-
Boosted Neural Decoders: Achieving Extreme Reliability of LDPC Codes for 6G Networks
Authors:
Hee-Youl Kwak,
Dae-Young Yun,
Yongjune Kim,
Sang-Hyo Kim,
Jong-Seon No
Abstract:
Ensuring extremely high reliability is essential for channel coding in 6G networks. The next-generation of ultra-reliable and low-latency communications (xURLLC) scenario within 6G networks requires a frame error rate (FER) below 10-9. However, low-density parity-check (LDPC) codes, the standard in 5G new radio (NR), encounter a challenge known as the error floor phenomenon, which hinders to achie…
▽ More
Ensuring extremely high reliability is essential for channel coding in 6G networks. The next-generation of ultra-reliable and low-latency communications (xURLLC) scenario within 6G networks requires a frame error rate (FER) below 10-9. However, low-density parity-check (LDPC) codes, the standard in 5G new radio (NR), encounter a challenge known as the error floor phenomenon, which hinders to achieve such low rates. To tackle this problem, we introduce an innovative solution: boosted neural min-sum (NMS) decoder. This decoder operates identically to conventional NMS decoders, but is trained by novel training methods including: i) boosting learning with uncorrected vectors, ii) block-wise training schedule to address the vanishing gradient issue, iii) dynamic weight sharing to minimize the number of trainable weights, iv) transfer learning to reduce the required sample count, and v) data augmentation to expedite the sampling process. Leveraging these training strategies, the boosted NMS decoder achieves the state-of-the art performance in reducing the error floor as well as superior waterfall performance. Remarkably, we fulfill the 6G xURLLC requirement for 5G LDPC codes without the severe error floor. Additionally, the boosted NMS decoder, once its weights are trained, can perform decoding without additional modules, making it highly practical for immediate application.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Weakly Private Information Retrieval Under Rényi Divergence
Authors:
Jun-Woo Tak,
Sang-Hyo Kim,
Yongjune Kim,
Jong-Seon No
Abstract:
Private information retrieval (PIR) is a protocol that guarantees the privacy of a user who is in communication with databases. The user wants to download one of the messages stored in the databases while hiding the identity of the desired message. Recently, the benefits that can be obtained by weakening the privacy requirement have been studied, but the definition of weak privacy needs to be elab…
▽ More
Private information retrieval (PIR) is a protocol that guarantees the privacy of a user who is in communication with databases. The user wants to download one of the messages stored in the databases while hiding the identity of the desired message. Recently, the benefits that can be obtained by weakening the privacy requirement have been studied, but the definition of weak privacy needs to be elaborated upon. In this paper, we attempt to quantify the weak privacy (i.e., information leakage) in PIR problems by using the Rényi divergence that generalizes the Kullback-Leibler divergence. By introducing Rényi divergence into the existing PIR problem, the tradeoff relationship between privacy (information leakage) and PIR performance (download cost) is characterized via convex optimization. Furthermore, we propose an alternative PIR scheme with smaller message sizes than the Tian-Sun-Chen (TSC) scheme. The proposed scheme cannot achieve the PIR capacity of perfect privacy since the message size of the TSC scheme is the minimum to achieve the PIR capacity. However, we show that the proposed scheme can be better than the TSC scheme in the weakly PIR setting, especially under a low download cost regime.
△ Less
Submitted 17 May, 2021;
originally announced May 2021.
-
Iterative DNA Coding Scheme With GC Balance and Run-Length Constraints Using a Greedy Algorithm
Authors:
Seong-Joon Park,
Yongwoo Lee,
Jong-Seon No
Abstract:
In this paper, we propose a novel iterative encoding algorithm for DNA storage to satisfy both the GC balance and run-length constraints using a greedy algorithm. DNA strands with run-length more than three and the GC balance ratio far from 50\% are known to be prone to errors. The proposed encoding algorithm stores data at high information density with high flexibility of run-length at most $m$ a…
▽ More
In this paper, we propose a novel iterative encoding algorithm for DNA storage to satisfy both the GC balance and run-length constraints using a greedy algorithm. DNA strands with run-length more than three and the GC balance ratio far from 50\% are known to be prone to errors. The proposed encoding algorithm stores data at high information density with high flexibility of run-length at most $m$ and GC balance between $0.5\pmα$ for arbitrary $m$ and $α$. More importantly, we propose a novel map** method to reduce the average bit error compared to the randomly generated map** method, using a greedy algorithm. The proposed algorithm is implemented through iterative encoding, consisting of three main steps: randomization, M-ary map**, and verification. The proposed algorithm has an information density of 1.8523 bits/nt in the case of $m=3$ and $α=0.05$. Also, the proposed algorithm is robust to error propagation, since the average bit error caused by the one nt error is 2.3455 bits, which is reduced by $20.5\%$, compared to the randomized map**.
△ Less
Submitted 1 August, 2021; v1 submitted 5 March, 2021;
originally announced March 2021.
-
Analysis of Maximal Topologies Achieving Optimal DoF and DoF $\frac{1}{n}$ in Topological Interference Management
Authors:
Jong-Yoon Yoon,
Jong-Seon No
Abstract:
Topological interference management (TIM) can obtain degrees of freedom (DoF) gains with no channel state information at the transmitters (CSIT) except topological information of network in the interference channel. It was shown that TIM achieves the optimal symmetric DoF when internal conflict does not exist among messages. However, it is difficult to assure whether a specific topology can achiev…
▽ More
Topological interference management (TIM) can obtain degrees of freedom (DoF) gains with no channel state information at the transmitters (CSIT) except topological information of network in the interference channel. It was shown that TIM achieves the optimal symmetric DoF when internal conflict does not exist among messages. However, it is difficult to assure whether a specific topology can achieve the optimal DoF without scrutinizing internal conflict, which requires lots of works. Also, it is hard to design a specific optimal topology directly from the conventional condition for the optimal DoF. With these problems in mind, we propose a method to derive maximal topology directly in TIM, named as alliance construction in K-user interference channel. That is, it is proved that a topology is maximal if and only if it is derived from alliance construction. We translate a topology design by alliance construction in message graph into topology matrix and propose conditions for maximal topology matrix (MTM). Moreover, we propose a generalized alliance construction that derives a topology achieving DoF 1/n for n>=3 by generalizing sub-alliances. A topology matrix can also be used to analyze maximality of topology with DoF 1/n.
△ Less
Submitted 9 October, 2018;
originally announced October 2018.
-
Uplink Time Scheduling with Power Level Modulation in Wireless Powered Communication Networks
Authors:
Yeongwoo Ko,
Sang-Hyo Kim,
Jong-Seon No
Abstract:
In this paper, we propose downlink signal design and optimal uplink scheduling for the wireless powered communication networks (WPCNs). Prior works give attention to resource allocation in a static channel because users are equipped with only energy receiver and users cannot update varying uplink schedulling. For uplink scheduling, we propose a downlink signal design scheme, called a power level m…
▽ More
In this paper, we propose downlink signal design and optimal uplink scheduling for the wireless powered communication networks (WPCNs). Prior works give attention to resource allocation in a static channel because users are equipped with only energy receiver and users cannot update varying uplink schedulling. For uplink scheduling, we propose a downlink signal design scheme, called a power level modulation, which conveys uplink scheduling information to users. First, we design a downlink energy signal using power level modulation. Hybrid-access point (H-AP) allocates different power level in each subslot of the downlink energy signal according to channel condition and users optimize their uplink time subslots for signal transmission based on the power levels of their received signals. Further, we formulate the sum throughput maximization problem for the proposed scheme by determining the uplink and downlink time allocation using convex optimization problem. Numerical results confirm that the throughput of the proposed scheme outperforms that of the conventional schemes.
△ Less
Submitted 4 October, 2018;
originally announced October 2018.