-
The Inverted 3-Sum Box: General Formulation and Quantum Information Theoretic Optimality
Authors:
Yuhang Yao,
Syed A. Jafar
Abstract:
The $N$-sum box protocol specifies a class of $\mathbb{F}_d$ linear functions $f(W_1,\cdots,W_K)=V_1W_1+V_2W_2+\cdots+V_KW_K\in\mathbb{F}_d^{m\times 1}$ that can be computed at information theoretically optimal communication cost (minimum number of qudits $Δ_1,\cdots,Δ_K$ sent by the transmitters Alice$_1$, Alice$_2$,$\cdots$, Alice$_K$, respectively, to the receiver, Bob, per computation instance…
▽ More
The $N$-sum box protocol specifies a class of $\mathbb{F}_d$ linear functions $f(W_1,\cdots,W_K)=V_1W_1+V_2W_2+\cdots+V_KW_K\in\mathbb{F}_d^{m\times 1}$ that can be computed at information theoretically optimal communication cost (minimum number of qudits $Δ_1,\cdots,Δ_K$ sent by the transmitters Alice$_1$, Alice$_2$,$\cdots$, Alice$_K$, respectively, to the receiver, Bob, per computation instance) over a noise-free quantum multiple access channel (QMAC), when the input data streams $W_k\in\mathbb{F}_d^{m_k\times 1}, k\in[K]$, originate at the distributed transmitters, who share quantum entanglement in advance but are not otherwise allowed to communicate with each other. In prior work this set of optimally computable functions is identified in terms of a strong self-orthogonality (SSO) condition on the transfer function of the $N$-sum box. In this work we consider an `inverted' scenario, where instead of a feasible $N$-sum box transfer function, we are given an arbitrary $\mathbb{F}_d$ linear function, i.e., arbitrary matrices $V_k\in\mathbb{F}_d^{m\times m_k}$ are specified, and the goal is to characterize the set of all feasible communication cost tuples $(Δ_1,\cdots,Δ_K)$, not just based on $N$-sum box protocols, but across all possible quantum coding schemes. As our main result, we fully solve this problem for $K=3$ transmitters ($K\geq 4$ settings remain open). Coding schemes based on the $N$-sum box protocol (along with elementary ideas such as treating qudits as classical dits, time-sharing and batch-processing) are shown to be information theoretically optimal in all cases. As an example, in the symmetric case where rk$(V_1)$=rk$(V_2)$=rk$(V_3) \triangleq r_1$, rk$([V_1, V_2])$=rk$([V_2, V_3])$=rk$([V_3, V_1])\triangleq r_2$, and rk$([V_1, V_2, V_3])\triangleq r_3$ (rk = rank), the minimum total-download cost is $\max \{1.5r_1 + 0.75(r_3 - r_2), r_3\}$.
△ Less
Submitted 1 July, 2024;
originally announced July 2024.
-
Aging modeling and lifetime prediction of a proton exchange membrane fuel cell using an extended Kalman filter
Authors:
Serigne Daouda Pene,
Antoine Picot,
Fabrice Gamboa,
Nicolas Savy,
Christophe Turpin,
Amine Jaafar
Abstract:
This article presents a methodology that aims to model and to provide predictive capabilities for the lifetime of Proton Exchange Membrane Fuel Cell (PEMFC). The approach integrates parametric identification, dynamic modeling, and Extended Kalman Filtering (EKF). The foundation is laid with the creation of a representative aging database, emphasizing specific operating conditions. Electrochemical…
▽ More
This article presents a methodology that aims to model and to provide predictive capabilities for the lifetime of Proton Exchange Membrane Fuel Cell (PEMFC). The approach integrates parametric identification, dynamic modeling, and Extended Kalman Filtering (EKF). The foundation is laid with the creation of a representative aging database, emphasizing specific operating conditions. Electrochemical behavior is characterized through the identification of critical parameters. The methodology extends to capture the temporal evolution of the identified parameters. We also address challenges posed by the limiting current density through a differential analysis-based modeling technique and the detection of breakpoints. This approach, involving Monte Carlo simulations, is coupled with an EKF for predicting voltage degradation. The Remaining Useful Life (RUL) is also estimated. The results show that our approach accurately predicts future voltage and RUL with very low relative errors.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
JUNO Sensitivity to Invisible Decay Modes of Neutrons
Authors:
JUNO Collaboration,
Angel Abusleme,
Thomas Adam,
Kai Adamowicz,
Shakeel Ahmad,
Rizwan Ahmed,
Sebastiano Aiello,
Fengpeng An,
Qi An,
Giuseppe Andronico,
Nikolay Anfimov,
Vito Antonelli,
Tatiana Antoshkina,
João Pedro Athayde Marcondes de André,
Didier Auguste,
Weidong Bai,
Nikita Balashov,
Wander Baldini,
Andrea Barresi,
Davide Basilico,
Eric Baussan,
Marco Bellato,
Marco Beretta,
Antonio Bergnoli,
Daniel Bick
, et al. (635 additional authors not shown)
Abstract:
We explore the bound neutrons decay into invisible particles (e.g., $n\rightarrow 3 ν$ or $nn \rightarrow 2 ν$) in the JUNO liquid scintillator detector. The invisible decay includes two decay modes: $ n \rightarrow { inv} $ and $ nn \rightarrow { inv} $. The invisible decays of $s$-shell neutrons in $^{12}{\rm C}$ will leave a highly excited residual nucleus. Subsequently, some de-excitation mode…
▽ More
We explore the bound neutrons decay into invisible particles (e.g., $n\rightarrow 3 ν$ or $nn \rightarrow 2 ν$) in the JUNO liquid scintillator detector. The invisible decay includes two decay modes: $ n \rightarrow { inv} $ and $ nn \rightarrow { inv} $. The invisible decays of $s$-shell neutrons in $^{12}{\rm C}$ will leave a highly excited residual nucleus. Subsequently, some de-excitation modes of the excited residual nuclei can produce a time- and space-correlated triple coincidence signal in the JUNO detector. Based on a full Monte Carlo simulation informed with the latest available data, we estimate all backgrounds, including inverse beta decay events of the reactor antineutrino $\barν_e$, natural radioactivity, cosmogenic isotopes and neutral current interactions of atmospheric neutrinos. Pulse shape discrimination and multivariate analysis techniques are employed to further suppress backgrounds. With two years of exposure, JUNO is expected to give an order of magnitude improvement compared to the current best limits. After 10 years of data taking, the JUNO expected sensitivities at a 90% confidence level are $τ/B( n \rightarrow { inv} ) > 5.0 \times 10^{31} \, {\rm yr}$ and $τ/B( nn \rightarrow { inv} ) > 1.4 \times 10^{32} \, {\rm yr}$.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Blind Interference Alignment for MapReduce: Exploiting Side-information with Reconfigurable Antennas
Authors:
Yuxiang Lu,
Syed A. Jafar
Abstract:
In order to explore how blind interference alignment (BIA) schemes may take advantage of side-information in computation tasks, we study the degrees of freedom (DoF) of a $K$ user wireless network setting that arises in full-duplex wireless MapReduce applications. In this setting the receivers are assumed to have reconfigurable antennas and channel knowledge, while the transmitters have neither, i…
▽ More
In order to explore how blind interference alignment (BIA) schemes may take advantage of side-information in computation tasks, we study the degrees of freedom (DoF) of a $K$ user wireless network setting that arises in full-duplex wireless MapReduce applications. In this setting the receivers are assumed to have reconfigurable antennas and channel knowledge, while the transmitters have neither, i.e., the transmitters lack channel knowledge and are only equipped with conventional antennas. The central ingredient of the problem formulation is the message structure arising out of MapReduce, whereby each transmitter has a subset of messages that need to be delivered to various receivers, and each receiver has a subset of messages available to it in advance as side-information. The challenge resides in both achievability and converse arguments. Unlike conventional BIA where alignments occur only within the symbols of the same message (intra-message) the new achievable scheme also requires inter-message alignments, as well as an outer MDS (maximum distance separable) code structure. The scheme emerges from two essential ideas: 1) understanding the DoF of a $K$ user vector broadcast channel with groupcast messages, and 2) a mapping of messages from the broadcast setting to the MapReduce setting that makes use of inter-message alignment. On the converse side, whereas prior BIA converse bounds relied only on a compound channel argument, in the new setting our converse bounds also require a statistical equivalence assumption.
△ Less
Submitted 14 April, 2024;
originally announced April 2024.
-
MR.CAP: Multi-Robot Joint Control and Planning for Object Transport
Authors:
Hussein Ali Jaafar,
Cheng-Hao Kao,
Sajad Saeedi
Abstract:
With the recent influx in demand for multi-robot systems throughout industry and academia, there is an increasing need for faster, robust, and generalizable path planning algorithms. Similarly, given the inherent connection between control algorithms and multi-robot path planners, there is in turn an increased demand for fast, efficient, and robust controllers. We propose a scalable joint path pla…
▽ More
With the recent influx in demand for multi-robot systems throughout industry and academia, there is an increasing need for faster, robust, and generalizable path planning algorithms. Similarly, given the inherent connection between control algorithms and multi-robot path planners, there is in turn an increased demand for fast, efficient, and robust controllers. We propose a scalable joint path planning and control algorithm for multi-robot systems with constrained behaviours based on factor graph optimization. We demonstrate our algorithm on a series of hardware and simulated experiments. Our algorithm is consistently able to recover from disturbances and avoid obstacles while outperforming state-of-the-art methods in optimization time, path deviation, and inter-robot errors. See the code and supplementary video for experiments.
△ Less
Submitted 21 January, 2024;
originally announced January 2024.
-
A Kannappan-sine subtraction law on semigroups
Authors:
Ahmed Jafar,
Omar Ajebbar,
Elhoucien Elqorachi
Abstract:
Let $S$ be a semigroup, $z_0$ a fixed element in $S$ and $σ:S \longrightarrow S$ an involutive automorphism. We determine the complex-valued solutions of Kannappan-sine subtraction law $f(xσ(y)z_0)=f(x)g(y)-f(y)g(x),\; x,y \in S$. As an application we solve the following variant of Kannappan-sine subtraction law viz. $f(xσ(y)z_0)=f(x)g(y)-f(y)g(x)+λg(xσ(y)z_0) ,\; x,y \in S,$ where…
▽ More
Let $S$ be a semigroup, $z_0$ a fixed element in $S$ and $σ:S \longrightarrow S$ an involutive automorphism. We determine the complex-valued solutions of Kannappan-sine subtraction law $f(xσ(y)z_0)=f(x)g(y)-f(y)g(x),\; x,y \in S$. As an application we solve the following variant of Kannappan-sine subtraction law viz. $f(xσ(y)z_0)=f(x)g(y)-f(y)g(x)+λg(xσ(y)z_0) ,\; x,y \in S,$ where $λ\in \mathbb{C}^{*}$. The continuous solutions on topological semigroups are given and an example to illustrate the main results is also given.
△ Less
Submitted 8 December, 2023;
originally announced January 2024.
-
Compositional Zero-Shot Learning for Attribute-Based Object Reference in Human-Robot Interaction
Authors:
Peng Gao,
Ahmed Jaafar,
Brian Reily,
Christopher Reardon,
Hao Zhang
Abstract:
Language-enabled robots have been widely studied over the past years to enable natural human-robot interaction and teaming in various real-world applications. Language-enabled robots must be able to comprehend referring expressions to identify a particular object from visual perception using a set of referring attributes extracted from natural language. However, visual observations of an object ma…
▽ More
Language-enabled robots have been widely studied over the past years to enable natural human-robot interaction and teaming in various real-world applications. Language-enabled robots must be able to comprehend referring expressions to identify a particular object from visual perception using a set of referring attributes extracted from natural language. However, visual observations of an object may not be available when it is referred to, and the number of objects and attributes may also be unbounded in open worlds. To address the challenges, we implement an attribute-based compositional zero-shot learning method that uses a list of attributes to perform referring expression comprehension in open worlds. We evaluate the approach on two datasets including the MIT-States and the Clothing 16K. The preliminary experimental results show that our implemented approach allows a robot to correctly identify the objects referred to by human commands.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Do Physicians Know How to Prompt? The Need for Automatic Prompt Optimization Help in Clinical Note Generation
Authors:
Zonghai Yao,
Ahmed Jaafar,
Beining Wang,
Zhichao Yang,
Hong Yu
Abstract:
This study examines the effect of prompt engineering on the performance of Large Language Models (LLMs) in clinical note generation. We introduce an Automatic Prompt Optimization (APO) framework to refine initial prompts and compare the outputs of medical experts, non-medical experts, and APO-enhanced GPT3.5 and GPT4. Results highlight GPT4 APO's superior performance in standardizing prompt qualit…
▽ More
This study examines the effect of prompt engineering on the performance of Large Language Models (LLMs) in clinical note generation. We introduce an Automatic Prompt Optimization (APO) framework to refine initial prompts and compare the outputs of medical experts, non-medical experts, and APO-enhanced GPT3.5 and GPT4. Results highlight GPT4 APO's superior performance in standardizing prompt quality across clinical note sections. A human-in-the-loop approach shows that experts maintain content quality post-APO, with a preference for their own modifications, suggesting the value of expert customization. We recommend a two-phase optimization process, leveraging APO-GPT4 for consistency and expert input for personalization.
△ Less
Submitted 5 July, 2024; v1 submitted 16 November, 2023;
originally announced November 2023.
-
Capacity of Summation over a Symmetric Quantum Erasure MAC with Partially Replicated Inputs
Authors:
Yuhang Yao,
Syed A. Jafar
Abstract:
The optimal quantum communication cost of computing a classical sum of distributed sources is studied over a quantum erasure multiple access channel (QEMAC). K classical messages comprised of finite-field symbols are distributed across $S$ servers, who also share quantum entanglement in advance. Each server $s\in[S]$ manipulates its quantum subsystem $\mathcal{Q}_s$ according to its own available…
▽ More
The optimal quantum communication cost of computing a classical sum of distributed sources is studied over a quantum erasure multiple access channel (QEMAC). K classical messages comprised of finite-field symbols are distributed across $S$ servers, who also share quantum entanglement in advance. Each server $s\in[S]$ manipulates its quantum subsystem $\mathcal{Q}_s$ according to its own available classical messages and sends $\mathcal{Q}_s$ to the receiver who then computes the sum of the messages based on a joint quantum measurement. The download cost from Server $s\in [S]$ is the logarithm of the dimension of $\mathcal{Q}_s$. The rate $R$ is defined as the number of instances of the sum computed at the receiver, divided by the total download cost from all the servers. The main focus is on the symmetric setting with $K= {S \choose α} $ messages where each message is replicated among a unique subset of $α$ servers, and the answers from any $β$ servers may be erased. If no entanglement is initially available to the receiver, then we show that the capacity (maximal rate) is precisely $C= \max\left\{ \min \left\{ \frac{2(α-β)}{S}, \frac{S-2β}{S} \right\}, \frac{α-β}{S} \right\}$. The capacity with arbitrary levels of prior entanglement $(Δ_0)$ between the $S$ data-servers and the receiver is also characterized, by including an auxiliary server (Server $0$) that has no classical data, so that the communication cost from Server $0$ is a proxy for the amount of receiver-side entanglement that is available in advance. The challenge on the converse side resides in the optimal application of the weak monotonicity property, while the achievability combines ideas from classical network coding and treating qudits as classical dits, as well as new constructions based on the $N$-sum box abstraction that rely on absolutely maximally entangled quantum states.
△ Less
Submitted 15 May, 2024; v1 submitted 14 November, 2023;
originally announced November 2023.
-
A Coding Scheme for Unresponsive and Byzantine Server Resilient Quantum $X$-Secure $T$-Private Information Retrieval
Authors:
Yuxiang Lu,
Syed A. Jafar
Abstract:
Building on recent constructions of Quantum Cross Subspace Alignment (QCSA) codes, this work develops a coding scheme for QEBXSTPIR, i.e., classical private information retrieval with $X$-secure storage and $T$-private queries, over a quantum multiple access channel, that is resilient to any set of up to $E$ erased servers (equivalently known as unresponsive servers, or stragglers) together with a…
▽ More
Building on recent constructions of Quantum Cross Subspace Alignment (QCSA) codes, this work develops a coding scheme for QEBXSTPIR, i.e., classical private information retrieval with $X$-secure storage and $T$-private queries, over a quantum multiple access channel, that is resilient to any set of up to $E$ erased servers (equivalently known as unresponsive servers, or stragglers) together with any set of up to $B$ Byzantine servers. The scheme is accordingly labeled QEBCSA, with the `E' and `B' indicating resilience to erased and Byzantine servers respectively. The QEBCSA code structure may be broadly useful for problems such as quantum coded secure distributed computation, where security, straggler resilience, and distributed superdense coding gains are simultaneously required. The $X$-security property is further exploited to improve the communication rate when $ε$-error decoding is allowed.
△ Less
Submitted 25 February, 2024; v1 submitted 13 November, 2023;
originally announced November 2023.
-
Electronic transport through the phtalocyanine molecule in atomic contacts Co
Authors:
Ali Jaafar,
Tarek Khalil
Abstract:
The effect of magnetic STM-tip on electronic, magnetic and electronic transport properties through the molecule junction STM-tip-Co/CoPc/Co(111), has been investigated by mean of ab initio electronic structure calculations. The spin transition has been studied by varying the distance (passing from the tunneling regime to the contact regime) between the tip and the CoPc molecule in both configurati…
▽ More
The effect of magnetic STM-tip on electronic, magnetic and electronic transport properties through the molecule junction STM-tip-Co/CoPc/Co(111), has been investigated by mean of ab initio electronic structure calculations. The spin transition has been studied by varying the distance (passing from the tunneling regime to the contact regime) between the tip and the CoPc molecule in both configurations, parallel and anti-parallel. Our calculation shows that the transition of spin of the Co atom of CoPc molecule has led to a change of the sign of the Magneto-Resistance (MR). It is also shown that the characteristic I-V has been influenced by this spin-transition of central atom of CoPc molecule.
△ Less
Submitted 7 October, 2023;
originally announced October 2023.
-
Real-time Monitoring for the Next Core-Collapse Supernova in JUNO
Authors:
Angel Abusleme,
Thomas Adam,
Shakeel Ahmad,
Rizwan Ahmed,
Sebastiano Aiello,
Muhammad Akram,
Abid Aleem,
Fengpeng An,
Qi An,
Giuseppe Andronico,
Nikolay Anfimov,
Vito Antonelli,
Tatiana Antoshkina,
Burin Asavapibhop,
João Pedro Athayde Marcondes de André,
Didier Auguste,
Weidong Bai,
Nikita Balashov,
Wander Baldini,
Andrea Barresi,
Davide Basilico,
Eric Baussan,
Marco Bellato,
Marco Beretta,
Antonio Bergnoli
, et al. (606 additional authors not shown)
Abstract:
The core-collapse supernova (CCSN) is considered one of the most energetic astrophysical events in the universe. The early and prompt detection of neutrinos before (pre-SN) and during the supernova (SN) burst presents a unique opportunity for multi-messenger observations of CCSN events. In this study, we describe the monitoring concept and present the sensitivity of the system to pre-SN and SN neu…
▽ More
The core-collapse supernova (CCSN) is considered one of the most energetic astrophysical events in the universe. The early and prompt detection of neutrinos before (pre-SN) and during the supernova (SN) burst presents a unique opportunity for multi-messenger observations of CCSN events. In this study, we describe the monitoring concept and present the sensitivity of the system to pre-SN and SN neutrinos at the Jiangmen Underground Neutrino Observatory (JUNO), a 20 kton liquid scintillator detector currently under construction in South China. The real-time monitoring system is designed to ensure both prompt alert speed and comprehensive coverage of progenitor stars. It incorporates prompt monitors on the electronic board as well as online monitors at the data acquisition stage. Assuming a false alert rate of 1 per year, this monitoring system exhibits sensitivity to pre-SN neutrinos up to a distance of approximately 1.6 (0.9) kiloparsecs and SN neutrinos up to about 370 (360) kiloparsecs for a progenitor mass of 30 solar masses, considering both normal and inverted mass ordering scenarios. The pointing ability of the CCSN is evaluated by analyzing the accumulated event anisotropy of inverse beta decay interactions from pre-SN or SN neutrinos. This, along with the early alert, can play a crucial role in facilitating follow-up multi-messenger observations of the next galactic or nearby extragalactic CCSN.
△ Less
Submitted 4 December, 2023; v1 submitted 13 September, 2023;
originally announced September 2023.
-
Improving Deep Attractor Network by BGRU and GMM for Speech Separation
Authors:
Rawad Melhem,
Assef Jafar,
Riad Hamadeh
Abstract:
Deep Attractor Network (DANet) is the state-of-the-art technique in speech separation field, which uses Bidirectional Long Short-Term Memory (BLSTM), but the complexity of the DANet model is very high. In this paper, a simplified and powerful DANet model is proposed using Bidirectional Gated neural network (BGRU) instead of BLSTM. The Gaussian Mixture Model (GMM) other than the k-means was applied…
▽ More
Deep Attractor Network (DANet) is the state-of-the-art technique in speech separation field, which uses Bidirectional Long Short-Term Memory (BLSTM), but the complexity of the DANet model is very high. In this paper, a simplified and powerful DANet model is proposed using Bidirectional Gated neural network (BGRU) instead of BLSTM. The Gaussian Mixture Model (GMM) other than the k-means was applied in DANet as a clustering algorithm to reduce the complexity and increase the learning speed and accuracy. The metrics used in this paper are Signal to Distortion Ratio (SDR), Signal to Interference Ratio (SIR), Signal to Artifact Ratio (SAR), and Perceptual Evaluation Speech Quality (PESQ) score. Two speaker mixture datasets from TIMIT corpus were prepared to evaluate the proposed model, and the system achieved 12.3 dB and 2.94 for SDR and PESQ scores respectively, which were better than the original DANet model. Other improvements were 20.7% and 17.9% in the number of parameters and time training, respectively. The model was applied on mixed Arabic speech signals and the results were better than that in English.
△ Less
Submitted 7 August, 2023;
originally announced August 2023.
-
On the Capacity of Secure $K$-user Product Computation over a Quantum MAC
Authors:
Yuxiang Lu,
Yuhang Yao,
Syed A. Jafar
Abstract:
Inspired by recent work by Christensen and Popovski on secure $2$-user product computation for finite-fields of prime-order over a quantum multiple access channel, the generalization to $K$ users and arbitrary finite fields is explored. Asymptotically optimal (capacity-achieving for large alphabet) schemes are proposed. Additionally, the capacity of modulo-$d$ ($d\geq 2$) secure $K$-sum computatio…
▽ More
Inspired by recent work by Christensen and Popovski on secure $2$-user product computation for finite-fields of prime-order over a quantum multiple access channel, the generalization to $K$ users and arbitrary finite fields is explored. Asymptotically optimal (capacity-achieving for large alphabet) schemes are proposed. Additionally, the capacity of modulo-$d$ ($d\geq 2$) secure $K$-sum computation is shown to be $2/K$ computations/qudit, generalizing a result of Nishimura and Kawachi beyond binary, and improving upon it for odd $K$.
△ Less
Submitted 28 August, 2023; v1 submitted 31 May, 2023;
originally announced May 2023.
-
Towards Solving Cocktail-Party: The First Method to Build a Realistic Dataset with Ground Truths for Speech Separation
Authors:
Rawad Melhem,
Assef Jafar,
Oumayma Al Dakkak
Abstract:
Speech separation is very important in real-world applications such as human-machine interaction, hearing aids devices, and automatic meeting transcription. In recent years, a significant improvement occurred towards the solution based on deep learning. In fact, much attention has been drawn to supervised learning methods using synthetic mixtures datasets despite their being not representative of…
▽ More
Speech separation is very important in real-world applications such as human-machine interaction, hearing aids devices, and automatic meeting transcription. In recent years, a significant improvement occurred towards the solution based on deep learning. In fact, much attention has been drawn to supervised learning methods using synthetic mixtures datasets despite their being not representative of real-world mixtures. The difficulty in building a realistic dataset led researchers to use unsupervised learning methods, because of their ability to handle realistic mixtures directly. The results of unsupervised learning methods are still unconvincing. In this paper, a method is introduced to create a realistic dataset with ground truth sources for speech separation. The main challenge in designing a realistic dataset is the unavailability of ground truths for speakers signals. To address this, we propose a method for simultaneously recording two speakers and obtaining the ground truth for each. We present a methodology for benchmarking our realistic dataset using a deep learning model based on Bidirectional Gated Recurrent Units (BGRU) and clustering algorithm. The experiments show that our proposed dataset improved SI-SDR (Scale Invariant Signal to Distortion Ratio) by 1.65 dB and PESQ (Perceptual Evaluation of Speech Quality) by approximately 0.5. We also evaluated the effectiveness of our method at different distances between the microphone and the speakers and found that it improved the stability of the learned model.
△ Less
Submitted 28 August, 2024; v1 submitted 25 May, 2023;
originally announced May 2023.
-
The Capacity of Classical Summation over a Quantum MAC with Arbitrarily Distributed Inputs and Entanglements
Authors:
Yuhang Yao,
Syed A. Jafar
Abstract:
The $Σ$-QMAC problem is introduced, involving $S$ servers, $K$ classical ($\mathbb{F}_d$) data streams, and $T$ independent quantum systems. Data stream ${\sf W}_k, k\in[K]$ is replicated at a subset of servers $\mathcal{W}(k)\subset[S]$, and quantum system $\mathcal{Q}_t, t\in[T]$ is distributed among a subset of servers $\mathcal{E}(t)\subset[S]$ such that Server $s\in\mathcal{E}(t)$ receives su…
▽ More
The $Σ$-QMAC problem is introduced, involving $S$ servers, $K$ classical ($\mathbb{F}_d$) data streams, and $T$ independent quantum systems. Data stream ${\sf W}_k, k\in[K]$ is replicated at a subset of servers $\mathcal{W}(k)\subset[S]$, and quantum system $\mathcal{Q}_t, t\in[T]$ is distributed among a subset of servers $\mathcal{E}(t)\subset[S]$ such that Server $s\in\mathcal{E}(t)$ receives subsystem $\mathcal{Q}_{t,s}$ of $\mathcal{Q}_t=(\mathcal{Q}_{t,s})_{s\in\mathcal{E}(t)}$. Servers manipulate their quantum subsystems according to their data and send the subsystems to a receiver. The total download cost is $\sum_{t\in[T]}\sum_{s\in\mathcal{E}(t)}\log_d|\mathcal{Q}_{t,s}|$ qudits, where $|\mathcal{Q}|$ is the dimension of $\mathcal{Q}$. The states and measurements of $(\mathcal{Q}_t)_{t\in[T]}$ are required to be separable across $t\in[T]$ throughout, but for each $t\in[T]$, the subsystems of $\mathcal{Q}_{t}$ can be prepared initially in an arbitrary (independent of data) entangled state, manipulated arbitrarily by the respective servers, and measured jointly by the receiver. From the measurements, the receiver must recover the sum of all data streams. Rate is defined as the number of dits ($\mathbb{F}_d$ symbols) of the desired sum computed per qudit of download. The capacity of $Σ$-QMAC, i.e., the supremum of achievable rates is characterized for arbitrary data replication and entanglement distribution maps $\mathcal{W}, \mathcal{E}$. Coding based on the $N$-sum box abstraction is optimal in every case. Notably, for every $S\neq 3$ there exists an instance of the $Σ$-QMAC where $S$-party entanglement is necessary to achieve the fully entangled capacity.
△ Less
Submitted 5 May, 2024; v1 submitted 4 May, 2023;
originally announced May 2023.
-
A Kannappan-cosine functional equation on semigroups
Authors:
Ahmed Jafar,
Omar Ajebbar,
Elhoucien Elqorachi
Abstract:
We determine the complex-valued solutions of the Kannappan cosine functional law $g(xyz_{0})=g(x)g(y)-f(x)f(y)$, $x,y\in S$, where $S$ is a semigroup and $z_{0}$ is a fixed element in $S.$
We determine the complex-valued solutions of the Kannappan cosine functional law $g(xyz_{0})=g(x)g(y)-f(x)f(y)$, $x,y\in S$, where $S$ is a semigroup and $z_{0}$ is a fixed element in $S.$
△ Less
Submitted 1 May, 2023;
originally announced May 2023.
-
Quantum Cross Subspace Alignment Codes via the $N$-sum Box Abstraction
Authors:
Yuxiang Lu,
Syed Ali Jafar
Abstract:
Cross-subspace alignment (CSA) codes are used in various private information retrieval (PIR) schemes (e.g., with secure storage) and in secure distributed batch matrix multiplication (SDBMM). Using a recently developed $N$-sum box abstraction of a quantum multiple-access channel (QMAC), we translate CSA schemes over classical multiple-access channels into efficient quantum CSA schemes over a QMAC,…
▽ More
Cross-subspace alignment (CSA) codes are used in various private information retrieval (PIR) schemes (e.g., with secure storage) and in secure distributed batch matrix multiplication (SDBMM). Using a recently developed $N$-sum box abstraction of a quantum multiple-access channel (QMAC), we translate CSA schemes over classical multiple-access channels into efficient quantum CSA schemes over a QMAC, achieving maximal superdense coding gain. Because of the $N$-sum box abstraction, the underlying problem of coding to exploit quantum entanglements for CSA schemes, becomes conceptually equivalent to that of designing a channel matrix for a MIMO MAC subject to given structural constraints imposed by the $N$-sum box abstraction, such that the resulting MIMO MAC is able to implement the functionality of a CSA scheme (encoding/decoding) over-the-air. Applications include Quantum PIR with secure and MDS-coded storage, as well as Quantum SDBMM.
△ Less
Submitted 28 April, 2023;
originally announced April 2023.
-
A Kannappan-sine addition law on semigroups
Authors:
Ahmed Jafar,
Omar Ajebbar,
Elhoucien Elqorachi
Abstract:
Let $S$ be a semigroup and $z_{0}$ a fixed element in $S.$ We determine the complex-valued solutions of the following Kannappan-sine addition law $f(xyz_{0})=f(x)g(y)+f(y)g(x),x,y\in S.$
Let $S$ be a semigroup and $z_{0}$ a fixed element in $S.$ We determine the complex-valued solutions of the following Kannappan-sine addition law $f(xyz_{0})=f(x)g(y)+f(y)g(x),x,y\in S.$
△ Less
Submitted 4 April, 2023;
originally announced April 2023.
-
On the Generic Capacity of $K$-User Symmetric Linear Computation Broadcast
Authors:
Yuhang Yao,
Syed A. Jafar
Abstract:
Linear computation broadcast (LCBC) refers to a setting with $d$ dimensional data stored at a central server, where $K$ users, each with some prior linear side-information, wish to retrieve various linear combinations of the data. The goal is to determine the minimum amount of information that must be broadcast to satisfy all the users. The reciprocal of the optimal broadcast cost is the capacity…
▽ More
Linear computation broadcast (LCBC) refers to a setting with $d$ dimensional data stored at a central server, where $K$ users, each with some prior linear side-information, wish to retrieve various linear combinations of the data. The goal is to determine the minimum amount of information that must be broadcast to satisfy all the users. The reciprocal of the optimal broadcast cost is the capacity of LCBC. The capacity is known for up to $K=3$ users. Since LCBC includes index coding as a special case, large $K$ settings of LCBC are at least as hard as the index coding problem. Instead of the general setting (all instances), by focusing on the generic setting (almost all instances) this work shows that the generic capacity of the symmetric LCBC (where every user has $m'$ dimensions of side-information and $m$ dimensions of demand) for large number of users ($K>d$ suffices) is $C_g=1/Δ_g$, where $Δ_g=\min\left\{\max\{0,d-m'\}, \frac{dm}{m+m'}\right\}$, is the broadcast cost that is both achievable and unbeatable asymptotically almost surely for large $n$, among all LCBC instances with the given parameters $p,K,d,m,m'$. Relative to baseline schemes of random coding or separate transmissions, $C_g$ shows an extremal gain by a factor of $K$ as a function of number of users, and by a factor of $\approx d/4$ as a function of data dimensions, when optimized over remaining parameters. For arbitrary number of users, the generic capacity of the symmetric LCBC is characterized within a factor of $2$.
△ Less
Submitted 14 December, 2022; v1 submitted 15 September, 2022;
originally announced September 2022.
-
The Capacity of 3 User Linear Computation Broadcast
Authors:
Yuhang Yao,
Syed A. Jafar
Abstract:
The $K$ User Linear Computation Broadcast (LCBC) problem is comprised of $d$ dimensional data (from $\mathbb{F}_q$), that is fully available to a central server, and $K$ users, who require various linear computations of the data, and have prior knowledge of various linear functions of the data as side-information. The optimal broadcast cost is the minimum number of $q$-ary symbols to be broadcast…
▽ More
The $K$ User Linear Computation Broadcast (LCBC) problem is comprised of $d$ dimensional data (from $\mathbb{F}_q$), that is fully available to a central server, and $K$ users, who require various linear computations of the data, and have prior knowledge of various linear functions of the data as side-information. The optimal broadcast cost is the minimum number of $q$-ary symbols to be broadcast by the server per computation instance, for every user to retrieve its desired computation. The reciprocal of the optimal broadcast cost is called the capacity. The main contribution of this paper is the exact capacity characterization for the $K=3$ user LCBC for all cases, i.e., for arbitrary finite fields $\mathbb{F}_q$, arbitrary data dimension $d$, and arbitrary linear side-informations and demands at each user. A remarkable aspect of the converse is that unlike the $2$ user LCBC whose capacity was determined previously, the entropic formulation (where the entropies of demands and side-informations are specified, but not their functional forms) is insufficient to obtain a tight converse for the $3$ user LCBC. Instead, the converse exploits functional submodularity. Notable aspects of achievability include a decomposition of the users' collective signal space into subspaces that allow different degrees of efficiency in broadcast cost, revealing a tradeoff that leads to a constrained water-filling solution. Random coding arguments are invoked to resolve compatibility issues that arise as each user has a different view of these subspaces, conditioned on its own side-information.
△ Less
Submitted 5 May, 2024; v1 submitted 20 June, 2022;
originally announced June 2022.
-
The Extremal GDoF Gain of Optimal versus Binary Power Control in $K$ User Interference Networks Is $Θ(\sqrt{K})$
Authors:
Yao-Chia Chan,
Pouya Pezeshkpour,
Chunhua Geng,
Syed A. Jafar
Abstract:
Using ideas from Generalized Degrees of Freedom (GDoF) analyses and extremal network theory, this work studies the extremal gain of optimal power control over binary (on/off) power control, especially in large interference networks, in search of new theoretical insights. Whereas numerical studies have already established that in most practical settings binary power control is close to optimal, the…
▽ More
Using ideas from Generalized Degrees of Freedom (GDoF) analyses and extremal network theory, this work studies the extremal gain of optimal power control over binary (on/off) power control, especially in large interference networks, in search of new theoretical insights. Whereas numerical studies have already established that in most practical settings binary power control is close to optimal, the extremal analysis shows not only that there exist settings where the gain from optimal power control can be quite significant, but also bounds the extremal values of such gains from a GDoF perspective. As its main contribution, this work explicitly characterizes the extremal GDoF gain of optimal over binary power control as $Θ\left(\sqrt{K}\right)$ for all $K$. In particular, the extremal gain is bounded between $\lfloor \sqrt{K}\rfloor$ and $2.5\sqrt{K}$ for every $K$. For $K=2,3,4,5,6$ users, the precise extremal gain is found to be $1, 3/2, 2, 9/4$ and $41/16$, respectively. Networks shown to achieve the extremal gain may be interpreted as multi-tier heterogeneous networks. It is worthwhile to note that because of their focus on asymptotic analysis, the sharp characterizations of extremal gains are valuable primarily from a theoretical perspective, and not as contradictions to the conventional wisdom that binary power control is generally close to optimal in practical, non-asymptotic settings.
△ Less
Submitted 5 May, 2022; v1 submitted 4 May, 2022;
originally announced May 2022.
-
Systematic Comparison of Path Planning Algorithms using PathBench
Authors:
Hao-Ya Hsueh,
Alexandru-Iosif Toma,
Hussein Ali Jaafar,
Edward Stow,
Riku Murai,
Paul H. J. Kelly,
Sajad Saeedi
Abstract:
Path planning is an essential component of mobile robotics. Classical path planning algorithms, such as wavefront and rapidly-exploring random tree (RRT) are used heavily in autonomous robots. With the recent advances in machine learning, development of learning-based path planning algorithms has been experiencing rapid growth. An unified path planning interface that facilitates the development an…
▽ More
Path planning is an essential component of mobile robotics. Classical path planning algorithms, such as wavefront and rapidly-exploring random tree (RRT) are used heavily in autonomous robots. With the recent advances in machine learning, development of learning-based path planning algorithms has been experiencing rapid growth. An unified path planning interface that facilitates the development and benchmarking of existing and new algorithms is needed. This paper presents PathBench, a platform for developing, visualizing, training, testing, and benchmarking of existing and future, classical and learning-based path planning algorithms in 2D and 3D grid world environments. Many existing path planning algorithms are supported; e.g. A*, Dijkstra, waypoint planning networks, value iteration networks, gated path planning networks; and integrating new algorithms is easy and clearly specified. The benchmarking ability of PathBench is explored in this paper by comparing algorithms across five different hardware systems and three different map types, including built-in PathBench maps, video game maps, and maps from real world databases. Metrics, such as path length, success rate, and computational time, were used to evaluate algorithms. Algorithmic analysis was also performed on a real world robot to demonstrate PathBench's support for Robot Operating System (ROS). PathBench is open source.
△ Less
Submitted 6 March, 2022;
originally announced March 2022.
-
On Single Server Private Information Retrieval with Private Coded Side Information
Authors:
Yuxiang Lu,
Syed Ali Jafar
Abstract:
Motivated by an open problem and a conjecture, this work studies the problem of single server private information retrieval with private coded side information (PIR-PCSI) that was recently introduced by Heidarzadeh et al. The goal of PIR-PCSI is to allow a user to efficiently retrieve a desired message $\bm{W}_{\bmθ}$, which is one of $K$ independent messages that are stored at a server, while uti…
▽ More
Motivated by an open problem and a conjecture, this work studies the problem of single server private information retrieval with private coded side information (PIR-PCSI) that was recently introduced by Heidarzadeh et al. The goal of PIR-PCSI is to allow a user to efficiently retrieve a desired message $\bm{W}_{\bmθ}$, which is one of $K$ independent messages that are stored at a server, while utilizing private side information of a linear combination of a uniformly chosen size-$M$ subset ($\bm{\mathcal{S}}\subset[K]$) of messages. The settings PIR-PCSI-I and PIR-PCSI-II correspond to the constraints that $\bmθ$ is generated uniformly from $[K]\setminus\bm{\mathcal{S}}$, and $\bm{\mathcal{S}}$, respectively. In each case, $(\bmθ,\bm{\mathcal{S}})$ must be kept private from the server. The capacity is defined as the supremum over message and field sizes, of achievable rates (number of bits of desired message retrieved per bit of download) and is characterized by Heidarzadeh et al. for PIR-PCSI-I in general, and for PIR-PCSI-II for $M>(K+1)/2$ as $(K-M+1)^{-1}$. For $2\leq M\leq (K+1)/2$ the capacity of PIR-PCSI-II remains open, and it is conjectured that even in this case the capacity is $(K-M+1)^{-1}$. We show the capacity of PIR-PCSI-II is equal to $2/K$ for $2 \leq M \leq \frac{K+1}{2}$, which is strictly larger than the conjectured value, and does not depend on $M$ within this parameter regime. Remarkably, half the side-information is found to be redundant. We also characterize the infimum capacity (infimum over fields instead of supremum), and the capacity with private coefficients. The results are generalized to PIR-PCSI-I ($θ\in[K]\setminus\mathcal{S}$) and PIR-PCSI ($θ\in[K]$) settings.
△ Less
Submitted 15 February, 2022;
originally announced February 2022.
-
Flexible Distributed Matrix Multiplication
Authors:
Weiqi Li,
Zhen Chen,
Zhiying Wang,
Syed A. Jafar,
Hamid Jafarkhani
Abstract:
The distributed matrix multiplication problem with an unknown number of stragglers is considered, where the goal is to efficiently and flexibly obtain the product of two massive matrices by distributing the computation across N servers. There are up to N - R stragglers but the exact number is not known a priori. Motivated by reducing the computation load of each server, a flexible solution is prop…
▽ More
The distributed matrix multiplication problem with an unknown number of stragglers is considered, where the goal is to efficiently and flexibly obtain the product of two massive matrices by distributing the computation across N servers. There are up to N - R stragglers but the exact number is not known a priori. Motivated by reducing the computation load of each server, a flexible solution is proposed to fully utilize the computation capability of available servers. The computing task for each server is separated into several subtasks, constructed based on Entangled Polynomial codes by Yu et al. The final results can be obtained from either a larger number of servers with a smaller amount of computation completed per server or a smaller number of servers with a larger amount of computation completed per server. The required finite field size of the proposed solution is less than 2N. Moreover, the optimal design parameters such as the partitioning of the input matrices is discussed. Our constructions can also be generalized to other settings such as batch distributed matrix multiplication and secure distributed matrix multiplication.
△ Less
Submitted 22 July, 2021;
originally announced July 2021.
-
Large perpendicular magnetic anisotropy in Ta/CoFeB/MgO on full coverage monolayer MoS2 and first principle study of its electronic structure
Authors:
Ziqi Zhou,
Paul Marcon,
Xavier Devaux,
Philippe Pigeat,
Alexandre Bouché,
Sylvie Migot,
Abdallah Jaafar,
Remi Arras,
Michel Vergnat,
Lei Ren,
Hans Tornatzky,
Cedric Robert,
Xavier Marie,
Jean-Marie George,
Henri-Yves Jaffrès,
Mathieu Stoffel,
Hervé Rinnert,
Zhongming Wei,
Pierre Renucci,
Lionel Calmels,
Yuan Lu
Abstract:
Perpendicularly magnetized spin injector with high Curie temperature is a prerequisite for developing spin optoelectronic devices on 2D materials working at room temperature (RT) with zero applied magnetic field. Here, we report the growth of Ta/CoFeB/MgO structures with a large perpendicular magnetic anisotropy (PMA) on full coverage monolayer (ML) MoS2. A large perpendicular interface anisotropy…
▽ More
Perpendicularly magnetized spin injector with high Curie temperature is a prerequisite for developing spin optoelectronic devices on 2D materials working at room temperature (RT) with zero applied magnetic field. Here, we report the growth of Ta/CoFeB/MgO structures with a large perpendicular magnetic anisotropy (PMA) on full coverage monolayer (ML) MoS2. A large perpendicular interface anisotropy energy of 0.975mJ/m2 has been obtained at the CoFeB/MgO interface, comparable to that observed in magnetic tunnel junction systems. It is found that the insertion of MgO between the ferromagnetic metal (FM) and the 2D material can effectively prevent the diffusion of the FM atoms into the 2D material. Moreover, the MoS2 ML favors a MgO(001) texture and plays a critical role to establish the large PMA. First principle calculations on a similar Fe/MgO/MoS2 structure reveal that the MgO thickness can modify the MoS2 band structure, from an indirect bandgap with 7ML-MgO to a direct bandgap with 3ML-MgO. Proximity effect induced by Fe results in a splitting of 10meV in the valence band at the Γ point for the 3ML-MgO structure while it is negligible for the 7ML-MgO structure. These results pave the way to develop RT spin optoelectronic devices on 2D transition-metal dichalcogenide materials.
△ Less
Submitted 18 June, 2021;
originally announced June 2021.
-
Price of Precision in Coded Distributed Matrix Multiplication: A Dimensional Analysis
Authors:
Junge Wang,
Zhuqing Jia,
Syed A. Jafar
Abstract:
Coded distributed matrix multiplication (CDMM) schemes, such as MatDot codes, seek efficient ways to distribute matrix multiplication task(s) to a set of $N$ distributed servers so that the answers returned from any $R$ servers are sufficient to recover the desired product(s). For example, to compute the product of matrices ${\bf U, V}$, MatDot codes partition each matrix into $p>1$ sub-matrices t…
▽ More
Coded distributed matrix multiplication (CDMM) schemes, such as MatDot codes, seek efficient ways to distribute matrix multiplication task(s) to a set of $N$ distributed servers so that the answers returned from any $R$ servers are sufficient to recover the desired product(s). For example, to compute the product of matrices ${\bf U, V}$, MatDot codes partition each matrix into $p>1$ sub-matrices to create smaller coded computation tasks that reduce the upload/storage at each server by $1/p$, such that ${\bf UV}$ can be recovered from the answers returned by any $R=2p-1$ servers. An important concern in CDMM is to reduce the recovery threshold $R$ for a given storage/upload constraint. Recently, Jeong et al. introduced Approximate MatDot (AMD) codes that are shown to improve the recovery threshold by a factor of nearly $2$, from $2p-1$ to $p$. A key observation that motivates our work is that the storage/upload required for approximate computing depends not only on the dimensions of the (coded) sub-matrices that are assigned to each server, but also on their precision levels -- a critical aspect that is not explored by Jeong et al. Our main contribution is a dimensional analysis of AMD codes inspired by the Generalized Degrees of Freedom (GDoF) framework previously developed for wireless networks, which indicates that for the same upload/storage, once the precision levels of the task assignments are accounted for, AMD codes surprisingly fall short in all aspects to even the trivial replication scheme which assigns the full computation task to every server. Indeed, the trivial replication scheme has a much better recovery threshold of $1$, better download cost, better computation cost, and much better encoding/decoding (none required) complexity than AMD codes. The dimensional analysis is supported by simple numerical experiments.
△ Less
Submitted 16 May, 2021;
originally announced May 2021.
-
PathBench: A Benchmarking Platform for Classical and Learned Path Planning Algorithms
Authors:
Alexandru-Iosif Toma,
Hao-Ya Hsueh,
Hussein Ali Jaafar,
Riku Murai,
Paul H. J. Kelly,
Sajad Saeedi
Abstract:
Path planning is a key component in mobile robotics. A wide range of path planning algorithms exist, but few attempts have been made to benchmark the algorithms holistically or unify their interface. Moreover, with the recent advances in deep neural networks, there is an urgent need to facilitate the development and benchmarking of such learning-based planning algorithms. This paper presents PathB…
▽ More
Path planning is a key component in mobile robotics. A wide range of path planning algorithms exist, but few attempts have been made to benchmark the algorithms holistically or unify their interface. Moreover, with the recent advances in deep neural networks, there is an urgent need to facilitate the development and benchmarking of such learning-based planning algorithms. This paper presents PathBench, a platform for developing, visualizing, training, testing, and benchmarking of existing and future, classical and learned 2D and 3D path planning algorithms, while offering support for Robot Oper-ating System (ROS). Many existing path planning algorithms are supported; e.g. A*, wavefront, rapidly-exploring random tree, value iteration networks, gated path planning networks; and integrating new algorithms is easy and clearly specified. We demonstrate the benchmarking capability of PathBench by comparing implemented classical and learned algorithms for metrics, such as path length, success rate, computational time and path deviation. These evaluations are done on built-in PathBench maps and external path planning environments from video games and real world databases. PathBench is open source.
△ Less
Submitted 4 May, 2021;
originally announced May 2021.
-
Waypoint Planning Networks
Authors:
Alexandru-Iosif Toma,
Hussein Ali Jaafar,
Hao-Ya Hsueh,
Stephen James,
Daniel Lenton,
Ronald Clark,
Sajad Saeedi
Abstract:
With the recent advances in machine learning, path planning algorithms are also evolving; however, the learned path planning algorithms often have difficulty competing with success rates of classic algorithms. We propose waypoint planning networks (WPN), a hybrid algorithm based on LSTMs with a local kernel - a classic algorithm such as A*, and a global kernel using a learned algorithm. WPN produc…
▽ More
With the recent advances in machine learning, path planning algorithms are also evolving; however, the learned path planning algorithms often have difficulty competing with success rates of classic algorithms. We propose waypoint planning networks (WPN), a hybrid algorithm based on LSTMs with a local kernel - a classic algorithm such as A*, and a global kernel using a learned algorithm. WPN produces a more computationally efficient and robust solution. We compare WPN against A*, as well as related works including motion planning networks (MPNet) and value iteration networks (VIN). In this paper, the design and experiments have been conducted for 2D environments. Experimental results outline the benefits of WPN, both in efficiency and generalization. It is shown that WPN's search space is considerably less than A*, while being able to generate near optimal results. Additionally, WPN works on partial maps, unlike A* which needs the full map in advance. The code is available online.
△ Less
Submitted 1 May, 2021;
originally announced May 2021.
-
Phase Change Memory by GeSbTe Electrodeposition in Crossbar Arrays
Authors:
Yasir J Noori,
Lingcong Meng,
Ayoub H. Jaafar,
Wenjian Zhang,
Gabriela P. Kissling,
Yisong Han,
Nema Abdelazim,
Kath Leblanc,
Nikolay Zhelev,
Ruomeng Huang,
Richard Beanland,
David C. Smith,
Gill Reid,
Kees de Groot,
Philip N. Bartlett
Abstract:
Phase change memories (PCM) is an emerging type of non-volatile memory that has shown a strong presence in the data-storage market. This technology has recently attracted significant research interest in the development of non-Von Neumann computing architectures such as in-memory and neuromorphic computing. Research in these areas has been primarily motivated by the scalability potential of phase…
▽ More
Phase change memories (PCM) is an emerging type of non-volatile memory that has shown a strong presence in the data-storage market. This technology has recently attracted significant research interest in the development of non-Von Neumann computing architectures such as in-memory and neuromorphic computing. Research in these areas has been primarily motivated by the scalability potential of phase change materials and their compatibility with industrial nanofabrication processes. In this work, we are presenting our development of crossbar phase change memory arrays through the electrodeposition of GeSbTe (GST). We show that GST can be electrodeposited in microfabricated TiN crossbar arrays using a scalable process. Our phase switching test of the electrodeposited materials have shown that a SET/RESET resistance ratio of 2-3 orders of magnitude is achievable with a switching endurance of around 80 cycles. These results represent the first phase switching of electrodeposited GeSbTe in microfabricated crossbar arrays. Our work paves the way towards developing large memory arrays involving electrodeposited materials for passive selectors and phase switching devices. It also opens opportunities for developing a variety of different electronic devices using electrodeposited materials.
△ Less
Submitted 2 August, 2021; v1 submitted 6 April, 2021;
originally announced April 2021.
-
Sum-GDoF of Symmetric Multi-hop Interference Channel under Finite Precision CSIT using Aligned-Images Sumset Inequalities
Authors:
Junge Wang,
Syed Ali Jafar
Abstract:
Aligned-Images Sumset Inequalities are used in this work to study the Generalized Degrees of Freedom (GDoF) of the symmetric layered multi-hop interference channel under the robust assumption that the channel state information at the transmitters (CSIT) is limited to finite precision. First, the sum-GDoF value is characterized for the $2\times 2\times 2$ setting that is comprised of $2$ sources,…
▽ More
Aligned-Images Sumset Inequalities are used in this work to study the Generalized Degrees of Freedom (GDoF) of the symmetric layered multi-hop interference channel under the robust assumption that the channel state information at the transmitters (CSIT) is limited to finite precision. First, the sum-GDoF value is characterized for the $2\times 2\times 2$ setting that is comprised of $2$ sources, $2$ relays, and $2$ destinations. It is shown that the sum-GDoF do not improve even if perfect CSIT is allowed in the first hop, as long as the CSIT in the second hop is limited to finite precision. The sum GDoF characterization is then generalized to the $2\times 2\times \cdots \times 2$ setting that is comprised of $L$ hops. Remarkably, for large $L$, the GDoF value approaches that of the one hop broadcast channel that is obtained by full cooperation among the two transmitters of the last hop, with finite precision CSIT. Previous studies of multi-hop interference networks either identified sophisticated GDoF optimal schemes under perfect CSIT, such as aligned interference neutralization and network diagonalization, that are powerful in theory but too fragile to be practical, or studied robust achievable schemes like classical amplify/decode/compress-and-forward without claims of information-theoretic optimality. In contrast, under finite precision CSIT, we show that the benefits of fragile schemes are lost, while a combination of classical random coding schemes that are simpler and much more robust, namely a rate-splitting between decode-and-forward and amplify-and-forward, is shown to be GDoF optimal. As such, this work represents another step towards bridging the gap between theory (optimality) and practice (robustness) with the aid of Aligned-Images Sumset Inequalities.
△ Less
Submitted 13 March, 2021;
originally announced March 2021.
-
Multilevel Topological Interference Management: A TIM-TIN Perspective
Authors:
Chunhua Geng,
Hua Sun,
Syed A. Jafar
Abstract:
The robust principles of treating interference as noise (TIN) when it is sufficiently weak, and avoiding it when it is not, form the background of this work. Combining TIN with the topological interference management (TIM) framework that identifies optimal interference avoidance schemes, we formulate a TIM-TIN problem for multilevel topological interference management, wherein only a coarse knowle…
▽ More
The robust principles of treating interference as noise (TIN) when it is sufficiently weak, and avoiding it when it is not, form the background of this work. Combining TIN with the topological interference management (TIM) framework that identifies optimal interference avoidance schemes, we formulate a TIM-TIN problem for multilevel topological interference management, wherein only a coarse knowledge of channel strengths and no knowledge of channel phases is available to transmitters. To address the TIM-TIN problem, we first propose an analytical baseline approach, which decomposes a network into TIN and TIM components, allocates the signal power levels to each user in the TIN component, allocates signal vector space dimensions to each user in the TIM component, and guarantees that the product of the two is an achievable number of signal dimensions available to each user in the original network. Next, a distributed numerical algorithm called ZEST is developed. The convergence of the algorithm is demonstrated, leading to the duality of the TIM-TIN problem (in terms of GDoF). Numerical results are also provided to demonstrate the superior sum-rate performance and fast convergence of ZEST.
△ Less
Submitted 8 February, 2021;
originally announced February 2021.
-
Secure GDoF of the Z-channel with Finite Precision CSIT: How Robust are Structured Codes?
Authors:
Yao-Chia Chan,
Syed A. Jafar
Abstract:
Under the assumption of perfect channel state information at the transmitters (CSIT), it is known that structured codes offer significant advantages for secure communication in an interference network, e.g., structured jamming signals based on lattice codes may allow a receiver to decode the sum of the jamming signal and the signal being jammed, even though they cannot be separately resolved due t…
▽ More
Under the assumption of perfect channel state information at the transmitters (CSIT), it is known that structured codes offer significant advantages for secure communication in an interference network, e.g., structured jamming signals based on lattice codes may allow a receiver to decode the sum of the jamming signal and the signal being jammed, even though they cannot be separately resolved due to secrecy constraints, subtract the aggregate jammed signal, and then proceed to decode desired codewords at lower power levels. To what extent are such benefits of structured codes fundamentally limited by uncertainty in CSIT? To answer this question, we explore what is perhaps the simplest setting where the question presents itself -- a Z interference channel with secure communication. Using sum-set inequalities based on Aligned Images bounds we prove that the GDoF benefits of structured codes are lost completely under finite precision CSIT. The secure GDoF region of the Z interference channel is obtained as a byproduct of the analysis.
△ Less
Submitted 25 November, 2020;
originally announced November 2020.
-
$X$-Secure $T$-Private Federated Submodel Learning with Elastic Dropout Resilience
Authors:
Zhuqing Jia,
Syed A. Jafar
Abstract:
Motivated by recent interest in federated submodel learning, this work explores the fundamental problem of privately reading from and writing to a database comprised of $K$ files (submodels) that are stored across $N$ distributed servers according to an $X$-secure threshold secret sharing scheme. One after another, various users wish to retrieve their desired file, locally process the information…
▽ More
Motivated by recent interest in federated submodel learning, this work explores the fundamental problem of privately reading from and writing to a database comprised of $K$ files (submodels) that are stored across $N$ distributed servers according to an $X$-secure threshold secret sharing scheme. One after another, various users wish to retrieve their desired file, locally process the information and then update the file in the distributed database while keeping the identity of their desired file private from any set of up to $T$ colluding servers. The availability of servers changes over time, so elastic dropout resilience is required. The main contribution of this work is an adaptive scheme, called ACSA-RW, that takes advantage of all currently available servers to reduce its communication costs, fully updates the database after each write operation even though the database is only partially accessible due to server dropouts, and ensures a memoryless operation of the network in the sense that the storage structure is preserved and future users may remain oblivious of the past history of server dropouts. The ACSA-RW construction builds upon CSA codes that were originally introduced for XSTPIR and have been shown to be natural solutions for secure distributed matrix multiplication problems. ACSA-RW achieves the desired private read and write functionality with elastic dropout resilience, matches the best results for private-read from PIR literature, improves significantly upon available baselines for private-write, reveals a striking symmetry between upload and download costs, and exploits redundant storage dimensions to accommodate arbitrary read and write dropout servers up to certain threshold values. It also answers in the affirmative an open question by Kairouz et al. by exploiting synergistic gains from the joint design of private read and write operations.
△ Less
Submitted 22 March, 2021; v1 submitted 2 October, 2020;
originally announced October 2020.
-
Double Blind $T$-Private Information Retrieval
Authors:
Yuxiang Lu,
Zhuqing Jia,
Syed A. Jafar
Abstract:
Double blind $T$-private information retrieval (DB-TPIR) enables two users, each of whom specifies an index ($θ_1, θ_2$, resp.), to efficiently retrieve a message $W(θ_1,θ_2)$ labeled by the two indices, from a set of $N$ servers that store all messages $W(k_1,k_2), k_1\in\{1,2,\cdots,K_1\}, k_2\in\{1,2,\cdots,K_2\}$, such that the two users' indices are kept private from any set of up to…
▽ More
Double blind $T$-private information retrieval (DB-TPIR) enables two users, each of whom specifies an index ($θ_1, θ_2$, resp.), to efficiently retrieve a message $W(θ_1,θ_2)$ labeled by the two indices, from a set of $N$ servers that store all messages $W(k_1,k_2), k_1\in\{1,2,\cdots,K_1\}, k_2\in\{1,2,\cdots,K_2\}$, such that the two users' indices are kept private from any set of up to $T_1,T_2$ colluding servers, respectively, as well as from each other. A DB-TPIR scheme based on cross-subspace alignment is proposed in this paper, and shown to be capacity-achieving in the asymptotic setting of large number of messages and bounded latency. The scheme is then extended to $M$-way blind $X$-secure $T$-private information retrieval (MB-XS-TPIR) with multiple ($M$) indices, each belonging to a different user, arbitrary privacy levels for each index ($T_1, T_2,\cdots, T_M$), and arbitrary level of security ($X$) of data storage, so that the message $W(θ_1,θ_2,\cdots, θ_M)$ can be efficiently retrieved while the stored data is held secure against collusion among up to $X$ colluding servers, the $m^{th}$ user's index is private against collusion among up to $T_m$ servers, and each user's index $θ_m$ is private from all other users. The general scheme relies on a tensor-product based extension of cross-subspace alignment and retrieves $1-(X+T_1+\cdots+T_M)/N$ bits of desired message per bit of download.
△ Less
Submitted 8 March, 2021; v1 submitted 9 August, 2020;
originally announced August 2020.
-
Canonical Conditions for K/2 Degrees of Freedom
Authors:
Recep Gül,
David Stotz,
Syed Ali Jafar,
Helmut Bölcskei,
Shlomo Shamai
Abstract:
We present a necessary and sufficient condition for $1/2$ degree of freedom for each user in constant $K$-user single-antenna interference channels. This condition applies to all channel topologies, i.e., to fully-connected channels as well as channels that have individual links absent, reflected by corresponding zeros in the channel matrix. Moreover, it captures the essence of interference alignm…
▽ More
We present a necessary and sufficient condition for $1/2$ degree of freedom for each user in constant $K$-user single-antenna interference channels. This condition applies to all channel topologies, i.e., to fully-connected channels as well as channels that have individual links absent, reflected by corresponding zeros in the channel matrix. Moreover, it captures the essence of interference alignment by virtue of being expressed in terms of a generic injectivity condition that guarantees separability of signal and interference. Finally, we provide codebook constructions achieving $1/2$ degree of freedom for each user for all channel matrices satisfying our condition.
△ Less
Submitted 3 June, 2020;
originally announced June 2020.
-
Regional exponential general observability in diffusion problem
Authors:
Zainab A. Jaafar,
Raheam A. Al-Saphory
Abstract:
The aim of this paper is to extend the concept of regional exponential general observability to the case of Neumann boundary conditions problem in diffusion system. More precisely, for linear distributed parameter diffusion systems, we show that the sensors characterizations allow to reconstruct the regional exponential state in a sub-region of the considered systems domain. Moreover, various inte…
▽ More
The aim of this paper is to extend the concept of regional exponential general observability to the case of Neumann boundary conditions problem in diffusion system. More precisely, for linear distributed parameter diffusion systems, we show that the sensors characterizations allow to reconstruct the regional exponential state in a sub-region of the considered systems domain. Moreover, various interesting results associated with the choice of sensors are given and illustrated in specific situations in order regional exponential general observability notion to be achieved. Finally, we also show that, there exists a dynamical system for diffusion system is not exponential general observable in the usual sense, but it may be regional exponential general observable.
△ Less
Submitted 27 May, 2020;
originally announced May 2020.
-
GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication
Authors:
Zhen Chen,
Zhuqing Jia,
Zhiying Wang,
Syed A. Jafar
Abstract:
A secure multi-party batch matrix multiplication problem (SMBMM) is considered, where the goal is to allow a master to efficiently compute the pairwise products of two batches of massive matrices, by distributing the computation across S servers. Any X colluding servers gain no information about the input, and the master gains no additional information about the input beyond the product. A solutio…
▽ More
A secure multi-party batch matrix multiplication problem (SMBMM) is considered, where the goal is to allow a master to efficiently compute the pairwise products of two batches of massive matrices, by distributing the computation across S servers. Any X colluding servers gain no information about the input, and the master gains no additional information about the input beyond the product. A solution called Generalized Cross Subspace Alignment codes with Noise Alignment (GCSA-NA) is proposed in this work, based on cross-subspace alignment codes. The state of art solution to SMBMM is a coding scheme called polynomial sharing (PS) that was proposed by Nodehi and Maddah-Ali. GCSA-NA outperforms PS codes in several key aspects - more efficient and secure inter-server communication, lower latency, flexible inter-server network topology, efficient batch processing, and tolerance to stragglers. The idea of noise alignment can also be combined with N-source Cross Subspace Alignment (N-CSA) codes and fast matrix multiplication algorithms like Strassen's construction. Moreover, noise alignment can be applied to symmetric secure private information retrieval to achieve the asymptotic capacity.
△ Less
Submitted 6 September, 2020; v1 submitted 18 February, 2020;
originally announced February 2020.
-
Multilevel Resistance Switching and Enhanced Spin Transition Temperature in Single Molecule Spin Crossover Nanogap Devices
Authors:
Alex Gee,
Ayoub H. Jaafar,
Barbora Brachňaková,
Jamie Massey,
Christopher H. Marrows,
Ivan Šalitroš,
N. T. Kemp
Abstract:
Spin crossover (SCO) molecules are promising bi-stable magnetic switches with applications in molecular spintronics. However, little is known about the switching effects of a single SCO molecule when it is confined between two metal electrodes. Here we examine the switching properties of a [Fe(III)(EtOSalPet )(NCS)] SCO molecule that is specifically tailored for surface deposition and binding to o…
▽ More
Spin crossover (SCO) molecules are promising bi-stable magnetic switches with applications in molecular spintronics. However, little is known about the switching effects of a single SCO molecule when it is confined between two metal electrodes. Here we examine the switching properties of a [Fe(III)(EtOSalPet )(NCS)] SCO molecule that is specifically tailored for surface deposition and binding to only one gold electrode in a nanogap device. Temperature dependent conductivity measurements on SCO molecule containing electromigrated gold break junctions show voltage independent telegraphic-like switching between two resistance states at temperature below 200 K. The transition temperature is very different from the transition temperature of 83 K that occurs in a bulk film of the same material. This indicates that the bulk, co-operative SCO phenomenon is no longer preserved for a single molecule and that the surface interaction drastically increases the temperature of the SCO phenomenon. Another key finding of this work is that some devices show switching between multiple resistance levels. We propose that in this case, two SCO molecules are present within the nanogap with both participating in the electronic transport and switching.
△ Less
Submitted 19 January, 2020;
originally announced January 2020.
-
Cross Subspace Alignment Codes for Coded Distributed Batch Computation
Authors:
Zhuqing Jia,
Syed A. Jafar
Abstract:
Coded distributed batch computation distributes a computation task, such as matrix multiplication, $N$-linear computation, or multivariate polynomial evaluation, across $S$ servers through a coding scheme, such that the response from any $R$ servers ($R$ is called the recovery threshold) is sufficient for the user to recover the desired computed value. Current approaches are based on either exclus…
▽ More
Coded distributed batch computation distributes a computation task, such as matrix multiplication, $N$-linear computation, or multivariate polynomial evaluation, across $S$ servers through a coding scheme, such that the response from any $R$ servers ($R$ is called the recovery threshold) is sufficient for the user to recover the desired computed value. Current approaches are based on either exclusively matrix-partitioning (Entangled Polynomial (EP) Codes for matrix multiplication), or exclusively batch processing (Lagrange Coded Computing (LCC)). We present three related classes of codes, based on the idea of Cross-Subspace Alignment (CSA) which was introduced originally in the context of private information retrieval. CSA codes are characterized by a Cauchy-Vandermonde matrix structure that facilitates interference alignment along Vandermonde terms, while the desired computations remain resolvable along the Cauchy terms. These codes unify, generalize and improve upon the state-of-art codes for distributed computing. First we introduce CSA codes for matrix multiplication, which yield LCC codes as a special case, and are shown to outperform LCC codes in general over strictly download-limited settings. Next, we introduce Generalized CSA (GCSA) codes for matrix multiplication that bridge the extremes of matrix-partitioning and batch processing approaches. Finally, we introduce $N$-CSA codes for $N$-linear distributed batch computations and multivariate batch polynomial evaluations. $N$-CSA codes include LCC codes as a special case, and are in general capable of achieving significantly lower downloads than LCC codes due to cross-subspace alignment. Generalizations of $N$-CSA codes to include $X$-secure data and $B$-byzantine servers are also obtained.
△ Less
Submitted 14 November, 2019; v1 submitted 30 September, 2019;
originally announced September 2019.
-
$X$-secure $T$-private Information Retrieval from MDS Coded Storage with Byzantine and Unresponsive Servers
Authors:
Zhuqing Jia,
Syed A. Jafar
Abstract:
The problem of $X$-secure $T$-private information retrieval from MDS coded storage is studied in this paper, where the user wishes to privately retrieve one out of $K$ independent messages that are distributed over $N$ servers according to an MDS code. It is guaranteed that any group of up to $X$ colluding servers learn nothing about the messages and that any group of up to $T$ colluding servers l…
▽ More
The problem of $X$-secure $T$-private information retrieval from MDS coded storage is studied in this paper, where the user wishes to privately retrieve one out of $K$ independent messages that are distributed over $N$ servers according to an MDS code. It is guaranteed that any group of up to $X$ colluding servers learn nothing about the messages and that any group of up to $T$ colluding servers learn nothing about the identity of desired message. A lower bound of achievable rates is proved by presenting a novel scheme based on \emph{cross-subspace alignment} and a successive decoding with interference cancellation strategy. For large number of messages $(K\rightarrow\infty)$ the achieved rate, which we conjecture to be optimal, improves upon the best known rates previously reported in the literature by Raviv and Karpuk, and generalizes an achievable rate for MDS-TPIR previously found by Freij-Hollanti et al. that is also conjectured to be asymptotically optimal. The setting is then expanded to allow unresponsive and Byzantine servers. Finally, the scheme is applied to find a new lower convex hull of (download, upload) pairs of secure and private distributed matrix multiplication that generalizes, and in certain asymptotic settings strictly improves upon the best known previous results.
△ Less
Submitted 28 August, 2019;
originally announced August 2019.
-
On the Capacity of Secure Distributed Batch Matrix Multiplication
Authors:
Zhuqing Jia,
Syed A. Jafar
Abstract:
The problem of secure distributed batch matrix multiplication (SDBMM) studies the communication efficiency of retrieving a sequence of desired matrix products ${\bf AB}$ $=$ $({\bf A}_1{\bf B}_1,$ ${\bf A}_2{\bf B}_2,$ $\cdots,$ ${\bf A}_S{\bf B}_S)$ from $N$ distributed servers where the constituent matrices ${\bf A}=({\bf A}_1, {\bf A}_2, \cdots, {\bf A}_S)$ and…
▽ More
The problem of secure distributed batch matrix multiplication (SDBMM) studies the communication efficiency of retrieving a sequence of desired matrix products ${\bf AB}$ $=$ $({\bf A}_1{\bf B}_1,$ ${\bf A}_2{\bf B}_2,$ $\cdots,$ ${\bf A}_S{\bf B}_S)$ from $N$ distributed servers where the constituent matrices ${\bf A}=({\bf A}_1, {\bf A}_2, \cdots, {\bf A}_S)$ and ${\bf B}=({\bf B}_1, {\bf B}_2,\cdots,{\bf B}_S)$ are stored in $X$-secure coded form, i.e., any group of up to $X$ colluding servers learn nothing about ${\bf A, B}$. It is assumed that ${\bf A}_s\in\mathbb{F}_q^{L\times K}, {\bf B}_s\in\mathbb{F}_q^{K\times M}, s\in\{1,2,\cdots, S\}$ are uniformly and independently distributed and $\mathbb{F}_q$ is a large finite field. The rate of an SDBMM scheme is defined as the ratio of the number of bits of desired information that is retrieved, to the total number of bits downloaded on average. The supremum of achievable rates is called the capacity of SDBMM. In this work we explore the capacity of SDBMM, as well as several of its variants, e.g., where the user may already have either ${\bf A}$ or ${\bf B}$ available as side-information, and/or where the security constraint for either ${\bf A}$ or ${\bf B}$ may be relaxed. We obtain converse bounds, as well as achievable schemes for various cases of SDBMM, depending on the $L, K, M, N, X$ parameters, and identify parameter regimes where these bounds match. A remarkable aspect of our upper bounds is a connection between SDBMM and a form of private information retrieval (PIR) problem, known as multi-message $X$-secure $T$-private information retrieval (MM-XSTPIR). Notable features of our achievable schemes include the use of cross-subspace alignment and a transformation argument that converts a scalar multiplication problem into a scalar addition problem, allowing a surprisingly efficient solution.
△ Less
Submitted 22 June, 2021; v1 submitted 19 August, 2019;
originally announced August 2019.
-
GDoF of Interference Channel with Limited Cooperation under Finite Precision CSIT
Authors:
Junge Wang,
Bofeng Yuan,
Lexiang Huang,
Syed A. Jafar
Abstract:
The Generalized Degrees of Freedom (GDoF) of the two user interference channel are characterized for all parameter regimes under the assumption of finite precision channel state information at the transmitters (CSIT), when a limited amount of (half-duplex or full-duplex) cooperation is allowed between the transmitters in the form of $π$ DoF of shared messages. In all cases, the number of over-the-…
▽ More
The Generalized Degrees of Freedom (GDoF) of the two user interference channel are characterized for all parameter regimes under the assumption of finite precision channel state information at the transmitters (CSIT), when a limited amount of (half-duplex or full-duplex) cooperation is allowed between the transmitters in the form of $π$ DoF of shared messages. In all cases, the number of over-the-air bits that each cooperation bit buys is shown to be equal to either $0, 1, 1/2$ or $1/3$. The most interesting aspect of the result is the $1/3$ slope, which appears only under finite precision CSIT and strong interference, and as such has not been encountered in previous studies that invariably assumed perfect CSIT. Indeed, the achievability and converse for the parameter regimes with $1/3$ slope are the most challenging aspects of this work. In particular, the converse relies on non-trivial applications of Aligned Images bounds.
△ Less
Submitted 2 August, 2019;
originally announced August 2019.
-
Chua Mem-Components for Adaptive RF Metamaterials
Authors:
J. Georgiou,
K. M. Kossifos,
A. H. Jaafar,
N. T. Kemp,
M. A. Antoniades
Abstract:
Chua's mem-components are ideal for creating adaptive metasurfaces for manipulating EM waves given that they hold their state without external biases. In this paper, we propose a generic adaptive reactive element that is in fact a memcapacitor/meminductor. This element makes use of a polymer that demonstrates reversible trans-cis photochemical isomerization, thus making it possible to change the d…
▽ More
Chua's mem-components are ideal for creating adaptive metasurfaces for manipulating EM waves given that they hold their state without external biases. In this paper, we propose a generic adaptive reactive element that is in fact a memcapacitor/meminductor. This element makes use of a polymer that demonstrates reversible trans-cis photochemical isomerization, thus making it possible to change the distance between two conductive plates by up to 25%. Furthermore, a design methodology for utilizing these devices is presented.
△ Less
Submitted 20 June, 2019;
originally announced July 2019.
-
An Optically-Programmable Absorbing Metasurface
Authors:
K. M. Kossifos,
A. H. Jaafar,
N. T. Kemp,
M. A. Antoniades,
J. Georgiou
Abstract:
A tunable metasurface absorber is presented in this work using an optically-programmable capacitor as the tuning element. The tuning element does not employ conventional semiconductor technologies to operate but rather a bases its tuning by changing the optomechanical properties of its dielectric, poly disperse red 1 acrylate (PDR1A). Doing so there are no conventional semiconductor devices in the…
▽ More
A tunable metasurface absorber is presented in this work using an optically-programmable capacitor as the tuning element. The tuning element does not employ conventional semiconductor technologies to operate but rather a bases its tuning by changing the optomechanical properties of its dielectric, poly disperse red 1 acrylate (PDR1A). Doing so there are no conventional semiconductor devices in the RF signal path. The metasurface operates at a design frequency of 5.5 GHz and it achieves an optically-tuned bandwidth of 150 MHz, from 5.50 GHz to 5.65 GHz.
△ Less
Submitted 20 June, 2019;
originally announced July 2019.
-
On the Asymptotic Capacity of $X$-Secure $T$-Private Information Retrieval with Graph Based Replicated Storage
Authors:
Zhuqing Jia,
Syed A. Jafar
Abstract:
The problem of private information retrieval with graph-based replicated storage was recently introduced by Raviv, Tamo and Yaakobi. Its capacity remains open in almost all cases. In this work the asymptotic (large number of messages) capacity of this problem is studied along with its generalizations to include arbitrary $T$-privacy and $X$-security constraints, where the privacy of the user must…
▽ More
The problem of private information retrieval with graph-based replicated storage was recently introduced by Raviv, Tamo and Yaakobi. Its capacity remains open in almost all cases. In this work the asymptotic (large number of messages) capacity of this problem is studied along with its generalizations to include arbitrary $T$-privacy and $X$-security constraints, where the privacy of the user must be protected against any set of up to $T$ colluding servers and the security of the stored data must be protected against any set of up to $X$ colluding servers. A general achievable scheme for arbitrary storage patterns is presented that achieves the rate $(ρ_{\min}-X-T)/N$, where $N$ is the total number of servers, and each message is replicated at least $ρ_{\min}$ times. Notably, the scheme makes use of a special structure inspired by dual Generalized Reed Solomon (GRS) codes. A general converse is also presented. The two bounds are shown to match for many settings, including symmetric storage patterns. Finally, the asymptotic capacity is fully characterized for the case without security constraints $(X=0)$ for arbitrary storage patterns provided that each message is replicated no more than $T+2$ times. As an example of this result, consider PIR with arbitrary graph based storage ($T=1, X=0$) where every message is replicated at exactly $3$ servers. For this $3$-replicated storage setting, the asymptotic capacity is equal to $2/ν_2(G)$ where $ν_2(G)$ is the maximum size of a $2$-matching in a storage graph $G[V,E]$. In this undirected graph, the vertices $V$ correspond to the set of servers, and there is an edge $uv\in E$ between vertices $u,v$ only if a subset of messages is replicated at both servers $u$ and $v$.
△ Less
Submitted 11 April, 2019;
originally announced April 2019.
-
Customer churn prediction in telecom using machine learning and social network analysis in big data platform
Authors:
Abdelrahim Kasem Ahmad,
Assef Jafar,
Kadan Aljoumaa
Abstract:
Customer churn is a major problem and one of the most important concerns for large companies. Due to the direct effect on the revenues of the companies, especially in the telecom field, companies are seeking to develop means to predict potential customer to churn. Therefore, finding factors that increase customer churn is important to take necessary actions to reduce this churn. The main contribut…
▽ More
Customer churn is a major problem and one of the most important concerns for large companies. Due to the direct effect on the revenues of the companies, especially in the telecom field, companies are seeking to develop means to predict potential customer to churn. Therefore, finding factors that increase customer churn is important to take necessary actions to reduce this churn. The main contribution of our work is to develop a churn prediction model which assists telecom operators to predict customers who are most likely subject to churn. The model developed in this work uses machine learning techniques on big data platform and builds a new way of features' engineering and selection. In order to measure the performance of the model, the Area Under Curve (AUC) standard measure is adopted, and the AUC value obtained is 93.3%. Another main contribution is to use customer social network in the prediction model by extracting Social Network Analysis (SNA) features. The use of SNA enhanced the performance of the model from 84 to 93.3% against AUC standard. The model was prepared and tested through Spark environment by working on a large dataset created by transforming big raw data provided by SyriaTel telecom company. The dataset contained all customers' information over 9 months, and was used to train, test, and evaluate the system at SyriaTel. The model experimented four algorithms: Decision Tree, Random Forest, Gradient Boosted Machine Tree "GBM" and Extreme Gradient Boosting "XGBOOST". However, the best results were obtained by applying XGBOOST algorithm. This algorithm was used for classification in this churn predictive model.
△ Less
Submitted 1 April, 2019;
originally announced April 2019.
-
On the Capacity of Computation Broadcast
Authors:
Hua Sun,
Syed A. Jafar
Abstract:
The two-user computation broadcast problem is introduced as the setting where User $1$ wants message $W_1$ and has side-information $W_1'$, User $2$ wants message $W_2$ and has side-information $W_2'$, and $(W_1, W_1', W_2, W_2')$ may have arbitrary dependencies. The rate of a computation broadcast scheme is defined as the ratio $H(W_1,W_2)/H(S)$, where $S$ is the information broadcast to both use…
▽ More
The two-user computation broadcast problem is introduced as the setting where User $1$ wants message $W_1$ and has side-information $W_1'$, User $2$ wants message $W_2$ and has side-information $W_2'$, and $(W_1, W_1', W_2, W_2')$ may have arbitrary dependencies. The rate of a computation broadcast scheme is defined as the ratio $H(W_1,W_2)/H(S)$, where $S$ is the information broadcast to both users to simultaneously satisfy their demands. The supremum of achievable rates is called the capacity of computation broadcast $C_{CB}$. It is shown that $C_{CB}\leq H(W_1,W_2)/\left[H(W_1|W_1')+H(W_2|W_2')-\min\Big(I(W_1; W_2, W_2'|W_1'), I(W_2; W_1, W_1'|W_2')\Big)\right]$. For the linear computation broadcast problem, where $W_1, W_1', W_2, W_2'$ are comprised of arbitrary linear combinations of a basis set of independent symbols, the bound is shown to be tight. For non-linear computation broadcast, it is shown that this bound is not tight in general. Examples are provided to prove that different instances of computation broadcast that have the same entropic structure, i.e., the same entropy for all subsets of $\{W_1,W_1',W_2,W_2'\}$, can have different capacities. Thus, extra-entropic structure matters even for two-user computation broadcast. The significance of extra-entropic structure is further explored through a class of non-linear computation broadcast problems where the extremal values of capacity are shown to correspond to minimally and maximally structured problems within that class.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
Predicting customer's gender and age depending on mobile phone data
Authors:
Ibrahim Mousa AlZuabi,
Assef Jafar,
Kadan Aljoumaa
Abstract:
In the age of data driven solution, the customer demographic attributes, such as gender and age, play a core role that may enable companies to enhance the offers of their services and target the right customer in the right time and place. In the marketing campaign, the companies want to target the real user of the GSM (global system for mobile communications), not the line owner. Where sometimes t…
▽ More
In the age of data driven solution, the customer demographic attributes, such as gender and age, play a core role that may enable companies to enhance the offers of their services and target the right customer in the right time and place. In the marketing campaign, the companies want to target the real user of the GSM (global system for mobile communications), not the line owner. Where sometimes they may not be the same. This work proposes a method that predicts users' gender and age based on their behavior, services and contract information. We used call detail records (CDRs), customer relationship management (CRM) and billing information as a data source to analyze telecom customer behavior, and applied different types of machine learning algorithms to provide marketing campaigns with more accurate information about customer demographic attributes. This model is built using reliable data set of 18,000 users provided by SyriaTel Telecom Company, for training and testing. The model applied by using big data technology and achieved 85.6% accuracy in terms of user gender prediction and 65.5% of user age prediction. The main contribution of this work is the improvement in the accuracy in terms of user gender prediction and user age prediction based on mobile phone data and end-to-end solution that approaches customer data from multiple aspects in the telecom domain.
△ Less
Submitted 20 February, 2019;
originally announced March 2019.
-
Towards an Extremal Network Theory -- Robust GDoF Gain of Transmitter Cooperation over TIN
Authors:
Yao-Chia Chan,
Junge Wang,
Syed A. Jafar
Abstract:
Significant progress has been made recently in Generalized Degrees of Freedom (GDoF) characterizations of wireless interference channels (IC) and broadcast channels (BC) under the assumption of finite precision channel state information at the transmitters (CSIT), especially for smaller or highly symmetric network settings. A critical barrier in extending these results to larger and asymmetric net…
▽ More
Significant progress has been made recently in Generalized Degrees of Freedom (GDoF) characterizations of wireless interference channels (IC) and broadcast channels (BC) under the assumption of finite precision channel state information at the transmitters (CSIT), especially for smaller or highly symmetric network settings. A critical barrier in extending these results to larger and asymmetric networks is the inherent combinatorial complexity of such networks. Motivated by other fields such as extremal combinatorics and extremal graph theory, we explore the possibility of an extremal network theory, i.e., a study of extremal networks within particular regimes of interest. As our test application, we study the GDoF benefits of transmitter cooperation in a $K$ user IC over the simple scheme of power control and treating interference as Gaussian noise (TIN) for three regimes of interest -- a TIN regime where TIN was shown to be GDoF optimal for the $K$ user interference channel, a CTIN regime where the GDoF region achievable by TIN is convex without time-sharing, and an SLS regime where a simple layered superposition (SLS) scheme is shown to be optimal in the $K$ user MISO BC, albeit only for $K\leq 3$. As our first result, we show that under finite precision CSIT, TIN is GDoF optimal for the $K$ user IC throughout the CTIN regime. Furthermore, under finite precision CSIT, appealing to extremal network theory we obtain the following results. In both TIN and CTIN regimes, we show that the extremal GDoF gain from transmitter cooperation over TIN is bounded regardless of the number of users: the gain is exactly a factor of $3/2$ in the TIN regime, and $2-1/K$ in the CTIN regime, for arbitrary number of users $K>1$. However, in the SLS regime, the gain is $Θ(\log_2(K))$, i.e., it scales logarithmically with the number of users.
△ Less
Submitted 24 October, 2019; v1 submitted 28 January, 2019;
originally announced January 2019.