-
An Efficient ADMM-Based Algorithm to Nonconvex Penalized Support Vector Machines
Authors:
Lei Guan,
Linbo Qiao,
Dongsheng Li,
Tao Sun,
Keshi Ge,
Xicheng Lu
Abstract:
Support vector machines (SVMs) with sparsity-inducing nonconvex penalties have received considerable attentions for the characteristics of automatic classification and variable selection. However, it is quite challenging to solve the nonconvex penalized SVMs due to their nondifferentiability, nonsmoothness and nonconvexity. In this paper, we propose an efficient ADMM-based algorithm to the nonconv…
▽ More
Support vector machines (SVMs) with sparsity-inducing nonconvex penalties have received considerable attentions for the characteristics of automatic classification and variable selection. However, it is quite challenging to solve the nonconvex penalized SVMs due to their nondifferentiability, nonsmoothness and nonconvexity. In this paper, we propose an efficient ADMM-based algorithm to the nonconvex penalized SVMs. The proposed algorithm covers a large class of commonly used nonconvex regularization terms including the smooth clipped absolute deviation (SCAD) penalty, minimax concave penalty (MCP), log-sum penalty (LSP) and capped-$\ell_1$ penalty. The computational complexity analysis shows that the proposed algorithm enjoys low computational cost. Moreover, the convergence of the proposed algorithm is guaranteed. Extensive experimental evaluations on five benchmark datasets demonstrate the superior performance of the proposed algorithm to other three state-of-the-art approaches.
△ Less
Submitted 10 September, 2018;
originally announced September 2018.
-
Diophantine transference inequalities: weighted, inhomogeneous, and intermediate exponents
Authors:
Sam Chow,
Anish Ghosh,
Lifan Guan,
Antoine Marnat,
David Simmons
Abstract:
We extend the Khintchine transference inequalities, as well as a homogeneous-inhomogeneous transference inequality for lattices, due to Bugeaud and Laurent, to a weighted setting. We also provide applications to inhomogeneous Diophantine approximation on manifolds and to weighted badly approximable vectors. Finally, we interpret and prove a conjecture of Beresnevich-Velani (2010) about inhomogeneo…
▽ More
We extend the Khintchine transference inequalities, as well as a homogeneous-inhomogeneous transference inequality for lattices, due to Bugeaud and Laurent, to a weighted setting. We also provide applications to inhomogeneous Diophantine approximation on manifolds and to weighted badly approximable vectors. Finally, we interpret and prove a conjecture of Beresnevich-Velani (2010) about inhomogeneous intermediate exponents.
△ Less
Submitted 27 March, 2019; v1 submitted 21 August, 2018;
originally announced August 2018.
-
Practical MIMO-NOMA: Low Complexity & Capacity-Approaching Solution
Authors:
Yuhao Chi,
Lei Liu,
Guanghui Song,
Chau Yuen,
Yong Liang Guan,
Ying Li
Abstract:
MIMO-NOMA combines Multiple-Input Multiple-Output (MIMO) and Non-Orthogonal Multiple Access (NOMA), which can address heterogeneous challenges, such as massive connectivity, low latency, and high reliability. In this paper, a practical coded MIMO-NOMA system with capacityapproaching performance as well as low implementation complexity is proposed. Specifically, the employed receiver consists of a…
▽ More
MIMO-NOMA combines Multiple-Input Multiple-Output (MIMO) and Non-Orthogonal Multiple Access (NOMA), which can address heterogeneous challenges, such as massive connectivity, low latency, and high reliability. In this paper, a practical coded MIMO-NOMA system with capacityapproaching performance as well as low implementation complexity is proposed. Specifically, the employed receiver consists of a multi-user Linear Minimum Mean-Square Error (LMMSE) detector and a bank of single-user message-passing decoders, which decompose the overall signal recovery into distributed low-complexity calculations. An asymptotic extrinsic information transfer analysis is proposed to estimate the performance of iterative receiver, where practical channel codes that match with the LMMSE detector in the iterative decoding perspective are constructed. As a result, the proposed coded MIMO-NOMA system achieves asymptotic performances within 0.2 dB from the theoretical capacity. Simulation results validate the reliability and robustness of the proposed system in practical settings, including various system loads, iteration numbers, code lengths, and channel conditions.
△ Less
Submitted 18 July, 2018;
originally announced July 2018.
-
Detecting strong signals in gene perturbation experiments: An adaptive approach with power guarantee and FDR control
Authors:
Leying Guan,
Xi Chen,
Wing Hung Wong
Abstract:
The perturbation of a transcription factor should affect the expression levels of its direct targets. However, not all genes showing changes in expression are direct targets. To increase the chance of detecting direct targets, we propose a modified two-group model where the null group corresponds to genes which are not direct targets, but can have small non-zero effects. We model the behaviour of…
▽ More
The perturbation of a transcription factor should affect the expression levels of its direct targets. However, not all genes showing changes in expression are direct targets. To increase the chance of detecting direct targets, we propose a modified two-group model where the null group corresponds to genes which are not direct targets, but can have small non-zero effects. We model the behaviour of genes from the null set by a Gaussian distribution with unknown variance $τ^2$, and we discuss and compare three methods which adaptively estimate $τ^2$ from the data: the iterated empirical Bayes estimator, the truncated MLE and the central moment matching estimator. We conduct a detailed analysis of the properties of the iterated EB estimate which has the best performance in the simulations. In particular, we provide theoretical guarantee of its good performance under mild conditions.
We provide simulations comparing the new modeling approach with existing methods, and the new approach shows more stable and better performance under different situations. We also apply it to a real data set from gene knock-down experiments and obtained better results compared with the original two-group model testing for non-zero effects.
△ Less
Submitted 18 July, 2018;
originally announced July 2018.
-
A Product Line Systems Engineering Process for Variability Identification and Reduction
Authors:
Mole Li,
Alan Grigg,
Charles Dickerson,
Lin Guan,
Siyuan Ji
Abstract:
Software Product Line Engineering has attracted attention in the last two decades due to its promising capabilities to reduce costs and time to market through reuse of requirements and components. In practice, develo** system level product lines in a large-scale company is not an easy task as there may be thousands of variants and multiple disciplines involved. The manual reuse of legacy system…
▽ More
Software Product Line Engineering has attracted attention in the last two decades due to its promising capabilities to reduce costs and time to market through reuse of requirements and components. In practice, develo** system level product lines in a large-scale company is not an easy task as there may be thousands of variants and multiple disciplines involved. The manual reuse of legacy system models at domain engineering to build reusable system libraries and configurations of variants to derive target products can be infeasible. To tackle this challenge, a Product Line Systems Engineering process is proposed. Specifically, the process extends research in the System Orthogonal Variability Model to support hierarchical variability modeling with formal definitions; utilizes Systems Engineering concepts and legacy system models to build the hierarchy for the variability model and to identify essential relations between variants; and finally, analyzes the identified relations to reduce the number of variation points. The process, which is automated by computational algorithms, is demonstrated through an illustrative example on generalized Rolls-Royce aircraft engine control systems. To evaluate the effectiveness of the process in the reduction of variation points, it is further applied to case studies in different engineering domains at different levels of complexity. Subject to system model availability, reduction of 14% to 40% in the number of variation points are demonstrated in the case studies.
△ Less
Submitted 12 June, 2018;
originally announced June 2018.
-
Post model-fitting exploration via a "Next-Door" analysis
Authors:
Leying Guan,
Robert Tibshirani
Abstract:
We propose a simple method for evaluating the model that has been chosen by an adaptive regression procedure, our main focus being the lasso. This procedure deletes each chosen predictor and refits the lasso to get a set of models that are "close" to the one chosen, referred to as "base model". If the deletion of a predictor leads to significant deterioration in the model's predictive power, the p…
▽ More
We propose a simple method for evaluating the model that has been chosen by an adaptive regression procedure, our main focus being the lasso. This procedure deletes each chosen predictor and refits the lasso to get a set of models that are "close" to the one chosen, referred to as "base model". If the deletion of a predictor leads to significant deterioration in the model's predictive power, the predictor is called indispensable; otherwise, the nearby model is called acceptable and can serve as a good alternative to the base model. This provides both an assessment of the predictive contribution of each variable and a set of alternative models that may be used in place of the chosen model.
In this paper, we will focus on the cross-validation (CV) setting and a model's predictive power is measured by its CV error, with base model tuned by cross-validation. We propose a method for comparing the error rates of the base model with that of nearby models, and a p-value for testing whether a predictor is dispensable. We also propose a new quantity called model score which works similarly as the p-value for the control of type I error. Our proposal is closely related to the LOCO (leave-one-covarate-out) methods of ([Rinaldo 2016 Bootstrap**]) and less so, to Stability Selection ([Meinshausen 2010 stability]).
We call this procedure "Next-Door analysis" since it examines models close to the base model. It can be applied to Gaussian regression data, generalized linear models, and other supervised learning problems with $\ell_1$ penalization. It could also be applied to best subset and stepwise regression procedures. We have implemented it in the R language as a library to accompany the well-known {\tt glmnet} library.
△ Less
Submitted 4 June, 2018;
originally announced June 2018.
-
Hausdorff dimension of divergent trajectories on homogeneous space
Authors:
Lifan Guan,
Ronggang Shi
Abstract:
For one parameter subgroup action on a finite volume homogeneous space, we consider the set of points admitting divergent on average trajectories. We show that the Hausdorff dimension of this set is strictly less than the manifold dimension of the homogeneous space. As a corollary we know that the Hausdorff dimension of the set of points admitting divergent trajectories is not full, which proves a…
▽ More
For one parameter subgroup action on a finite volume homogeneous space, we consider the set of points admitting divergent on average trajectories. We show that the Hausdorff dimension of this set is strictly less than the manifold dimension of the homogeneous space. As a corollary we know that the Hausdorff dimension of the set of points admitting divergent trajectories is not full, which proves a conjecture of Y. Cheung.
△ Less
Submitted 18 May, 2018;
originally announced May 2018.
-
VH-HFCN based Parking Slot and Lane Markings Segmentation on Panoramic Surround View
Authors:
Yan Wu,
Tao Yang,
Junqiao Zhao,
Linting Guan,
Wei Jiang
Abstract:
The automatic parking is being massively developed by car manufacturers and providers. Until now, there are two problems with the automatic parking. First, there is no openly-available segmentation labels of parking slot on panoramic surround view (PSV) dataset. Second, how to detect parking slot and road structure robustly. Therefore, in this paper, we build up a public PSV dataset. At the same t…
▽ More
The automatic parking is being massively developed by car manufacturers and providers. Until now, there are two problems with the automatic parking. First, there is no openly-available segmentation labels of parking slot on panoramic surround view (PSV) dataset. Second, how to detect parking slot and road structure robustly. Therefore, in this paper, we build up a public PSV dataset. At the same time, we proposed a highly fused convolutional network (HFCN) based segmentation method for parking slot and lane markings based on the PSV dataset. A surround-view image is made of four calibrated images captured from four fisheye cameras. We collect and label more than 4,200 surround view images for this task, which contain various illuminated scenes of different types of parking slots. A VH-HFCN network is proposed, which adopts an HFCN as the base, with an extra efficient VH-stage for better segmenting various markings. The VH-stage consists of two independent linear convolution paths with vertical and horizontal convolution kernels respectively. This modification enables the network to robustly and precisely extract linear features. We evaluated our model on the PSV dataset and the results showed outstanding performance in ground markings segmentation. Based on the segmented markings, parking slots and lanes are acquired by skeletonization, hough line transform and line arrangement.
△ Less
Submitted 6 May, 2018; v1 submitted 19 April, 2018;
originally announced April 2018.
-
TiEV: The Tongji Intelligent Electric Vehicle in the Intelligent Vehicle Future Challenge of China
Authors:
Junqiao Zhao,
Chen Ye,
Yan Wu,
Linting Guan,
Lewen Cai,
Lu Sun,
Tao Yang,
Xudong He,
Jun Li,
Yongchao Ding,
Xinglian Zhang,
Xinchen Wang,
**lin Huang,
Enwei Zhang,
Yewei Huang,
Wei Jiang,
Shaoming Zhang,
Lu Xiong,
Tiantian Feng
Abstract:
TiEV is an autonomous driving platform implemented by Tongji University of China. The vehicle is drive-by-wire and is fully powered by electricity. We devised the software system of TiEV from scratch, which is capable of driving the vehicle autonomously in urban paths as well as on fast express roads. We describe our whole system, especially novel modules of probabilistic perception fusion, increm…
▽ More
TiEV is an autonomous driving platform implemented by Tongji University of China. The vehicle is drive-by-wire and is fully powered by electricity. We devised the software system of TiEV from scratch, which is capable of driving the vehicle autonomously in urban paths as well as on fast express roads. We describe our whole system, especially novel modules of probabilistic perception fusion, incremental map**, the 1st and the 2nd planning and the overall safety concern. TiEV finished 2016 and 2017 Intelligent Vehicle Future Challenge of China held at Changshu. We show our experiences on the development of autonomous vehicles and future trends.
△ Less
Submitted 6 May, 2018; v1 submitted 17 April, 2018;
originally announced April 2018.
-
SCK: A sparse coding based key-point detector
Authors:
Thanh Hong-Phuoc,
Yifeng He,
Ling Guan
Abstract:
All current popular hand-crafted key-point detectors such as Harris corner, MSER, SIFT, SURF... rely on some specific pre-designed structures for the detection of corners, blobs, or junctions in an image. In this paper, a novel sparse coding based key-point detector which requires no particular pre-designed structures is presented. The key-point detector is based on measuring the complexity level…
▽ More
All current popular hand-crafted key-point detectors such as Harris corner, MSER, SIFT, SURF... rely on some specific pre-designed structures for the detection of corners, blobs, or junctions in an image. In this paper, a novel sparse coding based key-point detector which requires no particular pre-designed structures is presented. The key-point detector is based on measuring the complexity level of each block in an image to decide where a key-point should be. The complexity level of a block is defined as the total number of non-zero components of a sparse representation of that block. Generally, a block constructed with more components is more complex and has greater potential to be a good key-point. Experimental results on Webcam and EF datasets [1, 2] show that the proposed detector achieves significantly high repeatability compared to hand-crafted features, and even outperforms the matching scores of the state-of-the-art learning based detector.
△ Less
Submitted 7 December, 2018; v1 submitted 7 February, 2018;
originally announced February 2018.
-
Test Error Estimation after Model Selection Using Validation Error
Authors:
Leying Guan
Abstract:
When performing supervised learning with the model selected using validation error from sample splitting and cross validation, the minimum value of the validation error can be biased downward. We propose two simple methods that use the errors produced in the validating step to estimate the test error after model selection, and we focus on the situations where we select the model by minimizing the…
▽ More
When performing supervised learning with the model selected using validation error from sample splitting and cross validation, the minimum value of the validation error can be biased downward. We propose two simple methods that use the errors produced in the validating step to estimate the test error after model selection, and we focus on the situations where we select the model by minimizing the validation error and the randomized validation error. Our methods do not require model refitting, and the additional computational cost is negligible. In the setting of sample splitting, we show that, the proposed test error estimates have biases of size $o(1/\sqrt{n})$ under suitable assumptions. We also propose to use the bootstrap to construct confidence intervals for the test error based on this result. We apply our proposed methods to a number of simulations and examine their performance.
△ Less
Submitted 10 February, 2018; v1 submitted 9 January, 2018;
originally announced January 2018.
-
Semantic Segmentation via Highly Fused Convolutional Network with Multiple Soft Cost Functions
Authors:
Tao Yang,
Yan Wu,
Junqiao Zhao,
Linting Guan
Abstract:
Semantic image segmentation is one of the most challenged tasks in computer vision. In this paper, we propose a highly fused convolutional network, which consists of three parts: feature downsampling, combined feature upsampling and multiple predictions. We adopt a strategy of multiple steps of upsampling and combined feature maps in pooling layers with its corresponding unpooling layers. Then we…
▽ More
Semantic image segmentation is one of the most challenged tasks in computer vision. In this paper, we propose a highly fused convolutional network, which consists of three parts: feature downsampling, combined feature upsampling and multiple predictions. We adopt a strategy of multiple steps of upsampling and combined feature maps in pooling layers with its corresponding unpooling layers. Then we bring out multiple pre-outputs, each pre-output is generated from an unpooling layer by one-step upsampling. Finally, we concatenate these pre-outputs to get the final output. As a result, our proposed network makes highly use of the feature information by fusing and reusing feature maps. In addition, when training our model, we add multiple soft cost functions on pre-outputs and final outputs. In this way, we can reduce the loss reduction when the loss is back propagated. We evaluate our model on three major segmentation datasets: CamVid, PASCAL VOC and ADE20K. We achieve a state-of-the-art performance on CamVid dataset, as well as considerable improvements on PASCAL VOC dataset and ADE20K dataset
△ Less
Submitted 4 January, 2018;
originally announced January 2018.
-
Overcoming Endurance Issue: UAV-Enabled Communications with Proactive Caching
Authors:
Xiaoli Xu,
Yong Zeng,
Yong Liang Guan,
Rui Zhang
Abstract:
Wireless communication enabled by unmanned aerial vehicles (UAVs) has emerged as an appealing technology for many application scenarios in future wireless systems. However, the limited endurance of UAVs greatly hinders the practical implementation of UAV-enabled communications. To overcome this issue, this paper proposes a novel scheme for UAV-enabled communications by utilizing the promising tech…
▽ More
Wireless communication enabled by unmanned aerial vehicles (UAVs) has emerged as an appealing technology for many application scenarios in future wireless systems. However, the limited endurance of UAVs greatly hinders the practical implementation of UAV-enabled communications. To overcome this issue, this paper proposes a novel scheme for UAV-enabled communications by utilizing the promising technique of proactive caching at the users. Specifically, we focus on content-centric communication systems, where a UAV is dispatched to serve a group of ground nodes (GNs) with random and asynchronous requests for files drawn from a given set. With the proposed scheme, at the beginning of each operation period, the UAV pro-actively transmits the files to a subset of selected GNs that cooperatively cache all the files in the set. As a result, when requested, a file can be retrieved by each GN either directly from its local cache or from its nearest neighbor that has cached the file via device-to-device (D2D) communications. It is revealed that there exists a fundamental trade-off between the file caching cost, which is the total time required for the UAV to transmit the files to their designated caching GNs, and the file retrieval cost, which is the average time required for serving one file request. To characterize this trade-off, we formulate an optimization problem to minimize the weighted sum of the two costs, via jointly designing the file caching policy, the UAV trajectory and communication scheduling. As the formulated problem is NP-hard in general, we propose efficient algorithms to find high-quality approximate solutions for it. Numerical results are provided to corroborate our study and show the great potential of proactive caching for overcoming the limited endurance issue in UAV-enabled communications.
△ Less
Submitted 2 October, 2018; v1 submitted 10 December, 2017;
originally announced December 2017.
-
V2X Content Distribution Based on Batched Network Coding with Distributed Scheduling
Authors:
Yumeng Gao,
Xiaoli Xu,
Yong Liang Guan,
Peter Han Joo Chong
Abstract:
Content distribution is an application in intelligent transportation system to assist vehicles in acquiring information such as digital maps and entertainment materials. In this paper, we consider content distribution from a single roadside infrastructure unit to a group of vehicles passing by it. To combat the short connection time and the lossy channel quality, the downloaded contents need to be…
▽ More
Content distribution is an application in intelligent transportation system to assist vehicles in acquiring information such as digital maps and entertainment materials. In this paper, we consider content distribution from a single roadside infrastructure unit to a group of vehicles passing by it. To combat the short connection time and the lossy channel quality, the downloaded contents need to be further shared among vehicles after the initial broadcasting phase. To this end, we propose a joint infrastructure-to-vehicle (I2V) and vehicle-to-vehicle (V2V) communication scheme based on batched sparse (BATS) coding to minimize the traffic overhead and reduce the total transmission delay. In the I2V phase, the roadside unit (RSU) encodes the original large-size file into a number of batches in a rateless manner, each containing a fixed number of coded packets, and sequentially broadcasts them during the I2V connection time. In the V2V phase, vehicles perform the network coded cooperative sharing by re-encoding the received packets. We propose a utility-based distributed algorithm to efficiently schedule the V2V cooperative transmissions, hence reducing the transmission delay. A closed-form expression for the expected rank distribution of the proposed content distribution scheme is derived, which is used to design the optimal BATS code. The performance of the proposed content distribution scheme is evaluated by extensive simulations that consider multi-lane road and realistic vehicular traffic settings, and shown to significantly outperform the existing content distribution protocols.
△ Less
Submitted 3 October, 2018; v1 submitted 4 December, 2017;
originally announced December 2017.
-
A Novel Image-centric Approach Towards Direct Volume Rendering
Authors:
Naimul Khan,
Riadh Ksantini,
Ling Guan
Abstract:
Transfer Function (TF) generation is a fundamental problem in Direct Volume Rendering (DVR). A TF maps voxels to color and opacity values to reveal inner structures. Existing TF tools are complex and unintuitive for the users who are more likely to be medical professionals than computer scientists. In this paper, we propose a novel image-centric method for TF generation where instead of complex to…
▽ More
Transfer Function (TF) generation is a fundamental problem in Direct Volume Rendering (DVR). A TF maps voxels to color and opacity values to reveal inner structures. Existing TF tools are complex and unintuitive for the users who are more likely to be medical professionals than computer scientists. In this paper, we propose a novel image-centric method for TF generation where instead of complex tools, the user directly manipulates volume data to generate DVR. The user's work is further simplified by presenting only the most informative volume slices for selection. Based on the selected parts, the voxels are classified using our novel Sparse Nonparametric Support Vector Machine classifier, which combines both local and near-global distributional information of the training data. The voxel classes are mapped to aesthetically pleasing and distinguishable color and opacity values using harmonic colors. Experimental results on several benchmark datasets and a detailed user survey show the effectiveness of the proposed method.
△ Less
Submitted 29 November, 2017;
originally announced November 2017.
-
Real-Time System for Human Activity Analysis
Authors:
Randy Tan,
Naimul Khan,
Ling Guan
Abstract:
We propose a real-time human activity analysis system, where a user's activity can be quantiatively evaluated with respect to a ground truth recording. We use two Kinects to solve the ptorblem of self-occlusion through extraction optimal joint positions using Singular Value Decomposition (SVD) and Sequential Quadratic Programming (SQP). Incremental Dynamic Time War** (IDTW) is used to compare th…
▽ More
We propose a real-time human activity analysis system, where a user's activity can be quantiatively evaluated with respect to a ground truth recording. We use two Kinects to solve the ptorblem of self-occlusion through extraction optimal joint positions using Singular Value Decomposition (SVD) and Sequential Quadratic Programming (SQP). Incremental Dynamic Time War** (IDTW) is used to compare the user and expert (ground truth) to quantiatively score the user's performance. Furthermore, the user's performance is displayed through a visual feedback system, where colors on the skeleton represent the user's score. Our experiements use a motion capture suit as ground truth to compare our dual Kinect setup to a single Kinect. We also show that with out visual feedback method, users gain statistically significant boost to learning as opposed to watching a simple video.
△ Less
Submitted 29 November, 2017;
originally announced November 2017.
-
Scanning tunneling microscopy and spectroscopy of twisted trilayer graphene
Authors:
Wei-Jie Zuo,
Jia-Bin Qiao,
Dong-Lin Ma,
Long-**g Yin,
Gan Sun,
Jun-Yang Zhang,
Li-Yang Guan,
Lin He
Abstract:
Twist, as a simple and unique degree of freedom, could lead to enormous novel quantum phenomena in bilayer graphene. A small rotation angle introduces low-energy van Hove singularities (VHSs) approaching the Fermi level, which result in unusual correlated states in the bilayer graphene. It is reasonable to expect that the twist could also affect the electronic properties of few-layer graphene dram…
▽ More
Twist, as a simple and unique degree of freedom, could lead to enormous novel quantum phenomena in bilayer graphene. A small rotation angle introduces low-energy van Hove singularities (VHSs) approaching the Fermi level, which result in unusual correlated states in the bilayer graphene. It is reasonable to expect that the twist could also affect the electronic properties of few-layer graphene dramatically. However, such an issue has remained experimentally elusive. Here, by using scanning tunneling microscopy/spectroscopy (STM/STS), we systematically studied a twisted trilayer graphene (TTG) with two different small twist angles between adjacent layers. Two sets of VHSs originating from the two twist angles were observed in the TTG, indicating that the TTG could be simply regarded as a combination of two different twisted bilayer graphene. By using high-resolution STS, we observed split of the VHSs and directly imaged spatial symmetry breaking of electronic states around the VHSs. These results suggest that electron-electron interactions play an important role in affecting the electronic properties of graphene systems with low-energy VHSs.
△ Less
Submitted 21 November, 2017;
originally announced November 2017.
-
Message Passing in C-RAN: Joint User Activity and Signal Detection
Authors:
Yuhao Chi,
Lei Liu,
Guanghui Song,
Chau Yuen,
Yong Liang Guan,
Ying Li
Abstract:
In cloud radio access network (C-RAN), remote radio heads (RRHs) and users are uniformly distributed in a large area such that the channel matrix can be considered as sparse. Based on this phenomenon, RRHs only need to detect the relatively strong signals from nearby users and ignore the weak signals from far users, which is helpful to develop low-complexity detection algorithms without causing mu…
▽ More
In cloud radio access network (C-RAN), remote radio heads (RRHs) and users are uniformly distributed in a large area such that the channel matrix can be considered as sparse. Based on this phenomenon, RRHs only need to detect the relatively strong signals from nearby users and ignore the weak signals from far users, which is helpful to develop low-complexity detection algorithms without causing much performance loss. However, before detection, RRHs require to obtain the realtime user activity information by the dynamic grant procedure, which causes the enormous latency. To address this issue, in this paper, we consider a grant-free C-RAN system and propose a low-complexity Bernoulli-Gaussian message passing (BGMP) algorithm based on the sparsified channel, which jointly detects the user activity and signal. Since active users are assumed to transmit Gaussian signals at any time, the user activity can be regarded as a Bernoulli variable and the signals from all users obey a Bernoulli-Gaussian distribution. In the BGMP, the detection functions for signals are designed with respect to the Bernoulli-Gaussian variable. Numerical results demonstrate the robustness and effectivity of the BGMP. That is, for different sparsified channels, the BGMP can approach the mean-square error (MSE) of the genie-aided sparse minimum mean-square error (GA-SMMSE) which exactly knows the user activity information. Meanwhile, the fast convergence and strong recovery capability for user activity of the BGMP are also verified.
△ Less
Submitted 20 August, 2017;
originally announced August 2017.
-
Sparse Vector Recovery: Bernoulli-Gaussian Message Passing
Authors:
Lei Liu,
Chongwen Huang,
Yuhao Chi,
Chau Yuen,
Yong Liang Guan,
Ying Li
Abstract:
Low-cost message passing (MP) algorithm has been recognized as a promising technique for sparse vector recovery. However, the existing MP algorithms either focus on mean square error (MSE) of the value recovery while ignoring the sparsity requirement, or support error rate (SER) of the sparse support (non-zero position) recovery while ignoring its value. A novel low-complexity Bernoulli-Gaussian M…
▽ More
Low-cost message passing (MP) algorithm has been recognized as a promising technique for sparse vector recovery. However, the existing MP algorithms either focus on mean square error (MSE) of the value recovery while ignoring the sparsity requirement, or support error rate (SER) of the sparse support (non-zero position) recovery while ignoring its value. A novel low-complexity Bernoulli-Gaussian MP (BGMP) is proposed to perform the value recovery as well as the support recovery. Particularly, in the proposed BGMP, support-related Bernoulli messages and value-related Gaussian messages are jointly processed and assist each other. In addition, a strict lower bound is developed for the MSE of BGMP via the genie-aided minimum mean-square-error (GA-MMSE) method. The GA-MMSE lower bound is shown to be tight in high signal-to-noise ratio. Numerical results are provided to verify the advantage of BGMP in terms of final MSE, SER and convergence speed.
△ Less
Submitted 30 July, 2017;
originally announced July 2017.
-
Design of a Trigger Data Serializer ASIC for the Upgrade of the ATLAS Forward Muon Spectrometer
Authors:
**hong Wang,
Liang Guan,
J. W. Chapman,
Bing Zhou,
Junjie Zhu
Abstract:
The small-strip Thin Gap Chamber (sTGC) will be used for both triggering and precision tracking purposes in the upgrade of the ATLAS forward muon spectrometer. Both sTGC pad and strip detectors are readout by a Trigger Data Serializer (TDS) ASIC in the trigger path. This ASIC has two operation modes to prepare trigger data from pad and strip detectors respectively. The pad mode (pad-TDS) collects…
▽ More
The small-strip Thin Gap Chamber (sTGC) will be used for both triggering and precision tracking purposes in the upgrade of the ATLAS forward muon spectrometer. Both sTGC pad and strip detectors are readout by a Trigger Data Serializer (TDS) ASIC in the trigger path. This ASIC has two operation modes to prepare trigger data from pad and strip detectors respectively. The pad mode (pad-TDS) collects the firing status for up to 104 pads from one detector layer and transmits the data at 4.8 Gbps to the pad trigger extractor every 25 ns. The pad trigger extractor collects pad-TDS data from eight detector layers and defines a region of interest along the path of a muon candidate. In the strip mode (strip-TDS), the deposited charges from up to 128 strips are buffered, time-stamped, and a trigger matching procedure is performed to read out strips underneath the region of interest. The strip-TDS output is also transmitted at 4.8 Gbps to the following FPGA processing circuits. Details about the ASIC design and test results are presented in this paper.
△ Less
Submitted 17 July, 2017;
originally announced July 2017.
-
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices
Authors:
Chen Cao,
Le Guan,
Peng Liu,
Neng Gao,
**gqiang Lin,
Ji Xiang
Abstract:
Mirai is botnet which targets out-of-date Internet-of-Things (IoT) devices. The disruptive Distributed Denial of Service (DDoS) attack last year has hit major Internet companies, causing intermittent service for millions of Internet users. Since the affected devices typically do not support firmware update, it becomes challenging to expel these vulnerable devices in the wild.
Both industry and a…
▽ More
Mirai is botnet which targets out-of-date Internet-of-Things (IoT) devices. The disruptive Distributed Denial of Service (DDoS) attack last year has hit major Internet companies, causing intermittent service for millions of Internet users. Since the affected devices typically do not support firmware update, it becomes challenging to expel these vulnerable devices in the wild.
Both industry and academia have made great efforts in amending the situation. However, none of these efforts is simple to deploy, and at the same time effective in solving the problem. In this work, we design a collaborative defense strategy to tackle Mirai. Our key idea is to take advantage of human involvement in the least aggressive way. In particular, at a negotiated time slot, a customer is required to reboot the compromised device, then a "white" Mirai operated by the manufacturer breaks into the clean-state IoT devices immediately. The "white" Mirai expels other malicious Mirai variants, blocks vulnerable ports, and keeps a heart-beat connection with the server operated by the manufacturer. Once the heart-beat is lost, the server re-implants the "white" Mirai instantly. We have implemented a full prototype of the designed system, and the results show that our system can evade Mirai attacks effectively.
△ Less
Submitted 19 June, 2017;
originally announced June 2017.
-
A Programmable Time Alignment Scheme for Detector Signals from the Upgraded muon Spectrometer at the ATLAS Experiment
Authors:
**hong Wang,
Liang Guan,
John W Chapman,
Bing Zhou,
Junjie Zhu
Abstract:
We present a programmable time alignment scheme used in an ASIC for the ATLAS forward muon trigger development. The scheme utilizes regenerated clocks with programmable phases to compensate for the timing offsets introduced by different detector trace lengths. Each ASIC used in the design has 104 input channels with delay compensation circuitry providing steps of ~ 3 ns and a full range of 25 ns f…
▽ More
We present a programmable time alignment scheme used in an ASIC for the ATLAS forward muon trigger development. The scheme utilizes regenerated clocks with programmable phases to compensate for the timing offsets introduced by different detector trace lengths. Each ASIC used in the design has 104 input channels with delay compensation circuitry providing steps of ~ 3 ns and a full range of 25 ns for each channel. Detailed implementation of the scheme including majority logic to suppress single-event effects is presented. The scheme is flexible and fully synthesizable. The approach is adaptable to other applications with similar phase shifting requirements. In addition, the design is resource efficient and is suitable for cost-effective digital implementation with a large number of channels.
△ Less
Submitted 7 August, 2017; v1 submitted 4 June, 2017;
originally announced June 2017.
-
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone
Authors:
Le Guan,
Peng Liu,
Xinyu Xing,
Xinyang Ge,
Shengzhi Zhang,
Meng Yu,
Trent Jaeger
Abstract:
The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make it smarter. A variety of applications now run simultaneously on an ARM-based processor. For example, devices on the edge of the Internet are provided with higher horsepower to be entrusted with storing, processing and analyzing data collected from IoT devices. This significantly improves efficiency and…
▽ More
The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make it smarter. A variety of applications now run simultaneously on an ARM-based processor. For example, devices on the edge of the Internet are provided with higher horsepower to be entrusted with storing, processing and analyzing data collected from IoT devices. This significantly improves efficiency and reduces the amount of data that needs to be transported to the cloud for data processing, analysis and storage. However, commodity OSes are prone to compromise. Once they are exploited, attackers can access the data on these devices. Since the data stored and processed on the devices can be sensitive, left untackled, this is particularly disconcerting.
In this paper, we propose a new system, TrustShadow that shields legacy applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds. In the secure world, TrustShadow constructs a trusted execution environment for security-critical applications. This trusted environment is maintained by a lightweight runtime system that coordinates the communication between applications and the ordinary OS running in the normal world. The runtime system does not provide system services itself. Rather, it forwards requests for system services to the ordinary OS, and verifies the correctness of the responses. To demonstrate the efficiency of this design, we prototyped TrustShadow on a real chip board with ARM TrustZone support, and evaluated its performance using both microbenchmarks and real-world applications. We showed TrustShadow introduces only negligible overhead to real-world applications.
△ Less
Submitted 22 June, 2017; v1 submitted 18 April, 2017;
originally announced April 2017.
-
Approximate $l_0$-penalized estimation of piecewise-constant signals on graphs
Authors:
Zhou Fan,
Leying Guan
Abstract:
We study recovery of piecewise-constant signals on graphs by the estimator minimizing an $l_0$-edge-penalized objective. Although exact minimization of this objective may be computationally intractable, we show that the same statistical risk guarantees are achieved by the $α$-expansion algorithm which computes an approximate minimizer in polynomial time. We establish that for graphs with small ave…
▽ More
We study recovery of piecewise-constant signals on graphs by the estimator minimizing an $l_0$-edge-penalized objective. Although exact minimization of this objective may be computationally intractable, we show that the same statistical risk guarantees are achieved by the $α$-expansion algorithm which computes an approximate minimizer in polynomial time. We establish that for graphs with small average vertex degree, these guarantees are minimax rate-optimal over classes of edge-sparse signals. For spatially inhomogeneous graphs, we propose minimization of an edge-weighted objective where each edge is weighted by its effective resistance or another measure of its contribution to the graph's connectivity. We establish minimax optimality of the resulting estimators over corresponding edge-weighted sparsity classes. We show theoretically that these risk guarantees are not always achieved by the estimator minimizing the $l_1$/total-variation relaxation, and empirically that the $l_0$-based estimates are more accurate in high signal-to-noise settings.
△ Less
Submitted 28 September, 2017; v1 submitted 4 March, 2017;
originally announced March 2017.
-
Asymptotically Locally Optimal Weight Vector Design for a Tighter Correlation Lower Bound of Quasi-Complementary Sequence Sets
Authors:
Zilong Liu,
Yong Liang Guan,
Wai Ho Mow
Abstract:
A quasi-complementary sequence set (QCSS) refers to a set of two-dimensional matrices with low non-trivial aperiodic auto- and cross- correlation sums. For multicarrier code-division multiple-access applications, the availability of large QCSSs with low correlation sums is desirable. The generalized Levenshtein bound (GLB) is a lower bound on the maximum aperiodic correlation sum of QCSSs. The bou…
▽ More
A quasi-complementary sequence set (QCSS) refers to a set of two-dimensional matrices with low non-trivial aperiodic auto- and cross- correlation sums. For multicarrier code-division multiple-access applications, the availability of large QCSSs with low correlation sums is desirable. The generalized Levenshtein bound (GLB) is a lower bound on the maximum aperiodic correlation sum of QCSSs. The bounding expression of GLB is a fractional quadratic function of a weight vector $\mathbf{w}$ and is expressed in terms of three additional parameters associated with QCSS: the set size $K$, the number of channels $M$, and the sequence length $N$. It is known that a tighter GLB (compared to the Welch bound) is possible only if the condition $M\geq2$ and $K\geq \overline{K}+1$, where $\overline{K}$ is a certain function of $M$ and $N$, is satisfied. A challenging research problem is to determine if there exists a weight vector which gives rise to a tighter GLB for \textit{all} (not just \textit{some}) $K\geq \overline{K}+1$ and $M\geq2$, especially for large $N$, i.e., the condition is {asymptotically} both necessary and sufficient. To achieve this, we \textit{analytically} optimize the GLB which is (in general) non-convex as the numerator term is an indefinite quadratic function of the weight vector. Our key idea is to apply the frequency domain decomposition of the circulant matrix (in the numerator term) to convert the non-convex problem into a convex one. Following this optimization approach, we derive a new weight vector meeting the aforementioned objective and prove that it is a local minimizer of the GLB under certain conditions.
△ Less
Submitted 6 January, 2017;
originally announced January 2017.
-
Bounded orbits of Diagonalizable Flows on finite volume quotients of products of $SL_2(\mathbb{R})$
Authors:
**peng An,
Anish Ghosh,
Lifan Guan,
Tue Ly
Abstract:
We prove a number field analogue of W. M. Schmidt's conjecture on the intersection of weighted badly approximable vectors and use this to prove an instance of a conjecture of An, Guan and Kleinbock. Namely, let $G := SL_2(\mathbb{R}) \times \dots \times SL_2(\mathbb{R}) $ and $Γ$ be a lattice in $G$. We show that the set of points on $G/Γ$ whose forward orbits under a one parameter Ad-semisimple s…
▽ More
We prove a number field analogue of W. M. Schmidt's conjecture on the intersection of weighted badly approximable vectors and use this to prove an instance of a conjecture of An, Guan and Kleinbock. Namely, let $G := SL_2(\mathbb{R}) \times \dots \times SL_2(\mathbb{R}) $ and $Γ$ be a lattice in $G$. We show that the set of points on $G/Γ$ whose forward orbits under a one parameter Ad-semisimple subsemigroup of $G$ are bounded, form a hyperplane absolute winning set.
△ Less
Submitted 17 July, 2019; v1 submitted 20 November, 2016;
originally announced November 2016.
-
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance
Authors:
Le Guan,
Jun Xu,
Shuai Wang,
Xinyu Xing,
Lin Lin,
Heqing Huang,
Peng Liu,
Wenke Lee
Abstract:
Nowadays, auto insurance companies set personalized insurance rate based on data gathered directly from their customers' cars. In this paper, we show such a personalized insurance mechanism -- wildly adopted by many auto insurance companies -- is vulnerable to exploit. In particular, we demonstrate that an adversary can leverage off-the-shelf hardware to manipulate the data to the device that coll…
▽ More
Nowadays, auto insurance companies set personalized insurance rate based on data gathered directly from their customers' cars. In this paper, we show such a personalized insurance mechanism -- wildly adopted by many auto insurance companies -- is vulnerable to exploit. In particular, we demonstrate that an adversary can leverage off-the-shelf hardware to manipulate the data to the device that collects drivers' habits for insurance rate customization and obtain a fraudulent insurance discount. In response to this type of attack, we also propose a defense mechanism that escalates the protection for insurers' data collection. The main idea of this mechanism is to augment the insurer's data collection device with the ability to gather unforgeable data acquired from the physical world, and then leverage these data to identify manipulated data points. Our defense mechanism leveraged a statistical model built on unmanipulated data and is robust to manipulation methods that are not foreseen previously. We have implemented this defense mechanism as a proof-of-concept prototype and tested its effectiveness in the real world. Our evaluation shows that our defense mechanism exhibits a false positive rate of 0.032 and a false negative rate of 0.013.
△ Less
Submitted 23 May, 2017; v1 submitted 7 September, 2016;
originally announced September 2016.
-
Regularization for supervised learning via the "hubNet" procedure
Authors:
Leying Guan,
Zhou Fan,
Robert Tibshirani
Abstract:
We propose a new method for supervised learning. The hubNet procedure fits a hub-based graphical model to the predictors, to estimate the amount of "connection" that each predictor has with other predictors. This yields a set of predictor weights that are then used in a regularized regression such as the lasso or elastic net. The resulting procedure is easy to implement, can sometimes yields highe…
▽ More
We propose a new method for supervised learning. The hubNet procedure fits a hub-based graphical model to the predictors, to estimate the amount of "connection" that each predictor has with other predictors. This yields a set of predictor weights that are then used in a regularized regression such as the lasso or elastic net. The resulting procedure is easy to implement, can sometimes yields higher prediction accuracy that the lasso, and can give insights into the underlying structure of the predictors. HubNet can also be generalized seamlessly to other supervised problems such as regularized logistic regression (and other GLMs), Cox's proportional hazards model, and nonlinear procedures such as random forests and boosting. We prove some recovery results under a specialized model and illustrate the method on real and simulated data.
△ Less
Submitted 18 August, 2016;
originally announced August 2016.
-
Gaussian Message Passing Iterative Detection for MIMO-NOMA Systems with Massive Access
Authors:
Lei Liu,
Chau Yuen,
Yong Liang Guan,
Ying Li,
Chongwen Huang
Abstract:
This paper considers a low-complexity Gaussian Message Passing Iterative Detection (GMPID) algorithm for Multiple-Input Multiple-Output systems with Non-Orthogonal Multiple Access (MIMO-NOMA), in which a base station with $N_r$ antennas serves $N_u$ sources simultaneously. Both $N_u$ and $N_r$ are very large numbers and we consider the cases that $N_u>N_r$. The GMPID is based on a fully connected…
▽ More
This paper considers a low-complexity Gaussian Message Passing Iterative Detection (GMPID) algorithm for Multiple-Input Multiple-Output systems with Non-Orthogonal Multiple Access (MIMO-NOMA), in which a base station with $N_r$ antennas serves $N_u$ sources simultaneously. Both $N_u$ and $N_r$ are very large numbers and we consider the cases that $N_u>N_r$. The GMPID is based on a fully connected loopy graph, which is well understood to be not convergent in some cases. The large-scale property of the MIMO-NOMA is used to simplify the convergence analysis. Firstly, we prove that the variances of the GMPID definitely converge to that of Minimum Mean Square Error (MMSE) detection. Secondly, two sufficient conditions that the means of the GMPID converge to a higher MSE than that of the MMSE detection are proposed. However, the means of the GMPID may still not converge when $ N_u/N_r< (\sqrt{2}-1)^{-2}$. Therefore, a new convergent SA-GMPID is proposed, which converges to the MMSE detection for any $N_u> N_r$ with a faster convergence speed. Finally, numerical results are provided to verify the validity of the proposed theoretical results.
△ Less
Submitted 4 July, 2016;
originally announced July 2016.
-
Convergence Analysis and Assurance for Gaussian Message Passing Iterative Detector in Massive MU-MIMO Systems
Authors:
Lei Liu,
Chau Yuen,
Yong Liang Guan,
Ying Li,
Yu** Su
Abstract:
This paper considers a low-complexity Gaussian Message Passing Iterative Detection (GMPID) algorithm for massive Multiuser Multiple-Input Multiple-Output (MU-MIMO) system, in which a base station with $M$ antennas serves $K$ Gaussian sources simultaneously. Both $K$ and $M$ are very large numbers, and we consider the cases that $K<M$. The GMPID is a low-complexity message passing algorithm based o…
▽ More
This paper considers a low-complexity Gaussian Message Passing Iterative Detection (GMPID) algorithm for massive Multiuser Multiple-Input Multiple-Output (MU-MIMO) system, in which a base station with $M$ antennas serves $K$ Gaussian sources simultaneously. Both $K$ and $M$ are very large numbers, and we consider the cases that $K<M$. The GMPID is a low-complexity message passing algorithm based on a fully connected loopy graph, which is well understood to be not convergent in some cases. As it is hard to analyse the GMPID directly, the large-scale property of the massive MU-MIMO is used to simplify the analysis. Firstly, we prove that the variances of the GMPID definitely converge to the mean square error of Minimum Mean Square Error (MMSE) detection. Secondly, we propose two sufficient conditions that the means of the GMPID converge to those of the MMSE detection. However, the means of GMPID may not converge when $ K/M\geq (\sqrt{2}-1)^2$. Therefore, a new convergent GMPID called SA-GMPID (scale-and-add GMPID) , which converges to the MMSE detection in mean and variance for any $K<M$ and has a faster convergence speed than the GMPID, but has no higher complexity than the GMPID, is proposed. Finally, numerical results are provided to verify the validity and accuracy of the theoretical results.
△ Less
Submitted 20 June, 2016;
originally announced June 2016.
-
Bounded orbits of certain diagonalizable flows on $SL_{n}(\mathbb{R})/SL_{n}(\mathbb{Z})$
Authors:
Lifan Guan,
Weisheng Wu
Abstract:
We prove that the set of points that have bounded orbits under certain diagonalizable flows is a hyperplane absolute winning subset of $SL_{n}(\mathbb{R})/SL_{n}(\mathbb{Z})$.
We prove that the set of points that have bounded orbits under certain diagonalizable flows is a hyperplane absolute winning subset of $SL_{n}(\mathbb{R})/SL_{n}(\mathbb{Z})$.
△ Less
Submitted 27 May, 2016;
originally announced May 2016.
-
Capacity-Achieving Iterative LMMSE Detection for MIMO-NOMA Systems
Authors:
Lei Liu,
Chau Yuen,
Yong Liang Guan,
Ying Li
Abstract:
This paper considers a Iterative Linear Minimum Mean Square Error (LMMSE) detection for the uplink Multiuser Multiple-Input and Multiple-Output (MU-MIMO) systems with Non-Orthogonal Multiple Access (NOMA), in which all the users interfere with each other both in the time domain and frequency domain. It is well known that the Iterative LMMSE detection greatly reduces the system computational comple…
▽ More
This paper considers a Iterative Linear Minimum Mean Square Error (LMMSE) detection for the uplink Multiuser Multiple-Input and Multiple-Output (MU-MIMO) systems with Non-Orthogonal Multiple Access (NOMA), in which all the users interfere with each other both in the time domain and frequency domain. It is well known that the Iterative LMMSE detection greatly reduces the system computational complexity by departing the overall processing into many low-complexity distributed calculations that can be executed in parallel. However, it is generally considered to be suboptimal and achieves relatively poor performance due to its sub-optimal detector. In this paper, we firstly present the matching conditions and area theorems for the iterative detection of the MIMO-NOMA systems. Based on the matching conditions and area theorems, the achievable rate region of the Iterative LMMSE detection is analysed. Interestingly, we prove that by properly design the Iterative LMMSE detection, it can achieve (i) the optimal capacity of symmetric MIMO-NOMA system, (ii) the optimal sum capacity of asymmetric MIMO-NOMA system, (iii) all the maximal extreme points in the capacity region of asymmetric MIMO-NOMA system, (iv) the whole capacity region of two-user and three-user asymmetric MIMO-NOMA systems, in a distributed manner for all cases. Finally, a practical Iterative LMMSE detection design is also proposed for the general asymmetric MIMO-NOMA systems.
△ Less
Submitted 28 April, 2016;
originally announced April 2016.
-
Capacity-Achieving Iterative LMMSE Detection for MIMO-NOMA Systems
Authors:
Lei Liu,
Chau Yuen,
Yong Liang Guan,
Ying Li
Abstract:
This paper considers a iterative Linear Minimum Mean Square Error (LMMSE) detection for the uplink Multiuser Multiple-Input and Multiple-Output (MU-MIMO) systems with Non-Orthogonal Multiple Access (NOMA). The iterative LMMSE detection greatly reduces the system computational complexity by departing the overall processing into many low-complexity distributed calculations. However, it is generally…
▽ More
This paper considers a iterative Linear Minimum Mean Square Error (LMMSE) detection for the uplink Multiuser Multiple-Input and Multiple-Output (MU-MIMO) systems with Non-Orthogonal Multiple Access (NOMA). The iterative LMMSE detection greatly reduces the system computational complexity by departing the overall processing into many low-complexity distributed calculations. However, it is generally considered to be sub-optimal and achieves relatively poor performance. In this paper, we firstly present the matching conditions and area theorems for the iterative detection of the MIMO-NOMA systems. Based on the proposed matching conditions and area theorems, the achievable rate region of the iterative LMMSE detection is analysed. We prove that by properly design the iterative LMMSE detection, it can achieve (i) the optimal sum capacity of MU-MIMO systems, (ii) all the maximal extreme points in the capacity region of MU-MIMO system, and (iii) the whole capacity region of two-user MIMO systems.
△ Less
Submitted 24 February, 2016;
originally announced February 2016.
-
A Low-Complexity Gaussian Message Passing Iterative Detector for Massive MU-MIMO Systems
Authors:
Lei Liu,
Chau Yuen,
Yong Liang Guan,
Ying Li,
Yu** Su
Abstract:
This paper considers a low-complexity Gaussian Message Passing Iterative Detection (GMPID) method over a pairwise graph for a massive Multiuser Multiple-Input Multiple-Output (MU-MIMO) system, in which a base station with M antennas serves K Gaussian sources simultaneously. Both K and M are large numbers and we consider the cases that K<M in this paper. The GMPID is a message passing algorithm bas…
▽ More
This paper considers a low-complexity Gaussian Message Passing Iterative Detection (GMPID) method over a pairwise graph for a massive Multiuser Multiple-Input Multiple-Output (MU-MIMO) system, in which a base station with M antennas serves K Gaussian sources simultaneously. Both K and M are large numbers and we consider the cases that K<M in this paper. The GMPID is a message passing algorithm based on a fully connected loopy graph, which is well known that it is not convergent in some cases. In this paper, we first analyse the convergence of GMPID. Two sufficient conditions that the GMPID converges to the Minimum Mean Square Error (MMSE) detection are proposed. However, the GMPID may still not converge when $K/M>(\sqrt{2}-1)^2$. Therefore, a new convergent GMPID with equally low complexity called SA-GMPID is proposed, which converges to the MMSE detection for any K< M with a faster convergence speed. Finally, numerical results are provided to verify the validity and accuracy of the proposed theoretical results.
△ Less
Submitted 25 October, 2015;
originally announced October 2015.
-
Strongly interacting Bose-Fermi mixtures in one dimension
Authors:
Hai** Hu,
Liming Guan,
Shu Chen
Abstract:
We study one-dimensional strongly interacting Bose-Fermi mixtures by both the exact Bethe-ansatz method and variational perturbation theory within the degenerate ground state subspace of the system in the infinitely repulsive limit. Based on the exact solution of the one-dimensional Bose-Fermi gas with equal boson-boson and boson-fermion interaction strengths, we demonstrate that the ground state…
▽ More
We study one-dimensional strongly interacting Bose-Fermi mixtures by both the exact Bethe-ansatz method and variational perturbation theory within the degenerate ground state subspace of the system in the infinitely repulsive limit. Based on the exact solution of the one-dimensional Bose-Fermi gas with equal boson-boson and boson-fermion interaction strengths, we demonstrate that the ground state energy is degenerate for different Bose-Fermi configurations and the degeneracy is lifted when the interaction deviates the infinitely interacting limit. We then show that the ground properties in the strongly interacting regime can be well characterized by using the variational perturbation method within the degenerate ground state subspace, which can be applied to deal with more general cases with anisotropic interactions and in external traps. Our results indicate that the total ground-state density profile in the strongly repulsive regime behaves like the polarized noninteracting fermions, whereas the density distributions of bosons and fermions display different properties for different Bose-Fermi configurations and are sensitive to the anisotropy of interactions.
△ Less
Submitted 5 February, 2016; v1 submitted 12 October, 2015;
originally announced October 2015.
-
Hybrid RF and Digital Beamformer for Cellular Networks: Algorithms, Microwave Architectures and Measurements
Authors:
Vijay Venkateswaran,
Florian Pivit,
Lei Guan
Abstract:
Modern wireless communication networks, particularly cellular networks utilize multiple antennas to improve the capacity and signal coverage. In these systems, typically an active transceiver is connected to each antenna. However, this one-to-one map** between transceivers and antennas will dramatically increase the cost and complexity of a large phased antenna array system.
In this paper, fir…
▽ More
Modern wireless communication networks, particularly cellular networks utilize multiple antennas to improve the capacity and signal coverage. In these systems, typically an active transceiver is connected to each antenna. However, this one-to-one map** between transceivers and antennas will dramatically increase the cost and complexity of a large phased antenna array system.
In this paper, firstly we propose a \emph{partially adaptive} beamformer architecture where a reduced number of transceivers with a digital beamformer (DBF) is connected to an increased number of antennas through an RF beamforming network (RFBN). Then, based on the proposed architecture, we present a methodology to derive the minimum number of transceivers that are required for marco-cell and small-cell base stations, respectively. Subsequently, in order to achieve optimal beampatterns with given cellular standard requirements and RF operational constraints, we propose efficient algorithms to jointly design DBF and RFBN. Starting from the proposed algorithms, we specify generic microwave RFBNs for optimal marco-cell and small-cell networks. In order to verify the proposed approaches, we compare the performance of RFBN using simulations and anechoic chamber measurements. Experimental measurement results confirm the robustness and performance of the proposed hybrid DBF-RFBN concept eventually ensuring that theoretical multi-antenna capacity and coverage are achieved at a little incremental cost.
△ Less
Submitted 9 October, 2015;
originally announced October 2015.
-
Discrete Fresnel Transform and Its Circular Convolution
Authors:
Xing Ouyang,
Cleitus Antony,
Fatima Gunning,
Hongyu Zhang,
Yong Liang Guan
Abstract:
Discrete trigonometric transformations, such as the discrete Fourier and cosine/sine transforms, are important in a variety of applications due to their useful properties. For example, one well-known property is the convolution theorem for Fourier transform. In this letter, we derive a discrete Fresnel transform (DFnT) from the infinitely periodic optical gratings, as a linear trigonometric transf…
▽ More
Discrete trigonometric transformations, such as the discrete Fourier and cosine/sine transforms, are important in a variety of applications due to their useful properties. For example, one well-known property is the convolution theorem for Fourier transform. In this letter, we derive a discrete Fresnel transform (DFnT) from the infinitely periodic optical gratings, as a linear trigonometric transform. Compared to the previous formulations of DFnT, the DFnT in this letter has no degeneracy, which hinders its mathematic applications, due to destructive interferences. The circular convolution property of the DFnT is studied for the first time. It is proved that the DFnT of a circular convolution of two sequences equals either one circularly convolving with the DFnT of the other. As circular convolution is a fundamental process in discrete systems, the DFnT not only gives the coefficients of the Talbot image, but can also be useful for optical and digital signal processing and numerical evaluation of the Fresnel transform.
△ Less
Submitted 2 October, 2015;
originally announced October 2015.
-
Weighted badly approximable vectors and games
Authors:
Lifan Guan,
Jun Yu
Abstract:
We prove that the set of (r_1,r_2,..,r_{d})-badly approximable vectors is a winning set if r_1=r_2=...=r_{d-1}\geq r_{d}.
We prove that the set of (r_1,r_2,..,r_{d})-badly approximable vectors is a winning set if r_1=r_2=...=r_{d-1}\geq r_{d}.
△ Less
Submitted 11 January, 2017; v1 submitted 27 September, 2015;
originally announced September 2015.
-
Characterization of a Serializer ASIC chip for the upgrade of the ATLAS muon detector
Authors:
**hong Wang,
Liang Guan,
Ziru Sang,
J. W. Chapman,
Tiesheng Dai,
Bing Zhou,
Junjie Zhu
Abstract:
We report on the design of a serializer ASIC to be used in the ATLAS forward muon detector for trigger data transmission. We discuss the performance of a prototype chip covering power dissipation, latency and stable operating line rate. Tests show that the serializer is capable of running at least at 5.76 Gbps with a bit error ratio below 1x10^{-15}, and a power consumption of 200 mW running at 4.…
▽ More
We report on the design of a serializer ASIC to be used in the ATLAS forward muon detector for trigger data transmission. We discuss the performance of a prototype chip covering power dissipation, latency and stable operating line rate. Tests show that the serializer is capable of running at least at 5.76 Gbps with a bit error ratio below 1x10^{-15}, and a power consumption of 200 mW running at 4.8 Gbps. The latency between the start of loading 30 bits into the serializer to the transmission of the first bit from the serializer is measured to be about 6 ns.
△ Less
Submitted 20 September, 2015;
originally announced September 2015.
-
Reliable Broadcast to A User Group with Limited Source Transmissions
Authors:
Xiaoli Xu,
Meenakshi Sundaram Gandhi Praveen Kumar,
Yong Liang Guan
Abstract:
In order to reduce the number of retransmissions and save power for the source node, we propose a two-phase coded scheme to achieve reliable broadcast from the source to a group of users with minimal source transmissions. In the first phase, the information packets are encoded with batched sparse (BATS) code, which are then broadcasted by the source node until the file can be cooperatively decoded…
▽ More
In order to reduce the number of retransmissions and save power for the source node, we propose a two-phase coded scheme to achieve reliable broadcast from the source to a group of users with minimal source transmissions. In the first phase, the information packets are encoded with batched sparse (BATS) code, which are then broadcasted by the source node until the file can be cooperatively decoded by the user group. In the second phase, each user broadcasts the re-encoded packets to its peers based on their respective received packets from the first phase, so that the file can be decoded by each individual user. The performance of the proposed scheme is analyzed and the rank distribution at the moment of decoding is derived, which is used as input for designing the optimal BATS code. Simulation results show that the proposed scheme can reduce the total number of retransmissions compared with the traditional single-phase broadcast with optimal erasure codes. Furthermore, since a large number of transmissions are shifted from the source node to the users, power consumptions at the source node is significantly reduced.
△ Less
Submitted 25 June, 2015;
originally announced June 2015.
-
Two-Phase Cooperative Broadcasting Based on Batched Network Code
Authors:
Xiaoli Xu,
Praveen Kumar M. Gandhi,
Yong Liang Guan,
Peter Han Joo Chong
Abstract:
In this paper, we consider the wireless broadcasting scenario with a source node sending some common information to a group of closely located users, where each link is subject to certain packet erasures. To ensure reliable information reception by all users, the conventional approach generally requires repeated transmission by the source until all the users are able to decode the information, whi…
▽ More
In this paper, we consider the wireless broadcasting scenario with a source node sending some common information to a group of closely located users, where each link is subject to certain packet erasures. To ensure reliable information reception by all users, the conventional approach generally requires repeated transmission by the source until all the users are able to decode the information, which is inefficient in many practical scenarios. In this paper, by exploiting the close proximity among the users, we propose a novel two-phase wireless broadcasting protocol with user cooperations based on an efficient batched network code, known as batched sparse (BATS) code. In the first phase, the information packets are encoded into batches with BATS encoder and sequentially broadcasted by the source node until certain terminating criterion is met. In the second phase, the users cooperate with each other by exchanging the network-coded information via peer-to-peer (P2P) communications based on their respective received packets. A fully distributed and light-weight scheduling algorithm is proposed to improve the efficiency of the P2P communication in the second phase. The performance of the proposed two-phase protocol is analyzed and the channel rank distribution at the instance of decoding is derived, based on which the optimal BATS code is designed. Simulation results demonstrate that the proposed protocol significantly outperforms the existing schemes. Lastly, the performance of the proposed scheme is further verified via testbed experiments.
△ Less
Submitted 17 April, 2015;
originally announced April 2015.
-
Multi-Antenna Wireless Energy Transfer for Backscatter Communication Systems
Authors:
Gang Yang,
Chin Keong Ho,
Yong Liang Guan
Abstract:
We study RF-enabled wireless energy transfer (WET) via energy beamforming, from a multi-antenna energy transmitter (ET) to multiple energy receivers (ERs) in a backscatter communication system, such as RFID, where each ER (or RFID tag) reflects back a portion of the incident signal to the ET (or RFID reader). For such a system, the acquisition of the forward-channel (i.e., ET-to-ER) state informat…
▽ More
We study RF-enabled wireless energy transfer (WET) via energy beamforming, from a multi-antenna energy transmitter (ET) to multiple energy receivers (ERs) in a backscatter communication system, such as RFID, where each ER (or RFID tag) reflects back a portion of the incident signal to the ET (or RFID reader). For such a system, the acquisition of the forward-channel (i.e., ET-to-ER) state information (F-CSI) at the ET is challenging, since the ERs are typically too energy-and-hardware-constrained to estimate or feed back the F-CSI. The ET leverages its observed backscatter signals to estimate the backscatter-channel (i.e., ET-to-ER-to-ET) state information (BS-CSI) directly. We first analyze the harvested energy obtained by using the estimated BS-CSI. Furthermore, we optimize the channel-training energy and the energy allocation weights for different energy beams, for weighted-sum-energy (WSE) maximization and proportional-fair-energy (PFE) maximization. For WET to single ER, we obtain the optimal channel-training energy in a semi-closed form. For WET to multiple ERs, the optimal WET scheme for WSE maximization is shown to use only one energy beam. For PFE maximization, we show it is a biconvex problem, and propose a block-coordinate-descent based algorithm to find the close-to-optimal solution. Numerical results show that with the optimized solutions, the harvested energy suffers slight reduction of less than 10%, compared to that obtained by using the perfect F-CSI. Hence, energy beamforming by using the estimated BS-CSI is promising, as the complexity and energy requirement is shifted from the ERs to the ET.
△ Less
Submitted 16 March, 2015;
originally announced March 2015.
-
Strongly Interacting Quantum Gases in One-Dimensional Traps
Authors:
Li Yang,
Liming Guan,
Han Pu
Abstract:
Under the second-order degenerate perturbation theory, we show that the physics of $N$ particles with arbitrary spin confined in a one dimensional trap in the strongly interacting regime can be described by super-exchange interaction. An effective spin-chain Hamiltonian (non-translational-invariant Sutherland model) can be constructed from this procedure. For spin-1/2 particles, this model reduces…
▽ More
Under the second-order degenerate perturbation theory, we show that the physics of $N$ particles with arbitrary spin confined in a one dimensional trap in the strongly interacting regime can be described by super-exchange interaction. An effective spin-chain Hamiltonian (non-translational-invariant Sutherland model) can be constructed from this procedure. For spin-1/2 particles, this model reduces to the non-translational-invariant Heisenberg model, where a transition between Heisenberg anti-ferromagnetic (AFM) and ferromagnetic (FM) states is expected to occur when the interaction strength is tuned from the strongly repulsive to the strongly attractive limit. We show that the FM and the AFM states can be distinguished in two different methods: the first is based on their distinct response to a spin-dependent magnetic gradient, and the second is based on their distinct momentum distribution. We confirm the validity of the spin-chain model by comparison with results obtained from several unbiased techniques
△ Less
Submitted 29 April, 2015; v1 submitted 5 February, 2015;
originally announced February 2015.
-
Bounded orbits of diagonalizable flows on $\rm{SL}_3(\mathbb{R})/\rm{SL}_3(\mathbb{Z})$
Authors:
**peng An,
Lifan Guan,
Dmitry Kleinbock
Abstract:
We prove that for any countably many one-parameter diagonalizable subgroups $F_n$ of $\rm{SL}_3(\mathbb{R})$, the set of $Λ\in\rm{SL}_3(\mathbb{R})/\rm{SL}_3(\mathbb{Z})$ such that all the orbits $F_nΛ$ are bounded has full Hausdorff dimension.
We prove that for any countably many one-parameter diagonalizable subgroups $F_n$ of $\rm{SL}_3(\mathbb{R})$, the set of $Λ\in\rm{SL}_3(\mathbb{R})/\rm{SL}_3(\mathbb{Z})$ such that all the orbits $F_nΛ$ are bounded has full Hausdorff dimension.
△ Less
Submitted 31 January, 2015; v1 submitted 22 January, 2015;
originally announced January 2015.
-
Sequence Design for Cognitive CDMA Communications under Arbitrary Spectrum Hole Constraint
Authors:
Su Hu,
Zilong Liu,
Yong Liang Guan,
Wenhui Xiong,
Guoan Bi,
Shaoqian Li
Abstract:
To support interference-free quasi-synchronous code-division multiple-access (QS-CDMA) communication with low spectral density profile in a cognitive radio (CR) network, it is desirable to design a set of CDMA spreading sequences with zero-correlation zone (ZCZ) property. However, traditional ZCZ sequences (which assume the availability of the entire spectral band) cannot be used because their ort…
▽ More
To support interference-free quasi-synchronous code-division multiple-access (QS-CDMA) communication with low spectral density profile in a cognitive radio (CR) network, it is desirable to design a set of CDMA spreading sequences with zero-correlation zone (ZCZ) property. However, traditional ZCZ sequences (which assume the availability of the entire spectral band) cannot be used because their orthogonality will be destroyed by the spectrum hole constraint in a CR channel. To date, analytical construction of ZCZ CR sequences remains open. Taking advantage of the Kronecker sequence property, a novel family of sequences (called "quasi-ZCZ" CR sequences) which displays zero cross-correlation and near-zero auto-correlation zone property under arbitrary spectrum hole constraint is presented in this paper. Furthermore, a novel algorithm is proposed to jointly optimize the peak-to-average power ratio (PAPR) and the periodic auto-correlations of the proposed quasi-ZCZ CR sequences. Simulations show that they give rise to single-user bit-error-rate performance in CR-CDMA systems which outperform traditional non-contiguous multicarrier CDMA and transform domain communication systems; they also lead to CR-CDMA systems which are more resilient than non-contiguous OFDM systems to spectrum sensing mismatch, due to the wideband spreading.
△ Less
Submitted 4 October, 2014;
originally announced October 2014.
-
How did the Suicide Act and Speak Differently Online? Behavioral and Linguistic Features of China's Suicide Microblog Users
Authors:
Li Guan,
Bibo Hao,
Tingshao Zhu
Abstract:
Background: Suicide issue is of great concern in China. Social media provides an active approach to understanding suicide individuals in terms of their behavior and language use. Aims: This study investigates how suicide Microblog users in China act and speak differently on social media from others. Methods: Hypothesis testing in behavioral and linguistic features was performed between a target gr…
▽ More
Background: Suicide issue is of great concern in China. Social media provides an active approach to understanding suicide individuals in terms of their behavior and language use. Aims: This study investigates how suicide Microblog users in China act and speak differently on social media from others. Methods: Hypothesis testing in behavioral and linguistic features was performed between a target group of 33 Chinese Microblog users who have committed suicide and a control group of 30 active users without suicidal ideation. Results: Suicide group significantly outnumbered control group in the extent of openly published posts and self-reference, and the intensity of using 7 word categories: negative words/social process words/cognitive process words/emotion process words/negative emotion words/exclusive words/physiological process words. Limitations: Information collection and confirmation of suicide users remain difficult. Conclusions: It is revealed that suicide people vary from others in certain behavioral and linguistic features in social media. This study fills the niche of suicide studies by noting specified indicators of suicide ideation for Chinese individuals online, providing insights of constructing an online alarm system for early detection and intervention of suicidal individuals.
△ Less
Submitted 2 July, 2014;
originally announced July 2014.
-
Balancing Weighted Substreams in MIMO Interference Channels
Authors:
Cenk M. Yetis,
Yong Zeng,
Kushal Anand,
Yong Liang Guan,
Erry Gunawan
Abstract:
Substreams refer to the streams of each user in a system. Substream weighting, where the weights determine the prioritization order, can be important in multiple-input multiple-output interference channels. In this letter, a distributed algorithm is proposed for the problem of power minimization subject to weighted SINR constraint. The algorithm is based on two basic features, the well known distr…
▽ More
Substreams refer to the streams of each user in a system. Substream weighting, where the weights determine the prioritization order, can be important in multiple-input multiple-output interference channels. In this letter, a distributed algorithm is proposed for the problem of power minimization subject to weighted SINR constraint. The algorithm is based on two basic features, the well known distributed power control algorithm by Yates in 1995 and a simple linear search to find feasible SINR targets. The power control law used in the proposed algorithm is proven to linearly converge to a unique fixed-point.
△ Less
Submitted 29 June, 2014;
originally announced June 2014.
-
Quasi-periodic solutions of the Heisenberg hierarchy
Authors:
Xianguo Geng,
Zhu Li,
Liang Guan
Abstract:
The Heisenberg hierarchy and its Hamiltonian structure are derived respectively by virtue of the zero curvature equation and the trace identity. With the help of the Lax matrix we introduce an algebraic curve $\mathcal{K}_{n}$ of arithmetic genus $n$, from which we define meromorphic function $φ$ and straighten out all of the flows associated with the Heisenberg hierarchy under the Abel-Jacobi coo…
▽ More
The Heisenberg hierarchy and its Hamiltonian structure are derived respectively by virtue of the zero curvature equation and the trace identity. With the help of the Lax matrix we introduce an algebraic curve $\mathcal{K}_{n}$ of arithmetic genus $n$, from which we define meromorphic function $φ$ and straighten out all of the flows associated with the Heisenberg hierarchy under the Abel-Jacobi coordinates. Finally, we achieve the explicit theta function representations of solutions for the whole Heisenberg hierarchy as a result of the asymptotic properties of $φ$.
△ Less
Submitted 4 May, 2014;
originally announced May 2014.
-
Throughput Optimization for Massive MIMO Systems Powered by Wireless Energy Transfer
Authors:
Gang Yang,
Chin Keong Ho,
Rui Zhang,
Yong Liang Guan
Abstract:
This paper studies a wireless-energy-transfer (WET) enabled massive multiple-input-multiple-output (MIMO) system (MM) consisting of a hybrid data-and-energy access point (H-AP) and multiple single-antenna users. In the WET-MM system, the H-AP is equipped with a large number $M$ of antennas and functions like a conventional AP in receiving data from users, but additionally supplies wireless power t…
▽ More
This paper studies a wireless-energy-transfer (WET) enabled massive multiple-input-multiple-output (MIMO) system (MM) consisting of a hybrid data-and-energy access point (H-AP) and multiple single-antenna users. In the WET-MM system, the H-AP is equipped with a large number $M$ of antennas and functions like a conventional AP in receiving data from users, but additionally supplies wireless power to the users. We consider frame-based transmissions. Each frame is divided into three phases: the uplink channel estimation (CE) phase, the downlink WET phase, as well as the uplink wireless information transmission (WIT) phase. Firstly, users use a fraction of the previously harvested energy to send pilots, while the H-AP estimates the uplink channels and obtains the downlink channels by exploiting channel reciprocity. Next, the H-AP utilizes the channel estimates just obtained to transfer wireless energy to all users in the downlink via energy beamforming. Finally, the users use a portion of the harvested energy to send data to the H-AP simultaneously in the uplink (reserving some harvested energy for sending pilots in the next frame). To optimize the throughput and ensure rate fairness, we consider the problem of maximizing the minimum rate among all users. In the large-$M$ regime, we obtain the asymptotically optimal solutions and some interesting insights for the optimal design of WET-MM system. We define a metric, namely, the massive MIMO degree-of-rate-gain (MM-DoRG), as the asymptotic UL rate normalized by $\log(M)$. We show that the proposed WET-MM system is optimal in terms of MM-DoRG, i.e., it achieves the same MM-DoRG as the case with ideal CE.
△ Less
Submitted 1 January, 2015; v1 submitted 16 March, 2014;
originally announced March 2014.
-
Planning the Future of U.S. Particle Physics (Snowmass 2013): Chapter 8: Instrumentation Frontier
Authors:
M. Demarteau,
R. Lipton,
H. Nicholson,
I. Shipsey,
D. Akerib,
A. Albayrak-Yetkin,
J. Alexander,
J. Anderson,
M. Artuso,
D. Asner,
R. Ball,
M. Battaglia,
C. Bebek,
J. Beene,
Y. Benhammou,
E. Bentefour,
M. Bergevin,
A. Bernstein,
B. Bilki,
E. Blucher,
G. Bolla,
D. Bortoletto,
N. Bowden,
G. Brooijmans,
K. Byrum
, et al. (189 additional authors not shown)
Abstract:
These reports present the results of the 2013 Community Summer Study of the APS Division of Particles and Fields ("Snowmass 2013") on the future program of particle physics in the U.S. Chapter 8, on the Instrumentation Frontier, discusses the instrumentation needs of future experiments in the Energy, Intensity, and Cosmic Frontiers, promising new technologies for particle physics research, and iss…
▽ More
These reports present the results of the 2013 Community Summer Study of the APS Division of Particles and Fields ("Snowmass 2013") on the future program of particle physics in the U.S. Chapter 8, on the Instrumentation Frontier, discusses the instrumentation needs of future experiments in the Energy, Intensity, and Cosmic Frontiers, promising new technologies for particle physics research, and issues of gathering resources for long-term research in this area.
△ Less
Submitted 23 January, 2014;
originally announced January 2014.