-
Towards Efficient Device Identification in Massive Random Access: A Multi-stage Approach
Authors:
Jyotish Robin,
Elza Erkip
Abstract:
Efficient and low-latency wireless connectivity between the base station (BS) and a sparse set of sporadically active devices from a massive number of devices is crucial for random access in emerging massive machine-type communications (mMTC). This paper addresses the challenge of identifying active devices while meeting stringent access delay and reliability constraints in mMTC environments. A no…
▽ More
Efficient and low-latency wireless connectivity between the base station (BS) and a sparse set of sporadically active devices from a massive number of devices is crucial for random access in emerging massive machine-type communications (mMTC). This paper addresses the challenge of identifying active devices while meeting stringent access delay and reliability constraints in mMTC environments. A novel multi-stage active device identification framework is proposed where we aim to refine a partial estimate of the active device set using feedback and hypothesis testing across multiple stages eventually leading to an exact recovery of active devices after the final stage of processing. In our proposed approach, active devices independently transmit binary preambles during each stage, leveraging feedback signals from the BS, whereas the BS employs a non-coherent binary energy detection. The minimum user identification cost associated with our multi-stage non-coherent active device identification framework with feedback, in terms of the required number of channel-uses, is quantified using information-theoretic techniques in the asymptotic regime of total number of devices $\ell$ when the number of active devices $k$ scales as $k = Θ(1)$. Practical implementations of our multi-stage active device identification schemes, leveraging Belief Propagation (BP) techniques, are also presented and evaluated. Simulation results show that our multi-stage BP strategies exhibit superior performance over single-stage strategies, even when considering overhead costs associated with feedback and hypothesis testing.
△ Less
Submitted 13 April, 2024;
originally announced April 2024.
-
Active User Identification in Fast Fading Massive Random Access Channels
Authors:
Jyotish Robin,
Elza Erkip
Abstract:
Reliable and prompt identification of active users is critical for enabling random access in massive machine-to-machine type networks which typically operate within stringent access delay and energy constraints. In this paper, an energy efficient active user identification protocol is envisioned in which the active users simultaneously transmit On-Off Keying (OOK) modulated preambles whereas the b…
▽ More
Reliable and prompt identification of active users is critical for enabling random access in massive machine-to-machine type networks which typically operate within stringent access delay and energy constraints. In this paper, an energy efficient active user identification protocol is envisioned in which the active users simultaneously transmit On-Off Keying (OOK) modulated preambles whereas the base station uses non-coherent detection to avoid the channel estimation overheads. The minimum number of channel-uses required for active user identification in the asymptotic regime of total number of users $\ell$ when the number of active devices k scales as $k = Θ(1)$ is characterized along with an achievability scheme relying on the equivalence of activity detection to a group testing problem. A practical scheme for active user identification based on a belief propagation strategy is also proposed and its performance is compared against the theoretical bounds.
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
Non-Coherent Active Device Identification for Massive Random Access
Authors:
Jyotish Robin,
Elza Erkip
Abstract:
Massive Machine-Type Communications (mMTC) is a key service category in the current generation of wireless networks featuring an extremely high density of energy and resource-limited devices with sparse and sporadic activity patterns. In order to enable random access in such mMTC networks, base station needs to identify the active devices while operating within stringent access delay constraints.…
▽ More
Massive Machine-Type Communications (mMTC) is a key service category in the current generation of wireless networks featuring an extremely high density of energy and resource-limited devices with sparse and sporadic activity patterns. In order to enable random access in such mMTC networks, base station needs to identify the active devices while operating within stringent access delay constraints. In this paper, an energy efficient active device identification protocol is proposed in which active devices transmit On-Off Keying (OOK) modulated preambles jointly and base station employs non-coherent energy detection avoiding channel estimation overheads. The minimum number of channel-uses required by the active user identification protocol is characterized in the asymptotic regime of total number of devices $\ell$ when the number of active devices $k$ scales as $k=Θ(1)$ along with an achievability scheme relying on the equivalence of activity detection to a group testing problem. Several practical schemes based on Belief Propagation (BP) and Combinatorial Orthogonal Matching Pursuit (COMP) are also proposed. Simulation results show that BP strategies outperform COMP significantly and can operate close to the theoretical achievability bounds. In a partial-recovery setting where few misdetections are allowed, BP continues to perform well.
△ Less
Submitted 10 March, 2023;
originally announced March 2023.
-
On some Foundational Aspects of Human-Centered Artificial Intelligence
Authors:
Luciano Serafini,
Raul Barbosa,
Jasmin Grosinger,
Luca Iocchi,
Christian Napoli,
Salvatore Rinzivillo,
Jacques Robin,
Alessandro Saffiotti,
Teresa Scantamburlo,
Peter Schueller,
Paolo Traverso,
Javier Vazquez-Salceda
Abstract:
The burgeoning of AI has prompted recommendations that AI techniques should be "human-centered". However, there is no clear definition of what is meant by Human Centered Artificial Intelligence, or for short, HCAI. This paper aims to improve this situation by addressing some foundational aspects of HCAI. To do so, we introduce the term HCAI agent to refer to any physical or software computational…
▽ More
The burgeoning of AI has prompted recommendations that AI techniques should be "human-centered". However, there is no clear definition of what is meant by Human Centered Artificial Intelligence, or for short, HCAI. This paper aims to improve this situation by addressing some foundational aspects of HCAI. To do so, we introduce the term HCAI agent to refer to any physical or software computational agent equipped with AI components and that interacts and/or collaborates with humans. This article identifies five main conceptual components that participate in an HCAI agent: Observations, Requirements, Actions, Explanations and Models. We see the notion of HCAI agent, together with its components and functions, as a way to bridge the technical and non-technical discussions on human-centered AI. In this paper, we focus our analysis on scenarios consisting of a single agent operating in dynamic environments in presence of humans.
△ Less
Submitted 29 December, 2021;
originally announced December 2021.
-
Capacity Bounds and User Identification Costs in Rayleigh-Fading Many-Access Channel
Authors:
Jyotish Robin,
Elza Erkip
Abstract:
Many-access channel (MnAC) model allows the number of users in the system and the number of active users to scale as a function of the blocklength and as such is suited for dynamic communication systems with massive number of users such as the Internet of Things. Existing MnAC models assume a priori knowledge of channel gains which is impractical since acquiring Channel State Information (CSI) for…
▽ More
Many-access channel (MnAC) model allows the number of users in the system and the number of active users to scale as a function of the blocklength and as such is suited for dynamic communication systems with massive number of users such as the Internet of Things. Existing MnAC models assume a priori knowledge of channel gains which is impractical since acquiring Channel State Information (CSI) for massive number of users can overwhelm the available radio resources. This paper incorporates Rayleigh fading effects to the MnAC model and derives an upper bound on the symmetric message-length capacity of the Rayleigh-fading Gaussian MnAC. Furthermore, a lower bound on the minimum number of channel uses for discovering the active users is established. In addition, the performance of Noisy Combinatorial Orthogonal Matching Pursuit (N-COMP) based group testing (GT) is studied as a practical strategy for active device discovery. Simulations show that, for a given SNR, as the number of users increase, the required number of channel uses for N-COMP GT scales approximately the same way as the lower bound on minimum user identification cost. Moreover, in the low SNR regime, for sufficiently large population sizes, the number of channel uses required by N-COMP GT was observed to be within a factor of two of the lower bound when the expected number of active users scales sub-linearly with the total population size.
△ Less
Submitted 12 May, 2021;
originally announced May 2021.
-
Scattering Mechanisms and Modeling for Terahertz Wireless Communications
Authors:
Shihao Ju,
Syed Hashim Ali Shah,
Muhammad Affan Javed,
Jun Li,
Girish Palteru,
Jyotish Robin,
Yunchou Xing,
Ojas Kanhere,
Theodore S. Rappaport
Abstract:
This paper provides an analysis of radio wave scattering for frequencies ranging from the microwave to the Terahertz band (e.g., 1 GHz - 1 THz), by studying the scattering power reradiated from various types of materials with different surface roughnesses. First, fundamentals of scattering and reflection are developed and explained for use in wireless mobile radio, and the effect of scattering on…
▽ More
This paper provides an analysis of radio wave scattering for frequencies ranging from the microwave to the Terahertz band (e.g., 1 GHz - 1 THz), by studying the scattering power reradiated from various types of materials with different surface roughnesses. First, fundamentals of scattering and reflection are developed and explained for use in wireless mobile radio, and the effect of scattering on the reflection coefficient for rough surfaces is investigated. Received power is derived using two popular scattering models - the directive scattering (DS) model and the radar cross section (RCS) model through simulations over a wide range of frequencies, materials, and orientations for the two models, and measurements confirm the accuracy of the DS model at 140 GHz. This paper shows that scattering can become a prominent propagation mechanism as frequencies extend to millimeter-wave (mmWave) and beyond, but at other times can be treated like simple reflection. Knowledge of scattering effects is critical for appropriate and realistic channel models, which further support the development of massive multiple input-multiple output (MIMO) techniques, localization, ray tracing tool design, and imaging for future 5G and 6G wireless systems.
△ Less
Submitted 8 March, 2019; v1 submitted 6 March, 2019;
originally announced March 2019.
-
Towards a Generic Trace for Rule Based Constraint Reasoning
Authors:
Armando Gonçalves Da Silva Junior,
Pierre Deransart,
Luis-Carlos Menezes,
Marcos-Aurélio Almeida Da Silva,
Jacques Robin
Abstract:
CHR is a very versatile programming language that allows programmers to declaratively specify constraint solvers. An important part of the development of such solvers is in their testing and debugging phases. Current CHR implementations support those phases by offering tracing facilities with limited information. In this report, we propose a new trace for CHR which contains enough information to a…
▽ More
CHR is a very versatile programming language that allows programmers to declaratively specify constraint solvers. An important part of the development of such solvers is in their testing and debugging phases. Current CHR implementations support those phases by offering tracing facilities with limited information. In this report, we propose a new trace for CHR which contains enough information to analyze any aspects of \CHRv\ execution at some useful abstract level, common to several implementations. %a large family of rule based solvers. This approach is based on the idea of generic trace. Such a trace is formally defined as an extension of the $ω_r^\lor$ semantics of CHR. We show that it can be derived form the SWI Prolog CHR trace.
△ Less
Submitted 24 April, 2012;
originally announced April 2012.