# Information Theory (cs.IT)

• A pure multipartite quantum state is called absolutely maximally entangled (AME), if all reductions obtained by tracing out at least half of its parties are maximally mixed. However, the existence of such states is in many cases unclear. With the help of the weight enumerator machinery known from quantum error correcting codes and the generalized shadow inequalities, we obtain new bounds on the existence of AME states in higher dimensions. To complete the treatment on the weight enumerator machinery, the quantum MacWilliams identity is derived in the Bloch representation.
• We propose a novel mode of operation for Amplify-and-Forward relays in which the spectra of the relay input and output signals partially overlap. This partial-duplex relaying mode encompasses half-duplex and full-duplex as particular cases. By viewing the partial-duplex relay as a bandwidth-preserving Linear Periodic Time-Varying system, an analysis of the spectral efficiency in the presence of self-interference is developed. In contrast with previous works, self-interference is regarded as a useful information-bearing component rather than simply assimilated to noise. This approach reveals that previous results regarding the impact of self-interference on (full-duplex) relay performance are overly pessimistic. Based on a frequency-domain interpretation of the effect of self-interference, a number of suboptimal decoding architectures at the destination node are also discussed. It is found that the partial-duplex relaying mode may provide an attractive tradeoff between spectral efficiency and receiver complexity.
• This paper provides an initial investigation on the application of convolutional neural networks (CNNs) for fingerprint-based positioning using measured massive MIMO channels. When represented in appropriate domains, massive MIMO channels have a sparse structure which can be efficiently learned by CNNs for positioning purposes. We evaluate the positioning accuracy of state-of-the-art CNNs with channel fingerprints generated from a channel model with a rich clustered structure: the COST 2100 channel model. We find that moderately deep CNNs can achieve fractional-wavelength positioning accuracies, provided that an enough representative data set is available for training.
• Feedforward neural networks have wide applicability in various disciplines of science due to their universal approximation property. Some authors have shown that single hidden layer feedforward neural networks (SLFNs) with fixed weights still possess the universal approximation property provided that approximated functions are univariate. But this phenomenon does not lay any restrictions on the number of neurons in the hidden layer. The more this number, the more the probability of the considered network to give precise results. In this note, we constructively prove that SLFNs with the fixed weight $1$ and two neurons in the hidden layer can approximate any continuous function on a compact subset of the real line. The applicability of this result is demonstrated in various numerical examples. Finally, we show that SLFNs with fixed weights cannot approximate all continuous multivariate functions.
• In this paper, we present the block Markov superposition transmission of BCH (BMST-BCH) codes, which can be constructed to obtain a very low error floor. To reduce the implementation complexity, we design a low complexity iterative sliding-window decoding algorithm, in which only binary and/or erasure messages are processed and exchanged between processing units. The error floor can be predicted by a genie-aided lower bound, while the waterfall performance can be analyzed by the density evolution method. To evaluate the error floor of the constructed BMST-BCH codes at a very low bit error rate (BER) region, we propose a fast simulation approach. Numerical results show that, at a target BER of $10^{-15}$, the hard-decision decoding of the BMST-BCH codes with overhead $25\%$ can achieve a net coding gain (NCG) of $10.55$ dB. Furthermore, the soft-decision decoding can yield an NCG of $10.74$ dB. The construction of BMST-BCH codes is flexible to trade off latency against performance at all overheads of interest and may find applications in optical transport networks as an attractive~candidate.
• Statistical inference can be computationally prohibitive in ultrahigh-dimensional linear models. Correlation-based variable screening, in which one leverages marginal correlations for removal of irrelevant variables from the model prior to statistical inference, can be used to overcome this challenge. Prior works on correlation-based variable screening either impose strong statistical priors on the linear model or assume specific post-screening inference methods. This paper first extends the analysis of correlation-based variable screening to arbitrary linear models and post-screening inference techniques. In particular, ($i$) it shows that a condition---termed the screening condition---is sufficient for successful correlation-based screening of linear models, and ($ii$) it provides insights into the dependence of marginal correlation-based screening on different problem parameters. Numerical experiments confirm that these insights are not mere artifacts of analysis; rather, they are reflective of the challenges associated with marginal correlation-based variable screening. Second, the paper explicitly derives the screening condition for two families of linear models, namely, sub-Gaussian linear models and arbitrary (random or deterministic) linear models. In the process, it establishes that---under appropriate conditions---it is possible to reduce the dimension of an ultrahigh-dimensional, arbitrary linear model to almost the sample size even when the number of active variables scales almost linearly with the sample size.
• Motivated by applications of distributed storage systems to cloud-based key-value stores, the multi-version coding problem has been recently formulated to store frequently updated data in asynchronous distributed storage systems. Inspired by consistency requirements in distributed computing, the main goal in multi-version coding is to ensure that the latest possible version of the data is decodable, even if all the data updates have not reached all the servers in the system. In this paper, we study the storage cost of ensuring consistency for the case where the various versions of the data are correlated, in contrast to previous work where versions were treated as being independent. We provide multi-version code constructions that show that the storage cost can be significantly smaller than the previous constructions depending on the degree of correlation between the different versions of the data. Our constructions are based on update-efficient codes, Reed-Solomon code, random binning coding and BCH codes. Specifically, we consider the multi-version coding setting with $n$ servers and $\nu$ versions, with a failure tolerance of $n-c$, where the $\nu$ message versions form a Markov chain. The message version is distributed uniformly over all binary vectors of length $K$, and given a version, the subsequent version is uniformly distributed in a Hamming ball of radius $\delta_K K$ centered around that given version. Previously derived achievable schemes have a per-server storage cost of at least $\frac{1}{2}\frac{\nu K}{c}-o(K)$ when $\nu \leq c$, whereas we propose a scheme that has a storage cost of $\frac{K}{c} + \frac{\nu-1}{c}\log Vol(\delta_KK, K)$, where $Vol(r, K)$ is the volume of a ball of radius $r$ in the $K$ dimensional Hamming cube. Through a converse result, we show that our multi-version code constructions are nearly-optimal in certain correlation regimes.
• In coding for distributed storage systems, efficient data reconstruction and repair through accessing a predefined number of arbitrarily chosen storage nodes is guaranteed by regenerating codes. Traditionally, code parameters, specially the number of helper nodes participating in a repair process, are predetermined. However, depending on the state of the system and network traffic, it is desirable to adapt such parameters accordingly in order to minimize the cost of repair. In this work a class of regenerating codes with minimum storage is introduced that can simultaneously operate at the optimal repair bandwidth, for a wide range of exact repair mechanisms, based on different number of helper nodes.
• In this paper, a data hiding scheme ready for Internet applications is proposed. An existing scheme based on chaotic iterations is improved, to respond to some major Internet security concerns, such as digital rights management, communication over hidden channels, and social search engines. By using Reed Solomon error correcting codes and wavelets domain, we show that this data hiding scheme can be improved to solve issues and requirements raised by these Internet fields.
• For lengths $64$ and $66$, we construct extremal singly even self-dual codes with weight enumerators for which no extremal singly even self-dual codes were previously known to exist. We also construct new $40$ inequivalent extremal doubly even self-dual $[64,32,12]$ codes with covering radius $12$ meeting the Delsarte bound.
• Aug 22 2017 cs.IT math.IT arXiv:1708.05947v1
Quadrature amplitude modulation (QAM) exhibits a shaping-loss of $\pi \mathrm{e}/6$, ($\approx1.53$ dB) compared to the AWGN Shannon capacity. With inspiration gained from special (leaf, flower petal, and seed) packing arrangements (spiral phyllotaxis) found among plants, a novel, shape-versatile, circular symmetric, modulation scheme, the Golden Angle Modulation (GAM) is introduced. Disc-shaped, and complex Gaussian approximating bell-shaped, GAM-signal constellations are considered. For bell-GAM, a high-rate approximation, and a mutual information optimization formulation, are developed. Bell-GAM overcomes the asymptotic shaping-loss seen in QAM, and offers Shannon capacity approaching performance. Transmitter resource limited links, such as space probe-to-earth, and mobile-to-basestation, are cases where GAM could be particularly valuable.
• In cloud radio access network (C-RAN), remote radio heads (RRHs) and users are uniformly distributed in a large area such that the channel matrix can be considered as sparse. Based on this phenomenon, RRHs only need to detect the relatively strong signals from nearby users and ignore the weak signals from far users, which is helpful to develop low-complexity detection algorithms without causing much performance loss. However, before detection, RRHs require to obtain the realtime user activity information by the dynamic grant procedure, which causes the enormous latency. To address this issue, in this paper, we consider a grant-free C-RAN system and propose a low-complexity Bernoulli-Gaussian message passing (BGMP) algorithm based on the sparsified channel, which jointly detects the user activity and signal. Since active users are assumed to transmit Gaussian signals at any time, the user activity can be regarded as a Bernoulli variable and the signals from all users obey a Bernoulli-Gaussian distribution. In the BGMP, the detection functions for signals are designed with respect to the Bernoulli-Gaussian variable. Numerical results demonstrate the robustness and effectivity of the BGMP. That is, for different sparsified channels, the BGMP can approach the mean-square error (MSE) of the genie-aided sparse minimum mean-square error (GA-SMMSE) which exactly knows the user activity information. Meanwhile, the fast convergence and strong recovery capability for user activity of the BGMP are also verified.
• In phase retrieval we want to recover an unknown signal $\boldsymbol x\in\mathbb C^d$ from $n$ quadratic measurements of the form $y_i = |\langle\boldsymbol a_i,\boldsymbol x\rangle|^2+w_i$ where $\boldsymbol a_i\in \mathbb C^d$ are known sensing vectors and $w_i$ is measurement noise. We ask the following weak recovery question: what is the minimum number of measurements $n$ needed to produce an estimator $\hat{\boldsymbol x}(\boldsymbol y)$ that is positively correlated with the signal $\boldsymbol x$? We consider the case of Gaussian vectors $\boldsymbol a_i$. We prove that - in the high-dimensional limit - a sharp phase transition takes place, and we locate the threshold in the regime of vanishingly small noise. For $n\le d-o(d)$ no estimator can do significantly better than random and achieve a strictly positive correlation. For $n\ge d+o(d)$ a simple spectral estimator achieves a positive correlation. Surprisingly, numerical simulations with the same spectral estimator demonstrate promising performances with realistic sensing matrices as well. Spectral methods are used to initialize non-convex optimization algorithms in phase retrieval, and our approach can boost performances in this setting as well. Our impossibility result is based on classical information-theory arguments. The spectral algorithm computes the leading eigenvector of a weighted empirical covariance matrix. We obtain a sharp characterization of the spectral properties of this random matrix using tools from free probability and generalizing a recent result by Lu and Li. Both the upper and lower bound generalize beyond phase retrieval to measurements $y_i$ produced according to a generalized linear model.
• We address a fundamental question in wireless networks that, surprisingly, has not been studied before: what is the maximum density of concurrently active links that satisfy a certain outage constraint? We call this quantity the spatial outage capacity (SOC), give a rigorous definition, and analyze it for Poisson bipolar networks with ALOHA. Specifically, we provide exact analytical and approximate expressions for the density of links satisfying an outage constraint and give simple upper and lower bounds on the SOC. In the high-reliability regime where the target outage probability is close to zero, we obtain an exact closed-form expression of the SOC, which reveals the interesting and perhaps counter-intuitive result that all transmitters need to be always active to achieve the SOC, i.e., the transmit probability needs to be set to 1 to achieve the SOC.
• In this paper, we analyze the outage performance of two multicarrier relay selection schemes, i.e. bulk and per-subcarrier selections, for two-hop orthogonal frequency-division multiplexing (OFDM) systems. To provide a comprehensive analysis, three forwarding protocols: decode-and-forward (DF), fixed-gain (FG) amplify-and-forward (AF) and variable-gain (VG) AF relay systems are considered. We obtain closed-form approximations for the outage probability and closed-form expressions for the asymptotic outage probability in the high signal-to-noise ratio (SNR) region for all cases. Our analysis is verified by Monte Carlo simulations, and provides an analytical framework for multicarrier systems with relay selection.
• In this paper, we propose a power allocation strategy for the adaptive orthogonal frequency-division multiplexing (OFDM) index modulation (IM) in cooperative networks. The allocation strategy is based on the Karush-Kuhn-Tucker (KKT) conditions, and aims at maximizing the average network capacity according to the instantaneous channel state information (CSI). As the transmit power at source and relay is constrained separately, we can thus formulate an optimization problem by allocating power to active subcarriers. Compared to the conventional uniform power allocation strategy, the proposed dynamic strategy can lead to a higher average network capacity, especially in the low signal-to-noise ratio (SNR) region. The analysis is also verified by numerical results produced by Monte Carlo simulations. By applying the proposed power allocation strategy, the efficiency of adaptive OFDM IM can be enhanced in practice, which paves the way for its implementation in the future, especially for cell-edge communications.
• Completely blind sensing is the problem of recovering bandlimited signals from measurements, without any spectral information beside an upper bound on the measure of the whole support set in the frequency domain. Determining the number of measurements necessary and sufficient for reconstruction has been an open problem, and usually partially blind sensing is performed, assuming to have some partial spectral information available a priori. In this paper, the minimum number of measurements that guarantees perfect recovery in the absence of measurement error, and robust recovery in the presence of measurement error, is determined in a completely blind setting. Results show that a factor of two in the measurement rate is the price pay for blindness, compared to reconstruction with full spectral knowledge. The minimum number of measurements is also related to the fractal (Minkowski-Bouligand) dimension of a discrete approximating set, defined in terms of the Kolmogorov $\epsilon$-entropy. These results are analogous to a deterministic coding theorem, where an operational quantity defined in terms of minimum measurement rate is shown to be equal to an information-theoretic one. A comparison with parallel results in compressed sensing is illustrated, where the relevant dimensionality notion in a stochastic setting is the information (Rényi) dimension, defined in terms of the Shannon entropy.
• In this paper, the problem of network connectivity is studied for an adversarial Internet of Battlefield Things (IoBT) system in which an attacker aims at disrupting the connectivity of the network by choosing to compromise one of the IoBT nodes at each time epoch. To counter such attacks, an IoBT defender attempts to reestablish the IoBT connectivity by either deploying new IoBT nodes or by changing the roles of existing nodes. This problem is formulated as a dynamic multistage Stackelberg connectivity game that extends classical connectivity games and that explicitly takes into account the characteristics and requirements of the IoBT network. In particular, the defender's payoff captures the IoBT latency as well as the sum of weights of disconnected nodes at each stage of the game. Due to the dependence of the attacker's and defender's actions at each stage of the game on the network state, the feedback Stackelberg solution (FSE) is used to solve the IoBT connectivity game. Then, sufficient conditions under which the IoBT system will remain connected, when the FSE solution is used, are determined analytically. Numerical results show that the expected number of disconnected sensors, when the FSE solution is used, decreases up to 62% compared to a baseline scenario in which a Stackelberg game with no feedback is used, and up to 57% compared to a baseline equal probability policy.
• Approximate Symbol error rate (SER) expressions are derived for receive diversity system employing optimum combining, when both the desired and the interfering signals are subjected to Rician fading, for the case of a) equal power uncorrelated interferers b) unequal power interferers c) interferer correlation. The derived expressions are applicable for an arbitrary number of receive antennas and interferers and for any QAM constellation. Furthermore, we derive a simple closed form expression for SER in the interference-limited regime, for the special case of Rayleigh faded interferers. A close match is observed between the SER result obtained through the derived analytical expression and the one obtained from Monte-Carlo simulations, for a variety of QAM constellations.
• Statistical QoS provisioning as an important performance metric in analyzing next generation mobile cellular network, aka 5G, is investigated. In this context, by quantifying the performance in terms of the effective capacity, we introduce a lower bound for the system performance that facilitates an efficient analysis. Based on the proposed lower bound, which is mainly built on a per resource block analysis, we build a basic mathematical framework to analyze effective capacity in an ultra dense heterogeneous cellular network. We use our proposed scalable approach to give insights about the possible enhancements of the statistical QoS experienced by the end users if heterogeneous cellular networks migrate from a conventional half duplex to an imperfect full duplex mode of operation. Numerical results and analysis are provided, where the network is modeled as a Matern point process. The results demonstrate the accuracy and computational efficiency of the proposed scheme, especially in large scale wireless systems. Moreover, the minimum level of self interference cancellation for the full duplex system to start outperforming its half duplex counterpart is investigated.

gae Jul 26 2017 21:19 UTC

For those interested in the literature on teleportation simulation of quantum channels, a detailed and *comprehensive* review is provided in Supplementary Note 8 of https://images.nature.com/original/nature-assets/ncomms/2017/170426/ncomms15043/extref/ncomms15043-s1.pdf
The note describes well the t

...(continued)
Stefano Pirandola May 05 2017 05:45 UTC

Today I have seen on the arXiv the version 2 of this paper on quantum reading. I am sorry to say that this revision still misses to acknowledge important contributions from previous works, especially in relation to the methods on channel simulation and teleportation that are crucial for its claims.

...(continued)
gae spedalieri Mar 13 2017 14:13 UTC

1) Sorry but this is false.

1a) That analysis is specifically for reducing QECC protocol to an entanglement distillation protocol over certain class of discrete variable channels. Exactly as in BDSW96. Task of the protocol is changed in the reduction.

1b) The simulation is not via a general LOCC b

...(continued)
Siddhartha Das Mar 13 2017 13:22 UTC

We feel that we have cited and credited previous works appropriately in our paper. To clarify:

1) The LOCC simulation of a channel and the corresponding adaptive reduction can be found worked out in full generality in the 2012 Master's thesis of Muller-Hermes. We have cited the original paper BD

...(continued)
gae spedalieri Mar 13 2017 08:56 UTC

This is one of those papers where the contribution of previous literature is omitted and not fairly represented.

1- the LOCC simulation of quantum channels (not necessarily teleportation based) and the corresponding general reduction of adaptive protocols was developed in PLOB15 (https://arxiv.org/

...(continued)
Samad Khabbazi Oskouei Sep 05 2016 11:34 UTC

I think that we have missed the "semi-" at the conclusion. Because, the proof of the theorem 4.3 is based on the using universal semi-density matrix concept which is not computable. The semi-computability concept used here is like the Kolmogorov complexity which is not computable and so the Cubic co

...(continued)
Toby Cubitt Sep 01 2016 11:14 UTC

I could well be missing something. But as far as I could tell from a rather quick read through the paper, all they show is that the quantum capacity of a channel with computable matrix elements is given by the regularised coherent information optimised over input ensembles with computable matrix ele

...(continued)
Māris Ozols Aug 30 2016 17:52 UTC

Do I understand correctly that this paper claims to show that quantum capacity is computable?

> After defining the algorithmic quantum capacity we have proved that it
> equals the standard one. Furthermore we have shown that it is
> computable.

Richard Kueng Jul 28 2015 07:01 UTC

fyi: our quantum implications are presented in Subsection 2.2 (pp 7-9).