Information Theory (cs.IT)
Mon, 17 Apr 2023
1.Collaborative Bearing Estimation Using Set Membership Methods
Authors:Mohammad Zamani, Jochen Trumpf, Chris Manzie
Abstract: We consider the problem of collaborative bearing estimation using a method with historic roots in set theoretic estimation techniques. We refer to this method as the Convex Combination Ellipsoid (CCE) method and show that it provides a less conservative covariance estimate than the well known Covariance Intersection (CI) method. The CCE method does not introduce additional uncertainty that was not already present in the prior estimates. Using our proposed approach for collaborative bearing estimation, the nonlinearity of the bearing measurement is captured as an uncertainty ellipsoid thereby avoiding the need for linearization or approximation via sampling procedures. Simulations are undertaken to evaluate the relative performance of the collaborative bearing estimation solution using the proposed (CCE) and typical (CI) methods.
2.Orthogonal AMP for Problems with Multiple Measurement Vectors and/or Multiple Transforms
Authors:Yiyao Cheng, Lei Liu, Shansuo Liang, Jonathan. H. Manton, Li Ping
Abstract: Approximate message passing (AMP) algorithms break a (high-dimensional) statistical problem into parts then repeatedly solve each part in turn, akin to alternating projections. A distinguishing feature is their asymptotic behaviours can be accurately predicted via their associated state evolution equations. Orthogonal AMP (OAMP) was recently developed to avoid the need for computing the so-called Onsager term in traditional AMP algorithms, providing two clear benefits: the derivation of an OAMP algorithm is both straightforward and more broadly applicable. OAMP was originally demonstrated for statistical problems with a single measurement vector and single transform. This paper extends OAMP to statistical problems with multiple measurement vectors (MMVs) and multiple transforms (MTs). We name the resulting algorithms as OAMP-MMV and OAMP-MT respectively, and their combination as augmented OAMP (A-OAMP). Whereas the extension of traditional AMP algorithms to such problems would be challenging, the orthogonal principle underpinning OAMP makes these extensions straightforward. The MMV and MT models are widely applicable to signal processing and communications. We present an example of MIMO relay system with correlated source data and signal clipping, which can be modelled as a joint MMV-MT system. While existing methods meet with difficulties in this example, OAMP offers an efficient solution with excellent performance.
3.Wireless Channel Charting: Theory, Practice, and Applications
Authors:Paul Ferrand, Maxime Guillaud, Christoph Studer, Olav Tirkkonen
Abstract: Channel charting is a recently proposed framework that applies dimensionality reduction to channel state information (CSI) in wireless systems with the goal of associating a pseudo-position to each mobile user in a low-dimensional space: the channel chart. Channel charting summarizes the entire CSI dataset in a self-supervised manner, which opens up a range of applications that are tied to user location. In this article, we introduce the theoretical underpinnings of channel charting and present an overview of recent algorithmic developments and experimental results obtained in the field. We furthermore discuss concrete application examples of channel charting to network- and user-related applications, and we provide a perspective on future developments and challenges as well as the role of channel charting in next-generation wireless networks.
4.Entanglement-assisted quantum error-correcting codes from subfield subcodes of projective Reed-Solomon codes
Authors:P. Gimenez, D. Ruano, R. San-José
Abstract: Subfield subcodes of Reed-Solomon codes and their duals, BCH codes, have been widely used for constructing quantum error-correcting codes with good parameters. In this paper, we study subfield subcodes of projective Reed-Solomon codes and their duals, we provide bases for these codes and estimate their parameters. With this knowledge, we can construct symmetric and asymmetric entanglement-assisted quantum error-correcting codes, which in many cases have new or better parameters than the ones available in the literature.
5.Secrecy Design of Indoor Visible Light Communication Network under Downlink NOMA Transmission
Authors:Tianji Shen, Vamoua Yachongka, Yuto Hama, Hideki Ochiai
Abstract: In this work, we investigate the transmission sum rate as well as the secrecy sum rate of indoor visible light communication (VLC) networks for mobile devices with the power domain non-orthogonal multiple access (NOMA) transmission, where multiple legitimate users are equipped with photodiodes (PDs). We introduce a body blockage model of the legitimate users as well as the eavesdropper to focus on the case where the communications from transmitting light-emitting diodes (LEDs) to receiving devices are blocked by the bodies of receiving users. Furthermore, in order to improve the secrecy without any knowledge of the channel state information (CSI) of the eavesdropper, a novel LED arrangement is introduced to reduce the overlapping area covered by LED units supporting different users. We also propose two LED operation strategies, called simple and smart LED linking, and evaluate their performance against the conventional broadcasting in terms of transmission sum rate and secrecy sum rate. Through computer simulations, the superiority of our proposed strategies is demonstrated.
6.Solving Systems of Algebraic Equations Over Finite Commutative Rings and Applications
Authors:Hermann Tchatchiem Kamche, Hervé Talé Kalachi
Abstract: Several problems in algebraic geometry and coding theory over finite rings are modeled by systems of algebraic equations. Among these problems, we have the rank decoding problem, which is used in the construction of public-key cryptography. In 2004, Nechaev and Mikhailov proposed two methods for solving systems of polynomial equations over finite chain rings. These methods used solutions over the residual field to construct all solutions step by step. However, for some types of algebraic equations, one simply needs partial solutions. In this paper, we combine two existing approaches to show how Gr\"obner bases over finite chain rings can be used to solve systems of algebraic equations over finite commutative rings. Then, we use skew polynomials and Pl\"ucker coordinates to show that some algebraic approaches used to solve the rank decoding problem and the MinRank problem over finite fields can be extended to finite principal ideal rings.