Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where H. El Gamal is active.

Publication


Featured researches published by H. El Gamal.


IEEE Transactions on Information Theory | 2003

On maximum-likelihood detection and the search for the closest lattice point

Mohamed Oussama Damen; H. El Gamal; Giuseppe Caire

Maximum-likelihood (ML) decoding algorithms for Gaussian multiple-input multiple-output (MIMO) linear channels are considered. Linearity over the field of real numbers facilitates the design of ML decoders using number-theoretic tools for searching the closest lattice point. These decoders are collectively referred to as sphere decoders in the literature. In this paper, a fresh look at this class of decoding algorithms is taken. In particular, two novel algorithms are developed. The first algorithm is inspired by the Pohst enumeration strategy and is shown to offer a significant reduction in complexity compared to the Viterbo-Boutros sphere decoder. The connection between the proposed algorithm and the stack sequential decoding algorithm is then established. This connection is utilized to construct the second algorithm which can also be viewed as an application of the Schnorr-Euchner strategy to ML decoding. Aided with a detailed study of preprocessing algorithms, a variant of the second algorithm is developed and shown to offer significant reductions in the computational complexity compared to all previously proposed sphere decoders with a near-ML detection performance. This claim is supported by intuitive arguments and simulation results in many relevant scenarios.


IEEE Transactions on Information Theory | 2005

On the achievable diversity-multiplexing tradeoff in half-duplex cooperative channels

K. Azarian; H. El Gamal; Philip Schniter

We propose novel cooperative transmission protocols for delay-limited coherent fading channels consisting of N (half-duplex and single-antenna) partners and one cell site. In our work, we differentiate between the relay, cooperative broadcast (down-link), and cooperative multiple-access (CMA) (up-link) channels. The proposed protocols are evaluated using Zheng-Tse diversity-multiplexing tradeoff. For the relay channel, we investigate two classes of cooperation schemes; namely, amplify and forward (AF) protocols and decode and forward (DF) protocols. For the first class, we establish an upper bound on the achievable diversity-multiplexing tradeoff with a single relay. We then construct a new AF protocol that achieves this upper bound. The proposed algorithm is then extended to the general case with (N-1) relays where it is shown to outperform the space-time coded protocol of Laneman and Wornell without requiring decoding/encoding at the relays. For the class of DF protocols, we develop a dynamic decode and forward (DDF) protocol that achieves the optimal tradeoff for multiplexing gains 0lesrles1/N. Furthermore, with a single relay, the DDF protocol is shown to dominate the class of AF protocols for all multiplexing gains. The superiority of the DDF protocol is shown to be more significant in the cooperative broadcast channel. The situation is reversed in the CMA channel where we propose a new AF protocol that achieves the optimal tradeoff for all multiplexing gains. A distinguishing feature of the proposed protocols in the three scenarios is that they do not rely on orthogonal subspaces, allowing for a more efficient use of resources. In fact, using our results one can argue that the suboptimality of previously proposed protocols stems from their use of orthogonal subspaces rather than the half-duplex constraint.


IEEE Transactions on Information Theory | 2008

On the Secrecy Capacity of Fading Channels

Praveen Kumar Gopala; Lifeng Lai; H. El Gamal

We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyners wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We analyze the full channel state information (CSI) case, where the transmitter has access to the channel gains of the legitimate receiver and eavesdropper, and the main channel CSI scenario, where only the legitimate receiver channel gain is known at the transmitter. In each scenario, the secrecy capacity is obtained along with the optimal power and rate allocation strategies. We then propose a low-complexity on/off power allocation strategy that achieves near-optimal performance with only the main channel CSI. More specifically, this scheme is shown to be asymptotically optimal as the average SNR goes to infinity, and interestingly, is shown to attain the secrecy capacity under the full CSI assumption. Remarkably, our results reveal the positive impact of fading on the secrecy capacity and establish the critical role of rate adaptation, based on the main channel CSI, in facilitating secure communications over slow fading channels.


IEEE Transactions on Information Theory | 2008

The Relay–Eavesdropper Channel: Cooperation for Secrecy

Lifeng Lai; H. El Gamal

This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several cooperation strategies are then devised and the corresponding achievable rate-equivocation region are characterized. Of particular interest is the novel noise-forwarding (NF) strategy, where the relay node sends codewords independent of the source message to confuse the eavesdropper. This strategy is used to illustrate the deaf helper phenomenon, where the relay is able to facilitate secure communications while being totally ignorant of the transmitted messages. Furthermore, NF is shown to increase the secrecy capacity in the reversely degraded scenario, where the relay node fails to offer performance gains in the classical setting. The gain offered by the proposed cooperation strategies is then proved theoretically and validated numerically in the additive white Gaussian noise (AWGN) channel.


IEEE Transactions on Information Theory | 2000

On the theory of space-time codes for PSK modulation

A.R. Hammons; H. El Gamal

The design of space-time codes to achieve full spatial diversity over fading channels has largely been addressed by handcrafting example codes using computer search methods and only for small numbers of antennas. The lack of more general designs is in part due to the fact that the diversity advantage of a code is the minimum rank among the complex baseband differences between modulated codewords, which is difficult to relate to traditional code designs over finite fields and rings. We present general binary design criteria for PSK-modulated space-time codes. For linear BPSK/QPSK codes, the rank of (binary projections of) the unmodulated codewords, as binary matrices over the binary field, is a sufficient design criterion: full binary rank guarantees full spatial diversity. This criterion accounts for much of what is currently known about PSK-modulated space-time codes. We develop new fundamental code constructions for both quasi-static and time-varying channels. These are perhaps the first general constructions-other than delay diversity schemes-that guarantee full spatial diversity for an arbitrary number of transmit antennas.


international symposium on information theory | 2000

Analyzing the turbo decoder using the Gaussian approximation

H. El Gamal; A.R. Hammons

We introduce a simple technique for analyzing the iterative decoder that is broadly applicable to different classes of codes defined over graphs in certain fading as well as additive white Gaussian noise (AWGN) channels. The technique is based on the observation that the extrinsic information from constituent maximum a posteriori (MAP) decoders is well approximated by Gaussian random variables when the inputs to the decoders are Gaussian. The independent Gaussian model implies the existence of an iterative decoder threshold that statistically characterizes the convergence of the iterative decoder. Specifically, the iterative decoder converges to zero probability of error as the number of iterations increases if and only if the channel E/sub b//N/sub 0/ exceeds the threshold. Despite the idealization of the model and the simplicity of the analysis technique, the predicted threshold values are in excellent agreement with the waterfall regions observed experimentally in the literature when the codeword lengths are large. Examples are given for parallel concatenated convolutional codes, serially concatenated convolutional codes, and the generalized low-density parity-check (LDPC) codes of Gallager and Cheng-McEliece (1996). Convergence-based design of asymmetric parallel concatenated convolutional codes (PCCC) is also discussed.


IEEE Transactions on Information Theory | 2006

A unified framework for tree search decoding: rediscovering the sequential decoder

A.D. Murugan; H. El Gamal; Mohamed Oussama Damen; Giuseppe Caire

We consider receiver design for coded transmission over linear Gaussian channels. We restrict ourselves to the class of lattice codes and formulate the joint detection and decoding problem as a closest lattice point search (CLPS). Here, a tree search framework for solving the CLPS is adopted. In our framework, the CLPS algorithm is decomposed into the preprocessing and tree search stages. The role of the preprocessing stage is to expose the tree structure in a form matched to the search stage. We argue that the forward and feedback (matrix) filters of the minimum mean-square error decision feedback equalizer (MMSE-DFE) are instrumental for solving the joint detection and decoding problem in a single search stage. It is further shown that MMSE-DFE filtering allows for solving underdetermined linear systems and using lattice reduction methods to diminish complexity, at the expense of a marginal performance loss. For the search stage, we present a generic method, based on the branch and bound (BB) algorithm, and show that it encompasses all existing sphere decoders as special cases. The proposed generic algorithm further allows for an interesting classification of tree search decoders, sheds more light on the structural properties of all known sphere decoders, and inspires the design of more efficient decoders. In particular, an efficient decoding algorithm that resembles the well-known Fano sequential decoder is identified. The excellent performance-complexity tradeoff achieved by the proposed MMSE-DFE Fano decoder is established via simulation results and analytical arguments in several multiple-input multiple-output (MIMO) and intersymbol interference (ISI) scenarios.


IEEE Transactions on Information Theory | 2008

On The Han–Kobayashi Region for theInterference Channel

Hon-Fah Chong; Mehul Motani; Hari Krishna Garg; H. El Gamal

In this correspondence, we derive a simplified description of the Han-Kobayashi rate region for the general interference channel. Using this result, we establish that the recently discovered Chong-Motani-Garg rate region is a new representation of the Han-Kobayashi region. Moreover, a tighter bound for the cardinality of the time-sharing auxiliary random variable emerges from our simplified description.


IEEE Transactions on Information Theory | 2001

A new approach to layered space-time coding and signal processing

H. El Gamal; A.R. Hammons

The information-theoretic capacity of multiple antenna systems has been shown to be significantly higher than that of single antenna systems in Rayleigh-fading channels. In an attempt to realize this capacity, Foschini (1996) proposed the layered space-time architecture. This scheme was argued to asymptotically achieve a lower bound on the capacity. Another line of work has focused on the design of channel codes that exploit the spatial diversity provided by multiple transmit antennas (Tarokh et al. 1998, Hammons and Gamal 2000). In this paper, we take a fresh look at the problem of designing multiple-input-multiple-output (MIMO) wireless systems. First, we develop a generalized framework for the design of layered space-time systems. Then, we present a novel layered architecture that combines efficient algebraic code design with iterative signal processing techniques. This novel layered system is referred to as the threaded space-time (TST) architecture. The TST architecture provides more flexibility in the tradeoff between power efficiency, bandwidth efficiency, and receiver complexity. It also allows for exploiting the temporal diversity provided by time-varying fading channels. Simulation results are provided for the various techniques that demonstrate the superiority of the proposed TST architecture over both the diagonal layered space-time architecture in Foschini (1996) and the multilayering approach (Tarokh et al. (1999).


IEEE Journal on Selected Areas in Communications | 2000

Iterative multiuser detection for coded CDMA signals in AWGN and fading channels

H. El Gamal; Evaggelos Geraniotis

A new iterative receiver for joint detection and decoding of code division multiple access (CDMA) signals is presented. The new scheme is based on a combination of the minimum mean square error (MMSE) criterion and the turbo processing principle by Hagenauer (see Proc. Int. Symp. Turbo Codes and Related Topics, Brest, France, p.1-9, 1997). The complexity of the new scheme is of polynomial order in the number of users. The new scheme is applicable to two situations: (a) when the receiver is capable of decoding the signals from all users and (b) when the receiver is only capable of decoding the signals from a subset of users. In the first scenario, we establish that the proposed receiver achieves superior performance to the iterative soft interference cancellation technique under certain conditions. On the other hand, in the second scenario, we argue that the proposed receiver outperforms both the iterative soft interference canceler and the iterative maximum a posteriori (MAP) receiver because of its superior near-far resistance. For operation over fading channels, the estimation of the complex fading parameters for all users becomes an important ingredient in any multiuser detector. In our scheme, the soft information provided by the decoders is used to enhance this estimation process. Two iterative soft-input channel estimation algorithms are presented: the first is based on the MMSE criterion, and the second is a lower-complexity approximation of the first. The proposed multiuser detection algorithm(s) are suitable for both terrestrial and satellite applications of CDMA.

Collaboration


Dive into the H. El Gamal's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lifeng Lai

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge