Information Theory
New submissions
[ showing up to 2000 entries per page: fewer  more ]
New submissions for Mon, 2 Aug 21
 [1] arXiv:2107.14264 [pdf, other]

Title: An InformationTheoretic Approach to Joint Sensing and CommunicationSubjects: Information Theory (cs.IT)
A communication setup is considered where a transmitter wishes to convey a message to a receiver and simultaneously estimate the state of that receiver through a common waveform. The state is estimated at the transmitter by means of generalized feedback, i.e., a strictly causal channel output, and the known waveform. The scenario at hand is motivated by joint radar and communication, which aims to codesign radar sensing and communication over shared spectrum and hardware. For the case of memoryless single receiver channels with i.i.d. timevarying state sequences, we fully characterize the capacitydistortion tradeoff, defined as the largest achievable rate below which a message can be conveyed reliably while satisfying some distortion constraints on state sensing. We propose a numerical method to compute the optimal input that achieves the capacitydistortion tradeoff. Then, we address memoryless statedependent broadcast channels (BCs). For physically degraded BCs with i.i.d. timevarying state sequences, we characterize the capacitydistortion tradeoff region as a rather straightforward extension of single receiver channels. For general BCs, we provide inner and outer bounds on the capacitydistortion region, as well as a sufficient condition when this capacitydistortion region is equal to the product of the capacity region and the set of achievable distortions. A number of illustrative examples demonstrates that the optimal codesign schemes outperform conventional schemes that split the resources between sensing and communication.
 [2] arXiv:2107.14270 [pdf, other]

Title: Secure Swarm UAVassisted Communications with Cooperative Friendly JammingAuthors: Hanh DangNgoc, Diep N. Nguyen, Khuong HoVan, Dinh Thai Hoang, Eryk Dutkiewicz, QuocViet Pham, WonJoo HwangComments: 30 pages, 7 figures, journalSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
This article proposes a cooperative friendly jamming framework for swarm unmanned aerial vehicle (UAV)assisted amplifyandforward (AF) relaying networks with wireless energy harvesting. Due to the limited energy of the UAVs, we develop a collaborative timeswitching relaying protocol which allows the UAVs to collaborate to harvest wireless energy, relay information, and jam the eavesdropper. To evaluate the secrecy rate, we derive the secrecy outage probability (SOP) for two popular detection techniques at the eavesdropper, i.e., selection combining and maximumratio combining. Monte Carlo simulations are then used to validate the theoretical SOP derivation and to show the effectiveness of the proposed framework in terms of SOP as compared with the conventional amplifyandforward relaying system. Using the derived SOP, one can obtain engineering insights to optimize the energy harvesting time and the number of UAVs in the swarm to achieve a given secrecy protection level. The analytical SOP derived in this work can also be helpful in future UAV securecommunications optimizations (e.g., trajectory, locations of UAVs). As an example, we present a case study to find the optimal corridor to locate the swarm so as to minimize the system SOP.
 [3] arXiv:2107.14396 [pdf, other]

Title: Combined Radar and Communications with PhaseModulated Frequency PermutationsSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
This paper focuses on the combined radar and communications problem and conducts a thorough analytical investigation on the effect of phase and frequency change on the communication and sensing functionality. First, we consider the classical stepped frequency radar waveform and modulate data using Mary phase shift keying (MPSK). Two important analytical tools in radar waveform design, namely the ambiguity function (AF) and the Fisher information matrix (FIM) are derived, based on which, we make the important conclusion that MPSK modulation has a negligible effect on radar local accuracy. Next, we extend the analysis to incorporate frequency permutations and propose a new signalling scheme in which the mapping between incoming data and waveforms is performed based on an efficient combinatorial transform called the Lehmer code. We also provide an efficient communications receiver based on the Hungarian algorithm. From the communications perspective, we consider the optimal maximum likelihood (ML) detector and derive the union bound and nearest neighbour approximation on the block error probability. From the radar sensing perspective, we discuss the broader structure of the waveform based on the AF derivation and quantify the radar local accuracy based on the FIM.
 [4] arXiv:2107.14404 [pdf, ps, other]

Title: Towards Efficient LargeScale Network Slicing: An LP RoundingandRefinement ApproachComments: 13 pages, 9 figures. arXiv admin note: substantial text overlap with arXiv:2102.02563Subjects: Information Theory (cs.IT); Signal Processing (eess.SP); Optimization and Control (math.OC)
In this paper, we propose an efficient algorithm for the network slicing problem which attempts to map multiple customized virtual network requests (also called services) to a common shared network infrastructure and allocate network resources to meet diverse service requirements. The problem has been formulated as a mixed integer linear programming (MILP) formulation in the literature. By exploiting the special structure of the network slicing problem, we first propose a novel linear programming (LP) relaxation of the MILP formulation. We show that compared with a natural LP relaxation of the MILP formulation, the novel LP relaxation is much more compact in terms of smaller numbers of variables and constraints, and much stronger in terms of providing a better LP bound, which makes it particularly suitable to be embedded in an LP based algorithm. Then we design an efficient twostage LP roundingandrefinement algorithm based on this novel LP relaxation. In the first stage, the proposed algorithm uses an iterative LP rounding procedure to place the virtual network functions of all services into cloud nodes while taking traffic routing of all services into consideration; in the second stage, the proposed algorithm uses an iterative LP refinement procedure to obtain a solution for traffic routing of all services with their endtoend delay constraints being satisfied. Compared with the existing algorithms which either have an exponential complexity or return a lowquality solution, our proposed algorithm achieves a better tradeoff between the solution quality and the computational complexity. In particular, the worstcase complexity of our proposed algorithm is polynomial, which makes it suitable for solving largescale problems. Numerical results demonstrate the effectiveness and efficiency of our proposed algorithm.
 [5] arXiv:2107.14576 [pdf, ps, other]

Title: On weight spectrum of linear codesAuthors: Vladimir N. PotapovSubjects: Information Theory (cs.IT); Combinatorics (math.CO)
We study sequences of linear or affine codes with uniform weight spectrum, i.e., a part of codewords with any fixed weight tends to zero. It is proved that a sequence of linear codes has a uniform weight spectrum if the number of vectors from codes with weight $1$ grows to infinity. We find an example of a sequence of linear codes such that the dimension of the code is the half of the codelength but it has not a uniform weight spectrum. This example generates eigenfunctions of the Fourier transform with minimal support and partial covering sets. Moreover, we generalize some MacWilliamstype identity.
Keywords: weight distribution of code, dual code, MacWilliams identity, Fourier transform, partial covering array  [6] arXiv:2107.14577 [pdf, ps, other]

Title: Fast direct access to variable length codesAuthors: Boris RyabkoSubjects: Information Theory (cs.IT); Data Structures and Algorithms (cs.DS)
We consider the issue of direct access to any letter of a sequence encoded with a variable length code and stored in the computer's memory, which is a special case of the random access problem to compressed memory. The characteristics according to which methods are evaluated are the access time to one letter and the memory used. The proposed methods, with various tradeoffs between the characteristics, outperform the known ones.
 [7] arXiv:2107.14583 [pdf, ps, other]

Title: An Upper Bound on the Number of Bent FunctionsAuthors: Vladimir N. PotapovSubjects: Information Theory (cs.IT)
The number of $n$ary bent functions is less than $2^{3\cdot2^{n3}(1+o(1))}$ as $n$ is even and $n\rightarrow\infty$.
Keywords: Boolean function, bent function, upper bound  [8] arXiv:2107.14669 [pdf, ps, other]

Title: Representing Pareto optima in preordered spaces: from Shannon entropy to injective monotonesSubjects: Information Theory (cs.IT)
Shannon entropy is the most widely used measure of uncertainty. It is used, for example, in Jaynes' maximum entropy principle which is considered a basis for statistical inference and serves as a justification for many regularization techniques that appear throughout machine learning and decision theory. Entropy is, however, only one possible monotone that does not fully capture the more fundamental notion of uncertainty considered as a preorder on the space of probability distributions, also known as majorization. While the maximum entropy principle therefore cannot yield all Pareto optima of the uncertainty preorder in general, it has the appealing property that its solutions are unique Pareto optima, since it maximizes a strictly concave functional over a convex subset. Here, we investigate a class of monotones on general preordered spaces that preserve this uniqueness property (up to order equivalence) on any subset, without asking for the additional vector space structure required for convexity. We show that the class of preorders for which these socalled injective monotones exist, lies in between the class of preorders with strict monotones and preorders with utility functions. We extend several wellknown results for strict monotones (RichterPeleg functions) to injective monotones, we provide a construction of injective monotones from countable multiutilities, and relate injective monotones to classic results concerning Debreu denseness and order separability. Along the way, we connect our results to Shannon entropy and the uncertainty preorder, obtaining new insights into how they are related.
Crosslists for Mon, 2 Aug 21
 [9] arXiv:2107.14458 (crosslist from cs.ET) [pdf, ps, other]

Title: HighEfficiency Resonant Beam Charging and CommunicationSubjects: Emerging Technologies (cs.ET); Information Theory (cs.IT); Signal Processing (eess.SP)
Simultaneous wireless information and power transfer (SWIPT) has been envisioned as an enabling technology for future 6G by providing highefficiency power transfer and highrate data transmissions concurrently. In this paper, we propose a resonant beam charging and communication (RBCC) system utilizing the telescope internal modulator (TIM) and the semiconductor gain medium. TIM can concentrate the diverged beam into a smallsize gain module, thus the propagation loss is reduced and the transmission efficiency is enhanced. Since the semiconductor gain medium has better energy absorption capacity compared with the traditional solidstate one, the overall energy conversion efficiency can be improved. We establish an analytical model of this RBCC system for SWIPT and evaluate its stability, output energy, and spectral efficiency. Numerical analysis shows that the proposed RBCC system can realize stable SWIPT over 10 meters, whose energy conversion efficiency is increased by 14 times compared with the traditional system using the solidstate gain medium without TIM, and the spectrum efficiency can be above 15 bit/s/Hz.
Replacements for Mon, 2 Aug 21
 [10] arXiv:2107.00901 (replaced) [pdf, other]

Title: Ruin Theory for User Association and Energy Optimization in Multiaccess Edge ComputingComments: This paper has been submitted to IEEE Wireless Communications LettersSubjects: Information Theory (cs.IT); Computer Science and Game Theory (cs.GT)
 [11] arXiv:2107.07161 (replaced) [pdf, other]

Title: Deep Learning Based OFDM Channel Estimation Using FrequencyTime Division and Attention MechanismSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
 [12] arXiv:2003.10526 (replaced) [pdf, ps, other]

Title: Hessian metric via transport information geometryAuthors: Wuchen LiSubjects: Differential Geometry (math.DG); Information Theory (cs.IT); Mathematical Physics (mathph)
[ showing up to 2000 entries per page: fewer  more ]
Disable MathJax (What is MathJax?)
Links to: arXiv, form interface, find, cs, recent, 2108, contact, help (Access key information)