Featured Researches

Information Theory

Mosaics of combinatorial designs for information-theoretic security

We study security functions which can serve to establish semantic security for the two central problems of information-theoretic security: the wiretap channel, and privacy amplification for secret key generation. The security functions are functional forms of mosaics of combinatorial designs, more precisely, of group divisible designs and balanced incomplete block designs. Every member of a mosaic is associated with a unique color, and each color corresponds to a unique message or key value. Every block index of the mosaic corresponds to a public seed shared between the two trusted communicating parties. The seed set should be as small as possible. We give explicit examples which have an optimal or nearly optimal trade-off of seed length versus color (i.e., message or key) rate. We also derive bounds for the security performance of security functions given by functional forms of mosaics of designs.

Read more
Information Theory

Moving Object Classification with a Sub-6 GHz Massive MIMO Array using Real Data

Classification between different activities in an indoor environment using wireless signals is an emerging technology for various applications, including intrusion detection, patient care, and smart home. Researchers have shown different methods to classify activities and their potential benefits by utilizing WiFi signals. In this paper, we analyze classification of moving objects by employing machine learning on real data from a massive multi-input-multi-output (MIMO) system in an indoor environment. We conduct measurements for different activities in both line-of-sight and non line-of-sight scenarios with a massive MIMO testbed operating at 3.7 GHz. We propose algorithms to exploit amplitude and phase-based features classification task. For the considered setup, we benchmark the classification performance and show that we can achieve up to 98% accuracy using real massive MIMO data, even with a small number of experiments. Furthermore, we demonstrate the gain in performance results with a massive MIMO system as compared with that of a limited number of antennas such as in WiFi devices.

Read more
Information Theory

Multi-Beam Multi-Hop Routing for Intelligent Reflecting Surfaces Aided Massive MIMO

Intelligent reflecting surface (IRS) is envisioned to play a significant role in future wireless communication systems as an effective means of reconfiguring the radio signal propagation environment. In this paper, we study a new multi-IRS aided massive multiple-input multiple-output (MIMO) system, where a multi-antenna BS transmits independent messages to a set of remote single-antenna users using orthogonal beams that are subsequently reflected by different groups of IRSs via their respective multi-hop passive beamforming over pairwise line-of-sight (LoS) links. We aim to select optimal IRSs and their beam routing path for each of the users, along with the active/passive beamforming at the BS/IRSs, such that the minimum received signal power among all users is maximized. This problem is particularly difficult to solve due to a new type of path separation constraints for avoiding the IRS-reflected signal induced interference among different users. To tackle this difficulty, we first derive the optimal BS/IRS active/passive beamforming solutions based on their practical codebooks given the reflection paths. Then we show that the resultant multi-beam multi-hop routing problem can be recast as an equivalent graph-optimization problem, which is however NP-complete. To solve this challenging problem, we propose an efficient recursive algorithm to partially enumerate the feasible routing solutions, which is able to effectively balance the performance-complexity trade-off. Numerical results demonstrate that the proposed algorithm achieves near-optimal performance with low complexity and outperforms other benchmark schemes. Useful insights into the optimal multi-beam multi-hop routing design are also drawn under different setups of the multi-IRS aided massive MIMO network.

Read more
Information Theory

Multi-Cell Mobile Edge Computing: Joint Service Migration and Resource Allocation

Mobile-edge computing (MEC) enhances the capacities and features of mobile devices by offloading computation-intensive tasks over wireless networks to edge servers. One challenge faced by the deployment of MEC in cellular networks is to support user mobility. As a result, offloaded tasks can be seamlessly migrated between base stations (BSs) without compromising the resource-utilization efficiency and link reliability. In this paper, we tackle the challenge by optimizing the policy for migration/handover between BSs by jointly managing computation-and-radio resources. The objectives are twofold: maximizing the sum offloading rate, quantifying MEC throughput, and minimizing the migration cost. The policy design is formulated as a decision-optimization problem that accounts for virtualization, I/O interference between virtual machines (VMs), and wireless multi-access. To solve the complex combinatorial problem, we develop an efficient relaxation-and-rounding based solution approach. The approach relies on an optimal iterative algorithm for solving the integer-relaxed problem and a novel integer-recovery design. The latter outperforms the traditional rounding method by exploiting the derived problem properties and applying matching theory. In addition, we also consider the design for a special case of "hotspot mitigation", referring to alleviating an overloaded server/BS by migrating its load to the nearby idle servers/BSs. From simulation results, we observed close-to-optimal performance of the proposed migration policies under various settings. This demonstrates their efficiency in computation-and-radio resource management for joint service migration and BS handover in multi-cell MEC networks.

Read more
Information Theory

Multi-Class Unsourced Random Access via Coded Demixing

Unsourced random access (URA) is a recently proposed communication paradigm attuned to machine-driven data transfers. In the original URA formulation, all the active devices share the same number of bits per packet. The scenario where several classes of devices transmit concurrently has so far received little attention. An initial solution to this problem takes the form of group successive interference cancellation, where codewords from a class of devices with more resources are recovered first, followed by the decoding of the remaining messages. This article introduces a joint iterative decoding approach rooted in approximate message passing. This framework has a concatenated coding structure borrowed from the single-class coded compressed sensing and admits a solution that offers performance improvement at little added computational complexity. Our findings point to new connections between multi-class URA and compressive demixing. The performance of the envisioned algorithm is validated through numerical simulations.

Read more
Information Theory

Multi-Vehicle Velocity Estimation Using IEEE 802.11ad Waveform

Wireless communication systems are to use millimeter-wave (mmWave) spectra, which can enable extra radar functionalities. In this paper, we propose a multi-target velocity estimation technique using IEEE 802.11ad waveform in a vehicle-to-vehicle (V2V) scenario. We form a wide beam to consider multiple target vehicles. The Doppler shift of each vehicle is estimated from least square estimation (LSE) using the round-trip delay obtained from the auto-correlation property of Golay complementary sequences in IEEE 802.11ad waveform, and the phase wrapping is compensated by the Doppler shift estimates of proper two frames. Finally, the velocities of target vehicles are obtained from the estimated Doppler shifts. Simulation results show the proposed velocity estimation technique can achieve significantly high accuracy even for short coherent processing interval (CPI).

Read more
Information Theory

Multi-access Coded Caching Scheme with Linear Sub-packetization using PDAs

We consider multi-access coded caching problem introduced by Hachem this http URL., where each user has access to L neighboring caches in a cyclic wrap-around fashion. We focus on the deterministic schemes for a specific class of multi-access coded caching problem based on the concept of PDA. We construct new PDAs which specify the delivery scheme for the specific class of multi-access coded caching problem discussed in this paper. For the proposed scheme, the coding gain is larger than that of the state-of-the-art while the sub-packetization level varies only linearly with the number of users. Hence, we achieve a lower transmission rate with the least sub-packetization level compared to the existing schemes.

Read more
Information Theory

Multi-access Coded Caching from a New Class of Cross Resolvable Designs

Multi-access coded caching schemes from cross resolvable designs (CRD) have been reported recently \cite{KNRarXiv}. To be able to compare coded caching schemes with different number of users and possibly with different number of caches a new metric called rate-per-user was introduced and it was shown that under this new metric the schemes from CRDs perform better than the Maddah-Ali-Niesen scheme in the large memory regime. In this paper a new class of CRDs is presented and it is shown that the multi-access coded caching schemes derived from these CRDs perform better than the Maddah-Ali-Niesen scheme in the entire memory regime. Comparison with other known multi-access coding schemes is also presented.

Read more
Information Theory

Multilevel Topological Interference Management: A TIM-TIN Perspective

The robust principles of treating interference as noise (TIN) when it is sufficiently weak, and avoiding it when it is not, form the background of this work. Combining TIN with the topological interference management (TIM) framework that identifies optimal interference avoidance schemes, we formulate a TIM-TIN problem for multilevel topological interference management, wherein only a coarse knowledge of channel strengths and no knowledge of channel phases is available to transmitters. To address the TIM-TIN problem, we first propose an analytical baseline approach, which decomposes a network into TIN and TIM components, allocates the signal power levels to each user in the TIN component, allocates signal vector space dimensions to each user in the TIM component, and guarantees that the product of the two is an achievable number of signal dimensions available to each user in the original network. Next, a distributed numerical algorithm called ZEST is developed. The convergence of the algorithm is demonstrated, leading to the duality of the TIM-TIN problem (in terms of GDoF). Numerical results are also provided to demonstrate the superior sum-rate performance and fast convergence of ZEST.

Read more
Information Theory

Multipair Two-Way DF Relaying with Cell-Free Massive MIMO

We consider a two-way half-duplex decode-and-forward (DF) relaying system with multiple pairs of single-antenna users assisted by a cell-free (CF) massive multiple-input multiple-output (mMIMO) architecture with multiple-antenna access points (APs). Under the practical constraint of imperfect channel state information (CSI), we derive the achievable sum spectral efficiency (SE) for a finite number of APs with maximum ratio (MR) linear processing for both reception and transmission in closed-form. Notably, the proposed CF mMIMO relaying architecture, exploiting the spatial diversity, and providing better coverage, outperforms the conventional collocated mMIMO deployment. Moreover, we shed light on the power-scaling laws maintaining a specific SE as the number of APs grows. A thorough examination of the interplay between the transmit powers per pilot symbol and user/APs takes place, and useful conclusions are extracted. Finally, differently to the common approach for power control in CF mMIMO systems, we design a power allocation scheme maximizing the sum SE.

Read more

Ready to get started?

Join us today