-
Iterative Causal Segmentation: Filling the Gap between Market Segmentation and Marketing Strategy
Authors:
Kaihua Ding,
**gsong Cui,
Mohammad Soltani,
**g **
Abstract:
The field of causal Machine Learning (ML) has made significant strides in recent years. Notable breakthroughs include methods such as meta learners (arXiv:1706.03461v6) and heterogeneous doubly robust estimators (arXiv:2004.14497) introduced in the last five years. Despite these advancements, the field still faces challenges, particularly in managing tightly coupled systems where both the causal t…
▽ More
The field of causal Machine Learning (ML) has made significant strides in recent years. Notable breakthroughs include methods such as meta learners (arXiv:1706.03461v6) and heterogeneous doubly robust estimators (arXiv:2004.14497) introduced in the last five years. Despite these advancements, the field still faces challenges, particularly in managing tightly coupled systems where both the causal treatment variable and a confounding covariate must serve as key decision-making indicators. This scenario is common in applications of causal ML for marketing, such as marketing segmentation and incremental marketing uplift. In this work, we present our formally proven algorithm, iterative causal segmentation, to address this issue.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
On Stochastic Fundamental Limits in a Downlink Integrated Sensing and Communication Network
Authors:
Marziyeh Soltani,
Mahtab Mirmohseni,
Rahim Tafazolli
Abstract:
This paper aims to analyze the stochastic performance of a multiple input multiple output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario, where a base station (BS) transmits a dual-functional radar-communication (DFRC) signal matrix, serving the purpose of transmitting communication data to the user while simultaneously sensing the angular location of a target. Th…
▽ More
This paper aims to analyze the stochastic performance of a multiple input multiple output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario, where a base station (BS) transmits a dual-functional radar-communication (DFRC) signal matrix, serving the purpose of transmitting communication data to the user while simultaneously sensing the angular location of a target. The channel between the BS and the user is modeled as a random channel with Rayleigh fading distribution, and the azimuth angle of the target is assumed to follow a uniform distribution. Due to the randomness inherent in the network, the challenge is to consider suitable performance metrics for this randomness. To address this issue, for users, we employ the user's rate outage probability (OP) and ergodic rate, while for target, we propose using the OP of the Cramér-Rao lower bound (CRLB) for the angle of arrival and the ergodic CRLB. We have obtained the expressions of these metrics for scenarios where the BS employs two different beamforming methods. Our approach to deriving these metrics involves computing the probability density function (PDF) of the signal-to-noise ratio for users and the CRLB for the target. We have demonstrated that the central limit theorem provides a viable approach for deriving these PDFs. In our numerical results, we demonstrate the trade-off between sensing and communication (S \& C) by characterizing the region of S \& C metrics and by obtaining the Pareto optimal boundary points, confirmed with simulations.
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
Nanophotonic Phased Array XY Hamiltonian Solver
Authors:
Michelle Chalupnik,
Anshuman Singh,
James Leatham,
Marko Loncar,
Moe Soltani
Abstract:
Solving large-scale computationally hard optimization problems using existing computers has hit a bottleneck. A promising alternative approach uses physics-based phenomena to naturally solve optimization problems wherein the physical phenomena evolves to its minimum energy. In this regard, photonics devices have shown promise as alternative optimization architectures, benefiting from high-speed, h…
▽ More
Solving large-scale computationally hard optimization problems using existing computers has hit a bottleneck. A promising alternative approach uses physics-based phenomena to naturally solve optimization problems wherein the physical phenomena evolves to its minimum energy. In this regard, photonics devices have shown promise as alternative optimization architectures, benefiting from high-speed, high-bandwidth and parallelism in the optical domain. Among photonic devices, programmable spatial light modulators (SLMs) have shown promise in solving large scale Ising model problems to which many computationally hard problems can be mapped. Despite much progress, existing SLMs for solving the Ising model and similar problems suffer from slow update rates and physical bulkiness. Here, we show that using a compact silicon photonic integrated circuit optical phased array (PIC-OPA) we can simulate an XY Hamiltonian, a generalized form of Ising Hamiltonian, where spins can vary continuously. In this nanophotonic XY Hamiltonian solver, the spins are implemented using analog phase shifters in the optical phased array. The far field intensity pattern of the PIC-OPA represents an all-to-all coupled XY Hamiltonian energy and can be optimized with the tunable phase-shifters allowing us to solve an all-to-all coupled XY model. Our results show the utility of PIC-OPAs as compact, low power, and high-speed solvers for nondeterministic polynomial (NP)-hard problems. The scalability of the silicon PIC-OPA and its compatibility with monolithic integration with CMOS electronics further promises the realization of a powerful hybrid photonic/electronic non-Von Neumann compute engine.
△ Less
Submitted 9 March, 2024; v1 submitted 2 February, 2024;
originally announced February 2024.
-
Optimization of Raman amplifiers: a comparison between black-, grey- and white-box modeling
Authors:
Metodi P. Yankov,
Mehran Soltani,
Andrea Carena,
Darko Zibar,
Francesco Da Ros
Abstract:
Designing and optimizing optical amplifiers to maximize system performance is becoming increasingly important as optical communication systems strive to increase throughput. Offline optimization of optical amplifiers relies on models ranging from white-box models deeply rooted in physics to black-box data-driven physics-agnostic models. Here, we compare the capabilities of white-, grey- and black-…
▽ More
Designing and optimizing optical amplifiers to maximize system performance is becoming increasingly important as optical communication systems strive to increase throughput. Offline optimization of optical amplifiers relies on models ranging from white-box models deeply rooted in physics to black-box data-driven physics-agnostic models. Here, we compare the capabilities of white-, grey- and black-box models to achieve a target frequency-distance amplification in a bidirectional Raman amplifier. We show that any of the studied methods can achieve down to 1 dB of frequency-distance flatness over the C-band in a 100-km span. Then, we discuss the models' applicability, advantages, and drawbacks based on the target application scenario, in particular in terms of optimization speed and access to training data.
△ Less
Submitted 11 September, 2023;
originally announced October 2023.
-
Older and younger adults are influenced differently by dark pattern designs
Authors:
Reza Ghaiumy Anaraky,
Byron Lowens,
Yao Li,
Kaileigh A. Byrne,
Marten Risius,
Xinru Page,
Pamela Wisniewski,
Masoumeh Soleimani,
Morteza Soltani,
Bart Knijnenburg
Abstract:
Considering that prior research has found older users undergo a different privacy decision-making process compared to younger adults, more research is needed to inform the behavioral privacy disclosure effects of these strategies for different age groups. To address this gap, we used an existing dataset of an experiment with a photo-tagging Facebook application. This experiment had a 2x2x5 between…
▽ More
Considering that prior research has found older users undergo a different privacy decision-making process compared to younger adults, more research is needed to inform the behavioral privacy disclosure effects of these strategies for different age groups. To address this gap, we used an existing dataset of an experiment with a photo-tagging Facebook application. This experiment had a 2x2x5 between-subjects design where the manipulations were common dark pattern design strategies: framing (positive vs. negative), privacy defaults (opt-in vs. opt-out), and justification messages (positive normative, negative normative, positive rationale, negative rationale, none). We compared older (above 65 years old, N=44) and young adults (18 to 25 years old, N=162) privacy concerns and disclosure behaviors (i.e., accepting or refusing automated photo tagging) in the scope of dark pattern design. Overall, we find support for the effectiveness of dark pattern designs in the sense that positive framing and opt-out privacy defaults significantly increased disclosure behavior, while negative justification messages significantly decreased privacy concerns. Regarding older adults, our results show that certain dark patterns do lead to more disclosure than for younger adults, but also to increased privacy concerns for older adults than for younger.
△ Less
Submitted 5 October, 2023;
originally announced October 2023.
-
Outage Tradeoff Analysis in a Downlink Integrated Sensing and Communication Network
Authors:
Marziyeh Soltani,
Mahtab Mirmohseni,
Rahim Tafazolli
Abstract:
This paper aims to analyze the stochastic performance of a multiple input multiple output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario, where a base station (BS) transmits a dual-functional radar-communication (DFRC) signal matrix, serving the purpose of transmitting communication data to the user while simultaneously sensing the angular location of a target. Th…
▽ More
This paper aims to analyze the stochastic performance of a multiple input multiple output (MIMO) integrated sensing and communication (ISAC) system in a downlink scenario, where a base station (BS) transmits a dual-functional radar-communication (DFRC) signal matrix, serving the purpose of transmitting communication data to the user while simultaneously sensing the angular location of a target. The channel between the BS and the user is modeled as a random channel with Rayleigh fading distribution, and the azimuth angle of the target is assumed to follow a uniform distribution. We use a maximum ratio transmission (MRT) beamformer to share resource between sensing and communication (S \& C) and observe the trade-off between them. We derive the approximate probability density function (PDF) of the signal-to-noise ratio (SNR) for both the user and the target. Subsequently, leveraging the obtained PDF, we derive the expressions for the user's rate outage probability (OP), as well as the OP for the Cramer-Rao lower bound (CRLB) of the angle of arrival (AOA). In our numerical results, we demonstrate the trade-off between S \& C, confirmed with simulations.
△ Less
Submitted 24 May, 2023;
originally announced May 2023.
-
ProKnow: Process Knowledge for Safety Constrained and Explainable Question Generation for Mental Health Diagnostic Assistance
Authors:
Kaushik Roy,
Manas Gaur,
Misagh Soltani,
Vipula Rawte,
Ashwin Kalyan,
Amit Sheth
Abstract:
Current Virtual Mental Health Assistants (VMHAs) provide counseling and suggestive care. They refrain from patient diagnostic assistance because they lack training in safety-constrained and specialized clinical process knowledge. In this work, we define Proknow as an ordered set of information that maps to evidence-based guidelines or categories of conceptual understanding to experts in a domain.…
▽ More
Current Virtual Mental Health Assistants (VMHAs) provide counseling and suggestive care. They refrain from patient diagnostic assistance because they lack training in safety-constrained and specialized clinical process knowledge. In this work, we define Proknow as an ordered set of information that maps to evidence-based guidelines or categories of conceptual understanding to experts in a domain. We also introduce a new dataset of diagnostic conversations guided by safety constraints and Proknow that healthcare professionals use. We develop a method for natural language question generation (NLG) that collects diagnostic information from the patient interactively. We demonstrate the limitations of using state-of-the-art large-scale language models (LMs) on this dataset. Our algorithm models the process knowledge through explicitly modeling safety, knowledge capture, and explainability. LMs augmented with ProKnow guided method generated 89% safer questions in the depression and anxiety domain. The Explainability of the generated question is assessed by computing similarity with concepts in depression and anxiety knowledge bases. Overall, irrespective of the type of LMs augmented with our ProKnow, we achieved an average 82% improvement over simple pre-trained LMs on safety, explainability, and process-guided question generation. We qualitatively and quantitatively evaluate the efficacy of the proposed ProKnow-guided methods by introducing three new evaluation metrics for safety, explainability, and process knowledge adherence.
△ Less
Submitted 1 June, 2023; v1 submitted 13 May, 2023;
originally announced May 2023.
-
A Multi-Agent Adaptive Deep Learning Framework for Online Intrusion Detection
Authors:
Mahdi Soltani,
Khashayar Khajavi,
Mahdi Jafari Siavoshani,
Amir Hossein Jahangir
Abstract:
The network security analyzers use intrusion detection systems (IDSes) to distinguish malicious traffic from benign ones. The deep learning-based IDSes are proposed to auto-extract high-level features and eliminate the time-consuming and costly signature extraction process. However, this new generation of IDSes still suffers from a number of challenges. One of the main issues of an IDS is facing t…
▽ More
The network security analyzers use intrusion detection systems (IDSes) to distinguish malicious traffic from benign ones. The deep learning-based IDSes are proposed to auto-extract high-level features and eliminate the time-consuming and costly signature extraction process. However, this new generation of IDSes still suffers from a number of challenges. One of the main issues of an IDS is facing traffic concept drift which manifests itself as new (i.e., zero-day) attacks, in addition to the changing behavior of benign users/applications. Furthermore, a practical DL-based IDS needs to be conformed to a distributed architecture to handle big data challenges.
We propose a framework for adapting DL-based models to the changing attack/benign traffic behaviors, considering a more practical scenario (i.e., online adaptable IDSes). This framework employs continual deep anomaly detectors in addition to the federated learning approach to solve the above-mentioned challenges. Furthermore, the proposed framework implements sequential packet labeling for each flow, which provides an attack probability score for the flow by gradually observing each flow packet and updating its estimation. We evaluate the proposed framework by employing different deep models (including CNN-based and LSTM-based) over the CIC-IDS2017 and CSE-CIC-IDS2018 datasets. Through extensive evaluations and experiments, we show that the proposed distributed framework is well adapted to the traffic concept drift. More precisely, our results indicate that the CNN-based models are well suited for continually adapting to the traffic concept drift (i.e., achieving an average detection rate of above 95% while needing just 128 new flows for the updating phase), and the LSTM-based models are a good candidate for sequential packet labeling in practical online IDSes (i.e., detecting intrusions by just observing their first 15 packets).
△ Less
Submitted 5 March, 2023;
originally announced March 2023.
-
SPAD-Based Optical Wireless Communication with ACO-OFDM
Authors:
Shenjie Huang,
Cheng Chen,
Mohammad Dehghani Soltani,
Robert Henderson,
Harald Haas,
Majid Safari
Abstract:
The sensitivity of the optical wireless communication (OWC) can be effectively improved by employing the highly sensitive single-photon avalanche diode (SPAD) arrays. However, the nonlinear distortion introduced by the dead time strongly limits the throughput of the SPAD-based OWC systems. Optical orthogonal frequency division multiplexing (OFDM) can be employed in the systems with SPAD arrays to…
▽ More
The sensitivity of the optical wireless communication (OWC) can be effectively improved by employing the highly sensitive single-photon avalanche diode (SPAD) arrays. However, the nonlinear distortion introduced by the dead time strongly limits the throughput of the SPAD-based OWC systems. Optical orthogonal frequency division multiplexing (OFDM) can be employed in the systems with SPAD arrays to improve the spectral efficiency. In this work, a theoretical performance analysis of SPAD-based OWC system with asymmetrically-clipped optical OFDM (ACO-OFDM) is presented. The impact of the SPAD nonlinearity on the system performance is investigated. In addition, the comparison of the considered scheme with direct-current-biased optical OFDM (DCO-OFDM) is presented showing the distinct reliable operation regimes of the two schemes. In the low power regimes, ACO-OFDM outperforms DCO-OFDM; whereas, the latter is more preferable in the high power regimes.
△ Less
Submitted 25 October, 2022;
originally announced October 2022.
-
Experimental validation of machine-learning based spectral-spatial power evolution sha** using Raman amplifiers
Authors:
Mehran Soltani,
Francesco Da Ros,
Andrea Carena,
Darko Zibar
Abstract:
We experimentally validate a real-time machine learning framework, capable of controlling the pump power values of Raman amplifiers to shape the signal power evolution in two-dimensions (2D): frequency and fiber distance. In our setup, power values of four first-order counter-propagating pumps are optimized to achieve the desired 2D power profile. The pump power optimization framework includes a c…
▽ More
We experimentally validate a real-time machine learning framework, capable of controlling the pump power values of Raman amplifiers to shape the signal power evolution in two-dimensions (2D): frequency and fiber distance. In our setup, power values of four first-order counter-propagating pumps are optimized to achieve the desired 2D power profile. The pump power optimization framework includes a convolutional neural network (CNN) followed by differential evolution (DE) technique, applied online to the amplifier setup to automatically achieve the target 2D power profiles. The results on achievable 2D profiles show that the framework is able to guarantee very low maximum absolute error (MAE) (<0.5 dB) between the obtained and the target 2D profiles. Moreover, the framework is tested in a multi-objective design scenario where the goal is to achieve the 2D profiles with flat gain levels at the end of the span, jointly with minimum spectral excursion over the entire fiber length. In this case, the experimental results assert that for 2D profiles with the target flat gain levels, the DE obtains less than 1 dB maximum gain deviation, when the setup is not physically limited in the pump power values. The simulation results also prove that with enough pump power available, better gain deviation (less than 0.6 dB) for higher target gain levels is achievable.
△ Less
Submitted 26 September, 2022;
originally announced September 2022.
-
Terabit Indoor Laser-Based Wireless Communications: LiFi 2.0 for 6G
Authors:
Mohammad Dehghani Soltani,
Hossein Kazemi,
Elham Sarbazi,
Ahmad Adnan Qidan,
Barzan Yosuf,
Sanaa Mohamed,
Ravinder Singh,
Bela Berde,
Dominique Chiaroni,
Bastien BĂ©chadergue,
Fathi Abdeldayem,
Hardik Soni,
Jose Tabu,
Micheline Perrufel,
Nikola Serafimovski,
Taisir E. H. El-Gorashi,
Jaafar Elmirghani,
Richard Penty,
Ian H. White,
Harald Haas,
Majid Safari
Abstract:
This paper provides a summary of available technologies required for implementing indoor laser-based wireless networks capable of achieving aggregate data-rates of terabits per second as widely accepted as a sixth generation (6G) key performance indicator. The main focus of this paper is on the technologies supporting the near infrared region of the optical spectrum. The main challenges in the des…
▽ More
This paper provides a summary of available technologies required for implementing indoor laser-based wireless networks capable of achieving aggregate data-rates of terabits per second as widely accepted as a sixth generation (6G) key performance indicator. The main focus of this paper is on the technologies supporting the near infrared region of the optical spectrum. The main challenges in the design of the transmitter and receiver systems and communication/networking schemes are identified and new insights are provided. This paper also covers the previous and recent standards as well as industrial applications for optical wireless communications (OWC) and LiFi.
△ Less
Submitted 21 June, 2022;
originally announced June 2022.
-
Experimental Validation of Spectral-Spatial Power Evolution Design Using Raman Amplifiers
Authors:
Mehran Soltani,
Francesco Da Ros,
Andrea Carena,
Darko Zibar
Abstract:
We experimentally validate a machine learning-enabled Raman amplification framework, capable of jointly sha** the signal power evolution in two domains: frequency and fiber distance. The proposed experiment addresses the amplification in the whole C-band, by optimizing four first-order counter-propagating Raman pumps.
We experimentally validate a machine learning-enabled Raman amplification framework, capable of jointly sha** the signal power evolution in two domains: frequency and fiber distance. The proposed experiment addresses the amplification in the whole C-band, by optimizing four first-order counter-propagating Raman pumps.
△ Less
Submitted 16 May, 2022;
originally announced June 2022.
-
Performance Analysis of SPAD-Based Optical Wireless Communication with OFDM
Authors:
Shenjie Huang,
Yichen Li,
Cheng Chen,
Mohammad Dehghani Soltani,
Robert Henderson,
Majid Safari,
Harald Haas
Abstract:
In recent years, there has been a growing interest in the use of single-photon avalanche diode (SPAD) in optical wireless communication (OWC). SPAD operates in the Geiger mode and can act as a photon counting receiver obviating the need for a transimpedance amplifier (TIA). Although a SPAD receiver can provide higher sensitivity compared to the traditional linear photodetectors, it suffers from th…
▽ More
In recent years, there has been a growing interest in the use of single-photon avalanche diode (SPAD) in optical wireless communication (OWC). SPAD operates in the Geiger mode and can act as a photon counting receiver obviating the need for a transimpedance amplifier (TIA). Although a SPAD receiver can provide higher sensitivity compared to the traditional linear photodetectors, it suffers from the dead-time-induced nonlinearity. To improve the data rates of SPAD-based OWC systems, optical orthogonal frequency division multiplexing (OFDM) can be employed. This paper provides a comprehensive theoretical analysis of the SPAD-based OWC systems using OFDM signalling considering the effects of signal clip**, SPAD nonlinearity, and signal-dependent shot noise. An equivalent additive Gaussian noise channel model is proposed to describe the performance of the SPAD-based OFDM system. The statistics of the proposed channel model and the analytical expressions of the signal-to-noise ratio (SNR) and bit error rate (BER) are derived in closed forms. By means of extensive numerical results, the impact of the unique receiver nonlinearity on the system performance is investigated. The results demonstrate new insights into different optical power regimes of reliable operation for SPAD-based OFDM systems even well beyond SPAD saturation level.
△ Less
Submitted 4 June, 2022;
originally announced June 2022.
-
High-Speed Imaging Receiver Design for 6G Optical Wireless Communications: A Rate-FOV Trade-Off
Authors:
Mohammad Dehghani Soltani,
Hossein Kazemi,
Elham Sarbazi,
Taisir E. H. El-Gorashi,
Jaafar M. H. Elmirghani,
Richard V. Penty,
Ian H. White,
Harald Haas,
Majid Safari
Abstract:
The design of a compact high-speed and wide field of view (FOV) receiver is challenging due to the presence of two well-known trade-offs. The first one is the area-bandwidth trade-off of photodetectors (PDs) and the second one is the gain-FOV trade-off due to the use of optics. The combined effects of these two trade-offs imply that the achievable data rate of an imaging optical receiver is limite…
▽ More
The design of a compact high-speed and wide field of view (FOV) receiver is challenging due to the presence of two well-known trade-offs. The first one is the area-bandwidth trade-off of photodetectors (PDs) and the second one is the gain-FOV trade-off due to the use of optics. The combined effects of these two trade-offs imply that the achievable data rate of an imaging optical receiver is limited by its FOV, i.e., a rate-FOV trade-off. To control the area-bandwidth trade-off, an array of small PDs can be used instead of a single PD. Moreover, in practice, a large-area lens is required to ensure sufficient power collection, which in turn limits the receiver FOV (i.e., gain-FOV trade-off). We propose an imaging receiver design in the form of an array of arrays. To achieve a reasonable receiver FOV, we use individual focusing lens for each PD array rather than a single collection lens for the whole receiver. The proposed array of arrays structure provides an effective method to control both gain-FOV trade-off (via an array of lenses) and area-bandwidth trade-off (via arrays of PDs). We first derive a tractable analytical model for the SNR of an array of PDs where the maximum ratio combining has been employed. Then, we extend the model for the proposed array of arrays structure and the accuracy of the analytical model is verified based on several Optic Studio-based simulations. Next, we formulate an optimization problem to maximize the achievable data rate of the imaging receiver subject to a minimum required FOV. The optimization problem is solved for two commonly used modulation techniques, namely, OOK and direct current biased optical orthogonal frequency division multiplexing with variable rate quadrature amplitude modulation. It is demonstrated that a data rate of ~ 24 Gbps with a FOV of 15 is achievable using OOK with a total receiver size of 2 cm by 2 cm.
△ Less
Submitted 11 May, 2022;
originally announced May 2022.
-
On The Energy Statistics of Feature Maps in Pruning of Neural Networks with Skip-Connections
Authors:
Mohammadreza Soltani,
Suya Wu,
Yuerong Li,
Jie Ding,
Vahid Tarokh
Abstract:
We propose a new structured pruning framework for compressing Deep Neural Networks (DNNs) with skip connections, based on measuring the statistical dependency of hidden layers and predicted outputs. The dependence measure defined by the energy statistics of hidden layers serves as a model-free measure of information between the feature maps and the output of the network. The estimated dependence m…
▽ More
We propose a new structured pruning framework for compressing Deep Neural Networks (DNNs) with skip connections, based on measuring the statistical dependency of hidden layers and predicted outputs. The dependence measure defined by the energy statistics of hidden layers serves as a model-free measure of information between the feature maps and the output of the network. The estimated dependence measure is subsequently used to prune a collection of redundant and uninformative layers. Model-freeness of our measure guarantees that no parametric assumptions on the feature map distribution are required, making it computationally appealing for very high dimensional feature space in DNNs. Extensive numerical experiments on various architectures show the efficacy of the proposed pruning approach with competitive performance to state-of-the-art methods.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Toward Data-Driven STAP Radar
Authors:
Shyam Venkatasubramanian,
Chayut Wongkamthong,
Mohammadreza Soltani,
Bosung Kang,
Sandeep Gogineni,
Ali Pezeshki,
Muralidhar Rangaswamy,
Vahid Tarokh
Abstract:
Using an amalgamation of techniques from classical radar, computer vision, and deep learning, we characterize our ongoing data-driven approach to space-time adaptive processing (STAP) radar. We generate a rich example dataset of received radar signals by randomly placing targets of variable strengths in a predetermined region using RFView, a site-specific radio frequency modeling and simulation to…
▽ More
Using an amalgamation of techniques from classical radar, computer vision, and deep learning, we characterize our ongoing data-driven approach to space-time adaptive processing (STAP) radar. We generate a rich example dataset of received radar signals by randomly placing targets of variable strengths in a predetermined region using RFView, a site-specific radio frequency modeling and simulation tool developed by ISL Inc. For each data sample within this region, we generate heatmap tensors in range, azimuth, and elevation of the output power of a minimum variance distortionless response (MVDR) beamformer, which can be replaced with a desired test statistic. These heatmap tensors can be thought of as stacked images, and in an airborne scenario, the moving radar creates a sequence of these time-indexed image stacks, resembling a video. Our goal is to use these images and videos to detect targets and estimate their locations, a procedure reminiscent of computer vision algorithms for object detection$-$namely, the Faster Region-Based Convolutional Neural Network (Faster R-CNN). The Faster R-CNN consists of a proposal generating network for determining regions of interest (ROI), a regression network for positioning anchor boxes around targets, and an object classification algorithm; it is developed and optimized for natural images. Our ongoing research will develop analogous tools for heatmap images of radar data. In this regard, we will generate a large, representative adaptive radar signal processing database for training and testing, analogous in spirit to the COCO dataset for natural images. As a preliminary example, we present a regression network in this paper for estimating target locations to demonstrate the feasibility of and significant improvements provided by our data-driven approach.
△ Less
Submitted 9 March, 2022; v1 submitted 25 January, 2022;
originally announced January 2022.
-
Uncertainty-Cognizant Model Predictive Control for Energy Management of Residential Buildings with PVT and Thermal Energy Storage
Authors:
Hossein Kalantar-Neyestanaki,
Madjid Soltani
Abstract:
The building sector accounts for almost 40 percent of the global energy consumption. This reveals a great opportunity to exploit renewable energy resources in buildings to achieve the climate target. In this context, this paper offers a building energy system embracing a heat pump, a thermal energy storage system along with grid-connected photovoltaic thermal (PVT) collectors to supply both electr…
▽ More
The building sector accounts for almost 40 percent of the global energy consumption. This reveals a great opportunity to exploit renewable energy resources in buildings to achieve the climate target. In this context, this paper offers a building energy system embracing a heat pump, a thermal energy storage system along with grid-connected photovoltaic thermal (PVT) collectors to supply both electric and thermal energy demands of the building with minimum operating cost. To this end, the paper develops a stochastic model predictive control (MPC) strategy to optimally determine the set-point of the whole building energy system while accounting for the uncertainties associated with the PVT energy generation. This system enables the building to 1-shift its electric demand from high-peak to off-peak hours and 2- sell electricity to the grid to make energy arbitrage.
△ Less
Submitted 21 January, 2022;
originally announced January 2022.
-
Blaschke Product Neural Networks (BPNN): A Physics-Infused Neural Network for Phase Retrieval of Meromorphic Functions
Authors:
Juncheng Dong,
Simiao Ren,
Yang Deng,
Omar Khatib,
Jordan Malof,
Mohammadreza Soltani,
Willie Padilla,
Vahid Tarokh
Abstract:
Numerous physical systems are described by ordinary or partial differential equations whose solutions are given by holomorphic or meromorphic functions in the complex domain. In many cases, only the magnitude of these functions are observed on various points on the purely imaginary jw-axis since coherent measurement of their phases is often expensive. However, it is desirable to retrieve the lost…
▽ More
Numerous physical systems are described by ordinary or partial differential equations whose solutions are given by holomorphic or meromorphic functions in the complex domain. In many cases, only the magnitude of these functions are observed on various points on the purely imaginary jw-axis since coherent measurement of their phases is often expensive. However, it is desirable to retrieve the lost phases from the magnitudes when possible. To this end, we propose a physics-infused deep neural network based on the Blaschke products for phase retrieval. Inspired by the Helson and Sarason Theorem, we recover coefficients of a rational function of Blaschke products using a Blaschke Product Neural Network (BPNN), based upon the magnitude observations as input. The resulting rational function is then used for phase retrieval. We compare the BPNN to conventional deep neural networks (NNs) on several phase retrieval problems, comprising both synthetic and contemporary real-world problems (e.g., metamaterials for which data collection requires substantial expertise and is time consuming). On each phase retrieval problem, we compare against a population of conventional NNs of varying size and hyperparameter settings. Even without any hyper-parameter search, we find that BPNNs consistently outperform the population of optimized NNs in scarce data scenarios, and do so despite being much smaller models. The results can in turn be applied to calculate the refractive index of metamaterials, which is an important problem in emerging areas of material science.
△ Less
Submitted 25 November, 2021;
originally announced November 2021.
-
Task Affinity with Maximum Bipartite Matching in Few-Shot Learning
Authors:
Cat P. Le,
Juncheng Dong,
Mohammadreza Soltani,
Vahid Tarokh
Abstract:
We propose an asymmetric affinity score for representing the complexity of utilizing the knowledge of one task for learning another one. Our method is based on the maximum bipartite matching algorithm and utilizes the Fisher Information matrix. We provide theoretical analyses demonstrating that the proposed score is mathematically well-defined, and subsequently use the affinity score to propose a…
▽ More
We propose an asymmetric affinity score for representing the complexity of utilizing the knowledge of one task for learning another one. Our method is based on the maximum bipartite matching algorithm and utilizes the Fisher Information matrix. We provide theoretical analyses demonstrating that the proposed score is mathematically well-defined, and subsequently use the affinity score to propose a novel algorithm for the few-shot learning problem. In particular, using this score, we find relevant training data labels to the test data and leverage the discovered relevant data for episodically fine-tuning a few-shot model. Results on various few-shot benchmark datasets demonstrate the efficacy of the proposed approach by improving the classification accuracy over the state-of-the-art methods even when using smaller models.
△ Less
Submitted 21 January, 2022; v1 submitted 5 October, 2021;
originally announced October 2021.
-
Simulation-based Evaluation of a Synchronous Transaction Model for Time-Sensitive Software-Defined Networks
Authors:
Tobias Haugg,
Mohammad Fazel Soltani,
Timo Häckel,
Philipp Meyer,
Franz Korf,
Thomas C. Schmidt
Abstract:
Real-time networks based on Ethernet require robust quality-of-service for time-critical traffic. The Time-Sensitive Networking (TSN) collection of standards enables this in real-time environments like vehicle on-board networks. Runtime reconfigurations in TSN must respect the deadlines of real-time traffic. Software-Defined Networking (SDN) moves the control plane of network devices to the SDN co…
▽ More
Real-time networks based on Ethernet require robust quality-of-service for time-critical traffic. The Time-Sensitive Networking (TSN) collection of standards enables this in real-time environments like vehicle on-board networks. Runtime reconfigurations in TSN must respect the deadlines of real-time traffic. Software-Defined Networking (SDN) moves the control plane of network devices to the SDN controller, making these networks programmable. This allows reconfigurations from a central point in the network. In this work, we present a transactional model for network reconfigurations that are synchronously executed in all network devices. We evaluate its performance in a case study against nontransactional reconfigurations and show that synchronous transactions enable consistency for reconfigurations in TSN without increased latencies for real-time frames.
△ Less
Submitted 8 October, 2021; v1 submitted 1 October, 2021;
originally announced October 2021.
-
An Adaptable Deep Learning-Based Intrusion Detection System to Zero-Day Attacks
Authors:
Mahdi Soltani,
Behzad Ousat,
Mahdi Jafari Siavoshani,
Amir Hossein Jahangir
Abstract:
The intrusion detection system (IDS) is an essential element of security monitoring in computer networks. An IDS distinguishes the malicious traffic from the benign one and determines the attack types targeting the assets of the organization. The main challenge of an IDS is facing new (i.e., zero-day) attacks and separating them from benign traffic and existing types of attacks. Along with the pow…
▽ More
The intrusion detection system (IDS) is an essential element of security monitoring in computer networks. An IDS distinguishes the malicious traffic from the benign one and determines the attack types targeting the assets of the organization. The main challenge of an IDS is facing new (i.e., zero-day) attacks and separating them from benign traffic and existing types of attacks. Along with the power of the deep learning-based IDSes in auto-extracting high-level features and its independence from the time-consuming and costly signature extraction process, the mentioned challenge still exists in this new generation of IDSes.
In this paper, we propose a framework for deep learning-based IDSes addressing new attacks. This framework is the first approach using both deep novelty-based classifiers besides the traditional clustering based on the specialized layer of deep structures, in the security scope. Additionally, we introduce DOC++ as a newer version of DOC as a deep novelty-based classifier. We also employ the Deep Intrusion Detection (DID) framework for the preprocessing phase, which improves the ability of deep learning algorithms to detect content-based attacks. We compare four different algorithms (including DOC, DOC++, OpenMax, and AutoSVM) as the novelty classifier of the framework and use both the CIC-IDS2017 and CSE-CIC-IDS2018 datasets for the evaluation. Our results show that DOC++ is the best implementation of the open set recognition module. Besides, the completeness and homogeneity of the clustering and post-training phase prove that this model is good enough for the supervised labeling and updating phase.
△ Less
Submitted 20 August, 2021;
originally announced August 2021.
-
A VCSEL Array Transmission System with Novel Beam Activation Mechanisms
Authors:
Zhihong Zeng,
Mohammad Dehghani Soltani,
Majid Safari,
Harald Haas
Abstract:
Optical wireless communication (OWC) is considered to be a promising technology which will alleviate traffic burden caused by the increasing number of mobile devices. In this study, a novel vertical-cavity surface-emitting laser (VCSEL) array is proposed for indoor OWC systems. To activate the best beam for a mobile user, two beam activation methods are proposed for the system. The method based on…
▽ More
Optical wireless communication (OWC) is considered to be a promising technology which will alleviate traffic burden caused by the increasing number of mobile devices. In this study, a novel vertical-cavity surface-emitting laser (VCSEL) array is proposed for indoor OWC systems. To activate the best beam for a mobile user, two beam activation methods are proposed for the system. The method based on a corner-cube retroreflector (CCR) provides very low latency and allows real-time activation for high-speed users. The other method uses the omnidirectional transmitter (ODTx). The ODTx can serve the purpose of uplink transmission and beam activation simultaneously. Moreover, systems with ODTx are very robust to the random orientation of a user equipment (UE). System level analyses are carried out for the proposed VCSEL array system. For a single user scenario, the probability density function (PDF) of the signal-to-noise ratio (SNR) for the central beam of the VCSEL array system can be approximated as a uniform distribution. In addition, the average data rate of the central beam and its upper bound are given analytically and verified by Monte-Carlo simulations. For a multi-user scenario, an analytical upper bound for the average data rate is given. The effects of the cell size and the full width at half maximum (FWHM) angle on the system performance are studied. The results show that the system with a FWHM angle of $4^\circ$ outperforms the others.
△ Less
Submitted 13 August, 2021;
originally announced August 2021.
-
Interference Mitigation using Optimized Angle Diversity Receiver in LiFi Cellular Network
Authors:
Zhihong Zeng,
Chen Chen,
Svetislav Savovi,
Mohammad Dehghani Soltani,
Cheng Chen,
Majid Safari,
Harald Haas
Abstract:
Light-fidelity (LiFi) is an emerging technology for high-speed short-range mobile communications. Inter-cell interference (ICI) is an important issue that limits the system performance in an optical attocell network. Angle diversity receivers (ADRs) have been proposed to mitigate ICI. In this paper, the structure of pyramid receivers (PRs) and truncated pyramid receivers (TPRs) are studied. The co…
▽ More
Light-fidelity (LiFi) is an emerging technology for high-speed short-range mobile communications. Inter-cell interference (ICI) is an important issue that limits the system performance in an optical attocell network. Angle diversity receivers (ADRs) have been proposed to mitigate ICI. In this paper, the structure of pyramid receivers (PRs) and truncated pyramid receivers (TPRs) are studied. The coverage problems of PRs and TPRs are defined and investigated, and the lower bound of field of view (FOV) for each PD is given analytically. The impact of random device orientation and diffuse link signal propagation are taken into consideration. The performances of PRs and TPRs are compared and then optimized ADR structures are proposed. The performance comparison between the select best combining (SBC) and maximum ratio combining (MRC) is given under different noise levels. It is shown that SBC will outperform MRC in an interference limited system, otherwise, MRC is a preferred scheme. In addition, the double source system, where each LiFi AP consists of two sources transmitting the same information signals but with opposite polarity, is proved to outperform the single source (SS) system under certain conditions.
△ Less
Submitted 12 June, 2024; v1 submitted 12 August, 2021;
originally announced August 2021.
-
A Methodology for Exploring Deep Convolutional Features in Relation to Hand-Crafted Features with an Application to Music Audio Modeling
Authors:
Anna K. Yanchenko,
Mohammadreza Soltani,
Robert J. Ravier,
Sayan Mukherjee,
Vahid Tarokh
Abstract:
Understanding the features learned by deep models is important from a model trust perspective, especially as deep systems are deployed in the real world. Most recent approaches for deep feature understanding or model explanation focus on highlighting input data features that are relevant for classification decisions. In this work, we instead take the perspective of relating deep features to well-s…
▽ More
Understanding the features learned by deep models is important from a model trust perspective, especially as deep systems are deployed in the real world. Most recent approaches for deep feature understanding or model explanation focus on highlighting input data features that are relevant for classification decisions. In this work, we instead take the perspective of relating deep features to well-studied, hand-crafted features that are meaningful for the application of interest. We propose a methodology and set of systematic experiments for exploring deep features in this setting, where input feature importance approaches for deep feature understanding do not apply. Our experiments focus on understanding which hand-crafted and deep features are useful for the classification task of interest, how robust these features are for related tasks and how similar the deep features are to the meaningful hand-crafted features. Our proposed method is general to many application areas and we demonstrate its utility on orchestral music audio data.
△ Less
Submitted 9 October, 2021; v1 submitted 31 May, 2021;
originally announced June 2021.
-
Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers
Authors:
Marziyeh Soltani,
Mahtab Mirmohseni,
Panos Papadimitratos
Abstract:
Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient. Massive MIMO systems are inherently resistant to passive attackers (eavesdroppers), thanks to transmissions directed to the desired users. However, active attackers can transmit a combination of legitimate user pilot signals during the channel estimation phase. This way they can mi…
▽ More
Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient. Massive MIMO systems are inherently resistant to passive attackers (eavesdroppers), thanks to transmissions directed to the desired users. However, active attackers can transmit a combination of legitimate user pilot signals during the channel estimation phase. This way they can mislead the base station (BS) to rotate the transmission in their direction, and allow them to eavesdrop during the downlink data transmission phase. In this paper, we analyse this vulnerability in an improved system model and stronger adversary assumptions, and investigate how physical layer security can mitigate such attacks and ensure secure (confidential) communication. We derive the secrecy outage probability (SOP) and a lower bound on the ergodic secrecy capacity, using stochastic geometry tools when the number of antennas in the BSs tends to infinity. We adapt the result to evaluate the secrecy performance in massive orthogonal multiple access (OMA). We find that appropriate power allocation allows NOMA to outperform OMA in terms of ergodic secrecy rate and SOP.
△ Less
Submitted 5 May, 2021;
originally announced May 2021.
-
Fisher Task Distance and Its Application in Neural Architecture Search
Authors:
Cat P. Le,
Mohammadreza Soltani,
Juncheng Dong,
Vahid Tarokh
Abstract:
We formulate an asymmetric (or non-commutative) distance between tasks based on Fisher Information Matrices, called Fisher task distance. This distance represents the complexity of transferring the knowledge from one task to another. We provide a proof of consistency for our distance through theorems and experiments on various classification tasks from MNIST, CIFAR-10, CIFAR-100, ImageNet, and Tas…
▽ More
We formulate an asymmetric (or non-commutative) distance between tasks based on Fisher Information Matrices, called Fisher task distance. This distance represents the complexity of transferring the knowledge from one task to another. We provide a proof of consistency for our distance through theorems and experiments on various classification tasks from MNIST, CIFAR-10, CIFAR-100, ImageNet, and Taskonomy datasets. Next, we construct an online neural architecture search framework using the Fisher task distance, in which we have access to the past learned tasks. By using the Fisher task distance, we can identify the closest learned tasks to the target task, and utilize the knowledge learned from these related tasks for the target task. Here, we show how the proposed distance between a target task and a set of learned tasks can be used to reduce the neural architecture search space for the target task. The complexity reduction in search space for task-specific architectures is achieved by building on the optimized architectures for similar tasks instead of doing a full search and without using this side information. Experimental results for tasks in MNIST, CIFAR-10, CIFAR-100, ImageNet datasets demonstrate the efficacy of the proposed approach and its improvements, in terms of the performance and the number of parameters, over other gradient-based search methods, such as ENAS, DARTS, PC-DARTS.
△ Less
Submitted 30 April, 2022; v1 submitted 23 March, 2021;
originally announced March 2021.
-
Improved Automated Machine Learning from Transfer Learning
Authors:
Cat P. Le,
Mohammadreza Soltani,
Robert Ravier,
Vahid Tarokh
Abstract:
In this paper, we propose a neural architecture search framework based on a similarity measure between some baseline tasks and a target task. We first define the notion of the task similarity based on the log-determinant of the Fisher Information matrix. Next, we compute the task similarity from each of the baseline tasks to the target task. By utilizing the relation between a target and a set of…
▽ More
In this paper, we propose a neural architecture search framework based on a similarity measure between some baseline tasks and a target task. We first define the notion of the task similarity based on the log-determinant of the Fisher Information matrix. Next, we compute the task similarity from each of the baseline tasks to the target task. By utilizing the relation between a target and a set of learned baseline tasks, the search space of architectures for the target task can be significantly reduced, making the discovery of the best candidates in the set of possible architectures tractable and efficient, in terms of GPU days. This method eliminates the requirement for training the networks from scratch for a given target task as well as introducing the bias in the initialization of the search space from the human domain.
△ Less
Submitted 29 January, 2022; v1 submitted 27 February, 2021;
originally announced March 2021.
-
A Tb/s Indoor MIMO Optical Wireless Backhaul System Using VCSEL Arrays
Authors:
Hossein Kazemi,
Elham Sarbazi,
Mohammad Dehghani Soltani,
Taisir E. H. El-Gorashi,
Jaafar M. H. Elmirghani,
Richard V. Penty,
Ian H. White,
Majid Safari,
Harald Haas
Abstract:
In this paper, the design of a multiple-input multiple-output (MIMO) optical wireless communication (OWC) link based on vertical cavity surface emitting laser (VCSEL) arrays is systematically carried out with the aim to support data rates in excess of 1 Tb/s for the backhaul of sixth generation (6G) indoor wireless networks. The proposed design combines direct current optical orthogonal frequency…
▽ More
In this paper, the design of a multiple-input multiple-output (MIMO) optical wireless communication (OWC) link based on vertical cavity surface emitting laser (VCSEL) arrays is systematically carried out with the aim to support data rates in excess of 1 Tb/s for the backhaul of sixth generation (6G) indoor wireless networks. The proposed design combines direct current optical orthogonal frequency division multiplexing (DCO-OFDM) and a spatial multiplexing MIMO architecture. For such an ultra-high-speed line-of-sight (LOS) OWC link with low divergence laser beams, maintaining alignment is of high importance. In this paper, two types of misalignment error between the transmitter and receiver are distinguished, namely, radial displacement error and orientation angle error, and they are thoroughly modeled in a unified analytical framework assuming Gaussian laser beams, resulting in a generalized misalignment model (GMM). The derived GMM is then extended to MIMO arrays and the performance of the MIMO-OFDM OWC system is analyzed in terms of the aggregate data rate. Novel insights are provided into the system performance based on computer simulations by studying various influential factors such as beam waist, array configuration and different misalignment errors, which can be used as guidelines for designing short range Tb/s MIMO OWC systems.
△ Less
Submitted 4 April, 2022; v1 submitted 19 February, 2021;
originally announced February 2021.
-
Safety Analysis for Laser-based Optical Wireless Communications: A Tutorial
Authors:
Mohammad Dehghani Soltani,
Elham Sarbazi,
Nikolaos Bamiedakis,
Priyanka de Souza,
Hossein Kazemi,
Jaafar M. H. Elmirghani,
Ian H. White,
Richard V. Penty,
Harald Haas,
Majid Safari
Abstract:
Light amplification by stimulated emission of radiation (laser) sources have many advantages for use in high data rate optical wireless communications. In particular, the low cost and high-bandwidth properties of laser sources such as vertical-cavity surface-emitting lasers (VCSELs) make them attractive for future indoor optical wireless communications. In order to be integrated into future indoor…
▽ More
Light amplification by stimulated emission of radiation (laser) sources have many advantages for use in high data rate optical wireless communications. In particular, the low cost and high-bandwidth properties of laser sources such as vertical-cavity surface-emitting lasers (VCSELs) make them attractive for future indoor optical wireless communications. In order to be integrated into future indoor networks, such lasers should conform to eye safety regulations determined by the international electrotechnical commission (IEC) standards for laser safety. In this paper, we provide a detailed study of beam propagation to evaluate the received power of various laser sources, based on which as well as the maximum permissible exposure (MPE) defined by the IEC 60825-1:2014 standard, we establish a comprehensive framework for eye safety analyses. This framework allows us to calculate the maximum allowable transmit power, which is crucial in the design of a reliable and safe laser-based wireless communication system. Initially, we consider a single-mode Gaussian beam and calculate the maximum permissible transmit power. Subsequently, we generalize this approach for higher-mode beams. It is shown that the M-squared-based approach for analysis of multimode lasers ensures the IEC eye safety limits, however, in some scenarios, it can be too conservative compared to the precise beam decomposition method. Laser safety analyses with consideration of optical elements such as lens and diffuser, as well as for VCSEL array have been also presented. Skin safety, as another significant factor of laser safety, has also been investigated in this paper. We have studied the impacts of various parameters such as wavelength, exposure duration and the divergence angle of laser sources on the safety analysis by presenting insightful results.
△ Less
Submitted 5 May, 2021; v1 submitted 17 February, 2021;
originally announced February 2021.
-
The Degraded Discrete-Time Poisson Wiretap Channel
Authors:
Morteza Soltani,
Zouheir Rezki
Abstract:
This paper addresses the degraded discrete-time Poisson wiretap channel (DT--PWC) in an optical wireless communication system based on intensity modulation and direct detection. Subject to nonnegativity, peak- and average-intensity as well as bandwidth constraints, we study the secrecy-capacity-achieving input distribution of this wiretap channel and prove it to be unique and discrete with a finit…
▽ More
This paper addresses the degraded discrete-time Poisson wiretap channel (DT--PWC) in an optical wireless communication system based on intensity modulation and direct detection. Subject to nonnegativity, peak- and average-intensity as well as bandwidth constraints, we study the secrecy-capacity-achieving input distribution of this wiretap channel and prove it to be unique and discrete with a finite number of mass points; one of them located at the origin. Furthermore, we establish that every point on the boundary of the rate-equivocation region of this wiretap channel is also obtained by a unique and discrete input distribution with finitely many mass points. In general, the number of mass points of the optimal distributions is greater than two. This is in contrast with the degraded continuous-time PWC when the signaling bandwidth is not restricted and where the secrecy capacity and the entire boundary of the rate-equivocation region are achieved by binary distributions. Furthermore, we extend our analysis to the case where only an average-intensity constraint is active. For this case, we find that the secrecy capacity and the entire boundary of the rate-equivocation region are attained by discrete distributions with countably \textit{infinite} number of mass points, but with finitely many mass points in any bounded interval.
△ Less
Submitted 26 January, 2021; v1 submitted 10 January, 2021;
originally announced January 2021.
-
Task-Aware Neural Architecture Search
Authors:
Cat P. Le,
Mohammadreza Soltani,
Robert Ravier,
Vahid Tarokh
Abstract:
The design of handcrafted neural networks requires a lot of time and resources. Recent techniques in Neural Architecture Search (NAS) have proven to be competitive or better than traditional handcrafted design, although they require domain knowledge and have generally used limited search spaces. In this paper, we propose a novel framework for neural architecture search, utilizing a dictionary of m…
▽ More
The design of handcrafted neural networks requires a lot of time and resources. Recent techniques in Neural Architecture Search (NAS) have proven to be competitive or better than traditional handcrafted design, although they require domain knowledge and have generally used limited search spaces. In this paper, we propose a novel framework for neural architecture search, utilizing a dictionary of models of base tasks and the similarity between the target task and the atoms of the dictionary; hence, generating an adaptive search space based on the base models of the dictionary. By introducing a gradient-based search algorithm, we can evaluate and discover the best architecture in the search space without fully training the networks. The experimental results show the efficacy of our proposed task-aware approach.
△ Less
Submitted 15 March, 2021; v1 submitted 26 October, 2020;
originally announced October 2020.
-
GeoStat Representations of Time Series for Fast Classification
Authors:
Robert J. Ravier,
Mohammadreza Soltani,
Miguel Simões,
Denis Garagic,
Vahid Tarokh
Abstract:
Recent advances in time series classification have largely focused on methods that either employ deep learning or utilize other machine learning models for feature extraction. Though successful, their power often comes at the requirement of computational complexity. In this paper, we introduce GeoStat representations for time series. GeoStat representations are based off of a generalization of rec…
▽ More
Recent advances in time series classification have largely focused on methods that either employ deep learning or utilize other machine learning models for feature extraction. Though successful, their power often comes at the requirement of computational complexity. In this paper, we introduce GeoStat representations for time series. GeoStat representations are based off of a generalization of recent methods for trajectory classification, and summarize the information of a time series in terms of comprehensive statistics of (possibly windowed) distributions of easy to compute differential geometric quantities, requiring no dynamic time war**. The features used are intuitive and require minimal parameter tuning. We perform an exhaustive evaluation of GeoStat on a number of real datasets, showing that simple KNN and SVM classifiers trained on these representations exhibit surprising performance relative to modern single model methods requiring significant computational power, achieving state of the art results in many cases. In particular, we show that this methodology achieves good performance on a challenging dataset involving the classification of fishing vessels, where our methods achieve good performance relative to the state of the art despite only having access to approximately two percent of the dataset used in training and evaluating this state of the art.
△ Less
Submitted 11 January, 2021; v1 submitted 13 July, 2020;
originally announced July 2020.
-
Projected Latent Markov Chain Monte Carlo: Conditional Sampling of Normalizing Flows
Authors:
Chris Cannella,
Mohammadreza Soltani,
Vahid Tarokh
Abstract:
We introduce Projected Latent Markov Chain Monte Carlo (PL-MCMC), a technique for sampling from the high-dimensional conditional distributions learned by a normalizing flow. We prove that a Metropolis-Hastings implementation of PL-MCMC asymptotically samples from the exact conditional distributions associated with a normalizing flow. As a conditional sampling method, PL-MCMC enables Monte Carlo Ex…
▽ More
We introduce Projected Latent Markov Chain Monte Carlo (PL-MCMC), a technique for sampling from the high-dimensional conditional distributions learned by a normalizing flow. We prove that a Metropolis-Hastings implementation of PL-MCMC asymptotically samples from the exact conditional distributions associated with a normalizing flow. As a conditional sampling method, PL-MCMC enables Monte Carlo Expectation Maximization (MC-EM) training of normalizing flows from incomplete data. Through experimental tests applying normalizing flows to missing data tasks for a variety of data sets, we demonstrate the efficacy of PL-MCMC for conditional sampling from normalizing flows.
△ Less
Submitted 26 February, 2021; v1 submitted 12 July, 2020;
originally announced July 2020.
-
Hyperparameter Optimization in Neural Networks via Structured Sparse Recovery
Authors:
Minsu Cho,
Mohammadreza Soltani,
Chinmay Hegde
Abstract:
In this paper, we study two important problems in the automated design of neural networks -- Hyper-parameter Optimization (HPO), and Neural Architecture Search (NAS) -- through the lens of sparse recovery methods. In the first part of this paper, we establish a novel connection between HPO and structured sparse recovery. In particular, we show that a special encoding of the hyperparameter space en…
▽ More
In this paper, we study two important problems in the automated design of neural networks -- Hyper-parameter Optimization (HPO), and Neural Architecture Search (NAS) -- through the lens of sparse recovery methods. In the first part of this paper, we establish a novel connection between HPO and structured sparse recovery. In particular, we show that a special encoding of the hyperparameter space enables a natural group-sparse recovery formulation, which when coupled with HyperBand (a multi-armed bandit strategy), leads to improvement over existing hyperparameter optimization methods. Experimental results on image datasets such as CIFAR-10 confirm the benefits of our approach. In the second part of this paper, we establish a connection between NAS and structured sparse recovery. Building upon ``one-shot'' approaches in NAS, we propose a novel algorithm that we call CoNAS by merging ideas from one-shot approaches with a techniques for learning low-degree sparse Boolean polynomials. We provide theoretical analysis on the number of validation error measurements. Finally, we validate our approach on several datasets and discover novel architectures hitherto unreported, achieving competitive (or better) results in both performance and search time compared to the existing NAS approaches.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
Clustering Time Series Data through Autoencoder-based Deep Learning Models
Authors:
Neda Tavakoli,
Sima Siami-Namini,
Mahdi Adl Khanghah,
Fahimeh Mirza Soltani,
Akbar Siami Namin
Abstract:
Machine learning and in particular deep learning algorithms are the emerging approaches to data analysis. These techniques have transformed traditional data mining-based analysis radically into a learning-based model in which existing data sets along with their cluster labels (i.e., train set) are learned to build a supervised learning model and predict the cluster labels of unseen data (i.e., tes…
▽ More
Machine learning and in particular deep learning algorithms are the emerging approaches to data analysis. These techniques have transformed traditional data mining-based analysis radically into a learning-based model in which existing data sets along with their cluster labels (i.e., train set) are learned to build a supervised learning model and predict the cluster labels of unseen data (i.e., test set). In particular, deep learning techniques are capable of capturing and learning hidden features in a given data sets and thus building a more accurate prediction model for clustering and labeling problem. However, the major problem is that time series data are often unlabeled and thus supervised learning-based deep learning algorithms cannot be directly adapted to solve the clustering problems for these special and complex types of data sets. To address this problem, this paper introduces a two-stage method for clustering time series data. First, a novel technique is introduced to utilize the characteristics (e.g., volatility) of given time series data in order to create labels and thus be able to transform the problem from unsupervised learning into supervised learning. Second, an autoencoder-based deep learning model is built to learn and model both known and hidden features of time series data along with their created labels to predict the labels of unseen time series data. The paper reports a case study in which financial and stock time series data of selected 70 stock indices are clustered into distinct groups using the introduced two-stage procedure. The results show that the proposed procedure is capable of achieving 87.5\% accuracy in clustering and predicting the labels for unseen time series data.
△ Less
Submitted 11 April, 2020;
originally announced April 2020.
-
Pilot Pattern Design for Deep Learning-Based Channel Estimation in OFDM Systems
Authors:
Mehran Soltani,
Vahid Pourahmadi,
Hamid Sheikhzadeh
Abstract:
In this paper, we present a downlink pilot design scheme for Deep Learning (DL) based channel estimation (ChannelNet) in orthogonal frequency-division multiplexing (OFDM) systems. Specifically, in the proposed scheme, a feature selection method named Concrete Autoencoder (ConcreteAE) is used to find the most informative locations for pilot transmission. This autoencoder consists of a concrete laye…
▽ More
In this paper, we present a downlink pilot design scheme for Deep Learning (DL) based channel estimation (ChannelNet) in orthogonal frequency-division multiplexing (OFDM) systems. Specifically, in the proposed scheme, a feature selection method named Concrete Autoencoder (ConcreteAE) is used to find the most informative locations for pilot transmission. This autoencoder consists of a concrete layer as the encoder and a multilayer perceptron (MLP) as the decoder. During the training, the concrete layer selects the most informative pilot locations, and the decoder reconstructs an approximate estimation of the channel. Eventually, the ChannelNet is trained on the output of the ConcreteAE aiming to reconstruct the ideal channel response. The estimation error results show that this approach outperforms the previously presented ChannelNet with a uniformly distributed pilot pattern, and its performance is comparable to the minimum mean square error (MMSE).
△ Less
Submitted 19 March, 2020;
originally announced March 2020.
-
A Content-Based Deep Intrusion Detection System
Authors:
Mahdi Soltani,
Mahdi Jafari Siavoshani,
Amir Hossein Jahangir
Abstract:
The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential m…
▽ More
The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks like SQL injection, Cross-site Scripting (XSS), and various viruses.
In this work, we propose a framework, called deep intrusion detection (DID) system, that uses the pure content of traffic flows in addition to traffic metadata in the learning and detection phases of a passive DNN IDS. To this end, we deploy and evaluate an offline IDS following the framework using LSTM as a deep learning technique. Due to the inherent nature of deep learning, it can process high dimensional data content and, accordingly, discover the sophisticated relations between the auto extracted features of the traffic. To evaluate the proposed DID system, we use the CIC-IDS2017 and CSE-CIC-IDS2018 datasets. The evaluation metrics, such as precision and recall, reach $0.992$ and $0.998$ on CIC-IDS2017, and $0.933$ and $0.923$ on CSE-CIC-IDS2018 respectively, which show the high performance of the proposed DID method.
△ Less
Submitted 16 August, 2021; v1 submitted 14 January, 2020;
originally announced January 2020.
-
Hybrid LiFi and WiFi Networks: A Survey
Authors:
Xi** Wu,
Mohammad Dehghani Soltani,
Lai Zhou,
Majid Safari,
Harald Haas
Abstract:
To tackle the rapidly growing number of mobile devices and their expanding demands for Internet services, network convergence is envisaged to integrate different technology domains. A recently proposed and promising approach to indoor wireless communications is integrating light fidelity (LiFi) and wireless fidelity (WiFi), namely a hybrid LiFi and WiFi network (HLWNet). This type of network combi…
▽ More
To tackle the rapidly growing number of mobile devices and their expanding demands for Internet services, network convergence is envisaged to integrate different technology domains. A recently proposed and promising approach to indoor wireless communications is integrating light fidelity (LiFi) and wireless fidelity (WiFi), namely a hybrid LiFi and WiFi network (HLWNet). This type of network combines the high-speed data transmission of LiFi and the ubiquitous coverage of WiFi. In this paper, we present a survey-style introduction to HLWNets, starting with a framework including the network structure, cell deployment, multiple access schemes, modulation techniques, illumination requirements and backhauling. Then, key performance metrics and recent achievements are reviewed. Further, the unique challenges faced by HLWNets are elaborated in many research directions, including user behavior modeling, interference management, handover and load balancing. Finally, we discuss the potential of HLWNets in application areas such as indoor positioning and physical layer security.
△ Less
Submitted 14 January, 2020;
originally announced January 2020.
-
The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities
Authors:
Faranak Abri,
Sima Siami-Namini,
Mahdi Adl Khanghah,
Fahimeh Mirza Soltani,
Akbar Siami Namin
Abstract:
The detection of zero-day attacks and vulnerabilities is a challenging problem. It is of utmost importance for network administrators to identify them with high accuracy. The higher the accuracy is, the more robust the defense mechanism will be. In an ideal scenario (i.e., 100% accuracy) the system can detect zero-day malware without being concerned about mistakenly tagging benign files as malware…
▽ More
The detection of zero-day attacks and vulnerabilities is a challenging problem. It is of utmost importance for network administrators to identify them with high accuracy. The higher the accuracy is, the more robust the defense mechanism will be. In an ideal scenario (i.e., 100% accuracy) the system can detect zero-day malware without being concerned about mistakenly tagging benign files as malware or enabling disruptive malicious code running as none-malicious ones. This paper investigates different machine learning algorithms to find out how well they can detect zero-day malware. Through the examination of 34 machine/deep learning classifiers, we found that the random forest classifier offered the best accuracy. The paper poses several research questions regarding the performance of machine and deep learning algorithms when detecting zero-day malware with zero rates for false positive and false negative.
△ Less
Submitted 21 November, 2019;
originally announced November 2019.
-
Perception-Distortion Trade-off with Restricted Boltzmann Machines
Authors:
Chris Cannella,
Jie Ding,
Mohammadreza Soltani,
Vahid Tarokh
Abstract:
In this work, we introduce a new procedure for applying Restricted Boltzmann Machines (RBMs) to missing data inference tasks, based on linearization of the effective energy function governing the distribution of observations. We compare the performance of our proposed procedure with those obtained using existing reconstruction procedures trained on incomplete data. We place these performance compa…
▽ More
In this work, we introduce a new procedure for applying Restricted Boltzmann Machines (RBMs) to missing data inference tasks, based on linearization of the effective energy function governing the distribution of observations. We compare the performance of our proposed procedure with those obtained using existing reconstruction procedures trained on incomplete data. We place these performance comparisons within the context of the perception-distortion trade-off observed in other data reconstruction tasks, which has, until now, remained unexplored in tasks relying on incomplete training data.
△ Less
Submitted 20 October, 2019;
originally announced October 2019.
-
One-Shot Neural Architecture Search via Compressive Sensing
Authors:
Minsu Cho,
Mohammadreza Soltani,
Chinmay Hegde
Abstract:
Neural Architecture Search remains a very challenging meta-learning problem. Several recent techniques based on parameter-sharing idea have focused on reducing the NAS running time by leveraging proxy models, leading to architectures with competitive performance compared to those with hand-crafted designs. In this paper, we propose an iterative technique for NAS, inspired by algorithms for learnin…
▽ More
Neural Architecture Search remains a very challenging meta-learning problem. Several recent techniques based on parameter-sharing idea have focused on reducing the NAS running time by leveraging proxy models, leading to architectures with competitive performance compared to those with hand-crafted designs. In this paper, we propose an iterative technique for NAS, inspired by algorithms for learning low-degree sparse Boolean functions. We validate our approach on the DARTs search space (Liu et al., 2018b) and NAS-Bench-201 (Yang et al., 2020). In addition, we provide theoretical analysis via upper bounds on the number of validation error measurements needed for reliable learning, and include ablation studies to further in-depth understanding of our technique.
△ Less
Submitted 7 February, 2022; v1 submitted 6 June, 2019;
originally announced June 2019.
-
Deep Feature Selection using a Teacher-Student Network
Authors:
Ali Mirzaei,
Vahid Pourahmadi,
Mehran Soltani,
Hamid Sheikhzadeh
Abstract:
High-dimensional data in many machine learning applications leads to computational and analytical complexities. Feature selection provides an effective way for solving these problems by removing irrelevant and redundant features, thus reducing model complexity and improving accuracy and generalization capability of the model. In this paper, we present a novel teacher-student feature selection (TSF…
▽ More
High-dimensional data in many machine learning applications leads to computational and analytical complexities. Feature selection provides an effective way for solving these problems by removing irrelevant and redundant features, thus reducing model complexity and improving accuracy and generalization capability of the model. In this paper, we present a novel teacher-student feature selection (TSFS) method in which a 'teacher' (a deep neural network or a complicated dimension reduction method) is first employed to learn the best representation of data in low dimension. Then a 'student' network (a simple neural network) is used to perform feature selection by minimizing the reconstruction error of low dimensional representation. Although the teacher-student scheme is not new, to the best of our knowledge, it is the first time that this scheme is employed for feature selection. The proposed TSFS can be used for both supervised and unsupervised feature selection. This method is evaluated on different datasets and is compared with state-of-the-art existing feature selection methods. The results show that TSFS performs better in terms of classification and clustering accuracies and reconstruction error. Moreover, experimental evaluations demonstrate a low degree of sensitivity to parameter selection in the proposed method.
△ Less
Submitted 17 March, 2019;
originally announced March 2019.
-
Learning Generative Models of Structured Signals from Their Superposition Using GANs with Application to Denoising and Demixing
Authors:
Mohammadreza Soltani,
Swayambhoo Jain,
Abhinav Sambasivan
Abstract:
Recently, Generative Adversarial Networks (GANs) have emerged as a popular alternative for modeling complex high dimensional distributions. Most of the existing works implicitly assume that the clean samples from the target distribution are easily available. However, in many applications, this assumption is violated. In this paper, we consider the observation setting when the samples from target d…
▽ More
Recently, Generative Adversarial Networks (GANs) have emerged as a popular alternative for modeling complex high dimensional distributions. Most of the existing works implicitly assume that the clean samples from the target distribution are easily available. However, in many applications, this assumption is violated. In this paper, we consider the observation setting when the samples from target distribution are given by the superposition of two structured components and leverage GANs for learning the structure of the components. We propose two novel frameworks: denoising-GAN and demixing-GAN. The denoising-GAN assumes access to clean samples from the second component and try to learn the other distribution, whereas demixing-GAN learns the distribution of the components at the same time. Through extensive numerical experiments, we demonstrate that proposed frameworks can generate clean samples from unknown distributions, and provide competitive performance in tasks such as denoising, demixing, and compressive sensing.
△ Less
Submitted 12 February, 2019;
originally announced February 2019.
-
Deep Learning-Based Channel Estimation
Authors:
Mehran Soltani,
Vahid Pourahmadi,
Ali Mirzaei,
Hamid Sheikhzadeh
Abstract:
In this paper, we present a deep learning (DL) algorithm for channel estimation in communication systems. We consider the time-frequency response of a fast fading communication channel as a two-dimensional image. The aim is to find the unknown values of the channel response using some known values at the pilot locations. To this end, a general pipeline using deep image processing techniques, image…
▽ More
In this paper, we present a deep learning (DL) algorithm for channel estimation in communication systems. We consider the time-frequency response of a fast fading communication channel as a two-dimensional image. The aim is to find the unknown values of the channel response using some known values at the pilot locations. To this end, a general pipeline using deep image processing techniques, image super-resolution (SR) and image restoration (IR) is proposed. This scheme considers the pilot values, altogether, as a low-resolution image and uses an SR network cascaded with a denoising IR network to estimate the channel. Moreover, an implementation of the proposed pipeline is presented. The estimation error shows that the presented algorithm is comparable to the minimum mean square error (MMSE) with full knowledge of the channel statistics and it is better than ALMMSE (an approximation to linear MMSE). The results confirm that this pipeline can be used efficiently in channel estimation.
△ Less
Submitted 19 February, 2019; v1 submitted 13 October, 2018;
originally announced October 2018.
-
Impact of Device Orientation on Error Performance of LiFi Systems
Authors:
Mohammad Dehghani Soltani,
Ardimas Andi Purwita,
Iman Tavakkolnia,
Harald Haas,
Majid Safari
Abstract:
Most studies on optical wireless communications (OWCs) have neglected the effect of random orientation in their performance analysis due to the lack of a proper model for the random orientation. Our recent empirical-based research illustrates that the random orientation follows a Laplace distribution for a static user equipment (UE). In this paper, we analyze the device orientation and assess its…
▽ More
Most studies on optical wireless communications (OWCs) have neglected the effect of random orientation in their performance analysis due to the lack of a proper model for the random orientation. Our recent empirical-based research illustrates that the random orientation follows a Laplace distribution for a static user equipment (UE). In this paper, we analyze the device orientation and assess its importance on system performance. The reliability of an OWC channel highly depends on the availability and alignment of line-of-sight (LOS) links. In this study, the effect of receiver orientation including both polar and azimuth angles on the LOS channel gain are analyzed. The probability of establishing a LOS link is investigated and the probability density function (PDF) of signal-to-noise ratio (SNR) for a randomly-oriented device is derived. By means of the PDF of SNR, the bit-error ratio (BER) of DC-biased optical orthogonal frequency division multiplexing (DCO-OFDM) in additive white Gaussian noise (AWGN) channels is evaluated. A closed-form approximation for the BER of UE with random orientation is presented which shows a good match with Monte-Carlo simulation results. Furthermore, the impact of the UE's random motion on the BER performance has been assessed. Finally, the effect of random orientation on the average signal-to-interference-plus-noise ratio (SINR) in a multiple access points (APs) scenario is investigated.
△ Less
Submitted 25 February, 2019; v1 submitted 30 August, 2018;
originally announced August 2018.
-
Efficient Single-Shot Multibox Detector for Construction Site Monitoring
Authors:
Viral Thakar,
Himani Saini,
Walid Ahmed,
Mohammad M Soltani,
Ahmed Aly,
Jia Yuan Yu
Abstract:
Asset monitoring in construction sites is an intricate, manually intensive task, that can highly benefit from automated solutions engineered using deep neural networks. We use Single-Shot Multibox Detector --- SSD, for its fine balance between speed and accuracy, to leverage ubiquitously available images and videos from the surveillance cameras on the construction sites and automate the monitoring…
▽ More
Asset monitoring in construction sites is an intricate, manually intensive task, that can highly benefit from automated solutions engineered using deep neural networks. We use Single-Shot Multibox Detector --- SSD, for its fine balance between speed and accuracy, to leverage ubiquitously available images and videos from the surveillance cameras on the construction sites and automate the monitoring tasks, hence enabling project managers to better track the performance and optimize the utilization of each resource. We propose to improve the performance of SSD by clustering the predicted boxes instead of a greedy approach like non-maximum suppression. We do so using Affinity Propagation Clustering --- APC to cluster the predicted boxes based on the similarity index computed using the spatial features as well as location of predicted boxes. In our attempts, we have been able to improve the mean average precision of SSD by 3.77% on custom dataset consist of images from construction sites and by 1.67% on PASCAL VOC Challenge.
△ Less
Submitted 19 August, 2018; v1 submitted 16 August, 2018;
originally announced August 2018.
-
Ensemble-based Adaptive Single-shot Multi-box Detector
Authors:
Viral Thakar,
Walid Ahmed,
Mohammad M Soltani,
Jia Yuan Yu
Abstract:
We propose two improvements to the SSD---single shot multibox detector. First, we propose an adaptive approach for default box selection in SSD. This uses data to reduce the uncertainty in the selection of best aspect ratios for the default boxes and improves performance of SSD for datasets containing small and complex objects (e.g., equipments at construction sites). We do so by finding the distr…
▽ More
We propose two improvements to the SSD---single shot multibox detector. First, we propose an adaptive approach for default box selection in SSD. This uses data to reduce the uncertainty in the selection of best aspect ratios for the default boxes and improves performance of SSD for datasets containing small and complex objects (e.g., equipments at construction sites). We do so by finding the distribution of aspect ratios of the given training dataset, and then choosing representative values. Secondly, we propose an ensemble algorithm, using SSD as components, which improves the performance of SSD, especially for small amount of training datasets. Compared to the conventional SSD algorithm, adaptive box selection improves mean average precision by 3%, while ensemble-based SSD improves it by 8%.
△ Less
Submitted 16 August, 2018;
originally announced August 2018.
-
Modeling the Random Orientation of Mobile Devices: Measurement, Analysis and LiFi Use Case
Authors:
Mohammad Dehghani Soltani,
Ardimas Andi Purwita,
Zhihong Zeng,
Harald Haas,
Majid Safari
Abstract:
Light-fidelity (LiFi) is a networked optical wireless communication (OWC) solution for high-speed indoor connectivity for fixed and mobile optical communications. Unlike conventional radio frequency wireless systems, the OWC channel is not isotropic, meaning that the device orientation affects the channel gain significantly, particularly for mobile users. However, due to the lack of a proper model…
▽ More
Light-fidelity (LiFi) is a networked optical wireless communication (OWC) solution for high-speed indoor connectivity for fixed and mobile optical communications. Unlike conventional radio frequency wireless systems, the OWC channel is not isotropic, meaning that the device orientation affects the channel gain significantly, particularly for mobile users. However, due to the lack of a proper model for device orientation, many studies have assumed that the receiver is vertically upward and fixed. In this paper, a novel model for device orientation based on experimental measurements of forty participants has been proposed. It is shown that the probability density function (PDF) of the polar angle can be modeled either based on a Laplace (for static users) or a Gaussian (for mobile users) distribution. In addition, a closed-form expression is obtained for the PDF of the cosine of the incidence angle based on which line-of-sight (LOS) channel gain is described in OWC channels. An approximation of this PDF based on the truncated Laplace is proposed and the accuracy of this approximation is confirmed by the Kolmogorov-Smirnov distance (KSD). Moreover, the statistics of the LOS channel gain are calculated and the random orientation of a user equipment (UE) is modeled as a random process. The influence of the random orientation on signal-to-noise-ratio (SNR) performance of OWC systems has been evaluated. Finally, an orientation-based random waypoint (ORWP) mobility model is proposed by considering the random orientation of the UE during the user's movement. The performance of ORWP is assessed on the handover rate and it is shown that it is important to take the random orientation into account.
△ Less
Submitted 28 September, 2018; v1 submitted 21 May, 2018;
originally announced May 2018.
-
Bidirectional User Throughput Maximization Based on Feedback Reduction in LiFi Networks
Authors:
Mohammad Dehghani Soltani,
Xi** Wu,
Majid Safari,
Harald Haas
Abstract:
Channel adaptive signalling, which is based on feedback, can result in almost any performance metric enhancement. Unlike the radio frequency (RF) channel, the optical wireless communications (OWCs) channel is fairly static. This feature enables a potential improvement of the bidirectional user throughput by reducing the amount of feedback. Light-Fidelity (LiFi) is a subset of OWCs, and it is a bid…
▽ More
Channel adaptive signalling, which is based on feedback, can result in almost any performance metric enhancement. Unlike the radio frequency (RF) channel, the optical wireless communications (OWCs) channel is fairly static. This feature enables a potential improvement of the bidirectional user throughput by reducing the amount of feedback. Light-Fidelity (LiFi) is a subset of OWCs, and it is a bidirectional, high-speed and fully networked wireless communication technology where visible light and infrared are used in downlink and uplink respectively. In this paper, two techniques for reducing the amount of feedback in LiFi cellular networks are proposed, i) Limited-content feedback (LCF) scheme based on reducing the content of feedback information and ii) Limited-frequency feedback (LFF) based on the update interval scheme that lets the receiver to transmit feedback information after some data frames transmission. Furthermore, based on the random waypoint (RWP) mobility model, the optimum update interval which provides maximum bidirectional user equipment (UE) throughput, has been derived. Results show that the proposed schemes can achieve better average overall throughput compared to the benchmark one-bit feedback and full-feedback mechanisms.
△ Less
Submitted 10 August, 2017;
originally announced August 2017.