-
Cognitive-Radio Functionality: A Novel Configuration for STAR-RIS assisted RSMA Networks
Authors:
Saeed Ibrahim,
Yue Xiao,
Dimitrios Tyrovolas,
Sotiris A. Tegos,
Panagiotis D. Diamantoulakis,
Zheng Ma,
George K. Karagiannidis,
Pinghzi Fan
Abstract:
Cognitive radio rate-splitting multiple access (CR-RSMA) has emerged as a promising multiple access framework that can efficiently manage interference and adapt dynamically to heterogeneous quality-of-service (QoS) requirements. To effectively support such demanding access schemes, programmable wireless environments have attracted considerable attention, especially through simultaneously transmitt…
▽ More
Cognitive radio rate-splitting multiple access (CR-RSMA) has emerged as a promising multiple access framework that can efficiently manage interference and adapt dynamically to heterogeneous quality-of-service (QoS) requirements. To effectively support such demanding access schemes, programmable wireless environments have attracted considerable attention, especially through simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs), which can enable full-space control of signal propagation in asymmetric user deployments. In this paper, we propose the cognitive radio (CR) functionality for STAR-RIS-assisted CR-RSMA systems, leveraging the unique capability of the STAR-RIS to combine element and power splitting for adaptive control of transmission and reflection in CR scenarios. Specifically, the proposed CR functionality partitions the STAR-RIS into two regions independently controlling the transmission and reflection of signals, simultaneously ensuring the required QoS for the primary user and enhancing the performance of the secondary user. To accurately characterize the system performance, we derive analytical expressions for the ergodic rate of the secondary user and the outage rate of the primary user under Nakagami-m fading. Finally, simulation results show that the proposed approach effectively manages interference, guarantees the QoS of the primary user, and significantly improves the throughput of the secondary user, highlighting STAR-RIS as an efficient solution for CR-RSMA-based services.
△ Less
Submitted 30 May, 2025;
originally announced May 2025.
-
Comprehensive Overview of Reward Engineering and Shaping in Advancing Reinforcement Learning Applications
Authors:
Sinan Ibrahim,
Mostafa Mostafa,
Ali Jnadi,
Hadi Salloum,
Pavel Osinenko
Abstract:
The aim of Reinforcement Learning (RL) in real-world applications is to create systems capable of making autonomous decisions by learning from their environment through trial and error. This paper emphasizes the importance of reward engineering and reward shaping in enhancing the efficiency and effectiveness of reinforcement learning algorithms. Reward engineering involves designing reward functio…
▽ More
The aim of Reinforcement Learning (RL) in real-world applications is to create systems capable of making autonomous decisions by learning from their environment through trial and error. This paper emphasizes the importance of reward engineering and reward shaping in enhancing the efficiency and effectiveness of reinforcement learning algorithms. Reward engineering involves designing reward functions that accurately reflect the desired outcomes, while reward shaping provides additional feedback to guide the learning process, accelerating convergence to optimal policies. Despite significant advancements in reinforcement learning, several limitations persist. One key challenge is the sparse and delayed nature of rewards in many real-world scenarios, which can hinder learning progress. Additionally, the complexity of accurately modeling real-world environments and the computational demands of reinforcement learning algorithms remain substantial obstacles. On the other hand, recent advancements in deep learning and neural networks have significantly improved the capability of reinforcement learning systems to handle high-dimensional state and action spaces, enabling their application to complex tasks such as robotics, autonomous driving, and game playing. This paper provides a comprehensive review of the current state of reinforcement learning, focusing on the methodologies and techniques used in reward engineering and reward shaping. It critically analyzes the limitations and recent advancements in the field, offering insights into future research directions and potential applications in various domains.
△ Less
Submitted 27 December, 2024; v1 submitted 22 July, 2024;
originally announced August 2024.
-
Learning From Crowdsourced Noisy Labels: A Signal Processing Perspective
Authors:
Shahana Ibrahim,
Panagiotis A. Traganitis,
Xiao Fu,
Georgios B. Giannakis
Abstract:
One of the primary catalysts fueling advances in artificial intelligence (AI) and machine learning (ML) is the availability of massive, curated datasets. A commonly used technique to curate such massive datasets is crowdsourcing, where data are dispatched to multiple annotators. The annotator-produced labels are then fused to serve downstream learning and inference tasks. This annotation process o…
▽ More
One of the primary catalysts fueling advances in artificial intelligence (AI) and machine learning (ML) is the availability of massive, curated datasets. A commonly used technique to curate such massive datasets is crowdsourcing, where data are dispatched to multiple annotators. The annotator-produced labels are then fused to serve downstream learning and inference tasks. This annotation process often creates noisy labels due to various reasons, such as the limited expertise, or unreliability of annotators, among others. Therefore, a core objective in crowdsourcing is to develop methods that effectively mitigate the negative impact of such label noise on learning tasks. This feature article introduces advances in learning from noisy crowdsourced labels. The focus is on key crowdsourcing models and their methodological treatments, from classical statistical models to recent deep learning-based approaches, emphasizing analytical insights and algorithmic developments. In particular, this article reviews the connections between signal processing (SP) theory and methods, such as identifiability of tensor and nonnegative matrix factorization, and novel, principled solutions of longstanding challenges in crowdsourcing -- showing how SP perspectives drive the advancements of this field. Furthermore, this article touches upon emerging topics that are critical for developing cutting-edge AI/ML systems, such as crowdsourcing in reinforcement learning with human feedback (RLHF) and direct preference optimization (DPO) that are key techniques for fine-tuning large language models (LLMs).
△ Less
Submitted 2 July, 2025; v1 submitted 9 July, 2024;
originally announced July 2024.
-
wmh_seg: Transformer based U-Net for Robust and Automatic White Matter Hyperintensity Segmentation across 1.5T, 3T and 7T
Authors:
Jinghang Li,
Tales Santini,
Yuanzhe Huang,
Joseph M. Mettenburg,
Tamer S. Ibrahim,
Howard J. Aizenstein,
Minjie Wu
Abstract:
White matter hyperintensity (WMH) remains the top imaging biomarker for neurodegenerative diseases. Robust and accurate segmentation of WMH holds paramount significance for neuroimaging studies. The growing shift from 3T to 7T MRI necessitates robust tools for harmonized segmentation across field strengths and artifacts. Recent deep learning models exhibit promise in WMH segmentation but still fac…
▽ More
White matter hyperintensity (WMH) remains the top imaging biomarker for neurodegenerative diseases. Robust and accurate segmentation of WMH holds paramount significance for neuroimaging studies. The growing shift from 3T to 7T MRI necessitates robust tools for harmonized segmentation across field strengths and artifacts. Recent deep learning models exhibit promise in WMH segmentation but still face challenges, including diverse training data representation and limited analysis of MRI artifacts' impact. To address these, we introduce wmh_seg, a novel deep learning model leveraging a transformer-based encoder from SegFormer. wmh_seg is trained on an unmatched dataset, including 1.5T, 3T, and 7T FLAIR images from various sources, alongside with artificially added MR artifacts. Our approach bridges gaps in training diversity and artifact analysis. Our model demonstrated stable performance across magnetic field strengths, scanner manufacturers, and common MR imaging artifacts. Despite the unique inhomogeneity artifacts on ultra-high field MR images, our model still offers robust and stable segmentation on 7T FLAIR images. Our model, to date, is the first that offers quality white matter lesion segmentation on 7T FLAIR images.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
Efficient Resource Allocation and User Association in NOMA-Enabled Vehicular-Aided HetNets with High Altitude Platforms
Authors:
Ali Nauman,
Mashael Maashi,
Hend K. Alkahtani,
Fahd N. Al-Wesabi,
Nojood O Aljehane,
Mohammed Assiri,
Sara Saadeldeen Ibrahim,
Wali Ullah Khan
Abstract:
The increasing demand for massive connectivity and high data rates has made the efficient use of existing spectrum resources an increasingly challenging problem. Non-orthogonal multiple access (NOMA) is a potential solution for future heterogeneous networks (HetNets) due to its high capacity and spectrum efficiency. In this study, we analyze an uplink NOMA-enabled vehicular-aided HetNet, where mul…
▽ More
The increasing demand for massive connectivity and high data rates has made the efficient use of existing spectrum resources an increasingly challenging problem. Non-orthogonal multiple access (NOMA) is a potential solution for future heterogeneous networks (HetNets) due to its high capacity and spectrum efficiency. In this study, we analyze an uplink NOMA-enabled vehicular-aided HetNet, where multiple vehicular user equipment (VUEs) share the access link spectrum, and a high-altitude platform (HAP) communicates with roadside units (RSUs) through a backhaul communication link. We propose an improved algorithm for user association that selects VUEs for HAPs based on channel coefficient ratios and terrestrial VUEs based on a caching-state backhaul communication link. The joint optimization problems aim to maximize a utility function that considers VUE transmission rates and cross-tier interference while meeting the constraints of backhaul transmission rates and QoS requirements of each VUE. The joint resource allocation optimization problem consists of three sub-problems: bandwidth allocation, user association, and transmission power allocation. We derive a closed-form solution for bandwidth allocation and solve the transmission power allocation sub-problem iteratively using Taylor expansion to transform a non-convex term into a convex one. Our proposed three-stage iterative algorithm for resource allocation integrates all three sub-problems and is shown to be effective through simulation results. Specifically, the results demonstrate that our solution achieves performance improvements over existing approaches.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Deep Learning From Crowdsourced Labels: Coupled Cross-entropy Minimization, Identifiability, and Regularization
Authors:
Shahana Ibrahim,
Tri Nguyen,
Xiao Fu
Abstract:
Using noisy crowdsourced labels from multiple annotators, a deep learning-based end-to-end (E2E) system aims to learn the label correction mechanism and the neural classifier simultaneously. To this end, many E2E systems concatenate the neural classifier with multiple annotator-specific ``label confusion'' layers and co-train the two parts in a parameter-coupled manner. The formulated coupled cros…
▽ More
Using noisy crowdsourced labels from multiple annotators, a deep learning-based end-to-end (E2E) system aims to learn the label correction mechanism and the neural classifier simultaneously. To this end, many E2E systems concatenate the neural classifier with multiple annotator-specific ``label confusion'' layers and co-train the two parts in a parameter-coupled manner. The formulated coupled cross-entropy minimization (CCEM)-type criteria are intuitive and work well in practice. Nonetheless, theoretical understanding of the CCEM criterion has been limited. The contribution of this work is twofold: First, performance guarantees of the CCEM criterion are presented. Our analysis reveals for the first time that the CCEM can indeed correctly identify the annotators' confusion characteristics and the desired ``ground-truth'' neural classifier under realistic conditions, e.g., when only incomplete annotator labeling and finite samples are available. Second, based on the insights learned from our analysis, two regularized variants of the CCEM are proposed. The regularization terms provably enhance the identifiability of the target model parameters in various more challenging cases. A series of synthetic and real data experiments are presented to showcase the effectiveness of our approach.
△ Less
Submitted 5 June, 2023;
originally announced June 2023.
-
Under-Counted Tensor Completion with Neural Incorporation of Attributes
Authors:
Shahana Ibrahim,
Xiao Fu,
Rebecca Hutchinson,
Eugene Seo
Abstract:
Systematic under-counting effects are observed in data collected across many disciplines, e.g., epidemiology and ecology. Under-counted tensor completion (UC-TC) is well-motivated for many data analytics tasks, e.g., inferring the case numbers of infectious diseases at unobserved locations from under-counted case numbers in neighboring regions. However, existing methods for similar problems often…
▽ More
Systematic under-counting effects are observed in data collected across many disciplines, e.g., epidemiology and ecology. Under-counted tensor completion (UC-TC) is well-motivated for many data analytics tasks, e.g., inferring the case numbers of infectious diseases at unobserved locations from under-counted case numbers in neighboring regions. However, existing methods for similar problems often lack supports in theory, making it hard to understand the underlying principles and conditions beyond empirical successes. In this work, a low-rank Poisson tensor model with an expressive unknown nonlinear side information extractor is proposed for under-counted multi-aspect data. A joint low-rank tensor completion and neural network learning algorithm is designed to recover the model. Moreover, the UC-TC formulation is supported by theoretical analysis showing that the fully counted entries of the tensor and each entry's under-counting probability can be provably recovered from partial observations -- under reasonable conditions. To our best knowledge, the result is the first to offer theoretical supports for under-counted multi-aspect data completion. Simulations and real-data experiments corroborate the theoretical claims.
△ Less
Submitted 5 June, 2023;
originally announced June 2023.
-
Unsupervised Learning for Pilot-free Transmission in 3GPP MIMO Systems
Authors:
Omar M. Sleem,
Mohamed Salah Ibrahim,
Akshay Malhotra,
Mihaela Beluri,
Philip Pietraski
Abstract:
Reference signals overhead reduction has recently evolved as an effective solution for improving the system spectral efficiency. This paper introduces a new downlink data structure that is free from demodulation reference signals (DM-RS), and hence does not require any channel estimation at the receiver. The new proposed data transmission structure involves a simple repetition step of part of the…
▽ More
Reference signals overhead reduction has recently evolved as an effective solution for improving the system spectral efficiency. This paper introduces a new downlink data structure that is free from demodulation reference signals (DM-RS), and hence does not require any channel estimation at the receiver. The new proposed data transmission structure involves a simple repetition step of part of the user data across the different sub-bands. Exploiting the repetition structure at the user side, it is shown that reliable recovery is possible via canonical correlation analysis. This paper also proposes two effective mechanisms for boosting the CCA performance in OFDM systems; one for repetition pattern selection and another to deal with the severe frequency selectivity issues. The proposed approach exhibits favorable complexity-performance tradeoff, rendering it appealing for practical implementation. Numerical results, using a 3GPP link-level testbench, demonstrate the superiority of the proposed approach relative to the state-of-the-art methods.
△ Less
Submitted 4 February, 2023;
originally announced February 2023.
-
Anticancer Peptides Classification using Kernel Sparse Representation Classifier
Authors:
Ehtisham Fazal,
Muhammad Sohail Ibrahim,
Seongyong Park,
Imran Naseem,
Abdul Wahab
Abstract:
Cancer is one of the most challenging diseases because of its complexity, variability, and diversity of causes. It has been one of the major research topics over the past decades, yet it is still poorly understood. To this end, multifaceted therapeutic frameworks are indispensable. \emph{Anticancer peptides} (ACPs) are the most promising treatment option, but their large-scale identification and s…
▽ More
Cancer is one of the most challenging diseases because of its complexity, variability, and diversity of causes. It has been one of the major research topics over the past decades, yet it is still poorly understood. To this end, multifaceted therapeutic frameworks are indispensable. \emph{Anticancer peptides} (ACPs) are the most promising treatment option, but their large-scale identification and synthesis require reliable prediction methods, which is still a problem. In this paper, we present an intuitive classification strategy that differs from the traditional \emph{black box} method and is based on the well-known statistical theory of \emph{sparse-representation classification} (SRC). Specifically, we create over-complete dictionary matrices by embedding the \emph{composition of the K-spaced amino acid pairs} (CKSAAP). Unlike the traditional SRC frameworks, we use an efficient \emph{matching pursuit} solver instead of the computationally expensive \emph{basis pursuit} solver in this strategy. Furthermore, the \emph{kernel principal component analysis} (KPCA) is employed to cope with non-linearity and dimension reduction of the feature space whereas the \emph{synthetic minority oversampling technique} (SMOTE) is used to balance the dictionary. The proposed method is evaluated on two benchmark datasets for well-known statistical parameters and is found to outperform the existing methods. The results show the highest sensitivity with the most balanced accuracy, which might be beneficial in understanding structural and chemical aspects and developing new ACPs. The Google-Colab implementation of the proposed method is available at the author's GitHub page (\href{https://github.com/ehtisham-Fazal/ACP-Kernel-SRC}{https://github.com/ehtisham-fazal/ACP-Kernel-SRC}).
△ Less
Submitted 19 December, 2022;
originally announced December 2022.
-
Vandermonde Constrained Tensor Decomposition for Hybrid Beamforming in Multi-Carrier MIMO Systems
Authors:
Mohamed Salah Ibrahim,
Akshay Malhotra,
Mihaela Beluri,
Arnab Roy,
Shahab Hamidi-Rad
Abstract:
Hybrid beamforming has evolved as a promising technology that offers the balance between system performance and design complexity in mmWave MIMO systems. Existing hybrid beamforming methods either impose unit-modulus constraints or a codebook constraint on the analog precoders/combiners, which in turn results in a performance-overhead tradeoff. This paper puts forth a tensor framework to handle th…
▽ More
Hybrid beamforming has evolved as a promising technology that offers the balance between system performance and design complexity in mmWave MIMO systems. Existing hybrid beamforming methods either impose unit-modulus constraints or a codebook constraint on the analog precoders/combiners, which in turn results in a performance-overhead tradeoff. This paper puts forth a tensor framework to handle the wideband hybrid beamforming problem, with Vandermonde constraints on the analog precoders/combiners. The proposed method strikes the balance between performance, overhead and complexity. Numerical results on a 3GPP link-level test bench reveal the efficacy of the proposed approach relative to the codebook-based method while attaining the same feedback overhead. Moreover, the proposed method is shown to achieve comparable performance to the unit-modulus approaches, with substantial reductions in overhead.
△ Less
Submitted 29 November, 2022;
originally announced November 2022.
-
Geometric Machine Learning for Channel Covariance Estimation in Vehicular Networks
Authors:
Imtiaz Nasim,
Ahmed S. Ibrahim
Abstract:
Learning the covariance matrices of spatially-correlated wireless channels, in millimeter-wave (mmWave) vehicular communication, can be utilized in designing environmen-taware beamforming codebooks. Such channel covariance matrices can be represented on non-Euclidean Riemannian manifolds, thanks to their symmetric positive definite (SPD) characteristics. Consequently in this paper, we propose a Ri…
▽ More
Learning the covariance matrices of spatially-correlated wireless channels, in millimeter-wave (mmWave) vehicular communication, can be utilized in designing environmen-taware beamforming codebooks. Such channel covariance matrices can be represented on non-Euclidean Riemannian manifolds, thanks to their symmetric positive definite (SPD) characteristics. Consequently in this paper, we propose a Riemannian-Geometric machine learning (G-ML) approach for estimating the channel covariance matrices based on unsupervised K-Means model. The proposed K-means algorithm utilizes Log-Euclidean metric (LEM) as the distance measure among channel covariance matrices over the Riemannian manifolds. We show that our proposed K-Means G-ML model can achieve up to 80% less error compared to Euclidean-based K-Means algorithm, which applies clustering on the channel vectors themselves.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
A Fast Graph Kernel Based Classification Method for Wireless Link Scheduling on Riemannian Manifold
Authors:
Rashed Shelim,
Ahmed S. Ibrahim
Abstract:
In this paper, we propose a novel graph kernel method for the wireless link scheduling problem in device-to-device (D2D) networks on Riemannian manifold. The link scheduling problem can be considered as a binary classification problem since each D2D pair can only hold the state active or inactive. Our goal is to learn a novel metric that facilitates the design of an efficient but less computationa…
▽ More
In this paper, we propose a novel graph kernel method for the wireless link scheduling problem in device-to-device (D2D) networks on Riemannian manifold. The link scheduling problem can be considered as a binary classification problem since each D2D pair can only hold the state active or inactive. Our goal is to learn a novel metric that facilitates the design of an efficient but less computationally demanding machine learning (ML) solution for the binary classification task of link scheduling problem that requires no channel state information (CSI) and a fewer number of training samples as opposed to other benchmark ML algorithms. To this aim, we first represent the wireless D2D network as a graph and model the features of each D2D pair, including its communication and interference links, as regularized (i.e., positively-shifted) Laplacian matrices which are symmetric positive definite (SPD) one. By doing so, we represent the feature information of each D2D pair as a point on the SPD manifold, and we analyze the topology through Riemannian geometry. We compute the Riemannian metric, e.g., Log-Euclidean metric (LEM), which are suitable distance measures between the regularized Laplacian matrices. The LEM is then utilized to define a positive definite graph kernel for the binary classification of the link scheduling decisions. Simulation results demonstrate that the proposed graph Kernel-based method is computationally less demanding and achieves a sum rate of more than 95% of benchmark algorithm FPLinQ [1] for 10 D2D pairs without using CSI and less than a hundred training network layouts.
△ Less
Submitted 25 June, 2021;
originally announced June 2021.
-
Crowdsourcing via Annotator Co-occurrence Imputation and Provable Symmetric Nonnegative Matrix Factorization
Authors:
Shahana Ibrahim,
Xiao Fu
Abstract:
Unsupervised learning of the Dawid-Skene (D&S) model from noisy, incomplete and crowdsourced annotations has been a long-standing challenge, and is a critical step towards reliably labeling massive data. A recent work takes a coupled nonnegative matrix factorization (CNMF) perspective, and shows appealing features: It ensures the identifiability of the D\&S model and enjoys low sample complexity,…
▽ More
Unsupervised learning of the Dawid-Skene (D&S) model from noisy, incomplete and crowdsourced annotations has been a long-standing challenge, and is a critical step towards reliably labeling massive data. A recent work takes a coupled nonnegative matrix factorization (CNMF) perspective, and shows appealing features: It ensures the identifiability of the D\&S model and enjoys low sample complexity, as only the estimates of the co-occurrences of annotator labels are involved. However, the identifiability holds only when certain somewhat restrictive conditions are met in the context of crowdsourcing. Optimizing the CNMF criterion is also costly -- and convergence assurances are elusive. This work recasts the pairwise co-occurrence based D&S model learning problem as a symmetric NMF (SymNMF) problem -- which offers enhanced identifiability relative to CNMF. In practice, the SymNMF model is often (largely) incomplete, due to the lack of co-labeled items by some annotators. Two lightweight algorithms are proposed for co-occurrence imputation. Then, a low-complexity shifted rectified linear unit (ReLU)-empowered SymNMF algorithm is proposed to identify the D&S model. Various performance characterizations (e.g., missing co-occurrence recoverability, stability, and convergence) and evaluations are also presented.
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
Wireless Link Scheduling via Interference-aware Symmetric Positive Definite Connectivity Manifolds
Authors:
Ahmed S. Ibrahim
Abstract:
In this paper, we investigate the fundamental problem of wireless link scheduling in device-to-device (D2D) networks, through the lens of Riemannian geometry. Our goal is to find a novel metric to characterize interference among D2D pairs, which can pave the way towards efficient and fast scheduling algorithms. Towards achieving this goal, we first model the connectivity pattern of each D2D pair,…
▽ More
In this paper, we investigate the fundamental problem of wireless link scheduling in device-to-device (D2D) networks, through the lens of Riemannian geometry. Our goal is to find a novel metric to characterize interference among D2D pairs, which can pave the way towards efficient and fast scheduling algorithms. Towards achieving this goal, we first model the connectivity pattern of each D2D pair, including its interference links, as a positively-shifted Laplacian matrix, which is a symmetric positive definite (SPD) one. Noting that SPD matrices constitute a non-Euclidean manifold, we represent each of the D2D pairs as a point on the SPD (i.e., conic) manifold, which is analyzed via Riemannian geometry. Accordingly we employ Riemannian metrics (e.g., Log-Euclidean metric "LEM"), which are suitable measures of distances on manifolds, to characterize the interference among D2D points on the SPD manifold.
To validate the effectiveness of the proposed LEM-based interference measure, we propose a sequential link selection algorithm that schedules D2D pairs in a descending order of their signal-to-noise ratio (SNR), while keeping their LEM distances towards the already-scheduled pairs on the Riemannian manifold to be greater than a certain LEM threshold. Such LEM-based condition is equivalent to limiting the interference from potential D2D pairs to be below certain threshold. We show that the proposed LEM-based scheduling algorithm achieves sum rate of more than 86% of state-of-the-art ones (e.g., FPLinQ), while only requiring spatial locations of D2D pairs, as opposed to requiring full channel state information (CSI).
△ Less
Submitted 27 May, 2021;
originally announced May 2021.
-
Stochastic Mirror Descent for Low-Rank Tensor Decomposition Under Non-Euclidean Losses
Authors:
Wenqiang Pu,
Shahana Ibrahim,
Xiao Fu,
Mingyi Hong
Abstract:
This work considers low-rank canonical polyadic decomposition (CPD) under a class of non-Euclidean loss functions that frequently arise in statistical machine learning and signal processing. These loss functions are often used for certain types of tensor data, e.g., count and binary tensors, where the least squares loss is considered unnatural.Compared to the least squares loss, the non-Euclidean…
▽ More
This work considers low-rank canonical polyadic decomposition (CPD) under a class of non-Euclidean loss functions that frequently arise in statistical machine learning and signal processing. These loss functions are often used for certain types of tensor data, e.g., count and binary tensors, where the least squares loss is considered unnatural.Compared to the least squares loss, the non-Euclidean losses are generally more challenging to handle. Non-Euclidean CPD has attracted considerable interests and a number of prior works exist. However, pressing computational and theoretical challenges, such as scalability and convergence issues, still remain. This work offers a unified stochastic algorithmic framework for large-scale CPD decomposition under a variety of non-Euclidean loss functions. Our key contribution lies in a tensor fiber sampling strategy-based flexible stochastic mirror descent framework. Leveraging the sampling scheme and the multilinear algebraic structure of low-rank tensors, the proposed lightweight algorithm ensures global convergence to a stationary point under reasonable conditions. Numerical results show that our framework attains promising non-Euclidean CPD performance. The proposed framework also exhibits substantial computational savings compared to state-of-the-art methods.
△ Less
Submitted 29 April, 2021;
originally announced April 2021.
-
Rethinking Maximum Flow Problem and Beamforming Design through Brain-inspired Geometric Lens
Authors:
Ahmed S. Ibrahim
Abstract:
Increasing data rate in wireless networks can be accomplished through a two-pronged approach, which are 1) increasing the network flow rate through parallel independent routes and 2) increasing the user's link rate through beamforming codebook adaptation. Mobile relays are utilized to enable achieving these goals given their flexible positioning. First at the network level, we model regularized La…
▽ More
Increasing data rate in wireless networks can be accomplished through a two-pronged approach, which are 1) increasing the network flow rate through parallel independent routes and 2) increasing the user's link rate through beamforming codebook adaptation. Mobile relays are utilized to enable achieving these goals given their flexible positioning. First at the network level, we model regularized Laplacian matrices, which are symmetric positive definite (SPD) ones representing relay-dependent network graphs, as points over Riemannian manifolds. Inspired by the geometric classification of different tasks in the brain network, Riemannian metrics, such as Log-Euclidean metric (LEM), are utilized to choose relay positions that result in maximum LEM. Simulation results show that the proposed LEM-based relay positioning algorithm enables parallel routes and achieves maximum network flow rate, as opposed to other metrics (e.g., algebraic connectivity).
Second at the link level, we design unique relay-dependent beamforming codebooks aimed to increase data rate over the spatially-correlated fading channels between a given relay and its neighboring users. To do so, we propose a geometric machine learning approach, which utilizes support vector machine (SVM) model to learn an SPD variant of the user's channel over Riemannian manifolds. Consequently, LEM-based Riemannian metric is utilized for classification of different channels, and a matched beamforming codebook is constructed accordingly. Simulation results show that the proposed geometric-based learning model achieves the maximum link rate after a short training period.
△ Less
Submitted 29 July, 2020;
originally announced July 2020.
-
Recovering Joint Probability of Discrete Random Variables from Pairwise Marginals
Authors:
Shahana Ibrahim,
Xiao Fu
Abstract:
Learning the joint probability of random variables (RVs) is the cornerstone of statistical signal processing and machine learning. However, direct nonparametric estimation for high-dimensional joint probability is in general impossible, due to the curse of dimensionality. Recent work has proposed to recover the joint probability mass function (PMF) of an arbitrary number of RVs from three-dimensio…
▽ More
Learning the joint probability of random variables (RVs) is the cornerstone of statistical signal processing and machine learning. However, direct nonparametric estimation for high-dimensional joint probability is in general impossible, due to the curse of dimensionality. Recent work has proposed to recover the joint probability mass function (PMF) of an arbitrary number of RVs from three-dimensional marginals, leveraging the algebraic properties of low-rank tensor decomposition and the (unknown) dependence among the RVs. Nonetheless, accurately estimating three-dimensional marginals can still be costly in terms of sample complexity, affecting the performance of this line of work in practice in the sample-starved regime. Using three-dimensional marginals also involves challenging tensor decomposition problems whose tractability is unclear. This work puts forth a new framework for learning the joint PMF using only pairwise marginals, which naturally enjoys a lower sample complexity relative to the third-order ones. A coupled nonnegative matrix factorization (CNMF) framework is developed, and its joint PMF recovery guarantees under various conditions are analyzed. Our method also features a Gram--Schmidt (GS)-like algorithm that exhibits competitive runtime performance. The algorithm is shown to provably recover the joint PMF up to bounded error in finite iterations, under reasonable conditions. It is also shown that a recently proposed economical expectation maximization (EM) algorithm guarantees to improve upon the GS-like algorithm's output, thereby further lifting up the accuracy and efficiency. Real-data experiments are employed to showcase the effectiveness.
△ Less
Submitted 11 July, 2021; v1 submitted 30 June, 2020;
originally announced June 2020.
-
Cell-Edge Detection via Selective Cooperation and Generalized Canonical Correlation
Authors:
Mohamed Salah Ibrahim,
Ahmed S. Zamzam,
Aritra Konar,
Nicholas D. Sidiropoulos
Abstract:
Improving the uplink quality of service for users located around the boundaries between cells is a key challenge in LTE systems. Relying on power control, existing approaches throttle the rates of cell-center users, while multi-user detection requires accurate channel estimates for the cell-edge users, which is another challenge due to their low received signal-to-noise ratio (SNR). Utilizing the…
▽ More
Improving the uplink quality of service for users located around the boundaries between cells is a key challenge in LTE systems. Relying on power control, existing approaches throttle the rates of cell-center users, while multi-user detection requires accurate channel estimates for the cell-edge users, which is another challenge due to their low received signal-to-noise ratio (SNR). Utilizing the fact that cell-edge user signals are weak but common (received at roughly equal power) at different base stations (BSs), this paper establishes a connection between cell-edge user detection and generalized canonical correlation analysis (GCCA). It puts forth a GCCA-based method that leverages selective BS cooperation to recover the cell-edge user signal subspace even at low SNR. The cell-edge user signals can then be extracted from the resulting mixture via algebraic signal processing techniques. The paper includes theoretical analysis showing why GCCA recovers the correct subspace containing the cell-edge user signals under mild conditions. The proposed method can also identify the number of cell-edge users in the system, i.e., the common subspace dimension. Simulations reveal significant performance improvement relative to various multiuser detection techniques. Cell-edge detection performance is further studied as a function of how many / which BSs are selected, and it is shown that using the closest three BS is always the best choice.
△ Less
Submitted 11 April, 2020;
originally announced April 2020.
-
Reliable Detection of Unknown Cell-Edge Users Via Canonical Correlation Analysis
Authors:
Mohamed Salah Ibrahim,
Nicholas D. Sidiropoulos
Abstract:
Providing reliable service to users close to the edge between cells remains a challenge in cellular systems, even as 5G deployment is around the corner. These users are subject to significant signal attenuation, which also degrades their uplink channel estimates. Even joint detection using base station (BS) cooperation often fails to reliably detect such users, due to near-far power imbalance, and…
▽ More
Providing reliable service to users close to the edge between cells remains a challenge in cellular systems, even as 5G deployment is around the corner. These users are subject to significant signal attenuation, which also degrades their uplink channel estimates. Even joint detection using base station (BS) cooperation often fails to reliably detect such users, due to near-far power imbalance, and channel estimation errors. Is it possible to bypass the channel estimation stage and design a detector that can reliably detect cell-edge user signals under significant near-far imbalance? This paper shows, perhaps surprisingly, that the answer is affirmative -- albeit not via traditional multiuser detection. Exploiting that cell-edge user signals are weak but {\em common} to different base stations, while cell-center users are unique to their serving BS, this paper establishes an elegant connection between cell-edge user detection and canonical correlation analysis (CCA) of the associated space-time baseband-equivalent matrices. It proves that CCA identifies the common subspace of these matrices, even under significant intra- and inter-cell interference. The resulting mixture of cell-edge user signals can subsequently be unraveled using a well-known algebraic signal processing technique. Interestingly, the proposed approach does not even require that the signals from the different base stations are synchronized -- the right synchronization can be automatically determined as well. Experimental results demonstrate that the proposed approach achieves order of magnitude BER improvements compared to `oracle' multiuser detection that assumes perfect knowledge of the cell-center user channels.
△ Less
Submitted 4 March, 2020;
originally announced March 2020.
-
Fast Algorithms for Joint Multicast Beamforming and Antenna Selection in Massive MIMO
Authors:
Mohamed Salah Ibrahim,
Aritra Konar,
Nicholas D. Sidiropoulos
Abstract:
Massive MIMO is currently a leading physical layer technology candidate that can dramatically enhance throughput in 5G systems, for both unicast and multicast transmission modalities. As antenna elements are becoming smaller and cheaper in the mmW range compared to radio frequency (RF) chains, it is crucial to perform antenna selection at the transmitter, such that the available RF chains are swit…
▽ More
Massive MIMO is currently a leading physical layer technology candidate that can dramatically enhance throughput in 5G systems, for both unicast and multicast transmission modalities. As antenna elements are becoming smaller and cheaper in the mmW range compared to radio frequency (RF) chains, it is crucial to perform antenna selection at the transmitter, such that the available RF chains are switched to an appropriate subset of antennas. This paper considers the joint problem of multicast beamforming and antenna selection for a single multicast group in massive MIMO systems. The prior state-of-art for this problem relies on semi-definite relaxation (SDR), which cannot scale up to the massive MIMO regime. A successive convex approximation (SCA) based approach is proposed to tackle max-min fair joint multicast beamforming and antenna selection. The key idea of SCA is to successively approximate the non-convex problem by a class of non-smooth, convex optimization problems. Two fast and memory efficient first-order methods are proposed to solve each SCA subproblem. Simulations demonstrate that the proposed algorithms outperform the existing state-of-art approach in terms of solution quality and run time, in both traditional and especially in massive MIMO settings.
△ Less
Submitted 4 March, 2020;
originally announced March 2020.
-
On Recoverability of Randomly Compressed Tensors with Low CP Rank
Authors:
Shahana Ibrahim,
Xiao Fu,
Xingguo Li
Abstract:
Our interest lies in the recoverability properties of compressed tensors under the \textit{canonical polyadic decomposition} (CPD) model. The considered problem is well-motivated in many applications, e.g., hyperspectral image and video compression. Prior work studied this problem under somewhat special assumptions---e.g., the latent factors of the tensor are sparse or drawn from absolutely contin…
▽ More
Our interest lies in the recoverability properties of compressed tensors under the \textit{canonical polyadic decomposition} (CPD) model. The considered problem is well-motivated in many applications, e.g., hyperspectral image and video compression. Prior work studied this problem under somewhat special assumptions---e.g., the latent factors of the tensor are sparse or drawn from absolutely continuous distributions. We offer an alternative result: We show that if the tensor is compressed by a subgaussian linear mapping, then the tensor is recoverable if the number of measurements is on the same order of magnitude as that of the model parameters---without strong assumptions on the latent factors. Our proof is based on deriving a \textit{restricted isometry property} (R.I.P.) under the CPD model via set covering techniques, and thus exhibits a flavor of classic compressive sensing. The new recoverability result enriches the understanding to the compressed CP tensor recovery problem; it offers theoretical guarantees for recovering tensors whose elements are not necessarily continuous or sparse.
△ Less
Submitted 7 January, 2020;
originally announced January 2020.
-
Heart Segmentation From MRI Scans Using Convolutional Neural Network
Authors:
Shakeel Muhammad Ibrahim,
Muhammad Sohail Ibrahim,
Muhammad Usman,
Imran Naseem,
Muhammad Moinuddin
Abstract:
Heart is one of the vital organs of human body. A minor dysfunction of heart even for a short time interval can be fatal, therefore, efficient monitoring of its physiological state is essential for the patients with cardiovascular diseases. In the recent past, various computer assisted medical imaging systems have been proposed for the segmentation of the organ of interest. However, for the segmen…
▽ More
Heart is one of the vital organs of human body. A minor dysfunction of heart even for a short time interval can be fatal, therefore, efficient monitoring of its physiological state is essential for the patients with cardiovascular diseases. In the recent past, various computer assisted medical imaging systems have been proposed for the segmentation of the organ of interest. However, for the segmentation of heart using MRI, only few methods have been proposed each with its own merits and demerits. For further advancement in this area of research, we analyze automated heart segmentation methods for magnetic resonance images. The analysis are based on deep learning methods that processes a full MR scan in a slice by slice fashion to predict desired mask for heart region. We design two encoder decoder type fully convolutional neural network models
△ Less
Submitted 21 November, 2019;
originally announced November 2019.
-
Quantum Calculus-based Volterra LMS for Nonlinear Channel Estimation
Authors:
Muhammad Usman,
Muhammad Sohail Ibrahim,
Jawwad Ahmad,
Syed Saiq Hussain,
Muhammad Moinuddin
Abstract:
A novel adaptive filtering method called $q$-Volterra least mean square ($q$-VLMS) is presented in this paper. The $q$-VLMS is a nonlinear extension of conventional LMS and it is based on Jackson's derivative also known as $q$-calculus. In Volterra LMS, due to large variance of input signal the convergence speed is very low. With proper manipulation we successfully improved the convergence perform…
▽ More
A novel adaptive filtering method called $q$-Volterra least mean square ($q$-VLMS) is presented in this paper. The $q$-VLMS is a nonlinear extension of conventional LMS and it is based on Jackson's derivative also known as $q$-calculus. In Volterra LMS, due to large variance of input signal the convergence speed is very low. With proper manipulation we successfully improved the convergence performance of the Volterra LMS. The proposed algorithm is analyzed for the step-size bounds and results of analysis are verified through computer simulations for nonlinear channel estimation problem.
△ Less
Submitted 7 August, 2019;
originally announced August 2019.
-
Ray Tracing Analysis for UAV-assisted Integrated Access and Backhaul Millimeter Wave Networks
Authors:
Alberto Perez,
Abdurrahman Fouda,
Ahmed S. Ibrahim
Abstract:
The use of Millimeter-wave (mmWave) spectrum in cellular communications has recently attracted growing interest to support the expected massive increase in traffic demands. However, the high path-loss at mmWave frequencies poses severe challenges. In this paper, we analyze the potential coverage gains of using unmanned aerial vehicles (UAVs), as hovering relays, in integrated access and backhaul (…
▽ More
The use of Millimeter-wave (mmWave) spectrum in cellular communications has recently attracted growing interest to support the expected massive increase in traffic demands. However, the high path-loss at mmWave frequencies poses severe challenges. In this paper, we analyze the potential coverage gains of using unmanned aerial vehicles (UAVs), as hovering relays, in integrated access and backhaul (IAB) mmWave cellular scenarios. Specifically, we utilize the WinProp software package, which employs ray tracing methodology, to study the propagation characteristics of outdoor mmWave channels at 30 and 60 GHz frequency bands in a Manhattan-like environment. In doing so, we propose the implementation of amplify-and-forward (AF) and decode-and-forward (DF) relaying mechanisms in the WinProp software. We show how the 3D deployment of UAVs can be defined based on the coverage ray tracing maps at access and backhaul links. Furthermore, we propose an adaptive UAV transmission power for the AF relaying. We demonstrate, with the aid of ray tracing simulations, the performance gains of the proposed relaying modes in terms of downlink coverage, and the received signal to interference and noise ratio (SINR).
△ Less
Submitted 4 July, 2019;
originally announced July 2019.
-
Interference Management in UAV-assisted Integrated Access and Backhaul Cellular Networks
Authors:
Abdurrahman Fouda,
Ahmed S. Ibrahim,
Ismail Guvenc,
Monisha Ghosh
Abstract:
An integrated access and backhaul (IAB) network architecture can enable flexible and fast deployment of next-generation cellular networks. However, mutual interference between access and backhaul links, small inter-site distance and spatial dynamics of user distribution pose major challenges in the practical deployment of IAB networks. To tackle these problems, we leverage the flying capabilities…
▽ More
An integrated access and backhaul (IAB) network architecture can enable flexible and fast deployment of next-generation cellular networks. However, mutual interference between access and backhaul links, small inter-site distance and spatial dynamics of user distribution pose major challenges in the practical deployment of IAB networks. To tackle these problems, we leverage the flying capabilities of unmanned aerial vehicles (UAVs) as hovering IAB-nodes and propose an interference management algorithm to maximize the overall sum rate of the IAB network. In particular, we jointly optimize the user and base station associations, the downlink power allocations for access and backhaul transmissions, and the spatial configurations of UAVs. We consider two spatial configuration modes of UAVs: distributed UAVs and drone antenna array (DAA), and show how they are intertwined with the spatial distribution of ground users. Our numerical results show that the proposed algorithm achieves an average of $2.9\times$ and $6.7\times$ gains in the received downlink signal-to-interference-plus-noise ratio (SINR) and overall network sum rate, respectively. Finally, the numerical results reveal that UAVs cannot only be used for coverage improvement but also for capacity boosting in IAB cellular networks.
△ Less
Submitted 25 July, 2019; v1 submitted 4 July, 2019;
originally announced July 2019.
-
A Low-Power 20-Gb/s Discrete-Time Analog Front-End for ADC-Based Serial Link Equalizers
Authors:
Mostafa Ayesh,
Sameh Ibrahim,
Mohamed M. Aboudina
Abstract:
This paper presents a discrete-time analog frontend for an analog-to-digital (ADC) based equalizers. The frontend uses a discrete-time linear equalizer (DTLE) and ultralow-power 4-bit time-interleaved charge-steering flash ADC. The DTLE serves two functions; linear equalization and sampling and holding for the following charge-steering ADC. The ADC uses fully differential low-power clocked compara…
▽ More
This paper presents a discrete-time analog frontend for an analog-to-digital (ADC) based equalizers. The frontend uses a discrete-time linear equalizer (DTLE) and ultralow-power 4-bit time-interleaved charge-steering flash ADC. The DTLE serves two functions; linear equalization and sampling and holding for the following charge-steering ADC. The ADC uses fully differential low-power clocked comparators. Low power in the comparators is achieved by embedding a dynamic latch into the core of a charge-steering pre-amplifier. The 20-Gb/s front-end is designed and simulated in 65-nm CMOS technology. The flash ADC uses 4-stage interleaving and thus requires 4 DTLEs running at 5 Gb/s. A 5-Gb/s DTLE consumes 0.57 mW from a 1.2-V supply and the ADC consumes 15.5 mW from a 1-V supply at 20 GS/s for a total power dissipation of 17.78 mW or 0.89 pJ/bit. The ADC has an SNDR of 23.9 dB, an SFDR of 33.6 dB, and an effective number of bits (ENOB) of 3.67 bits for a sinusoidal input of frequency 9.84 GHz and amplitude 600 mVdiff .
△ Less
Submitted 1 February, 2019;
originally announced February 2019.
-
Block-Randomized Stochastic Proximal Gradient for Low-Rank Tensor Factorization
Authors:
Xiao Fu,
Shahana Ibrahim,
Hoi-To Wai,
Cheng Gao,
Kejun Huang
Abstract:
This work considers the problem of computing the canonical polyadic decomposition (CPD) of large tensors. Prior works mostly leverage data sparsity to handle this problem, which is not suitable for handling dense tensors that often arise in applications such as medical imaging, computer vision, and remote sensing. Stochastic optimization is known for its low memory cost and per-iteration complexit…
▽ More
This work considers the problem of computing the canonical polyadic decomposition (CPD) of large tensors. Prior works mostly leverage data sparsity to handle this problem, which is not suitable for handling dense tensors that often arise in applications such as medical imaging, computer vision, and remote sensing. Stochastic optimization is known for its low memory cost and per-iteration complexity when handling dense data. However, exisiting stochastic CPD algorithms are not flexible enough to incorporate a variety of constraints/regularizations that are of interest in signal and data analytics. Convergence properties of many such algorithms are also unclear. In this work, we propose a stochastic optimization framework for large-scale CPD with constraints/regularizations. The framework works under a doubly randomized fashion, and can be regarded as a judicious combination of randomized block coordinate descent (BCD) and stochastic proximal gradient (SPG). The algorithm enjoys lightweight updates and small memory footprint. In addition, this framework entails considerable flexibility---many frequently used regularizers and constraints can be readily handled under the proposed scheme. The approach is also supported by convergence analysis. Numerical results on large-scale dense tensors are employed to showcase the effectiveness of the proposed approach.
△ Less
Submitted 25 March, 2020; v1 submitted 16 January, 2019;
originally announced January 2019.
-
UAV-Based in-band Integrated Access and Backhaul for 5G Communications
Authors:
Abdurrahman Fouda,
Ahmed S. Ibrahim,
Ismail Guvenc,
Monisha Ghosh
Abstract:
We introduce the concept of using unmanned aerial vehicles (UAVs) as drone base stations for in-band Integrated Access and Backhaul (IB-IAB) scenarios for 5G networks. We first present a system model for forward link transmissions in an IB-IAB multi-tier drone cellular network. We then investigate the key challenges of this scenario and propose a framework that utilizes the flying capabilities of…
▽ More
We introduce the concept of using unmanned aerial vehicles (UAVs) as drone base stations for in-band Integrated Access and Backhaul (IB-IAB) scenarios for 5G networks. We first present a system model for forward link transmissions in an IB-IAB multi-tier drone cellular network. We then investigate the key challenges of this scenario and propose a framework that utilizes the flying capabilities of the UAVs as the main degree of freedom to find the optimal precoder design for the backhaul links, user-base station association, UAV 3D hovering locations, and power allocations. We discuss how the proposed algorithm can be utilized to optimize the network performance in both large and small scales. Finally, we use an exhaustive search-based solution to demonstrate the performance gains that can be achieved from the presented algorithm in terms of the received signal to interference plus noise ratio (SINR) and overall network sum-rate.
△ Less
Submitted 18 July, 2018;
originally announced July 2018.
-
Estimating Phase Duration for SPaT Messages
Authors:
Shahana Ibrahim,
Dileep Kalathil,
Rene O. Sanchez,
Pravin Varaiya
Abstract:
A SPaT (Signal Phase and Timing) message describes for each lane the current phase at a signalized intersection together with an estimate of the residual time of that phase. Accurate SPaT messages can be used to construct a speed profile for a vehicle that reduces its fuel consumption as it approaches or leaves an intersection. This paper presents SPaT estimation algorithms at an intersection with…
▽ More
A SPaT (Signal Phase and Timing) message describes for each lane the current phase at a signalized intersection together with an estimate of the residual time of that phase. Accurate SPaT messages can be used to construct a speed profile for a vehicle that reduces its fuel consumption as it approaches or leaves an intersection. This paper presents SPaT estimation algorithms at an intersection with a semi-actuated signal, using real-time signal phase measurements. The algorithms are evaluated using high-resolution data from two intersections in Montgomery County, MD. The algorithms can be readily implemented at signal controllers. The study supports three findings. First, real-time information dramatically improves the accuracy of the prediction of the residual time compared with prediction based on historical data alone. Second, as time increases the prediction of the residual time may increase or decrease. Third, as drivers differently weight errors in predicting `end of green' and `end of red', drivers on two different approaches may prefer different estimates of the residual time of the same phase.
△ Less
Submitted 10 January, 2018; v1 submitted 15 October, 2017;
originally announced October 2017.