-
Context-aware LLM-based Safe Control Against Latent Risks
Authors:
Quan Khanh Luu,
Xiyu Deng,
Anh Van Ho,
Yorie Nakahira
Abstract:
It is challenging for autonomous control systems to perform complex tasks in the presence of latent risks. Motivated by this challenge, this paper proposes an integrated framework that involves Large Language Models (LLMs), stochastic gradient descent (SGD), and optimization-based control. In the first phrase, the proposed framework breaks down complex tasks into a sequence of smaller subtasks, wh…
▽ More
It is challenging for autonomous control systems to perform complex tasks in the presence of latent risks. Motivated by this challenge, this paper proposes an integrated framework that involves Large Language Models (LLMs), stochastic gradient descent (SGD), and optimization-based control. In the first phrase, the proposed framework breaks down complex tasks into a sequence of smaller subtasks, whose specifications account for contextual information and latent risks. In the second phase, these subtasks and their parameters are refined through a dual process involving LLMs and SGD. LLMs are used to generate rough guesses and failure explanations, and SGD is used to fine-tune parameters. The proposed framework is tested using simulated case studies of robots and vehicles. The experiments demonstrate that the proposed framework can mediate actions based on the context and latent risks and learn complex behaviors efficiently.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
Enhancing Quality of Compressed Images by Mitigating Enhancement Bias Towards Compression Domain
Authors:
Qunliang Xing,
Mai Xu,
Shengxi Li,
Xin Deng,
Meisong Zheng,
Huaida Liu,
Ying Chen
Abstract:
Existing quality enhancement methods for compressed images focus on aligning the enhancement domain with the raw domain to yield realistic images. However, these methods exhibit a pervasive enhancement bias towards the compression domain, inadvertently regarding it as more realistic than the raw domain. This bias makes enhanced images closely resemble their compressed counterparts, thus degrading…
▽ More
Existing quality enhancement methods for compressed images focus on aligning the enhancement domain with the raw domain to yield realistic images. However, these methods exhibit a pervasive enhancement bias towards the compression domain, inadvertently regarding it as more realistic than the raw domain. This bias makes enhanced images closely resemble their compressed counterparts, thus degrading their perceptual quality. In this paper, we propose a simple yet effective method to mitigate this bias and enhance the quality of compressed images. Our method employs a conditional discriminator with the compressed image as a key condition, and then incorporates a domain-divergence regularization to actively distance the enhancement domain from the compression domain. Through this dual strategy, our method enables the discrimination against the compression domain, and brings the enhancement domain closer to the raw domain. Comprehensive quality evaluations confirm the superiority of our method over other state-of-the-art methods without incurring inference overheads.
△ Less
Submitted 19 March, 2024; v1 submitted 26 February, 2024;
originally announced February 2024.
-
Reconfigurable Power Converters with Increased Utilization for Unbalanced Power Distribution System Applications
Authors:
Matthew Deakin,
Xu Deng
Abstract:
A low-cost reconfiguration stage connected at the output of balanced three-phase, multi-terminal ac/dc/ac converters can increase the feasible set of power injections substantially, increasing converter utilization and therefore achieving a lower system cost. However, the approach has yet to be explored for phase unbalance mitigation in power distribution networks, an important application for fut…
▽ More
A low-cost reconfiguration stage connected at the output of balanced three-phase, multi-terminal ac/dc/ac converters can increase the feasible set of power injections substantially, increasing converter utilization and therefore achieving a lower system cost. However, the approach has yet to be explored for phase unbalance mitigation in power distribution networks, an important application for future energy systems. This study addresses this by considering power converter reconfiguration's potential for increasing the feasible set of power transfers of four-wire power converters. Reconfigurable topologies are compared against both conventional four-wire designs and an idealised, fully reconfigurable converter. Results show that conventional converters need up to 75.3% greater capacity to yield a capability chart of equivalent size to an idealised reconfigurable converter. The number and capacity of legs impact the capability chart's size, as do constraints on dc-side power injections. The proposed approach shows significant promise for maximizing the utilization of power electronics used to mitigate impacts of phase unbalance.
△ Less
Submitted 5 June, 2024; v1 submitted 6 February, 2024;
originally announced February 2024.
-
Real-Time Systems Optimization with Black-box Constraints and Hybrid Variables
Authors:
Sen Wang,
Dong Li,
Shao-Yu Huang,
Xuanliang Deng,
Ashrarul H. Sifat,
Changhee Jung,
Ryan Williams,
Haibo Zeng
Abstract:
When optimizing real-time systems, designers often face a challenging problem where the schedulability constraints are non-convex, non-continuous, or lack an analytical form to understand their properties. Although the optimization framework NORTH proposed in previous work is general (it works with arbitrary schedulability analysis) and scalable, it can only handle problems with continuous variabl…
▽ More
When optimizing real-time systems, designers often face a challenging problem where the schedulability constraints are non-convex, non-continuous, or lack an analytical form to understand their properties. Although the optimization framework NORTH proposed in previous work is general (it works with arbitrary schedulability analysis) and scalable, it can only handle problems with continuous variables, which limits its application. In this paper, we extend the applications of the framework NORTH to problems with a hybrid of continuous and discrete variables. This is achieved in a coordinate-descent method, where the continuous and discrete variables are optimized separately during iterations. The new framework, NORTH+, improves around 20% solution quality than NORTH in experiments.
△ Less
Submitted 21 January, 2024;
originally announced January 2024.
-
A General and Scalable Method for Optimizing Real-Time Systems
Authors:
Sen Wang,
Dong Li,
Shao-Yu Huang,
Xuanliang Deng,
Ashrarul H. Sifat,
Changhee Jung,
Ryan Williams,
Haibo Zeng
Abstract:
In real-time systems optimization, designers often face a challenging problem posed by the non-convex and non-continuous schedulability conditions, which may even lack an analytical form to understand their properties. To tackle this challenging problem, we treat the schedulability analysis as a black box that only returns true/false results. We propose a general and scalable framework to optimize…
▽ More
In real-time systems optimization, designers often face a challenging problem posed by the non-convex and non-continuous schedulability conditions, which may even lack an analytical form to understand their properties. To tackle this challenging problem, we treat the schedulability analysis as a black box that only returns true/false results. We propose a general and scalable framework to optimize real-time systems, named Numerical Optimizer with Real-Time Highlight (NORTH). NORTH is built upon the gradient-based active-set methods from the numerical optimization literature but with new methods to manage active constraints for the non-differentiable schedulability constraints. In addition, we also generalize NORTH to NORTH+, to collaboratively optimize certain types of discrete variables (\eg priority assignments, categorical variables) with continuous variables based on numerical optimization algorithms. We demonstrate the algorithm performance with two example applications: energy minimization based on dynamic voltage and frequency scaling (DVFS), and optimization of control system performance. In these experiments, NORTH achieved $10^2$ to $10^5$ times speed improvements over state-of-the-art methods while maintaining similar or better solution quality. NORTH+ outperforms NORTH by 30\% with similar algorithm scalability. Both NORTH and NORTH+ support black-box schedulability analysis, ensuring broad applicability.
△ Less
Submitted 6 January, 2024;
originally announced January 2024.
-
Physics-Informed Representation and Learning: Control and Risk Quantification
Authors:
Zhuoyuan Wang,
Reece Keller,
Xiyu Deng,
Kenta Hoshino,
Takashi Tanaka,
Yorie Nakahira
Abstract:
Optimal and safety-critical control are fundamental problems for stochastic systems, and are widely considered in real-world scenarios such as robotic manipulation and autonomous driving. In this paper, we consider the problem of efficiently finding optimal and safe control for high-dimensional systems. Specifically, we propose to use dimensionality reduction techniques from a comparison theorem f…
▽ More
Optimal and safety-critical control are fundamental problems for stochastic systems, and are widely considered in real-world scenarios such as robotic manipulation and autonomous driving. In this paper, we consider the problem of efficiently finding optimal and safe control for high-dimensional systems. Specifically, we propose to use dimensionality reduction techniques from a comparison theorem for stochastic differential equations together with a generalizable physics-informed neural network to estimate the optimal value function and the safety probability of the system. The proposed framework results in substantial sample efficiency improvement compared to existing methods. We further develop an autoencoder-like neural network to automatically identify the low-dimensional features of the system to enhance the ease of design for system integration. We also provide experiments and quantitative analysis to validate the efficacy of the proposed method. Source code is available at https://github.com/jacobwang925/path-integral-PINN.
△ Less
Submitted 8 May, 2024; v1 submitted 16 December, 2023;
originally announced December 2023.
-
Deep Neural Network Identification of Limnonectes Species and New Class Detection Using Image Data
Authors:
Li Xu,
Yili Hong,
Eric P. Smith,
David S. McLeod,
Xinwei Deng,
Laura J. Freeman
Abstract:
As is true of many complex tasks, the work of discovering, describing, and understanding the diversity of life on Earth (viz., biological systematics and taxonomy) requires many tools. Some of this work can be accomplished as it has been done in the past, but some aspects present us with challenges which traditional knowledge and tools cannot adequately resolve. One such challenge is presented by…
▽ More
As is true of many complex tasks, the work of discovering, describing, and understanding the diversity of life on Earth (viz., biological systematics and taxonomy) requires many tools. Some of this work can be accomplished as it has been done in the past, but some aspects present us with challenges which traditional knowledge and tools cannot adequately resolve. One such challenge is presented by species complexes in which the morphological similarities among the group members make it difficult to reliably identify known species and detect new ones. We address this challenge by develo** new tools using the principles of machine learning to resolve two specific questions related to species complexes. The first question is formulated as a classification problem in statistics and machine learning and the second question is an out-of-distribution (OOD) detection problem. We apply these tools to a species complex comprising Southeast Asian stream frogs (Limnonectes kuhlii complex) and employ a morphological character (hind limb skin texture) traditionally treated qualitatively in a quantitative and objective manner. We demonstrate that deep neural networks can successfully automate the classification of an image into a known species group for which it has been trained. We further demonstrate that the algorithm can successfully classify an image into a new class if the image does not belong to the existing classes. Additionally, we use the larger MNIST dataset to test the performance of our OOD detection algorithm. We finish our paper with some concluding remarks regarding the application of these methods to species complexes and our efforts to document true biodiversity. This paper has online supplementary materials.
△ Less
Submitted 14 November, 2023;
originally announced November 2023.
-
Frequency Domain Decomposition Translation for Enhanced Medical Image Translation Using GANs
Authors:
Zhuhui Wang,
Jianwei Zuo,
Xuliang Deng,
Jiajia Luo
Abstract:
Medical Image-to-image translation is a key task in computer vision and generative artificial intelligence, and it is highly applicable to medical image analysis. GAN-based methods are the mainstream image translation methods, but they often ignore the variation and distribution of images in the frequency domain, or only take simple measures to align high-frequency information, which can lead to d…
▽ More
Medical Image-to-image translation is a key task in computer vision and generative artificial intelligence, and it is highly applicable to medical image analysis. GAN-based methods are the mainstream image translation methods, but they often ignore the variation and distribution of images in the frequency domain, or only take simple measures to align high-frequency information, which can lead to distortion and low quality of the generated images. To solve these problems, we propose a novel method called frequency domain decomposition translation (FDDT). This method decomposes the original image into a high-frequency component and a low-frequency component, with the high-frequency component containing the details and identity information, and the low-frequency component containing the style information. Next, the high-frequency and low-frequency components of the transformed image are aligned with the transformed results of the high-frequency and low-frequency components of the original image in the same frequency band in the spatial domain, thus preserving the identity information of the image while destroying as little stylistic information of the image as possible. We conduct extensive experiments on MRI images and natural images with FDDT and several mainstream baseline models, and we use four evaluation metrics to assess the quality of the generated images. Compared with the baseline models, optimally, FDDT can reduce Fréchet inception distance by up to 24.4%, structural similarity by up to 4.4%, peak signal-to-noise ratio by up to 5.8%, and mean squared error by up to 31%. Compared with the previous method, optimally, FDDT can reduce Fréchet inception distance by up to 23.7%, structural similarity by up to 1.8%, peak signal-to-noise ratio by up to 6.8%, and mean squared error by up to 31.6%.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
Optimizing Logical Execution Time Model for Both Determinism and Low Latency
Authors:
Sen Wang,
Dong Li,
Ashrarul H. Sifat,
Shao-Yu Huang,
Xuanliang Deng,
Changhee Jung,
Ryan Williams,
Haibo Zeng
Abstract:
The Logical Execution Time (LET) programming model has recently received considerable attention, particularly because of its timing and dataflow determinism. In LET, task computation appears always to take the same amount of time (called the task's LET interval), and the task reads (resp. writes) at the beginning (resp. end) of the interval. Compared to other communication mechanisms, such as impl…
▽ More
The Logical Execution Time (LET) programming model has recently received considerable attention, particularly because of its timing and dataflow determinism. In LET, task computation appears always to take the same amount of time (called the task's LET interval), and the task reads (resp. writes) at the beginning (resp. end) of the interval. Compared to other communication mechanisms, such as implicit communication and Dynamic Buffer Protocol (DBP), LET performs worse on many metrics, such as end-to-end latency (including reaction time and data age) and time disparity jitter. Compared with the default LET setting, the flexible LET (fLET) model shrinks the LET interval while still guaranteeing schedulability by introducing the virtual offset to defer the read operation and using the virtual deadline to move up the write operation. Therefore, fLET has the potential to significantly improve the end-to-end timing performance while kee** the benefits of deterministic behavior on timing and dataflow.
To fully realize the potential of fLET, we consider the problem of optimizing the assignments of its virtual offsets and deadlines. We propose new abstractions to describe the task communication pattern and new optimization algorithms to explore the solution space efficiently. The algorithms leverage the linearizability of communication patterns and utilize symbolic operations to achieve efficient optimization while providing a theoretical guarantee. The framework supports optimizing multiple performance metrics and guarantees bounded suboptimality when optimizing end-to-end latency. Experimental results show that our optimization algorithms improve upon the default LET and its existing extensions and significantly outperform implicit communication and DBP in terms of various metrics, such as end-to-end latency, time disparity, and its jitter.
△ Less
Submitted 7 March, 2024; v1 submitted 30 October, 2023;
originally announced October 2023.
-
ConvFormer: Plug-and-Play CNN-Style Transformers for Improving Medical Image Segmentation
Authors:
Xian Lin,
Zengqiang Yan,
Xianbo Deng,
Chuansheng Zheng,
Li Yu
Abstract:
Transformers have been extensively studied in medical image segmentation to build pairwise long-range dependence. Yet, relatively limited well-annotated medical image data makes transformers struggle to extract diverse global features, resulting in attention collapse where attention maps become similar or even identical. Comparatively, convolutional neural networks (CNNs) have better convergence p…
▽ More
Transformers have been extensively studied in medical image segmentation to build pairwise long-range dependence. Yet, relatively limited well-annotated medical image data makes transformers struggle to extract diverse global features, resulting in attention collapse where attention maps become similar or even identical. Comparatively, convolutional neural networks (CNNs) have better convergence properties on small-scale training data but suffer from limited receptive fields. Existing works are dedicated to exploring the combinations of CNN and transformers while ignoring attention collapse, leaving the potential of transformers under-explored. In this paper, we propose to build CNN-style Transformers (ConvFormer) to promote better attention convergence and thus better segmentation performance. Specifically, ConvFormer consists of pooling, CNN-style self-attention (CSA), and convolutional feed-forward network (CFFN) corresponding to tokenization, self-attention, and feed-forward network in vanilla vision transformers. In contrast to positional embedding and tokenization, ConvFormer adopts 2D convolution and max-pooling for both position information preservation and feature size reduction. In this way, CSA takes 2D feature maps as inputs and establishes long-range dependency by constructing self-attention matrices as convolution kernels with adaptive sizes. Following CSA, 2D convolution is utilized for feature refinement through CFFN. Experimental results on multiple datasets demonstrate the effectiveness of ConvFormer working as a plug-and-play module for consistent performance improvement of transformer-based frameworks. Code is available at https://github.com/xianlin7/ConvFormer.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
DAQE: Enhancing the Quality of Compressed Images by Exploiting the Inherent Characteristic of Defocus
Authors:
Qunliang Xing,
Mai Xu,
Xin Deng,
Yichen Guo
Abstract:
Image defocus is inherent in the physics of image formation caused by the optical aberration of lenses, providing plentiful information on image quality. Unfortunately, existing quality enhancement approaches for compressed images neglect the inherent characteristic of defocus, resulting in inferior performance. This paper finds that in compressed images, significantly defocused regions have bette…
▽ More
Image defocus is inherent in the physics of image formation caused by the optical aberration of lenses, providing plentiful information on image quality. Unfortunately, existing quality enhancement approaches for compressed images neglect the inherent characteristic of defocus, resulting in inferior performance. This paper finds that in compressed images, significantly defocused regions have better compression quality, and two regions with different defocus values possess diverse texture patterns. These observations motivate our defocus-aware quality enhancement (DAQE) approach. Specifically, we propose a novel dynamic region-based deep learning architecture of the DAQE approach, which considers the regionwise defocus difference of compressed images in two aspects. (1) The DAQE approach employs fewer computational resources to enhance the quality of significantly defocused regions and more resources to enhance the quality of other regions; (2) The DAQE approach learns to separately enhance diverse texture patterns for regions with different defocus values, such that texture-specific enhancement can be achieved. Extensive experiments validate the superiority of our DAQE approach over state-of-the-art approaches in terms of quality enhancement and resource savings.
△ Less
Submitted 13 March, 2023; v1 submitted 20 November, 2022;
originally announced November 2022.
-
A Learning and Control Perspective for Microfinance
Authors:
Christian Kurniawan,
Xiyu Deng,
Adhiraj Chakraborty,
Assane Gueye,
Niangjun Chen,
Yorie Nakahira
Abstract:
Microfinance, despite its significant potential for poverty reduction, is facing sustainability hardships due to high default rates. Although many methods in regular finance can estimate credit scores and default probabilities, these methods are not directly applicable to microfinance due to the following unique characteristics: a) under-explored (develo**) areas such as rural Africa do not have…
▽ More
Microfinance, despite its significant potential for poverty reduction, is facing sustainability hardships due to high default rates. Although many methods in regular finance can estimate credit scores and default probabilities, these methods are not directly applicable to microfinance due to the following unique characteristics: a) under-explored (develo**) areas such as rural Africa do not have sufficient prior loan data for microfinance institutions (MFIs) to establish a credit scoring system; b) microfinance applicants may have difficulty providing sufficient information for MFIs to accurately predict default probabilities; and c) many MFIs use group liability (instead of collateral) to secure repayment. Here, we present a novel control-theoretic model of microfinance that accounts for these characteristics. We construct an algorithm to learn microfinance decision policies that achieve financial inclusion, fairness, social welfare, and sustainability. We characterize the convergence conditions to Pareto-optimum and the convergence speeds. We demonstrate, in numerous real and synthetic datasets, that the proposed method accounts for the complexities induced by group liability to produce robust decisions before sufficient loans are given to establish credit scoring systems and for applicants whose default probability cannot be accurately estimated due to missing information. To the best of our knowledge, this paper is the first to connect microfinance and control theory. We envision that the connection will enable safe learning and control techniques to help modernize microfinance and alleviate poverty.
△ Less
Submitted 12 December, 2022; v1 submitted 25 July, 2022;
originally announced July 2022.
-
Actions at the Edge: Jointly Optimizing the Resources in Multi-access Edge Computing
Authors:
Yiqin Deng,
Xianhao Chen,
Guangyu Zhu,
Yuguang Fang,
Zhigang Chen,
Xiaoheng Deng
Abstract:
Multi-access edge computing (MEC) is an emerging paradigm that pushes resources for sensing, communications, computing, storage and intelligence (SCCSI) to the premises closer to the end users, i.e., the edge, so that they could leverage the nearby rich resources to improve their quality of experience (QoE). Due to the growing emerging applications targeting at intelligentizing life-sustaining cyb…
▽ More
Multi-access edge computing (MEC) is an emerging paradigm that pushes resources for sensing, communications, computing, storage and intelligence (SCCSI) to the premises closer to the end users, i.e., the edge, so that they could leverage the nearby rich resources to improve their quality of experience (QoE). Due to the growing emerging applications targeting at intelligentizing life-sustaining cyber-physical systems, this paradigm has become a hot research topic, particularly when MEC is utilized to provide edge intelligence and real-time processing and control. This article is to elaborate the research issues along this line, including basic concepts and performance metrics, killer applications, architectural design, modeling approaches and solutions, and future research directions. It is hoped that this article provides a quick introduction to this fruitful research area particularly for beginning researchers.
△ Less
Submitted 18 April, 2022;
originally announced April 2022.
-
A UCB-based Tree Search Approach to Joint Verification-Correction Strategy for Large Scale Systems
Authors:
Peng Xu,
Xinwei Deng,
Alejandro Salado
Abstract:
Verification planning is a sequential decision-making problem that specifies a set of verification activities (VA) and correction activities (CA) at different phases of system development. While VAs are used to identify errors and defects, CAs also play important roles in system verification as they correct the identified errors and defects. However, current planning methods only consider VAs as d…
▽ More
Verification planning is a sequential decision-making problem that specifies a set of verification activities (VA) and correction activities (CA) at different phases of system development. While VAs are used to identify errors and defects, CAs also play important roles in system verification as they correct the identified errors and defects. However, current planning methods only consider VAs as decision choices. Because VAs and CAs have different activity spaces, planning a joint verification-correction strategy (JVCS) is still challenging, especially for large-size systems. Here we introduce a UCB-based tree search approach to search for near-optimal JVCSs. First, verification planning is simplified as repeatable bandit problems and an upper confidence bound rule for repeatable bandits (UCBRB) is presented with the optimal regret bound. Next, a tree search algorithm is proposed to search for feasible JVCSs. A tree-based ensemble learning model is also used to extend the tree search algorithm to handle local optimality issues. The proposed approach is evaluated on the notional case of a communication system.
△ Less
Submitted 2 April, 2022;
originally announced April 2022.
-
Spectral and Energy Efficiency of DCO-OFDM in Visible Light Communication Systems with Finite-Alphabet Inputs
Authors:
Ruixin Yang,
Shuai Ma,
Zihan Xu,
Hang Li,
Xiaodong Liu,
Xintong Ling,
Xiong Deng,
Xun Zhang,
Shiyin Li
Abstract:
The bound of the information transmission rate of direct current biased optical orthogonal frequency division multiplexing (DCO-OFDM) for visible light communication (VLC) with finite-alphabet inputs is yet unknown, where the corresponding spectral efficiency (SE) and energy efficiency (EE) stems out as the open research problems. In this paper, we derive the exact achievable rate of {the} DCO-OFD…
▽ More
The bound of the information transmission rate of direct current biased optical orthogonal frequency division multiplexing (DCO-OFDM) for visible light communication (VLC) with finite-alphabet inputs is yet unknown, where the corresponding spectral efficiency (SE) and energy efficiency (EE) stems out as the open research problems. In this paper, we derive the exact achievable rate of {the} DCO-OFDM system with finite-alphabet inputs for the first time. Furthermore, we investigate SE maximization problems of {the} DCO-OFDM system subject to both electrical and optical power constraints. By exploiting the relationship between the mutual information and the minimum mean-squared error, we propose a multi-level mercury-water-filling power allocation scheme to achieve the maximum SE. Moreover, the EE maximization problems of {the} DCO-OFDM system are studied, and the Dinkelbach-type power allocation scheme is developed for the maximum EE. Numerical results verify the effectiveness of the proposed theories and power allocation schemes.
△ Less
Submitted 2 February, 2022;
originally announced February 2022.
-
A Parallel Tempering Approach for Efficient Exploration of the Verification Tradespace in Engineered Systems
Authors:
Peng Xu,
Alejandro Salado,
Xinwei Deng
Abstract:
Verification is a critical process in the development of engineered systems. Through verification, engineers gain confidence in the correct functionality of the system before it is deployed into operation. Traditionally, verification strategies are fixed at the beginning of the system's development and verification activities are executed as the development progresses. Such an approach appears to…
▽ More
Verification is a critical process in the development of engineered systems. Through verification, engineers gain confidence in the correct functionality of the system before it is deployed into operation. Traditionally, verification strategies are fixed at the beginning of the system's development and verification activities are executed as the development progresses. Such an approach appears to give inferior results as the selection of the verification activities does not leverage information gained through the system's development process. In contrast, a set-based design approach to verification, where verification activities are dynamically selected as the system's development progresses, has been shown to provide superior results. However, its application under realistic engineering scenarios remains unproven due to the large size of the verification tradespace. In this work, we propose a parallel tempering approach (PTA) to efficiently explore the verification tradespace. First, we formulate exploration of the verification tradespace as a tree search problem. Second, we design a parallel tempering (PT) algorithm by simulating several replicas of the verification process at different temperatures to obtain a near-optimal result. Third, We apply the PT algorithm to all possible verification states to dynamically identify near-optimal results. The effectiveness of the proposed PTA is evaluated on a partial model of a notional satellite optical instrument.
△ Less
Submitted 23 September, 2021;
originally announced September 2021.
-
Learning Friction Model for Magnet-actuated Tethered Capsule Robot
Authors:
Yi Wang,
Yuyang Tu,
Yuchen He,
Xutian Deng,
Ziwei Lei,
Jianwei Zhang,
Miao Li
Abstract:
The potential diagnostic applications of magnet-actuated capsules have been greatly increased in recent years. For most of these potential applications, accurate position control of the capsule have been highly demanding. However, the friction between the robot and the environment as well as the drag force from the tether play a significant role during the motion control of the capsule. Moreover,…
▽ More
The potential diagnostic applications of magnet-actuated capsules have been greatly increased in recent years. For most of these potential applications, accurate position control of the capsule have been highly demanding. However, the friction between the robot and the environment as well as the drag force from the tether play a significant role during the motion control of the capsule. Moreover, these forces especially the friction force are typically hard to model beforehand. In this paper, we first designed a magnet-actuated tethered capsule robot, where the driving magnet is mounted on the end of a robotic arm. Then, we proposed a learning-based approach to model the friction force between the capsule and the environment, with the goal of increasing the control accuracy of the whole system. Finally, several real robot experiments are demonstrated to showcase the effectiveness of our proposed approach.
△ Less
Submitted 1 October, 2021; v1 submitted 15 September, 2021;
originally announced September 2021.
-
Spectral and Energy Efficiency of ACO-OFDM in Visible Light Communication Systems
Authors:
Shuai Ma,
Ruixin Yang,
Xiong Deng,
Xintong Ling,
Xun Zhang,
Fuhui Zhou,
Shiyin Li,
Derrick Wing Kwan Ng
Abstract:
In this paper, we study the spectral efficiency (SE) and energy efficiency (EE) of asymmetrically clipped optical orthogonal frequency division multiplexing (ACO-OFDM) for visible light communication (VLC). Firstly, we derive the achiev-able rates for Gaussian distributions inputs and practical finite-alphabet inputs. Then, we investigate the SE maximization problems subject to both the total tran…
▽ More
In this paper, we study the spectral efficiency (SE) and energy efficiency (EE) of asymmetrically clipped optical orthogonal frequency division multiplexing (ACO-OFDM) for visible light communication (VLC). Firstly, we derive the achiev-able rates for Gaussian distributions inputs and practical finite-alphabet inputs. Then, we investigate the SE maximization problems subject to both the total transmit power constraint and the average optical power constraint with the above two inputs, respectively. By exploiting the relationship between the mutual information and the minimum mean-squared error, an optimal power allocation scheme is proposed to maximize the SE with finite-alphabet inputs. To reduce the computational complexity of the power allocation scheme, we derive a closed-form lower bound of the SE. Also, considering the quality of service, we further tackle the non-convex EE maximization problems of ACO-OFDM with the two inputs, respectively. The problems are solved by the proposed Dinkelbach-type iterative algorithm. In each iteration, the interior point algorithm is applied to obtain the optimal power allocation.The performance of the proposed power allocation schemes for the SE and EE maximization are validated through numerical analysis.
△ Less
Submitted 31 August, 2021;
originally announced August 2021.
-
SFE-Net: EEG-based Emotion Recognition with Symmetrical Spatial Feature Extraction
Authors:
Xiangwen Deng,
Junlin Zhu,
Shangming Yang
Abstract:
Emotion recognition based on EEG (electroencephalography) has been widely used in human-computer interaction, distance education and health care. However, the conventional methods ignore the adjacent and symmetrical characteristics of EEG signals, which also contain salient information related to emotion. In this paper, a spatial folding ensemble network (SFE-Net) is presented for EEG feature extr…
▽ More
Emotion recognition based on EEG (electroencephalography) has been widely used in human-computer interaction, distance education and health care. However, the conventional methods ignore the adjacent and symmetrical characteristics of EEG signals, which also contain salient information related to emotion. In this paper, a spatial folding ensemble network (SFE-Net) is presented for EEG feature extraction and emotion recognition. Firstly, for the undetected area between EEG electrodes, an improved Bicubic-EEG interpolation algorithm is developed for EEG channels information completion, which allows us to extract a wider range of adjacent space features. Then, motivated by the spatial symmetric mechanism of human brain, we fold the input EEG channels data with five different symmetrical strategies, which enable the proposed network to extract the information of space features of EEG signals more effectively. Finally, a 3DCNN-based spatial, temporal extraction, and a multi-voting strategy of ensemble learning are integrated to model a new neural network. With this network, the spatial features of different symmetric folding signals can be extracted simultaneously, which greatly improves the robustness and accuracy of emotion recognition. The experimental results on DEAP and SEED datasets show that the proposed algorithm has comparable performance in terms of recognition accuracy.
△ Less
Submitted 26 August, 2021; v1 submitted 9 April, 2021;
originally announced April 2021.
-
DIR-DBTnet: Deep iterative reconstruction network for 3D digital breast tomosynthesis imaging
Authors:
Ting Su,
Xiaolei Deng,
Zhenwei Wang,
Jiecheng Yang,
Jianwei Chen,
Hairong Zheng,
Dong Liang,
Yongshuai Ge
Abstract:
Purpose: The goal of this study is to develop a novel deep learning (DL) based reconstruction framework to improve the digital breast tomosynthesis (DBT) imaging performance. Methods: In this work, the DIR-DBTnet is developed for DBT image reconstruction by unrolling the standard iterative reconstruction algorithm within the deep learning framework. In particular, such network learns the regulariz…
▽ More
Purpose: The goal of this study is to develop a novel deep learning (DL) based reconstruction framework to improve the digital breast tomosynthesis (DBT) imaging performance. Methods: In this work, the DIR-DBTnet is developed for DBT image reconstruction by unrolling the standard iterative reconstruction algorithm within the deep learning framework. In particular, such network learns the regularizer and the iteration parameters automatically through network training with a large amount of simulated DBT data. Afterwards, both numerical and experimental data are used to evaluate its performance. Quantitative metrics such as the artifact spread function (ASF), breast density, and the signal difference to noise ratio (SDNR) are used for image quality assessment. Results: For both numerical and experimental data, the proposed DIR-DBTnet generates reduced in-plane shadow artifacts and out-of-plane artifacts compared with the filtered back projection (FBP) and total variation (TV) methods. Quantitatively, the full width half maximum (FWHM) of the measured ASF curve from the numerical data is 33.4% and 19.7% smaller than those obtained with the FBP and TV methods, respectively; the breast density of the network reconstructed DBT images is more accurate and consistent with the ground truth. Conclusions: In conclusion, a deep iterative reconstruction network, DIR-DBTnet, has been proposed. Both qualitative and quantitative analyses of the numerical and experimental results show superior DBT imaging performance than the FBP and iterative algorithms.
△ Less
Submitted 19 August, 2020;
originally announced August 2020.
-
Multi-level Wavelet-based Generative Adversarial Network for Perceptual Quality Enhancement of Compressed Video
Authors:
Jianyi Wang,
Xin Deng,
Mai Xu,
Congyong Chen,
Yuhang Song
Abstract:
The past few years have witnessed fast development in video quality enhancement via deep learning. Existing methods mainly focus on enhancing the objective quality of compressed video while ignoring its perceptual quality. In this paper, we focus on enhancing the perceptual quality of compressed video. Our main observation is that enhancing the perceptual quality mostly relies on recovering high-f…
▽ More
The past few years have witnessed fast development in video quality enhancement via deep learning. Existing methods mainly focus on enhancing the objective quality of compressed video while ignoring its perceptual quality. In this paper, we focus on enhancing the perceptual quality of compressed video. Our main observation is that enhancing the perceptual quality mostly relies on recovering high-frequency sub-bands in wavelet domain. Accordingly, we propose a novel generative adversarial network (GAN) based on multi-level wavelet packet transform (WPT) to enhance the perceptual quality of compressed video, which is called multi-level wavelet-based GAN (MW-GAN). In MW-GAN, we first apply motion compensation with a pyramid architecture to obtain temporal information. Then, we propose a wavelet reconstruction network with wavelet-dense residual blocks (WDRB) to recover the high-frequency details. In addition, the adversarial loss of MW-GAN is added via WPT to further encourage high-frequency details recovery for video frames. Experimental results demonstrate the superiority of our method.
△ Less
Submitted 2 August, 2020;
originally announced August 2020.
-
NOMA for Energy-Efficient LiFi-Enabled Bidirectional IoT Communication
Authors:
Chen Chen,
Shu Fu,
Xin Jian,
Min Liu,
Xiong Deng,
Zhiguo Ding
Abstract:
In this paper, we consider a light fidelity (LiFi)-enabled bidirectional Internet of Things (IoT) communication system, where visible light and infrared light are used in the downlink and uplink, respectively. In order to improve the energy efficiency (EE) of the bidirectional LiFi-IoT system, non-orthogonal multiple access (NOMA) with a quality-of-service (QoS)-guaranteed optimal power allocation…
▽ More
In this paper, we consider a light fidelity (LiFi)-enabled bidirectional Internet of Things (IoT) communication system, where visible light and infrared light are used in the downlink and uplink, respectively. In order to improve the energy efficiency (EE) of the bidirectional LiFi-IoT system, non-orthogonal multiple access (NOMA) with a quality-of-service (QoS)-guaranteed optimal power allocation (OPA) strategy is applied to maximize the EE of the system. We derive a closed-form OPA set based on the identification of the optimal decoding orders in both downlink and uplink channels, which can enable low-complexity power allocation. Moreover, we propose an adaptive channel and QoS-based user pairing approach by jointly considering users' channel gains and QoS requirements. We further analyze the EE of the bidirectional LiFi-IoT system and the user outage probabilities (UOPs) of both downlink and uplink channels of the system. Extensive analytical and simulation results demonstrate the superiority of NOMA with OPA in comparison to orthogonal multiple access (OMA) and NOMA with typical channel-based power allocation strategies. It is also shown that the proposed adaptive channel and QoS-based user pairing approach greatly outperforms individual channel/QoS-based approaches, especially when users have diverse QoS requirements.
△ Less
Submitted 24 May, 2020; v1 submitted 20 May, 2020;
originally announced May 2020.
-
Bidirectional Graph Reasoning Network for Panoptic Segmentation
Authors:
Yangxin Wu,
Gengwei Zhang,
Yiming Gao,
Xiajun Deng,
Ke Gong,
Xiaodan Liang,
Liang Lin
Abstract:
Recent researches on panoptic segmentation resort to a single end-to-end network to combine the tasks of instance segmentation and semantic segmentation. However, prior models only unified the two related tasks at the architectural level via a multi-branch scheme or revealed the underlying correlation between them by unidirectional feature fusion, which disregards the explicit semantic and co-occu…
▽ More
Recent researches on panoptic segmentation resort to a single end-to-end network to combine the tasks of instance segmentation and semantic segmentation. However, prior models only unified the two related tasks at the architectural level via a multi-branch scheme or revealed the underlying correlation between them by unidirectional feature fusion, which disregards the explicit semantic and co-occurrence relations among objects and background. Inspired by the fact that context information is critical to recognize and localize the objects, and inclusive object details are significant to parse the background scene, we thus investigate on explicitly modeling the correlations between object and background to achieve a holistic understanding of an image in the panoptic segmentation task. We introduce a Bidirectional Graph Reasoning Network (BGRNet), which incorporates graph structure into the conventional panoptic segmentation network to mine the intra-modular and intermodular relations within and between foreground things and background stuff classes. In particular, BGRNet first constructs image-specific graphs in both instance and semantic segmentation branches that enable flexible reasoning at the proposal level and class level, respectively. To establish the correlations between separate branches and fully leverage the complementary relations between things and stuff, we propose a Bidirectional Graph Connection Module to diffuse information across branches in a learnable fashion. Experimental results demonstrate the superiority of our BGRNet that achieves the new state-of-the-art performance on challenging COCO and ADE20K panoptic segmentation benchmarks.
△ Less
Submitted 13 April, 2020;
originally announced April 2020.
-
Wavelet Domain Style Transfer for an Effective Perception-distortion Tradeoff in Single Image Super-Resolution
Authors:
Xin Deng,
Ren Yang,
Mai Xu,
Pier Luigi Dragotti
Abstract:
In single image super-resolution (SISR), given a low-resolution (LR) image, one wishes to find a high-resolution (HR) version of it which is both accurate and photo-realistic. Recently, it has been shown that there exists a fundamental tradeoff between low distortion and high perceptual quality, and the generative adversarial network (GAN) is demonstrated to approach the perception-distortion (PD)…
▽ More
In single image super-resolution (SISR), given a low-resolution (LR) image, one wishes to find a high-resolution (HR) version of it which is both accurate and photo-realistic. Recently, it has been shown that there exists a fundamental tradeoff between low distortion and high perceptual quality, and the generative adversarial network (GAN) is demonstrated to approach the perception-distortion (PD) bound effectively. In this paper, we propose a novel method based on wavelet domain style transfer (WDST), which achieves a better PD tradeoff than the GAN based methods. Specifically, we propose to use 2D stationary wavelet transform (SWT) to decompose one image into low-frequency and high-frequency sub-bands. For the low-frequency sub-band, we improve its objective quality through an enhancement network. For the high-frequency sub-band, we propose to use WDST to effectively improve its perceptual quality. By feat of the perfect reconstruction property of wavelets, these sub-bands can be re-combined to obtain an image which has simultaneously high objective and perceptual quality. The numerical results on various datasets show that our method achieves the best trade-off between the distortion and perceptual quality among the existing state-of-the-art SISR methods.
△ Less
Submitted 9 October, 2019;
originally announced October 2019.
-
Online Dissolved Gas Analysis (DGA) Monitoring System
Authors:
Xianda Deng,
Kyle Thomas,
Huiying Huang,
Scott P Adams,
Hesen Liu
Abstract:
Transformers are critical assets in power systems and transformer failures can cause asset damage, customer outages, and safety concerns. Dominion Energy has a sophisticated monitoring process for the transformers. One of the most cost-efficient, convenient and practical transformer monitoring methods in industry is Dissolved Gas Analysis(DGA). Leveraging new technology, on-line transformer monito…
▽ More
Transformers are critical assets in power systems and transformer failures can cause asset damage, customer outages, and safety concerns. Dominion Energy has a sophisticated monitoring process for the transformers. One of the most cost-efficient, convenient and practical transformer monitoring methods in industry is Dissolved Gas Analysis(DGA). Leveraging new technology, on-line transformer monitoring equipment is able to measure samples automatically. The challenges of unstable sampling measurements and contradicted analysis results for DGA are discussed in this paper. To provide further insight of transformer health and support a new transformer monitoring process in Dominion Energy, a DGA monitoring system is proposed. The DGA analysis methods used in the monitoring system are selected based on laboratory verification results from Dominion Energy. After derive the thresholds from IEEE standard, the solution of the proposed monitoring system and test results are presented. In the end, a historical transformer failure case in Dominion was analyzed and the results indicate the monitoring system can provide prescient information and sufficient supplemental report for making operational decisions.
△ Less
Submitted 31 August, 2019;
originally announced September 2019.
-
Frequency Observations and Statistic Analysis of Worldwide Main Power Grids Using FNET/GridEye
Authors:
Xianda Deng,
Hongyu Li,
Wenpeng Yu,
Wang Weikang,
Yilu Liu
Abstract:
With the increasing renewable energy sources, concerns about how renewable energy sources impact frequency have risen. There are few reports regarding power frequency status in worldwide main power grids and what are differences of frequency status between power grids in mainland and island. FNET/GridEye, a wide-area measurement system collecting frequency and phase angle data at the distribution…
▽ More
With the increasing renewable energy sources, concerns about how renewable energy sources impact frequency have risen. There are few reports regarding power frequency status in worldwide main power grids and what are differences of frequency status between power grids in mainland and island. FNET/GridEye, a wide-area measurement system collecting frequency and phase angle data at the distribution level, provides an opportunity to observe and study the power frequency in different power grids over the world. In this paper, 13 different power grids, spreading at different mainland and islands over the world, are observed and compared. A more detail statistical analysis was conducted for typical power grids in three different places, e.g., U.S Eastern Interconnection (EI), Egypt, and Japan. The probability functions of frequency based on the measured data are calculated. The distributions of frequency in different power grids fall into two categories, e.g., single-peak distribution and multi-peak distribution. Furthermore, a meaningful insight that the single-peak distributions of the frequency almost follow the normal distribution is found. The frequency observations and statistic analysis of worldwide main power grids using FNET/GridEye could help the power system operators understand the frequency statistical characteristic more deeply.
△ Less
Submitted 10 August, 2019;
originally announced August 2019.
-
Restricted Linearized Augmented Lagrangian Method for Euler's Elastica Model
Authors:
Yinghui Zhang,
Xiaojuan Deng,
Jun Zhang,
Hongwei Li
Abstract:
Euler's elastica model has been extensively studied and applied to image processing tasks. However, due to the high nonlinearity and nonconvexity of the involved curvature term, conventional algorithms suffer from slow convergence and high computational cost. Various fast algorithms have been proposed, among which, the augmented Lagrangian based ones are very popular in the community. However, par…
▽ More
Euler's elastica model has been extensively studied and applied to image processing tasks. However, due to the high nonlinearity and nonconvexity of the involved curvature term, conventional algorithms suffer from slow convergence and high computational cost. Various fast algorithms have been proposed, among which, the augmented Lagrangian based ones are very popular in the community. However, parameter tuning might be very challenging for these methods. In this paper, a simple cutting-off strategy is introduced into the augmented Lagrangian based algorithms for minimizing the Euler's elastica energy, which leads to easy parameter tuning and fast convergence. The cutting-off strategy is based on an observation of inconsistency inside the augmented Lagrangian based algorithms. When the weighting parameter of the curvature term goes to zero, the energy functional boils down to the ROF model. So, a natural requirement is that its augmented Lagrangian based algorithms should also approach the augmented Lagrangian based algorithms formulated directly for solving the ROF model from the very beginning. Unfortunately, this is not the case for certain existing augmented Lagrangian based algorithms. The proposed cutting-off strategy helps to decouple the tricky dependence between the auxiliary splitting variables, so as to remove the observed inconsistency. Numerical experiments suggest that the proposed algorithm enjoys easier parameter-tuning, faster convergence and even higher quality of image restorations.
△ Less
Submitted 4 August, 2019;
originally announced August 2019.
-
Line Outage Detection and Localization via Synchrophasor Measurement
Authors:
Xianda Deng,
Desong Bian,
Di Shi,
Wenxuan Yao,
Zhihao Jiang,
Yilu Liu
Abstract:
Since transmission lines are crucial links in the power system, one line outage event may bring about interruption or even cascading failure of the power system. If a quick and accurate line outage detection and localization can be achieved, the system operator can take necessary actions in time to mitigate the negative impact. Therefore, the objective of this paper is to study a method for line o…
▽ More
Since transmission lines are crucial links in the power system, one line outage event may bring about interruption or even cascading failure of the power system. If a quick and accurate line outage detection and localization can be achieved, the system operator can take necessary actions in time to mitigate the negative impact. Therefore, the objective of this paper is to study a method for line outage detection and localization via synchrophasor measurements. The density of deployed phasor measurement units (PMUs) is increasing recently, which greatly improves the visibility of the power grid. Taking advantage of the high-resolution synchrophasor data, the proposed method utilizes frequency measurement for line outage detection and power change for localization. The procedure of the proposed method is given. Compared with conventional methods, it does not require the pre-knowledge on the system. Simulation study validates the effectiveness of the proposed method.
△ Less
Submitted 2 April, 2019; v1 submitted 21 March, 2019;
originally announced March 2019.
-
Learning Extreme Hummingbird Maneuvers on Flap** Wing Robots
Authors:
Fan Fei,
Zhan Tu,
Jian Zhang,
Xinyan Deng
Abstract:
Biological studies show that hummingbirds can perform extreme aerobatic maneuvers during fast escape. Given a sudden looming visual stimulus at hover, a hummingbird initiates a fast backward translation coupled with a 180-degree yaw turn, which is followed by instant posture stabilization in just under 10 wingbeats. Consider the wingbeat frequency of 40Hz, this aggressive maneuver is carried out i…
▽ More
Biological studies show that hummingbirds can perform extreme aerobatic maneuvers during fast escape. Given a sudden looming visual stimulus at hover, a hummingbird initiates a fast backward translation coupled with a 180-degree yaw turn, which is followed by instant posture stabilization in just under 10 wingbeats. Consider the wingbeat frequency of 40Hz, this aggressive maneuver is carried out in just 0.2 seconds. Inspired by the hummingbirds' near-maximal performance during such extreme maneuvers, we developed a flight control strategy and experimentally demonstrated that such maneuverability can be achieved by an at-scale 12-gram hummingbird robot equipped with just two actuators. The proposed hybrid control policy combines model-based nonlinear control with model-free reinforcement learning. We use model-based nonlinear control for nominal flight control, as the dynamic model is relatively accurate for these conditions. However, during extreme maneuver, the modeling error becomes unmanageable. A model-free reinforcement learning policy trained in simulation was optimized to 'destabilize' the system and maximize the performance during maneuvering. The hybrid policy manifests a maneuver that is close to that observed in hummingbirds. Direct simulation-to-real transfer is achieved, demonstrating the hummingbird-like fast evasive maneuvers on the at-scale hummingbird robot.
△ Less
Submitted 25 February, 2019;
originally announced February 2019.
-
Improved Decoding of Staircase Codes: The Soft-aided Bit-marking (SABM) Algorithm
Authors:
Yi Lei,
Bin Chen,
Gabriele Liga,
Xiong Deng,
Zizheng Cao,
Jianqiang Li,
Kun Xu,
Alex Alvarado
Abstract:
Staircase codes (SCCs) are typically decoded using iterative bounded-distance decoding (BDD) and hard decisions. In this paper, a novel decoding algorithm is proposed, which partially uses soft information from the channel. The proposed algorithm is based on marking certain number of highly reliable and highly unreliable bits. These marked bits are used to improve the miscorrection-detection capab…
▽ More
Staircase codes (SCCs) are typically decoded using iterative bounded-distance decoding (BDD) and hard decisions. In this paper, a novel decoding algorithm is proposed, which partially uses soft information from the channel. The proposed algorithm is based on marking certain number of highly reliable and highly unreliable bits. These marked bits are used to improve the miscorrection-detection capability of the SCC decoder and the error-correcting capability of BDD. For SCCs with $2$-error-correcting Bose-Chaudhuri-Hocquenghem component codes, our algorithm improves upon standard SCC decoding by up to $0.30$~dB at a bit-error rate (BER) of $10^{-7}$. The proposed algorithm is shown to achieve almost half of the gain achievable by an idealized decoder with this structure. A complexity analysis based on the number of additional calls to the component BDD decoder shows that the relative complexity increase is only around $4\%$ at a BER of $10^{-4}$. This additional complexity is shown to decrease as the channel quality improves. Our algorithm is also extended (with minor modifications) to product codes. The simulation results show that in this case, the algorithm offers gains of up to $0.44$~dB at a BER of $10^{-8}$.
△ Less
Submitted 4 February, 2019;
originally announced February 2019.
-
UAV-aided urban target tracking system based on edge computing
Authors:
Yajun Liu,
Congxu Zhu,
Xiaoheng Deng,
Peiyuan Guan,
Zhiwen Wan,
Jie Luo,
Enlu Liu,
Honggang Zhang
Abstract:
Target tracking is an important issue of social security. In order to track a target, traditionally a large amount of surveillance video data need to be uploaded into the cloud for processing and analysis, which put stremendous bandwidth pressure on communication links in access networks and core networks. At the same time, the long delay in wide area network is very likely to cause a tracking sys…
▽ More
Target tracking is an important issue of social security. In order to track a target, traditionally a large amount of surveillance video data need to be uploaded into the cloud for processing and analysis, which put stremendous bandwidth pressure on communication links in access networks and core networks. At the same time, the long delay in wide area network is very likely to cause a tracking system to lose its target. Often, unmanned aerial vehicle (UAV) has been adopted for target tracking due to its flexibility, but its limited flight time due to battery constraint and the blocking by various obstacles in the field pose two major challenges to its target tracking task, which also very likely results in the loss of target. A novel target tracking model that coordinates the tracking by UAV and ground nodes in an edge computing environment is proposed in this study. The model can effectively reduce the communication cost and the long delay of the traditional surveillance camera system that relies on cloud computing, and it can improve the probability of finding a target again after an UAV loses the tracing of that target. It has been demonstrated that the proposed system achieved a significantly better performance in terms of low latency, high reliability, and optimal quality of experience (QoE).
△ Less
Submitted 2 February, 2019;
originally announced February 2019.
-
Decoding Staircase Codes with Marked Bits
Authors:
Yi Lei,
Alex Alvarado,
Bin Chen,
Xiong Deng,
Zizheng Cao,
Jianqiang Li,
Kun Xu
Abstract:
Staircase codes (SCCs) are typically decoded using iterative bounded-distance decoding (BDD) and hard decisions. In this paper, a novel decoding algorithm is proposed, which partially uses soft information from the channel. The proposed algorithm is based on marking certain number of highly reliable and highly unreliable bits. These marked bits are used to improve the miscorrection-detection capab…
▽ More
Staircase codes (SCCs) are typically decoded using iterative bounded-distance decoding (BDD) and hard decisions. In this paper, a novel decoding algorithm is proposed, which partially uses soft information from the channel. The proposed algorithm is based on marking certain number of highly reliable and highly unreliable bits. These marked bits are used to improve the miscorrection-detection capability of the SCC decoder and the error-correcting capability of BDD. For SCCs with $2$-error-correcting BCH component codes, our algorithm improves upon standard SCC decoding by up to $0.30$~dB at a bit-error rate of $10^{-7}$. The proposed algorithm is shown to achieve almost half of the gain achievable by an idealized decoder with this structure.
△ Less
Submitted 21 November, 2018;
originally announced November 2018.