-
Advancing Ultra-Reliable 6G: Transformer and Semantic Localization Empowered Robust Beamforming in Millimeter-Wave Communications
Authors:
Avi Deb Raha,
Kitae Kim,
Apurba Adhikary,
Mrityunjoy Gain,
Choong Seon Hong
Abstract:
Advancements in 6G wireless technology have elevated the importance of beamforming, especially for attaining ultra-high data rates via millimeter-wave (mmWave) frequency deployment. Although promising, mmWave bands require substantial beam training to achieve precise beamforming. While initial deep learning models that use RGB camera images demonstrated promise in reducing beam training overhead,…
▽ More
Advancements in 6G wireless technology have elevated the importance of beamforming, especially for attaining ultra-high data rates via millimeter-wave (mmWave) frequency deployment. Although promising, mmWave bands require substantial beam training to achieve precise beamforming. While initial deep learning models that use RGB camera images demonstrated promise in reducing beam training overhead, their performance suffers due to sensitivity to lighting and environmental variations. Due to this sensitivity, Quality of Service (QoS) fluctuates, eventually affecting the stability and dependability of networks in dynamic environments. This emphasizes a critical need for more robust solutions. This paper proposes a robust beamforming technique to ensure consistent QoS under varying environmental conditions. An optimization problem has been formulated to maximize users' data rates. To solve the formulated NP-hard optimization problem, we decompose it into two subproblems: the semantic localization problem and the optimal beam selection problem. To solve the semantic localization problem, we propose a novel method that leverages the k-means clustering and YOLOv8 model. To solve the beam selection problem, we propose a novel lightweight hybrid architecture that utilizes various data sources and a weighted entropy-based mechanism to predict the optimal beams. Rapid and accurate beam predictions are needed to maintain QoS. A novel metric, Accuracy-Complexity Efficiency (ACE), has been proposed to quantify this. Six testing scenarios have been developed to evaluate the robustness of the proposed model. Finally, the simulation result demonstrates that the proposed model outperforms several state-of-the-art baselines regarding beam prediction accuracy, received power, and ACE in the developed test scenarios.
△ Less
Submitted 21 June, 2024; v1 submitted 4 June, 2024;
originally announced June 2024.
-
FedCCL: Federated Dual-Clustered Feature Contrast Under Domain Heterogeneity
Authors:
Yu Qiao,
Huy Q. Le,
Mengchun Zhang,
Apurba Adhikary,
Chaoning Zhang,
Choong Seon Hong
Abstract:
Federated learning (FL) facilitates a privacy-preserving neural network training paradigm through collaboration between edge clients and a central server. One significant challenge is that the distributed data is not independently and identically distributed (non-IID), typically including both intra-domain and inter-domain heterogeneity. However, recent research is limited to simply using averaged…
▽ More
Federated learning (FL) facilitates a privacy-preserving neural network training paradigm through collaboration between edge clients and a central server. One significant challenge is that the distributed data is not independently and identically distributed (non-IID), typically including both intra-domain and inter-domain heterogeneity. However, recent research is limited to simply using averaged signals as a form of regularization and only focusing on one aspect of these non-IID challenges. Given these limitations, this paper clarifies these two non-IID challenges and attempts to introduce cluster representation to address them from both local and global perspectives. Specifically, we propose a dual-clustered feature contrast-based FL framework with dual focuses. First, we employ clustering on the local representations of each client, aiming to capture intra-class information based on these local clusters at a high level of granularity. Then, we facilitate cross-client knowledge sharing by pulling the local representation closer to clusters shared by clients with similar semantics while pushing them away from clusters with dissimilar semantics. Second, since the sizes of local clusters belonging to the same class may differ for each client, we further utilize clustering on the global side and conduct averaging to create a consistent global signal for guiding each local training in a contrastive manner. Experimental results on multiple datasets demonstrate that our proposal achieves comparable or superior performance gain under intra-domain and inter-domain heterogeneity.
△ Less
Submitted 14 April, 2024;
originally announced April 2024.
-
Logit Calibration and Feature Contrast for Robust Federated Learning on Non-IID Data
Authors:
Yu Qiao,
Chaoning Zhang,
Apurba Adhikary,
Choong Seon Hong
Abstract:
Federated learning (FL) is a privacy-preserving distributed framework for collaborative model training on devices in edge networks. However, challenges arise due to vulnerability to adversarial examples (AEs) and the non-independent and identically distributed (non-IID) nature of data distribution among devices, hindering the deployment of adversarially robust and accurate learning models at the e…
▽ More
Federated learning (FL) is a privacy-preserving distributed framework for collaborative model training on devices in edge networks. However, challenges arise due to vulnerability to adversarial examples (AEs) and the non-independent and identically distributed (non-IID) nature of data distribution among devices, hindering the deployment of adversarially robust and accurate learning models at the edge. While adversarial training (AT) is commonly acknowledged as an effective defense strategy against adversarial attacks in centralized training, we shed light on the adverse effects of directly applying AT in FL that can severely compromise accuracy, especially in non-IID challenges. Given this limitation, this paper proposes FatCC, which incorporates local logit \underline{C}alibration and global feature \underline{C}ontrast into the vanilla federated adversarial training (\underline{FAT}) process from both logit and feature perspectives. This approach can effectively enhance the federated system's robust accuracy (RA) and clean accuracy (CA). First, we propose logit calibration, where the logits are calibrated during local adversarial updates, thereby improving adversarial robustness. Second, FatCC introduces feature contrast, which involves a global alignment term that aligns each local representation with unbiased global features, thus further enhancing robustness and accuracy in federated adversarial environments. Extensive experiments across multiple datasets demonstrate that FatCC achieves comparable or superior performance gains in both CA and RA compared to other baselines.
△ Less
Submitted 10 April, 2024;
originally announced April 2024.
-
Towards Robust Federated Learning via Logits Calibration on Non-IID Data
Authors:
Yu Qiao,
Apurba Adhikary,
Chaoning Zhang,
Choong Seon Hong
Abstract:
Federated learning (FL) is a privacy-preserving distributed management framework based on collaborative model training of distributed devices in edge networks. However, recent studies have shown that FL is vulnerable to adversarial examples (AEs), leading to a significant drop in its performance. Meanwhile, the non-independent and identically distributed (non-IID) challenge of data distribution be…
▽ More
Federated learning (FL) is a privacy-preserving distributed management framework based on collaborative model training of distributed devices in edge networks. However, recent studies have shown that FL is vulnerable to adversarial examples (AEs), leading to a significant drop in its performance. Meanwhile, the non-independent and identically distributed (non-IID) challenge of data distribution between edge devices can further degrade the performance of models. Consequently, both AEs and non-IID pose challenges to deploying robust learning models at the edge. In this work, we adopt the adversarial training (AT) framework to improve the robustness of FL models against adversarial example (AE) attacks, which can be termed as federated adversarial training (FAT). Moreover, we address the non-IID challenge by implementing a simple yet effective logits calibration strategy under the FAT framework, which can enhance the robustness of models when subjected to adversarial attacks. Specifically, we employ a direct strategy to adjust the logits output by assigning higher weights to classes with small samples during training. This approach effectively tackles the class imbalance in the training data, with the goal of mitigating biases between local and global models. Experimental results on three dataset benchmarks, MNIST, Fashion-MNIST, and CIFAR-10 show that our strategy achieves competitive results in natural and robust accuracy compared to several baselines.
△ Less
Submitted 5 March, 2024;
originally announced March 2024.
-
Generative AI-driven Semantic Communication Framework for NextG Wireless Network
Authors:
Avi Deb Raha,
Md. Shirajum Munir,
Apurba Adhikary,
Yu Qiao,
Choong Seon Hong
Abstract:
This work designs a novel semantic communication (SemCom) framework for the next-generation wireless network to tackle the challenges of unnecessary transmission of vast amounts that cause high bandwidth consumption, more latency, and experience with bad quality of services (QoS). In particular, these challenges hinder applications like intelligent transportation systems (ITS), metaverse, mixed re…
▽ More
This work designs a novel semantic communication (SemCom) framework for the next-generation wireless network to tackle the challenges of unnecessary transmission of vast amounts that cause high bandwidth consumption, more latency, and experience with bad quality of services (QoS). In particular, these challenges hinder applications like intelligent transportation systems (ITS), metaverse, mixed reality, and the Internet of Everything, where real-time and efficient data transmission is paramount. Therefore, to reduce communication overhead and maintain the QoS of emerging applications such as metaverse, ITS, and digital twin creation, this work proposes a novel semantic communication framework. First, an intelligent semantic transmitter is designed to capture the meaningful information (e.g., the rode-side image in ITS) by designing a domain-specific Mobile Segment Anything Model (MSAM)-based mechanism to reduce the potential communication traffic while QoS remains intact. Second, the concept of generative AI is introduced for building the SemCom to reconstruct and denoise the received semantic data frame at the receiver end. In particular, the Generative Adversarial Network (GAN) mechanism is designed to maintain a superior quality reconstruction under different signal-to-noise (SNR) channel conditions. Finally, we have tested and evaluated the proposed semantic communication (SemCom) framework with the real-world 6G scenario of ITS; in particular, the base station equipped with an RGB camera and a mmWave phased array. Experimental results demonstrate the efficacy of the proposed SemCom framework by achieving high-quality reconstruction across various SNR channel conditions, resulting in 93.45% data reduction in communication.
△ Less
Submitted 13 October, 2023;
originally announced October 2023.
-
New sets of Non-Orthogonal Spreading Sequences With Low Correlation and Low PAPR Using Extended Boolean Functions
Authors:
Kaiqiang Liu,
Zhengchun Zhou,
Avik Ranjan Adhikary,
Rong Luo
Abstract:
Extended Boolean functions (EBFs) are one of the most important tools in cryptography and spreading sequence design in communication systems. In this paper, we use EBFs to design new sets of spreading sequences for non-orthogonal multiple access (NOMA), which is an emerging technique capable of supporting massive machine-type communications (mMTC) in 5G and beyond. In this work, first $p$-ary comp…
▽ More
Extended Boolean functions (EBFs) are one of the most important tools in cryptography and spreading sequence design in communication systems. In this paper, we use EBFs to design new sets of spreading sequences for non-orthogonal multiple access (NOMA), which is an emerging technique capable of supporting massive machine-type communications (mMTC) in 5G and beyond. In this work, first $p$-ary complementary sequences are constructed using EBFs and then, these sequences are used to design new sets of non-orthogonal spreading sequence sets having very low coherence and peak to average power ratio (PAPR). The proposed spreading sequence sets are capable of supporting a large number of active devices simultaneously. In fact, for a $p$-ary spreading sequence set, we theoretically achieve an overloading factor of $2p$, where $p$ is an odd prime. Specifically, for $p=3$, we achieve an overloading factor of $6$, which cannot be achieved through the existing constructions till date.
△ Less
Submitted 5 May, 2023; v1 submitted 30 April, 2023;
originally announced May 2023.
-
Data-driven Knowledge Fusion for Deep Multi-instance Learning
Authors:
Yu-Xuan Zhang,
Zhengchun Zhou,
Xingxing He,
Avik Ranjan Adhikary,
Bapi Dutta
Abstract:
Multi-instance learning (MIL) is a widely-applied technique in practical applications that involve complex data structures. MIL can be broadly categorized into two types: traditional methods and those based on deep learning. These approaches have yielded significant results, especially with regards to their problem-solving strategies and experimental validation, providing valuable insights for res…
▽ More
Multi-instance learning (MIL) is a widely-applied technique in practical applications that involve complex data structures. MIL can be broadly categorized into two types: traditional methods and those based on deep learning. These approaches have yielded significant results, especially with regards to their problem-solving strategies and experimental validation, providing valuable insights for researchers in the MIL field. However, a considerable amount of knowledge is often trapped within the algorithm, leading to subsequent MIL algorithms that solely rely on the model's data fitting to predict unlabeled samples. This results in a significant loss of knowledge and impedes the development of more intelligent models. In this paper, we propose a novel data-driven knowledge fusion for deep multi-instance learning (DKMIL) algorithm. DKMIL adopts a completely different idea from existing deep MIL methods by analyzing the decision-making of key samples in the data set (referred to as the data-driven) and using the knowledge fusion module designed to extract valuable information from these samples to assist the model's training. In other words, this module serves as a new interface between data and the model, providing strong scalability and enabling the use of prior knowledge from existing algorithms to enhance the learning ability of the model. Furthermore, to adapt the downstream modules of the model to more knowledge-enriched features extracted from the data-driven knowledge fusion module, we propose a two-level attention module that gradually learns shallow- and deep-level features of the samples to achieve more effective classification. We will prove the scalability of the knowledge fusion module while also verifying the efficacy of the proposed architecture by conducting experiments on 38 data sets across 6 categories.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
MP-FedCL: Multiprototype Federated Contrastive Learning for Edge Intelligence
Authors:
Yu Qiao,
Md. Shirajum Munir,
Apurba Adhikary,
Huy Q. Le,
Avi Deb Raha,
Chaoning Zhang,
Choong Seon Hong
Abstract:
Federated learning-assisted edge intelligence enables privacy protection in modern intelligent services. However, not independent and identically distributed (non-IID) distribution among edge clients can impair the local model performance. The existing single prototype-based strategy represents a class by using the mean of the feature space. However, feature spaces are usually not clustered, and a…
▽ More
Federated learning-assisted edge intelligence enables privacy protection in modern intelligent services. However, not independent and identically distributed (non-IID) distribution among edge clients can impair the local model performance. The existing single prototype-based strategy represents a class by using the mean of the feature space. However, feature spaces are usually not clustered, and a single prototype may not represent a class well. Motivated by this, this paper proposes a multi-prototype federated contrastive learning approach (MP-FedCL) which demonstrates the effectiveness of using a multi-prototype strategy over a single-prototype under non-IID settings, including both label and feature skewness. Specifically, a multi-prototype computation strategy based on \textit{k-means} is first proposed to capture different embedding representations for each class space, using multiple prototypes ($k$ centroids) to represent a class in the embedding space. In each global round, the computed multiple prototypes and their respective model parameters are sent to the edge server for aggregation into a global prototype pool, which is then sent back to all clients to guide their local training. Finally, local training for each client minimizes their own supervised learning tasks and learns from shared prototypes in the global prototype pool through supervised contrastive learning, which encourages them to learn knowledge related to their own class from others and reduces the absorption of unrelated knowledge in each global iteration. Experimental results on MNIST, Digit-5, Office-10, and DomainNet show that our method outperforms multiple baselines, with an average test accuracy improvement of about 4.6\% and 10.4\% under feature and label non-IID distributions, respectively.
△ Less
Submitted 11 October, 2023; v1 submitted 1 April, 2023;
originally announced April 2023.
-
Interpreting Vulnerabilities of Multi-Instance Learning to Adversarial Perturbations
Authors:
Yu-Xuan Zhang,
Hua Meng,
Xue-Mei Cao,
Zhengchun Zhou,
Mei Yang,
Avik Ranjan Adhikary
Abstract:
Multi-Instance Learning (MIL) is a recent machine learning paradigm which is immensely useful in various real-life applications, like image analysis, video anomaly detection, text classification, etc. It is well known that most of the existing machine learning classifiers are highly vulnerable to adversarial perturbations. Since MIL is a weakly supervised learning, where information is available f…
▽ More
Multi-Instance Learning (MIL) is a recent machine learning paradigm which is immensely useful in various real-life applications, like image analysis, video anomaly detection, text classification, etc. It is well known that most of the existing machine learning classifiers are highly vulnerable to adversarial perturbations. Since MIL is a weakly supervised learning, where information is available for a set of instances, called bag and not for every instances, adversarial perturbations can be fatal. In this paper, we have proposed two adversarial perturbation methods to analyze the effect of adversarial perturbations to interpret the vulnerability of MIL methods. Out of the two algorithms, one can be customized for every bag, and the other is a universal one, which can affect all bags in a given data set and thus has some generalizability. Through simulations, we have also shown the effectiveness of the proposed algorithms to fool the state-of-the-art (SOTA) MIL methods. Finally, we have discussed through experiments, about taking care of these kind of adversarial perturbations through a simple strategy. Source codes are available at https://github.com/InkiInki/MI-UAP.
△ Less
Submitted 16 April, 2023; v1 submitted 30 November, 2022;
originally announced November 2022.
-
Impact Learning: A Learning Method from Features Impact and Competition
Authors:
Nusrat Jahan Prottasha,
Saydul Akbar Murad,
Abu Jafar Md Muzahid,
Masud Rana,
Md Kowsher,
Apurba Adhikary,
Sujit Biswas,
Anupam Kumar Bairagi
Abstract:
Machine learning is the study of computer algorithms that can automatically improve based on data and experience. Machine learning algorithms build a model from sample data, called training data, to make predictions or judgments without being explicitly programmed to do so. A variety of wellknown machine learning algorithms have been developed for use in the field of computer science to analyze da…
▽ More
Machine learning is the study of computer algorithms that can automatically improve based on data and experience. Machine learning algorithms build a model from sample data, called training data, to make predictions or judgments without being explicitly programmed to do so. A variety of wellknown machine learning algorithms have been developed for use in the field of computer science to analyze data. This paper introduced a new machine learning algorithm called impact learning. Impact learning is a supervised learning algorithm that can be consolidated in both classification and regression problems. It can furthermore manifest its superiority in analyzing competitive data. This algorithm is remarkable for learning from the competitive situation and the competition comes from the effects of autonomous features. It is prepared by the impacts of the highlights from the intrinsic rate of natural increase (RNI). We, moreover, manifest the prevalence of the impact learning over the conventional machine learning algorithm.
△ Less
Submitted 4 November, 2022;
originally announced November 2022.
-
Neuro-symbolic Explainable Artificial Intelligence Twin for Zero-touch IoE in Wireless Network
Authors:
Md. Shirajum Munir,
Ki Tae Kim,
Apurba Adhikary,
Walid Saad,
Sachin Shetty,
Seong-Bae Park,
Choong Seon Hong
Abstract:
Explainable artificial intelligence (XAI) twin systems will be a fundamental enabler of zero-touch network and service management (ZSM) for sixth-generation (6G) wireless networks. A reliable XAI twin system for ZSM requires two composites: an extreme analytical ability for discretizing the physical behavior of the Internet of Everything (IoE) and rigorous methods for characterizing the reasoning…
▽ More
Explainable artificial intelligence (XAI) twin systems will be a fundamental enabler of zero-touch network and service management (ZSM) for sixth-generation (6G) wireless networks. A reliable XAI twin system for ZSM requires two composites: an extreme analytical ability for discretizing the physical behavior of the Internet of Everything (IoE) and rigorous methods for characterizing the reasoning of such behavior. In this paper, a novel neuro-symbolic explainable artificial intelligence twin framework is proposed to enable trustworthy ZSM for a wireless IoE. The physical space of the XAI twin executes a neural-network-driven multivariate regression to capture the time-dependent wireless IoE environment while determining unconscious decisions of IoE service aggregation. Subsequently, the virtual space of the XAI twin constructs a directed acyclic graph (DAG)-based Bayesian network that can infer a symbolic reasoning score over unconscious decisions through a first-order probabilistic language model. Furthermore, a Bayesian multi-arm bandits-based learning problem is proposed for reducing the gap between the expected explained score and the current obtained score of the proposed neuro-symbolic XAI twin. To address the challenges of extensible, modular, and stateless management functions in ZSM, the proposed neuro-symbolic XAI twin framework consists of two learning systems: 1) an implicit learner that acts as an unconscious learner in physical space, and 2) an explicit leaner that can exploit symbolic reasoning based on implicit learner decisions and prior evidence. Experimental results show that the proposed neuro-symbolic XAI twin can achieve around 96.26% accuracy while guaranteeing from 18% to 44% more trust score in terms of reasoning and closed-loop automation.
△ Less
Submitted 12 October, 2022;
originally announced October 2022.
-
Asymptotically Optimal Golay-ZCZ Sequence Sets with Flexible Length
Authors:
Zhi Gu,
Zhengchun Zhou,
Avik Ranjan Adhikary,
Yanghe Feng,
Pingzhi Fan
Abstract:
Zero correlation zone (ZCZ) sequences and Golay complementary sequences are two kinds of sequences with different preferable correlation properties. Golay-ZCZ sequences are special kinds of complementary sequences which also possess a large ZCZ and are good candidates for pilots in OFDM systems. Known Golay-ZCZ sequences reported in the literature have a limitation in the length which is the form…
▽ More
Zero correlation zone (ZCZ) sequences and Golay complementary sequences are two kinds of sequences with different preferable correlation properties. Golay-ZCZ sequences are special kinds of complementary sequences which also possess a large ZCZ and are good candidates for pilots in OFDM systems. Known Golay-ZCZ sequences reported in the literature have a limitation in the length which is the form of a power of 2. In this paper, we propose two constructions of Golay-ZCZ sequence sets with new parameters which generalize the constructions of Gong et al. (IEEE Transaction on Communications 61(9), 2013) and Chen et al (IEEE Transaction on Communications 61(9), 2018). Notably, one of the constructions results in optimal binary Golay-ZCZ sequences, while the other results in asymptotically optimal polyphase Golay-ZCZ sequences as the number of sequences increases.
△ Less
Submitted 16 December, 2021;
originally announced December 2021.
-
New Constructions of Golay Complementary Pair/Array with Large Zero Correlation Zone
Authors:
Zhi Gu,
Zhengchun Zhou,
Avik Ranjan Adhikary,
Yanghe Feng,
Pingzhi Fan
Abstract:
Zero correlation zone (ZCZ) sequences and Golay sequences are two kinds of sequences with different preferable correlation properties. It was shown by Gong \textit{et al.} and Chen \textit{et al.} that some Golay sequences also possess a large ZCZ and are good candidates for pilots in OFDM systems. Known Golay sequences with ZCZ reported in the literature have a limitation in the length which is t…
▽ More
Zero correlation zone (ZCZ) sequences and Golay sequences are two kinds of sequences with different preferable correlation properties. It was shown by Gong \textit{et al.} and Chen \textit{et al.} that some Golay sequences also possess a large ZCZ and are good candidates for pilots in OFDM systems. Known Golay sequences with ZCZ reported in the literature have a limitation in the length which is the form of a power of 2. One objective of this paper is to propose a construction of Golay complementary pairs (GCPs) with new lengths whose periodic autocorrelation of each of the Golay sequences and periodic corss-correlation of the pair displays a zero correlation zone (ZCZ) around the in-phase position. Specifically, the proposed GCPs have length $4N$ (where, $N$ is the length of a GCP) and ZCZ width $N+1$. Another objective of this paper is to extend the construction to two-dimensional Golay complementary array pairs (GCAPs). Interestingly the periodic corss-correlation of the proposed GACPs also have large ZCZs around the in-phase position.
△ Less
Submitted 13 August, 2021; v1 submitted 12 August, 2021;
originally announced August 2021.
-
Asymptotically Optimal and Near-optimal Aperiodic Quasi-Complementary Sequence Sets Based on Florentine Rectangles
Authors:
Avik Ranjan Adhikary,
Yanghe Feng,
Zhengchun Zhou,
Pingzhi Fan
Abstract:
Quasi-complementary sequence sets (QCSSs) can be seen as a generalized version of complete complementary codes (CCCs), which enables multicarrier communication systems to support more users. The contribution of this work is two-fold. First, we propose a systematic construction of Florentine rectangles. Secondly, we propose several sets of CCCs and QCSS, using Florentine rectangles. The CCCs and QC…
▽ More
Quasi-complementary sequence sets (QCSSs) can be seen as a generalized version of complete complementary codes (CCCs), which enables multicarrier communication systems to support more users. The contribution of this work is two-fold. First, we propose a systematic construction of Florentine rectangles. Secondly, we propose several sets of CCCs and QCSS, using Florentine rectangles. The CCCs and QCSS are constructed over $\mathbb{Z}_N$, where $N\geq2$ is any integer. The cross-correlation magnitude of any two of the constructed CCCs is upper bounded by $N$. By combining the proposed CCCs, we propose asymptotically optimal and near-optimal QCSSs with new parameters. This solves a long-standing problem, of designing asymptotically optimal aperiodic QCSS over $\mathbb{Z}_N$, where $N$ is any integer.
△ Less
Submitted 21 October, 2020;
originally announced October 2020.
-
New Constructions of Cross Z-Complementary Pairs
Authors:
Avik Ranjan Adhikary,
Zhengchun Zhou,
Yang Yang,
Pingzhi Fan
Abstract:
Spatial modulation (SM) is a new paradigm of multiple-input multiple-output (MIMO) systems, in which only one antenna at the transmitter is activated during each symbol period. Recently, it is observed that SM training sequences derived from corss Z-complementary pairs (CZCPs) lead to optimal channel estimation performance over frequency-selective channels. CZCPs are special form of sequence pairs…
▽ More
Spatial modulation (SM) is a new paradigm of multiple-input multiple-output (MIMO) systems, in which only one antenna at the transmitter is activated during each symbol period. Recently, it is observed that SM training sequences derived from corss Z-complementary pairs (CZCPs) lead to optimal channel estimation performance over frequency-selective channels. CZCPs are special form of sequence pairs which have zero aperiodic autocorrelation zones and cross-correlation zone at certain time-shifts. Recent paper by Liu \textit{et al.} discussed only perfect CZCPs. In this paper, we focus on non-perfect CZCPs. We introduce the term cross Z-complementary ratio and re-categorise the CZCPs, both perfect and non-perfect, based on that. We propose a systematic construction of CZCPs based on generalised Boolean functions (GBFs). We further extend the lengths of the CZCPs by using the insertion method. The proposed CZCPs are all of new lengths of the form $2^\alpha10^\beta26^γ+2~(α\geq1)$, $10^β+2$, $26^γ+2$ and $10^β26^γ+2$. Finally we propose a construction of optimal binary CZCPs having parameters $(12,5)$ and $(24,11)$ from binary Barker sequences. These CZCPs are also extended to $(12N,5N)$- CZCPs and $(24N,11N)$- CZCPs, where $N$ is the length of a binary Golay complementary pair (GCP). During the proof, we also found a new structural property of binary CZCPs and concluded all binary GCPs are CZCPs too. Finally, we give some numerical simulations to confirm that depending on the number of multi-paths, the proposed CZCPs can be used to design SM training matrix which attains the minimum mean square error.
△ Less
Submitted 21 May, 2021; v1 submitted 16 February, 2020;
originally announced February 2020.
-
Generalized Constructions of Complementary Sets of Sequences of Lengths Non-Power-of-Two
Authors:
Gaoxiang Wang,
Avik Ranjan Adhikary,
Zhengchun Zhou,
Yang Yang
Abstract:
The construction of complementary sets (CSs) of sequences with different set size and sequence length become important due to its practical application for OFDM systems. Most of the constructions of CSs, based on generalized Boolean functions (GBFs), are of length $2^α$ ($α$ is a natural number). Recently some works have been reported on construction of CSs having lengths non-power of two, i.e., i…
▽ More
The construction of complementary sets (CSs) of sequences with different set size and sequence length become important due to its practical application for OFDM systems. Most of the constructions of CSs, based on generalized Boolean functions (GBFs), are of length $2^α$ ($α$ is a natural number). Recently some works have been reported on construction of CSs having lengths non-power of two, i.e., in the form of $2^{m-1}+2^v$ ($m$ is natural number, $0\leq v <m $), $N+1$ and $N+2$, where $N$ is a length for which $q$-ary complementary pairs exist. In this paper, we propose a construction of CSs of lengths $M+N$ for set size $4n$, using concatenation of CSs of lengths $M$ and $N$, and set size $4n$, where $M$ and $N$ are lengths for which $q$-ary complementary pairs exists. Also, we construct CSs of length $M+P$ for set size $8n$ by concatenating CSs of lengths $M$ and $P$, and set size $8n$, where $M$ and $P$ are lengths for which $q$-ary complementary pairs and complementary sets of size $4$ exists, respectively. The proposed constructions cover all the previous constructions as special cases in terms of lengths and lead to more CSs of new sequence lengths which have not been reported before.
△ Less
Submitted 10 December, 2019; v1 submitted 27 November, 2019;
originally announced November 2019.
-
New Sets of Optimal Odd-length Binary Z-Complementary Pairs
Authors:
Avik Ranjan Adhikary,
Sudhan Majhi,
Zilong Liu,
Yong Liang Guan
Abstract:
A pair of sequences is called a Z-complementary pair (ZCP) if it has zero aperiodic autocorrelation sums (AACSs) for time-shifts within a certain region, called zero correlation zone (ZCZ). Optimal odd-length binary ZCPs (OB-ZCPs) display closest correlation properties to Golay complementary pairs (GCPs) in that each OB-ZCP achieves maximum ZCZ of width (N+1)/2 (where N is the sequence length) and…
▽ More
A pair of sequences is called a Z-complementary pair (ZCP) if it has zero aperiodic autocorrelation sums (AACSs) for time-shifts within a certain region, called zero correlation zone (ZCZ). Optimal odd-length binary ZCPs (OB-ZCPs) display closest correlation properties to Golay complementary pairs (GCPs) in that each OB-ZCP achieves maximum ZCZ of width (N+1)/2 (where N is the sequence length) and every out-of-zone AACSs reaches the minimum magnitude value, i.e. 2. Till date, systematic constructions of optimal OB-ZCPs exist only for lengths $2^α \pm 1$, where $α$ is a positive integer. In this paper, we construct optimal OB-ZCPs of generic lengths $2^α10^β26^γ+1$ (where $α,~ β, ~ γ$ are non-negative integers and $α\geq 1$) from inserted versions of binary GCPs. The key leading to the proposed constructions is several newly identified structure properties of binary GCPs obtained from Turyn's method. This key also allows us to construct OB-ZCPs with possible ZCZ widths of $4 \times 10^{β-1} +1$, $12 \times 26^{γ-1}+1$ and $12 \times 10^β26^{γ-1}+1$ through proper insertions of GCPs of lengths $10^β,~ 26^γ, \text{and } 10^β26^γ$, respectively. Our proposed OB-ZCPs have applications in communications and radar (as an alternative to GCPs).
△ Less
Submitted 23 September, 2019;
originally announced September 2019.
-
A Generalised Construction of Multiple Complete Complementary Codes and Asymptotically Optimal Aperiodic Quasi-Complementary Sequence Sets
Authors:
Zhengchun Zhou,
Fangrui Liu,
Avik Ranjan Adhikary,
Pingzhi Fan
Abstract:
In recent years, complementary sequence sets have found many important applications in multi-carrier code-division multiple-access (MC-CDMA) systems for their good correlation properties. In this paper, we propose a construction, which can generate multiple sets of complete complementary codes (CCCs) over $\mathbb{Z}_N$, where $N~(N\geq 3)$ is a positive integer of the form…
▽ More
In recent years, complementary sequence sets have found many important applications in multi-carrier code-division multiple-access (MC-CDMA) systems for their good correlation properties. In this paper, we propose a construction, which can generate multiple sets of complete complementary codes (CCCs) over $\mathbb{Z}_N$, where $N~(N\geq 3)$ is a positive integer of the form $N=p_0^{e^0}p_1^{e^1}\dots p_{n-1}^{e^{n-1}}$, $p_0<p_1<\cdots<p_{n-1}$ are prime factors of $N$ and $e_0,e_1,\cdots,e_{n-1}$ are non-negative integers. Interestingly, the maximum inter-set aperiodic cross-correlation magnitude of the proposed CCCs is upper bounded by $N$. When $N$ is odd, the combination of the proposed CCCs results to a new set of sequences to obtain asymptotically optimal and near-optimal aperiodic quasi-complementary sequence sets (QCSSs) with more flexible parameters.
△ Less
Submitted 21 May, 2021; v1 submitted 9 September, 2019;
originally announced September 2019.
-
Uplink Massive MIMO for Channels with Spatial Correlation
Authors:
Ansuman Adhikary,
Alexei Ashikhmin
Abstract:
A massive MIMO system entails a large number of base station antennas M serving a much smaller number of users. This leads to large gains in spectral and energy efficiency compared with other technologies. As the number of antennas M grows, the performance of such systems gets limited by pilot contamination interference. Large Scale Fading Precoding/Postcoding (LSFP) was proposed in literature for…
▽ More
A massive MIMO system entails a large number of base station antennas M serving a much smaller number of users. This leads to large gains in spectral and energy efficiency compared with other technologies. As the number of antennas M grows, the performance of such systems gets limited by pilot contamination interference. Large Scale Fading Precoding/Postcoding (LSFP) was proposed in literature for mitigation of pilot contamination. It was shown recently that in channels without spatial correlation (uncorrelated base station antennas) LSFP leads to large spectral-efficiency gains. Also, recently, it was observed that if a channel has spatial correlation, then one can use this correlation to drastically reduce the pilot contamination interference in the asymptotic regime as M tends to infinity. In this work, we analyze the performance of Uplink (UL) transmission of massive MIMO systems with finitely many antennas M for channels with spatial correlation. We extend the idea of LSFP to correlated channel models and derive SINR expressions that depend only on slow fading channel components for such systems with and without LSFP. These simple expressions lead us to simple algorithms for transmit power optimization. As a result, we obtain a multi-fold increase in data transmission rates.
△ Less
Submitted 12 July, 2018;
originally announced July 2018.
-
Uplink Interference Reduction in Large Scale Antenna Systems
Authors:
Ansuman Adhikary,
Alexei Ashikhmin,
Thomas L. Marzetta
Abstract:
A massive MIMO system entails a large number (tens or hundreds) of base station antennas serving a much smaller number of terminals. These systems demonstrate large gains in spectral and energy efficiency compared with conventional MIMO technology. As the number of antennas grows, the performance of a massive MIMO system gets limited by the interference caused by pilot contamination. Earlier A. As…
▽ More
A massive MIMO system entails a large number (tens or hundreds) of base station antennas serving a much smaller number of terminals. These systems demonstrate large gains in spectral and energy efficiency compared with conventional MIMO technology. As the number of antennas grows, the performance of a massive MIMO system gets limited by the interference caused by pilot contamination. Earlier A. Ashikhmin and T. Marzetta proposed (under the name of Pilot Contamination Precoding) Large Scale Fading Precoding (LSFP) and Decoding (LSFD) based on limited cooperation between base stations. They showed that Zero-Forcing LSFP and LSFD eliminate pilot contamination entirely and lead to an infinite throughput as the number of antennas grows.
In this paper, we focus on the uplink and show that even in the case of a finite number of base station antennas, LSFD yields a very large performance gain. In particular, one of our algorithms gives a more than 140 fold increase in the 5% outage data transmission rate! We show that the performance can be improved further by optimizing the transmission powers of the users. Finally, we present decentralized LSFD that requires limited cooperation only between neighboring cells.
△ Less
Submitted 18 January, 2017;
originally announced January 2017.
-
A Primer on 3GPP Narrowband Internet of Things (NB-IoT)
Authors:
Y. -P. Eric Wang,
Xingqin Lin,
Ansuman Adhikary,
Asbjörn Grövlen,
Yutao Sui,
Yufei Blankenship,
Johan Bergman,
Hazhir S. Razaghi
Abstract:
Narrowband Internet of Things (NB-IoT) is a new cellular technology introduced in 3GPP Release 13 for providing wide-area coverage for the Internet of Things (IoT). This article provides an overview of the air interface of NB-IoT. We describe how NB-IoT addresses key IoT requirements such as deployment flexibility, low device complexity, long battery life time, support of massive number of devices…
▽ More
Narrowband Internet of Things (NB-IoT) is a new cellular technology introduced in 3GPP Release 13 for providing wide-area coverage for the Internet of Things (IoT). This article provides an overview of the air interface of NB-IoT. We describe how NB-IoT addresses key IoT requirements such as deployment flexibility, low device complexity, long battery life time, support of massive number of devices in a cell, and significant coverage extension beyond existing cellular technologies. We also share the various design rationales during the standardization of NB-IoT in Release 13 and point out several open areas for future evolution of NB-IoT.
△ Less
Submitted 13 June, 2016;
originally announced June 2016.
-
Random Access Preamble Design and Detection for 3GPP Narrowband IoT Systems
Authors:
Xingqin Lin,
Ansuman Adhikary,
Y. -P. Eric Wang
Abstract:
Narrowband internet of things (NB-IoT) is an emerging cellular technology that will provide improved coverage for massive number of low-throughput low-cost devices with low device power consumption in delay-tolerant applications. A new single tone signal with frequency hopping has been designed for NB-IoT physical random access channel (NPRACH). In this letter we describe this new NPRACH design an…
▽ More
Narrowband internet of things (NB-IoT) is an emerging cellular technology that will provide improved coverage for massive number of low-throughput low-cost devices with low device power consumption in delay-tolerant applications. A new single tone signal with frequency hopping has been designed for NB-IoT physical random access channel (NPRACH). In this letter we describe this new NPRACH design and explain in detail the design rationale. We further propose possible receiver algorithms for NPRACH detection and time-of-arrival estimation. Simulation results on NPRACH performance including detection rate, false alarm rate, and time-of-arrival estimation accuracy are presented to shed light on the overall potential of NB-IoT systems.
△ Less
Submitted 17 May, 2016;
originally announced May 2016.
-
Massive-MIMO Meets HetNet: Interference Coordination Through Spatial Blanking
Authors:
Ansuman Adhikary,
Harpreet S. Dhillon,
Giuseppe Caire
Abstract:
In this paper, we study the downlink performance of a heterogeneous cellular network (HetNet) where both macro and small cells share the same spectrum and hence interfere with each other. We assume that the users are concentrated at certain areas in the cell, i.e., they form hotspots. While some of the hotspots are assumed to have a small cell in their vicinity, the others are directly served by t…
▽ More
In this paper, we study the downlink performance of a heterogeneous cellular network (HetNet) where both macro and small cells share the same spectrum and hence interfere with each other. We assume that the users are concentrated at certain areas in the cell, i.e., they form hotspots. While some of the hotspots are assumed to have a small cell in their vicinity, the others are directly served by the macrocell. Due to a relatively small area of each hotspot, the users lying in a particular hotspot appear to be almost co-located to the macrocells, which are typically deployed at some elevation. Assuming large number of antennas at the macrocell, we exploit this directionality in the channel vectors to obtain spatial blanking, i.e., concentrating transmission energy only in certain directions while creating transmission opportunities for the small cells lying in the other directions. In addition to this inherent interference suppression, we also develop three low-complexity interference coordination strategies: (i) turn off small cells based on the amount of cross-tier interference they receive or cause to the scheduled macrocell hotspots, (ii) schedule hotspots such that treating interference as noise is approximately optimal for the resulting Gaussian interference channel, and (iii) offload some of the macrocell hotspots to nearby small cells in order to improve throughput fairness across all hotspots. For all these schemes, we study the relative merits and demerits of uniform deployment of small cells vs. deploying more small cells towards the cell center or the cell edge.
△ Less
Submitted 21 July, 2014;
originally announced July 2014.
-
Joint Spatial Division and Multiplexing for mm-Wave Channels
Authors:
Ansuman Adhikary,
Ebrahim Al Safadi,
Mathew Samimi,
Rui Wang,
Giuseppe Caire,
Theodore S. Rappaport,
Andreas F. Molisch
Abstract:
Massive MIMO systems are well-suited for mm-Wave communications, as large arrays can be built with reasonable form factors, and the high array gains enable reasonable coverage even for outdoor communications. One of the main obstacles for using such systems in frequency-division duplex mode, namely the high overhead for the feedback of channel state information (CSI) to the transmitter, can be mit…
▽ More
Massive MIMO systems are well-suited for mm-Wave communications, as large arrays can be built with reasonable form factors, and the high array gains enable reasonable coverage even for outdoor communications. One of the main obstacles for using such systems in frequency-division duplex mode, namely the high overhead for the feedback of channel state information (CSI) to the transmitter, can be mitigated by the recently proposed JSDM (Joint Spatial Division and Multiplexing) algorithm. In this paper we analyze the performance of this algorithm in some realistic propagation channels that take into account the partial overlap of the angular spectra from different users, as well as the sparsity of mm-Wave channels. We formulate the problem of user grouping for two different objectives, namely maximizing spatial multiplexing, and maximizing total received power, in a graph-theoretic framework. As the resulting problems are numerically difficult, we proposed (sub optimum) greedy algorithms as efficient solution methods. Numerical examples show that the different algorithms may be superior in different settings.We furthermore develop a new, "degenerate" version of JSDM that only requires average CSI at the transmitter, and thus greatly reduces the computational burden. Evaluations in propagation channels obtained from ray tracing results, as well as in measured outdoor channels show that this low-complexity version performs surprisingly well in mm-Wave channels.
△ Less
Submitted 24 May, 2014; v1 submitted 6 December, 2013;
originally announced December 2013.
-
Joint Spatial Division and Multiplexing: Opportunistic Beamforming and User Grouping
Authors:
Ansuman Adhikary,
Giuseppe Caire
Abstract:
Joint Spatial Division and Multiplexing (JSDM) is a recently proposed scheme to enable massive MIMO like gains and simplified system operations for Frequency Division Duplexing (FDD) systems. The key idea lies in partitioning the users into groups with approximately similar covariances, and use a two stage downlink beamforming: a pre-beamformer that depends on the channel covariances and minimizes…
▽ More
Joint Spatial Division and Multiplexing (JSDM) is a recently proposed scheme to enable massive MIMO like gains and simplified system operations for Frequency Division Duplexing (FDD) systems. The key idea lies in partitioning the users into groups with approximately similar covariances, and use a two stage downlink beamforming: a pre-beamformer that depends on the channel covariances and minimizes interference across groups and a multiuser MIMO precoder for the effective channel after pre-beamforming, to counteract interference within a group. We first focus on the regime of a fixed number of antennas and large number of users, and show that opportunistic beamforming with user selection yields significant gain, and thus, channel correlation may yield a capacity improvement over the uncorrelated "isotropic" channel result of Sharif and Hassibi. We prove that in the presence of different correlations among groups, a block diagonalization approach for the design of pre-beamformers achieves the optimal sum-rate scaling. Next, we consider the regime of large number of antennas and users, where user selection does not provide significant gain. Here, we propose a simplified user grouping algorithm to cluster users into groups when the number of antennas becomes very large, in a realistic setting where users are randomly distributed and have different angles of arrival and angular spreads depending on the propagation environment. Our subsequent analysis leads to a probabilistic scheduling algorithm, where users within each group are preselected at random based on probabilities derived from the large system analysis, depending on the fairness criterion. This is advantageous since only the selected users are required to feedback their channel state information (CSIT).
△ Less
Submitted 30 May, 2013;
originally announced May 2013.
-
Joint Spatial Division and Multiplexing
Authors:
Ansuman Adhikary,
Junyoung Nam,
Jae-Young Ahn,
Giuseppe Caire
Abstract:
We propose Joint Spatial Division and Multiplexing (JSDM), an approach to multiuser MIMO downlink that exploits the structure of the correlation of the channel vectors in order to allow for a large number of antennas at the base station while requiring reduced-dimensional Channel State Information at the Transmitter (CSIT). This allows for significant savings both in the downlink training and in t…
▽ More
We propose Joint Spatial Division and Multiplexing (JSDM), an approach to multiuser MIMO downlink that exploits the structure of the correlation of the channel vectors in order to allow for a large number of antennas at the base station while requiring reduced-dimensional Channel State Information at the Transmitter (CSIT). This allows for significant savings both in the downlink training and in the CSIT feedback from the user terminals to the base station, thus making the use of a large number of base station antennas potentially suitable also for Frequency Division Duplexing (FDD) systems, for which uplink/downlink channel reciprocity cannot be exploited. JSDM forms the multiuser MIMO downlink precoder by concatenating a pre-beamforming matrix, which depends only on the channel second-order statistics, with a classical multiuser precoder, based on the instantaneous knowledge of the resulting reduced dimensional effective channels. We prove a simple condition under which JSDM incurs no loss of optimality with respect to the full CSIT case. For linear uniformly spaced arrays, we show that such condition is closely approached when the number of antennas is large. For this case, we use Szego asymptotic theory of large Toeplitz matrices to design a DFT-based pre-beamforming scheme requiring only coarse information about the users angles of arrival and angular spread. Finally, we extend these ideas to the case of a two-dimensional base station antenna array, with 3-dimensional beamforming, including multiple beams in the elevation angle direction. We provide guidelines for the pre-beamforming optimization and calculate the system spectral efficiency under proportional fairness and maxmin fairness criteria, showing extremely attractive performance. Our numerical results are obtained via an asymptotic random matrix theory tool known as deterministic equivalent approximation.
△ Less
Submitted 28 January, 2013; v1 submitted 6 September, 2012;
originally announced September 2012.
-
On the Coexistence of Macrocell Spatial Multiplexing and Cognitive Femtocells
Authors:
Ansuman Adhikary,
Giuseppe Caire
Abstract:
We study a two-tier macrocell/femtocell system where the macrocell base station is equipped with multiple antennas and makes use of multiuser MIMO (spatial multiplexing), and the femtocells are "cognitive". In particular, we assume that the femtocells are aware of the locations of scheduled macrocell users on every time-frequency slot, so that they can make decisions on their transmission opportun…
▽ More
We study a two-tier macrocell/femtocell system where the macrocell base station is equipped with multiple antennas and makes use of multiuser MIMO (spatial multiplexing), and the femtocells are "cognitive". In particular, we assume that the femtocells are aware of the locations of scheduled macrocell users on every time-frequency slot, so that they can make decisions on their transmission opportunities accordingly. Femtocell base stations are also equipped with multiple antennas. We propose a scheme where the macrocell downlink (macro- DL) is aligned with the femtocells uplink (femto-UL) and, Vice Versa, the macrocell uplink (macro-UL) is aligned with the femtocells downlink femto-DL). Using a simple "interference temperature" power control in the macro-DL/femto-UL direction, and exploiting uplink/downlink duality and the Yates, Foschini and Miljanic distributed power control algorithm in the macro- UL/femto-DL direction, we can achieve an extremely attractive macro/femto throughput tradeoff region in both directions. We investigate the impact of multiuser MIMO spatial multiplexing in the macrocell under the proposed scheme, and find that large gains are achievable by letting the macrocell schedule groups of co-located users, such that the number of femtocells affected by the interference temperature power constraint is small.
△ Less
Submitted 7 February, 2012;
originally announced February 2012.
-
Multi-User MIMO with outdated CSI: Training, Feedback and Scheduling
Authors:
Ansuman Adhikary,
Haralabos C. Papadopoulos,
Sean A. Ramprashad,
Giuseppe Caire
Abstract:
Conventional MU-MIMO techniques, e.g. Linear Zero-Forced Beamforming (LZFB), require sufficiently accurate channel state information at the transmitter (CSIT) in order to realize spectral efficient transmission (degree of freedom gains). In practical settings, however, CSIT accuracy can be limited by a number of issues including CSI estimation, CSI feedback delay between user terminals to base sta…
▽ More
Conventional MU-MIMO techniques, e.g. Linear Zero-Forced Beamforming (LZFB), require sufficiently accurate channel state information at the transmitter (CSIT) in order to realize spectral efficient transmission (degree of freedom gains). In practical settings, however, CSIT accuracy can be limited by a number of issues including CSI estimation, CSI feedback delay between user terminals to base stations, and the time/frequency coherence of the channel. The latter aspects of CSIT-feedback delay and channel-dynamics can lead to significant challenges in the deployment of efficient MU-MIMO systems. Recently it has been shown by Maddah-Ali and Tse (MAT) that degree of freedom gains can be realized by MU-MIMO even when the knowledge of CSIT is completely outdated. Specifically, outdated CSIT, albeit perfect CSIT, is known for transmissions only after they have taken place. This aspect of insensitivity to CSIT-feedback delay is of particular interest since it allows one to reconsider MU-MIMO design in dynamic channel conditions. Indeed, as we show, with appropriate scheduling, and even in the context of CSI estimation and feedback errors, the proposed MAT scheme can have performance advantages over conventional MU-MIMO in such scenarios.
△ Less
Submitted 28 September, 2011;
originally announced September 2011.