首页 > 最新文献

arXiv - CS - Information Theory最新文献

英文 中文
RDARS Empowered Massive MIMO System: Two-Timescale Transceiver Design with Imperfect CSI RDARS 增强型大规模多输入多输出系统:具有不完美 CSI 的两倍级收发器设计
Pub Date : 2023-12-14 DOI: arxiv-2312.08753
Chengzhi Ma, Jintao Wang, Xi Yang, Guanghua Yang, Wei Zhang, Shaodan Ma
In this paper, we investigate a novel reconfigurable distributed antennas andreflecting surface (RDARS) aided multi-user massive MIMO system with imperfectCSI and propose a practical two-timescale (TTS) transceiver design to reducethe communication overhead and computational complexity of the system. In theRDARS-aided system, not only distribution gain but also reflection gain can beobtained by a flexible combination of the distributed antennas and reflectingsurface, which differentiates the system from the others and also makes the TTSdesign challenging. To enable the optimal TTS transceiver design, theachievable rate of the system is first derived in closed-form. Then the TTSdesign aiming at the weighted sum rate maximization is considered. To solve thechallenging non-convex optimization problem with high-order design variables,i.e., the transmit powers and the phase shifts at the RDARS, a block coordinatedescent based method is proposed to find the optimal solutions in semi-closedforms iteratively. Specifically, two efficient algorithms are proposed withprovable convergence for the optimal phase shift design, i.e., RiemannianGradient Ascent based algorithm by exploiting the unit-modulus constraints, andTwo-Tier Majorization-Minimization based algorithm with closed-form optimalsolutions in each iteration. Simulation results validate the effectiveness ofthe proposed algorithm and demonstrate the superiority of deploying RDARS inmassive MIMO systems to provide substantial rate improvement with asignificantly reduced total number of active antennas/RF chains and lowertransmit power when compared to the DAS and RIS-aided systems.
本文研究了一种新型的可重构分布式天线和反射面(RDARS)辅助多用户大规模多输入输出(MIMO)系统,并提出了一种实用的双时标(TTS)收发器设计,以降低系统的通信开销和计算复杂度。在 RDARS 辅助系统中,不仅可以通过分布式天线和反射面的灵活组合获得分布增益,还可以获得反射增益。为了实现最佳的 TTS 收发器设计,首先以闭合形式推导出系统的可实现速率。然后考虑以加权总速率最大化为目标的 TTS 设计。为了解决具有高阶设计变量(即 RDARS 的发射功率和相移)的非凸优化问题,提出了一种基于块协调cent 的方法,以迭代方式在半封闭形式中找到最优解。具体地说,针对最佳相移设计提出了两种具有可收敛性的高效算法,即利用单位模数约束的基于黎曼梯度上升的算法,以及在每次迭代中都有闭式最优解的基于两层大化-最小化的算法。仿真结果验证了所提算法的有效性,并证明了在大容量多输入多输出系统中部署 RDARS 的优越性,与 DAS 和 RIS 辅助系统相比,RDARS 在大幅减少有源天线/射频链总数和降低发射功率的同时,还能大幅提高传输速率。
{"title":"RDARS Empowered Massive MIMO System: Two-Timescale Transceiver Design with Imperfect CSI","authors":"Chengzhi Ma, Jintao Wang, Xi Yang, Guanghua Yang, Wei Zhang, Shaodan Ma","doi":"arxiv-2312.08753","DOIUrl":"https://doi.org/arxiv-2312.08753","url":null,"abstract":"In this paper, we investigate a novel reconfigurable distributed antennas and\u0000reflecting surface (RDARS) aided multi-user massive MIMO system with imperfect\u0000CSI and propose a practical two-timescale (TTS) transceiver design to reduce\u0000the communication overhead and computational complexity of the system. In the\u0000RDARS-aided system, not only distribution gain but also reflection gain can be\u0000obtained by a flexible combination of the distributed antennas and reflecting\u0000surface, which differentiates the system from the others and also makes the TTS\u0000design challenging. To enable the optimal TTS transceiver design, the\u0000achievable rate of the system is first derived in closed-form. Then the TTS\u0000design aiming at the weighted sum rate maximization is considered. To solve the\u0000challenging non-convex optimization problem with high-order design variables,\u0000i.e., the transmit powers and the phase shifts at the RDARS, a block coordinate\u0000descent based method is proposed to find the optimal solutions in semi-closed\u0000forms iteratively. Specifically, two efficient algorithms are proposed with\u0000provable convergence for the optimal phase shift design, i.e., Riemannian\u0000Gradient Ascent based algorithm by exploiting the unit-modulus constraints, and\u0000Two-Tier Majorization-Minimization based algorithm with closed-form optimal\u0000solutions in each iteration. Simulation results validate the effectiveness of\u0000the proposed algorithm and demonstrate the superiority of deploying RDARS in\u0000massive MIMO systems to provide substantial rate improvement with a\u0000significantly reduced total number of active antennas/RF chains and lower\u0000transmit power when compared to the DAS and RIS-aided systems.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138693177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Active Attacks in Over-the-Air Computation using Dummy Samples 使用假样本检测空中计算中的主动攻击
Pub Date : 2023-12-14 DOI: arxiv-2312.08950
David Nordlund, Zheng Chen, Erik G. Larsson
Over-the-Air (OtA) computation is a newly emerged concept for computingfunctions of data from distributed nodes by taking advantage of the wavesuperposition property of wireless channels. Despite its advantage incommunication efficiency, OtA computation is associated with significantsecurity and privacy concerns that have so far not been thoroughlyinvestigated, especially in the case of active attacks. In this paper, wepropose and evaluate a detection scheme against active attacks in OtAcomputation systems. More explicitly, we consider an active attacker which isan external node sending random or misleading data to alter the aggregated datareceived by the server. To detect the presence of the attacker, in everycommunication period, legitimate users send some dummy samples in addition tothe real data. We propose a detector design that relies on the existence of ashared secret only known by the legitimate users and the server, that can beused to hide the transmitted signal in a secret subspace. After the serverprojects the received vector back to the original subspace, the dummy samplescan be used to detect active attacks. We show that this design achieves gooddetection performance for a small cost in terms of channel resources.
空中计算(OtA)是一个新出现的概念,它利用无线信道的波叠加特性,计算分布式节点的数据函数。尽管空中计算在通信效率方面具有优势,但它在安全和隐私方面却存在重大隐患,迄今为止尚未对其进行深入研究,尤其是在主动攻击的情况下。在本文中,我们提出并评估了一种针对 OtA 计算系统中主动攻击的检测方案。更明确地说,我们认为主动攻击者是一个外部节点,它发送随机或误导数据来改变服务器接收到的聚合数据。为了检测攻击者的存在,在每次通信期间,合法用户都会在真实数据之外发送一些虚假样本。我们提出了一种检测器设计,它依赖于只有合法用户和服务器知道的共享秘密的存在,该秘密可用于将传输信号隐藏在秘密子空间中。服务器将接收到的矢量投影回原始子空间后,假样本就可以用来检测主动攻击。我们的研究表明,这种设计以较小的信道资源成本实现了良好的检测性能。
{"title":"Detecting Active Attacks in Over-the-Air Computation using Dummy Samples","authors":"David Nordlund, Zheng Chen, Erik G. Larsson","doi":"arxiv-2312.08950","DOIUrl":"https://doi.org/arxiv-2312.08950","url":null,"abstract":"Over-the-Air (OtA) computation is a newly emerged concept for computing\u0000functions of data from distributed nodes by taking advantage of the wave\u0000superposition property of wireless channels. Despite its advantage in\u0000communication efficiency, OtA computation is associated with significant\u0000security and privacy concerns that have so far not been thoroughly\u0000investigated, especially in the case of active attacks. In this paper, we\u0000propose and evaluate a detection scheme against active attacks in OtA\u0000computation systems. More explicitly, we consider an active attacker which is\u0000an external node sending random or misleading data to alter the aggregated data\u0000received by the server. To detect the presence of the attacker, in every\u0000communication period, legitimate users send some dummy samples in addition to\u0000the real data. We propose a detector design that relies on the existence of a\u0000shared secret only known by the legitimate users and the server, that can be\u0000used to hide the transmitted signal in a secret subspace. After the server\u0000projects the received vector back to the original subspace, the dummy samples\u0000can be used to detect active attacks. We show that this design achieves good\u0000detection performance for a small cost in terms of channel resources.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138689189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantics-Division Duplexing: A Novel Full-Duplex Paradigm 语义分割双工:新颖的全双工范例
Pub Date : 2023-12-14 DOI: arxiv-2312.08862
Kai Niu, Zijian Liang, Chao Dong, Jincheng Dai, Zhongwei Si, Ping Zhang
In-band full-duplex (IBFD) is a theoretically effective solution to increasethe overall throughput for the future wireless communications system byenabling transmission and reception over the same time-frequency resources.However, reliable source reconstruction remains a great challenge in thepractical IBFD systems due to the non-ideal elimination of theself-interference and the inherent limitations of the separate source andchannel coding methods. On the other hand, artificial intelligence-enabledsemantic communication can provide a viable direction for the optimization ofthe IBFD system. This article introduces a novel IBFD paradigm with theguidance of semantic communication called semantics-division duplexing (SDD).It utilizes semantic domain processing to further suppress self-interference,distinguish the expected semantic information, and recover the desired sources.Further integration of the digital and semantic domain processing can beimplemented so as to achieve intelligent and concise communications. We presentthe advantages of the SDD paradigm with theoretical explanations and providesome visualized results to verify its effectiveness.
理论上,带内全双工(IBFD)是提高未来无线通信系统总体吞吐量的有效解决方案,它可以在相同的时频资源上进行传输和接收。然而,由于无法理想地消除自干扰以及独立信源和信道编码方法的固有局限性,可靠的信源重构在实际的 IBFD 系统中仍然是一个巨大的挑战。另一方面,人工智能支持的语义通信可以为 IBFD 系统的优化提供一个可行的方向。本文介绍了一种以语义通信为指导的新型 IBFD 范式--语义分割双工(SDD),它利用语义域处理进一步抑制自干扰、区分预期的语义信息并恢复所需的信源。我们通过理论解释介绍了 SDD 范式的优势,并提供了一些可视化结果来验证其有效性。
{"title":"Semantics-Division Duplexing: A Novel Full-Duplex Paradigm","authors":"Kai Niu, Zijian Liang, Chao Dong, Jincheng Dai, Zhongwei Si, Ping Zhang","doi":"arxiv-2312.08862","DOIUrl":"https://doi.org/arxiv-2312.08862","url":null,"abstract":"In-band full-duplex (IBFD) is a theoretically effective solution to increase\u0000the overall throughput for the future wireless communications system by\u0000enabling transmission and reception over the same time-frequency resources.\u0000However, reliable source reconstruction remains a great challenge in the\u0000practical IBFD systems due to the non-ideal elimination of the\u0000self-interference and the inherent limitations of the separate source and\u0000channel coding methods. On the other hand, artificial intelligence-enabled\u0000semantic communication can provide a viable direction for the optimization of\u0000the IBFD system. This article introduces a novel IBFD paradigm with the\u0000guidance of semantic communication called semantics-division duplexing (SDD).\u0000It utilizes semantic domain processing to further suppress self-interference,\u0000distinguish the expected semantic information, and recover the desired sources.\u0000Further integration of the digital and semantic domain processing can be\u0000implemented so as to achieve intelligent and concise communications. We present\u0000the advantages of the SDD paradigm with theoretical explanations and provide\u0000some visualized results to verify its effectiveness.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138689191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Uplink and Downlink EMF Exposure and Coverage in Dense Cellular Networks: A Stochastic Geometry Approach 论密集蜂窝网络中的上行和下行电磁场暴露与覆盖:随机几何方法
Pub Date : 2023-12-14 DOI: arxiv-2312.08978
Quentin Gontier, Charles Wiame, Joe Wiart, François Horlin, Christo Tsigros, Claude Oestges, Philippe De Doncker
Existing studies analyzing electromagnetic field (EMF) exposure in wirelessnetworks have primarily considered downlink (DL) communications. In the uplink(UL), the EMF exposure caused by the user's smartphone is usually the onlyconsidered source of radiation, thereby ignoring contributions caused by otheractive neighboring devices. In addition, the network coverage and EMF exposureare typically analyzed independently for both the UL and DL, while a jointanalysis would be necessary to fully understand the network performance. Thispaper aims at bridging the resulting gaps by presenting a comprehensivestochastic geometry framework including the above aspects. The proposedtopology features base stations (BS) modeled via a homogeneous Poisson pointprocess as well as a user process of type II (with users uniformly distributedin the Voronoi cell of each BS). In addition to the UL to DL exposure ratio, wederive joint probability metrics considering the UL and DL coverage and EMFexposure. These metrics are evaluated in two scenarios considering BS and/oruser densifications. Our numerical results highlight the existence of optimalnode densities maximizing these joint probabilities.
现有的无线网络电磁场(EMF)暴露分析研究主要考虑的是下行链路(DL)通信。在上行链路(UL)中,用户的智能手机造成的电磁场暴露通常是唯一考虑的辐射源,从而忽略了其他邻近设备造成的辐射。此外,网络覆盖和电磁场辐射通常是对上行链路和下行链路进行独立分析,而要想全面了解网络性能,就必须进行联合分析。本文旨在通过提出一个包含上述方面的综合随机几何框架来弥补由此产生的差距。所提出的拓扑结构包括通过同质泊松点过程建模的基站(BS)以及 II 型用户过程(用户均匀分布在每个 BS 的 Voronoi 单元中)。除了 UL 与 DL 暴露比之外,我们还考虑了 UL 和 DL 覆盖范围以及 EMF 暴露的联合概率指标。在考虑到 BS 和/或用户密度的两种情况下对这些指标进行了评估。我们的数值结果表明,存在使这些联合概率最大化的最佳节点密度。
{"title":"On the Uplink and Downlink EMF Exposure and Coverage in Dense Cellular Networks: A Stochastic Geometry Approach","authors":"Quentin Gontier, Charles Wiame, Joe Wiart, François Horlin, Christo Tsigros, Claude Oestges, Philippe De Doncker","doi":"arxiv-2312.08978","DOIUrl":"https://doi.org/arxiv-2312.08978","url":null,"abstract":"Existing studies analyzing electromagnetic field (EMF) exposure in wireless\u0000networks have primarily considered downlink (DL) communications. In the uplink\u0000(UL), the EMF exposure caused by the user's smartphone is usually the only\u0000considered source of radiation, thereby ignoring contributions caused by other\u0000active neighboring devices. In addition, the network coverage and EMF exposure\u0000are typically analyzed independently for both the UL and DL, while a joint\u0000analysis would be necessary to fully understand the network performance. This\u0000paper aims at bridging the resulting gaps by presenting a comprehensive\u0000stochastic geometry framework including the above aspects. The proposed\u0000topology features base stations (BS) modeled via a homogeneous Poisson point\u0000process as well as a user process of type II (with users uniformly distributed\u0000in the Voronoi cell of each BS). In addition to the UL to DL exposure ratio, we\u0000derive joint probability metrics considering the UL and DL coverage and EMF\u0000exposure. These metrics are evaluated in two scenarios considering BS and/or\u0000user densifications. Our numerical results highlight the existence of optimal\u0000node densities maximizing these joint probabilities.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138689187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LLMind: Orchestrating AI and IoT with LLMs for Complex Task Execution LLMind:利用 LLM 协调人工智能和物联网以执行复杂任务
Pub Date : 2023-12-14 DOI: arxiv-2312.09007
Hongwei Cui, Yuyang Du, Qun Yang, Yulin Shao, Soung Chang Liew
In this article, we introduce LLMind, an innovative AI framework thatutilizes large language models (LLMs) as a central orchestrator. The frameworkintegrates LLMs with domain-specific AI modules, enabling IoT devices tocollaborate effectively in executing complex tasks. The LLM performs planningand generates control scripts using a reliable and precise language-codetransformation approach based on finite state machines (FSMs). The LLM engagesin natural conversations with users, employing role-playing techniques togenerate contextually appropriate responses. Additionally, users can interacteasily with the AI agent via a user-friendly social media platform. Theframework also incorporates semantic analysis and response optimizationtechniques to enhance speed and effectiveness. Ultimately, this framework isdesigned not only to innovate IoT device control and enrich user experiencesbut also to foster an intelligent and integrated IoT device ecosystem thatevolves and becomes more sophisticated through continuing user and machineinteractions.
本文介绍的 LLMind 是一种创新型人工智能框架,它利用大型语言模型 (LLM) 作为中心协调器。该框架将 LLM 与特定领域的人工智能模块集成在一起,使物联网设备能够在执行复杂任务时进行有效协作。LLM 使用基于有限状态机(FSM)的可靠而精确的语言代码转换方法执行规划并生成控制脚本。LLM 与用户进行自然对话,采用角色扮演技术生成与上下文相适应的响应。此外,用户还可以通过用户友好型社交媒体平台与人工智能代理轻松互动。该框架还结合了语义分析和响应优化技术,以提高速度和效率。最终,该框架不仅旨在创新物联网设备控制和丰富用户体验,还旨在促进智能集成物联网设备生态系统的发展,并通过持续的用户和机器互动变得更加复杂。
{"title":"LLMind: Orchestrating AI and IoT with LLMs for Complex Task Execution","authors":"Hongwei Cui, Yuyang Du, Qun Yang, Yulin Shao, Soung Chang Liew","doi":"arxiv-2312.09007","DOIUrl":"https://doi.org/arxiv-2312.09007","url":null,"abstract":"In this article, we introduce LLMind, an innovative AI framework that\u0000utilizes large language models (LLMs) as a central orchestrator. The framework\u0000integrates LLMs with domain-specific AI modules, enabling IoT devices to\u0000collaborate effectively in executing complex tasks. The LLM performs planning\u0000and generates control scripts using a reliable and precise language-code\u0000transformation approach based on finite state machines (FSMs). The LLM engages\u0000in natural conversations with users, employing role-playing techniques to\u0000generate contextually appropriate responses. Additionally, users can interact\u0000easily with the AI agent via a user-friendly social media platform. The\u0000framework also incorporates semantic analysis and response optimization\u0000techniques to enhance speed and effectiveness. Ultimately, this framework is\u0000designed not only to innovate IoT device control and enrich user experiences\u0000but also to foster an intelligent and integrated IoT device ecosystem that\u0000evolves and becomes more sophisticated through continuing user and machine\u0000interactions.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138689244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of $(σ,δ)$-cyclic codes over a non-chain ring and their applications in DNA codes 非链环上 $(σ,δ)$ 循环码的构建及其在 DNA 码中的应用
Pub Date : 2023-12-13 DOI: arxiv-2312.08109
Ashutosh Singh, Priyanka Sharma, Om Prakash
For a prime $p$ and a positive integer $m$, let $mathbb{F}_{p^m}$ be thefinite field of characteristic $p$, and$mathfrak{R}_l:=mathbb{F}_{p^m}[v]/langle v^l-vrangle$ be a non-chain ring.In this paper, we study the $(sigma,delta)$-cyclic codes over$mathfrak{R}_l$. Further, we study the application of these codes in findingDNA codes. Towards this, we first define a Gray map to find classical codesover $mathbb{F}_{p^m}$ using codes over the ring $mathfrak{R}_l$. Later, wefind the conditions for a code to be reversible and a DNA code using $(sigma,delta)$-cyclic code. Finally, this algebraic method provides many classicaland DNA codes of better parameters.
对于素数$p$和正整数$m$,设$mathbb{F}_{p^m}$为特征$p$的有限域,$mathfrak{R}_l:=mathbb{F}_{p^m}[v]/langle v^l-vrangle$为非链环。本文研究了$mathfrak{R}_l$上的$(sigma,delta)$ -循环码。进一步,我们研究了这些密码在寻找dna密码中的应用。为此,我们首先定义一个Gray映射,使用环$mathfrak{R}_l$上的代码查找$mathbb{F}_{p^m}$上的经典代码。后来,我们发现了代码可逆和DNA代码使用$(sigma,delta)$ -循环代码的条件。最后,这种代数方法提供了许多具有较好参数的经典和DNA编码。
{"title":"Construction of $(σ,δ)$-cyclic codes over a non-chain ring and their applications in DNA codes","authors":"Ashutosh Singh, Priyanka Sharma, Om Prakash","doi":"arxiv-2312.08109","DOIUrl":"https://doi.org/arxiv-2312.08109","url":null,"abstract":"For a prime $p$ and a positive integer $m$, let $mathbb{F}_{p^m}$ be the\u0000finite field of characteristic $p$, and\u0000$mathfrak{R}_l:=mathbb{F}_{p^m}[v]/langle v^l-vrangle$ be a non-chain ring.\u0000In this paper, we study the $(sigma,delta)$-cyclic codes over\u0000$mathfrak{R}_l$. Further, we study the application of these codes in finding\u0000DNA codes. Towards this, we first define a Gray map to find classical codes\u0000over $mathbb{F}_{p^m}$ using codes over the ring $mathfrak{R}_l$. Later, we\u0000find the conditions for a code to be reversible and a DNA code using $(sigma,\u0000delta)$-cyclic code. Finally, this algebraic method provides many classical\u0000and DNA codes of better parameters.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138628077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The duals of narrow-sense BCH codes with length $frac{q^m-1}λ$ 长度为 $frac{q^m-1}λ$ 的窄义 BCH 码的对偶码
Pub Date : 2023-12-09 DOI: arxiv-2312.05474
Xiaoqiang Wang, Chengliang Xiao, Dabin Zheng
BCH codes are an interesting class of cyclic codes due to their efficientencoding and decoding algorithms. In the past sixty years, a lot of progress onthe study of BCH codes has been made, but little is known about the propertiesof their duals. Recently, in order to study the duals of BCH codes and thelower bounds on their minimum distances, a new concept called dually-BCH codewas proposed by authors in cite{GDL21}. In this paper, the lower bounds on theminimum distances of the duals of narrow-sense BCH codes with length$frac{q^m-1}{lambda}$ over $mathbb{F}_q$ are developed, where $lambda$ is apositive integer satisfying $lambda, |, q-1$, or $lambda=q^s-1$ and $s,|,m$. In addition, the sufficient and necessary conditions in terms of thedesigned distances for these codes being dually-BCH codes are presented. Manyconsidered codes in cite{GDL21} and cite{Wang23} are the special cases of thecodes showed in this paper. Our lower bounds on the minimum distances of the duals of BCH codes includethe bounds stated in cite{GDL21} as a special case. Several examples show thatthe lower bounds are good in some cases.
BCH 码因其高效的编码和解码算法而成为一类有趣的循环码。在过去的六十年中,BCH 码的研究取得了很大进展,但对其对偶码的性质却知之甚少。最近,为了研究 BCH 码的对偶码及其最小距离的下界,作者在《GDL21》中提出了一个新概念--双 BCH 码。本文提出了长度为 $frac{q^m-1}{lambda}$ over $mathbb{F}_q$ 的窄义 BCH 码对偶码的最小距离下界,其中 $lambda$ 是满足 $lambda, |, q-1$ 或 $lambda=q^s-1$ 和 $s,|,m$ 的正整数。此外,还提出了这些编码成为双BCH编码的设计距离的充分条件和必要条件。GDL21}和Wang23}中考虑的许多编码都是本文所展示的编码的特例。我们关于 BCH 码对偶最小距离的下界包括了作为特例的 cite{GDL21}中所述的下界。几个例子表明,在某些情况下下界是不错的。
{"title":"The duals of narrow-sense BCH codes with length $frac{q^m-1}λ$","authors":"Xiaoqiang Wang, Chengliang Xiao, Dabin Zheng","doi":"arxiv-2312.05474","DOIUrl":"https://doi.org/arxiv-2312.05474","url":null,"abstract":"BCH codes are an interesting class of cyclic codes due to their efficient\u0000encoding and decoding algorithms. In the past sixty years, a lot of progress on\u0000the study of BCH codes has been made, but little is known about the properties\u0000of their duals. Recently, in order to study the duals of BCH codes and the\u0000lower bounds on their minimum distances, a new concept called dually-BCH code\u0000was proposed by authors in cite{GDL21}. In this paper, the lower bounds on the\u0000minimum distances of the duals of narrow-sense BCH codes with length\u0000$frac{q^m-1}{lambda}$ over $mathbb{F}_q$ are developed, where $lambda$ is a\u0000positive integer satisfying $lambda, |, q-1$, or $lambda=q^s-1$ and $s,\u0000|,m$. In addition, the sufficient and necessary conditions in terms of the\u0000designed distances for these codes being dually-BCH codes are presented. Many\u0000considered codes in cite{GDL21} and cite{Wang23} are the special cases of the\u0000codes showed in this paper. Our lower bounds on the minimum distances of the duals of BCH codes include\u0000the bounds stated in cite{GDL21} as a special case. Several examples show that\u0000the lower bounds are good in some cases.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138576147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Cell-Free Integrated Sensing and Communication in the Presence of Information and Sensing Eavesdroppers 在存在信息和传感窃听者的情况下实现安全的无蜂窝综合传感与通信
Pub Date : 2023-12-07 DOI: arxiv-2312.04355
Zixiang Ren, Jie Xu, Ling Qiu, Derrick Wing Kwan Ng
This paper studies a secure cell-free integrated sensing and communication(ISAC) system, in which multiple ISAC transmitters collaboratively sendconfidential information to multiple communication users (CUs) and concurrentlyconduct target detection. Different from prior works investigatingcommunication security against potential information eavesdropping, we considerthe security of both communication and sensing in the presence of bothinformation and sensing eavesdroppers that aim to intercept confidentialcommunication information and extract target information, respectively. Towardsthis end, we optimize the joint information and sensing transmit beamforming atthese ISAC transmitters for secure cell-free ISAC. Our objective is to maximizethe detection probability over a designated sensing area while ensuring theminimum signal-to-interference-plus-noise-ratio (SINR) requirements at CUs. Ourformulation also takes into account the maximum tolerable signal-to-noise ratio(SNR) at information eavesdroppers for ensuring the confidentiality ofinformation transmission, and the maximum detection probability constraints atsensing eavesdroppers for preserving sensing privacy. The formulated securejoint transmit beamforming problem is highly non-convex due to the intricateinterplay between the detection probabilities, beamforming vectors, and SINRconstraints. Fortunately, through strategic manipulation and via applying thesemidefinite relaxation (SDR) technique, we successfully obtain the globallyoptimal solution to the design problem by rigorously verifying the tightness ofSDR. Furthermore, we present two alternative joint beamforming designs based onthe sensing SNR maximization over the specific sensing area and the coordinatedbeamforming, respectively. Numerical results reveal the benefits of ourproposed design over these alternative benchmarks.
本文研究了一种安全的无蜂窝综合传感与通信(ISAC)系统,在该系统中,多个 ISAC 发射器协同向多个通信用户(CU)发送机密信息,并同时进行目标检测。与之前研究针对潜在信息窃听的通信安全的工作不同,我们考虑的是在同时存在信息窃听者和传感窃听者的情况下通信和传感的安全性,窃听者的目的分别是截获机密通信信息和提取目标信息。为此,我们优化了这些 ISAC 发射机上的联合信息和传感发射波束成形,以实现安全的无小区 ISAC。我们的目标是最大限度地提高指定感知区域内的探测概率,同时确保 CU 的信噪比(SINR)要求最小。我们的方案还考虑了信息窃听者可容忍的最大信噪比(SNR),以确保信息传输的保密性,以及传感窃听者的最大检测概率限制,以保护传感隐私。由于检测概率、波束成形向量和信噪比约束之间错综复杂的相互作用,所提出的安全联合发射波束成形问题是高度非凸的。幸运的是,通过策略操作和应用半无限松弛(SDR)技术,我们成功地获得了设计问题的全局最优解,严格验证了 SDR 的严密性。此外,我们还提出了两种可供选择的联合波束成形设计,分别基于特定传感区域的传感信噪比最大化和协调波束成形。数值结果表明,我们提出的设计优于这些替代基准。
{"title":"Secure Cell-Free Integrated Sensing and Communication in the Presence of Information and Sensing Eavesdroppers","authors":"Zixiang Ren, Jie Xu, Ling Qiu, Derrick Wing Kwan Ng","doi":"arxiv-2312.04355","DOIUrl":"https://doi.org/arxiv-2312.04355","url":null,"abstract":"This paper studies a secure cell-free integrated sensing and communication\u0000(ISAC) system, in which multiple ISAC transmitters collaboratively send\u0000confidential information to multiple communication users (CUs) and concurrently\u0000conduct target detection. Different from prior works investigating\u0000communication security against potential information eavesdropping, we consider\u0000the security of both communication and sensing in the presence of both\u0000information and sensing eavesdroppers that aim to intercept confidential\u0000communication information and extract target information, respectively. Towards\u0000this end, we optimize the joint information and sensing transmit beamforming at\u0000these ISAC transmitters for secure cell-free ISAC. Our objective is to maximize\u0000the detection probability over a designated sensing area while ensuring the\u0000minimum signal-to-interference-plus-noise-ratio (SINR) requirements at CUs. Our\u0000formulation also takes into account the maximum tolerable signal-to-noise ratio\u0000(SNR) at information eavesdroppers for ensuring the confidentiality of\u0000information transmission, and the maximum detection probability constraints at\u0000sensing eavesdroppers for preserving sensing privacy. The formulated secure\u0000joint transmit beamforming problem is highly non-convex due to the intricate\u0000interplay between the detection probabilities, beamforming vectors, and SINR\u0000constraints. Fortunately, through strategic manipulation and via applying the\u0000semidefinite relaxation (SDR) technique, we successfully obtain the globally\u0000optimal solution to the design problem by rigorously verifying the tightness of\u0000SDR. Furthermore, we present two alternative joint beamforming designs based on\u0000the sensing SNR maximization over the specific sensing area and the coordinated\u0000beamforming, respectively. Numerical results reveal the benefits of our\u0000proposed design over these alternative benchmarks.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138554059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HARQ-IR Aided Short Packet Communications: BLER Analysis and Throughput Maximization HARQ-IR 辅助短分组通信:BLER 分析和吞吐量最大化
Pub Date : 2023-12-07 DOI: arxiv-2312.04377
Fuchao He, Zheng Shi, Guanghua Yang, Xiaofan Li, Xinrong Ye, Shaodan Ma
This paper introduces hybrid automatic repeat request with incrementalredundancy (HARQ-IR) to boost the reliability of short packet communications.The finite blocklength information theory and correlated decoding eventstremendously preclude the analysis of average block error rate (BLER).Fortunately, the recursive form of average BLER motivates us to calculate itsvalue through the trapezoidal approximation and Gauss-Laguerre quadrature.Moreover, the asymptotic analysis is performed to derive a simple expressionfor the average BLER at high signal-to-noise ratio (SNR). Then, we study themaximization of long term average throughput (LTAT) via power allocationmeanwhile ensuring the power and the BLER constraints. For tractability, theasymptotic BLER is employed to solve the problem through geometric programming(GP). However, the GP-based solution underestimates the LTAT at low SNR due toa large approximation error in this case. Alternatively, we also develop a deepreinforcement learning (DRL)-based framework to learn power allocation policy.In particular, the optimization problem is transformed into a constrainedMarkov decision process, which is solved by integrating deep deterministicpolicy gradient (DDPG) with subgradient method. The numerical results finallydemonstrate that the DRL-based method outperforms the GP-based one at low SNR,albeit at the cost of increasing computational burden.
有限块长信息论和相关解码事件极大地阻碍了对平均块误码率(BLER)的分析。幸运的是,平均误码率的递归形式促使我们通过梯形近似和高斯-拉盖尔正交来计算其值。此外,我们还进行了渐近分析,得出了高信噪比(SNR)下平均误码率的简单表达式。然后,我们研究了通过功率分配最大化长期平均吞吐量(LTAT),同时确保功率和 BLER 约束。为了提高可操作性,我们采用了渐近 BLER,通过几何编程(GP)来解决这个问题。然而,由于这种情况下的近似误差较大,基于 GP 的解决方案在低信噪比时会低估 LTAT。另外,我们还开发了一种基于深度强化学习(DRL)的框架来学习功率分配策略,特别是将优化问题转化为受约束马尔可夫决策过程,并通过将深度确定性策略梯度(DDPG)与子梯度法相结合来解决该问题。数值结果最终证明,在低信噪比条件下,基于 DRL 的方法优于基于 GP 的方法,尽管代价是增加了计算负担。
{"title":"HARQ-IR Aided Short Packet Communications: BLER Analysis and Throughput Maximization","authors":"Fuchao He, Zheng Shi, Guanghua Yang, Xiaofan Li, Xinrong Ye, Shaodan Ma","doi":"arxiv-2312.04377","DOIUrl":"https://doi.org/arxiv-2312.04377","url":null,"abstract":"This paper introduces hybrid automatic repeat request with incremental\u0000redundancy (HARQ-IR) to boost the reliability of short packet communications.\u0000The finite blocklength information theory and correlated decoding events\u0000tremendously preclude the analysis of average block error rate (BLER).\u0000Fortunately, the recursive form of average BLER motivates us to calculate its\u0000value through the trapezoidal approximation and Gauss-Laguerre quadrature.\u0000Moreover, the asymptotic analysis is performed to derive a simple expression\u0000for the average BLER at high signal-to-noise ratio (SNR). Then, we study the\u0000maximization of long term average throughput (LTAT) via power allocation\u0000meanwhile ensuring the power and the BLER constraints. For tractability, the\u0000asymptotic BLER is employed to solve the problem through geometric programming\u0000(GP). However, the GP-based solution underestimates the LTAT at low SNR due to\u0000a large approximation error in this case. Alternatively, we also develop a deep\u0000reinforcement learning (DRL)-based framework to learn power allocation policy.\u0000In particular, the optimization problem is transformed into a constrained\u0000Markov decision process, which is solved by integrating deep deterministic\u0000policy gradient (DDPG) with subgradient method. The numerical results finally\u0000demonstrate that the DRL-based method outperforms the GP-based one at low SNR,\u0000albeit at the cost of increasing computational burden.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138553805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Approximate Computing with Constant Locality 具有恒定位置性的分布式近似计算
Pub Date : 2023-12-07 DOI: arxiv-2312.04141
Deheng Yuan, Tao Guo, Zhongyi Huang, Shi Jin
We consider a distributed coding for computing problem with constant decodinglocality, i.e. with a vanishing error probability, any single sample of thefunction can be approximately recovered by probing only constant number ofcompressed bits. We establish an achievable rate region by designing anefficient coding scheme. The scheme reduces the required rate by introducingauxiliary random variables and supports local decoding at the same time. Thenwe show the rate region is optimal under mild regularity conditions on sourcedistributions. A coding for computing problem with side information isanalogously studied. These results indicate that more rate has to be taken inorder to achieve lower coding complexity in distributed computing settings.Moreover, useful graph characterizations are developed to simplify thecomputation of the achievable rate region.
我们考虑的是计算问题的分布式编码,具有恒定的解码位置性,即在错误概率消失的情况下,只需探测恒定数量的压缩比特,就能近似恢复函数的任何单个样本。我们通过设计一种高效的编码方案,建立了一个可实现的速率区域。该方案通过引入辅助随机变量降低了所需速率,同时支持本地解码。然后,我们证明了在源分布的温和规则性条件下,该速率区域是最优的。我们还研究了具有侧信息的计算问题编码。这些结果表明,在分布式计算环境中,为了达到更低的编码复杂度,必须采用更高的速率。此外,我们还开发了有用的图特征,以简化可实现速率区域的计算。
{"title":"Distributed Approximate Computing with Constant Locality","authors":"Deheng Yuan, Tao Guo, Zhongyi Huang, Shi Jin","doi":"arxiv-2312.04141","DOIUrl":"https://doi.org/arxiv-2312.04141","url":null,"abstract":"We consider a distributed coding for computing problem with constant decoding\u0000locality, i.e. with a vanishing error probability, any single sample of the\u0000function can be approximately recovered by probing only constant number of\u0000compressed bits. We establish an achievable rate region by designing an\u0000efficient coding scheme. The scheme reduces the required rate by introducing\u0000auxiliary random variables and supports local decoding at the same time. Then\u0000we show the rate region is optimal under mild regularity conditions on source\u0000distributions. A coding for computing problem with side information is\u0000analogously studied. These results indicate that more rate has to be taken in\u0000order to achieve lower coding complexity in distributed computing settings.\u0000Moreover, useful graph characterizations are developed to simplify the\u0000computation of the achievable rate region.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138553763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1