Sunteți pe pagina 1din 10

Quantum-assisted and Quantum-based Solutions in

Wireless Systems
Sandor Imre, Member, IEEE and Laszlo Gyongyosi, Member, IEEE,
Department of Telecommunications
Budapest University of Technology and Economics
Budapest, Hungary

Abstract— In wireless systems there is always a trade-off If the current trend of miniaturization continues, above-
between reducing the transmit power and mitigating the mentioned lines will depart from the well-known natural
resultant signal-degradation imposed by the transmit-power environment obeying the well-understood rules revealed step by
reduction with the aid of sophisticated receiver algorithms, when step during the evolution of the human race and enter into a new
considering the total energy consumption. Quantum-assisted world, where ’the traveler has to obey strange new rules if
wireless communications exploits the extra computing power he/she would like to pass through this nano-world’. The new
offered by quantum mechanics based architectures. This paper rules are explained by quantum mechanics and the ’border
summarizes some recent results in quantum computing and the between these two worlds’ lies around one nanometer (10−9m)
corresponding application areas in wireless communications. thickness. These rules are sometimes similar to their classic (i.e.
macroscopic) counterparts, but sometimes they are quite
strange. The reality is though that we have entered this ’nano-
era’, hence we have to accept its rules as the new framework of
computing and communications. Let us briefly explore their
I. INTRODUCTION benefits.
One day in 1965 when Gordon Moore from Intel was preparing a
presentation and started to draw a plot about the performance of A. Background
memory chips he suddenly observed an interesting rule-of-thumb, In the year 1985 Feynman suggested a new straightforward
which was later termed as Moore’s law. He concluded that since approach [138]. Instead of regarding computers as devices
the invention of the transistor the number of transistors per chip operating under the laws of classic physics - which is common
roughly doubled every 18-24 months, which eventually resulted sense – let us consider their operation as a special case of a more
in an exponential increase in the computing power of computers. general theory governed by quantum mechanics [139]. Our goal
Although this was an empirical observation without any is that of seeking algorithms, which are more efficient than their
theoretical substantiation, Moore’s law seems to have maintained best classic counterparts, but are only available in the quantum
its validity over the years, provided of course that sufficient world. The corresponding software-related efforts are in the
investment in science and technology is attracted by the semi- realms of quantum computing [140]. We might also hypothesize
conductor industry. that the capacity of a quantum channel could exceed that of
The growth in the processors’ performance is due to the fact classic wireless links or that we could design more secure
that we put more and more transistors on the same size chip. This protocols than the currently applied ones. Quantum
requires smaller and smaller transistors, which can be achieved if communications [141] or quantum information theory [142]
we are able to draw thinner and thinner lines onto the surface of a aims for answering these questions.
semiconductor wafer, lines that are significantly thinner than hair. In order to understand how quantum computing and
Current semiconductor technology also enables us to remove or communication might improve the performance of our classic
retain certain parts of the wafer according to the specific layout of wireless systems, let us summarize the four basic rules (called
transistors, diodes, external pins, etc. Postulates) of quantum mechanics from a telecommunications
engineering point of view [140]. These are similar to the
This material appeared in "Wireless Myths, Realities, and Futures: From Euclidean axioms of geometry in the sense that there are no
3G/4G to Optical and Quantum Wireless" by Hanzo, L.; Haas, H.; Imre, S.; formal proofs supporting them - but as a difference - anyone
O'Brien, D.; Rupp, M.; Gyongyosi, L., Proceedings of the IEEE, Volume: who presents an experiment, which contradicts to the postulates
100, Issue: Special Centennial Issue, DOI: 10.1109/JPROC.2012.2189788, might stand a chance of receiving the Nobel Prize. We will
2012, pp. 1853-1888. The full version of the paper is available at: demonstrate that any reader who is well-versed in wireless
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6191306. communications has sufficient background to accept these rules
at an abstraction level, which is required to absorb the results
A summary of this work is included in “Prolog to the Section on Wireless
presented in this paper. In order to pave the way further, we will
Communications Technology” by Hanzo, L.; Haas, H.; Imre, S.; O'Brien, D.;
Rupp, M.; Gyongyosi, L., Proceedings of the IEEE, Volume: 100, Issue: invoke the well-known DS-CDMA Maximum Likelihood Multi
Special Centennial Issue, DOI: 10.1109/JPROC.2012.2189809, 2012, pp. User Detection (ML-MUD) example as a bridge between the
1849-1852. The full version of the paper is available at: classic wireless and the quantum world.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6198345
23

m, which maximizes the conditional probability density function


TS
TS yk[i]
(PDF) of
ò
0
b̃M LS : max f (y|bm ). (15)
m
sk(t+iTs) MLS ~
b 1. The 1st Postulate declares how to describe the state of any
r(t) physical system 14 .
MBER
Considering our ML MUD problem, similarly to the classic
TS TS yl[i]
vectors b or y, a quantum register consisting of K qbits stores
ò
0 2K legitimate states at any instant, but the quantum register
sl(t+iTs) may assume all these states simultaneously, i.e. in parallel,
which is formulated as [141]:
K
Fig. 19: Multi-user DS-CDMA detector 2X −1
|ϕi = ϕi |ii. (16)
i=0

In our fairly simplified model the ith symbol of the kth (k = This implies from our MUD perspective that a single quantum
1, 2, . . . , K) user is denoted by bk [i], where the symbol-duration register is capable of storing all the legitimate bm hypotheses.
is TS . For the sake of simplicity we opt for BPSK, i.e. we have 2. The 2nd Postulate is related to the time evolution of any
bk [i] ∈ {+1, −1}. The channel-induced signal distortion from the system in time domain. 15
kth user’s perspective is modeled by means of hk (i, t) = ak [i]δ(t− The parallel processing capability of the quantum-search orig-
τk ), where we have ak [i] = Ak [i]ejαk [i] and Ak [i], αk [i] as well inating from the 2nd Postulate allows us to find the discrete
as τk are typically independent random variables. Finally, sk (t) PDF given by the relative frequencies of those transmitted
refers to the unique, user-specific DS-CDMA signature waveform. signal vectors bm that lead to a certain received signal
The complex baseband equivalent representation of the signal re- vector y, which are then combined by weighting with the
ceived at the base station is calculated by convolving the channel’s corresponding a priori probabilities. Finally, in possession of
input with its impulse response in the following manner: the function f (·|·) we may opt for using quantum-search for
finding the most likely transmitted signal vector bm , given a
K K
X X specific received signal vector y.
r(t) = hk (i, t) ∗ vk (i, t) = ak [i]bk [i]sk (t − iTS − τk ).
k=1 k=1
This postulate is one of the key features responsible for the
(13) significant speed up of quantum algorithms. Similar to the
Since in the uplink different τk delays are considered owing classic algorithms, any quantum-domain algorithm - such as
to the different distances of the MSs from the BS, the system a unitary transform - can be decomposed into a set of two-
is asynchronous. Furthermore, ak [i] is assumed to be completely and four dimensional unitary transforms (like the Karnaugh
unknown at the receiver, hence we have to solve a blind MUD method in classical systems) and implemented by means of
problem. a predefined set of corresponding elementary quantum gates.
When applying matched filters (MF) in the BS’s detector, their Returning to our ML MUD example - as any classic detector,
output for the ith symbol may be denoted by yk [i] this ML MUD may be implemented using adders, multipliers,
inverters, logical NAND etc. By analogy, provided that we
(i+1)T
Z s can find an efficient quantum MUD algorithm, we will be able
yk [i] = r(t)sk (t − iTs )dt. (14) to implement it using basic quantum gates and circuits. This
iTs analogy might appear to be trivial in the light of our everyday
In order to formulate the detection Cost Function (CF) more 14 In quantum computing, a qbit or quantum bit is a unit of quantum
explicitly, we construct two matrices from the transmitted symbol information, namely the ’quantum’ counterpart of the classic bit. More
combinations and from the corresponding MF outputs, yielding explicitly, the qbit is described by a specific quantum state in a two-
b = [b1 , b2 , ..., bK ], y = [y1 , y2 , ..., yK ], respectively. state quantum-mechanical system, which is formally equivalent to a two-
dimensional vector space defined over the complex numbers. A specific
To expound further, given the received signals encapsulated example of a two-state quantum system is constituted by the two legitimate
in the MF output vector y, we have 2K different hypotheses polarizations of a single photon, namely the vertical and horizontal polar-
according to all the different legitimate transmitted signals hosted izations. In a classic system, a bit would have to be either a logical ’one’
by the vectors bm , yielding the vector y = w(bm ) hosting all or a logical ’zero’, but apart from ’one’ and ’zero’ quantum mechanics
allows the qbit to be concomitantly in a superposition of both states, which
the received signals. The vector-to-vector mapping function w(·) inherently facilitates their parallel processing. This beneficial property is
represents the matched filters’ outputs in response to the transmitted inherent in quantum computing.
symbol-vector bm containing the symbols transmitted by all the To elaborate a little further, a single qbit may be represented as |ϕi =
users. More explicitly, this represents the mth hypothesis. The a|0i + b|1i, where |i is referred to as the Dirac’s Ket-notation [143]
routinely used in quantum-physics for describing a state, while a and b are
corresponding MUD architecture is depicted in Fig. 19.
complex-valued numbers satisfying |a|2 + |b|2 = 1. Hence the qbit may
Obviously w(·) depends not only on the transmitted symbols of be interpreted as a vector in the two-dimensional complex-valued vector-
the K users, but also on the random channel parameters. Moreover space, where a and b are the complex-valued probability amplitudes within
the mapping w(·) is not reversible. Therefore we are unable to the orthogonal bases |0i and |1i of the vector-space |ϕi.
15 From an engineering point of view the Schrödinger equation simplifies
unambiguously identify that particular transmitted symbol vector
to the following essence: the evolution of any closed physical system may
b, which results exactly in the received symbol vector y. Instead, be characterized with the aid of unitary transforms obeying the property of
the optimal decision relying on the Maximum Likelihood Sequence U −1 = U † , and |ψi = U |ϕi, where U † denotes the complex conjugated
(MLS) CF ’simply’ requires us to spot that particular hypothesis and transposed version of U .
24

practice, but owing to the strange rules of quantum mechanics Before delving into any further discussions on quantum commu-
it is not trivial at all - quite the contrary, it is remarkable. nication based solutions conceived for future wireless systems, one
3. The 3rd Postulate connects the nano as well as the classic of the interesting but strange consequences of the above postulates
macroscopic world and it is referred to as ’the measurement’. should be mentioned:
16
• The no cloning theorem [141] of quantum computing claims
From a ML MUD’s perspective the received signal vector that only known and/or orthogonal quantum states can be
y is entered into the quantum detector, which also prepares copied. Fortunately classic states, which are widely used in op-
an additional register containing all legitimate hypotheses bm erational computers and processors are orthogonal, therefore
associated with uniformly distributed coefficients according to the quantum description of nature as a whole is in harmony
the 1st Postulate. Hence, if we performed a measurement on with our every-day experiences. This property is useful, if
this register, we would find that any of the hypotheses bm has someone would like to protect his/her information against
a probability of 1/2K . The 2nd Postulate enables us to modify eavesdropping in the communication channel. In simplified
these coefficients in such a way that the most likely hypothesis terms we could argue that it is sufficient to encode the
will have the largest coefficient. An appropriately constructed classic information states into non-orthogonal quantum states
measurement will deliver this particular hypothesis with a and as a result, the malicious hacker will become unable to
probability that is proportional to the absolute squared value make a copy. However, the no cloning theorem imposes a
of the largest coefficient. In order to increase this probability strict limitation, when constructing ML MUD detectors. For
towards unity, we have to conceive a sophisticated quantum example, if we have an inner quantum state computed within
algorithm and prepare an appropriate measurement. the MUD algorithm, it is impossible to make several copies
4. The 4th Postulate defines the technique of combining individ- of it in order to perform different calculations on them! One
ual quantum systems. In our ML MUD example the quantum of the most important current research challenges is that of
register containing the hypotheses bm has a length of K designing repeaters for large wireless and optical quantum
qbits. It may however also be viewed as being constituted networks.
by K independent qbits. This postulate sets out the rules • Entanglement [140]: Let us now investigate further, what is
of how to switch between the above-mentioned two different encapsulated in the notation |ϕi. As argued in [140], when we
perspectives. Furthermore, if we would like to combine two consider a 2-qbit quantum state formulated as |ϕi = a|00i +
detectors, each designed for K users, this postulate outlines b|11i, the question arises, whether it might be possible to
how to construct the register having a length of 2K in the decompose it into two individual single-qbit states, such as:
resultant joint detector. 17
|ψi = (a1 |0i + b1 |1i)(a2 |0i + b2 |1i) (18)
In conclusion of the basic rules, we emphasize that classic
physics and engineering may be regarded as a subset of quantum = a1 a2 |00i + a1 b2 |01i + b1 a2 |10i + b1 b2 |11i?
theory. More explicitly, the postulates discussed above extend the The answer to this question may be shown to be no! To
design-space of practical algorithms and protocols we may invoke elaborate a little further, a latent linkage exists between the
in telecommunications problems. However, this new quantum world two qbits and hence if we decided to measure or determine
simply opens up new realms of solutions, without actually telling the first qbit of this 2-qbit register, then either |0i or |1i will
us, how to construct these solutions. In this respect, its role is be obtained randomly with the corresponding probabilities of
reminiscent of Shannonian information theory - it took our com- |a|2 and |b|2 , respectively. Provided the measuring equipment,
munity over half-a-century to find near-capacity solutions capable observes 0, then the measurement of the second qbit can only
of approaching Shannon’s visionary predictions... lead to 0. Similarly, if the first qbit is 1, the second qbit will
16 Any quantum measurement may be described by means of a set of
also be 1. This is because our 2-qbit system |ϕi contains the
superposition of two classic basis states and the measurement
measurement operators {Mm }, where m stands for a legitimate classic
integer result of the measurement. Quantum measurements differ in two is only capable of opting either for |00i or for |11i. Plausibly,
aspects from classic ones. Firstly, they are random in the sense that getting for |ψi having four basis states any combination of 0 and
the specific result m has a certain probability. Secondly, the measurement 1 may be encountered. Hence it appears as if there was
itself typically influences/perturbs or modifies the measured object. The a mysterious connection between the two qbits and indeed,
role of the measurement may be deemed to be analogous to that of the
D/A converter in the classic ’A/D converter, Digital Signal Processing
there is! Carefully designed experiments based on the Bell
(DSP), D/A converter’ chain. More explicitly, in quantum-processing we inequalities of [144] or on the inequalities formulated in [145]
have a Classic-to-Quantum (C/Q) domain converter, followed by a quantum- have demonstrated that this interesting effect remains valid
algorithm and a Q/C converter, where again, the latter block carries out the even if the qbits of |ϕi are delivered to two arbitrarily distant
measurement.
17 Individual qbits have to be combined by means of the tensor product locations. Furthermore, surprisingly the propagation of this
denoted as ⊗ exactly in the same manner as in case of classic bits (e.g. linkage between the two qbits after the first measurement takes
0 ⊗ 1 ⇒ 01). When considering several qbits, such as for example a 2- zero time.
qbit system, there are four quantum states i.e. |00i, |01i, |10i and |11i, Let us now introduce some further related terminology. The
which are constituted by the tensor product of the 1st and 2nd qbits. The quantum states whose decomposition exists in the above-
superimposed state is then formulated as
mentioned sense are referred to as product states, while
|ψi = a00 |00i + a01 |01i + a10 |10i + a11 |11i, (17) qbits/qregisters tied together by the above-mentioned phe-
nomenon are referred to as entangled states. Entanglement is
where |aij |2 is the post-measurement
P probability of occurrence of the state an efficient tool of quantum computing and communications,
|iji normalized as i,j |aij |2 = 1. Recall that a tensor product may be
viewed as a bilinear operator, which is a function that linearly combines
which facilitates the ’science-fiction concept of teleporting,
the elements of two vector spaces to generate an element in a third vector communication over zero-capacity channels’ and - more re-
space, as exemplified by a matrix multiplication. alistically - fast algorithms. However, at the time of writing
25

commercial ’quantum PCs’ and ’quantum-phones’ are absent algorithms was then disseminated in [140]. Similar database search
from the shelves of electronics shops. Nonetheless, emerging problems are also often encountered in wireless communications,
quantum communications applications are already available on for example, when finding the most suitable resource allocation,
the market, for example in the field of quantum cryptography, which results in the lowest level of co-channel interference across
while a range of further applications are close to practical the entire network.
implementation. To elaborate a little further on the potential quantum-based
Finally, it is worth mentioning that despite the fact that Einstein communications techniques of the future, searching through un-
initiated the quest for the clarification of the quantum rules, sorted databases may be viewed as being equivalent to finding
he never accepted the concept of entanglement (he referred to certain points of a function y = f (x), such as the minimum or
it as a ’spooky action at a distance’) in his highly-acclaimed maximum of a CF. Just to mention a few examples in wireless
thought-experiment known as the Einstein, Podolsky and Rosen communications, we are typically looking for the specific K-user
(EPR) paradox published in 1935 [146]. Just to mention one of bit vector, which maximizes the CF of a MUD, or of a multi-
the ’spooky actions at a distance’, when observing an entangled stream MIMO-detector, etc. Unfortunately, classic MUD or MIMO-
qbit, it sheer observation instantaneously changes its entangled detector solutions suffer from a high computational complexity if
counterpart, regardless of its geographic position, which implies the database is unsorted or equivalently, if the CF concerned has
a propagation velocity higher than that of light... numerous local minimum/maximum points.
For example, the ML MUD of a K = 10-user 64QAM
B. Quantum-assisted Communications wireless system would have to evaluate the MMSE CF for all
In wireless systems there is always a trade-off between re- legitimate symbol combinations, namely 6410 times, which is
ducing the transmit power and mitigating the resultant signal- clearly unrealistic. Furthermore, multiple CF-optima may exist,
degradation imposed by the transmit-power reduction with the aid when there are more transmit antennas in a MIMO system than
of sophisticated receiver algorithms, when considering the total the number of receiver antennas, because in this scenario the
energy consumption. This is because more sophisticated receivers channel-matrix becomes a non-square, rank-deficient and hence
dissipate more power. The associated relationship becomes even non-invertible matrix. Similar problems are also often encountered
more complex in a multi-user networking context. Ideally, our in resource-allocation techniques, when for example a MS has to
design objective should be that of minimizing the total power search through the list of potential hand-over target BSs to find
consumption assigned to both transmission over the ether and the one providing the best signal quality. In [151] the classic
to the signal-processing electronics. More explicitly, it is neither logarithmic search - which is known to be efficient for sorted data
economical nor ’green’ to invoke the most powerful available signal bases - has been combined with quantum-based ’existence testing’
processing techniques owing to their high power consumption, in order to answer the question, as to whether the data base does
unless the achievable total transmit power reduction or some other or does not contain a specific entry at all? As alluded to above,
design constraints, such a severely limited available frequency band MUDs or multi-stream MIMO detectors may also be viewed as the
justifies this. This is because in general, the bandwidth-efficiency optimization of carefully chosen CFs.
and power-efficiency are inversely proportional to each other. The scope of the above-mentioned K-user DS-CDMA MLS CF
Quantum-assisted wireless communications exploits the extra may be further extended, in order to handle an entire burst of sym-
computing power offered by quantum mechanics based architec- bols bk [i] for the K users. Naturally, in the absence of any channel-
tures. This subsection summarises some recent results in quantum induced dispersion, ie. Inter-Symbol Interference (ISI) there would
computing and the corresponding application areas in wireless be no benefit in considering several consecutive bits during the
communications. decision process, since they are independent of each other. How-
Grover published his quantum-domain database search algorithm ever, in case of practical ISI-contaminated dispersive channels this
in [147] and [148] to illustrate its benefits. This algorithm is capable so-called jointly optimum decision would mitigate/eliminate both
of searching through unsorted databases by initiating parallel data the MUI and ISI by estimating R symbols - rather than a single
base queries and evaluating the answers in parallel. Notwithstand- symbol - of all the K users jointly during a given DS-CDMA
ing its efficiency, Grover’s solutions require several consecutive transmission burst. This results in a potentially excessive search-
’query-evaluation’ pairs, nonetheless, they only necessitate on the space, which would be unrealistic to search through with the aid

order of O( N ) iterations to carry out the search compared to the of conventional search/detection techniques. Hence classic MUDs
classically required O(N ) complexity, where N is the size of the generate an estimate b̃k [i] for the K users on a symbol by symbol
search space. It was shown to be optimal in terms of the number of basis.
iterations in [149]. As a further advance, Boyer, Brassard, Hoyer Having considered the basic philosophy of ’quantumised’
and Tapp [150] then enhanced the original algorithm by making search/optimization techniques, let us now continue by stipulating
it capable of finding M occurrences of the requested entry in the the optimization CF, which potentially has a more grave influence
database and introduced upper bounds for the required number of on the final result, than the choice of the specific optimization
p
operations, which was found to be on the order of O( N /M ). technique employed. We can use for example the classic Zero-
Unfortunately the results of Grover’s algorithm are probabilistic in Forcing (ZF) and the Minimum Mean Square Error (MMSE) CF,
the sense that they provide the database index of the requested item as well as the more recently-proposed direct Minimum Bit-Error
with an error probability of Perr ≈ M /N . Following a range of Ratio (MBER) CF, which were used in a MIMO multi-stream
further improvements, such as for example the elimination of the detection context in [11] and the maximum likelihood sequence
probability of error without increasing the computational complex- (MLS) estimation criterion.
ity imposed as well as tolerating the non-uniform distribution of the The first version of the above-mentioned quantum-assisted mul-
input database indeces provided for example by another quantum tiuser detection (QMUD) method was published in [152] and
algorithm, the most general form of quantum database search improved in [140] and by Zhao et al. in [153]. A range of other
26

closely related approaches have been introduced during the period


of 2000 - 2010. For example, Li et al. applied quantum neural 
networks in [154], while Gao et al. [155] introduced a quantum

&1 1
bee colony optimization (QBCO) technique for solving the above- B1 O1
mentioned MUD problem. A1
C1 D1
F1
<
C. Quantum-based Communications
The rudiments of classic information theoretic capacity were
A2 &2 B2
C2
2
O2
D2
highlighted and relied upon in the earlier parts of this treatise, but F2
its generalization to quantum information theory [142] is beyond
the scope of this paper. Instead, we adopt a more practical approach Fig. 20: Superactivation of zero-capacity quantum channels
and review a few quantum communication related aspects.
Suffice to say that the classic Shannonian entropy H(p) has
to be replaced by the so-called quantum entropy S(ρ) of von of freedom associated with the encoding and decoding processes
Neumann [141], when we want to quantify the information content introduced by the 1st Postulate.
of a quantum source. Naturally, the N quantum channels may be The science-fiction saga continues... One of the hot research
regarded as an extension of the N classic channels, as detailed topics in this field is referred to as superactivation [160]. Naturally,
in [141], noting that some similarities to the complex baseband in contrast to the previous striking example, there are also numer-
equivalent description widely used in wireless communication may ous quantum channels, which have zero capacity in the context of
be observed [156]. As an important application example, the error classic information transmission. Nonetheless, when considering
correction techniques of classic wireless communications have also two of these channels used in a parallel manner and, additionally
been extended to quantum channels. More specifically, various applying the ’entanglement-controlled’ decoder architecture D of
block-coding methods were developed in [141], while pilot-symbol Fig. 20, the pair of quantum channels N1 and N2 succeed in
based solutions have appeared in [157]. delivering classic information over the A1 − O1 and A2 − O2
Let us now turn our attention to the realms of opportunities links. In other words, their capacities have been (super)activated,
opened up by communications over quantum channels. Naturally, where A1 and A2 are the channel inputs, while B1 and B2 are
their capacity is one of the key aspects of their promise in future the corresponding channel outputs linked to the decoder. This
communications. Classically the mutual information between the superactivation may be achieved by coupling the two subdecoders
channel’s input and output has to be maximized [158]. Naturally, D1 and D2 with the aid of the entangled state |Ψi of inputs C1 and
in case of quantum channels the capacity had to be redefined, C2 . The outputs O1 and O2 of the decoder provide the payload
potentially leading to diverse scenarios to be considered. A natural information, while Di and Fi have an auxiliary role, since they
distinction concerning the channel capacity definition is, whether guarantee that the operator describing the overall operation of the
we restrict ourselves to classic inputs/outputs or not. In the former decoder remains unitary. Current research aims to complete the set
case of classic inputs/outputs we encode the input symbols/states of those channels which can be superactivated.
into quantum states, send them over the channel and carry out Concerning the entanglement assisted capacity CE (N ), when
a decision at the receiver side, effectively constructing a ’classic- the qbits at the channel’s input are conditioned to be entangled, a
quantum-classic’ processing chain. This is a natural approach, since plethora of open questions are under discussion. Perhaps the most
humans can only process classic information. By contrast, if we do challenging one to answer is, whether entanglement is capable of
not restrict ourselves to classic inputs/outputs, we are capable of increasing the attainable capacity.
dealing with quantum channels within larger quantum systems. The A promising, but rather specific application of quantum chan-
most important question arising in this context is, whether quantum nels is constituted by secret quantum key distribution techniques
channels are capable at all of increasing the achievable capacity and conceived for exchanging the classic encryption keys, which can
if so, under what conditions. be used for symmetric-key cryptography between distant locations.
The classic capacity of quantum channels has been quantified In order to indicate the importance of this area, information
for decomposable product state inputs in form of the so-called theoreticians have defined the private capacity CP (N ) of quantum
unentangled classical capacity, which is also often referred to as channels from a secure classic information transmission perspec-
the Holevo-Schumacher-Westmoreland (HSW) capacity denoted by tive [161].
C(N ). In order to highlight the power behind the application of If quantum information is fed into the quantum channel, the so-
quantum channels, let us consider a rudimentary example. The called quantum capacity Q(N ), which is also referred to as the
classical binary symmetric channel (BSC), which either inverts or Lloyd-Shor-Devetak (LSD) capacity [162] has to be considered,
leaves unchanged an input bit with a probability of p = 1/2 has which is expected to be upper-bounded by the classic capacity of
zero capacity quantified as C(N ) = 1 − H(p) = 0. However, we the same channel. In this context the MUD problem also exists
may readily construct an appropriate classic-single-bit to single- in quantum channels, as discussed in [163, 164]. For detailed
qbit encoding at the transmitter and the corresponding detector at discussions on quantum information theory please refer to [142].
the receiver [159], so that all the classic bits transmitted over the
channel will be received correctly with a unity probability, i.e. we
VI. C ONCLUSIONS
have C(N ) = 1. As a stunning consequence, redundancy-free error
correction is possible over noisy transmission media, at least for Many important aspects of contemporary wireless solutions have
a specific subset of quantum channels. The rationale of this extra- not even been touch upon owing to space-limitations, such as the
ordinary statement may be traced back to the increased degree benefits of Ultra-Wideband (UWB) systems [165] or Cognitive
27

Radios (CR) [166, 167] - just to mention a few of the essential R EFERENCES
elements of the wireless landscape. [1] L. Hanzo, M. El-Hajjar, and O. Alamri, “Near-capacity wireless
Again, over the past three decades a 1000-fold bit rate im- transceivers and cooperative communications in the mimo era:
provement was achieved, which facilitated the introduction of the Evolution of standards, waveform design, and future perspectives,”
Proceedings of the IEEE, vol. 99, no. 8, pp. 1343 – 1385, 2011.
powerful new wireless services featured in the stylised illustration [2] R. Steele and L. Hanzo, Mobile radio communications: Second and
of Figure 2. These enticing, but bandwidth-hungry and power- third generation cellular and WATM systems, Second ed. Chichester,
thirsty multimedia services ’absorbed’ the above-mentioned bitrate UK.: Wiley, 1999.
improvements. Furthermore, the increased popularity and wealth- [3] L. Hanzo, L.-L. Yang, E.-L. Kuan and K. Yen, Single and multi-
creation potential of conventional mobile phones, IPhones and carrier DS-CDMA: Multi-user detection, space-time spreading, syn-
chronisation, networking and standards. Chichester, England: John
tablet-computers resulted in the unprecedented penetration of wire- Wiley and Sons Ltd & IEEE Press, 2003.
less communications, as indicated in Figure 1. As a result, the [4] L. Hanzo, J. Blogh, S. Ni, 3G, HSPA and FDD versus TDD
amount of tele-traffic is expected to substantially increase during Networking: Smart Antennas and Adaptive Modulation. : John
the next decade, which requires new frequency bands. As a result, Wiley and Sons Ltd & IEEE Press, 2008.
[5] L. Hanzo, C.H. Wong and M.S. Yee, Adaptive wireless transceivers:
the RF bands gradually migrated from 450 MHz, 900 MHz, 2 GHz, turbo-coded, turbo-equalized and space-time coded TDMA, CDMA
5 GHz, 60 GHz and beyond, into the THz optical domain. and OFDM systems. Chichester, UK: John Wiley and Sons & IEEE
Regretfully, as the carrier frequency is increased, the pathloss Press, 2002.
tends to increase and the RF propagation properties gradually [6] L. Hanzo, M. Münster, B.J. Choi and T. Keller, OFDM and
MC-CDMA for broadband multi-user communications, WLANs and
become reminiscent of those of visible light. Hence the cell-size has broadcasting. Chichester, UK: Wiley & IEEE Press, 2003.
been reduced over the past decades from the original 35 km rural [7] L. Hanzo, J. Akhtman, L. Wang, M. Jiang, MIMO-OFDM FOR LTE,
GSM-cells to small urban pico-cells. Since plenty of unlicensed WIFI AND WIMAX: COHERENT VERSUS NON-COHERENT AND
bandwidth is available in the optical frequency domain, cutting- COOPERATIVE TURBO-TRANSCEIVERS. Chichester, UK: Wiley
& IEEE Press, 2010.
edge new research is required for achieving the same level of
[8] “Measuring the information society 2011,” International Telecom-
maturity in optical wireless communications, as in RF engineering. munication Union (ITU), 2011.
Additionally, radical advances are required in both quantum- [9] S. Y. Yoon, “Introduction to WiBro Technology,” Samsung Elec-
information theory to set out the theoretical performance limits, tronics Co., Ltd., September 2004, http://www.itu.int/ITU-D/imt-
like Shannon did for classic communications, and in the quantum- 2000/documents/Busan/Session3 Yoon.pdf.
[10] C. Shannon, “Communication in the presence of noise,” Proceedings
domain counterparts of RF transceivers capable of approaching the of the I.R.E., vol. 37, pp. 10–22, January 1949.
quantum-information theoretic predictions. [11] S. Sugiura, S. Chen, and L. Hanzo, “MIMO-aided near-capacity
Again, not even touch upon in this treatise, nonetheless, we turbo transceivers: Taxonomy and performance versus complexity,”
would like to close by alluding to flawless tele-presence, which IEEE Communications Surveys and Tutorials, pp. 1 – 22, 2012.
[12] G.J. Foschini, “Layered space-time architecture for wireless commu-
requires the extension of the transceiver design principles provided nication in a fading environment when using multiple antennas,” Bell
in this treatise to compelling future services, with an ambience of Laboratories Technical Journal, vol. 1, no. 2, pp. 41–59, Autumn
joy and wonder. The recent advances in three-dimensional (3D) 1996.
and holographic displays [168] facilitate immersive, flawless tele- [13] S.M. Alamouti, “A simple transmit diversity technique for wireless
communications,” IEEE Journal on Selected Areas in Communica-
presence with the aid of the stereoscopic video toolbox of the tions, vol. 16, no. 8, pp. 1451–1458, 1998.
H.264/MPEG4 codec, provided of course that a sufficiently high- [14] V. Tarokh, A. Naguib, N. Seshadri and A.R. Calderbank, “Space-
speed, high-integrity wireless link is available. time codes for high data rate wireless communication: performance
The holographic video displays available on the market at the criteria in the presence of channel estimation errors, mobility and
multiple paths,” IEEE Transactions on Communications, vol. 47,
time of writing are set to revolutionarize telecommunications, as the no. 2, pp. 199–207, February 1999.
emergence of mobile communications did two decades ago, leading [15] L. Hanzo, T.H. Liew and B.L. Yeap and R.Y.S. Tee and S.X.
to flawless tele-presence. However, the error-resilient streaming of Ng, Turbo coding, turbo equalisation and space time coding for
multiview and 3D holographic video using optical wireless and transmission over fading channels. Chichester, UK: Wiley & IEEE
Press, 2011.
quantum-domain transceivers constitutes a further challenge...
[16] G. Forney and D. Costello, “Channel coding: The road to channel
capacity,” Proceedings of the IEEE, vol. 95, no. 6, 2007.
[17] T. Liew and L. Hanzo, “Space-time codes and concatenated channel
ACKNOWLEDGMENT codes for wireless communications,” Proceedings of the IEEE,
vol. 90, no. 2, February 2002.
We would like to thank Sebastian Caban and Christian [18] Nasruminallah and L. Hanzo, “Near-capacity h.264 multimedia com-
Mehlführer for their expert support of the measurements as well as munications using iterative joint source-channel decoding,” IEEE
Stefan Schwarz for providing LTE simulations and preparing Fig- Communications Surveys and Tutorials, 2012.
ures 9–11 at the University of Technology in Vienna. [19] N. Bonello, S. Chen, and L. Hanzo, “Low-density parity-check
codes and their rateless relatives,” IEEE Communications Surveys
We would like to thank the current and past members of the & Tutorials, vol. 13, 2012.
optical wireless communications groups at Oxford and Edinburgh [20] M. Butt, S. Ng, and L. Hanzo, “Self-concatenated code design and
for their contributions to the work reported in this treatise, espe- its application in power-efficient cooperative communications,” IEEE
cially Svilen Dimitrov for providing the results on optical wireless Communications Surveys and Tutorials, 2012.
[21] L. Wang and L. Hanzo, “Dispensing with channel estimation: Dif-
networking.
ferentially modulated cooperative wireless communications,” IEEE
Harald Haas would also like to acknowledge the support of the Communications Surveys & Tutorials, 2012.
work on the optical wireless networking by Airbus Germany. [22] E. Damosso, L. Stola, and G. Brussaard, “Characterisation of the 50-
Lajos Hanzo would like to thank his colleagues at the University 70 GHz band for space communications,” European Space Agency
Journal, vol. 7, 1983.
of Southampton, UK, in particular Jos Akhtman and Raymond [23] R. Ott and M. Thompson, “Atmospheric amplitude spectra in an ab-
Steels for the enlightenment gained from past and present collab- sorption region,” in Proceedings of IEEE AP-S Symposium, Amherst,
orations. MA, USA, 1976.
28

[24] O. D. Lange, A. Dietrich, and D.C.Hogg, “An experiment on 2010. [Online]. Available: http://publik.tuwien.ac.at/files/PubDat
propagation of 60 ghz waves through rain,” in Bell Systems Technical 187112.pdf
Journal, vol. 54, 1975. [44] ——, “Cellular system physical layer throughput: How far off
[25] S. Chia, D. Greenwood, D. Rickard, C. Shephard, and R. Steele, are we from the shannon bound?” IEEE Wireless Communications
“Propagation studies for a point-to-point 60 ghz micro-cellular Magazine, Dec. 2011.
system for urban environments,” in IEE Communications ’86, Birm- [45] S. Caban, C. Mehlführer, M. Rupp, and M. Wrulich, Evaluation
ingham, 1986. of HSDPA to LTE: From Testbed Measurements to System Level
[26] T. Rappaport, J. Murdock, and F. Gutierrez, “State of the art in 60- Performance. Wiley Blackwell, 2012.
ghz integrated circuits and systems for wireless communications,” [46] L. Hentilä, P. Kyösti, M. Käske, M. Narandzic, and
Proceedings of the IEEE, vol. 99, no. 8, 2011. M. Alatossava, “MATLAB implementation of the WINNER
[27] A. Ogasawara, “Energy Issues Confronting the Information and phase ii channel model ver1.1,” Dec. 2007. [Online]. Available:
Communication Sector,” NISTEP: Science and Technology Trends http://www.ist-winner.org/phase 2 model.html
- Quarterly Review, no. 21, October 2006. [Online]. Available: [47] C. Mehlführer, S. Caban, and M. Rupp, “Experimental evaluation
www.nistep.go.jp/achiev/ftx/eng/stfc/stt021e/qr21pdf/STTqr2102.pdf of adaptive modulation and coding in MIMO WiMAX with
[28] EIA, “Average retail price of electricity to ultimate customers: Total limited feedback,” EURASIP Journal on Advances in Signal
by end-use sector,” Energy Information Administration: Official En- Processing, Special Issue on MIMO Systems with Limited
ergy Statistics from the U.S. Government, May 2008. [Online]. Avail- Feedback, vol. 2008, Article ID 837102, 2008. [Online]. Available:
able: http://www.eia.doe.gov/cneaf/electricity/epm/table5 3.html http://publik.tuwien.ac.at/files/pub-et 13762.pdf
[29] A. Ghosh, D. R. Wolter, J. G. Andrews, and R. Chen, [48] M. Rupp, C. Mehlführer, and S. Caban, “On achieving the Shannon
“Broadband wireless access with WiMax/802.16: current bound in cellular systems,” in Proc. 20th International Conference
performance benchmarks and future potential,” IEEE Commun. Radioelektronika 2010, Brno, Czech Republik, Apr. 2010. [Online].
Mag., vol. 43, no. 2, pp. 129–136, 2005. [Online]. Available: Available: http://publik.tuwien.ac.at/files/PubDat 185403.pdf
[49] S. Caban, C. Mehlführer, G. Lechner, and M. Rupp, “Testbedding
http://ieeexplore.ieee.org/iel5/35/30297/01391513.pdf?tp=&arnumber=1391513
[30] H. Holma, A. Toskala, K. Ranta-aho, and J. Pirskanen, “High-speed MIMO HSDPA and WiMAX,” in Proc. 70th IEEE Vehicular
packet access evolution in 3GPP release 7,” IEEE Commun. Technology Conference (VTC2009-Fall), Anchorage, AK, USA, Sept.
Mag., vol. 45, no. 12, pp. 29–35, Dec. 2007. [Online]. Available: 2009. [Online]. Available: http://publik.tuwien.ac.at/files/PubDat
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4395362 176574.pdf
[31] E. Dahlman, S. Parkvall, J. Sköld, and P. Beming, 3G Evolution – [50] B. Efron and D. V. Hinkley, An Introduction to the Bootstrap
HSPA and LTE for Mobile Broadband, 1st ed. Academic Press, (CRC Monographs on Statistics & Applied Probability 57), 1st ed.
2007. Chapman & Hall/CRC, 1994.
[32] S. Parkvall, E. Dahlman, A. Furuskar, Y. Jading, M. Olsson, [51] S. Schwarz, M. Simko, and M. Rupp, “On performance bounds for
S. Wanstedt, and K. Zangi, “LTE-advanced - evolving LTE MIMO OFDM based wireless communication systems,” in Proc.
towards IMT-advanced,” in Proc. 68th IEEE Vehicular Technology of the 12th IEEE International Workshop on Signal Processing
Conference 2008 (VTC2008-Fall), Sept. 2008. [Online]. Available: Advances in Wireless Communications (SPAWC 2011), June 2011.
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4657145 [52] S. Schwarz and M. Rupp, “Throughput maximizing feedback for
[33] TC LTE Group, “LTE simulator website,” 2009, [Online] MIMO OFDM based wireless communication systems,” in Proc.
http://www.nt.tuwien.ac.at/ltesimulator/. of the 12th IEEE International Workshop on Signal Processing
[34] P. Vandewalle, J. Kovacevic, and M. Vetterli, “Reproducible Research Advances in Wireless Communications (SPAWC 2011), June 2011.
in Signal Processing - What, why, and how,” IEEE Signal Processing [53] A. Paulraj, R. Nabar, and D. Gore, Introduction to Space-Time
Magazine, vol. 26, no. 3, pp. 37–47, 2009. Wireless Communications, 1st ed. Cambridge Univ. Press, 2003.
[35] S. Caban, J. A. Garcı́a-Naya, and M. Rupp, “Measuring the physical [54] A. F. Molisch, Wireless Communications, 1st ed. John Wiley &
layer performance of wireless communication systems,” IEEE Sons, 2005.
Instrumentation & Measurement Magazine, vol. 14, no. 5, pp. 8–17, [55] L. M. Correia, Ed., Wireless Flexible Personalised Communications.
2011. [Online]. Available: http://publik.tuwien.ac.at/files/PubDat Wiley, 2001.
201647.pdf [56] J. P. Kermoal, L. Schumacher, K. I. Pedersen, P. E. Mogensen,
[36] G. J. Foschini and M. J. Gans, “On limits of and F. Frederiksen, “A stochastic MIMO radio channel model
wireless communications in a fading environment when with experimental validation,” IEEE J. Sel. Areas Commun.,
using multiple antennas,” Wireless Personal Communications, vol. 20, no. 6, pp. 1211–1226, Aug. 2002. [Online]. Available:
vol. 6, no. 3, pp. 311–335, Mar. 1998. [Online]. Available: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1021913
http://www.springerlink.com/content/h1n7866218781520/fulltext.pdf [57] H. Hofstetter and G. Steinböck, “A geometric based stochastic
[37] I. E. Telatar, “Capacity of multi-antenna gaussian channels,” channel model for MIMO systems,” in Proc. of the ITG Workshop
European Transactions on Telecommunications, 1999, Technical on Smart Antennas, Munich, Germany, Mar. 2004.
Memorandum, Bell Laboratories, Lucent Technologies, vol. 10, [58] 3GPP, “Technical specification group radio access network; spatial
no. 6, pp. 585–595, Oct. 1998. [Online]. Available: channel model for Multiple Input Multiple Output (MIMO)
http://mars.bell-labs.com/papers/proof/proof.pdf simulations (release 8). 3GPP TS 25.996 v8.0.0,” Dec. 2008.
[38] L. Hanzo, O. Alamri, M. El-Hajjar, and N. Wu, Near-Capacity Multi- [Online]. Available: http://www.ist-winner.org/3gpp scm.html
Functional MIMO Systems: Sphere-Packing, Iterative Detection and [59] M. Rupp, J. A. Garcı́a-Naya, C. Mehlführer, S. Caban, and
Cooperation. IEEE Press - John Wiley, 2009. L. Castedo, “On mutual information and capacity in frequency
[39] S. Verdu, “Spectral efficiency in the wideband regime,” IEEE Trans. selective wireless channels,” in Proc. IEEE International Conference
Inf. Theory, vol. 48, no. 6, pp. 1319–1343, June 2002. on Communications (ICC 2010), Cape Town, South Africa, May
[40] G. Durisi, U. G. Schuster, H. Bölcskei, and S. Shamai (Shitz), 2010. [Online]. Available: http://publik.tuwien.ac.at/files/PubDat
“Noncoherent capacity of underspread fading channels,” 184660.pdf
IEEE Transactions on Information Theory, vol. 56, [60] X.-Y. Hu, E. Eleftheriou, and D. Arnold, “Regular and irregular
no. 1, pp. 367–395, Jan. 2010. [Online]. Available: progressive edge-growth tanner graphs,” IEEE Trans. Inf. Theory,
http://www.nari.ee.ethz.ch/commth/pubs/p/dsbsIT08 vol. 51, no. 1, pp. 386–398, Jan. 2005. [Online]. Available:
[41] J. Andrews, S. Shakkottai, R. Heath, N. Jindal, M. Haenggi, R. Berry, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1377521
D. Guo, M. Neely, S. Weber, S. Jafar, and A. Yener, “Rethinking [61] D. J. MacKay, “Good error-correcting codes based on
information theory for mobile ad hoc networks,” Communications very sparse matrices,” IEEE Trans. Inf. Theory, vol. 45,
Magazine, IEEE, vol. 46, no. 12, pp. 94 –101, Dec. 2008. no. 2, pp. 399–431, Mar. 1999. [Online]. Available:
[42] A. Tulino, A. Lozano, and S. Verdu, “MIMO capacity with channel http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=00748992
state information at the transmitter,” in Proc. ISSSTA, Sydney, [62] C. Mehlführer, S. Caban, and M. Rupp, “An accurate and low
Australia, Aug. 2004, pp. 22–26. complex channel estimator for OFDM WiMAX,” in Proc. 3rd
[43] C. Mehlführer, S. Caban, and M. Rupp, “Measurement-based International Symposium on Communications, Control and Signal
performance evaluation of MIMO HSDPA,” IEEE Transactions Processing (ISCCSP 2008), St. Julians, Malta, Mar. 2008, pp.
on Vehicular Technology, vol. 59, no. 9, pp. 4354–4367, Nov. 922–926. [Online]. Available: http://publik.tuwien.ac.at/files/pub-et
29

13650.pdf [88] R. Mesleh, H. Elgala, and H. Haas, “On the performance of different
[63] M. Simko, S. Pendl, S. Schwarz, Q. Wang, J. C. Ikuno, and M. Rupp, OFDM based optical wireless communication systems,” Journal of
“Optimal pilot symbol power allocation in LTE,” in Proc. IEEE 74th Optical Communications and Networking, vol. 3, no. 8, pp. 620–628,
Vehicular Technology Conference, (VTC2011-Fall), Sept. 2011. 2011.
[64] M. Simko and M. Rupp, “Optimal pilot symbol power allocation in [89] S. Dimitrov and H. Haas, “On the Clipping Noise in an ACO-
multi-cell scenario in LTE,” in Proc. of 44th Asilomar conference, OFDM Optical Wireless Communication System,” 2010 IEEE
Nov. 2011. Global Telecommunications Conference Globecom 2010, p. 6420,
[65] B. M. Hochwald, “Cayley differential unitary space-time codes,” 2010.
IEEE Trans. Inform. Theory, pp. 1485–1503, 2002. [90] D. Wisely and I. Neild, “A 100 Mbit/s tracked optical wireless
[66] J. G. Proakis, Ed., Digital Communications, 3rd ed. McGraw-Hill, telepoint,” in 8th International Symposium on Personal, Indoor and
1995. Mobile Radio Communications - PIMRC ’97, 1997, p. 1232.
[67] F. R. Gfeller and U. Bapst, “Wireless in-house data communication [91] J. B. Carruthers and J. M. Kahn, “Angle diversity for nondirected
via diffuse infrared radiation,” Proceedings of the IEEE, vol. 67, wireless infrared communication,” IEEE Transactions on Communi-
no. 11, pp. 1474–1486, 1979. cations, vol. 48, no. 6, pp. 960–969, 2000.
[68] H. Elgala, R. Mesleh, and H. Haas, “Indoor Optical Wireless Com- [92] G. Yun and M. Kavehrad, “Spot-diffusing and fly-eye receivers for
munication: Potential and State-of-the-Art,” IEEE Communications indoor infrared wireless communications,” in 1992 IEEE Interna-
Magazine, vol. 49, no. 9, pp. 56–62, 2011. tional Conference on Selected Topics in Wireless Communications,
[69] J. D. Barry, Wireless infrared communications. Kluwer, 1994. 1992, pp. xiv+468.
[70] Visible Light Communications Consortium, “www.vlcc.net,” Ac- [93] P. Djahani and J. M. Kahn, “Analysis of infrared wireless links
cessed 2012. employing multibeam transmitters and imaging diversity receivers,”
[71] Japan Electronics Industry Technology Association, “CP-1221 IEEE Transactions on Communications, vol. 48, no. 12, pp. 2077–
Japanese Visible Light Communications System,” 2007. 2088, 2000.
[72] Japan Electronics Industry Technology Association, “CP-1222 [94] F. Parand, G. E. Faulkner, and D. C. O’Brien, “Cellular tracked op-
Japanese Visible Light ID System,” 2007. tical wireless demonstration link,” IEE Proceedings-Optoelectronics,
[73] IEEE, “IEEE Standard for Local and Metropolitan Area Networks- vol. 150, no. 5, pp. 490–6, 2003.
Part 15.7: Short-Range Wireless Optical Communication Using Vis- [95] S. Jivkova, B. A. Hristov, and M. Kavehrad, “Power-efficient
ible Light ,” 2011. multispot-diffuse multiple-input-multiple-output approach to broad-
[74] International Electrotechnical Commission, IEC 60825-1. Safety of band optical wireless communications,” IEEE Transactions on Ve-
laser products part 1. British Standards Institution, 2007. hicular Technology, vol. 53, no. 3, pp. 882–9, 2004.
[75] P. L. Eardley, D. R. Wisely, D. Wood, and P. McKee, “Holograms [96] F. E. Alsaadi and J. M. H. Elmirghani, “Mobile multigigabit indoor
for optical wireless lans,” IEE Proceedings-Optoelectronics, vol. 143, optical wireless systems employing multibeam power adaptation and
no. 6, pp. 365–369, 1996. imaging diversity receivers,” Journal of Optical Communications and
[76] A. C. Boucouvalas, “Indoor ambient light noise and its effect on Networking, vol. 3, no. 1, pp. 27–39, 2011.
wireless optical links,” IEE Proceedings-Optoelectronics, vol. 143, [97] S. Hranilovic and F. Kschischang, “A pixelated MIMO wireless
no. 6, pp. 334–338, 1996. optical communication system,” IEEE Journal of Selected Topics in
[77] R. Winston, W. T. Welford, J. C. Minano, and P. Benitez, Nonimaging Quantum Electronics, vol. 12, no. 4, pp. 859–74, 2006.
optics. Elsevier Academic Press, 2005. [98] L. B. Zeng, D. C. O’Brien, H. Le Minh, G. E. Faulkner, K. Lee,
[78] D. C. O’Brien, G. E. Faulkner, E. B. Zyambo, K. Jim, D. J. Edwards, D. Jung, Y. Oh, and E. T. Won, “High Data Rate Multiple Input
P. Stavrinou, G. Parry, J. Bellon, M. J. Sibley, V. A. Lalithambika, Multiple Output (MIMO) Optical Wireless Communications Using
V. M. Joyner, R. J. Samsudin, D. M. Holburn, and R. J. Mears, White LED Lighting,” IEEE Journal on Selected Areas in Commu-
“Integrated transceivers for optical wireless communications,” IEEE nications, vol. 27, no. 9, pp. 1654–1662, 2009.
Journal of Selected Topics in Quantum Electronics, vol. 11, no. 1, [99] R. Mesleh, H. Elgala, and H. Haas, “Optical spatial modulation,”
pp. 173–83, 2005. IEEE/OSA Journal of Optical Communications and Networking,
[79] V. Jungnickel, V. Pohl, S. Nonnig, and C. von Helmolt, “A phys- vol. 3, no. 3, pp. 234–244, 2011.
ical model of the wireless infrared communication channel,” IEEE [100] K. Dambul, D. O’Brien, and G. Faulkner, “Indoor Optical Wireless
Journal on Selected Areas in Communications, vol. 20, no. 3, pp. MIMO System with an Imaging Receiver,” IEEE Photonics Technol-
631–40, 2002. ogy Letters, vol. 23, no. 2, pp. 97–99, 2011.
[80] J. M. Kahn, W. J. Krause, and J. B. Carruthers, “Experimental [101] L. Hanzo, M. El-Hajjar, and O. Alamri, “Near-capacity wireless
characterization of non-directed indoor infrared channels,” IEEE transceivers and cooperative communications in the mimo era:
Transactions on Communications, vol. 43, no. 2-4, pp. 1613–1623, Evolution of standards, waveform design, and future perspectives,”
1995. Proceedings of the IEEE, vol. 99, no. 8, pp. 1343 – 1385, 2011.
[81] J. R. Barry and J. M. Kahn, “Link design for nondirected wireless [102] S. Sugiura, S. Chen, and L. Hanzo, “Mimo-aided near-capacity turbo
infrared communications,” Applied Optics, vol. 34, no. 19, pp. 3764– transceivers: Taxonomy and performance versus complexity,” IEEE
3776, 1995. Communications Surveys and Tutorials, pp. 1–22, 2011.
[82] J. Grubor, S. Randel, K. D. Langer, and J. W. Walewski, “Broadband [103] ——, “A universal space-time architecture for multiple-antenna aided
information broadcasting using led-based interior lighting,” Journal systems,” IEEE Communications Surveys and Tutorials, 2011.
of Lightwave Technology, vol. 26, no. 24, pp. 3883–3892, 2008. [104] H. Le Minh, D. O’Brien, G. Faulkner, L. B. Zeng, K. Lee, D. Jung,
[83] H. Le-Minh, D. O’Brien, G. Faulkner, M. Wolf, L. Grobe, J. Lui, Y. Oh, and E. T. Won, “100-Mb/s NRZ Visible Light Communica-
and O. Bouchet, “A 1.25Gbit/s Indoor optical wireless demonstrator,” tions Using a Postequalized White LED,” IEEE Photonics Technol-
IEEE Photonics Technology Letters, vol. 22, no. 21, pp. 1598–1600, ogy Letters, vol. 21, no. 15, pp. 1063–1065, 2009.
2010. [105] K. Wang, A. Nirmalathas, C. Lim, and E. Skafidas, “4 x 12.5
[84] D. O’Brien, R. Turnbull, H. Le Minh, G. Faulkner, M. Wolf, Gb/s WDM Optical Wireless Communication System for Indoor
L. Grobe, J. Li, O. Bouchet, and E. Gueutier, “A 280Mbit/s infrared Applications,” Journal of Lightwave Technology, vol. 29, no. 13, pp.
optical wireless communications system,” in Free-Space and Atmo- 1988–1996, 2011.
spheric Laser Communications XI, vol. 8162. San Diego, California, [106] A. Khanifar and R. J. Green, “Photoparametric amplifiers for
USA: SPIE, 2011, pp. 81 620K–6. subcarrier-multiplexed communication systems,” IEE Proceedings-
[85] A. J. Lowery and J. Armstrong, “10 Gbit/s multimode fiber link using Optoelectronics, vol. 146, no. 5, pp. 223–229, 1999.
power-efficient orthogonal-frequency-division multiplexing,” Optics [107] G. Gilbreath and W. Rabinovich, “Research in free-space optical data
Express, vol. 13, no. 25, pp. 10 003–10 009, 2005. transfer at the u.s. naval research laboratory,” Proceedings of the
[86] J. Vucic, C. Kottke, S. Nerreter, K. D. Langer, and J. W. Walewski, SPIE The International Society for Optical Engineering, vol. 5160,
“513 Mbit/s Visible Light Communications Link Based on DMT- no. 1, pp. 225–33, 2004.
Modulation of a White LED,” Journal of Lightwave Technology, [108] Huanlin-Zhang, Seetharaman-A, Johnson-P, Guipeng-Luo, and Le-
vol. 28, no. 24, pp. 3512–3518, 2010. Hq, “High-gain low-noise mid-infrared quantum cascade optical
[87] J. Armstrong and A. Lowery, “Power efficient optical OFDM,” preamplifier for receiver,” IEEE Photonics Technology Letters,
Electronics Letters, vol. 42, no. 6, pp. 370–2, 2006. vol. 17, no. 1, pp. 13–15, 2005.
30

[109] D. C. O’Brien and M. Katz, “Invited. optical wireless communica- E. Bassow, “On the SIR of a Cellular Infrared Optical Wireless
tions within fourth-generation wireless systems,” Journal of optical System for an Aircraft,” IEEE Journal on Selected Areas in Commu-
networking, vol. 4, no. 6, p. 312, 2005. nications (IEEE JSAC), vol. 27, no. 9, pp. 1623–1638, Dec. 2009.
[110] Hou-J and O’Brien-Dc, “Vertical handover-decision-making algo- [133] Y. Tanaka, T. Komine, S. Haruyama, and M. Nakagawa, “Indoor
rithm using fuzzy logic for the integrated Radio-and-OW system,” Visible Communication Utilizing Plural White LEDs as Lighting,” in
IEEE Transactions on Wireless Communications, vol. 5, no. 1, pp. Proceedings of the 12th IEEE International Symposium on Personal,
176–85, 2006. Indoor and Mobile Radio Communications, vol. 2, San Diego, CA,
[111] L. C. Andrews, R. L. Phillips, and C. Y. Hopen, Laser Beam USA, Sept. 30–Oct. 3, 2001, pp. 81–85.
Scintillation with Applications. SPIE, Bellingham, WA,, 2001. [134] M. Z. Afgani, H. Haas, H. Elgala, and D. Knipp, “Visible Light
[112] I. B. Djordjevic, “Adaptive modulation and coding for free-space Communication Using OFDM,” in Proc. of the 2nd International
optical channels,” Jurado-Navas, A. and Puerta-Notario, A., vol. 2, Conference on Testbeds and Research Infrastructures for the Devel-
no. 5, pp. 221 – 229, May 2010. opment of Networks and Communities (TRIDENTCOM). Barcelona,
[113] E. Lee and V. Chan, “Diversity coherent and incoherent receivers Spain: IEEE, Mar. 1–3 2006, pp. 129–134.
for free-space optical communication in the presence and absence of [135] J. Armstrong and B. J. C. Schmidt, “Comparison of Asymmetrically
interference,” IEEE/OSA J. Opt. Commun. Netw., vol. 1, no. 5, pp. Clipped Optical OFDM and DC-Biased Optical OFDM in AWGN,”
463 – 483, Oct 2009. IEEE Commun. Lett., vol. 12, no. 5, pp. 343–345, May 2008.
[114] S. Aghajanzadeh and M. Uysal, “Diversity - multiplexing trade- [136] 3GPP, “Evolved Universal Terrestrial Radio Access (E-UTRA);
off in coherent free-space optical systems with multiple receivers,” Radio Frequency (RF) System Scenarios,” 3GPP TR 36.942 V
IEEE/OSA J. Opt. Commun. Netw., vol. 2, no. 12, pp. 1087 – 1094, 8.2.0 (2009-05), May 2009. Retrieved Dec. 1, 2009 from
Dec 2010. www.3gpp.org/ftp/Specs/.
[115] G. K. Karagiannidis, T. A. Tsiftsis, and H. G. Sandalidis, “Outage [137] Akhtman, J. and Hanzo, L., “Heterogeneous Networking: An En-
probability of relayed free space optical communication systems,” abling Paradigm for Ubiquitous Wireless Communications,” Pro-
Electron. Lett., vol. 42, no. 17, pp. 994–995, Aug 2006. ceedings of the IEEE, vol. 98, no. 2, 2010.
[116] M. Safari and M. Uysal, “Relay-assisted free-space optical commu- [138] R. D. Feynmann, QED: The Strange Theory of Light and Matter.
nication,” IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 5441– Princeton University Press, 1985.
5449, Dec 2008. [139] R. Shankar, Principles of Quantum Mechanics. Springer, 1994.
[117] C. Datsikas, K. Peppas, N. Sagias, and G. Tombras, “Serial free- [140] S. Imre, F. Balazs, Quantum Computing and Communications - An
space optical relaying communications over gamma-gamma atmo- Engineering Approach. John Wiley and Sons Ltd, 2005.
spheric turbulence channels,” IEEE/OSA J. Opt. Commun. Netw., [141] M.A. Nielsen, I.L. Chuang, Quantum Computation and Quantum
vol. 2, no. 8, pp. 576–586, Aug 2010. Information. Cambridge University Press, 2000.
[118] M. Karimi and M. Nasiri-Kenari, “Outage analysis of relay-assisted [142] D. Petz, Quantum information theory and quantum statistics.
free-space optical communications,” IET Communications, vol. 4, Springer, 2011.
no. 12, pp. 1423–1432, Aug 2010. [143] P. A. Dirac, The Principles of Quantum Mechanics. Oxford
[119] R. C. Menendez and J. W. Gannet, “Efficient, fault-tolerant all-optical University Press, 1982.
multicast networks via network coding,” in Proc. of OFC/NFOEC, [144] J. S. Bell, “On the problem of hidden variables in quantum mechan-
San Diego, CA, USA, Feb 2008, pp. 1–3. ics,” Review of Modern Phys., vol. 38, pp. 447–452, 1964.
[120] K. Minkyu, M. Medard, and U. M. OReilly, “Network coding and [145] J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt, “Proposed
its implications on optical networking,” in Proc. of OFC/NFOEC, experiment to test local hidden-variable theories,” Phys. Rev. Lett.,
San Diego, CA, USA, Feb 2009, pp. 1–3. vol. 23, pp. 880–884, 1969.
[121] E. D. Manley, J. S. Deogun, L. Xu, and D. R. Alexander, “All-optical [146] A. Einstein, B. Podolsky, and N. Rosen, “Can quantum-mechanical
network coding,” IEEE/OSA J. Opt. Commun. Netw., vol. 2, no. 4, description of physical reality be considered complete?” Phys. Rev.,
pp. 175–191, Apr 2010. vol. 47, pp. 777–780, 1935.
[122] A. E. Kamal, “1+n network protection for mesh networks: network [147] L. Grover, “A fast quantum mechanical algorithm for database
coding-based protection using p-cycles,” IEEE/ACM Trans. Network- search,” Proceedings, 28th Annual ACM Symposium on the Theory
ing, vol. 18, no. 18, pp. 67–80, Feb 2010. of Computing, pp. 212–219, May 1996, e-print quant-ph/9605043.
[123] O. Shalvi, “Multiple source cooperation diversity,” IEEE Commun. [148] L. K. Grover, “Quantum mechanics helps in searching for a needle
Lett., vol. 8, pp. 712–714, Dec. 2004. in a haystack,” Phys. Rev. Lett., vol. 79, no. 2, pp. 325–328, July
[124] R. Zhang and L. Hanzo, “A unified treatment of superposition coding 1997, e-print quant-ph/9706033.
aided communications: theory and practice,” IEEE Commun. Surveys [149] C. Zalka, “Grover’s quantum searching algorithm is optimal,” Phys.
and Tutorials, vol. Article in Press, 2010. Rev. A, vol. 60, pp. 2746–2751, 1999.
[125] ——, “Coding schemes for energy efficient multi-source cooperation [150] M. Boyer, G. Brassard, P. Hoyer, A. Tapp, “Tight bounds on quantum
aided uplink transmission,” IEEE Sig. Proces. Lett., vol. 16, pp. 438– searching,” Proceedings 4th Workshop on Physics and Computation,
441, May 2009. vol. 46, no. 4-5, pp. 36–43, 1996, also in Fortschritte der Physik,
[126] A. Farid and S. Hranilovic, “Channel capacity and non-uniform Vol. 46, No. 4-5, 1998, pp. 493-505.
signalling for free-space optical intensity channels,” IEEE Journal [151] S. Imre, “Quantum existence testing and its application for finding
on Selected Areas in Communications, vol. 27, no. 9, pp. 1553 – extreme values in unsorted databases,” IEEE Trans. On Computers,
1563, 2009. vol. 56, no. 5, pp. 706–710, 2007.
[127] J. Anguita, M. Neifeld, B. Hildner, and B. Vasic, “Rateless coding [152] S. Imre, F. Balazs, “Non-coherent multi-user detection based on
on experimental temporally correlated fso channels,” Journal of quantum search,” IEEE International Conference on Communication
Lightwave Technology, vol. 28, no. 7, pp. 990 – 1002, 2010. (ICC),New York, USA, April 28 - May 2 2002.
[128] I. Djordjevic, B. Vasic, and M. Neifeld, “Multilevel coding in free- [153] SM. Zhao, J. Yao, BY. Zheng, “Multiuser detection based on grover’s
space optical mimo transmission with q-ary ppm over the atmo- algorithm,” IEEE International Symposium on Circuits and Systems,
spheric turbulence channel,” IEEE Photonics Technology Letters, ISCAS 2006, May 21-24 2006.
vol. 18, pp. 1491 – 1493, 2006. [154] F. Li, SM.Zhao, BY. Zheng, “Quantum neural network for cdma
[129] I. Djordjevic, “Coded-orthogonal frequency division multiplexing in multi-user detection,” Lecture Notes in Computer Science, vol. 3498,
hybrid optical networks,” Optoelectronics, IET, vol. 4, no. 1, pp. 17 2005.
– 28, 2010. [155] HY Gao, YQ Liu, M Diao, “Robust multi-user detection based
[130] O. Bouchet, P. Porcon, J. W. Walewski, S. Nerreter, K. D. Langer, on quantum bee colony optimisation,” International Journal of
L. Fernandez, J. Vucic, T. Kamalakis, G. Ntogari, I. Neoskosmidis, Innovative Computing and Applications, vol. 3, no. 3, pp. 160–168,
and E. Gueutier, “Wireless optical network for a home network,” 2011.
Free-Space Laser Communications X, vol. 7814, 2010. [156] D. Petz, Quantum Information Theory and Quantum Statistics.
[131] B. Ghimire and H. Haas, “Resource allocation in optical wireless Springer-Verlag, Heidelberg, 2008.
networks,” in Personal, Indoor and Mobile Radio Communications. [157] L. Bacsardi, L. Gyongyosi, S. Imre, “Redundancy-free quantum
Toronto (Canada): IEEE, 2011. coding methods in satellite communications,” International Astro-
[132] S. Dimitrov, R. Mesleh, H. Haas, M. Cappitelli, M. Olbert, and nautical Congress 2011, Cape Town, South Africa, October 3-7 2011.
[158] C. E. Shannon, “Communication theory of secrecy systems,” Bell University of Technology (BME), Budapest, Hungary, in 1993, 1996,
System Technical Journal, vol. 28, pp. 656–715, 1949. and 1999, respectively, and the D.Sc. degree from the Hungarian
[159] L. Bacsardi, M. Berces, S. Imre, “Redundancy-free quantum theory Academy of Sciences, Budapest, Hungary, in 2007. Currently he is
based error correction method in long distance aerial communication,” Head of Telecommunications Department at BME. He is also
9th International Astronautical Congress 2008, Glasgow, UK, Chairman of the Telecommunication Scientific Committee of the
September 29 - October 3 2011. Hungarian Academy of Sciences. Since 2005, he has been the R&D
[160] G. Smith, J. Yard, “Quantum communication with zero-capacity Director of the Mobile Innovation Centre. His research interests
channels,” Science, vol. 321, pp. 1812–1815, 2008. include mobile and wireless systems, quantum computing, and
[161] I. Devetak, “The private classical capacity and quantum capacity of a communications. He has made wide-ranging contributions to
quantum channel,” IEEE Trans. Inf. Theory, vol. 51, pp. 44 – 55, different wireless access technologies, mobility protocols, security
2003. and privacy, reconfigurable systems, quantum-computing based
[162] S. Lloyd, “Capacity of the noisy quantum channel,” Phys. Rev. A, algorithms, and protocols.
vol. 55, pp. 1613 – 1622, 1997.
Prof. Imre is on the Editorial Board of two journals:
[163] J.I.Concha and H.V.Poor, “Multi-access quantum channels,” IEEE
Trans. Inform.Theory, vol. 50, no. 5, pp. 725–747, 2004.
Infocommunications Journal and Hungarian Telecommunications.
[164] SM Zhao, F. Gao, XL Dong, BY Zheng, “Quantum multi-user
detection scheme with discrete coherent states approximation,” IEEE
10th International Conference on Signal Processing (ICSP2010), pp. Laszlo Gyongyosi (Member, IEEE) received the M.Sc. degree in
1569 – 1572, October 24-28 2010. computer science (with honors) from the Budapest University of
[165] A. Molisch, “Ultra-wide-band propagation channels,” Proceedings of Technology and Economics (BUTE), Budapest, Hungary, in 2008,
the IEEE, vol. 97, no. 2, 2009. where he is currently working toward the Ph.D. degree at the
[166] A. Molisch, L. Greenstein, and M. Shafi, “Propagation issues for Department of Telecommunications. His research interests are in
cognitive radio,” Proceedings of the IEEE, vol. 97, no. 5, 2009. quantum channel capacities, quantum computation and
communication, quantum cryptography, and quantum information
[167] A. Goldsmith, S. Jafar, I. Maric, and S. Srinivasa, “Breaking spectrum
gridlock with cognitive radios: An information theoretic perspective,” theory. Currently, he is completing a book on advanced quantum
Proceedings of the IEEE, vol. 97, no. 5, 2009. communications, and he teaches courses in quantum computation.
Mr. Gyongyosi received the 2009 Future Computing Best Paper
[168] Edited by A.M. Tekalp and A. Smolic and A. Vetro and L. Onural,
“Special issue on 3d media and displays,” Proceedings of the IEEE, Award on quantum information. In 2010, he was awarded the Best
vol. 99, no. 4, April 2011. Paper Prize of University of Harvard, Cambridge, MA. In 2010, he
obtained a Ph.D. Grant Award from University of Arizona, Tuscon.
In 2011, he received the Ph.D. Candidate Scholarship at the BUTE;
the Ph.D. Grant Award of Stanford University, Stanford, CA; the
ABOUT THE AUTHORS award of University of Southern California, Los Angeles; and the
Sandor Imre (Member, IEEE) was born in Budapest, Hungary, in Ph.D. Grant Award of Quantum Information Processing 2012
1969. He received the M.Sc. degree in electrical engineering, the (QIP2012), University of Montreal, Montreal, QC, Canada.
Dr.Univ. degree in probability theory and mathematical statistics, and
the Ph.D. degree in telecommunications from the Budapest

S-ar putea să vă placă și