total 26469took 0.12s

Buffer-aided Resource Allocation for a Price Based Opportunistic Cognitive Radio NetworkMay 17 2019In this paper, a resource allocation problem for an opportunistic cooperative cognitive radio network is considered, where cognitive radio nodes send their hard decisions to the fusion center. The fusion center plays dual role, i.e., takes the global ... More

Random Sampling for Distributed Coded Matrix MultiplicationMay 16 2019Matrix multiplication is a fundamental building block for large scale computations arising in various applications, including machine learning. There has been significant recent interest in using coding to speed up distributed matrix multiplication, that ... More

Bit-Swap: Recursive Bits-Back Coding for Lossless Compression with Hierarchical Latent VariablesMay 16 2019The bits-back argument suggests that latent variable models can be turned into lossless compression schemes. Translating the bits-back argument into efficient and practical lossless compression schemes for general latent variable models, however, is still ... More

On ZpZp[u, v]-additive cyclic and constacyclic codesMay 16 2019Let $\mathbb{Z}_{p}$ be the ring of residue classes modulo a prime $p$. The $\mathbb{Z}_{p}\mathbb{Z}_{p}[u,v]$-additive cyclic codes of length $(\alpha,\beta)$ is identify as $\mathbb{Z}_{p}[u,v][x]$-submodule of $\mathbb{Z}_{p}[x]/\langle x^{\alpha}-1\rangle ... More

Optimal Status Updating with a Finite-Battery Energy Harvesting SourceMay 16 2019We consider an energy harvesting source equipped with a finite battery, which needs to send timely status updates to a remote destination. The timeliness of status updates is measured by a non-decreasing penalty function of the Age of Information (AoI). ... More

An Information Theoretic Interpretation to Deep Neural NetworksMay 16 2019It is commonly believed that the hidden layers of deep neural networks (DNNs) attempt to extract informative features for learning tasks. In this paper, we formalize this intuition by showing that the features extracted by DNN coincide with the result ... More

An Unified Approach on Constructing of MDS Self-dual Codes via Reed-Solomon CodesMay 16 2019Based on the fundamental results on MDS self-dual codes over finite fields constructed via generalized Reed-Solomon codes \cite{JX} and extended generalized Reed-Solomon codes \cite{Yan}, many series of MDS self-dual codes with different length have been ... More

Efficient Scheduling for the Massive Random Access Gaussian ChannelMay 16 2019This paper investigates the massive random access Gaussian channel with a focus on small payloads. For this problem, grant-based schemes have been regarded as inefficient due to the necessity of large feedbacks and the use of inefficient scheduling request ... More

On the Automatic Parameter Selection for Permutation EntropyMay 15 2019Permutation Entropy (PE) has been shown to be a useful tool for time series analysis due to its low computational cost and noise robustness. This has drawn for its successful application in many fields. Some of these include damage detection, disease ... More

Transfer Entropy in Continuous TimeMay 15 2019Transfer entropy (TE) was introduced by Schreiber in 2000 as a measurement of the predictive capacity of one stochastic process with respect to another. Originally stated for discrete time processes, we expand the theory of TE to stochastic processes ... More

Performance Analysis of SPAD-based OFDMMay 15 2019In this paper, an analytical approach for the nonlinear distorted bit error rate performance of optical orthogonal frequency division multiplexing (O-OFDM) with single photon avalanche diode (SPAD) receivers is presented. Major distortion effects of passive ... More

Massive MIMO for Internet of Things (IoT) ConnectivityMay 15 2019Massive MIMO is considered to be one of the key technologies in the emerging 5G systems, but also a concept applicable to other wireless systems. Exploiting the large number of degrees of freedom (DoFs) of massive MIMO essential for achieving high spectral ... More

MmWave UAV Networks with Multi-cell Association: Performance Limit and OptimizationMay 15 2019This paper aims to exploit the fundamental limits on the downlink coverage and spatial throughput performances of a cellular network consisting a tier of unmanned aerial vehicle (UAV) base stations (BSs) using the millimeter wave (mmWave) band and a tier ... More

An Energy-Efficient Controller for Wirelessly-Powered Communication NetworksMay 15 2019In a wirelessly-powered communication network (WPCN), an energy access point (E-AP) supplies the energy needs of the network nodes through radio frequency wave transmission, and the nodes store their received energy in their batteries for possible data ... More

Deep Reinforcement Learning for Scheduling in Cellular NetworksMay 15 2019Integrating artificial intelligence (AI) into wireless networks has drawn significant interest in both industry and academia. A common solution is to replace partial or even all modules in the conventional systems, which is often lack of efficiency and ... More

Time-Varying Downlink Channel Tracking for Quantized Massive MIMO NetworksMay 15 2019This paper proposes a Bayesian downlink channel estimation algorithm for time-varying massive MIMO networks. In particular, the quantization effects at the receiver are considered. In order to fully exploit the sparsity and time correlations of channels, ... More

Doubly transitive lines II: Almost simple symmetriesMay 15 2019We study lines through the origin of finite-dimensional complex vector spaces that enjoy a doubly transitive automorphism group. This paper, the second in a series, classifies those lines that exhibit almost simple symmetries. To perform this classification, ... More

Performance Analysis of Non-DC-Biased OFDMMay 14 2019The performance analysis of a novel optical modulation scheme is presented in this paper. The basic concept is to transmit signs of modulated optical orthogonal frequency division multiplexing (O-OFDM) symbols and absolute values of the symbols separately ... More

Robust Precoding Design for Coarsely Quantized MU-MIMO Under Channel UncertaintiesMay 14 2019Recently, multi-user multiple input multiple output (MU-MIMO) systems with low-resolution digital-to-analog converters (DACs) has received considerable attention, owing to the capability of dramatically reducing the hardware cost. Besides, it has been ... More

Low Complexity Algorithms for Robust Multigroup Multicast BeamformingMay 14 2019Existing methods for robust multigroup multicast beamforming obtain feasible points using semidefinite relaxation (SDR) and Gaussian randomization, and have high computational complexity. In this letter, we consider the robust multigroup multicast beamforming ... More

Coded Distributed TrackingMay 14 2019We consider the problem of tracking the state of a process that evolves over time in a distributed setting, with multiple observers each observing parts of the state, which is a fundamental information processing problem with a wide range of applications. ... More

A Novel Beamformed Control Channel Design for LTE with Full Dimension-MIMOMay 14 2019The Full Dimension-MIMO (FD-MIMO) technology is capable of achieving huge improvements in network throughput with simultaneous connectivity of a large number of mobile wireless devices, unmanned aerial vehicles, and the Internet of Things (IoT). In FD-MIMO, ... More

UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security PerspectiveMay 14 2019Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In this case, the management of multiple UAVs is important. This paper considers the power allocation ... More

D2D Assisted Beamforming for Coded CachingMay 14 2019Device-to-device (D2D) aided beamforming for coded caching is considered in finite signal-to-noise ratio regime. A novel beamforming scheme is proposed where the local cache content exchange among nearby users is exploited. The transmission is split into ... More

Comparison-limited Vector QuantizationMay 14 2019A variation of the classic vector quantization problem is considered, in which the analog-to-digital (A2D) conversion is not constrained by the cardinality of the output but rather by the number of comparators available for quantization. More specifically, ... More

Stochastic Gradient Coding for Straggler Mitigation in Distributed LearningMay 14 2019We consider distributed gradient descent in the presence of stragglers. Recent work on \em gradient coding \em and \em approximate gradient coding \em have shown how to add redundancy in distributed gradient descent to guarantee convergence even if some ... More

Learning for Matching Game in Cooperative D2D Communication with Incomplete InformationMay 14 2019This paper considers a cooperative device-to-device (D2D) communication system, where the D2D transmitters (DTs) act as relays to assist cellular users (CUs) in exchange for the opportunities to use licensed spectrum. Based on the interaction of each ... More

Study of Channel Estimation with Oversampling for 1-bit Large-Scale MIMO SystemsMay 13 2019In this paper, we propose an oversampling based low-resolution aware least squares channel estimator for large-scale multiple-antenna systems with 1-bit analog-to-digital converters on each receive antenna. To mitigate the information loss caused by the ... More

RF Chain Reduction for MIMO Systems: A Hardware PrototypeMay 13 2019RF chain circuits play a major role in digital receiver architectures, allowing passband communication signals to be processed in baseband. When operating at high frequencies, these circuits tend to be costly. This increased cost imposes a major limitation ... More

Generalized Approximate Survey Propagation for High-Dimensional EstimationMay 13 2019In Generalized Linear Estimation (GLE) problems, we seek to estimate a signal that is observed through a linear transform followed by a component-wise, possibly nonlinear and noisy, channel. In the Bayesian optimal setting, Generalized Approximate Message ... More

Transtemporal edges and crosslayer edges in incompressible high-order networksMay 13 2019This work presents some outcomes of a theoretical investigation of incompressible high-order networks defined by a generalized graph representation. We study some of their network topological properties and how these may be related to real-world complex ... More

Deep Multi-Agent Reinforcement Learning Based Cooperative Edge Caching in Wireless NetworksMay 13 2019The growing demand on high-quality and low-latency multimedia services has led to much interest in edge caching techniques. Motivated by this, we in this paper consider edge caching at the base stations with unknown content popularity distributions. To ... More

RLS Precoding for Massive MIMO Systems with Nonlinear Front-EndMay 13 2019To keep massive MIMO systems cost-efficient, power amplifiers with rather small output dynamic ranges are employed. They may distort the transmit signal and degrade the performance. This paper proposes a distortion aware precoding scheme for realistic ... More

RLS-Based Detection for Massive Spatial Modulation MIMOMay 13 2019Most detection algorithms in spatial modulation (SM) are formulated as linear regression via the regularized least-squares (RLS) method. In this method, the transmit signal is estimated by minimizing the residual sum of squares penalized with some regularization. ... More

Radio Map Based Path Planning for Cellular-Connected UAVMay 13 2019In this paper, we study the path planning for a cellular-connected unmanned aerial vehicle (UAV) to minimize its flying distance from given initial to final locations, while ensuring a target link quality in terms of the large-scale channel gain with ... More

Construction of three classes of Strictly Optimal Frequency-Hopping Sequence SetsMay 13 2019In this paper, we construct three classes of strictly optimal frequency-hopping sequence (FHS) sets with respect to partial Hamming correlation and family size. The first class is based on a generic construction, the second and third classes are based ... More

Massive MIMO Extensions to the COST 2100 Channel Model: Modeling and ValidationMay 13 2019To enable realistic studies of massive multiple-input multiple-output systems, the COST 2100 channel model is extended based on measurements. First, the concept of a base station-side visibility region (BS-VR) is proposed to model the appearance and disappearance ... More

Low Noise Non-Linear Equalization Using Neural Networks and Belief PropagationMay 13 2019Nonlinearities can be introduced into communication systems by the physical components such as the power amplifier, or during signal propagation through a nonlinear channel. These nonlinearities can be compensated by a nonlinear equalizer at the receiver ... More

Low Noise Non-Linear Equalization Using Neural Networks and Belief PropagationMay 13 2019May 14 2019Nonlinearities can be introduced into communication systems by the physical components such as the power amplifier, or during signal propagation through a nonlinear channel. These nonlinearities can be compensated by a nonlinear equalizer at the receiver ... More

Secure Hybrid Digital and Analog Precoder for mmWave Systems with low-resolution DACs and finite-quantized phase shiftersMay 13 2019Millimeter wave (mmWave) communication has been regarded as one of the most promising technologies for the future generation wireless networks because of its advantages of providing a ultra-wide new spectrum and ultra-high data transmission rate. To reduce ... More

Structured Mappings and Conferencing Common Information for Multiple-access ChannelsMay 12 2019In this work, we study two problems: three-user Multiple-Access Channel (MAC) with correlated sources, and MAC with Feedback (MAC-FB) with independent messages. For the first problem, we identify a structure in the joint probability distribution of discrete ... More

Ultra-small Cell Networks with Collaborative RF and Lightwave Power TransferMay 12 2019This paper investigates a hybrid radio frequency (RF)/visible light communication (VLC) ultra-small cell network consisting of multiple optical angle-diversity transmitters, one multi-antenna RF access point (AP), and multiple terminal devices. In the ... More

Terahertz-Band Ultra-Massive Spatial Modulation MIMOMay 12 2019The prospect of ultra-massive multiple-input multiple-output (UM-MIMO) technology to combat the distance problem at the Terahertz (THz)-band is considered. It is well-known that the very large available bandwidths at THz frequencies come at the cost of ... More

Deep Vocoder: Low Bit Rate Speech Compression of Speech with Deep AutoencoderMay 12 2019Inspired by the success of deep neural networks (DNNs) in speech processing, this paper presents Deep Vocoder, a direct end-to-end low bit rate speech compression method with deep autoencoder (DAE). In Deep Vocoder, DAE is used for extracting the latent ... More

Deep Vocoder: Low Bit Rate Compression of Speech with Deep AutoencoderMay 12 2019May 14 2019Inspired by the success of deep neural networks (DNNs) in speech processing, this paper presents Deep Vocoder, a direct end-to-end low bit rate speech compression method with deep autoencoder (DAE). In Deep Vocoder, DAE is used for extracting the latent ... More

A New Look at an Old Problem: A Universal Learning Approach to Linear RegressionMay 12 2019Linear regression is a classical paradigm in statistics. A new look at it is provided via the lens of universal learning. In applying universal learning to linear regression the hypotheses class represents the label $y\in {\cal R}$ as a linear combination ... More

Sparse Recovery Beyond Compressed Sensing: Separable Nonlinear Inverse ProblemsMay 12 2019Extracting information from nonlinear measurements is a fundamental challenge in data analysis. In this work, we consider separable inverse problems, where the data are modeled as a linear combination of functions that depend nonlinearly on certain parameters ... More

Interference Mitigation and Resource Allocation in Underlay Cognitive Radio NetworksMay 11 2019Due to ever increasing usage of wireless devices and data hungry applications, it has become necessary to improve the spectral efficiency of existing wireless networks. One way of improving spectral efficiency is to share the spectrum amongst different ... More

Hessian transport Gradient flowsMay 11 2019We derive new gradient flows of divergence functions in the probability space embedded with a class of Riemannian metrics. The Riemannian metric tensor is built from the transported Hessian operator of an entropy function. The new gradient flow is a generalized ... More

Hessian transport gradient flowsMay 11 2019May 14 2019We derive new gradient flows of divergence functions in the probability space embedded with a class of Riemannian metrics. The Riemannian metric tensor is built from the transported Hessian operator of an entropy function. The new gradient flow is a generalized ... More

Sparse Optimization Problem with s-difference RegularizationMay 11 2019In this paper, a s-difference type regularization for sparse recovery problem is proposed, which is the difference of the normal penalty function R(x) and its corresponding struncated function R (xs). First, we show the equivalent conditions between the ... More

On the Compositionality of Dynamic Leakage and Its Application to the Quantification ProblemMay 11 2019Quantitative information flow (QIF) is traditionally defined as the expected value of information leakage over all feasible program runs and it fails to identify vulnerable programs where only limited number of runs leak large amount of information. As ... More

User Association in Dense mmWave Networks based on Rate RequirementsMay 10 2019Commonly considered user association frameworks in millimeter-wave communications are based on the sum rate maximization, and they essentially neglect user specific rate and service requirements. Furthermore, new features of millimeter-wave communications ... More

Channels, Learning, Queueing and Remote Estimation Systems With A Utilization-Dependent ComponentMay 10 2019In this article, we survey the main models, techniques, concepts, and results centered on the design and performance evaluation of engineered systems that rely on a utilization-dependent component (UDC) whose operation may depend on its usage history ... More

Kesten-McKay law for random subensembles of Paley equiangular tight framesMay 10 2019We apply the method of moments to prove a recent conjecture of Haikin, Zamir and Gavish (2017) concerning the distribution of the singular values of random subensembles of Paley equiangular tight frames. Our analysis applies more generally to real equiangular ... More

Subpacketization-Rate Trade-off in Multi-Antenna Coded CachingMay 10 2019Coded caching can be applied in wireless multi-antenna communications by multicast beamforming coded data chunks to carefully selected user groups and using the existing file fragments in user caches to decode the desired files at each user. However, ... More

Quantifying information flow in interactive systemsMay 10 2019We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is deterministic then the information flow is either logarithmic ... More

Delay Parameter Selection in Permutation Entropy Using Topological Data AnalysisMay 10 2019Permutation Entropy (PE) is a powerful tool for quantifying the predictability of a sequence which includes measuring the regularity of a time series. Despite its successful application in a variety of scientific domains, PE requires a judicious choice ... More

Primary User Localization and Online Radio Cartography via Structured Tensor DecompositionMay 10 2019Source localization and radio cartography using multi-way representation of spectrum is the subject of study in this paper. A joint matrix factorization and tensor decomposition problem is proposed and solved using an iterative algorithm. The multi-way ... More

A One-Round Key Agreement Protocol with Information-Theoretic SecurityMay 10 2019Information-theoretic secure key agreement protocols do not use computational assumptions and will stay secure with future advances in computing technologies. We consider a setting where Alice and Bob have access to correlated variables, and use a public ... More

Mutual Information Scaling and Expressive Power of Sequence ModelsMay 10 2019Sequence models assign probabilities to variable-length sequences such as natural language texts. The ability of sequence models to capture temporal dependence can be characterized by the temporal scaling of correlation and mutual information. In this ... More

Power Efficient Visible Light Communication (VLC) with Unmanned Aerial Vehicles (UAVs)May 10 2019A novel approach that combines visible light communication (VLC) with unmanned aerial vehicles (UAVs) to simultaneously provide flexible communication and illumination is proposed. To minimize the power consumption, the locations of UAVs and the cell ... More

On the Distribution of AoI for the GI/GI/1/1 and GI/GI/1/2* Systems: Exact Expressions and BoundsMay 10 2019Since Age of Information (AoI) has been proposed as a metric that quantifies the freshness of information updates in a communication system, there has been a constant effort in understanding and optimizing different statistics of the AoI process for classical ... More

Intelligent User Association for Symbiotic Radio Networks using Deep Reinforcement LearningMay 10 2019In this paper, we are interested in symbiotic radio networks, in which an Internet-of-Things (IoT) network parasitizes in a primary network to achieve spectrum-, energy-, and infrastructure-efficient communications. Specifically, the BS serves multiple ... More

Efficient Channel AoD/AoA Estimation Using Widebeams for Millimeter Wave MIMO SystemsMay 10 2019Using millimeter-wave (mmWave) bands is expected to provide high data rates through large licensed and unlicensed spectrum. Due to large path loss and sparse scattering propagation properties, proper beam alignment is important in mmWave systems. Small ... More

Beamforming Algorithm for Multiuser Wideband Millimeter-Wave Systems with Hybrid and Subarray ArchitecturesMay 10 2019We present a beamforming algorithm for multiuser wideband millimeter wave (mmWave) communication systems where one access point uses hybrid analog/digital beamforming while multiple user stations have phased-arrays with a single RF chain. The algorithm ... More

Analysis of Approximate Message Passing with Non-Separable Denoisers and Markov Random Field PriorsMay 10 2019Approximate message passing (AMP) is a class of low-complexity, scalable algorithms for solving high-dimensional linear regression tasks where one wishes to recover an unknown signal from noisy, linear measurements. AMP is an iterative algorithm that ... More

On Unlimited Sampling and ReconstructionMay 10 2019Shannon's sampling theorem is one of the cornerstone topics that is well understood and explored, both mathematically and algorithmically. That said, practical realization of this theorem still suffers from a severe bottleneck due to the fundamental assumption ... More

Maximum A Posteriori Probability (MAP) Joint Fine Frequency Offset and Channel Estimation for MIMO Systems with Channels of Arbitrary CorrelationMay 09 2019Channel and frequency offset estimation is a classic topic with a large body of prior work using mainly maximum likelihood (ML) approach together with Cram\'er-Rao Lower bounds (CRLB) analysis. We provide the maximum a posteriori (MAP) estimation solution ... More

Deep Learning for TDD and FDD Massive MIMO: Mapping Channels in Space and FrequencyMay 09 2019Can we map the channels at one set of antennas and one frequency band to the channels at another set of antennas---possibly at a different location and a different frequency band? If this channel-to-channel mapping is possible, we can expect dramatic ... More

Practical Algebraic Attack on DAGSMay 09 2019DAGS scheme is a key encapsulation mechanism (KEM) based on quasi-dyadic alternant codes that was submitted to NIST standardization process for a quantum resistant public key algorithm. Recently an algebraic attack was devised by Barelli and Couvreur ... More

Learning Representations for Predicting Future ActivitiesMay 09 2019Foreseeing the future is one of the key factors of intelligence. It involves understanding of the past and current environment as well as decent experience of its possible dynamics. In this work, we address future prediction at the abstract level of activities. ... More

Stochastic Fading Channel Models with Multiple Dominant Specular Components for 5G and BeyondMay 09 2019We introduce a comprehensive statistical characterization of the multipath wireless channel built as a superposition of a number of scattered waves with random phases. We consider an arbitrary number $N$ of specular (dominant) components plus other diffusely ... More

Fog-Aided Device to Device Networks with Opportunistic Content DeliveryMay 09 2019In this paper, we investigate the caching placement and content delivery strategy in large-scale fog-aided device to device (F-D2D) networks by exploring the idea of opportunistic spectrum access (OSA) which is originally introduced in cognitive radio ... More

Limits of Deepfake Detection: A Robust Estimation ViewpointMay 09 2019Deepfake detection is formulated as a hypothesis testing problem to classify an image as genuine or GAN-generated. A robust statistics view of GANs is considered to bound the error probability for various GAN implementations in terms of their performance. ... More

Joint power and resource allocation of D2D communication with low-resolution ADCMay 09 2019This paper considers the joint power control and resource allocation for a device-to-device (D2D) underlay cellular system with a multi-antenna BS employing ADCs with different resolutions. We propose a four-step algorithm that optimizes the ADC resolution ... More

Learning Erdős-Rényi Random Graphs via Edge Detecting QueriesMay 09 2019May 11 2019In this paper, we consider the problem of learning an unknown graph via queries on groups of nodes, with the result indicating whether or not at least one edge is present among those nodes. While learning arbitrary graphs with $n$ nodes and $k$ edges ... More

Learning Erdős-Rényi Random Graphs via Edge Detecting QueriesMay 09 2019In this paper, we consider the problem of learning an unknown graph via queries on groups of nodes, with the result indicating whether or not at least one edge is present among those nodes. While learning arbitrary graphs with $n$ nodes and $k$ edges ... More

On Coverage Probability in Uplink NOMA With Instantaneous Signal Power-Based User RankingMay 08 2019In uplink non-orthogonal multiple access (NOMA) networks, the order of decoding at the base station (BS) depends on the received instantaneous signal powers (ISPs). Therefore, the signal-to-interference-plus-noise ratio (SINR) coverage probability for ... More

Bounds on Lyapunov exponentsMay 08 2019Lyapunov exponents describe the asymptotic behavior of the singular values of large products of random matrices. A direct computation of these exponents is however often infeasible. Here we derive an analytical upper and lower bound for the maximal and ... More

On Timely Channel Coding with Hybrid ARQMay 08 2019A status updating communication system is examined, in which a transmitter communicates with a receiver over a noisy channel. The goal is to realize timely delivery of fresh data over time, which is assessed by an age-of-information (AoI) metric. Channel ... More

Multi-target Detection with an Arbitrary Spacing DistributionMay 08 2019Motivated by the structure reconstruction problem in cryo-electron microscopy, we consider the multi-target detection model, where multiple copies of a target signal occur at unknown locations in a long measurement, further corrupted by additive Gaussian ... More

Tropical probability theory and an application to the entropic coneMay 08 2019In a series of articles, we have been developing a theory of tropical diagrams of probability spaces, expecting it to be useful for information optimization problems in information theory and artificial intelligence. In this article, we give a summary ... More

Tropical diagrams of probability spacesMay 08 2019After endowing the space of diagrams of probability spaces with an entropy distance, we study its large-scale geometry by identifying the asymptotic cone as a closed convex cone in a Banach space. We call this cone the tropical cone, and its elements ... More

Arrow Contraction and Expansion in Tropical DiagramsMay 08 2019Arrow contraction applied to a tropical diagram of probability spaces is a modification of the diagram, replacing one of the morphisms by an isomorphims, while preserving other parts of the diagram. It is related to the rate regions introduced by Ahlswede ... More

Conditioning in tropical probability theoryMay 08 2019We define a natural operation of conditioning of tropical diagrams of probability spaces and show that it is Lipschitz continuous with respect to the asymptotic entropy distance.

Explicit representation for a class of Type 2 constacyclic codes over the ring $\mathbb{F}_{2^m}[u]/\langle u^{2λ}\rangle$ with even lengthMay 08 2019Let $\mathbb{F}_{2^m}$ be a finite field of cardinality $2^m$, $\lambda$ and $k$ be integers satisfying $\lambda,k\geq 2$ and denote $R=\mathbb{F}_{2^m}[u]/\langle u^{2\lambda}\rangle$. Let $\delta,\alpha\in \mathbb{F}_{2^m}^{\times}$. For any odd positive ... More

The Method of Conditional Expectations for Cubic Metric Reduction in OFDMMay 08 2019High variations in the OFDM signal envelope cause nonlinear distortion in the power amplifier of the transmitter, which is a major drawback. Peak-to-Average Power Ratio (PAPR) and Cubic Metric (CM) are commonly used for quantifying this characteristic ... More

An Entropy Power Inequality for Discrete Random VariablesMay 08 2019Let $\mathsf{N}_{\rm d}\left[X\right]=\frac{1}{2\pi {\rm e}}{\rm e}^{2\mathsf{H}\left[X\right]}$ denote the entropy power of the discrete random variable $X$ where $\mathsf{H}\left[X\right]$ denotes the discrete entropy of $X$. In this paper, we show ... More

Deep Reinforcement Learning for Minimizing Age-of-Information in UAV-assisted NetworksMay 08 2019Unmanned aerial vehicles (UAVs) are expected to be a key component of the next-generation wireless systems. Due to their deployment flexibility, UAVs are being considered as an efficient solution for collecting information data from ground nodes and transmitting ... More

A Two-Stage Beam Alignment Framework for Hybrid MmWave Distributed Antenna SystemsMay 08 2019In this paper, we investigate the beam alignment problem in millimeter-wave (mmWave) distributed antenna systems where a home base station communicates with multiple users through a number of distributed remote radio units (RRUs). Specifically, a two-stage ... More

Redesigning Telecommunication Engineering Courses with CDIO geared for Polytechnic EducationMay 08 2019Whether in chemical, civil, mechanical, electrical, or their related engineering subdisciplines, remaining up-to-date in the subject matter is crucial. However, due to the pace of technological evolution, information and communications technology (ICT) ... More

Spectrum Sharing in Vehicular Networks Based on Multi-Agent Reinforcement LearningMay 08 2019This paper investigates the spectrum sharing problem in vehicular networks based on multi-agent reinforcement learning, where multiple vehicle-to-vehicle (V2V) links reuse the frequency spectrum preoccupied by vehicle-to-infrastructure (V2I) links. Fast ... More

On recoverability of finite traces of square-summable sequencesMay 08 2019The paper investigates recoverability of infinite sequences (discrete time signals) from incomplete observations. It is shown that under very mild restrictions on the location of the observed and missed data, recoverability of finite traces of signals ... More

Adaptive Causal Network Coding with Feedback for Delay and Throughput GuaranteesMay 08 2019We propose a novel causal coding scheme with forward error correction (FEC) for a point-to-point communication link with delayed feedback. The proposed model can learn the erasure pattern in the channel, and adaptively adjust its transmission and FEC ... More

Fundamental Limits of Identification System With Secret Binding Under Noisy EnrollmentMay 08 2019We investigate fundamental limits among identification, secrecy, template, and privacy-leakage rates in biometric identification system with secret binding from an information theoretic perspective. Ignatenko and Willems (2015) studied the system with ... More

Network Coding Gaps for Completion Times of Multiple UnicastsMay 07 2019Arguably the most common network communication problem is multiple-unicasts: Distinct packets at different nodes in a network need to be delivered to a destination specific to each packet as fast as possible. The famous multiple-unicast conjecture posits ... More

Code Design Principles for Ultra-Reliable Random Access with Preassigned PatternsMay 07 2019We study medium access control layer random access under the assumption that the receiver can perform successive interference cancellation, without feedback. During recent years, a number of protocols with impressive error performance have been suggested ... More

Somatic mutations render human exome and pathogen DNA more similarMay 07 2019Immunotherapy has recently shown important clinical successes in a substantial number of oncology indications. Additionally, the tumor somatic mutation load has been shown to associate with response to these therapeutic agents, and specific mutational ... More

A Multistage Method for SCMA Codebook Design Based on MDS CodesMay 07 2019Sparse Code Multiple Access (SCMA) has been recently proposed for the future generation of wireless communication standards. SCMA system design involves specifying several parameters. In order to simplify the procedure, most works consider a multistage ... More