-
Explicit orthogonal and unitary designs
Authors:
Ryan O'Donnell,
Rocco A. Servedio,
Pedro Paredes
Abstract:
We give a strongly explicit construction of $\varepsilon$-approximate $k$-designs for the orthogonal group $\mathrm{O}(N)$ and the unitary group $\mathrm{U}(N)$, for $N=2^n$. Our designs are of cardinality $\mathrm{poly}(N^k/\varepsilon)$ (equivalently, they have seed length $O(nk + \log(1/\varepsilon)))$; up to the polynomial, this matches the number of design elements used by the construction co…
▽ More
We give a strongly explicit construction of $\varepsilon$-approximate $k$-designs for the orthogonal group $\mathrm{O}(N)$ and the unitary group $\mathrm{U}(N)$, for $N=2^n$. Our designs are of cardinality $\mathrm{poly}(N^k/\varepsilon)$ (equivalently, they have seed length $O(nk + \log(1/\varepsilon)))$; up to the polynomial, this matches the number of design elements used by the construction consisting of completely random matrices.
△ Less
Submitted 20 October, 2023;
originally announced October 2023.
-
A Simple Method for the Performance Analysis of Fluid Antenna Systems under Correlated Nakagami-$m$ Fading
Authors:
José~David~Vega-Sánchez,
Luis~Urquiza-Aguiar,
Martha Cecilia Paredes Paredes,
Diana~Pamela~Moya~Osorio
Abstract:
By recognizing the tremendous flexibility of the emerging fluid antenna system (FAS), which allows dynamic reconfigurability of the location of the antenna within a given space, this paper investigates the performance of a single-antenna FAS over spatially correlated Nakagami-$m$ fading channels. Specifically, simple and highly accurate closed-form approximations for the cumulative density functio…
▽ More
By recognizing the tremendous flexibility of the emerging fluid antenna system (FAS), which allows dynamic reconfigurability of the location of the antenna within a given space, this paper investigates the performance of a single-antenna FAS over spatially correlated Nakagami-$m$ fading channels. Specifically, simple and highly accurate closed-form approximations for the cumulative density function of the FAS channel and the outage probability of the proposed system are obtained by employing a novel asymptotic matching method, which is an improved version of the well-known moment matching. With this method, the outage probability can be computed {simply} without incurring complex multi-fold integrals, thus requiring negligible computational effort. Finally, the accuracy of the proposed approximations is validated, and it is shown that the FAS can meet or even exceed the performance attained by the conventional maximal ratio combining (MRC) technique.
△ Less
Submitted 15 September, 2023;
originally announced September 2023.
-
Explicit two-sided unique-neighbor expanders
Authors:
Jun-Ting Hsieh,
Theo McKenzie,
Sidhanth Mohanty,
Pedro Paredes
Abstract:
We study the problem of constructing explicit sparse graphs that exhibit strong vertex expansion. Our main result is the first two-sided construction of imbalanced unique-neighbor expanders, meaning bipartite graphs where small sets contained in both the left and right bipartitions exhibit unique-neighbor expansion, along with algebraic properties relevant to constructing quantum codes.
Our cons…
▽ More
We study the problem of constructing explicit sparse graphs that exhibit strong vertex expansion. Our main result is the first two-sided construction of imbalanced unique-neighbor expanders, meaning bipartite graphs where small sets contained in both the left and right bipartitions exhibit unique-neighbor expansion, along with algebraic properties relevant to constructing quantum codes.
Our constructions are obtained from instantiations of the tripartite line product of a large tripartite spectral expander and a sufficiently good constant-sized unique-neighbor expander, a new graph product we defined that generalizes the line product in the work of Alon and Capalbo and the routed product in the work of Asherov and Dinur.
To analyze the vertex expansion of graphs arising from the tripartite line product, we develop a sharp characterization of subgraphs that can arise in bipartite spectral expanders, generalizing results of Kahale, which may be of independent interest.
By picking appropriate graphs to apply our product to, we give a strongly explicit construction of an infinite family of $(d_1,d_2)$-biregular graphs $(G_n)_{n\ge 1}$ (for large enough $d_1$ and $d_2$) where all sets $S$ with fewer than a small constant fraction of vertices have $Ω(d_1\cdot |S|)$ unique-neighbors (assuming $d_1 \leq d_2$).
Additionally, we can also guarantee that subsets of vertices of size up to $\exp(Ω(\sqrt{\log |V(G_n)|}))$ expand losslessly.
△ Less
Submitted 15 January, 2024; v1 submitted 2 February, 2023;
originally announced February 2023.
-
Computing Power of Hybrid Models in Synchronous Networks
Authors:
Pierre Fraigniaud,
Pedro Montealegre,
Pablo Paredes,
Ivan Rapaport,
Martín Ríos-Wilson,
Ioan Todinca
Abstract:
During the last two decades, a small set of distributed computing models for networks have emerged, among which LOCAL, CONGEST, and Broadcast Congested Clique (BCC) play a prominent role. We consider hybrid models resulting from combining these three models. That is, we analyze the computing power of models allowing to, say, perform a constant number of rounds of CONGEST, then a constant number of…
▽ More
During the last two decades, a small set of distributed computing models for networks have emerged, among which LOCAL, CONGEST, and Broadcast Congested Clique (BCC) play a prominent role. We consider hybrid models resulting from combining these three models. That is, we analyze the computing power of models allowing to, say, perform a constant number of rounds of CONGEST, then a constant number of rounds of LOCAL, then a constant number of rounds of BCC, possibly repeating this figure a constant number of times. We specifically focus on 2-round models, and we establish the complete picture of the relative powers of these models. That is, for every pair of such models, we determine whether one is (strictly) stronger than the other, or whether the two models are incomparable. The separation results are obtained by approaching communication complexity through an original angle, which may be of independent interest. The two players are not bounded to compute the value of a binary function, but the combined outputs of the two players are constrained by this value. In particular, we introduce the XOR-Index problem, in which Alice is given a binary vector $x\in\{0,1\}^n$ together with an index $i\in[n]$, Bob is given a binary vector $y\in\{0,1\}^n$ together with an index $j\in[n]$, and, after a single round of 2-way communication, Alice must output a boolean $\textrm{out}_A$, and Bob must output a boolean $\textrm{out}_B$, such that $\mbox{out}_A\land\mbox{out}_B = x_j\oplus y_i$. We show that the communication complexity of XOR-Index is $Ω(n)$ bits.
△ Less
Submitted 4 August, 2022;
originally announced August 2022.
-
Explicit Abelian Lifts and Quantum LDPC Codes
Authors:
Fernando Granha Jeronimo,
Tushant Mittal,
Ryan O'Donnell,
Pedro Paredes,
Madhur Tulsiani
Abstract:
For an abelian group $H$ acting on the set $[\ell]$, an $(H,\ell)$-lift of a graph $G_0$ is a graph obtained by replacing each vertex by $\ell$ copies, and each edge by a matching corresponding to the action of an element of $H$.
In this work, we show the following explicit constructions of expanders obtained via abelian lifts. For every (transitive) abelian group $H \leqslant \text{Sym}(\ell)$,…
▽ More
For an abelian group $H$ acting on the set $[\ell]$, an $(H,\ell)$-lift of a graph $G_0$ is a graph obtained by replacing each vertex by $\ell$ copies, and each edge by a matching corresponding to the action of an element of $H$.
In this work, we show the following explicit constructions of expanders obtained via abelian lifts. For every (transitive) abelian group $H \leqslant \text{Sym}(\ell)$, constant degree $d \ge 3$ and $ε> 0$, we construct explicit $d$-regular expander graphs $G$ obtained from an $(H,\ell)$-lift of a (suitable) base $n$-vertex expander $G_0$ with the following parameters:
(i) $λ(G) \le 2\sqrt{d-1} + ε$, for any lift size $\ell \le 2^{n^δ}$ where $δ=δ(d,ε)$,
(ii) $λ(G) \le ε\cdot d$, for any lift size $\ell \le 2^{n^{δ_0}}$ for a fixed $δ_0 > 0$, when $d \ge d_0(ε)$, or
(iii) $λ(G) \le \widetilde{O}(\sqrt{d})$, for lift size ``exactly'' $\ell = 2^{Θ(n)}$.
As corollaries, we obtain explicit quantum lifted product codes of Panteleev and Kalachev of almost linear distance (and also in a wide range of parameters) and explicit classical quasi-cyclic LDPC codes with wide range of circulant sizes.
Items $(i)$ and $(ii)$ above are obtained by extending the techniques of Mohanty, O'Donnell and Paredes [STOC 2020] for $2$-lifts to much larger abelian lift sizes (as a byproduct simplifying their construction). This is done by providing a new encoding of special walks arising in the trace power method, carefully "compressing'" depth-first search traversals. Result $(iii)$ is via a simpler proof of Agarwal et al. [SIAM J. Discrete Math 2019] at the expense of polylog factors in the expansion.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
Expectation-Maximization Learning for Wireless Channel Modeling of Reconfigurable Intelligent Surfaces
Authors:
José David Vega Sánchez,
Luis Urquiza-Aguiar,
Martha Cecilia Paredes Paredes,
F. Javier López-Martínez
Abstract:
Channel modeling is a critical issue when designing or evaluating the performance of reconfigurable intelligent surface (RIS)-assisted communications. Inspired by the promising potential of learning-based methods for characterizing the radio environment, we present a general approach to model the RIS end-to-end equivalent channel using the unsupervised expectation-maximization (EM) learning algori…
▽ More
Channel modeling is a critical issue when designing or evaluating the performance of reconfigurable intelligent surface (RIS)-assisted communications. Inspired by the promising potential of learning-based methods for characterizing the radio environment, we present a general approach to model the RIS end-to-end equivalent channel using the unsupervised expectation-maximization (EM) learning algorithm. We show that an EM-based approximation through a simple mixture of two Nakagami-$m$ distributions suffices to accurately approximating the equivalent channel, while allowing for the incorporation of crucial aspects into RIS's channel modeling as spatial channel correlation, phase-shift errors, arbitrary fading conditions, and coexistence of direct and RIS channels. Based on the proposed analytical framework, we evaluate the outage probability under different settings of RIS's channel features and confirm the superiority of this approach compared to recent results in the literature.
△ Less
Submitted 10 August, 2021; v1 submitted 24 March, 2021;
originally announced March 2021.
-
Survey on Physical Layer Security for 5G Wireless Networks
Authors:
José David Vega Sánchez,
Luis Urquiza-Aguiar,
Martha Cecilia Paredes Paredes,
Diana Pamela Moya Osorio
Abstract:
Physical layer security is a promising approach that can benefit traditional encryption methods. The idea of physical layer security is to take advantage of the features of the propagation medium and its impairments to ensure secure communication in the physical layer. This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in p…
▽ More
Physical layer security is a promising approach that can benefit traditional encryption methods. The idea of physical layer security is to take advantage of the features of the propagation medium and its impairments to ensure secure communication in the physical layer. This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in physical layer security. Furthermore, a theoretical framework related to the most commonly used physical layer security techniques to improve the secrecy performance is provided. Finally, our work surveys physical layer security research over several enabling 5G technologies, such as massive multiple-input multiple-output, millimeter-wave communications, heterogeneous networks, non-orthogonal multiple access, and full-duplex. Also, we include the key concepts of each of the aforementioned technologies. Future fields of research and technical challenges of physical layer security are also identified.
△ Less
Submitted 14 June, 2020;
originally announced June 2020.
-
Information-Theoretic Security of MIMO Networks under $κ$-$μ$ Shadowed Fading Channels
Authors:
José David Vega Sánchez,
D. P. Moya Osorio,
F. Javier López-Martínez,
Martha Cecilia Paredes Paredes,
Luis Urquiza-Aguiar
Abstract:
This paper investigates the impact of realistic propagation conditions on the achievable secrecy performance of multiple-input multiple-output systems in the presence of an eavesdropper. Specifically, we concentrate on the $κ$-$μ$ shadowed fading model because its physical underpinnings capture a wide range of propagation conditions, while, at the same time, it allows for much better tractability…
▽ More
This paper investigates the impact of realistic propagation conditions on the achievable secrecy performance of multiple-input multiple-output systems in the presence of an eavesdropper. Specifically, we concentrate on the $κ$-$μ$ shadowed fading model because its physical underpinnings capture a wide range of propagation conditions, while, at the same time, it allows for much better tractability than other state-of-the-art fading models. By considering transmit antenna selection and maximal ratio combining reception at the legitimate and eavesdropper's receiver sides, we study two relevant scenarios $(i)$ the transmitter does not know the eavesdropper's channel state information (CSI), and $(ii)$ the transmitter has knowledge of the CSI of the eavesdropper link. For this purpose, we first obtain novel and tractable expressions for the statistics of the maximum of independent and identically distributed (i.i.d.) variates related to the legitimate path. Based on these results, we derive novel closed-form expressions for the secrecy outage probability (SOP) and the average secrecy capacity (ASC) to assess the secrecy performance in passive and active eavesdropping scenarios, respectively. Moreover, we develop analytical asymptotic expressions of the SOP and ASC at the high signal-to-noise ratio regime. In all instances, secrecy performance metrics are characterized in closed-form, without requiring the evaluation of Meijer or Fox functions. Some useful insights on how the different propagation conditions and the number of antennas impact the secrecy performance are also provided.
△ Less
Submitted 30 June, 2020; v1 submitted 5 May, 2020;
originally announced May 2020.
-
Spectrum preserving short cycle removal on regular graphs
Authors:
Pedro Paredes
Abstract:
We describe a new method to remove short cycles on regular graphs while maintaining spectral bounds (the nontrivial eigenvalues of the adjacency matrix), as long as the graphs have certain combinatorial properties. These combinatorial properties are related to the number and distance between short cycles and are known to happen with high probability in uniformly random regular graphs.
Using this…
▽ More
We describe a new method to remove short cycles on regular graphs while maintaining spectral bounds (the nontrivial eigenvalues of the adjacency matrix), as long as the graphs have certain combinatorial properties. These combinatorial properties are related to the number and distance between short cycles and are known to happen with high probability in uniformly random regular graphs.
Using this method we can show two results involving high girth spectral expander graphs. First, we show that given $d \geq 3$ and $n$, there exists an explicit distribution of $d$-regular $Θ(n)$-vertex graphs where with high probability its samples have girth $Ω(\log_{d - 1} n)$ and are $ε$-near-Ramanujan; i.e., its eigenvalues are bounded in magnitude by $2\sqrt{d - 1} + ε$ (excluding the single trivial eigenvalue of $d$). Then, for every constant $d \geq 3$ and $ε> 0$, we give a deterministic poly$(n)$-time algorithm that outputs a $d$-regular graph on $Θ(n)$-vertices that is $ε$-near-Ramanujan and has girth $Ω(\sqrt{\log n})$, based on the work of arXiv:1909.06988 .
△ Less
Submitted 17 February, 2020;
originally announced February 2020.
-
A Survey on Subgraph Counting: Concepts, Algorithms and Applications to Network Motifs and Graphlets
Authors:
Pedro Ribeiro,
Pedro Paredes,
Miguel E. P. Silva,
David Aparicio,
Fernando Silva
Abstract:
Computing subgraph frequencies is a fundamental task that lies at the core of several network analysis methodologies, such as network motifs and graphlet-based metrics, which have been widely used to categorize and compare networks from multiple domains. Counting subgraphs is however computationally very expensive and there has been a large body of work on efficient algorithms and strategies to ma…
▽ More
Computing subgraph frequencies is a fundamental task that lies at the core of several network analysis methodologies, such as network motifs and graphlet-based metrics, which have been widely used to categorize and compare networks from multiple domains. Counting subgraphs is however computationally very expensive and there has been a large body of work on efficient algorithms and strategies to make subgraph counting feasible for larger subgraphs and networks.
This survey aims precisely to provide a comprehensive overview of the existing methods for subgraph counting. Our main contribution is a general and structured review of existing algorithms, classifying them on a set of key characteristics, highlighting their main similarities and differences. We identify and describe the main conceptual approaches, giving insight on their advantages and limitations, and provide pointers to existing implementations. We initially focus on exact sequential algorithms, but we also do a thorough survey on approximate methodologies (with a trade-off between accuracy and execution time) and parallel strategies (that need to deal with an unbalanced search space).
△ Less
Submitted 28 October, 2019;
originally announced October 2019.
-
Explicit near-Ramanujan graphs of every degree
Authors:
Sidhanth Mohanty,
Ryan O'Donnell,
Pedro Paredes
Abstract:
For every constant $d \geq 3$ and $ε> 0$, we give a deterministic $\mathrm{poly}(n)$-time algorithm that outputs a $d$-regular graph on $Θ(n)$ vertices that is $ε$-near-Ramanujan; i.e., its eigenvalues are bounded in magnitude by $2\sqrt{d-1} + ε$ (excluding the single trivial eigenvalue of~$d$).
For every constant $d \geq 3$ and $ε> 0$, we give a deterministic $\mathrm{poly}(n)$-time algorithm that outputs a $d$-regular graph on $Θ(n)$ vertices that is $ε$-near-Ramanujan; i.e., its eigenvalues are bounded in magnitude by $2\sqrt{d-1} + ε$ (excluding the single trivial eigenvalue of~$d$).
△ Less
Submitted 27 November, 2022; v1 submitted 16 September, 2019;
originally announced September 2019.
-
The SDP value for random two-eigenvalue CSPs
Authors:
Sidhanth Mohanty,
Ryan O'Donnell,
Pedro Paredes
Abstract:
We precisely determine the SDP value (equivalently, quantum value) of large random instances of certain kinds of constraint satisfaction problems, ``two-eigenvalue 2CSPs''. We show this SDP value coincides with the spectral relaxation value, possibly indicating a computational threshold. Our analysis extends the previously resolved cases of random regular $\mathsf{2XOR}$ and $\textsf{NAE-3SAT}$, a…
▽ More
We precisely determine the SDP value (equivalently, quantum value) of large random instances of certain kinds of constraint satisfaction problems, ``two-eigenvalue 2CSPs''. We show this SDP value coincides with the spectral relaxation value, possibly indicating a computational threshold. Our analysis extends the previously resolved cases of random regular $\mathsf{2XOR}$ and $\textsf{NAE-3SAT}$, and includes new cases such as random $\mathsf{Sort}_4$ (equivalently, $\mathsf{CHSH}$) and $\mathsf{Forrelation}$ CSPs. Our techniques include new generalizations of the nonbacktracking operator, the Ihara--Bass Formula, and the Friedman/Bordenave proof of Alon's Conjecture.
△ Less
Submitted 16 June, 2019;
originally announced June 2019.
-
On the Statistics of the Ratio of Non-Constrained Arbitrary α-μ Random Variables: a General Framework and Applications
Authors:
J. D. Vega Sánchez,
D. P. Moya Osorio,
E. E. Benitez Olivo,
H. Alves,
M. C. P. Paredes,
L. Urquiza-Aguiar
Abstract:
In this paper, we derive closed-form exact expressions for the main statistics of the ratio of squared alpha-mu random variables, which are of interest in many scenarios for future wireless networks where generalized distributions are more suitable to fit with field data. Importantly, different from previous proposals, our expressions are general in the sense that are valid for non constrained arb…
▽ More
In this paper, we derive closed-form exact expressions for the main statistics of the ratio of squared alpha-mu random variables, which are of interest in many scenarios for future wireless networks where generalized distributions are more suitable to fit with field data. Importantly, different from previous proposals, our expressions are general in the sense that are valid for non constrained arbitrary values of the parameters of the alpha-mu distribution. Thus, the probability density function, cumulative distribution function, moment generating function, and higher order moments are given in terms of both (i) theFox H-function for which we provide a portable and efficient Wolfram Mathematica code and (ii) easily computable series expansions. Our expressions can be used straightforwardly in the performance analysis of a number of wireless communication systems, including either interference-limited scenarios, spectrum sharing, full-duplex or physical-layer security networks, for which we present the application of the proposed framework. Moreover, closed-form expressions for some classical distributions, derived as special cases from the alpha-mu distribution, are provided as byproducts. The validity of the proposed expressions is confirmed via Monte Carlo simulations.
△ Less
Submitted 20 February, 2019;
originally announced February 2019.
-
Development of a passive Rehabilitation Robot for the wrist joint through the implementation of an Arduino UNO microcontroller
Authors:
E Ceballos,
M Díaz-Rodriguez,
P Paredes,
P Vargas
Abstract:
In this research was implemented the use of an Arduino UNO R3 microcontroller to control the movements of a prototype robotic functional developed to perform rehabilitation exercises in the wrist joint; This device can be used to assist the physiatrist to rehabilitate the tendinitis, synovitis, rheumatoid arthritis and for pre-operative and post-operative therapy in this joint. During the design s…
▽ More
In this research was implemented the use of an Arduino UNO R3 microcontroller to control the movements of a prototype robotic functional developed to perform rehabilitation exercises in the wrist joint; This device can be used to assist the physiatrist to rehabilitate the tendinitis, synovitis, rheumatoid arthritis and for pre-operative and post-operative therapy in this joint. During the design stage of the functional prototype, the methodology of the industrial design process was used from a concurrent engineering approach, through which anthropometric studies could be performed related to the dimensions and angles of movement of the wrist joint in the population Venezuelan from the information collected, the design proposal was elaborated, and the use of CAD programs defined the different forms, geometries and materials of the components of the rehabilitation device, which were later analyzed using the finite element method for the determination The tensional state of efforts and safety factors through the use of CAE programs. In addition, a software was developed for the acquisition, registration, reproduction and execution of the different movements produced during the rehabilitation therapy. Through the research developed, a device was designed that will help the rehabilitation of the wrist joint allowing the combination of dorsal-palmar flexion and ulnar-radial movements to recover the joint function of various pathologies presented in the Venezuelan population.
△ Less
Submitted 7 June, 2017;
originally announced June 2017.
-
The Problem of Peak-to-Average Power Ratio in OFDM Systems
Authors:
Martha C. Paredes Paredes,
M. Julia Fernández-Getino García
Abstract:
Orthogonal Frequency Division Multiplexing (OFDM) is widely used in many digital communication systems due to its advantages such us high bit rate, strong immunity to multipath and high spectral efficiency but it suffers a high Peak-to-Average Power Ratio (PAPR) at the transmitted signal. It is very important to deal with PAPR reduction in OFDM systems to avoid signal degradation. Currently, the P…
▽ More
Orthogonal Frequency Division Multiplexing (OFDM) is widely used in many digital communication systems due to its advantages such us high bit rate, strong immunity to multipath and high spectral efficiency but it suffers a high Peak-to-Average Power Ratio (PAPR) at the transmitted signal. It is very important to deal with PAPR reduction in OFDM systems to avoid signal degradation. Currently, the PAPR problem is an active area of research and in this paper we present several techniques and that mathematically analyzed. Moreover their advantages and disadvantages have been enumerated in order to provide the readers the actual situation of the PAPR problem.
△ Less
Submitted 28 March, 2015;
originally announced March 2015.
-
Three Degrees of Distance on Twitter
Authors:
Jorge Fabrega,
Pablo Paredes
Abstract:
Recent work has found that the propagation of behaviors and sentiments through networks extends in ranges up to 2 to 4 degrees of distance. The regularity with which the same observation is found in dissimilar phenomena has been associated with friction in the propagation process and the instability of link structure that emerges in the dynamic of social networks. We study a contagious behavior, t…
▽ More
Recent work has found that the propagation of behaviors and sentiments through networks extends in ranges up to 2 to 4 degrees of distance. The regularity with which the same observation is found in dissimilar phenomena has been associated with friction in the propagation process and the instability of link structure that emerges in the dynamic of social networks. We study a contagious behavior, the practice of retweeting, in a setting where neither of those restrictions is present and still found the same result.
△ Less
Submitted 31 July, 2012; v1 submitted 30 July, 2012;
originally announced July 2012.