-
Federated Edge Learning with Misaligned Over-The-Air Computation arXiv.cs.IT Pub Date : 2021-02-26 Yulin Shao; Deniz Gunduz; Soung Chang Liew
Over-the-air computation (OAC) is a promising technique to realize fast model aggregation in the uplink of federated edge learning. OAC, however, hinges on accurate channel-gain precoding and strict synchronization among the edge devices, which are challenging in practice. As such, how to design the maximum likelihood (ML) estimator in the presence of residual channel-gain mismatch and asynchronies
-
Double-IRS Aided MIMO Communication under LoS Channels: Capacity Maximization and Scaling arXiv.cs.IT Pub Date : 2021-02-26 Yitao Han; Shuowen Zhang; Lingjie Duan; Rui Zhang
Intelligent reflecting surface (IRS) is a promising technology to extend the wireless signal coverage and support the high performance communication. By intelligently adjusting the reflection coefficients of a large number of passive reflecting elements, the IRS can modify the wireless propagation environment in favour of signal transmission. Different from most of the prior works which did not consider
-
Oversampled Adaptive Sensing via a Predefined Codebook arXiv.cs.IT Pub Date : 2021-02-26 Ali Bereyhi; Saba Asaad; Ralf R. Müller
Oversampled adaptive sensing (OAS) is a Bayesian framework recently proposed for effective sensing of structured signals in a time-limited setting. In contrast to the conventional blind oversampling, OAS uses the prior information on the signal to construct posterior beliefs sequentially. These beliefs help in constructive oversampling which iteratively evolves through a sequence of time sub-frames
-
Average Rate and Error Probability Analysis in Short Packet Communications over RIS-aided URLLC Systems arXiv.cs.IT Pub Date : 2021-02-26 Ramin Hashemi; Samad Ali; Nurul Huda Mahmood; Matti Latva-aho
In this paper, the average achievable rate and error probability of a reconfigurable intelligent surface (RIS) aided systems is investigated for the finite blocklength (FBL) regime. The performance loss due to the presence of phase errors arising from limited quantization levels as well as hardware impairments at the RIS elements is also discussed. First, the composite channel containing the direct
-
Energy Efficiency Maximization in the Uplink Delta-OMA Networks arXiv.cs.IT Pub Date : 2021-02-26 Ramin Hashemi; Hamzeh Beyranvand; Mohammad Robat Mili; Hina Tabassum
Delta-orthogonal multiple access (D-OMA) has been recently investigated as a potential technique to enhance the spectral efficiency in 6G networks. D-OMA enables partial overlapping of the adjacent sub-channels that are assigned to different clusters of users served by non-orthogonal multiple access (NOMA), at the expense of additional interference. In this paper, we analyze the performance of D-OMA
-
DoA-LF: A Location Fingerprint Positioning Algorithm with Millimeter-Wave arXiv.cs.IT Pub Date : 2021-02-26 Zhiqing Wei; Yadong Zhao; Xinyi Liu; Zhiyong Feng
Location fingerprint (LF) has been widely applied in indoor positioning. However, the existing studies on LF mostly focus on the fingerprint of WiFi below 6 GHz, bluetooth, ultra wideband (UWB), etc. The LF with millimeter-wave (mmWave) was rarely addressed. Since mmWave has the characteristics of narrow beam, fast signal attenuation and wide bandwidth, etc., the positioning error can be reduced. In
-
Exact recovery of functions in refinable shift-invariant space by single-angle Radon samples arXiv.cs.IT Pub Date : 2021-02-26 Youfa Li; Shengli Fan; Yanfen Huang
The traditional approaches to computerized tomography (CT) depend on the samples of Radon transform at multiple angles. In optics, the real time imaging requires the reconstruction of an object by the samples of Radon transform at a \emph{single angle} (SA). Driven by this and motivated by the connection between Bin Han's construction of wavelet frames (e.g \cite{Han1}) and Radon transform, in ref
-
The Magic of Superposition: A Survey on the Simultaneous Transmission Based Wireless Systems arXiv.cs.IT Pub Date : 2021-02-25 Ufuk Altun; Gunes Kurt; Enver Ozdemir
In conventional communication systems, any interference between two communicating points is regarded as unwanted noise since it distorts the received signals. On the other hand, allowing simultaneous transmission and intentionally accepting the interference of signals and even benefiting from it have been considered for a range of wireless applications. As prominent examples, non-orthogonal multiple
-
Moreau-Yosida $f$-divergences arXiv.cs.IT Pub Date : 2021-02-26 Dávid Terjék
Variational representations of $f$-divergences are central to many machine learning algorithms, with Lipschitz constrained variants recently gaining attention. Inspired by this, we generalize the so-called tight variational representation of $f$-divergences in the case of probability measures on compact metric spaces to be taken over the space of Lipschitz functions vanishing at an arbitrary base point
-
CausalEC: A Causally Consistent Data Storage Algorithm based on Cross-Object Erasure Coding arXiv.cs.IT Pub Date : 2021-02-26 Viveck R. Cadambe; Shihang Lyu
Causally consistent distributed storage systems have received significant recent attention due to the potential for providing a low latency data access as compared with linearizability. Current causally consistent data stores use partial or full replication to ensure data access to clients over a distributed setting. In this paper, we develop, for the first time, an erasure coding based algorithm called
-
Inductive Mutual Information Estimation: A Convex Maximum-Entropy Copula Approach arXiv.cs.IT Pub Date : 2021-02-25 Yves-Laurent Kom Samo
We propose a novel estimator of the mutual information between two ordinal vectors $x$ and $y$. Our approach is inductive (as opposed to deductive) in that it depends on the data generating distribution solely through some nonparametric properties revealing associations in the data, and does not require having enough data to fully characterize the true joint distributions $P_{x, y}$. Specifically,
-
Multi-Group Multicast Beamforming by Superiorized Projections onto Convex Sets arXiv.cs.IT Pub Date : 2021-02-23 Jochen Fink; Renato L. G. Cavalcante; Slawomir Stanczak
In this paper, we propose an iterative algorithm to address the nonconvex multi-group multicast beamforming problem with quality-of-service constraints and per-antenna power constraints. We formulate a convex relaxation of the problem as a semidefinite program in a real Hilbert space, which allows us to approximate a point in the feasible set by iteratively applying a bounded perturbation resilient
-
Download Cost of Private Updating arXiv.cs.IT Pub Date : 2021-02-25 Bryttany Herren; Ahmed Arafa; Karim Banawan
We consider the problem of privately updating a message out of $K$ messages from $N$ replicated and non-colluding databases. In this problem, a user has an outdated version of the message $\hat{W}_\theta$ of length $L$ bits that differ from the current version $W_\theta$ in at most $f$ bits. The user needs to retrieve $W_\theta$ correctly using a private information retrieval (PIR) scheme with the
-
Dual MINE-based Neural Secure Communications under Gaussian Wiretap Channel arXiv.cs.IT Pub Date : 2021-02-25 Jingjing Li; Zhuo Sun; Lei Zhang; Hongyu Zhu
Recently, some researches are devoted to the topic of end-to-end learning a physical layer secure communication system based on autoencoder under Gaussian wiretap channel. However, in those works, the reliability and security of the encoder model were learned through necessary decoding outputs of not only legitimate receiver but also the eavesdropper. In fact, the assumption of known eavesdropper's
-
New Singly and Doubly Even Binary [72,36,12] Self-Dual Codes from $M_2(R)G$ -- Group Matrix Rings arXiv.cs.IT Pub Date : 2021-02-25 Adrian Korban; Serap Sahinkaya; Deniz Ustun
In this work, we present a number of generator matrices of the form $[I_{2n} \ | \ \tau_k(v)],$ where $I_{kn}$ is the $kn \times kn$ identity matrix, $v$ is an element in the group matrix ring $M_2(R)G$ and where $R$ is a finite commutative Frobenius ring and $G$ is a finite group of order 18. We employ these generator matrices and search for binary $[72,36,12]$ self-dual codes directly over the finite
-
Deep Learning based Channel Extrapolation for Large-Scale Antenna Systems: Opportunities, Challenges and Solutions arXiv.cs.IT Pub Date : 2021-02-25 Shun Zhang; Yushan Liu; Feifei Gao; Chengwen Xing; Jianping An; Octavia A. Dobre
With the depletion of spectrum, wireless communication systems turn to exploit large antenna arrays to achieve the degree of freedom in space domain, such as millimeter wave massive multi-input multioutput (MIMO), reconfigurable intelligent surface assisted communications and cell-free massive MIMO. In these systems, how to acquire accurate channel state information (CSI) is difficult and becomes a
-
The Role of Correlation in the Doubly Dirty Fading MAC with Side Information at the Transmitters arXiv.cs.IT Pub Date : 2021-02-25 Farshad Rostami Ghadi; Ghosheh Abed Hodtani; F. Javier Lopez-Martinez
We investigate the impact of fading correlation on the performance of the doubly dirty fading multiple access channel (MAC) with non-causally known side information at transmitters. Using Copula theory, we derive closed-form expressions for the outage probability and the coverage region under arbitrary dependence conditions. We show that a positive dependence structure between the fading channel coefficients
-
New identities for the Shannon function and applications arXiv.cs.IT Pub Date : 2021-02-25 Aiden A Bruen
We show how the Shannon entropy function H(p,q)is expressible as a linear combination of other Shannon entropy functions involving quotients of polynomials in p,q of degree n for any given positive integer n. An application to cryptographic keys is presented.
-
A Layered Grouping Random Access Scheme Based on Dynamic Preamble Selection for Massive Machine Type Communications arXiv.cs.IT Pub Date : 2021-02-25 Gaofeng Cheng; Huan Chen; Pingzhi Fan; Li Li; Li Hao
Massive machine type communication (mMTC) has been identified as an important use case in Beyond 5G networks and future massive Internet of Things (IoT). However, for the massive multiple access in mMTC, there is a serious access preamble collision problem if the conventional 4-step random access (RA) scheme is employed. Consequently, a range of grantfree (GF) RA schemes were proposed. Nevertheless
-
Protograph-Based Design for QC Polar Codes arXiv.cs.IT Pub Date : 2021-02-25 Toshiaki Koike-Akino; Ye Wang
We propose a new family of polar coding which realizes high coding gain, low complexity, and high throughput by introducing a protograph-based design. The proposed technique called as quasi-cyclic (QC) polar codes can be highly parallelized without sacrificing decoding complexity. We analyze short cycles in the protograph polar codes and develop a design method to increase the girth. Our approach can
-
On the Weight Spectrum of Pre-Transformed Polar Codes arXiv.cs.IT Pub Date : 2021-02-25 Yuan Li; Huazi Zhang; Rong Li; Jun Wang; Guiying Yan; Zhiming Ma
Polar codes are the first class of channel codes achieving the symmetric capacity of the binary-input discrete memoryless channels with efficient encoding and decoding algorithms. But the weight spectrum of Polar codes is relatively poor compared to RM codes, which degrades their ML performance. Pre-transformation with an upper-triangular matrix (including cyclic redundancy check (CRC), parity-check
-
Federated Multi-armed Bandits with Personalization arXiv.cs.IT Pub Date : 2021-02-25 Chengshuai Shi; Cong Shen; Jing Yang
A general framework of personalized federated multi-armed bandits (PF-MAB) is proposed, which is a new bandit paradigm analogous to the federated learning (FL) framework in supervised learning and enjoys the features of FL with personalization. Under the PF-MAB framework, a mixed bandit learning problem that flexibly balances generalization and personalization is studied. A lower bound analysis for
-
ConCrete MAP: Learning a Probabilistic Relaxation of Discrete Variables for Soft Estimation with Low Complexity arXiv.cs.IT Pub Date : 2021-02-25 Edgar Beck; Carsten Bockelmann; Armin Dekorsy
Following the great success of Machine Learning (ML), especially Deep Neural Networks (DNNs), in many research domains in 2010s, several learning-based approaches were proposed for detection in large inverse linear problems, e.g., massive MIMO systems. The main motivation behind is that the complexity of Maximum A-Posteriori (MAP) detection grows exponentially with system dimensions. Instead of using
-
Computing Accurate Probabilistic Estimates of One-D Entropy from Equiprobable Random Samples arXiv.cs.IT Pub Date : 2021-02-25 Hoshin V Gupta; Mohammed Reza Ehsani; Tirthankar Roy; Maria A Sans-Fuentes; Uwe Ehret; Ali Behrangi
We develop a simple Quantile Spacing (QS) method for accurate probabilistic estimation of one-dimensional entropy from equiprobable random samples, and compare it with the popular Bin-Counting (BC) method. In contrast to BC, which uses equal-width bins with varying probability mass, the QS method uses estimates of the quantiles that divide the support of the data generating probability density function
-
FERMI: Fair Empirical Risk Minimization via Exponential Rényi Mutual Information arXiv.cs.IT Pub Date : 2021-02-24 Andrew Lowy; Rakesh Pavan; Sina Baharlouei; Meisam Razaviyayn; Ahmad Beirami
In this paper, we propose a new notion of fairness violation, called Exponential R\'enyi Mutual Information (ERMI). We show that ERMI is a strong fairness violation notion in the sense that it provides upper bound guarantees on existing notions of fairness violation. We then propose the Fair Empirical Risk Minimization via ERMI regularization framework, called FERMI. Whereas most existing in-processing
-
Symmetric distinguishability as a quantum resource arXiv.cs.IT Pub Date : 2021-02-24 Robert Salzmann; Nilanjana Datta; Gilad Gour; Xin Wang; Mark M. Wilde
We develop a resource theory of symmetric distinguishability, the fundamental objects of which are elementary quantum information sources, i.e., sources that emit one of two possible quantum states with given prior probabilities. Such a source can be represented by a classical-quantum state of a composite system $XA$, corresponding to an ensemble of two quantum states, with $X$ being classical and
-
Rack-Aware Cooperative Regenerating Codes arXiv.cs.IT Pub Date : 2021-02-24 Shreya Gupta; V. Lalitha
In distributed storage systems, cooperative regenerating codes tradeoff storage for repair bandwidth in the case of multiple node failures. In rack-aware distributed storage systems, there is no cost associated with transferring symbols within a rack. Hence, the repair bandwidth will only take into account cross-rack transfer. Rack-aware regenerating codes for the case of single node failures have
-
Temporal Energy Analysis of Symbol Sequences for Fiber Nonlinear Interference Modelling via Energy Dispersion Index arXiv.cs.IT Pub Date : 2021-02-24 Kaiquan Wu; Gabriele Liga; Alireza Sheikh; Frans M. J. Willems; Alex Alvarado
The stationary statistical properties of independent, identically distributed (i.i.d.) input symbols provide insights on the induced nonlinear interference (NLI) during fiber transmission. For example, kurtosis is known to predict the modulation format-dependent NLI. These statistical properties can be used in the design of probabilistic amplitude shaping (PAS), which is a popular scheme that relies
-
Binary Subspace Chirps arXiv.cs.IT Pub Date : 2021-02-24 Tefjol Pllaha; Olav Tirkkonen; Robert Calderbank
We describe in details the interplay between binary symplectic geometry and quantum computation, with the ultimate goal of constructing highly structured codebooks. The Binary Chirps (BCs) are Complex Grassmannian Lines in $N = 2^m$ dimensions used in deterministic compressed sensing and random/unsourced multiple access in wireless networks. Their entries are fourth roots of unity and can be described
-
Wirelessly Powered Federated Edge Learning: Optimal Tradeoffs Between Convergence and Power Transfer arXiv.cs.IT Pub Date : 2021-02-24 Qunsong Zeng; Yuqing Du; Kaibin Huang
Federated edge learning (FEEL) is a widely adopted framework for training an artificial intelligence (AI) model distributively at edge devices to leverage their data while preserving their data privacy. The execution of a power-hungry learning task at energy-constrained devices is a key challenge confronting the implementation of FEEL. To tackle the challenge, we propose the solution of powering devices
-
Two Problems about Monomial Bent Functions arXiv.cs.IT Pub Date : 2021-02-24 Honggang Hu; Bei Wang; Xianhong Xie; Yiyuan Luo
In 2008, Langevin and Leander determined the dual function of three classes of monomial bent functions with the help of Stickelberger's theorem: Dillon, Gold and Kasami. In their paper, they proposed one very strong condition such that their method works, and showed that both Gold exponent and Kasami exponent satisfy this condition. In 2018, Pott {\em et al.} investigated the issue of vectorial functions
-
A Multi-Objective Optimization Framework for URLLC with Decoding Complexity Constraints arXiv.cs.IT Pub Date : 2021-02-24 Hasan Basri Celebi; Antonios Pitarokoilis; Mikael Skoglund
Stringent constraints on both reliability and latency must be guaranteed in ultra-reliable low-latency communication (URLLC). To fulfill these constraints with computationally constrained receivers, such as low-budget IoT receivers, optimal transmission parameters need to be studied in detail. In this paper, we introduce a multi-objective optimization framework for the optimal design of URLLC in the
-
Uncoordinated Spectrum Sharing in Millimeter Wave Networks Using Carrier Sensing arXiv.cs.IT Pub Date : 2021-02-24 Shamik Sarkar; Xiang Zhang; Arupjyoti Bhuyan; Mingyue Ji; Sneha Kumar Kasera
We propose using Carrier Sensing (CS) for distributed interference management in millimeter-wave (mmWave) cellular networks where spectrum is shared by multiple operators that do not coordinate among themselves. In addition, even the base station sites can be shared by the operators. We describe important challenges in using traditional CS in this setting and propose enhanced CS protocols to address
-
A new upper bound and optimal constructions of equi-difference conflict-avoiding codes on constant weight arXiv.cs.IT Pub Date : 2021-02-24 Chun-e Zhao; Wenping Ma; Tongjiang Yan; Yuhua Sun
Conflict-avoiding codes (CACs) have been used in multiple-access collision channel without feedback. The size of a CAC is the number of potential users that can be supported in the system. A code with maximum size is called optimal. The use of an optimal CAC enables the largest possible number of asynchronous users to transmit information efficiently and reliably. In this paper, a new upper bound on
-
Further results on the 2-adic complexity of a class of balanced generalized cyclotomic sequences arXiv.cs.IT Pub Date : 2021-02-24 Chun-e Zhao; Yuhua Sun; Tongjiang Yan
In this paper, the 2-adic complexity of a class of balanced Whiteman generalized cyclotomic sequences of period $pq$ is considered. Through calculating the determinant of the circulant matrix constructed by one of these sequences, we derive a lower bound on the 2-adic complexity of the corresponding sequence, which further expands our previous work (Zhao C, Sun Y and Yan T. Study on 2-adic complexity
-
Position Location for Futuristic Cellular Communications -- 5G and Beyond arXiv.cs.IT Pub Date : 2021-02-24 Ojas Kanhere; Theodore S. Rappaport
With vast mmWave spectrum and narrow beam antenna technology, precise position location is now possible in 5G and future mobile communication systems. In this article, we describe how centimeterlevel localization accuracy can be achieved, particularly through the use of map-based techniques. We show how data fusion of parallel information streams, machine learning, and cooperative localization techniques
-
Multiple Access Channel Simulation arXiv.cs.IT Pub Date : 2021-02-24 Gowtham R. Kurri; Viswanathan Ramachandran; Sibi Raj B. Pillai; Vinod M. Prabhakaran
We study the problem of simulating a two-user multiple access channel over a multiple access network of noiseless links. Two encoders observe independent and identically distributed (i.i.d.) copies of a source random variable each, while a decoder observes i.i.d. copies of a side-information random variable. There are rate-limited noiseless communication links and independent pairwise shared randomness
-
Asymptotic results for linear combinations of spacings generated by i.i.d. exponential random variables arXiv.cs.IT Pub Date : 2021-02-24 Camilla Calì; Maria Longobardi; Claudio Macci; Barbara Pacchiarotti
We prove large (and moderate) deviations for a class of linear combinations of spacings generated by i.i.d. exponentially distributed random variables. We allow a wide class of coefficients which can be expressed in terms of continuous functions defined on [0, 1] which satisfy some suitable conditions. In this way we generalize some recent results by Giuliano et al. (2015) which concern the empirical
-
It was "all" for "nothing": sharp phase transitions for noiseless discrete channels arXiv.cs.IT Pub Date : 2021-02-24 Jonathan Niles-Weed; Ilias Zadik
We establish a phase transition known as the "all-or-nothing" phenomenon for noiseless discrete channels. This class of models includes the Bernoulli group testing model and the planted Gaussian perceptron model. Previously, the existence of the all-or-nothing phenomenon for such models was only known in a limited range of parameters. Our work extends the results to all signals with arbitrary sublinear
-
Quaternary Hermitian self-dual codes of lengths 26, 32, 36, 38 and 40 from modifications of well-known circulant constructions arXiv.cs.IT Pub Date : 2021-02-24 Adam Michael Roberts
In this work, we give three new techniques for constructing Hermitian self-dual codes over commutative Frobenius rings with a non-trivial involutory automorphism using $\lambda$-circulant matrices. The new constructions are derived as modifications of various well-known circulant constructions of self-dual codes. Applying these constructions together with the building-up construction, we construct
-
Quantum Cross Entropy and Maximum Likelihood Principle arXiv.cs.IT Pub Date : 2021-02-23 Zhou Shangnan; Yixu Wang
Quantum machine learning is an emerging field at the intersection of machine learning and quantum computing. Classical cross entropy plays a central role in machine learning. We define its quantum generalization, the quantum cross entropy, and investigate its relations with the quantum fidelity and the maximum likelihood principle. We also discuss its physical implications on quantum measurements.
-
Quantum Entropic Causal Inference arXiv.cs.IT Pub Date : 2021-02-23 Mohammad Ali Javidian; Vaneet Aggarwal; Fanglin Bao; Zubin Jacob
As quantum computing and networking nodes scale-up, important open questions arise on the causal influence of various sub-systems on the total system performance. These questions are related to the tomographic reconstruction of the macroscopic wavefunction and optimizing connectivity of large engineered qubit systems, the reliable broadcasting of information across quantum networks as well as speed-up
-
The Channel Between Randomly Oriented Dipoles: Statistics and Outage in the Near and Far Field arXiv.cs.IT Pub Date : 2021-02-23 Gregor Dumphart; Armin Wittneben
We consider the class of wireless links whose propagation characteristics are described by a dipole model. This comprises free-space links between dipole antennas and magneto-inductive links between coils, with important communication and power transfer applications. A dipole model describes the channel coefficient as a function of link distance and antenna orientations. In many use cases the orientations
-
On the Generic Low-Rank Matrix Completion Problems arXiv.cs.IT Pub Date : 2021-02-23 Yuan Zhang; Yuanqing Xia; Hongwei Zhang; Gang Wang; Li Dai
This paper investigates the low-rank matrix completion (LRMC) problem from a generic view. Unlike most existing work which focused on numerically recovering exact or approximate missing matrix entries from the observed ones, the only available information herein is the pattern (structure) of observed/missing entries, and the observed entries are classified into two types, namely, fixed zero entries
-
Quasi-Distributed Antenna Selection for Spectral Efficiency Maximization in Subarray Switching XL-MIMO Systems arXiv.cs.IT Pub Date : 2021-02-23 Joao Henrique Inacio de Souza; Abolfazl Amiri; Taufik Abrao; Elisabeth de Carvalho; Petar Popovski
In this paper, we consider the downlink (DL) of a zero-forcing (ZF) precoded extra-large scale massive MIMO (XL-MIMO) system. The base-station (BS) operates with limited number of radio-frequency (RF) transceivers due to high cost, power consumption and interconnection bandwidth associated to the fully digital implementation. The BS, which is implemented with a subarray switching architecture, selects
-
Outage Probability Analysis of IRS-Assisted Systems Under Spatially Correlated Channels arXiv.cs.IT Pub Date : 2021-02-22 Trinh Van Chien; Anastasios K. Papazafeiropoulos; Lam Thanh Tu; Ribhu Chopra; Symeon Chatzinotas; Björn Ottersten
This paper investigates the impact of spatial channel correlation on the outage probability of intelligent reflecting surface (IRS)-assisted single-input single-output (SISO) communication systems. In particular, we derive a novel closed-form expression of the outage probability for arbitrary phase shifts and correlation matrices of the indirect channels. To shed light on the impact of the spatial
-
Reinforcement Learning of Beam Codebooks in Millimeter Wave and Terahertz MIMO Systems arXiv.cs.IT Pub Date : 2021-02-22 Yu Zhang; Muhammad Alrabeiah; Ahmed Alkhateeb
Millimeter wave (mmWave) and terahertz MIMO systems rely on pre-defined beamforming codebooks for both initial access and data transmission. Being pre-defined, however, these codebooks are commonly not optimized for specific environments, user distributions, and/or possible hardware impairments. This leads to large codebook sizes with high beam training overhead which increases the initial access/tracking
-
Federated Learning for Physical Layer Design arXiv.cs.IT Pub Date : 2021-02-23 Ahmet M. Elbir; Anastasios K. Papazafeiropoulos; Symeon Chatzinotas
Model-free techniques, such as machine learning (ML), have recently attracted much interest for physical layer design, e.g., symbol detection, channel estimation and beamforming. Most of these ML techniques employ centralized learning (CL) schemes and assume the availability of datasets at a parameter server (PS), demanding the transmission of data from the edge devices, such as mobile phones, to the
-
Covert MIMO Communications under Variational Distance Constraint arXiv.cs.IT Pub Date : 2021-02-22 Shi-Yuan Wang; Matthieu R. Bloch
The problem of covert communication over Multiple-Input Multiple-Output (MIMO) Additive White Gaussian Noise (AWGN) channels is investigated, in which a transmitter attempts to reliably communicate with a legitimate receiver while avoiding detection by a passive adversary. The covert capacity of the MIMO AWGN is characterized under a variational distance covertness constraint when the MIMO channel
-
Performance Improvement of LoRa Modulation with Signal Combining arXiv.cs.IT Pub Date : 2021-02-23 The Khai Nguyen; Ha H. Nguyen; Ebrahim Bedeer
Low-power long-range (LoRa) modulation has been used to satisfy the low power and large coverage requirements of Internet of Things (IoT) networks. In this paper, we investigate performance improvements of LoRa modulation when a gateway is equipped with multiple antennas. We derive the optimal decision rules for both coherent and non-coherent detections when combining signals received from multiple
-
Decomposition of Clifford Gates arXiv.cs.IT Pub Date : 2021-02-05 Tefjol Pllaha; Kalle Volanto; Olav Tirkkonen
In fault-tolerant quantum computation and quantum error-correction one is interested on Pauli matrices that commute with a circuit/unitary. We provide a fast algorithm that decomposes any Clifford gate as a $\textit{minimal}$ product of Clifford transvections. The algorithm can be directly used for finding all Pauli matrices that commute with any given Clifford gate. To achieve this goal, we exploit
-
Deep Learning for THz Drones with Flying Intelligent Surfaces: Beam and Handoff Prediction arXiv.cs.IT Pub Date : 2021-02-22 Nof Abuzainab; Muhammad Alrabeiah; Ahmed Alkhateeb; Yalin E. Sagduyu
We consider the problem of proactive handoff and beam selection in Terahertz (THz) drone communication networks assisted with reconfigurable intelligent surfaces (RIS). Drones have emerged as critical assets for next-generation wireless networks to provide seamless connectivity and extend the coverage, and can largely benefit from operating in the THz band to achieve high data rates (such as considered
-
Belief-Propagation Decoding of LDPC Codes with Variable Node-Centric Dynamic Schedules arXiv.cs.IT Pub Date : 2021-02-22 Tofar C. -Y. Chang; Pin-Han Wang; Jian-Jia Weng; I-Hsiang Lee; Yu T. Su
Belief propagation (BP) decoding of low-density parity-check (LDPC) codes with various dynamic decoding schedules have been proposed to improve the efficiency of the conventional flooding schedule. As the ultimate goal of an ideal LDPC code decoder is to have correct bit decisions, a dynamic decoding schedule should be variable node (VN)-centric and be able to find the VNs with probable incorrect decisions
-
Anchor-Assisted Channel Estimation for Intelligent Reflecting Surface Aided Multiuser Communication arXiv.cs.IT Pub Date : 2021-02-22 Xinrong Guan; Qingqing Wu; Rui Zhang
Channel estimation is a practical challenge for intelligent reflecting surface (IRS) aided wireless communication. As the number of IRS reflecting elements or IRS-aided users increases, the channel training overhead becomes excessively high, which results in long delay and low throughput in data transmission. To tackle this challenge, we propose in this paper a new anchor-assisted channel estimation
-
Deep Learning Based Frequency-Selective Channel Estimation for Hybrid mmWave MIMO Systems arXiv.cs.IT Pub Date : 2021-02-22 Asmaa Abdallah; Abdulkadir Celik; Mohammad M. Mansour; Ahmed M. Eltawil
Millimeter wave (mmWave) massive multiple-input multiple-output (MIMO) systems typically employ hybrid mixed signal processing to avoid expensive hardware and high training overheads. {However, the lack of fully digital beamforming at mmWave bands imposes additional challenges in channel estimation. Prior art on hybrid architectures has mainly focused on greedy optimization algorithms to estimate frequency-flat
-
Distributional Reinforcement Learning for mmWave Communications with Intelligent Reflectors on a UAV arXiv.cs.IT Pub Date : 2021-02-22 Qianqian Zhang; Aidin Ferdowsi; Walid Saad
In this paper, a novel framework is proposed to enable air-to-ground channel modeling over millimeter wave (mmWave) frequencies in an unmanned aerial vehicle (UAV) wireless network. First, an effective channel estimation approach is developed to collect mmWave channel information allowing each UAV to train a local channel model via a generative adversarial network (GAN). Next, in order to share the
-
Energy-Efficient Precoding for Multi-User Visible Light Communication with Confidential Messages arXiv.cs.IT Pub Date : 2021-02-22 Son T. Duong; Thanh V. Pham; Chuyen T. Nguyen; Anh T. Pham
In this paper, an energy-efficient precoding scheme is designed for multi-user visible light communication (VLC) systems in the context of physical layer security, where users' messages are kept mutually confidential. The design problem is shown to be non-convex fractional programming, therefore Dinkelbach algorithm and convex-concave procedure (CCCP) based on the first-order Taylor approximation are
-
Residual-Aided End-to-End Learning of Communication System without Known Channel arXiv.cs.IT Pub Date : 2021-02-22 Hao Jiang; Shuangkaisheng Bi; Linglong Dai
Leveraging powerful deep learning techniques, the end-to-end (E2E) learning of communication system is able to outperform the classical communication system. Unfortunately, this communication system cannot be trained by deep learning without known channel. To deal with this problem, a generative adversarial network (GAN) based training scheme has been recently proposed to imitate the real channel.
-
Massive Random Access with Sporadic Short Packets: Joint Active User Detection and Channel Estimation via Sequential Message Passing arXiv.cs.IT Pub Date : 2021-02-22 Jia-Cheng Jiang; Hui-Ming Wang
This paper considers an uplink massive machine-type communication (mMTC) scenario, where a large number of user devices are connected to a base station (BS). A novel grant-free massive random access (MRA) strategy is proposed, considering both the sporadic user traffic and short packet features. Specifically, the notions of active detection time (ADT) and active detection period (ADP) are introduced
-
CSIT-Free Federated Edge Learning via Reconfigurable Intelligent Surface arXiv.cs.IT Pub Date : 2021-02-22 Hang Liu; Xiaojun Yuan; Ying-Jun Angela Zhang
We study over-the-air model aggregation in federated edge learning (FEEL) systems, where channel state information at the transmitters (CSIT) is assumed to be unavailable. We leverage the reconfigurable intelligent surface (RIS) technology to align the cascaded channel coefficients for CSIT-free model aggregation. To this end, we jointly optimize the RIS and the receiver by minimizing the aggregation
Contents have been reproduced by permission of the publishers.