The DMT of Real and Quaternionic Lattice Codes and DMT Classification of Division Algebra Codes
Vehkalahti, R., & Luzzi, L. (2022). The DMT of Real and Quaternionic Lattice Codes and DMT Classification of Division Algebra Codes. IEEE Transactions on Information Theory, 68(5), 2999-3013. https://doi.org/10.1109/tit.2021.3137153
Published in
IEEE Transactions on Information TheoryDate
2022Copyright
© 2022, IEEE
In this paper we consider the diversity-multiplexing gain tradeoff (DMT) of so-called minimum delay asymmetric space-time codes for the n × m MIMO channel. Such codes correspond to lattices in Mn(C) with dimension smaller than 2n2. Currently, very little is known about their DMT, except in the case m = 1, corresponding to the multiple input single output (MISO) channel. Further, apart from the MISO case, no DMT optimal asymmetric codes are known. We first discuss previous criteria used to analyze the DMT of space-time codes and comment on why these methods fail when applied to asymmetric codes. We then consider two special classes of asymmetric codes where the code-words are restricted to either real or quaternion matrices. We prove two separate diversity-multiplexing gain trade-off (DMT) upper bounds for such codes and provide a criterion for a lattice code to achieve these upper bounds. We also show that lattice codes based on Q-central division algebras satisfy this optimality criterion. As a corollary this result provides a DMT classification for all Q-central division algebra codes that are based on standard embeddings. While the Q-central division algebra based codes achieve the largest possible DMT of a code restricted to either real or quaternion space, they still fall short of the optimal DMT apart from the MISO case.
...
Publisher
IEEEISSN Search the Publication Forum
0018-9448Keywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/103479828
Metadata
Show full item recordCollections
Additional information about funding
The authors acknowledge the support of ENSEA (AAP SRV 2018) for funding R. Vehkalahti’s visit to ETIS in 2018. Academy of Finland (Grant Number: 299916).License
Related items
Showing items with similar title or keywords.
-
Methods for space-time parameter estimation in DS-CDMA arrays
Wu, Rui (University of Jyväskylä, 2006)Rui Wu tutki väitöstyössään radiokanavan eri ominaisuuksien arviointia. Tietämys radiokanavan ominaisuuksista on monesti välttämätöntä, jotta radiovastaanottimen vastaanottama signaali voidaan purkaa ymmärrettävään muotoon. ... -
Modeling and Mitigating Errors in Belief Propagation for Distributed Detection
Abdi, Younes; Ristaniemi, Tapani (Institute of Electrical and Electronics Engineers (IEEE), 2021)We study the behavior of the belief-propagation (BP) algorithm affected by erroneous data exchange in a wireless sensor network (WSN). The WSN conducts a distributed multidimensional hypothesis test over binary random ... -
Fast Estimation of Diffusion Tensors under Rician noise by the EM algorithm
Liu, Jia; Gasbarra, Dario; Railavo, Juha (Elsevier BV, 2016)Diffusion tensor imaging (DTI) is widely used to characterize, in vivo, the white matter of the central nerve system (CNS). This biological tissue contains much anatomic, structural and orientational information of fibers ... -
Joint Subcarrier and Phase Shifts Optimization for RIS-aided Localization-Communication System
Luan, Mingan; Wang, Bo; Chang, Zheng; Hämäläinen, Timo; Ling, Zhuang; Hu, Fengye (IEEE, 2022)Joint localization and communication systems have drawn significant attention due to their high resource utilization. In this paper, we consider a reconfigurable intelligent surface (RIS)-aided simultaneously localization ... -
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security
Jameel, Furqan; Wyne, Shurjeel; Kaddoum, Georges; Duong, Trung Q. (IEEE, 2019)Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of ...