m T N 0 1 T 2 m = 0 L 1 V 1 2 λ c , m P m T N 0 Q 1 ( ϵ ) + 1 T O ( log 2 ( L ) ) b / s .
where
  • ϵ ( 0 , 1 ) is the probability of error,
  • V 1 [ θ ] = θ 2 θ + 2 ( θ + 1 ) 2 log 2 2 e ,
  • { P m } is the water-filling solution such that P m = μ N 0 2 λ c , m T + and 2 m = 0 P m = 2 m = 0 L 1 P m = P ,
  • and L is the number of non-zero { P m } s.

4.2. Lower Bounds

In what follows, we derive a lower bound on the rates by jointly:
Finding an upper bound on the interference.
Using only the first N PSWFs to transmit data.
Subsequently, we optimize over the value of N to obtain tighter bounds as well as lower bounds on the degrees of freedom.
We study below three scenarios for the interference and derive a lower bound for these scenarios.

4.2.1. Consecutive Single Band Codewords (CSB)

We consider first the case where a single band is used and only the codewords { C k , 0 ( t ) } k are transmitted over the channel, i.e., I = { ( k , 0 ) , k * = def \ { 0 } } as shown in Figure 4.
In the case where only the first N PSWFs are used,
x ( t ) = C ( 0 , 0 ) ( t ) + k * C k , 0 ( t ) = l = 0 N 1 a 0 , 0 , l D φ c , l ( t ) λ c , l + k * l = 0 N 1 a k , 0 , l D φ c , l ( t k T ) λ c , l ,
and the received signal is the sum of an information bearing signal, an interfering signal and additive channel noise,
r ( t ) = l = 0 N 1 a 0 , 0 , l λ c , l φ c , l ( t ) + k * l = 0 N 1 a k , 0 , l λ c , l φ c , l ( t k T ) + N ( t ) .
Projecting r ( t ) on the m t h normalized time-limited PSWF—which can be done using an appropriate matched filter—results in
y m = λ c , m a 0 , 0 , m + w m ,
where the interference plus noise term w m is
w m = k * l = 0 N 1 α c , l , m k , 0 a k , 0 , l + λ c , m n m ,
where α c , l , m k , h is defined in Equation (6). Next, we upper bound its second moment,
𝖤 | w m | 2 = 𝖤 | k * l = 0 N 1 α c , l , m k , 0 a k , 0 , l | 2 + λ c , m N 0 = k * 𝖤 | l = 0 N 1 α c , l , m k , 0 a k , 0 , l | 2 + λ c , m N 0 .
Since the { a k , 0 , l } l = 0 N 1 are not necessarily uncorrelated for a fixed k, we use the upper bound
| l = 1 N c l | 2 N l = 1 N | c l | , 2
and the fact that 𝖤 | a k , 0 , l | 2 = 2 P l T to upper bound the second moment
𝖤 | w m | 2 k * N l = 0 N 1 | α c , l , m k , 0 | 2 𝖤 | a k , 0 , l | 2 + λ c , m N 0 = N l = 0 N 1 2 P l T k * | α c , l , m k , 0 | 2 + λ c , m N 0 .
Using the bound (A11) derived in Appendix A
k * | α c , l , m k , 0 | 2 λ c , l ( 1 λ c , l ) 𝖤 | w m | 2 N l = 0 N 1 2 P l T λ c , l ( 1 λ c , l ) + λ c , m N 0 .
Using the alternative bound (A7) and the fact that l = 0 N 1 2 P l T P T ,
k * | α c , l , m k , 0 | 2 λ c , m ( 1 λ c , m ) 𝖤 | w m | 2 λ c , m N ( 1 λ c , m ) P T + N 0 .
Therefore the second moment of the interference term is upper-bounded by
I C S B [ m ] = def min N l = 0 N 1 2 P l T λ c , l ( 1 λ c , l ) , λ c , m N ( 1 λ c , m ) P T ,
and the signal to noise and interference ratio per dimension in y m is lower-bounded by
S C S B [ m ] = def λ c , m 2 2 P m T I C S B [ m ] + λ c , m N 0 .
These derivations yield the following lemma:
Lemma 2.
A lower bound on the data rates is given by
R C S B ( ϵ , P , c ) = max N , { P m } m 1 T m = 0 N 1 log 2 1 + S C S B [ m ] 2 m = 0 N 1 V 1 S C S B [ m ] Q 1 ( ϵ ) + O ( log 2 ( L ) ) ,
where L is the number of non-zero { P m } s.

4.2.2. Single Time-Slot Multi-Band Codewords (STMB)

In this scenario multiple bands in a single time-slot are used and only the codewords { C 0 , h ( t ) } h are transmitted over the channel, i.e., I = { ( 0 , h ) , h * } as shown in Figure 5 below.
As above, the output of the m t h matched filter is
y m = λ c , m a 0 , 0 , m + w m ,
where the interference plus noise term is now
w m = h * l = 0 N 1 α c , l , m 0 , h a 0 , h , l + λ c , m n m .
Using the bound (A12), one can upper bound the second moment of w m ,
h * | α c , l , m 0 , h | 2 λ c , m 2 ( 1 λ c , m ) λ c , l 𝖤 | w m | 2 = 𝖤 | h * l = 0 N 1 α c , l , m 0 , h a 0 , h , l | 2 + λ c , m N 0 λ c , m 2 ( 1 λ c , m ) N l = 0 N 1 2 P l T λ c , l + λ c , m N 0 .
Alternatively, using the bound (A8)
h * | α c , l , m 0 , h | 2 λ c , m ( 1 λ c , l ) 𝖤 | w m | 2 = 𝖤 | h * l = 0 N 1 α c , l , m 0 , h a 0 , h , l | 2 + λ c , m N 0 λ c , m N l = 0 N 1 ( 1 λ c , l ) 2 P l T + λ c , m N 0 .
Therefore the second moment of the interference term is upper-bounded by
I S T M B [ m ] = def min λ c , m 2 ( 1 λ c , m ) N l = 0 N 1 2 P l T λ c , l , λ c , m N l = 0 N 1 ( 1 λ c , l ) 2 P l T .
These derivations yield the following lemma:
Lemma 3.
The corresponding lower bound on the data rates is given by
R S T M B ( ϵ , P , c ) = max N , { P m } m 1 T m = 0 N 1 log 2 1 + S S T M B [ m ] 2 m = 0 N 1 V 1 S S T M B [ m ] Q 1 ( ϵ ) + O ( log 2 ( L ) ) ,
where L is the number of non-zero { P m } ’s and
S S T M B [ m ] = λ c , m 2 2 P m T I S T M B [ m ] + λ c , m N 0 .

4.2.3. Consecutive Multi-Band Codewords (CMB)

We consider now the case where all the codewords { C k , h } ( k , h ) 2 are transmitted over the channel. The analysis follows as above and the interference plus noise term w m is
w m = ( k , h ) 2 \ ( 0 , 0 ) l = 0 N 1 α c , l , m k , h a k , h , l + λ c , m n m = k * l = 0 N 1 α c , l , m k , 0 a k , 0 , l + h * l = 0 N 1 α c , l , m 0 , h a 0 , h , l + ( k , h ) * × * l = 0 N 1 α c , l , m k , h a k , h , l + λ c , m n m .
Upper bounds on the second moments of the first two interference terms have been derived in Section 4.2.1 and Section 4.2.2, respectively, and it remains to derive one for the third term. By Equation (11),
𝖤 | k * h * l = 0 N 1 α c , l , m k , h a k , h , l | 2 N l = 0 N 1 𝖤 | h * k * a k , h , l α c , l , m k , h | 2 = N l = 0 N 1 h * k * 𝖤 | a k , h , l | 2 | α c , l , m k , h | 2 N l = 0 N 1 2 P l T k * h * | α c , l , m k , h | 2 .
Using bound (A13) and Equations (12) and (14),
𝖤 | w m | 2 I C S B [ m ] + I S T M B [ m ] + N l = 0 N 1 ( 1 λ c , l ) 2 P l T + λ c , m N 0
Alternatively, using bound (A14),
𝖤 | w m | 2 I C S B [ m ] + I S T M B [ m ] + N l = 0 N 1 λ c , m λ c , l ( 1 λ c , m ) 2 P l T + λ c , m N 0 ,
Therefore, the second moment on the interference terms is upper-bounded by
I C M B [ m ] = def I C S B [ m ] + I S T M B [ m ] + min N l = 0 N 1 ( 1 λ c , l ) 2 P l T , N l = 0 N 1 λ c , m λ c , l ( 1 λ c , m ) 2 P l T .
These derivations yield the following lemma:
Lemma 4.
The corresponding lower bound on the data rates is given by
R L B ( ϵ , P , c ) = max N , { P m } m 1 T m = 0 N 1 log 2 1 + S C M B [ m ] 2 m = 0 N 1 V 1 S C M B [ m ] Q 1 ( ϵ ) + O ( log 2 ( L ) ) ,
where L is the number of non-zero { P m } s and
S C M B [ m ] = def λ c , m 2 2 P m T I C M B [ m ] + λ c , m N 0 .

5. Numerical Results

In what follows, we use W = 1 KHz and ϵ = 10 3 in our computations. Since we consider the complex base-band channel, an equivalent real pass-band channel will have 2 W -Hz bandwidth (i.e., 2 KHz in our case), and L complex degrees of freedom in base-band is equivalent to 2 L real degrees of freedom in passband.
In the following we evaluate the degrees of freedom and the data rates for different 𝖲𝖭𝖱 levels (in dB) as L depends on the 𝖲𝖭𝖱; for example, since the water-filling algorithm is used for Equation (10), L can be increased by increasing the “water level” in the water-filling algorithm, which means that the 𝖲𝖭𝖱 level must be increased. Note that for a fixed c, the ratio of the derived bounds to Shannon’s capacity depends only on P , N o and W through the ratio P N o W , and the results for W 1 KHz can be extracted from our presented results for an appropriate range of 𝖲𝖭𝖱 = 2 P / N o .
To evaluate the bounds in Equations (10), (13), (15) and (16), we used the optimization toolbox in MATLAB to search for the optimal solution in { P m } m . When it comes to the upper bound (10), the water-filling choice used by Polyanskiy only maximizes the term m = 0 log 2 1 + 2 λ c , m P m T N 0 and not the whole expression. However, the water-filling choice almost achieves the same performance as the optimization routine with negligible differences. When it comes to the term O ( log 2 ( L ) ) , we specialize it to 1 2 log 2 ( 2 L ) for the sake of numerical computations; we used the constant 1 2 as Polyanskiy conjectured in Equation (4.218) in his thesis [12], and we used the term 2 L inside log 2 ( . ) since the number of real independent variables is 2 L (as explained in Section 4.1).

5.1. Upper Bound

To solve Equation (10), we maximize the following quantity using the optimization tool in MATLAB
R U B N = max P m 1 T m = 0 N 1 log 2 1 + 2 λ c , m P m T N 0 1 T 2 m = 0 N 1 V 1 2 λ c , m P m T N 0 Q 1 ( ϵ ) ,
over { P m } m N 1 for different values of N. The solution being decreasing with m, L is the value of N where R U B N saturates (which is the same as the number of non-zero P m ’s after saturation). We adopt similar method and notations for all the bounds presented hereafter.
Figure 6 shows the obtained R U B N for c = 1000 and at 𝖲𝖭𝖱 = 50 dB, and in this example the obtained degrees of freedom are L = 1004 . The upper bound on the rates is
R U B ( ϵ , P , c ) = R U B L + 1 2 T log 2 ( 2 L ) bits / sec .
We compute L and the corresponding upper bound R U B for different values of c and for different levels of 𝖲𝖭𝖱. Figure 7 shows the difference ( L c ) between the obtained degrees of freedom and c = 2 W T , and as expected, L increases as the 𝖲𝖭𝖱 increases (in a manner akin to the water-filling solution: as the water level increases, it is possible to use additional PSWFs). However, the additional degrees of freedom (beyond c) increase slowly with c and L / c 1 as c increases towards infinity.
In Figure 8 we plot the obtained upper bound on the rates together with the Shannon capacity. We notice that the gap between the upper bounds and the Shannon capacity decreases as c increases.
The ratio of the bounds to the Shannon capacity can be seen in Figure 10 below.

5.2. Lower Bounds

In this section, we present the numerical results for Section 4.2.1, Section 4.2.2 and Section 4.2.3 (Equations (13), (15) and (16)), and we apply the same numerical method we used in the previous section. We notice that the lower bounds when using either CSB or STMB are almost the same with no significant differences and we omit the results for CSB.
Figure 9 shows the obtained lower bounds on the degrees of freedom. We note that for given scenario (CSB, STMB or the general lower bound), the results are almost the same for different 𝖲𝖭𝖱 levels; increasing the signal power will only lead to increasing the power of the interference (see Equations (13), (15) and (16)), and the effect on the signal to interference ratio remains negligible. Moreover, the results for the different scenarios are very close ( ± 1 on average). Although L c decreases as c increases, it decreases slowly and L / c 1 as c increases towards infinity.
We propose approximating the degrees of freedom for the general lower bound by the following equation
L L B = ^ c 1.35 log 2 ( c ) + 3.25 ,
and we draw “ L L B c ” in Figure 9. It is expected that “ L L B c ” is a logarithmic function of c since the transition region of the eigenvalues of PSWFs is a logarithmic function of c (as shown in Section 2).
Figure 10 shows the ratio of the obtained bounds to the Shannon capacity. For a fixed c and as 𝖲𝖭𝖱 increases, the bounds get relatively closer to capacity and the gap between the upper bound and the lower bound increases. In addition, for a fixed 𝖲𝖭𝖱, as c increases, the gap between the bounds decreases.

6. Possible Enhancements on the Bounds

Since the obtained upper and lower bounds on the rates (Figure 10) are very close for 𝖲𝖭𝖱 = 30 dB, the bounds are tight and a good approximation for the optimal data rates is reached. However, the gap between the upper and lower bounds increases as the 𝖲𝖭𝖱 increases. For instance, the gap between the upper and lower bounds for c = 200 and 𝖲𝖭𝖱 = 70 dB is 5.5 % of Shannon’s capacity, which means that one or both bounds are loose. In the following we present some possible improvements on the bounds.

6.1. A Tighter Upper Bound

To derive the upper bound, we ignored the interference due to other codewords and the obtained degrees of freedom surpassed 2 W T for 𝖲𝖭𝖱 ∈ {50 dB,70 dB}. However, the results in the literature shows that the asymptotic dimension of the W-T space is 2 W T , and thus adding the constraint that the the codewords must be time-limited will not increase the available degrees of freedom. So one can conclude that our upper bound on the degrees of freedom is not tight. One possible way to improve this upper bound is to force the degrees of freedom to be at most 2 W T , and hence, L in constrained to be less or equal to 2 W T in Equation (10). In other words, the normalized time-limited PSWFs D φ c , m ( t ) λ c , m with m 2 W T will not be used to transmit data and their allocated power P m ’s are forced to be zero. The obtained upper bound will decrease and hence the gap between the upper and lower bounds will decrease.
In Figure 11 we present the numerical values for the tighter upper bound (TUB) in addition to those of the upper bound. When c = 200 , we note that the tighter upper bound achieves improvements of 0.8 % and 1.5 % for 𝖲𝖭𝖱 = 50 dB and 𝖲𝖭𝖱 = 70 dB, respectively.

6.2. Introducing a Guard Time or a Guard Band between the Codewords

The use of a guard time or a guard band is expected to decrease the effect of inter-codeword interference which drives towards increasing the achievable rates. On the other hand a portion of the time resources or frequency resources will not be used which decreases the data rates. Therefore, there must be an optimal guard time and an optimal guard band that maintain a good trade-off between the lost resources and the improvement of the inter-codeword interference.
Using a guard time T G reduces the upper bound to R U B ( T G ) = R U B T T + T G , but introducing a guard band does not affect it. When it comes to the lower bound, deriving a closed form expression has proven to be difficult.
Nevertheless, if adding a guard time is beneficial, we can state that the optimal guard time T G * must satisfy R U B ( T G * ) R L B where R U B and R L B are given by Equations (10) and (16) and hence T G * T R U B R L B 1 . In Figure 12, we draw the obtained upper bound on T G * . Naturally, it increases as the 𝖲𝖭𝖱 increases since the relative difference between the bounds increases as the 𝖲𝖭𝖱 increases.

7. Summary and Conclusions

In this work, we studied the maximal achievable rates and the available degrees of freedom when transmitting T-seconds time-limited codewords over a W-Hz band-limited AWGN channel. We made use of the prolate spheroidal wave functions to switch to discrete time and then applied the results by Polyanskiy. We derived the upper bound by ignoring the interference due to other codewords, and we derived lower bounds by deriving upper bounds on the inter-codeword interference. The derived bounds were found to be tight for for low values of 𝖲𝖭𝖱/W (for example W = 1 KHz and 𝖲𝖭𝖱 = 30 dB or equivalently W = 100 KHz and 𝖲𝖭𝖱 = 50 dB). However, the gap between the bounds increases as this 𝖲𝖭𝖱/W ratio increases.
When it comes to the available degrees of freedom, the numerical results showed that the potential decrease from 2 W T is upper bounded by a logarithmic function of 2 W T and hence the relative reduction is asymptotically negligible.
Based on the results of this work, one can approximate the achievable data rates by
R ( ϵ , P , c ) = L T log 2 1 + P T N 0 L 2 L T V 1 P T N 0 L Q 1 ( ϵ ) + 1 2 T log 2 ( 2 L ) ,
where V 1 ( θ ) = θ 2 θ + 2 ( θ + 1 ) 2 log 2 2 e and L is in the range c 1.35 log 2 ( c ) + 3.25 L c . This approximation is guaranteed to be between the derived bounds, and hence is a “good” one for low values of 𝖲𝖭𝖱 / W .

Author Contributions

Writing—original draft, Y.J. and I.A.-F.; Writing—review & editing, Y.J. and I.A.-F. Both authors contributed equally on all stages of this work: formulated and solved the problem and prepared the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

The authors would like to acknowledge the American University of Beirut (AUB) and the National Council for Scientific Research of Lebanon (CNRS-L) for granting a doctoral fellowship to Youssef Jaffal.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Properties of α c , l , m k , h

The inner product between the l t h normalized time-limited PSWF already shifted in time and frequency by k T -seconds and h 2 W -Hz respectively, and the band-limited version of the m t h normalized time-limited PSWF is denoted in this document by α c , l , m k , h . By Equation (5) and using Parseval,
α c , l , m k , 0 = def D φ c , l ( t k T ) λ c , l e j 2 π h 2 W ( t k T ) , λ c , m φ c , m ( t ) = Φ c , l D ( f h 2 W ) e j 2 π k T f , Φ c , m D ( f ) rect f 2 W = Φ c , l D ( f h 2 W ) e j 2 π k T f rect f 2 W , Φ c , m D ( f ) .
Property A1.
The coefficients α c , l , m k , h satisfy
α c , l , m k , h = j m l λ c , m λ c , l α c , m , l h , k .
Proof. 
This can be readily obtained by noting that by (4)
α c , l , m k , h = D φ c , l ( t k T ) λ c , l e j 2 π h 2 W ( t k T ) , λ c , m φ c , m ( t ) = Φ c , l D ( f h 2 W ) e j 2 π k T f rect f 2 W , Φ c , m D ( f ) = j l T 2 W φ c , l T 2 W ( f h 2 W ) e j 2 π k T f rect f 2 W , j m T 2 W φ c , m T 2 W f = j l m T 2 W φ c , l T 2 W ( f h 2 W ) , φ c , m T 2 W f rect f 2 W e j 2 π k T f
By a change of variable ν = T f / 2 W ,
α c , l , m k , h = j l m φ c , l ( ν h T ) φ c , m ( ν ) rect ν T e j 2 π k 2 W ν = j l m φ c , l ( ν ) D φ c , m ( ν + h T ) e j 2 π k 2 W ( ν + h T ) = j l m λ c , m λ c , l D φ c , m ( ν + h T ) λ c , m e j 2 π k 2 W ( ν + h T ) , λ c , l φ c , l ( ν ) = j m l λ c , m λ c , l α c , m , l h , k .

Upper Bounds

Various upper bounds on the magnitude of α c , l , m k , h may be found using Cauchy Schwarz’s inequality.
Property A2.
The magnitude of α c , l , m k , h is upperbounded by
| α c , l , m k , h | 2 λ c , m ( 2 k 1 ) T / 2 ( 2 k + 1 ) T / 2 | φ c , m ( t ) | 2 d t
| α c , l , m k , h | 2 λ c , m ( 2 h 1 ) T / 2 ( 2 h + 1 ) T / 2 | φ c , l ( t ) | 2 d t
| α c , l , m k , h | 2 ( 2 k 1 ) T / 2 ( 2 k + 1 ) T / 2 | g h , l ( t ) | 2 d t
| α c , l , m k , h | 2 λ c , m λ c , l ( 2 h 1 ) T / 2 ( 2 h + 1 ) T / 2 | g k , m ( t ) | 2 d t
where
g h , l ( t ) = def D φ c , l ( t ) λ c , l e j 2 π h 2 W t 2 W 2 W t G h , l ( f ) = def Φ c , l D ( f h 2 W ) rect f 2 W .
Before proceeding to the proof, we specialize the bounds (A3) and (A4) to the values of h = 0 and k = 0 respectively. Using the fact that g 0 , l ( t ) = D φ c , l ( t ) λ c , l 2 W sinc 2 W t = λ c , l φ c , l ( t ) ,
| α c , l , m k , 0 | 2 ( 2 k 1 ) T / 2 ( 2 k + 1 ) T / 2 | g 0 , l ( t ) | 2 d t = λ c , l ( 2 k 1 ) T / 2 ( 2 k + 1 ) T / 2 | φ c , l ( t ) | 2 d t
| α c , l , m 0 , h | 2 λ c , m λ c , l ( 2 h 1 ) T / 2 ( 2 h + 1 ) T / 2 | g 0 , m ( t ) | 2 d t = λ c , m 2 λ c , l ( 2 h 1 ) T / 2 ( 2 h + 1 ) T / 2 | φ c , m ( t ) | 2 d t .
Proof. 
Bound (A1) is obtained by using Cauchy Schwarz,
α c , l , m k , h = D φ c , l ( t k T ) λ c , l e j 2 π h 2 W ( t k T ) , λ c , m φ c , m ( t ) = D φ c , l ( t k T ) λ c , l e j 2 π h 2 W ( t k T ) , λ c , m φ c , m ( t ) rect t k T T | α c , l , m k , h | 2 λ c , m φ c , m ( t ) rect t k T T 2 D φ c , l ( t k T ) λ c , l 2 = λ c , m ( 2 k 1 ) T / 2 ( 2 k + 1 ) T / 2 | φ c , m ( t ) | 2 d t .
When it comes to (A2), using Property A1,
| α c , l , m k , h | 2 = λ c , m λ c , l | α c , l , m k , h | 2 λ c , m ( 2 h 1 ) T / 2 ( 2 h + 1 ) T / 2 | φ c , l ( t ) | 2 d t .
Bound (A3) may be derived as follows:
α c , l , m k , h = Φ c , l D ( f h 2 W ) e j 2 π k T f rect f 2 W , Φ c , m D ( f ) = Φ c , l D ( f h 2 W ) rect f 2 W , Φ c , m D ( f ) e j 2 π k T f = G h , l ( f ) , Φ c , m D ( f ) e j 2 π k T f = g h , l ( t ) D φ c , m ( t + k T ) λ c , m = g h , l ( t ) rect t + k T T , D φ c , m ( t + k T ) λ c , m ,
and hence, by Cauchy Schwarz
| α c , l , m k , h | 2 ( 2 k 1 ) T / 2 ( 2 k + 1 ) T / 2 | g h , l ( t ) | 2 d t .
Using Property A1, bound (A4) is readily obtained
| α c , l , m k , h | 2 = λ c , m λ c , l | α c , m , l h , k | 2 λ c , m λ c , l ( 2 h 1 ) T / 2 ( 2 h + 1 ) T / 2 | g k , m ( t ) | 2 d t .
When it comes to sums over one index, one can immediately obtain the following inequalities.
Corollary A1.
The following bounds are directly obtained from the respective bounds derived above.
k * | α c , l , m k , h | 2 λ c , m ( 1 λ c , m )
h * | α c , l , m k , h | 2 λ c , m ( 1 λ c , l )
k * | α c , l , m k , h | 2 g h , l ( t ) 2 T / 2 T / 2 | g h , l ( t ) | 2 d t g h , l ( t ) 2
h * | α c , l , m k , h | 2 λ c , m λ c , l g k , m ( t ) 2 T / 2 T / 2 | g k , m ( t ) | 2 d t λ c , m λ c , l g k , m ( t ) 2
k * | α c , l , m k , h | 2 λ c , l ( 1 λ c , l )
h * | α c , l , m k , h | 2 λ c , m 2 λ c , l ( 1 λ c , m ) .
Finally, considering sums over the two indices k and h, we note by Plancherel that
h * g h , l ( t ) 2 = h * G h , l ( f ) 2 = h * ( 2 h 1 ) W ( 2 h + 1 ) W | Φ c , l D ( f ) | 2 d f = ( 1 λ c , l ) ,
and hence bounds (A9) and (A10) imply
h * k * | α c , l , m k , h | 2 ( 1 λ c , l )
h * k * | α c , l , m k , h | 2 λ c , m λ c , l ( 1 λ c , m ) .

References

  1. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423, 623–656. [Google Scholar] [CrossRef] [Green Version]
  2. Wyner, A.D. The Capacity of the band-Limited Gaussian Channel. Bell Syst. Tech. J. 1965, 45, 359–395. [Google Scholar] [CrossRef]
  3. Wyner, A.D. A Note on The Capacity of the Band-Limited Gaussian Channel. Bell Syst. Tech. J. 1976, 55, 343–346. [Google Scholar] [CrossRef]
  4. Gallager, R.G. Information Theory and Reliable Communication; John Wiley & Sons: New York, NY, USA, 1968. [Google Scholar]
  5. Nyquist, H. Certain Topics in Telegraph Transmission Theory. AIEE Trans. 1928, 47, 617–644. [Google Scholar] [CrossRef]
  6. Gabor, D. Theory of Communication. J. Inst. Elect. Eng. (Lond.) 1946, 93, 429–457. [Google Scholar] [CrossRef]
  7. Shannon, C.E. Communication in the Presence of Noise. Proc. IRE 1949, 37, 10–21. [Google Scholar] [CrossRef]
  8. Landau, H.J.; Pollak, H.O. Prolate Spheroidal Wave Functions, Fourier Analysis and Uncertainty-III: The Dimension of the Space Essentially Time- and Band-Limited Signals. Bell Syst. Tech. J. 1962, 41, 1295–1336. [Google Scholar] [CrossRef]
  9. Slepian, D. On Bandwidth. Proc. IEEE 1976, 64, 292–300. [Google Scholar] [CrossRef]
  10. Jaffal, Y.; Abou-Faycal, I. Achievable rates using PAM time-limited pulses over band-limited channels: From Nyquist to FTN. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019; pp. 1–6. [Google Scholar]
  11. Jaffal, Y.; Abou-Faycal, I. Using time-limited pulses in a combined PAM-OMM system over band-limited channels. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019; pp. 1–7. [Google Scholar]
  12. Polyanskiy, Y. Channel Coding: Non-Asymptotic Fundamental Limits. PhD Thesis, Princeton University, Princeton, NJ, USA, 2010. [Google Scholar]
  13. Jaffal, Y.; Abou-Faycal, I. Lossy coding of a time-limited piece of a band-limited white Gaussian source. In Proceedings of the IEEE International Symposium on Information Theory (ISIT 2020), Los Angeles, CA, USA, 21–26 June 2020; pp. 2327–2331. [Google Scholar]
  14. Slepian, D.; Pollak, H. Prolate Spheroidal Wave Functions, Fourier Analysis and Uncertainty-I. Bell Syst. Tech. J. 1961, 40, 43–64. [Google Scholar] [CrossRef]
  15. Adelman, R.; Gumerov, N.; Duraiswami, R. Software for computing the spheroidal wave functions using arbitrary precision arithmetic. arXiv 2014, arXiv:1408.0074. [Google Scholar]
  16. Polyanskiy, Y.; Poor, H.V.; Verdú, S. Dispersion of Gaussian channels. In Proceedings of the IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, 28 June–3 July 2009; pp. 2204–2208. [Google Scholar]
Figure 1. Eigenvalues of prolate spheroidal wave functions (PSWFs) for c = 100 and 84 l 116 .
Figure 1. Eigenvalues of prolate spheroidal wave functions (PSWFs) for c = 100 and 84 l 116 .
Entropy 22 00924 g001
Figure 2. Continuous time system model.
Figure 2. Continuous time system model.
Entropy 22 00924 g002
Figure 3. Equivalent discrete time system model.
Figure 3. Equivalent discrete time system model.
Entropy 22 00924 g003
Figure 4. Single band interference.
Figure 4. Single band interference.
Entropy 22 00924 g004
Figure 5. Single time-slot interference.
Figure 5. Single time-slot interference.
Entropy 22 00924 g005
Figure 6. Saturation of R U B N for c = 1000 and 𝖲𝖭𝖱 = 50 dB.
Figure 6. Saturation of R U B N for c = 1000 and 𝖲𝖭𝖱 = 50 dB.
Entropy 22 00924 g006
Figure 7. Upper bounds on the degrees of freedom.
Figure 7. Upper bounds on the degrees of freedom.
Entropy 22 00924 g007
Figure 8. Upper bounds on the data rates.
Figure 8. Upper bounds on the data rates.
Entropy 22 00924 g008
Figure 9. Lower bounds on the degrees of freedom.
Figure 9. Lower bounds on the degrees of freedom.
Entropy 22 00924 g009
Figure 10. Upper and lower bounds on the rates.
Figure 10. Upper and lower bounds on the rates.
Entropy 22 00924 g010
Figure 11. Tighter upper bound on the rates vs. the old ones.
Figure 11. Tighter upper bound on the rates vs. the old ones.
Entropy 22 00924 g011
Figure 12. Upper bound on T G * T for different 𝖲𝖭𝖱 levels.
Figure 12. Upper bound on T G * T for different 𝖲𝖭𝖱 levels.
Entropy 22 00924 g012

Share and Cite

MDPI and ACS Style

Jaffal, Y.; Abou-Faycal, I. Time-Limited Codewords over Band-Limited Channels: Data Rates and the Dimension of the W-T Space. Entropy 2020, 22, 924. https://doi.org/10.3390/e22090924

AMA Style

Jaffal Y, Abou-Faycal I. Time-Limited Codewords over Band-Limited Channels: Data Rates and the Dimension of the W-T Space. Entropy. 2020; 22(9):924. https://doi.org/10.3390/e22090924

Chicago/Turabian Style

Jaffal, Youssef, and Ibrahim Abou-Faycal. 2020. "Time-Limited Codewords over Band-Limited Channels: Data Rates and the Dimension of the W-T Space" Entropy 22, no. 9: 924. https://doi.org/10.3390/e22090924

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop