Zum Hauptinhalt springen

Showing 1–11 of 11 results for author: Yu, N Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.02307  [pdf, other

    cs.IT

    Joint Activity and Data Detection for Massive Grant-Free Access Using Deterministic Non-Orthogonal Signatures

    Authors: Nam Yul Yu, Wei Yu

    Abstract: Grant-free access is a key enabler for connecting wireless devices with low latency and low signaling overhead in massive machine-type communications (mMTC). For massive grant-free access, user-specific signatures are uniquely assigned to mMTC devices. In this paper, we first derive a sufficient condition for the successful identification of active devices through maximum likelihood (ML) estimatio… ▽ More

    Submitted 3 February, 2024; originally announced February 2024.

  2. arXiv:2304.11135  [pdf

    cs.CV physics.med-ph

    Deep-Learning-based Fast and Accurate 3D CT Deformable Image Registration in Lung Cancer

    Authors: Yuzhen Ding, Hongying Feng, Yunze Yang, Jason Holmes, Zhengliang Liu, David Liu, William W. Wong, Nathan Y. Yu, Terence T. Sio, Steven E. Schild, Baoxin Li, Wei Liu

    Abstract: Purpose: In some proton therapy facilities, patient alignment relies on two 2D orthogonal kV images, taken at fixed, oblique angles, as no 3D on-the-bed imaging is available. The visibility of the tumor in kV images is limited since the patient's 3D anatomy is projected onto a 2D plane, especially when the tumor is behind high-density structures such as bones. This can lead to large patient setup… ▽ More

    Submitted 21 April, 2023; originally announced April 2023.

    Comments: 9 figures

  3. arXiv:2108.00361  [pdf, ps, other

    cs.IT eess.SP

    Design of Non-Orthogonal Sequences Using a Two-Stage Genetic Algorithm for Grant-Free Massive Connectivity

    Authors: Nam Yul Yu

    Abstract: In massive machine-type communications (mMTC), grant-free access is a key enabler for a massive number of users to be connected to a base station with low signaling overhead and low latency. In this paper, a two-stage genetic algorithm (GA) is proposed to design a new set of user-specific, non-orthogonal, unimodular sequences for uplink grant-free access. The first-stage GA is to find a subsamplin… ▽ More

    Submitted 1 August, 2021; originally announced August 2021.

  4. arXiv:2004.01446  [pdf, other

    cs.IT

    Binary Golay Spreading Sequences and Reed-Muller Codes for Uplink Grant-Free NOMA

    Authors: Nam Yul Yu

    Abstract: Non-orthogonal multiple access (NOMA) is an emerging technology for massive connectivity in machine-type communications (MTC). In code-domain NOMA, non-orthogonal spreading sequences are uniquely assigned to all devices, where active ones attempt a grant-free access to a system. In this paper, we study a set of user-specific, non-orthogonal, binary spreading sequences for uplink grant-free NOMA. B… ▽ More

    Submitted 14 April, 2020; v1 submitted 3 April, 2020; originally announced April 2020.

  5. arXiv:1903.05436  [pdf, ps, other

    cs.IT

    Secure and efficient compressed sensing based encryption with sparse matrices

    Authors: Wonwoo Cho, Nam Yul Yu

    Abstract: In this paper, we study the security of a compressed sensing (CS) based cryptosystem called a sparse one-time sensing (S-OTS) cryptosystem, which encrypts a plaintext with a sparse measurement matrix. To construct the secret matrix and renew it at each encryption, a bipolar keystream and a random permutation pattern are employed as cryptographic primitives, which can be obtained by a keystream gen… ▽ More

    Submitted 5 November, 2019; v1 submitted 13 March, 2019; originally announced March 2019.

  6. arXiv:1709.05744  [pdf, ps, other

    cs.IT

    Indistinguishability and Energy Sensitivity of Asymptotically Gaussian Compressed Encryption

    Authors: Nam Yul Yu

    Abstract: The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In information-theoretic sense, it is known that a CS-based cryptosystem can be perfectly secure if it employs a random Gaussian sensing matrix updated at each encryption and its plaintext has constant energy. In this paper, we propose a new CS-based cryptosystem that employs a secret bip… ▽ More

    Submitted 17 September, 2017; originally announced September 2017.

    Comments: Submitted to IEEE Transactions on Information Forensics and Security

  7. arXiv:1604.00742  [pdf

    cs.IT

    An Information Theoretic Study for Noisy Compressed Sensing With Joint Sparsity Model-2

    Authors: Sangjun Park, Nam Yul Yu, Heung-No Lee

    Abstract: In this paper, we study a support set reconstruction problem in which the signals of interest are jointly sparse with a common support set, and sampled by joint sparsity model-2 (JSM-2) in the presence of noise. Using mathematical tools, we develop upper and lower bounds on the failure probability of support set reconstruction in terms of the sparsity, the ambient dimension, the minimum signal to… ▽ More

    Submitted 4 April, 2016; originally announced April 2016.

  8. arXiv:1011.2740  [pdf, ps, other

    cs.IT

    Deterministic Compressed Sensing Matrices from Multiplicative Character Sequences

    Authors: Nam Yul Yu

    Abstract: Compressed sensing is a novel technique where one can recover sparse signals from the undersampled measurements. In this paper, a $K \times N$ measurement matrix for compressed sensing is deterministically constructed via multiplicative character sequences. Precisely, a constant multiple of a cyclic shift of an $M$-ary power residue or Sidelnikov sequence is arranged as a column vector of the matr… ▽ More

    Submitted 11 November, 2010; originally announced November 2010.

  9. arXiv:1010.0189  [pdf, ps, other

    cs.IT

    Reed-Muller Codes for Peak Power Control in Multicarrier CDMA

    Authors: Nam Yul Yu

    Abstract: Reed-Muller codes are studied for peak power control in multicarrier code-division multiple access (MC-CDMA) communication systems. In a coded MC-CDMA system, the information data multiplexed from users is encoded by a Reed-Muller subcode and the codeword is fully-loaded to Walsh-Hadamard spreading sequences. The polynomial representation of a coded MC-CDMA signal is established for theoretical an… ▽ More

    Submitted 1 October, 2010; originally announced October 2010.

  10. arXiv:1010.0011  [pdf, ps, other

    cs.IT

    Deterministic Compressed Sensing Matrices from Additive Character Sequences

    Authors: Nam Yul Yu

    Abstract: Compressed sensing is a novel technique where one can recover sparse signals from the undersampled measurements. In this correspondence, a $K \times N$ measurement matrix for compressed sensing is deterministically constructed via additive character sequences. The Weil bound is then used to show that the matrix has asymptotically optimal coherence for $N=K^2$, and to present a sufficient condition… ▽ More

    Submitted 30 September, 2010; originally announced October 2010.

  11. arXiv:1008.0885   

    cs.IT

    Deterministic Construction of Partial Fourier Compressed Sensing Matrices Via Cyclic Difference Sets

    Authors: Nam Yul Yu

    Abstract: Compressed sensing is a novel technique where one can recover sparse signals from the undersampled measurements. This paper studies a $K \times N$ partial Fourier measurement matrix for compressed sensing which is deterministically constructed via cyclic difference sets (CDS). Precisely, the matrix is constructed by $K$ rows of the $N\times N$ inverse discrete Fourier transform (IDFT) matrix, wher… ▽ More

    Submitted 28 December, 2010; v1 submitted 4 August, 2010; originally announced August 2010.

    Comments: This paper has been withdrawn by the author due to crucial errors