-
RIS-Assisted Beamfocusing in Near-Field IoT Communication Systems: A Transformer-Based Approach
Authors:
Quan Zhou,
Jingjing Zhao,
Kaiquan Cai,
Yanbo Zhu
Abstract:
The massive number of antennas in extremely large aperture array (ELAA) systems shifts the propagation regime of signals in internet of things (IoT) communication systems towards near-field spherical wave propagation. We propose a reconfigurable intelligent surfaces (RIS)-assisted beamfocusing mechanism, where the design of the two-dimensional beam codebook that contains both the angular and dista…
▽ More
The massive number of antennas in extremely large aperture array (ELAA) systems shifts the propagation regime of signals in internet of things (IoT) communication systems towards near-field spherical wave propagation. We propose a reconfigurable intelligent surfaces (RIS)-assisted beamfocusing mechanism, where the design of the two-dimensional beam codebook that contains both the angular and distance domains is challenging. To address this issue, we introduce a novel Transformer-based two-stage beam training algorithm, which includes the coarse and fine search phases. The proposed mechanism provides a fine-grained codebook with enhanced spatial resolution, enabling precise beamfocusing. Specifically, in the first stage, the beam training is performed to estimate the approximate location of the device by using a simple codebook, determining whether it is within the beamfocusing range (BFR) or the none-beamfocusing range (NBFR). In the second stage, by using a more precise codebook, a fine-grained beam search strategy is conducted. Experimental results unveil that the precision of the RIS-assisted beamfocusing is greatly improved. The proposed method achieves beam selection accuracy up to 97% at signal-to-noise ratio (SNR) of 20 dB, and improves 10% to 50% over the baseline method at different SNRs.
△ Less
Submitted 17 April, 2025;
originally announced April 2025.
-
Continuous Aperture Array (CAPA)-Based Secure Wireless Communications
Authors:
Jingjing Zhao,
Haowen Song,
Xidong Mu,
Kaiquan Cai,
Yanbo Zhu,
Yuanwei Liu
Abstract:
A continuous aperture array (CAPA)-based secure communication system is investigated, where a base station equipped with a CAPA transmits signals to a legitimate user under the existence of an eavesdropper. For improving the secrecy performance, the artificial noise (AN) is employed at the BS for the jamming purpose. We aim at maximizing the secrecy rate by jointly optimizing the information-beari…
▽ More
A continuous aperture array (CAPA)-based secure communication system is investigated, where a base station equipped with a CAPA transmits signals to a legitimate user under the existence of an eavesdropper. For improving the secrecy performance, the artificial noise (AN) is employed at the BS for the jamming purpose. We aim at maximizing the secrecy rate by jointly optimizing the information-bearing and AN source current patterns, subject to the maximum transmit power constraint. To solve the resultant non-convex integral-based functional programming problem, a channel subspace-based approach is first proposed via exploiting the result that the optimal current patterns always lie within the subspace spanned by all users' channel responses. Then, the intractable CAPA continuous source current pattern design problem with an infinite number of optimization variables is equivalently transformed into the channel-subspace weighting factor optimization problem with a finite number of optimization variables. A penalty-based successive convex approximation method is developed for iteratively optimizing the finite-size weighting vectors. To further reduce the computational complexity, we propose a two-stage source current patterns design scheme. Specifically, the information-bearing and AN patterns are first designed using the maximal ration transmission and zero-forcing transmission, respectively. Then, the remaining power allocation is addressed via the one-dimensional search method. Numerical results unveil that 1) the CAPA brings in significant secrecy rate gain compared to the conventional discrete multiple-input multiple-output; 2) the proposed channel subspace-based algorithm outperforms the conventional Fourier-based approach, while sustaining much lower computational complexity; and 3) the two-stage ZF-MRT approach has negligible performance loss for the large transmit power regime.
△ Less
Submitted 15 April, 2025;
originally announced April 2025.
-
Markov Clustering based Fully Automated Nonblocking Hierarchical Supervisory Control of Large-Scale Discrete-Event Systems
Authors:
Yingying Liu,
Zhaojian Cai,
Kai Cai
Abstract:
In this paper we revisit the abstraction-based approach to synthesize a hierarchy of decentralized supervisors and coordinators for nonblocking control of large-scale discrete-event systems (DES), and augment it with a new clustering method for automatic and flexible grouping of relevant components during the hierarchical synthesis process. This method is known as Markov clustering, which not only…
▽ More
In this paper we revisit the abstraction-based approach to synthesize a hierarchy of decentralized supervisors and coordinators for nonblocking control of large-scale discrete-event systems (DES), and augment it with a new clustering method for automatic and flexible grouping of relevant components during the hierarchical synthesis process. This method is known as Markov clustering, which not only automatically performs grouping but also allows flexible tuning the sizes of the resulting clusters using a single parameter. Compared to the existing abstraction-based approach that lacks effective grouping method for general cases, our proposed approach based on Markov clustering provides a fully automated and effective hierarchical synthesis procedure applicable to general large-scale DES. Moreover, it is proved that the resulting hierarchy of supervisors and coordinators collectively achieves global nonblocking (and maximally permissive) controlled behavior under the same conditions as those in the existing abstraction-based approach. Finally, a benchmark case study is conducted to empirically demonstrate the effectiveness of our approach.
△ Less
Submitted 14 April, 2025;
originally announced April 2025.
-
Movable-Element RIS-Aided Wireless Communications: An Element-Wise Position Optimization Approach
Authors:
Jingjing Zhao,
Qingyi Huang,
Kaiquan Cai,
Quan Zhou,
Xidong Mu,
Yuanwei Liu
Abstract:
A point-to-point movable element (ME) enabled reconfigurable intelligent surface (ME-RIS) communication system is investigated, where each element position can be flexibly adjusted to create favorable channel conditions. For maximizing the communication rate, an efficient ME position optimization approach is proposed. Specifically, by characterizing the cascaded channel power gain in an element-wi…
▽ More
A point-to-point movable element (ME) enabled reconfigurable intelligent surface (ME-RIS) communication system is investigated, where each element position can be flexibly adjusted to create favorable channel conditions. For maximizing the communication rate, an efficient ME position optimization approach is proposed. Specifically, by characterizing the cascaded channel power gain in an element-wise manner, the position of each ME is iteratively updated by invoking the successive convex approximation method. Numerical results unveil that 1) the proposed element-wise ME position optimization algorithm outperforms the gradient descent algorithm; and 2) the ME-RIS significantly improves the communication rate compared to the conventional RIS with fixed-position elements.
△ Less
Submitted 19 March, 2025;
originally announced March 2025.
-
Waveguide Division Multiple Access for Pinching-Antenna Systems (PASS)
Authors:
Jingjing Zhao,
Xidong Mu,
Kaiquan Cai,
Yanbo Zhu,
Yuanwei Liu
Abstract:
A novel concept of waveguide division multiple access (WDMA) is proposed for multi-user pinching-antenna systems (PASS). The key principle of WDMA is to allocate each user with a dedicated waveguide, which is regarded as a new type of radio resources, so as to facilitate multi-user communications. By adjusting the activation positions of pinching antennas (PAs) over each waveguide, the pinching be…
▽ More
A novel concept of waveguide division multiple access (WDMA) is proposed for multi-user pinching-antenna systems (PASS). The key principle of WDMA is to allocate each user with a dedicated waveguide, which is regarded as a new type of radio resources, so as to facilitate multi-user communications. By adjusting the activation positions of pinching antennas (PAs) over each waveguide, the pinching beamforming can be exploited for intended user signal enhancement and inter-user interference mitigation. Considering both ideal continuous and practical discrete PA position activation schemes, a joint power allocation and pinching beamforming optimization problem is formulated for the maximization of the sum rate. An alternating optimization-based algorithm is developed to address the formulated nonconvex problem. For solving the power allocation subproblem, the successive convex approximation method is invoked. For the pinching beamforming design subproblem, a penalty-based gradient ascent algorithm is first developed for the continuous PA activation case. Then, for the discrete PA activation case, a matching theory-based algorithm is proposed to achieve the near-optimal performance but with a low complexity. Numerical results unveil that: 1) For both continuous and discrete activation cases, PASS can achieve a significant performance gain over conventional fixed-position antenna systems; 2) the proposed WDMA can effectively underpin multi-user communications with the near orthogonality in free space achieved by the pinching beamforming; and 3) the performance gap between the discrete and continuous activation cases can be significantly alleviated with practically feasible numbers of PA candidate positions.
△ Less
Submitted 24 February, 2025;
originally announced February 2025.
-
Near-Field Integrated Sensing and Communications for Secure UAV Networks
Authors:
Jingjing Zhao,
Songtao Xue,
Kaiquan Cai,
Xidong Mu,
Yuanwei Liu,
Yanbo Zhu
Abstract:
A novel near-field integrated sensing and communications framework for secure unmanned aerial vehicle (UAV) networks with high time efficiency is proposed. A ground base station (GBS) with large aperture size communicates with one communication UAV (C-UAV) under the existence of one eavesdropping UAV (E-UAV), where the artificial noise (AN) is employed for both jamming and sensing purpose. Given t…
▽ More
A novel near-field integrated sensing and communications framework for secure unmanned aerial vehicle (UAV) networks with high time efficiency is proposed. A ground base station (GBS) with large aperture size communicates with one communication UAV (C-UAV) under the existence of one eavesdropping UAV (E-UAV), where the artificial noise (AN) is employed for both jamming and sensing purpose. Given that the E-UAV's motion model is unknown at the GBS, we first propose a near-field localization and trajectory tracking scheme. Specifically, exploiting the variant Doppler shift observations over the spatial domain in the near field, the E-UAV's three-dimensional (3D) velocities are estimated from echo signals. To provide the timely correction of location prediction errors, the extended Kalman filter (EKF) is adopted to fuse the predicted states and the measured ones. Subsequently, based on the real-time predicated location of the E-UAV, we further propose a joint GBS beamforming and C-UAV trajectory design scheme for maximizing the instantaneous secrecy rate, while guaranteeing the sensing accuracy constraint. To solve the resultant non-convex problem, an alternating optimization approach is developed, where the near-field GBS beamforming and the C-UAV trajectory design subproblems are iteratively solved by exploiting the successive convex approximation method. Finally, our numerical results unveil that: 1) the E-UAV's 3D velocities and location can be accurately estimated in real time with our proposed framework by exploiting the near-field spherical wave propagation; and 2) the proposed framework achieves superior secrecy rate compared to benchmark schemes and closely approaches the performance when the E-UAV trajectory is perfectly known.
△ Less
Submitted 2 February, 2025;
originally announced February 2025.
-
Exploiting Movable-Element STARS for Wireless Communications
Authors:
Jingjing Zhao,
Quan Zhou,
Xidong Mu,
Kaiquan Cai,
Yanbo Zhu,
Yuanwei Liu
Abstract:
A novel movable-element enabled simultaneously transmitting and reflecting surface (ME-STARS) communication system is proposed, where ME-STARS elements positions can be adjusted to enhance the degress-of-freedom for transmission and reflection. For each ME-STARS operating protocols, namely energy-splitting (ES), mode switching (MS), and time switching (TS), a weighted sum rate (WSR) maximization p…
▽ More
A novel movable-element enabled simultaneously transmitting and reflecting surface (ME-STARS) communication system is proposed, where ME-STARS elements positions can be adjusted to enhance the degress-of-freedom for transmission and reflection. For each ME-STARS operating protocols, namely energy-splitting (ES), mode switching (MS), and time switching (TS), a weighted sum rate (WSR) maximization problem is formulated to jointly optimize the active beamforming at the base station (BS) as well as the elements positions and passive beamforming at the ME-STARS. An alternative optimization (AO)-based iterative algorithm is developed to decompose the original non-convex problem into three subproblems. Specifically, the gradient descent algorithm is employed for solving the ME-STARS element position optimization subproblem, and the weighted minimum mean square error and the successive convex approximation methods are invoked for solving the active and passive beamforming subproblems, respectively. It is further demonstrated that the proposed AO algorithm for ES can be extended to solve the problems for MS and TS. Numerical results unveil that: 1) the ME-STARS can significantly improve the WSR compared to the STARS with fixed position elements and the conventional reconfigurable intelligent surface with movable elements, thanks to the extra spatial-domain diversity and the higher flexibility in beamforming; and 2) the performance gain of ME-STARS is significant in the scenarios with larger number of users or more scatterers.
△ Less
Submitted 27 December, 2024;
originally announced December 2024.
-
Interference-Robust Broadband Rapidly-Varying MIMO Communications: A Knowledge-Data Dual Driven Framework
Authors:
Jingjing Zhao,
Jing Su,
Kaiquan Cai,
Yanbo Zhu,
Yuanwei Liu,
Naofal Al-Dhahir
Abstract:
A novel time-efficient framework is proposed for improving the robustness of a broadband multiple-input multiple-output (MIMO) system against unknown interference under rapidly-varying channels. A mean-squared error (MSE) minimization problem is formulated by optimizing the beamformers employed. Since the unknown interference statistics are the premise for solving the formulated problem, an interf…
▽ More
A novel time-efficient framework is proposed for improving the robustness of a broadband multiple-input multiple-output (MIMO) system against unknown interference under rapidly-varying channels. A mean-squared error (MSE) minimization problem is formulated by optimizing the beamformers employed. Since the unknown interference statistics are the premise for solving the formulated problem, an interference statistics tracking (IST) module is first designed. The IST module exploits both the time- and spatial-domain correlations of the interference-plus-noise (IPN) covariance for the future predictions with data training. Compared to the conventional signal-free space sampling approach, the IST module can realize zero-pilot and low-latency estimation. Subsequently, an interference-resistant hybrid beamforming (IR-HBF) module is presented, which incorporates both the prior knowledge of the theoretical optimization method as well as the data-fed training. Taking advantage of the interpretable network structure, the IR-HBF module enables the simplified mapping from the interference statistics to the beamforming weights. The simulations are executed in high-mobility scenarios, where the numerical results unveil that: 1) the proposed IST module attains promising prediction accuracy compared to the conventional counterparts under different snapshot sampling errors; and 2) the proposed IR-HBF module achieves lower MSE with significantly reduced computational complexity.
△ Less
Submitted 1 March, 2025; v1 submitted 26 December, 2024;
originally announced December 2024.
-
Constrained Coding and Deep Learning Aided Threshold Detection for Resistive Memories
Authors:
Xingwei Zhong,
Kui Cai,
Guanghui Song,
Weijie Wang,
Yao Zhu
Abstract:
Resistive random access memory (ReRAM) is a promising emerging non-volatile memory (NVM) technology that shows high potential for both data storage and computing. However, its crossbar array architecture leads to the sneak path problem, which may severely degrade the reliability of data stored in the ReRAM cell. Due to the complication of memory physics and unique features of the sneak path induce…
▽ More
Resistive random access memory (ReRAM) is a promising emerging non-volatile memory (NVM) technology that shows high potential for both data storage and computing. However, its crossbar array architecture leads to the sneak path problem, which may severely degrade the reliability of data stored in the ReRAM cell. Due to the complication of memory physics and unique features of the sneak path induced interference (SPI), it is difficult to derive an accurate channel model for it. The deep learning (DL)-based detection scheme \cite{zhong2020sneakdl} can better mitigate the SPI, at the cost of additional power consumption and read latency. In this letter, we first propose a novel CC scheme which can not only reduce the SPI in the memory array, but also effectively differentiate the memory arrays into two categories of sneak-path-free and sneak-path-affected arrays. For the sneak-path-free arrays, we can use a simple middle-point threshold detector to detect the low and high resistance cells of ReRAM. For the sneak-path-affected arrays, a DL detector is first trained off-line (prior to the data detection of ReRAM). To avoid the additional power consumption and latency introduced by the DL detector, we further propose a DL-based threshold detector, whose detection threshold can be derived based on the outputs of the DL detector. It is then utilized for the online data detection of all the identified sneak-path-affected arrays. Simulation results demonstrate that the above CC and DL aided threshold detection scheme can effectively mitigate the SPI of the ReRAM array and achieve better error rate performance than the prior art detection schemes, without the prior knowledge of the channel.
△ Less
Submitted 19 November, 2024;
originally announced November 2024.
-
A Degree of Flowability for Virtual Tubes
Authors:
Quan Quan,
Shuhan Huang,
Kai-Yuan Cai
Abstract:
With the rapid development of robotics swarm technology, there are more tasks that require the swarm to pass through complicated environments safely and efficiently. Virtual tube technology is a novel way to achieve this goal. Virtual tubes are free spaces connecting two places that provide safety boundaries and direction of motion for swarm robotics. How to determine the design quality of a virtu…
▽ More
With the rapid development of robotics swarm technology, there are more tasks that require the swarm to pass through complicated environments safely and efficiently. Virtual tube technology is a novel way to achieve this goal. Virtual tubes are free spaces connecting two places that provide safety boundaries and direction of motion for swarm robotics. How to determine the design quality of a virtual tube is a fundamental problem. For such a purpose, this paper presents a degree of flowability (DOF) for two-dimensional virtual tubes according to a minimum energy principle. After that, methods to calculate DOF are proposed with a feasibility analysis. Simulations of swarm robotics in different kinds of two-dimensional virtual tubes are performed to demonstrate the effectiveness of the proposed method of calculating DOF.
△ Less
Submitted 3 November, 2024; v1 submitted 29 October, 2024;
originally announced October 2024.
-
Deep Transfer Learning-based Detection for Flash Memory Channels
Authors:
Zhen Mei,
Kui Cai,
Long Shi,
Jun Li,
Li Chen,
Kees A. Schouhamer Immink
Abstract:
The NAND flash memory channel is corrupted by different types of noises, such as the data retention noise and the wear-out noise, which lead to unknown channel offset and make the flash memory channel non-stationary. In the literature, machine learning-based methods have been proposed for data detection for flash memory channels. However, these methods require a large number of training samples an…
▽ More
The NAND flash memory channel is corrupted by different types of noises, such as the data retention noise and the wear-out noise, which lead to unknown channel offset and make the flash memory channel non-stationary. In the literature, machine learning-based methods have been proposed for data detection for flash memory channels. However, these methods require a large number of training samples and labels to achieve a satisfactory performance, which is costly. Furthermore, with a large unknown channel offset, it may be impossible to obtain enough correct labels. In this paper, we reformulate the data detection for the flash memory channel as a transfer learning (TL) problem. We then propose a model-based deep TL (DTL) algorithm for flash memory channel detection. It can effectively reduce the training data size from $10^6$ samples to less than 104 samples. Moreover, we propose an unsupervised domain adaptation (UDA)-based DTL algorithm using moment alignment, which can detect data without any labels. Hence, it is suitable for scenarios where the decoding of error-correcting code fails and no labels can be obtained. Finally, a UDA-based threshold detector is proposed to eliminate the need for a neural network. Both the channel raw error rate analysis and simulation results demonstrate that the proposed DTL-based detection schemes can achieve near-optimal bit error rate (BER) performance with much less training data and/or without using any labels.
△ Less
Submitted 7 October, 2024;
originally announced October 2024.
-
Deep Learning-Based Decoding of Linear Block Codes for Spin-Torque Transfer Magnetic Random Access Memory (STT-MRAM)
Authors:
Xingwei Zhong,
Kui Cai,
Zhen Mei,
Tony Q. S. Quek
Abstract:
Thanks to its superior features of fast read/write speed and low power consumption, spin-torque transfer magnetic random access memory (STT-MRAM) has become a promising non-volatile memory (NVM) technology that is suitable for many applications. However, the reliability of STT-MRAM is seriously affected by the variation of the memory fabrication process and the working temperature, and the later w…
▽ More
Thanks to its superior features of fast read/write speed and low power consumption, spin-torque transfer magnetic random access memory (STT-MRAM) has become a promising non-volatile memory (NVM) technology that is suitable for many applications. However, the reliability of STT-MRAM is seriously affected by the variation of the memory fabrication process and the working temperature, and the later will lead to an unknown offset of the channel. Hence, there is a pressing need to develop more effective error correction coding techniques to tackle these imperfections and improve the reliability of STT-MRAM. In this work, we propose, for the first time, the application of deep-learning (DL) based algorithms and techniques to improve the decoding performance of linear block codes with short codeword lengths for STT-MRAM. We formulate the belief propagation (BP) decoding of linear block code as a neural network (NN), and propose a novel neural normalized-offset reliability-based min-sum (NNORB-MS) decoding algorithm. We successfully apply our proposed decoding algorithm to the STT-MRAM channel through channel symmetrization to overcome the channel asymmetry. We also propose an NN-based soft information generation method (SIGM) to take into account the unknown offset of the channel. Simulation results demonstrate that our proposed NNORB-MS decoding algorithm can achieve significant performance gain over both the hard-decision decoding (HDD) and the regular reliability-based min-sum (RB-MS) decoding algorithm, for cases without and with the unknown channel offset. Moreover, the decoder structure and time complexity of the NNORB-MS algorithm remain similar to those of the regular RB-MS algorithm.
△ Less
Submitted 7 October, 2024;
originally announced October 2024.
-
Deep-Learning-Based Adaptive Error-Correction Decoding for Spin-Torque Transfer Magnetic Random Access Memory (STT-MRAM)
Authors:
Xingwei Zhong,
Kui Cai,
Peng Kang,
Guanghui Song,
Bin Dai
Abstract:
Spin-torque transfer magnetic random access memory (STT-MRAM) is a promising emerging non-volatile memory (NVM) technology with wide applications. However, the data recovery of STT-MRAM is affected by the diversity of channel raw bit error rate (BER) across different dies caused by process variations, as well as the unknown resistance offset due to temperature change. Therefore, it is critical to…
▽ More
Spin-torque transfer magnetic random access memory (STT-MRAM) is a promising emerging non-volatile memory (NVM) technology with wide applications. However, the data recovery of STT-MRAM is affected by the diversity of channel raw bit error rate (BER) across different dies caused by process variations, as well as the unknown resistance offset due to temperature change. Therefore, it is critical to develop effective decoding algorithms of error correction codes (ECCs) for STT-MRAM. In this article, we first propose a neural bit-flipping (BF) decoding algorithm, which can share the same trellis representation as the state-of-the-art neural decoding algorithms, such as the neural belief propagation (NBP) and neural offset min-sum (NOMS) algorithm. Hence, a neural network (NN) decoder with a uniform architecture but different NN parameters can realize all these neural decoding algorithms. Based on such a unified NN decoder architecture, we further propose a novel deep-learning (DL)-based adaptive decoding algorithm whose decoding complexity can be adjusted according to the change of the channel conditions of STT-MRAM. Extensive experimental evaluation results demonstrate that the proposed neural decoders can greatly improve the performance over the standard decoders, with similar decoding latency and energy consumption. Moreover, the DL-based adaptive decoder can work well over different channel conditions of STT-MRAM irrespective of the unknown resistance offset, with a 50% reduction of the decoding latency and energy consumption compared to the fixed decoder.
△ Less
Submitted 7 October, 2024;
originally announced October 2024.
-
Supervisory Control Theory with Event Forcing
Authors:
Michel Reniers,
Kai Cai
Abstract:
In the Ramadge-Wonham supervisory control theory the only interaction mechanism between supervisor and plant is that the supervisor may enable/disable events from the plant and the plant makes a final decision about which of the enabled events is actually taking place. In this paper, the interaction between supervisor and plant is enriched by allowing the supervisor to force specific events (calle…
▽ More
In the Ramadge-Wonham supervisory control theory the only interaction mechanism between supervisor and plant is that the supervisor may enable/disable events from the plant and the plant makes a final decision about which of the enabled events is actually taking place. In this paper, the interaction between supervisor and plant is enriched by allowing the supervisor to force specific events (called forcible events) that are allowed to preempt uncontrollable events. A notion of forcible-controllability is defined that captures the interplay between controllability of a supervisor w.r.t. the uncontrollable events provided by a plant in the setting with event forcing. Existence of a maximally permissive, forcibly-controllable, nonblocking supervisor is shown and an algorithm is provided that computes such a supervisor. The approach is illustrated by two small case studies.
△ Less
Submitted 12 April, 2024;
originally announced April 2024.
-
GeNet: A Graph Neural Network-based Anti-noise Task-Oriented Semantic Communication Paradigm
Authors:
Chunhang Zheng,
Kechao Cai
Abstract:
Traditional approaches to semantic communication tasks rely on the knowledge of the signal-to-noise ratio (SNR) to mitigate channel noise. Moreover, these methods necessitate training under specific SNR conditions, entailing considerable time and computational resources. In this paper, we propose GeNet, a Graph Neural Network (GNN)-based paradigm for semantic communication aimed at combating noise…
▽ More
Traditional approaches to semantic communication tasks rely on the knowledge of the signal-to-noise ratio (SNR) to mitigate channel noise. Moreover, these methods necessitate training under specific SNR conditions, entailing considerable time and computational resources. In this paper, we propose GeNet, a Graph Neural Network (GNN)-based paradigm for semantic communication aimed at combating noise, thereby facilitating Task-Oriented Communication (TOC). We propose a novel approach where we first transform the input data image into graph structures. Then we leverage a GNN-based encoder to extract semantic information from the source data. This extracted semantic information is then transmitted through the channel. At the receiver's end, a GNN-based decoder is utilized to reconstruct the relevant semantic information from the source data for TOC. Through experimental evaluation, we show GeNet's effectiveness in anti-noise TOC while decoupling the SNR dependency. We further evaluate GeNet's performance by varying the number of nodes, revealing its versatility as a new paradigm for semantic communication. Additionally, we show GeNet's robustness to geometric transformations by testing it with different rotation angles, without resorting to data augmentation.
△ Less
Submitted 21 September, 2024; v1 submitted 27 March, 2024;
originally announced March 2024.
-
Bounded-Time Nonblocking Supervisory Control of Timed Discrete-Event Systems
Authors:
Renyuan Zhang,
Jiale Wu,
Junhua Gou,
Yabo Zhu,
Kai Cai
Abstract:
Recently an automaton property of quantitative nonblockingness was proposed in supervisory control of untimed discrete-event systems (DES), which quantifies the standard nonblocking property by capturing the practical requirement that all tasks be completed within a bounded number of steps. However, in practice tasks may be further required to be completed in specific time. To meet this new requir…
▽ More
Recently an automaton property of quantitative nonblockingness was proposed in supervisory control of untimed discrete-event systems (DES), which quantifies the standard nonblocking property by capturing the practical requirement that all tasks be completed within a bounded number of steps. However, in practice tasks may be further required to be completed in specific time. To meet this new requirement, in this paper we introduce the concept of bounded-time nonblockingness, which extends the concept of quantitative nonblockingness from untimed DES to timed DES. This property requires that each task must be completed within a bounded time counted by the number of ticks, rather than bounded number of transition steps in quantitative nonblockingness. Accordingly, we formulate a new bounded-time nonblocking supervisory control problem (BTNSCP) of timed DES, and characterize its solvability in terms of a new concept of bounded-time language completability. Then we present an approach to compute the maximally permissive solution to the new BTNSCP.
△ Less
Submitted 29 July, 2024; v1 submitted 27 January, 2024;
originally announced March 2024.
-
Distributed Secret Securing in Discrete-Event Systems
Authors:
Shoma Matsui,
Kai Cai,
Karen Rudie
Abstract:
In this paper, we study a security problem of protecting secrets in distributed systems. Specifically, we employ discrete-event systems to describe the structure and behaviour of distributed systems, in which global secret information is separated into pieces and stored in local component agents. The goal is to prevent such secrets from being exposed to intruders by imposing appropriate protection…
▽ More
In this paper, we study a security problem of protecting secrets in distributed systems. Specifically, we employ discrete-event systems to describe the structure and behaviour of distributed systems, in which global secret information is separated into pieces and stored in local component agents. The goal is to prevent such secrets from being exposed to intruders by imposing appropriate protection measures. This problem is formulated as to ensure that at least one piece of every distributed global secret is secured by a required number of protections, while the overall cost to apply protections is minimum. We first characterize the solvability of this security problem by providing a necessary and sufficient condition, and then develop an algorithm to compute a solution based on the supervisory control theory of discrete-event systems. Finally, we illustrate the effectiveness of our solution with an example system comprising distributed databases.
△ Less
Submitted 13 February, 2024;
originally announced February 2024.
-
ANIM-400K: A Large-Scale Dataset for Automated End-To-End Dubbing of Video
Authors:
Kevin Cai,
Chonghua Liu,
David M. Chan
Abstract:
The Internet's wealth of content, with up to 60% published in English, starkly contrasts the global population, where only 18.8% are English speakers, and just 5.1% consider it their native language, leading to disparities in online information access. Unfortunately, automated processes for dubbing of video - replacing the audio track of a video with a translated alternative - remains a complex an…
▽ More
The Internet's wealth of content, with up to 60% published in English, starkly contrasts the global population, where only 18.8% are English speakers, and just 5.1% consider it their native language, leading to disparities in online information access. Unfortunately, automated processes for dubbing of video - replacing the audio track of a video with a translated alternative - remains a complex and challenging task due to pipelines, necessitating precise timing, facial movement synchronization, and prosody matching. While end-to-end dubbing offers a solution, data scarcity continues to impede the progress of both end-to-end and pipeline-based methods. In this work, we introduce Anim-400K, a comprehensive dataset of over 425K aligned animated video segments in Japanese and English supporting various video-related tasks, including automated dubbing, simultaneous translation, guided video summarization, and genre/theme/style classification. Our dataset is made publicly available for research purposes at https://github.com/davidmchan/Anim400K.
△ Less
Submitted 10 January, 2024;
originally announced January 2024.
-
Multiple-Antenna Aided Aeronautical Communications in Air-Ground Integrated Networks: Channel Estimation, Reliable Transmission, and Multiple Access
Authors:
Jingjing Zhao,
Yanbo Zhu,
Kaiquan Cai,
Zhen Gao,
Zhu Han,
Lajos Hanzo
Abstract:
To provide seamless coverage during all flight phases, aeronautical communications systems (ACS) have to integrate space-based, air-based, as well as ground-based platforms to formulate aviation-oriented space-air-ground integrated networks (SAGINs). In continental areas, L-band aeronautical broadband communications (ABC) are gaining popularity for supporting air traffic management (ATM) moderniza…
▽ More
To provide seamless coverage during all flight phases, aeronautical communications systems (ACS) have to integrate space-based, air-based, as well as ground-based platforms to formulate aviation-oriented space-air-ground integrated networks (SAGINs). In continental areas, L-band aeronautical broadband communications (ABC) are gaining popularity for supporting air traffic management (ATM) modernization. However, L-band ABC faces the challenges of spectrum congestion and severe interference due to the legacy systems. To circumvent these, we propose a novel multiple-antenna aided L-band ABC paradigm to tackle the key issues of reliable and high-rate air-to-ground (A2G) transmissions. Specifically, we first introduce the development roadmap of the ABC. Furthermore, we discuss the peculiarities of the L-band ABC propagation environment and the distinctive challenges of the associated multiple-antenna techniques. To overcome these challenges, we propose an advanced multiple-antenna assisted L-band ABC paradigm from the perspective of channel estimation, reliable transmission, and multiple access. Finally, we shed light on the compelling research directions of the aviation component of SAGINs.
△ Less
Submitted 15 January, 2023;
originally announced January 2023.
-
An NLoS-based Enhanced Sensing Method for MmWave Communication System
Authors:
Shiwen He,
Kangli Cai,
Shiyue Huang,
Zhenyu Anz,
Wei Huang,
Ning Gao
Abstract:
The millimeter-wave (mmWave)-based Wi-Fi sensing technology has recently attracted extensive attention since it provides a possibility to realize higher sensing accuracy. However, current works mainly concentrate on sensing scenarios where the line-of-sight (LoS) path exists, which significantly limits their applications. To address the problem, we propose an enhanced mmWave sensing algorithm in t…
▽ More
The millimeter-wave (mmWave)-based Wi-Fi sensing technology has recently attracted extensive attention since it provides a possibility to realize higher sensing accuracy. However, current works mainly concentrate on sensing scenarios where the line-of-sight (LoS) path exists, which significantly limits their applications. To address the problem, we propose an enhanced mmWave sensing algorithm in the 3D non-line-of-sight environment (mm3NLoS), aiming to sense the direction and distance of the target when the LoS path is weak or blocked. Specifically, we first adopt the directional beam to estimate the azimuth/elevation angle of arrival (AoA) and angle of departure (AoD) of the reflection path. Then, the distance of the related path is measured by the fine timing measurement protocol. Finally, we transform the AoA and AoD of the multiple non-line-of-sight (NLoS) paths into the direction vector and then obtain the information of targets based on the geometric relationship. The simulation results demonstrate that mm3NLoS can achieve a centimeter-level error with a 2m spacing. Compared to the prior work, it can significantly reduce the performance degradation under the NLoS condition.
△ Less
Submitted 10 October, 2022;
originally announced October 2022.
-
Local Opacity Verification for Distributed Discrete Event Systems
Authors:
Sasinee Pruekprasert,
Kai Cai
Abstract:
This paper studies current-state opacity and initial-state opacity verification of distributed discrete event systems. The distributed system's global model is the parallel composition of multiple local systems: each of which represents a component. We propose sufficient conditions for verifying opacity of the global system model based only on the opacity of the local systems. We also present effi…
▽ More
This paper studies current-state opacity and initial-state opacity verification of distributed discrete event systems. The distributed system's global model is the parallel composition of multiple local systems: each of which represents a component. We propose sufficient conditions for verifying opacity of the global system model based only on the opacity of the local systems. We also present efficient approaches for the opacity verification problem that only rely on the intruder's observer automata of the local systems.
△ Less
Submitted 20 December, 2021;
originally announced December 2021.
-
Quantitatively Nonblocking Supervisory Control of Discrete-Event Systems
Authors:
Renyuan Zhang,
Jiahao Wang,
Zenghui Wang,
Kai Cai
Abstract:
In this paper, we propose two new nonblocking properties of automata as quantitative measures of maximal distances to marker states. The first property, called {\em quantitative nonblockingness}, captures the practical requirement that at least one of the marker states (representing e.g. task completion) be reachable within a prescribed number of steps from any non-marker state and following any t…
▽ More
In this paper, we propose two new nonblocking properties of automata as quantitative measures of maximal distances to marker states. The first property, called {\em quantitative nonblockingness}, captures the practical requirement that at least one of the marker states (representing e.g. task completion) be reachable within a prescribed number of steps from any non-marker state and following any trajectory of the system. The second property, called {\em heterogeneously quantitative nonblockingness}, distinguishes individual marker states and requires that each marker state be reached within a given bounded number of steps from any other state and following any trajectory of the system. Accordingly, we formulate two new problems of quantitatively nonblocking supervisory control and heterogeneously quantitatively nonblocking supervisory control, and characterize their solvabilities in terms of new concepts of quantitative language completability and heterogeneously quantitative language completability, respectively. It is proved that there exists the unique supremal (heterogeneously) quantitatively completable sublanguage of a given language, and we develop effective algorithms to compute the supremal sublanguages. Finally, combining with the algorithm of computing the supremal controllable sublanguage, we design algorithms to compute the maximally permissive solutions to the formulated (heterogeneously) quantitatively nonblocking supervisory control problems.
△ Less
Submitted 20 December, 2023; v1 submitted 2 August, 2021;
originally announced August 2021.
-
$ω-$nonblocking supervisory control of discrete-event systems with infinite behavior
Authors:
Ting Jiao,
Renyuan Zhang,
Kai Cai
Abstract:
In the supervisory control framework of discrete-event systems (DES) with infinite behavior initiated by Thistle and Wonham, a supervisor satisfying the minimal acceptable specification and the maximal legal specification is synthesized. However, this supervisor may incur livelocks as it cannot ensure that the infinite behavior under supervision will always visit some marker states. To tackle this…
▽ More
In the supervisory control framework of discrete-event systems (DES) with infinite behavior initiated by Thistle and Wonham, a supervisor satisfying the minimal acceptable specification and the maximal legal specification is synthesized. However, this supervisor may incur livelocks as it cannot ensure that the infinite behavior under supervision will always visit some marker states. To tackle this problem, we propose the definition of markability by requiring that all infinite cycles include at least one marker state. Then we formulate the problem of $ω-$nonblocking supervisory control of DES with infinite behavior to synthesize an $ω-$nonblocking (i.e. nonblocking, deadlock-free and livelock-free) supervisor. An algorithm is proposed to achieve $ω-$nonblockingness by computing the supremal $*-$controllable, $*-$closed, $ω-$controllable and markable sublanguage. We utilize the example of a robot as a running example.
△ Less
Submitted 15 March, 2021;
originally announced March 2021.
-
UAV Deployment, Device Scheduling and Resource Allocation for Energy-Efficient UAV-Aided IoT Networks with NOMA
Authors:
Jingjing Zhao,
Kaiquan Cai,
Yanbo Zhu
Abstract:
This article investigates the energy efficiency issue in non-orthogonal multiple access (NOMA)-enhanced Internet-of-Things (IoT) networks, where a mobile unmanned aerial vehicle (UAV) is exploited as a flying base station to collect data from ground devices via the NOMA protocol. With the aim of maximizing network energy efficiency, we formulate a joint problem of UAV deployment, device scheduling…
▽ More
This article investigates the energy efficiency issue in non-orthogonal multiple access (NOMA)-enhanced Internet-of-Things (IoT) networks, where a mobile unmanned aerial vehicle (UAV) is exploited as a flying base station to collect data from ground devices via the NOMA protocol. With the aim of maximizing network energy efficiency, we formulate a joint problem of UAV deployment, device scheduling and resource allocation. First, we formulate the joint device scheduling and spectrum allocation problem as a three-sided matching problem, and propose a novel low-complexity near-optimal algorithm. We also introduce the novel concept of `exploration' into the matching game for further performance improvement. By algorithm analysis, we prove the convergence and stability of the final matching state. Second, in an effort to allocate proper transmit power to IoT devices, we adopt the Dinkelbach's algorithm to obtain the optimal power allocation solution. Furthermore, we provide a simple but effective approach based on disk covering problem to determine the optimal number and locations of UAV's stop points to ensure that all IoT devices can be fully covered by the UAV via line-of-sight (LoS) links for the sake of better channel condition. Numerical results unveil that: i) the proposed joint UAV deployment, device scheduling and resource allocation scheme achieves much higher EE compared to predefined stationary UAV deployment case and fixed power allocation scheme, with acceptable complexity; and ii) the UAV-aided IoT networks with NOMA greatly outperforms the OMA case in terms of number of accessed devices.
△ Less
Submitted 15 March, 2021; v1 submitted 11 March, 2021;
originally announced March 2021.
-
Usability Aware Secret Protection with Minimum Cost
Authors:
Shoma Matsui,
Kai Cai
Abstract:
In this paper we study a cybersecurity problem of protecting system's secrets with multiple protections and a required security level, while minimizing the associated cost due to implementation/maintenance of these protections as well as the affected system usability. The target system is modeled as a discrete-event system (DES) in which there are a subset of marker states denoting the services/fu…
▽ More
In this paper we study a cybersecurity problem of protecting system's secrets with multiple protections and a required security level, while minimizing the associated cost due to implementation/maintenance of these protections as well as the affected system usability. The target system is modeled as a discrete-event system (DES) in which there are a subset of marker states denoting the services/functions provided to regular users, a subset of secret states, and multiple subsets of protectable events with different security levels. We first introduce usability-aware cost levels for the protectable events, and then formulate the security problem as to ensure that every system trajectory that reaches a secret state contains a specified number of protectable events with at least a certain security level, and the highest usability-aware cost level of these events is minimum. We first provide a necessary and sufficient condition under which this security problem is solvable, and when this condition holds we propose an algorithm to solve the problem based on the supervisory control theory of DES. Moreover, we extend the problem to the case of heterogeneous secrets with different levels of importance, and develop an algorithm to solve this extended problem. Finally, we demonstrate the effectiveness of our solutions with a network security example.
△ Less
Submitted 16 February, 2021;
originally announced February 2021.
-
User Association and Path Planning for UAV-Aided Mobile Edge Computing with Energy Restriction
Authors:
Yuwen Qian,
Feifei Wang,
Jun Li,
Long Shi,
Kui Cai,
Feng Shu
Abstract:
Mobile edge computing (MEC) provides computational services at the edge of networks by offloading tasks from user equipments (UEs). This letter employs an unmanned aerial vehicle (UAV) as the edge computing server to execute offloaded tasks from the ground UEs. We jointly optimize user association, UAV trajectory, and uploading power of each UE to maximize sum bits offloaded from all UEs to the UA…
▽ More
Mobile edge computing (MEC) provides computational services at the edge of networks by offloading tasks from user equipments (UEs). This letter employs an unmanned aerial vehicle (UAV) as the edge computing server to execute offloaded tasks from the ground UEs. We jointly optimize user association, UAV trajectory, and uploading power of each UE to maximize sum bits offloaded from all UEs to the UAV, subject to energy constraint of the UAV and quality of service (QoS) of each UE. To address the non-convex optimization problem, we first decompose it into three subproblems that are solved with integer programming and successive convex optimization methods respectively. Then, we tackle the overall problem by the multi-variable iterative optimization algorithm. Simulations show that the proposed algorithm can achieve a better performance than other baseline schemes.
△ Less
Submitted 24 October, 2019;
originally announced October 2019.
-
Distributed Dual Gradient Tracking for Resource Allocation in Unbalanced Networks
Authors:
Jiaqi Zhang,
Keyou You,
Kai Cai
Abstract:
This paper proposes a distributed dual gradient tracking algorithm (DDGT) to solve resource allocation problems over an unbalanced network, where each node in the network holds a private cost function and computes the optimal resource by interacting only with its neighboring nodes. Our key idea is the novel use of the distributed push-pull gradient algorithm (PPG) to solve the dual problem of the…
▽ More
This paper proposes a distributed dual gradient tracking algorithm (DDGT) to solve resource allocation problems over an unbalanced network, where each node in the network holds a private cost function and computes the optimal resource by interacting only with its neighboring nodes. Our key idea is the novel use of the distributed push-pull gradient algorithm (PPG) to solve the dual problem of the resource allocation problem. To study the convergence of the DDGT, we first establish the sublinear convergence rate of PPG for non-convex objective functions, which advances the existing results on PPG as they require the strong-convexity of objective functions. Then we show that the DDGT converges linearly for strongly convex and Lipschitz smooth cost functions, and sublinearly without the Lipschitz smoothness. Finally, experimental results suggest that DDGT outperforms existing algorithms.
△ Less
Submitted 23 August, 2020; v1 submitted 22 September, 2019;
originally announced September 2019.
-
Towards Assume-Guarantee Profiles for Autonomous Vehicles
Authors:
Tung Phan-Minh,
Karena X. Cai,
Richard M. Murray
Abstract:
Rules or specifications for autonomous vehicles are currently formulated on a case-by-case basis, and put together in a rather ad-hoc fashion. As a step towards eliminating this practice, we propose a systematic procedure for generating a set of supervisory specifications for self-driving cars that are 1) associated with a distributed assume-guarantee structure and 2) characterizable by the notion…
▽ More
Rules or specifications for autonomous vehicles are currently formulated on a case-by-case basis, and put together in a rather ad-hoc fashion. As a step towards eliminating this practice, we propose a systematic procedure for generating a set of supervisory specifications for self-driving cars that are 1) associated with a distributed assume-guarantee structure and 2) characterizable by the notion of consistency and completeness. Besides helping autonomous vehicles make better decisions on the road, the assume-guarantee contract structure also helps address the notion of blame when undesirable events occur. We give several game-theoretic examples to demonstrate applicability of our framework.
△ Less
Submitted 12 September, 2019; v1 submitted 11 September, 2019;
originally announced September 2019.
-
Design Automation and Optimization Methodology for Electric Multicopter UAVs
Authors:
Xunhua Dai,
Quan Quan,
Kai-Yuan Cai
Abstract:
The traditional multicopter design method usually requires a long iterative process to find the optimal design based on given performance requirements. The method is uneconomical and inefficient. In this paper, a practical method is proposed to automatically calculate the optimal multicopter design according to the given design requirements including flight time, altitude, payload capacity, and ma…
▽ More
The traditional multicopter design method usually requires a long iterative process to find the optimal design based on given performance requirements. The method is uneconomical and inefficient. In this paper, a practical method is proposed to automatically calculate the optimal multicopter design according to the given design requirements including flight time, altitude, payload capacity, and maneuverability. The proposed method contains two algorithms: an offline algorithm and an online algorithm. The offline algorithm finds the optimal components (propeller and electronic speed controller) for each motor to establish its component combination, and subsequently, these component combinations and their key performance parameters are stored in a combination database. The online algorithm obtains the multicopter design results that satisfy the given requirements by searching through the component combinations in the database and calculating the optimal parameters for the battery and airframe. Subsequently, these requirement-satisfied multicopter design results are obtained and sorted according to an objective function that contains evaluation indexes including size, weight, performance, and practicability. The proposed method has the advantages of high precision and quick calculating speed because parameter calibrations and time-consuming calculations are completed offline. Experiments are performed to validate the effectiveness and practicality of the proposed method. Comparisons with the brutal search method and other design methods demonstrate the efficiency of the proposed method.
△ Less
Submitted 17 August, 2019;
originally announced August 2019.
-
Secret Securing with Multiple Protections and Minimum Costs
Authors:
Shoma Matsui,
Kai Cai
Abstract:
In this paper we study a security problem of protecting secrets with multiple protections and minimum costs. The target system is modeled as a discrete-event system (DES) in which a few states are secrets, and there are multiple subsets of protectable events with different cost levels. We formulate the problem as to ensure that every string that reaches a secret state (from the initial state) cont…
▽ More
In this paper we study a security problem of protecting secrets with multiple protections and minimum costs. The target system is modeled as a discrete-event system (DES) in which a few states are secrets, and there are multiple subsets of protectable events with different cost levels. We formulate the problem as to ensure that every string that reaches a secret state (from the initial state) contains a specified number of protectable events and the highest cost level of these events is minimum. We first provide a necessary and sufficient condition under which this security problem is solvable, and then propose an algorithm to solve the problem based on the supervisory control theory of DES. The resulting solution is a protection policy which specifies at each state which events to protect and the highest cost level of protecting these events is minimum. Finally, we demonstrate the effectiveness of our solution with a network security example.
△ Less
Submitted 11 August, 2019;
originally announced August 2019.
-
Unified Simulation and Test Platform for Control Systems of Unmanned Vehicles
Authors:
Xunhua Dai,
Chenxu Ke,
Quan Quan,
Kai-Yuan Cai
Abstract:
Control systems on unmanned vehicles are safety-critical systems whose requirements on reliability and safety are ever-increasing. Currently, testing a complex autonomous control system is an expensive and time-consuming process, which requires massive repeated experimental testing during the whole development stage. This paper presents a unified simulation and test platform for vehicle autonomous…
▽ More
Control systems on unmanned vehicles are safety-critical systems whose requirements on reliability and safety are ever-increasing. Currently, testing a complex autonomous control system is an expensive and time-consuming process, which requires massive repeated experimental testing during the whole development stage. This paper presents a unified simulation and test platform for vehicle autonomous control systems aiming to significantly improve the development speed and safety level of unmanned vehicles. First, a unified modular modeling framework compatible with different types of vehicles is proposed with methods to ensure modeling credibility. Then, the simulation software system is developed by the model-based design framework, whose modular programming methods and automatic code generation functions ensure the efficiency, credibility, and standardization of the system development process. Finally, an FPGA-based real-time hardware-in-the-loop simulation platform is proposed to ensure the comprehensiveness and credibility of the simulation and test results. In the end, the proposed platform is applied to a multicopter control system. By comparing with experimental results, the accuracy and credibility of the simulation testing results are verified by using the simulation credibility assessment method proposed in our previous work. To verify the practicability of the proposed platform, several successful applications are presented for the multicopter rapid prototyping, estimation algorithm verification, autonomous flight testing, and automatic safety testing with automatic fault injection and result evaluation of unmanned vehicles.
△ Less
Submitted 7 August, 2019;
originally announced August 2019.
-
Simulation Credibility Assessment Methodology with FPGA-based Hardware-in-the-loop Platform
Authors:
Xunhua Dai,
Chenxu Ke,
Quan Quan,
Kai-Yuan Cai
Abstract:
Electronic control systems are becoming more and more complicated, which makes it difficult to test them sufficiently only through experiments. Simulation is an efficient way in the development and testing of complex electronic systems, but the simulation results are always doubtful by people due to the lack of credible simulation platforms and assessment methods. This paper proposes a credible si…
▽ More
Electronic control systems are becoming more and more complicated, which makes it difficult to test them sufficiently only through experiments. Simulation is an efficient way in the development and testing of complex electronic systems, but the simulation results are always doubtful by people due to the lack of credible simulation platforms and assessment methods. This paper proposes a credible simulation platform based on real-time FPGA-based hardware-in-the-loop (HIL) simulation, and then an assessment method is proposed to quantitatively assess its simulation credibility. By using the FPGA to simulate all sensor chips, the simulation platform can ensure that the tested electronic system maintains the same hardware and software operating environment in both simulations and experiments, which makes it possible to perform the same tests in the simulation platform and the real experiment to compare and analyze the simulation errors. Then, the testing methods and assessment indices are proposed to assess the simulation platform from various perspectives, such as performance, time-domain response, and frequency-domain response. These indices are all normalized to the same scale (from 0 to 1) and mapped to a uniform assessment criterion, which makes it convenient to compare and synthesize different assessment indices. Finally, an overall assessment index is proposed by combining all assessment indices obtained from different tests to assess the simulation credibility of the whole simulation platform. The simulation platform and the proposed assessment method are applied to a multicopter system, where the effectiveness and practicability are verified by simulations and experiments.
△ Less
Submitted 9 July, 2019;
originally announced July 2019.
-
Computation of the spectrum of $\text{dc}^2$-balanced codes
Authors:
Kees A. Schouhamer Immink,
Kui Cai
Abstract:
We apply the central limit theorem for deriving approximations to the auto-correlation function and power density function (spectrum) of second-order spectral null (dc2-balanced) codes.We show that the auto-correlation function of dc2-balanced codes can be accurately approximated by a cubic function. We show that the difference between the approximate and exact spectrum is less than 0.04 dB for co…
▽ More
We apply the central limit theorem for deriving approximations to the auto-correlation function and power density function (spectrum) of second-order spectral null (dc2-balanced) codes.We show that the auto-correlation function of dc2-balanced codes can be accurately approximated by a cubic function. We show that the difference between the approximate and exact spectrum is less than 0.04 dB for codeword length n = 256.
△ Less
Submitted 21 December, 2018;
originally announced December 2018.
-
An Unsupervised Learning Approach for Data Detection in the Presence of Channel Mismatch and Additive Noise
Authors:
Kees A. Schouhamer Immink,
Kui Cai
Abstract:
We investigate machine learning based on clustering techniques that are suitable for the detection of encoded strings of q-ary symbols transmitted over a noisy channel with partially unknown characteristics. We consider the detection of the q-ary data as a classification problem, where objects are recognized from a corrupted vector, which is obtained by an unknown corruption process. We first eval…
▽ More
We investigate machine learning based on clustering techniques that are suitable for the detection of encoded strings of q-ary symbols transmitted over a noisy channel with partially unknown characteristics. We consider the detection of the q-ary data as a classification problem, where objects are recognized from a corrupted vector, which is obtained by an unknown corruption process. We first evaluate the error performance of k- means clustering technique without constrained coding. Secondly, we apply constrained codes that create an environment that improves the detection reliability and it allows a wider range of channel uncertainties.
△ Less
Submitted 21 December, 2018;
originally announced December 2018.
-
Properties and constructions of constrained codes for DNA-based data storage
Authors:
Kees A. Schouhamer Immink,
Kui Cai
Abstract:
We describe properties and constructions of constraint-based codes for DNA-based data storage which account for the maximum repetition length and AT/GC balance. We present algorithms for computing the number of sequences with maximum repetition length and AT/GC balance constraint. We describe routines for translating binary runlength limited and/or balanced strings into DNA strands, and compute th…
▽ More
We describe properties and constructions of constraint-based codes for DNA-based data storage which account for the maximum repetition length and AT/GC balance. We present algorithms for computing the number of sequences with maximum repetition length and AT/GC balance constraint. We describe routines for translating binary runlength limited and/or balanced strings into DNA strands, and compute the efficiency of such routines. We show that the implementation of AT/GC-balanced codes is straightforward accomplished with binary balanced codes. We present codes that account for both the maximum repetition length and AT/GC balance. We compute the redundancy difference between the binary and a fully fledged quaternary approach.
△ Less
Submitted 14 December, 2018;
originally announced December 2018.
-
An Analytical Design Optimization Method for Electric Propulsion Systems of Multicopter UAVs with Desired Hovering Endurance
Authors:
Xunhua Dai,
Quan Quan,
Jinrui Ren,
Kai-Yuan Cai
Abstract:
Multicopters are becoming increasingly important in both civil and military fields. Currently, most multicopter propulsion systems are designed by experience and trial-and-error experiments, which are costly and ineffective. This paper proposes a simple and practical method to help designers find the optimal propulsion system according to the given design requirements. First, the modeling methods…
▽ More
Multicopters are becoming increasingly important in both civil and military fields. Currently, most multicopter propulsion systems are designed by experience and trial-and-error experiments, which are costly and ineffective. This paper proposes a simple and practical method to help designers find the optimal propulsion system according to the given design requirements. First, the modeling methods for four basic components of the propulsion system including propellers, motors, electric speed controls, and batteries are studied respectively. Secondly, the whole optimization design problem is simplified and decoupled into several sub-problems. By solving these sub-problems, the optimal parameters of each component can be obtained respectively. Finally, based on the obtained optimal component parameters, the optimal product of each component can be quickly located and determined from the corresponding database. Experiments and statistical analyses demonstrate the effectiveness of the proposed method.
△ Less
Submitted 17 September, 2018; v1 submitted 1 September, 2018;
originally announced September 2018.
-
Distributed Robust Output Regulation of Heterogeneous Uncertain Linear Agents by Adaptive Internal Model Principle
Authors:
Satoshi Kawamura,
Kai Cai,
Masako Kishida
Abstract:
We study a multi-agent output regulation problem, where not all agents have access to the exosystem's dynamics. We propose a fully distributed controller that solves the problem for linear, heterogeneous, and uncertain agent dynamics as well as time-varying directed networks. The distributed controller consists of two parts: (1) an exosystem generator that locally estimates the exosystem dynamics,…
▽ More
We study a multi-agent output regulation problem, where not all agents have access to the exosystem's dynamics. We propose a fully distributed controller that solves the problem for linear, heterogeneous, and uncertain agent dynamics as well as time-varying directed networks. The distributed controller consists of two parts: (1) an exosystem generator that locally estimates the exosystem dynamics, and (2) a dynamic compensator that, by locally approaching the internal model of the exosystem, achieves perfect output regulation. Moreover, we extend this distributed controller to solve an output synchronization problem where not all agents initially have the same internal model dynamics. Our approach leverages methods from internal model based controller synthesis and multi-agent consensus over time-varying directed networks; the derived result is a generalization of the (centralized) internal model principle to the distributed, networked setting.
△ Less
Submitted 8 December, 2019; v1 submitted 1 March, 2018;
originally announced March 2018.
-
Terminal Iterative Learning Control for Autonomous Aerial Refueling under Aerodynamic Disturbances
Authors:
Xunhua Dai,
Quan Quan,
Jinrui Ren,
Zhiyu Xi,
Kai-Yuan Cai
Abstract:
This paper studies the model of the probe-drogue aerial refueling system under aerodynamic disturbances, and proposes a docking control method based on terminal iterative learning control to compensate for the docking errors caused by aerodynamic disturbances. The designed controller works as an additional unit for the trajectory generation function of the original autopilot system. Simulations ba…
▽ More
This paper studies the model of the probe-drogue aerial refueling system under aerodynamic disturbances, and proposes a docking control method based on terminal iterative learning control to compensate for the docking errors caused by aerodynamic disturbances. The designed controller works as an additional unit for the trajectory generation function of the original autopilot system. Simulations based on our previously published simulation environment show that the proposed control method has a fast learning speed to achieve a successful docking control under aerodynamic disturbances including the bow wave effect.
△ Less
Submitted 1 March, 2018;
originally announced March 2018.
-
Supervisor Localization of Discrete-Event Systems with Infinite Behavior
Authors:
Renyuan Zhang,
Kai Cai
Abstract:
Recently we developed supervisor localization, a top-down approach to distributed control of discrete-event systems (DES) with finite behavior. Its essence is the allocation of monolithic (global) control action among the local control strategies of individual agents. In this report, we extend supervisor localization to study the distributed control of DES with infinite behavior. Specifically, we…
▽ More
Recently we developed supervisor localization, a top-down approach to distributed control of discrete-event systems (DES) with finite behavior. Its essence is the allocation of monolithic (global) control action among the local control strategies of individual agents. In this report, we extend supervisor localization to study the distributed control of DES with infinite behavior. Specifically, we first employ Thistle and Wonham's supervisory control theory for DES with infinite behavior to compute a safety supervisor (for safety specifications) and a liveness supervisor (for liveness specifications), and then design a suitable localization procedure to decompose the safety supervisor into a set of safety local controllers, one for each controllable event, and decompose the liveness supervisor into a set of liveness local controllers, two for each controllable event. The localization procedure for decomposing the liveness supervisor is novel; in particular, a local controller is responsible for disabling the corresponding controllable event on only part of the states of the liveness supervisor, and consequently, the derived local controller in general has states number no more than that computed by considering the disablement on all the states. Moreover, we prove that the derived local controllers achieve the same controlled behavior with the safety and liveness supervisors. We finally illustrate the result by a Small Factory example.
△ Less
Submitted 24 October, 2017;
originally announced October 2017.
-
Supervisor Localization for Large-Scale Discrete-Event Systems under Partial Observation
Authors:
Renyuan Zhang,
Kai Cai
Abstract:
Recently we developed partial-observation supervisor localization, a top-down approach to distributed control of discrete-event systems (DES) under partial observation. Its essence is the decomposition of the partial-observation monolithic supervisor into partial-observation local controllers for individual controllable events. In this paper we extend the partial-observation supervisor localizatio…
▽ More
Recently we developed partial-observation supervisor localization, a top-down approach to distributed control of discrete-event systems (DES) under partial observation. Its essence is the decomposition of the partial-observation monolithic supervisor into partial-observation local controllers for individual controllable events. In this paper we extend the partial-observation supervisor localization to large-scale DES, for which the monolithic supervisor may be incomputable. Specifically, we first employ an efficient heterarchical supervisor synthesis procedure to compute a heterarchical array of partial-observation decentralized supervisors and partial-observation coordinators. Then we localize each of these supervisors/coordinators into partial-observation local controllers. This procedure suggests a systematic approach to the distributed control of large-scale DES under partial observation. The results are illustrated by a system of automatic guided vehicles (AGV) serving a manufacturing workcell.
△ Less
Submitted 26 August, 2017;
originally announced August 2017.
-
Top-Down Synthesis of Multi-Agent Formation Control: An Eigenstructure Assignment based Approach
Authors:
Takatoshi Motoyama,
Kai Cai
Abstract:
We propose a top-down approach for formation control of heterogeneous multi-agent systems, based on the method of eigenstructure assignment. Given the problem of achieving scalable formations on the plane, our approach globally computes a state feedback control that assigns desired closed-loop eigenvalues/eigenvectors. We characterize the relation between the eigenvalues/eigenvectors and the resul…
▽ More
We propose a top-down approach for formation control of heterogeneous multi-agent systems, based on the method of eigenstructure assignment. Given the problem of achieving scalable formations on the plane, our approach globally computes a state feedback control that assigns desired closed-loop eigenvalues/eigenvectors. We characterize the relation between the eigenvalues/eigenvectors and the resulting inter-agent communication topology, and design special (sparse) topologies such that the synthesized control may be implemented locally by the individual agents. Moreover, we present a hierarchical synthesis procedure that significantly improves computational efficiency. Finally, we extend the proposed approach to achieve rigid formation and circular motion, and illustrate these results by simulation examples.
△ Less
Submitted 16 August, 2017;
originally announced August 2017.
-
On Scalable Supervisory Control of Multi-Agent Discrete-Event Systems
Authors:
Yingying Liu,
Kai Cai,
Zhiwu Li
Abstract:
In this paper we study multi-agent discrete-event systems where the agents can be divided into several groups, and within each group the agents have similar or identical state transition structures. We employ a relabeling map to generate a "template structure" for each group, and synthesize a scalable supervisor whose state size and computational process are independent of the number of agents. Th…
▽ More
In this paper we study multi-agent discrete-event systems where the agents can be divided into several groups, and within each group the agents have similar or identical state transition structures. We employ a relabeling map to generate a "template structure" for each group, and synthesize a scalable supervisor whose state size and computational process are independent of the number of agents. This scalability allows the supervisor to remain invariant (no recomputation or reconfiguration needed) if and when there are agents removed due to failure or added for increasing productivity. The constant computational effort for synthesizing the scalable supervisor also makes our method promising for handling large-scale multi-agent systems. Moreover, based on the scalable supervisor we design scalable local controllers, one for each component agent, to establish a purely distributed control architecture. Three examples are provided to illustrate our proposed scalable supervisory synthesis and the resulting scalable supervisors as well as local controllers.
△ Less
Submitted 31 December, 2018; v1 submitted 28 April, 2017;
originally announced April 2017.
-
Failsafe Mechanism Design of Multicopters Based on Supervisory Control Theory
Authors:
Quan Quan,
Zhiyao Zhao,
Liyong Lin,
Peng Wang,
Walter Murray Wonham,
Kai-Yuan Cai
Abstract:
In order to handle undesirable failures of a multicopter which occur in either the pre-flight process or the in-flight process, a failsafe mechanism design method based on supervisory control theory is proposed for the semi-autonomous control mode. Failsafe mechanism is a control logic that guides what subsequent actions the multicopter should take, by taking account of real-time information from…
▽ More
In order to handle undesirable failures of a multicopter which occur in either the pre-flight process or the in-flight process, a failsafe mechanism design method based on supervisory control theory is proposed for the semi-autonomous control mode. Failsafe mechanism is a control logic that guides what subsequent actions the multicopter should take, by taking account of real-time information from guidance, attitude control, diagnosis, and other low-level subsystems. In order to design a failsafe mechanism for multicopters, safety issues of multicopters are introduced. Then, user requirements including functional requirements and safety requirements are textually described, where function requirements determine a general multicopter plant, and safety requirements cover the failsafe measures dealing with the presented safety issues. In order to model the user requirements by discrete-event systems, several multicopter modes and events are defined. On this basis, the multicopter plant and control specifications are modeled by automata. Then, a supervisor is synthesized by monolithic supervisory control theory. In addition, we present three examples to demonstrate the potential blocking phenomenon due to inappropriate design of control specifications. Also, we discuss the meaning of correctness and the properties of the obtained supervisor. This makes the failsafe mechanism convincingly correct and effective. Finally, based on the obtained supervisory controller generated by TCT software, an implementation method suitable for multicopters is presented, in which the supervisory controller is transformed into decision-making codes.
△ Less
Submitted 27 April, 2017;
originally announced April 2017.
-
Characterizations and Effective Computation of Supremal Relatively Observable Sublanguages
Authors:
Kai Cai,
Renyuan Zhang,
W. M. Wonham
Abstract:
Recently we proposed relative observability for supervisory control of discrete-event systems under partial observation. Relative observability is closed under set unions and hence there exists the supremal relatively observable sublanguage of a given language. In this paper we present a new characterization of relative observability, based on which an operator on languages is proposed whose large…
▽ More
Recently we proposed relative observability for supervisory control of discrete-event systems under partial observation. Relative observability is closed under set unions and hence there exists the supremal relatively observable sublanguage of a given language. In this paper we present a new characterization of relative observability, based on which an operator on languages is proposed whose largest fixpoint is the supremal relatively observable sublanguage. Iteratively applying this operator yields a monotone sequence of languages; exploiting the linguistic concept of support based on Nerode equivalence, we prove for regular languages that the sequence converges finitely to the supremal relatively observable sublanguage, and the operator is effectively computable. Moreover, for the purpose of control, we propose a second operator that in the regular case computes the supremal relatively observable and controllable sublanguage. The computational effectiveness of the operator is demonstrated on a case study.
△ Less
Submitted 7 September, 2016;
originally announced September 2016.
-
Representing Extended Finite State Machines for SDL by A Novel Control Model of Discrete Event Systems
Authors:
Peng Wang,
Kai-Yuan Cai
Abstract:
This paper discusses EFSM for SDL and transforms EFSM into a novel control model of discrete event systems. We firstly propose a control model of discrete event systems, where the event set is made up of several conflicting pairs and control is implemented to select one event of the pair. Then we transform EFSM for SDL to the control model to clarify the control mechanism functioning in SDL flow g…
▽ More
This paper discusses EFSM for SDL and transforms EFSM into a novel control model of discrete event systems. We firstly propose a control model of discrete event systems, where the event set is made up of several conflicting pairs and control is implemented to select one event of the pair. Then we transform EFSM for SDL to the control model to clarify the control mechanism functioning in SDL flow graphs. This work views the EFSM for SDL in the perspective of supervisory control theory, and this contributes to the field of software cybernetics, which explores the theoretically justified interplay of software and the control.
△ Less
Submitted 24 June, 2016;
originally announced June 2016.
-
On Distributed Internal Model Principle for Output Regulation over Time-Varying Networks of Linear Heterogeneous Agents
Authors:
Kai Cai
Abstract:
We study a multi-agent output regulation problem, where not all agents have access to the exosystem's dynamics. We propose a distributed controller that solves the problem for linear, heterogeneous, and uncertain agent dynamics as well as time-varying directed networks. The distributed controller consists of two parts: (1) an exosystem generator that creates a local copy of the exosystem dynamics…
▽ More
We study a multi-agent output regulation problem, where not all agents have access to the exosystem's dynamics. We propose a distributed controller that solves the problem for linear, heterogeneous, and uncertain agent dynamics as well as time-varying directed networks. The distributed controller consists of two parts: (1) an exosystem generator that creates a local copy of the exosystem dynamics by using consensus protocols, and (2) a dynamic compensator that uses (again) consensus to approach the internal model of the exosystem and thereby achieves perfect output regulation. Our approach leverages methods from internal model based controller synthesis, multi-agent consensus over directed networks, and stability of time-varying linear systems; the derived result is an adaptation of the (centralized) internal model principle to the distributed, networked setting.
△ Less
Submitted 23 June, 2016; v1 submitted 19 April, 2016;
originally announced April 2016.
-
Relative Coobservability in Decentralized Supervisory Control of Discrete-Event Systems
Authors:
Kai Cai,
Renyuan Zhang,
W. M. Wonham
Abstract:
We study the new concept of relative coobservability in decentralized supervisory control of discrete-event systems under partial observation. This extends our previous work on relative observability from a centralized setup to a decentralized one. A fundamental concept in decentralized supervisory control is coobservability (and its several variations); this property is not, however, closed under…
▽ More
We study the new concept of relative coobservability in decentralized supervisory control of discrete-event systems under partial observation. This extends our previous work on relative observability from a centralized setup to a decentralized one. A fundamental concept in decentralized supervisory control is coobservability (and its several variations); this property is not, however, closed under set union, and hence there generally does not exist the supremal element. Our proposed relative coobservability, although stronger than coobservability, is algebraically well-behaved, and the supremal relatively coobservable sublanguage of a given language exists. We present an algorithm to compute this supremal sublanguage. Moreover, relative coobservability is weaker than conormality, which is also closed under set union; unlike conormality, relative coobservability imposes no constraint on disabling unobservable controllable events.
△ Less
Submitted 13 April, 2016; v1 submitted 12 April, 2016;
originally announced April 2016.
-
Supervisor Localization of Timed Discrete-Event Systems under Partial Observation and Communication Delay
Authors:
Renyuan Zhang,
Kai Cai
Abstract:
We study supervisor localization for timed discrete-event systems under partial observation and communication delay in the Brandin-Wonham framework. First, we employ timed relative observability to synthesize a partial-observation monolithic supervisor; the control actions of this supervisor include not only disabling action of prohibitible events (as that of controllable events in the untimed cas…
▽ More
We study supervisor localization for timed discrete-event systems under partial observation and communication delay in the Brandin-Wonham framework. First, we employ timed relative observability to synthesize a partial-observation monolithic supervisor; the control actions of this supervisor include not only disabling action of prohibitible events (as that of controllable events in the untimed case) but also "clock-preempting" action of forcible events. Accordingly we decompose the supervisor into a set of partial-observation local controllers one for each prohibitible event, as well as a set of partial-observation local preemptors one for each forcible event. We prove that these local controllers and preemptors collectively achieve the same controlled behavior as the partial-observation monolithic supervisor does. Moreover, we propose channel models for inter-agent event communication and impose bounded and unbounded delay as temporal specifications. In this formulation, there exist multiple distinct observable event sets; thus we employ timed relative coobservability to synthesize partial-observation decentralized supervisors, and then localize these supervisors into local controllers and preemptors. The above results are illustrated by a timed workcell example.
△ Less
Submitted 14 March, 2019; v1 submitted 7 March, 2016;
originally announced March 2016.
-
Supervisor Localization of Discrete-Event Systems under Partial Observation
Authors:
Renyuan Zhang,
Kai Cai,
W. M. Wonham
Abstract:
Recently we developed supervisor localization, a top-down approach to distributed control of discrete-event systems. Its essence is the allocation of monolithic (global) control action among the local control strategies of individual agents. In this paper, we extend supervisor localization by considering partial observation; namely not all events are observable. Specifically, we employ the recentl…
▽ More
Recently we developed supervisor localization, a top-down approach to distributed control of discrete-event systems. Its essence is the allocation of monolithic (global) control action among the local control strategies of individual agents. In this paper, we extend supervisor localization by considering partial observation; namely not all events are observable. Specifically, we employ the recently proposed concept of relative observability to compute a partial-observation monolithic supervisor, and then design a suitable localization procedure to decompose the supervisor into a set of local controllers. In the resulting local controllers, only observable events can cause state change. Further, to deal with large-scale systems, we combine the partial-observation supervisor localization with an efficient architectural synthesis approach: first compute a heterarchical array of partial-observation decentralized supervisors and coordinators, and then localize each of these supervisors/coordinators into local controllers.
△ Less
Submitted 18 June, 2018; v1 submitted 17 September, 2015;
originally announced September 2015.
-
Controllability Analysis for Multirotor Helicopter Rotor Degradation and Failure
Authors:
Guang-Xun Du,
Quan Quan,
Binxian Yang,
Kai-Yuan Cai
Abstract:
This paper considers the controllability analysis problem for a class of multirotor systems subject to rotor failure/wear. It is shown that classical controllability theories of linear systems are not sufficient to test the controllability of the considered multirotors. Owing to this, an easy-to-use measurement index is introduced to assess the available control authority. Based on it, a new neces…
▽ More
This paper considers the controllability analysis problem for a class of multirotor systems subject to rotor failure/wear. It is shown that classical controllability theories of linear systems are not sufficient to test the controllability of the considered multirotors. Owing to this, an easy-to-use measurement index is introduced to assess the available control authority. Based on it, a new necessary and sufficient condition for the controllability of multirotors is derived. Furthermore, a controllability test procedure is approached. The proposed controllability test method is applied to a class of hexacopters with different rotor configurations and different rotor efficiency parameters to show its effectiveness. The analysis results show that hexacopters with different rotor configurations have different fault-tolerant capabilities. It is therefore necessary to test the controllability of the multirotors before any fault-tolerant control strategies are employed.
△ Less
Submitted 3 February, 2015; v1 submitted 24 March, 2014;
originally announced March 2014.