-
High-fidelity spatial information transfer through dynamic scattering media by an epsilon-near-zero time-gate
Authors:
Yang Xu,
Saumya Choudhary,
Long D. Nguyen,
Matthew Klein,
Shivashankar Vangala,
J. Keith Miller,
Eric G. Johnson,
Joshua R. Hendrickson,
M. Zahirul Alam,
Robert W. Boyd
Abstract:
Transparent conducting oxides (TCO) such as indium-tin-oxide (ITO) exhibit strong optical nonlinearity in the frequency range where their permittivities are near zero. We leverage this nonlinear optical response to realize a sub-picosecond time-gate based on upconversion (or sum-) four-wave mixing (FWM) between two ultrashort pulses centered at the epsilon-near-zero (ENZ) wavelength in a sub-micro…
▽ More
Transparent conducting oxides (TCO) such as indium-tin-oxide (ITO) exhibit strong optical nonlinearity in the frequency range where their permittivities are near zero. We leverage this nonlinear optical response to realize a sub-picosecond time-gate based on upconversion (or sum-) four-wave mixing (FWM) between two ultrashort pulses centered at the epsilon-near-zero (ENZ) wavelength in a sub-micron-thick ITO film. The time-gate removes the effect of both static and dynamic scattering on the signal pulse by retaining only the ballistic photons of the pulse, that is, the photons that are not scattered. Thus, the spatial information encoded in either the intensity or the phase of the signal pulse can be preserved and transmitted with high fidelity through scattering media. Furthermore, in the presence of time-varying scattering, our time-gate can reduce the resulting scintillation by two orders of magnitude. In contrast to traditional bulk nonlinear materials, time gating by sum-FWM in a sub-wavelength-thick ENZ film can produce a scattering-free upconverted signal at a visible wavelength without sacrificing spatial resolution, which is usually limited by the phase-matching condition. Our proof-of-principle experiment can have implications for potential applications such as \textit{in vivo} diagnostic imaging and free-space optical communication.
△ Less
Submitted 26 March, 2025;
originally announced March 2025.
-
Maximizing NFT Incentives: References Make You Rich
Authors:
Guangsheng Yu,
Qin Wang,
Caijun Sun,
Lam Duc Nguyen,
H. M. N. Dilum Bandara,
Shiping Chen
Abstract:
In this paper, we study how to optimize existing Non-Fungible Token (NFT) incentives. Upon exploring a large number of NFT-related standards and real-world projects, we come across an unexpected finding. That is, the current NFT incentive mechanisms, often organized in an isolated and one-time-use fashion, tend to overlook their potential for scalable organizational structures.
We propose, analy…
▽ More
In this paper, we study how to optimize existing Non-Fungible Token (NFT) incentives. Upon exploring a large number of NFT-related standards and real-world projects, we come across an unexpected finding. That is, the current NFT incentive mechanisms, often organized in an isolated and one-time-use fashion, tend to overlook their potential for scalable organizational structures.
We propose, analyze, and implement a novel reference incentive model, which is inherently structured as a Directed Acyclic Graph (DAG)-based NFT network. This model aims to maximize connections (or references) between NFTs, enabling each isolated NFT to expand its network and accumulate rewards derived from subsequent or subscribed ones. We conduct both theoretical and practical analyses of the model, demonstrating its optimal utility.
△ Less
Submitted 9 February, 2024;
originally announced February 2024.
-
Quantum Software Analytics: Opportunities and Challenges
Authors:
Thong Hoang,
Hoa Khanh Dam,
Tingting Bi,
Qinghua Lu,
Zhenchang Xing,
Liming Zhu,
Lam Duc Nguyen,
Shiping Chen
Abstract:
Quantum computing systems depend on the principles of quantum mechanics to perform multiple challenging tasks more efficiently than their classical counterparts. In classical software engineering, the software life cycle is used to document and structure the processes of design, implementation, and maintenance of software applications. It helps stakeholders understand how to build an application.…
▽ More
Quantum computing systems depend on the principles of quantum mechanics to perform multiple challenging tasks more efficiently than their classical counterparts. In classical software engineering, the software life cycle is used to document and structure the processes of design, implementation, and maintenance of software applications. It helps stakeholders understand how to build an application. In this paper, we summarize a set of software analytics topics and techniques in the development life cycle that can be leveraged and integrated into quantum software application development. The results of this work can assist researchers and practitioners in better understanding the quantum-specific emerging development activities, challenges, and opportunities in the next generation of quantum software.
△ Less
Submitted 20 July, 2023;
originally announced July 2023.
-
Blockchain-Empowered Trustworthy Data Sharing: Fundamentals, Applications, and Challenges
Authors:
Linh T. Nguyen,
Lam Duc Nguyen,
Thong Hoang,
Dilum Bandara,
Qin Wang,
Qinghua Lu,
Xiwei Xu,
Liming Zhu,
Petar Popovski,
Shiping Chen
Abstract:
Various data-sharing platforms have emerged with the growing public demand for open data and legislation mandating certain data to remain open. Most of these platforms remain opaque, leading to many questions about data accuracy, provenance and lineage, privacy implications, consent management, and the lack of fair incentives for data providers. With their transparency, immutability, non-repudiati…
▽ More
Various data-sharing platforms have emerged with the growing public demand for open data and legislation mandating certain data to remain open. Most of these platforms remain opaque, leading to many questions about data accuracy, provenance and lineage, privacy implications, consent management, and the lack of fair incentives for data providers. With their transparency, immutability, non-repudiation, and decentralization properties, blockchains could not be more apt to answer these questions and enhance trust in a data-sharing platform. However, blockchains are not good at handling the four Vs of big data (i.e., volume, variety, velocity, and veracity) due to their limited performance, scalability, and high cost. Given many related works proposes blockchain-based trustworthy data-sharing solutions, there is increasing confusion and difficulties in understanding and selecting these technologies and platforms in terms of their sharing mechanisms, sharing services, quality of services, and applications. In this paper, we conduct a comprehensive survey on blockchain-based data-sharing architectures and applications to fill the gap. First, we present the foundations of blockchains and discuss the challenges of current data-sharing techniques. Second, we focus on the convergence of blockchain and data sharing to give a clear picture of this landscape and propose a reference architecture for blockchain-based data sharing. Third, we discuss the industrial applications of blockchain-based data sharing, ranging from healthcare and smart grid to transportation and decarbonization. For each application, we provide lessons learned for the deployment of Blockchain-based data sharing. Finally, we discuss research challenges and open research directions.
△ Less
Submitted 11 March, 2023;
originally announced March 2023.
-
BDSP: A Fair Blockchain-enabled Framework for Privacy-Enhanced Enterprise Data Sharing
Authors:
Lam Duc Nguyen,
James Hoang,
Qin Wang,
Qinghua Lu,
Sherry Xu,
Shiping Chen
Abstract:
Across industries, there is an ever-increasing rate of data sharing for collaboration and innovation between organizations and their customers, partners, suppliers, and internal teams. However, many enterprises are restricted from freely sharing data due to regulatory restrictions across different regions, performance issues in moving large volume data, or requirements to maintain autonomy. In suc…
▽ More
Across industries, there is an ever-increasing rate of data sharing for collaboration and innovation between organizations and their customers, partners, suppliers, and internal teams. However, many enterprises are restricted from freely sharing data due to regulatory restrictions across different regions, performance issues in moving large volume data, or requirements to maintain autonomy. In such situations, the enterprise can benefit from the concept of federated learning, in which machine learning models are constructed at various geographic sites. In this paper, we introduce a general framework, namely BDSP, to share data among enterprises based on Blockchain and federated learning techniques. Specifically, we propose a transparency contribution accounting mechanism to estimate the valuation of data and implement a proof-of-concept for further evaluation. The extensive experimental results show that the proposed BDSP has a competitive performance with higher training accuracy, an increase of over 5%, and lower communication overhead, reducing 3 times, compared to baseline approaches.
△ Less
Submitted 16 December, 2022;
originally announced December 2022.
-
An Empirical Study on Snapshot DAOs
Authors:
Qin Wang,
Guangsheng Yu,
Yilin Sai,
Caijun Sun,
Lam Duc Nguyen,
Sherry Xu,
Shiping Chen
Abstract:
Decentralized Autonomous Organization (DAO) is an organization constructed by automatically executed rules such as via smart contracts, holding features of the permissionless committee, transparent proposals, and fair contribution by stakeholders. As of Nov 2022, DAO has impacted over \$11.2B market caps. However, there are no substantial studies focused on this emerging field. To fill the gap, we…
▽ More
Decentralized Autonomous Organization (DAO) is an organization constructed by automatically executed rules such as via smart contracts, holding features of the permissionless committee, transparent proposals, and fair contribution by stakeholders. As of Nov 2022, DAO has impacted over \$11.2B market caps. However, there are no substantial studies focused on this emerging field. To fill the gap, we start from the ground truth by empirically studying the breadth and depth of the DAO markets in mainstream public chain ecosystems in this paper. We dive into the most widely adoptable DAO launchpad, \textit{Snapshot}, which covers 95\% in the wild DAO projects for data collection and analysis. By integrating extensive enrolled DAOs and corresponding data measurements, we explore statistical data from Snapshot and try to demystify its undiscovered truths by delivering a series of summarised insights. We also present DAO status, patterns, distribution, and trends. To our knowledge, this is the first empirical study putting concentration on DAO spaces.
△ Less
Submitted 19 May, 2023; v1 submitted 29 November, 2022;
originally announced November 2022.
-
Observation of the massive Lee-Fukuyama phason in a charge density wave insulator
Authors:
Soyeun Kim,
Yinchuan Lv,
Xiao-Qi Sun,
Chengxi Zhao,
Nina Bielinski,
Azel Murzabekova,
Kejian Qu,
Ryan A. Duncan,
Quynh L. D. Nguyen,
Mariano Trigo,
Daniel P. Shoemaker,
Barry Bradlyn,
Fahad Mahmood
Abstract:
The lowest-lying fundamental excitation of an incommensurate charge density wave (CDW) material is widely believed to be a massless phason -- a collective modulation of the phase of the CDW order parameter. However, as first pointed out by Lee and Fukuyama, long-range Coulomb interactions should push the phason energy up to the plasma energy of the CDW condensate, resulting in a massive phason and…
▽ More
The lowest-lying fundamental excitation of an incommensurate charge density wave (CDW) material is widely believed to be a massless phason -- a collective modulation of the phase of the CDW order parameter. However, as first pointed out by Lee and Fukuyama, long-range Coulomb interactions should push the phason energy up to the plasma energy of the CDW condensate, resulting in a massive phason and a fully gapped spectrum. Whether such behavior occurs in a CDW system has been unresolved for more than four decades. Using time-domain THz emission spectroscopy, we investigate this issue in the material (TaSe$_4$)$_2$I, a classical example of a quasi-one-dimensional CDW insulator. Upon transient photoexcitation at low temperatures, we find the material strikingly emits coherent, narrow-band THz radiation. The frequency, polarization and temperature-dependence of the emitted radiation imply the existence of a phason that acquires mass by coupling to long-range Coulomb interaction. Our observations constitute the first direct evidence of the massive "Lee-Fukuyama" phason and highlight the potential applicability of fundamental collective modes of correlated materials as compact and robust sources of THz radiation.
△ Less
Submitted 25 October, 2022;
originally announced October 2022.
-
FedToken: Tokenized Incentives for Data Contribution in Federated Learning
Authors:
Shashi Raj Pandey,
Lam Duc Nguyen,
Petar Popovski
Abstract:
Incentives that compensate for the involved costs in the decentralized training of a Federated Learning (FL) model act as a key stimulus for clients' long-term participation. However, it is challenging to convince clients for quality participation in FL due to the absence of: (i) full information on the client's data quality and properties; (ii) the value of client's data contributions; and (iii)…
▽ More
Incentives that compensate for the involved costs in the decentralized training of a Federated Learning (FL) model act as a key stimulus for clients' long-term participation. However, it is challenging to convince clients for quality participation in FL due to the absence of: (i) full information on the client's data quality and properties; (ii) the value of client's data contributions; and (iii) the trusted mechanism for monetary incentive offers. This often leads to poor efficiency in training and communication. While several works focus on strategic incentive designs and client selection to overcome this problem, there is a major knowledge gap in terms of an overall design tailored to the foreseen digital economy, including Web 3.0, while simultaneously meeting the learning objectives. To address this gap, we propose a contribution-based tokenized incentive scheme, namely \texttt{FedToken}, backed by blockchain technology that ensures fair allocation of tokens amongst the clients that corresponds to the valuation of their data during model training. Leveraging the engineered Shapley-based scheme, we first approximate the contribution of local models during model aggregation, then strategically schedule clients lowering the communication rounds for convergence and anchor ways to allocate \emph{affordable} tokens under a constrained monetary budget. Extensive simulations demonstrate the efficacy of our proposed method.
△ Less
Submitted 3 November, 2022; v1 submitted 20 September, 2022;
originally announced September 2022.
-
Self-Healing Secure Blockchain Framework in Microgrids
Authors:
Suman Rath,
Lam Duc Nguyen,
Subham Sahoo,
Petar Popovski
Abstract:
Blockchain has recently been depicted as a secure protocol for information exchange in cyber-physical microgrids. However, it is still found vulnerable to consensus manipulation attacks. These stealth attacks are often difficult to detect as they use kernel-level access to mask their actions. In this paper, we firstly build a trusted and secured peer-to-peer network mechanism for physical DC micro…
▽ More
Blockchain has recently been depicted as a secure protocol for information exchange in cyber-physical microgrids. However, it is still found vulnerable to consensus manipulation attacks. These stealth attacks are often difficult to detect as they use kernel-level access to mask their actions. In this paper, we firstly build a trusted and secured peer-to-peer network mechanism for physical DC microgrids' validation of transactions over Distributed Ledger. Secondly, we leverage from a physics-informed approach for detecting malware-infected nodes and then recovering from stealth attacks using a self-healing recovery scheme augmented into the microgrid Blockchain network. This scheme allows compromised nodes to adapt to a reconstructed trustworthy signal in a multi-hop manner using corresponding measurements from the reliable nodes in the network. Additionally, recognizing the possible threat of denial-of-service attacks and random time delays (where information sharing via communication channels is blocked), we also integrate a model-free predictive controller with the proposed system that can locally reconstruct an expected version of the attacked/delayed signals. This supplements the capabilities of Blockchain, enabling it to detect and mitigate consensus manipulation attempts, and network latencies.
△ Less
Submitted 7 March, 2023; v1 submitted 15 September, 2022;
originally announced September 2022.
-
Analysis of Distributed Ledger Technologies for Industrial Manufacturing
Authors:
Lam Duc Nguyen,
Arne Broering,
Massimo Pizzol,
Petar Popovski
Abstract:
In recent years, industrial manufacturing has undergone massive technological changes that embrace digitalization and automation towards the vision of intelligent manufacturing plants. With the aim of maximizing efficiency and profitability in production, an important goal is to enable flexible manufacturing, both, for the customer (desiring more individualized products) and for the manufacturer (…
▽ More
In recent years, industrial manufacturing has undergone massive technological changes that embrace digitalization and automation towards the vision of intelligent manufacturing plants. With the aim of maximizing efficiency and profitability in production, an important goal is to enable flexible manufacturing, both, for the customer (desiring more individualized products) and for the manufacturer (to adjust to market demands). Manufacturing-as-a-service can support this through manufacturing plants that are used by different tenants who utilize the machines in the plant, which are offered by different providers. To enable such pay-per-use business models, Distributed Ledger Technology (DLT) is a viable option to establish decentralized trust and traceability. Thus, in this paper, we study potential DLT technologies for an efficient and intelligent integration of DLT-based solutions in manufacturing environments. We propose a general framework to adapt DLT in manufacturing, then we introduce the use case of shared manufacturing, which we utilize to study the communication and computation efficiency of selected DLTs in resource-constrained wireless IoT networks.
△ Less
Submitted 18 October, 2022; v1 submitted 16 May, 2022;
originally announced May 2022.
-
A Contribution-based Device Selection Scheme in Federated Learning
Authors:
Shashi Raj Pandey,
Lam D. Nguyen,
Petar Popovski
Abstract:
In a Federated Learning (FL) setup, a number of devices contribute to the training of a common model. We present a method for selecting the devices that provide updates in order to achieve improved generalization, fast convergence, and better device-level performance. We formulate a min-max optimization problem and decompose it into a primal-dual setup, where the duality gap is used to quantify th…
▽ More
In a Federated Learning (FL) setup, a number of devices contribute to the training of a common model. We present a method for selecting the devices that provide updates in order to achieve improved generalization, fast convergence, and better device-level performance. We formulate a min-max optimization problem and decompose it into a primal-dual setup, where the duality gap is used to quantify the device-level performance. Our strategy combines \emph{exploration} of data freshness through a random device selection with \emph{exploitation} through simplified estimates of device contributions. This improves the performance of the trained model both in terms of generalization and personalization. A modified Truncated Monte-Carlo (TMC) method is applied during the exploitation phase to estimate the device's contribution and lower the communication overhead. The experimental results show that the proposed approach has a competitive performance, with lower communication overhead and competitive personalization performance against the baseline schemes.
△ Less
Submitted 7 June, 2022; v1 submitted 10 March, 2022;
originally announced March 2022.
-
A Marketplace for Trading AI Models based on Blockchain and Incentives for IoT Data
Authors:
Lam Duc Nguyen,
Shashi Raj Pandey,
Soret Beatriz,
Arne Broering,
Petar Popovski
Abstract:
As Machine Learning (ML) models are becoming increasingly complex, one of the central challenges is their deployment at scale, such that companies and organizations can create value through Artificial Intelligence (AI). An emerging paradigm in ML is a federated approach where the learning model is delivered to a group of heterogeneous agents partially, allowing agents to train the model locally wi…
▽ More
As Machine Learning (ML) models are becoming increasingly complex, one of the central challenges is their deployment at scale, such that companies and organizations can create value through Artificial Intelligence (AI). An emerging paradigm in ML is a federated approach where the learning model is delivered to a group of heterogeneous agents partially, allowing agents to train the model locally with their own data. However, the problem of valuation of models, as well the questions of incentives for collaborative training and trading of data/models, have received limited treatment in the literature. In this paper, a new ecosystem of ML model trading over a trusted Blockchain-based network is proposed. The buyer can acquire the model of interest from the ML market, and interested sellers spend local computations on their data to enhance that model's quality. In doing so, the proportional relation between the local data and the quality of trained models is considered, and the valuations of seller's data in training the models are estimated through the distributed Data Shapley Value (DSV). At the same time, the trustworthiness of the entire trading process is provided by the distributed Ledger Technology (DLT). Extensive experimental evaluation of the proposed approach shows a competitive run-time performance, with a 15\% drop in the cost of execution, and fairness in terms of incentives for the participants.
△ Less
Submitted 6 December, 2021;
originally announced December 2021.
-
Direct observation of enhanced electron-phonon coupling in copper nanoparticles in the warm-dense matter regime
Authors:
Quynh L. D. Nguyen,
Jacopo Simoni,
Kevin M. Dorney,
Xun Shi,
Jennifer L. Ellis,
Nathan J. Brooks,
Daniel D. Hickstein,
Amanda G. Grennell,
Sadegh Yazdi,
Eleanor E. B. Campbell,
Liang Z. Tan,
David Prendergast,
Jerome Daligault,
Henry C. Kapteyn,
Margaret M. Murnane
Abstract:
Warm-dense matter (WDM) is a highly-excited state that lies at the confluence of solids, plasmas, and liquids and that cannot be described by equilibrium theories. The transient nature of this state when created in a laboratory, as well as the difficulties in probing the strongly-coupled interactions between the electrons and the ions, make it challenging to develop a complete understanding of mat…
▽ More
Warm-dense matter (WDM) is a highly-excited state that lies at the confluence of solids, plasmas, and liquids and that cannot be described by equilibrium theories. The transient nature of this state when created in a laboratory, as well as the difficulties in probing the strongly-coupled interactions between the electrons and the ions, make it challenging to develop a complete understanding of matter in this regime. In this work, by exciting isolated ~8 nm nanoparticles with a femtosecond laser below the ablation threshold, we create uniformly-excited WDM. We then use photoelectron spectroscopy to track the instantaneous electron temperature and directly extract the strongest electron-ion coupling observed experimentally to date. By directly comparing with state-of-the-art theories, we confirm that the superheated nanoparticles lie at the boundary between hot solids and plasmas, with associated strong electron-ion coupling. This is evidenced both by the fast energy loss of electrons to ions, as well as a strong modulation of the electron temperature by acoustic oscillations in the nanoparticle. This work demonstrates a new route for experimental exploration and theoretical validation of the exotic properties of WDM.
△ Less
Submitted 28 June, 2022; v1 submitted 27 October, 2021;
originally announced October 2021.
-
Learning, Computing, and Trustworthiness in Intelligent IoT Environments: Performance-Energy Tradeoffs
Authors:
Beatriz Soret,
Lam D. Nguyen,
Jan Seeger,
Arne Bröring,
Chaouki Ben Issaid,
Sumudu Samarakoon,
Anis El Gabli,
Vivek Kulkarni,
Mehdi Bennis,
Petar Popovski
Abstract:
An Intelligent IoT Environment (iIoTe) is comprised of heterogeneous devices that can collaboratively execute semi-autonomous IoT applications, examples of which include highly automated manufacturing cells or autonomously interacting harvesting machines. Energy efficiency is key in such edge environments, since they are often based on an infrastructure that consists of wireless and battery-run de…
▽ More
An Intelligent IoT Environment (iIoTe) is comprised of heterogeneous devices that can collaboratively execute semi-autonomous IoT applications, examples of which include highly automated manufacturing cells or autonomously interacting harvesting machines. Energy efficiency is key in such edge environments, since they are often based on an infrastructure that consists of wireless and battery-run devices, e.g., e-tractors, drones, Automated Guided Vehicle (AGV)s and robots. The total energy consumption draws contributions from multipleiIoTe technologies that enable edge computing and communication, distributed learning, as well as distributed ledgers and smart contracts. This paper provides a state-of-the-art overview of these technologies and illustrates their functionality and performance, with special attention to the tradeoff among resources, latency, privacy and energy consumption. Finally, the paper provides a vision for integrating these enabling technologies in energy-efficient iIoTe and a roadmap to address the open research challenges
△ Less
Submitted 24 December, 2021; v1 submitted 4 October, 2021;
originally announced October 2021.
-
Deep Reinforcement Learning for Intelligent Reflecting Surface-assisted D2D Communications
Authors:
Khoi Khac Nguyen,
Antonino Masaracchia,
Cheng Yin,
Long D. Nguyen,
Octavia A. Dobre,
Trung Q. Duong
Abstract:
In this paper, we propose a deep reinforcement learning (DRL) approach for solving the optimisation problem of the network's sum-rate in device-to-device (D2D) communications supported by an intelligent reflecting surface (IRS). The IRS is deployed to mitigate the interference and enhance the signal between the D2D transmitter and the associated D2D receiver. Our objective is to jointly optimise t…
▽ More
In this paper, we propose a deep reinforcement learning (DRL) approach for solving the optimisation problem of the network's sum-rate in device-to-device (D2D) communications supported by an intelligent reflecting surface (IRS). The IRS is deployed to mitigate the interference and enhance the signal between the D2D transmitter and the associated D2D receiver. Our objective is to jointly optimise the transmit power at the D2D transmitter and the phase shift matrix at the IRS to maximise the network sum-rate. We formulate a Markov decision process and then propose the proximal policy optimisation for solving the maximisation game. Simulation results show impressive performance in terms of the achievable rate and processing time.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.
-
Necklace-structured high harmonic generation for low-divergence, soft X-ray harmonic combs with tunable line spacing
Authors:
Laura Rego,
Nathan J. Brooks,
Quynh L. D. Nguyen,
Julio San Román,
Iona Binnie,
Luis Plaja,
Henry C. Kapteyn,
Margaret M. Murnane,
Carlos Hernández-García
Abstract:
The extreme nonlinear optical process of high-harmonic generation (HHG) makes it possible to map the properties of a laser beam onto a radiating electron wavefunction, and in turn, onto the emitted x-ray light. Bright HHG beams typically emerge from a longitudinal phased distribution of atomic-scale quantum antennae. Here, we form a transverse necklace-shaped phased array of HHG emitters, where or…
▽ More
The extreme nonlinear optical process of high-harmonic generation (HHG) makes it possible to map the properties of a laser beam onto a radiating electron wavefunction, and in turn, onto the emitted x-ray light. Bright HHG beams typically emerge from a longitudinal phased distribution of atomic-scale quantum antennae. Here, we form a transverse necklace-shaped phased array of HHG emitters, where orbital angular momentum conservation allows us to tune the line spacing and divergence properties of extreme-ultraviolet and soft X-ray high harmonic combs. The on-axis HHG emission has extremely low divergence, well below that obtained when using Gaussian driving beams, which further decreases with harmonic order. This work provides a new degree of freedom for the design of harmonic combs, particularly in the soft X-ray regime, where very limited options are available. Such harmonic beams can enable more sensitive probes of the fastest correlated charge and spin dynamics in molecules, nanoparticles and materials.
△ Less
Submitted 27 July, 2021;
originally announced July 2021.
-
Reconfigurable Intelligent Surface-assisted Multi-UAV Networks: Efficient Resource Allocation with Deep Reinforcement Learning
Authors:
Khoi Khac Nguyen,
Saeed Khosravirad,
Daniel Benevides da Costa,
Long D. Nguyen,
Trung Q. Duong
Abstract:
In this paper, we propose reconfigurable intelligent surface (RIS)-assisted unmanned aerial vehicles (UAVs) networks that can utilise both advantages of UAV's agility and RIS's reflection for enhancing the network's performance. To aim at maximising the energy efficiency (EE) of the considered networks, we jointly optimise the power allocation of the UAVs and the phase-shift matrix of the RIS. A d…
▽ More
In this paper, we propose reconfigurable intelligent surface (RIS)-assisted unmanned aerial vehicles (UAVs) networks that can utilise both advantages of UAV's agility and RIS's reflection for enhancing the network's performance. To aim at maximising the energy efficiency (EE) of the considered networks, we jointly optimise the power allocation of the UAVs and the phase-shift matrix of the RIS. A deep reinforcement learning (DRL) approach is proposed for solving the continuous optimisation problem with time-varying channels in a centralised fashion. Moreover, a parallel learning approach is also proposed for reducing the information transmission requirement of the centralised approach. Numerical results show a significant improvement of our proposed schemes compared with the conventional approaches in terms of EE, flexibility, and processing time. Our proposed DRL methods for RIS-assisted UAV networks can be used for real-time applications due to their capability of instant decision-making and handling the time-varying channel with the dynamic environmental setting.
△ Less
Submitted 5 August, 2021; v1 submitted 28 May, 2021;
originally announced May 2021.
-
Conversational Machine Reading Comprehension for Vietnamese Healthcare Texts
Authors:
Son T. Luu,
Mao Nguyen Bui,
Loi Duc Nguyen,
Khiem Vinh Tran,
Kiet Van Nguyen,
Ngan Luu-Thuy Nguyen
Abstract:
Machine reading comprehension (MRC) is a sub-field in natural language processing that aims to assist computers understand unstructured texts and then answer questions related to them. In practice, the conversation is an essential way to communicate and transfer information. To help machines understand conversation texts, we present UIT-ViCoQA, a new corpus for conversational machine reading compr…
▽ More
Machine reading comprehension (MRC) is a sub-field in natural language processing that aims to assist computers understand unstructured texts and then answer questions related to them. In practice, the conversation is an essential way to communicate and transfer information. To help machines understand conversation texts, we present UIT-ViCoQA, a new corpus for conversational machine reading comprehension in the Vietnamese language. This corpus consists of 10,000 questions with answers over 2,000 conversations about health news articles. Then, we evaluate several baseline approaches for conversational machine comprehension on the UIT-ViCoQA corpus. The best model obtains an F1 score of 45.27%, which is 30.91 points behind human performance (76.18%), indicating that there is ample room for improvement. Our dataset is available at our website: http://nlp.uit.edu.vn/datasets/ for research purposes.
△ Less
Submitted 30 September, 2021; v1 submitted 4 May, 2021;
originally announced May 2021.
-
B-ETS: A Trusted Blockchain-based Emissions Trading System for Vehicle-to-Vehicle Networks
Authors:
Lam Duc Nguyen,
Amari N. Lewis,
Israel Leyva-Mayorga,
Amelia Regan,
Petar Popovski
Abstract:
Urban areas are negatively impacted by Carbon Dioxide (CO2 ) and Nitrogen Oxide (NOx) emissions. In order to achieve a cost-effective reduction of greenhouse gas emissions and to combat climate change, the European Union (EU) introduced an Emissions Trading System (ETS) where organizations can buy or receive emission allowances as needed. The current ETS is a centralized one, consisting of a set o…
▽ More
Urban areas are negatively impacted by Carbon Dioxide (CO2 ) and Nitrogen Oxide (NOx) emissions. In order to achieve a cost-effective reduction of greenhouse gas emissions and to combat climate change, the European Union (EU) introduced an Emissions Trading System (ETS) where organizations can buy or receive emission allowances as needed. The current ETS is a centralized one, consisting of a set of complex rules. It is currently administered at the organizational level and is used for fixed-point sources of pollution such as factories, power plants, and refineries. However, the current ETS cannot efficiently cope with vehicle mobility, even though vehicles are one of the primary sources of CO2 and NOx emissions. In this study, we propose a new distributed Blockchain-based emissions allowance trading system called B-ETS. This system enables transparent and trustworthy data exchange as well as trading of allowances among vehicles, relying on vehicle-to-vehicle communication. In addition, we introduce an economic incentive-based mechanism that appeals to individual drivers and leads them to modify their driving behavior in order to reduce emissions. The efficiency of the proposed system is studied through extensive simulations, showing how increased vehicle connectivity can lead to a reduction of the emissions generated from those vehicles. We demonstrate that our method can be used for full life-cycle monitoring and fuel economy reporting. This leads us to conjecture that the proposed system could lead to important behavioral changes among the drivers
△ Less
Submitted 28 February, 2021; v1 submitted 18 February, 2021;
originally announced February 2021.
-
Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model
Authors:
Giang L. D. Nguyen,
Willy Susilo,
Dung Hoang Duong,
Huy Quoc Le,
Fuchun Guo
Abstract:
Identity-based encryption with equality test supporting flexible authorization (IBEET-FA) allows the equality test of underlying messages of two ciphertexts while strengthens privacy protection by allowing users (identities) to control the comparison of their ciphertexts with others. IBEET by itself has a wide range of useful applicable domain such as keyword search on encrypted data, database par…
▽ More
Identity-based encryption with equality test supporting flexible authorization (IBEET-FA) allows the equality test of underlying messages of two ciphertexts while strengthens privacy protection by allowing users (identities) to control the comparison of their ciphertexts with others. IBEET by itself has a wide range of useful applicable domain such as keyword search on encrypted data, database partitioning for efficient encrypted data management, personal health record systems, and spam filtering in encrypted email systems. The flexible authorization will enhance privacy protection of IBEET. In this paper, we propose an efficient construction of IBEET-FA system based on the hardness of learning with error (LWE) problem. Our security proof holds in the standard model.
△ Less
Submitted 26 October, 2020;
originally announced October 2020.
-
Containing Future Epidemics with Trustworthy Federated Systems for Ubiquitous Warning and Response
Authors:
Dick Carrillo,
Lam Duc Nguyen,
Pedro H. J. Nardelli,
Evangelos Pournaras,
Plinio Morita,
Demóstenes Z. Rodríguez,
Merim Dzaferagic,
Harun Siljak,
Alexander Jung,
Laurent Hébert-Dufresne,
Irene Macaluso,
Mehar Ullah,
Gustavo Fraidenraich,
Petar Popovski
Abstract:
In this paper, we propose a global digital platform to avoid and combat epidemics by providing relevant real-time information to support selective lockdowns. It leverages the pervasiveness of wireless connectivity while being trustworthy and secure. The proposed system is conceptualized to be decentralized yet federated, based on ubiquitous public systems and active citizen participation. Its foun…
▽ More
In this paper, we propose a global digital platform to avoid and combat epidemics by providing relevant real-time information to support selective lockdowns. It leverages the pervasiveness of wireless connectivity while being trustworthy and secure. The proposed system is conceptualized to be decentralized yet federated, based on ubiquitous public systems and active citizen participation. Its foundations lie on the principle of informational self-determination. We argue that only in this way it can become a trustworthy and legitimate public good infrastructure for citizens by balancing the asymmetry of the different hierarchical levels within the federated organization while providing highly effective detection and guiding mitigation measures towards graceful lockdown of the society. To exemplify the proposed system, we choose the remote patient monitoring as use case. In which, the integration of distributed ledger technologies with narrowband IoT technology is evaluated considering different number of endorsed peers. An experimental proof of concept setup is used to evaluate the performance of this integration, in which the end-to-end latency is slightly increased when a new endorsed element is added. However, the system reliability, privacy, and interoperability are guaranteed. In this sense, we expect active participation of empowered citizens to supplement the more usual top-down management of epidemics.
△ Less
Submitted 25 March, 2021; v1 submitted 26 October, 2020;
originally announced October 2020.
-
A Reliable Link-adaptive Position-based Routing Protocol for Flying Ad hoc Network
Authors:
Qamar Usman,
Omer Chughtai,
Nadia Nawaz,
Zeeshan Kaleem,
Kishwer Abdul Khaliq,
Long D. Nguyen
Abstract:
Flying ad hoc network (FANET) provides portable and flexible communication for many applications and possesses several unique design challenges; a key one is the successful delivery of messages to the destination, reliably. For reliable communication, routing plays an important role, which establishes a path between source and destination on the basis of certain criteria. Conventional routing prot…
▽ More
Flying ad hoc network (FANET) provides portable and flexible communication for many applications and possesses several unique design challenges; a key one is the successful delivery of messages to the destination, reliably. For reliable communication, routing plays an important role, which establishes a path between source and destination on the basis of certain criteria. Conventional routing protocols of FANET generally use a minimum hop count criterion to find the best route between source and destination, which results in lower latency with the consideration that there is single source/destination network environment. However, in a network with multiple sources, the minimum hop count routing criterion along with the 1-Hop HELLO messages broadcasted by each node in the network may deteriorate the network performance in terms of high End-to-End (ETE) delay and decrease in the lifetime of the network. This research work proposes a Reliable link-adaptive position-based routing protocol (RLPR) for FANET. It uses relative speed, signal strength, and energy of the nodes along with the geographic distance towards the destination using a forwarding angle. This angle is used to determine the forwarding zone that decreases the undesirable control messages in the network in order to discover the route. RLPR enhances the network performance by selecting those relay nodes which are in the forwarding zone and whose geographic movement is towards the destination. Additionally, RLPR selects the next hop with better energy level and uses signal strength and relative speed of the nodes to achieve high connectivity-level. Based on the performance evaluation performed in the Network simulator (ns-2.35), it has been analysed that RLPR outperforms the Robust and reliable predictive based routing (RARP) and Ad hoc on-demand distance vector (AODV) protocols in different scenarios.
△ Less
Submitted 12 October, 2020;
originally announced October 2020.
-
Modeling and Analysis of Data Trading on Blockchain-based Market in IoT Networks
Authors:
Lam Duc Nguyen,
Israel Leyva-Mayorga,
Amari N. Lewis,
Petar Popovski
Abstract:
Mobile devices with embedded sensors for data collection and environmental sensing create a basis for a cost-effective approach for data trading. For example, these data can be related to pollution and gas emissions, which can be used to check the compliance with national and international regulations. The current approach for IoT data trading relies on a centralized third-party entity to negotiat…
▽ More
Mobile devices with embedded sensors for data collection and environmental sensing create a basis for a cost-effective approach for data trading. For example, these data can be related to pollution and gas emissions, which can be used to check the compliance with national and international regulations. The current approach for IoT data trading relies on a centralized third-party entity to negotiate between data consumers and data providers, which is inefficient and insecure on a large scale. In comparison, a decentralized approach based on distributed ledger technologies (DLT) enables data trading while ensuring trust, security, and privacy. However, due to the lack of understanding of the communication efficiency between sellers and buyers, there is still a significant gap in benchmarking the data trading protocols in IoT environments. Motivated by this knowledge gap, we introduce a model for DLT-based IoT data trading over the Narrowband Internet of Things (NB-IoT) system, intended to support massive environmental sensing. We characterize the communication efficiency of three basic DLT-based IoT data trading protocols via NB-IoT connectivity in terms of latency and energy consumption. The model and analyses of these protocols provide a benchmark for IoT data trading applications.
△ Less
Submitted 20 December, 2020; v1 submitted 12 October, 2020;
originally announced October 2020.
-
On the implementation of the Universal Basic Income as a response to technological unemployment
Authors:
Le Dong Hai Nguyen
Abstract:
The effects of automation on our economy and society are more palpable than ever, with nearly half of jobs at risk of being fully executed by machines over the next decade or two. Policymakers and scholars alike have championed the Universal Basic Income (UBI) as a catch-all solution to this problem. This paper examines the shortcomings of UBI in addressing the automation-led large-scale displacem…
▽ More
The effects of automation on our economy and society are more palpable than ever, with nearly half of jobs at risk of being fully executed by machines over the next decade or two. Policymakers and scholars alike have championed the Universal Basic Income (UBI) as a catch-all solution to this problem. This paper examines the shortcomings of UBI in addressing the automation-led large-scale displacement of labor by analyzing empirical data from previous UBI-comparable experiments and presenting theoretical projections that highlight disappointing impacts of UBI in the improvement of relevant living standards and employability metrics among pensioners. Finally, a recommendation shall be made for the retainment of existing means-tested welfare programs while bolstering funding and R&D for more up-to-date worker training schemes as a more effective solution to technological unemployment.
△ Less
Submitted 19 August, 2021; v1 submitted 19 September, 2020;
originally announced September 2020.
-
Witness-based Approach for Scaling Distributed Ledgers to Massive IoT Scenarios
Authors:
Lam D. Nguyen,
Israel Leyva-Mayorga,
Petar Popovski
Abstract:
Distributed Ledger Technologies (DLTs) are playing a major role in building security and trust in Internet of Things (IoT) systems. However, IoT deployments with a large number of devices, such as in environment monitoring applications, generate and send massive amounts of data. This would generate vast number of transactions that must be processed within the distributed ledger. In this work, we f…
▽ More
Distributed Ledger Technologies (DLTs) are playing a major role in building security and trust in Internet of Things (IoT) systems. However, IoT deployments with a large number of devices, such as in environment monitoring applications, generate and send massive amounts of data. This would generate vast number of transactions that must be processed within the distributed ledger. In this work, we first demonstrate that the Proof of Work (PoW) blockchain fails to scale in a sizable IoT connectivity infrastructure. To solve this problem, we present a lightweight distributed ledger scheme to integrate PoW blockchain into IoT. In our scheme, we classify transactions into two types: 1) global transactions, which must be processed by global blockchain nodes and 2) local transactions, which can be processed locally by entities called witnesses. Performance evaluation demonstrates that our proposed scheme improves the scalability of integrated blockchain and IoT monitoring systems by processing a fraction of the transactions, inversely proportional to the number of witnesses, locally. Hence, reducing the number of global transactions.
△ Less
Submitted 14 April, 2020;
originally announced April 2020.
-
Trusted Wireless Monitoring based on Blockchain over NB-IoT Connectivity
Authors:
Lam D. Nguyen,
Anders E. Kalør,
Israel Leyva-Mayorga,
Petar Popovski
Abstract:
The data collected from Internet of Things (IoT) devices on various emissions or pollution, can have a significant economic value for the stakeholders. This makes it prone to abuse or tampering and brings forward the need to integrate IoT with a Distributed Ledger Technology (DLT) to collect, store, and protect the IoT data. However, DLT brings an additional overhead to the frugal IoT connectivity…
▽ More
The data collected from Internet of Things (IoT) devices on various emissions or pollution, can have a significant economic value for the stakeholders. This makes it prone to abuse or tampering and brings forward the need to integrate IoT with a Distributed Ledger Technology (DLT) to collect, store, and protect the IoT data. However, DLT brings an additional overhead to the frugal IoT connectivity and symmetrizes the IoT traffic, thus changing the usual assumption that IoT is uplink-oriented. We have implemented a platform that integrates DLTs with a monitoring system based on narrowband IoT (NB-IoT). We evaluate the performance and discuss the tradeoffs in two use cases: data authorization and real-time monitoring.
△ Less
Submitted 1 January, 2021; v1 submitted 14 April, 2020;
originally announced April 2020.
-
Physical Layer Security: Detection of Active Eavesdropping Attacks by Support Vector Machines
Authors:
Tiep M. Hoang,
Trung Q. Duong,
Hoang Duong Tuan,
Sangarapillai Lambotharan,
Emi Garcia-Palacios,
Long D. Nguyen
Abstract:
This paper presents a framework for converting wireless signals into structured datasets, which can be fed into machine learning algorithms for the detection of active eavesdropping attacks at the physical layer. More specifically, a wireless communication system, which consists of K legal users, one access point (AP) and one active eavesdropper, is considered. To cope with the eavesdropper who br…
▽ More
This paper presents a framework for converting wireless signals into structured datasets, which can be fed into machine learning algorithms for the detection of active eavesdropping attacks at the physical layer. More specifically, a wireless communication system, which consists of K legal users, one access point (AP) and one active eavesdropper, is considered. To cope with the eavesdropper who breaks into the system during the uplink phase, we first build structured datasets based on several different features. We then apply support vector machine (SVM) classifiers and one-class SVM classifiers to those structured datasets for detecting the presence of eavesdropper. Regarding the data, we first process received signals at the AP and then define three different features (i.e., MEAN, RATIO and SUM) based on the post-processing signals. Noticeably, our three defined features are formulated such that they have relevant statistical properties. Enabling the AP to simulate the entire process of transmission, we form the so-called artificial training data (ATD) that is used for training SVM (or one-class SVM) models. While SVM is preferred in the case of having perfect channel state information (CSI) of all channels, one-class SVM is preferred in the case of having only the CSI of legal users. We also evaluate the accuracy of the trained models in relation to the choice of kernel functions, the choice of features, and the change of eavesdropper's power. Numerical results show that the accuracy is relatively sensitive to adjusting parameters. Under some settings, SVM classifiers (or even one-class SVM) can bring about the accuracy of over 90%.
△ Less
Submitted 23 February, 2021; v1 submitted 2 March, 2020;
originally announced March 2020.
-
RDSP: Rapidly Deployable Wireless Ad Hoc System for Post-Disaster Management
Authors:
Ajmal Khan,
Adnan Munir,
Zeeshan Kaleem,
Farman Ullah,
Muhammad Bilal,
Lewis Nkenyereye,
Shahen Shah,
Long D. Nguyen,
S. M. Riazul Islam,
Kyung-Sup Kwak
Abstract:
In post-disaster scenarios, such as after floods, earthquakes, and in war zones, the cellular communication infrastructure may be destroyed or seriously disrupted. In such emergency scenarios, it becomes very important for first aid responders to communicate with other rescue teams in order to provide feedback to both the central office and the disaster survivors. To address this issue, rapidly de…
▽ More
In post-disaster scenarios, such as after floods, earthquakes, and in war zones, the cellular communication infrastructure may be destroyed or seriously disrupted. In such emergency scenarios, it becomes very important for first aid responders to communicate with other rescue teams in order to provide feedback to both the central office and the disaster survivors. To address this issue, rapidly deployable systems are required to re-establish connectivity and assist users and first responders in the region of incident. In this work, we describe the design, implementation, and evaluation of a rapidly deployable system for first response applications in post-disaster situations, named RDSP. The proposed system helps early rescue responders and victims by sharing their location information to remotely located servers by utilizing a novel routing scheme. This novel routing scheme consists of the Dynamic ID Assignment (DIA) algorithm and the Minimum Maximum Neighbor (MMN) algorithm. The DIA algorithm is used by relay devices to dynamically select their IDs on the basis of all the available IDs of networks. Whereas, the MMN algorithm is used by the client and relay devices to dynamically select their next neighbor relays for the transmission of messages. The RDSP contains three devices; the client device sends the victim's location information to the server, the relay device relays information between client and server device, the server device receives messages from the client device to alert the rescue team. We deployed and evaluated our system in the outdoor environment of the university campus. The experimental results show that the RDSP system reduces the message delivery delay and improves the message delivery ratio with lower communication overhead.
△ Less
Submitted 20 January, 2020;
originally announced January 2020.
-
Communication Aspects of the Integration of Wireless IoT Devices with Distributed Ledger Technology
Authors:
Pietro Danzi,
Anders E. Kalør,
René B. Sørensen,
Alexander K. Hagelskjær,
Lam D. Nguyen,
Čedomir Stefanović,
Petar Popovski
Abstract:
The pervasive need to safely share and store information between devices calls for the replacement of centralized trust architectures with the decentralized ones. Distributed Ledger Technologies (DLTs) are seen as the most promising enabler of decentralized trust, but they still lack technological maturity and their successful adoption depends on the understanding of the fundamental design trade-o…
▽ More
The pervasive need to safely share and store information between devices calls for the replacement of centralized trust architectures with the decentralized ones. Distributed Ledger Technologies (DLTs) are seen as the most promising enabler of decentralized trust, but they still lack technological maturity and their successful adoption depends on the understanding of the fundamental design trade-offs and their reflection in the actual technical design. This work focuses on the challenges and potential solutions for an effective integration of DLTs in the context of Internet-of-Things (IoT). We first introduce the landscape of IoT applications and discuss the limitations and opportunities offered by DLTs. Then, we review the technical challenges encountered in the integration of resource-constrained devices with distributed trust networks. We describe the common traits of lightweight synchronization protocols, and propose a novel classification, rooted in the IoT perspective. We identify the need of receiving ledger information at the endpoint devices, implying a two-way data exchange that contrasts with the conventional uplink-oriented communication technologies intended for IoT systems.
△ Less
Submitted 5 March, 2019;
originally announced March 2019.
-
Real-time Optimal Resource Allocation for Embedded UAV Communication Systems
Authors:
Minh-Nghia Nguyen,
Long D. Nguyen,
Trung Q. Duong,
Hoang Duong Tuan
Abstract:
We consider device-to-device (D2D) wireless information and power transfer systems using an unmanned aerial vehicle (UAV) as a relay-assisted node. As the energy capacity and flight time of UAVs is limited, a significant issue in deploying UAV is to manage energy consumption in real-time application, which is proportional to the UAV transmit power. To tackle this important issue, we develop a real…
▽ More
We consider device-to-device (D2D) wireless information and power transfer systems using an unmanned aerial vehicle (UAV) as a relay-assisted node. As the energy capacity and flight time of UAVs is limited, a significant issue in deploying UAV is to manage energy consumption in real-time application, which is proportional to the UAV transmit power. To tackle this important issue, we develop a real-time resource allocation algorithm for maximizing the energy efficiency by jointly optimizing the energy-harvesting time and power control for the considered (D2D) communication embedded with UAV. We demonstrate the effectiveness of the proposed algorithms as running time for solving them can be conducted in milliseconds.
△ Less
Submitted 5 September, 2018;
originally announced September 2018.
-
Multi-cell Massive MIMO Beamforming in Assuring QoS for Large Numbers of Users
Authors:
Long D. Nguyen,
Hoang D. Tuan,
Trung Q. Duong,
H. Vincent Poor
Abstract:
Massive multi-input multi-output (MIMO) uses a very large number of low-power transmit antennas to serve much smaller numbers of users. The most widely proposed type of massive MIMO transmit beamforming is zero-forcing, which is based on the right inverse of the overall MIMO channel matrix to force the inter-user interference to zero. The performance of massive MIMO is then analyzed based on the t…
▽ More
Massive multi-input multi-output (MIMO) uses a very large number of low-power transmit antennas to serve much smaller numbers of users. The most widely proposed type of massive MIMO transmit beamforming is zero-forcing, which is based on the right inverse of the overall MIMO channel matrix to force the inter-user interference to zero. The performance of massive MIMO is then analyzed based on the throughput of cell-edge users. This paper reassesses this beamforming philosophy, to instead consider the maximization of the energy efficiency of massive MIMO systems in assuring the quality-of- service (QoS) for as many users as possible. The bottleneck of serving small numbers of users by a large number of transmit antennas is unblocked by a new time-fraction-wise beamforming technique, which focuses signal transmission in fractions of a time slot. Accordingly, massive MIMO can deliver better quality-of-experience (QoE) in assuring QoS for much larger numbers of users. The provided simulations show that the numbers of users served by massive MIMO with the required QoS may be twice or more than the number of its transmit antennas.
△ Less
Submitted 10 December, 2017;
originally announced December 2017.
-
E-motives and motivic stable homotopy
Authors:
Le Dang Thi Nguyen
Abstract:
We introduce in this work the notion of the category of pure $\mathbf{E}$-Motives, where $\mathbf{E}$ is a motivic strict ring spectrum and construct twisted $\mathbf{E}$-cohomology by using six functors formalism of J. Ayoub. In particular, we construct the category of pure Chow-Witt motives $CHW(k)_{\mathbb{Q}}$ over a field $k$ and show that this category admits a fully faithful embedding into…
▽ More
We introduce in this work the notion of the category of pure $\mathbf{E}$-Motives, where $\mathbf{E}$ is a motivic strict ring spectrum and construct twisted $\mathbf{E}$-cohomology by using six functors formalism of J. Ayoub. In particular, we construct the category of pure Chow-Witt motives $CHW(k)_{\mathbb{Q}}$ over a field $k$ and show that this category admits a fully faithful embedding into the geometric stable $\mathbb{A}^1$-derived category $D_{\mathbb{A}^1,gm}(k)_{\mathbb{Q}}$.
△ Less
Submitted 25 April, 2017;
originally announced April 2017.
-
Energy Efficiency in Cell-Free Massive MIMO with Zero-Forcing Precoding Design
Authors:
L. D. Nguyen,
T. Q. Duong,
H. Q. Ngo,
K. Tourki
Abstract:
We consider the downlink of a cell-free massive multiple-input multiple-output (MIMO) network where numerous distributed access points (APs) serve a smaller number of users under time division duplex operation. An important issue in deploying cell-free networks is high power consumption, which is proportional to the number of APs. This issue has raised the question as to their suitability for gree…
▽ More
We consider the downlink of a cell-free massive multiple-input multiple-output (MIMO) network where numerous distributed access points (APs) serve a smaller number of users under time division duplex operation. An important issue in deploying cell-free networks is high power consumption, which is proportional to the number of APs. This issue has raised the question as to their suitability for green communications in terms of the total energy efficiency (bits/Joule). To tackle this, we develop a novel low-complexity power control technique with zero-forcing precoding design to maximize the energy efficiency of cell-free massive MIMO taking into account the backhaul power consumption and the imperfect channel state information.
△ Less
Submitted 11 April, 2017;
originally announced April 2017.
-
Embedding of category of twisted Chow-Witt correspondences into geometric stable $\A^1$-derived category over a field
Authors:
Le Dang Thi Nguyen
Abstract:
We introduce in this note the notion of the category of twisted Chow-Witt correspondences $CHW(k)$ over a field $k$ of characteristic different from $2$. Moreover, we show that over an infinite perfect field this category $CHW(k)$ admits a fully faithful embedding into the geometric stable $\A^1$-derived category $D_{\A^1,gm}(k)$ after taking $\Q$-localization. We also prove a conjecture of F. Mor…
▽ More
We introduce in this note the notion of the category of twisted Chow-Witt correspondences $CHW(k)$ over a field $k$ of characteristic different from $2$. Moreover, we show that over an infinite perfect field this category $CHW(k)$ admits a fully faithful embedding into the geometric stable $\A^1$-derived category $D_{\A^1,gm}(k)$ after taking $\Q$-localization. We also prove a conjecture of F. Morel about the rational splitting of stable $\A^1$-cohomology over an essentially smooth scheme $S$ over a field $k$ of $char(k) \neq 2$.
△ Less
Submitted 18 March, 2014; v1 submitted 12 April, 2012;
originally announced April 2012.