68 results
Search Results
2. Deep Reinforcement Learning for Energy-Efficient Power Control in Heterogeneous Networks
- Abstract
In a typical heterogeneous network (HetNet), in which a macro base station (BS) and multiple small BSs coexist on the same spectrum band, energy-efficiency (EE) performance is an important design metric and is highly related to the transmit power of BSs. Conventional methods optimize BSs' transmit power to enhance the EE by assuming that the global channel state information (CSI) is available. However, it is challenging or expensive to collect the instantaneous global CSI in the HetNet. In this paper, we utilize deep reinforcement learning (DRL) technique to design an intelligent power control algorithm, with which each BS can independently determine the transmit power based on only local information. Simulation results demonstrate that the proposed algorithm outperforms conventional methods in terms of both EE performance and time complexity., QC 20221215Part of proceedings: ISBN 978-1-5386-8347-7
- Published
- 2022
- Full Text
- View/download PDF
3. Privacy Signaling Games with Binary Alphabets
- Abstract
In this paper, we consider a privacy signaling game problem for binary alphabets and single-bit transmission where a transmitter has a pair of messages, one of which is a casual message that needs to be conveyed, whereas the other message contains sensitive data and needs to be protected. The receiver wishes to estimate both messages to acquire as much information as possible. For this setup, we study the interactions between the transmitter and the receiver with non-aligned information-theoretic objectives (modeled by mutual information and hamming distance) due to the privacy concerns of the transmitter. We derive conditions under which Nash and/or Stackelberg equilibria exist and identify the optimal responses of the encoder and decoders strategies for each type of game. One particularly surprising result is that when both types of equilibria exist, they admit the same encoding and decoding strategies. We corroborate our analysis with simulation studies., Part of proceedings: ISBN 978-3-907144-07-7, QC 20221101
- Published
- 2022
- Full Text
- View/download PDF
4. Hidden Markov Model Based Data-driven Calibration of Non-dispersive Infrared Gas Sensor
- Abstract
Non-dispersive infrared gas sensing is one of the best gas measurement method for air quality monitoring. However, sensors drift over time due to sensor aging and environmental factors, which makes calibration necessary. In this paper, we propose a hidden Markov model approach for sensor self-calibration, which builds on the physical model of gas sensors based on the Beer-Lambert law. We focus on the statistical dependency between a calibration coefficient and the temperature change. Supervised and unsupervised learning algorithms to learn the stochastic parameters of the hidden Markov model are derived and numerically tested. The true calibration coefficient at each time instant is estimated using the Viterbi algorithm. The numerical experiments using CO2 sensor data show excellent initial results which confirms that data-driven calibration of non-dispersive infrared gas sensors is possible. Meanwhile, the challenge in the practical design is to find an appropriate quantization scheme to keep the computation burden reasonable while achieving good performance., QC 20210614
- Published
- 2020
- Full Text
- View/download PDF
5. Performance Analysis of Deep Anomaly Detection Algorithms for Commercial Microwave Link Attenuation
- Abstract
Highly accurate weather classifiers have recently received a great deal of attention due to their promising applications. An alternative to conventional Weather radars consists of using the measured attenuation data in commercial microwave links (CML) as input to a weather classifier. The design of an accurate weather classifier is challenging due to diverse weather conditions, the absence of predefined features, and specific domain requirements in terms of execution time and detection sensitivity. In addition to this, the quality of the data given as input to the classifier plays a crucial role as it directly impacts the classification output. However, the quality of the measured attenuation data in the CMLs poses a serious concern for different reasons, e.g. the nature of the data itself, the location of each link, and the geographical distance between the links. This mandates the adoption of a data preprocessing step before classification with the purpose to validate the quality of the input data. In this paper, we propose a data preprocessing framework which employs a deep learning model to (i) detect anomalies in the raw data and (ii) validate the measured CML attenuation data by adding quality flags. Moreover, the feasibility and possible generalizations of the proposed framework are studied by conducting an empirical case study performed on real data collected from CMLs at Ericsson AB in Sweden. The empirical evaluation indicates that the average area under the receiver operating characteristic curve exceeding 0.72 using the proposed data preprocessing framework., QC 20210329
- Published
- 2020
- Full Text
- View/download PDF
6. Selection of Sensors for Efficient Transmitter Localization
- Abstract
We address the problem of localizing an (illegal) transmitter using a distributed set of sensors. Our focus is on developing techniques that perform the transmitter localization in an efficient manner, wherein the efficiency is defined in terms of the number of sensors used to localize. Localization of illegal transmitters is an important problem which arises in many important applications, e.g., in patrolling of shared spectrum systems for any unauthorized users. Localization of transmitters is generally done based on observations from a deployed set of sensors with limited resources, thus it is imperative to design techniques that minimize the sensors' energy resources. In this paper, we design greedy approximation algorithms for the optimization problem of selecting a given number of sensors in order to maximize an appropriately defined objective function of localization accuracy. The obvious greedy algorithm delivers a constant-factor approximation only for the special case of two hypotheses (potential locations). For the general case of multiple hypotheses, we design a greedy algorithm based on an appropriate auxiliary objective function-and show that it delivers a provably approximate solution for the general case. We develop techniques to significantly reduce the time complexity of the designed algorithms, by incorporating certain observations and reasonable assumptions. We evaluate our techniques over multiple simulation platforms, including an indoor as well as an outdoor testbed, and demonstrate the effectiveness of our designed techniques-our techniques easily outperform prior and other approaches by up to 50-60% in large-scale simulations., QC 20210329
- Published
- 2020
- Full Text
- View/download PDF
7. Distributed Detection with Non-Identical Sensors : Fusion in the Air or at the Receiver?
- Abstract
In this research paper, fusion in the air (FIA) and fusion at the receiver (FAR) - two different approaches of multi-hypotheses distributed detection for wireless sensor networks with decision fusion center (DFC) - are investigated. The DFC is equipped with multiple antennas, whereas each of the sensors has a single antenna. The performance of these schemes is evaluated in two different scenarios; with identical sensors and non-identical sensors, in terms of their detection capabilities. For a global event, identical sensors observe an equal number of hypotheses, whereas the number of hypotheses detected by the non-identical sensors can be different. When all the sensors in the network are identical, the FIA based technique has a higher detection probability in transmit power constrained situations. However, the FAR scheme performs better when the transmit power budget is higher. Additionally, in the network with non-identical wireless sensors, the FAR based technique is unable to exploit the benefits from the local decisions of the low capability sensors. Therefore the FAR scheme has a lower detection probability than the FIA based approach., QC 20201006
- Published
- 2020
- Full Text
- View/download PDF
8. Hidden Markov Model Based Data-driven Calibration of Non-dispersive Infrared Gas Sensor
- Abstract
Non-dispersive infrared gas sensing is one of the best gas measurement method for air quality monitoring. However, sensors drift over time due to sensor aging and environmental factors, which makes calibration necessary. In this paper, we propose a hidden Markov model approach for sensor self-calibration, which builds on the physical model of gas sensors based on the Beer-Lambert law. We focus on the statistical dependency between a calibration coefficient and the temperature change. Supervised and unsupervised learning algorithms to learn the stochastic parameters of the hidden Markov model are derived and numerically tested. The true calibration coefficient at each time instant is estimated using the Viterbi algorithm. The numerical experiments using CO2 sensor data show excellent initial results which confirms that data-driven calibration of non-dispersive infrared gas sensors is possible. Meanwhile, the challenge in the practical design is to find an appropriate quantization scheme to keep the computation burden reasonable while achieving good performance., QC 20210614
- Published
- 2020
- Full Text
- View/download PDF
9. Hidden Markov Model Based Data-driven Calibration of Non-dispersive Infrared Gas Sensor
- Abstract
Non-dispersive infrared gas sensing is one of the best gas measurement method for air quality monitoring. However, sensors drift over time due to sensor aging and environmental factors, which makes calibration necessary. In this paper, we propose a hidden Markov model approach for sensor self-calibration, which builds on the physical model of gas sensors based on the Beer-Lambert law. We focus on the statistical dependency between a calibration coefficient and the temperature change. Supervised and unsupervised learning algorithms to learn the stochastic parameters of the hidden Markov model are derived and numerically tested. The true calibration coefficient at each time instant is estimated using the Viterbi algorithm. The numerical experiments using CO2 sensor data show excellent initial results which confirms that data-driven calibration of non-dispersive infrared gas sensors is possible. Meanwhile, the challenge in the practical design is to find an appropriate quantization scheme to keep the computation burden reasonable while achieving good performance., QC 20210614
- Published
- 2020
- Full Text
- View/download PDF
10. Hidden Markov Model Based Data-driven Calibration of Non-dispersive Infrared Gas Sensor
- Abstract
Non-dispersive infrared gas sensing is one of the best gas measurement method for air quality monitoring. However, sensors drift over time due to sensor aging and environmental factors, which makes calibration necessary. In this paper, we propose a hidden Markov model approach for sensor self-calibration, which builds on the physical model of gas sensors based on the Beer-Lambert law. We focus on the statistical dependency between a calibration coefficient and the temperature change. Supervised and unsupervised learning algorithms to learn the stochastic parameters of the hidden Markov model are derived and numerically tested. The true calibration coefficient at each time instant is estimated using the Viterbi algorithm. The numerical experiments using CO2 sensor data show excellent initial results which confirms that data-driven calibration of non-dispersive infrared gas sensors is possible. Meanwhile, the challenge in the practical design is to find an appropriate quantization scheme to keep the computation burden reasonable while achieving good performance., QC 20210614
- Published
- 2020
- Full Text
- View/download PDF
11. Hidden Markov Model Based Data-driven Calibration of Non-dispersive Infrared Gas Sensor
- Abstract
Non-dispersive infrared gas sensing is one of the best gas measurement method for air quality monitoring. However, sensors drift over time due to sensor aging and environmental factors, which makes calibration necessary. In this paper, we propose a hidden Markov model approach for sensor self-calibration, which builds on the physical model of gas sensors based on the Beer-Lambert law. We focus on the statistical dependency between a calibration coefficient and the temperature change. Supervised and unsupervised learning algorithms to learn the stochastic parameters of the hidden Markov model are derived and numerically tested. The true calibration coefficient at each time instant is estimated using the Viterbi algorithm. The numerical experiments using CO2 sensor data show excellent initial results which confirms that data-driven calibration of non-dispersive infrared gas sensors is possible. Meanwhile, the challenge in the practical design is to find an appropriate quantization scheme to keep the computation burden reasonable while achieving good performance., QC 20210614
- Published
- 2020
- Full Text
- View/download PDF
12. Operational Equivalence of Distributed Hypothesis Testing and Identification Systems
- Abstract
In this paper we revisit the connections of the distributed hypothesis testing against independence (HT) problem with the Wyner-Ahlswede-Korner (WAK) problem and the identification systems (ID). We show that the strong converse for the WAK problem is equivalent to the strong converse for the HT problem via constructive and nonconstructive transformations of codes. As another consequence of the transformation we provide a new exponentially strong converse equivalence statement. Applying the same idea, we prove a new result that the epsilon-identification capacity of the ID problem is equal to the maximum epsilon-exponent of type II of error in the HT problem when both side compression is allowed., QC 20191114. QC 20200318
- Published
- 2019
- Full Text
- View/download PDF
13. Rectenna for Bluetooth Low Energy Applications
- Abstract
In this paper, we propose an efficient rectenna design for Bluetooth low energy (BLE) applications targeting the 2.4 GHz ISM band. A miniature meandered planar Inverted-F antenna (MIFA) was designed, simulated, fabricated, and measured, achieving good matching with small profile. In addition, a single diode rectifier circuit was optimized at -20 dBm input power to convert the radio frequency (RF) energy captured by the antenna into DC power. Simulation results for the rectifier circuit show that it maintains a high RF-to-DC conversion efficiency. Using ideal components, an efficiency of 36% can be achieved at -20 dBm input power. When the non-idealities are considered in the rectifier, an efficiency of 20% at -20 dBm input power can be obtained., QC 20201006
- Published
- 2019
- Full Text
- View/download PDF
14. Convolutional LSTM Network with Hierarchical Attention for Relation Classification in Clinical Texts
- Abstract
Identifying relation from clinical texts is a complex and challenging task due to the specific biomedical knowledge. Existing methods for this work generally have the misclassification problem caused by sample class imbalance. In this paper, we propose a hierarchical attention-based convolutional long short-term memory (ConvLSTM) network model to solve this problem. We construct a sentence as multi-dimensional hierarchical sequence and directly learn local and global context information by a single-layer ConvLSTM network. Besides, a hierarchical attention-based pooling is built to capture the parts of a sentence that are relevant with the target semantic relation. Experiments on the 2010 i2b2/VA relation dataset show that our model outperforms several previous state-of-the-art models without relying on any external features., QC 20200622
- Published
- 2019
- Full Text
- View/download PDF
15. Operational Equivalence of Distributed Hypothesis Testing and Identification Systems
- Abstract
In this paper we revisit the connections of the distributed hypothesis testing against independence (HT) problem with the Wyner-Ahlswede-Korner (WAK) problem and the identification systems (ID). We show that the strong converse for the WAK problem is equivalent to the strong converse for the HT problem via constructive and nonconstructive transformations of codes. As another consequence of the transformation we provide a new exponentially strong converse equivalence statement. Applying the same idea, we prove a new result that the epsilon-identification capacity of the ID problem is equal to the maximum epsilon-exponent of type II of error in the HT problem when both side compression is allowed., QC 20191114. QC 20200318
- Published
- 2019
- Full Text
- View/download PDF
16. SPOTNET - LEARNED ITERATIONS FOR CELL DETECTION IN IMAGE-BASED IMMUNOASSAYS
- Abstract
Accurate cell detection and counting in the image-based ELISpot and FluoroSpot immunoassays is a challenging task. Recently proposed methodology matches human accuracy by leveraging knowledge of the underlying physical process of these assays and using proximal optimization methods to solve an inverse problem. Nonetheless, thousands of computationally expensive iterations are often needed to reach a near-optimal solution. In this paper, we exploit the structure of the iterations to design a parameterized computation graph, SpotNet, that learns the patterns embedded within several training images and their respective cell information. Further, we compare SpotNet to a convolutional neural network layout customized for cell detection. We show empirical evidence that, while both designs obtain a detection performance on synthetic data far beyond that of a human expert, SpotNet is easier to train and obtains better estimates of particle secretion for each cell., QC 20191002
- Published
- 2019
- Full Text
- View/download PDF
17. ECO-PANDA : A COMPUTATIONALLY ECONOMIC, GEOMETRICALLY CONVERGING DUAL OPTIMIZATION METHOD ON TIME-VARYING UNDIRECTED GRAPHS
- Abstract
In this paper we consider distributed convex optimization over time-varying undirected graphs. We propose a linearized version of primarily averaged network dual ascent (PANDA) that keeps the advantages of PANDA while requiring less computational costs. The proposed method, economic primarily averaged network dual ascent (Eco-PANDA), provably converges at R-linear rate to the optimal point given that the agents' objective functions are strongly convex and have Lipschitz continuous gradients. Therefore, the method is competitive, in terms of type of rate, with both DIGing and PANDA. The proposed method halves the communication costs of methods like DIGing while still converging R-linearly and having the same per iterate complexity., QC 20191002
- Published
- 2019
- Full Text
- View/download PDF
18. Generalized Interference Alignment for Multi-cell Cooperative Transmission over Doubly Selective Channels
- Abstract
The paper studies the multi-cell cooperation scheme under the time and frequency doubly selective channels, in which the multi-cell co-channel interference are jointly eliminated with the inter-symbol interference to enhance the transmission reception. The basic idea of interference alignment is exploited, with which the link-level interference and network-level interference are aligned to the same dimension before canceled. Instead of assuming the perfect channel information is available at the receivers, an embedded pilot framework is also proposed to track and update the channel state information every short time period, making the proposed scheme more feasible for practical application. Additionally, the pilot design is also discussed and an optimal embedded pilot scheme is derived.
- Published
- 2019
- Full Text
- View/download PDF
19. Operational Equivalence of Distributed Hypothesis Testing and Identification Systems
- Abstract
In this paper we revisit the connections of the distributed hypothesis testing against independence (HT) problem with the Wyner-Ahlswede-Korner (WAK) problem and the identification systems (ID). We show that the strong converse for the WAK problem is equivalent to the strong converse for the HT problem via constructive and nonconstructive transformations of codes. As another consequence of the transformation we provide a new exponentially strong converse equivalence statement. Applying the same idea, we prove a new result that the epsilon-identification capacity of the ID problem is equal to the maximum epsilon-exponent of type II of error in the HT problem when both side compression is allowed., QC 20191114. QC 20200318
- Published
- 2019
- Full Text
- View/download PDF
20. Operational Equivalence of Distributed Hypothesis Testing and Identification Systems
- Abstract
In this paper we revisit the connections of the distributed hypothesis testing against independence (HT) problem with the Wyner-Ahlswede-Korner (WAK) problem and the identification systems (ID). We show that the strong converse for the WAK problem is equivalent to the strong converse for the HT problem via constructive and nonconstructive transformations of codes. As another consequence of the transformation we provide a new exponentially strong converse equivalence statement. Applying the same idea, we prove a new result that the epsilon-identification capacity of the ID problem is equal to the maximum epsilon-exponent of type II of error in the HT problem when both side compression is allowed., QC 20191114. QC 20200318
- Published
- 2019
- Full Text
- View/download PDF
21. Operational Equivalence of Distributed Hypothesis Testing and Identification Systems
- Abstract
In this paper we revisit the connections of the distributed hypothesis testing against independence (HT) problem with the Wyner-Ahlswede-Korner (WAK) problem and the identification systems (ID). We show that the strong converse for the WAK problem is equivalent to the strong converse for the HT problem via constructive and nonconstructive transformations of codes. As another consequence of the transformation we provide a new exponentially strong converse equivalence statement. Applying the same idea, we prove a new result that the epsilon-identification capacity of the ID problem is equal to the maximum epsilon-exponent of type II of error in the HT problem when both side compression is allowed., QC 20191114. QC 20200318
- Published
- 2019
- Full Text
- View/download PDF
22. Operational Equivalence of Distributed Hypothesis Testing and Identification Systems
- Abstract
In this paper we revisit the connections of the distributed hypothesis testing against independence (HT) problem with the Wyner-Ahlswede-Korner (WAK) problem and the identification systems (ID). We show that the strong converse for the WAK problem is equivalent to the strong converse for the HT problem via constructive and nonconstructive transformations of codes. As another consequence of the transformation we provide a new exponentially strong converse equivalence statement. Applying the same idea, we prove a new result that the epsilon-identification capacity of the ID problem is equal to the maximum epsilon-exponent of type II of error in the HT problem when both side compression is allowed., QC 20191114. QC 20200318
- Published
- 2019
- Full Text
- View/download PDF
23. Convex optimization based Sparse Learning over Networks
- Abstract
In this paper, we consider the problem of estimating a sparse signal over a network. The main interest is to save communication resource for information exchange over the network and hence reduce processing time. With this aim, we develop a distributed learning algorithm where each node of the network uses a locally optimized convex optimization based algorithm. The nodes iteratively exchange their signal estimates over the network to refine the local estimates. The convex cost is constructed to promote sparsity as well as to include influence of estimates from the neighboring nodes. We provide a restricted isometry property (RIP)-based theoretical guarantee on the estimation quality of the proposed algorithm. Using simulations, we show that the algorithm provides competitive performance vis-a-vis a globally optimum distributed LASSO algorithm, both in convergence speed and estimation error., QC 20211014Proceedings ISBN 978-9-0827-9703-9
- Published
- 2019
24. Identification Rates for Block-correlated Gaussian Sources
- Abstract
Among many current data processing systems, the objectives are often not the reproduction of data, but to compute some answers based on the data responding to sonic queries. The similarity identification task is to identify the items in a database which are similar to a given query item regarding to a certain metric. The problem of compression for similarity identification has been studied in [1]. Unlike classic compression problems, the focus is not on reconstructing the original data. Instead, the compression rate is determined by the desired reliability of the answers. Specifically, the information measure identification rate of a compression scheme characterizes the minimum compression rate that can be achieved which guarantees reliable answers with respect to a given similarity threshold. In this paper, we study the component-based quadratic similarity identification for correlated sources. The blocks are first decorrelated by Karhunen-Loeve transform. Then, the decorrelated data is processed by a distinct D-admissible system for each component. We derive the identification rate of component-based scheme for block correlated Gaussian sources. In addition, we characterize the identification rate of a special setting where any information regarding to the component similarity thresholds is unknown while only the similarity threshold of the whole scheme is given. Furthermore, we prove that block-correlated Gaussian sources are the "most difficult" to code under the special setting., QC 20190603
- Published
- 2018
- Full Text
- View/download PDF
25. PREDICTION-BASED SIMILARITY IDENTIFICATION FOR AUTOREGRESSIVE PROCESSES
- Abstract
The task of similarity identification is to identify items in a database which are similar to a given query item for a given metric. The identification rate of a compression scheme characterizes the minimum rate that can be achieved which guarantees reliable answers with respect to a given similarity threshold [1]. In this paper, we study a prediction-based quadratic similarity identification for autoregressive processes. We use an ideal linear predictor to remove linear dependencies in autoregressive processes. The similarity identification is conducted on the residuals. We show that the relation between the distortion of query and database processes and the distortion of their residuals is characterized by a sequence of eigenvalues. We derive the identification rate of our prediction-based approach for autoregressive Gaussian processes. We characterize the identification rate for the special case where only the smallest value in the sequence of eigenvalues is required to be known and derive its analytical upper bound by approximating a sequence of matrices with a sequence of Toeplitz matrices., QC 20190423
- Published
- 2018
- Full Text
- View/download PDF
26. A Comparison of OFDM, QAM-FBMC, and OQAM-FBMC Waveforms Subject to Phase Noise
- Abstract
Frequencies above 6 GHz are being considered by mobile communication industry for the deployment of future 5G networks. However in the higher carrier frequencies, especially the millimeter-wave frequencies (above 30 GHz), there can be severe degradations in the transmitted and received signals due to Phase Noise (PN) introduced by the local oscillators. In this paper, the effect of PN has been investigated for Orthogonal Frequency Division Multiplexing (OFDM), Offset QAM Filter-Bank Multi-Carrier (OQAM-FBMC) and QAM Filter-Bank Multi-Carrier (QAM-FBMC). The sources of degradation in these waveforms are quantified and closed-form expressions are derived for Signal-to-Interference Ratio (SIR). Evaluations are performed in terms of SIR and Symbol Error Rate (SER) for mm-wave frequencies using mmMAGIC PN model. The results reveal that OFDM outperforms OQAM-FBMC and QAM-FBMC and is a promising candidate for mm-wave communication., QC 20190513
- Published
- 2017
- Full Text
- View/download PDF
27. Learning-based Pilot Precoding and Combining for Wideband Millimeter-wave Networks
- Abstract
This paper proposes an efficient channel estimation scheme with a minimum number of pilots for a frequency-selective millimeter-wave communication system. We model the dynamics of the channel's second-order statistics by a Markov process and develop a learning framework that finds the optimal precoding and combining vectors for pilot signals, given the channel dynamics. Using these vectors, the transmitter and receiver will sequentially estimate the corresponding angles of departure and arrival, and then refine the pilot precoding and combining vectors to minimize the error of estimating the small-scale fading of all subcarriers. Numerical results demonstrate near-optimality of our approach, compared to the oracle wherein the second-order statistics (not the dynamics) are perfectly known a priori., QC 20180504
- Published
- 2017
- Full Text
- View/download PDF
28. Time-varying Normalizing Flow for Generative Modeling of Dynamical Signals
- Abstract
We develop a time-varying normalizing flow (TVNF) for explicit generative modeling of dynamical signals. Being explicit, it can generate samples of dynamical signals, and compute the likelihood of a (given) dynamical signal sample. In the proposed model, signal flow in the layers of the normalizing flow is a function of time, which is realized using an encoded representation that is the output of a recurrent neural network (RNN). Given a set of dynamical signals, the parameters of TVNF are learned according to maximum-likelihood approach in conjunction with gradient descent (backpropagation). Use of the proposed model is illustrated for a toy application scenario - maximum-likelihood based speech-phone classification task., QC 20230228
- Published
- 2022
29. A Low Complexity Decentralized Neural Net with Centralized Equivalence using Layer-wise Learning
- Abstract
We design a low complexity decentralized learning algorithm to train a recently proposed large neural network in distributed processing nodes (workers). We assume the communication network between the workers is synchronized and can be modeled as a doubly-stochastic mixing matrix without having any master node. In our setup, the training data is distributed among the workers but is not shared in the training process due to privacy and security concerns. Using altemating-direction-method-of-multipliers (ADMM) along with a layer-wise convex optimization approach, we propose a decentralized learning algorithm which enjoys low computational complexity and communication cost among the workers. We show that it is possible to achieve equivalent learning performance as if the data is available in a single place. Finally, we experimentally illustrate the time complexity and convergence behavior of the algorithm., QC 20210419
- Published
- 2020
- Full Text
- View/download PDF
30. Secure Strong Coordination
- Abstract
We consider a network of two nodes separated by a noisy channel, in which the source and its reconstruction have to be strongly coordinated, while simultaneously satisfying the strong secrecy condition with respect to an outside observer of the noisy channel. In the case of non-causal encoding and decoding, we propose a joint source-channel coding scheme for the secure strong coordination region. Furthermore, we provide a complete characterization of the secure strong coordination region when the decoder has to reliably reconstruct the source sequence and the legitimate channel is more capable than the channel of the eavesdropper., QC 20210329
- Published
- 2020
- Full Text
- View/download PDF
31. Streaming 360-Degree Videos Using Super-Resolution
- Abstract
360 degrees videos provide an immersive experience to users, but require considerably more bandwidth to stream compared to regular videos. State-of-the-art 360 degrees video streaming systems use viewport prediction to reduce bandwidth requirement, that involves predicting which part of the video the user will view and only fetching that content. However, viewport prediction is error prone resulting in poor user Quality of Experience (QoE). We design PARSEC, a 360 degrees video streaming system that reduces bandwidth requirement while improving video quality. PARSEC trades off bandwidth for additional client-side computation to achieve its goals. PARSEC uses an approach based on super-resolution, where the video is significantly compressed at the server and the client runs a deep learning model to enhance the video to a much higher quality. PARSEC addresses a set of challenges associated with using super-resolution for 360 degrees video streaming: large deep learning models, slow inference rate, and variance in the quality of the enhanced videos. To this end, PARSEC trains small micro-models over shorter video segments, and then combines traditional video encoding with super-resolution techniques to overcome the challenges. We evaluate PARSEC on a real WiFi network, over a broadband network trace released by FCC, and over a 4G/LTE network trace. PARSEC significantly outperforms the state-of-art 360 degrees video streaming systems while reducing the bandwidth requirement., QC 20210324
- Published
- 2020
- Full Text
- View/download PDF
32. Detecting State Transitions of a Markov Source : Sampling Frequency and Age Trade-off
- Abstract
We consider a finite-state Discrete-Time Markov Chain (DTMC) source that can be sampled for detecting the events when the DTMC transits to a new state. Our goal is to study the trade-off between sampling frequency and staleness in detecting the events. We argue that, for the problem at hand, using Age of Information (AoI) for quantifying the staleness of a sample is conservative and therefore, introduce age penalty for this purpose. We study two optimization problems: minimize average age penalty subject to an average sampling frequency constraint, and minimize average sampling frequency subject to an average age penalty constraint; both are Constrained Markov Decision Problems. We solve them using linear programming approach and compute Markov policies that are optimal among all causal policies. Our numerical results demonstrate that the computed Markov policies not only outperform optimal periodic sampling policies, but also achieve sampling frequencies close to or lower than that of an optimal clairvoyant (non-causal) sampling policy, if a small age penalty is allowed., QC 20210113
- Published
- 2020
- Full Text
- View/download PDF
33. Glide Symmetry to Improve the Bandgap Operation of Periodic Microstrip Defected Ground Structures
- Abstract
A novel one-dimensional periodic planar defected ground structure exploiting glide symmetry is proposed here. The planar structure is designed to operate as an electromagnetic bandgap structure that avoids the use of vias. Simulation results show that the glide-symmetric structure offers a wider rejection bandwidth as well as a higher rejection level than the conventional structure (without glide symmetry). Measurement results of the fabricated prototypes are provided to verify the simulation results., QC 20210803Part of proceedings: ISBN 978-2-87487-059-0
- Published
- 2020
- Full Text
- View/download PDF
34. Robust classification using hidden markov models and mixtures of normalizing flows
- Abstract
We test the robustness of a maximum-likelihood (ML) based classifier where sequential data as observation is corrupted by noise. The hypothesis is that a generative model, that combines the state transitions of a hidden Markov model (HMM) and the neural network based probability distributions for the hidden states of the HMM, can provide a robust classification performance. The combined model is called normalizing-flow mixture model based HMM (NMM-HMM). It can be trained using a combination of expectation-maximization (EM) and backpropagation. We verify the improved robustness of NMM-HMM classifiers in an application to speech recognition., QC 20210503
- Published
- 2020
35. alpha Belief Propagation as Fully Factorized Approximation
- Abstract
Belief propagation (BP) can do exact inference in loop-free graphs, but its performance could be poor in graphs with loops, and the understanding of its solution is limited. This work gives an interpretable belief propagation rule that is actually minimization of a localized alpha-divergence. We term this algorithm as alpha belief propagation (alpha-BP). The performance of alpha-BP is tested in MAP (maximum a posterior) inference problems, where alpha-BP can outperform (loopy) BP by a significant margin even in fully-connected graphs., QC 20200910
- Published
- 2019
- Full Text
- View/download PDF
36. Performance Characterization Using AoI in a Single-loop Networked Control System
- Abstract
The joint design of control and communication scheduling in a Networked Control System (NCS) is known to be a hard problem. Several research works have successfully designed optimal sampling and/or control strategies under simplified communication models, where transmission delays/times are negligible or fixed. However, considering sophisticated communication models, with random transmission times, result in highly coupled and difficult-to-solve optimal design problems due to the parameter inter-dependencies between estimation/control and communication layers. To tackle this problem, in this work, we investigate the applicability of Age-of-Information (AoI) for solving control/estimation problems in an NCS under i.i.d. transmission times. Our motivation for this investigation stems from the following facts: 1) recent results indicate that AoI can be tackled under relatively sophisticated communication models, and 2) a lower AoI in an NCS may result in a lower estimation/control cost. We study a joint optimization of sampling and scheduling for a single-loop stochastic LTI networked system with the objective of minimizing the time-average squared norm of the estimation error. We first show that, under mild assumptions on information structure the optimal control policy can be designed independently from the sampling and scheduling policies. We then derive a key result that minimizing the estimation error is equivalent to minimizing a non-negative and non-decreasing function of AoI. The parameters of this function include the LTI matrix and the covariance of exogenous noise in the LTI system. Noting that the formulated problem is a stochastic combinatorial optimization problem and is hard to solve, we resort to heuristic algorithms by extending existing algorithms in the AoI literature. We also identify a class of LTI system dynamics for which minimizing the estimation error is equivalent to minimizing the expected AoI., QC 20200511
- Published
- 2019
- Full Text
- View/download PDF
37. ENTROPY-REGULARIZED OPTIMAL TRANSPORT GENERATIVE MODELS
- Abstract
We investigate the use of entropy-regularized optimal transport (EOT) cost in developing generative models to learn implicit distributions. Two generative models are proposed. One uses EOT cost directly in an one-shot optimization problem and the other uses EOT cost iteratively in an adversarial game. The proposed generative models show improved performance over contemporary models on scores of sample based test., QC 20191001
- Published
- 2019
- Full Text
- View/download PDF
38. Optimal Power Allocations for 5G Non-Orthogonal Multiple Access with Half/Full Duplex Relaying
- Abstract
Recently, power allocation has attracted more and more attention in order to optimize the performance of nonorthogonal multiple access (NOMA) systems. Different from existing works, the power allocation problems are investigated for cooperative NOMA systems with dedicated amplify-and-forward half-duplex relay (NOMA-HDR) and full-duplex relay (NOMA-FDR). From the fairness standpoint, the power allocation problems are formulated to maximize the minimum achievable user rate in the considered systems. The problems for both NOMA-HDR and NOMA-FDR systems with two-user and M-user are addressed. The closed-form power allocation policy of two-user NOMA-HDR system is obtained. Also, the optimal numerical power allocation policies for two-user NOMA-FDR and M-user NOMA-HDR systems are obtained. In addition, the problem for M-user NOMA-FDR systems is solved in noise-limited environment. Simulation results show that the proposed NOMA-HDR or NOMA-FDR scheme with power adaption clearly outperforms the NOMA-HDR or NOMA-FDR scheme with fixed power allocation. Besides, when the residual self-interference channel gain is small, the performance of NOMA-FDR system is better than the NOMA-HDR system., QC 20191129
- Published
- 2019
- Full Text
- View/download PDF
39. Symmetric Private Information Retrieval with Mismatched Coded Messages and Randomness
- Abstract
The capacity of symmetric private information retrieval (PIR) with N servers and K messages, each coded by an (N, M)-MDS code has been characterized as CMDS-SPIR = 1- M/N. A critical assumption for this result is that the randomness is similarly coded by an (N, M)-MDS code, i.e., the code parameters of the messages and randomness are matched. In this work, we are interested in the mismatched case, and as a preliminary result, we establish the capacity of the mismatched MDS coded symmetric PIR (SPIR) problem under an extreme setting, where the messages are coded by an (N, M)-MDS code and the randomness is replicated (i.e., coded by an (N, 1)-MDS code). The capacity is shown to be Cmis-MDS-SPIR = (1 - 1/N). (1 + M-1/N (1+ M/N + . . . (M/N)(K-2)))(-1). Interestingly, Cmis-MDS-SPIR > CMDS-SPIR, so mismatched coded randomness (with more redundancy) is strictly beneficial. Further, mismatched SPIR exhibits properties that are similar to PIR., QC 20191114
- Published
- 2019
- Full Text
- View/download PDF
40. On the Mutual Information of Two Boolean Functions, with Application to Privacy
- Abstract
We investigate the behavior of the mutual information between two Boolean functions of correlated binary strings. The covariance of these functions is found to be a crucial parameter in the aforementioned mutual information. We then apply this result in the analysis of a specific privacy problem where a user observes a random binary string. Under particular conditions, we characterize the optimal strategy for communicating the outcomes of a function of said string while preventing to leak any information about a different function., QC 20191114
- Published
- 2019
- Full Text
- View/download PDF
41. KERNEL REGRESSION FOR GRAPH SIGNAL PREDICTION IN PRESENCE OF SPARSE NOISE
- Abstract
In presence of sparse noise we propose kernel regression for predicting output vectors which are smooth over a given graph. Sparse noise models the training outputs being corrupted either with missing samples or large perturbations. The presence of sparse noise is handled using appropriate use of l(1)-norm along-with use of l(2)-norm in a convex cost function. For optimization of the cost function, we propose an iteratively reweighted least-squares (IRLS) approach that is suitable for kernel substitution or kernel trick due to availability of a closed form solution. Simulations using real-world temperature data show efficacy of our proposed method, mainly for limited-size training datasets., QC 20191002
- Published
- 2019
- Full Text
- View/download PDF
42. Performance Analysis for MmWave MIMO-SCMA systems Using Lens Antenna Array
- Abstract
The recent concept of beamspace multiple input multiple output (MEMO) can significantly reduce the number of required radio frequency (RE) chains in millimeter wave (mmWave) massive MEMO systems without obvious performance loss. However, the number of supported users cannot be larger than the number of RF chains in hybrid MEMO architectures. To break this fundamental limit, we introduce the concept of sparse code multiple access (SCMA) with beamspace MEMO, then a useful upper bound on the average symbol error probability is obtained through the union bound. The bound is tight in beamspace nunWave MEMO-SCMA systems for high SNR regions. The analytical result is compared with simulations, and the results confirm the effectiveness of the analysis for mmWave MEMO-SCMA channels., QC 20191002
- Published
- 2019
- Full Text
- View/download PDF
43. Compressive Sensing with Applications to Millimeter-wave Architectures
- Abstract
To make the system available at low-cost, millimeter-ave (mmWave) multiple-input multiple-output (MIMO) architectures employ analog arrays, which are driven by a limited number of radio frequency (RF) chains. One primary challenge of using large hybrid analog-digital arrays is that the digital baseband cannot directly access the signal to/from each antenna. To address this limitation, recent research has focused on retransmissions, iterative precoding, and subspace decomposition methods. Unlike these approaches that exploited the channel's low-rank, in this work we exploit the sparsity of the received signal at both the transmit/receive antennas. While the signal itself is de facto dense, it is well-known that most signals are sparse under an appropriate choice of basis. By delving into the structured compressive sensing (CS) framework and adapting them to variants of the mmWave hybrid architectures, we provide methodologies to recover the analog signal at each antenna from the (low-dimensional) digital signal. Moreover, we characterizes the minimal numbers of measurement and RF chains to provide this recovery, with high probability. We discuss their applications to common variants of the hybrid architecture. By leveraging the inherent sparsity of the received signal, our analysis reveals that a hybrid MIMO system can be " turned into" a fully digital one: the number of needed RF chains increases logarithmically with the number of antennas., QC 20191001
- Published
- 2019
- Full Text
- View/download PDF
44. On the Distribution of AoI for the GI/GI/1/1 and GI/GI/1/2*Systems : Exact Expressions and Bounds
- Abstract
Since Age of Information (AoI) has been proposed as a metric that quantifies the freshness of information updates in a communication system, there has been a constant effort in understanding and optimizing different statistics of the AoI process for classical queueing systems. In addition to classical queuing systems, more recently, systems with no queue or a unit capacity queue storing the latest packet have been gaining importance as storing and transmitting older packets do not reduce AoI at the receiver. Following this line of research, we study the distribution of AoI for the GI/GI/1/1 and GI/GI/1/2* systems, under non-preemptive scheduling. For any single-source-single-server queueing system, we derive, using sample path analysis, a fundamental result that characterizes the AoI violation probability, and use it to obtain closed-form expressions for D/GI/1/1, M/GI/1/1 as well as systems that use zero-wait policy. Further, when exact results are not tractable, we present a simple methodology for obtaining upper bounds for the violation probability for both GI/GI/1/1 and GI/GI/1/2* systems. An interesting feature of the proposed upper bounds is that, if the departure rate is given, they overestimate the violation probability by at most a value that decreases with the arrival rate. Thus, given the departure rate and for a fixed average service, the bounds are tighter at higher utilization., QC 20190906
- Published
- 2019
- Full Text
- View/download PDF
45. Uncertainty in Identification Systems
- Abstract
We study the high-dimensional identification systems under the presence of statistical uncertainties. The task is to design mappings for enrollment and identification purposes. The identification mapping compresses users' information then stores the index in the corresponding position in a database. The identification mapping combines the information in the database and the observation which originates randomly from an enrolled user to produce an estimate of the underlying user index. We study two scenarios. Users' data are generated from the same unknown distribution while the observation channel is also subjected to uncertainty. Each user's data are generated iid from the distribution corresponding to its own state, while the observation channel is known. We provide an achievable compression-identification trade-off for the first and second settings considering both discrete and continuous cases. In the discrete scenario, the described regions are also the correspondingly complete characterizations., Part of ISBN 978-1-5386-4781-3QC 20230922
- Published
- 2018
46. A Learning Approach for Optimal Codebook Selection in Spatial Modulation Systems
- Abstract
For spatial modulation (SM) systems that utilize multiple transmit antennas/patterns with a single radio front-end, we propose a learning approach to predict the average symbol error rate (SER) conditioned on the instantaneous channel state. We show that the predicted SER can he used to lower the average SER over Rayleigh fading channels by selecting the optimal codebook in each transmission instance. Further by exploiting that feedforward artificial neural networks (ANNs) trained with a mean squared error (MSE) criterion estimate the conditional a posteriori probabilities, we maximize the expected rate for each transmission instance and thereby improve the link spectral efficiency., QC 20190603
- Published
- 2018
- Full Text
- View/download PDF
47. A Learning Approach for Optimal Codebook Selection in Spatial Modulation Systems
- Abstract
For spatial modulation (SM) systems that utilize multiple transmit antennas/patterns with a single radio front-end, we propose a learning approach to predict the average symbol error rate (SER) conditioned on the instantaneous channel state. We show that the predicted SER can he used to lower the average SER over Rayleigh fading channels by selecting the optimal codebook in each transmission instance. Further by exploiting that feedforward artificial neural networks (ANNs) trained with a mean squared error (MSE) criterion estimate the conditional a posteriori probabilities, we maximize the expected rate for each transmission instance and thereby improve the link spectral efficiency., QC 20190603
- Published
- 2018
- Full Text
- View/download PDF
48. A Learning Approach for Optimal Codebook Selection in Spatial Modulation Systems
- Abstract
For spatial modulation (SM) systems that utilize multiple transmit antennas/patterns with a single radio front-end, we propose a learning approach to predict the average symbol error rate (SER) conditioned on the instantaneous channel state. We show that the predicted SER can he used to lower the average SER over Rayleigh fading channels by selecting the optimal codebook in each transmission instance. Further by exploiting that feedforward artificial neural networks (ANNs) trained with a mean squared error (MSE) criterion estimate the conditional a posteriori probabilities, we maximize the expected rate for each transmission instance and thereby improve the link spectral efficiency., QC 20190603
- Published
- 2018
- Full Text
- View/download PDF
49. Performance Analysis of Mobility Prediction Based Proactive Wireless Caching
- Abstract
We study a mobility prediction based proactive wireless caching scheme for two-tier cellular networks consisting of a base station (BS) tier and a device-to-device (D2D) tier. Two scenarios are considered: popular contents cached only at BSs, and popular contents cached at both BSs and Nil's. We model user mobility as a Markov renewal process to predict user moving paths and residence time. Then we analyse the hit-rate performance to evaluate the presented schemes. By formulating content placement to maximize the hit-rate as optimization problems, we provide the optimal solution for the first scenario and develop a greedy mobility prediction based proactive wireless caching (MPPC) scheme for the second. Through analysis we show that the hit-rate achieved by MPPC is at least exp(1)-1/exp(1) of the optimal hit-rate. The numeric results show that the MPPC can dramatically improve the hit-rate performance, compared with random caching and most popular caching (MPC) schemes. We show that the hit-rate achieved by MPPC outperformances MPC by 26% at most when MTs are not able to cache. Besides we present the impact of the moving speed on the hit-rate performance of MPPC for MTs., QC 20180719
- Published
- 2018
- Full Text
- View/download PDF
50. Testing in Identification Systems
- Abstract
We study a hypothesis testing problem to decide whether or not an observation sequence is related to one of users in a database which contains compressed versions of users' data. Our main interest lies on the characterization of the exponent of the probability of the second kind of error when the number of users in the database grows exponentially. We show a lower bound on the error exponent and identify special cases where the bound is tight. Next, we study the c-achievable error exponent and show a sub-region where the lower bound is tight., QC 20190610. QC 20200318
- Published
- 2018
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.