Skip to main content

Showing 1–50 of 64 results for author: Wadayama, T

.
  1. arXiv:2304.14097  [pdf, other

    eess.SP

    Ordinary Differential Equation-based MIMO Signal Detection

    Authors: Ayano Nakai-Kasai, Tadashi Wadayama

    Abstract: The required signal processing rate in future wireless communication systems exceeds the performance of the latest electronics-based processors. Introduction of analog optical computation is one promising direction for energy-efficient processing. This paper considers a continuous-time minimum mean squared error detection for multiple-input multiple-output systems to realize signal detection using… ▽ More

    Submitted 16 March, 2024; v1 submitted 27 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: text overlap with arXiv:2205.01338

  2. arXiv:2303.17083  [pdf, other

    math.OC cs.IT

    Stochastic Dynamics of Noisy Average Consensus: Analysis and Optimization

    Authors: Tadashi Wadayama, Ayano Nakai-Kasai

    Abstract: A continuous-time average consensus system is a linear dynamical system defined over a graph, where each node has its own state value that evolves according to a simultaneous linear differential equation. A node is allowed to interact with neighboring nodes. Average consensus is a phenomenon that the all the state values converge to the average of the initial state values. In this paper, we assume… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

    Comments: 12 pages

  3. arXiv:2303.16431  [pdf, other

    cs.IT

    Ordinary Differential Equation-based Sparse Signal Recovery

    Authors: Tadashi Wadayama, Ayano Nakai-Kasai

    Abstract: This study investigates the use of continuous-time dynamical systems for sparse signal recovery. The proposed dynamical system is in the form of a nonlinear ordinary differential equation (ODE) derived from the gradient flow of the Lasso objective function. The sparse signal recovery process of this ODE-based approach is demonstrated by numerical simulations using the Euler method. The state of th… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: 13 pages

  4. arXiv:2303.16414  [pdf, other

    cs.IT

    Gradient Flow Decoding for LDPC Codes

    Authors: Tadashi Wadayama, Kensho Nakajima, Ayano Nakai-Kasai

    Abstract: The power consumption of the integrated circuit is becoming a significant burden, particularly for large-scale signal processing tasks requiring high throughput. The decoding process of LDPC codes is such a heavy signal processing task that demands power efficiency and higher decoding throughput. A promising approach to reducing both power and latency of a decoding process is to use an analog circ… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: 6 pages

  5. arXiv:2212.12191  [pdf, other

    cs.LG eess.SP

    Deep Unfolding-based Weighted Averaging for Federated Learning in Heterogeneous Environments

    Authors: Ayano Nakai-Kasai, Tadashi Wadayama

    Abstract: Federated learning is a collaborative model training method that iterates model updates by multiple clients and aggregation of the updates by a central server. Device and statistical heterogeneity of participating clients cause significant performance degradation so that an appropriate aggregation weight should be assigned to each client in the aggregation phase of the server. To adjust the aggreg… ▽ More

    Submitted 28 August, 2023; v1 submitted 23 December, 2022; originally announced December 2022.

  6. arXiv:2208.11459  [pdf, other

    cs.DS cs.DC

    Deterministic Fault-Tolerant Connectivity Labeling Scheme

    Authors: Taisuke Izumi, Yuval Emek, Tadashi Wadayama, Toshimitsu Masuzawa

    Abstract: The \emph{$f$-fault-tolerant connectivity labeling} ($f$-FTC labeling) is a scheme of assigning each vertex and edge with a small-size label such that one can determine the connectivity of two vertices $s$ and $t$ under the presence of at most $f$ faulty edges only from the labels of $s$, $t$, and the faulty edges. This paper presents a new deterministic $f$-FTC labeling scheme attaining… ▽ More

    Submitted 16 November, 2023; v1 submitted 24 August, 2022; originally announced August 2022.

  7. arXiv:2205.03080  [pdf, other

    eess.SP

    Precoder Design for Correlated Data Aggregation via Over-the-Air Computation in Sensor Networks

    Authors: Ayano Nakai-Kasai, Tadashi Wadayama

    Abstract: Over-the-air computation (AirComp) enables efficient wireless data aggregation in sensor networks by simultaneous processing of calculation and communication. This paper proposes a novel precoder design for AirComp that incorporates statistical properties of sensing data, spatial correlation and heterogeneous data correlation. The proposed design of the precoder requires no iterative processes so… ▽ More

    Submitted 2 September, 2022; v1 submitted 6 May, 2022; originally announced May 2022.

  8. arXiv:2205.01338  [pdf, other

    cs.IT eess.SP

    MMSE Signal Detection for MIMO Systems based on Ordinary Differential Equation

    Authors: Ayano Nakai-Kasai, Tadashi Wadayama

    Abstract: Motivated by emerging technologies for energy efficient analog computing and continuous-time processing, this paper proposes continuous-time minimum mean squared error estimation for multiple-input multiple-output (MIMO) systems based on an ordinary differential equation. Mean squared error (MSE) is a principal detection performance measure of estimation methods for MIMO systems. We derive an anal… ▽ More

    Submitted 2 September, 2022; v1 submitted 3 May, 2022; originally announced May 2022.

  9. arXiv:2102.05256  [pdf, other

    cs.IT

    Proximal Decoding for LDPC-coded Massive MIMO Channels

    Authors: Tadashi Wadayama, Satoshi Takabe

    Abstract: We propose a novel optimization-based decoding algorithm for LDPC-coded massive MIMO channels. The proposed decoding algorithm is based on a proximal gradient method for solving an approximate maximum a posteriori (MAP) decoding problem. The key idea is the use of a code-constraint polynomial penalizing a vector far from a codeword as a regularizer in the approximate MAP objective function. The co… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

  10. arXiv:2011.11927  [pdf, other

    cs.IT

    Acceleration of Cooperative Least Mean Square via Chebyshev Periodical Successive Over-Relaxation

    Authors: Tadashi Wadayama, Satoshi Takabe

    Abstract: A distributed algorithm for least mean square (LMS) can be used in distributed signal estimation and in distributed training for multivariate regression models. The convergence speed of an algorithm is a critical factor because a faster algorithm requires less communications overhead and it results in a narrower network bandwidth. The goal of this paper is to present that use of Chebyshev periodic… ▽ More

    Submitted 24 November, 2020; originally announced November 2020.

  11. arXiv:2010.13335  [pdf, other

    cs.LG cs.IT eess.SP stat.ML

    Convergence Acceleration via Chebyshev Step: Plausible Interpretation of Deep-Unfolded Gradient Descent

    Authors: Satoshi Takabe, Tadashi Wadayama

    Abstract: Deep unfolding is a promising deep-learning technique, whose network architecture is based on expanding the recursive structure of existing iterative algorithms. Although convergence acceleration is a remarkable advantage of deep unfolding, its theoretical aspects have not been revealed yet. The first half of this study details the theoretical analysis of the convergence acceleration in deep-unfol… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Comments: 17 pages, 22 figures, This manuscript is the revised and updated version of arXiv:2001.03280 and arXiv:2001.05142

  12. arXiv:2004.09345  [pdf, other

    cs.IT cs.LG eess.SP

    Deep Unfolded Multicast Beamforming

    Authors: Satoshi Takabe, Tadashi Wadayama

    Abstract: Multicast beamforming is a promising technique for multicast communication. Providing an efficient and powerful beamforming design algorithm is a crucial issue because multicast beamforming problems such as a max-min-fair problem are NP-hard in general. Recently, deep learning-based approaches have been proposed for beamforming design. Although these approaches using deep neural networks exhibit r… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Comments: 6 pages, 5 figures

  13. arXiv:2001.06126  [pdf, other

    cs.IT math.NA

    Chebyshev Inertial Landweber Algorithm for Linear Inverse Problems

    Authors: Tadashi Wadayama, Satoshi Takabe

    Abstract: The Landweber algorithm defined on complex/real Hilbert spaces is a gradient descent algorithm for linear inverse problems. Our contribution is to present a novel method for accelerating convergence of the Landweber algorithm. In this paper, we first extend the theory of the Chebyshev inertial iteration to the Landweber algorithm on Hilbert spaces. An upper bound on the convergence rate clarifies… ▽ More

    Submitted 16 January, 2020; originally announced January 2020.

    Comments: 5 pages

  14. arXiv:2001.05142  [pdf, other

    cs.LG math.OC stat.ML

    Theoretical Interpretation of Learned Step Size in Deep-Unfolded Gradient Descent

    Authors: Satoshi Takabe, Tadashi Wadayama

    Abstract: Deep unfolding is a promising deep-learning technique in which an iterative algorithm is unrolled to a deep network architecture with trainable parameters. In the case of gradient descent algorithms, as a result of the training process, one often observes the acceleration of the convergence speed with learned non-constant step size parameters whose behavior is not intuitive nor interpretable from… ▽ More

    Submitted 30 January, 2020; v1 submitted 15 January, 2020; originally announced January 2020.

    Comments: 12 pages, 12 figures, typos are fixed

  15. Chebyshev Inertial Iteration for Accelerating Fixed-Point Iterations

    Authors: Tadashi Wadayama, Satoshi Takabe

    Abstract: A novel method which is called the Chebyshev inertial iteration for accelerating the convergence speed of fixed-point iterations is presented. The Chebyshev inertial iteration can be regarded as a valiant of the successive over relaxation or Krasnosel'skiǐ-Mann iteration utilizing the inverse of roots of a Chebyshev polynomial as iteration dependent inertial factors. One of the most notable featur… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

    Comments: 9 pages

  16. arXiv:1910.10336  [pdf, other

    cs.IT cs.LG

    Trainable Projected Gradient Detector for Sparsely Spread Code Division Multiple Access

    Authors: Satoshi Takabe, Yuki Yamauchi, Tadashi Wadayama

    Abstract: Sparsely spread code division multiple access (SCDMA) is a promising non-orthogonal multiple access technique for future wireless communications. In this paper, we propose a novel trainable multiuser detector called sparse trainable projected gradient (STPG) detector, which is based on the notion of deep unfolding. In the STPG detector, trainable parameters are embedded to a projected gradient des… ▽ More

    Submitted 23 October, 2019; originally announced October 2019.

    Comments: 6 pages, 5 figures

  17. Deep Learning-Based Average Consensus

    Authors: Masako Kishida, Masaki Ogura, Yuichi Yoshida, Tadashi Wadayama

    Abstract: In this study, we analyzed the problem of accelerating the linear average consensus algorithm for complex networks. We propose a data-driven approach to tuning the weights of temporal (i.e., time-varying) networks using deep learning techniques. Given a finite-time window, the proposed approach first unfolds the linear average consensus protocol to obtain a feedforward signal-flow graph, which is… ▽ More

    Submitted 6 August, 2020; v1 submitted 26 August, 2019; originally announced August 2019.

    Journal ref: IEEE Access, volume 8, 2020, pp.142404 - 142412

  18. arXiv:1907.02944  [pdf

    cs.IT

    Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory

    Authors: A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, J. H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hasimoto, O. Ytrehus, Shigeaki Kuzuoaka, Mikihiko Nishiara, Han Mao Kiah , et al. (2 additional authors not shown)

    Abstract: This year, 2019 we celebrate 30 years of our friendship between Asian and European scientists at the AEW11 in Rotterdam, the Netherlands. Many of the 1989 participants are also present at the 2019 event. This year we have many participants from different parts of Asia and Europe. It shows the importance of this event. It is a good tradition to pay a tribute to a special lecturer in our community.… ▽ More

    Submitted 26 June, 2019; originally announced July 2019.

  19. arXiv:1904.08306  [pdf, other

    cs.IT

    Compute-and-forward relaying with LDPC codes over QPSK scheme

    Authors: Satoshi Takabe, Tadashi Wadayama, Ángeles Vazquez-Castro, Masahito Hayashi

    Abstract: In this paper, we study a compute-and-forward (CAF) relaying scheme with low-density parity-check (LDPC) codes, a special case of physical layer network coding, under the quadrature phase shift keying (QPSK) modulation. The novelty of this paper is the theoretical analysis of decoding performance of the CAF scheme and traditional separation decoding (SD) scheme with joint decoding or with successi… ▽ More

    Submitted 17 April, 2019; originally announced April 2019.

    Comments: 6 pages, 5 figures

  20. arXiv:1904.07409  [pdf, other

    cs.IT cs.LG

    Complex Trainable ISTA for Linear and Nonlinear Inverse Problems

    Authors: Satoshi Takabe, Tadashi Wadayama, Yonina C. Eldar

    Abstract: Complex-field signal recovery problems from noisy linear/nonlinear measurements appear in many areas of signal processing and wireless communications. In this paper, we propose a trainable iterative signal recovery algorithm named complex-field TISTA (C-TISTA) which treats complex-field nonlinear inverse problems. C-TISTA is based on the concept of deep unfolding and consists of a gradient descent… ▽ More

    Submitted 17 October, 2019; v1 submitted 15 April, 2019; originally announced April 2019.

    Comments: 6 pages, 3 figures

  21. arXiv:1901.05262  [pdf, other

    cs.IT

    Asymptotic Analysis on LDPC-BICM Scheme for Compute-and-Forward Relaying

    Authors: Satoshi Takabe, Tadashi Wadayama, Masahito Hayashi

    Abstract: The compute-and-forward (CAF) scheme has attracted great interests due to its high band-width efficiency on two-way relay channels. In the CAF scheme, a relay attempts to decode a linear combination of transmitted messages from other terminals or relays. It is a crucial issue to study practical error-correcting codes in order to realize the CAF scheme with low computational complexity. In this pap… ▽ More

    Submitted 16 January, 2019; originally announced January 2019.

    Comments: 5 pages, 7 figures

  22. arXiv:1901.04630  [pdf, other

    cs.IT

    Deep Learning-Aided Trainable Projected Gradient Decoding for LDPC Codes

    Authors: Tadashi Wadayama, Satoshi Takabe

    Abstract: We present a novel optimization-based decoding algorithm for LDPC codes that is suitable for hardware architectures specialized to feed-forward neural networks. The algorithm is based on the projected gradient descent algorithm with a penalty function for solving a non-convex minimization problem. The proposed algorithm has several internal parameters such as step size parameters, a softness param… ▽ More

    Submitted 14 January, 2019; originally announced January 2019.

    Comments: 8 pages

  23. arXiv:1812.10044  [pdf, other

    cs.IT cs.LG

    Trainable Projected Gradient Detector for Massive Overloaded MIMO Channels: Data-driven Tuning Approach

    Authors: Satoshi Takabe, Masayuki Imanishi, Tadashi Wadayama, Ryo Hayakawa, Kazunori Hayashi

    Abstract: This paper presents a deep learning-aided iterative detection algorithm for massive overloaded multiple-input multiple-output (MIMO) systems where the number of transmit antennas $n$ is larger than that of receive antennas $m$. Since the proposed algorithm is based on the projected gradient descent method with trainable parameters, it is named the trainable projected gradient-detector (TPG-detecto… ▽ More

    Submitted 9 July, 2019; v1 submitted 25 December, 2018; originally announced December 2018.

    Comments: 12 pages, 16 figures, accepted to IEEE Access, this is a long version of arXiv:1806.10827

  24. arXiv:1807.01599  [pdf, other

    cs.IT

    Asymptotic Analysis of Spatial Coupling Coding for Compute-and-Forward Relaying

    Authors: Satoshi Takabe, Tadashi Wadayama, Masahito Hayashi

    Abstract: Compute-and-forward (CAF) relaying is effective to increase bandwidth efficiency of wireless two-way relay channels. In a CAF scheme, a relay is designed to decode a linear combination composed of transmitted messages from other terminals or relays. Design for error-correcting codes and its decoding algorithms suitable for CAF relaying schemes remain as an important issue to be studied. As describ… ▽ More

    Submitted 3 July, 2018; originally announced July 2018.

    Comments: 8 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:1801.06328

  25. arXiv:1806.10827  [pdf, ps, other

    cs.IT cs.LG

    Deep Learning-Aided Projected Gradient Detector for Massive Overloaded MIMO Channels

    Authors: Satoshi Takabe, Masayuki Imanishi, Tadashi Wadayama, Kazunori Hayashi

    Abstract: The paper presents a deep learning-aided iterative detection algorithm for massive overloaded MIMO systems. Since the proposed algorithm is based on the projected gradient descent method with trainable parameters, it is named as trainable projected descent-detector (TPG-detector). The trainable internal parameters can be optimized with standard deep learning techniques such as back propagation and… ▽ More

    Submitted 25 December, 2018; v1 submitted 28 June, 2018; originally announced June 2018.

    Comments: 6 pages, 8 figures, metadata is updated

  26. arXiv:1804.10729  [pdf, other

    cs.IT

    Secure Computation-and-Forward with Linear Codes

    Authors: Masahito Hayashi, Tadashi Wadayama, Angeles Vazquez-Castro

    Abstract: We discuss secure transmission via an untrusted relay when we have a multiple access phase from two nodes to the relay and broadcast phase from the relay to the two nodes. To realize the security, we construct a code that securely transmits the modulo sum of the messages of two nodes via a multiple access channel. In this code, the relay cannot obtain any information for the message of each node,… ▽ More

    Submitted 27 April, 2018; originally announced April 2018.

  27. arXiv:1804.07368  [pdf, other

    cs.IT cs.SI

    Connectivity of Ad Hoc Wireless Networks with Node Faults

    Authors: Satoshi Takabe, Tadashi Wadayama

    Abstract: Connectivity of wireless sensor networks (WSNs) is a fundamental global property expected to be maintained even though some sensor nodes are at fault. In this paper, we investigate the connectivity of random geometric graphs (RGGs) in the node fault model as an abstract model of ad hoc WSNs with unreliable nodes. In the model, each node is assumed to be stochastically at fault, i.e., removed from… ▽ More

    Submitted 19 April, 2018; originally announced April 2018.

    Comments: 6pages, 3 figures

  28. arXiv:1804.06002  [pdf, ps, other

    cs.IT

    Joint Quantizer Optimization based on Neural Quantizer for Sum-Product Decoder

    Authors: Tadashi Wadayama, Satoshi Takabe

    Abstract: A low-precision analog-to-digital converter (ADC) is required to implement a frontend device of wideband digital communication systems in order to reduce its power consumption. The goal of this paper is to present a novel joint quantizer optimization method for minimizing lower-precision quantizers matched to the sum-product algorithms. The principal idea is to introduce a quantizer that includes… ▽ More

    Submitted 16 April, 2018; originally announced April 2018.

    Comments: 6 pages

  29. arXiv:1804.06000  [pdf, ps, other

    cs.IT

    Asymptotic Achievable Rate of Two-Dimensional Constraint Codes based on Column by Column Encoding

    Authors: Kazuya Hirata, Tadashi Wadayama

    Abstract: In this paper, we propose a column by column encoding scheme suitable for two-dimensional (2D) constraint codes and derive a lower bound of its maximum achievable rate. It is shown that the maximum achievable rate is equal to the largest minimum degree of a subgraph of the maximal valid pair graph. A graph theoretical analysis to provide a lower bound of the maximum achievable rate is presented. F… ▽ More

    Submitted 16 April, 2018; originally announced April 2018.

    Comments: 5 pages

  30. arXiv:1801.06328  [pdf, other

    cs.IT

    Asymptotic Analysis on Spatial Coupling Coding for Two-Way Relay Channels

    Authors: Satoshi Takabe, Yuta Ishimatsu, Tadashi Wadayama, Masahito Hayashi

    Abstract: Compute-and-forward relaying is effective to increase bandwidth efficiency of wireless two-way relay channels. In a compute-and-forward scheme, a relay tries to decode a linear combination composed of transmitted messages from other terminals or relays. Design for error correcting codes and its decoding algorithms suitable for compute-and-forward relaying schemes are still important issue to be st… ▽ More

    Submitted 19 January, 2018; originally announced January 2018.

    Comments: 5 pages

  31. arXiv:1801.02818  [pdf, ps, other

    cs.IT cs.SI physics.soc-ph

    k-connectivity of Random Graphs and Random Geometric Graphs in Node Fault Model

    Authors: Satoshi Takabe, Tadashi Wadayama

    Abstract: k-connectivity of random graphs is a fundamental property indicating reliability of multi-hop wireless sensor networks (WSN). WSNs comprising of sensor nodes with limited power resources are modeled by random graphs with unreliable nodes, which is known as the node fault model. In this paper, we investigate k-connectivity of random graphs in the node fault model by evaluating the network breakdown… ▽ More

    Submitted 9 January, 2018; originally announced January 2018.

    Comments: 6 pages

  32. Trainable ISTA for Sparse Signal Recovery

    Authors: Daisuke Ito, Satoshi Takabe, Tadashi Wadayama

    Abstract: In this paper, we propose a novel sparse signal recovery algorithm called Trainable ISTA (TISTA). The proposed algorithm consists of two estimation units such as a linear estimation unit and a minimum mean squared error (MMSE) estimator-based shrinkage unit. The estimated error variance required in the MMSE shrinkage unit is precisely estimated from a tentative estimate of the original signal. The… ▽ More

    Submitted 21 November, 2018; v1 submitted 6 January, 2018; originally announced January 2018.

    Comments: 10 pages

  33. arXiv:1712.07807  [pdf, other

    cond-mat.dis-nn cond-mat.stat-mech cs.IT cs.SI

    Fault Tolerance of Random Graphs with respect to Connectivity: Mean-field Approximation for Semi-dense Random Graphs

    Authors: Satoshi Takabe, Takafumi Nakano, Tadashi Wadayama

    Abstract: The fault tolerance of random graphs with unbounded degrees with respect to connectivity is investigated, which relates to the reliability of wireless sensor networks with unreliable relay nodes. The model evaluates the network breakdown probability that a graph is disconnected after stochastic node removal. To establish a mean-field approximation for the model, we propose the cavity method for fi… ▽ More

    Submitted 9 May, 2019; v1 submitted 21 December, 2017; originally announced December 2017.

    Comments: 5 pages, 3 figures

    Journal ref: Phys. Rev. E 99, 050304 (2019)

  34. arXiv:1707.08567  [pdf

    cs.IT

    Proceedings of Workshop AEW10: Concepts in Information Theory and Communications

    Authors: Kees A. Schouhamer Immink, Stan Baggen, Ferdaous Chaabane, Yanling Chen, Peter H. N. de With, Hela Gassara, Hamed Gharbi, Adel Ghazel, Khaled Grati, Naira M. Grigoryan, Ashot Harutyunyan, Masayuki Imanishi, Mitsugu Iwamoto, Ken-ichi Iwata, Hiroshi Kamabe, Brian M. Kurkoski, Shigeaki Kuzuoka, Patrick Langenhuizen, Jan Lewandowsky, Akiko Manada, Shigeki Miyake, Hiroyoshi Morita, Jun Muramatsu, Safa Najjar, Arnak V. Poghosyan , et al. (9 additional authors not shown)

    Abstract: The 10th Asia-Europe workshop in "Concepts in Information Theory and Communications" AEW10 was held in Boppard, Germany on June 21-23, 2017. It is based on a longstanding cooperation between Asian and European scientists. The first workshop was held in Eindhoven, the Netherlands in 1989. The idea of the workshop is threefold: 1) to improve the communication between the scientist in the different p… ▽ More

    Submitted 27 July, 2017; originally announced July 2017.

    Comments: 44 pages, editors for the proceedings: Yanling Chen and A. J. Han Vinck

    MSC Class: 68P30; 94A05

  35. On Zero Error Capacity of Nearest Neighbor Error Channels with Multilevel Alphabet

    Authors: Takafumi Nakano, Tadashi Wadayama

    Abstract: This paper studies the zero error capacity of the Nearest Neighbor Error (NNE) channels with a multilevel alphabet. In the NNE channels, a transmitted symbol is a $d$-tuple of elements in $\{0,1,2,\dots, n-1 \}$. It is assumed that only one element error to a nearest neighbor element in a transmitted symbol can occur. The NNE channels can be considered as a special type of limited magnitude error… ▽ More

    Submitted 30 January, 2017; originally announced January 2017.

  36. Construction of Fixed Rate Non-Binary WOM Codes based on Integer Programming

    Authors: Yoju Fu**o, Tadashi Wadayama

    Abstract: In this paper, we propose a construction of non-binary WOM (Write-Once-Memory) codes for WOM storages such as flash memories. The WOM codes discussed in this paper are fixed rate WOM codes where messages in a fixed alphabet of size $M$ can be sequentially written in the WOM storage at least $t^*$-times. In this paper, a WOM storage is modeled by a state transition graph. The proposed construction… ▽ More

    Submitted 28 January, 2017; originally announced January 2017.

  37. arXiv:1701.06770  [pdf, ps, other

    cs.IT

    Analysis of Breakdown Probability of Wireless Sensor Networks with Unreliable Relay Nodes

    Authors: Takayuki Nozaki, Takafumi Nakano, Tadashi Wadayama

    Abstract: In the present paper, we derive an upper bound of the average network breakdown probability of packet networks with unreliable relay nodes. We here assume that relay nodes get independently broken with a given node breakdown probability. A survivor graph is the induced subgraph obtained by removing the broken relay nodes and their connecting edges from the original graph. If the survivor network i… ▽ More

    Submitted 24 January, 2017; originally announced January 2017.

    Comments: 5 pages, 4 figures, submitted to ISIT2017

  38. arXiv:1610.09463  [pdf, ps, other

    cs.IT cs.LG stat.ML

    Sparse Signal Recovery for Binary Compressed Sensing by Majority Voting Neural Networks

    Authors: Daisuke Ito, Tadashi Wadayama

    Abstract: In this paper, we propose majority voting neural networks for sparse signal recovery in binary compressed sensing. The majority voting neural network is composed of several independently trained feedforward neural networks employing the sigmoid function as an activation function. Our empirical study shows that a choice of a loss function used in training processes for the network is of prime impor… ▽ More

    Submitted 29 October, 2016; originally announced October 2016.

    Comments: 6 pages

  39. Performance Analysis based on Density Evolution on Fault Erasure Belief Propagation Decoder

    Authors: Hiroki Mori, Tadashi Wadayama

    Abstract: In this paper, we will present an analysis on the fault erasure BP decoders based on the density evolution. In the fault BP decoder, messages exchanged in a BP process are stochastically corrupted due to unreliable logic gates and flip-flops; i.e., we assume circuit components with transient faults. We derived a set of the density evolution equations for the fault erasure BP processes. Our density… ▽ More

    Submitted 26 January, 2016; originally announced January 2016.

    Comments: 12 pages, submitted to ISIT 2016

  40. arXiv:1601.06880  [pdf, ps, other

    cs.IT

    Bounds on Asymptotic Rate of Capacitive Crosstalk Avoidance Codes for On-chip Buses

    Authors: Tadashi Wadayama, Taisuke Izumi

    Abstract: In order to prevent the capacitive crosstalk in on-chip buses, several types of capacitive crosstalk avoidance codes have been devised. These codes are designed to prohibit transition patterns prone to the capacity crosstalk from any consecutive two words transmitted to on-chip buses. This paper provides a rigorous analysis on the asymptotic rate of (p,q)-transition free word sequences under the a… ▽ More

    Submitted 25 January, 2016; originally announced January 2016.

    Comments: 10 pages, 2 figures, submitted to ISIT 2016

  41. arXiv:1503.08937  [pdf, ps, other

    cs.IT

    Evaluation of Symmetric Mutual Information of the Simplified TDMR Channel Model

    Authors: Tadashi Wadayama

    Abstract: In the present paper, a simplified two-dimensional magnetic recording (TDMR) channel model is proposed in order to capture the qualitative features of writing and read-back processes of TDMR systems.The proposed channel model incorporates the effects of both linear interference from adjacent bit-cells and signal-dependent noise due to irregular grain boundaries between adjacent bit-cells. The simp… ▽ More

    Submitted 31 March, 2015; originally announced March 2015.

  42. arXiv:1503.08934  [pdf, other

    cs.IT

    Index ARQ Protocol for Reliable Contents Distribution over Broadcast Channels

    Authors: Takahiro Oshima, Tadashi Wadayama

    Abstract: In the present paper, we propose a broadcast ARQ protocol based on the concept of index coding. In the proposed scenario, a server wishes to transmit a finite sequence of packets to multiple receivers via a broadcast channel with packet erasures until all of the receivers successfully receive all of the packets. In the retransmission phase, the server produces a coded packet as a retransmitted pac… ▽ More

    Submitted 31 March, 2015; originally announced March 2015.

  43. arXiv:1501.04402  [pdf, ps, other

    cs.IT

    Subgraph Domatic Problem and Writing Capacity of Memory Devises with Restricted State Transitions

    Authors: Tadashi Wadayama, Taizuke Izumi, Hirotaka Ono

    Abstract: A code design problem for memory devises with restricted state transitions is formulated as a combinatorial optimization problem that is called a subgraph domatic partition (subDP) problem. If any neighbor set of a given state transition graph contains all the colors, then the coloring is said to be valid. The goal of a subDP problem is to find a valid coloring with the largest number of colors fo… ▽ More

    Submitted 19 January, 2015; originally announced January 2015.

    Comments: 7 pages

  44. arXiv:1501.04394  [pdf, ps, other

    cs.IT

    Band Splitting Permutations for Spatially Coupled LDPC Codes Enhancing Burst Erasure Immunity

    Authors: Hiroki Mori, Tadashi Wadayama

    Abstract: It is well known that spatially coupled (SC) codes with erasure-BP decoding have powerful error correcting capability over memoryless erasure channels. However, the decoding performance of SC-codes significantly degrades when they are used over burst erasure channels. In this paper, we propose band splitting permutations (BSP) suitable for $(l,r,L)$ SC-codes. The BSP splits a diagonal band in a ba… ▽ More

    Submitted 19 January, 2015; originally announced January 2015.

    Comments: 5 pages, submitted to ISIT 2015

  45. arXiv:1401.4251  [pdf, ps, other

    cs.IT

    Bitwise MAP Algorithm for Group Testing based on Holographic Transformation

    Authors: Tadashi Wadayama, Taisuke Izumi

    Abstract: In this paper, an exact bitwise MAP (Maximum A Posteriori) estimation algorithm for group testing problems is presented. We assume a simplest non-adaptive group testing scenario including N-objects with binary status and M-disjunctive tests. If a group contains a positive object, the test result for the group is assumed to be one; otherwise, the test result becomes zero. Our inference problem is t… ▽ More

    Submitted 17 January, 2014; originally announced January 2014.

    Comments: 6 pages, 5 figures

  46. An Analysis on Minimum s-t Cut Capacity of Random Graphs with Specified Degree Distribution

    Authors: Yuki Fujii, Tadashi Wadayama

    Abstract: The capacity (or maximum flow) of an unicast network is known to be equal to the minimum s-t cut capacity due to the max-flow min-cut theorem. If the topology of a network (or link capacities) is dynamically changing or unknown, it is not so trivial to predict statistical properties on the maximum flow of the network. In this paper, we present a probabilistic analysis for evaluating the accumulate… ▽ More

    Submitted 31 January, 2013; originally announced January 2013.

    Comments: 5 pages, Submitted to ISIT 2013. arXiv admin note: substantial text overlap with arXiv:1202.0876

  47. arXiv:1301.7519  [pdf, ps, other

    cs.IT

    Non-Adaptive Group Testing based on Sparse Pooling Graphs

    Authors: Tadashi Wadayama

    Abstract: In this paper, an information theoretic analysis on non-adaptive group testing schemes based on sparse pooling graphs is presented. The binary status of the objects to be tested are modeled by i.i.d. Bernoulli random variables with probability p. An (l, r, n)-regular pooling graph is a bipartite graph with left node degree l and right node degree r, where n is the number of left nodes. Two scenari… ▽ More

    Submitted 26 April, 2013; v1 submitted 31 January, 2013; originally announced January 2013.

    Comments: 20 pages

  48. Finite Length Analysis on Listing Failure Probability of Invertible Bloom Lookup Tables

    Authors: Daichi Yugawa, Tadashi Wadayama

    Abstract: The Invertible Bloom Lookup Tables (IBLT) is a data structure which supports insertion, deletion, retrieval and listing operations of the key-value pair. The IBLT can be used to realize efficient set reconciliation for database synchronization. The most notable feature of the IBLT is the complete listing operation of the key-value pairs based on the algorithm similar to the peeling algorithm for l… ▽ More

    Submitted 30 January, 2013; originally announced January 2013.

    Comments: 5pages, Submitted to ISIT 2013

  49. arXiv:1208.2329  [pdf, ps, other

    cs.DS cs.DM

    A New Direction for Counting Perfect Matchings

    Authors: Taisuke Izumi, Tadashi Wadayama

    Abstract: In this paper, we present a new exact algorithm for counting perfect matchings, which relies on neither inclusion-exclusion principle nor tree-decompositions. For any bipartite graph of $2n$ nodes and $Δn$ edges such that $Δ\geq 3$, our algorithm runs with $O^{\ast}(2^{(1 - 1/O(Δ\log Δ))n})$ time and exponential space. Compared to the previous algorithms, it achieves a better time bound in the sen… ▽ More

    Submitted 11 August, 2012; originally announced August 2012.

    Comments: The 53rd Annual Symposium on Foundations of Computer Science (FOCS 2012)

  50. arXiv:1202.0876  [pdf, other

    cs.IT

    A Coding Theoretic Approach for Evaluating Accumulate Distribution on Minimum Cut Capacity of Weighted Random Graphs

    Authors: Tadashi Wadayama, Yuki Fujii

    Abstract: The multicast capacity of a directed network is closely related to the $s$-$t$ maximum flow, which is equal to the $s$-$t$ minimum cut capacity due to the max-flow min-cut theorem. If the topology of a network (or link capacities) is dynamically changing or have stochastic nature, it is not so trivial to predict statistical properties on the maximum flow. In this paper, we present a coding theoret… ▽ More

    Submitted 4 February, 2012; originally announced February 2012.

    Comments: 5 pages, 2 figures, submitted to IEEE ISIT 2012