-
Bubble Clustering Decoder for Quantum Topological Codes
Authors:
Diego Forlivesi,
Lorenzo Valentini,
Marco Chiani
Abstract:
Quantum computers are highly vulnerable to noise, necessitating the use of error-correcting codes to protect stored data. Errors must be continuously corrected over time to counteract decoherence using appropriate decoders. Therefore, fast decoding strategies capable of handling real-time syndrome extraction are crucial for achieving fault-tolerant quantum computing. In this paper, we introduce th…
▽ More
Quantum computers are highly vulnerable to noise, necessitating the use of error-correcting codes to protect stored data. Errors must be continuously corrected over time to counteract decoherence using appropriate decoders. Therefore, fast decoding strategies capable of handling real-time syndrome extraction are crucial for achieving fault-tolerant quantum computing. In this paper, we introduce the bubble clustering (BC) decoder for quantum surface codes, which serves as a low-latency replacement for MWPM, achieving significantly faster execution at the cost of a slight performance degradation. This speed boost is obtained leveraging an efficient cluster generation based on bubbles centered on defects, and avoiding the computational overhead associated with cluster growth and merging phases, commonly adopted in traditional decoders. Our complexity analysis reveals that the proposed decoder operates with a complexity on the order of the square of the number of defects. For moderate physical error rates, this is equivalent to linear complexity in the number of data qubits.
△ Less
Submitted 2 April, 2025;
originally announced April 2025.
-
Cylindrical and Möbius Quantum Codes for Asymmetric Pauli Errors
Authors:
Lorenzo Valentini,
Diego Forlivesi,
Marco Chiani
Abstract:
In the implementation of quantum information systems, one type of Pauli error, such as phase-flip errors, may occur more frequently than others, like bit-flip errors. For this reason, quantum error-correcting codes that handle asymmetric errors are critical to mitigating the impact of such impairments. To this aim, several asymmetric quantum codes have been proposed. These include variants of surf…
▽ More
In the implementation of quantum information systems, one type of Pauli error, such as phase-flip errors, may occur more frequently than others, like bit-flip errors. For this reason, quantum error-correcting codes that handle asymmetric errors are critical to mitigating the impact of such impairments. To this aim, several asymmetric quantum codes have been proposed. These include variants of surface codes like the XZZX and ZZZY surface codes, tailored to preserve quantum information in the presence of error asymmetries. In this work, we propose two classes of Calderbank, Shor and Steane (CSS) topological codes, referred to as cylindrical and Möbius codes, particular cases of the fiber bundle family. Cylindrical codes maintain a fully planar structure, while Möbius codes are quasi-planar, with minimal non-local qubit interactions. We construct these codes employing the algebraic chain complexes formalism, providing theoretical upper bounds for the logical error rate. Our results demonstrate that cylindrical and Möbius codes outperform standard surface codes when using the minimum weight perfect matching (MWPM) decoder.
△ Less
Submitted 26 February, 2025;
originally announced February 2025.
-
Research Directions and Modeling Guidelines for Industrial Internet of Things Applications
Authors:
Giampaolo Cuozzo,
Enrico Testi,
Salvatore Riolo,
Luciano Miuccio,
Gianluca Cena,
Gianni Pasolini,
Luca De Nardis,
Daniela Panno,
Marco Chiani,
Maria-Gabriella Di Benedetto,
Enrico Buracchini,
Roberto Verdone
Abstract:
The Industrial Internet of Things (IIoT) paradigm has emerged as a transformative force, revolutionizing industrial processes by integrating advanced wireless technologies into traditional procedures to enhance their efficiency. The importance of this paradigm shift has produced a massive, yet heterogeneous, proliferation of scientific contributions. However, these works lack a standardized and co…
▽ More
The Industrial Internet of Things (IIoT) paradigm has emerged as a transformative force, revolutionizing industrial processes by integrating advanced wireless technologies into traditional procedures to enhance their efficiency. The importance of this paradigm shift has produced a massive, yet heterogeneous, proliferation of scientific contributions. However, these works lack a standardized and cohesive characterization of the IIoT framework coming from different entities, like the 3rd Generation Partnership Project (3GPP) or the 5G Alliance for Connected Industries and Automation (5G-ACIA), resulting in divergent perspectives and potentially hindering interoperability. To bridge this gap, this article offers a unified characterization of (i) the main IIoT application domains, (ii) their respective requirements, (iii) the principal technological gaps existing in the current literature, and, most importantly, (iv) we propose a systematic approach for assessing and addressing the identified research challenges. Therefore, this article serves as a roadmap for future research endeavors, promoting a unified vision of the IIoT paradigm and fostering collaborative efforts to advance the field.
△ Less
Submitted 27 January, 2025; v1 submitted 3 October, 2024;
originally announced October 2024.
-
Quantum codes for asymmetric channels: ZZZY surface codes
Authors:
Diego Forlivesi,
Lorenzo Valentini,
Marco Chiani
Abstract:
We introduce surface ZZZY codes, a novel family of quantum error-correcting codes designed for asymmetric channels. Derived from standard surface codes through tailored modification of generators, ZZZY codes can be decoded by the minimum weight perfect matching (MWPM) algorithm with a suitable pre-processing phase. The resulting decoder exploits the information provided by the modified generators…
▽ More
We introduce surface ZZZY codes, a novel family of quantum error-correcting codes designed for asymmetric channels. Derived from standard surface codes through tailored modification of generators, ZZZY codes can be decoded by the minimum weight perfect matching (MWPM) algorithm with a suitable pre-processing phase. The resulting decoder exploits the information provided by the modified generators without introducing additional complexity. ZZZY codes demonstrate a significant performance advantage over surface codes when increasing the channel asymmetry, while maintaining the same correction capability over depolarizing channel.
△ Less
Submitted 16 September, 2024;
originally announced September 2024.
-
Blind User Activity Detection for Grant-Free Random Access in Cell-Free mMIMO Networks
Authors:
Muhammad Usman Khan,
Enrico Testi,
Marco Chiani,
Enrico Paolini
Abstract:
Cell-free massive MIMO (CF-mMIMO) networks have recently emerged as a promising solution to tackle the challenges arising from next-generation massive machine-type communications. In this paper, a fully grant-free deep learning (DL)-based method for user activity detection in CF-mMIMO networks is proposed. Initially, the known non-orthogonal pilot sequences are used to estimate the channel coeffic…
▽ More
Cell-free massive MIMO (CF-mMIMO) networks have recently emerged as a promising solution to tackle the challenges arising from next-generation massive machine-type communications. In this paper, a fully grant-free deep learning (DL)-based method for user activity detection in CF-mMIMO networks is proposed. Initially, the known non-orthogonal pilot sequences are used to estimate the channel coefficients between each user and the access points. Then, a deep convolutional neural network is used to estimate the activity status of the users. The proposed method is "blind", i.e., it is fully data-driven and does not require prior large-scale fading coefficients estimation. Numerical results show how the proposed DL-based algorithm is able to merge the information gathered by the distributed antennas to estimate the user activity status, yet outperforming a state-of-the-art covariance-based method.
△ Less
Submitted 5 August, 2024;
originally announced August 2024.
-
Spanning Tree Matching Decoder for Quantum Surface Codes
Authors:
Diego Forlivesi,
Lorenzo Valentini,
Marco Chiani
Abstract:
We introduce the spanning tree matching (STM) decoder for surface codes, which guarantees the error correction capability up to the code's designed distance by first employing an instance of the minimum spanning tree on a subset of ancilla qubits within the lattice. Then, a perfect matching graph is simply obtained, by selecting the edges more likely to be faulty. A comparative analysis reveals th…
▽ More
We introduce the spanning tree matching (STM) decoder for surface codes, which guarantees the error correction capability up to the code's designed distance by first employing an instance of the minimum spanning tree on a subset of ancilla qubits within the lattice. Then, a perfect matching graph is simply obtained, by selecting the edges more likely to be faulty. A comparative analysis reveals that the STM decoder, at the cost of a slight performance degradation, provides a substantial advantage in decoding time compared to the minimum weight perfect matching (MWPM) decoder. Finally, we propose an even more simplified and faster algorithm, the Rapid-Fire (RFire) decoder, designed for scenarios where decoding speed is a critical requirement.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Logical Error Rates of XZZX and Rotated Quantum Surface Codes
Authors:
Diego Forlivesi,
Lorenzo Valentini,
Marco Chiani
Abstract:
Surface codes are versatile quantum error-correcting codes known for their planar geometry, making them ideal for practical implementations. While the original proposal used Pauli $X$ or Pauli $Z$ operators in a square structure, these codes can be improved by rotating the lattice or incorporating a mix of generators in the XZZX variant. However, a comprehensive theoretical analysis of the logical…
▽ More
Surface codes are versatile quantum error-correcting codes known for their planar geometry, making them ideal for practical implementations. While the original proposal used Pauli $X$ or Pauli $Z$ operators in a square structure, these codes can be improved by rotating the lattice or incorporating a mix of generators in the XZZX variant. However, a comprehensive theoretical analysis of the logical error rate for these variants has been lacking. To address this gap, we present theoretical formulas based on recent advancements in understanding the weight distribution of stabilizer codes. For example, over an asymmetric channel with asymmetry $A=10$ and a physical error rate $p \to 0$, we observe that the logical error rate asymptotically approaches $p_\mathrm{L} \to 10 p^2$ for the rotated $[[9,1,3]]$ XZZX code and $p_\mathrm{L} \to 18.3 p^2$ for the $[[13,1,3]]$ surface code. Additionally, we observe a particular behavior regarding rectangular lattices in the presence of asymmetric channels. Our findings demonstrate that implementing both rotation and XZZX modifications simultaneously can lead to suboptimal performance. Thus, in scenarios involving a rectangular lattice, it is advisable to avoid using both modifications simultaneously. This research enhances our theoretical understanding of the logical error rates for XZZX and rotated surface codes, providing valuable insights into their performance under different conditions.
△ Less
Submitted 28 December, 2023;
originally announced December 2023.
-
Quantum Two-Way Protocol Beyond Superdense Coding: Joint Transfer of Data and Entanglement
Authors:
Lorenzo Valentini,
Kristian Skafte Jensen,
René Bødker Christensen,
Marco Chiani,
Petar Popovski
Abstract:
In this article, we introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs. The proposed protocol jointly addresses the provision of entangled pairs and superdense coding, introducing an integrated approach for managing entanglement within the communication protocol. To assess the performance of th…
▽ More
In this article, we introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs. The proposed protocol jointly addresses the provision of entangled pairs and superdense coding, introducing an integrated approach for managing entanglement within the communication protocol. To assess the performance of the proposed protocol, we consider its data rate and resource usage, and we analyze this both in an ideal setting with no decoherence and in a more realistic setting where decoherence must be taken into account. In the ideal case, the proposal offers a 50% increase in both data rate and resource usage efficiency compared to conventional protocols. Even when decoherence is taken into consideration, the quantum protocol performs better as long as the decoherence time is not extremely short. Finally, we present the results of implementing the protocol in a computer simulation based on the NetSquid framework. We compare the simulation results with the theoretical values.
△ Less
Submitted 10 February, 2025; v1 submitted 6 September, 2023;
originally announced September 2023.
-
Interference Cancellation Algorithms for Grant-Free Multiple Access with Massive MIMO
Authors:
Lorenzo Valentini,
Marco Chiani,
Enrico Paolini
Abstract:
In next generation Internet-of-Things, the overhead introduced by grant-based multiple access protocols may engulf the access network as a consequence of the unprecedented number of connected devices. Grant-free access protocols are therefore gaining an increasing interest to support massive access from machine-type devices with intermittent activity. In this paper, coded random access (CRA) with…
▽ More
In next generation Internet-of-Things, the overhead introduced by grant-based multiple access protocols may engulf the access network as a consequence of the unprecedented number of connected devices. Grant-free access protocols are therefore gaining an increasing interest to support massive access from machine-type devices with intermittent activity. In this paper, coded random access (CRA) with massive multiple input multiple output (MIMO) is investigated as a solution to design highly-scalable massive multiple access protocols, taking into account stringent requirements on latency and reliability. With a focus on signal processing aspects at the physical layer and their impact on the overall system performance, critical issues of successive interference cancellation (SIC) over fading channels are first analyzed. Then, SIC algorithms and a scheduler are proposed that can overcome some of the limitations of the current access protocols. The effectiveness of the proposed processing algorithms is validated by Monte Carlo simulation, for different CRA protocols and by comparisons with developed benchmarks.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
Performance Analysis of Quantum CSS Error-Correcting Codes via MacWilliams Identities
Authors:
Diego Forlivesi,
Lorenzo Valentini,
Marco Chiani
Abstract:
Quantum error correcting codes are of primary interest for the evolution towards quantum computing and quantum Internet. We analyze the performance of stabilizer codes, one of the most important classes for practical implementations, on both symmetric and asymmetric quantum channels. To this aim, we first derive the weight enumerator (WE) for the undetectable errors based on the quantum MacWilliam…
▽ More
Quantum error correcting codes are of primary interest for the evolution towards quantum computing and quantum Internet. We analyze the performance of stabilizer codes, one of the most important classes for practical implementations, on both symmetric and asymmetric quantum channels. To this aim, we first derive the weight enumerator (WE) for the undetectable errors based on the quantum MacWilliams identities. The WE is then used to evaluate tight upper bounds on the error rate of CSS quantum codes with minimum weight decoding. For surface codes we also derive a simple closed form expression of the bounds over the depolarizing channel. Finally, we introduce a novel approach that combines the knowledge of WE with a logical operator analysis. This method allows the derivation of the exact asymptotic performance for short codes. For example, on a depolarizing channel with physical error rate $ρ\to 0$ it is found that the logical error rate $ρ_\mathrm{L}$ is asymptotically $ρ_\mathrm{L} \approx 16 ρ^2$ for the $[[9,1,3]]$ Shor code, $ρ_\mathrm{L} \approx 16.3 ρ^2$ for the $[[7,1,3]]$ Steane code, $ρ_\mathrm{L} \approx 18.7 ρ^2$ for the $[[13,1,3]]$ surface code, and $ρ_\mathrm{L} \approx 149.3 ρ^3$ for the $[[41,1,5]]$ surface code. For larger codes our bound provides $ρ_\mathrm{L} \approx 1215 ρ^4$ and $ρ_\mathrm{L} \approx 663 ρ^5$ for the $[[85,1,7]]$ and the $[[181,1,10]]$ surface codes, respectively.
△ Less
Submitted 8 February, 2024; v1 submitted 2 May, 2023;
originally announced May 2023.
-
Reliable Quantum Communications based on Asymmetry in Distillation and Coding
Authors:
Lorenzo Valentini,
René Bødker Christensen,
Petar Popovski,
Marco Chiani
Abstract:
The reliable provision of entangled qubits is an essential precondition in a variety of schemes for distributed quantum computing. This is challenged by multiple nuisances, such as errors during the transmission over quantum links, but also due to degradation of the entanglement over time due to decoherence. The latter can be seen as a constraint on the latency of the quantum protocol, which bring…
▽ More
The reliable provision of entangled qubits is an essential precondition in a variety of schemes for distributed quantum computing. This is challenged by multiple nuisances, such as errors during the transmission over quantum links, but also due to degradation of the entanglement over time due to decoherence. The latter can be seen as a constraint on the latency of the quantum protocol, which brings the problem of quantum protocol design into the context of latency-reliability constraints. We address the problem through hybrid schemes that combine: (1) indirect transmission based on teleportation and distillation; (2) direct transmission, based on quantum error correction (QEC). The intuition is that, at present, the quantum hardware offers low fidelity, which demands distillation; on the other hand, low latency can be obtained by QEC techniques. It is shown that, in the proposed framework, the distillation protocol gives rise to asymmetries that can be exploited by asymmetric quantum error correcting code (QECC), which sets the basis for unique hybrid distillation and coding design. Our results show that ad-hoc asymmetric codes give, compared to conventional QEC, a performance boost and codeword size reduction both in a single link and in a quantum network scenario.
△ Less
Submitted 3 June, 2024; v1 submitted 1 May, 2023;
originally announced May 2023.
-
An Implementation of the Optimal Scheme for Energy Efficient Bus Encoding
Authors:
Lorenzo Valentini,
Marco Chiani
Abstract:
In computer system buses, most of the energy is spent to change the voltage of each line from high to low or vice versa. Bus encoding schemes aim to improve energy efficiency by limiting the number of transitions between successive uses of the bus. We propose an implementation of the optimal code with reduced number of clock cycles.
In computer system buses, most of the energy is spent to change the voltage of each line from high to low or vice versa. Bus encoding schemes aim to improve energy efficiency by limiting the number of transitions between successive uses of the bus. We propose an implementation of the optimal code with reduced number of clock cycles.
△ Less
Submitted 4 April, 2024; v1 submitted 11 March, 2023;
originally announced March 2023.
-
Performance Analysis of Quantum Error-Correcting Surface Codes over Asymmetric Channels
Authors:
Lorenzo Valentini,
Diego Forlivesi,
Marco Chiani
Abstract:
One of the main challenge for an efficient implementation of quantum information technologies is how to counteract quantum noise. Quantum error correcting codes are therefore of primary interest for the evolution towards quantum computing and quantum Internet. We here analyze the performance of surface codes, one of the most important class for practical implementations, on both symmetric and asym…
▽ More
One of the main challenge for an efficient implementation of quantum information technologies is how to counteract quantum noise. Quantum error correcting codes are therefore of primary interest for the evolution towards quantum computing and quantum Internet. We here analyze the performance of surface codes, one of the most important class for practical implementations, on both symmetric and asymmetric quantum channels. We derive approximate expressions, confirmed by simulations, to evaluate the performance of surface codes and of XZZX codes, and provide a metric to assess the advantage of codes with respect to uncoded systems. Our findings allow to characterize the performance by means of analytical formulas of surface codes, like, for example, the [[13, 1, 3]], the [[23, 1, 3/5]], the [[33, 1, 3/7]], and the [[41, 1, 5]] surface codes.
△ Less
Submitted 25 February, 2023;
originally announced February 2023.
-
A Joint PHY and MAC Layer Design for Coded Random Access with Massive MIMO
Authors:
Lorenzo Valentini,
Marco Chiani,
Enrico Paolini
Abstract:
Grant-free access schemes are candidates to support future massive multiple access applications owing to their capability to reduce control signaling and latency. As a promising class of grant-free schemes, coded random access schemes can achieve high reliabilities also with uncoordinated transmissions and therefore in presence packet collisions. In this paper, an analysis tool for coded random ac…
▽ More
Grant-free access schemes are candidates to support future massive multiple access applications owing to their capability to reduce control signaling and latency. As a promising class of grant-free schemes, coded random access schemes can achieve high reliabilities also with uncoordinated transmissions and therefore in presence packet collisions. In this paper, an analysis tool for coded random access, based on density evolution, is proposed and exploited for system design and optimization. In sharp contrast with the existing literature, where such tools have been developed under simplified channel assumptions, the proposed tool captures not only MAC layer features, but also the physical wireless fading channel and a realistic physical layer signal processing based on multiple antennas and randomly-chosen orthogonal pilots. Theoretical results are validated by comparison with symbol-level Monte Carlo simulations.
△ Less
Submitted 24 August, 2022;
originally announced August 2022.
-
Irregular Repetition Slotted ALOHA in an Information-Theoretic Setting
Authors:
Enrico Paolini,
Lorenzo Valentini,
Velio Tralli,
Marco Chiani
Abstract:
An information-theoretic approach to irregular repetition slotted ALOHA (IRSA) is proposed. In contrast with previous works, in which IRSA analysis is conducted only based on quantities that are typical of collision models such as the traffic, the new approach also captures more fundamental quantities. Specifically, a suitable codebook construction for the adder channel model is adopted to establi…
▽ More
An information-theoretic approach to irregular repetition slotted ALOHA (IRSA) is proposed. In contrast with previous works, in which IRSA analysis is conducted only based on quantities that are typical of collision models such as the traffic, the new approach also captures more fundamental quantities. Specifically, a suitable codebook construction for the adder channel model is adopted to establish a link with successive interference cancellation over the multi-packet reception channel. This perspective allows proving achievability and converse results for the average sum rate of IRSA multiple access schemes.
△ Less
Submitted 13 July, 2022;
originally announced July 2022.
-
Two-Leg Deep Space Relay Architectures: Performance, Challenges, and Perspectives
Authors:
Dario Modenini,
Alfredo Locarini,
Lorenzo Valentini,
Alberto Faedi,
Paolo Tortora,
Davide Rovelli,
Nicolò Mazzali,
Marco Chiani,
Enrico Paolini
Abstract:
In this paper, architectures for interplanetary communications that feature the use of a data relay are investigated. In the considered "two-leg" architecture, a spacecraft orbiting the Earth, or in orbit at a Lagrange point, receives data from a deep space probe (leg-1) and relays them towards ground (leg-2). Different wireless technologies for the interplanetary link, namely, radio frequencies a…
▽ More
In this paper, architectures for interplanetary communications that feature the use of a data relay are investigated. In the considered "two-leg" architecture, a spacecraft orbiting the Earth, or in orbit at a Lagrange point, receives data from a deep space probe (leg-1) and relays them towards ground (leg-2). Different wireless technologies for the interplanetary link, namely, radio frequencies above the Ka band and optical frequencies, are considered. Moreover, the cases of transparent and regenerative relaying as well as different different orbital configurations are addressed, offering a thorough analysis of such systems from different viewpoints. Results show that, under certain constraints in terms of pointing accuracy and onboard antenna size, the adoption of a two-leg architecture can achieve the data rates supported by direct space-to-Earth link configurations with remarkably smaller ground station antennas.
△ Less
Submitted 27 May, 2022;
originally announced May 2022.
-
Impact of Interference Subtraction on Grant-Free Multiple Access with Massive MIMO
Authors:
Lorenzo Valentini,
Alberto Faedi,
Marco Chiani,
Enrico Paolini
Abstract:
The design of highly scalable multiple access schemes is a main challenge in the evolution towards future massive machine-type communications, where reliability and latency constraints must be ensured to a large number of uncoordinated devices. In this scenario, coded random access (CRA) schemes, where successive interference cancellation algorithms allow large improvements with respect to classic…
▽ More
The design of highly scalable multiple access schemes is a main challenge in the evolution towards future massive machine-type communications, where reliability and latency constraints must be ensured to a large number of uncoordinated devices. In this scenario, coded random access (CRA) schemes, where successive interference cancellation algorithms allow large improvements with respect to classical random access protocols, have recently attracted an increasing interest. Impressive performance can be potentially obtained by combining CRA with massive multiple input multiple output (MIMO). In this paper we provide an analysis of such schemes focusing on the effects of imperfect channel estimation on successive interference cancellation. Based on the analysis we then propose an innovative signal processing algorithm for CRA in massive MIMO systems.
△ Less
Submitted 26 February, 2022;
originally announced February 2022.
-
Analysis of Pointing Loss Effects in Deep Space Optical Links
Authors:
Lorenzo Valentini,
Alberto Faedi,
Enrico Paolini,
Marco Chiani
Abstract:
Owing to the extremely narrow beams, a main issue in optical deep space communications is represented by miss-pointing errors, which may severely degrade the system performance and availability. In this paper, we address pointing losses in the case in which both the receiver and the transmitter are affected by angular errors. Pointing losses are evaluated through two approaches. The first approach…
▽ More
Owing to the extremely narrow beams, a main issue in optical deep space communications is represented by miss-pointing errors, which may severely degrade the system performance and availability. In this paper, we address pointing losses in the case in which both the receiver and the transmitter are affected by angular errors. Pointing losses are evaluated through two approaches. The first approach is deterministic and only requires knowledge of a maximum angular error. The second approach requires knowledge of the angular error statistical distribution and tackles the problem from an outage probability viewpoint. These tools are then applied to analyze the impact of pointing losses in deep space optical links in which both terminals suffer from miss-pointing effects. The antenna gains are first optimized to maximize the effective system gain. The optimum antenna gains are then applied to evaluate maximum achievable ranges and to perform link design by means of optical link budgets.
△ Less
Submitted 5 December, 2021;
originally announced December 2021.
-
Identification-Detection Group Testing Protocols for COVID-19 at High Prevalence
Authors:
Marco Chiani,
Gianluigi Liva,
Enrico Paolini
Abstract:
Group testing allows saving chemical reagents, analysis time, and costs, by testing pools of samples instead of individual samples. We introduce a class of group testing protocols with small dilution, suited to operate even at high prevalence ($5\%-10\%$), and maximizing the fraction of samples classified positive/negative within the first round of tests. Precisely, if the tested group has exactly…
▽ More
Group testing allows saving chemical reagents, analysis time, and costs, by testing pools of samples instead of individual samples. We introduce a class of group testing protocols with small dilution, suited to operate even at high prevalence ($5\%-10\%$), and maximizing the fraction of samples classified positive/negative within the first round of tests. Precisely, if the tested group has exactly one positive sample then the protocols identify it without further individual tests. The protocols also detect the presence of two or more positives in the group, in which case a second round could be applied to identify the positive individuals. With a prevalence of $5\%$ and maximum dilution 6, with 100 tests we classify 242 individuals, $92\%$ of them in one round and $8\%$ requiring a second individual test. In comparison, the Dorfman's scheme can test 229 individuals with 100 tests, with a second round for $18.5\%$ of the individuals.
△ Less
Submitted 8 March, 2022; v1 submitted 22 April, 2021;
originally announced April 2021.
-
Short Codes for Quantum Channels with One Prevalent Pauli Error Type
Authors:
Marco Chiani,
Lorenzo Valentini
Abstract:
One of the main problems in quantum information systems is the presence of errors due to noise, and for this reason quantum error-correcting codes (QECCs) play a key role. While most of the known codes are designed for correcting generic errors, i.e., errors represented by arbitrary combinations of Pauli X , Y and Z operators, in this paper we investigate the design of stabilizer QECC able to corr…
▽ More
One of the main problems in quantum information systems is the presence of errors due to noise, and for this reason quantum error-correcting codes (QECCs) play a key role. While most of the known codes are designed for correcting generic errors, i.e., errors represented by arbitrary combinations of Pauli X , Y and Z operators, in this paper we investigate the design of stabilizer QECC able to correct a given number eg of generic Pauli errors, plus eZ Pauli errors of a specified type, e.g., Z errors. These codes can be of interest when the quantum channel is asymmetric in that some types of error occur more frequently than others. We first derive a generalized quantum Hamming bound for such codes, then propose a design methodology based on syndrome assignments. For example, we found a [[9,1]] quantum error-correcting code able to correct up to one generic qubit error plus one Z error in arbitrary positions. This, according to the generalized quantum Hamming bound, is the shortest code with the specified error correction capability. Finally, we evaluate analytically the performance of the new codes over asymmetric channels.
△ Less
Submitted 9 April, 2021;
originally announced April 2021.
-
Optimum Detection of Defective Elements in Non-Adaptive Group Testing
Authors:
Gianluigi Liva,
Enrico Paolini,
Marco Chiani
Abstract:
We explore the problem of deriving a posteriori probabilities of being defective for the members of a population in the non-adaptive group testing framework. Both noiseless and noisy testing models are addressed. The technique, which relies of a trellis representation of the test constraints, can be applied efficiently to moderate-size populations. The complexity of the approach is discussed and n…
▽ More
We explore the problem of deriving a posteriori probabilities of being defective for the members of a population in the non-adaptive group testing framework. Both noiseless and noisy testing models are addressed. The technique, which relies of a trellis representation of the test constraints, can be applied efficiently to moderate-size populations. The complexity of the approach is discussed and numerical results on the false positive probability vs. false negative probability trade-off are presented.
△ Less
Submitted 10 February, 2021;
originally announced February 2021.
-
Piggybacking on Quantum Streams
Authors:
Marco Chiani,
Andrea Conti,
Moe Z. Win
Abstract:
This paper shows that it is possible to piggyback classical information on a stream of qubits protected by quantum error correcting codes. The piggyback channel can be created by introducing intentional errors corresponding to a controlled sequence of syndromes. These syndromes are further protected, when quantum noise is present, by classical error correcting codes according to a performance-dela…
▽ More
This paper shows that it is possible to piggyback classical information on a stream of qubits protected by quantum error correcting codes. The piggyback channel can be created by introducing intentional errors corresponding to a controlled sequence of syndromes. These syndromes are further protected, when quantum noise is present, by classical error correcting codes according to a performance-delay trade-off. Classical information can thus be added and extracted at arbitrary epochs without consuming additional quantum resources and without disturbing the quantum stream.
△ Less
Submitted 25 May, 2020;
originally announced May 2020.
-
On the Distribution of an Arbitrary Subset of the Eigenvalues for some Finite Dimensional Random Matrices
Authors:
Marco Chiani,
Alberto Zanella
Abstract:
We present some new results on the joint distribution of an arbitrary subset of the ordered eigenvalues of complex Wishart, double Wishart, and Gaussian hermitian random matrices of finite dimensions, using a tensor pseudo-determinant operator. Specifically, we derive compact expressions for the joint probability distribution function of the eigenvalues and the expectation of functions of the eige…
▽ More
We present some new results on the joint distribution of an arbitrary subset of the ordered eigenvalues of complex Wishart, double Wishart, and Gaussian hermitian random matrices of finite dimensions, using a tensor pseudo-determinant operator. Specifically, we derive compact expressions for the joint probability distribution function of the eigenvalues and the expectation of functions of the eigenvalues, including joint moments, for the case of both ordered and unordered eigenvalues.
△ Less
Submitted 2 January, 2020;
originally announced January 2020.
-
Model Order Selection Based on Information Theoretic Criteria: Design of the Penalty
Authors:
Andrea Mariani,
Andrea Giorgetti,
Marco Chiani
Abstract:
Information theoretic criteria (ITC) have been widely adopted in engineering and statistics for selecting, among an ordered set of candidate models, the one that better fits the observed sample data. The selected model minimizes a penalized likelihood metric, where the penalty is determined by the criterion adopted. While rules for choosing a penalty that guarantees a consistent estimate of the mo…
▽ More
Information theoretic criteria (ITC) have been widely adopted in engineering and statistics for selecting, among an ordered set of candidate models, the one that better fits the observed sample data. The selected model minimizes a penalized likelihood metric, where the penalty is determined by the criterion adopted. While rules for choosing a penalty that guarantees a consistent estimate of the model order are known, theoretical tools for its design with finite samples have never been provided in a general setting. In this paper, we study model order selection for finite samples under a design perspective, focusing on the generalized information criterion (GIC), which embraces the most common ITC. The theory is general, and as case studies we consider: a) the problem of estimating the number of signals embedded in additive white Gaussian noise (AWGN) by using multiple sensors; b) model selection for the general linear model (GLM), which includes e.g. the problem of estimating the number of sinusoids in AWGN. The analysis reveals a trade-off between the probabilities of overestimating and underestimating the order of the model. We then propose to design the GIC penalty to minimize underestimation while keeping the overestimation probability below a specified level. For the considered problems, this method leads to analytical derivation of the optimal penalty for a given sample size. A performance comparison between the penalty optimized GIC and common AIC and BIC is provided, demonstrating the effectiveness of the proposed design strategy.
△ Less
Submitted 4 October, 2019;
originally announced October 2019.
-
On Oversampling-Based Signal Detection
Authors:
Andrea Mariani,
Andrea Giorgetti,
Marco Chiani
Abstract:
The availability of inexpensive devices allows nowadays to implement cognitive radio functionalities in large-scale networks such as the internet-of-things and future mobile cellular systems. In this paper, we focus on wideband spectrum sensing in the presence of oversampling, i.e., the sampling frequency of a digital receiver is larger than the signal bandwidth, where signal detection must take i…
▽ More
The availability of inexpensive devices allows nowadays to implement cognitive radio functionalities in large-scale networks such as the internet-of-things and future mobile cellular systems. In this paper, we focus on wideband spectrum sensing in the presence of oversampling, i.e., the sampling frequency of a digital receiver is larger than the signal bandwidth, where signal detection must take into account the front-end impairments of low-cost devices. Based on the noise model of a software-defined radio dongle, we address the problem of robust signal detection in the presence of noise power uncertainty and non-flat noise power spectral density (PSD). In particular, we analyze the receiver operating characteristic of several detectors in the presence of such front-end impairments, to assess the performance attainable in a real-world scenario. We propose new frequency-domain detectors, some of which are proven to outperform previously proposed spectrum sensing techniques such as, e.g., eigenvalue-based tests. The study shows that the best performance is provided by a noise-uncertainty immune energy detector (ED) and, for the colored noise case, by tests that match the PSD of the receiver noise.
△ Less
Submitted 31 July, 2019;
originally announced July 2019.
-
On the LoRa Modulation for IoT: Waveform Properties and Spectral Analysis
Authors:
Marco Chiani,
Ahmed Elzanaty
Abstract:
An important modulation technique for Internet of Things (IoT) is the one proposed by the LoRa allianceTM. In this paper we analyze the M-ary LoRa modulation in the time and frequency domains. First, we provide the signal description in the time domain, and show that LoRa is a memoryless continuous phase modulation. The cross-correlation between the transmitted waveforms is determined, proving tha…
▽ More
An important modulation technique for Internet of Things (IoT) is the one proposed by the LoRa allianceTM. In this paper we analyze the M-ary LoRa modulation in the time and frequency domains. First, we provide the signal description in the time domain, and show that LoRa is a memoryless continuous phase modulation. The cross-correlation between the transmitted waveforms is determined, proving that LoRa can be considered approximately an orthogonal modulation only for large M. Then, we investigate the spectral characteristics of the signal modulated by random data, obtaining a closed-form expression of the spectrum in terms of Fresnel functions. Quite surprisingly, we found that LoRa has both continuous and discrete spectra, with the discrete spectrum containing exactly a fraction 1/M of the total signal power.
△ Less
Submitted 10 June, 2019;
originally announced June 2019.
-
Limits on Sparse Data Acquisition: RIC Analysis of Finite Gaussian Matrices
Authors:
Ahmed Elzanaty,
Andrea Giorgetti,
Marco Chiani
Abstract:
One of the key issues in the acquisition of sparse data by means of compressed sensing (CS) is the design of the measurement matrix. Gaussian matrices have been proven to be information-theoretically optimal in terms of minimizing the required number of measurements for sparse recovery. In this paper we provide a new approach for the analysis of the restricted isometry constant (RIC) of finite dim…
▽ More
One of the key issues in the acquisition of sparse data by means of compressed sensing (CS) is the design of the measurement matrix. Gaussian matrices have been proven to be information-theoretically optimal in terms of minimizing the required number of measurements for sparse recovery. In this paper we provide a new approach for the analysis of the restricted isometry constant (RIC) of finite dimensional Gaussian measurement matrices. The proposed method relies on the exact distributions of the extreme eigenvalues for Wishart matrices. First, we derive the probability that the restricted isometry property is satisfied for a given sufficient recovery condition on the RIC, and propose a probabilistic framework to study both the symmetric and asymmetric RICs. Then, we analyze the recovery of compressible signals in noise through the statistical characterization of stability and robustness. The presented framework determines limits on various sparse recovery algorithms for finite size problems. In particular, it provides a tight lower bound on the maximum sparsity order of the acquired data allowing signal recovery with a given target probability. Also, we derive simple approximations for the RICs based on the Tracy-Widom distribution.
△ Less
Submitted 22 November, 2018; v1 submitted 9 February, 2018;
originally announced February 2018.
-
Short Codes with Mismatched Channel State Information: A Case Study
Authors:
Gianluigi Liva,
Giuseppe Durisi,
Marco Chiani,
Shakeel Salamat Ullah,
Soung Chang Liew
Abstract:
The rising interest in applications requiring the transmission of small amounts of data has recently lead to the development of accurate performance bounds and of powerful channel codes for the transmission of short-data packets over the AWGN channel. Much less is known about the interaction between error control coding and channel estimation at short blocks when transmitting over channels with st…
▽ More
The rising interest in applications requiring the transmission of small amounts of data has recently lead to the development of accurate performance bounds and of powerful channel codes for the transmission of short-data packets over the AWGN channel. Much less is known about the interaction between error control coding and channel estimation at short blocks when transmitting over channels with states (e.g., fading channels, phase-noise channels, etc...) for the setup where no a priori channel state information (CSI) is available at the transmitter and the receiver. In this paper, we use the mismatched-decoding framework to characterize the fundamental tradeoff occurring in the transmission of short data packet over an AWGN channel with unknown gain that stays constant over the packet. Our analysis for this simplified setup aims at showing the potential of mismatched decoding as a tool to design and analyze transmission strategies for short blocks. We focus on a pragmatic approach where the transmission frame contains a codeword as well as a preamble that is used to estimate the channel (the codeword symbols are not used for channel estimation). Achievability and converse bounds on the block error probability achievable by this approach are provided and compared with simulation results for schemes employing short low-density parity-check codes. Our bounds turn out to predict accurately the optimal trade-off between the preamble length and the redundancy introduced by the channel code.
△ Less
Submitted 16 May, 2017;
originally announced May 2017.
-
A chart for the energy levels of the square quantum well
Authors:
M. Chiani
Abstract:
A chart for the quantum mechanics of a particle of mass $m$ in a one-dimensional potential well of width $w$ and depth $V_0$ is derived. The chart is obtained by normalizing energy and potential through multiplication by ${8 m}{w^2} / h^2$, and gives directly the allowed couples (potential, energy), providing insights on the relation between the parameters and the number of allowed energy levels.
A chart for the quantum mechanics of a particle of mass $m$ in a one-dimensional potential well of width $w$ and depth $V_0$ is derived. The chart is obtained by normalizing energy and potential through multiplication by ${8 m}{w^2} / h^2$, and gives directly the allowed couples (potential, energy), providing insights on the relation between the parameters and the number of allowed energy levels.
△ Less
Submitted 28 October, 2017; v1 submitted 30 September, 2016;
originally announced October 2016.
-
On the probability that all eigenvalues of Gaussian, Wishart, and double Wishart random matrices lie within an interval
Authors:
Marco Chiani
Abstract:
We derive the probability that all eigenvalues of a random matrix $\bf M$ lie within an arbitrary interval $[a,b]$, $ψ(a,b)\triangleq\Pr\{a\leqλ_{\min}({\bf M}), λ_{\max}({\bf M})\leq b\}$, when $\bf M$ is a real or complex finite dimensional Wishart, double Wishart, or Gaussian symmetric/Hermitian matrix. We give efficient recursive formulas allowing the exact evaluation of $ψ(a,b)$ for Wishart m…
▽ More
We derive the probability that all eigenvalues of a random matrix $\bf M$ lie within an arbitrary interval $[a,b]$, $ψ(a,b)\triangleq\Pr\{a\leqλ_{\min}({\bf M}), λ_{\max}({\bf M})\leq b\}$, when $\bf M$ is a real or complex finite dimensional Wishart, double Wishart, or Gaussian symmetric/Hermitian matrix. We give efficient recursive formulas allowing the exact evaluation of $ψ(a,b)$ for Wishart matrices, even with large number of variates and degrees of freedom. We also prove that the probability that all eigenvalues are within the limiting spectral support (given by the Mar{č}enko-Pastur or the semicircle laws) tends for large dimensions to the universal values $0.6921$ and $0.9397$ for the real and complex cases, respectively. Applications include improved bounds for the probability that a Gaussian measurement matrix has a given restricted isometry constant in compressed sensing.
△ Less
Submitted 22 April, 2017; v1 submitted 14 February, 2015;
originally announced February 2015.
-
Distribution of the largest root of a matrix for Roy's test in multivariate analysis of variance
Authors:
Marco Chiani
Abstract:
Let ${\bf X, Y} $ denote two independent real Gaussian $\mathsf{p} \times \mathsf{m}$ and $\mathsf{p} \times \mathsf{n}$ matrices with $\mathsf{m}, \mathsf{n} \geq \mathsf{p}$, each constituted by zero mean i.i.d. columns with common covariance. The Roy's largest root criterion, used in multivariate analysis of variance (MANOVA), is based on the statistic of the largest eigenvalue, $Θ_1$, of…
▽ More
Let ${\bf X, Y} $ denote two independent real Gaussian $\mathsf{p} \times \mathsf{m}$ and $\mathsf{p} \times \mathsf{n}$ matrices with $\mathsf{m}, \mathsf{n} \geq \mathsf{p}$, each constituted by zero mean i.i.d. columns with common covariance. The Roy's largest root criterion, used in multivariate analysis of variance (MANOVA), is based on the statistic of the largest eigenvalue, $Θ_1$, of ${\bf{(A+B)}}^{-1} \bf{B}$, where ${\bf A =X X}^T$ and ${\bf B =Y Y}^T$ are independent central Wishart matrices. We derive a new expression and efficient recursive formulas for the exact distribution of $Θ_1$. The expression can be easily calculated even for large parameters, eliminating the need of pre-calculated tables for the application of the Roy's test.
△ Less
Submitted 2 April, 2017; v1 submitted 16 January, 2014;
originally announced January 2014.
-
Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access
Authors:
Enrico Paolini,
Gianluigi Liva,
Marco Chiani
Abstract:
In this paper, a random access scheme is introduced which relies on the combination of packet erasure correcting codes and successive interference cancellation (SIC). The scheme is named coded slotted ALOHA. A bipartite graph representation of the SIC process, resembling iterative decoding of generalized low-density parity-check codes over the erasure channel, is exploited to optimize the selectio…
▽ More
In this paper, a random access scheme is introduced which relies on the combination of packet erasure correcting codes and successive interference cancellation (SIC). The scheme is named coded slotted ALOHA. A bipartite graph representation of the SIC process, resembling iterative decoding of generalized low-density parity-check codes over the erasure channel, is exploited to optimize the selection probabilities of the component erasure correcting codes via density evolution analysis. The capacity (in packets per slot) of the scheme is then analyzed in the context of the collision channel without feedback. Moreover, a capacity bound is developed and component code distributions tightly approaching the bound are derived.
△ Less
Submitted 30 September, 2015; v1 submitted 8 January, 2014;
originally announced January 2014.
-
Distribution of the largest eigenvalue for real Wishart and Gaussian random matrices and a simple approximation for the Tracy-Widom distribution
Authors:
Marco Chiani
Abstract:
We derive efficient recursive formulas giving the exact distribution of the largest eigenvalue for finite dimensional real Wishart matrices and for the Gaussian Orthogonal Ensemble (GOE). In comparing the exact distribution with the limiting distribution of large random matrices, we also found that the Tracy-Widom law can be approximated by a properly scaled and shifted Gamma distribution, with gr…
▽ More
We derive efficient recursive formulas giving the exact distribution of the largest eigenvalue for finite dimensional real Wishart matrices and for the Gaussian Orthogonal Ensemble (GOE). In comparing the exact distribution with the limiting distribution of large random matrices, we also found that the Tracy-Widom law can be approximated by a properly scaled and shifted Gamma distribution, with great accuracy for the values of common interest in statistical applications.
△ Less
Submitted 22 April, 2014; v1 submitted 15 September, 2012;
originally announced September 2012.
-
Spatially-Coupled Random Access on Graphs
Authors:
Gianluigi Liva,
Enrico Paolini,
Michael Lentmaier,
Marco Chiani
Abstract:
In this paper we investigate the effect of spatial coupling applied to the recently-proposed coded slotted ALOHA (CSA) random access protocol. Thanks to the bridge between the graphical model describing the iterative interference cancelation process of CSA over the random access frame and the erasure recovery process of low-density parity-check (LDPC) codes over the binary erasure channel (BEC), w…
▽ More
In this paper we investigate the effect of spatial coupling applied to the recently-proposed coded slotted ALOHA (CSA) random access protocol. Thanks to the bridge between the graphical model describing the iterative interference cancelation process of CSA over the random access frame and the erasure recovery process of low-density parity-check (LDPC) codes over the binary erasure channel (BEC), we propose an access protocol which is inspired by the convolutional LDPC code construction. The proposed protocol exploits the terminations of its graphical model to achieve the spatial coupling effect, attaining performance close to the theoretical limits of CSA. As for the convolutional LDPC code case, large iterative decoding thresholds are obtained by simply increasing the density of the graph. We show that the threshold saturation effect takes place by defining a suitable counterpart of the maximum-a-posteriori decoding threshold of spatially-coupled LDPC code ensembles. In the asymptotic setting, the proposed scheme allows sustaining a traffic close to 1 [packets/slot].
△ Less
Submitted 15 May, 2012;
originally announced May 2012.
-
Spectral Shape of Doubly-Generalized LDPC Codes: Efficient and Exact Evaluation
Authors:
Mark F. Flanagan,
Enrico Paolini,
Marco Chiani,
Marc P. C. Fossorier
Abstract:
This paper analyzes the asymptotic exponent of the weight spectrum for irregular doubly-generalized LDPC (D-GLDPC) codes. In the process, an efficient numerical technique for its evaluation is presented, involving the solution of a 4 x 4 system of polynomial equations. The expression is consistent with previous results, including the case where the normalized weight or stopping set size tends to z…
▽ More
This paper analyzes the asymptotic exponent of the weight spectrum for irregular doubly-generalized LDPC (D-GLDPC) codes. In the process, an efficient numerical technique for its evaluation is presented, involving the solution of a 4 x 4 system of polynomial equations. The expression is consistent with previous results, including the case where the normalized weight or stopping set size tends to zero. The spectral shape is shown to admit a particularly simple form in the special case where all variable nodes are repetition codes of the same degree, a case which includes Tanner codes; for this case it is also shown how certain symmetry properties of the local weight distribution at the CNs induce a symmetry in the overall weight spectral shape function. Finally, using these new results, weight and stopping set size spectral shapes are evaluated for some example generalized and doubly-generalized LDPC code ensembles.
△ Less
Submitted 13 May, 2013; v1 submitted 11 April, 2012;
originally announced April 2012.
-
Graph-Based Random Access for the Collision Channel without Feedback: Capacity Bound
Authors:
Enrico Paolini,
Gianluigi Liva,
Marco Chiani
Abstract:
A random access scheme for the collision channel without feedback is proposed. The scheme is based on erasure correcting codes for the recovery of packet segments that are lost in collisions, and on successive interference cancellation for resolving collisions. The proposed protocol achieves reliable communication in the asymptotic setting and attains capacities close to 1 [packets/slot]. A capaci…
▽ More
A random access scheme for the collision channel without feedback is proposed. The scheme is based on erasure correcting codes for the recovery of packet segments that are lost in collisions, and on successive interference cancellation for resolving collisions. The proposed protocol achieves reliable communication in the asymptotic setting and attains capacities close to 1 [packets/slot]. A capacity bound as a function of the overall rate of the scheme is derived, and code distributions tightly approaching the bound developed.
△ Less
Submitted 9 January, 2012;
originally announced January 2012.
-
Stability of Iterative Decoding of Multi-Edge Type Doubly-Generalized LDPC Codes Over the BEC
Authors:
Enrico Paolini,
Mark F. Flanagan,
Marco Chiani,
Marc P. C. Fossorier
Abstract:
Using the EXIT chart approach, a necessary and sufficient condition is developed for the local stability of iterative decoding of multi-edge type (MET) doubly-generalized low-density parity-check (D-GLDPC) code ensembles. In such code ensembles, the use of arbitrary linear block codes as component codes is combined with the further design of local Tanner graph connectivity through the use of multi…
▽ More
Using the EXIT chart approach, a necessary and sufficient condition is developed for the local stability of iterative decoding of multi-edge type (MET) doubly-generalized low-density parity-check (D-GLDPC) code ensembles. In such code ensembles, the use of arbitrary linear block codes as component codes is combined with the further design of local Tanner graph connectivity through the use of multiple edge types. The stability condition for these code ensembles is shown to be succinctly described in terms of the value of the spectral radius of an appropriately defined polynomial matrix.
△ Less
Submitted 16 December, 2011;
originally announced December 2011.
-
Turbo Codes Based on Time-Variant Memory-1 Convolutional Codes over Fq
Authors:
Gianluigi Liva,
Enrico Paolini,
Sandro Scalise,
Marco Chiani
Abstract:
Two classes of turbo codes over high-order finite fields are introduced. The codes are derived from a particular protograph sub-ensemble of the (dv=2,dc=3) low-density parity-check code ensemble. A first construction is derived as a parallel concatenation of two non-binary, time-variant accumulators. The second construction is based on the serial concatenation of a non-binary, time-variant differe…
▽ More
Two classes of turbo codes over high-order finite fields are introduced. The codes are derived from a particular protograph sub-ensemble of the (dv=2,dc=3) low-density parity-check code ensemble. A first construction is derived as a parallel concatenation of two non-binary, time-variant accumulators. The second construction is based on the serial concatenation of a non-binary, time-variant differentiator and of a non-binary, time-variant accumulator, and provides a highly-structured flexible encoding scheme for (dv=2,dc=4) ensemble codes. A cycle graph representation is provided. The proposed codes can be decoded efficiently either as low-density parity-check codes (via belief propagation decoding over the codes bipartite graph) or as turbo codes (via the forward-backward algorithm applied to the component codes trellis). The forward-backward algorithm for symbol maximum a posteriori decoding of the component codes is illustrated and simplified by means of the fast Fourier transform. The proposed codes provide remarkable gains (~ 1 dB) over binary low-density parity-check and turbo codes in the moderate-short block regimes.
△ Less
Submitted 13 April, 2011; v1 submitted 23 February, 2011;
originally announced February 2011.
-
High Throughput Random Access via Codes on Graphs: Coded Slotted ALOHA
Authors:
Enrico Paolini,
Gianluigi Liva,
Marco Chiani
Abstract:
In this paper, coded slotted ALOHA (CSA) is introduced as a powerful random access scheme to the MAC frame. In CSA, the burst a generic user wishes to transmit in the MAC frame is first split into segments, and these segments are then encoded through a local a packet-oriented code prior to transmission. On the receiver side, iterative interference cancellation combined with decoding of the local c…
▽ More
In this paper, coded slotted ALOHA (CSA) is introduced as a powerful random access scheme to the MAC frame. In CSA, the burst a generic user wishes to transmit in the MAC frame is first split into segments, and these segments are then encoded through a local a packet-oriented code prior to transmission. On the receiver side, iterative interference cancellation combined with decoding of the local code is performed to recover from collisions. The new scheme generalizes the previously proposed irregular repetition slotted ALOHA (IRSA) technique, based on a simple repetition of the users' bursts. An interpretation of the CSA interference cancellation process as an iterative erasure decoding process over a sparse bipartite graph is identified, and the corresponding density evolution equations derived. Based on these equations, asymptotically optimal CSA schemes are designed for several rates and their performance for a finite number of users investigated through simulation and compared to IRSA competitors. Throughputs as high as 0.8 are demonstrated. The new scheme turns out to be a good candidate in contexts where power efficiency is required.
△ Less
Submitted 12 February, 2011;
originally announced February 2011.
-
High-Throughput Random Access via Codes on Graphs
Authors:
Gianluigi Liva,
Enrico Paolini,
Marco Chiani
Abstract:
Recently, contention resolution diversity slotted ALOHA (CRDSA) has been introduced as a simple but effective improvement to slotted ALOHA. It relies on MAC burst repetitions and on interference cancellation to increase the normalized throughput of a classic slotted ALOHA access scheme. CRDSA allows achieving a larger throughput than slotted ALOHA, at the price of an increased average transmitted…
▽ More
Recently, contention resolution diversity slotted ALOHA (CRDSA) has been introduced as a simple but effective improvement to slotted ALOHA. It relies on MAC burst repetitions and on interference cancellation to increase the normalized throughput of a classic slotted ALOHA access scheme. CRDSA allows achieving a larger throughput than slotted ALOHA, at the price of an increased average transmitted power. A way to trade-off the increment of the average transmitted power and the improvement of the throughput is presented in this paper. Specifically, it is proposed to divide each MAC burst in k sub-bursts, and to encode them via a (n,k) erasure correcting code. The n encoded sub-bursts are transmitted over the MAC channel, according to specific time/frequency-hopping patterns. Whenever n-e>=k sub-bursts (of the same burst) are received without collisions, erasure decoding allows recovering the remaining e sub-bursts (which were lost due to collisions). An interference cancellation process can then take place, removing in e slots the interference caused by the e recovered sub-bursts, possibly allowing the correct decoding of sub-bursts related to other bursts. The process is thus iterated as for the CRDSA case.
△ Less
Submitted 19 October, 2010; v1 submitted 18 October, 2010;
originally announced October 2010.
-
How to use our talents based on Information Theory - or spending time wisely
Authors:
Marco Chiani
Abstract:
We discuss the allocation of finite resources in the presence of a logarithmic diminishing return law, in analogy to some results from Information Theory. To exemplify the problem we assume that the proposed logarithmic law is applied to the problem of how to spend our time.
We discuss the allocation of finite resources in the presence of a logarithmic diminishing return law, in analogy to some results from Information Theory. To exemplify the problem we assume that the proposed logarithmic law is applied to the problem of how to spend our time.
△ Less
Submitted 16 October, 2010;
originally announced October 2010.
-
Spectral Shape of Check-Hybrid GLDPC Codes
Authors:
Enrico Paolini,
Mark F. Flanagan,
Marco Chiani,
Marc P. C. Fossorier
Abstract:
This paper analyzes the asymptotic exponent of both the weight spectrum and the stopping set size spectrum for a class of generalized low-density parity-check (GLDPC) codes. Specifically, all variable nodes (VNs) are assumed to have the same degree (regular VN set), while the check node (CN) set is assumed to be composed of a mixture of different linear block codes (hybrid CN set). A simple expres…
▽ More
This paper analyzes the asymptotic exponent of both the weight spectrum and the stopping set size spectrum for a class of generalized low-density parity-check (GLDPC) codes. Specifically, all variable nodes (VNs) are assumed to have the same degree (regular VN set), while the check node (CN) set is assumed to be composed of a mixture of different linear block codes (hybrid CN set). A simple expression for the exponent (which is also referred to as the growth rate or the spectral shape) is developed. This expression is consistent with previous results, including the case where the normalized weight or stopping set size tends to zero. Furthermore, it is shown how certain symmetry properties of the local weight distribution at the CNs induce a symmetry in the overall weight spectral shape function.
△ Less
Submitted 26 May, 2010;
originally announced May 2010.
-
Growth Rate of the Weight Distribution of Doubly-Generalized LDPC Codes: General Case and Efficient Evaluation
Authors:
Mark F. Flanagan,
Enrico Paolini,
Marco Chiani,
Marc P. C. Fossorier
Abstract:
The growth rate of the weight distribution of irregular doubly-generalized LDPC (D-GLDPC) codes is developed and in the process, a new efficient numerical technique for its evaluation is presented. The solution involves simultaneous solution of a 4 x 4 system of polynomial equations. This represents the first efficient numerical technique for exact evaluation of the growth rate, even for LDPC co…
▽ More
The growth rate of the weight distribution of irregular doubly-generalized LDPC (D-GLDPC) codes is developed and in the process, a new efficient numerical technique for its evaluation is presented. The solution involves simultaneous solution of a 4 x 4 system of polynomial equations. This represents the first efficient numerical technique for exact evaluation of the growth rate, even for LDPC codes. The technique is applied to two example D-GLDPC code ensembles.
△ Less
Submitted 28 July, 2009;
originally announced July 2009.
-
On a Class of Doubly-Generalized LDPC Codes with Single Parity-Check Variable Nodes
Authors:
E. Paolini,
M. F. Flanagan,
M. Chiani,
M. P. C. Fossorier
Abstract:
A class of doubly-generalized low-density parity-check (D-GLDPC) codes, where single parity-check (SPC) codes are used as variable nodes (VNs), is investigated. An expression for the growth rate of the weight distribution of any D-GLDPC ensemble with a uniform check node (CN) set is presented at first, together with an analytical technique for its efficient evaluation. These tools are then used…
▽ More
A class of doubly-generalized low-density parity-check (D-GLDPC) codes, where single parity-check (SPC) codes are used as variable nodes (VNs), is investigated. An expression for the growth rate of the weight distribution of any D-GLDPC ensemble with a uniform check node (CN) set is presented at first, together with an analytical technique for its efficient evaluation. These tools are then used for detailed analysis of a case study, namely, a rate-1/2 D-GLDPC ensemble where all the CNs are (7,4) Hamming codes and all the VNs are length-7 SPC codes. It is illustrated how the VN representations can heavily affect the code properties and how different VN representations can be combined within the same graph to enhance some of the code parameters. The analysis is conducted over the binary erasure channel. Interesting features of the new codes include the capability of achieving a good compromise between waterfall and error floor performance while preserving graphical regularity, and values of threshold outperforming LDPC counterparts.
△ Less
Submitted 19 May, 2009;
originally announced May 2009.
-
On the Growth Rate of the Weight Distribution of Irregular Doubly-Generalized LDPC Codes
Authors:
Mark F. Flanagan,
Enrico Paolini,
Marco Chiani,
Marc Fossorier
Abstract:
In this paper, an expression for the asymptotic growth rate of the number of small linear-weight codewords of irregular doubly-generalized LDPC (D-GLDPC) codes is derived. The expression is compact and generalizes existing results for LDPC and generalized LDPC (GLDPC) codes. Ensembles with check or variable node minimum distance greater than 2 are shown to be have good growth rate behavior, while…
▽ More
In this paper, an expression for the asymptotic growth rate of the number of small linear-weight codewords of irregular doubly-generalized LDPC (D-GLDPC) codes is derived. The expression is compact and generalizes existing results for LDPC and generalized LDPC (GLDPC) codes. Ensembles with check or variable node minimum distance greater than 2 are shown to be have good growth rate behavior, while for other ensembles a fundamental parameter is identified which discriminates between an asymptotically small and an asymptotically large expected number of small linear-weight codewords. Also, in the latter case it is shown that the growth rate depends only on the check and variable nodes with minimum distance 2. An important connection between this new result and the stability condition of D-GLDPC codes over the BEC is highlighted. Such a connection, previously observed for LDPC and GLDPC codes, is now extended to the case of D-GLDPC codes. Finally, it is shown that the analysis may be extended to include the growth rate of the stopping set size distribution of irregular D-GLDPC codes.
△ Less
Submitted 4 May, 2010; v1 submitted 9 March, 2009;
originally announced March 2009.
-
Construction of Near-Optimum Burst Erasure Correcting Low-Density Parity-Check Codes
Authors:
E. Paolini,
M. Chiani
Abstract:
In this paper, a simple, general-purpose and effective tool for the design of low-density parity-check (LDPC) codes for iterative correction of bursts of erasures is presented. The design method consists in starting from the parity-check matrix of an LDPC code and developing an optimized parity-check matrix, with the same performance on the memory-less erasure channel, and suitable also for the…
▽ More
In this paper, a simple, general-purpose and effective tool for the design of low-density parity-check (LDPC) codes for iterative correction of bursts of erasures is presented. The design method consists in starting from the parity-check matrix of an LDPC code and developing an optimized parity-check matrix, with the same performance on the memory-less erasure channel, and suitable also for the iterative correction of single bursts of erasures. The parity-check matrix optimization is performed by an algorithm called pivot searching and swapping (PSS) algorithm, which executes permutations of carefully chosen columns of the parity-check matrix, after a local analysis of particular variable nodes called stopping set pivots. This algorithm can be in principle applied to any LDPC code. If the input parity-check matrix is designed for achieving good performance on the memory-less erasure channel, then the code obtained after the application of the PSS algorithm provides good joint correction of independent erasures and single erasure bursts. Numerical results are provided in order to show the effectiveness of the PSS algorithm when applied to different categories of LDPC codes.
△ Less
Submitted 7 October, 2008;
originally announced October 2008.
-
On the Growth Rate of the Weight Distribution of Irregular Doubly-Generalized LDPC Codes
Authors:
Mark F. Flanagan,
Enrico Paolini,
Marco Chiani,
Marc Fossorier
Abstract:
In this paper, an expression for the asymptotic growth rate of the number of small linear-weight codewords of irregular doubly-generalized LDPC (D-GLDPC) codes is derived. The expression is compact and generalizes existing results for LDPC and generalized LDPC (GLDPC) codes. Assuming that there exist check and variable nodes with minimum distance 2, it is shown that the growth rate depends only…
▽ More
In this paper, an expression for the asymptotic growth rate of the number of small linear-weight codewords of irregular doubly-generalized LDPC (D-GLDPC) codes is derived. The expression is compact and generalizes existing results for LDPC and generalized LDPC (GLDPC) codes. Assuming that there exist check and variable nodes with minimum distance 2, it is shown that the growth rate depends only on these nodes. An important connection between this new result and the stability condition of D-GLDPC codes over the BEC is highlighted. Such a connection, previously observed for LDPC and GLDPC codes, is now extended to the case of D-GLDPC codes.
△ Less
Submitted 26 August, 2008;
originally announced August 2008.
-
Low-Complexity LDPC Codes with Near-Optimum Performance over the BEC
Authors:
Enrico Paolini,
Gianluigi Liva,
Michela Varrella,
Balazs Matuz,
Marco Chiani
Abstract:
Recent works showed how low-density parity-check (LDPC) erasure correcting codes, under maximum likelihood (ML) decoding, are capable of tightly approaching the performance of an ideal maximum-distance-separable code on the binary erasure channel. Such result is achievable down to low error rates, even for small and moderate block sizes, while keeping the decoding complexity low, thanks to a cla…
▽ More
Recent works showed how low-density parity-check (LDPC) erasure correcting codes, under maximum likelihood (ML) decoding, are capable of tightly approaching the performance of an ideal maximum-distance-separable code on the binary erasure channel. Such result is achievable down to low error rates, even for small and moderate block sizes, while keeping the decoding complexity low, thanks to a class of decoding algorithms which exploits the sparseness of the parity-check matrix to reduce the complexity of Gaussian elimination (GE). In this paper the main concepts underlying ML decoding of LDPC codes are recalled. A performance analysis among various LDPC code classes is then carried out, including a comparison with fixed-rate Raptor codes. The results show that LDPC and Raptor codes provide almost identical performance in terms of decoding failure probability vs. overhead.
△ Less
Submitted 18 April, 2008;
originally announced April 2008.
-
Doubly-Generalized LDPC Codes: Stability Bound over the BEC
Authors:
Enrico Paolini,
Marc Fossorier,
Marco Chiani
Abstract:
The iterative decoding threshold of low-density parity-check (LDPC) codes over the binary erasure channel (BEC) fulfills an upper bound depending only on the variable and check nodes with minimum distance 2. This bound is a consequence of the stability condition, and is here referred to as stability bound. In this paper, a stability bound over the BEC is developed for doubly-generalized LDPC cod…
▽ More
The iterative decoding threshold of low-density parity-check (LDPC) codes over the binary erasure channel (BEC) fulfills an upper bound depending only on the variable and check nodes with minimum distance 2. This bound is a consequence of the stability condition, and is here referred to as stability bound. In this paper, a stability bound over the BEC is developed for doubly-generalized LDPC codes, where the variable and the check nodes can be generic linear block codes, assuming maximum a posteriori erasure correction at each node. It is proved that in this generalized context as well the bound depends only on the variable and check component codes with minimum distance 2. A condition is also developed, namely the derivative matching condition, under which the bound is achieved with equality.
△ Less
Submitted 6 February, 2008;
originally announced February 2008.
-
MIMO Networks: the Effects of Interference
Authors:
Marco Chiani,
Moe Z. Win,
Hyundong Shin
Abstract:
Multiple-input/multiple-output (MIMO) systems promise enormous capacity increase and are being considered as one of the key technologies for future wireless networks. However, the decrease in capacity due to the presence of interferers in MIMO networks is not well understood. In this paper, we develop an analytical framework to characterize the capacity of MIMO communication systems in the prese…
▽ More
Multiple-input/multiple-output (MIMO) systems promise enormous capacity increase and are being considered as one of the key technologies for future wireless networks. However, the decrease in capacity due to the presence of interferers in MIMO networks is not well understood. In this paper, we develop an analytical framework to characterize the capacity of MIMO communication systems in the presence of multiple MIMO co-channel interferers and noise. We consider the situation in which transmitters have no information about the channel and all links undergo Rayleigh fading. We first generalize the known determinant representation of hypergeometric functions with matrix arguments to the case when the argument matrices have eigenvalues of arbitrary multiplicity. This enables the derivation of the distribution of the eigenvalues of Gaussian quadratic forms and Wishart matrices with arbitrary correlation, with application to both single user and multiuser MIMO systems. In particular, we derive the ergodic mutual information for MIMO systems in the presence of multiple MIMO interferers. Our analysis is valid for any number of interferers, each with arbitrary number of antennas having possibly unequal power levels. This framework, therefore, accommodates the study of distributed MIMO systems and accounts for different positions of the MIMO interferers.
△ Less
Submitted 8 October, 2009; v1 submitted 5 February, 2008;
originally announced February 2008.