-
Truncated Polynomial Expansion-Based Detection in Massive MIMO: A Model-Driven Deep Learning Approach
Authors:
Kazem Izadinasab,
Ahmed Wagdy Shaban,
Oussama Damen
Abstract:
In this paper, we propose a deep learning (DL)-based approach for efficiently computing the inverse of Hermitian matrices using truncated polynomial expansion (TPE). Our model-driven approach involves optimizing the coefficients of the TPE during an offline training procedure for a given number of TPE terms. We apply this method to signal detection in uplink massive multiple-input multiple-output…
▽ More
In this paper, we propose a deep learning (DL)-based approach for efficiently computing the inverse of Hermitian matrices using truncated polynomial expansion (TPE). Our model-driven approach involves optimizing the coefficients of the TPE during an offline training procedure for a given number of TPE terms. We apply this method to signal detection in uplink massive multiple-input multiple-output (MIMO) systems, where the matrix inverse operation required by linear detectors, such as zero-forcing (ZF) and minimum mean square error (MMSE), is approximated using TPE. Our simulation results demonstrate that the proposed learned TPE-based method outperforms the conventional TPE method with optimal coefficients in terms of asymptotic convergence speed and reduces the computational complexity of the online detection stage, albeit at the expense of the offline training stage. However, the limited number of trainable parameters leads to a swift offline training process.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
Radiation Conditions for the Difference Schrödinger Operators
Authors:
W. Shaban,
B. Vainberg
Abstract:
The problem of determining a unique solution of the Schrödinger equation $\left(Δ+q-λ\right) ψ=f$ on the lattice $\mathbb{Z}^{d}$ is considered, where $Δ$ is the difference Laplacian and both $f$ and $q$ have finite supports$.$ It is shown that there is an exceptional set $S_{0}$ of points on $Sp(Δ)=[-2d,2d]$ for which the limiting absorption principle fails, even for unperturbed operator (…
▽ More
The problem of determining a unique solution of the Schrödinger equation $\left(Δ+q-λ\right) ψ=f$ on the lattice $\mathbb{Z}^{d}$ is considered, where $Δ$ is the difference Laplacian and both $f$ and $q$ have finite supports$.$ It is shown that there is an exceptional set $S_{0}$ of points on $Sp(Δ)=[-2d,2d]$ for which the limiting absorption principle fails, even for unperturbed operator ($q(x)=0$). This exceptional set consists of the points $\left\{ \pm4n\right\} $ when $d$ is even and $\left\{ \pm2(2n+1)\right\} $ when $d$ is odd. For all values of $λ\in[-2d,2d]\backslash S_{0},$ the radiation conditions are found which single out the same solutions of the problem as the ones determined by the limiting absorption principle. These solutions are combinations of several waves propagating with different frequencies, and the number of waves depends on the value of $λ.$
△ Less
Submitted 16 December, 2018;
originally announced December 2018.
-
On the Degrees of Freedom of SISO X-networks with Synergistic Alternating Channel State Information at transmitters
Authors:
Ahmed Wagdy Shaban,
Amr El-Keyi,
Tamer Khattab,
Mohammed Nafie
Abstract:
In this paper, we consider the two-user single-input single-output (SISO) X-channel and $K$-user SISO X-network in fast fading environment. It is assumed that the transmitters have access to synergistic alternating channel state information (CSI). Specifically, the CSIT alternates between three states, namely, perfect, delayed and no-CSIT, in a certain manner to enable these states to work togethe…
▽ More
In this paper, we consider the two-user single-input single-output (SISO) X-channel and $K$-user SISO X-network in fast fading environment. It is assumed that the transmitters have access to synergistic alternating channel state information (CSI). Specifically, the CSIT alternates between three states, namely, perfect, delayed and no-CSIT, in a certain manner to enable these states to work together cooperatively. These states are associated with fractions of time denoted by $λ_P$, $λ_D$ \text{and} $λ_N$, respectively. For the two-user $X$-channel, simple upper bound is developed to prove the tightness of the achievability result of $4/3$ DoF under a certain distribution of the availability of three CSIT states for $Λ(λ_P=1/3, λ_D= 1/3, λ_N=1/3)$. For the $K$-user $X$-network, it is shown that the sum Degrees of freedom (DoF) is at least $2K/(K + 1)$, using two-phase transmission schemes over finite symbols channel extension and under the same distribution of the availability of $Λ(λ_P=1/3, λ_D= 1/3, λ_N=1/3)$.This achievability result, can be considered as a tight lower bound, coincides with the best lower bound known for the same network but with partial output feedback in stead of alternating CSIT. Hence, we show that the role of synergistic alternating CSIT with distribution $Λ(1/3,1/3,1/3)$ is equivalent to the partial output feedback. Also, this lower bound is strictly better than the best lower bound known for the case of delayed CSI assumption for all values of $K$. All the proposed transmission schemes are based on two phases transmission strategy, namely, interference creation and interference resurrection, which exploit the synergy of instantaneous CSI and delay CSIT to retrospectively align interference in the subsequent channel uses.
△ Less
Submitted 23 May, 2016;
originally announced May 2016.
-
Confidential Algorithm for Golden Cryptography Using Haar Wavelet
Authors:
Marghny H. Mohamed,
Yousef B. Mahdy,
Wafaa Abd El-Wahed Shaban
Abstract:
One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals.…
▽ More
One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals. In this paper, we introduce a technique of encryption based on combination of haar wavelet and golden matrix. These combinations carry out after compression data by adaptive Huffman code to reduce data size and remove redundant data. This process will provide multisecurity services. In addition Message Authentication Code (MAC) technique can be used to provide authentication and the integrity of this scheme. The proposed scheme is accomplished through five stages, the compression data, key generation, encryption stage, the decryption stage and decompression at communication ends.
△ Less
Submitted 15 January, 2015;
originally announced January 2015.