entropy-logo

Journal Browser

Journal Browser

Information Theory and Coding for Wireless Communications

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".

Deadline for manuscript submissions: closed (30 June 2022) | Viewed by 16142

Special Issue Editors


E-Mail Website
Guest Editor
School of Electrical Engineering, University of Belgrade, Belgrade 11000, Serbia
Interests: information theory; error control coding; wireless communications theory; beyond-5G mobile networks; Low-Earth-Orbit satellite networks
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Faculty of Electronic Engineering, University of Niš, Niš 18000, Serbia
Interests: wireless communications theory; cooperative networks; free-space optical systems; satellite communications; physical layer security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The goal of this Special Issue is to present the novel applications of Shannon's theory in wireless networks. Introduced by Claude Shannon in the 1940s, information theory aims to quantify the fundamental limits of reliable and secure communication. In the past few decades, it was shown that it is possible to reach very close to the Shannon limit, by using a modern error control coding techniques. Iterative decoding with reduced complexity enabled the wide application of low-density parity-check (LDPC) codes in cellular, satellite, and local wireless networks. The capacity of wireless communication systems can be further increased by applying multiple-input multiple-output (MIMO) techniques, in combination with network coding or cognitive radio concepts. On the other hand, a various physical layer security procedures are designed with the aim to achieve an optimal secrecy capacity. Recent researches show that machine learning techniques can be efficiently used to optimize iterative decoding, boost information processing in cognitive radio networks, and to further improve physical layer security paradigm. Therefore, the aim of this Special Issue is to bring together the wireless communications, machine learning, and information theory communities.

We intend for this Special Issue to serve as a forum for the presentation of novel and improved techniques based on information theory concepts, with the aim to improve physical layer of wireless communications systems. Beside the information theory analysis, based on entropy and mutual information, relevant topics include novel coding and decoding techniques that provide reliable and secure communication in wireless networks. Therefore, our focus is on both fundamental and application-specific analyses, based on information theory.  

We invite authors to submit previously unpublished contributions in any area related to applications of information theory in wireless communications including, but not limited to, the following subtopics: 

  • information theory in wireless systems;
  • low-density parity-check (LDPC) codes;
  • iterative decoding algorithms;
  • channel coding techniques for 5G and satellite communications;
  • multiple-input multiple-output (MIMO) channels;
  • information theoretic analysis of cognitive radio systems;
  • network information theory;
  • wiretap channel and secrecy capacity;
  • information processing theory;
  • machine learning for the physical layer communications. 

Prof. Dr. Predrag Ivanis
Prof. Dr. Goran Djordjević
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Shannon theory
  • Wireless communication networks
  • Error correction coding
  • Physical layer security
  • Information processing theory

Published Papers (8 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 349 KiB  
Article
CRC-Aided Adaptive BP Decoding of PAC Codes
by Xianwen Zhang, Ming Jiang, Mingyang Zhu, Kailin Liu and Chunming Zhao
Entropy 2022, 24(8), 1170; https://0-doi-org.brum.beds.ac.uk/10.3390/e24081170 - 22 Aug 2022
Cited by 2 | Viewed by 2139
Abstract
Although long polar codes with successive cancellation decoding can asymptotically achieve channel capacity, the performance of short blocklength polar codes is far from optimal. Recently, Arıkan proposed employing a convolutional pre-transformation before the polarization network, called polarization-adjusted convolutional (PAC) codes. In this paper, [...] Read more.
Although long polar codes with successive cancellation decoding can asymptotically achieve channel capacity, the performance of short blocklength polar codes is far from optimal. Recently, Arıkan proposed employing a convolutional pre-transformation before the polarization network, called polarization-adjusted convolutional (PAC) codes. In this paper, we focus on improving the performance of short PAC codes concatenated with a cyclic redundancy check (CRC) outer code, CRC-PAC codes, since error detection capability is essential in practical applications, such as the polar coding scheme for the control channel. We propose an enhanced adaptive belief propagation (ABP) decoding algorithm with the assistance of CRC bits for PAC codes. We also derive joint parity-check matrices of CRC-PAC codes suitable for iterative BP decoding. The proposed CRC-aided ABP (CA-ABP) decoding can effectively improve error performance when partial CRC bits are used in the decoding. Meanwhile, the error detection ability can still be guaranteed by the remaining CRC bits and adaptive decoding parameters. Moreover, compared with the conventional CRC-aided list (CA-List) decoding, our proposed scheme can significantly reduce computational complexity, to achieve a better trade-off between the performance and complexity for short PAC codes. Full article
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications)
Show Figures

Figure 1

16 pages, 3751 KiB  
Article
Multi-Access Channel Based on Quantum Detection in Wireless Optical Communication
by Wenbin Yu, Fei Chen, Zeyu Xu, Yifan Zhang, Alex X. Liu and Chengjun Zhang
Entropy 2022, 24(8), 1044; https://0-doi-org.brum.beds.ac.uk/10.3390/e24081044 - 29 Jul 2022
Cited by 2 | Viewed by 1134
Abstract
In this paper, we propose a novel multi-user access in wireless optical communication based on the quantum detection of the coherent state. In this case, the coherent states are used as the signal carrier and a technique of quantum detection is applied to [...] Read more.
In this paper, we propose a novel multi-user access in wireless optical communication based on the quantum detection of the coherent state. In this case, the coherent states are used as the signal carrier and a technique of quantum detection is applied to distinguish between signals from different users. To accomplish this task, two main quantum measurement methods are introduced; one is minimum error discrimination (MED), and the other is unambiguous state discrimination (USD). The theoretical derivation implies that the two methods can both distinguish between the signals from different users efficiently when the average photon number is large enough. Typically, the numerical result shows that in the two-user case, the channel capacity will approach the theoretical maximum limit when the average photon number is greater than 2.5 for MED and 5 for USD in the absence of noise. The MED gains more channel capacity than the USD at the same average photon number. However, the USD wins the error-correction scene with its free-error capability. Furthermore, the detection error probability and channel capacity for the USD with the thermal noise are examined. The result shows that increasing the signal average photon number can continue the USD’s advantage of error-free detection even if in the presence of thermal noise. In addition, compared with non-orthogonal multiple access (NOMA), the bit error rate (BER) against signal-to-noise rate (SNR) performance of USD has been improved. Full article
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications)
Show Figures

Figure 1

11 pages, 2965 KiB  
Article
On Entanglement-Assisted Multistatic Radar Techniques
by Ivan B. Djordjevic
Entropy 2022, 24(7), 990; https://0-doi-org.brum.beds.ac.uk/10.3390/e24070990 - 17 Jul 2022
Cited by 5 | Viewed by 1911
Abstract
Entanglement-based quantum sensors have much better sensitivity than corresponding classical sensors in a noisy and lossy regime. In our recent paper, we showed that the entanglement-assisted (EA) joint monostatic–bistatic quantum radar performs much better than conventional radars. Here, we propose an entanglement-assisted (EA) [...] Read more.
Entanglement-based quantum sensors have much better sensitivity than corresponding classical sensors in a noisy and lossy regime. In our recent paper, we showed that the entanglement-assisted (EA) joint monostatic–bistatic quantum radar performs much better than conventional radars. Here, we propose an entanglement-assisted (EA) multistatic radar that significantly outperforms EA bistatic, coherent state-based quantum, and classical radars. The proposed EA multistatic radar employs multiple entangled transmitters performing transmit-side optical phase conjugation, multiple coherent detection-based receivers serving as EA detectors, and a joint detector. Full article
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications)
Show Figures

Figure 1

22 pages, 2315 KiB  
Article
Suspicion Distillation Gradient Descent Bit-Flipping Algorithm
by Predrag Ivaniš, Srdjan Brkić and Bane Vasić
Entropy 2022, 24(4), 558; https://0-doi-org.brum.beds.ac.uk/10.3390/e24040558 - 15 Apr 2022
Viewed by 1846
Abstract
We propose a novel variant of the gradient descent bit-flipping (GDBF) algorithm for decoding low-density parity-check (LDPC) codes over the binary symmetric channel. The new bit-flipping rule is based on the reliability information passed from neighboring nodes in the corresponding Tanner graph. The [...] Read more.
We propose a novel variant of the gradient descent bit-flipping (GDBF) algorithm for decoding low-density parity-check (LDPC) codes over the binary symmetric channel. The new bit-flipping rule is based on the reliability information passed from neighboring nodes in the corresponding Tanner graph. The name SuspicionDistillation reflects the main feature of the algorithm—that in every iteration, we assign a level of suspicion to each variable node about its current bit value. The level of suspicion of a variable node is used to decide whether the corresponding bit will be flipped. In addition, in each iteration, we determine the number of satisfied and unsatisfied checks that connect a suspicious node with other suspicious variable nodes. In this way, in the course of iteration, we “distill” such suspicious bits and flip them. The deterministic nature of the proposed algorithm results in a low-complexity implementation, as the bit-flipping rule can be obtained by modifying the original GDBF rule by using basic logic gates, and the modification is not applied in all decoding iterations. Furthermore, we present a more general framework based on deterministic re-initialization of the decoder input. The performance of the resulting algorithm is analyzed for the codes with various code lengths, and significant performance improvements are observed compared to the state-of-the-art hard-decision-decoding algorithms. Full article
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications)
Show Figures

Figure 1

12 pages, 445 KiB  
Article
Higher-Order Belief Propagation Correction Decoder for Polar Codes
by Meng Zhang, Zhuo Li, Lijuan Xing and Xin Liao
Entropy 2022, 24(4), 534; https://0-doi-org.brum.beds.ac.uk/10.3390/e24040534 - 11 Apr 2022
Cited by 1 | Viewed by 1545
Abstract
Belief propagation (BP) decoding for polar codes has been extensively studied because of its inherent parallelism. However, its performance remains inferior to that of successive cancellation list decoding (SCL) due to the structure of the decoding graph. To improve the block error rate [...] Read more.
Belief propagation (BP) decoding for polar codes has been extensively studied because of its inherent parallelism. However, its performance remains inferior to that of successive cancellation list decoding (SCL) due to the structure of the decoding graph. To improve the block error rate (BLER) performance, the BP correction (BPC) decoding, a post-processing scheme that corrects prior knowledge of the identified code bit, improves convergence by executing additional iterations on the failed BP decoder. Moreover, the BPC decoder demonstrates a better decoding performance than the BP-based bit-flipping decoder. Nevertheless, the additional decoding attempts lead to increased latency. In this article, a modified BPC decoder is proposed to reduce the number of decoding attempts by redefining the correction rules. A new metric is designed to effectively identify the corrected location. Numerical results show that the proposed modified BPC decoder achieves a slight improvement in BLER compared with the original BPC, with a dramatic reduction in average complexity. Furthermore, a higher-order version, named MBPC-Ω, is extended to further improve the performance, where the Ω is the maximum correction order. Numerical results show that the higher-order modified BPC achieves a similar BLER performance to existing multiple bit-flipping BP decoders but has around half the latency overhead. In addition, the proposed MBPC-2 decoder performs better than the cyclic redundancy check-aided SCL (CA-SCL) decoder with list size 4 and is slightly worse than the CA-SCL with list size 8 in high signal-to-noise ratio (SNR) regions but with significant decoding latency reduction. Full article
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications)
Show Figures

Figure 1

26 pages, 2596 KiB  
Article
Outage Performance Analysis of NOMA in Wireless Powered Cognitive Radio Networks with AF and DF Relaying Techniques
by Hui Wang, Jian Dong, Kun Tang and Heyuan Shi
Entropy 2021, 23(11), 1463; https://0-doi-org.brum.beds.ac.uk/10.3390/e23111463 - 05 Nov 2021
Cited by 2 | Viewed by 1576
Abstract
Improving spectral efficiency under a certain energy limitation is an important design metric for future wireless communications as a response to the growing transmission demand of wireless devices. In order to improve spectral efficiency for communication systems without increasing energy consumption, this paper [...] Read more.
Improving spectral efficiency under a certain energy limitation is an important design metric for future wireless communications as a response to the growing transmission demand of wireless devices. In order to improve spectral efficiency for communication systems without increasing energy consumption, this paper considers a non-orthogonal multiple access (NOMA)–based cognitive radio network, with the assistance of a wireless-powered relay station (RS), and then analyzes the system outage performance under amplified-and-forward (AF) and decoded-and-forward (DF) cooperative transmission modes. Specifically, the base station (BS) has the opportunity to cooperate by transmitting information through the RS, depending on whether the RS can harvest sufficient RF energy for cooperative transmission. That is to say, when the energy stored by the RS is sufficient for cooperative transmission, the RS will assist the BS to forward information; otherwise, the BS will send information through direct links, while the RS converts the radio frequency (RF) signals sent by the BS into energy for future transmission. Moreover, the transmission power required by the RS for cooperative transmission is usually relatively large, while the amount of harvested energy by the RS in a transmission slot is usually low, so it takes several consecutive time slots to accumulate enough transmission energy. To this end, we utilize a discrete-time Markov chain to describe the processes of charging and discharging of the RS. Subsequently, we derive the closed-form outage probabilities of both the primary and secondary systems for the considered system in AF and DF modes through mathematical analysis, and verify the accuracy of the analyses through Monte Carlo simulation. The simulation results show that the two proposed cooperative transmission schemes with AF and DF relaying techniques outperform both direct transmission and other similar schemes in both the primary and secondary system, while the DF scheme can provide better performance than the AF scheme within the range of setting values. Full article
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications)
Show Figures

Figure 1

17 pages, 18236 KiB  
Article
Joint User Scheduling, Relay Selection, and Power Allocation for Multi-Antenna Opportunistic Beamforming Systems
by Wenbin Sun, Mingliang Tao, Xin Yang, Tao Zhang, Chuang Han and Ling Wang
Entropy 2021, 23(10), 1278; https://0-doi-org.brum.beds.ac.uk/10.3390/e23101278 - 29 Sep 2021
Viewed by 1306
Abstract
Opportunistic beamforming (OBF) is a potential technique in the fifth generation (5G) and beyond 5G (B5G) that can boost the performance of communication systems and encourage high user quality of service (QoS) through multi-user selection gain. However, the achievable rate tends to be [...] Read more.
Opportunistic beamforming (OBF) is a potential technique in the fifth generation (5G) and beyond 5G (B5G) that can boost the performance of communication systems and encourage high user quality of service (QoS) through multi-user selection gain. However, the achievable rate tends to be saturated with the increased number of users, when the number of users is large. To further improve the achievable rate, we proposed a multi-antenna opportunistic beamforming-based relay (MOBR) system, which can achieve both multi-user and multi-relay selection gains. Then, an optimization problem is formulated to maximize the achievable rate. Nevertheless, the optimization problem is a non-deterministic polynomial (NP)-hard problem, and it is difficult to obtain an optimal solution. In order to solve the proposed optimization problem, we divide it into two suboptimal issues and apply a joint iterative algorithm to consider both the suboptimal issues. Our simulation results indicate that the proposed system achieved a higher achievable rate than the conventional OBF systems and outperformed other beamforming schemes with low feedback information. Full article
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications)
Show Figures

Figure 1

20 pages, 1881 KiB  
Article
Performance Analysis and Optimization of a Cooperative Transmission Protocol in NOMA-Assisted Cognitive Radio Networks with Discrete Energy Harvesting
by Hui Wang, Ronghua Shi, Kun Tang, Jian Dong and Shaowei Liao
Entropy 2021, 23(6), 785; https://0-doi-org.brum.beds.ac.uk/10.3390/e23060785 - 20 Jun 2021
Cited by 8 | Viewed by 2343
Abstract
In this paper, we propose a spectrum-sharing protocol for a cooperative cognitive radio network based on non-orthogonal multiple access technology, where the base station (BS) transmits the superimposed signal to the primary user and secondary user with/without the assistance of a relay station [...] Read more.
In this paper, we propose a spectrum-sharing protocol for a cooperative cognitive radio network based on non-orthogonal multiple access technology, where the base station (BS) transmits the superimposed signal to the primary user and secondary user with/without the assistance of a relay station (RS) by adopting the decode-and-forward technique. RS performs discrete-time energy harvesting for opportunistically cooperative transmission. If the RS harvests sufficient energy, the system performs cooperative transmission; otherwise, the system performs direct transmission. Moreover, the outage probabilities and outage capacities of both primary and secondary systems are analyzed, and the corresponding closed-form expressions are derived. In addition, one optimization problem is formulated, where our objective is to maximize the energy efficiency of the secondary system while ensuring that of the primary system exceeds or equals a threshold value. A joint optimization algorithm of power allocation at BS and RS is considered to solve the optimization problem and to realize a mutual improvement in the performance of energy efficiency for both the primary and secondary systems. The simulation results demonstrate the validity of the analysis results and prove that the proposed transmission scheme has a higher energy efficiency than the direct transmission scheme and the transmission scheme with simultaneous wireless information and power transfer technology. Full article
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications)
Show Figures

Figure 1

Back to TopTop