Information Theory
New submissions
[ showing up to 2000 entries per page: fewer  more ]
New submissions for Fri, 21 Jan 22
 [1] arXiv:2201.07795 [pdf, ps, other]

Title: Rate Splitting for General MulticastComments: 6 pages, 7 figures, to appear in IEEE ICC 2022. arXiv admin note: substantial text overlap with arXiv:2201.07386Subjects: Information Theory (cs.IT)
Immersive video, such as virtual reality (VR) and multiview videos, is growing in popularity. Its wireless streaming is an instance of general multicast, extending conventional unicast and multicast, whose effective design is still open. This paper investigates the optimization of general rate splitting with linear beamforming for general multicast. Specifically, we consider a multicarrier singlecell wireless network where a multiantenna base station (BS) communicates to multiple singleantenna users via general multicast. Linear beamforming is adopted at the BS, and joint decoding is adopted at each user. We consider the maximization of the weighted sum rate, which is a challenging nonconvex problem. Then, we propose an iterative algorithm for the problem to obtain a KKT point using the concaveconvex procedure (CCCP). The proposed optimization framework generalizes the existing ones for rate splitting for various types of services. Finally, we numerically show substantial gains of the proposed solutions over existing schemes and reveal the design insights of general rate splitting for general multicast.
 [2] arXiv:2201.07843 [pdf, other]

Title: CRCAided List Decoding of Convolutional and Polar Codes for Short Messages in 5GComments: 6 pages, 8 figures; this preprint is accepted for publication at the 2022 IEEE International Conference on Communications (ICC); cameraready version to be updatedSubjects: Information Theory (cs.IT)
This paper explores list decoding of convolutional and polar codes for short messages such as those found in the 5G physical broadcast channel. A cyclic redundancy check (CRC) is used to select a codeword from a list of likely codewords. One example in the 5G standard encodes a 32bit message with a 24bit CRC and a 512bit polar code with additional bits added by repetition to achieve a very low rate of 32/864. This paper shows that optimizing the CRC length improves the $E_b/N_0$ performance of this polar code, where $E_b/N_0$ is the ratio of the energy per data bit to the noise power spectral density. Furthermore, even better $E_b/N_0$ performance is achieved by replacing the polar code with a tailbiting convolutional code (TBCC) with a distancespectrumoptimal (DSO) CRC. This paper identifies the optimal CRC length to minimize the frame error rate (FER) of a rate1/5 TBCC at a specific value of $E_b/N_0$. We also show that this optimized TBCC/CRC can attain the same excellent $E_b/N_0$ performance with the very low rate of 32/864 of the 5G polar code, where the low rate is achieved through repetition. We show that the proposed TBCC/CRC concatenated code outperforms the PBCH polar code described in the 5G standard both in terms of FER and decoding run time. We also explore the tradeoff between undetected error rate and erasure rate as the CRC size varies.
 [3] arXiv:2201.07915 [pdf, other]

Title: Sensing Method for TwoTarget Detection in TimeConstrained Vector Poisson ChannelComments: 24 pages, 37 figures, journal articleJournalref: Signal & Image Processing: An International Journal (SIPIJ) Vol. 12, No. 6, December 2021Subjects: Information Theory (cs.IT); Signal Processing (eess.SP); Computation (stat.CO)
It is an experimental design problem in which there are two Poisson sources with two possible and known rates, and one counter. Through a switch, the counter can observe the sources individually or the counts can be combined so that the counter observes the sum of the two. The sensor scheduling problem is to determine an optimal proportion of the available time to be allocated toward individual and joint sensing, under a total time constraint. Two different metrics are used for optimization: mutual information between the sources and the observed counts, and probability of detection for the associated source detection problem. Our results, which are primarily computational, indicate similar but not identical results under the two cost functions.
 [4] arXiv:2201.07950 [pdf, ps, other]

Title: A LowComplexity LocationBased Hybrid Multiple Access and Relay Selection in V2X Multicast CommunicationsComments: Submitted to IEEE Transactions on Vehicular TechnologySubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
This study investigated relayassisted mode 1 sidelink (SL) multicast transmission, which encounters interference from mode 2 SL transmission, for use in lowlatency vehicletoeverything communications. To accommodate mode 1mode 2 SL traffic, we use the hybrid multiple access (MA) approach, which combines orthogonal MA (OMA) and nonorthogonal MA (NOMA) schemes. We introduce a lowcomplexity locationbased hybrid MA algorithm and its associated relay selection that can be used when SL channel state information is unavailable.
 [5] arXiv:2201.08068 [pdf, other]

Title: Power Allocation Algorithms for Massive MIMO Systems with MultiAntenna UsersAuthors: Evgeny Bobrov (1 and 2), Boris Chinyaev (1), Viktor Kuznetsov (2), Dmitrii Minenkov (1, 3), Daniil Yudakov (1) ((1) M.V. Lomonosov Moscow State University, Russia, (2) Huawei Technologies, Russian Research Institute, Moscow Research Center, Russia (3) A. Ishlinsky Institute for Problems in Mechanics RAS, Russia)Comments: 25 pages, 6 figures, 2 tables, comments are welcomeSubjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
Modern 5G wireless cellular networks use massive multipleinput multipleoutput (MIMO) technology. This concept entails using an antenna array at a base station to concurrently service many mobile devices that have several antennas on their side. In this field, a significant role is played by the precoding (beamforming) problem. During downlink, an important part of precoding is the power allocation problem that distributes power between transmitted symbols. In this paper, we consider the power allocation problem for a class of precodings that asymptotically work as regularized zeroforcing. Under some realistic assumptions, we simplify the sum spectral efficiency functional and obtain tractable expressions for it. We prove that equal power allocation provides optimum for the simplified functional with total power constraint (TPC). Also, lowcomplexity algorithms that improve equal power allocation in the case of perantenna power constraints are proposed. On simulations using Quadriga, the proposed algorithms show a significant gain in sum spectral efficiency while using a similar computing time as the reference solutions.
 [6] arXiv:2201.08136 [pdf, ps, other]

Title: Energy Efficiency Maximization in LargeScale CellFree Massive MIMO: A Projected Gradient ApproachSubjects: Information Theory (cs.IT)
This paper considers the fundamental power allocation problem in cellfree massive mutipleinput and multipleoutput (MIMO) systems which aims at maximizing the total energy efficiency (EE) under a sum power constraint at each access point (AP) and a qualityofservice (QoS) constraint at each user. Existing solutions for this optimization problem are based on solving a sequence of secondorder cone programs (SOCPs), whose computational complexity scales dramatically with the network size. Therefore, they are not implementable for practical largescale cellfree massive MIMO systems. To tackle this issue, we propose an iterative power control algorithm based on the frame work of an accelerated projected gradient (APG) method. In particular, each iteration of the proposed method is done by simple closedform expressions, where a penalty method is applied to bring constraints into the objective in the form of penalty functions. Finally, the convergence of the proposed algorithm is analytically proved and numerically compared to the known solution based on SOCP. Simulations results demonstrate that our proposed power control algorithm can achieve the same EE as the existing SOCPsbased method, but more importantly, its run time is much lower (one to two orders of magnitude reduction in run time, compared to the SOCPsbased approaches).
 [7] arXiv:2201.08169 [pdf, other]

Title: Secure RateSplitting for the MIMO Broadcast Channel with Imperfect CSIT and a JammerComments: 5 pages, 3 figuresSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
In this paper, we investigate the secure ratesplitting for the twouser multipleinput multipleoutput (MIMO) broadcast channel with imperfect channel state information at the transmitter (CSIT) and a multipleantenna jammer, where each receiver has equal number of antennas and the jammer has perfect channel state information (CSI). Specifically, we design the secure ratesplitting multipleaccess in this scenario, where the security of splitted private and common messages is ensured by precoder design with joint nulling and aligning the leakage information, regarding to different antenna configurations. As a result, we show that the sumsecure degreesoffreedom (SDoF) achieved by secure ratesplitting outperforms that by conventional zeroforcing. Therefore, we validate the superiority of ratesplitting for the secure purpose in the twouser MIMO broadcast channel with imperfect CSIT and a jammer.
 [8] arXiv:2201.08237 [pdf, ps, other]

Title: Simple Gray Coding and LLR Calculation for MDS Modulation SystemsComments: 5 Pages, 3 FiguresSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
Due to dependence between codeword elements, index modulation (IM) and related modulation techniques struggle to provide simple solutions for practical problems such as Gray coding between information bits and constellation points; and lowcomplexity loglikelihood ratio (LLR) calculations for channelencoded information bits. In this paper, we show that a modulation technique based on a simple maximum distance separable (MDS) code, in other words, MDS modulation, can provide simple yet effective solutions to these problems, rendering the MDS techniques more beneficial in the presence of coding. We also compare the coded error performance of the MDS methods with that of the IM methods and demonstrate that MDS modulation outperforms IM.
 [9] arXiv:2201.08242 [pdf, ps, other]

Title: Nonminimum tensor rank Gabidulin codesSubjects: Information Theory (cs.IT); Combinatorics (math.CO)
The tensor rank of some Gabidulin codes of small dimension is investigated. In particular, we determine the tensor rank of any rank metric code equivalent to an $8$dimensional $\mathbb{F}_q$linear generalized Gabidulin code in $\mathbb{F}_{q}^{4\times4}$. This shows that such a code is never minimum tensor rank. In this way, we detect the first infinite family of Gabidulin codes which are not minimum tensor rank.
 [10] arXiv:2201.08261 [pdf, ps, other]

Title: Optimization of a ReedSolomon codebased protocol against blockchain data availability attacksSubjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
ASBK (named after the authors' initials) is a recent blockchain protocol tackling data availability attacks against light nodes, employing twodimensional ReedSolomon codes to encode the list of transactions and a random sampling phase where adversaries are forced to reveal information. In its original formulation, only codes with rate $1/4$ are considered, and a theoretical analysis requiring computationally demanding formulas is provided. This makes ASBK difficult to optimize in situations of practical interest. In this paper, we introduce a much simpler model for such a protocol, which additionally supports the use of codes with arbitrary rate. This makes blockchains implementing ASBK much easier to design and optimize. Furthermore, disposing of a clearer view of the protocol, some general features and considerations can be derived (e.g., nodes behaviour in largely participated networks). As a concrete application of our analysis, we consider relevant blockchain parameters and find network settings that minimize the amount of data downloaded by light nodes. Our results show that the protocol benefits from the use of codes defined over large finite fields, with code rates that may be even significantly different from the originally proposed ones.
 [11] arXiv:2201.08306 [pdf, other]

Title: An Information Theory Approach to Network Evolution ModelsSubjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
A novel Markovian network evolution model is introduced and analysed by means of information theory. It will be proved that the model, called Network Evolution Chain, is a stationary and ergodic stochastic process. Therefore, the Asymptotic Equipartition Property can be applied to it. The model's entropy rate and typical sequences are also explored. Extracting particular information from the network and methods to simulate network evolution in the continuous time domain are discussed. Additionally, the ErdosRenyi Network Evolution Chain is introduced as a subset of our model with the additional property of its stationary distribution matching the ErdosRenyi random graph model. The stationary distributions of nodes and graphs are calculated for this subset alongside its entropy rate. The simulation results at the end of the paper back up the proved theorems and calculated values.
 [12] arXiv:2201.08322 [pdf, ps, other]

Title: Erroranderasure Decoding of Product and Staircase Codes with Simplified Extrinsic Message PassingSubjects: Information Theory (cs.IT)
The decoding performance of product codes (PCs) and staircase codes (SCCs) based on iterative boundeddistance decoding (iBDD) can be improved with the aid of a moderate amount of soft information, maintaining a low decoding complexity. One promising approach is erroranderasure (EaE) decoding, whose performance can be reliably estimated with density evolution (DE). However, the extrinsic message passing (EMP) decoder required by the DE analysis entails a much higher complexity than the simple intrinsic message passing (IMP) decoder. In this paper, we simplify the EMP decoding algorithm for the EaE channel for two commonlyused EaE decoders by deriving the EMP decoding results from the IMP decoder output and some additional logical operations based on the algebraic structure of the component codes and the EaE decoding rule. Simulation results show that the number of BDD steps is reduced to being comparable with IMP. Furthermore, we propose a heuristic modification of the EMP decoder that reduces the complexity further. In numerical simulations, the decoding performance of the modified decoder yields up to 0.25 dB improvement compared to standard EMP decoding.
 [13] arXiv:2201.08365 [pdf, ps, other]

Title: The Role of Gossiping for Information Dissemination over Networked AgentsComments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibleSubjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP); Systems and Control (eess.SY)
We consider information dissemination over a network of gossiping agents (nodes). In this model, a source keeps the most uptodate information about a timevarying binary state of the world, and $n$ receiver nodes want to follow the information at the source as accurately as possible. When the information at the source changes, the source first sends updates to a subset of $m\leq n$ nodes. After that, the nodes share their local information during the gossiping period to disseminate the information further. The nodes then estimate the information at the source using the majority rule at the end of the gossiping period. To analyze information dissemination, we introduce a new error metric to find the average percentage of nodes that can accurately obtain the most uptodate information at the source. We characterize the equations necessary to obtain the steadystate distribution for the average error and then analyze the system behavior under both high and low gossip rates. In the high gossip rate, in which each node can access other nodes' information more frequently, we show that the nodes update their information based on the majority of the information in the network. In the low gossip rate, we introduce and analyze the gossip gain, which is the reduction at the average error due to gossiping. In particular, we develop an adaptive policy that the source can use to determine its current transmission capacity $m$ based on its past transmission rates and the accuracy of the information at the nodes. In numerical results, we show that when the source's transmission capacity $m$ is limited, gossiping can be harmful as it causes incorrect information to disseminate. We then find the optimal gossip rates to minimize the average error for a fixed $m$. Finally, we illustrate the outperformance of our adaptive policy compared to the constant $m$selection policy even for the high gossip rates.
Crosslists for Fri, 21 Jan 22
 [14] arXiv:2201.07204 (crosslist from stat.ME) [pdf, ps, other]

Title: Dynamical Dorfman Testing with QuarantineSubjects: Methodology (stat.ME); Computers and Society (cs.CY); Data Structures and Algorithms (cs.DS); Information Theory (cs.IT); Signal Processing (eess.SP)
We consider dynamical group testing problem with a community structure. With a discretetime SIR (susceptible, infectious, recovered) model, we use Dorfman's twostep group testing approach to identify infections, and step in whenever necessary to inhibit infection spread via quarantines. We analyze the tradeoff between quarantine and test costs as well as disease spread. For the special dynamical i.i.d. model, we show that the optimal first stage Dorfman group size differs in dynamic and static cases. We compare the performance of the proposed dynamic twostage Dorfman testing with stateoftheart nonadaptive group testing method in dynamic settings.
 [15] arXiv:2201.07886 (crosslist from eess.SP) [pdf, other]

Title: THzEmpowered UAVs in 6G: Opportunities, Challenges, and TradeOffsSubjects: Signal Processing (eess.SP); Information Theory (cs.IT)
Envisioned use cases of unmanned aerial vehicles (UAVs) impose new service requirements in terms of data rate, latency, and sensing accuracy, to name a few. If such requirements are satisfactorily met, it can create novel applications and enable highly reliable and harmonized integration of UAVs in the 6G network ecosystem. Towards this, terahertz (THz) bands are perceived as a prospective technological enabler for various improved functionalities such as ultrahigh throughput and enhanced sensing capabilities. This paper focuses on THzempowered UAVs with the following capabilities: communication, sensing, localization, imaging, and control. We review the potential opportunities and use cases of THzempowered UAVs, corresponding novel design challenges, and resulting tradeoffs. Furthermore, we overview recent advances in UAV deployments regulations, THz standardization, and health aspects related to THz bands. Finally, we take UAV to UAV (U2U) communication as a casestudy to provide numerical insights into the impact of various system design parameters and environment factors.
 [16] arXiv:2201.07912 (crosslist from cs.LG) [pdf, other]

Title: CommunicationEfficient Device Scheduling for Federated Learning Using Stochastic OptimizationComments: To be included in Proceedings of INFOCOM 2022, 10 Pages, 5 FiguresSubjects: Machine Learning (cs.LG); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Machine Learning (stat.ML)
Federated learning (FL) is a useful tool in distributed machine learning that utilizes users' local datasets in a privacypreserving manner. When deploying FL in a constrained wireless environment; however, training models in a timeefficient manner can be a challenging task due to intermittent connectivity of devices, heterogeneous connection quality, and noni.i.d. data. In this paper, we provide a novel convergence analysis of nonconvex loss functions using FL on both i.i.d. and noni.i.d. datasets with arbitrary device selection probabilities for each round. Then, using the derived convergence bound, we use stochastic optimization to develop a new client selection and power allocation algorithm that minimizes a function of the convergence bound and the average communication time under a transmit power constraint. We find an analytical solution to the minimization problem. One key feature of the algorithm is that knowledge of the channel statistics is not required and only the instantaneous channel state information needs to be known. Using the FEMNIST and CIFAR10 datasets, we show through simulations that the communication time can be significantly decreased using our algorithm, compared to uniformly random participation.
 [17] arXiv:2201.07923 (crosslist from quantph) [pdf, other]

Title: The Accuracy vs. Sampling Overhead Tradeoff in Quantum Error Mitigation Using Monte CarloBased Channel InversionJournalref: IEEE Transactions on Communications, 2022Subjects: Quantum Physics (quantph); Information Theory (cs.IT)
Quantum error mitigation (QEM) is a class of promising techniques for reducing the computational error of variational quantum algorithms. In general, the computational error reduction comes at the cost of a sampling overhead due to the varianceboosting effect caused by the channel inversion operation, which ultimately limits the applicability of QEM. Existing sampling overhead analysis of QEM typically assumes exact channel inversion, which is unrealistic in practical scenarios. In this treatise, we consider a practical channel inversion strategy based on Monte Carlo sampling, which introduces additional computational error that in turn may be eliminated at the cost of an extra sampling overhead. In particular, we show that when the computational error is small compared to the dynamic range of the errorfree results, it scales with the square root of the number of gates. By contrast, the error exhibits a linear scaling with the number of gates in the absence of QEM under the same assumptions. Hence, the error scaling of QEM remains to be preferable even without the extra sampling overhead. Our analytical results are accompanied by numerical examples.
 [18] arXiv:2201.08284 (crosslist from math.PR) [pdf, ps, other]

Title: Entropies of sums of independent gamma random variablesSubjects: Probability (math.PR); Information Theory (cs.IT)
We establish several Schurconvexity type results under fixed variance for weighted sums of independent gamma random variables and obtain nonasymptotic bounds on their R\'enyi entropies. In particular, this pertains to the recent results by BartczakNayarZwara as well as BobkovNaumovUlyanov, offering simple proofs of the former and extending the latter.
Replacements for Fri, 21 Jan 22
 [19] arXiv:2105.14304 (replaced) [pdf, ps, other]

Title: Stability and Superresolution of MUSIC and ESPRIT for Multisnapshot Spectral EstimationComments: 16 pagesSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
 [20] arXiv:2201.07437 (replaced) [pdf, ps, other]

Title: Extreme Age of Information for WirelessPowered Communication SystemsSubjects: Information Theory (cs.IT)
 [21] arXiv:2102.08573 (replaced) [pdf, other]

Title: Robust Mean Estimation in High Dimensions: An Outlier Fraction Agnostic and Efficient AlgorithmComments: arXiv admin note: text overlap with arXiv:2008.09239Subjects: Applications (stat.AP); Information Theory (cs.IT)
[ showing up to 2000 entries per page: fewer  more ]
Disable MathJax (What is MathJax?)
Links to: arXiv, form interface, find, cs, recent, 2201, contact, help (Access key information)