Featured Researches

Information Theory

Improved Multi-access Coded Caching Schemes from Cross Resolvable Designs

Recently multi-access coded caching schemes with number of users different from the number of caches obtained from a special case of resolvable designs called Cross Resolvable Designs (CRDs) have been reported and a new performance metric called rate-per-user has been introduced \cite{KNRarXiv}. In this paper we present a generalization of this work resulting in multi-access coded caching schemes with improved rate-per-user.

Read more
Information Theory

Improved Rank-Modulation Codes for DNA Storage with Shotgun Sequencing

We study permutations over the set of ??-grams, that are feasible in the sense that there is a sequence whose ??-gram frequency has the same ranking as the permutation. Codes, which are sets of feasible permutations, protect information stored in DNA molecules using the rank-modulation scheme, and read using the shotgun sequencing technique. We construct systematic codes with an efficient encoding algorithm, and show that they are optimal in size. The length of the DNA sequences that correspond to the codewords is shown to be polynomial in the code parameters. Non-systematic with larger size are also constructed.

Read more
Information Theory

Improved Rate-Energy Trade-off For SWIPT Using Chordal Distance Decomposition In Interference Alignment Networks

This paper investigates the simultaneous wireless information and power transfer (SWIPT) precoding scheme for K-user multiple-input-multiple-output (MIMO) interference channels (IC). In IC, interference alignment (IA) schemes provide optimal precoders to achieve full degrees-of-freedom (DoF) gain. To study a trade-off between harvested energy and sum rate, the transceiver design problem is suboptimally formulated in literature via convex relaxations, which is still computationally intensive, especially for battery limited nodes running on harvested energy. In this paper, we propose a systematic method using chordal distance (CD) decomposition to obtain the balanced precoding, which achieves the improved trade-off. Analysis shows that given the nonnegative value of CD, the achieved harvested energy for the proposed precoder is higher than that for perfect IA precoder. Moreover, energy constraints can be achieved, while maintaining a constant rate loss without losing DoFs via tuning the CD value and splitting factor. Simulation results verify the analysis and add that the IA schemes based on max-SINR or mean-squared error are better suited for SWIPT maximization than subspace or leakage minimization methods.

Read more
Information Theory

Improved algorithms for non-adaptive group testing with consecutive positives

The goal of group testing is to efficiently identify a few specific items, called positives, in a large population of items via tests. A test is an action on a subset of items which returns positive if the subset contains at least one positive and negative otherwise. In non-adaptive group testing, all tests are independent, can be performed in parallel and represented as a measurement matrix. In this work, we consider non-adaptive group testing with consecutive positives in which the items are linearly ordered and the positives are consecutive in that order. We proposed two improved algorithms for efficiently identifying consecutive positives. In particular, without storing measurement matrices, we can identify up to d consecutive positives with 2 log 2 n d +2d ( 4 log 2 n d +2d , resp.) tests in O( log 2 2 n d +d) ( O( log 2 n d +d) , resp.) time. These results significantly improve the state-of-the-art scheme in which it takes 5 log 2 n d +2d+21 tests to identify the positives in O( n d log 2 n d + d 2 ) time with the measurement matrices associated with the scheme stored somewhere.

Read more
Information Theory

Improving Physical Layer Security for Reconfigurable Intelligent Surface aided NOMA 6G Networks

The intrinsic integration of the nonorthogonal multiple access (NOMA) and reconfigurable intelligent surface (RIS) techniques is envisioned to be a promising approach to significantly improve both the spectrum efficiency and energy efficiency for future wireless communication networks. In this paper, the physical layer security (PLS) for a RIS-aided NOMA 6G networks is investigated, in which a RIS is deployed to assist the two "dead zone" NOMA users and both internal and external eavesdropping are considered. For the scenario with only internal eavesdropping, we consider the worst case that the near-end user is untrusted and may try to intercept the information of far-end user. A joint beamforming and power allocation sub-optimal scheme is proposed to improve the system PLS. Then we extend our work to a scenario with both internal and external eavesdropping. Two sub-scenarios are considered in this scenario: one is the sub-scenario without channel state information (CSI) of eavesdroppers, and another is the sub-scenario where the eavesdroppers' CSI are available. For the both sub-scenarios, a noise beamforming scheme is introduced to be against the external eavesdroppers. An optimal power allocation scheme is proposed to further improve the system physical security for the second sub-scenario. Simulation results show the superior performance of the proposed schemes. Moreover, it has also been shown that increasing the number of reflecting elements can bring more gain in secrecy performance than that of the transmit antennas.

Read more
Information Theory

Information Bottleneck for a Rayleigh Fading MIMO Channel with an Oblivious Relay

This paper considers the information bottleneck (IB) problem of a Rayleigh fading multiple-input multiple-out (MIMO) channel with an oblivious relay. The relay is constrained to operate without knowledge of the codebooks, i.e., it performs oblivious processing. Moreover, due to the bottleneck constraint, it is impossible for the relay to inform the destination node of the perfect channel state information (CSI) in each channel realization. To evaluate the bottleneck rate, we first provide an upper bound by assuming that the destination node can get the perfect CSI at no cost. Then, we provide four achievable schemes where each scheme satisfies the bottleneck constraint and gives a lower bound to the bottleneck rate. In the first and second schemes, the relay splits the capacity of the relay-destination link into two parts, and conveys both the CSI and its observation to the destination node. Due to CSI transmission, the performance of these two schemes is sensitive to the MIMO channel dimension, especially the channel input dimension. To ensure that it still performs well when the channel dimension grows large, in the third and fourth achievable schemes, the relay only transmits compressed observation to the destination node. Numerical results show that with simple symbol-by-symbol oblivious relay processing and compression, the proposed achievable schemes work well and can demonstrate lower bounds coming quite close to the upper bound on a wide range of relevant system parameters.

Read more
Information Theory

Information Bottleneck for an Oblivious Relay with Channel State Information: the Vector Case

This paper considers the information bottleneck (IB) problem of a Rayleigh fading multiple-input multiple-out (MIMO) channel. Due to the bottleneck constraint, it is impossible for the oblivious relay to inform the destination node of the perfect channel state information (CSI) in each channel realization. To evaluate the bottleneck rate, we provide an upper bound by assuming that the destination node can get the perfect CSI at no cost and two achievable schemes with simple symbol-by-symbol relay processing and compression. Numerical results show that the lower bounds obtained by the proposed achievable schemes can come close to the upper bound on a wide range of relevant system parameters.

Read more
Information Theory

Information Decoding and SDR Implementation of DFRC Systems Without Training Signals

Recent performance analysis of dual-function radar communications (DFRC) systems, which embed information using phase shift keying (PSK) into multiple-input multiple-output (MIMO) frequency hopping (FH) radar pulses, shows promising results for addressing spectrum sharing issues between radar and communications. However, the problem of decoding information at the communication receiver remains challenging, since the DFRC transmitter is typically assumed to transmit only information embedded radar waveforms and not the training sequence. We propose a novel method for decoding information at the communication receiver without using training data, which is implemented using a software-defined radio (SDR). The performance of the SDR implementation is examined in terms of bit error rate (BER) as a function of signal-to-noise ratio (SNR) for differential binary and quadrature phase shift keying modulation schemes and compared with the BER versus SNR obtained with numerical simulations.

Read more
Information Theory

Information Energy Capacity Region for SWIPT Systems over Raylegh-Fading Channels

In this paper, we study the fundamental limits of simultaneous information and power transfer over a Rayleigh fading channel, where the channel input is constrained to peak-power constraints that vary in each channel use by taking into account high-power amplifier nonlinearities. In particular, a three-party communication system is considered, where a transmitter aims simultaneously conveying information to an information receiver and delivering energy to an energy harvesting receiver. For the special case of static PP constraints, we study the information-energy capacity region and the associated input distribution under: average-power and PP constraints at the transmitter, an HPA nonlinearity at the transmitter, and nonlinearity of the energy harvesting circuit at the energy receiver. By extending Smith \' mathematical framework, we show that the optimal input distribution under those constraints is discrete with a finite number of mass points. We show that HPA significantly reduces the information energy capacity region. In addition, we derive a closed\-form expression of the capacity achieving distribution for the low PP regime, where there is no trade-off between information and energy transfer. For the case with time-varying PP constraints, we prove that the optimal input distribution has a finite support by using Shannon? coding scheme. Specifically, we numerically study a particular scenario for the time-varying PP constraints, where the PP constraint probabilistically is either zero or equal to a non-zero constant.

Read more
Information Theory

Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective

We study the information leakage to a guessing adversary in zero-error source coding. The source coding problem is defined by a confusion graph capturing the distinguishability between source symbols. The information leakage is measured by the ratio of the adversary's successful guessing probability after and before eavesdropping the codeword, maximized over all possible source distributions. Such measurement under the basic adversarial model where the adversary makes a single guess and allows no distortion between its estimator and the true sequence is known as the maximum min-entropy leakage or the maximal leakage in the literature. We develop a single-letter characterization of the optimal normalized leakage under the basic adversarial model, together with an optimum-achieving scalar stochastic mapping scheme. An interesting observation is that the optimal normalized leakage is equal to the optimal compression rate with fixed-length source codes, both of which can be simultaneously achieved by some deterministic coding schemes. We then extend the leakage measurement to generalized adversarial models where the adversary makes multiple guesses and allows certain level of distortion, for which we derive single-letter lower and upper bounds.

Read more

Ready to get started?

Join us today