-
Multi-Aperture Fusion of Transformer-Convolutional Network (MFTC-Net) for 3D Medical Image Segmentation and Visualization
Authors:
Siyavash Shabani,
Muhammad Sohaib,
Sahar A. Mohammed,
Bahram Parvin
Abstract:
Vision Transformers have shown superior performance to the traditional convolutional-based frameworks in many vision applications, including but not limited to the segmentation of 3D medical images. To further advance this area, this study introduces the Multi-Aperture Fusion of Transformer-Convolutional Network (MFTC-Net), which integrates the output of Swin Transformers and their corresponding c…
▽ More
Vision Transformers have shown superior performance to the traditional convolutional-based frameworks in many vision applications, including but not limited to the segmentation of 3D medical images. To further advance this area, this study introduces the Multi-Aperture Fusion of Transformer-Convolutional Network (MFTC-Net), which integrates the output of Swin Transformers and their corresponding convolutional blocks using 3D fusion blocks. The Multi-Aperture incorporates each image patch at its original resolutions with its pyramid representation to better preserve minute details. The proposed architecture has demonstrated a score of 89.73 and 7.31 for Dice and HD95, respectively, on the Synapse multi-organs dataset an improvement over the published results. The improved performance also comes with the added benefits of the reduced complexity of approximately 40 million parameters. Our code is available at https://github.com/Siyavashshabani/MFTC-Net
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Zak-OTFS and Turbo Signal Processing for Joint Sensing and Communication
Authors:
**u Jayachandran,
Muhammad Ubadah,
Saif Khan Mohammed,
Ronny Hadani,
Ananthanarayanan Chockalingam,
Robert Calderbank
Abstract:
The Zak-OTFS input/output (I/O) relation is predictable and non-fading when the delay and Doppler periods are greater than the effective channel delay and Doppler spreads, a condition which we refer to as the crystallization condition. The filter taps can simply be read off from the response to a single Zak-OTFS pilot pulsone, and the I/O relation can be reconstructed for a sampled system that ope…
▽ More
The Zak-OTFS input/output (I/O) relation is predictable and non-fading when the delay and Doppler periods are greater than the effective channel delay and Doppler spreads, a condition which we refer to as the crystallization condition. The filter taps can simply be read off from the response to a single Zak-OTFS pilot pulsone, and the I/O relation can be reconstructed for a sampled system that operates under finite duration and bandwidth constraints. In previous work we had measured BER performance of a baseline system where we used separate Zak-OTFS subframes for sensing and data transmission. In this Letter we demonstrate how to use turbo signal processing to match BER performance of this baseline system when we integrate sensing and communication within the same Zak-OTFS subframe. The turbo decoder alternates between channel sensing using a noise-like waveform (spread pulsone) and recovery of data transmitted using point pulsones.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Zak-OTFS: Pulse Sha** and the Tradeoff between Time/Bandwidth Expansion and Predictability
Authors:
**u Jayachandran,
Rahul Kumar Jaiswal,
Saif Khan Mohammed,
Ronny Hadani,
Ananthanarayanan Chockalingam,
Robert Calderbank
Abstract:
The Zak-OTFS input/output (I/O) relation is predictable and non-fading when the delay and Doppler periods are greater than the effective channel delay and Doppler spreads, a condition which we refer to as the crystallization condition. When the crystallization condition is satisfied, we describe how to integrate sensing and communication within a single Zak-OTFS subframe by transmitting a pilot in…
▽ More
The Zak-OTFS input/output (I/O) relation is predictable and non-fading when the delay and Doppler periods are greater than the effective channel delay and Doppler spreads, a condition which we refer to as the crystallization condition. When the crystallization condition is satisfied, we describe how to integrate sensing and communication within a single Zak-OTFS subframe by transmitting a pilot in the center of the subframe and surrounding the pilot with a pilot region and guard band to mitigate interference between data symbols and pilot. At the receiver we first read off the effective channel taps within the pilot region, and then use the estimated channel taps to recover the data from the symbols received outside the pilot region. We introduce a framework for filter design in the delay-Doppler (DD) domain where the symplectic Fourier transform connects aliasing in the DD domain (predictability of the I/O relation) with time/bandwidth expansion. The choice of pulse sha** filter determines the fraction of pilot energy that lies outside the pilot region and the degradation in BER performance that results from the interference to data symbols. We demonstrate that Gaussian filters in the DD domain provide significant improvements in BER performance over the sinc and root raised cosine filters considered in previous work. We also demonstrate that, by limiting DD domain aliasing, Gaussian filters extend the region where the crystallization condition is satisfied. The Gaussian filters considered in this paper are a particular case of factorizable pulse sha** filters in the DD domain, and this family of filters may be of independent interest.
△ Less
Submitted 4 May, 2024;
originally announced May 2024.
-
GuideWalk -- Heterogeneous Data Fusion for Enhanced Learning -- A Multiclass Document Classification Case
Authors:
Sarmad N. Mohammed,
Semra Gündüç
Abstract:
One of the prime problems of computer science and machine learning is to extract information efficiently from large-scale, heterogeneous data. Text data, with its syntax, semantics, and even hidden information content, possesses an exceptional place among the data types in concern. The processing of the text data requires embedding, a method of translating the content of the text to numeric vector…
▽ More
One of the prime problems of computer science and machine learning is to extract information efficiently from large-scale, heterogeneous data. Text data, with its syntax, semantics, and even hidden information content, possesses an exceptional place among the data types in concern. The processing of the text data requires embedding, a method of translating the content of the text to numeric vectors. A correct embedding algorithm is the starting point for obtaining the full information content of the text data. In this work, a new embedding method based on the graph structure of the meaningful sentences is proposed. The design of the algorithm aims to construct an embedding vector that constitutes syntactic and semantic elements as well as the hidden content of the text data. The success of the proposed embedding method is tested in classification problems. Among the wide range of application areas, text classification is the best laboratory for embedding methods; the classification power of the method can be tested using dimensional reduction without any further processing. Furthermore, the method can be compared with different embedding algorithms and machine learning methods. The proposed method is tested with real-world data sets and eight well-known and successful embedding algorithms. The proposed embedding method shows significantly better classification for binary and multiclass datasets compared to well-known algorithms.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
Introducing v0.5 of the AI Safety Benchmark from MLCommons
Authors:
Bertie Vidgen,
Adarsh Agrawal,
Ahmed M. Ahmed,
Victor Akinwande,
Namir Al-Nuaimi,
Najla Alfaraj,
Elie Alhajjar,
Lora Aroyo,
Trupti Bavalatti,
Max Bartolo,
Borhane Blili-Hamelin,
Kurt Bollacker,
Rishi Bomassani,
Marisa Ferrara Boston,
Siméon Campos,
Kal Chakra,
Canyu Chen,
Cody Coleman,
Zacharie Delpierre Coudert,
Leon Derczynski,
Debojyoti Dutta,
Ian Eisenberg,
James Ezick,
Heather Frase,
Brian Fuller
, et al. (75 additional authors not shown)
Abstract:
This paper introduces v0.5 of the AI Safety Benchmark, which has been created by the MLCommons AI Safety Working Group. The AI Safety Benchmark has been designed to assess the safety risks of AI systems that use chat-tuned language models. We introduce a principled approach to specifying and constructing the benchmark, which for v0.5 covers only a single use case (an adult chatting to a general-pu…
▽ More
This paper introduces v0.5 of the AI Safety Benchmark, which has been created by the MLCommons AI Safety Working Group. The AI Safety Benchmark has been designed to assess the safety risks of AI systems that use chat-tuned language models. We introduce a principled approach to specifying and constructing the benchmark, which for v0.5 covers only a single use case (an adult chatting to a general-purpose assistant in English), and a limited set of personas (i.e., typical users, malicious users, and vulnerable users). We created a new taxonomy of 13 hazard categories, of which 7 have tests in the v0.5 benchmark. We plan to release version 1.0 of the AI Safety Benchmark by the end of 2024. The v1.0 benchmark will provide meaningful insights into the safety of AI systems. However, the v0.5 benchmark should not be used to assess the safety of AI systems. We have sought to fully document the limitations, flaws, and challenges of v0.5. This release of v0.5 of the AI Safety Benchmark includes (1) a principled approach to specifying and constructing the benchmark, which comprises use cases, types of systems under test (SUTs), language and context, personas, tests, and test items; (2) a taxonomy of 13 hazard categories with definitions and subcategories; (3) tests for seven of the hazard categories, each comprising a unique set of test items, i.e., prompts. There are 43,090 test items in total, which we created with templates; (4) a grading system for AI systems against the benchmark; (5) an openly available platform, and downloadable tool, called ModelBench that can be used to evaluate the safety of AI systems on the benchmark; (6) an example evaluation report which benchmarks the performance of over a dozen openly available chat-tuned language models; (7) a test specification for the benchmark.
△ Less
Submitted 13 May, 2024; v1 submitted 18 April, 2024;
originally announced April 2024.
-
Zak-OTFS for Integration of Sensing and Communication
Authors:
Muhammad Ubadah,
Saif Khan Mohammed,
Ronny Hadani,
Shachar Kons,
Ananthanarayanan Chockalingam,
Robert Calderbank
Abstract:
The Zak-OTFS input/output (I/O) relation is predictable and non-fading when the delay and Doppler periods are greater than the effective channel delay and Doppler spreads, a condition which we refer to as the crystallization condition. The filter taps can simply be read off from the response to a single Zak-OTFS point (impulse) pulsone waveform, and the I/O relation can be reconstructed for a samp…
▽ More
The Zak-OTFS input/output (I/O) relation is predictable and non-fading when the delay and Doppler periods are greater than the effective channel delay and Doppler spreads, a condition which we refer to as the crystallization condition. The filter taps can simply be read off from the response to a single Zak-OTFS point (impulse) pulsone waveform, and the I/O relation can be reconstructed for a sampled system that operates under finite duration and bandwidth constraints. Predictability opens up the possibility of a model-free mode of operation. The time-domain realization of a Zak-OTFS point pulsone is a pulse train modulated by a tone, hence the name, pulsone. The Peak-to-Average Power Ratio (PAPR) of a pulsone is about $15$ dB, and we describe a general method for constructing a spread pulsone for which the time-domain realization has a PAPR of about 6dB. We construct the spread pulsone by applying a type of discrete spreading filter to a Zak-OTFS point pulsone. The self-ambiguity function of the point pulsone is supported on the period lattice $Λ_{p}$, and by applying a discrete chirp filter, we obtain a spread pulsone with a self-ambiguity function that is supported on a rotated lattice ${Λ^*}$. We show that if the channel satisfies the crystallization conditions with respect to ${Λ^*}$ then the effective DD domain filter taps can simply be read off from the cross-ambiguity between the channel response to the spread pulsone and the transmitted spread pulsone. If, in addition, the channel satisfies the crystallization conditions with respect to the period lattice $Λ_{p}$, then in an OTFS frame consisting of a spread pilot pulsone and point data pulsones, after cancelling the received signal corresponding to the spread pulsone, we can recover the channel response to any data pulsone.
△ Less
Submitted 5 April, 2024;
originally announced April 2024.
-
Data Quality Assessment: Challenges and Opportunities
Authors:
Sedir Mohammed,
Hazar Harmouch,
Felix Naumann,
Divesh Srivastava
Abstract:
Data-oriented applications, their users, and even the law require data of high quality. Research has broken down the rather vague notion of data quality into various dimensions, such as accuracy, consistency, and reputation, to name but a few. To achieve the goal of high data quality, many tools and techniques exist to clean and otherwise improve data. Yet, systematic research on actually assessin…
▽ More
Data-oriented applications, their users, and even the law require data of high quality. Research has broken down the rather vague notion of data quality into various dimensions, such as accuracy, consistency, and reputation, to name but a few. To achieve the goal of high data quality, many tools and techniques exist to clean and otherwise improve data. Yet, systematic research on actually assessing data quality in all of its dimensions is largely absent, and with it the ability to gauge the success of any data cleaning effort. It is our vision to establish a systematic and comprehensive framework for the (numeric) assessment of data quality for a given dataset and its intended use. Such a framework must cover the various facets that influence data quality, as well as the many types of data quality dimensions. In particular, we identify five facets that serve as a foundation of data quality assessment. For each facet, we outline the challenges and opportunities that arise when trying to actually assign quality scores to data and create a data quality profile for it, along with a wide range of technologies needed for this purpose.
△ Less
Submitted 1 March, 2024;
originally announced March 2024.
-
Zak-OTFS and LDPC Codes
Authors:
Beyza Dabak,
Venkatesh Khammammetti,
Saif Khan Mohammed,
Robert Calderbank
Abstract:
Orthogonal Time Frequency Space (OTFS) is a framework for communications and active sensing that processes signals in the delay-Doppler (DD) domain. It is informed by 6G propagation environments, where Doppler spreads measured in kHz make it more and more difficult to estimate channels, and the standard model-dependent approach to wireless communication is starting to break down. We consider Zak-O…
▽ More
Orthogonal Time Frequency Space (OTFS) is a framework for communications and active sensing that processes signals in the delay-Doppler (DD) domain. It is informed by 6G propagation environments, where Doppler spreads measured in kHz make it more and more difficult to estimate channels, and the standard model-dependent approach to wireless communication is starting to break down. We consider Zak-OTFS where inverse Zak transform converts information symbols mounted on DD domain pulses to the time domain for transmission. Zak-OTFS modulation is parameterized by a delay period $τ_{p}$ and a Doppler period $ν_{p}$, where the product $τ_{p}ν_{p}=1$. When the channel spread is less than the delay period, and the Doppler spread is less than the Doppler period, the Zak-OTFS input-output relation can be predicted from the response to a single pilot symbol. The highly reliable channel estimates concentrate around the pilot location, and we configure low-density parity-check (LDPC) codes that take advantage of this prior information about reliability. It is advantageous to allocate information symbols to more reliable bins in the DD domain. We report simulation results for a Veh-A channel model where it is not possible to resolve all the paths, showing that LDPC coding extends the range of Doppler spreads for which reliable model-free communication is possible. We show that LDPC coding reduces sensitivity to the choice of transmit filter, making bandwidth expansion less necessary. Finally, we compare BER performance of Zak-OTFS to that of a multicarrier approximation (MC-OTFS), showing LDPC coding amplifies the gains previously reported for uncoded transmission.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
Quilt-1M: One Million Image-Text Pairs for Histopathology
Authors:
Wisdom Oluchi Ikezogwo,
Mehmet Saygin Seyfioglu,
Fatemeh Ghezloo,
Dylan Stefan Chan Geva,
Fatwir Sheikh Mohammed,
Pavan Kumar Anand,
Ranjay Krishna,
Linda Shapiro
Abstract:
Recent accelerations in multi-modal applications have been made possible with the plethora of image and text data available online. However, the scarcity of analogous data in the medical field, specifically in histopathology, has slowed comparable progress. To enable similar representation learning for histopathology, we turn to YouTube, an untapped resource of videos, offering $1,087$ hours of va…
▽ More
Recent accelerations in multi-modal applications have been made possible with the plethora of image and text data available online. However, the scarcity of analogous data in the medical field, specifically in histopathology, has slowed comparable progress. To enable similar representation learning for histopathology, we turn to YouTube, an untapped resource of videos, offering $1,087$ hours of valuable educational histopathology videos from expert clinicians. From YouTube, we curate QUILT: a large-scale vision-language dataset consisting of $802, 144$ image and text pairs. QUILT was automatically curated using a mixture of models, including large language models, handcrafted algorithms, human knowledge databases, and automatic speech recognition. In comparison, the most comprehensive datasets curated for histopathology amass only around $200$K samples. We combine QUILT with datasets from other sources, including Twitter, research papers, and the internet in general, to create an even larger dataset: QUILT-1M, with $1$M paired image-text samples, marking it as the largest vision-language histopathology dataset to date. We demonstrate the value of QUILT-1M by fine-tuning a pre-trained CLIP model. Our model outperforms state-of-the-art models on both zero-shot and linear probing tasks for classifying new histopathology images across $13$ diverse patch-level datasets of $8$ different sub-pathologies and cross-modal retrieval tasks.
△ Less
Submitted 27 October, 2023; v1 submitted 19 June, 2023;
originally announced June 2023.
-
Strengths and Weaknesses of 3D Pose Estimation and Inertial Motion Capture System for Movement Therapy
Authors:
Shawan Mohammed,
Hannah Siebers,
Ted Preuß
Abstract:
3D pose estimation offers the opportunity for fast, non-invasive, and accurate motion analysis. This is of special interest also for clinical use. Currently, motion capture systems are used, as they offer robust and precise data acquisition, which is essential in the case of clinical applications. In this study, we investigate the accuracy of the state-of-the-art 3D position estimation approach Me…
▽ More
3D pose estimation offers the opportunity for fast, non-invasive, and accurate motion analysis. This is of special interest also for clinical use. Currently, motion capture systems are used, as they offer robust and precise data acquisition, which is essential in the case of clinical applications. In this study, we investigate the accuracy of the state-of-the-art 3D position estimation approach MeTrabs, compared to the established inertial sensor system MTw Awinda for specific motion exercises. The study uses and provides an evaluation dataset of parallel recordings from 10 subjects during various movement therapy exercises. The information from the Awinda system and the frames for monocular pose estimation are synchronized. For the comparison, clinically relevant parameters for joint angles of ankle, knee, back, and elbow flexion-extension were estimated and evaluated using mean, median, and maximum deviation between the calculated joint angles for the different exercises, camera positions, and clothing items. The results of the analysis indicate that the mean and median deviations can be kept below 5° for some of the studied angles. These joints could be considered for medical applications even considering the maximum deviations of 15°. However, caution should be applied to certain particularly problematic joints. In particular, elbow flexions, which showed high maximum deviations of up to 50° in our analysis. Furthermore, the type of exercise plays a crucial role in the reliable and safe application of the 3D position estimation method. For example, all joint angles showed a significant deterioration in performance during exercises near the ground.
△ Less
Submitted 1 June, 2023;
originally announced June 2023.
-
OTFS -- Predictability in the Delay-Doppler Domain and its Value to Communication and Radar Sensing
Authors:
Saif Khan Mohammed,
Ronny Hadani,
Ananthanarayanan Chockalingam,
Robert Calderbank
Abstract:
In our first paper [2] we explained why the Zak-OTFS input-output (I/O) relation is predictable and non-fading when the delay and Doppler periods are greater than the effective channel delay and Doppler spreads, a condition which we refer to as the crystallization condition. We argued that a communication system should operate within the crystalline regime.
It is well known that it is possible t…
▽ More
In our first paper [2] we explained why the Zak-OTFS input-output (I/O) relation is predictable and non-fading when the delay and Doppler periods are greater than the effective channel delay and Doppler spreads, a condition which we refer to as the crystallization condition. We argued that a communication system should operate within the crystalline regime.
It is well known that it is possible to identify a linear time varying (LTV) channel if and only if it is under-spread. The crystallization condition is more restrictive than the under-spread condition, so identification is always possible. In the crystalline regime, we show that Zak-OTFS pilot sequences minimize the complexity of identifying the effective DD domain channel filter. We demonstrate that the filter taps can simply be read off from the response to a single Zak-OTFS pilot. In general, we provide an explicit formula for reconstructing the Zak-OTFS I/O relation from a finite number of received pilot symbols in the delay-Doppler (DD) domain. This reconstruction formula makes it possible to study predictability of the Zak-OTFS I/O relation for a sampled system that operates under finite duration and bandwidth constraints. We analyze reconstruction accuracy for different choices of the delay and Doppler periods, and of the pulse sha** filter. Reconstruction accuracy is high when the crystallization condition is satisfied, implying that it is possible to learn directly the I/O relation without needing to estimate the underlying channel. This opens up the possibility of a model-free mode of operation, which is especially useful when a traditional model-dependent mode of operation (reliant on estimation of the underlying physical channel) is out of reach (for example, when the channel comprises of unresolvable paths, or exhibits a continuous delay-Doppler profile such as in presence of acceleration). Our study clarifies the
△ Less
Submitted 2 October, 2023; v1 submitted 17 February, 2023;
originally announced February 2023.
-
OTFS -- A Mathematical Foundation for Communication and Radar Sensing in the Delay-Doppler Domain
Authors:
Saif Khan Mohammed,
Ronny Hadani,
Ananthanarayanan Chockalingam,
Robert Calderbank
Abstract:
Orthogonal time frequency space (OTFS) is a framework for communication and active sensing that processes signals in the delay-Doppler (DD) domain. This paper explores three key features of the OTFS framework, and explains their value to applications. The first feature is a compact and sparse DD domain parameterization of the wireless channel, where the parameters map directly to physical attribut…
▽ More
Orthogonal time frequency space (OTFS) is a framework for communication and active sensing that processes signals in the delay-Doppler (DD) domain. This paper explores three key features of the OTFS framework, and explains their value to applications. The first feature is a compact and sparse DD domain parameterization of the wireless channel, where the parameters map directly to physical attributes of the reflectors that comprise the scattering environment, and as a consequence these parameters evolve predictably. The second feature is a novel waveform / modulation technique, matched to the DD channel model, that embeds information symbols in the DD domain. The relation between channel inputs and outputs is localized, non-fading and predictable, even in the presence of significant delay and Doppler spread, and as a consequence the channel can be efficiently acquired and equalized. By avoiding fading, the post equalization SNR remains constant across all information symbols in a packet, so that bit error performance is superior to contemporary multi-carrier waveforms. Further, the OTFS carrier waveform is a localized pulse in the DD domain, making it possible to separate reflectors along both delay and Doppler simultaneously, and to achieve a high-resolution delay-Doppler radar image of the environment. In other words, the DD parameterization provides a common mathematical framework for communication and radar. This is the third feature of the OTFS framework, and it is ideally suited to intelligent transportation systems involving self-driving cars and unmanned ground/aerial vehicles which are self/network controlled. The OTFS waveform is able to support stable and superior performance over a wide range of user speeds.
△ Less
Submitted 17 February, 2023;
originally announced February 2023.
-
TPM: Transition Probability Matrix -- Graph Structural Feature based Embedding
Authors:
Sarmad N. Mohammed,
Semra Gündüç
Abstract:
In this work, Transition Probability Matrix (TPM) is proposed as a new method for extracting the features of nodes in the graph. The proposed method uses random walks to capture the connectivity structure of a node's close neighborhood. The information obtained from random walks is converted to anonymous walks to extract the topological features of nodes. In the embedding process of nodes, anonymo…
▽ More
In this work, Transition Probability Matrix (TPM) is proposed as a new method for extracting the features of nodes in the graph. The proposed method uses random walks to capture the connectivity structure of a node's close neighborhood. The information obtained from random walks is converted to anonymous walks to extract the topological features of nodes. In the embedding process of nodes, anonymous walks are used since they capture the topological similarities of connectivities better than random walks. Therefore the obtained embedding vectors have richer information about the underlying connectivity structure. The method is applied to node classification and link prediction tasks. The performance of the proposed algorithm is superior to the state-of-the-art algorithms in the recent literature. Moreover, the extracted information about the connectivity structure of similar networks is used to link prediction and node classification tasks for a completely new graph.
△ Less
Submitted 3 March, 2023; v1 submitted 7 August, 2022;
originally announced August 2022.
-
A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach
Authors:
Mhmood Radhi Hadi,
Adnan Saher Mohammed
Abstract:
Software-Defined Networking (SDN) is the next generation to change the architecture of traditional networks. SDN is one of the promising solutions to change the architecture of internet networks. Attacks become more common due to the centralized nature of SDN architecture. It is vital to provide security for the SDN. In this study, we propose a Network Intrusion Detection System-Deep Learning modu…
▽ More
Software-Defined Networking (SDN) is the next generation to change the architecture of traditional networks. SDN is one of the promising solutions to change the architecture of internet networks. Attacks become more common due to the centralized nature of SDN architecture. It is vital to provide security for the SDN. In this study, we propose a Network Intrusion Detection System-Deep Learning module (NIDS-DL) approach in the context of SDN. Our suggested method combines Network Intrusion Detection Systems (NIDS) with many types of deep learning algorithms. Our approach employs 12 features extracted from 41 features in the NSL-KDD dataset using a feature selection method. We employed classifiers (CNN, DNN, RNN, LSTM, and GRU). When we compare classifier scores, our technique produced accuracy results of (98.63%, 98.53%, 98.13%, 98.04%, and 97.78%) respectively. The novelty of our new approach (NIDS-DL) uses 5 deep learning classifiers and made pre-processing dataset to harvests the best results. Our proposed approach was successful in binary classification and detecting attacks, implying that our approach (NIDS-DL) might be used with great efficiency in the future.
△ Less
Submitted 3 August, 2022;
originally announced August 2022.
-
Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective
Authors:
Abubakar Sadiq Mohammed,
Philipp Reinecke,
Pete Burnap,
Omer Rana,
Eirini Anthi
Abstract:
The offshore oil and gas industry has recently been going through a digitalisation drive, with use of `smart' equipment using technologies like the Industrial Internet of Things (IIoT) and Industrial Cyber-Physical Systems (ICPS). There has also been a corresponding increase in cyber attacks targeted at oil and gas companies. Oil production offshore is usually in remote locations, requiring remote…
▽ More
The offshore oil and gas industry has recently been going through a digitalisation drive, with use of `smart' equipment using technologies like the Industrial Internet of Things (IIoT) and Industrial Cyber-Physical Systems (ICPS). There has also been a corresponding increase in cyber attacks targeted at oil and gas companies. Oil production offshore is usually in remote locations, requiring remote access and control. This is achieved by integrating ICPS, Supervisory, Control and Data Acquisition (SCADA) systems, and IIoT technologies. A successful cyber attack against an oil and gas offshore asset could have a devastating impact on the environment, marine ecosystem and safety of personnel. Any disruption to the world's supply of oil and gas (O\&G) can also have an effect on oil prices and in turn, the global economy. This makes it important to secure the industry against cyber threats. We describe the potential cyberattack surface within the oil and gas industry, discussing emerging trends in the offshore sub-sector, and provide a timeline of known cyberattacks. We also present a case study of a subsea control system architecture typically used in offshore oil and gas operations and highlight potential vulnerabilities affecting the components of the system. This study is the first to provide a detailed analysis on the attack vectors in a subsea control system and is crucial to understanding key vulnerabilities, primarily to implement efficient mitigation methods that safeguard the safety of personnel and the environment when using such systems.
△ Less
Submitted 23 February, 2022;
originally announced February 2022.
-
Low Complexity Channel Estimation for OTFS Modulation with Fractional Delay and Doppler
Authors:
Imran Ali Khan,
Saif Khan Mohammed
Abstract:
We consider the problem of accurate channel estimation for OTFS based systems with few transmit/receive antennas, where additional sparsity due to large number of antennas is not a possibility. For such systems the sparsity of the effective delay-Doppler (DD) domain channel is adversely affected in the presence of channel path delay and Doppler shifts which are non-integer multiples of the delay a…
▽ More
We consider the problem of accurate channel estimation for OTFS based systems with few transmit/receive antennas, where additional sparsity due to large number of antennas is not a possibility. For such systems the sparsity of the effective delay-Doppler (DD) domain channel is adversely affected in the presence of channel path delay and Doppler shifts which are non-integer multiples of the delay and Doppler domain resolution. The sparsity is also adversely affected when practical transmit and receive pulses are used. In this paper we propose a Modified Maximum Likelihood Channel Estimation (M-MLE) method for OTFS based systems which exploits the fine delay and Doppler domain resolution of the OTFS modulated signal to decouple the joint estimation of the channel parameters (i.e., channel gain, delay and Doppler shift) of all channel paths into separate estimation of the channel parameters for each path. We further observe that with fine delay and Doppler domain resolution, the received DD domain signal along a particular channel path can be written as a product of a delay domain term and a Doppler domain term where the delay domain term is primarily dependent on the delay of this path and the Doppler domain term is primarily dependent on the Doppler shift of this path. This allows us to propose another method termed as the two-step method (TSE), where the joint two-dimensional estimation of the delay and Doppler shift of a particular path in the M-MLE method is further decoupled into two separate one-dimensional estimation for the delay and for the Doppler shift of that path. Simulations reveal that the proposed methods (M-MLE and TSE) achieve better channel estimation accuracy at lower complexity when compared to other known methods for accurate OTFS channel estimation.
△ Less
Submitted 10 November, 2021;
originally announced November 2021.
-
Degree-Based Random Walk Approach for Graph Embedding
Authors:
Sarmad N. Mohammed,
Semra Gündüç
Abstract:
Graph embedding, representing local and global neighborhood information by numerical vectors, is a crucial part of the mathematical modeling of a wide range of real-world systems. Among the embedding algorithms, random walk-based algorithms have proven to be very successful. These algorithms collect information by creating numerous random walks with a redefined number of steps. Creating random wal…
▽ More
Graph embedding, representing local and global neighborhood information by numerical vectors, is a crucial part of the mathematical modeling of a wide range of real-world systems. Among the embedding algorithms, random walk-based algorithms have proven to be very successful. These algorithms collect information by creating numerous random walks with a redefined number of steps. Creating random walks is the most demanding part of the embedding process. The computation demand increases with the size of the network. Moreover, for real-world networks, considering all nodes on the same footing, the abundance of low-degree nodes creates an imbalanced data problem. In this work, a computationally less intensive and node connectivity aware uniform sampling method is proposed. In the proposed method, the number of random walks is created proportionally with the degree of the node. The advantages of the proposed algorithm become more enhanced when the algorithm is applied to large graphs. A comparative study by using two networks namely CORA and CiteSeer is presented. Comparing with the fixed number of walks case, the proposed method requires 50% less computational effort to reach the same accuracy for node classification and link prediction calculations.
△ Less
Submitted 5 July, 2022; v1 submitted 21 October, 2021;
originally announced October 2021.
-
Embracing advanced AI/ML to help investors achieve success: Vanguard Reinforcement Learning for Financial Goal Planning
Authors:
Shareefuddin Mohammed,
Rusty Bealer,
Jason Cohen
Abstract:
In the world of advice and financial planning, there is seldom one right answer. While traditional algorithms have been successful in solving linear problems, its success often depends on choosing the right features from a dataset, which can be a challenge for nuanced financial planning scenarios. Reinforcement learning is a machine learning approach that can be employed with complex data sets whe…
▽ More
In the world of advice and financial planning, there is seldom one right answer. While traditional algorithms have been successful in solving linear problems, its success often depends on choosing the right features from a dataset, which can be a challenge for nuanced financial planning scenarios. Reinforcement learning is a machine learning approach that can be employed with complex data sets where picking the right features can be nearly impossible. In this paper, we will explore the use of machine learning for financial forecasting, predicting economic indicators, and creating a savings strategy. Vanguard ML algorithm for goals-based financial planning is based on deep reinforcement learning that identifies optimal savings rates across multiple goals and sources of income to help clients achieve financial success. Vanguard learning algorithms are trained to identify market indicators and behaviors too complex to capture with formulas and rules, instead, it works to model the financial success trajectory of investors and their investment outcomes as a Markov decision process. We believe that reinforcement learning can be used to create value for advisors and end-investors, creating efficiency, more personalized plans, and data to enable customized solutions.
△ Less
Submitted 18 October, 2021;
originally announced October 2021.
-
Spectral Efficiency of OTFS Based Orthogonal Multiple Access with Rectangular Pulses
Authors:
Venkatesh Khammammetti,
Saif Khan Mohammed
Abstract:
In this paper we consider Orthogonal Time Frequency Space (OTFS) modulation based multiple-access (MA). We specifically consider Orthogonal MA methods (OMA) where the user terminals (UTs) are allocated non-overlap** physical resource in the delay-Doppler (DD) and/or time-frequency (TF) domain. To the best of our knowledge, in prior literature, the performance of OMA methods have been reported on…
▽ More
In this paper we consider Orthogonal Time Frequency Space (OTFS) modulation based multiple-access (MA). We specifically consider Orthogonal MA methods (OMA) where the user terminals (UTs) are allocated non-overlap** physical resource in the delay-Doppler (DD) and/or time-frequency (TF) domain. To the best of our knowledge, in prior literature, the performance of OMA methods have been reported only for ideal transmit and receive pulses. In [20] and [21], OMA methods were proposed which were shown to achieve multi-user interference (MUI) free communication with ideal pulses. Since ideal pulses are not realizable, in this paper we study the spectral efficiency (SE) performance of these OMA methods with practical rectangular pulses. For these OMA methods, we derive the expression for the received DD domain symbols at the base station (BS) receiver and the effective DD domain channel matrix when rectangular pulses are used. We then derive the expression for the achievable sum SE. These expressions are also derived for another well known OMA method where guard bands (GB) are used to reduce MUI (called as the GB based MA methods) [19]. Through simulations, we observe that with rectangular pulses the sum SE achieved by the method in [21] is almost invariant of the Doppler shift and is higher than that achieved by the methods in [19], [20] at practical values of the received signal-to-noise ratio.
△ Less
Submitted 17 October, 2021;
originally announced October 2021.
-
A Novel Collision Detection and Avoidance system for Midvehicle using Offset-based Curvilinear Motion
Authors:
N. Prabhakaran,
P. M. Balasubramaniam,
P. Ranjith Kumar,
S. Sheik Mohammed
Abstract:
Major cause of midvehicle collision is due to the distraction of drivers in both the Front and rear-end vehicle witnessed in dense traffic and high speed road conditions. In view of this scenario, a crash detection and collision avoidance algorithm coined as Midvehicle Collision Detection and Avoidance System (MCDAS) is proposed to evade the possible crash at both ends of the host vehicle. The met…
▽ More
Major cause of midvehicle collision is due to the distraction of drivers in both the Front and rear-end vehicle witnessed in dense traffic and high speed road conditions. In view of this scenario, a crash detection and collision avoidance algorithm coined as Midvehicle Collision Detection and Avoidance System (MCDAS) is proposed to evade the possible crash at both ends of the host vehicle. The method based upon Constant Velocity (CV) model specifically, addresses two scenarios, the first scenario encompasses two sub-scenario namely, a) A rear-end collision avoidance mechanism that accelerates the host vehicle under no front-end vehicle condition and b) Curvilinear motion based on front and host vehicle offset (position), whilst, the other scenario deals with parallel parking issues. The offset based curvilinear motion of the host vehicle plays a vital role in threat avoidance from the front-end vehicle. A desired curvilinear strategy on left and right sides is achieved by the host vehicle with concern of possible CV to avoid both end collisions. In this methodology, path constraint is applicable for both scenarios with required direction. Monte Carlo analysis of MCDAS covering vehicle kinematics demonstrated acute discrimination with consistent performance for the collision validated on simulated with real-time data.
△ Less
Submitted 1 February, 2021;
originally announced February 2021.
-
Low Complexity Precoding and Detection in Multi-user Massive MIMO OTFS Downlink
Authors:
Brijesh Chander Pandey,
Saif Khan Mohammed,
P. Raviteja,
Yi Hong,
Emanuele Viterbo
Abstract:
We consider the problem of degradation in performance of multi-carrier multi-user massive MIMO systems when channel induced Doppler spread is high. Recently, Orthogonal Time Frequency Space (OTFS) modulation has been shown to be robust to channel induced Doppler spread. In OTFS based systems, information symbols are embedded in the delay-Doppler (DD) domain where they are jointly modulated to gene…
▽ More
We consider the problem of degradation in performance of multi-carrier multi-user massive MIMO systems when channel induced Doppler spread is high. Recently, Orthogonal Time Frequency Space (OTFS) modulation has been shown to be robust to channel induced Doppler spread. In OTFS based systems, information symbols are embedded in the delay-Doppler (DD) domain where they are jointly modulated to generate the time-domain transmit signal. Due to the multi-path delay and Doppler shifts, the DD domain information symbols need to be jointly demodulated at the receiver. For multi-carrier based communication (e.g., Orthogonal Frequency Division Multiplexing (OFDM)), massive MIMO systems have been shown to achieve high spectral and energy efficiency with low complexity multi-user precoding in the downlink. Extending the same to OTFS based downlink multi-user massive MIMO systems is challenging due to the requirement for joint demodulation of all information symbols at the user terminal (UT). In this paper, we solve this problem by proposing a novel OTFS based multi-user precoder at the base station (BS) and a corresponding low complexity detector (LCD) at the user terminals (UTs), which allows for separate demodulation of each DD domain information symbol at the UT. The complexity of the proposed precoder increases only linearly with increasing number BS antennas Q and the number of UTs. We show, through analysis, that as Q increases (with total transmitted power decreased linearly with Q), the proposed low complexity detector achieves a sum SE close to that achieved with optimal joint demodulation at each UT. Numerical simulations confirm our analysis and also show that the SE and error rate performance of the proposed OTFS based massive MIMO precoder and LCD detector is significantly more robust to channel induced Doppler spread when compared to OFDM based multi-user massive MIMO systems.
△ Less
Submitted 24 November, 2020;
originally announced November 2020.
-
Model Predictive Control for Human-Centred Lower Limb Robotic Assistance
Authors:
Christopher Caulcrick,
Weiguang Huo,
Enrico Franco,
Samer Mohammed,
Will Hoult,
Ravi Vaidyanathan
Abstract:
Loss of mobility or balance resulting from neural trauma is a critical consideration in public health. Robotic exoskeletons hold great potential for rehabilitation and assisted movement, yet optimal assist-as-needed (AAN) control remains unresolved given pathological variance among patients. We introduce a model predictive control (MPC) architecture for lower limb exoskeletons centred around a fuz…
▽ More
Loss of mobility or balance resulting from neural trauma is a critical consideration in public health. Robotic exoskeletons hold great potential for rehabilitation and assisted movement, yet optimal assist-as-needed (AAN) control remains unresolved given pathological variance among patients. We introduce a model predictive control (MPC) architecture for lower limb exoskeletons centred around a fuzzy logic algorithm (FLA) identifying modes of assistance based on human involvement. Assistance modes are: 1) passive for human relaxed and robot dominant, 2) active-assist for human cooperation with the task, and 3) safety in the case of human resistance to the robot. Human torque is estimated from electromyography (EMG) signals prior to joint motions, enabling advanced prediction of torque by the MPC and selection of assistance mode by the FLA. The controller is demonstrated in hardware with three subjects on a 1-DOF knee exoskeleton tracking a sinusoidal trajectory with human relaxed assistive, and resistive. Experimental results show quick and appropriate transfers among the assistance modes and satisfied assistive performance in each mode. Results illustrate an objective approach to lower limb robotic assistance through on-the-fly transition between modes of movement, providing a new level of human-robot synergy for mobility assist and rehabilitation.
△ Less
Submitted 10 November, 2020;
originally announced November 2020.
-
OTFS Based Random Access Preamble Transmission For High Mobility Scenarios
Authors:
Alok Kumar Sinha,
Saif Khan Mohammed,
P. Raviteja,
Yi Hong,
Emanuele Viterbo
Abstract:
We consider the problem of uplink timing synchronization for Orthogonal Time Frequency Space (OTFS) modulation based systems where information is embedded in the delay-Doppler (DD) domain. For this, we propose a novel Random Access (RA) preamble waveform based on OTFS modulation. We also propose a method to estimate the round-trip propagation delay between a user terminal (UT) and the base station…
▽ More
We consider the problem of uplink timing synchronization for Orthogonal Time Frequency Space (OTFS) modulation based systems where information is embedded in the delay-Doppler (DD) domain. For this, we propose a novel Random Access (RA) preamble waveform based on OTFS modulation. We also propose a method to estimate the round-trip propagation delay between a user terminal (UT) and the base station (BS) based on the received RA preambles in the DD domain. This estimate (known as the timing advance estimate) is fed back to the respective UTs so that they can advance their uplink timing in order that the signal from all UTs in a cell is received at the BS in a time-synchronized manner. Through analysis and simulations we study the impact of OTFS modulation parameters of the RA preamble on the probability of timing error, which gives valuable insights on how to choose these parameters. Exhaustive numerical simulations of high mobility scenarios suggests that the timing error probability (TEP) performance of the proposed OTFS based RA is much more robust to channel induced multi-path Doppler shift when compared to the RA method in Fourth Generation (4G) systems.
△ Less
Submitted 24 October, 2020;
originally announced October 2020.
-
Wound and episode level readmission risk or weeks to readmit: Why do patients get readmitted? How long does it take for a patient to get readmitted?
Authors:
Subba Reddy Oota,
Nafisur Rahman,
Shahid Saleem Mohammed,
Jeffrey Galitz,
Ming Liu
Abstract:
The Affordable care Act of 2010 had introduced Readmission reduction program in 2012 to reduce avoidable re-admissions to control rising healthcare costs. Wound care impacts 15 of medicare beneficiaries making it one of the major contributors of medicare health care cost. Health plans have been exploring proactive health care services that can focus on preventing wound recurrences and re-admission…
▽ More
The Affordable care Act of 2010 had introduced Readmission reduction program in 2012 to reduce avoidable re-admissions to control rising healthcare costs. Wound care impacts 15 of medicare beneficiaries making it one of the major contributors of medicare health care cost. Health plans have been exploring proactive health care services that can focus on preventing wound recurrences and re-admissions to control the wound care costs. With rising costs of Wound care industry, it has become of paramount importance to reduce wound recurrences & patient re-admissions. What factors are responsible for a Wound to recur which ultimately lead to hospitalization or re-admission? Is there a way to identify the patients at risk of re-admission before the occurrence using data driven analysis? Patient re-admission risk management has become critical for patients suffering from chronic wounds such as diabetic ulcers, pressure ulcers, and vascular ulcers. Understanding the risk & the factors that cause patient readmission can help care providers and patients avoid wound recurrences. Our work focuses on identifying patients who are at high risk of re-admission & determining the time period with in which a patient might get re-admitted. Frequent re-admissions add financial stress to the patient & Health plan and deteriorate the quality of life of the patient. Having this information can allow a provider to set up preventive measures that can delay, if not prevent, patients' re-admission. On a combined wound & episode-level data set of patient's wound care information, our extended autoprognosis achieves a recall of 92 and a precision of 92 for the predicting a patient's re-admission risk. For new patient class, precision and recall are as high as 91 and 98, respectively. We are also able to predict the patient's discharge event for a re-admission event to occur through our model with a MAE of 2.3 weeks.
△ Less
Submitted 5 October, 2020;
originally announced October 2020.
-
Derivation of OTFS Modulation from First Principles
Authors:
Saif Khan Mohammed
Abstract:
Orthogonal Time Frequency Space (OTFS) modulation has been recently proposed to be robust to channel induced Doppler shift in high mobility wireless communication systems. However, to the best of our knowledge, none of the prior works on OTFS have derived it from first principles. In this paper, using the ZAK representation of time-domain (TD) signals, we rigorously derive an orthonormal basis of…
▽ More
Orthogonal Time Frequency Space (OTFS) modulation has been recently proposed to be robust to channel induced Doppler shift in high mobility wireless communication systems. However, to the best of our knowledge, none of the prior works on OTFS have derived it from first principles. In this paper, using the ZAK representation of time-domain (TD) signals, we rigorously derive an orthonormal basis of approximately time and bandwidth limited signals which are also localized in the delay-Doppler (DD) domain. We then consider DD domain modulation based on this orthonormal basis, and derive OTFS modulation. To the best of our knowledge, this is the first paper to rigorously derive OTFS modulation from first principles. We show that irrespective of the amount of Doppler shift, the received DD domain basis signals are localized in a small interval of size roughly equal to the inverse time duration along the Doppler domain and of size roughly equal to the inverse bandwidth along the delay domain (time duration refers to the length of the time-interval where the TD transmit signal has been limited). With sufficiently large time duration and bandwidth, there is little interference between information symbols modulated on different basis signals, which allows for joint DD domain equalization of all information symbols. This explains the inherent robustness of DD domain modulation to channel induced Doppler shift when compared with Orthogonal Frequency Division Multiplexing (OFDM). The degree of localization of the DD domain basis signals is inversely related to the time duration of the transmit signal, which explains the trade-off between robustness to Doppler shift and latency.
△ Less
Submitted 28 July, 2020;
originally announced July 2020.
-
Time-Domain to Delay-Doppler Domain Conversion of OTFS Signals in Very High Mobility Scenarios
Authors:
Saif Khan Mohammed
Abstract:
In Orthogonal Time Frequency Space (OTFS) modulation, information symbols are embedded in the delay-Doppler (DD) domain instead of the time-frequency (TF) domain. n order to ensure compatibility with existing OFDM systems (e.g. 4G LTE), most prior work on OTFS receivers consider a two-step conversion, where the received time-domain (TD) signal is firstly converted to a time-frequency (TF) signal (…
▽ More
In Orthogonal Time Frequency Space (OTFS) modulation, information symbols are embedded in the delay-Doppler (DD) domain instead of the time-frequency (TF) domain. n order to ensure compatibility with existing OFDM systems (e.g. 4G LTE), most prior work on OTFS receivers consider a two-step conversion, where the received time-domain (TD) signal is firstly converted to a time-frequency (TF) signal (using an OFDM demodulator) followed by post-processing of this TF signal into a DD domain signal. In this paper, we show that the spectral efficiency (SE) performance of a two-step conversion based receiver degrades in very high mobility scenarios where the Doppler shift is a significant fraction of the communication bandwidth (e.g., control and non-payload communication (CNPC) in Unmanned Aircraft Systems (UAS)). We therefore consider an alternate conversion, where the received TD signal is directly converted to the DD domain. The resulting received DD domain signal is shown to be not the same as that obtained in the two-step conversion considered in prior works. The alternate conversion does not require an OFDM demodulator and is shown to have lower complexity than the two-step conversion. Analysis and simulations reveal that even in very high mobility scenarios, the SE achieved with the alternate conversion is invariant of Doppler shift and is significantly higher than the SE achieved with two-step conversion (which degrades with increasing Doppler shift).
△ Less
Submitted 22 June, 2020;
originally announced June 2020.
-
Efficient and Secure Flash-based Gaming CAPTCH
Authors:
Monther Aldwairi,
Suaad Mohammed,
Megana Lakshmi Padmanabhan
Abstract:
With the growth of connectivity to smart grids, new applications, and the changing interaction between customer and energy clouds, clouds are more vulnerable to denial-of-service attacks. Efficient detection methods are required to authenticate, detect and control attackers. Completely Automated Public Turing test to tell Computers and Humans Apart, CAPTCHA, is one efficient tool to thwart denial…
▽ More
With the growth of connectivity to smart grids, new applications, and the changing interaction between customer and energy clouds, clouds are more vulnerable to denial-of-service attacks. Efficient detection methods are required to authenticate, detect and control attackers. Completely Automated Public Turing test to tell Computers and Humans Apart, CAPTCHA, is one efficient tool to thwart denial of service attacks. The server presents the user with a client puzzle to solve in order to gain access to the service or website. The puzzle should be hard enough for computers, but easy for humans to solve. Several methods have been suggested including the popular image-based, as well as video-based, and text-based CAPTCHAs. In this paper, we present a new Flash-based gaming CAPTCHA to differentiate bots from humans. We propose a drag and drop client puzzle where the user will play a simple game to answer a visual question. Our method turns out to be convenient, easy for users and challenging for bots. Additionally, it has gaming aspect, which makes it interesting to users of all age groups.
△ Less
Submitted 9 April, 2020;
originally announced April 2020.
-
Accurate, Data-Efficient, Unconstrained Text Recognition with Convolutional Neural Networks
Authors:
Mohamed Yousef,
Khaled F. Hussain,
Usama S. Mohammed
Abstract:
Unconstrained text recognition is an important computer vision task, featuring a wide variety of different sub-tasks, each with its own set of challenges. One of the biggest promises of deep neural networks has been the convergence and automation of feature extractors from input raw signals, allowing for the highest possible performance with minimum required domain knowledge. To this end, we propo…
▽ More
Unconstrained text recognition is an important computer vision task, featuring a wide variety of different sub-tasks, each with its own set of challenges. One of the biggest promises of deep neural networks has been the convergence and automation of feature extractors from input raw signals, allowing for the highest possible performance with minimum required domain knowledge. To this end, we propose a data-efficient, end-to-end neural network model for generic, unconstrained text recognition. In our proposed architecture we strive for simplicity and efficiency without sacrificing recognition accuracy. Our proposed architecture is a fully convolutional network without any recurrent connections trained with the CTC loss function. Thus it operates on arbitrary input sizes and produces strings of arbitrary length in a very efficient and parallelizable manner. We show the generality and superiority of our proposed text recognition architecture by achieving state of the art results on seven public benchmark datasets, covering a wide spectrum of text recognition tasks, namely: Handwriting Recognition, CAPTCHA recognition, OCR, License Plate Recognition, and Scene Text Recognition. Our proposed architecture has won the ICFHR2018 Competition on Automated Text Recognition on a READ Dataset.
△ Less
Submitted 31 December, 2018;
originally announced December 2018.
-
Timing Advance Estimation and Beamforming of Random Access Response in Crowded TDD Massive MIMO Systems
Authors:
Sudarshan Mukherjee,
Alok Kumar Sinha,
Saif Khan Mohammed
Abstract:
Timing advance (TA) estimation at the base station (BS) and reliable decoding of random access response (RAR) at the users are the most important steps in the initial random access (RA) procedure. However, due to the limited availability of physical resources dedicated for RA, successful completion of RA requests would become increasingly difficult in high user density scenarios, due to contention…
▽ More
Timing advance (TA) estimation at the base station (BS) and reliable decoding of random access response (RAR) at the users are the most important steps in the initial random access (RA) procedure. However, due to the limited availability of physical resources dedicated for RA, successful completion of RA requests would become increasingly difficult in high user density scenarios, due to contention among users requesting RA. In this paper, we propose to use the large antenna array at the massive MIMO BS to jointly group RA requests from different users using the same RA preamble. We then beamform the common RAR of each detected user group onto the same frequency resource, in such a way that most users in the group can reliably decode the RAR. The proposed RAR beamforming therefore automatically resolves the problem of collision between multiple RA requests on the same RA preamble, which reduces the RA latency significantly as compared to LTE. Analysis and simulations also reveal that for a fixed desired SINR of the received RAR, both the required per-user RA preamble transmission power and the total RAR beamforming power can be decreased roughly by 1.5 dB with every doubling in the number of BS antennas.
△ Less
Submitted 25 January, 2018;
originally announced January 2018.
-
Strong Baselines for Simple Question Answering over Knowledge Graphs with and without Neural Networks
Authors:
Salman Mohammed,
Peng Shi,
Jimmy Lin
Abstract:
We examine the problem of question answering over knowledge graphs, focusing on simple questions that can be answered by the lookup of a single fact. Adopting a straightforward decomposition of the problem into entity detection, entity linking, relation prediction, and evidence combination, we explore simple yet strong baselines. On the popular SimpleQuestions dataset, we find that basic LSTMs and…
▽ More
We examine the problem of question answering over knowledge graphs, focusing on simple questions that can be answered by the lookup of a single fact. Adopting a straightforward decomposition of the problem into entity detection, entity linking, relation prediction, and evidence combination, we explore simple yet strong baselines. On the popular SimpleQuestions dataset, we find that basic LSTMs and GRUs plus a few heuristics yield accuracies that approach the state of the art, and techniques that do not use neural networks also perform reasonably well. These results show that gains from sophisticated deep learning techniques proposed in the literature are quite modest and that some previous models exhibit unnecessary complexity.
△ Less
Submitted 5 June, 2018; v1 submitted 5 December, 2017;
originally announced December 2017.
-
Efficient hybrid search algorithm on ordered datasets
Authors:
Adnan Saher Mohammed,
Şahin Emrah Amrahov,
Fatih V. Çelebi
Abstract:
The increase in the rate of data is much higher than the increase in the speed of computers, which results in a heavy emphasis on search algorithms in research literature. Searching an item in ordered list is an efficient operation in data processing. Binary and interpolation search algorithms commonly are used for searching ordered dataset in many applications. In this paper, we present a hybrid…
▽ More
The increase in the rate of data is much higher than the increase in the speed of computers, which results in a heavy emphasis on search algorithms in research literature. Searching an item in ordered list is an efficient operation in data processing. Binary and interpolation search algorithms commonly are used for searching ordered dataset in many applications. In this paper, we present a hybrid algorithm to search ordered datasets based on the idea of interpolation and binary search. The proposed algorithm called Hybrid Search (HS), which is designed to work efficiently on unknown distributed ordered datasets, experimental results showed that our proposed algorithm has better performance when compared with other algorithms that use a similar approach.
△ Less
Submitted 2 August, 2017;
originally announced August 2017.
-
Exploring the Effectiveness of Convolutional Neural Networks for Answer Selection in End-to-End Question Answering
Authors:
Royal Sequiera,
Gaurav Baruah,
Zhucheng Tu,
Salman Mohammed,
**feng Rao,
Haotian Zhang,
Jimmy Lin
Abstract:
Most work on natural language question answering today focuses on answer selection: given a candidate list of sentences, determine which contains the answer. Although important, answer selection is only one stage in a standard end-to-end question answering pipeline. This paper explores the effectiveness of convolutional neural networks (CNNs) for answer selection in an end-to-end context using the…
▽ More
Most work on natural language question answering today focuses on answer selection: given a candidate list of sentences, determine which contains the answer. Although important, answer selection is only one stage in a standard end-to-end question answering pipeline. This paper explores the effectiveness of convolutional neural networks (CNNs) for answer selection in an end-to-end context using the standard TrecQA dataset. We observe that a simple idf-weighted word overlap algorithm forms a very strong baseline, and that despite substantial efforts by the community in applying deep learning to tackle answer selection, the gains are modest at best on this dataset. Furthermore, it is unclear if a CNN is more effective than the baseline in an end-to-end context based on standard retrieval metrics. To further explore this finding, we conducted a manual user evaluation, which confirms that answers from the CNN are detectably better than those from idf-weighted word overlap. This result suggests that users are sensitive to relatively small differences in answer selection quality.
△ Less
Submitted 24 July, 2017;
originally announced July 2017.
-
Integrating Lexical and Temporal Signals in Neural Ranking Models for Searching Social Media Streams
Authors:
**feng Rao,
Hua He,
Haotian Zhang,
Ferhan Ture,
Royal Sequiera,
Salman Mohammed,
Jimmy Lin
Abstract:
Time is an important relevance signal when searching streams of social media posts. The distribution of document timestamps from the results of an initial query can be leveraged to infer the distribution of relevant documents, which can then be used to rerank the initial results. Previous experiments have shown that kernel density estimation is a simple yet effective implementation of this idea. T…
▽ More
Time is an important relevance signal when searching streams of social media posts. The distribution of document timestamps from the results of an initial query can be leveraged to infer the distribution of relevant documents, which can then be used to rerank the initial results. Previous experiments have shown that kernel density estimation is a simple yet effective implementation of this idea. This paper explores an alternative approach to mining temporal signals with recurrent neural networks. Our intuition is that neural networks provide a more expressive framework to capture the temporal coherence of neighboring documents in time. To our knowledge, we are the first to integrate lexical and temporal signals in an end-to-end neural network architecture, in which existing neural ranking models are used to generate query-document similarity vectors that feed into a bidirectional LSTM layer for temporal modeling. Our results are mixed: existing neural models for document ranking alone yield limited improvements over simple baselines, but the integration of lexical and temporal signals yield significant improvements over competitive temporal baselines.
△ Less
Submitted 24 July, 2017;
originally announced July 2017.
-
Distant Supervision for Topic Classification of Tweets in Curated Streams
Authors:
Salman Mohammed,
Nimesh Ghelani,
Jimmy Lin
Abstract:
We tackle the challenge of topic classification of tweets in the context of analyzing a large collection of curated streams by news outlets and other organizations to deliver relevant content to users. Our approach is novel in applying distant supervision based on semi-automatically identifying curated streams that are topically focused (for example, on politics, entertainment, or sports). These s…
▽ More
We tackle the challenge of topic classification of tweets in the context of analyzing a large collection of curated streams by news outlets and other organizations to deliver relevant content to users. Our approach is novel in applying distant supervision based on semi-automatically identifying curated streams that are topically focused (for example, on politics, entertainment, or sports). These streams provide a source of labeled data to train topic classifiers that can then be applied to categorize tweets from more topically-diffuse streams. Experiments on both noisy labels and human ground-truth judgments demonstrate that our approach yields good topic classifiers essentially "for free", and that topic classifiers trained in this manner are able to dynamically adjust for topic drift as news on Twitter evolves.
△ Less
Submitted 21 April, 2017;
originally announced April 2017.
-
Achievable Rate Region of the Zero-Forcing Precoder in a 2 X 2 MU-MISO Broadcast VLC Channel with Per-LED Peak Power Constraint and Dimming Control
Authors:
Amit Agarwal,
Saif Khan Mohammed
Abstract:
In this paper, we consider the 2 X 2 multi-user multiple-input-single-output (MU-MISO) broadcast visible light communication (VLC) channel with two light emitting diodes (LEDs) at the transmitter and a single photo diode (PD) at each of the two users. We propose an achievable rate region of the Zero-Forcing (ZF) precoder in this 2 X 2 MU-MISO VLC channel under a per-LED peak and average power cons…
▽ More
In this paper, we consider the 2 X 2 multi-user multiple-input-single-output (MU-MISO) broadcast visible light communication (VLC) channel with two light emitting diodes (LEDs) at the transmitter and a single photo diode (PD) at each of the two users. We propose an achievable rate region of the Zero-Forcing (ZF) precoder in this 2 X 2 MU-MISO VLC channel under a per-LED peak and average power constraint, where the average optical power emitted from each LED is fixed for constant lighting, but is controllable (referred to as dimming control in IEEE 802.15.7 standard on VLC). We analytically characterize the proposed rate region boundary and show that it is Pareto-optimal. Further analysis reveals that the largest rate region is achieved when the fixed per-LED average optical power is half of the allowed per-LED peak optical power. We also propose a novel transceiver architecture where the channel encoder and dimming control are separated which greatly simplifies the complexity of the transceiver. A case study of an indoor VLC channel with the proposed transceiver reveals that the achievable information rates are sensitive to the placement of the LEDs and the PDs. An interesting observation is that for a given placement of LEDs in a 5 m X 5 m X 3 m room, even with a substantial displacement of the users from their optimum placement, reduction in the achievable rates is not significant. This observation could therefore be used to define "coverage zones" within a room where the reduction in the information rates to the two users is within an acceptable tolerance limit.
△ Less
Submitted 12 January, 2017;
originally announced January 2017.
-
Information Theoretic Performance of Periodogram-based CFO Estimation in Massive MU-MIMO Systems
Authors:
Sudarshan Mukherjee,
Saif Khan Mohammed
Abstract:
In this paper, we study the information theoretic performance of the modified time-reversal maximum ratio combining (TR-MRC) receiver (presented in [9]) with the spatially averaged periodogram-based carrier frequency offset (CFO) estimator (proposed in [7]) in multi-user massive MIMO systems. Our analysis shows that an $\mathcal{O}(\sqrt{M})$ array gain is achieved with this periodogram-based CFO…
▽ More
In this paper, we study the information theoretic performance of the modified time-reversal maximum ratio combining (TR-MRC) receiver (presented in [9]) with the spatially averaged periodogram-based carrier frequency offset (CFO) estimator (proposed in [7]) in multi-user massive MIMO systems. Our analysis shows that an $\mathcal{O}(\sqrt{M})$ array gain is achieved with this periodogram-based CFO estimator, which is same as the array gain achieved in the ideal/zero CFO scenario ($M$ is the number of base station antennas). Information theoretic performance comparison with the correlation-based CFO estimator for massive MIMO systems (proposed in [6]) reveals that this periodogram-based CFO estimator is more energy efficient in slowly time-varying channels.
△ Less
Submitted 15 November, 2016;
originally announced November 2016.
-
Bidirectional Conditional Insertion Sort algorithm; An efficient progress on the classical insertion sort
Authors:
Adnan Saher Mohammed,
Şahin Emrah Amrahov,
Fatih V. Çelebi
Abstract:
In this paper, we proposed a new efficient sorting algorithm based on insertion sort concept. The proposed algorithm called Bidirectional Conditional Insertion Sort (BCIS). It is in-place sorting algorithm and it has remarkably efficient average case time complexity when compared with classical insertion sort (IS). By comparing our new proposed algorithm with the Quicksort algorithm, BCIS indicate…
▽ More
In this paper, we proposed a new efficient sorting algorithm based on insertion sort concept. The proposed algorithm called Bidirectional Conditional Insertion Sort (BCIS). It is in-place sorting algorithm and it has remarkably efficient average case time complexity when compared with classical insertion sort (IS). By comparing our new proposed algorithm with the Quicksort algorithm, BCIS indicated faster average case time for relatively small size arrays up to 1500 elements. Furthermore, BCIS was observed to be faster than Quicksort within high rate of duplicated elements even for large size array.
△ Less
Submitted 12 August, 2016; v1 submitted 8 August, 2016;
originally announced August 2016.
-
Information Rate Performance of Massive MU-MIMO Uplink with Constant Envelope Pilot-based Frequency Synchronization
Authors:
Sudarshan Mukherjee,
Saif Khan Mohammed
Abstract:
In this paper, we consider a constant envelope (CE) pilot-based low-complexity technique for frequency synchronization in multi-user massive MIMO systems. Study of the complexity-performance trade-off shows that this CE-pilot-based technique provides better MSE performance when compared to existing low-complexity high-PAPR pilot-based CFO (carrier frequency offset) estimator. Numerical study of th…
▽ More
In this paper, we consider a constant envelope (CE) pilot-based low-complexity technique for frequency synchronization in multi-user massive MIMO systems. Study of the complexity-performance trade-off shows that this CE-pilot-based technique provides better MSE performance when compared to existing low-complexity high-PAPR pilot-based CFO (carrier frequency offset) estimator. Numerical study of the information rate performance of the TR-MRC receiver in imperfect CSI scenario with this CE-pilot based CFO estimator shows that it is more energy-and-spectrally efficient than existing low-complexity CFO estimator in massive MIMO systems. It is also observed that with this CE-pilot based CFO estimation, an $\mathcal{O}(\sqrt{M})$ array gain is achievable.
△ Less
Submitted 20 May, 2016;
originally announced May 2016.
-
Constant Envelope Pilot-Based Low-Complexity CFO Estimation in Massive MU-MIMO Systems
Authors:
Sudarshan Mukherjee,
Saif Khan Mohammed
Abstract:
In this paper we consider a constant envelope pilot signal based carrier frequency offset (CFO) estimation in massive multiple-input multiple-output (MIMO) systems. The proposed algorithm performs spatial averaging on the periodogram of the received pilots across the base station (BS) antennas. Our study reveals that the proposed algorithm has complexity only linear in $M$ (the number of BS antenn…
▽ More
In this paper we consider a constant envelope pilot signal based carrier frequency offset (CFO) estimation in massive multiple-input multiple-output (MIMO) systems. The proposed algorithm performs spatial averaging on the periodogram of the received pilots across the base station (BS) antennas. Our study reveals that the proposed algorithm has complexity only linear in $M$ (the number of BS antennas). Further our analysis and numerical simulations also reveal that with fixed number of users and a fixed pilot length, the minimum required transmit pilot power decreases as $\frac{1}{\sqrt{M}}$ with increasing $M$, while maintaining a fixed desired mean squared error (MSE) of CFO estimation.
△ Less
Submitted 5 May, 2016;
originally announced May 2016.
-
How Much Bandpass Filtering is Required in Massive MIMO Basestations?
Authors:
Sudarshan Mukherjee,
Saif Khan Mohammed
Abstract:
In this paper, we study the impact of aliased out-of-band interference signals on the information sum-rate of the maximum ratio combining receiver in massive multiple-input multiple-output (MIMO) uplink, with both perfect and imperfect channel estimates, in order to determine the required out-of-band attenuation in RF bandpass filters (BPFs). With imperfect channel estimates, our study reveals tha…
▽ More
In this paper, we study the impact of aliased out-of-band interference signals on the information sum-rate of the maximum ratio combining receiver in massive multiple-input multiple-output (MIMO) uplink, with both perfect and imperfect channel estimates, in order to determine the required out-of-band attenuation in RF bandpass filters (BPFs). With imperfect channel estimates, our study reveals that as the number of base-station (BS) antennas ($M$) increases, the required attenuation at the BPFs increases as $\mathcal{O}(\sqrt{M})$ with $M \to \infty$, provided the desired information sum-rate (both in the presence and in the absence of AOOBIs (aliased out-of-band interferers)) remains fixed. This implies a practical limit on the number of BS antennas due to the increase in BPF design complexity and power consumption with increasing $M$.
△ Less
Submitted 5 May, 2016; v1 submitted 22 February, 2016;
originally announced February 2016.
-
The need for effective information security awareness practices in Oman higher educational institutions
Authors:
Rajasekar Ramalingam,
Shimaz Khan,
Shameer Mohammed
Abstract:
The revolution of internet technology and its usage have led a significant increase in the number of online transactions and electronic data transfer, parallely increased the number of cybercrime incidents around the world. Steady economic growth in the Sultanate of Oman accelerated the volume of online utilization for e-commerce, banking, communication, education and so forth. Normally attackers…
▽ More
The revolution of internet technology and its usage have led a significant increase in the number of online transactions and electronic data transfer, parallely increased the number of cybercrime incidents around the world. Steady economic growth in the Sultanate of Oman accelerated the volume of online utilization for e-commerce, banking, communication, education and so forth. Normally attackers target the users who ignore security practices due to the lack of information security awareness. Unawareness of information security practices, user negligence, lack of awareness programs and trainings are the root cause for information security threats. Earlier studies reveal there is a considerable and continuous cybercrime incident in Oman which compromises the security policy of the organizations, affecting the business continuity and the economic growth. In this study, a survey was performed among the educational institutions in Oman to investigate the level of information security awareness and based on the study, a security awareness model is proposed to enable information security practices in the educational institutions.
△ Less
Submitted 21 February, 2016;
originally announced February 2016.
-
Impact of Underlaid Multi-antenna D2D on Cellular Downlink in Massive MIMO Systems
Authors:
Amit Agarwal,
Sudarshan Mukherjee,
Saif Khan Mohammed
Abstract:
In this paper, we consider a massive multiple-input multiple-output (MIMO) downlink system underlaid with a network of multi-antenna D2D user equipments (UEs). Each D2D transmitter (Tx) uses all its antennas to beamform information towards its desired D2D receiver, which uses only a single antenna for reception. While beamforming at the D2D Tx reduces D2D interference to the neighbouring cellular…
▽ More
In this paper, we consider a massive multiple-input multiple-output (MIMO) downlink system underlaid with a network of multi-antenna D2D user equipments (UEs). Each D2D transmitter (Tx) uses all its antennas to beamform information towards its desired D2D receiver, which uses only a single antenna for reception. While beamforming at the D2D Tx reduces D2D interference to the neighbouring cellular UEs (CUEs), the cellular-to-D2D interference is also negligible due to highly directional beamforming at the massive MIMO base station. For the above proposed system, we analyze the average per-user spectral efficiency (SE) of CUEs ($R^{c,d}$) as a function of the D2D area spectral efficiency (ASE). Our analysis reveals that for a fixed D2D ASE ($R_0^{(d)}$) and fixed number of D2D antennas ($N$), with increasing density of D2D Txs ($λ$), $R^{c,d}$ increases (for sufficiently large $λ$) and approaches a fundamental limit $R_{\infty}^{c,d}$ as $λ\to \infty$. Also, $R_{\infty}^{c,d}$ depends on $R_{0}^{(d)}$ and $N$, only through the ratio $\frac{R_{0}^{(d)}}{N-1}$, i.e, for a given fundamental limit $R_{\infty}^{c,d}$, the D2D ASE can be approximately doubled with every doubling in $N$.
△ Less
Submitted 30 March, 2016; v1 submitted 3 November, 2015;
originally announced November 2015.
-
Impact of CFO Estimation on the Performance of ZF Receiver in Massive MU-MIMO Systems
Authors:
Sudarshan Mukherjee,
Saif Khan Mohammed,
Indra Bhushan
Abstract:
In this paper, we study the impact of carrier frequency offset (CFO) estimation/compensation on the information rate performance of the zero-forcing (ZF) receiver in the uplink of a multi-user massive multiple-input multiple-output (MIMO) system. Analysis of the derived closed-form expression of the per-user information rate reveals that with increasing number of BS antennas $M$, an…
▽ More
In this paper, we study the impact of carrier frequency offset (CFO) estimation/compensation on the information rate performance of the zero-forcing (ZF) receiver in the uplink of a multi-user massive multiple-input multiple-output (MIMO) system. Analysis of the derived closed-form expression of the per-user information rate reveals that with increasing number of BS antennas $M$, an $\mathcal{O}(\sqrt{M})$ array gain is achievable, which is same as that achieved in the ideal zero CFO scenario. Also it is observed that compared to the ideal zero CFO case, the performance degradation in the presence of residual CFO (after CFO compensation) is the same for both ZF and MRC.
△ Less
Submitted 2 December, 2015; v1 submitted 24 August, 2015;
originally announced August 2015.
-
Performance Evaluation Of Qos In Wimax Network
Authors:
Ahmed Hassan M. Hassan,
Elrasheed Ismail M. Zayid,
Mohammed Altayeb Awad,
Ahmed Salah Mohammed,
Samreen Tarig Hassan
Abstract:
OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for obtaining the performance measures of an end-to-end delay as well as throughput can be used as an effective tool for this purpose.
OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for obtaining the performance measures of an end-to-end delay as well as throughput can be used as an effective tool for this purpose.
△ Less
Submitted 16 June, 2015;
originally announced June 2015.
-
Impact of Frequency Selectivity on the Information Rate Performance of CFO Impaired Single-Carrier Massive MU-MIMO Uplink
Authors:
Sudarshan Mukherjee,
Saif Khan Mohammed
Abstract:
In this paper, we study the impact of frequency-selectivity on the gap between the required per-user transmit power in the residual CFO scenario (i.e. after CFO estimation/compensation at the base-station (BS) from [6]) and that in the ideal/zero CFO scenario, for a fixed per-user information rate, in single-carrier massive MU-MIMO uplink systems with the TR-MRC receiver. Information theoretic ana…
▽ More
In this paper, we study the impact of frequency-selectivity on the gap between the required per-user transmit power in the residual CFO scenario (i.e. after CFO estimation/compensation at the base-station (BS) from [6]) and that in the ideal/zero CFO scenario, for a fixed per-user information rate, in single-carrier massive MU-MIMO uplink systems with the TR-MRC receiver. Information theoretic analysis reveals that this gap decreases with increasing frequency-selectivity of the channel. Also, in the residual CFO scenario, an $\mathcal{O}(\sqrt{M})$ array gain is still achievable ($M$ is the number of BS antennas) in frequency-selective channels with imperfect channel estimates.
△ Less
Submitted 10 June, 2016; v1 submitted 3 June, 2015;
originally announced June 2015.
-
Growing the Digital Repository of Mathematical Formulae with Generic LaTeX Sources
Authors:
Howard S. Cohl,
Moritz Schubotz,
Marjorie A. McClain,
Bonita V. Saunders,
Cherry Y. Zou,
Azeem S. Mohammed,
Alex A. Danoff
Abstract:
One initial goal for the DRMF is to seed our digital compendium with fundamental orthogonal polynomial formulae. We had used the data from the NIST Digital Library of Mathematical Functions (DLMF) as initial seed for our DRMF project. The DLMF input LaTeX source already contains some semantic information encoded using a highly customized set of semantic LaTeX macros. Those macros could be converte…
▽ More
One initial goal for the DRMF is to seed our digital compendium with fundamental orthogonal polynomial formulae. We had used the data from the NIST Digital Library of Mathematical Functions (DLMF) as initial seed for our DRMF project. The DLMF input LaTeX source already contains some semantic information encoded using a highly customized set of semantic LaTeX macros. Those macros could be converted to content MathML using LaTeXML. During that conversion the semantics were translated to an implicit DLMF content dictionary. This year, we have developed a semantic enrichment process whose goal is to infer semantic information from generic LaTeX sources. The generated context-free semantic information is used to build DRMF formula home pages for each individual formula. We demonstrate this process using selected chapters from the book "Hypergeometric Orthogonal Polynomials and their $q$-Analogues" (2010) by Koekoek, Lesky and Swarttouw (KLS) as well as an actively maintained addendum to this book by Koornwinder (KLSadd). The generic input KLS and KLSadd LaTeX sources describe the printed representation of the formulae, but does not contain explicit semantic information. See http://drmf.wmflabs.org.
△ Less
Submitted 10 May, 2015; v1 submitted 6 May, 2015;
originally announced May 2015.
-
Low-Complexity CFO Estimation for Multi-User Massive MIMO Systems
Authors:
Sudarshan Mukherjee,
Saif Khan Mohammed
Abstract:
Low-complexity carrier frequency offset (CFO) estimation and compensation in multi-user massive multiple-input multiple-output (MIMO) systems is a challenging problem. The existing CFO estimation algorithms incur tremendous increase in complexity with increasing number of base station (BS) antennas, $M$ and number of user terminals (UTs) $K$ (i.e. massive MIMO regime). In this paper, we address th…
▽ More
Low-complexity carrier frequency offset (CFO) estimation and compensation in multi-user massive multiple-input multiple-output (MIMO) systems is a challenging problem. The existing CFO estimation algorithms incur tremendous increase in complexity with increasing number of base station (BS) antennas, $M$ and number of user terminals (UTs) $K$ (i.e. massive MIMO regime). In this paper, we address this problem by proposing a novel low-complexity algorithm for CFO estimation which uses the pilot signal received at the BS during special uplink slots. The total per-channel use complexity of the proposed algorithm increases only linearly with increasing $M$ and is independent of $K$. Analysis reveals that the CFO estimation accuracy can be considerably improved by increasing $M$ and $K$ (i.e. massive MIMO regime). For example, for a fixed $K$ and a fixed training length, the required per-user radiated power during uplink training decreases as $\frac{1}{\sqrt{M}}$ with increasing $M$.
△ Less
Submitted 4 May, 2015; v1 submitted 22 April, 2015;
originally announced April 2015.
-
Constant-Envelope Precoding with Time-Variation Constraint on the Transmitted Phase Angles
Authors:
Sudarshan Mukherjee,
Saif Khan Mohammed
Abstract:
We consider downlink precoding in a frequency-selective multi-user massive MIMO system with highly efficient but non-linear power amplifiers at the base station (BS). A low-complexity precoding algorithm is proposed, which generates constant-envelope (CE) transmit signals for each BS antenna. To avoid large variations in the phase angle transmitted from each antenna, the difference of the phase an…
▽ More
We consider downlink precoding in a frequency-selective multi-user massive MIMO system with highly efficient but non-linear power amplifiers at the base station (BS). A low-complexity precoding algorithm is proposed, which generates constant-envelope (CE) transmit signals for each BS antenna. To avoid large variations in the phase angle transmitted from each antenna, the difference of the phase angles transmitted in consecutive channel uses is limited to $[-απ\,,\, απ]$ for a fixed $0 < α\leq 1$. To achieve a desired per-user information rate, the extra total transmit power required under the time variation constraint when compared to the special case of no time variation constraint (i.e., $α=1$), is small for many practical values of $α$. In a i.i.d. Rayleigh fading channel with $80$ BS antennas, $5$ single-antenna users and a desired per-user information rate of $1$ bit-per-channel-use, the extra total transmit power required is less than $2.0$ dB when $α= 1/2$.
△ Less
Submitted 27 November, 2014;
originally announced November 2014.
-
Improving the Performance of the Zero-Forcing Multiuser MISO Downlink Precoder through User Grou**
Authors:
Saif Khan Mohammed,
Erik G. Larsson
Abstract:
We consider the Multiple Input Single Output (MISO) Gaussian Broadcast channel with $N_t$ antennas at the base station (BS) and $N_u$ single-antenna users in the downlink. We propose a novel user grou** precoder which improves the sum rate performance of the Zero-Forcing (ZF) precoder specially when the channel is ill-conditioned. The proposed precoder partitions all the users into small groups…
▽ More
We consider the Multiple Input Single Output (MISO) Gaussian Broadcast channel with $N_t$ antennas at the base station (BS) and $N_u$ single-antenna users in the downlink. We propose a novel user grou** precoder which improves the sum rate performance of the Zero-Forcing (ZF) precoder specially when the channel is ill-conditioned. The proposed precoder partitions all the users into small groups of equal size. Downlink beamforming is then done in such a way that, at each user's receiver the interference from the signal intended for users not in its group is nulled out. Intra-group interference still remains, and is cancelled through successive interference pre-subtraction at the BS using Dirty Paper Coding (DPC). The proposed user grou** method is different from user selection, since it is a method for precoding of information to the selected (scheduled) users, and not for selecting which users are to be scheduled. Through analysis and simulations, the proposed user grou** based precoder is shown to achieve significant improvement in the achievable sum rate when compared to the ZF precoder. When users are paired (i.e., each group has two users), the complexity of the proposed precoder is $O(N_u^3) + O(N_u^2 N_t)$ which is the same as that of the ZF precoder.
△ Less
Submitted 27 November, 2014;
originally announced November 2014.
-
Energy-Spectral Efficiency Trade-off for a Massive SU-MIMO System with Transceiver Power Consumption
Authors:
Sudarshan Mukherjee,
Saif Khan Mohammed
Abstract:
We consider a single user (SU) massive MIMO system with multiple antennas at the transmitter (base station) and a single antenna at the user terminal (UT). Taking transceiver power consumption into consideration, for a given spectral efficiency (SE) we maximize the energy efficiency (EE) as a function of the number of base station (BS) antennas $M$, resulting in a closed-form expression for the op…
▽ More
We consider a single user (SU) massive MIMO system with multiple antennas at the transmitter (base station) and a single antenna at the user terminal (UT). Taking transceiver power consumption into consideration, for a given spectral efficiency (SE) we maximize the energy efficiency (EE) as a function of the number of base station (BS) antennas $M$, resulting in a closed-form expression for the optimal SE-EE trade-off. It is observed that in contrast to the classical SE-EE trade-off (which considers only the radiated power), with transceiver power consumption taken into account, the EE increases with increasing SE when SE is sufficiently small. Further, for a fixed SE we analyze the impact of varying cell size (i.e., equivalently average channel gain $G_c$) on the optimal EE. We show the interesting result that for sufficiently small $G_c$, the optimal EE decreases as $\mathcal{O}(\sqrt{G_c})$ with decreasing $G_c$. Our analysis also reveals that for sufficiently small SE (or large $G_c$), the EE is insensitive to the power amplifier efficiency.
△ Less
Submitted 20 October, 2014;
originally announced October 2014.