-
Fast Updating the STBC Decoder Matrices in the Uplink of a Massive MIMO System
Authors:
Seyed Hosein Mousavi,
Jafar Pourrostam
Abstract:
Reducing computational complexity of the modern wireless communication systems such as massive Multiple-Input Multiple-Output (MIMO) configurations is of utmost interest. In this paper, we propose new algorithm that can be used to accelerate matrix inversion in the decoding of space-time block codes (STBC) in the uplink of dynamic massive MIMO systems. A multi-user system in which the base station…
▽ More
Reducing computational complexity of the modern wireless communication systems such as massive Multiple-Input Multiple-Output (MIMO) configurations is of utmost interest. In this paper, we propose new algorithm that can be used to accelerate matrix inversion in the decoding of space-time block codes (STBC) in the uplink of dynamic massive MIMO systems. A multi-user system in which the base station is equipped with a large number of antennas and each user has two antennas is considered. In addition, users can enter or exit the system dynamically. For a given space-time block coding/decoding scheme the computational complexity of the receiver will be significantly reduced when a user is added to or removed from the system by employing the proposed method. In the proposed scheme, the matrix inversion for zero-forcing (ZF) as well as minimum mean square error (MMSE) decoding is derived from the inverse of a partitioned matrix and the Woodbury matrix identity. Furthermore, the suggested technique can be utilized when the number of users is fixed but the channel estimate changes for a particular user. The mathematical equations for updating the inverse of the decoding matrices are derived and its complexity is compared to the direct way of computing the inverse. Evaluations confirm the effectiveness of the proposed approach.
△ Less
Submitted 22 August, 2022;
originally announced August 2022.
-
Skew cyclic codes over $\mathbb{F}_{p}+u\mathbb{F}_{p}$
Authors:
Reza Dastbasteh,
Seyyed Hamed Mousavi,
Taher Abualrub,
Nuh Aydin,
Javad Haghighat
Abstract:
In this paper, we study skew cyclic codes with arbitrary length over the ring $R=\mathbb{F}_{p}+u\mathbb{F}_{p}$ where $p$ is an odd prime and $% u^{2}=0$. We characterize all skew cyclic codes of length $n$ as left $% R[x;θ]$-submodules of $R_{n}=R[x;θ]/\langle x^{n}-1\rangle $. We find all generator polynomials for these codes and describe their minimal spanning sets. Moreover, an encoding and d…
▽ More
In this paper, we study skew cyclic codes with arbitrary length over the ring $R=\mathbb{F}_{p}+u\mathbb{F}_{p}$ where $p$ is an odd prime and $% u^{2}=0$. We characterize all skew cyclic codes of length $n$ as left $% R[x;θ]$-submodules of $R_{n}=R[x;θ]/\langle x^{n}-1\rangle $. We find all generator polynomials for these codes and describe their minimal spanning sets. Moreover, an encoding and decoding algorithm is presented for skew cyclic codes over the ring $R$. Finally, based on the theory we developed in this paper, we provide examples of codes with good parameters over $F_{p}$ with different odd prime $p.$ In fact, example 25 in our paper is a new ternary code in the class of quasi-twisted codes. The other examples we provided are examples of optimal codes.
△ Less
Submitted 20 December, 2017;
originally announced December 2017.
-
Solving the L1 regularized least square problem via a box-constrained smooth minimization
Authors:
Majid Mohammadi,
Wout Hofman,
Yaohua Tan,
S. Hamid Mousavi
Abstract:
In this paper, an equivalent smooth minimization for the L1 regularized least square problem is proposed. The proposed problem is a convex box-constrained smooth minimization which allows applying fast optimization methods to find its solution. Further, it is investigated that the property "the dual of dual is primal" holds for the L1 regularized least square problem. A solver for the smooth probl…
▽ More
In this paper, an equivalent smooth minimization for the L1 regularized least square problem is proposed. The proposed problem is a convex box-constrained smooth minimization which allows applying fast optimization methods to find its solution. Further, it is investigated that the property "the dual of dual is primal" holds for the L1 regularized least square problem. A solver for the smooth problem is proposed, and its affinity to the proximal gradient is shown. Finally, the experiments on L1 and total variation regularized problems are performed, and the corresponding results are reported.
△ Less
Submitted 20 October, 2021; v1 submitted 11 April, 2017;
originally announced April 2017.
-
A Subset Selection Algorithm for Wireless Sensor Networks
Authors:
Seyed Hamed Mousavi,
Javad Haghighat,
Walaa Hamouda,
Reza Dastbasteh
Abstract:
One of the main challenges facing wireless sensor networks (WSNs) is the limited power resources available at small sensor nodes. It is therefore desired to reduce the power consumption of sensors while keeping the distortion between the source information and its estimate at the fusion centre (FC) below a specific threshold. In this paper, given the channel state information at the FC, we propose…
▽ More
One of the main challenges facing wireless sensor networks (WSNs) is the limited power resources available at small sensor nodes. It is therefore desired to reduce the power consumption of sensors while keeping the distortion between the source information and its estimate at the fusion centre (FC) below a specific threshold. In this paper, given the channel state information at the FC, we propose a subset selection algorithm of sensor nodes to reduce the average transmission power of the WSN. We assume the channels between the source and the sensors to be correlated fading channels, modeled by the Gilbert-Elliott model. We show that when these channels are known at the FC, a subset of sensors can be selected by the FC such that the received observations from this subset is sufficient to estimate the source information at the FC while maintaining the distortion between source information and its estimate below a specific threshold. Through analyses, we find the probability distribution of the size of this subset and provide results to evaluate the power efficiency of our proposed algorithm.
△ Less
Submitted 14 May, 2015;
originally announced May 2015.
-
Key classification attack on block ciphers
Authors:
Maghsood Parviz,
Seyed Hassan Mousavi,
Saeed Mirahmadi
Abstract:
In this paper, security analysis of block ciphers with key length greater than block length is proposed. When key length is significantly greater than block length and the statistical distribution of cipher system is like a uniform distribution, there are more than one key which map fixed input to fixed output. If a block cipher designed sufficiently random, it is expected that the key space can b…
▽ More
In this paper, security analysis of block ciphers with key length greater than block length is proposed. When key length is significantly greater than block length and the statistical distribution of cipher system is like a uniform distribution, there are more than one key which map fixed input to fixed output. If a block cipher designed sufficiently random, it is expected that the key space can be classified into same classes. Using such classes of keys, our proposed algorithm would be able to recover the key of block cipher with complexity O(max(2^n, 2^{k-n}) where n is block length and k is key length. We applied our algorithm to 2- round KASUMI block cipher as sample block cipher by using weakness of functions that used in KASUMI.
△ Less
Submitted 18 May, 2013;
originally announced May 2013.