首页 > 最新文献

arXiv - MATH - Information Theory最新文献

英文 中文
Generalized Measures of Anticipation and Responsivity in Online Language Processing 在线语言处理中预期和反应能力的通用测量方法
Pub Date : 2024-09-16 DOI: arxiv-2409.10728
Mario Giulianelli, Andreas Opedal, Ryan Cotterell
We introduce a generalization of classic information-theoretic measures ofpredictive uncertainty in online language processing, based on the simulationof expected continuations of incremental linguistic contexts. Our frameworkprovides a formal definition of anticipatory and responsive measures, and itequips experimenters with the tools to define new, more expressive measuresbeyond standard next-symbol entropy and surprisal. While extracting thesestandard quantities from language models is convenient, we demonstrate thatusing Monte Carlo simulation to estimate alternative responsive andanticipatory measures pays off empirically: New special cases of ourgeneralized formula exhibit enhanced predictive power compared to surprisal forhuman cloze completion probability as well as ELAN, LAN, and N400 amplitudes,and greater complementarity with surprisal in predicting reading times.
我们基于对增量语言上下文预期连续性的模拟,对在线语言处理中预测不确定性的经典信息论测量方法进行了概括。我们的框架提供了预测性和反应性测量的正式定义,并为实验人员提供了工具,以定义标准下一符号熵和惊奇度之外新的、更具表现力的测量。虽然从语言模型中提取这些标准量很方便,但我们证明,使用蒙特卡罗模拟来估算其他反应性和预期性量度在实证上是有效的:与惊奇相比,我们的通用公式的新特例在预测人类掐词完成概率、ELAN、LAN 和 N400 振幅方面显示出更强的预测能力,并且在预测阅读时间方面与惊奇有更大的互补性。
{"title":"Generalized Measures of Anticipation and Responsivity in Online Language Processing","authors":"Mario Giulianelli, Andreas Opedal, Ryan Cotterell","doi":"arxiv-2409.10728","DOIUrl":"https://doi.org/arxiv-2409.10728","url":null,"abstract":"We introduce a generalization of classic information-theoretic measures of\u0000predictive uncertainty in online language processing, based on the simulation\u0000of expected continuations of incremental linguistic contexts. Our framework\u0000provides a formal definition of anticipatory and responsive measures, and it\u0000equips experimenters with the tools to define new, more expressive measures\u0000beyond standard next-symbol entropy and surprisal. While extracting these\u0000standard quantities from language models is convenient, we demonstrate that\u0000using Monte Carlo simulation to estimate alternative responsive and\u0000anticipatory measures pays off empirically: New special cases of our\u0000generalized formula exhibit enhanced predictive power compared to surprisal for\u0000human cloze completion probability as well as ELAN, LAN, and N400 amplitudes,\u0000and greater complementarity with surprisal in predicting reading times.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Second Generalized Covering Radius of Binary Primitive Double-Error-Correcting BCH Codes 二进制原始双误校正 BCH 码的第二广义覆盖半径
Pub Date : 2024-09-16 DOI: arxiv-2409.10420
Lev Yohananov, Moshe Schwartz
We completely determine the second covering radius for binary primitivedouble-error-correcting BCH codes. As part of this process, we provide a lowerbound on the second covering radius for binary primitive BCH codes correctingmore than two errors.
我们完全确定了二进制原始双误差校正 BCH 码的第二覆盖半径。作为这一过程的一部分,我们提供了纠正两次以上错误的二进制基元 BCH 码的第二覆盖半径下限。
{"title":"The Second Generalized Covering Radius of Binary Primitive Double-Error-Correcting BCH Codes","authors":"Lev Yohananov, Moshe Schwartz","doi":"arxiv-2409.10420","DOIUrl":"https://doi.org/arxiv-2409.10420","url":null,"abstract":"We completely determine the second covering radius for binary primitive\u0000double-error-correcting BCH codes. As part of this process, we provide a lower\u0000bound on the second covering radius for binary primitive BCH codes correcting\u0000more than two errors.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Allocation for Finite-Blocklength IR-HARQ 有限块长 IR-HARQ 的功率分配
Pub Date : 2024-09-15 DOI: arxiv-2409.09780
Wenyu Wang, Minhao Zhu, Kaiming Shen, Zhaorui Wang, Shuguang Cui
This letter concerns the power allocation across the multiple transmissionrounds under the Incremental Redundancy Hybrid Automatic Repeat reQuest(IR-HARQ) policy, in pursuit of an energy-efficient way of fulfilling theoutage probability target in the finite-blocklength regime. We start by showingthat the optimization objective and the constraints of the above powerallocation problem all depend upon the outage probability. The main challengethen lies in the fact that the outage probability cannot be writtenanalytically in terms of the power variables. To sidestep this difficulty, wepropose a novel upper bound on the outage probability in the finite-blocklengthregime, which is much tighter than the existing ones from the literature. Mostimportantly, by using this upper bound to approximate the outage probability,we can recast the original intractable power allocation problem into ageometric programming (GP) form--which can be efficiently solved by thestandard method.
这封信涉及增量冗余混合自动重复请求(IR-HARQ)策略下的多轮传输功率分配问题,目的是在有限块长机制下以一种节能的方式实现中断概率目标。我们首先证明,上述功率分配问题的优化目标和约束条件都取决于停电概率。接下来的主要挑战在于,停电概率无法用功率变量来分析。为了避开这一难题,我们提出了一个新的有限块长区间的停电概率上界,它比现有文献中的上界更为严格。最重要的是,通过使用这个上界来近似断电概率,我们可以将原来难以解决的电力分配问题重塑为年龄几何程序设计(GP)形式--这可以通过标准方法高效求解。
{"title":"Power Allocation for Finite-Blocklength IR-HARQ","authors":"Wenyu Wang, Minhao Zhu, Kaiming Shen, Zhaorui Wang, Shuguang Cui","doi":"arxiv-2409.09780","DOIUrl":"https://doi.org/arxiv-2409.09780","url":null,"abstract":"This letter concerns the power allocation across the multiple transmission\u0000rounds under the Incremental Redundancy Hybrid Automatic Repeat reQuest\u0000(IR-HARQ) policy, in pursuit of an energy-efficient way of fulfilling the\u0000outage probability target in the finite-blocklength regime. We start by showing\u0000that the optimization objective and the constraints of the above power\u0000allocation problem all depend upon the outage probability. The main challenge\u0000then lies in the fact that the outage probability cannot be written\u0000analytically in terms of the power variables. To sidestep this difficulty, we\u0000propose a novel upper bound on the outage probability in the finite-blocklength\u0000regime, which is much tighter than the existing ones from the literature. Most\u0000importantly, by using this upper bound to approximate the outage probability,\u0000we can recast the original intractable power allocation problem into a\u0000geometric programming (GP) form--which can be efficiently solved by the\u0000standard method.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Simple Study on the Optimality of Hybrid NOMA 关于混合 NOMA 优化性的简单研究
Pub Date : 2024-09-15 DOI: arxiv-2409.09654
Zhiguo Ding
The key idea of hybrid non-orthogonal multiple access (NOMA) is to allowusers to use the bandwidth resources to which they cannot have access inorthogonal multiple access (OMA) based legacy networks while still guaranteeingits compatibility with the legacy network. However, in a conventional hybridNOMA network, some users have access to more bandwidth resources than others,which leads to a potential performance loss. So what if the users can accessthe same amount of bandwidth resources? This letter focuses on a simpletwo-user scenario, and develops analytical and simulation results to revealthat for this considered scenario, conventional hybrid NOMA is still an optimaltransmission strategy.
混合非正交多址接入(NOMA)的主要理念是允许用户使用在基于正交多址接入(OMA)的传统网络中无法访问的带宽资源,同时保证与传统网络的兼容性。然而,在传统的混合 NOMA 网络中,一些用户比其他用户能访问更多的带宽资源,这可能会导致性能损失。那么,如果用户可以访问相同数量的带宽资源呢?这封信重点讨论了一个简单的双用户场景,并通过分析和仿真结果揭示了在这种场景下,传统的混合 NOMA 仍然是一种最佳传输策略。
{"title":"A Simple Study on the Optimality of Hybrid NOMA","authors":"Zhiguo Ding","doi":"arxiv-2409.09654","DOIUrl":"https://doi.org/arxiv-2409.09654","url":null,"abstract":"The key idea of hybrid non-orthogonal multiple access (NOMA) is to allow\u0000users to use the bandwidth resources to which they cannot have access in\u0000orthogonal multiple access (OMA) based legacy networks while still guaranteeing\u0000its compatibility with the legacy network. However, in a conventional hybrid\u0000NOMA network, some users have access to more bandwidth resources than others,\u0000which leads to a potential performance loss. So what if the users can access\u0000the same amount of bandwidth resources? This letter focuses on a simple\u0000two-user scenario, and develops analytical and simulation results to reveal\u0000that for this considered scenario, conventional hybrid NOMA is still an optimal\u0000transmission strategy.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"207 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative Semantic Communication via Textual Prompts: Latency Performance Tradeoffs 通过文本提示进行生成式语义交流:延迟性能权衡
Pub Date : 2024-09-15 DOI: arxiv-2409.09715
Mengmeng Ren, Li Qiao, Long Yang, Zhen Gao, Jian Chen, Mahdi Boloursaz Mashhadi, Pei Xiao, Rahim Tafazolli, Mehdi Bennis
This paper develops an edge-device collaborative Generative SemanticCommunications (Gen SemCom) framework leveraging pre-trained Multi-modal/VisionLanguage Models (M/VLMs) for ultra-low-rate semantic communication via textualprompts. The proposed framework optimizes the use of M/VLMs on the wirelessedge/device to generate high-fidelity textual prompts through visualcaptioning/question answering, which are then transmitted over a wirelesschannel for SemCom. Specifically, we develop a multi-user Gen SemCom frameworkusing pre-trained M/VLMs, and formulate a joint optimization problem of promptgeneration offloading, communication and computation resource allocation tominimize the latency and maximize the resulting semantic quality. Due to thenonconvex nature of the problem with highly coupled discrete and continuousvariables, we decompose it as a two-level problem and propose a low-complexityswap/leaving/joining (SLJ)-based matching algorithm. Simulation resultsdemonstrate significant performance improvements over the conventionalsemanticunaware/non-collaborative offloading benchmarks.
本文利用预先训练好的多模态/视觉语言模型(M/VLMs)开发了一种边缘设备协作式生成语义通信(Gen SemCom)框架,通过文本提示进行超低速语义通信。所提出的框架优化了无线边缘/设备上 M/VLM 的使用,通过可视化字幕/问题解答生成高保真文本提示,然后通过无线信道传输用于 SemCom。具体来说,我们利用预先训练好的 M/VLM 开发了一个多用户 Gen SemCom 框架,并提出了一个提示生成卸载、通信和计算资源分配的联合优化问题,以最小化延迟并最大化语义质量。由于该问题具有离散变量和连续变量高度耦合的非凸性质,我们将其分解为一个两级问题,并提出了一种基于低复杂度交换/离开/连接(SLJ)的匹配算法。仿真结果表明,与传统的语义未感知/非协作卸载基准相比,该算法的性能有了显著提高。
{"title":"Generative Semantic Communication via Textual Prompts: Latency Performance Tradeoffs","authors":"Mengmeng Ren, Li Qiao, Long Yang, Zhen Gao, Jian Chen, Mahdi Boloursaz Mashhadi, Pei Xiao, Rahim Tafazolli, Mehdi Bennis","doi":"arxiv-2409.09715","DOIUrl":"https://doi.org/arxiv-2409.09715","url":null,"abstract":"This paper develops an edge-device collaborative Generative Semantic\u0000Communications (Gen SemCom) framework leveraging pre-trained Multi-modal/Vision\u0000Language Models (M/VLMs) for ultra-low-rate semantic communication via textual\u0000prompts. The proposed framework optimizes the use of M/VLMs on the wireless\u0000edge/device to generate high-fidelity textual prompts through visual\u0000captioning/question answering, which are then transmitted over a wireless\u0000channel for SemCom. Specifically, we develop a multi-user Gen SemCom framework\u0000using pre-trained M/VLMs, and formulate a joint optimization problem of prompt\u0000generation offloading, communication and computation resource allocation to\u0000minimize the latency and maximize the resulting semantic quality. Due to the\u0000nonconvex nature of the problem with highly coupled discrete and continuous\u0000variables, we decompose it as a two-level problem and propose a low-complexity\u0000swap/leaving/joining (SLJ)-based matching algorithm. Simulation results\u0000demonstrate significant performance improvements over the conventional\u0000semanticunaware/non-collaborative offloading benchmarks.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inter Observer Variability Assessment through Ordered Weighted Belief Divergence Measure in MAGDM Application to the Ensemble Classifier Feature Fusion 通过 MAGDM 中的有序加权信念发散度量评估观察者之间的变异性 将其应用于集合分类器特征融合
Pub Date : 2024-09-13 DOI: arxiv-2409.08450
Pragya GuptaDepartment of Mathematics Indian Institute of Technology Kharagpur, Debjani ChakrabortyDepartment of Mathematics Indian Institute of Technology Kharagpur, Debashree GuhaSchool of Medical Science and Technology Indian Institute of Technology Kharagpur
A large number of multi-attribute group decisionmaking (MAGDM) have beenwidely introduced to obtain consensus results. However, most of themethodologies ignore the conflict among the experts opinions and only considerequal or variable priorities of them. Therefore, this study aims to propose anEvidential MAGDM method by assessing the inter-observational variability andhandling uncertainty that emerges between the experts. The proposed frameworkhas fourfold contributions. First, the basic probability assignment (BPA)generation method is introduced to consider the inherent characteristics ofeach alternative by computing the degree of belief. Second, the orderedweighted belief and plausibility measure is constructed to capture the overallintrinsic information of the alternative by assessing the inter-observationalvariability and addressing the conflicts emerging between the group of experts.An ordered weighted belief divergence measure is constructed to acquire theweighted support for each group of experts to obtain the final preferencerelationship. Finally, we have shown an illustrative example of the proposedEvidential MAGDM framework. Further, we have analyzed the interpretation ofEvidential MAGDM in the real-world application for ensemble classifier featurefusion to diagnose retinal disorders using optical coherence tomography images.
为了获得协商一致的结果,人们广泛采用了大量多属性群体决策(MAGDM)方法。然而,大多数方法都忽略了专家意见之间的冲突,只考虑了专家的同等或不同优先级。因此,本研究旨在通过评估专家间的观测变异性和处理专家间出现的不确定性,提出一种可靠的 MAGDM 方法。所提出的框架有四个方面的贡献。首先,引入了基本概率分配(BPA)生成方法,通过计算信念度来考虑每个备选方案的固有特征。其次,构建了有序加权信念和可信度度量,通过评估观察间的可变性来捕捉替代方案的整体内在信息,并解决专家小组之间出现的冲突。最后,我们举例说明了所提出的保密 MAGDM 框架。此外,我们还分析了 Evidential MAGDM 在实际应用中的解释,即利用光学相干断层扫描图像诊断视网膜疾病的集合分类器特征融合。
{"title":"Inter Observer Variability Assessment through Ordered Weighted Belief Divergence Measure in MAGDM Application to the Ensemble Classifier Feature Fusion","authors":"Pragya GuptaDepartment of Mathematics Indian Institute of Technology Kharagpur, Debjani ChakrabortyDepartment of Mathematics Indian Institute of Technology Kharagpur, Debashree GuhaSchool of Medical Science and Technology Indian Institute of Technology Kharagpur","doi":"arxiv-2409.08450","DOIUrl":"https://doi.org/arxiv-2409.08450","url":null,"abstract":"A large number of multi-attribute group decisionmaking (MAGDM) have been\u0000widely introduced to obtain consensus results. However, most of the\u0000methodologies ignore the conflict among the experts opinions and only consider\u0000equal or variable priorities of them. Therefore, this study aims to propose an\u0000Evidential MAGDM method by assessing the inter-observational variability and\u0000handling uncertainty that emerges between the experts. The proposed framework\u0000has fourfold contributions. First, the basic probability assignment (BPA)\u0000generation method is introduced to consider the inherent characteristics of\u0000each alternative by computing the degree of belief. Second, the ordered\u0000weighted belief and plausibility measure is constructed to capture the overall\u0000intrinsic information of the alternative by assessing the inter-observational\u0000variability and addressing the conflicts emerging between the group of experts.\u0000An ordered weighted belief divergence measure is constructed to acquire the\u0000weighted support for each group of experts to obtain the final preference\u0000relationship. Finally, we have shown an illustrative example of the proposed\u0000Evidential MAGDM framework. Further, we have analyzed the interpretation of\u0000Evidential MAGDM in the real-world application for ensemble classifier feature\u0000fusion to diagnose retinal disorders using optical coherence tomography images.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Short Codes for Fading Channels with No or Receiver-Only Channel State Information 学习无信道状态信息或仅有接收器信道状态信息的衰减信道短码
Pub Date : 2024-09-13 DOI: arxiv-2409.08581
Rishabh Sharad Pomaje, Rajshekhar V Bhat
In next-generation wireless networks, low latency often necessitatesshort-length codewords that either do not use channel state information (CSI)or rely solely on CSI at the receiver (CSIR). Gaussian codes that achievecapacity for AWGN channels may be unsuitable for these no-CSI and CSIR-onlycases. In this work, we design short-length codewords for these cases using anautoencoder architecture. From the designed codes, we observe the following: Inthe no-CSI case, the learned codes are mutually orthogonal when thedistribution of the real and imaginary parts of the fading random variable hassupport over the entire real line. However, when the support is limited to thenon-negative real line, the codes are not mutually orthogonal. For theCSIR-only case, deep learning-based codes designed for AWGN channels performworse in fading channels with optimal coherent detection compared to codesspecifically designed for fading channels with CSIR, where the autoencoderjointly learns encoding, coherent combining, and decoding. In both no-CSI andCSIR-only cases, the codes perform at least as well as or better than classicalcodes of the same block length.
在下一代无线网络中,低延迟通常需要短长度的码字,这些码字要么不使用信道状态信息(CSI),要么仅依赖接收器上的 CSI(CSIR)。可实现 AWGN 信道容量的高斯编码可能不适合这些无 CSI 和仅依赖 CSIR 的情况。在这项工作中,我们使用自动编码器架构为这些情况设计了短码。从所设计的编码中,我们观察到以下几点:在无 CSI 情况下,当衰减随机变量的实部和虚部的分布在整个实线上都有支持时,学习到的编码是相互正交的。但是,当支持范围仅限于非负实线时,编码就不是相互正交的了。在仅有 CSIR 的情况下,为 AWGN 信道设计的基于深度学习的编码与专门为有 CSIR 的衰落信道设计的编码相比,在具有最佳相干检测的衰落信道中表现更差,在后者中,自动编码器联合学习编码、相干组合和解码。在无 CSI 和仅有 CSIR 的情况下,这些编码的性能至少与相同块长度的经典编码相当,甚至更好。
{"title":"Learning Short Codes for Fading Channels with No or Receiver-Only Channel State Information","authors":"Rishabh Sharad Pomaje, Rajshekhar V Bhat","doi":"arxiv-2409.08581","DOIUrl":"https://doi.org/arxiv-2409.08581","url":null,"abstract":"In next-generation wireless networks, low latency often necessitates\u0000short-length codewords that either do not use channel state information (CSI)\u0000or rely solely on CSI at the receiver (CSIR). Gaussian codes that achieve\u0000capacity for AWGN channels may be unsuitable for these no-CSI and CSIR-only\u0000cases. In this work, we design short-length codewords for these cases using an\u0000autoencoder architecture. From the designed codes, we observe the following: In\u0000the no-CSI case, the learned codes are mutually orthogonal when the\u0000distribution of the real and imaginary parts of the fading random variable has\u0000support over the entire real line. However, when the support is limited to the\u0000non-negative real line, the codes are not mutually orthogonal. For the\u0000CSIR-only case, deep learning-based codes designed for AWGN channels perform\u0000worse in fading channels with optimal coherent detection compared to codes\u0000specifically designed for fading channels with CSIR, where the autoencoder\u0000jointly learns encoding, coherent combining, and decoding. In both no-CSI and\u0000CSIR-only cases, the codes perform at least as well as or better than classical\u0000codes of the same block length.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Offloading in NOMA-Aided Aerial MEC Systems Based on Deep Reinforcement Learning 基于深度强化学习的 NOMA 辅助空中 MEC 系统中的安全卸载
Pub Date : 2024-09-13 DOI: arxiv-2409.08579
Hongjiang Lei, Mingxu Yang, Ki-Hong Park, Gaofeng Pan
Mobile edge computing (MEC) technology can reduce user latency and energyconsumption by offloading computationally intensive tasks to the edge servers.Unmanned aerial vehicles (UAVs) and non-orthogonal multiple access (NOMA)technology enable the MEC networks to provide offloaded computing services formassively accessed terrestrial users conveniently. However, the broadcastnature of signal propagation in NOMA-based UAV-MEC networks makes it vulnerableto eavesdropping by malicious eavesdroppers. In this work, a secure offloadscheme is proposed for NOMA-based UAV-MEC systems with the existence of anaerial eavesdropper. The long-term average network computational cost isminimized by jointly designing the UAV's trajectory, the terrestrial users'transmit power, and computational frequency while ensuring the security ofusers' offloaded data. Due to the eavesdropper's location uncertainty, theworst-case security scenario is considered through the estimated eavesdroppingrange. Due to the high-dimensional continuous action space, the deepdeterministic policy gradient algorithm is utilized to solve the non-convexoptimization problem. Simulation results validate the effectiveness of theproposed scheme.
移动边缘计算(MEC)技术可以通过将计算密集型任务卸载到边缘服务器来减少用户延迟和能耗。无人机(UAV)和非正交多址(NOMA)技术使MEC网络能够方便地为大规模接入的地面用户提供卸载计算服务。然而,基于 NOMA 的无人机-MEC 网络中信号传播的广播特性使其容易被恶意窃听者窃听。本研究提出了一种基于 NOMA 的无人机-MEC 系统的安全卸载方案。通过联合设计无人机的轨迹、地面用户的发射功率和计算频率,最大限度地降低了长期平均网络计算成本,同时确保了用户卸载数据的安全性。由于窃听者位置的不确定性,通过估计窃听范围来考虑最坏情况下的安全场景。由于存在高维连续行动空间,因此利用深度确定性策略梯度算法来解决非凸优化问题。仿真结果验证了所提方案的有效性。
{"title":"Secure Offloading in NOMA-Aided Aerial MEC Systems Based on Deep Reinforcement Learning","authors":"Hongjiang Lei, Mingxu Yang, Ki-Hong Park, Gaofeng Pan","doi":"arxiv-2409.08579","DOIUrl":"https://doi.org/arxiv-2409.08579","url":null,"abstract":"Mobile edge computing (MEC) technology can reduce user latency and energy\u0000consumption by offloading computationally intensive tasks to the edge servers.\u0000Unmanned aerial vehicles (UAVs) and non-orthogonal multiple access (NOMA)\u0000technology enable the MEC networks to provide offloaded computing services for\u0000massively accessed terrestrial users conveniently. However, the broadcast\u0000nature of signal propagation in NOMA-based UAV-MEC networks makes it vulnerable\u0000to eavesdropping by malicious eavesdroppers. In this work, a secure offload\u0000scheme is proposed for NOMA-based UAV-MEC systems with the existence of an\u0000aerial eavesdropper. The long-term average network computational cost is\u0000minimized by jointly designing the UAV's trajectory, the terrestrial users'\u0000transmit power, and computational frequency while ensuring the security of\u0000users' offloaded data. Due to the eavesdropper's location uncertainty, the\u0000worst-case security scenario is considered through the estimated eavesdropping\u0000range. Due to the high-dimensional continuous action space, the deep\u0000deterministic policy gradient algorithm is utilized to solve the non-convex\u0000optimization problem. Simulation results validate the effectiveness of the\u0000proposed scheme.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning-based Codes for Wiretap Fading Channels 基于深度学习的窃听消隐信道编码
Pub Date : 2024-09-13 DOI: arxiv-2409.08786
Daniel Seifert, Onur Günlü, Rafael F. Schaefer
The wiretap channel is a well-studied problem in the physical layer security(PLS) literature. Although it is proven that the decoding error probability andinformation leakage can be made arbitrarily small in the asymptotic regime,further research on finite-blocklength codes is required on the path towardspractical, secure communications systems. This work provides the firstexperimental characterization of a deep learning-based, finite-blocklength codeconstruction for multi-tap fading wiretap channels without channel stateinformation (CSI). In addition to the evaluation of the average probability oferror and information leakage, we illustrate the influence of (i) the number offading taps, (ii) differing variances of the fading coefficients and (iii) theseed selection for the hash function-based security layer.
窃听信道是物理层安全(PLS)文献中研究得很透彻的一个问题。虽然事实证明,在渐近机制下,解码错误概率和信息泄漏可以变得任意小,但在通往实用安全通信系统的道路上,还需要进一步研究有限块长编码。本研究首次针对无信道状态信息(CSI)的多抽头衰落有线抽头信道,对基于深度学习的有限块长编码构造进行了实验描述。除了评估错误和信息泄漏的平均概率外,我们还说明了以下因素的影响:(i) 衰减抽头的数量;(ii) 衰减系数的不同方差;(iii) 基于哈希函数的安全层的选择。
{"title":"Deep Learning-based Codes for Wiretap Fading Channels","authors":"Daniel Seifert, Onur Günlü, Rafael F. Schaefer","doi":"arxiv-2409.08786","DOIUrl":"https://doi.org/arxiv-2409.08786","url":null,"abstract":"The wiretap channel is a well-studied problem in the physical layer security\u0000(PLS) literature. Although it is proven that the decoding error probability and\u0000information leakage can be made arbitrarily small in the asymptotic regime,\u0000further research on finite-blocklength codes is required on the path towards\u0000practical, secure communications systems. This work provides the first\u0000experimental characterization of a deep learning-based, finite-blocklength code\u0000construction for multi-tap fading wiretap channels without channel state\u0000information (CSI). In addition to the evaluation of the average probability of\u0000error and information leakage, we illustrate the influence of (i) the number of\u0000fading taps, (ii) differing variances of the fading coefficients and (iii) the\u0000seed selection for the hash function-based security layer.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized Nearest Neighbor Decoding: General Input Constellation and a Case Study of Interference Suppression 广义近邻解码:通用输入星座和干扰抑制案例研究
Pub Date : 2024-09-13 DOI: arxiv-2409.08826
Shuqin Pang, Wenyi Zhang
In this work, generalized nearest neighbor decoding (GNND), a recentlyproposed receiver architecture, is studied for channels under general inputconstellations, and multiuser uplink interference suppression is employed as acase study for demonstrating its potential. In essence, GNND generalizes thewellknown nearest neighbor decoding, by introducing a symbol-level memorylessprocessing step, which can be rendered seamlessly compatible with Gaussianchannel-based decoders. First, criteria of the optimal GNND are derived forgeneral input constellations, expressed in the form of conditional momentsmatching, thereby generalizing the prior work which has been confined toGaussian input. Then, the optimal GNND is applied to the use case of multiuseruplink, for which the optimal GNND is shown to be capable of achievinginformation rates nearly identical to the channel mutual information. Bycontrast, the commonly used channel linearization (CL) approach incurs anoticeable rate loss. A coded modulation scheme is subsequently developed,aiming at implementing GNND using off-the-shelf channel codes, withoutrequiring iterative message passing between demodulator and decoder. Throughnumerical experiments it is validated that the developed scheme significantlyoutperforms the CL-based scheme.
本研究针对一般输入构型下的信道,研究了最近提出的广义近邻解码(GNND)接收器架构,并将多用户上行链路干扰抑制作为案例研究,以展示其潜力。从本质上讲,GNND 通过引入符号级无记忆处理步骤,推广了众所周知的近邻解码,可与基于高斯信道的解码器无缝兼容。首先,最优 GNND 的标准是针对一般输入星座得出的,以条件矩匹配的形式表示,从而推广了之前仅限于高斯输入的工作。然后,将最优 GNND 应用于多用户上行链路的使用情况,结果表明最优 GNND 能够实现与信道互信息几乎相同的信息速率。相比之下,常用的信道线性化(CL)方法会产生明显的速率损失。随后开发了一种编码调制方案,旨在利用现成的信道编码实现 GNND,而无需在解调器和解码器之间进行迭代信息传递。通过数值实验,验证了所开发的方案明显优于基于信道编码的方案。
{"title":"Generalized Nearest Neighbor Decoding: General Input Constellation and a Case Study of Interference Suppression","authors":"Shuqin Pang, Wenyi Zhang","doi":"arxiv-2409.08826","DOIUrl":"https://doi.org/arxiv-2409.08826","url":null,"abstract":"In this work, generalized nearest neighbor decoding (GNND), a recently\u0000proposed receiver architecture, is studied for channels under general input\u0000constellations, and multiuser uplink interference suppression is employed as a\u0000case study for demonstrating its potential. In essence, GNND generalizes the\u0000wellknown nearest neighbor decoding, by introducing a symbol-level memoryless\u0000processing step, which can be rendered seamlessly compatible with Gaussian\u0000channel-based decoders. First, criteria of the optimal GNND are derived for\u0000general input constellations, expressed in the form of conditional moments\u0000matching, thereby generalizing the prior work which has been confined to\u0000Gaussian input. Then, the optimal GNND is applied to the use case of multiuser\u0000uplink, for which the optimal GNND is shown to be capable of achieving\u0000information rates nearly identical to the channel mutual information. By\u0000contrast, the commonly used channel linearization (CL) approach incurs a\u0000noticeable rate loss. A coded modulation scheme is subsequently developed,\u0000aiming at implementing GNND using off-the-shelf channel codes, without\u0000requiring iterative message passing between demodulator and decoder. Through\u0000numerical experiments it is validated that the developed scheme significantly\u0000outperforms the CL-based scheme.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - MATH - Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1