-
Machine Learning-Based Channel Prediction for RIS-assisted MIMO Systems With Channel Aging
Authors:
Nipuni Ginige,
Arthur Sousa de Sena,
Nurul Huda Mahmood,
Nandana Rajatheva,
Matti Latva-aho
Abstract:
Reconfigurable intelligent surfaces (RISs) have emerged as a promising technology to enhance the performance of sixth-generation (6G) and beyond communication systems. The passive nature of RISs and their large number of reflecting elements pose challenges to the channel estimation process. The associated complexity further escalates when the channel coefficients are fast-varying as in scenarios w…
▽ More
Reconfigurable intelligent surfaces (RISs) have emerged as a promising technology to enhance the performance of sixth-generation (6G) and beyond communication systems. The passive nature of RISs and their large number of reflecting elements pose challenges to the channel estimation process. The associated complexity further escalates when the channel coefficients are fast-varying as in scenarios with user mobility. In this paper, we propose an extended channel estimation framework for RIS-assisted multiple-input multiple-output (MIMO) systems based on a convolutional neural network (CNN) integrated with an autoregressive (AR) predictor. The implemented framework is designed for identifying the aging pattern and predicting enhanced estimates of the wireless channels in correlated fast-fading environments. Insightful simulation results demonstrate that our proposed CNN-AR approach is robust to channel aging, exhibiting a high-precision estimation accuracy. The results also show that our approach can achieve high spectral efficiency and low pilot overhead compared to traditional methods.
△ Less
Submitted 9 May, 2024;
originally announced June 2024.
-
Configuration and EMT Simulation of the 240-bus MiniWECC System Integrating Offshore Wind Farms (OWFs)
Authors:
Buxin She,
Hisham Mahmood,
Marcelo Elizondo,
Veronica Adetola,
Yuqing Dong
Abstract:
As offshore wind farms (OWFs) become increasingly prevalent in Northern California and Southern Oregon, they introduce faster dynamics into the Western Electricity Coordinating Council (WECC) system, resha** its dynamic behavior. Accordingly, electromagnetic transient (EMT) simulation is essential to assess high frequency dynamics of the WECC system with integrated OWFs. Against this background,…
▽ More
As offshore wind farms (OWFs) become increasingly prevalent in Northern California and Southern Oregon, they introduce faster dynamics into the Western Electricity Coordinating Council (WECC) system, resha** its dynamic behavior. Accordingly, electromagnetic transient (EMT) simulation is essential to assess high frequency dynamics of the WECC system with integrated OWFs. Against this background, this paper presents the integration of detailed dynamic models of OWFs into a 240-bus miniWECC system in PSCAD software. The sequential initialization technique is employed to facilitate the smooth initiation of a large-scale system in an EMT simulation. The performance of the configured model is assessed under wind speed variations and grounded faults, demonstrating the effectiveness of the miniWECC system with OWFs. This system serves as a valuable basic use case for validating the fast dynamic performance of future WECC systems with high penetration of wind energy.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
Dynamic Model of Back-to-Back Converter for System-Level Phasor Simulation
Authors:
Hisham Mahmood,
Samrat Acharya,
Francis Tuffner,
Priya Mana,
Alok Kumar Bharati
Abstract:
The power system is expected to evolve rapidly with the increasing deployment of power electronic interface and conditioning systems, microgrids, and hybrid AC/DC grids. Among power electronic systems, back-to-back (BTB) converters can be a powerful interface to integrate microgrids and networked microgrids. To study the integration of such devices into large power systems, a balance between power…
▽ More
The power system is expected to evolve rapidly with the increasing deployment of power electronic interface and conditioning systems, microgrids, and hybrid AC/DC grids. Among power electronic systems, back-to-back (BTB) converters can be a powerful interface to integrate microgrids and networked microgrids. To study the integration of such devices into large power systems, a balance between power electronics model fidelity and system-level computational efficiency is critical. In system-level simulations of bulk power systems dominated by synchronous generators, detailed electromagnetic models of back-to-back converters may be unnecessary and also computationally inefficient. This paper focuses on develo** a simple phasor model for back-to-back converters that can be easily integrated into powerflow solvers to facilitate large-scale power system simulations. The model is implemented using C$^{++}$ language and integrated into GridLAB-D, an open source software for distribution systems studies, as a potential new capability. The GridLAB-D phasor domain model is validated against the electromagnetic transient (EMT) simulation of the detailed switching model. Simulation results show that the phasor model successfully captures the dominant dynamics of the converter with significantly shorter simulation elapsed time.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
Assessment of the Sparsity-Diversity Trade-offs in Active Users Detection for mMTC
Authors:
Gabriel Martins de Jesus,
Onel Luis Alcaraz Lopez,
Richard Demo Souza,
Nurul Huda Mahmood,
Markku Juntti,
Matti Latva-Aho
Abstract:
Wireless communication systems must increasingly support a multitude of machine-type communications (MTC) devices, thus calling for advanced strategies for active user detection (AUD). Recent literature has delved into AUD techniques based on compressed sensing, highlighting the critical role of signal sparsity. This study investigates the relationship between frequency diversity and signal sparsi…
▽ More
Wireless communication systems must increasingly support a multitude of machine-type communications (MTC) devices, thus calling for advanced strategies for active user detection (AUD). Recent literature has delved into AUD techniques based on compressed sensing, highlighting the critical role of signal sparsity. This study investigates the relationship between frequency diversity and signal sparsity in the AUD problem. Single-antenna users transmit multiple copies of non-orthogonal pilots across multiple frequency channels and the base station independently performs AUD in each channel using the orthogonal matching pursuit algorithm. We note that, although frequency diversity may improve the likelihood of successful reception of the signals, it may also damage the channel sparsity level, leading to important trade-offs. We show that a sparser signal significantly benefits AUD, surpassing the advantages brought by frequency diversity in scenarios with limited temporal resources and/or high numbers of receive antennas. Conversely, with longer pilots and fewer receive antennas, investing in frequency diversity becomes more impactful, resulting in a tenfold AUD performance improvement.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Malicious RIS versus Massive MIMO: Securing Multiple Access against RIS-based Jamming Attacks
Authors:
Arthur Sousa de Sena,
Jacek Kibilda,
Nurul Huda Mahmood,
André Gomes,
Matti Latva-aho
Abstract:
In this letter, we study an attack that leverages a reconfigurable intelligent surface (RIS) to induce harmful interference toward multiple users in massive multiple-input multiple-output (mMIMO) systems during the data transmission phase. We propose an efficient and flexible weighted-sum projected gradient-based algorithm for the attacker to optimize the RIS reflection coefficients without knowin…
▽ More
In this letter, we study an attack that leverages a reconfigurable intelligent surface (RIS) to induce harmful interference toward multiple users in massive multiple-input multiple-output (mMIMO) systems during the data transmission phase. We propose an efficient and flexible weighted-sum projected gradient-based algorithm for the attacker to optimize the RIS reflection coefficients without knowing legitimate user channels. To counter such a threat, we propose two reception strategies. Simulation results demonstrate that our malicious algorithm outperforms baseline strategies while offering adaptability for targeting specific users. At the same time, our results show that our mitigation strategies are effective even if only an imperfect estimate of the cascade RIS channel is available.
△ Less
Submitted 13 January, 2024;
originally announced January 2024.
-
Beyond Diagonal RIS for Multi-Band Multi-Cell MIMO Networks: A Practical Frequency-Dependent Model and Performance Analysis
Authors:
Arthur S. de Sena,
Mehdi Rasti,
Nurul H. Mahmood,
Matti Latva-aho
Abstract:
This paper delves into the unexplored frequency-dependent characteristics of beyond diagonal reconfigurable intelligent surfaces (BD-RISs). A generalized practical frequency-dependent reflection model is proposed as a fundamental framework for configuring fully-connected and group-connected RISs in a multi-band multi-base station (BS) multiple-input multiple-output (MIMO) network. Leveraging this…
▽ More
This paper delves into the unexplored frequency-dependent characteristics of beyond diagonal reconfigurable intelligent surfaces (BD-RISs). A generalized practical frequency-dependent reflection model is proposed as a fundamental framework for configuring fully-connected and group-connected RISs in a multi-band multi-base station (BS) multiple-input multiple-output (MIMO) network. Leveraging this practical model, multi-objective optimization strategies are formulated to maximize the received power at multiple users connected to different BSs, each operating under a distinct carrier frequency. By relying on matrix theory and exploiting the symmetric structure of the reflection matrices inherent to BD-RISs, relaxed tractable versions of the challenging problems are achieved for scenarios with obstructed and unobstructed direct channel links. The relaxed solutions are then combined with codebook-based approaches to configure the practical capacitance values for the BD-RISs. Simulation results reveal the frequency-dependent behaviors of different RIS architectures and demonstrate the effectiveness of the proposed schemes. Notably, BD-RISs exhibit high reflection performance across the intended frequency range, remarkably outperforming conventional single-connected RISs. Moreover, the proposed optimization approaches prove effective in enabling the targeted operation of BD-RISs across one or more carrier frequencies. The results also shed light on the potential for harmful interference in the absence of synchronization between RISs and adjacent BSs.
△ Less
Submitted 24 June, 2024; v1 submitted 12 January, 2024;
originally announced January 2024.
-
Code Swarm: A Code Generation Tool Based on the Automatic Derivation of Transformation Rule Set
Authors:
Hina Mahmood,
Atif Aftab Jilani,
Abdul Rauf
Abstract:
Automatic generation of software code from system design models remains an actively explored research area for the past several years. A number of tools are currently available to facilitate and automate the task of generating code from software models. To the best of our knowledge, existing software tools rely on an explicitly defined transformation rule set to perform the model-to-code transform…
▽ More
Automatic generation of software code from system design models remains an actively explored research area for the past several years. A number of tools are currently available to facilitate and automate the task of generating code from software models. To the best of our knowledge, existing software tools rely on an explicitly defined transformation rule set to perform the model-to-code transformation process. In this paper, we introduce a novel tool named Code Swarm, abbreviated as CodS, that automatically generates implementation code from system design models by utilizing a swarm-based approach. Specifically, CodS is capable of generating Java code from the class and state models of the software system by making use of the previously solved model-to-code transformation examples. Our tool enables the designers to specify behavioural actions in the input models using the Action Specification Language (ASL). We use an industrial case study of the Elevator Control System (ECS) to perform the experimental validation of our tool. Our results indicate that the code generated by CodS is correct and consistent with the input design models. CodS performs the process of automatic code generation without taking the explicit transformation rule set or languages metamodels information as input, which distinguishes it from all the existing automatic code generation tools.
△ Less
Submitted 3 December, 2023;
originally announced December 2023.
-
Transformer-based Model for Oral Epithelial Dysplasia Segmentation
Authors:
Adam J Shephard,
Hanya Mahmood,
Shan E Ahmed Raza,
Anna Luiza Damaceno Araujo,
Alan Roger Santos-Silva,
Marcio Ajudarte Lopes,
Pablo Agustin Vargas,
Kris McCombe,
Stephanie Craig,
Jacqueline James,
Jill Brooks,
Paul Nankivell,
Hisham Mehanna,
Syed Ali Khurram,
Nasir M Rajpoot
Abstract:
Oral epithelial dysplasia (OED) is a premalignant histopathological diagnosis given to lesions of the oral cavity. OED grading is subject to large inter/intra-rater variability, resulting in the under/over-treatment of patients. We developed a new Transformer-based pipeline to improve detection and segmentation of OED in haematoxylin and eosin (H&E) stained whole slide images (WSIs). Our model was…
▽ More
Oral epithelial dysplasia (OED) is a premalignant histopathological diagnosis given to lesions of the oral cavity. OED grading is subject to large inter/intra-rater variability, resulting in the under/over-treatment of patients. We developed a new Transformer-based pipeline to improve detection and segmentation of OED in haematoxylin and eosin (H&E) stained whole slide images (WSIs). Our model was trained on OED cases (n = 260) and controls (n = 105) collected using three different scanners, and validated on test data from three external centres in the United Kingdom and Brazil (n = 78). Our internal experiments yield a mean F1-score of 0.81 for OED segmentation, which reduced slightly to 0.71 on external testing, showing good generalisability, and gaining state-of-the-art results. This is the first externally validated study to use Transformers for segmentation in precancerous histology images. Our publicly available model shows great promise to be the first step of a fully-integrated pipeline, allowing earlier and more efficient OED diagnosis, ultimately benefiting patient outcomes.
△ Less
Submitted 9 November, 2023;
originally announced November 2023.
-
Clinical Decision Support System for Unani Medicine Practitioners
Authors:
Haider Sultan,
Hafiza Farwa Mahmood,
Noor Fatima,
Marriyam Nadeem,
Talha Waheed
Abstract:
Like other fields of Traditional Medicines, Unani Medicines have been found as an effective medical practice for ages. It is still widely used in the subcontinent, particularly in Pakistan and India. However, Unani Medicines Practitioners are lacking modern IT applications in their everyday clinical practices. An Online Clinical Decision Support System may address this challenge to assist apprenti…
▽ More
Like other fields of Traditional Medicines, Unani Medicines have been found as an effective medical practice for ages. It is still widely used in the subcontinent, particularly in Pakistan and India. However, Unani Medicines Practitioners are lacking modern IT applications in their everyday clinical practices. An Online Clinical Decision Support System may address this challenge to assist apprentice Unani Medicines practitioners in their diagnostic processes. The proposed system provides a web-based interface to enter the patient's symptoms, which are then automatically analyzed by our system to generate a list of probable diseases. The system allows practitioners to choose the most likely disease and inform patients about the associated treatment options remotely. The system consists of three modules: an Online Clinical Decision Support System, an Artificial Intelligence Inference Engine, and a comprehensive Unani Medicines Database. The system employs advanced AI techniques such as Decision Trees, Deep Learning, and Natural Language Processing. For system development, the project team used a technology stack that includes React, FastAPI, and MySQL. Data and functionality of the application is exposed using APIs for integration and extension with similar domain applications. The novelty of the project is that it addresses the challenge of diagnosing diseases accurately and efficiently in the context of Unani Medicines principles. By leveraging the power of technology, the proposed Clinical Decision Support System has the potential to ease access to healthcare services and information, reduce cost, boost practitioner and patient satisfaction, improve speed and accuracy of the diagnostic process, and provide effective treatments remotely. The application will be useful for Unani Medicines Practitioners, Patients, Government Drug Regulators, Software Developers, and Medical Researchers.
△ Less
Submitted 24 October, 2023;
originally announced October 2023.
-
Decomposition Based Interference Management Framework for Local 6G Networks
Authors:
Samitha Gunarathne,
Thushan Sivalingam,
Nurul Huda Mahmood,
Nandana Rajatheva,
Matti Latva-Aho
Abstract:
Managing inter-cell interference is among the major challenges in a wireless network, more so when strict quality of service needs to be guaranteed such as in ultra-reliable low latency communications (URLLC) applications. This study introduces a novel intelligent interference management framework for a local 6G network that allocates resources based on interference prediction. The proposed algori…
▽ More
Managing inter-cell interference is among the major challenges in a wireless network, more so when strict quality of service needs to be guaranteed such as in ultra-reliable low latency communications (URLLC) applications. This study introduces a novel intelligent interference management framework for a local 6G network that allocates resources based on interference prediction. The proposed algorithm involves an advanced signal pre-processing technique known as empirical mode decomposition followed by prediction of each decomposed component using the sequence-to-one transformer algorithm. The predicted interference power is then used to estimate future signal-to-interference plus noise ratio, and subsequently allocate resources to guarantee the high reliability required by URLLC applications. Finally, an interference cancellation scheme is explored based on the predicted interference signal with the transformer model. The proposed sequence-to-one transformer model exhibits its robustness for interference prediction. The proposed scheme is numerically evaluated against two baseline algorithms, and is found that the root mean squared error is reduced by up to 55% over a baseline scheme.
△ Less
Submitted 9 October, 2023;
originally announced October 2023.
-
A Fully Automated and Explainable Algorithm for the Prediction of Malignant Transformation in Oral Epithelial Dysplasia
Authors:
Adam J Shephard,
Raja Muhammad Saad Bashir,
Hanya Mahmood,
Mostafa Jahanifar,
Fayyaz Minhas,
Shan E Ahmed Raza,
Kris D McCombe,
Stephanie G Craig,
Jacqueline James,
Jill Brooks,
Paul Nankivell,
Hisham Mehanna,
Syed Ali Khurram,
Nasir M Rajpoot
Abstract:
Oral epithelial dysplasia (OED) is a premalignant histopathological diagnosis given to lesions of the oral cavity. Its grading suffers from significant inter-/intra- observer variability, and does not reliably predict malignancy progression, potentially leading to suboptimal treatment decisions. To address this, we developed a novel artificial intelligence algorithm that can assign an Oral Maligna…
▽ More
Oral epithelial dysplasia (OED) is a premalignant histopathological diagnosis given to lesions of the oral cavity. Its grading suffers from significant inter-/intra- observer variability, and does not reliably predict malignancy progression, potentially leading to suboptimal treatment decisions. To address this, we developed a novel artificial intelligence algorithm that can assign an Oral Malignant Transformation (OMT) risk score, based on histological patterns in the in Haematoxylin and Eosin stained whole slide images, to quantify the risk of OED progression. The algorithm is based on the detection and segmentation of nuclei within (and around) the epithelium using an in-house segmentation model. We then employed a shallow neural network fed with interpretable morphological/spatial features, emulating histological markers. We conducted internal cross-validation on our development cohort (Sheffield; n = 193 cases) followed by independent validation on two external cohorts (Birmingham and Belfast; n = 92 cases). The proposed OMTscore yields an AUROC = 0.74 in predicting whether an OED progresses to malignancy or not. Survival analyses showed the prognostic value of our OMTscore for predicting malignancy transformation, when compared to the manually-assigned WHO and binary grades. Analysis of the correctly predicted cases elucidated the presence of peri-epithelial and epithelium-infiltrating lymphocytes in the most predictive patches of cases that transformed (p < 0.0001). This is the first study to propose a completely automated algorithm for predicting OED transformation based on interpretable nuclear features, whilst being validated on external datasets. The algorithm shows better-than-human-level performance for prediction of OED malignant transformation and offers a promising solution to the challenges of grading OED in routine clinical practice.
△ Less
Submitted 6 July, 2023;
originally announced July 2023.
-
Predictive Resource Allocation for URLLC using Empirical Mode Decomposition
Authors:
Chandu Jayawardhana,
Thushan Sivalingam,
Nurul Huda Mahmood,
Nandana Rajatheva,
Matti Latva-Aho
Abstract:
Effective resource allocation is a crucial requirement to achieve the stringent performance targets of ultra-reliable low-latency communication (URLLC) services. Predicting future interference and utilizing it to design efficient interference management algorithms is one way to allocate resources for URLLC services effectively. This paper proposes an empirical mode decomposition (EMD) based hybrid…
▽ More
Effective resource allocation is a crucial requirement to achieve the stringent performance targets of ultra-reliable low-latency communication (URLLC) services. Predicting future interference and utilizing it to design efficient interference management algorithms is one way to allocate resources for URLLC services effectively. This paper proposes an empirical mode decomposition (EMD) based hybrid prediction method to predict the interference and allocate resources for downlink based on the prediction results. EMD is used to decompose the past interference values faced by the user equipment. Long short-term memory and auto-regressive integrated moving average methods are used to predict the decomposed components. The final predicted interference value is reconstructed using individual predicted values of decomposed components. It is found that such a decomposition-based prediction method reduces the root mean squared error of the prediction by $20 - 25\%$. The proposed resource allocation algorithm utilizing the EMD-based interference prediction was found to meet near-optimal allocation of resources and correspondingly results in $2-3$ orders of magnitude lower outage compared to state-of-the-art baseline prediction algorithm-based resource allocation.
△ Less
Submitted 4 April, 2023;
originally announced April 2023.
-
Multi-UAV Path Learning for Age and Power Optimization in IoT with UAV Battery Recharge
Authors:
Eslam Eldeeb,
Jean Michel de Souza Sant'Ana,
Dian Echevarría Pérez,
Mohammad Shehab,
Nurul Huda Mahmood,
Hirley Alves
Abstract:
In many emerging Internet of Things (IoT) applications, the freshness of the is an important design criterion. Age of Information (AoI) quantifies the freshness of the received information or status update. This work considers a setup of deployed IoT devices in an IoT network; multiple unmanned aerial vehicles (UAVs) serve as mobile relay nodes between the sensors and the base station. We formulat…
▽ More
In many emerging Internet of Things (IoT) applications, the freshness of the is an important design criterion. Age of Information (AoI) quantifies the freshness of the received information or status update. This work considers a setup of deployed IoT devices in an IoT network; multiple unmanned aerial vehicles (UAVs) serve as mobile relay nodes between the sensors and the base station. We formulate an optimization problem to jointly plan the UAVs' trajectory, while minimizing the AoI of the received messages and the devices' energy consumption. The solution accounts for the UAVs' battery lifetime and flight time to recharging depots to ensure the UAVs' green operation. The complex optimization problem is efficiently solved using a deep reinforcement learning algorithm. In particular, we propose a deep Q-network, which works as a function approximation to estimate the state-action value function. The proposed scheme is quick to converge and results in a lower ergodic age and ergodic energy consumption when compared with benchmark algorithms such as greedy algorithm (GA), nearest neighbour (NN), and random-walk (RW).
△ Less
Submitted 9 January, 2023;
originally announced January 2023.
-
Reconfigurable Intelligent Surfaces: The New Frontier of Next G Security
Authors:
Jacek Kibilda,
Nurul H. Mahmood,
André Gomes,
Matti Latva-aho,
Luiz A. DaSilva
Abstract:
RIS is one of the significant technological advancements that will mark next-generation wireless. RIS technology also opens up the possibility of new security threats, since the reflection of im**ing signals can be used for malicious purposes. This article introduces the basic concept for a RIS-assisted attack that re-uses the legitimate signal towards a malicious objective. Specific attacks are…
▽ More
RIS is one of the significant technological advancements that will mark next-generation wireless. RIS technology also opens up the possibility of new security threats, since the reflection of im**ing signals can be used for malicious purposes. This article introduces the basic concept for a RIS-assisted attack that re-uses the legitimate signal towards a malicious objective. Specific attacks are identified from this base scenario, and the RIS-assisted signal cancellation attack is selected for evaluation as an attack that inherently exploits RIS capabilities. The key takeaway from the evaluation is that an effective attack requires accurate channel information, a RIS deployed in a favorable location (from the point of view of the attacker), and it disproportionately affects legitimate links that already suffer from reduced path loss. These observations motivate specific security solutions and recommendations for future work.
△ Less
Submitted 9 December, 2022;
originally announced December 2022.
-
A Learning-Based Trajectory Planning of Multiple UAVs for AoI Minimization in IoT Networks
Authors:
Eslam Eldeeb,
Dian Echevarría Pérez,
Jean Michel de Souza Sant'Ana,
Mohammad Shehab,
Nurul Huda Mahmood,
Hirley Alves,
Matti Latva-aho
Abstract:
Many emerging Internet of Things (IoT) applications rely on information collected by sensor nodes where the freshness of information is an important criterion. \textit{Age of Information} (AoI) is a metric that quantifies information timeliness, i.e., the freshness of the received information or status update. This work considers a setup of deployed sensors in an IoT network, where multiple unmann…
▽ More
Many emerging Internet of Things (IoT) applications rely on information collected by sensor nodes where the freshness of information is an important criterion. \textit{Age of Information} (AoI) is a metric that quantifies information timeliness, i.e., the freshness of the received information or status update. This work considers a setup of deployed sensors in an IoT network, where multiple unmanned aerial vehicles (UAVs) serve as mobile relay nodes between the sensors and the base station. We formulate an optimization problem to jointly plan the UAVs' trajectory, while minimizing the AoI of the received messages. This ensures that the received information at the base station is as fresh as possible. The complex optimization problem is efficiently solved using a deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network, which works as a function approximation to estimate the state-action value function. The proposed scheme is quick to converge and results in a lower AoI than the random walk scheme. Our proposed algorithm reduces the average age by approximately $25\%$ and requires down to $50\%$ less energy when compared to the baseline scheme.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
Towards Effective Multi-Label Recognition Attacks via Knowledge Graph Consistency
Authors:
Hassan Mahmood,
Ehsan Elhamifar
Abstract:
Many real-world applications of image recognition require multi-label learning, whose goal is to find all labels in an image. Thus, robustness of such systems to adversarial image perturbations is extremely important. However, despite a large body of recent research on adversarial attacks, the scope of the existing works is mainly limited to the multi-class setting, where each image contains a sin…
▽ More
Many real-world applications of image recognition require multi-label learning, whose goal is to find all labels in an image. Thus, robustness of such systems to adversarial image perturbations is extremely important. However, despite a large body of recent research on adversarial attacks, the scope of the existing works is mainly limited to the multi-class setting, where each image contains a single label. We show that the naive extensions of multi-class attacks to the multi-label setting lead to violating label relationships, modeled by a knowledge graph, and can be detected using a consistency verification scheme. Therefore, we propose a graph-consistent multi-label attack framework, which searches for small image perturbations that lead to misclassifying a desired target set while respecting label hierarchies. By extensive experiments on two datasets and using several multi-label recognition models, we show that our method generates extremely successful attacks that, unlike naive multi-label perturbations, can produce model predictions consistent with the knowledge graph.
△ Less
Submitted 11 July, 2022;
originally announced July 2022.
-
A Functional Architecture for 6G Special Purpose Industrial IoT Networks
Authors:
{Nurul Huda Mahmood,
Gilberto Berardinelli,
Emil J. Khatib,
Ramin Hashemi,
Carlos de Lima,
Matti Latva-aho
Abstract:
Future industrial applications will encompass compelling new use cases requiring stringent performance guarantees over multiple key performance indicators (KPI) such as reliability, dependability, latency, time synchronization, security, etc. Achieving such stringent and diverse service requirements necessitates the design of a special-purpose Industrial Internet of Things (IIoT) network comprisin…
▽ More
Future industrial applications will encompass compelling new use cases requiring stringent performance guarantees over multiple key performance indicators (KPI) such as reliability, dependability, latency, time synchronization, security, etc. Achieving such stringent and diverse service requirements necessitates the design of a special-purpose Industrial Internet of Things (IIoT) network comprising a multitude of specialized functionalities and technological enablers. This article proposes an innovative architecture for such a special-purpose 6G IIoT network incorporating seven functional building blocks categorized into: special-purpose functionalities and enabling technologies. The former consists of Wireless Environment Control, Traffic/Channel Prediction, Proactive Resource Management and End-to-End Optimization functions; whereas the latter includes Synchronization and Coordination, Machine Learning and Artificial Intelligence Algorithms, and Auxiliary Functions. The proposed architecture aims at providing a resource-efficient and holistic solution for the complex and dynamically challenging requirements imposed by future 6G industrial use cases. Selected test scenarios are provided and assessed to illustrate cross-functional collaboration and demonstrate the applicability of the proposed architecture in a wireless IIoT network.
△ Less
Submitted 1 July, 2022;
originally announced July 2022.
-
Operator Deformations and T-duality via Parallel Transport
Authors:
Hasan Mahmood,
R. A. Reid-Edwards
Abstract:
We consider deformations of CFTs from the perspective of parallel transport in moduli space. In particular, we show how the deformations of individual operators can be computed and we also explore how these ideas can be extended to more general QFTs lacking conformal symmetry. We explore how to write one theory in terms of operators defined in a nearby theory, related to the first by a parallel tr…
▽ More
We consider deformations of CFTs from the perspective of parallel transport in moduli space. In particular, we show how the deformations of individual operators can be computed and we also explore how these ideas can be extended to more general QFTs lacking conformal symmetry. We explore how to write one theory in terms of operators defined in a nearby theory, related to the first by a parallel transport in theory space. Using this construction, we describe how T-duality can be realised and how this provides a different perspective from the usual Buscher construction.
△ Less
Submitted 30 May, 2022;
originally announced May 2022.
-
Joint Sum Rate and Blocklength Optimization in RIS-aided Short Packet URLLC Systems
Authors:
Ramin Hashemi,
Samad Ali,
Nurul Huda Mahmood,
Matti Latva-aho
Abstract:
In this paper, a multi-objective optimization problem (MOOP) is proposed for maximizing the achievable finite blocklength (FBL) rate while minimizing the utilized channel blocklengths (CBLs) in a reconfigurable intelligent surface (RIS)-assisted short packet communication system. The formulated MOOP has two objective functions namely maximizing the total FBL rate with a target error probability, a…
▽ More
In this paper, a multi-objective optimization problem (MOOP) is proposed for maximizing the achievable finite blocklength (FBL) rate while minimizing the utilized channel blocklengths (CBLs) in a reconfigurable intelligent surface (RIS)-assisted short packet communication system. The formulated MOOP has two objective functions namely maximizing the total FBL rate with a target error probability, and minimizing the total utilized CBLs which is directly proportional to the transmission duration. The considered MOOP variables are the base station (BS) transmit power, number of CBLs, and passive beamforming at the RIS. Since the proposed non-convex problem is intractable to solve, the Tchebyshev method is invoked to transform it into a single-objective OP, then the alternating optimization (AO) technique is employed to iteratively obtain optimized parameters in three main sub-problems. The numerical results show a fundamental trade-off between maximizing the achievable rate in the FBL regime and reducing the transmission duration. Also, the applicability of RIS technology is emphasized in reducing the utilized CBLs while increasing the achievable rate significantly.
△ Less
Submitted 2 June, 2022; v1 submitted 28 April, 2022;
originally announced April 2022.
-
An Adaptive Benchmark for Modeling User Exploration of Large Datasets
Authors:
Joanna Purich,
Hira Mahmood,
Diana Chou,
Chidi Udeze,
Leilani Battle
Abstract:
Interactive analysis systems provide efficient and accessible means by which users of varying technical experience can comfortably manipulate and analyze data using interactive widgets. Widgets are elements of interaction within a user interface (e.g. scrollbar, button, etc). Interactions with these widgets produce database queries whose results determine the subsequent changes made to the current…
▽ More
Interactive analysis systems provide efficient and accessible means by which users of varying technical experience can comfortably manipulate and analyze data using interactive widgets. Widgets are elements of interaction within a user interface (e.g. scrollbar, button, etc). Interactions with these widgets produce database queries whose results determine the subsequent changes made to the current visualization made by the user. In this paper, we present a tool that extends IDEBench to ingest visualization interfaces and a dataset, and estimate the expected database load that would be generated by real users. Our tool analyzes the interactive capabilities of the visualization and creates the queries that support the various interactions. We began with a proof of concept implementation of every interaction widget, which led us to define three distinct sets of query templates that can support all interactions. We then show that these templates can be layered to imitate various interfaces and tailored to any dataset. Secondly, we simulate how users would interact with the proposed interface and report on the strain that such use would place on the database management system.
△ Less
Submitted 5 May, 2023; v1 submitted 29 March, 2022;
originally announced March 2022.
-
Deep Learning-Based Blind Multiple User Detection for Grant-free SCMA and MUSA Systems
Authors:
Thushan Sivalingam,
Samad Ali,
Nurul Huda Mahmood,
Nandana Rajatheva,
Matti Latva Aho
Abstract:
Massive machine-type communications (mMTC) in 6G requires supporting a massive number of devices with limited resources, posing challenges in efficient random access. Grant-free random access and uplink non-orthogonal multiple access (NOMA) are introduced to increase the overload factor and reduce transmission latency with signaling overhead in mMTC. Sparse code multiple access (SCMA) and Multi-us…
▽ More
Massive machine-type communications (mMTC) in 6G requires supporting a massive number of devices with limited resources, posing challenges in efficient random access. Grant-free random access and uplink non-orthogonal multiple access (NOMA) are introduced to increase the overload factor and reduce transmission latency with signaling overhead in mMTC. Sparse code multiple access (SCMA) and Multi-user shared access (MUSA) are introduced as advanced code domain NOMA schemes. In grant-free NOMA, machine-type devices (MTD) transmit information to the base station (BS) without a grant, creating a challenging task for the BS to identify the active MTD among all potential active devices. In this paper, a novel pre-activated residual neural network-based multi-user detection (MUD) scheme for the grant-free SCMA and MUSA system in an mMTC uplink framework is proposed to jointly identify the number of active MTDs and their respective messages in the received signal's sparsity and the active MTDs in the absence of channel state information. A novel residual unit designed to learn the properties of multi-dimensional SCMA codebooks, MUSA spreading sequences, and corresponding combinations of active devices with diverse settings. The proposed scheme learns from the labeled dataset of the received signal and identifies the active MTDs from the received signal without any prior knowledge of the device sparsity level. A calibration curve is evaluated to verify the model's calibration. The application of the proposed MUD scheme is investigated in an indoor factory setting using four different mmWave channel models. Numerical results show that when the number of active MTDs in the system is large, the proposed MUD has a significantly higher probability of detection compared to existing approaches over the signal-to-noise ratio range of interest.
△ Less
Submitted 31 May, 2023; v1 submitted 11 March, 2022;
originally announced March 2022.
-
Interference Aware Cooperative Routing for Edge Computing-enabled 5G Networks
Authors:
Abdullah Waqas,
Hasan Mahmood,
Nasir Saeed
Abstract:
Recently, there has been growing research on develo** interference-aware routing (IAR) protocols for supporting multiple concurrent transmission in next-generation wireless communication systems. The existing IAR protocols do not consider node cooperation while establishing the routes because motivating the nodes to cooperate and modeling that cooperation is not a trivial task. In addition, the…
▽ More
Recently, there has been growing research on develo** interference-aware routing (IAR) protocols for supporting multiple concurrent transmission in next-generation wireless communication systems. The existing IAR protocols do not consider node cooperation while establishing the routes because motivating the nodes to cooperate and modeling that cooperation is not a trivial task. In addition, the information about the cooperative behavior of a node is not directly visible to neighboring nodes. Therefore, in this paper, we develop a new routing method in which the nodes' cooperation information is utilized to improve the performance of edge computing-enabled 5G networks. The proposed metric is a function of created and received interference in the network. The received interference term ensures that the Signal to Interference plus Noise Ratio (SINR) at the route remains above the threshold value, while the created interference term ensures that those nodes are selected to forward the packet that creates low interference for other nodes. The results show that the proposed solution improves ad hoc networks' performance compared to conventional routing protocols in terms of high network throughput and low outage probability.
△ Less
Submitted 5 January, 2022;
originally announced January 2022.
-
A Nonlinear Autoregressive Neural Network for Interference Prediction and Resource Allocation in URLLC Scenarios
Authors:
Christian Padilla,
Ramin Hashemi,
Nurul Huda Mahmood,
Matti Latva-aho
Abstract:
Ultra reliable low latency communications (URLLC) is a new service class introduced in 5G which is characterized by strict reliability $(1-10^{-5})$ and low latency requirements (1 ms). To meet these requisites, several strategies like overprovisioning of resources and channel-predictive algorithms have been developed. This paper describes the application of a Nonlinear Autoregressive Neural Netwo…
▽ More
Ultra reliable low latency communications (URLLC) is a new service class introduced in 5G which is characterized by strict reliability $(1-10^{-5})$ and low latency requirements (1 ms). To meet these requisites, several strategies like overprovisioning of resources and channel-predictive algorithms have been developed. This paper describes the application of a Nonlinear Autoregressive Neural Network (NARNN) as a novel approach to forecast interference levels in a wireless system for the purpose of efficient resource allocation. Accurate interference forecasts also grant the possibility of meeting specific outage probability requirements in URLLC scenarios. Performance of this proposal is evaluated upon the basis of NARNN predictions accuracy and system resource usage. Our proposed approach achieved a promising mean absolute percentage error of 7.8 % on interference predictions and also reduced the resource usage in up to 15 % when compared to a recently proposed interference prediction algorithm.
△ Less
Submitted 28 November, 2021;
originally announced November 2021.
-
Deep Reinforcement Learning for Practical Phase Shift Optimization in RIS-aided MISO URLLC Systems
Authors:
Ramin Hashemi,
Samad Ali,
Nurul Huda Mahmood,
Matti Latva-aho
Abstract:
We study the joint active/passive beamforming and channel blocklength (CBL) allocation in a non-ideal reconfigurable intelligent surface (RIS)-aided ultra-reliable and low-latency communication (URLLC) system. The considered scenario is a finite blocklength (FBL) regime and the problem is solved by leveraging a novel deep reinforcement learning (DRL) algorithm named twin-delayed deep deterministic…
▽ More
We study the joint active/passive beamforming and channel blocklength (CBL) allocation in a non-ideal reconfigurable intelligent surface (RIS)-aided ultra-reliable and low-latency communication (URLLC) system. The considered scenario is a finite blocklength (FBL) regime and the problem is solved by leveraging a novel deep reinforcement learning (DRL) algorithm named twin-delayed deep deterministic policy gradient (TD3). First, assuming an industrial automation system with multiple actuators, the signal-to-interference-plus-noise ratio and achievable rate in the FBL regime are identified for each actuator in terms of the phase shift configuration matrix at the RIS. Next, the joint active/passive beamforming and CBL optimization problem is formulated where the objective is to maximize the total achievable FBL rate in all actuators, subject to non-linear amplitude response at the RIS elements, BS transmit power budget, and total available CBL. Since the amplitude response equality constraint is highly non-convex and non-linear, we resort to employing an actor-critic policy gradient DRL algorithm based on TD3. The considered method relies on interacting RIS with the industrial automation environment by taking actions which are the phase shifts at the RIS elements, CBL variables, and BS beamforming to maximize the expected observed reward, i.e., the total FBL rate. We assess the performance loss of the system when the RIS is non-ideal, i.e., with non-linear amplitude response, and compare it with ideal RIS without impairments. The numerical results show that optimizing the RIS phase shifts, BS beamforming, and CBL variables via the proposed TD3 method is highly beneficial to improving the network total FBL rate as the proposed method with deterministic policy outperforms conventional methods.
△ Less
Submitted 19 April, 2022; v1 submitted 16 October, 2021;
originally announced October 2021.
-
Simultaneous Nuclear Instance and Layer Segmentation in Oral Epithelial Dysplasia
Authors:
Adam J. Shephard,
Simon Graham,
R. M. Saad Bashir,
Mostafa Jahanifar,
Hanya Mahmood,
Syed Ali Khurram,
Nasir M. Rajpoot
Abstract:
Oral epithelial dysplasia (OED) is a pre-malignant histopathological diagnosis given to lesions of the oral cavity. Predicting OED grade or whether a case will transition to malignancy is critical for early detection and appropriate treatment. OED typically begins in the lower third of the epithelium before progressing upwards with grade severity, thus we have suggested that segmenting intra-epith…
▽ More
Oral epithelial dysplasia (OED) is a pre-malignant histopathological diagnosis given to lesions of the oral cavity. Predicting OED grade or whether a case will transition to malignancy is critical for early detection and appropriate treatment. OED typically begins in the lower third of the epithelium before progressing upwards with grade severity, thus we have suggested that segmenting intra-epithelial layers, in addition to individual nuclei, may enable researchers to evaluate important layer-specific morphological features for grade/malignancy prediction. We present HoVer-Net+, a deep learning framework to simultaneously segment (and classify) nuclei and (intra-)epithelial layers in H&E stained slides from OED cases. The proposed architecture consists of an encoder branch and four decoder branches for simultaneous instance segmentation of nuclei and semantic segmentation of the epithelial layers. We show that the proposed model achieves the state-of-the-art (SOTA) performance in both tasks, with no additional costs when compared to previous SOTA methods for each task. To the best of our knowledge, ours is the first method for simultaneous nuclear instance segmentation and semantic tissue segmentation, with potential for use in computational pathology for other similar simultaneous tasks and for future studies into malignancy prediction.
△ Less
Submitted 1 September, 2021; v1 submitted 31 August, 2021;
originally announced August 2021.
-
Beyond 5G URLLC Evolution: New Service Modes and Practical Considerations
Authors:
Hirley Alves,
Gweon Do Jo,
JaeSheung Shin,
Choongil Yeh,
Nurul Huda Mahmood,
Carlos Lima,
Chanho Yoon,
Nandana Rahatheva,
Ok-Sun Park,
Seokki Kim,
Eunah Kim,
Ville Niemelä,
Hyeon Woo Lee,
Ari Pouttu,
Hyun Kyu Chung,
Matti Latva-aho
Abstract:
Ultra-reliable low latency communications (URLLC) arose to serve industrial IoT (IIoT) use cases within the 5G. Currently, it has inherent limitations to support future services. Based on state-of-the-art research and practical deployment experience, in this article, we introduce and advocate for three variants: broadband, scalable and extreme URLLC. We discuss use cases and key performance indica…
▽ More
Ultra-reliable low latency communications (URLLC) arose to serve industrial IoT (IIoT) use cases within the 5G. Currently, it has inherent limitations to support future services. Based on state-of-the-art research and practical deployment experience, in this article, we introduce and advocate for three variants: broadband, scalable and extreme URLLC. We discuss use cases and key performance indicators and identify technology enablers for the new service modes. We bring practical considerations from the IIoT testbed and provide an outlook toward some new research directions.
△ Less
Submitted 16 June, 2022; v1 submitted 7 June, 2021;
originally announced June 2021.
-
Deep Neural Network-Based Blind Multiple User Detection for Grant-free Multi-User Shared Access
Authors:
Thushan Sivalingam,
Samad Ali,
Nurul Huda Mahmood,
Nandana Rajatheva,
Matti Latva-Aho
Abstract:
Multi-user shared access (MUSA) is introduced as advanced code domain non-orthogonal complex spreading sequences to support a massive number of machine-type communications (MTC) devices. In this paper, we propose a novel deep neural network (DNN)-based multiple user detection (MUD) for grant-free MUSA systems. The DNN-based MUD model determines the structure of the sensing matrix, randomly distrib…
▽ More
Multi-user shared access (MUSA) is introduced as advanced code domain non-orthogonal complex spreading sequences to support a massive number of machine-type communications (MTC) devices. In this paper, we propose a novel deep neural network (DNN)-based multiple user detection (MUD) for grant-free MUSA systems. The DNN-based MUD model determines the structure of the sensing matrix, randomly distributed noise, and inter-device interference during the training phase of the model by several hidden nodes, neuron activation units, and a fit loss function. The thoroughly learned DNN model is capable of distinguishing the active devices of the received signal without any a priori knowledge of the device sparsity level and the channel state information. Our numerical evaluation shows that with a higher percentage of active devices, the DNN-MUD achieves a significantly increased probability of detection compared to the conventional approaches.
△ Less
Submitted 21 June, 2021;
originally announced June 2021.
-
Deep Learning-Based Active User Detection for Grant-free SCMA Systems
Authors:
Thushan Sivalingam,
Samad Ali,
Nurul Huda Mahmood,
Nandana Rajatheva,
Matti Latva-Aho
Abstract:
Grant-free random access and uplink non-orthogonal multiple access (NOMA) have been introduced to reduce transmission latency and signaling overhead in massive machine-type communication (mMTC). In this paper, we propose two novel group-based deep neural network active user detection (AUD) schemes for the grant-free sparse code multiple access (SCMA) system in mMTC uplink framework. The proposed A…
▽ More
Grant-free random access and uplink non-orthogonal multiple access (NOMA) have been introduced to reduce transmission latency and signaling overhead in massive machine-type communication (mMTC). In this paper, we propose two novel group-based deep neural network active user detection (AUD) schemes for the grant-free sparse code multiple access (SCMA) system in mMTC uplink framework. The proposed AUD schemes learn the nonlinear map**, i.e., multi-dimensional codebook structure and the channel characteristic. This is accomplished through the received signal which incorporates the sparse structure of device activity with the training dataset. Moreover, the offline pre-trained model is able to detect the active devices without any channel state information and prior knowledge of the device sparsity level. Simulation results show that with several active devices, the proposed schemes obtain more than twice the probability of detection compared to the conventional AUD schemes over the signal to noise ratio range of interest.
△ Less
Submitted 21 June, 2021;
originally announced June 2021.
-
Average Rate Analysis of RIS-aided Short Packet Communication in URLLC Systems
Authors:
Ramin Hashemi,
Samad Ali,
Nurul Huda Mahmood,
Matti Latva-aho
Abstract:
In this paper, the average achievable rate of a re-configurable intelligent surface (RIS) aided factory automation is investigated in finite blocklength (FBL) regime. First, the composite channel containing the direct path plus the product of reflected paths through the RIS is characterized. Then, the distribution of the received signal-to-noise ratio (SNR) is matched to a Gamma random variable wh…
▽ More
In this paper, the average achievable rate of a re-configurable intelligent surface (RIS) aided factory automation is investigated in finite blocklength (FBL) regime. First, the composite channel containing the direct path plus the product of reflected paths through the RIS is characterized. Then, the distribution of the received signal-to-noise ratio (SNR) is matched to a Gamma random variable whose parameters depend on the total number of RIS elements as well as the channel pathloss. Next, by assuming FBL model, the achievable rate expression is identified and the corresponding average rate is elaborated based on the proposed SNR distribution. The phase error due to quantizing the phase shifts is considered in the simulation. The numerical results show that Monte Carlo simulations conform to the matched Gamma distribution for the received SNR for large number of RIS elements. In addition, the system reliability indicated by the tightness of the SNR distribution increases when RIS is leveraged particularly when only the reflected channel exists. This highlights the advantages of RIS-aided communications for ultra-reliable low-latency communications (URLLC) systems. The reduction of average achievable rate due to working in FBL regime with respect to Shannon capacity is also investigated as a function of total RIS elements.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Average Rate and Error Probability Analysis in Short Packet Communications over RIS-aided URLLC Systems
Authors:
Ramin Hashemi,
Samad Ali,
Nurul Huda Mahmood,
Matti Latva-aho
Abstract:
In this paper, the average achievable rate and error probability of a reconfigurable intelligent surface (RIS) aided systems is investigated for the finite blocklength (FBL) regime. The performance loss due to the presence of phase errors arising from limited quantization levels as well as hardware impairments at the RIS elements is also discussed. First, the composite channel containing the direc…
▽ More
In this paper, the average achievable rate and error probability of a reconfigurable intelligent surface (RIS) aided systems is investigated for the finite blocklength (FBL) regime. The performance loss due to the presence of phase errors arising from limited quantization levels as well as hardware impairments at the RIS elements is also discussed. First, the composite channel containing the direct path plus the product of reflected channels through the RIS is characterized. Then, the distribution of the received signal-to-noise ratio (SNR) is matched to a Gamma random variable whose parameters depend on the total number of RIS elements, phase errors and the channels' path loss. Next, by considering the FBL regime, the achievable rate expression and error probability are identified and the corresponding average rate and average error probability are elaborated based on the proposed SNR distribution. Furthermore, the impact of the presence of phase error due to either limited quantization levels or hardware impairments on the average rate and error probability is discussed. The numerical results show that Monte Carlo simulations conform to matched Gamma distribution to received SNR for sufficiently large number of RIS elements. In addition, the system reliability indicated by the tightness of the SNR distribution increases when RIS is leveraged particularly when only the reflected channel exists. This highlights the advantages of RIS-aided communications for ultra-reliable and low-latency systems. The difference between Shannon capacity and achievable rate in FBL regime is also discussed. Additionally, the required number of RIS elements to achieve a desired error probability in the FBL regime will be significantly reduced when the phase shifts are performed without error.
△ Less
Submitted 13 July, 2021; v1 submitted 26 February, 2021;
originally announced February 2021.
-
Characterization and Newton Complementary Dual of Quasi $f$-Ideals
Authors:
F. U. Rehman,
H. Hasan,
H. Mahmood,
M. A. Binyamin
Abstract:
The notion of quasi $f$-ideals was first presented in $[14]$ which generalize the idea of $f$-ideals. In this paper, we give the complete characterization of quasi $f$-ideals of degree greater or equal to $2$. Additionally, we show that the property of being quasi $f$-ideals remains the same after taking the Newton complementary dual of a squarefree monomial ideal $I$ provided that the minimal gen…
▽ More
The notion of quasi $f$-ideals was first presented in $[14]$ which generalize the idea of $f$-ideals. In this paper, we give the complete characterization of quasi $f$-ideals of degree greater or equal to $2$. Additionally, we show that the property of being quasi $f$-ideals remains the same after taking the Newton complementary dual of a squarefree monomial ideal $I$ provided that the minimal generating set of $I$ is perfect.
△ Less
Submitted 5 January, 2021;
originally announced January 2021.
-
Classification of Planar Graphs Associated to the Ideal of the Numerical Semigroup
Authors:
Muhammad Ahsan Binyamin,
Wajid Ali,
Adnan Aslam,
Hasan Mahmood
Abstract:
Let $Λ$ be a numerical semigroup and $I\subset Λ$ be an ideal of $Λ$. The graph $G_I(Λ)$ assigned to an ideal $I$ of $Λ$ is a graph with elements of $(Λ\setminus I)^*$ as vertices and any two vertices $x,y$ are adjacent if and only if $x+y \in I$. In this paper we give a complete characterization (up to isomorphism ) of the graph $G_I(Λ)$ to be planar, where $I$ is an irreducible ideal of $Λ$. Thi…
▽ More
Let $Λ$ be a numerical semigroup and $I\subset Λ$ be an ideal of $Λ$. The graph $G_I(Λ)$ assigned to an ideal $I$ of $Λ$ is a graph with elements of $(Λ\setminus I)^*$ as vertices and any two vertices $x,y$ are adjacent if and only if $x+y \in I$. In this paper we give a complete characterization (up to isomorphism ) of the graph $G_I(Λ)$ to be planar, where $I$ is an irreducible ideal of $Λ$. This will finally characterize non planar graphs $G_I(Λ)$ corresponding to irreducible ideal $I$.
△ Less
Submitted 18 December, 2020;
originally announced December 2020.
-
Density of $f$-ideals and $f$-ideals in mixed small degrees
Authors:
Huy TÀi HÀ,
Graham Keiper,
Hasan Mahmood,
Jonathan L. O'Rourke
Abstract:
A squarefree monomial ideal is called an $f$-ideal if its Stanley-Reisner and facet simplicial complexes have the same $f$-vector. We show that $f$-ideals generated in a fixed degree have asymptotic density zero when the number of variables goes to infinity. We also provide novel algorithms to construct $f$-ideals generated in small degrees.
A squarefree monomial ideal is called an $f$-ideal if its Stanley-Reisner and facet simplicial complexes have the same $f$-vector. We show that $f$-ideals generated in a fixed degree have asymptotic density zero when the number of variables goes to infinity. We also provide novel algorithms to construct $f$-ideals generated in small degrees.
△ Less
Submitted 5 November, 2020;
originally announced November 2020.
-
Torus Bundles, Automorphisms and T-Duality
Authors:
Hasan Mahmood,
R. A. Reid-Edwards
Abstract:
We reconsider some older constructions of T-duality, based on automorphisms of the worldsheet operator algebra, in a modern context. It has been long known that at special points in the moduli space of torus compactifications, the target space gauge symmetry may be enhanced. Away from such points the symmetry is broken and T-duality may be understood as a residual discrete gauge symmetry that surv…
▽ More
We reconsider some older constructions of T-duality, based on automorphisms of the worldsheet operator algebra, in a modern context. It has been long known that at special points in the moduli space of torus compactifications, the target space gauge symmetry may be enhanced. Away from such points the symmetry is broken and T-duality may be understood as a residual discrete gauge symmetry that survives this breaking. Drawing on work on connections over the space of string backgrounds, we discuss how to generalise this framework for T-duality to geometric and non-geometric backgrounds that are not full solutions of string theory, but may play an important role in exact backgrounds. Along the way we find an interesting algebraic structure and discuss its relationship with doubled geometry. We comment on non-isometric T-duality in this context.
△ Less
Submitted 2 April, 2021; v1 submitted 27 October, 2020;
originally announced October 2020.
-
Exploring Intensity Invariance in Deep Neural Networks for Brain Image Registration
Authors:
Hassan Mahmood,
Asim Iqbal,
Syed Mohammed Shamsul Islam
Abstract:
Image registration is a widely-used technique in analysing large scale datasets that are captured through various imaging modalities and techniques in biomedical imaging such as MRI, X-Rays, etc. These datasets are typically collected from various sites and under different imaging protocols using a variety of scanners. Such heterogeneity in the data collection process causes inhomogeneity or varia…
▽ More
Image registration is a widely-used technique in analysing large scale datasets that are captured through various imaging modalities and techniques in biomedical imaging such as MRI, X-Rays, etc. These datasets are typically collected from various sites and under different imaging protocols using a variety of scanners. Such heterogeneity in the data collection process causes inhomogeneity or variation in intensity (brightness) and noise distribution. These variations play a detrimental role in the performance of image registration, segmentation and detection algorithms. Classical image registration methods are computationally expensive but are able to handle these artifacts relatively better. However, deep learning-based techniques are shown to be computationally efficient for automated brain registration but are sensitive to the intensity variations. In this study, we investigate the effect of variation in intensity distribution among input image pairs for deep learning-based image registration methods. We find a performance degradation of these models when brain image pairs with different intensity distribution are presented even with similar structures. To overcome this limitation, we incorporate a structural similarity-based loss function in a deep neural network and test its performance on the validation split separated before training as well as on a completely unseen new dataset. We report that the deep learning models trained with structure similarity-based loss seems to perform better for both datasets. This investigation highlights a possible performance limiting factor in deep learning-based registration models and suggests a potential solution to incorporate the intensity distribution variation in the input image pairs. Our code and models are available at https://github.com/hassaanmahmood/DeepIntense.
△ Less
Submitted 21 September, 2020;
originally announced September 2020.
-
A Predictive Interference Management Algorithm for URLLC in Beyond 5G Networks
Authors:
Nurul Huda Mahmood,
Onel Alcaraz Lopez,
Hirley Alves,
Matti Latva-aho
Abstract:
Interference mitigation is a major design challenge in wireless systems,especially in the context of ultra-reliable low-latency communication (URLLC) services. Conventional average-based interference management schemes are not suitable for URLLC as they do not accurately capture the tail information of the interference distribution. This letter proposes a novel interference prediction algorithm th…
▽ More
Interference mitigation is a major design challenge in wireless systems,especially in the context of ultra-reliable low-latency communication (URLLC) services. Conventional average-based interference management schemes are not suitable for URLLC as they do not accurately capture the tail information of the interference distribution. This letter proposes a novel interference prediction algorithm that considers the entire interference distribution instead of only the mean. The key idea is to model the interference variation as a discrete state space discrete-time Markov chain. The state transition probability matrix is then used to estimate the state evolution in time, and allocate radio resources accordingly. The proposed scheme is found to meet the target reliability requirements in a low-latency single-shot transmission system considering realistic system assumptions, while requiring only ~25% more resources than the optimum case with perfect interference knowledge.
△ Less
Submitted 21 September, 2020;
originally announced September 2020.
-
Ultra-low Latency, Low Energy and Massiveness in the 6G Era via Efficient CSIT-limited Schemes
Authors:
Onel L. A. López,
Nurul H. Mahmood,
Hirley Alves,
Carlos M. Lima,
Matti Latva-aho
Abstract:
Channel state information (CSI) has been a key component in traditional wireless communication systems. This might no longer hold in future networks supporting services with stringent quality of service constraints such as extremely low-latency, low-energy and/or large number of simultaneously connected devices, where acquiring CSI would become extremely costly or even impractical. We overview the…
▽ More
Channel state information (CSI) has been a key component in traditional wireless communication systems. This might no longer hold in future networks supporting services with stringent quality of service constraints such as extremely low-latency, low-energy and/or large number of simultaneously connected devices, where acquiring CSI would become extremely costly or even impractical. We overview the main limitations of CSI at transmitter side (CSIT)-based designs toward the 6G era, assess how to design and use efficient CSIT-limited schemes that allow meeting the new and stringent requirements, and highlight some key research directions. We delve into the ideas of efficiently allocating pilot sequences, relying on statistical CSIT and/or using location-based strategies, and demonstrate viability via a selected use case.
△ Less
Submitted 14 September, 2020;
originally announced September 2020.
-
Quasi f-Simplicial Complexes and Quasi f-Graphs
Authors:
Hasan Mahmood,
Fazal Ur Rehman,
Thai Thanh Nguyen,
Muhammad Ahsan Binyamin
Abstract:
The notion of $f$-ideal is recent and has so far been studied in several papers. In \cite{qfi}, the idea of $f$-ideal is generalized to quasi $f$-ideals, which is much larger class than the class of $f$-ideals. In this paper, we introduce the concept of quasi $f$-simplicial complex and quasi $f$-graph. We give a characterization of quasi $f$-graphs on $n$ vertices. A complete solution of connected…
▽ More
The notion of $f$-ideal is recent and has so far been studied in several papers. In \cite{qfi}, the idea of $f$-ideal is generalized to quasi $f$-ideals, which is much larger class than the class of $f$-ideals. In this paper, we introduce the concept of quasi $f$-simplicial complex and quasi $f$-graph. We give a characterization of quasi $f$-graphs on $n$ vertices. A complete solution of connectedness of quasi $f$-simplicial complexes is described. We have also shown a method of constructing Cohen-Macaulay quasi $f$-graphs.
△ Less
Submitted 14 September, 2020; v1 submitted 10 September, 2020;
originally announced September 2020.
-
Quasi f-Ideals
Authors:
Hasan Mahmood,
Fazal Ur Rehman,
Thai Thanh Nguyen,
Muhammad Ahsan Binyamin
Abstract:
The notion off-ideals is recent and has been studied in the papers[1] [2], [5], [10], [11], [12], [13], [14] and [15]. In this paper, we have generalized the idea off-ideals to quasi f-ideals. This extended class of ideals is much bigger than the class of all f-ideals. Apart from giving various characterizations of quasi f-ideals of degree 2, we have determined all the minimal primes ideals of the…
▽ More
The notion off-ideals is recent and has been studied in the papers[1] [2], [5], [10], [11], [12], [13], [14] and [15]. In this paper, we have generalized the idea off-ideals to quasi f-ideals. This extended class of ideals is much bigger than the class of all f-ideals. Apart from giving various characterizations of quasi f-ideals of degree 2, we have determined all the minimal primes ideals of these ideals. Moreover, construction of quasi f-ideals of degree 2 has been described; the formula for computing Hilbert function and Hilbert series of the polynomial ring modulo quasi f-ideal has been provided.
△ Less
Submitted 8 September, 2020;
originally announced September 2020.
-
CSI-free vs CSI-based multi-antenna WET for massive low-power Internet of Things
Authors:
Onel L. A. López,
Nurul Huda Mahmood,
Hirley Alves,
Matti Latva-aho
Abstract:
Wireless Energy Transfer (WET) is a promising solution for powering massive Internet of Things deployments. An important question is whether the costly Channel State Information (CSI) acquisition procedure is necessary for optimum performance. In this paper, we shed some light into this matter by evaluating CSI-based and CSI-free multi-antenna WET schemes in a setup with WET in the downlink, and p…
▽ More
Wireless Energy Transfer (WET) is a promising solution for powering massive Internet of Things deployments. An important question is whether the costly Channel State Information (CSI) acquisition procedure is necessary for optimum performance. In this paper, we shed some light into this matter by evaluating CSI-based and CSI-free multi-antenna WET schemes in a setup with WET in the downlink, and periodic or Poisson-traffic Wireless Information Transfer (WIT) in the uplink. When CSI is available, we show that a maximum ratio transmission beamformer is close to optimum whenever the farthest node experiences at least 3 dB of power attenuation more than the remaining devices. On the other hand, although the adopted CSI-free mechanism is not capable of providing average harvesting gains, it does provide greater WET/WIT diversity with lower energy requirements when compared with the CSI-based scheme. Our numerical results evidence that the CSI-free scheme performs favorably under periodic traffic conditions, but it may be deficient in case of Poisson traffic, specially if the setup is not optimally configured. Finally, we show the prominent performance results when the uplink transmissions are periodic, while highlighting the need of a minimum mean square error equalizer rather than zero-forcing for information decoding.
△ Less
Submitted 22 December, 2020; v1 submitted 29 May, 2020;
originally announced June 2020.
-
The $\mathcal{N}\mathcal{F}$-Number of a Simplicial Complex
Authors:
Takayuki Hibi,
Hasan Mahmood
Abstract:
Let $Δ$ be a simplicial complex on $[n]$. The $\mathcal{N}\mathcal{F}$-complex of $Δ$ is the simplicial complex $δ_{\mathcal{N}\mathcal{F}}(Δ)$ on $[n]$ for which the facet ideal of $Δ$ is equal to the Stanley--Reisner ideal of $δ_{\mathcal{N}\mathcal{F}}(Δ)$. Furthermore, for each $k = 2,3,\ldots$\,, we introduce {\em $k^{th}$ $\mathcal{N}\mathcal{F}$-complex}…
▽ More
Let $Δ$ be a simplicial complex on $[n]$. The $\mathcal{N}\mathcal{F}$-complex of $Δ$ is the simplicial complex $δ_{\mathcal{N}\mathcal{F}}(Δ)$ on $[n]$ for which the facet ideal of $Δ$ is equal to the Stanley--Reisner ideal of $δ_{\mathcal{N}\mathcal{F}}(Δ)$. Furthermore, for each $k = 2,3,\ldots$\,, we introduce {\em $k^{th}$ $\mathcal{N}\mathcal{F}$-complex} $δ^{(k)}_{\mathcal{N}\mathcal{F}}(Δ)$ which is inductively defined by $δ^{(k)}_{\mathcal{N}\mathcal{F}}(Δ) = δ_{\mathcal{N}\mathcal{F}}(δ^{(k-1)}_{\mathcal{N}\mathcal{F}}(Δ))$ with setting $δ^{(1)}_{\mathcal{N}\mathcal{F}}(Δ) = δ_{\mathcal{N}\mathcal{F}}(Δ)$. One can set $δ^{(0)}_{\mathcal{N}\mathcal{F}}(Δ) = Δ$. The $\mathcal{N}\mathcal{F}$-number of $Δ$ is the smallest integer $k > 0$ for which $δ^{(k)}_{\mathcal{N}\mathcal{F}}(Δ) \simeq Δ$. In the present paper we are especially interested in the $\mathcal{N}\mathcal{F}$-number of a finite graph, which can be regraded as a simplicial complex of dimension one. It is shown that the $\mathcal{N}\mathcal{F}$-number of the finite graph $K_n\coprod K_m$ on $[n + m]$, which is the disjoint union of the complete graphs $K_n$ on $[n]$ and $K_m$ on $[m]$, where $n \geq 2$ and $m \geq 2$ with $(n,m) \neq (2,2)$, is equal to $n + m + 2$. Its corollary says that the $\mathcal{N}\mathcal{F}$-number of the complete bipartite graph $K_{n,m}$ on $[n+m]$ is also equal to $n + m + 2$.
△ Less
Submitted 3 May, 2020;
originally announced May 2020.
-
White Paper on Critical and Massive Machine Type Communication Towards 6G
Authors:
Nurul Huda Mahmood,
Stefan Böcker,
Andrea Munari,
Federico Clazzer,
Ingrid Moerman,
Konstantin Mikhaylov,
Onel Lopez,
Ok-Sun Park,
Eric Mercier,
Hannes Bartz,
Riku Jäntti,
Ravikumar Pragada,
Yihua Ma,
Elina Annanperä,
Christian Wietfeld,
Martin Andraud,
Gianluigi Liva,
Yan Chen,
Eduardo Garro,
Frank Burkhardt,
Hirley Alves,
Chen-Feng Liu,
Yalcin Sadi,
Jean-Baptiste Dore,
Eunah Kim
, et al. (6 additional authors not shown)
Abstract:
The society as a whole, and many vertical sectors in particular, is becoming increasingly digitalized. Machine Type Communication (MTC), encompassing its massive and critical aspects, and ubiquitous wireless connectivity are among the main enablers of such digitization at large. The recently introduced 5G New Radio is natively designed to support both aspects of MTC to promote the digital transfor…
▽ More
The society as a whole, and many vertical sectors in particular, is becoming increasingly digitalized. Machine Type Communication (MTC), encompassing its massive and critical aspects, and ubiquitous wireless connectivity are among the main enablers of such digitization at large. The recently introduced 5G New Radio is natively designed to support both aspects of MTC to promote the digital transformation of the society. However, it is evident that some of the more demanding requirements cannot be fully supported by 5G networks. Alongside, further development of the society towards 2030 will give rise to new and more stringent requirements on wireless connectivity in general, and MTC in particular. Driven by the societal trends towards 2030, the next generation (6G) will be an agile and efficient convergent network serving a set of diverse service classes and a wide range of key performance indicators (KPI). This white paper explores the main drivers and requirements of an MTC-optimized 6G network, and discusses the following six key research questions:
- Will the main KPIs of 5G continue to be the dominant KPIs in 6G; or will there emerge new key metrics?
- How to deliver different E2E service mandates with different KPI requirements considering joint-optimization at the physical up to the application layer?
- What are the key enablers towards designing ultra-low power receivers and highly efficient sleep modes?
- How to tackle a disruptive rather than incremental joint design of a massively scalable waveform and medium access policy for global MTC connectivity?
- How to support new service classes characterizing mission-critical and dependable MTC in 6G?
- What are the potential enablers of long term, lightweight and flexible privacy and security schemes considering MTC device requirements?
△ Less
Submitted 4 May, 2020; v1 submitted 29 April, 2020;
originally announced April 2020.
-
Enabling URLLC for Low-Cost IoT Devices via Diversity Combining Schemes
Authors:
Onel L. Alcaraz López,
Nurul Huda Mahmood,
Hirley Alves
Abstract:
Supporting Ultra-Reliable Low-Latency Communication (URLLC) in the Internet of Things (IoT) era is challenging due to stringent constraints on latency and reliability combined with the simple circuitry of IoT nodes. Diversity is usually required for sustaining the reliability levels of URLLC, but there is an additional delay associated to auxiliary procedures to be considered, specially when commu…
▽ More
Supporting Ultra-Reliable Low-Latency Communication (URLLC) in the Internet of Things (IoT) era is challenging due to stringent constraints on latency and reliability combined with the simple circuitry of IoT nodes. Diversity is usually required for sustaining the reliability levels of URLLC, but there is an additional delay associated to auxiliary procedures to be considered, specially when communication includes low-cost IoT devices. Herein, we analyze Selection Combining (SC) and Switch and Stay Combining (SSC) diversity schemes as plausible solutions for enabling ultra-reliable low-latency downlink communications to low-cost IoT devices. We demonstrate the necessity of considering the time spent in auxiliary procedures, which has not been traditionally taken into account, while we show its impact on the reliability performance. We show there is an optimum number of receive antennas, which suggests that under certain conditions it might be required to turn off some of them, specially under the SC operation. We highlight the superiority of SSC with respect to SC as long the associated Signal-to-Noise Ratio threshold is properly selected. We propose using a fixed threshold relying only on long-term channel fading statistics, which leads to near-optimum results.
△ Less
Submitted 4 March, 2020;
originally announced March 2020.
-
Dynamic Multi-Connectivity Activation for Ultra-Reliable and Low-Latency Communication
Authors:
Nurul Huda Mahmood,
Hirley Alves
Abstract:
Multi-connectivity (MC) with packet duplication, where the same data packet is duplicated and transmitted from multiple transmitters, is proposed in 5G New Radio as a reliability enhancement feature. However, it is found to be resource inefficient, since radio resources from more than one transmitters are required to serve a single user. Improving the performance enhancement vs. resource utilizati…
▽ More
Multi-connectivity (MC) with packet duplication, where the same data packet is duplicated and transmitted from multiple transmitters, is proposed in 5G New Radio as a reliability enhancement feature. However, it is found to be resource inefficient, since radio resources from more than one transmitters are required to serve a single user. Improving the performance enhancement vs. resource utilization tradeoff with MC is therefore a key design challenge. This work proposes a heuristic resource efficient latency-aware dynamic MC algorithm which activates MC selectively such that its benefits are harnessed for critical users, while minimizing the corresponding resource usage. Numerical results indicate that the proposed algorithm can deliver the outage performance gains of legacy MC schemes while requiring up to 45% less resources.
△ Less
Submitted 22 November, 2019;
originally announced November 2019.
-
Structural and Magnetic Properties of Er3Fe5-xAlxO12 Garnets
Authors:
Ibrahim Bsoul,
Khaled Hawamdeh,
Sami H. Mahmood
Abstract:
Er3Fe5-xAlxO12 (0.0 < x < 0.8) garnets were prepared by ball milling and sintering at 1300 C. Rietveld refinement of the samples revealed a garnet structure with Ia3d symmetry. The lattice parameter, cell volume, X-ray density and magnetization of the prepared garnets decreased with the increase of Al content (x). The coercivity of the garnets increased with x, but remained generally low, being be…
▽ More
Er3Fe5-xAlxO12 (0.0 < x < 0.8) garnets were prepared by ball milling and sintering at 1300 C. Rietveld refinement of the samples revealed a garnet structure with Ia3d symmetry. The lattice parameter, cell volume, X-ray density and magnetization of the prepared garnets decreased with the increase of Al content (x). The coercivity of the garnets increased with x, but remained generally low, being below 20 Oe. Low temperature magnetic measurements versus temperature indicated that the magnetization of x = 0.0 exhibited a compensation temperature at -186 C, however, x = 0.8 exhibited a minimum at a higher temperature of -134 C.
△ Less
Submitted 2 June, 2019;
originally announced June 2019.
-
Rethinking Table Recognition using Graph Neural Networks
Authors:
Shah Rukh Qasim,
Hassan Mahmood,
Faisal Shafait
Abstract:
Document structure analysis, such as zone segmentation and table recognition, is a complex problem in document processing and is an active area of research. The recent success of deep learning in solving various computer vision and machine learning problems has not been reflected in document structure analysis since conventional neural networks are not well suited to the input structure of the pro…
▽ More
Document structure analysis, such as zone segmentation and table recognition, is a complex problem in document processing and is an active area of research. The recent success of deep learning in solving various computer vision and machine learning problems has not been reflected in document structure analysis since conventional neural networks are not well suited to the input structure of the problem. In this paper, we propose an architecture based on graph networks as a better alternative to standard neural networks for table recognition. We argue that graph networks are a more natural choice for these problems, and explore two gradient-based graph neural networks. Our proposed architecture combines the benefits of convolutional neural networks for visual feature extraction and graph networks for dealing with the problem structure. We empirically demonstrate that our method outperforms the baseline by a significant margin. In addition, we identify the lack of large scale datasets as a major hindrance for deep learning research for structure analysis and present a new large scale synthetic dataset for the problem of table recognition. Finally, we open-source our implementation of dataset generation and the training framework of our graph networks to promote reproducible research in this direction.
△ Less
Submitted 3 July, 2019; v1 submitted 30 May, 2019;
originally announced May 2019.
-
On the Resource Utilization of Multi-Connectivity Transmission for URLLC Services in 5G New Radio
Authors:
Nurul Huda Mahmood,
Ali Karimi,
Gilberto Berardinelli,
Klaus I. Pedersen,
Daniela Laselva
Abstract:
Multi-connectivity with packet duplication, where the same data packet is duplicated and transmitted from multiple transmitters, is proposed in 5G New Radio as a reliability enhancement feature. This paper presents an analytical study of the outage probability enhancement with multi-connectivity, and analyses its cost in terms of resource usage. The performance analysis is further compared against…
▽ More
Multi-connectivity with packet duplication, where the same data packet is duplicated and transmitted from multiple transmitters, is proposed in 5G New Radio as a reliability enhancement feature. This paper presents an analytical study of the outage probability enhancement with multi-connectivity, and analyses its cost in terms of resource usage. The performance analysis is further compared against conventional single-connectivity transmission. Our analysis shows that, for transmission with a given block error rate target, multi-connectivity results in more than an order of magnitude outage probability improvement over the baseline single-connectivity scheme. However, such gains are achieved at the cost of almost doubling the amount of radio resources used. Multi-connectivity should thus be selectively used such that its benefits can be harnessed for critical users, while the price to pay in terms of resource utilization is simultaneously minimized.
△ Less
Submitted 13 March, 2019;
originally announced April 2019.
-
Uplink Grant-Free Random Access Solutions for URLLC services in 5G New Radio
Authors:
Nurul Huda Mahmood,
Renato Abreu,
Ronald Böhnke,
Martin Schubert,
Gilberto Berardinelli,
Thomas H. Jacobsen
Abstract:
The newly introduced ultra-reliable low latency communication service class in 5G New Radio depends on innovative low latency radio resource management solutions that can guarantee high reliability. Grant-free random access, where channel resources are accessed without undergoing assignment through a handshake process, is proposed in 5G New Radio as an important latency reducing solution. However,…
▽ More
The newly introduced ultra-reliable low latency communication service class in 5G New Radio depends on innovative low latency radio resource management solutions that can guarantee high reliability. Grant-free random access, where channel resources are accessed without undergoing assignment through a handshake process, is proposed in 5G New Radio as an important latency reducing solution. However, this comes at an increased likelihood of collisions resulting from uncontrolled channel access, when the same resources are preallocated to a group of users. Novel reliability enhancement techniques are therefore needed. This article provides an overview of grant-free random access in 5G New Radio focusing on the ultra-reliable low latency communication service class, and presents two reliability-enhancing solutions. The first proposes retransmissions over shared resources, whereas the second proposal incorporates grant-free transmission with non-orthogonal multiple access with overlap** transmissions being resolved through the use of advanced receivers. Both proposed solutions result in significant performance gains, in terms of reliability as well as resource efficiency. For example, the proposed non-orthogonal multiple access scheme can support a normalized load of more than 1.5 users/slot at packet loss rates of ~10^{-5} - a significant improvement over the maximum supported load with conventional grant-free schemes like slotted-ALOHA.
△ Less
Submitted 11 April, 2019;
originally announced April 2019.
-
Six Key Enablers for Machine Type Communication in 6G
Authors:
Nurul Huda Mahmood,
Hirley Alves,
Onel Alcaraz López,
Mohammad Shehab,
Diana P. Moya Osorio,
Matti Latva-aho
Abstract:
While 5G is being rolled out in different parts of the globe, few research groups around the world $-$ such as the Finnish 6G Flagship program $-$ have already started posing the question: \textit{What will 6G be?} The 6G vision is a data-driven society, enabled by near instant unlimited wireless connectivity. Driven by impetus to provide vertical-specific wireless network solutions, machine type…
▽ More
While 5G is being rolled out in different parts of the globe, few research groups around the world $-$ such as the Finnish 6G Flagship program $-$ have already started posing the question: \textit{What will 6G be?} The 6G vision is a data-driven society, enabled by near instant unlimited wireless connectivity. Driven by impetus to provide vertical-specific wireless network solutions, machine type communication encompassing both its mission critical and massive connectivity aspects is foreseen to be an important cornerstone of 6G development. This article presents an over-arching vision for machine type communication in 6G. In this regard, some relevant performance indicators are first anticipated, followed by a presentation of six key enabling technologies.
△ Less
Submitted 13 March, 2019;
originally announced March 2019.
-
Multi-Channel Access Solutions for 5G New Radio
Authors:
Nurul Huda Mahmood,
Daniela Laselva,
David Palacios,
Mustafa Emara,
Miltiades C. Filippou,
Dong Min Kim,
Isabel de-la-Bandera
Abstract:
5G New Radio paves the way for introducing novel multi-service radio resource management solutions tailored for enhanced Mobile Broadband and Ultra-Reliable Low Latency Communication service classes. Multi-Channel Access is a family of such multi-service solutions that enable a user equipment to aggregate radio resources from multiple sources. The objective is multi-fold; throughput enhancement th…
▽ More
5G New Radio paves the way for introducing novel multi-service radio resource management solutions tailored for enhanced Mobile Broadband and Ultra-Reliable Low Latency Communication service classes. Multi-Channel Access is a family of such multi-service solutions that enable a user equipment to aggregate radio resources from multiple sources. The objective is multi-fold; throughput enhancement through access to a larger bandwidth, reliability improvement by increasing the diversity order and/or coordinated transmission/reception, as well as flexibility and load balancing improvement by decoupling the downlink and the uplink access points. This paper presents several multi-channel access solutions for 5G New Radio multi-service scenarios. In particular, throughput enhancement and latency reduction concepts like multi-connectivity, carrier aggregation, downlink-uplink decoupled access and coordinated multi-point connectivity are discussed. Moreover, novel design solutions exploiting these concepts are proposed. Numerical evaluation of the introduced solutions indicates significant performance gains over state-of-the-art schemes; for example, our proposed component carrier selection mechanism leads to a median throughput gain of up to 100% by means of an implicit load balance. Therefore, the proposed Multi-Channel Access solutions have the potential to be key multi-service enablers for 5G New Radio.
△ Less
Submitted 13 March, 2019; v1 submitted 28 January, 2019;
originally announced February 2019.