-
What-if Analysis Framework for Digital Twins in 6G Wireless Network Management
Authors:
Elif Ak,
Berk Canberk,
Vishal Sharma,
Octavia A. Dobre,
Trung Q. Duong
Abstract:
This study explores implementing a digital twin network (DTN) for efficient 6G wireless network management, aligning with the fault, configuration, accounting, performance, and security (FCAPS) model. The DTN architecture comprises the Physical Twin Layer, implemented using NS-3, and the Service Layer, featuring machine learning and reinforcement learning for optimizing carrier sensitivity thresho…
▽ More
This study explores implementing a digital twin network (DTN) for efficient 6G wireless network management, aligning with the fault, configuration, accounting, performance, and security (FCAPS) model. The DTN architecture comprises the Physical Twin Layer, implemented using NS-3, and the Service Layer, featuring machine learning and reinforcement learning for optimizing carrier sensitivity threshold and transmit power control in wireless networks. We introduce a robust "What-if Analysis" module, utilizing conditional tabular generative adversarial network (CTGAN) for synthetic data generation to mimic various network scenarios. These scenarios assess four network performance metrics: throughput, latency, packet loss, and coverage. Our findings demonstrate the efficiency of the proposed what-if analysis framework in managing complex network conditions, highlighting the importance of the scenario-maker step and the impact of twinning intervals on network performance.
△ Less
Submitted 24 April, 2024; v1 submitted 17 April, 2024;
originally announced April 2024.
-
Multi-Tier Computing-Enabled Digital Twin in 6G Networks
Authors:
Kunlun Wang,
Yongyi Tang,
Trung Q. Duong,
Saeed R. Khosravirad,
Octavia A. Dobre,
George K. Karagiannidis
Abstract:
Digital twin (DT) is the recurrent and common feature in discussions about future technologies, bringing together advanced communication, computation, and artificial intelligence, to name a few. In the context of Industry 4.0, industries such as manufacturing, automotive, and healthcare are rapidly adopting DT-based development. The main challenges to date have been the high demands on communicati…
▽ More
Digital twin (DT) is the recurrent and common feature in discussions about future technologies, bringing together advanced communication, computation, and artificial intelligence, to name a few. In the context of Industry 4.0, industries such as manufacturing, automotive, and healthcare are rapidly adopting DT-based development. The main challenges to date have been the high demands on communication and computing resources, as well as privacy and security concerns, arising from the large volumes of data exchanges. To achieve low latency and high security services in the emerging DT, multi-tier computing has been proposed by combining edge/fog computing and cloud computing. Specifically, low latency data transmission, efficient resource allocation, and validated security strategies of multi-tier computing systems are used to solve the operational problems of the DT system. In this paper, we introduce the architecture and applications of DT using examples from manufacturing, the Internet-of-Vehicles and healthcare. At the same time, the architecture and technology of multi-tier computing systems are studied to support DT. This paper will provide valuable reference and guidance for the theory, algorithms, and applications in collaborative multi-tier computing and DT.
△ Less
Submitted 28 December, 2023;
originally announced December 2023.
-
Digital Twin-Enabled Intelligent DDoS Detection Mechanism for Autonomous Core Networks
Authors:
Yagmur Yigit,
Bahadir Bal,
Aytac Karameseoglu,
Trung Q. Duong,
Berk Canberk
Abstract:
Existing distributed denial of service attack (DDoS) solutions cannot handle highly aggregated data rates; thus, they are unsuitable for Internet service provider (ISP) core networks. This article proposes a digital twin-enabled intelligent DDoS detection mechanism using an online learning method for autonomous systems. Our contributions are three-fold: we first design a DDoS detection architectur…
▽ More
Existing distributed denial of service attack (DDoS) solutions cannot handle highly aggregated data rates; thus, they are unsuitable for Internet service provider (ISP) core networks. This article proposes a digital twin-enabled intelligent DDoS detection mechanism using an online learning method for autonomous systems. Our contributions are three-fold: we first design a DDoS detection architecture based on the digital twin for ISP core networks. We implemented a Yet Another Next Generation (YANG) model and an automated feature selection (AutoFS) module to handle core network data. We used an online learning approach to update the model instantly and efficiently, improve the learning model quickly, and ensure accurate predictions. Finally, we reveal that our proposed solution successfully detects DDoS attacks and updates the feature selection method and learning model with a true classification rate of ninety-seven percent. Our proposed solution can estimate the attack within approximately fifteen minutes after the DDoS attack starts.
△ Less
Submitted 25 October, 2023; v1 submitted 19 October, 2023;
originally announced October 2023.
-
TwinPot: Digital Twin-assisted Honeypot for Cyber-Secure Smart Seaports
Authors:
Yagmur Yigit,
Omer Kemal Kinaci,
Trung Q. Duong,
Berk Canberk
Abstract:
The idea of next-generation ports has become more apparent in the last ten years in response to the challenge posed by the rising demand for efficiency and the ever-increasing volume of goods. In this new era of intelligent infrastructure and facilities, it is evident that cyber-security has recently received the most significant attention from the seaport and maritime authorities, and it is a pri…
▽ More
The idea of next-generation ports has become more apparent in the last ten years in response to the challenge posed by the rising demand for efficiency and the ever-increasing volume of goods. In this new era of intelligent infrastructure and facilities, it is evident that cyber-security has recently received the most significant attention from the seaport and maritime authorities, and it is a primary concern on the agenda of most ports. Traditional security solutions can be applied to safeguard IoT and Cyber-Physical Systems (CPS) from harmful entities. Nevertheless, security researchers can only watch, examine, and learn about the behaviors of attackers if these solutions operate more transparently. Herein, honeypots are potential solutions since they offer valuable information about the attackers. It can be virtual or physical. Virtual honeypots must be more realistic to entice attackers, necessitating better high-fidelity. To this end, Digital Twin (DT) technology can be employed to increase the complexity and simulation fidelity of the honeypots. Seaports can be attacked from both their existing devices and external devices at the same time. Existing mechanisms are insufficient to detect external attacks; therefore, the current systems cannot handle attacks at the desired level. DT and honeypot technologies can be used together to tackle them. Consequently, we suggest a DT-assisted honeypot, called TwinPot, for external attacks in smart seaports. Moreover, we propose an intelligent attack detection mechanism to handle different attack types using DT for internal attacks. Finally, we build an extensive smart seaport dataset for internal and external attacks using the MANSIM tool and two existing datasets to test the performance of our system. We show that under simultaneous internal and external attacks on the system, our solution successfully detects internal and external attacks.
△ Less
Submitted 25 October, 2023; v1 submitted 19 October, 2023;
originally announced October 2023.
-
Fano factor, $ΔT$-noise and cross-correlations in double quantum dots
Authors:
A. Crépieux,
T. Q. Duong,
M. Lavagna
Abstract:
We present a theoretical study of electrical current fluctuations and finite-frequency noise in a double quantum dot connected to two electron reservoirs with the aim of deriving the Fano factor, the $ΔT$-noise and the cross-correlations. This allows one to highlight several interesting features. Firstly the possibility of getting a significant reduction of current noise and Fano factor either whe…
▽ More
We present a theoretical study of electrical current fluctuations and finite-frequency noise in a double quantum dot connected to two electron reservoirs with the aim of deriving the Fano factor, the $ΔT$-noise and the cross-correlations. This allows one to highlight several interesting features. Firstly the possibility of getting a significant reduction of current noise and Fano factor either when the system is placed in a given operating regime, or when a temperature gradient is applied between the two reservoirs, resulting from the fact that a negative $ΔT$-noise is generated. The second feature is the sign change found in the cross-correlator between the two reservoirs with increasing frequencies. This study clarifies the understanding of the results obtained experimentally in such systems.
△ Less
Submitted 3 June, 2023;
originally announced June 2023.
-
Coronal Heating as Determined by the Solar Flare Frequency Distribution Obtained by Aggregating Case Studies
Authors:
James Paul Mason,
Alexandra Werth,
Colin G. West,
Allison A. Youngblood,
Donald L. Woodraska,
Courtney Peck,
Kevin Lacjak,
Florian G. Frick,
Moutamen Gabir,
Reema A. Alsinan,
Thomas Jacobsen,
Mohammad Alrubaie,
Kayla M. Chizmar,
Benjamin P. Lau,
Lizbeth Montoya Dominguez,
David Price,
Dylan R. Butler,
Connor J. Biron,
Nikita Feoktistov,
Kai Dewey,
N. E. Loomis,
Michal Bodzianowski,
Connor Kuybus,
Henry Dietrick,
Aubrey M. Wolfe
, et al. (977 additional authors not shown)
Abstract:
Flare frequency distributions represent a key approach to addressing one of the largest problems in solar and stellar physics: determining the mechanism that counter-intuitively heats coronae to temperatures that are orders of magnitude hotter than the corresponding photospheres. It is widely accepted that the magnetic field is responsible for the heating, but there are two competing mechanisms th…
▽ More
Flare frequency distributions represent a key approach to addressing one of the largest problems in solar and stellar physics: determining the mechanism that counter-intuitively heats coronae to temperatures that are orders of magnitude hotter than the corresponding photospheres. It is widely accepted that the magnetic field is responsible for the heating, but there are two competing mechanisms that could explain it: nanoflares or Alfvén waves. To date, neither can be directly observed. Nanoflares are, by definition, extremely small, but their aggregate energy release could represent a substantial heating mechanism, presuming they are sufficiently abundant. One way to test this presumption is via the flare frequency distribution, which describes how often flares of various energies occur. If the slope of the power law fitting the flare frequency distribution is above a critical threshold, $α=2$ as established in prior literature, then there should be a sufficient abundance of nanoflares to explain coronal heating. We performed $>$600 case studies of solar flares, made possible by an unprecedented number of data analysts via three semesters of an undergraduate physics laboratory course. This allowed us to include two crucial, but nontrivial, analysis methods: pre-flare baseline subtraction and computation of the flare energy, which requires determining flare start and stop times. We aggregated the results of these analyses into a statistical study to determine that $α= 1.63 \pm 0.03$. This is below the critical threshold, suggesting that Alfvén waves are an important driver of coronal heating.
△ Less
Submitted 9 May, 2023;
originally announced May 2023.
-
An Unsupervised Learning Approach for Spectrum Allocation in Terahertz Communication Systems
Authors:
Akram Shafie,
Chunhui Li,
Nan Yang,
Xiangyun Zhou,
Trung Q. Duong
Abstract:
We propose a new spectrum allocation strategy, aided by unsupervised learning, for multiuser terahertz communication systems. In this strategy, adaptive sub-band bandwidth is considered such that the spectrum of interest can be divided into sub-bands with unequal bandwidths. This strategy reduces the variation in molecular absorption loss among the users, leading to the improved data rate performa…
▽ More
We propose a new spectrum allocation strategy, aided by unsupervised learning, for multiuser terahertz communication systems. In this strategy, adaptive sub-band bandwidth is considered such that the spectrum of interest can be divided into sub-bands with unequal bandwidths. This strategy reduces the variation in molecular absorption loss among the users, leading to the improved data rate performance. We first formulate an optimization problem to determine the optimal sub-band bandwidth and transmit power, and then propose the unsupervised learning-based approach to obtaining the near-optimal solution to this problem. In the proposed approach, we first train a deep neural network (DNN) while utilizing a loss function that is inspired by the Lagrangian of the formulated problem. Then using the trained DNN, we approximate the near-optimal solutions. Numerical results demonstrate that comparing to existing approaches, our proposed unsupervised learning-based approach achieves a higher data rate, especially when the molecular absorption coefficient within the spectrum of interest varies in a highly non-linear manner.
△ Less
Submitted 6 August, 2022;
originally announced August 2022.
-
Wireless Powered Communication Networks with Non-Ideal Circuit Power Consumption
Authors:
Slavche Pejoski,
Zoran Hadzi-Velkov,
Trung Q. Duong,
Caijun Zhong
Abstract:
Assuming non-ideal circuit power consumption at the energy harvesting (EH) nodes, we propose two practical protocols that optimize the performance of the harvest-then-transmit wireless powered communication networks (WPCNs) under two different objectives: (1) proportional fair (PF) resource allocation, and (2) sum rate maximization. These objectives lead to optimal allocations for the transmit pow…
▽ More
Assuming non-ideal circuit power consumption at the energy harvesting (EH) nodes, we propose two practical protocols that optimize the performance of the harvest-then-transmit wireless powered communication networks (WPCNs) under two different objectives: (1) proportional fair (PF) resource allocation, and (2) sum rate maximization. These objectives lead to optimal allocations for the transmit power by the base station (BS), which broadcasts RF radiation over the downlink, and optimal durations of the EH phase and the uplink information transmission phases within the dynamic time-division multiple access (TDMA) frame. Compared to the max-sum-rate protocol, the PF protocol attains a higher level of system fairness at the expense of the sum rate degradation. The PF protocol is advantageous over the max-sum-rate protocol in terms of system fairness regardless of the circuit power consumption, whereas the uplink sum rates of both protocols converge when this power consumption increases.
△ Less
Submitted 14 August, 2021;
originally announced August 2021.
-
Deep Reinforcement Learning for Intelligent Reflecting Surface-assisted D2D Communications
Authors:
Khoi Khac Nguyen,
Antonino Masaracchia,
Cheng Yin,
Long D. Nguyen,
Octavia A. Dobre,
Trung Q. Duong
Abstract:
In this paper, we propose a deep reinforcement learning (DRL) approach for solving the optimisation problem of the network's sum-rate in device-to-device (D2D) communications supported by an intelligent reflecting surface (IRS). The IRS is deployed to mitigate the interference and enhance the signal between the D2D transmitter and the associated D2D receiver. Our objective is to jointly optimise t…
▽ More
In this paper, we propose a deep reinforcement learning (DRL) approach for solving the optimisation problem of the network's sum-rate in device-to-device (D2D) communications supported by an intelligent reflecting surface (IRS). The IRS is deployed to mitigate the interference and enhance the signal between the D2D transmitter and the associated D2D receiver. Our objective is to jointly optimise the transmit power at the D2D transmitter and the phase shift matrix at the IRS to maximise the network sum-rate. We formulate a Markov decision process and then propose the proximal policy optimisation for solving the maximisation game. Simulation results show impressive performance in terms of the achievable rate and processing time.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.
-
RIS-assisted UAV Communications for IoT with Wireless Power Transfer Using Deep Reinforcement Learning
Authors:
Khoi Khac Nguyen,
Antonino Masaracchia,
Tan Do-Duy,
H. Vincent Poor,
Trung Q. Duong
Abstract:
Many of the devices used in Internet-of-Things (IoT) applications are energy-limited, and thus supplying energy while maintaining seamless connectivity for IoT devices is of considerable importance. In this context, we propose a simultaneous wireless power transfer and information transmission scheme for IoT devices with support from reconfigurable intelligent surface (RIS)-aided unmanned aerial v…
▽ More
Many of the devices used in Internet-of-Things (IoT) applications are energy-limited, and thus supplying energy while maintaining seamless connectivity for IoT devices is of considerable importance. In this context, we propose a simultaneous wireless power transfer and information transmission scheme for IoT devices with support from reconfigurable intelligent surface (RIS)-aided unmanned aerial vehicle (UAV) communications. In particular, in a first phase, IoT devices harvest energy from the UAV through wireless power transfer; and then in a second phase, the UAV collects data from the IoT devices through information transmission. To characterise the agility of the UAV, we consider two scenarios: a hovering UAV and a mobile UAV. Aiming at maximizing the total network sum-rate, we jointly optimize the trajectory of the UAV, the energy harvesting scheduling of IoT devices, and the phaseshift matrix of the RIS. We formulate a Markov decision process and propose two deep reinforcement learning algorithms to solve the optimization problem of maximizing the total network sum-rate. Numerical results illustrate the effectiveness of the UAV's flying path optimization and the network's throughput of our proposed techniques compared with other benchmark schemes. Given the strict requirements of the RIS and UAV, the significant improvement in processing time and throughput performance demonstrates that our proposed scheme is well applicable for practical IoT applications.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.
-
FedFog: Network-Aware Optimization of Federated Learning over Wireless Fog-Cloud Systems
Authors:
Van-Dinh Nguyen,
Symeon Chatzinotas,
Bjorn Ottersten,
Trung Q. Duong
Abstract:
Federated learning (FL) is capable of performing large distributed machine learning tasks across multiple edge users by periodically aggregating trained local parameters. To address key challenges of enabling FL over a wireless fog-cloud system (e.g., non-i.i.d. data, users' heterogeneity), we first propose an efficient FL algorithm based on Federated Averaging (called FedFog) to perform the local…
▽ More
Federated learning (FL) is capable of performing large distributed machine learning tasks across multiple edge users by periodically aggregating trained local parameters. To address key challenges of enabling FL over a wireless fog-cloud system (e.g., non-i.i.d. data, users' heterogeneity), we first propose an efficient FL algorithm based on Federated Averaging (called FedFog) to perform the local aggregation of gradient parameters at fog servers and global training update at the cloud. Next, we employ FedFog in wireless fog-cloud systems by investigating a novel network-aware FL optimization problem that strikes the balance between the global loss and completion time. An iterative algorithm is then developed to obtain a precise measurement of the system performance, which helps design an efficient stop** criteria to output an appropriate number of global rounds. To mitigate the straggler effect, we propose a flexible user aggregation strategy that trains fast users first to obtain a certain level of accuracy before allowing slow users to join the global training updates. Extensive numerical results using several real-world FL tasks are provided to verify the theoretical convergence of FedFog. We also show that the proposed co-design of FL and communication is essential to substantially improve resource utilization while achieving comparable accuracy of the learning model.
△ Less
Submitted 10 February, 2022; v1 submitted 4 July, 2021;
originally announced July 2021.
-
3D UAV Trajectory and Data Collection Optimisation via Deep Reinforcement Learning
Authors:
Khoi Khac Nguyen,
Trung Q. Duong,
Tan Do-Duy,
Holger Claussen,
and Lajos Hanzo
Abstract:
Unmanned aerial vehicles (UAVs) are now beginning to be deployed for enhancing the network performance and coverage in wireless communication. However, due to the limitation of their on-board power and flight time, it is challenging to obtain an optimal resource allocation scheme for the UAV-assisted Internet of Things (IoT). In this paper, we design a new UAV-assisted IoT systems relying on the s…
▽ More
Unmanned aerial vehicles (UAVs) are now beginning to be deployed for enhancing the network performance and coverage in wireless communication. However, due to the limitation of their on-board power and flight time, it is challenging to obtain an optimal resource allocation scheme for the UAV-assisted Internet of Things (IoT). In this paper, we design a new UAV-assisted IoT systems relying on the shortest flight path of the UAVs while maximising the amount of data collected from IoT devices. Then, a deep reinforcement learning-based technique is conceived for finding the optimal trajectory and throughput in a specific coverage area. After training, the UAV has the ability to autonomously collect all the data from user nodes at a significant total sum-rate improvement while minimising the associated resources used. Numerical results are provided to highlight how our techniques strike a balance between the throughput attained, trajectory, and the time spent. More explicitly, we characterise the attainable performance in terms of the UAV trajectory, the expected reward and the total sum-rate.
△ Less
Submitted 6 June, 2021;
originally announced June 2021.
-
Reconfigurable Intelligent Surface-assisted Multi-UAV Networks: Efficient Resource Allocation with Deep Reinforcement Learning
Authors:
Khoi Khac Nguyen,
Saeed Khosravirad,
Daniel Benevides da Costa,
Long D. Nguyen,
Trung Q. Duong
Abstract:
In this paper, we propose reconfigurable intelligent surface (RIS)-assisted unmanned aerial vehicles (UAVs) networks that can utilise both advantages of UAV's agility and RIS's reflection for enhancing the network's performance. To aim at maximising the energy efficiency (EE) of the considered networks, we jointly optimise the power allocation of the UAVs and the phase-shift matrix of the RIS. A d…
▽ More
In this paper, we propose reconfigurable intelligent surface (RIS)-assisted unmanned aerial vehicles (UAVs) networks that can utilise both advantages of UAV's agility and RIS's reflection for enhancing the network's performance. To aim at maximising the energy efficiency (EE) of the considered networks, we jointly optimise the power allocation of the UAVs and the phase-shift matrix of the RIS. A deep reinforcement learning (DRL) approach is proposed for solving the continuous optimisation problem with time-varying channels in a centralised fashion. Moreover, a parallel learning approach is also proposed for reducing the information transmission requirement of the centralised approach. Numerical results show a significant improvement of our proposed schemes compared with the conventional approaches in terms of EE, flexibility, and processing time. Our proposed DRL methods for RIS-assisted UAV networks can be used for real-time applications due to their capability of instant decision-making and handling the time-varying channel with the dynamic environmental setting.
△ Less
Submitted 5 August, 2021; v1 submitted 28 May, 2021;
originally announced May 2021.
-
COVID-19 Image Data Collection: Prospective Predictions Are the Future
Authors:
Joseph Paul Cohen,
Paul Morrison,
Lan Dao,
Karsten Roth,
Tim Q Duong,
Marzyeh Ghassemi
Abstract:
Across the world's coronavirus disease 2019 (COVID-19) hot spots, the need to streamline patient diagnosis and management has become more pressing than ever. As one of the main imaging tools, chest X-rays (CXRs) are common, fast, non-invasive, relatively cheap, and potentially bedside to monitor the progression of the disease. This paper describes the first public COVID-19 image data collection as…
▽ More
Across the world's coronavirus disease 2019 (COVID-19) hot spots, the need to streamline patient diagnosis and management has become more pressing than ever. As one of the main imaging tools, chest X-rays (CXRs) are common, fast, non-invasive, relatively cheap, and potentially bedside to monitor the progression of the disease. This paper describes the first public COVID-19 image data collection as well as a preliminary exploration of possible use cases for the data. This dataset currently contains hundreds of frontal view X-rays and is the largest public resource for COVID-19 image and prognostic data, making it a necessary resource to develop and evaluate tools to aid in the treatment of COVID-19. It was manually aggregated from publication figures as well as various web based repositories into a machine learning (ML) friendly format with accompanying dataloader code. We collected frontal and lateral view imagery and metadata such as the time since first symptoms, intensive care unit (ICU) status, survival status, intubation status, or hospital location. We present multiple possible use cases for the data such as predicting the need for the ICU, predicting patient survival, and understanding a patient's trajectory during treatment. Data can be accessed here: https://github.com/ieee8023/covid-chestxray-dataset
△ Less
Submitted 14 December, 2020; v1 submitted 21 June, 2020;
originally announced June 2020.
-
COVID-Net S: Towards computer-aided severity assessment via training and validation of deep neural networks for geographic extent and opacity extent scoring of chest X-rays for SARS-CoV-2 lung disease severity
Authors:
Alexander Wong,
Zhong Qiu Lin,
Linda Wang,
Audrey G. Chung,
Beiyi Shen,
Almas Abbasi,
Mahsa Hoshmand-Kochi,
Timothy Q. Duong
Abstract:
Background: A critical step in effective care and treatment planning for severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), the cause of the COVID-19 pandemic, is the assessment of the severity of disease progression. Chest x-rays (CXRs) are often used to assess SARS-CoV-2 severity, with two important assessment metrics being extent of lung involvement and degree of opacity. In this pro…
▽ More
Background: A critical step in effective care and treatment planning for severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), the cause of the COVID-19 pandemic, is the assessment of the severity of disease progression. Chest x-rays (CXRs) are often used to assess SARS-CoV-2 severity, with two important assessment metrics being extent of lung involvement and degree of opacity. In this proof-of-concept study, we assess the feasibility of computer-aided scoring of CXRs of SARS-CoV-2 lung disease severity using a deep learning system.
Materials and Methods: Data consisted of 396 CXRs from SARS-CoV-2 positive patient cases. Geographic extent and opacity extent were scored by two board-certified expert chest radiologists (with 20+ years of experience) and a 2nd-year radiology resident. The deep neural networks used in this study, which we name COVID-Net S, are based on a COVID-Net network architecture. 100 versions of the network were independently learned (50 to perform geographic extent scoring and 50 to perform opacity extent scoring) using random subsets of CXRs from the study, and we evaluated the networks using stratified Monte Carlo cross-validation experiments.
Findings: The COVID-Net S deep neural networks yielded R$^2$ of 0.664 $\pm$ 0.032 and 0.635 $\pm$ 0.044 between predicted scores and radiologist scores for geographic extent and opacity extent, respectively, in stratified Monte Carlo cross-validation experiments. The best performing networks achieved R$^2$ of 0.739 and 0.741 between predicted scores and radiologist scores for geographic extent and opacity extent, respectively.
Interpretation: The results are promising and suggest that the use of deep neural networks on CXRs could be an effective tool for computer-aided assessment of SARS-CoV-2 lung disease severity, although additional studies are needed before adoption for routine clinical use.
△ Less
Submitted 16 April, 2021; v1 submitted 26 May, 2020;
originally announced May 2020.
-
Predicting COVID-19 Pneumonia Severity on Chest X-ray with Deep Learning
Authors:
Joseph Paul Cohen,
Lan Dao,
Paul Morrison,
Karsten Roth,
Yoshua Bengio,
Beiyi Shen,
Almas Abbasi,
Mahsa Hoshmand-Kochi,
Marzyeh Ghassemi,
Haifang Li,
Tim Q Duong
Abstract:
Purpose: The need to streamline patient management for COVID-19 has become more pressing than ever. Chest X-rays provide a non-invasive (potentially bedside) tool to monitor the progression of the disease. In this study, we present a severity score prediction model for COVID-19 pneumonia for frontal chest X-ray images. Such a tool can gauge severity of COVID-19 lung infections (and pneumonia in ge…
▽ More
Purpose: The need to streamline patient management for COVID-19 has become more pressing than ever. Chest X-rays provide a non-invasive (potentially bedside) tool to monitor the progression of the disease. In this study, we present a severity score prediction model for COVID-19 pneumonia for frontal chest X-ray images. Such a tool can gauge severity of COVID-19 lung infections (and pneumonia in general) that can be used for escalation or de-escalation of care as well as monitoring treatment efficacy, especially in the ICU.
Methods: Images from a public COVID-19 database were scored retrospectively by three blinded experts in terms of the extent of lung involvement as well as the degree of opacity. A neural network model that was pre-trained on large (non-COVID-19) chest X-ray datasets is used to construct features for COVID-19 images which are predictive for our task.
Results: This study finds that training a regression model on a subset of the outputs from an this pre-trained chest X-ray model predicts our geographic extent score (range 0-8) with 1.14 mean absolute error (MAE) and our lung opacity score (range 0-6) with 0.78 MAE.
Conclusions: These results indicate that our model's ability to gauge severity of COVID-19 lung infections could be used for escalation or de-escalation of care as well as monitoring treatment efficacy, especially in the intensive care unit (ICU). A proper clinical trial is needed to evaluate efficacy. To enable this we make our code, labels, and data available online at https://github.com/mlmed/torchxrayvision/tree/master/scripts/covid-severity and https://github.com/ieee8023/covid-chestxray-dataset
△ Less
Submitted 30 June, 2020; v1 submitted 24 May, 2020;
originally announced May 2020.
-
Downlink Spectral Efficiency of Cell-Free Massive MIMO Systems with Multi-antenna Users
Authors:
Trang C. Mai,
Hien Quoc Ngo,
Trung Q. Duong
Abstract:
This paper studies a cell-free massive multiple-input multiple-output (MIMO) system where its access points (APs) and users are equipped with multiple antennas. Two transmission protocols are considered. In the first transmission protocol, there are no downlink pilots, while in the second transmission protocol, downlink pilots are proposed in order to improve the system performance. In both transm…
▽ More
This paper studies a cell-free massive multiple-input multiple-output (MIMO) system where its access points (APs) and users are equipped with multiple antennas. Two transmission protocols are considered. In the first transmission protocol, there are no downlink pilots, while in the second transmission protocol, downlink pilots are proposed in order to improve the system performance. In both transmission protocols, the users use the minimum mean-squared error-based successive interference cancellation (MMSE-SIC) scheme to detect the desired signals. For the analysis, we first derive a general spectral efficiency formula with arbitrary side information at the users. Then analytical expressions for the spectral efficiency of different transmission protocols are derived. To improve the spectral efficiency (SE) of the system, max-min fairness power control (PC) is applied for the first protocol by using the closed-form expression of its SE. Due to the computation complexity of deriving the closed-form performance expression of SE for the second protocol, we apply the optimal power coefficients of the first protocol to the second protocol. Numerical results show that two protocols combining with multi-antenna users are prerequisites to achieve the suboptimal SE regardless of the number of user in the system.
△ Less
Submitted 24 April, 2020;
originally announced April 2020.
-
Physical Layer Security: Detection of Active Eavesdrop** Attacks by Support Vector Machines
Authors:
Tiep M. Hoang,
Trung Q. Duong,
Hoang Duong Tuan,
Sangarapillai Lambotharan,
Emi Garcia-Palacios,
Long D. Nguyen
Abstract:
This paper presents a framework for converting wireless signals into structured datasets, which can be fed into machine learning algorithms for the detection of active eavesdrop** attacks at the physical layer. More specifically, a wireless communication system, which consists of K legal users, one access point (AP) and one active eavesdropper, is considered. To cope with the eavesdropper who br…
▽ More
This paper presents a framework for converting wireless signals into structured datasets, which can be fed into machine learning algorithms for the detection of active eavesdrop** attacks at the physical layer. More specifically, a wireless communication system, which consists of K legal users, one access point (AP) and one active eavesdropper, is considered. To cope with the eavesdropper who breaks into the system during the uplink phase, we first build structured datasets based on several different features. We then apply support vector machine (SVM) classifiers and one-class SVM classifiers to those structured datasets for detecting the presence of eavesdropper. Regarding the data, we first process received signals at the AP and then define three different features (i.e., MEAN, RATIO and SUM) based on the post-processing signals. Noticeably, our three defined features are formulated such that they have relevant statistical properties. Enabling the AP to simulate the entire process of transmission, we form the so-called artificial training data (ATD) that is used for training SVM (or one-class SVM) models. While SVM is preferred in the case of having perfect channel state information (CSI) of all channels, one-class SVM is preferred in the case of having only the CSI of legal users. We also evaluate the accuracy of the trained models in relation to the choice of kernel functions, the choice of features, and the change of eavesdropper's power. Numerical results show that the accuracy is relatively sensitive to adjusting parameters. Under some settings, SVM classifiers (or even one-class SVM) can bring about the accuracy of over 90%.
△ Less
Submitted 23 February, 2021; v1 submitted 2 March, 2020;
originally announced March 2020.
-
Level anticrossing effect in single-level or multilevel double quantum dots: Electrical conductance, zero-frequency charge susceptibility and Seebeck coefficient
Authors:
M. Lavagna,
V. Talbo,
T. Q. Duong,
A. Crépieux
Abstract:
We study electrical and thermoelectrical properties for a double quantum dot system. We consider the cases of both single-level and multilevel quantum dots whatever the way they are coupled, either in a series or in a parallel arrangement. The calculations are performed by using the nonequilibrium Green function theory. In the case of a single-level double quantum dot, the problem is exactly solva…
▽ More
We study electrical and thermoelectrical properties for a double quantum dot system. We consider the cases of both single-level and multilevel quantum dots whatever the way they are coupled, either in a series or in a parallel arrangement. The calculations are performed by using the nonequilibrium Green function theory. In the case of a single-level double quantum dot, the problem is exactly solvable whereas for a multilevel double quantum dot, an analytical solution is obtained in the limit of energy-independent hop** integrals. { We present a detailed discussion about} the dependences of electrical conductance, zero-frequency charge susceptibility and Seebeck coefficient on the gate voltages applied to the dots, allowing us to derive the charge stability diagram. The findings are in agreement with the experimental observations notably with the occurrence of successive sign changes of the Seebeck coefficient when varying the gate voltages. We interpret the results in terms of the bonding and antibonding states produced by the level anticrossing effect which occurs in the presence of a finite interdot coupling. We show that at equilibrium the boundary lines between the domains with different dot occupancies in the charge stability diagram, take place when the bonding and antibonding state levels are aligned with the chemical potentials in the leads. Finally the total dot occupancy is found to be considerably reduced in the case in parallel compared with the case in series, { whenever} the level energies in each dot are equal. We interpret this dip as a direct manifestation of the interference effects occurring in the presence of the two electronic transmission paths provided by each dot.
△ Less
Submitted 25 September, 2020; v1 submitted 2 March, 2020;
originally announced March 2020.
-
Full-Duplex MIMO-OFDM Communication with Self-Energy Recycling
Authors:
Ali A. Nasir,
H. D. Tuan,
T. Q. Duong,
H. V. Poor
Abstract:
This paper focuses on energy recycling in full-duplex (FD) relaying multiple-input-multiple-output orthogonal frequency division multiplexing (OFDM) communication. The loop self-interference (SI) due to full-duplexing is seen as an opportunity for the energy-constrained relay node to replenish its energy requirement through wireless power transfer. In forwarding the source information to the desti…
▽ More
This paper focuses on energy recycling in full-duplex (FD) relaying multiple-input-multiple-output orthogonal frequency division multiplexing (OFDM) communication. The loop self-interference (SI) due to full-duplexing is seen as an opportunity for the energy-constrained relay node to replenish its energy requirement through wireless power transfer. In forwarding the source information to the destination, the FD relay can simultaneously harvest energy from the source wireless transmission and also through energy recycling from its own transmission. The objective is to maximize the overall spectral efficiency by designing the optimal power allocation over OFDM sub-carriers and transmit antennas. Due to a large number of sub-carriers, this design problem poses a large-scale nonconvex optimization problem involving a few thousand variables of power allocation, which is very computationally challenging. A new path-following algorithm is proposed, which converges to an optimal solution. This algorithm is very efficient since it is based on \textit{closed-form} calculations. Numerical results for a practical simulation setting show promising results by achieving high spectral efficiency.
△ Less
Submitted 24 March, 2019;
originally announced March 2019.
-
Charge susceptibility and conductances of a double quantum dot
Authors:
V. Talbo,
M. Lavagna,
T. Q. Duong,
A. Crépieux
Abstract:
We calculate the charge susceptibility and the linear and differential conductances of a double quantum dot coupled to two metallic reservoirs both at equilibrium and when the system is driven away from equilibrium. This work is motivated by recent progress in the realization of solid state spin qubits. The calculations are performed by using the Keldysh nonequilibrium Green function technique. In…
▽ More
We calculate the charge susceptibility and the linear and differential conductances of a double quantum dot coupled to two metallic reservoirs both at equilibrium and when the system is driven away from equilibrium. This work is motivated by recent progress in the realization of solid state spin qubits. The calculations are performed by using the Keldysh nonequilibrium Green function technique. In the noninteracting case, we give the analytical expression for the electrical current and deduce from there the linear conductance as a function of the gate voltages applied to the dots, leading to a characteristic charge stability diagram. We determine the charge susceptibility which also exhibits peaks as a function of gate voltages. We show how the study can be extended to the case of an interacting quantum dot.
△ Less
Submitted 8 October, 2018;
originally announced October 2018.
-
Non-symmetrized quantum noise in a Kondo quantum dot
Authors:
A. Crépieux,
S. Sahoo,
T. Q. Duong,
R. Zamoum,
M. Lavagna
Abstract:
The fluctuations of electrical current provide information on the dynamics of electrons in quantum devices. Understanding the nature of these fluctuations in a quantum dot is thus a crucial step insofar as this system is the elementary brick of quantum circuits. In this context, we develop a theory for calculating the quantum noise at finite frequency in a quantum dot connected to two reservoirs i…
▽ More
The fluctuations of electrical current provide information on the dynamics of electrons in quantum devices. Understanding the nature of these fluctuations in a quantum dot is thus a crucial step insofar as this system is the elementary brick of quantum circuits. In this context, we develop a theory for calculating the quantum noise at finite frequency in a quantum dot connected to two reservoirs in the presence of interactions and for any symmetry of the couplings to the reservoirs. This theory is developed in the framework of the Keldysh non-equilibrium Green function technique. We establish an analytical expression for the quantum noise in terms of the various transmission amplitudes between the reservoirs and of some effective transmission coefficient which we define. We then study the noise as a function of the dot energy level and the bias voltage. The effects of both Coulomb interactions in the dot and asymmetric couplings with the reservoirs are characterized.
△ Less
Submitted 4 October, 2018;
originally announced October 2018.
-
UAV-Empowered Disaster-Resilient Edge Architecture for Delay-Sensitive Communication
Authors:
Zeeshan Kaleem,
Muhammad Yousaf,
Aamir Qamar,
Ayaz Ahmad,
Trung Q. Duong,
Wan Choi,
Abbas Jamalipour
Abstract:
The fifth-generation (5G) communication systems will enable enhanced mobile broadband, ultra-reliable low latency, and massive connectivity services. The broadband and low-latency services are indispensable to public safety (PS) communication during natural or man-made disasters. Recently, the third generation partnership project long term evolution (3GPPLTE) has emerged as a promising candidate t…
▽ More
The fifth-generation (5G) communication systems will enable enhanced mobile broadband, ultra-reliable low latency, and massive connectivity services. The broadband and low-latency services are indispensable to public safety (PS) communication during natural or man-made disasters. Recently, the third generation partnership project long term evolution (3GPPLTE) has emerged as a promising candidate to enable broadband PS communications. In this article, first we present six major PS-LTE enabling services and the current status of PS-LTE in 3GPP releases. Then, we discuss the spectrum bands allocated for PS-LTE in major countries by international telecommunication union (ITU). Finally, we propose a disaster resilient three-layered architecture for PS-LTE (DR-PSLTE). This architecture consists of a software-defined network (SDN) layer to provide centralized control, an unmanned air vehicle (UAV) cloudlet layer to facilitate edge computing or to enable emergency communication link, and a radio access layer. The proposed architecture is flexible and combines the benefits of SDNs and edge computing to efficiently meet the delay requirements of various PS-LTE services. Numerical results verified that under the proposed DR-PSLTE architecture, delay is reduced by 20% as compared with the conventional centralized computing architecture.
△ Less
Submitted 28 January, 2019; v1 submitted 26 September, 2018;
originally announced September 2018.
-
Real-time Optimal Resource Allocation for Embedded UAV Communication Systems
Authors:
Minh-Nghia Nguyen,
Long D. Nguyen,
Trung Q. Duong,
Hoang Duong Tuan
Abstract:
We consider device-to-device (D2D) wireless information and power transfer systems using an unmanned aerial vehicle (UAV) as a relay-assisted node. As the energy capacity and flight time of UAVs is limited, a significant issue in deploying UAV is to manage energy consumption in real-time application, which is proportional to the UAV transmit power. To tackle this important issue, we develop a real…
▽ More
We consider device-to-device (D2D) wireless information and power transfer systems using an unmanned aerial vehicle (UAV) as a relay-assisted node. As the energy capacity and flight time of UAVs is limited, a significant issue in deploying UAV is to manage energy consumption in real-time application, which is proportional to the UAV transmit power. To tackle this important issue, we develop a real-time resource allocation algorithm for maximizing the energy efficiency by jointly optimizing the energy-harvesting time and power control for the considered (D2D) communication embedded with UAV. We demonstrate the effectiveness of the proposed algorithms as running time for solving them can be conducted in milliseconds.
△ Less
Submitted 5 September, 2018;
originally announced September 2018.
-
UAV-Enabled Communication Using NOMA
Authors:
Ali A. Nasir,
Hoang D. Tuan,
Trung Q. Duong,
H. Vincent Poor
Abstract:
Unmanned aerial vehicles (UAVs) can be deployed as flying base stations (BSs) to leverage the strength of line-of-sight connections and effectively support the coverage and throughput of wireless communication. This paper considers a multiuser communication system, in which a single-antenna UAV-BS serves a large number of ground users by employing non-orthogonal multiple access (NOMA). The max-min…
▽ More
Unmanned aerial vehicles (UAVs) can be deployed as flying base stations (BSs) to leverage the strength of line-of-sight connections and effectively support the coverage and throughput of wireless communication. This paper considers a multiuser communication system, in which a single-antenna UAV-BS serves a large number of ground users by employing non-orthogonal multiple access (NOMA). The max-min rate optimization problem is formulated under total power, total bandwidth, UAV altitude, and antenna beamwdith constraints. The objective of max-min rate optimization is non-convex in all optimization variables, i.e. UAV altitude, transmit antenna beamwidth, power allocation and bandwidth allocation for multiple users. A path-following algorithm is proposed to solve the formulated problem. Next, orthogonal multiple access (OMA) and dirty paper coding (DPC)-based max-min rate optimization problems are formulated and respective path-following algorithms are developed to solve them. Numerical results show that NOMA outperforms OMA and achieves rates similar to those attained by DPC. In addition, a clear rate gain is observed by jointly optimizing all the parameters rather than optimizing a subset of parameters, which confirms the desirability of their joint optimization.
△ Less
Submitted 10 June, 2018;
originally announced June 2018.
-
PMU Placement Optimization for Smart Grid Obvervability and State Estimation
Authors:
Y. Shi,
H. D. Tuan,
A. A. Nasir,
T. Q. Duong,
H. V. Poor
Abstract:
In this paper, phasor measurement unit (PMU) placement for power grid state estimation under different degrees of observability is studied. Observability degree is the depth of the buses' reachability by the placed PMUs and thus constitutes an important characteristic for PMU placement. However, the sole observability as addressed in many works still does not guarantee a good estimate for the grid…
▽ More
In this paper, phasor measurement unit (PMU) placement for power grid state estimation under different degrees of observability is studied. Observability degree is the depth of the buses' reachability by the placed PMUs and thus constitutes an important characteristic for PMU placement. However, the sole observability as addressed in many works still does not guarantee a good estimate for the grid state. Some existing works also considered the PMU placement for minimizing the mean squared error or maximizing the mutual information between the measurement output and grid state. However, they ignore the observability requirements for computational tractability and thus potentially lead to artificial results such as acceptance of the estimate for an unobserved state component as its unconditional mean. In this work, the PMU placement optimization problem is considered by minimizing the mean squared error or maximizing the mutual information between the measurement output and grid state, under grid observability constraints. The provided solution is free from the mentioned fundamental drawbacks in the existing PMU placement designs. The problems are posed as binary nonlinear optimization problems, for which this paper develops efficient algorithms for computational solutions. The performance of the proposed algorithms is analyzed in detail through numerical examples on large-scale IEEE power networks.
△ Less
Submitted 7 June, 2018;
originally announced June 2018.
-
Cell-free Massive MIMO Networks: Optimal Power Control against Active Eavesdrop**
Authors:
Tiep M. Hoang,
Hien Quoc Ngo,
Trung Q. Duong,
Hoang D. Tuan,
Alan Marshall
Abstract:
This paper studies the security aspect of a recently introduced network ("cell-free massive MIMO") under a pilot spoofing attack. Firstly, a simple method to recognize the presence of this type of an active eavesdrop** attack to a particular user is shown. In order to deal with this attack, we consider the problem of maximizing the achievable data rate of the attacked user or its achievable secr…
▽ More
This paper studies the security aspect of a recently introduced network ("cell-free massive MIMO") under a pilot spoofing attack. Firstly, a simple method to recognize the presence of this type of an active eavesdrop** attack to a particular user is shown. In order to deal with this attack, we consider the problem of maximizing the achievable data rate of the attacked user or its achievable secrecy rate. The corresponding problems of minimizing the consumption power subject to security constraints are also considered in parallel. Path-following algorithms are developed to solve the posed optimization problems under different power allocation to access points (APs). Under equip-power allocation to APs, these optimization problems admit closed-form solutions. Numerical results show their efficiencies.
△ Less
Submitted 11 May, 2018;
originally announced May 2018.
-
NOMA for throughput and EE maximization in Energy Harvesting Enabled Networks
Authors:
A. A. Nasir,
H. D. Tuan,
T. Q. Duong,
M. Debbah
Abstract:
Wireless power transfer via radio-frequency (RF) radiation is regarded as a potential solution to energize energy-constrained users, who are deployed close to the base stations (near-by users). However, energy transfer requires much more transmit power than normal information transfer, which makes it very challenging to provide the quality of service in terms of throughput for all near-by users an…
▽ More
Wireless power transfer via radio-frequency (RF) radiation is regarded as a potential solution to energize energy-constrained users, who are deployed close to the base stations (near-by users). However, energy transfer requires much more transmit power than normal information transfer, which makes it very challenging to provide the quality of service in terms of throughput for all near-by users and cell-edge users. Thus, it is of practical interest to employ non-orthogonal multiple access (NOMA) to improve the throughput of all network users, while fulfilling the energy harvesting requirements of the near-by users. To realize both energy harvesting and information decoding, we consider a transmit time-switching (transmit-TS) protocol. We formulate two important beamfoming problems of users' max-min throughput optimization and energy efficiency maximization under power constraint and energy harvesting thresholds at the nearly-located users. For these problems, the optimization objective and energy harvesting are non-convex in beamforming vectors. Thus, we develop efficient path-following algorithms to solve them. In addition, we also consider conventional power splitting (PS)-based energy harvesting receiver. Our numerical results confirm that the proposed transmit-TS based algorithms clearly outperform PS-based algorithms in terms of both, throughput and energy efficiency.
△ Less
Submitted 23 June, 2018; v1 submitted 25 March, 2018;
originally announced March 2018.
-
Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying
Authors:
Chinmoy Kundu,
Sarbani Ghose,
Telex M. N. Ngatched,
Octavia A. Dobre,
Trung Q. Duong,
Ranjan Bose
Abstract:
This paper considers secrecy of a three node cooperative wireless system in the presence of a passive eavesdropper. The threshold-selection decode-and-forward (DF) relay is considered, which can decode the source message correctly only if a predefined signal-to-noise ratio (SNR) is achieved. The effects of channel state information (CSI) availability on secrecy outage probability (SOP) and ergodic…
▽ More
This paper considers secrecy of a three node cooperative wireless system in the presence of a passive eavesdropper. The threshold-selection decode-and-forward (DF) relay is considered, which can decode the source message correctly only if a predefined signal-to-noise ratio (SNR) is achieved. The effects of channel state information (CSI) availability on secrecy outage probability (SOP) and ergodic secrecy rate (ESR) are investigated, and closed-form expressions are derived. Diversity is achieved from the direct and relaying paths both at the destination and at the eavesdropper by combinations of maximal-ratio combining (MRC) and selection combining (SC) schemes. An asymptotic analysis is provided when each hop SNR is the same in the balanced case and when it is different in the unbalanced case. The analysis shows that both hops can be a bottleneck for secure communication; however, they do not affect the secrecy identically. While it is observed that CSI knowledge can improve secrecy, the amount of improvement for SOP is more when the required rate is low and for ESR when the operating SNR is also low. It is also shown that the source to eavesdropper link SNR is more crucial for secure communication.
△ Less
Submitted 1 March, 2018;
originally announced March 2018.
-
Optimal Beamforming for Physical Layer Security in MISO Wireless Networks
Authors:
Zhichao Sheng,
Hoang Duong Tuan,
Trung Q. Duong,
H. Vincent Poor
Abstract:
A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas while the users and eavesdropper are equipped with a single antenna, is considered. At different levels of wireless channel knowledge, the problem of interest is beamforming to optimize the users' quality-of-service (QoS) in terms of their secrecy throughpu…
▽ More
A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas while the users and eavesdropper are equipped with a single antenna, is considered. At different levels of wireless channel knowledge, the problem of interest is beamforming to optimize the users' quality-of-service (QoS) in terms of their secrecy throughputs or maximize the network's energy efficiency under users' QoS. All these problems are seen as very difficult optimization problems with many nonconvex constraints and nonlinear equality constraints in beamforming vectors. The paper develops path-following computational procedures of low-complexity and rapid convergence for the optimal beamforming solution. Their practicability is demonstrated through numerical examples.
△ Less
Submitted 19 February, 2018;
originally announced February 2018.
-
Bang-Bang Charging of Electrical Vehicles by Smart Grid Technology
Authors:
Y. Shi,
H. D. Tuan,
T. Q. Duong,
H. V. Poor,
A. V. Savkin
Abstract:
The success of the transportation electricification in this century particularly requires the penentration of the internet of plug-in electric vehicles (PEVs) into the smart power grid. Beside the function of serving the traditional residential power demand, next-generation power grids also aim to support the internet of PEVs at the same time. The distinct difference between the traditional power…
▽ More
The success of the transportation electricification in this century particularly requires the penentration of the internet of plug-in electric vehicles (PEVs) into the smart power grid. Beside the function of serving the traditional residential power demand, next-generation power grids also aim to support the internet of PEVs at the same time. The distinct difference between the traditional power demand and PEVs' power demand is that while the statistics of the former is rich enough for treating it as inelastic/known before hand, the latter is unknown until random PEVs' arrivals. Massive penentration of PEVs certainly causes the grid unpredictable fluctuation. The present paper considers the joint PEVs charging coordination and grid power generation to minimizing both of the negative impact of PEVs' integration and the cost of power generation while meeting the grid operating constraints and all parties' demand. The bang-bang PEVs charging strategy is adopted to exploit its simple implementation. By using a recently developed model predictive control (MPC) model for this problem, the online compuation is based on a predictive mixed integer nonlinear programming (MINP). A new solution computation for this optimization problem is developed. Its capacity of achieving the globally optimal solution is shown by numerical comparison between its performance and that by an off-line optimal solution.
△ Less
Submitted 17 October, 2018; v1 submitted 12 February, 2018;
originally announced February 2018.
-
Low-Latency Multiuser Two-Way Wireless Relaying for Spectral and Energy Efficiencies
Authors:
Zhichao Sheng,
Hoang Duong Tuan,
Trung Q. Duong,
H. Vincent Poor,
Yong Fang
Abstract:
The paper considers two possible approaches, which enable multiple pairs of users to exchange information via multiple multi-antenna relays within one time-slot to save the communication bandwidth in low-latency communications. The first approach is to deploy full-duplexes for both users and relays to make their simultaneous signal transmission and reception possible. In the second approach the us…
▽ More
The paper considers two possible approaches, which enable multiple pairs of users to exchange information via multiple multi-antenna relays within one time-slot to save the communication bandwidth in low-latency communications. The first approach is to deploy full-duplexes for both users and relays to make their simultaneous signal transmission and reception possible. In the second approach the users use a fraction of a time slot to send their information to the relays and the relays use the remaining complementary fraction of the time slot to send the beamformed signals to the users. The inherent loop self-interference in the duplexes and inter-full-duplexing-user interference in the first approach are absent in the second approach. Under both these approaches, the joint users' power allocation and relays' beamformers to either optimize the users' exchange of information or maximize the energy-efficiency subject to user quality-of-service (QoS) in terms of the exchanging information throughput thresholds lead to complex nonconvex optimization problems. Path-following algorithms are developed for their computational solutions. The provided numerical examples show the advantages of the second approach over the first approach.
△ Less
Submitted 11 December, 2017;
originally announced December 2017.
-
Multi-cell Massive MIMO Beamforming in Assuring QoS for Large Numbers of Users
Authors:
Long D. Nguyen,
Hoang D. Tuan,
Trung Q. Duong,
H. Vincent Poor
Abstract:
Massive multi-input multi-output (MIMO) uses a very large number of low-power transmit antennas to serve much smaller numbers of users. The most widely proposed type of massive MIMO transmit beamforming is zero-forcing, which is based on the right inverse of the overall MIMO channel matrix to force the inter-user interference to zero. The performance of massive MIMO is then analyzed based on the t…
▽ More
Massive multi-input multi-output (MIMO) uses a very large number of low-power transmit antennas to serve much smaller numbers of users. The most widely proposed type of massive MIMO transmit beamforming is zero-forcing, which is based on the right inverse of the overall MIMO channel matrix to force the inter-user interference to zero. The performance of massive MIMO is then analyzed based on the throughput of cell-edge users. This paper reassesses this beamforming philosophy, to instead consider the maximization of the energy efficiency of massive MIMO systems in assuring the quality-of- service (QoS) for as many users as possible. The bottleneck of serving small numbers of users by a large number of transmit antennas is unblocked by a new time-fraction-wise beamforming technique, which focuses signal transmission in fractions of a time slot. Accordingly, massive MIMO can deliver better quality-of-experience (QoE) in assuring QoS for much larger numbers of users. The provided simulations show that the numbers of users served by massive MIMO with the required QoS may be twice or more than the number of its transmit antennas.
△ Less
Submitted 10 December, 2017;
originally announced December 2017.
-
Model Predictive Control for Smart Grids with Multiple Electric-Vehicle Charging Stations
Authors:
Y. Shi,
H. D. Tuan,
A. V. Savkin,
T. Q. Duong,
H. V. Poor
Abstract:
Next-generation power grids will likely enable concurrent service for residences and plug-in electric vehicles (PEVs). While the residence power demand profile is known and thus can be considered inelastic, the PEVs' power demand is only known after random PEVs' arrivals. PEV charging scheduling aims at minimizing the potential impact of the massive integration of PEVs into power grids to save ser…
▽ More
Next-generation power grids will likely enable concurrent service for residences and plug-in electric vehicles (PEVs). While the residence power demand profile is known and thus can be considered inelastic, the PEVs' power demand is only known after random PEVs' arrivals. PEV charging scheduling aims at minimizing the potential impact of the massive integration of PEVs into power grids to save service costs to customers while power control aims at minimizing the cost of power generation subject to operating constraints and meeting demand. The present paper develops a model predictive control (MPC)- based approach to address the joint PEV charging scheduling and power control to minimize both PEV charging cost and energy generation cost in meeting both residence and PEV power demands. Unlike in related works, no assumptions are made about the probability distribution of PEVs' arrivals, the known PEVs' future demand, or the unlimited charging capacity of PEVs. The proposed approach is shown to achieve a globally optimal solution. Numerical results for IEEE benchmark power grids serving Tesla Model S PEVs show the merit of this approach.
△ Less
Submitted 25 August, 2017;
originally announced August 2017.
-
Power Allocation for Energy Efficiency and Secrecy of Interference Wireless Networks
Authors:
Zhichao Sheng,
Hoang Duong Tuan,
Ali Arshad Nasir,
Trung Q. Duong,
H. Vincent Poor
Abstract:
Considering a multi-user interference network with an eavesdropper, this paper aims at the power allocation to optimize the worst secrecy throughput among the network links or the secure energy efficiency in terms of achieved secrecy throughput per Joule under link security requirements. Three scenarios for the access of channel state information are considered: the perfect channel state informati…
▽ More
Considering a multi-user interference network with an eavesdropper, this paper aims at the power allocation to optimize the worst secrecy throughput among the network links or the secure energy efficiency in terms of achieved secrecy throughput per Joule under link security requirements. Three scenarios for the access of channel state information are considered: the perfect channel state information, partial channel state information with channels from the transmitters to the eavesdropper exponentially distributed, and not perfectly known channels between the transmitters and the users with exponentially distributed errors. The paper develops various path-following procedures of low complexity and rapid convergence for the optimal power allocation. Their effectiveness and viability are illustrated through numerical examples. The power allocation schemes are shown to achieve both high secrecy throughput and energy efficiency.
△ Less
Submitted 24 August, 2017;
originally announced August 2017.
-
Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
Authors:
Junqing Zhang,
Trung Q. Duong,
Roger Woods,
Alan Marshall
Abstract:
The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of ke…
▽ More
The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.
△ Less
Submitted 16 August, 2017;
originally announced August 2017.
-
Emission Noise in an Interacting Quantum Dot: Role of Inelastic Scattering and Asymmetric Coupling to the Reservoirs
Authors:
A. Crépieux,
S. Sahoo,
T. Q. Duong,
R. Zamoum,
M. Lavagna
Abstract:
A theory is developed for the emission noise at frequency $ν$ in a quantum dot in the presence of Coulomb interactions and asymmetric couplings to the reservoirs. We give an analytical expression for the noise in terms of the various transmission amplitudes. Including inelastic scattering contribution, it can be seen as the analog of the Meir-Wingreen formula for the current. A physical interpreta…
▽ More
A theory is developed for the emission noise at frequency $ν$ in a quantum dot in the presence of Coulomb interactions and asymmetric couplings to the reservoirs. We give an analytical expression for the noise in terms of the various transmission amplitudes. Including inelastic scattering contribution, it can be seen as the analog of the Meir-Wingreen formula for the current. A physical interpretation is given on the basis of the transmission of one electron-hole pair to the concerned reservoir where it emits an energy after recombination. We then treat the interactions by solving the self-consistent equations of motion for the Green functions. The results for the noise derivative versus $eV$ show a zero value until $eV = hν$, followed by a Kondo peak in the Kondo regime, in good agreement with recent measurements in carbon nanotube quantum dots.
△ Less
Submitted 13 March, 2018; v1 submitted 3 August, 2017;
originally announced August 2017.
-
Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications
Authors:
Van-Dinh Nguyen,
Trung Q. Duong,
Oh-Soon Shin,
Arumugam Nallanathan,
George K. Karagiannidis
Abstract:
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselve…
▽ More
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselves from eavesdrop**. The main objective of this work is to maximize the secrecy rate of the secondary system, while adhering to all individual primary users' secrecy rate constraints. In the case of active eavesdroppers and perfect channel state information (CSI) at the transceivers, the utility function of interest is nonconcave and the involved constraints are nonconvex, and thus, the optimal solutions are troublesome. To solve this problem, we propose an iterative algorithm to arrive at least to a local optimum of the original nonconvex problem. This algorithm is guaranteed to achieve a Karush-Kuhn-Tucker solution. Then, we extend the optimization approach to the case of passive eavesdroppers and imperfect CSI knowledge at the transceivers, where the constraints are transformed into a linear matrix inequality and convex constraints, in order to facilitate the optimal solution.
△ Less
Submitted 7 July, 2017;
originally announced July 2017.
-
Joint Fractional Time Allocation and Beamforming for Downlink Multiuser MISO Systems
Authors:
Van-Dinh Nguyen,
Hoang Duong Tuan,
Trung Q. Duong,
Oh-Soon Shin,
H. Vincent Poor
Abstract:
It is well-known that the traditional transmit beamforming at a base station (BS) to manage interference in serving multiple users is effective only when the number of users is less than the number of transmit antennas at the BS. Non-orthogonal multiple access (NOMA) can improve the throughput of users with poorer channel conditions by compromising their own privacy because other users with better…
▽ More
It is well-known that the traditional transmit beamforming at a base station (BS) to manage interference in serving multiple users is effective only when the number of users is less than the number of transmit antennas at the BS. Non-orthogonal multiple access (NOMA) can improve the throughput of users with poorer channel conditions by compromising their own privacy because other users with better channel conditions can decode the information of users in poorer channel state. NOMA still prefers that the number of users is less than the number of antennas at the BS transmitter. This paper resolves such issues by allocating separate fractional time slots for serving the users with similar channel conditions. This enables the BS to serve more users within the time unit while the privacy of each user is preserved. The fractional times and beamforming vectors are jointly optimized to maximize the system's throughput. An efficient path-following algorithm, which invokes a simple convex quadratic program at each iteration, is proposed for the solution of this challenging optimization problem. Numerical results confirm its versatility.
△ Less
Submitted 27 August, 2017; v1 submitted 6 June, 2017;
originally announced June 2017.
-
Precoder Design for Signal Superposition in MIMO-NOMA Multicell Networks
Authors:
Van-Dinh Nguyen,
Hoang Duong Tuan,
Trung Q. Duong,
H. Vincent Poor,
and Oh-Soon Shin
Abstract:
The throughput of users with poor channel conditions, such as those at a cell edge, is a bottleneck in wireless systems. A major part of the power budget must be allocated to serve these users in guaranteeing their quality-of-service (QoS) requirement, hampering QoS for other users and thus compromising the system reliability. In nonorthogonal multiple access (NOMA), the message intended for a use…
▽ More
The throughput of users with poor channel conditions, such as those at a cell edge, is a bottleneck in wireless systems. A major part of the power budget must be allocated to serve these users in guaranteeing their quality-of-service (QoS) requirement, hampering QoS for other users and thus compromising the system reliability. In nonorthogonal multiple access (NOMA), the message intended for a user with a poor channel condition is decoded by itself and by another user with a better channel condition. The message intended for the latter is then successively decoded by itself after canceling the interference of the former. The overall information throughput is thus improved by this particular successive decoding and interference cancellation. This paper aims to design linear precoders/beamformers for signal superposition at the base stations of NOMA multi-input multi-output multi-cellular systems to maximize the overall sum throughput subject to the users' QoS requirements, which are imposed independently on the users' channel condition. This design problem is formulated as the maximization of a highly nonlinear and nonsmooth function subject to nonconvex constraints, which is very computationally challenging. Path-following algorithms for its solution, which invoke only a simple convex problem of moderate dimension at each iteration are developed. Generating a sequence of improved points, these algorithms converge at least to a local optimum. Extensive numerical simulations are then provided to demonstrate their merit.
△ Less
Submitted 6 June, 2017;
originally announced June 2017.
-
Energy Efficiency in Cell-Free Massive MIMO with Zero-Forcing Precoding Design
Authors:
L. D. Nguyen,
T. Q. Duong,
H. Q. Ngo,
K. Tourki
Abstract:
We consider the downlink of a cell-free massive multiple-input multiple-output (MIMO) network where numerous distributed access points (APs) serve a smaller number of users under time division duplex operation. An important issue in deploying cell-free networks is high power consumption, which is proportional to the number of APs. This issue has raised the question as to their suitability for gree…
▽ More
We consider the downlink of a cell-free massive multiple-input multiple-output (MIMO) network where numerous distributed access points (APs) serve a smaller number of users under time division duplex operation. An important issue in deploying cell-free networks is high power consumption, which is proportional to the number of APs. This issue has raised the question as to their suitability for green communications in terms of the total energy efficiency (bits/Joule). To tackle this, we develop a novel low-complexity power control technique with zero-forcing precoding design to maximize the energy efficiency of cell-free massive MIMO taking into account the backhaul power consumption and the imperfect channel state information.
△ Less
Submitted 11 April, 2017;
originally announced April 2017.
-
How to Scale Up the Spectral Efficiency of Multi-way Massive MIMO Relaying?
Authors:
Chung Duc Ho,
Hien Quoc Ngo,
Michail Matthaiou,
Trung Q. Duong
Abstract:
This paper considers a decode-and-forward (DF) multi-way massive multiple-input multiple-output (MIMO) relay system where many users exchange their data with the aid of a relay station equipped with a massive antenna array. We propose a new transmission protocol which leverages successive cancelation decoding and zero-forcing (ZF) at the users. By using properties of massive MIMO, a tight analytic…
▽ More
This paper considers a decode-and-forward (DF) multi-way massive multiple-input multiple-output (MIMO) relay system where many users exchange their data with the aid of a relay station equipped with a massive antenna array. We propose a new transmission protocol which leverages successive cancelation decoding and zero-forcing (ZF) at the users. By using properties of massive MIMO, a tight analytical approximation of the spectral efficiency is derived. We show that our proposed scheme uses only half of the time-slots required in the conventional scheme (in which the number of time-slots is equal to the number of users [1]), to exchange data across different users. As a result, the sum spectral efficiency of our proposed scheme is nearly double the one of the conventional scheme, thereby boosting the performance of multi-way massive MIMO to unprecedented levels.
△ Less
Submitted 30 March, 2017;
originally announced March 2017.
-
Robust Beamforming for Secrecy Rate in Cooperative Cognitive Radio Multicast Communications
Authors:
Van-Dinh Nguyen,
Trung Q. Duong,
Oh-Soon Shin,
Arumugam Nallanathan,
George K. Karagiannidis
Abstract:
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselve…
▽ More
In this paper, we propose a cooperative approach to improve the security of both primary and secondary systems in cognitive radio multicast communications. During their access to the frequency spectrum licensed to the primary users, the secondary unlicensed users assist the primary system in fortifying security by sending a jamming noise to the eavesdroppers, while simultaneously protect themselves from eavesdrop**. The main objective of this work is to maximize the secrecy rate of the secondary system, while adhering to all individual primary users' secrecy rate constraints. In the case of passive eavesdroppers and imperfect channel state information knowledge at the transceivers, the utility function of interest is nonconcave and involved constraints are nonconvex, and thus, the optimal solutions are troublesome. To address this problem, we propose an iterative algorithm to arrive at a local optimum of the considered problem. The proposed iterative algorithm is guaranteed to achieve a Karush-Kuhn-Tucker solution.
△ Less
Submitted 1 March, 2017;
originally announced March 2017.
-
On the Total Energy Efficiency of Cell-Free Massive MIMO
Authors:
Hien Quoc Ngo,
Le-Nam Tran,
Trung Q. Duong,
Michail Matthaiou,
Erik G. Larsson
Abstract:
We consider the cell-free massive multiple-input multiple-output (MIMO) downlink, where a very large number of distributed multiple-antenna access points (APs) serve many single-antenna users in the same time-frequency resource. A simple (distributed) conjugate beamforming scheme is applied at each AP via the use of local channel state information (CSI). This CSI is acquired through time-division…
▽ More
We consider the cell-free massive multiple-input multiple-output (MIMO) downlink, where a very large number of distributed multiple-antenna access points (APs) serve many single-antenna users in the same time-frequency resource. A simple (distributed) conjugate beamforming scheme is applied at each AP via the use of local channel state information (CSI). This CSI is acquired through time-division duplex operation and the reception of uplink training signals transmitted by the users. We derive a closed-form expression for the spectral efficiency taking into account the effects of channel estimation errors and power control. This closed-form result enables us to analyze the effects of backhaul power consumption, the number of APs, and the number of antennas per AP on the total energy efficiency, as well as, to design an optimal power allocation algorithm. The optimal power allocation algorithm aims at maximizing the total energy efficiency, subject to a per-user spectral efficiency constraint and a per-AP power constraint. Compared with the equal power control, our proposed power allocation scheme can double the total energy efficiency. Furthermore, we propose AP selections schemes, in which each user chooses a subset of APs, to reduce the power consumption caused by the backhaul links. With our proposed AP selection schemes, the total energy efficiency increases significantly, especially for large numbers of APs. Moreover, under a requirement of good quality-of-service for all users, cell-free massive MIMO outperforms the colocated counterpart in terms of energy efficiency.
△ Less
Submitted 24 November, 2017; v1 submitted 24 February, 2017;
originally announced February 2017.
-
Joint Power Allocation and Beamforming for Energy-Efficient Two-Way Multi-Relay Communications
Authors:
Zhichao Sheng,
Hoang D. Tuan,
Trung Q. Duong,
H. Vincent Poor
Abstract:
This paper considers the joint design of user power allocation and relay beamforming in relaying communications, in which multiple pairs of single-antenna users exchange information with each other via multiple-antenna relays in two time slots. All users transmit their signals to the relays in the first time slot while the relays broadcast the beamformed signals to all users in the second time slo…
▽ More
This paper considers the joint design of user power allocation and relay beamforming in relaying communications, in which multiple pairs of single-antenna users exchange information with each other via multiple-antenna relays in two time slots. All users transmit their signals to the relays in the first time slot while the relays broadcast the beamformed signals to all users in the second time slot. The aim is to maximize the system's energy efficiency (EE) subject to quality-of-service (QoS) constraints in terms of exchange throughput requirements. The QoS constraints are nonconvex with many nonlinear cross-terms, so finding a feasible point is already computationally challenging. The sum throughput appears in the numerator while the total consumption power appears in the denominator of the EE objective function. The former is a nonconcave function and the latter is a nonconvex function, making fractional programming useless for EE optimization. Nevertheless, efficient iterations of low complexity to obtain its optimized solutions are developed. The performances of the multiple-user and multiple-relay networks under various scenarios are evaluated to show the merit of the paper development.
△ Less
Submitted 25 January, 2017;
originally announced January 2017.
-
MIMO Beamforming for Secure and Energy-Efficient Wireless Communication
Authors:
Nguyen T. Nghia,
Hoang D. Tuan,
Trung Q. Duong,
H. Vincent Poor
Abstract:
Considering a multiple-user multiple-input multiple-output (MIMO) channel with an eavesdropper, this letter develops a beamformer design to optimize the energy efficiency in terms of secrecy bits per Joule under secrecy quality-of-service constraints. This is a very difficult design problem with no available exact solution techniques. A path-following procedure, which iteratively improves its feas…
▽ More
Considering a multiple-user multiple-input multiple-output (MIMO) channel with an eavesdropper, this letter develops a beamformer design to optimize the energy efficiency in terms of secrecy bits per Joule under secrecy quality-of-service constraints. This is a very difficult design problem with no available exact solution techniques. A path-following procedure, which iteratively improves its feasible points by using a simple quadratic program of moderate dimension, is proposed. Under any fixed computational tolerance the procedure terminates after finitely many iterations, yielding at least a locally optimal solution. Simulation results show the superior performance of the obtained algorithm over other existing methods.
△ Less
Submitted 18 January, 2017;
originally announced January 2017.
-
On the Performance of Zero-Forcing Processing in Multi-Way Massive MIMO Relay Networks
Authors:
Chung Duc Ho,
Hien Quoc Ngo,
Michail Matthaiou,
Trung Q. Duong
Abstract:
We consider a multi-way massive multiple-input multiple-output relay network with zero-forcing processing at the relay. By taking into account the time-division duplex protocol with channel estimation, we derive an analytical approximation of the spectral efficiency. This approximation is very tight and simple which enables us to analyze the system performance, as well as, to compare the spectral…
▽ More
We consider a multi-way massive multiple-input multiple-output relay network with zero-forcing processing at the relay. By taking into account the time-division duplex protocol with channel estimation, we derive an analytical approximation of the spectral efficiency. This approximation is very tight and simple which enables us to analyze the system performance, as well as, to compare the spectral efficiency with zero-forcing and maximum-ratio processing. Our results show that by using a very large number of relay antennas and with the zero-forcing technique, we can simultaneously serve many active users in the same time-frequency resource, each with high spectral efficiency.
△ Less
Submitted 3 January, 2017;
originally announced January 2017.
-
Massive MIMO Pilot Retransmission Strategies for Robustification against Jamming
Authors:
Tan Tai Do,
Hien Quoc Ngo,
Trung Q. Duong,
Tobias J. Oechtering,
Mikael Skoglund
Abstract:
This letter proposes anti-jamming strategies based on pilot retransmission for a single user uplink massive MIMO under jamming attack. A jammer is assumed to attack the system both in the training and data transmission phases. We first derive an achievable rate which enables us to analyze the effect of jamming attacks on the system performance. Counter-attack strategies are then proposed to mitiga…
▽ More
This letter proposes anti-jamming strategies based on pilot retransmission for a single user uplink massive MIMO under jamming attack. A jammer is assumed to attack the system both in the training and data transmission phases. We first derive an achievable rate which enables us to analyze the effect of jamming attacks on the system performance. Counter-attack strategies are then proposed to mitigate this effect under two different scenarios: random and deterministic jamming attacks. Numerical results illustrate our analysis and benefit of the proposed schemes.
△ Less
Submitted 24 November, 2016;
originally announced November 2016.
-
Secure and Energy-Efficient Beamforming for Simultaneous Information and Energy Transfer
Authors:
Ali A. Nasir,
Hoang D. Tuan,
Trung Q. Duong,
H. Vincent Poor
Abstract:
Next-generation communication networks will likely involve the energy-efficient transfer of information and energy over the same wireless channel, for which the physical layer will become more vulnerable to cyber attacks by potential multi-antenna eavesdroppers. To address this issue, this paper considers transmit time-switching (TS) mode, in which energy and information signals are transmitted se…
▽ More
Next-generation communication networks will likely involve the energy-efficient transfer of information and energy over the same wireless channel, for which the physical layer will become more vulnerable to cyber attacks by potential multi-antenna eavesdroppers. To address this issue, this paper considers transmit time-switching (TS) mode, in which energy and information signals are transmitted separately in time by the BS. This protocol is not only easy to implement but also delivers the opportunity of multi-purpose beamforming, in which energy beamformers during wireless power transfer are useful in jamming the eavesdropper. In the presence of imperfect channel estimation and multi-antenna eavesdroppers, the energy and information beamformers and the transmit TS ratio are jointly optimized to maximize the worst-case user secrecy rate subject to UEs' harvested energy thresholds and a BS transmit power budget. New robust path-following algorithms, which involve one simple convex quadratic program at each iteration are proposed for computational solutions of this difficult optimization problem and also the problem of secure energy efficiency maximization. The latter is further complex due to additional optimization variables appearing in the denominator of the secrecy rate function. Numerical results confirm that the performance of the proposed computational solutions is robust against the channel uncertainties.
△ Less
Submitted 11 July, 2017; v1 submitted 18 November, 2016;
originally announced November 2016.
-
Multi-Way Massive MIMO with Maximum-Ratio Processing and Imperfect CSI
Authors:
Chung Duc Ho,
Hien Quoc Ngo,
Michail Matthaiou,
Trung Q. Duong
Abstract:
This paper considers a multi-way massive multiple-input multiple-output relaying system, where single-antenna users exchange their information-bearing signals with the help of one relay station equipped with unconventionally many antennas. The relay first estimates the channels to all users through the pilot signals transmitted from them. Then, the relay uses maximum-ratio processing (i.e. maximum…
▽ More
This paper considers a multi-way massive multiple-input multiple-output relaying system, where single-antenna users exchange their information-bearing signals with the help of one relay station equipped with unconventionally many antennas. The relay first estimates the channels to all users through the pilot signals transmitted from them. Then, the relay uses maximum-ratio processing (i.e. maximum-ratio combining in the multiple-access phase and maximum-ratio transmission in the broadcast phase) to process the signals. A rigorous closed-form expression for the spectral efficiency is derived. The effects of the channel estimation error, the channel estimation overhead, the length of the training duration, and the randomness of the user locations are analyzed. We show that by deploying massive antenna arrays at the relay and simple maximum-ratio processing, we can serve many users in the same time-frequency resource, while maintaining a given quality-of-service for each user.
△ Less
Submitted 3 November, 2016;
originally announced November 2016.