November 2024
·
2 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
November 2024
·
2 Reads
November 2024
June 2024
·
1 Citation
January 2024
·
13 Reads
IEEE Transactions on Communications
This paper analyzes energy consumption in wireless streaming with delay constraints. One fundamental question is whether the transmitter should transmit a steady stream of bits, continuous transmission, or transmit data in bursts and switch off while not transmitting. In the latter case, a question is also for what fraction of time the transmitter should transmit, the duty cycle. In this paper we use traditional and finite blocklength information theory to see whether bursty transmission would be better than transmitting data continuously. When doing this analysis we consider latency and energy efficiency, two fundamental parameters that characterize communication systems. We take into account realistic models of hardware, including overhead power, power amplifier inefficiency and the receiver noise factor. With these models we find that the energy consumption and latency tradeoff behaves quite differently from the ideal case.
September 2023
·
5 Reads
·
1 Citation
September 2023
·
7 Reads
·
12 Citations
January 2023
·
5 Reads
Compress-forward (CF) relays can improve communication rates even when the relay cannot decode the source signal. Efficient implementation of CF is a topic of contemporary interest, in part because of its potential impact on wireless technologies such as cloud-RAN. There exists a gap between the performance of CF implementations in the high spectral efficiency regime and the corresponding information theoretic achievable rates. We begin by re-framing a dilemma causing this gap, and propose an approach for its mitigation. We utilize trellis coded quantization (TCQ) at the relay together with multi-level coding at the source and relay, in a manner that facilitates the calculation of bit LLRs at the destination for joint decoding. The contributions of this work include designing TCQ for end-to-end relay performance, since a distortion-minimizing TCQ is suboptimum. The reported improvements include a 1dB gain over prior results for PSK modulation.
June 2022
·
96 Reads
We consider the following problem: we have a large dataset of normal data available. We are now given a new, possibly quite small, set of data, and we are to decide if these are normal data, or if they are indicating a new phenomenon. This is a novelty detection or out-of-distribution detection problem. An example is in medicine, where the normal data is for people with no known disease, and the new dataset people with symptoms. Other examples could be in security. We solve this problem by training a bidirectional generative adversarial network (BiGAN) on the normal data and using a Gaussian graphical model to model the output. We then use universal source coding, or minimum description length (MDL) on the output to decide if it is a new distribution, in an implementation of Kolmogorov and Martin-L\"{o}f randomness. We apply the methodology to both MNIST data and a real-world electrocardiogram (ECG) dataset of healthy and patients with Kawasaki disease, and show better performance in terms of the ROC curve than similar methods.
October 2021
·
114 Reads
Many multivariate data such as social and biological data exhibit complex dependencies that are best characterized by graphs. Unlike sequential data, graphs are, in general, unordered structures. This means we can no longer use classic, sequential-based compression methods on these graph-based data. Therefore, it is necessary to develop new methods for graph compression. In this paper, we present universal source coding methods for the lossless compression of unweighted, undirected, unlabelled graphs. We encode in two steps: 1) transforming graph into a rooted binary tree, 2) the encoding rooted binary tree using graph statistics. Our coders showed better compression performance than other source coding methods on both synthetic and real-world graphs. We then applied our graph coding methods for model selection of Gaussian graphical models using minimum description length (MDL) principle finding the description length of the conditional independence graph. Experiments on synthetic data show that our approach gives better performance compared to common model selection methods. We also applied our approach to electrocardiogram (ECG) data in order to explore the differences between graph models of two groups of subjects.
July 2021
·
59 Reads
·
2 Citations
EURASIP Journal on Wireless Communications and Networking
Recent progress in the understanding of the behavior of the interference channel has led to valuable insights: first, discrete signaling has been discovered to have tangible benefits in the presence of interference, especially when one does not wish to decode the interfering signal, i.e., the interference is treated as noise, and second, the capacity of the interference channel as a function of the interference link gains is now understood to be highly irregular, i.e., non-monotonic and discontinuous. This work addresses these two issues in an integrated and interdisciplinary manner: it utilizes discrete signaling to approach the capacity of the interference channel by developing lower bounds on the mutual information under discrete modulation and treating interference as noise, subject to an outage set, and addresses the issue of sensitivity to link gains with a liquid metal reconfigurable antenna to avoid the aforementioned outage sets. Simulations illustrate the effectiveness of our approach.
... Then, the limited energy and computing resources of UAVs, as well as the rapid movement of ground IoV users, make UAV-assisted IoV face many problems, such as: UAV deployment, data access and transmission, and task processing. For such problems that are difficult to solve with traditional heuristic algorithms, there have been many cases of using machine learning algorithms to solve the problems [13][14][15][16][17]. Further, it considers serving users within the UAV coverage area, while deploying instances on the UAV to offload tasks for multiple users [18]. ...
September 2023
... To pick the best value of penalty term λ, different model selection techniques have been proposed in the literature. A detailed overview of existing methods can be found in Abolfazli et al. (2021a). We use the approach proposed in Abolfazli et al. (2021b) to select λ and hence find graph G. Unlike other approaches that may only consider the number of edges from G (i.e., number of nonzero elements in Ω) to account for model complexity, this approach considers the whole structure of G for a more accurate model complexity. ...
July 2021
... The nonlinear problem is avoided since there are no active switching components in liquid-metal reconfigurable antennas. Additionally, the liquid-metal reconfigurable antennas can more effectively eliminate electromagnetic interference in multiantenna systems [12,13]. ...
July 2021
EURASIP Journal on Wireless Communications and Networking
... still hold. User 2's rate can then be directly obtained by using (31) as ...
November 2019
IEEE Transactions on Information Theory
... However, a large buffer is desirable from a user experience point of view, but when the user skips parts of the video or jumps to other videos, the energy consumed to download the video that has not been watched is wasted. These topic and strategies to address it are discussed in several works [11,14,33,34,51]. ...
Reference:
Towards a Sustainable Internet of Sounds
November 2019
IEEE Transactions on Information Theory
... DVB-S2 code was used for 16-PSK resulting in overall rate of 3.2 bits/s/Hz. In addition to the BICM results, we also display the results of a preliminary version of this work from [12] which uses only scalar quantization. In addition, rates are carefully chosen to avoid any unfair advantage to the method of this letter in reporting error rates. ...
July 2019
... The feasibility of avoiding problematic or singular channel gains with liquid metal antennas is demonstrated via experimental extraction of the operating parameters of the proposed liquid metal antennas and then using these parameters in extensive simulations of the channel states produced by the liquid metal antennas and matching it with the low minimumdistance channel gains suggested by analysis. An early version of this work appeared in [18]; the present paper goes beyond [18] in the following aspects: (a) Theorem 2 is reformulated and its expression is distinct from the results of [18], (b) Sect. 5 on successive interference cancellation is novel, (c) Sect. 6.1 involving analytical and simulation modeling based on a dipole model is new, (d) several insightful simulations, including those represented in Figs. ...
August 2018
... Other OoD methods [76][77][78][79][80][81] are not suitable, as identified in [70]. ...
February 2019
... However, by integrating specific severity data discovered during third-level actual surveys, the damage maps were progressively enhanced. For effective rescue operations, such a multi-phased impact assessment might produce better accurate damage maps [21]. ...
January 2008
... However, with the development of multi-functional phased array radar technology, the modulation parameters (such as CF, PW, PRI, etc.) can be flexibly changed with the switching of work modes, which poses a great challenge to most current parameter-based sorting methods [3]. The current research on pulse deinterleaving can be summarized into three categories: pulse repetition interval (PRI)-based [4][5][6][7][8][9][10], clustering-based [11][12][13][14][15][16][17], and neural network-based methods [18][19][20][21][22][23][24][25][26]. ...
December 2018
IEEE Transactions on Signal Processing