-
Factors Influencing User Willingness To Use SORA
Authors:
Gustave Florentin Nkoulou Mvondo,
Ben Niu
Abstract:
Sora promises to redefine the way visual content is created. Despite its numerous forecasted benefits, the drivers of user willingness to use the text-to-video (T2V) model are unknown. This study extends the extended unified theory of acceptance and use of technology (UTAUT2) with perceived realism and novelty value. Using a purposive sampling method, we collected data from 940 respondents in the…
▽ More
Sora promises to redefine the way visual content is created. Despite its numerous forecasted benefits, the drivers of user willingness to use the text-to-video (T2V) model are unknown. This study extends the extended unified theory of acceptance and use of technology (UTAUT2) with perceived realism and novelty value. Using a purposive sampling method, we collected data from 940 respondents in the US and analyzed the sample using covariance-based structural equation modeling and fuzzy set qualitative comparative analysis (fsQCA). The findings reveal that all hypothesized relationships are supported, with perceived realism emerging as the most influential driver, followed by novelty value. Moreover, fsQCA identifies five configurations leading to high and low willingness to use, and the model demonstrates high predictive validity, contributing to theory advancement. Our study provides valuable insights for developers and marketers, offering guidance for strategic decisions to promote the widespread adoption of T2V models.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Predicting Consultation Success in Online Health Platforms Using Dynamic Knowledge Networks and Multimodal Data Fusion
Authors:
Shuang Geng,
Wenli Zhang,
Jiaheng Xie,
Gemin Liang,
Ben Niu,
Sudha Ram
Abstract:
Online healthcare consultation in virtual health is an emerging industry marked by innovation and fierce competition. Accurate and timely prediction of healthcare consultation success can proactively help online platforms address patient concerns and improve retention rates. However, predicting online consultation success is challenging due to the partial role of virtual consultations in patients'…
▽ More
Online healthcare consultation in virtual health is an emerging industry marked by innovation and fierce competition. Accurate and timely prediction of healthcare consultation success can proactively help online platforms address patient concerns and improve retention rates. However, predicting online consultation success is challenging due to the partial role of virtual consultations in patients' overall healthcare journey and the disconnect between online and in-person healthcare IT systems. Patient data in online consultations is often sparse and incomplete, presenting significant technical challenges and a research gap. To address these issues, we propose the Dynamic Knowledge Network and Multimodal Data Fusion (DyKoNeM) framework, which enhances the predictive power of online healthcare consultations. Our work has important implications for new business models where specific and detailed online communication processes are stored in the IT database, and at the same time, latent information with predictive power is embedded in the network formed by stakeholders' digital traces. It can be extended to diverse industries and domains, where the virtual or hybrid model (e.g., integration of online and offline services) is emerging as a prevailing trend.
△ Less
Submitted 14 June, 2024; v1 submitted 6 June, 2023;
originally announced June 2023.
-
Symbol Rate and Carries Estimation in OFDM Framework: A high Accuracy Technique under Low SNR
Authors:
Zetian Qin,
Yubai Li,
Benye Niu,
Qingyao Li,
Renhao Xue
Abstract:
Under a low Signal-to-Noise Ratio (SNR), the Orthogonal Frequency-Division Multiplexing (OFDM) signal symbol rate is limited. Existing carrier number estimation algorithms lack adequate methods to deal with low SNR. This paper proposes an algorithm with a low error rate under low SNR by correlating the signal and applying a Fast Fourier Transform (FFT) operation. By improving existing algorithms,…
▽ More
Under a low Signal-to-Noise Ratio (SNR), the Orthogonal Frequency-Division Multiplexing (OFDM) signal symbol rate is limited. Existing carrier number estimation algorithms lack adequate methods to deal with low SNR. This paper proposes an algorithm with a low error rate under low SNR by correlating the signal and applying a Fast Fourier Transform (FFT) operation. By improving existing algorithms, we improve the performance of the OFDM carrier count algorithm. The performance of the OFDM's useful symbol time estimation algorithm is improved by estimating the number of carriers and symbol rate.
△ Less
Submitted 27 July, 2022;
originally announced July 2022.
-
Tolerance-Guided Policy Learning for Adaptable and Transferrable Delicate Industrial Insertion
Authors:
Boshen Niu,
Chenxi Wang,
Changliu Liu
Abstract:
Policy learning for delicate industrial insertion tasks (e.g., PC board assembly) is challenging. This paper considers two major problems: how to learn a diversified policy (instead of just one average policy) that can efficiently handle different workpieces with minimum amount of training data, and how to handle defects of workpieces during insertion. To address the problems, we propose tolerance…
▽ More
Policy learning for delicate industrial insertion tasks (e.g., PC board assembly) is challenging. This paper considers two major problems: how to learn a diversified policy (instead of just one average policy) that can efficiently handle different workpieces with minimum amount of training data, and how to handle defects of workpieces during insertion. To address the problems, we propose tolerance-guided policy learning. To encourage transferability of the learned policy to different workpieces, we add a task embedding to the policy's input space using the insertion tolerance. Then we train the policy using generative adversarial imitation learning with reward sha** (RS-GAIL) on a variety of representative situations. To encourage adaptability of the learned policy to handle defects, we build a probabilistic inference model that can output the best inserting pose based on failed insertions using the tolerance model. The best inserting pose is then used as a reference to the learned policy. This proposed method is validated on a sequence of IC socket insertion tasks in simulation. The results show that 1) RS-GAIL can efficiently learn optimal policies under sparse rewards; 2) the tolerance embedding can enhance the transferability of the learned policy; 3) the probabilistic inference makes the policy robust to defects on the workpieces.
△ Less
Submitted 4 August, 2021;
originally announced August 2021.
-
Single Image Super-Resolution via a Holistic Attention Network
Authors:
Ben Niu,
Weilei Wen,
Wenqi Ren,
Xiangde Zhang,
Lian** Yang,
Shuzhen Wang,
Kaihao Zhang,
Xiaochun Cao,
Haifeng Shen
Abstract:
Informative features play a crucial role in the single image super-resolution task. Channel attention has been demonstrated to be effective for preserving information-rich features in each layer. However, channel attention treats each convolution layer as a separate process that misses the correlation among different layers. To address this problem, we propose a new holistic attention network (HAN…
▽ More
Informative features play a crucial role in the single image super-resolution task. Channel attention has been demonstrated to be effective for preserving information-rich features in each layer. However, channel attention treats each convolution layer as a separate process that misses the correlation among different layers. To address this problem, we propose a new holistic attention network (HAN), which consists of a layer attention module (LAM) and a channel-spatial attention module (CSAM), to model the holistic interdependencies among layers, channels, and positions. Specifically, the proposed LAM adaptively emphasizes hierarchical features by considering correlations among layers. Meanwhile, CSAM learns the confidence at all the positions of each channel to selectively capture more informative features. Extensive experiments demonstrate that the proposed HAN performs favorably against the state-of-the-art single image super-resolution approaches.
△ Less
Submitted 20 August, 2020;
originally announced August 2020.
-
Complexity of tree-coloring interval graphs equitably
Authors:
Bei Niu,
Bi Li,
Xin Zhang
Abstract:
An equitable tree-$k$-coloring of a graph is a vertex $k$-coloring such that each color class induces a forest and the size of any two color classes differ by at most one. In this work, we show that every interval graph $G$ has an equitable tree-$k$-coloring for any integer $k\geq \lceil(Δ(G)+1)/2\rceil$, solving a conjecture of Wu, Zhang and Li (2013) for interval graphs, and furthermore, give a…
▽ More
An equitable tree-$k$-coloring of a graph is a vertex $k$-coloring such that each color class induces a forest and the size of any two color classes differ by at most one. In this work, we show that every interval graph $G$ has an equitable tree-$k$-coloring for any integer $k\geq \lceil(Δ(G)+1)/2\rceil$, solving a conjecture of Wu, Zhang and Li (2013) for interval graphs, and furthermore, give a linear-time algorithm for determining whether a proper interval graph admits an equitable tree-$k$-coloring for a given integer $k$. For disjoint union of split graphs, or $K_{1,r}$-free interval graphs with $r\geq 4$, we prove that it is $W[1]$-hard to decide whether there is an equitable tree-$k$-coloring when parameterized by number of colors, or by treewidth, number of colors and maximum degree, respectively.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
Input Perturbation: A New Paradigm between Central and Local Differential Privacy
Authors:
Yilin Kang,
Yong Liu,
Ben Niu,
Xinyi Tong,
Likun Zhang,
Wei** Wang
Abstract:
Traditionally, there are two models on differential privacy: the central model and the local model. The central model focuses on the machine learning model and the local model focuses on the training data. In this paper, we study the \textit{input perturbation} method in differentially private empirical risk minimization (DP-ERM), preserving privacy of the central model. By adding noise to the ori…
▽ More
Traditionally, there are two models on differential privacy: the central model and the local model. The central model focuses on the machine learning model and the local model focuses on the training data. In this paper, we study the \textit{input perturbation} method in differentially private empirical risk minimization (DP-ERM), preserving privacy of the central model. By adding noise to the original training data and training with the `perturbed data', we achieve ($ε$,$δ$)-differential privacy on the final model, along with some kind of privacy on the original data. We observe that there is an interesting connection between the local model and the central model: the perturbation on the original data causes the perturbation on the gradient, and finally the model parameters. This observation means that our method builds a bridge between local and central model, protecting the data, the gradient and the model simultaneously, which is more superior than previous central methods. Detailed theoretical analysis and experiments show that our method achieves almost the same (or even better) performance as some of the best previous central methods with more protections on privacy, which is an attractive result. Moreover, we extend our method to a more general case: the loss function satisfies the Polyak-Lojasiewicz condition, which is more general than strong convexity, the constraint on the loss function in most previous work.
△ Less
Submitted 20 February, 2020;
originally announced February 2020.
-
Equitable partition of graphs into induced linear forests
Authors:
Xin Zhang,
Bei Niu
Abstract:
It is proved that the vertex set of any simple graph $G$ can be equitably partitioned into $k$ subsets for any integer $k\geq\max\{\big\lceil\frac{Δ(G)+1}{2}\big\rceil,\big\lceil\frac{|G|}{4}\big\rceil\}$ so that each of them induces a linear forest.
It is proved that the vertex set of any simple graph $G$ can be equitably partitioned into $k$ subsets for any integer $k\geq\max\{\big\lceil\frac{Δ(G)+1}{2}\big\rceil,\big\lceil\frac{|G|}{4}\big\rceil\}$ so that each of them induces a linear forest.
△ Less
Submitted 14 August, 2019;
originally announced August 2019.
-
Light edges in 1-planar graphs of minimum degree 3
Authors:
Bei Niu,
Xin Zhang
Abstract:
A graph is 1-planar if it can be drawn in the plane so that each edge is crossed by at most one another edge. In this work we prove that each 1-planar graph of minimum degree at least $3$ contains an edge with degrees of its endvertices of type $(3,\leq23)$ or $(4,\leq11)$ or $(5,\leq9)$ or $(6,\leq8)$ or $(7,7)$. Moreover, the upper bounds $9,8$ and $7$ here are sharp and the upper bounds $23$ an…
▽ More
A graph is 1-planar if it can be drawn in the plane so that each edge is crossed by at most one another edge. In this work we prove that each 1-planar graph of minimum degree at least $3$ contains an edge with degrees of its endvertices of type $(3,\leq23)$ or $(4,\leq11)$ or $(5,\leq9)$ or $(6,\leq8)$ or $(7,7)$. Moreover, the upper bounds $9,8$ and $7$ here are sharp and the upper bounds $23$ and $11$ are very close to the possible sharp ones, which may be 20 and 10, respectively. This generalizes a result of Fabrici and Madaras [Discrete Math., 307 (2007) 854--865] which says that each 3-connected 1-planar graph contains a light edge, and improves a result of Hudák and Šugerek [Discuss. Math. Graph Theory, 32(3) (2012) 545--556], which states that each 1-planar graph of minimum degree at least $4$ contains an edge with degrees of its endvertices of type $(4,\leq 13)$ or $(5,\leq 9)$ or $(6,\leq 8)$ or $(7, 7)$.
△ Less
Submitted 27 September, 2019; v1 submitted 14 August, 2019;
originally announced August 2019.
-
Equitable tree-$O(d)$-coloring of $d$-degenerate graphs
Authors:
Xin Zhang,
Bei Niu
Abstract:
An equitable tree-$k$-coloring of a graph is a vertex coloring on $k$ colors so that every color class incudes a forest and the sizes of any two color classes differ by at most one.This kind of coloring was first introduced in 2013 and can be used to formulate the structure decomposition problem on the communication network with some security considerations. In 2015, Esperet, Lemoine and Maffray s…
▽ More
An equitable tree-$k$-coloring of a graph is a vertex coloring on $k$ colors so that every color class incudes a forest and the sizes of any two color classes differ by at most one.This kind of coloring was first introduced in 2013 and can be used to formulate the structure decomposition problem on the communication network with some security considerations. In 2015, Esperet, Lemoine and Maffray showed that every $d$-degenerate graph admits an equitable tree-$k$-coloring for every $k\geq 3^{d-1}$. Motivated by this result, we attempt to lower their exponential bound to a linear bound. Precisely, we prove that every $d$-degenerate graph $G$ admits an equitable tree-$k$-coloring for every $k\geq αd$ provided that $|G|\geq βΔ(G)$, where $(α,β)\in \{(8,56), (9,26), (10,18), (11,15), (12,13), (13,12), (14,11), (15,10), (17,9), (20,8), (27,7), (52,6)\}$.
△ Less
Submitted 14 August, 2019;
originally announced August 2019.
-
Equitable vertex arboricity conjecture holds for graphs with low degeneracy
Authors:
Xin Zhang,
Bei Niu,
Yan Li,
Bi Li
Abstract:
The equitable tree-coloring can formulate a structure decomposition problem on the communication network with some security considerations. Namely, an equitable tree-$k$-coloring of a graph is a vertex coloring using $k$ distinct colors such that every color class induces a forest and the sizes of any two color classes differ by at most one. In this paper, we show some theoretical results on the e…
▽ More
The equitable tree-coloring can formulate a structure decomposition problem on the communication network with some security considerations. Namely, an equitable tree-$k$-coloring of a graph is a vertex coloring using $k$ distinct colors such that every color class induces a forest and the sizes of any two color classes differ by at most one. In this paper, we show some theoretical results on the equitable tree-coloring of graphs by proving that every $d$-degenerate graph with maximum degree at most $Δ$ is equitably tree-$k$-colorable for every integer $k\geq (Δ+1)/2$ provided that $Δ\geq 9.818d$, confirming the equitable vertex arboricity conjecture for graphs with low degeneracy.
△ Less
Submitted 12 April, 2021; v1 submitted 14 August, 2019;
originally announced August 2019.
-
Equitable partition of plane graphs with independent crossings into induced forests
Authors:
Bei Niu,
Xin Zhang,
Yu** Gao
Abstract:
The cluster of a crossing in a graph drawing in the plane is the set of the four end-vertices of its two crossed edges. Two crossings are independent if their clusters do not intersect. In this paper, we prove that every plane graph with independent crossings has an equitable partition into $m$ induced forests for any $m\geq 8$. Moreover, we decrease this lower bound 8 for $m$ to 6, 5, 4 and 3 if…
▽ More
The cluster of a crossing in a graph drawing in the plane is the set of the four end-vertices of its two crossed edges. Two crossings are independent if their clusters do not intersect. In this paper, we prove that every plane graph with independent crossings has an equitable partition into $m$ induced forests for any $m\geq 8$. Moreover, we decrease this lower bound 8 for $m$ to 6, 5, 4 and 3 if we additionally assume that the girth of the considering graph is at least 4, 5, 6 and 26, respectively.
△ Less
Submitted 16 December, 2019; v1 submitted 20 March, 2019;
originally announced March 2019.
-
A structure of 1-planar graph and its applications to coloring problems
Authors:
Xin Zhang,
Bei Niu,
Jiguo Yu
Abstract:
A graph is 1-planar if it can be drawn on a plane so that each edge is crossed by at most one other edge. In this paper, we first give a useful structural theorem for 1-planar graphs, and then apply it to the list edge and list total coloring, the $(p,1)$-total labelling, and the equitable edge coloring of 1-planar graphs. More precisely, we verify the well-known List Edge Coloring Conjecture and…
▽ More
A graph is 1-planar if it can be drawn on a plane so that each edge is crossed by at most one other edge. In this paper, we first give a useful structural theorem for 1-planar graphs, and then apply it to the list edge and list total coloring, the $(p,1)$-total labelling, and the equitable edge coloring of 1-planar graphs. More precisely, we verify the well-known List Edge Coloring Conjecture and List Total Coloring Conjecture for 1-planar graph with maximum degree at least 18, prove that the $(p,1)$-total labelling number of every 1-planar graph $G$ is at most $Δ(G)+2p-2$ provided that $Δ(G)\geq 8p+2$ and $p\geq 2$, and show that every 1-planar graph has an equitable edge coloring with $k$ colors for any integer $k\geq 18$. These three results respectively generalize the main theorems of three different previously published papers.
△ Less
Submitted 24 February, 2019;
originally announced February 2019.
-
A note on the edge partition of graphs containing either a light edge or an alternating 2-cycle
Authors:
Xin Zhang,
Bei Niu
Abstract:
Let $\mathcal{G}_α$ be a hereditary graph class (i.e, every subgraph of $G_α\in \mathcal{G}_α$ belongs to $\mathcal{G}_α$) such that every graph $G_α$ in $\mathcal{G}_α$ has minimum degree at most 1, or contains either an edge $uv$ such that $d_{G_α}(u)+d_{G_α}(v)\leq α$ or a 2-alternating cycle. It is proved that every graph in $\mathcal{G}_α$ ($α\geq 5$) with maximum degree $Δ$ can be edge-parti…
▽ More
Let $\mathcal{G}_α$ be a hereditary graph class (i.e, every subgraph of $G_α\in \mathcal{G}_α$ belongs to $\mathcal{G}_α$) such that every graph $G_α$ in $\mathcal{G}_α$ has minimum degree at most 1, or contains either an edge $uv$ such that $d_{G_α}(u)+d_{G_α}(v)\leq α$ or a 2-alternating cycle. It is proved that every graph in $\mathcal{G}_α$ ($α\geq 5$) with maximum degree $Δ$ can be edge-partitioned into two forests $F_1$, $F_2$ and a subgraph $H$ such that $Δ(F_i)\leq \max\{2,\lceil\frac{Δ-α+6}{2}\rceil\}$ for $i=1,2$ and $Δ(H)\leq α-5$.
△ Less
Submitted 8 September, 2018;
originally announced September 2018.
-
Research on Solution Space of Bipartite Graph Vertex-Cover by Maximum Matchings
Authors:
Wei Wei,
Yunjia Zhang,
Ting Wang,
Baifeng Li,
Baolong Niu,
Zhiming Zheng
Abstract:
Some rigorous results and statistics of the solution space of Vertex-Covers on bipartite graphs are given in this paper. Based on the $K\ddot{o}nig$'s theorem, an exact solution space expression algorithm is proposed and statistical analysis of the nodes' states is provided. The statistical results fit well with the algorithmic results until the emergence of the unfrozen core, which makes the fluc…
▽ More
Some rigorous results and statistics of the solution space of Vertex-Covers on bipartite graphs are given in this paper. Based on the $K\ddot{o}nig$'s theorem, an exact solution space expression algorithm is proposed and statistical analysis of the nodes' states is provided. The statistical results fit well with the algorithmic results until the emergence of the unfrozen core, which makes the fluctuation of statistical quantities and causes the replica symmetric breaking in the solutions. Besides, the entropy of bipartite Vertex-Cover solutions is calculated with the clustering entropy using a cycle simplification technique for the unfrozen core. Furthermore, as generalization of bipartite graphs, bipartite core graph is proposed, the solution space of which can also be easily determined; and based on these results, how to generate a $K\ddot{o}nig-Egerv\acute{a}ry$ subgraph is studied by a growth process of adding edges. The investigation of solution space of bipartite graph Vertex-Cover provides intensive understanding and some insights on the solution space complexity, and will produce benefit for finding maximal $K\ddot{o}nig-Egerv\acute{a}ry$ subgraphs, solving general graph Vertex-Cover and recognizing the intrinsic hardness of NP-complete problems.
△ Less
Submitted 22 May, 2015;
originally announced May 2015.
-
Organization mechanism and counting algorithm on Vertex-Cover solutions
Authors:
Wei Wei,
Renquan Zhang,
Baolong Niu,
Binghui Guo,
Zhiming Zheng
Abstract:
Counting the solution number of combinational optimization problems is an important topic in the study of computational complexity, especially on the #P-complete complexity class. In this paper, we first investigate some organizations of Vertex-Cover unfrozen subgraphs by the underlying connectivity and connected components of unfrozen vertices. Then, a Vertex-Cover Solution Number Counting Algori…
▽ More
Counting the solution number of combinational optimization problems is an important topic in the study of computational complexity, especially on the #P-complete complexity class. In this paper, we first investigate some organizations of Vertex-Cover unfrozen subgraphs by the underlying connectivity and connected components of unfrozen vertices. Then, a Vertex-Cover Solution Number Counting Algorithm is proposed and its complexity analysis is provided, the results of which fit very well with the simulations and have better performance than those by 1-RSB in a neighborhood of c = e for random graphs. Base on the algorithm, variation and fluctuation on the solution number statistics are studied to reveal the evolution mechanism of the solution numbers. Besides, marginal probability distributions on the solution space are investigated on both random graph and scale-free graph to illustrate different evolution characteristics of their solution spaces. Thus, doing solution number counting based on graph expression of solution space should be an alternative and meaningful way to study the hardness of NP-complete and #P-complete problems, and appropriate algorithm design can help to achieve better approximations of solving combinational optimization problems and the corresponding counting problems.
△ Less
Submitted 12 January, 2015; v1 submitted 17 March, 2014;
originally announced March 2014.
-
Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks
Authors:
Ben Niu,
Tanran Zhang,
Xiaoyan Zhu,
Hui Li,
Zongqing Lu
Abstract:
The rapid developments of mobile devices and online social networks have resulted in increasing attention to Mobile Social Networking (MSN). The explosive growth of mobile-connected and location-aware devices makes it possible and meaningful to do the Proximity-based Mobile Social Networks (PMSNs). Users can discover and make new social interactions easily with physical-proximate mobile users thro…
▽ More
The rapid developments of mobile devices and online social networks have resulted in increasing attention to Mobile Social Networking (MSN). The explosive growth of mobile-connected and location-aware devices makes it possible and meaningful to do the Proximity-based Mobile Social Networks (PMSNs). Users can discover and make new social interactions easily with physical-proximate mobile users through WiFi/Bluetooth interfaces embedded in their smartphones. However, users enjoy these conveniences at the cost of their growing privacy concerns. To address this problem, we propose a suit of priority-aware private matching schemes to privately match the similarity with potential friends in the vicinity. Unlike most existing work, our proposed priority-aware matching scheme (P-match) achieves the privacy goal by combining the commutative encryption function and the Tanimoto similarity coefficient which considers both the number of common attributes between users as well as the corresponding priorities on each common attribute. Further, based on the newly constructed similarity function which takes the ratio of attributes matched over all the input set into consideration, we design an enhanced version to deal with some potential attacks such as unlimitedly inputting the attribute set on either the initiator side or the responder side, etc. Finally, our proposed E-match avoids the heavy cryptographic operations and improves the system performance significantly by employing a novel use of the Bloom filter. The security and communication/computation overhead of our schemes are thoroughly analyzed and evaluated via detailed simulations and implementation.
△ Less
Submitted 31 January, 2014;
originally announced January 2014.
-
Relay Assisted Cooperative OSTBC Communication with SNR Imbalance and Channel Estimation Errors
Authors:
Bo Niu,
Mihaela C. Beluri,
Zinan Lin,
Prabhakar Chitrapu
Abstract:
In this paper, a two-hop relay assisted cooperative Orthogonal Space-Time Block Codes (OSTBC) transmission scheme is considered for the downlink communication of a cellular system, where the base station (BS) and the relay station (RS) cooperate and transmit data to the user equipment (UE) in a distributed fashion. We analyze the impact of the SNR imbalance between the BS-UE and RS-UE links, as…
▽ More
In this paper, a two-hop relay assisted cooperative Orthogonal Space-Time Block Codes (OSTBC) transmission scheme is considered for the downlink communication of a cellular system, where the base station (BS) and the relay station (RS) cooperate and transmit data to the user equipment (UE) in a distributed fashion. We analyze the impact of the SNR imbalance between the BS-UE and RS-UE links, as well as the imperfect channel estimation at the UE receiver. The performance is analyzed in the presence of Rayleigh flat fading and our results show that the SNR imbalance does not impact the spatial diversity order. On the other hand, channel estimation errors have a larger impact on the system performance. Simulation results are then provided to confirm the analysis.
△ Less
Submitted 20 January, 2010;
originally announced January 2010.
-
Ergodic and Outage Performance of Fading Broadcast Channels with 1-Bit Feedback
Authors:
Bo Niu,
Osvaldo Simeone,
Oren Somekh,
Alexander M. Haimovich
Abstract:
In this paper, the ergodic sum-rate and outage probability of a downlink single-antenna channel with K users are analyzed in the presence of Rayleigh flat fading, where limited channel state information (CSI) feedback is assumed. Specifically, only 1-bit feedback per fading block per user is available at the base station. We first study the ergodic sum-rate of the 1-bit feedback scheme, and cons…
▽ More
In this paper, the ergodic sum-rate and outage probability of a downlink single-antenna channel with K users are analyzed in the presence of Rayleigh flat fading, where limited channel state information (CSI) feedback is assumed. Specifically, only 1-bit feedback per fading block per user is available at the base station. We first study the ergodic sum-rate of the 1-bit feedback scheme, and consider the impact of feedback delay on the system. A closed-form expression for the achievable ergodic sum-rate is presented as a function of the fading temporal correlation coefficient. It is proved that the sum-rate scales as loglogK, which is the same scaling law achieved by the optimal non-delayed full CSI feedback scheme. The sum-rate degradation due to outdated CSI is also evaluated in the asymptotic regimes of either large K or low SNR. The outage performance of the 1-bit feedback scheme for both instantaneous and outdated feedback is then investigated. Expressions for the outage probabilities are derived, along with the corresponding diversity-multiplexing tradeoffs (DMT). It is shown that with instantaneous feedback, a power allocation based on the feedback bits enables to double the DMT compared to the case with short-term power constraint in which a dynamic power allocation is not allowed. But, with outdated feedback, the advantage of power allocation is lost, and the DMT reverts to that achievable with no CSI feedback. Nevertheless, for finite SNR, improvement in terms of outage probability can still be obtained.
△ Less
Submitted 10 January, 2010;
originally announced January 2010.