Featured Researches

Information Theory

Coverage Evaluation for 5G Reduced Capability New Radio (NR-RedCap)

The fifth generation (5G) wireless technology is primarily designed to address a wide range of use cases categorized into the enhanced mobile broadband (eMBB), ultra-reliable and low latency communication (URLLC), and massive machine-type communication (mMTC). Nevertheless, there are a few other use cases which are in-between these main use cases such as industrial wireless sensor networks, video surveillance, or wearables. In order to efficiently serve such use cases, in Release 17, the 3rd generation partnership project (3GPP) introduced the reduced capability NR devices (NR-RedCap) with lower cost and complexity, smaller form factor and longer battery life compared to regular NR devices. However, one key potential consequence of device cost and complexity reduction is the coverage loss. In this paper, we provide a comprehensive evaluation of NR RedCap coverage for different physical channels and initial access messages to identify the channels/messages that are potentially coverage limiting for RedCap UEs. We perform the coverage evaluations for RedCap UEs operating in three different scenarios, namely Rural, Urban and Indoor with carrier frequencies 700 MHz, 2.6 GHz and 28 GHz, respectively. Our results confirm that for all the considered scenarios, the amounts of required coverage recovery for RedCap channels are either less than 1 dB or can be compensated by considering smaller data rate targets for RedCap use cases.

Read more
Information Theory

Coverage Probability of Distributed IRS Systems Under Spatially Correlated Channels

This paper suggests the use of multiple distributed intelligent reflecting surfaces (IRSs) towards a smarter control of the propagation environment. Notably, we also take into account the inevitable correlated Rayleigh fading in IRS-assisted systems. In particular, in a single-input and single-output (SISO) system, we consider and compare two insightful scenarios, namely, a finite number of large IRSs and a large number of finite size IRSs to show which implementation method is more advantageous. In this direction, we derive the coverage probability in closed-form for both cases contingent on statistical channel state information (CSI) by using the deterministic equivalent (DE) analysis. Next, we obtain the optimal coverage probability. Among others, numerical results reveal that the addition of more surfaces outperforms the design scheme of adding more elements per surface. Moreover, in the case of uncorrelated Rayleigh fading, statistical CSI-based IRS systems do not allow the optimization of the coverage probability.

Read more
Information Theory

Covert MIMO Communications under Variational Distance Constraint

The problem of covert communication over Multiple-Input Multiple-Output (MIMO) Additive White Gaussian Noise (AWGN) channels is investigated, in which a transmitter attempts to reliably communicate with a legitimate receiver while avoiding detection by a passive adversary. The covert capacity of the MIMO AWGN is characterized under a variational distance covertness constraint when the MIMO channel matrices are static and known. The characterization of the covert capacity is also extended to a class of channels in which the legitimate channel matrix is known but the adversary's channel matrix is only known up to a rank and a spectral norm constraint.

Read more
Information Theory

Cross Domain Iterative Detection for Orthogonal Time Frequency Space Modulation

Recently proposed orthogonal time frequency space (OTFS) modulation has been considered as a promising candidate for accommodating various emerging communication and sensing applications in high-mobility environments. In this paper, we propose a novel cross domain iterative detection algorithm to enhance the error performance of OTFS modulation. Different from conventional OTFS detection methods, the proposed algorithm applies basic estimation/detection approaches to both the time domain and delay-Doppler (DD) domain and iteratively updates the extrinsic information from two domains with the unitary transformation. In doing so, the proposed algorithm exploits the time domain channel sparsity and the DD domain symbol constellation constraints. We evaluate the estimation/detection error variance in each domain for each iteration and derive the state evolution to investigate the detection error performance. We show that the performance gain due to iterations comes from the non-Gaussian constellation constraint in the DD domain. More importantly, we prove the proposed algorithm can indeed converge and, in the convergence, the proposed algorithm can achieve almost the same error performance as the maximum-likelihood sequence detection even in the presence of fractional Doppler shifts. Furthermore, the computational complexity associated with the domain transformation is low, thanks to the structure of the discrete Fourier transform (DFT) kernel. Simulation results are consistent with our analysis and demonstrate a significant performance improvement compared to conventional OTFS detection methods.

Read more
Information Theory

Cross-Layer Network Codes for Content Delivery in Cache-Enabled D2D Networks

In this paper, we consider the use of cross-layer network coding (CLNC), caching, and device-to-device (D2D) communications to jointly optimize the delivery of a set of popular contents to a set of user devices (UDs). In the considered D2D network, a group of near-by UDs cooperate with each other and use NC to combine their cached files, so as the completion time required for delivering all requested contents to all UDs is minimized. Unlike the previous work that considers only one transmitting UD at a time, our work allows multiple UDs to transmit simultaneously given the interference among the active links is small. Such configuration brings a new trade-off among scheduling UDs to transmitting UDs, selecting the coding decisions and the transmission rate/power. Therefore, we consider the completion time minimization problem that involves scheduling multiple transmitting UDs, determining their transmission rates/powers and file combinations. The problem is shown to be intractable because it involves all future coding decisions. To tackle the problem at each transmission slot, we first design a graph called herein the D2D Rate-Aware IDNC graph where its vertices have weights that judiciously balance between the rates/powers of the transmitting UDs and the number of their scheduled UDs. Then, we propose an innovative and efficient CLNC solution that iteratively selects a set of transmitting UDs only if the interference caused by the transmissions of the newly selected UDs does not significantly impact the overall completion time. Simulation results show that the proposed solution offers significant completion time reduction compared with the existing algorithms.

Read more
Information Theory

Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret

The information leakage of a cryptographic implementation with a given degree of protection is evaluated in a typical situation when the signal-to-noise ratio is small. This is solved by expanding Kullback-Leibler divergence, entropy, and mutual information in terms of moments/cumulants.

Read more
Information Theory

Cyclic Orbit Flag Codes

In network coding, a flag code is a set of sequences of nested subspaces of F n q , being F q the finite field with q elements. Flag codes defined as orbits of a cyclic subgroup of the general linear group acting on flags of F n q are called cyclic orbit flag codes. Inspired by the ideas in arXiv:1403.1218, we determine the cardinality of a cyclic orbit flag code and provide bounds for its distance with the help of the largest subfield over which all the subspaces of a flag are vector spaces (the best friend of the flag). Special attention is paid to two specific families of cyclic orbit flag codes attaining the extreme possible values of the distance: Galois cyclic orbit flag codes and optimum distance cyclic orbit flag codes. We study in detail both classes of codes and analyze the parameters of the respective subcodes that still have a cyclic orbital structure.

Read more
Information Theory

D2D-Aided Multi-Antenna Multicasting under Generalized CSIT

Multicasting, where a base station (BS) wishes to convey the same message to several user equipments (UEs), represents a common yet highly challenging wireless scenario. In fact, guaranteeing decodability by the whole UE population proves to be a major performance bottleneck since the UEs in poor channel conditions ultimately determine the achievable rate. To overcome this issue, two-phase cooperative multicasting schemes, which use conventional multicasting in a first phase and leverage device-to-device (D2D) communications in a second phase to effectively spread the message, have been extensively studied. However, most works are limited either to the simple case of single-antenna BS or to a specific channel state information at the transmitter (CSIT) setup. This paper proposes a general two-phase framework that is applicable to the cases of perfect, statistical, and topological CSIT in the presence of multiple antennas at the BS. The proposed method exploits the precoding capabilities at the BS, which enable targeting specific UEs that can effectively serve as D2D relays towards the remaining UEs, and maximize the multicast rate under some outage constraint. Numerical results show that our schemes bring substantial gains over traditional single-phase multicasting and overcome the worst-UE bottleneck behavior in all the considered CSIT configurations.

Read more
Information Theory

DNA codes over two noncommutative rings of order four

In this paper, we describe a new type of DNA codes over two noncommutative rings E and F of order four with characteristic 2. Our DNA codes are based on quasi self-dual codes over E and F . Using quasi self-duality, we can describe fixed GC-content constraint weight distributions and reverse-complement constraint minimum distributions of those codes.

Read more
Information Theory

DNC-Aided SCL-Flip Decoding of Polar Codes

Successive-cancellation list (SCL) decoding of polar codes has been adopted for 5G. However, the performance is not very satisfactory with moderate code length. Heuristic or deep-learning-aided (DL-aided) flip algorithms have been developed to tackle this problem. The key for successful flip decoding is to accurately identify error bit positions. In this work, we propose a new flip algorithm with help of differentiable neural computer (DNC). New state and action encoding are developed for better DNC training and inference efficiency. The proposed method consists of two phases: i) a flip DNC (F-DNC) is exploited to rank most likely flip positions for multi-bit flipping; ii) if decoding still fails, a flip-validate DNC (FV-DNC) is used to re-select error bit positions for successive flip decoding trials. Supervised training methods are designed accordingly for the two DNCs. Simulation results show that proposed DNC-aided SCL-Flip (DNC-SCLF) decoding demonstrates up to 0.34dB coding gain improvement or 54.2 reduction in average number of decoding attempts compared to prior works.

Read more

Ready to get started?

Join us today