arXiv daily

Information Theory (cs.IT)

Wed, 07 Jun 2023

Other arXiv digests in this category:Thu, 14 Sep 2023; Wed, 13 Sep 2023; Tue, 12 Sep 2023; Mon, 11 Sep 2023; Fri, 08 Sep 2023; Tue, 05 Sep 2023; Fri, 01 Sep 2023; Thu, 31 Aug 2023; Wed, 30 Aug 2023; Tue, 29 Aug 2023; Mon, 28 Aug 2023; Fri, 25 Aug 2023; Thu, 24 Aug 2023; Wed, 23 Aug 2023; Tue, 22 Aug 2023; Mon, 21 Aug 2023; Fri, 18 Aug 2023; Thu, 17 Aug 2023; Wed, 16 Aug 2023; Tue, 15 Aug 2023; Mon, 14 Aug 2023; Fri, 11 Aug 2023; Thu, 10 Aug 2023; Wed, 09 Aug 2023; Tue, 08 Aug 2023; Mon, 07 Aug 2023; Fri, 04 Aug 2023; Thu, 03 Aug 2023; Wed, 02 Aug 2023; Tue, 01 Aug 2023; Mon, 31 Jul 2023; Fri, 28 Jul 2023; Thu, 27 Jul 2023; Wed, 26 Jul 2023; Tue, 25 Jul 2023; Mon, 24 Jul 2023; Fri, 21 Jul 2023; Thu, 20 Jul 2023; Wed, 19 Jul 2023; Tue, 18 Jul 2023; Mon, 17 Jul 2023; Fri, 14 Jul 2023; Thu, 13 Jul 2023; Wed, 12 Jul 2023; Tue, 11 Jul 2023; Mon, 10 Jul 2023; Fri, 07 Jul 2023; Thu, 06 Jul 2023; Wed, 05 Jul 2023; Tue, 04 Jul 2023; Mon, 03 Jul 2023; Fri, 30 Jun 2023; Thu, 29 Jun 2023; Wed, 28 Jun 2023; Tue, 27 Jun 2023; Mon, 26 Jun 2023; Fri, 23 Jun 2023; Thu, 22 Jun 2023; Wed, 21 Jun 2023; Tue, 20 Jun 2023; Fri, 16 Jun 2023; Thu, 15 Jun 2023; Tue, 13 Jun 2023; Mon, 12 Jun 2023; Fri, 09 Jun 2023; Thu, 08 Jun 2023; Tue, 06 Jun 2023; Mon, 05 Jun 2023; Fri, 02 Jun 2023; Thu, 01 Jun 2023; Wed, 31 May 2023; Tue, 30 May 2023; Mon, 29 May 2023; Fri, 26 May 2023; Thu, 25 May 2023; Wed, 24 May 2023; Tue, 23 May 2023; Mon, 22 May 2023; Fri, 19 May 2023; Thu, 18 May 2023; Wed, 17 May 2023; Tue, 16 May 2023; Mon, 15 May 2023; Fri, 12 May 2023; Thu, 11 May 2023; Wed, 10 May 2023; Tue, 09 May 2023; Mon, 08 May 2023; Fri, 05 May 2023; Thu, 04 May 2023; Wed, 03 May 2023; Tue, 02 May 2023; Mon, 01 May 2023; Fri, 28 Apr 2023; Thu, 27 Apr 2023; Wed, 26 Apr 2023; Tue, 25 Apr 2023; Mon, 24 Apr 2023; Fri, 21 Apr 2023; Thu, 20 Apr 2023; Wed, 19 Apr 2023; Tue, 18 Apr 2023; Mon, 17 Apr 2023; Fri, 14 Apr 2023; Thu, 13 Apr 2023; Wed, 12 Apr 2023; Mon, 10 Apr 2023
1.Achievable Rate Analysis in Molecular Channels with Reset-Counting Fully Absorbing Receivers

Authors:Fardad Vakilipoor, Luca Barletta, Stefano Bregni, Maurizio Magarini

Abstract: In this paper, we investigate the achievable rate of a diffusive Molecular Communication (MC) channel with fully absorbing receiver, which counts particles absorbed along each symbol interval and resets the counter at every interval (reset-counting). The MC channel is affected by a memory effect and thus inter-symbol interference (ISI), due to the delayed arrival of molecules. To reduce complexity, our analysis is based on measuring the channel memory as an integer number of symbol intervals and on a single-sample memoryless detector. Thus, in our model the effect of released particles remains effective for a limited number of symbol intervals. We optimize the detector threshold for maximizing capacity, approximate as Gaussian the received signal distribution, and calculate the channel mutual information affected by ISI, in the case of binary concentration shift keying modulation. To the best of our knowledge, in literature there are no previous investigations on the achievable rate in this type of system. Our results demonstrate that, in general, the optimal input probability distribution achieving the maximum achievable rate may be not uniform. In particular, when the symbol interval is small (strong ISI), the maximum achievable rate does not occur with equiprobable transmission of bits.

2.Pseudo-Random Quantization Based Two-Stage Detection in One-Bit Massive MIMO Systems

Authors:Gökhan Yılmaz, Ali Özgür Yılmaz

Abstract: Utilizing low-resolution analog-to-digital converters (ADCs) in uplink massive multiple-input multiple-output (MIMO) systems is a practical solution to decrease power consumption. The performance gap between the low and high-resolution systems is small at low signal-to-noise ratio (SNR) regimes. However, at high SNR and with high modulation orders, the achievable rate saturates after a finite SNR value due to the stochastic resonance (SR) phenomenon. This paper proposes a novel pseudo-random quantization (PRQ) scheme by modifying the quantization thresholds that can help compensate for the effects of SR and makes communication with high-order modulation schemes such as $1024$-QAM in one-bit quantized uplink massive MIMO systems possible. Moreover, modified linear detectors for non-zero threshold quantization are derived, and a two-stage uplink detector for single-carrier (SC) multi-user systems is proposed. The first stage is an iterative method called Boxed Newton Detector (BND) that utilizes Newton's Method to maximize the log-likelihood with box constraints. The second stage, Nearest Codeword Detector (NCD), exploits the first stage solution and creates a small set of most likely candidates based on sign constraints to increase detection performance. The proposed two-stage method with PRQ outperforms the state-of-the-art detectors from the literature with comparable complexity while supporting high-order modulation schemes.

3.Compressed Sensing Based Channel Estimation for Movable Antenna Communications

Authors:Wenyan Ma, Lipeng Zhu, Rui Zhang

Abstract: In this letter, we study the channel estimation for wireless communications with movable antenna (MA), which requires to reconstruct the channel response at any location in a given region where the transmitter/receiver is located based on the channel measurements taken at finite locations therein, so as to find the MA's location for optimizing the communication performance. To reduce the pilot overhead and computational complexity for channel estimation, we propose a new successive transmitter-receiver compressed sensing (STRCS) method by exploiting the efficient representation of the channel responses in the given transmitter/receiver region (field) in terms of multi-path components. Specifically, the field-response information (FRI) in the angular domain, including the angles of departure (AoDs)/angles of arrival (AoAs) and complex coefficients of all significant multi-path components are sequentially estimated based on a finite number of channel measurements taken at random/selected locations by the MA at the transmitter and/or receiver. Simulation results demonstrate that the proposed channel reconstruction method outperforms the benchmark schemes in terms of both pilot overhead and channel reconstruction accuracy.

4.Quasi-Newton Detection in One-Bit Pseudo-Randomly Quantized Wideband Massive MIMO Systems

Authors:Gökhan Yılmaz, Ali Özgür Yılmaz

Abstract: Using low-resolution analog-to-digital converters (ADCs) is a valuable solution to decrease power consumption and cost in massive MIMO systems. Previous studies show that the performance gap between low and high-resolution systems gets more prominent as the signal-to-noise ratio (SNR) increases since the detection performance starts to saturate at some point due to the stochastic resonance (SR) phenomenon. In our previous work, we proposed new quantization and detection schemes for one-bit massive MIMO systems operating under frequency-flat fading. This paper offers a new frequency domain equalization (FDE) scheme that can work with the previously proposed pseudo-random quantization (PRQ) scheme to mitigate the effects of SR to support high-order modulation schemes such as $64$-QAM and $256$-QAM. Our equalizer is based on a projected quasi-Newton method for one-bit uplink massive MIMO systems applicable for orthogonal frequency division multiplexing (OFDM) and single carrier (SC) transmission under frequency-selective fading. The proposed low-complexity detector can outperform the benchmark detector from the literature with very similar complexity. We analyze the effects of PRQ under frequency-selective fading for different scenarios and show that the PRQ scheme can close the performance gap between SC and OFDM systems by simulations.

5.Randomized Decoding of Linearized Reed-Solomon Codes Beyond the Unique Decoding Radius

Authors:Thomas Jerkovits, Hannes Bartz, Antonia Wachter-Zeh

Abstract: In this paper we address the problem of decoding linearized Reed-Solomon (LRS) codes beyond their unique decoding radius. We analyze the complexity in order to evaluate if the considered problem is of cryptographic relevance, i.e., can be used to design cryptosystems that are computationally hard to break. We show that our proposed algorithm improves over other generic algorithms that do not take into account the underlying code structure.

6.A Mirror Descent Perspective on Classical and Quantum Blahut-Arimoto Algorithms

Authors:Kerry He, James Saunderson, Hamza Fawzi

Abstract: The Blahut-Arimoto algorithm is a well known method to compute classical channel capacities and rate-distortion functions. Recent works have extended this algorithm to compute various quantum analogs of these quantities. In this paper, we show how these Blahut-Arimoto algorithms are special instances of mirror descent, which is a well-studied generalization of gradient descent for constrained convex optimization. Using new convex analysis tools, we show how relative smoothness and strong convexity analysis recovers known sublinear and linear convergence rates for Blahut-Arimoto algorithms. This mirror descent viewpoint allows us to derive related algorithms with similar convergence guarantees to solve problems in information theory for which Blahut-Arimoto-type algorithms are not directly applicable. We apply this framework to compute energy-constrained classical and quantum channel capacities, classical and quantum rate-distortion functions, and approximations of the relative entropy of entanglement, all with provable convergence guarantees.

7.Secure Integrated Sensing and Communication Exploiting Target Location Distribution

Authors:Kaiyue Hou, Shuowen Zhang

Abstract: In this paper, we study a secure integrated sensing and communication (ISAC) system where one multi-antenna base station (BS) simultaneously serves a downlink communication user and senses the location of a target that may potentially serve as an eavesdropper via its reflected echo signals. Specifically, the location information of the target is unknown and random, while its a priori distribution is available for exploitation. First, to characterize the sensing performance, we derive the posterior Cram\'er-Rao bound (PCRB) which is a lower bound of the mean squared error (MSE) for target sensing exploiting prior distribution. Due to the intractability of the PCRB expression, we further derive a novel approximate upper bound of it which has a closed-form expression. Next, under an artificial noise (AN) based beamforming structure at the BS to alleviate information eavesdropping and enhance the target's reflected signal power for sensing, we formulate a transmit beamforming optimization problem to maximize the worst-case secrecy rate among all possible target (eavesdropper) locations, under a sensing accuracy threshold characterized by an upper bound on the PCRB. Despite the non-convexity of the formulated problem, we propose a two-stage approach to obtain its optimal solution by leveraging the semi-definite relaxation (SDR) technique. Numerical results validate the effectiveness of our proposed transmit beamforming design and demonstrate the non-trivial trade-off between secrecy performance and sensing performance in secure ISAC systems.

8.Bayesian Extensive-Rank Matrix Factorization with Rotational Invariant Priors

Authors:Farzad Pourkamali, Nicolas Macris

Abstract: We consider a statistical model for matrix factorization in a regime where the rank of the two hidden matrix factors grows linearly with their dimension and their product is corrupted by additive noise. Despite various approaches, statistical and algorithmic limits of such problems have remained elusive. We study a Bayesian setting with the assumptions that (a) one of the matrix factors is symmetric, (b) both factors as well as the additive noise have rotational invariant priors, (c) the priors are known to the statistician. We derive analytical formulas for Rotation Invariant Estimators to reconstruct the two matrix factors, and conjecture that these are optimal in the large-dimension limit, in the sense that they minimize the average mean-square-error. We provide numerical checks which confirm the optimality conjecture when confronted to Oracle Estimators which are optimal by definition, but involve the ground-truth. Our derivation relies on a combination of tools, namely random matrix theory transforms, spherical integral formulas, and the replica method from statistical mechanics.