-
Joint Optimization of IRS Deployment and Passive Beamforming to Enhance the Received Power
Authors:
Jyotsna Rani,
Deepak Mishra,
Ganesh Prasad,
Ashraf Hossain,
Swades De,
Kuntal Deka
Abstract:
Intelligent reflecting surface (IRS) has recently emerged as a promising technology for beyond fifth-generation (B5G) and 6G networks conceived from metamaterials that smartly tunes the signal reflections via a large number of low-cost passive reflecting elements. However, the IRS-assisted communication model and the optimization of available resources needs to be improved further for more efficie…
▽ More
Intelligent reflecting surface (IRS) has recently emerged as a promising technology for beyond fifth-generation (B5G) and 6G networks conceived from metamaterials that smartly tunes the signal reflections via a large number of low-cost passive reflecting elements. However, the IRS-assisted communication model and the optimization of available resources needs to be improved further for more efficient communications. This paper investigates the enhancement of received power at the user end in an IRS assisted wireless communication by jointly optimizing the phase shifts at the IRS elements and its location. Employing the conventional Friss transmission model, the relationship between the transmitted power and reflected power is established. The expression of received power incorporates the free space loss, reflection loss factor, physical dimension of the IRS panel, and radiation pattern of the transmit signal. Also, the expression of reflection coefficient of IRS panel is obtained by exploiting the existing data of radar communications. Initially exploring a single IRS element within a two-ray reflection model, we extend it to a more complex multi-ray reflection model with multiple IRS elements in 3D Cartesian space. The received power expression is derived in a more tractable form, then, it is maximized by jointly optimizing the underlying underlying variables, the IRS location and the phase shifts. To realize the joint optimization of underlying variables, first, the phase shifts of the IRS elements are optimized to achieve constructive interference of received signal components at the user. Subsequently, the location of the IRS is optimized at the obtained optimal phase shifts. Numerical insights and performance comparison reveal that joint optimization leads to a substantial 37% enhancement in received power compared to the closest competitive benchmark scheme.
△ Less
Submitted 18 August, 2023;
originally announced August 2023.
-
An Algorithm for the Constrained Longest Common Subsequence and Substring Problem
Authors:
R. Li,
J. Deka,
K. Deka,
D. Li
Abstract:
Let $Σ$ be an alphabet. For two strings $X$, $Y$, and a constrained string $P$ over the alphabet $Σ$, the constrained longest common subsequence and substring problem for two strings $X$ and $Y$ with respect to $P$ is to find a longest string $Z$ which is a subsequence of $X$, a substring of $Y$, and has $P$ as a subsequence. In this paper, we propose an algorithm for the constrained longest commo…
▽ More
Let $Σ$ be an alphabet. For two strings $X$, $Y$, and a constrained string $P$ over the alphabet $Σ$, the constrained longest common subsequence and substring problem for two strings $X$ and $Y$ with respect to $P$ is to find a longest string $Z$ which is a subsequence of $X$, a substring of $Y$, and has $P$ as a subsequence. In this paper, we propose an algorithm for the constrained longest common subsequence and substring problem for two strings with a constrained string.
△ Less
Submitted 2 August, 2023;
originally announced August 2023.
-
An Algorithm for the Longest Common Subsequence and Substring Problem
Authors:
R. Li,
J. Deka,
K. Deka
Abstract:
In this note, we first introduce a new problem called the longest common subsequence and substring problem. Let $X$ and $Y$ be two strings over an alphabet $Σ$. The longest common subsequence and substring problem for $X$ and $Y$ is to find the longest string which is a subsequence of $X$ and a substring of $Y$. We propose an algorithm to solve the problem.
In this note, we first introduce a new problem called the longest common subsequence and substring problem. Let $X$ and $Y$ be two strings over an alphabet $Σ$. The longest common subsequence and substring problem for $X$ and $Y$ is to find the longest string which is a subsequence of $X$ and a substring of $Y$. We propose an algorithm to solve the problem.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
ADMM-based Detector for Large-scale MIMO Code-domain NOMA Systems
Authors:
Vinjamoori Vikas,
Kuntal Deka,
Sanjeev Sharma,
A. Rajesh
Abstract:
Large-scale multi-input multi-output (MIMO) code domain non-orthogonal multiple access (CD-NOMA) techniques are one of the potential candidates to address the next-generation wireless needs such as massive connectivity, and high reliability. This work focuses on two primary CD-NOMA techniques: sparse-code multiple access (SCMA) and dense-code multiple access (DCMA). One of the primary challenges i…
▽ More
Large-scale multi-input multi-output (MIMO) code domain non-orthogonal multiple access (CD-NOMA) techniques are one of the potential candidates to address the next-generation wireless needs such as massive connectivity, and high reliability. This work focuses on two primary CD-NOMA techniques: sparse-code multiple access (SCMA) and dense-code multiple access (DCMA). One of the primary challenges in implementing MIMO-CD-NOMA systems is designing the optimal detector with affordable computation cost and complexity. This paper proposes an iterative linear detector based on the alternating direction method of multipliers (ADMM). First, the maximum likelihood (ML) detection problem is converted into a sharing optimization problem. The set constraint in the ML detection problem is relaxed into the box constraint sharing problem. An alternative variable is introduced via the penalty term, which compensates for the loss incurred by the constraint relaxation. The system models, i.e., the relation between the input signal and the received signal, are reformulated so that the proposed sharing optimization problem can be readily applied.
The ADMM is a robust algorithm to solve the sharing problem in a distributed manner. The proposed detector leverages the distributive nature to reduce per-iteration cost and time. An ADMM-based linear detector is designed for three MIMO-CD-NOMA systems: single input multi output CD-NOMA (SIMO-CD-NOMA), spatial multiplexing CD-NOMA (SMX-CD-NOMA), and spatial modulated CD-NOMA (SM-CD-NOMA). The impact of various system parameters and ADMM parameters on computational complexity and symbol error rate (SER) has been thoroughly examined through extensive Monte Carlo simulations.
△ Less
Submitted 3 June, 2023;
originally announced June 2023.
-
Design of Puncturing for Length-Compatible Polar Codes Using Differential Evolution
Authors:
Kuntal Deka,
Sanjeev Sharma
Abstract:
This paper presents a puncturing technique to design length-compatible polar codes. The punctured bits are identified with the help of differential evolution (DE). A DE-based optimization framework is developed where the sum of the bit-error-rate (BER) values of the information bits is minimized. We identify a set of bits which can be avoided for puncturing in the case of additive white Gaussian n…
▽ More
This paper presents a puncturing technique to design length-compatible polar codes. The punctured bits are identified with the help of differential evolution (DE). A DE-based optimization framework is developed where the sum of the bit-error-rate (BER) values of the information bits is minimized. We identify a set of bits which can be avoided for puncturing in the case of additive white Gaussian noise (AWGN) channels. This reduces the size of the candidate puncturing patterns. Simulation results confirm the superiority of the proposed technique over other state-of-the-art puncturing methods.
△ Less
Submitted 9 July, 2020;
originally announced July 2020.
-
OTFS-NOMA based on SCMA
Authors:
Kuntal Deka,
Anna Thomas,
Sanjeev Sharma
Abstract:
Orthogonal Time Frequency Space (OTFS) is a $\text{2-D}$ modulation technique that has the potential to overcome the challenges faced by orthogonal frequency division multiplexing (OFDM) in high Doppler environments. The performance of OTFS in a multi-user scenario with orthogonal multiple access (OMA) techniques has been impressive. Due to the requirement of massive connectivity in 5G and beyond,…
▽ More
Orthogonal Time Frequency Space (OTFS) is a $\text{2-D}$ modulation technique that has the potential to overcome the challenges faced by orthogonal frequency division multiplexing (OFDM) in high Doppler environments. The performance of OTFS in a multi-user scenario with orthogonal multiple access (OMA) techniques has been impressive. Due to the requirement of massive connectivity in 5G and beyond, it is immensely essential to devise and examine the OTFS system with the existing Non-orthogonal Multiple Access (NOMA) techniques.
In this paper, we propose a multi-user OTFS system based on a code-domain NOMA technique called Sparse Code Multiple Access (SCMA). This system is referred to as the OTFS-SCMA model. The framework for OTFS-SCMA is designed for both downlink and uplink. First, the sparse SCMA codewords are strategically placed on the delay-Doppler plane such that the overall overloading factor of the OTFS-SCMA system is equal to that of the underlying basic SCMA system. The receiver in downlink performs the detection in two sequential phases: first, the conventional OTFS detection using the method of linear minimum mean square error (LMMSE), and then the conventional SCMA detection. For uplink, we propose a single-phase detector based on message-passing algorithm (MPA) to detect the multiple users' symbols. The performance of the proposed OTFS-SCMA system is validated through extensive simulations both in downlink and uplink. We consider delay-Doppler planes of different parameters and various SCMA systems of overloading factor up to 200$\%$. The performance of OTFS-SCMA is compared with those of existing OTFS-OMA techniques. The comprehensive investigation demonstrates the usefulness of OTFS-SCMA in future wireless communication standards.
△ Less
Submitted 8 May, 2020; v1 submitted 6 May, 2020;
originally announced May 2020.
-
Design of SCMA Codebooks Using Differential Evolution
Authors:
Kuntal Deka,
Minerva Priyadarsini,
Sanjeev Sharma,
Baltasar Beferull-Lozano
Abstract:
Non-orthogonal multiple access (NOMA) is a promising technology which meets the demands of massive connectivity in future wireless networks. Sparse code multiple access (SCMA) is a popular code-domain NOMA technique. The effectiveness of SCMA comes from: (1) the multi-dimensional sparse codebooks offering high sha** gain and (2) sophisticated multi-user detection based on message passing algorit…
▽ More
Non-orthogonal multiple access (NOMA) is a promising technology which meets the demands of massive connectivity in future wireless networks. Sparse code multiple access (SCMA) is a popular code-domain NOMA technique. The effectiveness of SCMA comes from: (1) the multi-dimensional sparse codebooks offering high sha** gain and (2) sophisticated multi-user detection based on message passing algorithm (MPA). The codebooks of the users play the main role in determining the performance of SCMA system. This paper presents a framework to design the codebooks by taking into account the entire system including the SCMA encoder and the MPA-based detector. The symbol-error rate (SER) is considered as the design criterion which needs to be minimized. Differential evolution (DE) is used to carry out the minimization of the SER over the codebooks. The simulation results are presented for various channel models.
△ Less
Submitted 15 February, 2021; v1 submitted 7 March, 2020;
originally announced March 2020.
-
Cooperative Spectrum Sensing Scheduling in Multi-channel Cognitive Radio Networks: A broad perspective
Authors:
Prakash Chauhan,
Sanjib K. Deka,
Monisha Devi,
Nityananda Sarma
Abstract:
Cooperative spectrum sensing has been proven to improve sensing performance of cognitive users in presence of spectral diversity. For multi-channel CRN (MC-CRN), designing a cooperative spectrum sensing scheme becomes quite challenging as it needs an optimal sensing scheduling scheme, which schedules cognitive users to different channels such that a good balance between detection performance and t…
▽ More
Cooperative spectrum sensing has been proven to improve sensing performance of cognitive users in presence of spectral diversity. For multi-channel CRN (MC-CRN), designing a cooperative spectrum sensing scheme becomes quite challenging as it needs an optimal sensing scheduling scheme, which schedules cognitive users to different channels such that a good balance between detection performance and the discovery of spectrum holes is achieved. The main issue associated with cooperative spectrum sensing scheduling (CSSS) scheme is the design of an optimal schedule that could specify which SUs should be assigned to which channels at what time to achieve maximal network throughput with minimal amount of energy and satisfying the desirable sensing accuracy. In this regard, designing an efficient CSSS scheme for MC-CRN is of utmost importance for practical implementation of CRN. In this article, we explore CSSS problem from a broad perspective and present the different objectives and the inherent issues and challenges arise in designing the CSSS scheme. We also discuss the different methods used for modeling of the CSSS scheme for MC-CRN. Further, a few future research directions are listed which need investigation while develo** the solution for CSSS problem.
△ Less
Submitted 7 November, 2017;
originally announced November 2017.
-
DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment
Authors:
Rup Kumar Deka,
Dhruba Kumar Bhattacharyya,
Jugal Kumar Kalita
Abstract:
The future of the Internet is predicted to be on the cloud, resulting in more complex and more intensive computing, but possibly also a more insecure digital world. The presence of a large amount of resources organized densely is a key factor in attracting DDoS attacks. Such attacks are arguably more dangerous in private individual clouds with limited resources. This paper discusses several promin…
▽ More
The future of the Internet is predicted to be on the cloud, resulting in more complex and more intensive computing, but possibly also a more insecure digital world. The presence of a large amount of resources organized densely is a key factor in attracting DDoS attacks. Such attacks are arguably more dangerous in private individual clouds with limited resources. This paper discusses several prominent approaches introduced to counter DDoS attacks in private clouds. We also discuss issues and challenges to mitigate DDoS attacks in private clouds.
△ Less
Submitted 24 October, 2017;
originally announced October 2017.