1,172 research outputs found

    Source and channel coding using Fountain codes

    Get PDF
    The invention of Fountain codes is a major advance in the field of error correcting codes. The goal of this work is to study and develop algorithms for source and channel coding using a family of Fountain codes known as Raptor codes. From an asymptotic point of view, the best currently known sum-product decoding algorithm for non binary alphabets has a high complexity that limits its use in practice. For binary channels, sum-product decoding algorithms have been extensively studied and are known to perform well. In the first part of this work, we develop a decoding algorithm for binary codes on non-binary channels based on a combination of sum-product and maximum-likelihood decoding. We apply this algorithm to Raptor codes on both symmetric and non-symmetric channels. Our algorithm shows the best performance in terms of complexity and error rate per symbol for blocks of finite length for symmetric channels. Then, we examine the performance of Raptor codes under sum-product decoding when the transmission is taking place on piecewise stationary memoryless channels and on channels with memory corrupted by noise. We develop algorithms for joint estimation and detection while simultaneously employing expectation maximization to estimate the noise, and sum-product algorithm to correct errors. We also develop a hard decision algorithm for Raptor codes on piecewise stationary memoryless channels. Finally, we generalize our joint LT estimation-decoding algorithms for Markov-modulated channels. In the third part of this work, we develop compression algorithms using Raptor codes. More specifically we introduce a lossless text compression algorithm, obtaining in this way competitive results compared to the existing classical approaches. Moreover, we propose distributed source coding algorithms based on the paradigm proposed by Slepian and Wolf

    Best Arm Identification Based Beam Acquisition in Stationary and Abruptly Changing Environments

    Full text link
    We study the initial beam acquisition problem in millimeter wave (mm-wave) networks from the perspective of best arm identification in multi-armed bandits (MABs). For the stationary environment, we propose a novel algorithm called concurrent beam exploration, CBE, in which multiple beams are grouped based on the beam indices and are simultaneously activated to detect the presence of the user. The best beam is then identified using a Hamming decoding strategy. For the case of orthogonal and highly directional thin beams, we characterize the performance of CBE in terms of the probability of missed detection and false alarm in a beam group (BG). Leveraging this, we derive the probability of beam selection error and prove that CBE outperforms the state-of-the-art strategies in this metric. Then, for the abruptly changing environments, e.g., in the case of moving blockages, we characterize the performance of the classical sequential halving (SH) algorithm. In particular, we derive the conditions on the distribution of the change for which the beam selection error is exponentially bounded. In case the change is restricted to a subset of the beams, we devise a strategy called K-sequential halving and exhaustive search, K-SHES, that leads to an improved bound for the beam selection error as compared to SH. This policy is particularly useful when a near-optimal beam becomes optimal during the beam-selection procedure due to abruptly changing channel conditions. Finally, we demonstrate the efficacy of the proposed scheme by employing it in a tandem beam refinement and data transmission scheme

    Neural network mechanisms of working memory interference

    Get PDF
    [eng] Our ability to memorize is at the core of our cognitive abilities. How could we effectively make decisions without considering memories of previous experiences? Broadly, our memories can be divided in two categories: long-term and short-term memories. Sometimes, short-term memory is also called working memory and throughout this thesis I will use both terms interchangeably. As the names suggest, long-term memory is the memory you use when you remember concepts for a long time, such as your name or age, while short-term memory is the system you engage while choosing between different wines at the liquor store. As your attention jumps from one bottle to another, you need to hold in memory characteristics of previous ones to pick your favourite. By the time you pick your favourite bottle, you might remember the prices or grape types of the other bottles, but you are likely to forget all of those details an hour later at home, opening the wine in front of your guests. The overall goal of this thesis is to study the neural mechanisms that underlie working memory interference, as reflected in quantitative, systematic behavioral biases. Ultimately, the goal of each chapter, even when focused exclusively on behavioral experiments, is to nail down plausible neural mechanisms that can produce specific behavioral and neurophysiological findings. To this end, we use the bump-attractor model as our working hypothesis, with which we often contrast the synaptic working memory model. The work performed during this thesis is described here in 3 main chapters, encapsulation 5 broad goals: In Chapter 4.1, we aim at testing behavioral predictions of a bump-attractor (1) network when used to store multiple items. Moreover, we connected two of such networks aiming to model feature-binding through selectivity synchronization (2). In Chapter 4.2, we aim to clarify the mechanisms of working memory interference from previous memories (3), the so-called serial biases. These biases provide an excellent opportunity to contrast activity-based and activity-silent mechanisms because both mechanisms have been proposed to be the underlying cause of those biases. In Chapter 4.3, armed with the same techniques used to seek evidence for activity-silent mechanisms, we test a prediction of the bump-attractor model with short-term plasticity (4). Finally, in light of the results from aim 4 and simple computer simulations, we reinterpret previous studies claiming evidence for activity-silent mechanisms (5)

    Unsupervised Learning on Monocular Videos for 3D Human Pose Estimation

    Full text link
    In the presence of annotated data, deep human pose estimation networks yield impressive performance. Nevertheless, annotating new data is extremely time-consuming, particularly in real-world conditions. Here, we address this by leveraging contrastive self-supervised (CSS) learning to extract rich latent vectors from single-view videos. Instead of simply treating the latent features of nearby frames as positive pairs and those of temporally-distant ones as negative pairs as in other CSS approaches, we explicitly disentangle each latent vector into a time-variant component and a time-invariant one. We then show that applying CSS only to the time-variant features, while also reconstructing the input and encouraging a gradual transition between nearby and away features, yields a rich latent space, well-suited for human pose estimation. Our approach outperforms other unsupervised single-view methods and matches the performance of multi-view techniques

    ํฌ์†Œ์ธ์ง€๋ฅผ ์ด์šฉํ•œ ์ „์†ก๊ธฐ์ˆ  ์—ฐ๊ตฌ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ •๋ณด๊ณตํ•™๋ถ€, 2019. 2. ์‹ฌ๋ณ‘ํšจ.The new wave of the technology revolution, named the fifth wireless systems, is changing our daily life dramatically. These days, unprecedented services and applications such as driverless vehicles and drone-based deliveries, smart cities and factories, remote medical diagnosis and surgery, and artificial intelligence-based personalized assistants are emerging. Communication mechanisms associated with these new applications and services are way different from traditional communications in terms of latency, energy efficiency, reliability, flexibility, and connection density. Since the current radio access mechanism cannot support these diverse services and applications, a new approach to deal with these relentless changes should be introduced. This compressed sensing (CS) paradigm is very attractive alternative to the conventional information processing operations including sampling, sensing, compression, estimation, and detection. To apply the CS techniques to wireless communication systems, there are a number of things to know and also several issues to be considered. In the last decade, CS techniques have spread rapidly in many applications such as medical imaging, machine learning, radar detection, seismology, computer science, statistics, and many others. Also, various wireless communication applications exploiting the sparsity of a target signal have been studied. Notable examples include channel estimation, interference cancellation, angle estimation, spectrum sensing, and symbol detection. The distinct feature of this work, in contrast to the conventional approaches exploiting naturally acquired sparsity, is to exploit intentionally designed sparsity to improve the quality of the communication systems. In the first part of the dissertation, we study the mapping data information into the sparse signal in downlink systems. We propose an approach, called sparse vector coding (SVC), suited for the short packet transmission. In SVC, since the data information is mapped to the position of sparse vector, whole data packet can be decoded by idenitifying nonzero positions of the sparse vector. From our simulations, we show that the packet error rate of SVC outperforms the conventional channel coding schemes at the URLLC regime. Moreover, we discuss the SVC transmission for the massive MTC access by overlapping multiple SVC-based packets into the same resources. Using the spare vector overlapping and multiuser CS decoding scheme, SVC-based transmission provides robustness against the co-channel interference and also provide comparable performance than other non-orthogonal multiple access (NOMA) schemes. By using the fact that SVC only identifies the support of sparse vector, we extend the SVC transmission without pilot transmission, called pilot-less SVC. Instead of using the support, we further exploit the magnitude of sparse vector for delivering additional information. This scheme is referred to as enhanced SVC. The key idea behind the proposed E-SVC transmission scheme is to transform the small information into a sparse vector and map the side-information into a magnitude of the sparse vector. Metaphorically, E-SVC can be thought as a standing a few poles to the empty table. As long as the number of poles is small enough and the measurements contains enough information to find out the marked cell positions, accurate recovery of E-SVC packet can be guaranteed. In the second part of this dissertation, we turn our attention to make sparsification of the non-sparse signal, especially for the pilot transmission and channel estimation. Unlike the conventional scheme where the pilot signal is transmitted without modification, the pilot signals are sent after the beamforming in the proposed technique. This work is motivated by the observation that the pilot overhead must scale linearly with the number of taps in CIR vector and the number of transmit antennas so that the conventional pilot transmission is not an appropriate option for the IoT devices. Primary goal of the proposed scheme is to minimize the nonzero entries of a time-domain channel vector by the help of multiple antennas at the basestation. To do so, we apply the time-domain sparse precoding, where each precoded channel propagates via fewer tap than the original channel vector. The received channel vector of beamformed pilots can be jointly estimated by the sparse recovery algorithm.5์„ธ๋Œ€ ๋ฌด์„ ํ†ต์‹  ์‹œ์Šคํ…œ์˜ ์ƒˆ๋กœ์šด ๊ธฐ์ˆ  ํ˜์‹ ์€ ๋ฌด์ธ ์ฐจ๋Ÿ‰ ๋ฐ ํ•ญ๊ณต๊ธฐ, ์Šค๋งˆํŠธ ๋„์‹œ ๋ฐ ๊ณต์žฅ, ์›๊ฒฉ ์˜๋ฃŒ ์ง„๋‹จ ๋ฐ ์ˆ˜์ˆ , ์ธ๊ณต ์ง€๋Šฅ ๊ธฐ๋ฐ˜ ๋งŸ์ถคํ˜• ์ง€์›๊ณผ ๊ฐ™์€ ์ „๋ก€ ์—†๋Š” ์„œ๋น„์Šค ๋ฐ ์‘์šฉํ”„๋กœ๊ทธ๋žจ์œผ๋กœ ๋ถ€์ƒํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ƒˆ๋กœ์šด ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ฐ ์„œ๋น„์Šค์™€ ๊ด€๋ จ๋œ ํ†ต์‹  ๋ฐฉ์‹์€ ๋Œ€๊ธฐ ์‹œ๊ฐ„, ์—๋„ˆ์ง€ ํšจ์œจ์„ฑ, ์‹ ๋ขฐ์„ฑ, ์œ ์—ฐ์„ฑ ๋ฐ ์—ฐ๊ฒฐ ๋ฐ€๋„ ์ธก๋ฉด์—์„œ ๊ธฐ์กด ํ†ต์‹ ๊ณผ ๋งค์šฐ ๋‹ค๋ฅด๋‹ค. ํ˜„์žฌ์˜ ๋ฌด์„  ์•ก์„ธ์Šค ๋ฐฉ์‹์„ ๋น„๋กฏํ•œ ์ข…๋ž˜์˜ ์ ‘๊ทผ๋ฒ•์€ ์ด๋Ÿฌํ•œ ์š”๊ตฌ ์‚ฌํ•ญ์„ ๋งŒ์กฑํ•  ์ˆ˜ ์—†๊ธฐ ๋•Œ๋ฌธ์— ์ตœ๊ทผ์— sparse processing๊ณผ ๊ฐ™์€ ์ƒˆ๋กœ์šด ์ ‘๊ทผ ๋ฐฉ๋ฒ•์ด ์—ฐ๊ตฌ๋˜๊ณ  ์žˆ๋‹ค. ์ด ์ƒˆ๋กœ์šด ์ ‘๊ทผ ๋ฐฉ๋ฒ•์€ ํ‘œ๋ณธ ์ถ”์ถœ, ๊ฐ์ง€, ์••์ถ•, ํ‰๊ฐ€ ๋ฐ ํƒ์ง€๋ฅผ ํฌํ•จํ•œ ๊ธฐ์กด์˜ ์ •๋ณด ์ฒ˜๋ฆฌ์— ๋Œ€ํ•œ ํšจ์œจ์ ์ธ ๋Œ€์ฒด๊ธฐ์ˆ ๋กœ ํ™œ์šฉ๋˜๊ณ  ์žˆ๋‹ค. ์ง€๋‚œ 10๋…„ ๋™์•ˆ compressed sensing (CS)๊ธฐ๋ฒ•์€ ์˜๋ฃŒ์˜์ƒ, ๊ธฐ๊ณ„ํ•™์Šต, ํƒ์ง€, ์ปดํ“จํ„ฐ ๊ณผํ•™, ํ†ต๊ณ„ ๋ฐ ๊ธฐํƒ€ ์—ฌ๋Ÿฌ ๋ถ„์•ผ์—์„œ ๋น ๋ฅด๊ฒŒ ํ™•์‚ฐ๋˜์—ˆ๋‹ค. ๋˜ํ•œ, ์‹ ํ˜ธ์˜ ํฌ์†Œ์„ฑ(sparsity)๋ฅผ ์ด์šฉํ•˜๋Š” CS ๊ธฐ๋ฒ•์€ ๋‹ค์–‘ํ•œ ๋ฌด์„  ํ†ต์‹ ์ด ์—ฐ๊ตฌ๋˜์—ˆ๋‹ค. ์ฃผ๋ชฉํ• ๋งŒํ•œ ์˜ˆ๋กœ๋Š” ์ฑ„๋„ ์ถ”์ •, ๊ฐ„์„ญ ์ œ๊ฑฐ, ๊ฐ๋„ ์ถ”์ •, ๋ฐ ์ŠคํŽ™ํŠธ๋Ÿผ ๊ฐ์ง€๊ฐ€ ์žˆ์œผ๋ฉฐ ํ˜„์žฌ๊นŒ์ง€ ์—ฐ๊ตฌ๋Š” ์ฃผ์–ด์ง„ ์‹ ํ˜ธ๊ฐ€ ๊ฐ€์ง€๊ณ  ์žˆ๋Š” ๋ณธ๋ž˜์˜ ํฌ์†Œ์„ฑ์— ์ฃผ๋ชฉํ•˜์˜€์œผ๋‚˜ ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๊ธฐ์กด์˜ ์ ‘๊ทผ ๋ฐฉ๋ฒ•๊ณผ ๋‹ฌ๋ฆฌ ์ธ์œ„์ ์œผ๋กœ ์„ค๊ณ„๋œ ํฌ์†Œ์„ฑ์„ ์ด์šฉํ•˜์—ฌ ํ†ต์‹  ์‹œ์Šคํ…œ์˜ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ์šฐ์„  ๋ณธ ๋…ผ๋ฌธ์€ ๋‹ค์šด๋งํฌ ์ „์†ก์—์„œ ํฌ์†Œ ์‹ ํ˜ธ ๋งคํ•‘์„ ํ†ตํ•œ ๋ฐ์ดํ„ฐ ์ „์†ก ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜๋ฉฐ ์งง์€ ํŒจํ‚ท (short packet) ์ „์†ก์— ์ ํ•ฉํ•œ CS ์ ‘๊ทผ๋ฒ•์„ ํ™œ์šฉํ•˜๋Š” ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. ์ œ์•ˆํ•˜๋Š” ๊ธฐ์ˆ ์ธ ํฌ์†Œ๋ฒกํ„ฐ์ฝ”๋”ฉ (sparse vector coding, SVC)์€ ๋ฐ์ดํ„ฐ ์ •๋ณด๊ฐ€ ์ธ๊ณต์ ์ธ ํฌ์†Œ๋ฒกํ„ฐ์˜ nonzero element์˜ ์œ„์น˜์— ๋งคํ•‘ํ•˜์—ฌ ์ „์†ก๋œ ๋ฐ์ดํ„ฐ ํŒจํ‚ท์€ ํฌ์†Œ๋ฒกํ„ฐ์˜ 0์ด ์•„๋‹Œ ์œ„์น˜๋ฅผ ์‹๋ณ„ํ•จ์œผ๋กœ ์›์‹ ํ˜ธ ๋ณต์›์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ๋ถ„์„๊ณผ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ์ œ์•ˆํ•˜๋Š” SVC ๊ธฐ๋ฒ•์˜ ํŒจํ‚ท ์˜ค๋ฅ˜๋ฅ ์€ ultra-reliable and low latency communications (URLLC) ์„œ๋น„์Šค๋ฅผ ์ง€์›์„ ์œ„ํ•ด ์‚ฌ์šฉ๋˜๋Š” ์ฑ„๋„์ฝ”๋”ฉ๋ฐฉ์‹๋ณด๋‹ค ์šฐ์ˆ˜ํ•œ ์„ฑ๋Šฅ์„ ๋ณด์—ฌ์ค€๋‹ค. ๋˜ํ•œ, ๋ณธ ๋…ผ๋ฌธ์€ SVC๊ธฐ์ˆ ์„ ๋‹ค์Œ์˜ ์„ธ๊ฐ€์ง€ ์˜์—ญ์œผ๋กœ ํ™•์žฅํ•˜์˜€๋‹ค. ์ฒซ์งธ๋กœ, ์—ฌ๋Ÿฌ ๊ฐœ์˜ SVC ๊ธฐ๋ฐ˜ ํŒจํ‚ท์„ ๋™์ผํ•œ ์ž์›์— ๊ฒน์น˜๊ฒŒ ์ „์†กํ•จ์œผ๋กœ ์ƒํ–ฅ๋งํฌ์—์„œ ๋Œ€๊ทœ๋ชจ ์ „์†ก์„ ์ง€์›ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ์ค‘์ฒฉ๋œ ํฌ์†Œ๋ฒกํ„ฐ๋ฅผ ๋‹ค์ค‘์‚ฌ์šฉ์ž CS ๋””์ฝ”๋”ฉ ๋ฐฉ์‹์„ ์‚ฌ์šฉํ•˜์—ฌ ์ฑ„๋„ ๊ฐ„์„ญ์— ๊ฐ•์ธํ•œ ์„ฑ๋Šฅ์„ ์ œ๊ณตํ•˜๊ณ  ๋น„์ง๊ต ๋‹ค์ค‘ ์ ‘์† (NOMA) ๋ฐฉ์‹๊ณผ ์œ ์‚ฌํ•œ ์„ฑ๋Šฅ์„ ์ œ๊ณตํ•œ๋‹ค. ๋‘˜์งธ๋กœ, SVC ๊ธฐ์ˆ ์ด ํฌ์†Œ ๋ฒกํ„ฐ์˜ support๋งŒ์„ ์‹๋ณ„ํ•œ๋‹ค๋Š” ์‚ฌ์‹ค์„ ์ด์šฉํ•˜์—ฌ ํŒŒ์ผ๋Ÿฟ ์ „์†ก์ด ํ•„์š”์—†๋Š” pilotless-SVC ์ „์†ก ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ์ฑ„๋„ ์ •๋ณด๊ฐ€ ์—†๋Š” ๊ฒฝ์šฐ์—๋„ ํฌ์†Œ ๋ฒกํ„ฐ์˜ support์˜ ํฌ๊ธฐ๋Š” ์ฑ„๋„์˜ ํฌ๊ธฐ์— ๋น„๋ก€ํ•˜๊ธฐ ๋•Œ๋ฌธ์— pilot์—†์ด ๋ณต์›์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ์…‹์งธ๋กœ, ํฌ์†Œ๋ฒกํ„ฐ์˜ support์˜ ํฌ๊ธฐ์— ์ถ”๊ฐ€ ์ •๋ณด๋ฅผ ์ „์†กํ•จ์œผ๋กœ ๋ณต์› ์„ฑ๋Šฅ์„ ํ–ฅ์ƒ ์‹œํ‚ค๋Š” enhanced SVC (E-SVC)๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ์ œ์•ˆ๋œ E-SVC ์ „์†ก ๋ฐฉ์‹์˜ ํ•ต์‹ฌ ์•„๋””๋””์–ด๋Š” ์งง์€ ํŒจํ‚ท์„ ์ „์†ก๋˜๋Š” ์ •๋ณด๋ฅผ ํฌ์†Œ ๋ฒกํ„ฐ๋กœ ๋ณ€ํ™˜ํ•˜๊ณ  ์ •๋ณด ๋ณต์›์„ ๋ณด์กฐํ•˜๋Š” ์ถ”๊ฐ€ ์ •๋ณด๋ฅผ ํฌ์†Œ ๋ฒกํ„ฐ์˜ ํฌ๊ธฐ (magnitude)๋กœ ๋งคํ•‘ํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ, SVC ๊ธฐ์ˆ ์„ ํŒŒ์ผ๋Ÿฟ ์ „์†ก์— ํ™œ์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ํŠนํžˆ, ์ฑ„๋„ ์ถ”์ •์„ ์œ„ํ•ด ์ฑ„๋„ ์ž„ํŽ„์Šค ์‘๋‹ต์˜ ์‹ ํ˜ธ๋ฅผ ํฌ์†Œํ™”ํ•˜๋Š” ํ”„๋ฆฌ์ฝ”๋”ฉ ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ํŒŒ์ผ๋Ÿฟ ์‹ ํ˜ธ์„ ํ”„๋กœ์ฝ”๋”ฉ ์—†์ด ์ „์†ก๋˜๋Š” ๊ธฐ์กด์˜ ๋ฐฉ์‹๊ณผ ๋‹ฌ๋ฆฌ, ์ œ์•ˆ๋œ ๊ธฐ์ˆ ์—์„œ๋Š” ํŒŒ์ผ๋Ÿฟ ์‹ ํ˜ธ๋ฅผ ๋น”ํฌ๋ฐํ•˜์—ฌ ์ „์†กํ•œ๋‹ค. ์ œ์•ˆ๋œ ๊ธฐ๋ฒ•์€ ๊ธฐ์ง€๊ตญ์—์„œ ๋‹ค์ค‘ ์•ˆํ…Œ๋‚˜๋ฅผ ํ™œ์šฉํ•˜์—ฌ ์ฑ„๋„ ์‘๋‹ต์˜ 0์ด ์•„๋‹Œ ์š”์†Œ๋ฅผ ์ตœ์†Œํ™”ํ•˜๋Š” ์‹œ๊ฐ„ ์˜์—ญ ํฌ์†Œ ํ”„๋ฆฌ์ฝ”๋”ฉ์„ ์ ์šฉํ•˜์˜€๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๋” ์ ํ™•ํ•œ ์ฑ„๋„ ์ถ”์ •์„ ๊ฐ€๋Šฅํ•˜๋ฉฐ ๋” ์ ์€ ํŒŒ์ผ๋Ÿฟ ์˜ค๋ฒ„ํ—ค๋“œ๋กœ ์ฑ„๋„ ์ถ”์ •์ด ๊ฐ€๋Šฅํ•˜๋‹ค.Abstract i Contents iv List of Tables viii List of Figures ix 1 INTRODUCTION 1 1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.1 Three Key Services in 5G systems . . . . . . . . . . . . . . . 2 1.1.2 Sparse Processing in Wireless Communications . . . . . . . . 4 1.2 Contributions and Organization . . . . . . . . . . . . . . . . . . . . . 7 1.3 Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2 Sparse Vector Coding for Downlink Ultra-reliable and Low Latency Communications 12 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.2 URLLC Service Requirements . . . . . . . . . . . . . . . . . . . . . 15 2.2.1 Latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.2.2 Ultra-High Reliability . . . . . . . . . . . . . . . . . . . . . 17 2.2.3 Coexistence . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 2.3 URLLC Physical Layer in 5G NR . . . . . . . . . . . . . . . . . . . 18 2.3.1 Packet Structure . . . . . . . . . . . . . . . . . . . . . . . . 19 2.3.2 Frame Structure and Latency-sensitive Scheduling Schemes . 20 2.3.3 Solutions to the Coexistence Problem . . . . . . . . . . . . . 22 2.4 Short-sized Packet in LTE-Advanced Downlink . . . . . . . . . . . . 24 2.5 Sparse Vector Coding . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.5.1 SVC Encoding and Transmission . . . . . . . . . . . . . . . 25 2.5.2 SVC Decoding . . . . . . . . . . . . . . . . . . . . . . . . . 30 2.5.3 Identification of False Alarm . . . . . . . . . . . . . . . . . . 33 2.6 SVC Performance Analysis . . . . . . . . . . . . . . . . . . . . . . . 36 2.7 Implementation Issues . . . . . . . . . . . . . . . . . . . . . . . . . 48 2.7.1 Codebook Design . . . . . . . . . . . . . . . . . . . . . . . . 48 2.7.2 High-order Modulation . . . . . . . . . . . . . . . . . . . . . 49 2.7.3 Diversity Transmission . . . . . . . . . . . . . . . . . . . . . 50 2.7.4 SVC without Pilot . . . . . . . . . . . . . . . . . . . . . . . 50 2.7.5 Threshold to Prevent False Alarm Event . . . . . . . . . . . . 51 2.8 Simulations and Discussions . . . . . . . . . . . . . . . . . . . . . . 52 2.8.1 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . 52 2.8.2 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . 53 2.9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 3 Sparse Vector Coding for Uplink Massive Machine-type Communications 59 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 3.2 Uplink NOMA transmission for mMTC . . . . . . . . . . . . . . . . 61 3.3 Sparse Vector Coding based NOMA for mMTC . . . . . . . . . . . . 63 3.3.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . 63 3.3.2 Joint Multiuser Decoding . . . . . . . . . . . . . . . . . . . . 66 3.4 Simulations and Discussions . . . . . . . . . . . . . . . . . . . . . . 68 3.4.1 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . 68 3.4.2 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . 69 3.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 4 Pilot-less Sparse Vector Coding for Short Packet Transmission 72 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 4.2 Pilot-less Sparse Vector Coding Processing . . . . . . . . . . . . . . 75 4.2.1 SVC Processing with Pilot Symbols . . . . . . . . . . . . . . 75 4.2.2 Pilot-less SVC . . . . . . . . . . . . . . . . . . . . . . . . . 76 4.2.3 PL-SVC Decoding in Multiple Basestation Antennas . . . . . 78 4.3 Simulations and Discussions . . . . . . . . . . . . . . . . . . . . . . 80 4.3.1 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . 80 4.3.2 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . 81 4.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 5 Joint Analog and Quantized Feedback via Sparse Vector Coding 84 5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 5.2 System Model for Joint Spase Vector Coding . . . . . . . . . . . . . 86 5.3 Sparse Recovery Algorithm and Performance Analysis . . . . . . . . 90 5.4 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 5.4.1 Linear Interpolation of Sensing Information . . . . . . . . . . 96 5.4.2 Linear Combined Feedback . . . . . . . . . . . . . . . . . . 96 5.4.3 One-shot Packet Transmission . . . . . . . . . . . . . . . . . 96 5.5 Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 5.5.1 Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . 97 5.5.2 Results and Discussions . . . . . . . . . . . . . . . . . . . . 98 5.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 6 Sparse Beamforming for Enhanced Mobile Broadband Communications 101 6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 6.1.1 Increase the number of transmit antennas . . . . . . . . . . . 102 6.1.2 2D active antenna system (AAS) . . . . . . . . . . . . . . . . 103 6.1.3 3D channel environment . . . . . . . . . . . . . . . . . . . . 104 6.1.4 RS transmission for CSI acquisition . . . . . . . . . . . . . . 106 6.2 System Design and Standardization of FD-MIMO Systems . . . . . . 107 6.2.1 Deployment scenarios . . . . . . . . . . . . . . . . . . . . . 108 6.2.2 Antenna configurations . . . . . . . . . . . . . . . . . . . . . 108 6.2.3 TXRU architectures . . . . . . . . . . . . . . . . . . . . . . 109 6.2.4 New CSI-RS transmission strategy . . . . . . . . . . . . . . . 112 6.2.5 CSI feedback mechanisms for FD-MIMO systems . . . . . . 114 6.3 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 6.3.1 Basic System Model . . . . . . . . . . . . . . . . . . . . . . 116 6.3.2 Beamformed Pilot Transmission . . . . . . . . . . . . . . . . 117 6.4 Sparsification of Pilot Beamforming . . . . . . . . . . . . . . . . . . 118 6.4.1 Time-domain System Model without Pilot Beamforming . . . 119 6.4.2 Pilot Beamforming . . . . . . . . . . . . . . . . . . . . . . . 120 6.5 Channel Estimation of Beamformed Pilots . . . . . . . . . . . . . . . 124 6.5.1 Recovery using Multiple Measurement Vector . . . . . . . . . 124 6.5.2 MSE Analysis . . . . . . . . . . . . . . . . . . . . . . . . . 128 6.6 Simulations and Discussion . . . . . . . . . . . . . . . . . . . . . . . 129 6.6.1 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . 129 6.6.2 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . 130 6.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 7 Conclusion 136 7.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 7.2 Future Research Directions . . . . . . . . . . . . . . . . . . . . . . . 139 Abstract (In Korean) 152Docto

    Clustering of Preferred Directions During Brain-Computer Interface Usage

    Get PDF
    Brain-computer interfaces (BCIs) are proving to be viable clinical interventions for sufferers of amyotrophic lateral sclerosis, amputations, and spinal cord injuries. To improve the viability of BCIs, it will help to have a thorough understanding of how the brain controls them. Neural activity during usage of certain BCIs behaves in a surprising and seemingly counterintuitive manner โ€“ the preferred directions (PDs) of neurons cluster together. We trained monkeys to reach to targets in a center-out task either using their arm or a BCI. We found that neuronsโ€™ PDs cluster similarly during training of the BCI decoder and usage of the BCI, but remain relatively unclustered when the monkeys use their arms. Modulation depths increase upon usage of the BCI, and narrowness of tuning tends to either increase or decrease rather than staying the same. In addition, the cluster direction can be predicted from per-target performance. A model where two neuronsโ€™ PDs approach one another reveals how much modulation depths have to increase to maintain controllability. This thesis concludes with considerations of why this clustering might occur, and whether or not it benefits BCI control

    Optimal Power Allocation in MIMO wire-tap channels

    Get PDF
    Projecte Finl de Carrera fet en col.laboraciรณ amb Universitร  La Sapienza di Roma.English: Study of a methodology that, without the use of cryptography, limits the possible "intelligence" present at the eavesdropper and increases the level of secrecy on a wireless environment using MIMO systems.Castellano: Estudio de una metodologia que, sin hacer uso de la criptografia, permite limitar la posible "inteligencia" del espia, con la finalidad de aumentar la confidencialidad en comunicacines wireless con sistemas MIMOCatalร : Estudi d'una metodologia que, sense fer รบs de la criptografia, permet limitar la possible "intel.ligรจncia" de l'espia per tal d'augmentar la confidencialitat en comunicacions wireless amb sistemes MIMO
    • โ€ฆ
    corecore