-
Joint Rate Allocation and Power Control for RSMA-Based Communication and Radar Coexistence Systems
Authors:
Trung Thanh Nguyen,
Nguyen Cong Luong,
Shaohan Feng,
Tien Hoa Nguyen,
Khaled Elbassioni,
Dusit Niyato,
Dong In Kim
Abstract:
We consider a rate-splitting multiple access (RSMA)-based communication and radar coexistence (CRC) system. The proposed system allows an RSMA-based communication system to share spectrum with multiple radars. Furthermore, RSMA enables flexible and powerful interference management by splitting messages into common parts and private parts to partially decode interference and partially treat interfe…
▽ More
We consider a rate-splitting multiple access (RSMA)-based communication and radar coexistence (CRC) system. The proposed system allows an RSMA-based communication system to share spectrum with multiple radars. Furthermore, RSMA enables flexible and powerful interference management by splitting messages into common parts and private parts to partially decode interference and partially treat interference as noise. The RSMA-based CRC system thus significantly improves spectral efficiency, energy efficiency and quality of service (QoS) of communication users (CUs). However, the RSMA-based CRC system raises new challenges. Due to the spectrum sharing, the communication network and the radars cause interference to each other, which reduces the signal-to-interference-plus-noise ratio (SINR) of the radars as well as the data rate of the CUs in the communication network. Therefore, a major problem is to maximize the sum rate of the CUs while guaranteeing their QoS requirements of data transmissions and the SINR requirements of multiple radars. To achieve these objectives, we formulate a problem that optimizes i) the common rate allocation to the CUs, transmit power of common messages and transmit power of private messages of the CUs, and ii) transmit power of the radars. The problem is non-convex with multiple decision parameters, which is challenging to be solved. We propose two algorithms. The first sequential quadratic programming (SQP) can quickly return a local optimal solution, and has been known to be the state-of-the-art in nonlinear programming methods. The second is an additive approximation scheme (AAS) which solves the problem globally in a reasonable amount of time, based on the technique of applying exhaustive enumeration to a modified instance. The simulation results show the improvement of the AAS compared with the SQP in terms of sum rate.
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
Deep Generative Model and Its Applications in Efficient Wireless Network Management: A Tutorial and Case Study
Authors:
Yinqiu Liu,
Hongyang Du,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Dong In Kim,
Abbas Jamalipour
Abstract:
With the phenomenal success of diffusion models and ChatGPT, deep generation models (DGMs) have been experiencing explosive growth from 2022. Not limited to content generation, DGMs are also widely adopted in Internet of Things, Metaverse, and digital twin, due to their outstanding ability to represent complex patterns and generate plausible samples. In this article, we explore the applications of…
▽ More
With the phenomenal success of diffusion models and ChatGPT, deep generation models (DGMs) have been experiencing explosive growth from 2022. Not limited to content generation, DGMs are also widely adopted in Internet of Things, Metaverse, and digital twin, due to their outstanding ability to represent complex patterns and generate plausible samples. In this article, we explore the applications of DGMs in a crucial task, i.e., improving the efficiency of wireless network management. Specifically, we firstly overview the generative AI, as well as three representative DGMs. Then, a DGM-empowered framework for wireless network management is proposed, in which we elaborate the issues of the conventional network management approaches, why DGMs can address them efficiently, and the step-by-step workflow for applying DGMs in managing wireless networks. Moreover, we conduct a case study on network economics, using the state-of-the-art DGM model, i.e., diffusion model, to generate effective contracts for incentivizing the mobile AI-Generated Content (AIGC) services. Last but not least, we discuss important open directions for the further research.
△ Less
Submitted 29 March, 2023;
originally announced March 2023.
-
Unleashing the Power of Edge-Cloud Generative AI in Mobile Networks: A Survey of AIGC Services
Authors:
Minrui Xu,
Hongyang Du,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Shiwen Mao,
Zhu Han,
Abbas Jamalipour,
Dong In Kim,
Xuemin Shen,
Victor C. M. Leung,
H. Vincent Poor
Abstract:
Artificial Intelligence-Generated Content (AIGC) is an automated method for generating, manipulating, and modifying valuable and diverse data using AI algorithms creatively. This survey paper focuses on the deployment of AIGC applications, e.g., ChatGPT and Dall-E, at mobile edge networks, namely mobile AIGC networks, that provide personalized and customized AIGC services in real time while mainta…
▽ More
Artificial Intelligence-Generated Content (AIGC) is an automated method for generating, manipulating, and modifying valuable and diverse data using AI algorithms creatively. This survey paper focuses on the deployment of AIGC applications, e.g., ChatGPT and Dall-E, at mobile edge networks, namely mobile AIGC networks, that provide personalized and customized AIGC services in real time while maintaining user privacy. We begin by introducing the background and fundamentals of generative models and the lifecycle of AIGC services at mobile AIGC networks, which includes data collection, training, finetuning, inference, and product management. We then discuss the collaborative cloud-edge-mobile infrastructure and technologies required to support AIGC services and enable users to access AIGC at mobile edge networks. Furthermore, we explore AIGCdriven creative applications and use cases for mobile AIGC networks. Additionally, we discuss the implementation, security, and privacy challenges of deploying mobile AIGC networks. Finally, we highlight some future research directions and open issues for the full realization of mobile AIGC networks.
△ Less
Submitted 31 October, 2023; v1 submitted 28 March, 2023;
originally announced March 2023.
-
Under-Identification of Structural Models Based on Timing and Information Set Assumptions
Authors:
Daniel Ackerberg,
Garth Frazer,
Kyoo il Kim,
Yao Luo,
Yingjun Su
Abstract:
We revisit identification based on timing and information set assumptions in structural models, which have been used in the context of production functions, demand equations, and hedonic pricing models (e.g. Olley and Pakes (1996), Blundell and Bond (2000)). First, we demonstrate a general under-identification problem using these assumptions in a simple version of the Blundell-Bond dynamic panel m…
▽ More
We revisit identification based on timing and information set assumptions in structural models, which have been used in the context of production functions, demand equations, and hedonic pricing models (e.g. Olley and Pakes (1996), Blundell and Bond (2000)). First, we demonstrate a general under-identification problem using these assumptions in a simple version of the Blundell-Bond dynamic panel model. In particular, the basic moment conditions can yield multiple discrete solutions: one at the persistence parameter in the main equation and another at the persistence parameter governing the regressor. We then show that the problem can persist in a broader set of models but disappears in models under stronger timing assumptions. We then propose possible solutions in the simple setting by enforcing an assumed sign restriction and conclude by using lessons from our basic identification approach to propose more general practical advice for empirical researchers.
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
MAIR: Multi-view Attention Inverse Rendering with 3D Spatially-Varying Lighting Estimation
Authors:
JunYong Choi,
SeokYeong Lee,
Haesol Park,
Seung-Won Jung,
Ig-Jae Kim,
Junghyun Cho
Abstract:
We propose a scene-level inverse rendering framework that uses multi-view images to decompose the scene into geometry, a SVBRDF, and 3D spatially-varying lighting. Because multi-view images provide a variety of information about the scene, multi-view images in object-level inverse rendering have been taken for granted. However, owing to the absence of multi-view HDR synthetic dataset, scene-level…
▽ More
We propose a scene-level inverse rendering framework that uses multi-view images to decompose the scene into geometry, a SVBRDF, and 3D spatially-varying lighting. Because multi-view images provide a variety of information about the scene, multi-view images in object-level inverse rendering have been taken for granted. However, owing to the absence of multi-view HDR synthetic dataset, scene-level inverse rendering has mainly been studied using single-view image. We were able to successfully perform scene-level inverse rendering using multi-view images by expanding OpenRooms dataset and designing efficient pipelines to handle multi-view images, and splitting spatially-varying lighting. Our experiments show that the proposed method not only achieves better performance than single-view-based methods, but also achieves robust performance on unseen real-world scene. Also, our sophisticated 3D spatially-varying lighting volume allows for photorealistic object insertion in any 3D location.
△ Less
Submitted 27 March, 2023; v1 submitted 22 March, 2023;
originally announced March 2023.
-
Few-shot Neural Radiance Fields Under Unconstrained Illumination
Authors:
SeokYeong Lee,
JunYong Choi,
Seungryong Kim,
Ig-Jae Kim,
Junghyun Cho
Abstract:
In this paper, we introduce a new challenge for synthesizing novel view images in practical environments with limited input multi-view images and varying lighting conditions. Neural radiance fields (NeRF), one of the pioneering works for this task, demand an extensive set of multi-view images taken under constrained illumination, which is often unattainable in real-world settings. While some previ…
▽ More
In this paper, we introduce a new challenge for synthesizing novel view images in practical environments with limited input multi-view images and varying lighting conditions. Neural radiance fields (NeRF), one of the pioneering works for this task, demand an extensive set of multi-view images taken under constrained illumination, which is often unattainable in real-world settings. While some previous works have managed to synthesize novel views given images with different illumination, their performance still relies on a substantial number of input multi-view images. To address this problem, we suggest ExtremeNeRF, which utilizes multi-view albedo consistency, supported by geometric alignment. Specifically, we extract intrinsic image components that should be illumination-invariant across different views, enabling direct appearance comparison between the input and novel view under unconstrained illumination. We offer thorough experimental results for task evaluation, employing the newly created NeRF Extreme benchmark-the first in-the-wild benchmark for novel view synthesis under multiple viewing directions and varying illuminations.
△ Less
Submitted 18 December, 2023; v1 submitted 21 March, 2023;
originally announced March 2023.
-
Semantic-aware Occlusion Filtering Neural Radiance Fields in the Wild
Authors:
Jaewon Lee,
Injae Kim,
Hwan Heo,
Hyunwoo J. Kim
Abstract:
We present a learning framework for reconstructing neural scene representations from a small number of unconstrained tourist photos. Since each image contains transient occluders, decomposing the static and transient components is necessary to construct radiance fields with such in-the-wild photographs where existing methods require a lot of training data. We introduce SF-NeRF, aiming to disentang…
▽ More
We present a learning framework for reconstructing neural scene representations from a small number of unconstrained tourist photos. Since each image contains transient occluders, decomposing the static and transient components is necessary to construct radiance fields with such in-the-wild photographs where existing methods require a lot of training data. We introduce SF-NeRF, aiming to disentangle those two components with only a few images given, which exploits semantic information without any supervision. The proposed method contains an occlusion filtering module that predicts the transient color and its opacity for each pixel, which enables the NeRF model to solely learn the static scene representation. This filtering module learns the transient phenomena guided by pixel-wise semantic features obtained by a trainable image encoder that can be trained across multiple scenes to learn the prior of transient objects. Furthermore, we present two techniques to prevent ambiguous decomposition and noisy results of the filtering module. We demonstrate that our method outperforms state-of-the-art novel view synthesis methods on Phototourism dataset in a few-shot setting.
△ Less
Submitted 5 March, 2023;
originally announced March 2023.
-
AI-Generated Incentive Mechanism and Full-Duplex Semantic Communications for Information Sharing
Authors:
Hongyang Du,
Jiacheng Wang,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Dong In Kim
Abstract:
The next generation of Internet services, such as Metaverse, rely on mixed reality (MR) technology to provide immersive user experiences. However, the limited computation power of MR headset-mounted devices (HMDs) hinders the deployment of such services. Therefore, we propose an efficient information sharing scheme based on full-duplex device-to-device (D2D) semantic communications to address this…
▽ More
The next generation of Internet services, such as Metaverse, rely on mixed reality (MR) technology to provide immersive user experiences. However, the limited computation power of MR headset-mounted devices (HMDs) hinders the deployment of such services. Therefore, we propose an efficient information sharing scheme based on full-duplex device-to-device (D2D) semantic communications to address this issue. Our approach enables users to avoid heavy and repetitive computational tasks, such as artificial intelligence-generated content (AIGC) in the view images of all MR users. Specifically, a user can transmit the generated content and semantic information extracted from their view image to nearby users, who can then use this information to obtain the spatial matching of computation results under their view images. We analyze the performance of full-duplex D2D communications, including the achievable rate and bit error probability, by using generalized small-scale fading models. To facilitate semantic information sharing among users, we design a contract theoretic AI-generated incentive mechanism. The proposed diffusion model generates the optimal contract design, outperforming two deep reinforcement learning algorithms, i.e., proximal policy optimization and soft actor-critic algorithms. Our numerical analysis experiment proves the effectiveness of our proposed methods. The code for this paper is available at https://github.com/HongyangDu/SemSharing
△ Less
Submitted 28 June, 2023; v1 submitted 3 March, 2023;
originally announced March 2023.
-
CrossSpeech: Speaker-independent Acoustic Representation for Cross-lingual Speech Synthesis
Authors:
Ji-Hoon Kim,
Hong-Sun Yang,
Yoon-Cheol Ju,
Il-Hwan Kim,
Byeong-Yeol Kim
Abstract:
While recent text-to-speech (TTS) systems have made remarkable strides toward human-level quality, the performance of cross-lingual TTS lags behind that of intra-lingual TTS. This gap is mainly rooted from the speaker-language entanglement problem in cross-lingual TTS. In this paper, we propose CrossSpeech which improves the quality of cross-lingual speech by effectively disentangling speaker and…
▽ More
While recent text-to-speech (TTS) systems have made remarkable strides toward human-level quality, the performance of cross-lingual TTS lags behind that of intra-lingual TTS. This gap is mainly rooted from the speaker-language entanglement problem in cross-lingual TTS. In this paper, we propose CrossSpeech which improves the quality of cross-lingual speech by effectively disentangling speaker and language information in the level of acoustic feature space. Specifically, CrossSpeech decomposes the speech generation pipeline into the speaker-independent generator (SIG) and speaker-dependent generator (SDG). The SIG produces the speaker-independent acoustic representation which is not biased to specific speaker distributions. On the other hand, the SDG models speaker-dependent speech variation that characterizes speaker attributes. By handling each information separately, CrossSpeech can obtain disentangled speaker and language representations. From the experiments, we verify that CrossSpeech achieves significant improvements in cross-lingual TTS, especially in terms of speaker similarity to the target speaker.
△ Less
Submitted 12 June, 2023; v1 submitted 28 February, 2023;
originally announced February 2023.
-
Neutron Star Mergers and the Quark Matter Equation of State
Authors:
Grant J. Mathews,
Atul Kedia,
Hee Il Kim,
In-Saeng Suh
Abstract:
As neutron stars merge they can approach very high nuclear density. Here, we summarized recent results for the evolution and gravitational wave emission from binary neutron star mergers using a a variety of nuclear equations of state with and without a crossover transition to quark matter. We discuss how the late time gravitational wave emission from binary neutron star mergers may possibly reveal…
▽ More
As neutron stars merge they can approach very high nuclear density. Here, we summarized recent results for the evolution and gravitational wave emission from binary neutron star mergers using a a variety of nuclear equations of state with and without a crossover transition to quark matter. We discuss how the late time gravitational wave emission from binary neutron star mergers may possibly reveal the existence of a crossover transition to quark matter.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
Semantic Information Marketing in The Metaverse: A Learning-Based Contract Theory Framework
Authors:
Ismail Lotfi,
Dusit Niyato,
Sumei Sun,
Dong In Kim,
Xuemin Shen
Abstract:
In this paper, we address the problem of designing incentive mechanisms by a virtual service provider (VSP) to hire sensing IoT devices to sell their sensing data to help creating and rendering the digital copy of the physical world in the Metaverse. Due to the limited bandwidth, we propose to use semantic extraction algorithms to reduce the delivered data by the sensing IoT devices. Nevertheless,…
▽ More
In this paper, we address the problem of designing incentive mechanisms by a virtual service provider (VSP) to hire sensing IoT devices to sell their sensing data to help creating and rendering the digital copy of the physical world in the Metaverse. Due to the limited bandwidth, we propose to use semantic extraction algorithms to reduce the delivered data by the sensing IoT devices. Nevertheless, mechanisms to hire sensing IoT devices to share their data with the VSP and then deliver the constructed digital twin to the Metaverse users are vulnerable to adverse selection problem. The adverse selection problem, which is caused by information asymmetry between the system entities, becomes harder to solve when the private information of the different entities are multi-dimensional. We propose a novel iterative contract design and use a new variant of multi-agent reinforcement learning (MARL) to solve the modelled multi-dimensional contract problem. To demonstrate the effectiveness of our algorithm, we conduct extensive simulations and measure several key performance metrics of the contract for the Metaverse. Our results show that our designed iterative contract is able to incentivize the participants to interact truthfully, which maximizes the profit of the VSP with minimal individual rationality (IR) and incentive compatibility (IC) violation rates. Furthermore, the proposed learning-based iterative contract framework has limited access to the private information of the participants, which is to the best of our knowledge, the first of its kind in addressing the problem of adverse selection in incentive mechanisms.
△ Less
Submitted 25 February, 2023; v1 submitted 22 February, 2023;
originally announced February 2023.
-
A regularity theory for an initial value problem with a time-measurable pseudo-differential operator in a weighted $L_p$-space
Authors:
Jae-Hwan Choi,
Ildoo Kim,
** Bong Lee
Abstract:
In this study, we investigate the existence, uniqueness, and maximal regularity estimates of solutions to homogeneous initial value problems involving time-measurable pseudo-differential operators within the framework of weighted mixed norm Lebesgue spaces. The class of temporal weights in our regularity estimates contains Muckenhoupt's class, and the initial data is in weighted Besov spaces with…
▽ More
In this study, we investigate the existence, uniqueness, and maximal regularity estimates of solutions to homogeneous initial value problems involving time-measurable pseudo-differential operators within the framework of weighted mixed norm Lebesgue spaces. The class of temporal weights in our regularity estimates contains Muckenhoupt's class, and the initial data is in weighted Besov spaces with variable order.
△ Less
Submitted 4 March, 2024; v1 submitted 15 February, 2023;
originally announced February 2023.
-
Experimental demonstration of the advantage of adaptive quantum circuits
Authors:
Michael Foss-Feig,
Arkin Tikku,
Tsung-Cheng Lu,
Karl Mayer,
Mohsin Iqbal,
Thomas M. Gatterman,
Justin A. Gerber,
Kevin Gilmore,
Dan Gresh,
Aaron Hankin,
Nathan Hewitt,
Chandler V. Horst,
Mitchell Matheny,
Tanner Mengle,
Brian Neyenhuis,
Henrik Dreyer,
David Hayes,
Timothy H. Hsieh,
Isaac H. Kim
Abstract:
Adaptive quantum circuits employ unitary gates assisted by mid-circuit measurement, classical computation on the measurement outcome, and the conditional application of future unitary gates based on the result of the classical computation. In this paper, we experimentally demonstrate that even a noisy adaptive quantum circuit of constant depth can achieve a task that is impossible for any purely u…
▽ More
Adaptive quantum circuits employ unitary gates assisted by mid-circuit measurement, classical computation on the measurement outcome, and the conditional application of future unitary gates based on the result of the classical computation. In this paper, we experimentally demonstrate that even a noisy adaptive quantum circuit of constant depth can achieve a task that is impossible for any purely unitary quantum circuit of identical depth: the preparation of long-range entangled topological states with high fidelity. We prepare a particular toric code ground state with fidelity of at least $76.9\pm 1.3\%$ using a constant depth ($d=4$) adaptive circuit, and rigorously show that no unitary circuit of the same depth and connectivity could prepare this state with fidelity greater than $50\%$.
△ Less
Submitted 6 February, 2023;
originally announced February 2023.
-
Universal lower bound on topological entanglement entropy
Authors:
Isaac H. Kim,
Michael Levin,
Ting-Chun Lin,
Daniel Ranard,
Bowen Shi
Abstract:
Entanglement entropies of two-dimensional gapped ground states are expected to satisfy an area law, with a constant correction term known as the topological entanglement entropy (TEE). In many models, the TEE takes a universal value that characterizes the underlying topological phase. However, the TEE is not truly universal: it can differ even for two states related by constant-depth circuits, whi…
▽ More
Entanglement entropies of two-dimensional gapped ground states are expected to satisfy an area law, with a constant correction term known as the topological entanglement entropy (TEE). In many models, the TEE takes a universal value that characterizes the underlying topological phase. However, the TEE is not truly universal: it can differ even for two states related by constant-depth circuits, which are necessarily in the same phase. The difference between the TEE and the value predicted by the anyon theory is often called the spurious topological entanglement entropy. We show that this spurious contribution is always nonnegative, thus the value predicted by the anyon theory provides a universal lower bound. This observation also leads to a definition of TEE that is invariant under constant-depth quantum circuits.
△ Less
Submitted 31 October, 2023; v1 submitted 1 February, 2023;
originally announced February 2023.
-
Knowledge-Aware Semantic Communication System Design
Authors:
Sachin Kadam,
Dong In Kim
Abstract:
The recent emergence of 6G raises the challenge of increasing the transmission data rate even further in order to break the barrier set by the Shannon limit. Traditional communication methods fall short of the 6G goals, paving the way for Semantic Communication (SemCom) systems. These systems find applications in wide range of fields such as economics, metaverse, autonomous transportation systems,…
▽ More
The recent emergence of 6G raises the challenge of increasing the transmission data rate even further in order to break the barrier set by the Shannon limit. Traditional communication methods fall short of the 6G goals, paving the way for Semantic Communication (SemCom) systems. These systems find applications in wide range of fields such as economics, metaverse, autonomous transportation systems, healthcare, smart factories, etc. In SemCom systems, only the relevant information from the data, known as semantic data, is extracted to eliminate unwanted overheads in the raw data and then transmitted after encoding. In this paper, we first use the shared knowledge base to extract the keywords from the dataset. Then, we design an auto-encoder and auto-decoder that only transmit these keywords and, respectively, recover the data using the received keywords and the shared knowledge. We show analytically that the overall semantic distortion function has an upper bound, which is shown in the literature to converge. We numerically compute the accuracy of the reconstructed sentences at the receiver. Using simulations, we show that the proposed methods outperform a state-of-the-art method in terms of the average number of words per sentence.
△ Less
Submitted 28 January, 2023;
originally announced January 2023.
-
Qubit recycling and the path counting problem
Authors:
Zijian Song,
Isaac H. Kim
Abstract:
Recently, it was shown that the qudits used in circuits of a convolutional form (e.g., Matrix Product State sand Multi-scale Entanglement Renormalization Ansatz) can be reset unitarily \href{https://doi.org/10.1103/PhysRevA.103.042613}{[Phys. Rev. A 103, 042613 (2021)]}, even without measurement. We analyze the fidelity of this protocol for a family of quantum circuits that interpolates between su…
▽ More
Recently, it was shown that the qudits used in circuits of a convolutional form (e.g., Matrix Product State sand Multi-scale Entanglement Renormalization Ansatz) can be reset unitarily \href{https://doi.org/10.1103/PhysRevA.103.042613}{[Phys. Rev. A 103, 042613 (2021)]}, even without measurement. We analyze the fidelity of this protocol for a family of quantum circuits that interpolates between such circuits and local quantum circuits, averaged over Haar-random gates. We establish a connection between this problem and a counting of directed paths on a graph, which is determined by the shape of the quantum circuit. This connection leads to an exact expression for the fidelity of the protocol for the entire family that interpolates between convolutional circuit and random quantum circuit. For convolutional circuits of constant window size, the rate of convergence to unit fidelity is shown to be $\frac{q^2}{q^2+1}$, independent of the window size, where $q$ is the local qudit dimension. Since most applications of convolutional circuits use constant-sized windows, our result suggests that the unitary reset protocol will likely work well in such a regime. We also derive two extra results in the convolutional limit, which may be of an independent interest. First, we derive exact expressions for the correlations between reset qudits and show that it decays exponentially in the distance. Second, we derive an expression for the the fidelity in the presence of noise, expressed in terms of the quantities that define the property of the channel, such as the entanglement fidelity.
△ Less
Submitted 18 October, 2023; v1 submitted 9 January, 2023;
originally announced January 2023.
-
Knowledge-Aware Semantic Communication System Design and Data Allocation
Authors:
Sachin Kadam,
Dong In Kim
Abstract:
The recent emergence of 6G raises the challenge of increasing the transmission data rate even further in order to overcome the Shannon limit. Traditional communication methods fall short of the 6G goals, paving the way for Semantic Communication (SemCom) systems that have applications in the metaverse, healthcare, economics, etc. In SemCom systems, only the relevant keywords from the data are extr…
▽ More
The recent emergence of 6G raises the challenge of increasing the transmission data rate even further in order to overcome the Shannon limit. Traditional communication methods fall short of the 6G goals, paving the way for Semantic Communication (SemCom) systems that have applications in the metaverse, healthcare, economics, etc. In SemCom systems, only the relevant keywords from the data are extracted and used for transmission. In this paper, we design an auto-encoder and auto-decoder that only transmit these keywords and, respectively, recover the data using the received keywords and the shared knowledge. This SemCom system is used in a setup in which the receiver allocates various categories of the same dataset collected from the transmitter, which differ in size and accuracy, to a number of users. This scenario is formulated using an optimization problem called the data allocation problem (DAP). We show that it is NP-complete and propose a greedy algorithm to solve it. Using simulations, we show that the proposed methods for SemCom system design outperform state-of-the-art methods in terms of average number of words per sentence for a given accuracy, and that the proposed greedy algorithm solution of the DAP performs significantly close to the optimal solution.
△ Less
Submitted 13 November, 2023; v1 submitted 30 December, 2022;
originally announced January 2023.
-
Enabling AI-Generated Content (AIGC) Services in Wireless Edge Networks
Authors:
Hongyang Du,
Zonghang Li,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Xuemin,
Shen,
Dong In Kim
Abstract:
Artificial Intelligence-Generated Content (AIGC) refers to the use of AI to automate the information creation process while fulfilling the personalized requirements of users. However, due to the instability of AIGC models, e.g., the stochastic nature of diffusion models, the quality and accuracy of the generated content can vary significantly. In wireless edge networks, the transmission of incorre…
▽ More
Artificial Intelligence-Generated Content (AIGC) refers to the use of AI to automate the information creation process while fulfilling the personalized requirements of users. However, due to the instability of AIGC models, e.g., the stochastic nature of diffusion models, the quality and accuracy of the generated content can vary significantly. In wireless edge networks, the transmission of incorrectly generated content may unnecessarily consume network resources. Thus, a dynamic AIGC service provider (ASP) selection scheme is required to enable users to connect to the most suited ASP, improving the users' satisfaction and quality of generated content. In this article, we first review the AIGC techniques and their applications in wireless networks. We then present the AIGC-as-a-service (AaaS) concept and discuss the challenges in deploying AaaS at the edge networks. Yet, it is essential to have performance metrics to evaluate the accuracy of AIGC services. Thus, we introduce several image-based perceived quality evaluation metrics. Then, we propose a general and effective model to illustrate the relationship between computational resources and user-perceived quality evaluation metrics. To achieve efficient AaaS and maximize the quality of generated content in wireless edge networks, we propose a deep reinforcement learning-enabled algorithm for optimal ASP selection. Simulation results show that the proposed algorithm can provide a higher quality of generated content to users and achieve fewer crashed tasks by comparing with four benchmarks, i.e., overloading-avoidance, random, round-robin policies, and the upper-bound schemes.
△ Less
Submitted 9 January, 2023;
originally announced January 2023.
-
Active Learning Guided by Efficient Surrogate Learners
Authors:
Yunpyo An,
Suyeong Park,
Kwang In Kim
Abstract:
Re-training a deep learning model each time a single data point receives a new label is impractical due to the inherent complexity of the training process. Consequently, existing active learning (AL) algorithms tend to adopt a batch-based approach where, during each AL iteration, a set of data points is collectively chosen for annotation. However, this strategy frequently leads to redundant sampli…
▽ More
Re-training a deep learning model each time a single data point receives a new label is impractical due to the inherent complexity of the training process. Consequently, existing active learning (AL) algorithms tend to adopt a batch-based approach where, during each AL iteration, a set of data points is collectively chosen for annotation. However, this strategy frequently leads to redundant sampling, ultimately eroding the efficacy of the labeling procedure. In this paper, we introduce a new AL algorithm that harnesses the power of a Gaussian process surrogate in conjunction with the neural network principal learner. Our proposed model adeptly updates the surrogate learner for every new data instance, enabling it to emulate and capitalize on the continuous learning dynamics of the neural network without necessitating a complete retraining of the principal model for each individual label. Experiments on four benchmark datasets demonstrate that this approach yields significant enhancements, either rivaling or aligning with the performance of state-of-the-art techniques.
△ Less
Submitted 17 December, 2023; v1 submitted 6 January, 2023;
originally announced January 2023.
-
The sharp interface limit of an Ising game
Authors:
William M Feldman,
Inwon C Kim,
Aaron Zeff Palmer
Abstract:
The Ising model of statistical physics has served as a keystone example of phase transitions, thermodynamic limits, scaling laws, and many other phenomena and mathematical methods. We introduce and explore an Ising game, a variant of the Ising model that features competing agents influencing the behavior of the spins. With long-range interactions, we consider a mean-field limit resulting in a nonl…
▽ More
The Ising model of statistical physics has served as a keystone example of phase transitions, thermodynamic limits, scaling laws, and many other phenomena and mathematical methods. We introduce and explore an Ising game, a variant of the Ising model that features competing agents influencing the behavior of the spins. With long-range interactions, we consider a mean-field limit resulting in a nonlocal potential game at the mesoscopic scale. This game exhibits a phase transition and multiple constant Nash-equilibria in the supercritical regime.
Our analysis focuses on a sharp interface limit for which potential minimizing solutions to the Ising game concentrate on two of the constant Nash-equilibria. We show that the mesoscopic problem can be recast as a mixed local/nonlocal space-time Allen-Cahn type minimization problem. We prove, using a $Γ$-convergence argument, that the limiting interface minimizes a space-time anisotropic perimeter type energy functional. This macroscopic scale problem could also be viewed as a problem of optimal control of interface motion. Sharp interface limits of Allen-Cahn type functionals have been well studied. We build on that literature with new techniques to handle a mixture of local derivative terms and nonlocal interactions. The boundary conditions imposed by the game theoretic considerations also appear as novel terms and require special treatment.
△ Less
Submitted 19 January, 2023; v1 submitted 2 January, 2023;
originally announced January 2023.
-
A weighted $L_q(L_p)$-theory for fully degenerate second-order evolution equations with unbounded time-measurable coefficients
Authors:
Ildoo Kim
Abstract:
We study the fully degenerate second-order evolution equation $u_t=a^{ij}(t)u_{x^ix^j} +b^i(t) u_{x^i} + c(t)u+f, \quad t>0, x\in \mathbb{R}^d$ given with the zero initial data. Here $a^{ij}(t)$, $b^i(t)$, $c(t)$ are merely locally integrable functions, and $(a^{ij}(t))_{d \times d}$ is a nonnegative symmetric matrix with the smallest eigenvalue $δ(t)\geq 0$. We show that there is a positive const…
▽ More
We study the fully degenerate second-order evolution equation $u_t=a^{ij}(t)u_{x^ix^j} +b^i(t) u_{x^i} + c(t)u+f, \quad t>0, x\in \mathbb{R}^d$ given with the zero initial data. Here $a^{ij}(t)$, $b^i(t)$, $c(t)$ are merely locally integrable functions, and $(a^{ij}(t))_{d \times d}$ is a nonnegative symmetric matrix with the smallest eigenvalue $δ(t)\geq 0$. We show that there is a positive constant $N$ such that
$\int_0^{T} \left(\int_{\mathbb{R}^d} \left(|u|+|u_{xx} |\right)^{p} dx \right)^{q/p} e^{-q\int_0^t c(s)ds} w(α(t)) δ(t) dt \leq N \int_0^{T} \left(\int_{\mathbb{R}^d} \left|f\left(t,x\right)\right|^{p} dx \right)^{q/p} e^{-q\int_0^t c(s)ds} w(α(t)) (δ(t))^{1-q} dt,$ where $p,q \in (1,\infty)$, $α(t)=\int_0^t δ(s)ds$, and $w$ is a Muckenhoupt's weight.
△ Less
Submitted 1 January, 2023;
originally announced January 2023.
-
A Permutation-Free Kernel Independence Test
Authors:
Shubhanshu Shekhar,
Ilmun Kim,
Aaditya Ramdas
Abstract:
In nonparametric independence testing, we observe i.i.d.\ data $\{(X_i,Y_i)\}_{i=1}^n$, where $X \in \mathcal{X}, Y \in \mathcal{Y}$ lie in any general spaces, and we wish to test the null that $X$ is independent of $Y$. Modern test statistics such as the kernel Hilbert-Schmidt Independence Criterion (HSIC) and Distance Covariance (dCov) have intractable null distributions due to the degeneracy of…
▽ More
In nonparametric independence testing, we observe i.i.d.\ data $\{(X_i,Y_i)\}_{i=1}^n$, where $X \in \mathcal{X}, Y \in \mathcal{Y}$ lie in any general spaces, and we wish to test the null that $X$ is independent of $Y$. Modern test statistics such as the kernel Hilbert-Schmidt Independence Criterion (HSIC) and Distance Covariance (dCov) have intractable null distributions due to the degeneracy of the underlying U-statistics. Thus, in practice, one often resorts to using permutation testing, which provides a nonasymptotic guarantee at the expense of recalculating the quadratic-time statistics (say) a few hundred times. This paper provides a simple but nontrivial modification of HSIC and dCov (called xHSIC and xdCov, pronounced ``cross'' HSIC/dCov) so that they have a limiting Gaussian distribution under the null, and thus do not require permutations. This requires building on the newly developed theory of cross U-statistics by Kim and Ramdas (2020), and in particular develo** several nontrivial extensions of the theory in Shekhar et al. (2022), which developed an analogous permutation-free kernel two-sample test. We show that our new tests, like the originals, are consistent against fixed alternatives, and minimax rate optimal against smooth local alternatives. Numerical simulations demonstrate that compared to the full dCov or HSIC, our variants have the same power up to a $\sqrt 2$ factor, giving practitioners a new option for large problems or data-analysis pipelines where computation, not sample size, could be the bottleneck.
△ Less
Submitted 18 December, 2022;
originally announced December 2022.
-
Complementarity and the unitarity of the black hole $S$-matrix
Authors:
Isaac H. Kim,
John Preskill
Abstract:
Recently, Akers et al. proposed a non-isometric holographic map from the interior of a black hole to its exterior. Within this model, we study properties of the black hole $S$-matrix, which are in principle accessible to observers who stay outside the black hole. Specifically, we investigate a scenario in which an infalling agent interacts with radiation both outside and inside the black hole. Bec…
▽ More
Recently, Akers et al. proposed a non-isometric holographic map from the interior of a black hole to its exterior. Within this model, we study properties of the black hole $S$-matrix, which are in principle accessible to observers who stay outside the black hole. Specifically, we investigate a scenario in which an infalling agent interacts with radiation both outside and inside the black hole. Because the holographic map involves postselection, the unitarity of the $S$-matrix is not guaranteed in this scenario, but we find that unitarity is satisfied to very high precision if suitable conditions are met. If the internal black hole dynamics is described by a pseudorandom unitary transformation, and if the operations performed by the infaller have computational complexity scaling polynomially with the black hole entropy, then the $S$-matrix is unitary up to corrections that are superpolynomially small in the black hole entropy. Furthermore, while in principle quantum computation assisted by postselection can be very powerful, we find under similar assumptions that the $S$-matrix of an evaporating black hole has polynomial computational complexity.
△ Less
Submitted 15 February, 2023; v1 submitted 30 November, 2022;
originally announced December 2022.
-
Tumor growth with nutrients: stability of the tumor patches
Authors:
Inwon Kim,
Jona Lelmi
Abstract:
In this paper, we study a tumor growth model with nutrients. The contact inhibition for the tumor cells, presented in the model, results in the evolution of a congested tumor patch. We study the regularity of the tumor patch as the nutrients' diffusion strength $D$ diminishes. In particular, we show that for small $D>0$ the boundary of the tumor patch stays in a small neighborhood of the smooth tu…
▽ More
In this paper, we study a tumor growth model with nutrients. The contact inhibition for the tumor cells, presented in the model, results in the evolution of a congested tumor patch. We study the regularity of the tumor patch as the nutrients' diffusion strength $D$ diminishes. In particular, we show that for small $D>0$ the boundary of the tumor patch stays in a small neighborhood of the smooth tumor patch boundary obtained with $D=0$, uniformly with respect to the Hausdorff distance.
△ Less
Submitted 30 November, 2022;
originally announced November 2022.
-
A Permutation-free Kernel Two-Sample Test
Authors:
Shubhanshu Shekhar,
Ilmun Kim,
Aaditya Ramdas
Abstract:
The kernel Maximum Mean Discrepancy~(MMD) is a popular multivariate distance metric between distributions that has found utility in two-sample testing. The usual kernel-MMD test statistic is a degenerate U-statistic under the null, and thus it has an intractable limiting distribution. Hence, to design a level-$α$ test, one usually selects the rejection threshold as the $(1-α)$-quantile of the perm…
▽ More
The kernel Maximum Mean Discrepancy~(MMD) is a popular multivariate distance metric between distributions that has found utility in two-sample testing. The usual kernel-MMD test statistic is a degenerate U-statistic under the null, and thus it has an intractable limiting distribution. Hence, to design a level-$α$ test, one usually selects the rejection threshold as the $(1-α)$-quantile of the permutation distribution. The resulting nonparametric test has finite-sample validity but suffers from large computational cost, since every permutation takes quadratic time. We propose the cross-MMD, a new quadratic-time MMD test statistic based on sample-splitting and studentization. We prove that under mild assumptions, the cross-MMD has a limiting standard Gaussian distribution under the null. Importantly, we also show that the resulting test is consistent against any fixed alternative, and when using the Gaussian kernel, it has minimax rate-optimal power against local alternatives. For large sample sizes, our new cross-MMD provides a significant speedup over the MMD, for only a slight loss in power.
△ Less
Submitted 4 February, 2023; v1 submitted 27 November, 2022;
originally announced November 2022.
-
Performance Analysis of Free-Space Information Sharing in Full-Duplex Semantic Communications
Authors:
Hongyang Du,
Jiacheng Wang,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Dong In Kim,
Boon Hee Soong
Abstract:
In next-generation Internet services, such as Metaverse, the mixed reality (MR) technique plays a vital role. Yet the limited computing capacity of the user-side MR headset-mounted device (HMD) prevents its further application, especially in scenarios that require a lot of computation. One way out of this dilemma is to design an efficient information sharing scheme among users to replace the heavy…
▽ More
In next-generation Internet services, such as Metaverse, the mixed reality (MR) technique plays a vital role. Yet the limited computing capacity of the user-side MR headset-mounted device (HMD) prevents its further application, especially in scenarios that require a lot of computation. One way out of this dilemma is to design an efficient information sharing scheme among users to replace the heavy and repetitive computation. In this paper, we propose a free-space information sharing mechanism based on full-duplex device-to-device (D2D) semantic communications. Specifically, the view images of MR users in the same real-world scenario may be analogous. Therefore, when one user (i.e., a device) completes some computation tasks, the user can send his own calculation results and the semantic features extracted from the user's own view image to nearby users (i.e., other devices). On this basis, other users can use the received semantic features to obtain the spatial matching of the computational results under their own view images without repeating the computation. Using generalized small-scale fading models, we analyze the key performance indicators of full-duplex D2D communications, including channel capacity and bit error probability, which directly affect the transmission of semantic information. Finally, the numerical analysis experiment proves the effectiveness of our proposed methods.
△ Less
Submitted 27 November, 2022;
originally announced November 2022.
-
A new operator extension of strong subadditivity of quantum entropy
Authors:
Ting-Chun Lin,
Isaac H. Kim,
Min-Hsiu Hsieh
Abstract:
Let $S(ρ)$ be the von Neumann entropy of a density matrix $ρ$. Weak monotonicity asserts that $S(ρ_{AB}) - S(ρ_A) + S(ρ_{BC}) - S(ρ_C)\geq 0$ for any tripartite density matrix $ρ_{ABC}$, a fact that is equivalent to the strong subadditivity of entropy. We prove an operator inequality, which, upon taking an expectation value with respect to the state $ρ_{ABC}$, reduces to the weak monotonicity ineq…
▽ More
Let $S(ρ)$ be the von Neumann entropy of a density matrix $ρ$. Weak monotonicity asserts that $S(ρ_{AB}) - S(ρ_A) + S(ρ_{BC}) - S(ρ_C)\geq 0$ for any tripartite density matrix $ρ_{ABC}$, a fact that is equivalent to the strong subadditivity of entropy. We prove an operator inequality, which, upon taking an expectation value with respect to the state $ρ_{ABC}$, reduces to the weak monotonicity inequality. Generalizations of this inequality to the one involving two independent density matrices, as well as their Rényi-generalizations, are also presented.
△ Less
Submitted 25 May, 2023; v1 submitted 23 November, 2022;
originally announced November 2022.
-
Dual Prototype Attention for Unsupervised Video Object Segmentation
Authors:
Suhwan Cho,
Minhyeok Lee,
Seunghoon Lee,
Dogyoon Lee,
Heeseung Choi,
Ig-Jae Kim,
Sangyoun Lee
Abstract:
Unsupervised video object segmentation (VOS) aims to detect and segment the most salient object in videos. The primary techniques used in unsupervised VOS are 1) the collaboration of appearance and motion information; and 2) temporal fusion between different frames. This paper proposes two novel prototype-based attention mechanisms, inter-modality attention (IMA) and inter-frame attention (IFA), t…
▽ More
Unsupervised video object segmentation (VOS) aims to detect and segment the most salient object in videos. The primary techniques used in unsupervised VOS are 1) the collaboration of appearance and motion information; and 2) temporal fusion between different frames. This paper proposes two novel prototype-based attention mechanisms, inter-modality attention (IMA) and inter-frame attention (IFA), to incorporate these techniques via dense propagation across different modalities and frames. IMA densely integrates context information from different modalities based on a mutual refinement. IFA injects global context of a video to the query frame, enabling a full utilization of useful properties from multiple frames. Experimental results on public benchmark datasets demonstrate that our proposed approach outperforms all existing methods by a substantial margin. The proposed two components are also thoroughly validated via ablative study.
△ Less
Submitted 26 March, 2024; v1 submitted 22 November, 2022;
originally announced November 2022.
-
The Projected Covariance Measure for assumption-lean variable significance testing
Authors:
Anton Rask Lundborg,
Ilmun Kim,
Rajen D. Shah,
Richard J. Samworth
Abstract:
Testing the significance of a variable or group of variables $X$ for predicting a response $Y$, given additional covariates $Z$, is a ubiquitous task in statistics. A simple but common approach is to specify a linear model, and then test whether the regression coefficient for $X$ is non-zero. However, when the model is misspecified, the test may have poor power, for example when $X$ is involved in…
▽ More
Testing the significance of a variable or group of variables $X$ for predicting a response $Y$, given additional covariates $Z$, is a ubiquitous task in statistics. A simple but common approach is to specify a linear model, and then test whether the regression coefficient for $X$ is non-zero. However, when the model is misspecified, the test may have poor power, for example when $X$ is involved in complex interactions, or lead to many false rejections. In this work we study the problem of testing the model-free null of conditional mean independence, i.e. that the conditional mean of $Y$ given $X$ and $Z$ does not depend on $X$. We propose a simple and general framework that can leverage flexible nonparametric or machine learning methods, such as additive models or random forests, to yield both robust error control and high power. The procedure involves using these methods to perform regressions, first to estimate a form of projection of $Y$ on $X$ and $Z$ using one half of the data, and then to estimate the expected conditional covariance between this projection and $Y$ on the remaining half of the data. While the approach is general, we show that a version of our procedure using spline regression achieves what we show is the minimax optimal rate in this nonparametric testing problem. Numerical experiments demonstrate the effectiveness of our approach both in terms of maintaining Type I error control, and power, compared to several existing approaches.
△ Less
Submitted 7 May, 2024; v1 submitted 3 November, 2022;
originally announced November 2022.
-
DyAnNet: A Scene Dynamicity Guided Self-Trained Video Anomaly Detection Network
Authors:
Kamalakar Thakare,
Yash Raghuwanshi,
Debi Prosad Dogra,
Heeseung Choi,
Ig-Jae Kim
Abstract:
Unsupervised approaches for video anomaly detection may not perform as good as supervised approaches. However, learning unknown types of anomalies using an unsupervised approach is more practical than a supervised approach as annotation is an extra burden. In this paper, we use isolation tree-based unsupervised clustering to partition the deep feature space of the video segments. The RGB- stream g…
▽ More
Unsupervised approaches for video anomaly detection may not perform as good as supervised approaches. However, learning unknown types of anomalies using an unsupervised approach is more practical than a supervised approach as annotation is an extra burden. In this paper, we use isolation tree-based unsupervised clustering to partition the deep feature space of the video segments. The RGB- stream generates a pseudo anomaly score and the flow stream generates a pseudo dynamicity score of a video segment. These scores are then fused using a majority voting scheme to generate preliminary bags of positive and negative segments. However, these bags may not be accurate as the scores are generated only using the current segment which does not represent the global behavior of a typical anomalous event. We then use a refinement strategy based on a cross-branch feed-forward network designed using a popular I3D network to refine both scores. The bags are then refined through a segment re-map** strategy. The intuition of adding the dynamicity score of a segment with the anomaly score is to enhance the quality of the evidence. The method has been evaluated on three popular video anomaly datasets, i.e., UCF-Crime, CCTV-Fights, and UBI-Fights. Experimental results reveal that the proposed framework achieves competitive accuracy as compared to the state-of-the-art video anomaly detection methods.
△ Less
Submitted 2 November, 2022;
originally announced November 2022.
-
Regularity of Hele-Shaw Flow with source and drift
Authors:
Inwon Kim,
Yuming Paul Zhang
Abstract:
In this paper we study the regularity property of Hele-Shaw flow, where source and drift are present in the evolution. More specifically we consider Hölder continuous source and Lipschitz continuous drift. We show that if the free boundary of the solution is locally close to a Lipschitz graph, then it is indeed Lipschitz, given that the Lipschitz constant is small. When there is no drift, our resu…
▽ More
In this paper we study the regularity property of Hele-Shaw flow, where source and drift are present in the evolution. More specifically we consider Hölder continuous source and Lipschitz continuous drift. We show that if the free boundary of the solution is locally close to a Lipschitz graph, then it is indeed Lipschitz, given that the Lipschitz constant is small. When there is no drift, our result establishes $C^{1,γ}$ regularity of the free boundary by combining our result with the obstacle problem theory. In general, when the source and drift are both smooth, we prove that the solution is non-degenerate, indicating higher regularity of the free boudary.
△ Less
Submitted 25 October, 2022;
originally announced October 2022.
-
SageMix: Saliency-Guided Mixup for Point Clouds
Authors:
Sanghyeok Lee,
Minkyu Jeon,
Injae Kim,
Yunyang Xiong,
Hyunwoo J. Kim
Abstract:
Data augmentation is key to improving the generalization ability of deep learning models. Mixup is a simple and widely-used data augmentation technique that has proven effective in alleviating the problems of overfitting and data scarcity. Also, recent studies of saliency-aware Mixup in the image domain show that preserving discriminative parts is beneficial to improving the generalization perform…
▽ More
Data augmentation is key to improving the generalization ability of deep learning models. Mixup is a simple and widely-used data augmentation technique that has proven effective in alleviating the problems of overfitting and data scarcity. Also, recent studies of saliency-aware Mixup in the image domain show that preserving discriminative parts is beneficial to improving the generalization performance. However, these Mixup-based data augmentations are underexplored in 3D vision, especially in point clouds. In this paper, we propose SageMix, a saliency-guided Mixup for point clouds to preserve salient local structures. Specifically, we extract salient regions from two point clouds and smoothly combine them into one continuous shape. With a simple sequential sampling by re-weighted saliency scores, SageMix preserves the local structure of salient regions. Extensive experiments demonstrate that the proposed method consistently outperforms existing Mixup methods in various benchmark point cloud datasets. With PointNet++, our method achieves an accuracy gain of 2.6% and 4.0% over standard training in 3D Warehouse dataset (MN40) and ScanObjectNN, respectively. In addition to generalization performance, SageMix improves robustness and uncertainty calibration. Moreover, when adopting our method to various tasks including part segmentation and standard 2D image classification, our method achieves competitive performance.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
Circuit depth versus energy in topologically ordered systems
Authors:
Arkin Tikku,
Isaac H. Kim
Abstract:
We prove a nontrivial circuit-depth lower bound for preparing a low-energy state of a locally interacting quantum many-body system in two dimensions, assuming the circuit is geometrically local. For preparing any state which has an energy density of at most $ε$ with respect to Kitaev's toric code Hamiltonian on a two dimensional lattice $Λ$, we prove a lower bound of…
▽ More
We prove a nontrivial circuit-depth lower bound for preparing a low-energy state of a locally interacting quantum many-body system in two dimensions, assuming the circuit is geometrically local. For preparing any state which has an energy density of at most $ε$ with respect to Kitaev's toric code Hamiltonian on a two dimensional lattice $Λ$, we prove a lower bound of $Ω\left(\min\left(1/ε^{\frac{1-α}{2}}, \sqrt{|Λ|}\right)\right)$ for any $α>0$. We discuss two implications. First, our bound implies that the lowest energy density obtainable from a large class of existing variational circuits (e.g., Hamiltonian variational ansatz) cannot, in general, decay exponentially with the circuit depth. Second, if long-range entanglement is present in the ground state, this can lead to a nontrivial circuit-depth lower bound even at nonzero energy density. Unlike previous approaches to prove circuit-depth lower bounds for preparing low energy states, our proof technique does not rely on the ground state to be degenerate.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
Rethinking Wireless Communication Security in Semantic Internet of Things
Authors:
Hongyang Du,
Jiacheng Wang,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Mohsen Guizani,
Dong In Kim
Abstract:
Semantic communication is an important participant in the next generation of wireless communications. Enabled by this novel paradigm, the conventional Internet-of-Things (IoT) is evolving toward the semantic IoT (SIoT) to achieve significant system performance improvements. However, traditional wireless communication security techniques for bit transmission cannot be applied directly to the SIoT t…
▽ More
Semantic communication is an important participant in the next generation of wireless communications. Enabled by this novel paradigm, the conventional Internet-of-Things (IoT) is evolving toward the semantic IoT (SIoT) to achieve significant system performance improvements. However, traditional wireless communication security techniques for bit transmission cannot be applied directly to the SIoT that focuses on semantic information transmission. One key reason is the lack of new security performance indicators. Thus, we have to rethink the wireless communication security in the SIoT. As such, in the paper, we analyze and compare classical security techniques, i.e., physical layer security, covert communications, and encryption, from the perspective of semantic information security. We highlight the differences among these security techniques when applied to the SIoT. Novel performance indicators such as semantic secrecy outage probability (for physical layer security techniques) and detection failure probability (for covert communication techniques) are proposed. Considering that semantic communications can raise new security issues, we then review attack and defense methods at the semantic level. Finally, we present several promising directions for future secure SIoT research.
△ Less
Submitted 18 October, 2022; v1 submitted 10 October, 2022;
originally announced October 2022.
-
Privacy-preserving Intelligent Resource Allocation for Federated Edge Learning in Quantum Internet
Authors:
Minrui Xu,
Dusit Niyato,
Zhaohui Yang,
Zehui Xiong,
Jiawen Kang,
Dong In Kim,
Xuemin,
Shen
Abstract:
Federated edge learning (FEL) is a promising paradigm of distributed machine learning that can preserve data privacy while training the global model collaboratively. However, FEL is still facing model confidentiality issues due to eavesdrop** risks of exchanging cryptographic keys through traditional encryption schemes. Therefore, in this paper, we propose a hierarchical architecture for quantum…
▽ More
Federated edge learning (FEL) is a promising paradigm of distributed machine learning that can preserve data privacy while training the global model collaboratively. However, FEL is still facing model confidentiality issues due to eavesdrop** risks of exchanging cryptographic keys through traditional encryption schemes. Therefore, in this paper, we propose a hierarchical architecture for quantum-secured FEL systems with ideal security based on the quantum key distribution (QKD) to facilitate public key and model encryption against eavesdrop** attacks. Specifically, we propose a stochastic resource allocation model for efficient QKD to encrypt FEL keys and models. In FEL systems, remote FEL workers are connected to cluster heads via quantum-secured channels to train an aggregated global model collaboratively. However, due to the unpredictable number of workers at each location, the demand for secret-key rates to support secure model transmission to the server is unpredictable. The proposed systems need to efficiently allocate limited QKD resources (i.e., wavelengths) such that the total cost is minimized in the presence of stochastic demand by formulating the optimization problem for the proposed architecture as a stochastic programming model. To this end, we propose a federated reinforcement learning-based resource allocation scheme to solve the proposed model without complete state information. The proposed scheme enables QKD managers and controllers to train a global QKD resource allocation policy while kee** their private experiences local. Numerical results demonstrate that the proposed schemes can successfully achieve the cost-minimizing objective under uncertain demand while improving the training efficiency by about 50\% compared to state-of-the-art schemes.
△ Less
Submitted 9 October, 2022;
originally announced October 2022.
-
New Limits on Spontaneous Wave Function Collapse Models with the XENONnT Data
Authors:
Inwook Kim
Abstract:
We have analyzed recently published XENONnT data for the spontaneous X-ray emission signature predicted by the objective wave function collapse model of quantum mechanics. With extremely low background and large exposure, XENONnT data can be used to completely exclude the theoretically predicted collapse parameters of continuous spontaneous localization~(CSL) model suggested by Ghirardi, Rhimini a…
▽ More
We have analyzed recently published XENONnT data for the spontaneous X-ray emission signature predicted by the objective wave function collapse model of quantum mechanics. With extremely low background and large exposure, XENONnT data can be used to completely exclude the theoretically predicted collapse parameters of continuous spontaneous localization~(CSL) model suggested by Ghirardi, Rhimini and Weber. Our result strongly suggests that the simplest version of the CSL model with the white-noise assumption is unlikely to provide answers to the long-standing measurement problem of quantum mechanics and motivates pursuits of more complex versions of the theory. If the result is interpreted with the Diósi-Penrose gravitational wave function collapse model, our limit improves the previous limit by a factor of 5.7. Detailed analysis using more precise background modelling can further improve the limits.
△ Less
Submitted 3 January, 2023; v1 submitted 29 September, 2022;
originally announced September 2022.
-
Isometric, symmetric and isosymmetric commuting $d$-tuples of Banach space operators
Authors:
Bhagwati Prashad Duggal,
In Hyun Kim
Abstract:
Generalising the definition to commuting $d$-tuples of operators, a number of authors have considered structural properties of $m$-isometric, $n$-symmetric and $(m,n)$-isosymmetric commuting $d$-tuples in the recent past. This note is an attempt to take the mystique out of this extension and show how a large number of these properties follow from the more familiar arguments used to prove the singl…
▽ More
Generalising the definition to commuting $d$-tuples of operators, a number of authors have considered structural properties of $m$-isometric, $n$-symmetric and $(m,n)$-isosymmetric commuting $d$-tuples in the recent past. This note is an attempt to take the mystique out of this extension and show how a large number of these properties follow from the more familiar arguments used to prove the single operator version of these properties.
△ Less
Submitted 27 September, 2022;
originally announced September 2022.
-
Modeling Backgrounds for the MAJORANA DEMONSTRATOR
Authors:
C. R. Haufe,
I. J. Arnquist,
F. T. Avignone III,
A. S. Barabash,
C. J. Barton,
K. H. Bhimani,
E. Blalock,
B. Bos,
M. Busch,
M. Buuck,
T. S. Caldwell,
Y-D. Chan,
C. D. Christofferson,
P. -H. Chu,
M. L. Clark,
C. Cuesta,
J. A. Detwiler,
Yu. Efremenko,
H. Ejiri,
S. R. Elliott,
G. K. Giovanetti,
M. P. Green,
J. Gruszko,
I. S. Guinn,
V. E. Guiseppe
, et al. (33 additional authors not shown)
Abstract:
The MAJORANA DEMONSTRATOR is a neutrinoless double-beta decay ($0νββ$) experiment containing $\sim$30 kg of p-type point contact germanium detectors enriched to 88% in 76Ge and $\sim$14 kg of natural germanium detectors. The detectors are housed in two electroformed copper cryostats and surrounded by a graded passive shield with active muon veto. An extensive radioassay campaign was performed prio…
▽ More
The MAJORANA DEMONSTRATOR is a neutrinoless double-beta decay ($0νββ$) experiment containing $\sim$30 kg of p-type point contact germanium detectors enriched to 88% in 76Ge and $\sim$14 kg of natural germanium detectors. The detectors are housed in two electroformed copper cryostats and surrounded by a graded passive shield with active muon veto. An extensive radioassay campaign was performed prior to installation to insure the use of ultra-clean materials. The DEMONSTRATOR achieved one of the lowest background rates in the region of the $0νββ$ Q-value, 15.7 $\pm$ 1.4 cts/(FWHM t y) from the low-background configuration spanning most of the 64.5 kg-yr active exposure. Nevertheless this background rate is a factor of five higher than the projected background rate. This discrepancy arises from an excess of events from the 232Th decay chain. Background model fits aim to understand this deviation from assay-based projections, potentially determine the source(s) of observed backgrounds, and allow a precision measurement of the two-neutrino double-beta decay half-life. The fits agree with earlier simulation studies, which indicate the origin of the 232Th excess is not from a near-detector component and have informed design decisions for the next-generation LEGEND experiment. Recent findings have narrowed the suspected locations for the excess activity, motivating a final simulation and assay campaign to complete the background model.
△ Less
Submitted 11 January, 2023; v1 submitted 21 September, 2022;
originally announced September 2022.
-
Deep Learning for Multi-User MIMO Systems: Joint Design of Pilot, Limited Feedback, and Precoding
Authors:
Jeonghyeon Jang,
Hoon Lee,
Il-Min Kim,
Inkyu Lee
Abstract:
In conventional multi-user multiple-input multiple-output (MU-MIMO) systems with frequency division duplexing (FDD), channel acquisition and precoder optimization processes have been designed separately although they are highly coupled. This paper studies an end-to-end design of downlink MU-MIMO systems which include pilot sequences, limited feedback, and precoding. To address this problem, we pro…
▽ More
In conventional multi-user multiple-input multiple-output (MU-MIMO) systems with frequency division duplexing (FDD), channel acquisition and precoder optimization processes have been designed separately although they are highly coupled. This paper studies an end-to-end design of downlink MU-MIMO systems which include pilot sequences, limited feedback, and precoding. To address this problem, we propose a novel deep learning (DL) framework which jointly optimizes the feedback information generation at users and the precoder design at a base station (BS). Each procedure in the MU-MIMO systems is replaced by intelligently designed multiple deep neural networks (DNN) units. At the BS, a neural network generates pilot sequences and helps the users obtain accurate channel state information. At each user, the channel feedback operation is carried out in a distributed manner by an individual user DNN. Then, another BS DNN collects feedback information from the users and determines the MIMO precoding matrices. A joint training algorithm is proposed to optimize all DNN units in an end-to-end manner. In addition, a training strategy which can avoid retraining for different network sizes for a scalable design is proposed. Numerical results demonstrate the effectiveness of the proposed DL framework compared to classical optimization techniques and other conventional DNN schemes.
△ Less
Submitted 21 September, 2022;
originally announced September 2022.
-
Concatenation Schemes for Topological Fault-tolerant Quantum Error Correction
Authors:
Zhaoyi Li,
Isaac Kim,
Patrick Hayden
Abstract:
We investigate a family of fault-tolerant quantum error correction schemes based on the concatenation of small error detection or error correction codes with the three-dimensional cluster state. We propose fault-tolerant state preparation and decoding schemes that effectively convert every circuit-level error into an erasure error, leveraging the cluster state's high threshold against such errors.…
▽ More
We investigate a family of fault-tolerant quantum error correction schemes based on the concatenation of small error detection or error correction codes with the three-dimensional cluster state. We propose fault-tolerant state preparation and decoding schemes that effectively convert every circuit-level error into an erasure error, leveraging the cluster state's high threshold against such errors. We find a set of codes for which such a conversion is possible, and study their performance against the standard circuit-level depolarizing model. Our best performing scheme, which is based on a concatenation with a classical code, improves the threshold by $16.5\%$ and decreases the spacetime overhead by $32\%$ compared to the scheme without concatenation, with each scheme subject to a physical error rate of $10^{-3}$ and achieving a logical error rate of $10^{-6}$.
△ Less
Submitted 5 August, 2023; v1 submitted 19 September, 2022;
originally announced September 2022.
-
Non-iterative generation of an optimal mesh for a blade passage using deep reinforcement learning
Authors:
Innyoung Kim,
Se** Kim,
Donghyun You
Abstract:
A method using deep reinforcement learning (DRL) to non-iteratively generate an optimal mesh for an arbitrary blade passage is developed. Despite automation in mesh generation using either an empirical approach or an optimization algorithm, repeated tuning of meshing parameters is still required for a new geometry. The method developed herein employs a DRL-based multi-condition optimization techni…
▽ More
A method using deep reinforcement learning (DRL) to non-iteratively generate an optimal mesh for an arbitrary blade passage is developed. Despite automation in mesh generation using either an empirical approach or an optimization algorithm, repeated tuning of meshing parameters is still required for a new geometry. The method developed herein employs a DRL-based multi-condition optimization technique to define optimal meshing parameters as a function of the blade geometry, attaining automation, minimization of human intervention, and computational efficiency. The meshing parameters are optimized by training an elliptic mesh generator which generates a structured mesh for a blade passage with an arbitrary blade geometry. During each episode of the DRL process, the mesh generator is trained to produce an optimal mesh for a randomly selected blade passage by updating the meshing parameters until the mesh quality, as measured by the ratio of determinants of the Jacobian matrices and the skewness, reaches the highest level. Once the training is completed, the mesh generator create an optimal mesh for a new arbitrary blade passage in a single try without an repetitive process for the parameter tuning for mesh generation from the scratch. The effectiveness and robustness of the proposed method are demonstrated through the generation of meshes for various blade passages.
△ Less
Submitted 9 May, 2023; v1 submitted 7 September, 2022;
originally announced September 2022.
-
Foundations of Wireless Information and Power Transfer: Theory, Prototypes, and Experiments
Authors:
Bruno Clerckx,
Junghoon Kim,
Kae Won Choi,
Dong In Kim
Abstract:
As wireless has disrupted communications, wireless will also disrupt the delivery of energy. Future wireless networks will be equipped with (radiative) wireless power transfer (WPT) capability and exploit radio waves to carry both energy and information through a unified wireless information and power transfer (WIPT). Such networks will make the best use of the RF spectrum and radiation as well as…
▽ More
As wireless has disrupted communications, wireless will also disrupt the delivery of energy. Future wireless networks will be equipped with (radiative) wireless power transfer (WPT) capability and exploit radio waves to carry both energy and information through a unified wireless information and power transfer (WIPT). Such networks will make the best use of the RF spectrum and radiation as well as the network infrastructure for the dual purpose of communicating and energizing. Consequently those networks will enable trillions of future low-power devices to sense, compute, connect, and energize anywhere, anytime, and on the move. In this paper, we review the foundations of such future system. We first give an overview of the fundamental theoretical building blocks of WPT and WIPT. Then we discuss some state-of-the-art experimental setups and prototypes of both WPT and WIPT and contrast theoretical and experimental results. We draw a special attention to how the integration of RF, signal and system designs in WPT and WIPT leads to new theoretical and experimental design challenges for both microwave and communication engineers and highlight some promising solutions. Topics and experimental testbeds discussed include closed-loop WPT and WIPT architectures with beamforming, waveform, channel acquisition, and single/multi-antenna energy harvester, centralized and distributed WPT, reconfigurable metasurfaces and intelligent surfaces for WPT, transmitter and receiver architecture for WIPT, modulation, rate-energy trade-off. Moreover, we highlight important theoretical and experimental research directions to be addressed for WPT and WIPT to become a foundational technology of future wireless networks.
△ Less
Submitted 8 September, 2022;
originally announced September 2022.
-
Building Surrogate Models of Nuclear Density Functional Theory with Gaussian Processesand Autoencoders
Authors:
Marc Verriere,
Nicolas Schunck,
Irene Kim,
Petar Marević,
Kevin Quinlan,
Michelle N. NGo,
David Regnier,
Raphael David Lasseri
Abstract:
From the lightest Hydrogen isotopes up to the recently synthesized Oganesson (Z=118), it is estimated that as many as about 3000 atomic nuclei could exist in nature. Most of these nuclei are too short-lived to be occurring on Earth, but they play an essential role in astrophysical events such as supernova explosions or neutron star mergers that are presumed to be at the origin of most heavy elemen…
▽ More
From the lightest Hydrogen isotopes up to the recently synthesized Oganesson (Z=118), it is estimated that as many as about 3000 atomic nuclei could exist in nature. Most of these nuclei are too short-lived to be occurring on Earth, but they play an essential role in astrophysical events such as supernova explosions or neutron star mergers that are presumed to be at the origin of most heavy elements in the Universe. Understanding the structure, reactions, and decays of nuclei across the entire chart of nuclides is an enormous challenge because of the experimental difficulties in measuring properties of interest in such fleeting objects and the theoretical and computational issues of simulating strongly-interacting quantum many-body systems. Nuclear density functional theory (DFT) is a fully microscopic theoretical framework which has the potential of providing such a quantitatively accurate description of nuclear properties for every nucleus in the chart of nuclides. Thanks to high-performance computing facilities, it has already been successfully applied to predict nuclear masses, global patterns of radioactive decay like $β$ or $γ$ decay, and several aspects of the nuclear fission process such as, e.g., spontaneous fission half-lives. Yet, predictive simulations of nuclear spectroscopy or of nuclear fission, or the quantification of theoretical uncertainties and their propagation to applications, would require several orders of magnitude more calculations than currently possible. However, most of this computational effort would be spent into generating a suitable basis of DFT wavefunctions. Such a task could potentially be considerably accelerated by borrowing tools from the field of machine learning and artificial intelligence. In this paper, we review different approaches to applying supervised and unsupervised learning techniques to nuclear DFT.
△ Less
Submitted 6 September, 2022;
originally announced September 2022.
-
Comparing multiple latent space embeddings using topological analysis
Authors:
Kisung You,
Ilmun Kim,
Ick Hoon **,
Minjeong Jeon,
Dennis Shung
Abstract:
The latent space model is one of the well-known methods for statistical inference of network data. While the model has been much studied for a single network, it has not attracted much attention to analyze collectively when multiple networks and their latent embeddings are present. We adopt a topology-based representation of latent space embeddings to learn over a population of network model fits,…
▽ More
The latent space model is one of the well-known methods for statistical inference of network data. While the model has been much studied for a single network, it has not attracted much attention to analyze collectively when multiple networks and their latent embeddings are present. We adopt a topology-based representation of latent space embeddings to learn over a population of network model fits, which allows us to compare networks of potentially varying sizes in an invariant manner to label permutation and rigid motion. This approach enables us to propose algorithms for clustering and multi-sample hypothesis tests by adopting well-established theories for Hilbert space-valued analysis. After the proposed method is validated via simulated examples, we apply the framework to analyze educational survey data from Korean innovative school reform.
△ Less
Submitted 26 August, 2022;
originally announced August 2022.
-
On The Robustness of Channel Allocation in Joint Radar And Communication Systems: An Auction Approach
Authors:
Ismail Lotfi,
Hongyang Du,
Dusit Niyato,
Sumei Sun,
Dong In Kim
Abstract:
Joint radar and communication (JRC) is a promising technique for spectrum re-utilization, which enables radar sensing and data transmission to operate on the same frequencies and the same devices. However, due to the multi-objective property of JRC systems, channel allocation to JRC nodes should be carefully designed to maximize system performance. Additionally, because of the broadcast nature of…
▽ More
Joint radar and communication (JRC) is a promising technique for spectrum re-utilization, which enables radar sensing and data transmission to operate on the same frequencies and the same devices. However, due to the multi-objective property of JRC systems, channel allocation to JRC nodes should be carefully designed to maximize system performance. Additionally, because of the broadcast nature of wireless signals, a watchful adversary, i.e., a warden, can detect ongoing transmissions and attack the system. Thus, we develop a covert JRC system that minimizes the detection probability by wardens, in which friendly jammers are deployed to improve the covertness of the JRC nodes during radar sensing and data transmission operations. Furthermore, we propose a robust multi-item auction design for channel allocation for such a JRC system that considers the uncertainty in bids. The proposed auction mechanism achieves the properties of truthfulness, individual rationality, budget feasibility, and computational efficiency. The simulations clearly show the benefits of our design to support covert JRC systems and to provide incentive to the JRC nodes in obtaining spectrum, in which the auction-based channel allocation mechanism is robust against perturbations in the bids, which is highly effective for JRC nodes working in uncertain environments.
△ Less
Submitted 10 October, 2022; v1 submitted 21 August, 2022;
originally announced August 2022.
-
Incompressible limit of porous medium equation with bistable and monostable reaction terms
Authors:
Inwon Kim,
Antoine Mellet
Abstract:
We study the incompressible limit of the porous medium equation with a reaction term that is non-monotone with respect to the pressure variable. More specifically we consider reaction terms that are either bistable or monostable. We show that this type of reaction term generates many interesting differences in the qualitative behavior of solutions, in contrast to the problem with monotone reaction…
▽ More
We study the incompressible limit of the porous medium equation with a reaction term that is non-monotone with respect to the pressure variable. More specifically we consider reaction terms that are either bistable or monostable. We show that this type of reaction term generates many interesting differences in the qualitative behavior of solutions, in contrast to the problem with monotone reaction terms that have been extensively studied in recent literature. After characterizing the limit problem, we embark on a comprehensive study of the problem in one space dimension, to illustrate the delicate nature of the problem, including the generic nature of non-uniqueness and instability. For compactly supported initial data, we show that the density can either perish or thrive, even if it starts from the same initial data, depending on its initial pressure configuration. When the initial pressure is a characteristic function, we establish the existence of the sharp threshold separating the two behaviors. Lastly we present a detailed analysis of the behavior of traveling waves in this incompressible limit. We study the existence of traveling waves for the limiting model and prove convergence results in the incompressible limit (depending on the reaction term).
△ Less
Submitted 19 August, 2022;
originally announced August 2022.
-
Curvature of the total space of a Griffiths negative vector bundle and quasi-Fuchsian space
Authors:
Inkang Kim,
Xueyuan Wan,
Genkai Zhang
Abstract:
For a holomorphic vector bundle $E$ over a Hermitian manifold $M$ there are two important notions of curvature positivity, the Griffiths positivity and Nakano positivity. We study the consequence of these positivities and the relevant estimates. If $E$ is Griffiths negative over Kähler manifold, then there is a Kähler metric on its total space $E$, and we calculate the curvature and prove the non-…
▽ More
For a holomorphic vector bundle $E$ over a Hermitian manifold $M$ there are two important notions of curvature positivity, the Griffiths positivity and Nakano positivity. We study the consequence of these positivities and the relevant estimates. If $E$ is Griffiths negative over Kähler manifold, then there is a Kähler metric on its total space $E$, and we calculate the curvature and prove the non-positivity of the curvature along the tautological direction. The Nakano positivity can be formulated as a positivity for the Nakano curvature operator and we give estimate the Nakano curvature operator associated with a Nakano positive direct image bundle. As applications we construct a map** class group invariant Kähler metric on the quasi-Fuchsian space QF$(S)$, which extends the Weil-Petersson metric on the Teichmüller space $\mathcal{T}(S)\subset {\rm QF}(S)$, and we obtain estimates for the Nakano curvature operator for the dual Weil-Petersson metric on the holomorphic cotangent bundle of Teichmüller space.
△ Less
Submitted 14 August, 2022;
originally announced August 2022.
-
Attention-aware Resource Allocation and QoE Analysis for Metaverse xURLLC Services
Authors:
Hongyang Du,
Jiazhen Liu,
Dusit Niyato,
Jiawen Kang,
Zehui Xiong,
Junshan Zhang,
Dong In Kim
Abstract:
Metaverse encapsulates our expectations of the next-generation Internet, while bringing new key performance indicators (KPIs). Although conventional ultra-reliable and low-latency communications (URLLC) can satisfy objective KPIs, it is difficult to provide a personalized immersive experience that is a distinctive feature of the Metaverse. Since the quality of experience (QoE) can be regarded as a…
▽ More
Metaverse encapsulates our expectations of the next-generation Internet, while bringing new key performance indicators (KPIs). Although conventional ultra-reliable and low-latency communications (URLLC) can satisfy objective KPIs, it is difficult to provide a personalized immersive experience that is a distinctive feature of the Metaverse. Since the quality of experience (QoE) can be regarded as a comprehensive KPI, the URLLC is evolved towards the next generation URLLC (xURLLC) with a personalized resource allocation scheme to achieve higher QoE. To deploy Metaverse xURLLC services, we study the interaction between the Metaverse service provider (MSP) and the network infrastructure provider (InP), and provide an optimal contract design framework. Specifically, the utility of the MSP, defined as a function of Metaverse users' QoE, is to be maximized, while ensuring the incentives of the InP. To model the QoE mathematically, we propose a novel metric named Meta-Immersion that incorporates both the objective KPIs and subjective feelings of Metaverse users. Furthermore, we develop an attention-aware rendering capacity allocation scheme to improve QoE in xURLLC. Using a user-object-attention level dataset, we validate that the xURLLC can achieve an average of 20.1% QoE improvement compared to the conventional URLLC with a uniform resource allocation scheme. The code for this paper is available at https://github.com/HongyangDu/AttentionQoE
△ Less
Submitted 28 June, 2023; v1 submitted 10 August, 2022;
originally announced August 2022.
-
Economics of Semantic Communication System: An Auction Approach
Authors:
Zi Qin Liew,
Hongyang Du,
Wei Yang Bryan Lim,
Zehui Xiong,
Dusit Niyato,
Chunyan Miao,
Dong In Kim
Abstract:
Semantic communication technologies enable wireless edge devices to communicate effectively by transmitting semantic meaning of data. Edge components, such as vehicles in next-generation intelligent transport systems, use well-trained semantic models to encode and decode semantic information extracted from raw and sensor data. However, the limitation in computing resources makes it difficult to su…
▽ More
Semantic communication technologies enable wireless edge devices to communicate effectively by transmitting semantic meaning of data. Edge components, such as vehicles in next-generation intelligent transport systems, use well-trained semantic models to encode and decode semantic information extracted from raw and sensor data. However, the limitation in computing resources makes it difficult to support the training process of accurate semantic models on edge devices. As such, edge devices can buy the pretrained semantic models from semantic model providers, which is called "semantic model trading". Upon collecting semantic information with the semantic models, the edge devices can then sell the extracted semantic information, e.g., information about urban road conditions or traffic signs, to the interested buyers for profit, which is called "semantic information trading". To facilitate both types of the trades, effective incentive mechanisms should be designed. Thus, in this paper, we propose a hierarchical trading system to support both semantic model trading and semantic information trading jointly. The proposed incentive mechanism helps to maximize the revenue of semantic model providers in the semantic model trading, and effectively incentivizes model providers to participate in the development of semantic communication systems. For semantic information trading, our designed auction approach can support the trading between multiple semantic information sellers and buyers, while ensuring individual rationality, incentive compatibility, and budget balance, and moreover, allowing them achieve higher utilities than the baseline method.
△ Less
Submitted 1 August, 2022;
originally announced August 2022.
-
Charge Trap** and Energy Performance of the MAJORANA DEMONSTRATOR
Authors:
I. J. Arnquist,
F. T. Avignone III,
A. S. Barabash,
C. J. Barton,
K. H. Bhimani,
E. Blalock,
B. Bos,
M. Busch,
M. Buuck,
T. S. Caldwell,
Y-D. Chan,
C. D. Christofferson,
P. -H. Chu,
M. L. Clark,
C. Cuesta,
J. A. Detwiler,
Yu. Efremenko,
H. Ejiri,
S. R. Elliott,
G. K. Giovanetti,
M. P. Green,
J. Gruszko,
I. S. Guinn,
V. E. Guiseppe,
C. R. Haufe
, et al. (33 additional authors not shown)
Abstract:
P-type point contact (PPC) high-purity germanium detectors are an important technology in astroparticle and nuclear physics due to their superb energy resolution, low noise, and pulse shape discrimination capabilities. Analysis of data from the MAJORANA DEMONSTRATOR, a neutrinoless double-beta decay experiment deploying PPC detectors enriched in $^{76}$Ge, has led to several novel improvements in…
▽ More
P-type point contact (PPC) high-purity germanium detectors are an important technology in astroparticle and nuclear physics due to their superb energy resolution, low noise, and pulse shape discrimination capabilities. Analysis of data from the MAJORANA DEMONSTRATOR, a neutrinoless double-beta decay experiment deploying PPC detectors enriched in $^{76}$Ge, has led to several novel improvements in the analysis of PPC signals. In this work we discuss charge trap** in PPC detectors and its effect on energy resolution. Small dislocations or impurities in the crystal lattice result in trap** of charge carriers from an ionization event of interest, attenuating the signal and degrading the measured energy. We present a modified digital pole-zero correction to the signal energy estimation that counters the effects of charge trap** and improves the energy resolution of the MAJORANA DEMONSTRATOR by approximately 30% to around 2.4 keV FWHM at 2039 keV, the $^{76}$Ge $Q$-value. An alternative approach achieving similar resolution enhancement is also presented.
△ Less
Submitted 26 April, 2023; v1 submitted 1 August, 2022;
originally announced August 2022.