-
Stabilization Techniques for Iterative Algorithms in Compressed Sensing
Authors:
Carmen Sippel,
Robert F. H. Fischer
Abstract:
Algorithms for signal recovery in compressed sensing (CS) are often improved by stabilization techniques, such as damping, or the less widely known so-called fractional approach, which is based on the expectation propagation (EP) framework. These procedures are used to increase the steady-state performance, i.e., the performance after convergence, or assure convergence, when this is otherwise not…
▽ More
Algorithms for signal recovery in compressed sensing (CS) are often improved by stabilization techniques, such as damping, or the less widely known so-called fractional approach, which is based on the expectation propagation (EP) framework. These procedures are used to increase the steady-state performance, i.e., the performance after convergence, or assure convergence, when this is otherwise not possible. In this paper, we give a thorough introduction and interpretation of several stabilization approaches. The effects of the stabilization procedures are examined and compared via numerical simulations and we show that a combination of several procedures can be beneficial for the performance of the algorithm.
△ Less
Submitted 30 September, 2021;
originally announced September 2021.
-
Semantic Security for Indoor THz-Wireless Communication
Authors:
Rebekka Schulz,
Onur Günlü,
Robert Elschner,
Rafael F. Schaefer,
Carsten Schmidt-Langhorst,
Colja Schubert,
Robert F. H. Fischer
Abstract:
Physical-layer security (PLS) for industrial indoor terahertz (THz) wireless communication applications is considered. We use a similar model as being employed for additive white Gaussian noise (AWGN) wireless communication channels. A cell communication and a directed communication scenario are analyzed to illustrate the achievable semantic security guarantees for a wiretap channel with finite-bl…
▽ More
Physical-layer security (PLS) for industrial indoor terahertz (THz) wireless communication applications is considered. We use a similar model as being employed for additive white Gaussian noise (AWGN) wireless communication channels. A cell communication and a directed communication scenario are analyzed to illustrate the achievable semantic security guarantees for a wiretap channel with finite-blocklength THz-wireless communication links. We show that weakly directed transmitter (Alice) antennas, which allow cell-type communication with multiple legitimate receivers (Bobs) without adaptation of the alignment, result in large insecure regions. In the directed communication scenario, the resulting insecure regions are shown to cover a large volume of the indoor environment only if the distance between Alice and Bob is large. Thus, our results for the two selected scenarios reveal that there is a stringent trade-off between the targeted semantic security level and the number of reliably and securely accessible legitimate receivers. Furthermore, the effects of secrecy code parameters and antenna properties on the achievable semantic security levels are illustrated to show directions for possible improvements to guarantee practically-acceptable security levels with PLS methods for industrial indoor THz-wireless communication applications.
△ Less
Submitted 19 July, 2021; v1 submitted 20 May, 2021;
originally announced May 2021.
-
On Discrete-Time/Frequency-Periodic End-to-End Fiber-Optical Channel Models
Authors:
Felix Frey,
Johannes K. Fischer,
Robert F. H. Fischer
Abstract:
A discrete-time end-to-end fiber-optical channel model is derived based on the first-order perturbation approach. The model relates the discrete-time input symbol sequences of co-propagating wavelength channels to the received symbol sequence after matched filtering and T-spaced sampling. To this end, the interference from both self- and cross-channel nonlinear interactions of the continuous-time…
▽ More
A discrete-time end-to-end fiber-optical channel model is derived based on the first-order perturbation approach. The model relates the discrete-time input symbol sequences of co-propagating wavelength channels to the received symbol sequence after matched filtering and T-spaced sampling. To this end, the interference from both self- and cross-channel nonlinear interactions of the continuous-time optical signal is represented by a single discrete-time perturbative term. Two equivalent discrete-time models can be formulated---one in the time-domain, the other in the 1/T-periodic continuous-frequency domain. The time-domain formulation coincides with the well-known pulse-collision picture. The novel frequency-domain picture incorporates the sampling operation via an aliased and periodic kernel description. This gives rise to an alternative perspective on the end-to-end input/output relation between the spectrum of the discrete-time transmit symbol sequence and the spectrum of the receive symbol sequence. Both views can be extended from a regular, i.e., solely additive model, to a combined regular-logarithmic model to take the multiplicative nature of certain distortions into consideration. An alternative formulation of the Gaussian Noise model is provided to take the aliasing of frequency components correctly into account. A novel algorithmic implementation of the discrete and periodic frequency-domain model is presented. The derived end-to-end model requires only a single computational step and shows good agreement in the mean-squared error sense compared to the oversampled and inherently sequential split-step Fourier method.
△ Less
Submitted 17 March, 2020; v1 submitted 13 July, 2019;
originally announced July 2019.