-
Ordered-Statistics Decoding with Adaptive Gaussian Elimination Reduction for Short Codes
Authors:
Chentao Yue,
Mahyar Shirvanimoghaddam,
Branka Vucetic,
Yonghui Li
Abstract:
In this paper, we propose an efficient ordered-statistics decoding (OSD) algorithm with an adaptive Gaussian elimination (GE) reduction technique. The proposed decoder utilizes two decoding conditions to adaptively remove GE in OSD. The first condition determines whether GE could be skipped in the OSD process by estimating the decoding error probability. Then, the second condition is utilized to i…
▽ More
In this paper, we propose an efficient ordered-statistics decoding (OSD) algorithm with an adaptive Gaussian elimination (GE) reduction technique. The proposed decoder utilizes two decoding conditions to adaptively remove GE in OSD. The first condition determines whether GE could be skipped in the OSD process by estimating the decoding error probability. Then, the second condition is utilized to identify the correct decoding result during the decoding process without GE. The proposed decoder can break the ``complexity floor'' in OSD decoders introduced by the GE overhead. Simulation results advise that when compared with the latest schemes in the literature, the proposed approach can significantly reduce the decoding complexity at high SNRs without any degradation in the error-correction capability.
△ Less
Submitted 22 December, 2022; v1 submitted 22 June, 2022;
originally announced June 2022.
-
Efficient Decoders for Short Block Length Codes in 6G URLLC
Authors:
Chentao Yue,
Vera Miloslavskaya,
Mahyar Shirvanimoghaddam,
Branka Vucetic,
Yonghui Li
Abstract:
This paper reviews the potential channel decoding techniques for ultra-reliable low-latency communications (URLLC). URLLC is renowned for its stringent requirements including ultra-reliability, low end-to-end transmission latency, and packet-size flexibility. These requirements exacerbate the difficulty of the physical-layer design, particularly for the channel coding and decoding schemes. To sati…
▽ More
This paper reviews the potential channel decoding techniques for ultra-reliable low-latency communications (URLLC). URLLC is renowned for its stringent requirements including ultra-reliability, low end-to-end transmission latency, and packet-size flexibility. These requirements exacerbate the difficulty of the physical-layer design, particularly for the channel coding and decoding schemes. To satisfy the requirements of URLLC, decoders must exhibit superior error-rate performance \black{and} low decoding complexity. \black{Also, it is desired that decoders be universal} to accommodate various coding schemes. This paper provides a comprehensive review and comparison of different candidate decoding techniques for URLLC in terms of their error-rate performance and computational complexity for structured and random short codes. We further make recommendations of the decoder selections and suggest several potential research directions.
△ Less
Submitted 22 December, 2022; v1 submitted 20 June, 2022;
originally announced June 2022.
-
Rate-Convergence Tradeoff of Federated Learning over Wireless Channel
Authors:
Ayoob Salari,
Mahyar Shirvanimoghaddam,
Branka Vucetic,
Sarah Johnson
Abstract:
In this paper, we consider a federated learning problem over wireless channel that takes into account the coding rate and packet transmission errors. Communication channels are modelled as packet erasure channels (PEC), where the erasure probability is determined by the block length, code rate, and signal-to-noise ratio (SNR). To lessen the effect of packet erasure on the FL performance, we propos…
▽ More
In this paper, we consider a federated learning problem over wireless channel that takes into account the coding rate and packet transmission errors. Communication channels are modelled as packet erasure channels (PEC), where the erasure probability is determined by the block length, code rate, and signal-to-noise ratio (SNR). To lessen the effect of packet erasure on the FL performance, we propose two schemes in which the central node (CN) reuses either the past local updates or the previous global parameters in case of packet erasure. We investigate the impact of coding rate on the convergence of federated learning (FL) for both short packet and long packet communications considering erroneous transmissions. Our simulation results shows that even one unit of memory has considerable impact on the performance of FL in erroneous communication.
△ Less
Submitted 10 May, 2022;
originally announced May 2022.
-
NOMA Joint Channel Estimation and Signal Detection using Rotational Invariant Codes and GMM-based Clustering
Authors:
Ayoob Salari,
Mahyar Shirvanimoghaddam,
Muhammad Basit Shahab,
Yonghui Li,
Sarah Johnson
Abstract:
This paper studies the joint channel estimation and signal detection for the uplink power-domain non-orthogonal multiple access. The proposed technique performs both detection and estimation without the need of pilot symbols by using a clustering technique. We apply rotational-invariant coding to assist signal detection at the receiver without sending pilot symbols. We utilize Gaussian mixture mod…
▽ More
This paper studies the joint channel estimation and signal detection for the uplink power-domain non-orthogonal multiple access. The proposed technique performs both detection and estimation without the need of pilot symbols by using a clustering technique. We apply rotational-invariant coding to assist signal detection at the receiver without sending pilot symbols. We utilize Gaussian mixture model (GMM) to automatically cluster the received signals without supervision and optimize decision boundaries to improve the bit error rate (BER) performance. Simulation results show that the proposed scheme without using any pilot symbol achieves almost the same BER performance as that for the conventional maximum likelihood receiver with full channel state information.
△ Less
Submitted 7 July, 2022; v1 submitted 25 February, 2022;
originally announced February 2022.
-
Federated Learning with Erroneous Communication Links
Authors:
Mahyar Shirvanimoghaddam,
Ayoob Salari,
Yifeng Gao,
Aradhika Guha
Abstract:
In this paper, we consider the federated learning (FL) problem in the presence of communication errors. We model the link between the devices and the central node (CN) by a packet erasure channel, where the local parameters from devices are either erased or received correctly by CN with probability $ε$ and $1-ε$, respectively. We proved that the FL algorithm in the presence of communication errors…
▽ More
In this paper, we consider the federated learning (FL) problem in the presence of communication errors. We model the link between the devices and the central node (CN) by a packet erasure channel, where the local parameters from devices are either erased or received correctly by CN with probability $ε$ and $1-ε$, respectively. We proved that the FL algorithm in the presence of communication errors, where the CN uses the past local update if the fresh one is not received from a device, converges to the same global parameter as that the FL algorithm converges to without any communication error. We provide several simulation results to validate our theoretical analysis. We also show that when the dataset is uniformly distributed among devices, the FL algorithm that only uses fresh updates and discards missing updates might converge faster than the FL algorithm that uses past local updates.
△ Less
Submitted 11 April, 2022; v1 submitted 30 January, 2022;
originally announced January 2022.
-
Design and Analysis of Clustering-based Joint Channel Estimation and Signal Detection for NOMA
Authors:
Ayoob Salari,
Mahyar Shirvanimoghaddam,
Muhammad Basit Shahab,
Reza Arablouei,
Sarah Johnson
Abstract:
We propose a joint channel estimation and signal detection approach for the uplink non-orthogonal multiple access (NOMA) using unsupervised machine learning. We apply a Gaussian mixture model (GMM) to cluster the received signals, and accordingly optimize the decision regions to enhance the symbol error rate (SER) performance. We show that, when the received powers of the users are sufficiently di…
▽ More
We propose a joint channel estimation and signal detection approach for the uplink non-orthogonal multiple access (NOMA) using unsupervised machine learning. We apply a Gaussian mixture model (GMM) to cluster the received signals, and accordingly optimize the decision regions to enhance the symbol error rate (SER) performance. We show that, when the received powers of the users are sufficiently different, the proposed clustering-based approach achieves an SER performance on a par with that of the conventional maximum-likelihood detector (MLD) with full channel state information (CSI). We study the tradeoff between the accuracy of the proposed approach and the blocklength, as the accuracy of the utilized clustering algorithm depends on the number of symbols available at the receiver. We provide a comprehensive performance analysis of the proposed approach and derive a theoretical bound on its SER performance. Our simulation results corroborate the effectiveness of the proposed approach and verify that the calculated theoretical bound can predict the SER performance of the proposed approach well. We further explore the application of the proposed approach to a practical grant-free NOMA scenario, and show that its performance is very close to that of the optimal MLD with full CSI, which usually requires long pilot sequences.
△ Less
Submitted 22 December, 2022; v1 submitted 17 January, 2022;
originally announced January 2022.
-
HARQ Optimization for Real-Time Remote Estimation in Wireless Networked Control
Authors:
Faisal Nadeem,
Yonghui Li,
Branka Vucetic,
Mahyar Shirvanimoghaddam
Abstract:
This paper analyzes wireless network control for remote estimation of linear time-invariant dynamical systems under various Hybrid Automatic Repeat Request (HARQ) packet retransmission schemes. In conventional HARQ, packet reliability increases gradually with additional packets; however, each retransmission maximally increases the Age of Information and causes severe degradation in estimation mean…
▽ More
This paper analyzes wireless network control for remote estimation of linear time-invariant dynamical systems under various Hybrid Automatic Repeat Request (HARQ) packet retransmission schemes. In conventional HARQ, packet reliability increases gradually with additional packets; however, each retransmission maximally increases the Age of Information and causes severe degradation in estimation mean squared error (MSE) performance. We optimize standard HARQ schemes by allowing partial retransmissions to increase the packet reliability gradually and limit the AoI growth. In incremental redundancy HARQ, we optimize the retransmission time to enable the early arrival of the next status updates. In Chase combining HARQ, since packet length remains fixed, we allow retransmission and new updates in a single time slot using non-orthogonal signaling. Non-orthogonal retransmissions increase packet reliability without delaying the fresh updates. We formulate bi-objective optimization with the proposed variance of the MSE-based cost function and standard long-term average MSE cost function to guarantee short-term performance stability. Using the Markov decision process formulation, we find the optimal static and dynamic policies under the proposed HARQ schemes to improve MSE performance further. The simulation results show that the proposed HARQ-based policies are more robust and achieve significantly better and more stable MSE performance than standard HARQ-based policies.
△ Less
Submitted 12 January, 2023; v1 submitted 15 January, 2022;
originally announced January 2022.
-
Density Evolution Analysis of the Iterative Joint Ordered-Statistics Decoding for NOMA
Authors:
Chentao Yue,
Mahyar Shirvanimoghaddam,
Alva Kosasih,
Giyoon Park,
Ok-Sun Park,
Wibowo Hardjawana,
Branka Vucetic,
Yonghui Li
Abstract:
In this paper, we develop a density evolution (DE) framework for analyzing the iterative joint decoding (JD) for non-orthogonal multiple access (NOMA) systems, where the ordered-statistics decoding (OSD) is applied to decode short block codes. We first investigate the density-transform feature of the soft-output OSD (SOSD), by deriving the density of the extrinsic log-likelihood ratio (LLR) with k…
▽ More
In this paper, we develop a density evolution (DE) framework for analyzing the iterative joint decoding (JD) for non-orthogonal multiple access (NOMA) systems, where the ordered-statistics decoding (OSD) is applied to decode short block codes. We first investigate the density-transform feature of the soft-output OSD (SOSD), by deriving the density of the extrinsic log-likelihood ratio (LLR) with known densities of the priori LLR. Then, we represent the OSD-based JD by bipartite graphs (BGs), and develop the DE framework by characterizing the density-transform features of nodes over the BG. Numerical examples show that the proposed DE framework accurately tracks the evolution of LLRs during the iterative decoding, especially at moderate-to-high SNRs. Based on the DE framework, we further analyze the BER performance of the OSD-based JD, and the convergence points of the two-user and equal-power systems.
△ Less
Submitted 23 December, 2021;
originally announced December 2021.
-
NOMA Joint Decoding based on Soft-Output Ordered-Statistics Decoder for Short Block Codes
Authors:
Chentao Yue,
Alva Kosasih,
Mahyar Shirvanimoghaddam,
Giyoon Park,
Ok-Sun Park,
Wibowo Hardjawana,
Branka Vucetic,
Yonghui Li
Abstract:
In this paper, we design the joint decoding (JD) of non-orthogonal multiple access (NOMA) systems employing short block length codes. We first proposed a low-complexity soft-output ordered-statistics decoding (LC-SOSD) based on a decoding stop** condition, derived from approximations of the a-posterior probabilities of codeword estimates. Simulation results show that LC-SOSD has the similar mutu…
▽ More
In this paper, we design the joint decoding (JD) of non-orthogonal multiple access (NOMA) systems employing short block length codes. We first proposed a low-complexity soft-output ordered-statistics decoding (LC-SOSD) based on a decoding stop** condition, derived from approximations of the a-posterior probabilities of codeword estimates. Simulation results show that LC-SOSD has the similar mutual information transform property to the original SOSD with a significantly reduced complexity. Then, based on the analysis, an efficient JD receiver which combines the parallel interference cancellation (PIC) and the proposed LC-SOSD is developed for NOMA systems. Two novel techniques, namely decoding switch (DS) and decoding combiner (DC), are introduced to accelerate the convergence speed. Simulation results show that the proposed receiver can achieve a lower bit-error rate (BER) compared to the successive interference cancellation (SIC) decoding over the additive-white-Gaussian-noise (AWGN) and fading channel, with a lower complexity in terms of the number of decoding iterations.
△ Less
Submitted 28 October, 2021;
originally announced October 2021.
-
Linear-Equation Ordered-Statistics Decoding
Authors:
Chentao Yue,
Mahyar Shirvanimoghaddam,
Giyoon Park,
Ok-Sun Park,
Branka Vucetic,
Yonghui Li
Abstract:
In this paper, we propose a new linear-equation ordered-statistics decoding (LE-OSD). Unlike the OSD, LE-OSD uses high reliable parity bits rather than information bits to recover the codeword estimates, which is equivalent to solving a system of linear equations (SLE). Only test error patterns (TEPs) that create feasible SLEs, referred to as the valid TEPs, are used to obtain different codeword e…
▽ More
In this paper, we propose a new linear-equation ordered-statistics decoding (LE-OSD). Unlike the OSD, LE-OSD uses high reliable parity bits rather than information bits to recover the codeword estimates, which is equivalent to solving a system of linear equations (SLE). Only test error patterns (TEPs) that create feasible SLEs, referred to as the valid TEPs, are used to obtain different codeword estimates. We introduce several constraints on the Hamming weight of TEPs to limit the overall decoding complexity. Furthermore, we analyze the block error rate (BLER) and the computational complexity of the proposed approach. It is shown that LE-OSD has a similar performance as OSD in terms of BLER, which can asymptotically approach Maximum-likelihood (ML) performance with proper parameter selections. Simulation results demonstrate that the LE-OSD has a significantly reduced complexity compared to OSD, especially for low-rate codes, that usually require high decoding order in OSD. Nevertheless, the complexity reduction can also be observed for high-rate codes. In addition, we further improve LE-OSD by applying the decoding stop** condition and the TEP discarding condition. As shown by simulations, the improved LE-OSD has a considerably reduced complexity while maintaining the BLER performance, compared to the latest OSD approach from literature.
△ Less
Submitted 21 October, 2021;
originally announced October 2021.
-
Analysis and Optimization of HARQ for URLLC
Authors:
Faisal Nadeem,
Yonghui Li,
Branka Vucetic,
Mahyar Shirvanimoghaddam
Abstract:
In this paper, we investigate the effectiveness of the hybrid automatic repeat request (HARQ) technique in providing high-reliability and low-latency in the finite blocklength (FBL) regime in a single user uplink scenario. We characterize the packet error rate (PER), throughput, and delay performance of chase combining HARQ (CC-HARQ) and incremental redundancy HARQ (IR-HARQ) in AWGN and Rayleigh f…
▽ More
In this paper, we investigate the effectiveness of the hybrid automatic repeat request (HARQ) technique in providing high-reliability and low-latency in the finite blocklength (FBL) regime in a single user uplink scenario. We characterize the packet error rate (PER), throughput, and delay performance of chase combining HARQ (CC-HARQ) and incremental redundancy HARQ (IR-HARQ) in AWGN and Rayleigh fading channel with $m$ retransmissions. Furthermore, we consider a quasi-static fading channel model, which is more accurate than the over-simplified i.i.d. block fading or same channel assumption over consecutive packets. We use finite state Markov model under the FBL regime to model correlative fading. Numerical results present interesting insight into the reliability-latency trade-off of HARQ. Furthermore, we formulate an optimization problem to maximize the throughput performance of IR-HARQ by reducing excessive retransmission overhead for a target packet error performance under different SNRs, Doppler frequencies, and rate regimes.
△ Less
Submitted 5 October, 2021;
originally announced October 2021.
-
Primitive Rateless Codes
Authors:
Mahyar Shirvanimoghaddam
Abstract:
In this paper, we propose primitive rateless (PR) codes. A PR code is characterized by the message length and a primitive polynomial over $\mathbf{GF}(2)$, which can generate a potentially limitless number of coded symbols. We show that codewords of a PR code truncated at any arbitrary length can be represented as subsequences of a maximum-length sequence ($m$-sequence). We characterize the Hammin…
▽ More
In this paper, we propose primitive rateless (PR) codes. A PR code is characterized by the message length and a primitive polynomial over $\mathbf{GF}(2)$, which can generate a potentially limitless number of coded symbols. We show that codewords of a PR code truncated at any arbitrary length can be represented as subsequences of a maximum-length sequence ($m$-sequence). We characterize the Hamming weight distribution of PR codes and their duals and show that for a properly chosen primitive polynomial, the Hamming weight distribution of the PR code can be well approximated by the truncated binomial distribution. We further find a lower bound on the minimum Hamming weight of PR codes and show that there always exists a PR code that can meet this bound for any desired codeword length. We provide a list of primitive polynomials for message lengths up to $40$ and show that the respective PR codes closely meet the Gilbert-Varshamov bound at various rates. Simulation results show that PR codes can achieve similar block error rates as their BCH counterparts at various signal-to-noise ratios (SNRs) and code rates. PR codes are rate-compatible and can generate as many coded symbols as required; thus, demonstrating a truly rateless performance.
△ Less
Submitted 12 July, 2021;
originally announced July 2021.
-
On the Hamming Weight Distribution of Subsequences of Pseudorandom Sequences
Authors:
Mahyar Shirvanimoghaddam
Abstract:
In this paper, we characterize the average Hamming weight distribution of subsequences of maximum-length sequences ($m$-sequences). In particular, we consider all possible $m$-sequences of dimension $k$ and find the average number of subsequences of length $n$ that have a Hamming weight $t$. To do so, we first characterize the Hamming weight distribution of the average dual code and use the MacWil…
▽ More
In this paper, we characterize the average Hamming weight distribution of subsequences of maximum-length sequences ($m$-sequences). In particular, we consider all possible $m$-sequences of dimension $k$ and find the average number of subsequences of length $n$ that have a Hamming weight $t$. To do so, we first characterize the Hamming weight distribution of the average dual code and use the MacWilliams identity to find the average Hamming weight distribution of subsequences of $m$-sequences. We further find a lower bound on the minimum Hamming weight of the subsequences and show that there always exists a primitive polynomial to generate an $m$-sequence to meet this bound. We show via simulations that when a proper primitive polynomial is chosen, subsequences of the $m$-sequence can form a good rateless code that can meet the normal approximation benchmark.
△ Less
Submitted 11 July, 2021;
originally announced July 2021.
-
Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Towards 6G
Authors:
Mojtaba Vaezi,
Amin Azari,
Saeed R. Khosravirad,
Mahyar Shirvanimoghaddam,
M. Mahdi Azari,
Danai Chasaki,
Petar Popovski
Abstract:
The next wave of wireless technologies is proliferating in connecting things among themselves as well as to humans. In the era of the Internet of things (IoT), billions of sensors, machines, vehicles, drones, and robots will be connected, making the world around us smarter. The IoT will encompass devices that must wirelessly communicate a diverse set of data gathered from the environment for myria…
▽ More
The next wave of wireless technologies is proliferating in connecting things among themselves as well as to humans. In the era of the Internet of things (IoT), billions of sensors, machines, vehicles, drones, and robots will be connected, making the world around us smarter. The IoT will encompass devices that must wirelessly communicate a diverse set of data gathered from the environment for myriad new applications. The ultimate goal is to extract insights from this data and develop solutions that improve quality of life and generate new revenue. Providing large-scale, long-lasting, reliable, and near real-time connectivity is the major challenge in enabling a smart connected world. This paper provides a comprehensive survey on existing and emerging communication solutions for serving IoT applications in the context of cellular, wide-area, as well as non-terrestrial networks. Specifically, wireless technology enhancements for providing IoT access in fifth-generation (5G) and beyond cellular networks, and communication networks over the unlicensed spectrum are presented. Aligned with the main key performance indicators of 5G and beyond 5G networks, we investigate solutions and standards that enable energy efficiency, reliability, low latency, and scalability (connection density) of current and future IoT networks. The solutions include grant-free access and channel coding for short-packet communications, non-orthogonal multiple access, and on-device intelligence. Further, a vision of new paradigm shifts in communication networks in the 2030s is provided, and the integration of the associated new technologies like artificial intelligence, non-terrestrial networks, and new spectra is elaborated. Finally, future research directions toward beyond 5G IoT networks are pointed out.
△ Less
Submitted 7 July, 2021;
originally announced July 2021.
-
Non-orthogonal HARQ for URLLC Design and Analysis
Authors:
Faisal Nadeem,
Mahyar Shirvanimoghaddam,
Yonghui Li,
Branka Vucetic
Abstract:
The fifth-generation (5G) of mobile standards is expected to provide ultra-reliability and low-latency communications (URLLC) for various applications and services, such as online gaming, wireless industrial control, augmented reality, and self driving cars. Meeting the contradictory requirements of URLLC, i.e., ultra-reliability and low-latency, is considered to be very challenging, especially in…
▽ More
The fifth-generation (5G) of mobile standards is expected to provide ultra-reliability and low-latency communications (URLLC) for various applications and services, such as online gaming, wireless industrial control, augmented reality, and self driving cars. Meeting the contradictory requirements of URLLC, i.e., ultra-reliability and low-latency, is considered to be very challenging, especially in bandwidth-limited scenarios. Most communication strategies rely on hybrid automatic repeat request (HARQ) to improve reliability at the expense of increased packet latency due to the retransmission of failing packets. To guarantee high-reliability and very low latency simultaneously, we enhance HARQ retransmission mechanism to achieve reliability with guaranteed packet level latency and in-time delivery. The proposed non-orthogonal HARQ (N-HARQ) utilizes non-orthogonal sharing of time slots for conducting retransmission. The reliability and delay analysis of the proposed N-HARQ in the finite block length (FBL) regime shows very high performance gain in packet delivery delay over conventional HARQ in both additive white Gaussian noise (AWGN) and Rayleigh fading channels. We also propose an optimization framework to further enhance the performance of N-HARQ for single and multiple retransmission cases.
△ Less
Submitted 19 May, 2021;
originally announced June 2021.
-
Analysis and Design of Analog Fountain Codes for Short Packet Communications
Authors:
Wen Jun Lim,
Rana Abbas,
Yonghui Li,
Branka Vucetic,
Mahyar Shirvanimoghaddam
Abstract:
In this paper, we focus on the design and analysis of the Analog Fountain Code (AFC) for short packet communications. We first propose a density evolution (DE) based framework, which tracks the evolution of the probability density function of the messages exchanged between variable and check nodes of AFC in the belief propagation decoder. Using the proposed DE framework, we formulate an optimisati…
▽ More
In this paper, we focus on the design and analysis of the Analog Fountain Code (AFC) for short packet communications. We first propose a density evolution (DE) based framework, which tracks the evolution of the probability density function of the messages exchanged between variable and check nodes of AFC in the belief propagation decoder. Using the proposed DE framework, we formulate an optimisation problem to find the optimal AFC code parameters, including the weight-set, which minimises the bit error rate at a given signal-to-noise ratio (SNR). Our results show the superiority of our AFC code design compared to existing designs of AFC in the literature and thus the validity of the proposed DE framework in the asymptotically long block length regime. We then focus on selecting the precoder to improve the performance of AFC at short block lengths. Simulation results show that lower precode rates obtain better realised rates over a wide SNR range for short information block lengths. We also discuss the complexity of the AFC decoder and propose a threshold-based decoder to reduce the complexity.
△ Less
Submitted 14 October, 2021; v1 submitted 3 February, 2021;
originally announced February 2021.
-
Clustering-based Joint Channel Estimation and Signal Detection for Grant-free NOMA
Authors:
Ayoob Salari,
Mahyar Shirvanimoghaddam,
Muhammad Basit Shahab,
Reza Arablouei,
Sarah Johnson
Abstract:
We propose a joint channel estimation and signal detection technique for the uplink non-orthogonal multiple access using an unsupervised clustering approach. We apply the Gaussian mixture model to cluster received signals and accordingly optimize the decision regions to enhance the symbol error rate (SER). We show that when the received powers of the users are sufficiently different, the proposed…
▽ More
We propose a joint channel estimation and signal detection technique for the uplink non-orthogonal multiple access using an unsupervised clustering approach. We apply the Gaussian mixture model to cluster received signals and accordingly optimize the decision regions to enhance the symbol error rate (SER). We show that when the received powers of the users are sufficiently different, the proposed clustering-based approach with no channel state information (CSI) at the receiver achieves an SER performance similar to that of the conventional maximum likelihood detector with full CSI. Since the accuracy of the utilized clustering algorithm depends on the number of the data points available at the receiver, the proposed technique delivers a tradeoff between the accuracy and block length.
△ Less
Submitted 6 October, 2020;
originally announced October 2020.
-
Performance Analysis and Optimization of NOMA with HARQ for Short Packet Communications in Massive IoT
Authors:
Fatemeh Ghanami,
Ghosheh Abed Hodtani,
Branka Vucetic,
Mahyar Shirvanimoghaddam
Abstract:
In this paper, we consider the massive non-orthogonal multiple access (NOMA) with hybrid automatic repeat request (HARQ) for short packet communications. To reduce the latency, each user can perform one re-transmission provided that the previous packet was not decoded successfully. The system performance is evaluated for both coordinated and uncoordinated transmissions. We first develop a Markov m…
▽ More
In this paper, we consider the massive non-orthogonal multiple access (NOMA) with hybrid automatic repeat request (HARQ) for short packet communications. To reduce the latency, each user can perform one re-transmission provided that the previous packet was not decoded successfully. The system performance is evaluated for both coordinated and uncoordinated transmissions. We first develop a Markov model (MM) to analyze the system dynamics and characterize the packet error rate (PER) and throughput of each user in the coordinated scenario. The power levels are then optimized for two scenarios, including the power constrained and reliability constrained scenarios. A simple yet efficient dynamic cell planning is also designed for the uncoordinated scenario. Numerical results show that both coordinated and uncoordinated NOMA-HARQ with a limited number of retransmissions can achieve the desired level of reliability with the guaranteed latency using a proper power control strategy. Results also show that NOMA-HARQ achieves a higher throughput compared to the orthogonal multiple access scheme with HARQ under the same average received power constraint at the base station.
△ Less
Submitted 1 October, 2020;
originally announced October 2020.
-
A Revisit to Ordered Statistics Decoding: Distance Distribution and Decoding Rules
Authors:
Chentao Yue,
Mahyar Shirvanimoghaddam,
Branka Vucetic,
Yonghui Li
Abstract:
This paper revisits the ordered statistics decoding (OSD). It provides a comprehensive analysis of the OSD algorithm by characterizing the statistical properties, evolution and the distribution of the Hamming distance and weighted Hamming distance from codeword estimates to the received sequence in the reprocessing stages of the OSD algorithm. We prove that the Hamming distance and weighted Hammin…
▽ More
This paper revisits the ordered statistics decoding (OSD). It provides a comprehensive analysis of the OSD algorithm by characterizing the statistical properties, evolution and the distribution of the Hamming distance and weighted Hamming distance from codeword estimates to the received sequence in the reprocessing stages of the OSD algorithm. We prove that the Hamming distance and weighted Hamming distance distributions can be characterized as mixture models capturing the decoding error probability and code weight enumerator. Simulation and numerical results show that our proposed statistical approaches can accurately describe the distance distributions. Based on these distributions and with the aim to reduce the decoding complexity, several techniques, including stop** rules and discarding rules, are proposed, and their decoding error performance and complexity are accordingly analyzed. Simulation results for decoding various eBCH codes demonstrate that the proposed techniques can significantly reduce the decoding complexity with a negligible loss in the decoding error performance.
△ Less
Submitted 6 May, 2021; v1 submitted 10 April, 2020;
originally announced April 2020.
-
Grant-Free Non-Orthogonal Multiple Access: A Key Enabler for 6G-IoT
Authors:
Rana Abbas,
Tao Huang,
Basit Shahab,
Mahyar Shirvanimoghaddam,
Yonghui Li,
Branka Vucetic
Abstract:
The proliferating number of devices with short payloads as well as low power budget has already driven researchers away from classical grant-based access schemes that are notorious for their large signalling overhead as well as power-consuming retransmissions. Instead, light-weight random access protocols have been re-investigated and their throughput has been improved in orders of magnitude with…
▽ More
The proliferating number of devices with short payloads as well as low power budget has already driven researchers away from classical grant-based access schemes that are notorious for their large signalling overhead as well as power-consuming retransmissions. Instead, light-weight random access protocols have been re-investigated and their throughput has been improved in orders of magnitude with sophisticated yet still low-complex transceiver algorithms. In fact, grant-free access has been identified as a key medium access control technique for providing massive connectivity in machine type communications in cellular networks. In this paper, we show that grant-free access combined with non-orthogonal transmission schemes is a promising solution for 6G Internet of Things (IoT). We present novel and promising results for deep learning (DL)-based techniques for joint user detection and decoding. Then, we propose a multi-layered model for GF-NOMA for power-efficient communications. We also discuss resource allocation issues to enable the co-existence of GF-NOMA with other orthogonal or even grant-based schemes. Finally, we conclude with proposed research directions for medium access towards enabling 6G-IoT.
△ Less
Submitted 23 March, 2020;
originally announced March 2020.
-
Dynamic HARQ with Guaranteed Delay
Authors:
Mahyar Shirvanimoghaddam,
Hossein Khayami,
Yonghui Li,
Branka Vucetic
Abstract:
In this paper, a dynamic-hybrid automatic repeat request (D-HARQ) scheme with guaranteed delay performance is proposed. As opposed to the conventional HARQ that the maximum number of re-transmissions, L, is fixed, in the proposed scheme packets can be retransmitted more times given that the previous packet was received with less than L re-transmissions. The dynamic of the proposed scheme is analyz…
▽ More
In this paper, a dynamic-hybrid automatic repeat request (D-HARQ) scheme with guaranteed delay performance is proposed. As opposed to the conventional HARQ that the maximum number of re-transmissions, L, is fixed, in the proposed scheme packets can be retransmitted more times given that the previous packet was received with less than L re-transmissions. The dynamic of the proposed scheme is analyzed using the Markov model. For delay-sensitive applications, the proposed scheme shows superior performance in terms of packet error rate compared with the conventional HARQ and Fixed re-transmission schemes when the channel state information is not available at the transmitter. We further show that D-HARQ achieves a higher throughput compared with the conventional HARQ and fixed re-transmission schemes under the same reliability constraint.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
Extended Kalman Filter Beam Tracking for Millimeter Wave Vehicular Communications
Authors:
Sina Shaham,
Matthew Kokshoorn,
Ming Ding,
Zihuai Lin,
Mahyar Shirvanimoghaddam
Abstract:
Millimeter-wave (mmWave) communication is a promising technology to meet the ever-growing data traffic of vehicular communications. Unfortunately, more frequent channel estimations are required in this spectrum due to the narrow beams employed to compensate for the high path loss. Hence, the development of highly efficient beam tracking algorithms is essential to enable the technology, particularl…
▽ More
Millimeter-wave (mmWave) communication is a promising technology to meet the ever-growing data traffic of vehicular communications. Unfortunately, more frequent channel estimations are required in this spectrum due to the narrow beams employed to compensate for the high path loss. Hence, the development of highly efficient beam tracking algorithms is essential to enable the technology, particularly for fast-changing environments in vehicular communications. In this paper, we propose an innovative scheme for beam tracking based on the Extended Kalman Filter (EKF), improving the mean square error performance by 49% in vehicular settings. We propose to use the position, velocity, and channel coefficient as state variables of the EKF algorithm and show that such an approach results in improved beam tracking with low computational complexity by taking the kinematic characteristics of the system into account. We also explicitly derive the closed-from expressions for the Jacobian matrix of the EKF algorithm.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
On the Importance of Location Privacy for Users of Location Based Applications
Authors:
Sina Shaham,
Saba Rafieian,
Ming Ding,
Mahyar Shirvanimoghaddam,
Zihuai Lin
Abstract:
Do people care about their location privacy while using location-based service apps? This paper aims to answer this question and several other hypotheses through a survey, and review the privacy preservation techniques. Our results indicate that privacy is indeed an influential factor in the selection of location-based apps by users.
Do people care about their location privacy while using location-based service apps? This paper aims to answer this question and several other hypotheses through a survey, and review the privacy preservation techniques. Our results indicate that privacy is indeed an influential factor in the selection of location-based apps by users.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
Grant-free Non-orthogonal Multiple Access for IoT: A Survey
Authors:
Muhammad Basit Shahab,
Rana Abbas,
Mahyar Shirvanimoghaddam,
Sarah J. Johnson
Abstract:
Massive machine-type communications (mMTC) is one of the main three focus areas in the 5th generation (5G) of mobile standards to enable connectivity of a massive number of internet of things (IoT) devices with little or no human intervention. In conventional human-type communications (HTC), due to the limited number of available radio resources and orthogonal/non-overlap** nature of existing re…
▽ More
Massive machine-type communications (mMTC) is one of the main three focus areas in the 5th generation (5G) of mobile standards to enable connectivity of a massive number of internet of things (IoT) devices with little or no human intervention. In conventional human-type communications (HTC), due to the limited number of available radio resources and orthogonal/non-overlap** nature of existing resource allocation techniques, users need to compete for connectivity through a random access (RA) process, which may turn into a performance bottleneck in mMTC. In this context, non-orthogonal multiple access (NOMA) has emerged as a potential technology that allows overlap** of multiple users over a radio resource, thereby creating an opportunity to enable more autonomous and grant-free communication, where devices can transmit data whenever they need. The existing literature on NOMA schemes majorly considers centralized scheduling based HTC, where users are already connected, and various system parameters like spreading sequences, interleaving patterns, power control, etc., are predefined. Contrary to HTC, mMTC traffic is different with mostly uplink communication, small data size per device, diverse quality of service, autonomous nature, and massive number of devices. Hence, the signaling overhead and latency of centralized scheduling becomes a potential performance bottleneck. To tackle this, grant-free access is needed, where mMTC devices can autonomously transmit their data over randomly chosen radio resources. This article, in contrast to existing surveys, comprehensively discusses the recent advances in NOMA from a grant-free connectivity perspective. Moreover, related practical challenges and future directions are discussed.
△ Less
Submitted 15 October, 2019;
originally announced October 2019.
-
Protograph LDPC Code Design for Asynchronous Random Access
Authors:
Federico Clazzer,
Balazs Matuz,
Sachini Jayasooriya,
Mahyar Shirvanimoghaddam,
Sarah J. Johnson
Abstract:
This work addresses the physical layer channel code design for an uncoordinated, frame- and slot-asynchronous random access protocol. Starting from the observation that collisions between two users yield very specific interference patterns, we define a surrogate channel model and propose different protograph low-density parity-check code designs. The proposed codes are both tested in a setup where…
▽ More
This work addresses the physical layer channel code design for an uncoordinated, frame- and slot-asynchronous random access protocol. Starting from the observation that collisions between two users yield very specific interference patterns, we define a surrogate channel model and propose different protograph low-density parity-check code designs. The proposed codes are both tested in a setup where the physical layer is abstracted, as well as on a more realistic channel model, where finite-length physical layer simulations of the entire asynchronous random access scheme, including decoding are carried out. We find that the abstracted physical layer model overestimates the performance when short blocks are considered. Additionally, the optimized codes show gains in supported channel traffic - a measure of the number of terminals that can be concurrently accommodated on the channel - of around 17% at a packet loss rate of 10^{-2} w.r.t. off-the-shelf codes.
△ Less
Submitted 5 August, 2019;
originally announced August 2019.
-
Real-Time Remote Estimation with Hybrid ARQ in Wireless Networked Control
Authors:
Kang Huang,
Wanchun Liu,
Mahyar Shirvanimoghaddam,
Yonghui Li,
Branka Vucetic
Abstract:
Real-time remote estimation is critical for mission-critical applications including industrial automation, smart grid and tactile Internet. In this paper, we propose a hybrid automatic repeat request (HARQ)-based real-time remote estimation framework for linear time-invariant (LTI) dynamic systems. Considering the estimation quality of such a system, there is a fundamental tradeoff between the rel…
▽ More
Real-time remote estimation is critical for mission-critical applications including industrial automation, smart grid and tactile Internet. In this paper, we propose a hybrid automatic repeat request (HARQ)-based real-time remote estimation framework for linear time-invariant (LTI) dynamic systems. Considering the estimation quality of such a system, there is a fundamental tradeoff between the reliability and freshness of the sensor's measurement transmission. We formulate a new problem to optimize the sensor's online transmission control policy for static and Markov fading channels, which depends on both the current estimation quality of the remote estimator and the current number of retransmissions of the sensor, so as to minimize the long-term remote estimation mean squared error (MSE). This problem is non-trivial. In particular, it is challenging to derive the condition in terms of the communication channel quality and the LTI system parameters, to ensure a bounded long-term estimation MSE. We derive an elegant sufficient condition of the existence of a stationary and deterministic optimal policy that stabilizes the remote estimation system and minimizes the MSE. Also, we prove that the optimal policy has a switching structure, and accordingly derive a low-complexity suboptimal policy. Numerical results show that the proposed optimal policy significantly improves the performance of the remote estimation system compared to the conventional non-HARQ policy.
△ Less
Submitted 28 March, 2019;
originally announced March 2019.
-
Segmentation-Discarding Ordered-Statistic Decoding for Linear Block Codes
Authors:
Chentao Yue,
Mahyar Shirvanimoghaddam,
Yonghui Li,
Branka Vucetic
Abstract:
In this paper, we propose an efficient reliability based segmentation-discarding decoding (SDD) algorithm for short block-length codes. A novel segmentation-discarding technique is proposed along with the stop** rule to significantly reduce the decoding complexity without a significant performance degradation compared to ordered statistics decoding (OSD). In the proposed decoder, the list of tes…
▽ More
In this paper, we propose an efficient reliability based segmentation-discarding decoding (SDD) algorithm for short block-length codes. A novel segmentation-discarding technique is proposed along with the stop** rule to significantly reduce the decoding complexity without a significant performance degradation compared to ordered statistics decoding (OSD). In the proposed decoder, the list of test error patterns (TEPs) is divided into several segments according to carefully selected boundaries and every segment is checked separately during the reprocessing stage. Decoding is performed under the constraint of the discarding rule and stop** rule. Simulations results for different codes show that our proposed algorithm can significantly reduce the decoding complexity compared to the existing OSD algorithms in literature.
△ Less
Submitted 21 January, 2019; v1 submitted 8 January, 2019;
originally announced January 2019.
-
Short Block-length Codes for Ultra-Reliable Low-Latency Communications
Authors:
Mahyar Shirvanimoghaddam,
Mohamad Sadegh Mohamadi,
Rana Abbas,
Aleksandar Minja,
Chentao Yue,
Balazs Matuz,
Guojun Han,
Zihuai Lin,
Yonghui Li,
Sarah Johnson,
Branka Vucetic
Abstract:
This paper reviews the state of the art channel coding techniques for ultra-reliable low latency communication (URLLC). The stringent requirements of URLLC services, such as ultra-high reliability and low latency, have made it the most challenging feature of the fifth generation (5G) mobile systems. The problem is even more challenging for the services beyond the 5G promise, such as tele-surgery a…
▽ More
This paper reviews the state of the art channel coding techniques for ultra-reliable low latency communication (URLLC). The stringent requirements of URLLC services, such as ultra-high reliability and low latency, have made it the most challenging feature of the fifth generation (5G) mobile systems. The problem is even more challenging for the services beyond the 5G promise, such as tele-surgery and factory automation, which require latencies less than 1ms and failure rate as low as $10^{-9}$. The very low latency requirements of URLLC do not allow traditional approaches such as re-transmission to be used to increase the reliability. On the other hand, to guarantee the delay requirements, the block length needs to be small, so conventional channel codes, originally designed and optimised for moderate-to-long block-lengths, show notable deficiencies for short blocks. This paper provides an overview on channel coding techniques for short block lengths and compares them in terms of performance and complexity. Several important research directions are identified and discussed in more detail with several possible solutions.
△ Less
Submitted 5 September, 2018; v1 submitted 26 February, 2018;
originally announced February 2018.
-
Towards a Green and Self-Powered Internet of Things Using Piezoelectric Energy Harvesting
Authors:
Mahyar Shirvanimoghaddam,
Kamyar Shirvanimoghaddam,
Mohammad Mahdi Abolhasani,
Majid Farhangi,
Vaid Zahiri Barsari,
Hangyue Liu,
Mischa Dohler,
Minoo Naebe
Abstract:
Internet of things (IoT) is a revolutionizing technology which aims to create an ecosystem of connected objects and embedded devices and provide ubiquitous connectivity between trillions of not only smart devices but also simple sensors and actuators. Although recent advancements in miniaturization of devices with higher computational capabilities and ultra-low power communication technologies hav…
▽ More
Internet of things (IoT) is a revolutionizing technology which aims to create an ecosystem of connected objects and embedded devices and provide ubiquitous connectivity between trillions of not only smart devices but also simple sensors and actuators. Although recent advancements in miniaturization of devices with higher computational capabilities and ultra-low power communication technologies have enabled the vast deployment of sensors and actuators everywhere, such an evolution calls for fundamental changes in hardware design, software, network architecture, data analytic, data storage and power sources. A large portion of IoT devices cannot be powered by batteries only anymore, as they will be installed in hard to reach areas and regular battery replacement and maintenance are infeasible. A viable solution is to scavenge and harvest energy from environment and then provide enough energy to the devices to perform their operations. This will significantly increase the device life time and eliminate the need for the battery as an energy source. This survey aims at providing a comprehensive study on energy harvesting techniques as alternative and promising solutions to power IoT devices. We present the main design challenges of IoT devices in terms of energy and power and provide design considerations for a successful implementations of self-powered IoT devices. We then specifically focus on piezoelectric energy harvesting and RF energy harvesting as most promising solutions to power IoT devices and present the main challenges and research directions. We also shed light on the security challenges of energy harvesting enabled IoT systems and green big data.
△ Less
Submitted 30 April, 2019; v1 submitted 4 December, 2017;
originally announced December 2017.
-
Ultra-Reliable Low Latency Cellular Networks: Use Cases, Challenges and Approaches
Authors:
He Chen,
Rana Abbas,
Peng Cheng,
Mahyar Shirvanimoghaddam,
Wibowo Hardjawana,
Wei Bao,
Yonghui Li,
Branka Vucetic
Abstract:
The fifth-generation cellular mobile networks are expected to support mission critical ultra-reliable low latency communication (URLLC) services in addition to the enhanced mobile broadband applications. This article first introduces three emerging mission critical applications of URLLC and identifies their requirements on end-to-end latency and reliability. We then investigate the various sources…
▽ More
The fifth-generation cellular mobile networks are expected to support mission critical ultra-reliable low latency communication (URLLC) services in addition to the enhanced mobile broadband applications. This article first introduces three emerging mission critical applications of URLLC and identifies their requirements on end-to-end latency and reliability. We then investigate the various sources of end-to-end delay of current wireless networks by taking the 4G Long Term Evolution (LTE) as an example. Subsequently, we propose and evaluate several techniques to reduce the end-to-end latency from the perspectives of error control coding, signal processing, and radio resource management. We also briefly discuss other network design approaches with the potential for further latency reduction.
△ Less
Submitted 7 August, 2018; v1 submitted 2 September, 2017;
originally announced September 2017.
-
Grant-Free Massive NOMA: Outage Probability and Throughput
Authors:
Rana Abbas,
Mahyar Shirvanimoghaddam,
Yonghui Li,
Branka Vucetic
Abstract:
In this paper, we consider a massive uncoordinated non-orthogonal multiple access (NOMA) scheme where devices have strict latency requirements and no retransmission opportunities are available. Each device chooses a pilot sequence from a predetermined set as its signature and transmits its selected pilot and data simultaneously. A collision occurs when two or more devices choose the same pilot seq…
▽ More
In this paper, we consider a massive uncoordinated non-orthogonal multiple access (NOMA) scheme where devices have strict latency requirements and no retransmission opportunities are available. Each device chooses a pilot sequence from a predetermined set as its signature and transmits its selected pilot and data simultaneously. A collision occurs when two or more devices choose the same pilot sequence. Collisions are treated as interference to the remaining received signals. We consider successive joint decoding (SJD) and successive interference cancellation (SIC) under a Rayleigh fading and path loss channel model. We first derive the expression for the outage probability for the case where devices transmit at the same fixed rate. Then, we derive the expression for the maximum achievable throughput for the case where devices transmit with rateless codes. Thus, their code rate is adaptive to the system conditions, i.e., load, received powers, and interference. Numerical results verify the accuracy of our analytical expressions. For low data rate transmissions, results show that SIC performs close to that of SJD in terms of outage probability for packet arrival rates up to 10 packets per slot. However, SJD can achieve almost double the throughput of SIC and is, thus, far more superior.
△ Less
Submitted 24 July, 2017;
originally announced July 2017.
-
On the Fundamental Limits of Random Non-orthogonal Multiple Access in Cellular Massive IoT
Authors:
Mahyar Shirvanimoghaddam,
Massimo Condoluci,
Mischa Dohler,
Sarah Johnson
Abstract:
Machine-to-machine (M2M) constitutes the communication paradigm at the basis of Internet of Things (IoT) vision. M2M solutions allow billions of multi-role devices to communicate with each other or with the underlying data transport infrastructure without, or with minimal, human intervention. Current solutions for wireless transmissions originally designed for human-based applications thus require…
▽ More
Machine-to-machine (M2M) constitutes the communication paradigm at the basis of Internet of Things (IoT) vision. M2M solutions allow billions of multi-role devices to communicate with each other or with the underlying data transport infrastructure without, or with minimal, human intervention. Current solutions for wireless transmissions originally designed for human-based applications thus require a substantial shift to cope with the capacity issues in managing a huge amount of M2M devices. In this paper, we consider the multiple access techniques as promising solutions to support a large number of devices in cellular systems with limited radio resources. We focus on non-orthogonal multiple access (NOMA) where, with the aim to increase the channel efficiency, the devices share the same radio resources for their data transmission. This has been shown to provide optimal throughput from an information theoretic point of view.We consider a realistic system model and characterise the system performance in terms of throughput and energy efficiency in a NOMA scenario with a random packet arrival model, where we also derive the stability condition for the system to guarantee the performance.
△ Less
Submitted 30 May, 2017;
originally announced May 2017.
-
Raptor Codes for Higher-Order Modulation Using a Multi-Edge Framework
Authors:
Sachini Jayasooriya,
Mahyar Shirvanimoghaddam,
Lawrence Ong,
Sarah J. Johnson
Abstract:
In this paper, we represent Raptor codes as multi-edge type low-density parity-check (MET-LDPC) codes, which gives a general framework to design them for higher-order modulation using MET density evolution. We then propose an efficient Raptor code design method for higher-order modulation, where we design distinct degree distributions for distinct bit levels. We consider a joint decoding scheme ba…
▽ More
In this paper, we represent Raptor codes as multi-edge type low-density parity-check (MET-LDPC) codes, which gives a general framework to design them for higher-order modulation using MET density evolution. We then propose an efficient Raptor code design method for higher-order modulation, where we design distinct degree distributions for distinct bit levels. We consider a joint decoding scheme based on belief propagation for Raptor codes and also derive an exact expression for the stability condition. In several examples, we demonstrate that the higher-order modulated Raptor codes designed using the multi-edge framework outperform previously reported higher-order modulation codes in literature.
△ Less
Submitted 13 January, 2017;
originally announced January 2017.
-
Analysis and design of Raptor codes using a multi-edge framework
Authors:
Sachini Jayasooriya,
Mahyar Shirvanimoghaddam,
Lawrence Ong,
Sarah J. Johnson
Abstract:
The focus of this paper is on the analysis and design of Raptor codes using a multi-edge framework. In this regard, we first represent the Raptor code as a multi-edge type low-density parity-check (METLDPC) code. This MET representation gives a general framework to analyze and design Raptor codes over a binary input additive white Gaussian noise channel using MET density evolution (MET-DE). We con…
▽ More
The focus of this paper is on the analysis and design of Raptor codes using a multi-edge framework. In this regard, we first represent the Raptor code as a multi-edge type low-density parity-check (METLDPC) code. This MET representation gives a general framework to analyze and design Raptor codes over a binary input additive white Gaussian noise channel using MET density evolution (MET-DE). We consider a joint decoding scheme based on the belief propagation (BP) decoding for Raptor codes in the multi-edge framework, and analyze the convergence behavior of the BP decoder using MET-DE. In joint decoding of Raptor codes, the component codes correspond to inner code and precode are decoded in parallel and provide information to each other. We also derive an exact expression for the stability of Raptor codes with joint decoding. We then propose an efficient Raptor code design method using the multi-edge framework, where we simultaneously optimize the inner code and the precode. Finally we consider performance-complexity trade-offs of Raptor codes using the multi-edge framework. Through density evolution analysis we show that the designed Raptor codes using the multi-edge framework outperform the existing Raptor codes in literature in terms of the realized rate.
△ Less
Submitted 9 January, 2017;
originally announced January 2017.
-
Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations
Authors:
Mahyar Shirvanimoghaddam,
Mischa Dohler,
Sarah Johnson
Abstract:
The Internet of Things (IoT) promises ubiquitous connectivity of everything everywhere, which represents the biggest technology trend in the years to come. It is expected that by 2020 over 25 billion devices will be connected to cellular networks; far beyond the number of devices in current wireless networks. Machine-to-Machine (M2M) communications aims at providing the communication infrastructur…
▽ More
The Internet of Things (IoT) promises ubiquitous connectivity of everything everywhere, which represents the biggest technology trend in the years to come. It is expected that by 2020 over 25 billion devices will be connected to cellular networks; far beyond the number of devices in current wireless networks. Machine-to-Machine (M2M) communications aims at providing the communication infrastructure for enabling IoT by facilitating the billions of multi-role devices to communicate with each other and with the underlying data transport infrastructure without, or with little, human intervention. Providing this infrastructure will require a dramatic shift from the current protocols mostly designed for human-to-human (H2H) applications. This article reviews recent 3GPP solutions for enabling massive cellular IoT and investigates the random access strategies for M2M communications, which shows that cellular networks must evolve to handle the new ways in which devices will connect and communicate with the system. A massive non-orthogonal multiple access (NOMA) technique is then presented as a promising solution to support a massive number of IoT devices in cellular networks, where we also identify its practical challenges and future research directions.
△ Less
Submitted 1 December, 2016;
originally announced December 2016.
-
Multiple Access Technologies for cellular M2M Communications: An Overview
Authors:
Mahyar Shirvanimoghaddam,
Sarah Johnson
Abstract:
This paper reviews the multiple access techniques for machine-to-machine (M2M) communications in future wireless cellular networks. M2M communications aims at providing te communication infrastructure for the emerging Internet of Things (IoT), which will revolutionize the way we interact with our surrounding physical environment. We provide an overview of the multiple access strategies and explain…
▽ More
This paper reviews the multiple access techniques for machine-to-machine (M2M) communications in future wireless cellular networks. M2M communications aims at providing te communication infrastructure for the emerging Internet of Things (IoT), which will revolutionize the way we interact with our surrounding physical environment. We provide an overview of the multiple access strategies and explain their limitations when used for M2M communications. We show the throughput efficiency of different multiple access techniques when used in coordinated and uncoordinated scenarios. Non-orthogonal multiple access is also shown to support a larger number of devices compared to orthogonal multiple access techniques, especially in uncoordinated scenarios. We also detail the issues and challenges of different multiple access techniques to be used for M2M applications in cellular networks.
△ Less
Submitted 16 November, 2016;
originally announced November 2016.
-
Random Multiple Access for M2M Communications with QoS Guarantees
Authors:
Rana Abbas,
Mahyar Shirvanimoghaddam,
Yonghui Li,
Branka Vucetic
Abstract:
We propose a novel random multiple access (RMA) scheme with quality of service (QoS) guarantees for machine-to-machine (M2M) communications. We consider a slotted uncoordinated data transmission period during which machine type communication (MTC) devices transmit over the same radio channel. Based on the latency requirements, MTC devices are divided into groups of different sizes, and the transmi…
▽ More
We propose a novel random multiple access (RMA) scheme with quality of service (QoS) guarantees for machine-to-machine (M2M) communications. We consider a slotted uncoordinated data transmission period during which machine type communication (MTC) devices transmit over the same radio channel. Based on the latency requirements, MTC devices are divided into groups of different sizes, and the transmission frame is divided into subframes of different lengths. In each subframe, each group is assigned an access probability based on which an MTC device decides to transmit replicas of its packet or remain silent. The base station (BS) employs successive interference cancellation (SIC) to recover all the superposed packets. We derive the closed form expressions for the average probability of device resolution for each group, and we use these expressions to design the access probabilities. The accuracy of the expressions is validated through Monte Carlo simulations. We show that the designed access probabilities can guarantee the QoS requirements with high reliability and high energy efficiency. Finally, we show that RMA can outperform standard coordinated access schemes as well as some of the recently proposed M2M access schemes for cellular networks.
△ Less
Submitted 23 October, 2016;
originally announced October 2016.
-
New Density Evolution Approximation for LDPC and Multi-Edge Type LDPC Codes
Authors:
Sachini Jayasooriya,
Mahyar Shirvanimoghaddam,
Lawrence Ong,
Gottfried Lechner,
Sarah J. Johnson
Abstract:
This paper considers density evolution for lowdensity parity-check (LDPC) and multi-edge type low-density parity-check (MET-LDPC) codes over the binary input additive white Gaussian noise channel. We first analyze three singleparameter Gaussian approximations for density evolution and discuss their accuracy under several conditions, namely at low rates, with punctured and degree-one variable nodes…
▽ More
This paper considers density evolution for lowdensity parity-check (LDPC) and multi-edge type low-density parity-check (MET-LDPC) codes over the binary input additive white Gaussian noise channel. We first analyze three singleparameter Gaussian approximations for density evolution and discuss their accuracy under several conditions, namely at low rates, with punctured and degree-one variable nodes. We observe that the assumption of symmetric Gaussian distribution for the density-evolution messages is not accurate in the early decoding iterations, particularly at low rates and with punctured variable nodes. Thus single-parameter Gaussian approximation methods produce very poor results in these cases. Based on these observations, we then introduce a new density evolution approximation algorithm for LDPC and MET-LDPC codes. Our method is a combination of full density evolution and a single-parameter Gaussian approximation, where we assume a symmetric Gaussian distribution only after density-evolution messages closely follow a symmetric Gaussian distribution. Our method significantly improves the accuracy of the code threshold estimation. Additionally, the proposed method significantly reduces the computational time of evaluating the code threshold compared to full density evolution thereby making it more suitable for code design.
△ Less
Submitted 16 May, 2016;
originally announced May 2016.
-
A Joint Optimization Technique for Multi-Edge Type LDPC Codes
Authors:
Sachini Jayasooriya,
Mahyar Shirvanimoghaddam,
Lawrence Ong,
Sarah J. Johnson
Abstract:
This paper considers the optimization of multi-edge type low-density parity-check (METLDPC) codes to maximize the decoding threshold. We propose an algorithm to jointly optimize the node degree distribution and the multi-edge structure of MET-LDPC codes for given values of the maximum number of edge-types and maximum node degrees. This joint optimization is particularly important for MET-LDPC code…
▽ More
This paper considers the optimization of multi-edge type low-density parity-check (METLDPC) codes to maximize the decoding threshold. We propose an algorithm to jointly optimize the node degree distribution and the multi-edge structure of MET-LDPC codes for given values of the maximum number of edge-types and maximum node degrees. This joint optimization is particularly important for MET-LDPC codes as it is not clear a priori which structures will be good. Using several examples, we demonstrate that the MET-LDPC codes designed by the proposed joint optimization algorithm exhibit improved decoding thresholds compared to previously reported MET-LDPC codes.
△ Less
Submitted 16 May, 2016;
originally announced May 2016.
-
On the problem of non-zero word error rates for fixed-rate error correction codes in continuous variable quantum key distribution
Authors:
Sarah J. Johnson,
Andrew M. Lance,
Lawrence Ong,
Mahyar Shirvanimoghaddam,
T. C. Ralph,
Thomas Symul
Abstract:
The maximum operational range of continuous variable quantum key distribution protocols has shown to be improved by employing high-efficiency forward error correction codes. Typically, the secret key rate model for such protocols is modified to account for the non-zero word error rate of such codes. In this paper, we demonstrate that this model is incorrect: Firstly, we show by example that fixed-…
▽ More
The maximum operational range of continuous variable quantum key distribution protocols has shown to be improved by employing high-efficiency forward error correction codes. Typically, the secret key rate model for such protocols is modified to account for the non-zero word error rate of such codes. In this paper, we demonstrate that this model is incorrect: Firstly, we show by example that fixed-rate error correction codes, as currently defined, can exhibit efficiencies greater than unity. Secondly, we show that using this secret key model combined with greater than unity efficiency codes, implies that it is possible to achieve a positive secret key over an entanglement breaking channel - an impossible scenario. We then consider the secret key model from a post-selection perspective, and examine the implications for key rate if we constrain the forward error correction codes to operate at low word error rates.
△ Less
Submitted 16 March, 2017; v1 submitted 16 May, 2016;
originally announced May 2016.
-
Massive Multiple Access Based on Superposition Raptor Codes for M2M Communications
Authors:
Mahyar Shirvanimoghaddam,
Mischa Dohler,
Sarah J. Johnson
Abstract:
Machine-to-machine (M2M) wireless systems aim to provide ubiquitous connectivity between machine type communication (MTC) devices without any human intervention. Given the exponential growth of MTC traffic, it is of utmost importance to ensure that future wireless standards are capable of handling this traffic. In this paper, we focus on the design of a very efficient massive access strategy for h…
▽ More
Machine-to-machine (M2M) wireless systems aim to provide ubiquitous connectivity between machine type communication (MTC) devices without any human intervention. Given the exponential growth of MTC traffic, it is of utmost importance to ensure that future wireless standards are capable of handling this traffic. In this paper, we focus on the design of a very efficient massive access strategy for highly dense cellular networks with M2M communications. Several MTC devices are allowed to simultaneously transmit at the same resource block by incorporating Raptor codes and superposition modulation. This significantly reduces the access delay and improves the achievable system throughput. A simple yet efficient random access strategy is proposed to only detect the selected preambles and the number of devices which have chosen them. No device identification is needed in the random access phase which significantly reduces the signalling overhead. The proposed scheme is analyzed and the maximum number of MTC devices that can be supported in a resource block is characterized as a function of the message length, number of available resources, and the number of preambles. Simulation results show that the proposed scheme can effectively support a massive number of MTC devices for a limited number of available resources, when the message size is small.
△ Less
Submitted 17 February, 2016;
originally announced February 2016.
-
Raptor Codes in the Low SNR Regime
Authors:
Mahyar Shirvanimoghaddam,
Sarah J. Johnson
Abstract:
In this paper, we revisit the design of Raptor codes for binary input additive white Gaussian noise (BIAWGN) channels, where we are interested in very low signal to noise ratios (SNRs). A linear programming degree distribution optimization problem is defined for Raptor codes in the low SNR regime through several approximations. We also provide an exact expression for the polynomial representation…
▽ More
In this paper, we revisit the design of Raptor codes for binary input additive white Gaussian noise (BIAWGN) channels, where we are interested in very low signal to noise ratios (SNRs). A linear programming degree distribution optimization problem is defined for Raptor codes in the low SNR regime through several approximations. We also provide an exact expression for the polynomial representation of the degree distribution with infinite maximum degree in the low SNR regime, which enables us to calculate the exact value of the fractions of output nodes of small degrees. A more practical degree distribution design is also proposed for Raptor codes in the low SNR regime, where we include the rate efficiency and the decoding complexity in the optimization problem, and an upper bound on the maximum rate efficiency is derived for given design parameters. Simulation results show that the Raptor code with the designed degree distributions can approach rate efficiencies larger than 0.95 in the low SNR regime.
△ Less
Submitted 27 October, 2015;
originally announced October 2015.
-
Design of Raptor Codes in the Low SNR Regime with Applications in Quantum Key Distribution
Authors:
Mahyar Shirvanimoghaddam,
Sarah J. Johnson,
Andrew M. Lance
Abstract:
The focus of this work is on the design of Raptor codes for continuous variable Quantum key distribution (CV-QKD) systems. We design a highly efficient Raptor code for very low signal to noise ratios (SNRs), which enables CV-QKD systems to operate over long distances with a significantly higher secret key rate compared to conventional fixed rate codes. The degree distribution design of Raptor code…
▽ More
The focus of this work is on the design of Raptor codes for continuous variable Quantum key distribution (CV-QKD) systems. We design a highly efficient Raptor code for very low signal to noise ratios (SNRs), which enables CV-QKD systems to operate over long distances with a significantly higher secret key rate compared to conventional fixed rate codes. The degree distribution design of Raptor codes in the low SNR regime is formulated as a linear program, where a set of optimized degree distributions are also obtained through linear programming. Simulation results show that the designed code achieves efficiencies higher than 94\% for SNRs as low as -20 dB and -30 dB. We further propose a new error reconciliation protocol for CV-QKD systems by using Raptor codes and show that it can achieve higher secret key rates over long distances compared to existing protocols.
△ Less
Submitted 26 October, 2015;
originally announced October 2015.
-
Binary Compressive Sensing via Analog Fountain Coding
Authors:
Mahyar Shirvanimoghaddam,
Yonghui Li,
Branka Vucetic,
**hong Yuan
Abstract:
In this paper, a compressive sensing (CS) approach is proposed for sparse binary signals' compression and reconstruction based on analog fountain codes (AFCs). In the proposed scheme, referred to as the analog fountain compressive sensing (AFCS), each measurement is generated from a linear combination of L randomly selected binary signal elements with real weight coefficients. The weight coefficie…
▽ More
In this paper, a compressive sensing (CS) approach is proposed for sparse binary signals' compression and reconstruction based on analog fountain codes (AFCs). In the proposed scheme, referred to as the analog fountain compressive sensing (AFCS), each measurement is generated from a linear combination of L randomly selected binary signal elements with real weight coefficients. The weight coefficients are chosen from a finite weight set and L, called measurement degree, is obtained based on a predefined degree distribution function. We propose a simple verification based reconstruction algorithm for the AFCS in the noiseless case. The proposed verification based decoder is analyzed through SUM-OR tree analytical approach and an optimization problem is formulated to find the optimum measurement degree to minimize the number of measurements required for the reconstruction of binary sparse signals. We show that in the AFCS, the number of required measurements is of O(-n log(1-k/n)), where n is the signal length and k is the signal sparsity level. We then consider the signal reconstruction of AFCS in the presence of additive white Gaussian noise (AWGN) and the standard message passing decoder is then used for the signal recovery. Simulation results show that the AFCS can perfectly recover all non-zero elements of the sparse binary signal with a significantly reduced number of measurements, compared to the conventional binary CS and L1-minimization approaches in a wide range of signal to noise ratios (SNRs). Finally, we show a practical application of the AFCS for the sparse event detection in wireless sensor networks (WSNs), where the sensors' readings can be treated as measurements from the CS point of view.
△ Less
Submitted 13 August, 2015;
originally announced August 2015.
-
Probabilistic Rateless Multiple Access for Machine-to-Machine Communication
Authors:
Mahyar Shirvanimoghaddam,
Yonghui Li,
Mischa Dohler,
Branka Vucetic
Abstract:
Future machine to machine (M2M) communications need to support a massive number of devices communicating with each other with little or no human intervention. Random access techniques were originally proposed to enable M2M multiple access, but suffer from severe congestion and access delay in an M2M system with a large number of devices. In this paper, we propose a novel multiple access scheme for…
▽ More
Future machine to machine (M2M) communications need to support a massive number of devices communicating with each other with little or no human intervention. Random access techniques were originally proposed to enable M2M multiple access, but suffer from severe congestion and access delay in an M2M system with a large number of devices. In this paper, we propose a novel multiple access scheme for M2M communications based on the capacity-approaching analog fountain code to efficiently minimize the access delay and satisfy the delay requirement for each device. This is achieved by allowing M2M devices to transmit at the same time on the same channel in an optimal probabilistic manner based on their individual delay requirements. Simulation results show that the proposed scheme achieves a near optimal rate performance and at the same time guarantees the delay requirements of the devices. We further propose a simple random access strategy and characterized the required overhead. Simulation results show the proposed approach significantly outperforms the existing random access schemes currently used in long term evolution advanced (LTE-A) standard in terms of the access delay.
△ Less
Submitted 9 July, 2015;
originally announced July 2015.
-
Multiple Access Analog Fountain Codes
Authors:
Mahyar Shirvanimoghaddam,
Yonghui Li,
Branka Vucetic
Abstract:
In this paper, we propose a novel rateless multiple access scheme based on the recently proposed capacity-approaching analog fountain code (AFC). We show that the multiple access process will create an equivalent analog fountain code, referred to as the multiple access analog fountain code (MA-AFC), at the destination. Thus, the standard belief propagation (BP) decoder can be effectively used to j…
▽ More
In this paper, we propose a novel rateless multiple access scheme based on the recently proposed capacity-approaching analog fountain code (AFC). We show that the multiple access process will create an equivalent analog fountain code, referred to as the multiple access analog fountain code (MA-AFC), at the destination. Thus, the standard belief propagation (BP) decoder can be effectively used to jointly decode all the users. We further analyse the asymptotic performance of the BP decoder by using a density evolution approach and show that the average log-likelihood ratio (LLR) of each user's information symbol is proportional to its transmit signal to noise ratio (SNR), when all the users utilize the same AFC code. Simulation results show that the proposed scheme can approach the sum-rate capacity of the Gaussian multiple access channel in a wide range of signal to noise ratios.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Near-Capacity Adaptive Analog Fountain Codes for Wireless Channels
Authors:
Mahyar Shirvanimoghaddam,
Yonghui Li,
Branka Vucetic
Abstract:
In this paper, we propose a capacity-approaching analog fountain code (AFC) for wireless channels. In AFC, the number of generated coded symbols is potentially limitless. In contrast to the conventional binary rateless codes, each coded symbol in AFC is a real-valued symbol, generated as a weighted sum of $d$ randomly selected information bits, where $d$ and the weight coefficients are randomly se…
▽ More
In this paper, we propose a capacity-approaching analog fountain code (AFC) for wireless channels. In AFC, the number of generated coded symbols is potentially limitless. In contrast to the conventional binary rateless codes, each coded symbol in AFC is a real-valued symbol, generated as a weighted sum of $d$ randomly selected information bits, where $d$ and the weight coefficients are randomly selected from predefined probability mass functions. The coded symbols are then directly transmitted through wireless channels. We analyze the error probability of AFC and design the weight set to minimize the error probability. Simulation results show that AFC achieves the capacity of the Gaussian channel in a wide range of signal to noise ratio (SNR).
△ Less
Submitted 1 October, 2013;
originally announced October 2013.
-
Distributed Raptor Coding for Erasure Channels: Partially and Fully Coded Cooperation
Authors:
Mahyar Shirvanimoghaddam,
Yonghui Li,
Shuang Tian,
Branka Vucetic
Abstract:
In this paper, we propose a new rateless coded cooperation scheme for a general multi-user cooperative wireless system. We develop cooperation methods based on Raptor codes with the assumption that the channels face erasure with specific erasure probabilities and transmitters have no channel state information. A fully coded cooperation (FCC) and a partially coded cooperation (PCC) strategy are dev…
▽ More
In this paper, we propose a new rateless coded cooperation scheme for a general multi-user cooperative wireless system. We develop cooperation methods based on Raptor codes with the assumption that the channels face erasure with specific erasure probabilities and transmitters have no channel state information. A fully coded cooperation (FCC) and a partially coded cooperation (PCC) strategy are developed to maximize the average system throughput. Both PCC and FCC schemes have been analyzed through AND-OR tree analysis and a linear programming optimization problem is then formulated to find the optimum degree distribution for each scheme. Simulation results show that optimized degree distributions can bring considerable throughput gains compared to existing degree distributions which are designed for point-to-point binary erasure channels. It is also shown that the PCC scheme outperforms the FCC scheme in terms of average system throughput.
△ Less
Submitted 21 July, 2013; v1 submitted 16 July, 2013;
originally announced July 2013.
-
A Physical-layer Rateless Code for Wireless Channels
Authors:
Shuang Tian,
Yonghui Li,
Mahyar Shirvanimoghaddam,
Branka Vucetic
Abstract:
In this paper, we propose a physical-layer rateless code for wireless channels. A novel rateless encoding scheme is developed to overcome the high error floor problem caused by the low-density generator matrix (LDGM)-like encoding scheme in conventional rateless codes. This is achieved by providing each symbol with approximately equal protection in the encoding process. An extrinsic information tr…
▽ More
In this paper, we propose a physical-layer rateless code for wireless channels. A novel rateless encoding scheme is developed to overcome the high error floor problem caused by the low-density generator matrix (LDGM)-like encoding scheme in conventional rateless codes. This is achieved by providing each symbol with approximately equal protection in the encoding process. An extrinsic information transfer (EXIT) chart based optimization approach is proposed to obtain a robust check node degree distribution, which can achieve near-capacity performances for a wide range of signal to noise ratios (SNR). Simulation results show that, under the same channel conditions and transmission overheads, the bit-error-rate (BER) performance of the proposed scheme considerably outperforms the existing rateless codes in additive white Gaussian noise (AWGN) channels, particularly at low BER regions.
△ Less
Submitted 20 June, 2013;
originally announced June 2013.