Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (4)

Search Parameters:
Keywords = Marton’s inner bound

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
27 pages, 748 KiB  
Article
Blahut–Arimoto Algorithms for Inner and Outer Bounds on Capacity Regions of Broadcast Channels
by Yanan Dou, Yanqing Liu, Xueyan Niu, Bo Bai, Wei Han and Yanlin Geng
Entropy 2024, 26(3), 178; https://doi.org/10.3390/e26030178 - 20 Feb 2024
Viewed by 1957
Abstract
The celebrated Blahut–Arimoto algorithm computes the capacity of a discrete memoryless point-to-point channel by alternately maximizing the objective function of a maximization problem. This algorithm has been applied to degraded broadcast channels, in which the supporting hyperplanes of the capacity region are again [...] Read more.
The celebrated Blahut–Arimoto algorithm computes the capacity of a discrete memoryless point-to-point channel by alternately maximizing the objective function of a maximization problem. This algorithm has been applied to degraded broadcast channels, in which the supporting hyperplanes of the capacity region are again cast as maximization problems. In this work, we consider general broadcast channels and extend this algorithm to compute inner and outer bounds on the capacity regions. Our main contributions are as follows: first, we show that the optimization problems are max–min problems and that the exchange of minimum and maximum holds; second, we design Blahut–Arimoto algorithms for the maximization part and gradient descent algorithms for the minimization part; third, we provide convergence analysis for both parts. Numerical experiments validate the effectiveness of our algorithms. Full article
(This article belongs to the Special Issue Advances in Multiuser Information Theory)
Show Figures

Figure 1

19 pages, 443 KiB  
Article
On the Achievable Rate Region of the K-Receiver Broadcast Channels via Exhaustive Message Splitting
by Rui Tang, Songjie Xie and Youlong Wu
Entropy 2021, 23(11), 1408; https://doi.org/10.3390/e23111408 - 26 Oct 2021
Cited by 4 | Viewed by 2747
Abstract
This paper focuses on K-receiver discrete-time memoryless broadcast channels (DM-BCs) with private messages, where the transmitter wishes to convey K private messages to K receivers. A general inner bound on the capacity region is proposed based on an exhaustive message splitting and [...] Read more.
This paper focuses on K-receiver discrete-time memoryless broadcast channels (DM-BCs) with private messages, where the transmitter wishes to convey K private messages to K receivers. A general inner bound on the capacity region is proposed based on an exhaustive message splitting and a K-level modified Marton’s coding. The key idea is to split every message into j=1KKj1 submessages each corresponding to a set of users who are assigned to recover them, and then send these submessages via codewords chosen from a K-level structure codebooks. To guarantee the joint typicality among all transmitted codewords, a sufficient condition on the subcodebooks’ sizes is derived through a newly establishing hierarchical covering lemma, which extends the 2-level multivariate covering lemma to the K-level case with more intricate dependences. As the number of auxiliary random variables and rate conditions both increase exponentially with K, the standard Fourier–Motzkin elimination procedure becomes infeasible when K is large. To tackle this problem, we obtain a closed form of achievable rate region with a special observation of disjoint unions of sets that constitute the power set of {1,,K}. The proposed achievable rate region allows arbitrary input probability mass functions and improves over previously known achievable (closed form) rate regions for K-receiver (K3) BCs. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

21 pages, 564 KiB  
Article
On the Capacity Regions of Degraded Relay Broadcast Channels with and without Feedback
by Bingbing Hu, Ke Wang, Yingying Ma and Youlong Wu
Entropy 2020, 22(7), 784; https://doi.org/10.3390/e22070784 - 17 Jul 2020
Cited by 2 | Viewed by 2372
Abstract
The four-node relay broadcast channel (RBC) is considered, in which a transmitter communicates with two receivers with the assistance of a relay node. We first investigate three types of physically degraded RBCs (PDRBCs) based on different degradation orders among the relay and the [...] Read more.
The four-node relay broadcast channel (RBC) is considered, in which a transmitter communicates with two receivers with the assistance of a relay node. We first investigate three types of physically degraded RBCs (PDRBCs) based on different degradation orders among the relay and the receivers’ observed signals. For the discrete memoryless (DM) case, only the capacity region of the second type of PDRBC is already known, while for the Gaussian case, only the capacity region of the first type of PDRBC is already known. In this paper, we step forward and make the following progress: (1) for the first type of DM-PDRBC, a new outer bound is established, which has the same rate expression as an existing inner bound, with only a slight difference on the input distributions; (2) for the second type of Gaussian PDRBC, the capacity region is established; (3) for the third type of PDRBC, the capacity regions are established both for DM and Gaussian cases. Besides, we also consider the RBC with relay feedback where the relay node can send the feedback signal to the transmitter. A new coding scheme based on a hybrid relay strategy and a layered Marton’s coding is proposed. It is shown that our scheme can strictly enlarge Behboodi and Piantanida’s rate region, which is tight for the second type of DM-PDRBC. Moreover, we show that capacity regions of the second and third types of PDRBCs are exactly the same as that without feedback, which means feedback cannot enlarge capacity regions for these types of RBCs. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

33 pages, 1164 KiB  
Article
MIMO Gaussian State-Dependent Channels with a State-Cognitive Helper
by Michael Dikshtein, Ruchen Duan, Yingbin Liang and Shlomo Shamai (Shitz)
Entropy 2019, 21(3), 273; https://doi.org/10.3390/e21030273 - 12 Mar 2019
Cited by 1 | Viewed by 5321
Abstract
We consider the problem of channel coding over multiterminal state-dependent channels in which neither transmitters nor receivers but only a helper node has a non-causal knowledge of the state. Such channel models arise in many emerging communication schemes. We start by investigating the [...] Read more.
We consider the problem of channel coding over multiterminal state-dependent channels in which neither transmitters nor receivers but only a helper node has a non-causal knowledge of the state. Such channel models arise in many emerging communication schemes. We start by investigating the parallel state-dependent channel with the same but differently scaled state corrupting the receivers. A cognitive helper knows the state in a non-causal manner and wishes to mitigate the interference that impacts the transmission between two transmit–receive pairs. Outer and inner bounds are derived. In our analysis, the channel parameters are partitioned into various cases, and segments on the capacity region boundary are characterized for each case. Furthermore, we show that for a particular set of channel parameters, the capacity region is entirely characterized. In the second part of this work, we address a similar scenario, but now each channel is corrupted by an independent state. We derive an inner bound using a coding scheme that integrates single-bin Gel’fand–Pinsker coding and Marton’s coding for the broadcast channel. We also derive an outer bound and further partition the channel parameters into several cases for which parts of the capacity region boundary are characterized. Full article
(This article belongs to the Special Issue Multiuser Information Theory II)
Show Figures

Figure 1

Back to TopTop