-
Multi-Agent Context Learning Strategy for Interference-Aware Beam Allocation in mmWave Vehicular Communications
Authors:
Abdulkadir Kose,
Haeyoung Lee,
Chuan Heng Foh,
Mohammad Shojafar
Abstract:
Millimeter wave (mmWave) has been recognized as one of key technologies for 5G and beyond networks due to its potential to enhance channel bandwidth and network capacity. The use of mmWave for various applications including vehicular communications has been extensively discussed. However, applying mmWave to vehicular communications faces challenges of high mobility nodes and narrow coverage along…
▽ More
Millimeter wave (mmWave) has been recognized as one of key technologies for 5G and beyond networks due to its potential to enhance channel bandwidth and network capacity. The use of mmWave for various applications including vehicular communications has been extensively discussed. However, applying mmWave to vehicular communications faces challenges of high mobility nodes and narrow coverage along the mmWave beams. Due to high mobility in dense networks, overlap** beams can cause strong interference which leads to performance degradation. As a remedy, beam switching capability in mmWave can be utilized. Then, frequent beam switching and cell change become inevitable to manage interference, which increase computational and signalling complexity. In order to deal with the complexity in interference control, we develop a new strategy called Multi-Agent Context Learning (MACOL), which utilizes Contextual Bandit to manage interference while allocating mmWave beams to serve vehicles in the network. Our approach demonstrates that by leveraging knowledge of neighbouring beam status, the machine learning agent can identify and avoid potential interfering transmissions to other ongoing transmissions. Furthermore, we show that even under heavy traffic loads, our proposed MACOL strategy is able to maintain low interference levels at around 10%.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
The Price of Distributed: Rate Loss in the CEO Problem
Authors:
Arda Atalik,
Alper Köse,
Michael Gastpar
Abstract:
In the distributed remote (CEO) source coding problem, many separate encoders observe independently noisy copies of an underlying source. The rate loss is the difference between the rate required in this distributed setting and the rate that would be required in a setting where the encoders can fully cooperate. In this sense, the rate loss characterizes the price of distributed processing. We surv…
▽ More
In the distributed remote (CEO) source coding problem, many separate encoders observe independently noisy copies of an underlying source. The rate loss is the difference between the rate required in this distributed setting and the rate that would be required in a setting where the encoders can fully cooperate. In this sense, the rate loss characterizes the price of distributed processing. We survey and extend the known results on the rate loss in various settings, with a particular emphasis on the case where the noise in the observations is Gaussian, but the underlying source is general.
△ Less
Submitted 3 February, 2022;
originally announced February 2022.
-
Differential Entropy of the Conditional Expectation under Additive Gaussian Noise
Authors:
Arda Atalik,
Alper Köse,
Michael Gastpar
Abstract:
The conditional mean is a fundamental and important quantity whose applications include the theories of estimation and rate-distortion. It is also notoriously difficult to work with. This paper establishes novel bounds on the differential entropy of the conditional mean in the case of finite-variance input signals and additive Gaussian noise. The main result is a new lower bound in terms of the di…
▽ More
The conditional mean is a fundamental and important quantity whose applications include the theories of estimation and rate-distortion. It is also notoriously difficult to work with. This paper establishes novel bounds on the differential entropy of the conditional mean in the case of finite-variance input signals and additive Gaussian noise. The main result is a new lower bound in terms of the differential entropies of the input signal and the noisy observation. The main results are also extended to the vector Gaussian channel and to the natural exponential family. Various other properties such as upper bounds, asymptotics, Taylor series expansion, and connection to Fisher Information are obtained. Two applications of the lower bound in the remote-source coding and CEO problem are discussed.
△ Less
Submitted 11 August, 2022; v1 submitted 8 June, 2021;
originally announced June 2021.
-
Simulated Annealing Algorithm for Graph Coloring
Authors:
Alper Kose,
Berke Aral Sonmez,
Metin Balaban
Abstract:
The goal of this Random Walks project is to code and experiment the Markov Chain Monte Carlo (MCMC) method for the problem of graph coloring. In this report, we present the plots of cost function \(\mathbf{H}\) by varying the parameters like \(\mathbf{q}\) (Number of colors that can be used in coloring) and \(\mathbf{c}\) (Average node degree). The results are obtained by using simulated annealing…
▽ More
The goal of this Random Walks project is to code and experiment the Markov Chain Monte Carlo (MCMC) method for the problem of graph coloring. In this report, we present the plots of cost function \(\mathbf{H}\) by varying the parameters like \(\mathbf{q}\) (Number of colors that can be used in coloring) and \(\mathbf{c}\) (Average node degree). The results are obtained by using simulated annealing scheme, where the temperature (inverse of \(\mathbfβ\)) parameter in the MCMC is lowered progressively.
△ Less
Submitted 3 December, 2017;
originally announced December 2017.
-
Study of the Sparse Superposition Codes and the Generalized Approximate Message Passing Decoder for the Communication over Binary Symmetric and Z Channels
Authors:
Alper Kose,
Berke Aral Sonmez
Abstract:
In this project, the behavior of Generalized Approximate Message-Passing Decoder for BSC and Z Channel is studied using i.i.d matrices for constructing the codewords. The performance of GAMP in AWGN Channel is already evaluated in the previous scientific work of Jean Barbier, therefore, this project mainly focuses on the performance of GAMP decoder for BSC and Z Channel. We evaluate the performanc…
▽ More
In this project, the behavior of Generalized Approximate Message-Passing Decoder for BSC and Z Channel is studied using i.i.d matrices for constructing the codewords. The performance of GAMP in AWGN Channel is already evaluated in the previous scientific work of Jean Barbier, therefore, this project mainly focuses on the performance of GAMP decoder for BSC and Z Channel. We evaluate the performance of the GAMP decoder for sparse superposition codes at various settings and compare the performance of decoder for different channels and parameters.
△ Less
Submitted 3 December, 2017;
originally announced December 2017.
-
Nearly Optimal Scheduling of Wireless Ad Hoc Networks in Polynomial Time
Authors:
Alper Kose,
Noyan Evirgen,
Hakan Gokcesu,
Kaan Gokcesu,
Muriel Medard
Abstract:
In this paper, we address the scheduling problem in wireless ad hoc networks by exploiting the computational advantage that comes when such scheduling problems can be represented by claw-free conflict graphs where we consider a wireless broadcast medium. It is possible to formulate a scheduling problem of network coded flows as finding maximum weighted independent set (MWIS) in the conflict graph…
▽ More
In this paper, we address the scheduling problem in wireless ad hoc networks by exploiting the computational advantage that comes when such scheduling problems can be represented by claw-free conflict graphs where we consider a wireless broadcast medium. It is possible to formulate a scheduling problem of network coded flows as finding maximum weighted independent set (MWIS) in the conflict graph of the network. Finding MWIS of a general graph is NP-hard leading to an NP-hard complexity of scheduling. In a claw-free conflict graph, MWIS can be found in polynomial time leading to a throughput-optimal scheduling. We show that the conflict graph of certain wireless ad hoc networks are claw-free. In order to obtain claw-free conflict graphs in general networks, we suggest introducing additional conflicts (edges) while kee** the decrease in MWIS size minimal. To this end, we introduce an iterative optimization problem to decide where to introduce edges and investigate its efficient implementation. Besides, we exemplify some physical modifications to manipulate the conflict graph of a network and also propose a mixed scheduling strategy for specific networks. We conclude that claw breaking method by adding extra edges can perform nearly optimal under the necessary assumptions.
△ Less
Submitted 2 December, 2017;
originally announced December 2017.
-
An Asymptotically Optimal Algorithm for Communicating Multiplayer Multi-Armed Bandit Problems
Authors:
Noyan Evirgen,
Alper Kose,
Hakan Gokcesu
Abstract:
We consider a decentralized stochastic multi-armed bandit problem with multiple players. Each player aims to maximize his/her own reward by pulling an arm. The arms give rewards based on i.i.d. stochastic Bernoulli distributions. Players are not aware about the probability distributions of the arms. At the end of each turn, the players inform their neighbors about the arm he/she pulled and the rew…
▽ More
We consider a decentralized stochastic multi-armed bandit problem with multiple players. Each player aims to maximize his/her own reward by pulling an arm. The arms give rewards based on i.i.d. stochastic Bernoulli distributions. Players are not aware about the probability distributions of the arms. At the end of each turn, the players inform their neighbors about the arm he/she pulled and the reward he/she got. Neighbors of players are determined according to an Erd{ő}s-R{é}nyi graph with connectivity $α$. This graph is reproduced in the beginning of every turn with the same connectivity. When more than one player choose the same arm in a turn, we assume that only one of the players who is randomly chosen gets the reward where the others get nothing. We first start by assuming players are not aware of the collision model and offer an asymptotically optimal algorithm for $α= 1$ case. Then, we extend our prior work and offer an asymptotically optimal algorithm for any connectivity but zero, assuming players aware of the collision model. We also study the effect of $α$, the degree of communication between players, empirically on the cumulative regret by comparing them with traditional multi-armed bandit algorithms.
△ Less
Submitted 2 December, 2017;
originally announced December 2017.
-
Meeting of Mobile Nodes Based on RSS Measurements in Wireless Ad Hoc Networks
Authors:
Noyan Evirgen,
Alper Kose
Abstract:
In this work, we address a completely novel case which is the meeting problem of mobile nodes (players) in a wireless ad hoc network. We assume that the only information players have is the received signal strength (RSS) measurements of other players and there is no centralized communication. Each node has a different frequency band and they try to meet with each other in a decentralized manner. W…
▽ More
In this work, we address a completely novel case which is the meeting problem of mobile nodes (players) in a wireless ad hoc network. We assume that the only information players have is the received signal strength (RSS) measurements of other players and there is no centralized communication. Each node has a different frequency band and they try to meet with each other in a decentralized manner. We consider the case where players are allowed to move in four orthogonal directions in a grid. Then, we use multi-armed bandit approach to give rewards in the end of every move that players do using RSS measurements. Taking into account that we have an adversarial setting, we propose different algorithms to solve the meeting problem. We start with considering two players and then extend the work to multiplayer by considering multiplayer problem as multiple two player problems. Throughout the paper, we construct mathematical bounds on meeting times and related concepts and evaluate the simulation results in the end.
△ Less
Submitted 29 November, 2017;
originally announced November 2017.
-
Performance Comparison of Algorithms for Movie Rating Estimation
Authors:
Alper Kose,
Can Kanbak,
Noyan Evirgen
Abstract:
In this paper, our goal is to compare performances of three different algorithms to predict the ratings that will be given to movies by potential users where we are given a user-movie rating matrix based on the past observations. To this end, we evaluate User-Based Collaborative Filtering, Iterative Matrix Factorization and Yehuda Koren's Integrated model using neighborhood and factorization where…
▽ More
In this paper, our goal is to compare performances of three different algorithms to predict the ratings that will be given to movies by potential users where we are given a user-movie rating matrix based on the past observations. To this end, we evaluate User-Based Collaborative Filtering, Iterative Matrix Factorization and Yehuda Koren's Integrated model using neighborhood and factorization where we use root mean square error (RMSE) as the performance evaluation metric. In short, we do not observe significant differences between performances, especially when the complexity increase is considered. We can conclude that Iterative Matrix Factorization performs fairly well despite its simplicity.
△ Less
Submitted 5 November, 2017;
originally announced November 2017.
-
The Effect of Communication on Noncooperative Multiplayer Multi-Armed Bandit Problems
Authors:
Noyan Evirgen,
Alper Kose
Abstract:
We consider decentralized stochastic multi-armed bandit problem with multiple players in the case of different communication probabilities between players. Each player makes a decision of pulling an arm without cooperation while aiming to maximize his or her reward but informs his or her neighbors in the end of every turn about the arm he or she pulled and the reward he or she got. Neighbors of pl…
▽ More
We consider decentralized stochastic multi-armed bandit problem with multiple players in the case of different communication probabilities between players. Each player makes a decision of pulling an arm without cooperation while aiming to maximize his or her reward but informs his or her neighbors in the end of every turn about the arm he or she pulled and the reward he or she got. Neighbors of players are determined according to an Erdos-Renyi graph with which is reproduced in the beginning of every turn. We consider i.i.d. rewards generated by a Bernoulli distribution and assume that players are unaware about the arms' probability distributions and their mean values. In case of a collision, we assume that only one of the players who is randomly chosen gets the reward where the others get zero reward. We study the effects of connectivity, the degree of communication between players, on the cumulative regret using well-known algorithms UCB1, epsilon-Greedy and Thompson Sampling.
△ Less
Submitted 5 November, 2017;
originally announced November 2017.
-
Scheduling Wireless Ad Hoc Networks in Polynomial Time Using Claw-free Conflict Graphs
Authors:
Alper Kose,
Muriel Medard
Abstract:
In this paper, we address the scheduling problem in wireless ad hoc networks by exploiting the computational advantage that comes when such scheduling problems can be represented by claw-free conflict graphs. It is possible to formulate a scheduling problem of network coded flows as finding maximum weighted independent set (MWIS) in the conflict graph of the network. We consider activation of hype…
▽ More
In this paper, we address the scheduling problem in wireless ad hoc networks by exploiting the computational advantage that comes when such scheduling problems can be represented by claw-free conflict graphs. It is possible to formulate a scheduling problem of network coded flows as finding maximum weighted independent set (MWIS) in the conflict graph of the network. We consider activation of hyperedges in a hypergraph to model a wireless broadcast medium. We show that the conflict graph of certain wireless ad hoc networks are claw-free. It is known that finding MWIS of a general graph is NP-hard, but in a claw-free conflict graph, it is possible to apply Minty's or Faenza et al.'s algorithms in polynomial time. We discuss our approach on some sample networks.
△ Less
Submitted 5 November, 2017;
originally announced November 2017.