- arXiv.org
- Space Physics
- Popular Physics
- Data Analysis, Statistics and Probability
- History and Philosophy of Physics
- Optics
- Fluid Dynamics
- Physics and Society
- Biological Physics
- Atomic and Molecular Clusters
- General Physics
- Geophysics
- Atomic Physics
- Plasma Physics
- Medical Physics
- Accelerator Physics
- Instrumentation and Detectors
- Chemical Physics
- Computational Physics
- Classical Physics
- Atmospheric and Oceanic Physics
- Physics Education

- Information Theory
- Number Theory
- Analysis of PDEs
- Statistics Theory
- History and Overview
- Representation Theory
- Mathematical Physics
- Complex Variables
- Group Theory
- Symplectic Geometry
- Probability
- Combinatorics
- Algebraic Geometry
- Metric Geometry
- Operator Algebras
- Geometric Topology
- Differential Geometry
- Optimization and Control
- Logic
- Quantum Algebra
- Numerical Analysis
- Dynamical Systems
- General Topology
- General Mathematics
- Spectral Theory
- Algebraic Topology
- Commutative Algebra
- Classical Analysis and ODEs
- Rings and Algebras
- Category Theory
- Functional Analysis
- K-Theory and Homology

- General Literature
- Information Theory
- Formal Languages and Automata Theory
- Symbolic Computation
- Computational Complexity
- Information Retrieval
- Multiagent Systems
- Learning
- Numerical Analysis
- Programming Languages
- Computer Vision and Pattern Recognition
- Other Computer Science
- Emerging Technologies
- Operating Systems
- Sound
- Social and Information Networks
- Databases
- Neural and Evolutionary Computing
- Software Engineering
- Mathematical Software
- Artificial Intelligence
- Digital Libraries
- Computer Science and Game Theory
- Cryptography and Security
- Performance
- Systems and Control
- Distributed, Parallel, and Cluster Computing
- Computational Engineering, Finance, and Science
- Human-Computer Interaction
- Hardware Architecture
- Discrete Mathematics
- Computation and Language
- Networking and Internet Architecture
- Data Structures and Algorithms
- Computers and Society
- Graphics
- Multimedia
- Robotics
- Computational Geometry
- Logic in Computer Science

- Millimeter-wave massive MIMO with lens antenna array can considerably reduce the number of required radio-frequency (RF) chains by beam selection. However, beam selection requires the base station to acquire the accurate information of beamspace channel. This is a challenging task, as the size of beamspace channel is large while the number of RF chains is limited. In this paper, we investigate the beamspace channel estimation problem in mmWave massive MIMO systems with lens antenna array. Specifically, we first design an adaptive selecting network for mmWave massive MIMO systems with lens antenna array, and based on this network, we further formulate the beamspace channel estimation problem as a sparse signal recovery problem. Then, by fully utilizing the structural characteristics of mmWave beamspace channel, we propose a support detection (SD)-based channel estimation scheme with reliable performance and low pilot overhead. Finally, the performance and complexity analyses are provided to prove that the proposed SD-based channel estimation scheme can estimate the support of sparse beamspace channel with comparable or higher accuracy than conventional schemes. Simulation results verify that the proposed SD-based channel estimation scheme outperforms conventional schemes and enjoys satisfying accuracy, even in the low SNR region as the structural characteristics of beamspace channel can be exploited.
- Radio-frequency (RF) signals enabled wireless information and power transfer (WIPT) is a cost-effective technique to achieve two-way communications and at the same time provide energy supplies for low-power wireless devices. However, the information transmission in WIPT is vulnerable to the eavesdropping by the energy receivers (ERs). To achieve secrecy communications with information nodes (INs) while satisfying the energy transfer requirement of ERs, an efficient solution is to exploit a dual use of the energy signals also as useful interference or artificial noise (AN) to interfere with the ERs, thus preventing against their potential information eavesdropping. Towards this end, this article provides an overview on the joint design of energy and information signals to achieve energy-efficient and secure WIPT under various practical setups, including simultaneous wireless information and power transfer (SWIPT), wireless powered cooperative relaying and jamming, and wireless powered communication networks (WPCN). We also present some research directions that are worth pursuing in the future.
- This paper proposes prediction-and-sensing based spectrum sharing, a new spectrum-sharing model for cognitive radio networks, with a time structure for each resource block divided into a spectrum prediction-and-sensing phase and a data transmission phase. Cooperative spectrum prediction is incorporated as a sub-phase of spectrum sensing in the first phase. We investigate a joint design of transmit beamforming at the secondary base station (BS) and sensing time. The primary design goal is to maximize the sum rate of all secondary users (SUs) subject to the minimum rate requirement for all SUs, the transmit power constraint at the secondary BS, and the interference power constraints at all primary users. The original problem is difficult to solve since it is highly nonconvex. We first convert the problem into a more tractable form, then arrive at a convex program based on an inner approximation framework, and finally propose a new algorithm to successively solve this convex program. We prove that the proposed algorithm iteratively improves the objective while guaranteeing convergence at least to local optima. Simulation results demonstrate that the proposed algorithm reaches a stationary point after only a few iterations with a substantial performance improvement over existing approaches.
- This paper studies the secrecy communication in an orthogonal frequency division multiplexing (OFDM) system, where a source sends confidential information to a destination in the presence of a potential eavesdropper. We employ wireless powered cooperative jamming to improve the secrecy rate of this system with the assistance of a cooperative jammer, which works in the harvest-then-jam protocol over two time-slots. In the first slot, the source sends dedicated energy signals to power the jammer; in the second slot, the jammer uses the harvested energy to jam the eavesdropper, in order to protect the simultaneous secrecy communication from the source to the destination. In particular, we consider two types of receivers at the destination, namely Type-I and Type-II receivers, which do not have and have the capability of canceling the (a-priori known) jamming signals, respectively. For both types of receivers, we maximize the secrecy rate at the destination by jointly optimizing the transmit power allocation at the source and the jammer over sub-carriers, as well as the time allocation between the two time-slots. First, we present the globally optimal solution to this problem via the Lagrange dual method, which, however, is of high implementation complexity. Next, to balance tradeoff between the algorithm complexity and performance, we propose alternative low-complexity solutions based on minorization maximization and heuristic successive optimization, respectively. Simulation results show that the proposed approaches significantly improve the secrecy rate, as compared to benchmark schemes without joint power and time allocation.
- In this paper, we consider a massive uncoordinated non-orthogonal multiple access (NOMA) scheme where devices have strict latency requirements and no retransmission opportunities are available. Each device chooses a pilot sequence from a predetermined set as its signature and transmits its selected pilot and data simultaneously. A collision occurs when two or more devices choose the same pilot sequence. Collisions are treated as interference to the remaining received signals. We consider successive joint decoding (SJD) and successive interference cancellation (SIC) under a Rayleigh fading and path loss channel model. We first derive the expression for the outage probability for the case where devices transmit at the same fixed rate. Then, we derive the expression for the maximum achievable throughput for the case where devices transmit with rateless codes. Thus, their code rate is adaptive to the system conditions, i.e., load, received powers, and interference. Numerical results verify the accuracy of our analytical expressions. For low data rate transmissions, results show that SIC performs close to that of SJD in terms of outage probability for packet arrival rates up to 10 packets per slot. However, SJD can achieve almost double the throughput of SIC and is, thus, far more superior.
- In this work, spatial diversity techniques in the area of multiple-input multiple-output (MIMO) diffusion-based molecular communications (DBMC) are investigated. For transmitter-side spatial coding, Alamouti-type coding and repetition MIMO coding are proposed and analyzed. At the receiver-side, selection diversity, equal-gain combining, and maximum-ratio combining are studied as combining strategies. Throughout the numerical analysis, a symmetrical $2\times 2$ MIMO-DBMC system is assumed. Furthermore, a trained artificial neural network is utilized to acquire the channel impulse responses. The numerical analysis demonstrates that it is possible to achieve a diversity gain in molecular communications. In addition, it is shown that for MIMO-DBMC systems repetition MIMO coding is superior to Alamouti-type coding.
- We study covert queueing channels (CQCs), which are a kind of covert timing channel that may be exploited in shared queues across supposedly isolated users. In our system model, a user modulates messages to another user via his pattern of access to the shared resource scheduled in a first-come-first-served (FCFS) manner. One example of such a channel is the cross-virtual network covert channel in data center networks resulting from the queueing effects of the shared resource. First, we study a system comprising a transmitter and a receiver that share a deterministic and work-conserving FCFS scheduler, and we compute the capacity of this channel. We also consider the effect of the presence of other users on the information transmission rate of this channel. The achievable information transmission rates obtained in this study demonstrate the possibility of significant information leakage and great privacy threats brought by CQCs in FCFS schedulers.
- This letter investigates the artificial noise aided beamforming design for secure simultaneous wireless information and power transfer (SWIPT) in a two-tier downlink heterogeneous network, where one femtocell is overlaid with one macrocell in co-channel deployment. Each energy receiver (ER) in femtocell can be considered as a potential eaves- dropper for messages intended for information receiver (IR). Our objective is to maximize the secrecy rate at IR subject to the signal-to-interference-plus noise ratio (SINR) requirements of macro users (MUs), transmit power constraint and energy harvesting constraint. Due to the non-convexity of the formulated problem, it cannot be solved directly. Thus, we propose a novel reformulation by using first-order Taylor expansion and successive convex approximation (SCA) techniques. Furthermore, an SCA-based algorithm with low complexity is proposed to arrive at provably convergent solution. Finally, numerical results evaluate the performance of the proposed algorithm.
- A centralized coded caching scheme has been proposed by Maddah-Ali and Niesen to reduce the worst-case load of a network consisting of a server with access to N files and connected through a shared link to K users, each equipped with a cache of size M. However, this centralized coded caching scheme is not able to take advantage of a non-uniform, possibly very skewed, file popularity distribution. In this work, we consider the same network setting but aim to reduce the average load under an arbitrary (known) file popularity distribution. First, we consider a class of centralized coded caching schemes utilizing general uncoded placement and a specific coded delivery strategy, which are specified by a general file partition parameter. Then, we formulate the coded caching design optimization problem over the considered class of schemes with 2^K2^N variables to minimize the average load by optimizing the file partition parameter under an arbitrary file popularity. Furthermore, we show that the optimization problem is convex, and the resulting optimal solution generally improves upon known schemes. Next, we analyze structural properties of the optimization problem to obtain design insights and reduce the complexity. Specifically, we obtain an equivalent linear optimization problem with (K+1)N variables under an arbitrary file popularity and an equivalent linear optimization problem with K+1 variables under the uniform file popularity. Under the uniform file popularity, we also obtain the closed form optimal solution, which corresponds to Maddah-Ali-Niesen's centralized coded caching scheme. Finally, we present an information-theoretic converse bound on the average load under an arbitrary file popularity.
- Non-orthogonal multiple access (NOMA) is a promising technique for the fifth generation (5G) wireless communications. As users with good channel conditions can serve as relays to enhance the system performance by using successive interference cancellation (SIC), the integration of NOMA and cooperative relaying has recently attracted increasing interests. In this paper, a NOMA-based cooperative relaying system is studied, and an analytical framework is developed to evaluate its performance. Specifically, the performance of NOMA over Rician fading channels is studied, and the exact expression of the average achievable rate is derived. Moreover, we also propose an approximation method to calculate the achievable rate by using the Gauss-Chebyshev Integration. Numerical results confirm that our derived analytical results match well with the Monte Carlo simulations.
- One of the important use-cases of 5G network is the vehicle to infrastructure (V2I) communication which requires accurate understanding about its dynamic propagation environment. As 5G base stations (BSs) tend to have multiple antennas, they will likely employ beamforming to steer their radiation pattern to the desired vehicle equipment (VE). Furthermore, since most wireless standards employ an OFDM system, each VE may use one or more sub-carriers. To this end, this paper proposes a joint design of adaptive channel prediction, beamforming and scheduling for 5G V2I communications. The channel prediction algorithm is designed without the training signal and channel impulse response (CIR) model. In this regard, first we utilize the well known adaptive recursive least squares (RLS) technique for predicting the next block CIR from the past and current block received signals (a block may have one or more OFDM symbols). Then, we jointly design the beamforming and VE scheduling for each sub-carrier to maximize the uplink channel average sum rate by utilizing the predicted CIR. The beamforming problem is formulated as a Rayleigh quotient optimization where its global optimal solution is guaranteed. And, the VE scheduling design is formulated as an integer programming problem which is solved by employing a greedy search. The superiority of the proposed channel prediction and scheduling algorithms over those of the existing ones is demonstrated via numerical simulations.
- This paper proposes a novel and simple orthogonal faster than Nyquist (OFTN) data transmission and detection approach for a single input multiple output (SIMO) system. It is assumed that the signal having a bandwidth $B$ is transmitted through a wireless channel with $L$ multipath components. Under this assumption, the current paper provides a novel and simple OFTN transmission and symbol-by-symbol detection approach that exploits the multiplexing gain obtained by the multipath characteristic of wideband wireless channels. It is shown that the proposed design can achieve a higher transmission rate than the existing one (i.e., orthogonal frequency division multiplexing (OFDM)). Furthermore, the achievable rate gap between the proposed approach and that of the OFDM increases as the number of receiver antennas increases for a fixed value of $L$. This implies that the performance gain of the proposed approach can be very significant for a large-scale multi-antenna wireless system. The superiority of the proposed approach is shown theoretically and confirmed via numerical simulations. Specifically, we have found upper-bound average rates of 15 bps/Hz and 28 bps/Hz with the OFDM and proposed approaches, respectively, in a Rayleigh fading channel with 32 receive antennas and signal to noise ratio (SNR) of 15.3 dB. The extension of the proposed approach for different system setups and associated research problems is also discussed.
- A linear radio frequency (RF) harvesting model is commonly assumed in recent simultaneous wireless information and power transfer (SWIPT) research, i.e., RF harvested power is assumed a scaled version of the input (received) power. However, rectifiers typically used in the microwave and radio frequency identification (RFID) industry are non-linear devices; thus, RF harvesting efficiency is not constant but depends on the input power. This work first reviews far field RF harvesting and then models RF harvested power as an arbitrary non-linear, continuous, and non-decreasing function of received power, taking into account sensitivity and saturation effects. Given such model, probability density and cumulative distribution functions of the harvested RF power are offered, based on a piece-wise linear approximation, in conjunction with accuracy analysis. Three example scenarios are considered, including duty-cycled (non-continuous), as well as continuous SWIPT, comparing linear with industry-level non- linear RF harvesting. It is demonstrated that the proposed methodology, even though simple, offers exact performance for all studied metrics. On the other hand, linear harvesting modeling results deviate from reality, and in some cases are off by one order of magnitude. The proposed modeling and methodology can be utilized in current and future SWIPT research.
- A K-tier heterogeneous downlink millimeter wave (mmWave) cellular network with user-centric small cell deployments is studied in this paper. In particular, we consider a heterogeneous network model with user equipments (UEs) being distributed according to a Poisson Cluster Process (PCP). Specifically, we address two cluster processes, namely (i) Thomas cluster process, where the UEs are clustered around the base stations (BSs) and the distances between UEs and the BS are modeled as Gaussian distributed, and (ii) Matern cluster process, where the UEs are scattered according to a uniform distribution. In addition, distinguishing features of mmWave communications including directional beamforming and a sophisticated path loss model incorporating both line-of-sight (LOS) and non-line-of-sight (NLOS) transmissions, are taken into account. Initially, the complementary cumulative distribution function (CCDF) and probability density function (PDF) of path loss are provided. Subsequently, using tools from stochastic geometry, we derive a general expression for the signal-to-interference-plus-noise ratio (SINR) coverage probability. Our results demonstrate that coverage probability can be improved by decreasing the size of UE clusters around BSs, decreasing the beamwidth of the main lobe, or increasing the main lobe directivity gain. Moreover, interference has noticeable influence on the coverage performance of our model. We also show that better coverage performance is achieved in the presence of clustered users compared to the case in which the users are distributed according to a Poisson Point Process (PPP).

Quantum reading capacity: General definition and bounds

Stefano Pirandola May 05 2017 05:45 UTCgae spedalieri Mar 13 2017 14:13 UTC

...(continued)1) Sorry but this is false.

1a) That analysis is specifically for reducing QECC protocol to an entanglement distillation protocol over certain class of discrete variable channels. Exactly as in BDSW96. Task of the protocol is changed in the reduction.

1b) The simulation is not via a general LOCC b

Siddhartha Das Mar 13 2017 13:22 UTC

...(continued)We feel that we have cited and credited previous works appropriately in our paper. To clarify:

1) The LOCC simulation of a channel and the corresponding adaptive reduction can be found worked out in full generality in the 2012 Master's thesis of Muller-Hermes. We have cited the original paper BD

gae spedalieri Mar 13 2017 08:56 UTC

...(continued)This is one of those papers where the contribution of previous literature is omitted and not fairly represented.

1- the LOCC simulation of quantum channels (not necessarily teleportation based) and the corresponding general reduction of adaptive protocols was developed in PLOB15 (https://arxiv.org/

Samad Khabbazi Oskouei Sep 05 2016 11:34 UTC

...(continued)I think that we have missed the "semi-" at the conclusion. Because, the proof of the theorem 4.3 is based on the using universal semi-density matrix concept which is not computable. The semi-computability concept used here is like the Kolmogorov complexity which is not computable and so the Cubic co

Toby Cubitt Sep 01 2016 11:14 UTC

...(continued)I could well be missing something. But as far as I could tell from a rather quick read through the paper, all they show is that the quantum capacity of a channel with computable matrix elements is given by the regularised coherent information optimised over input ensembles with computable matrix ele

Māris Ozols Aug 30 2016 17:52 UTC

Do I understand correctly that this paper claims to show that quantum capacity is computable?

> After defining the algorithmic quantum capacity we have proved that it

> equals the standard one. Furthermore we have shown that it is

> computable.

Frédéric Grosshans Apr 29 2016 10:49 UTC

Who ordered that ??

Richard Kueng Jul 28 2015 07:01 UTC

fyi: our quantum implications are presented in Subsection 2.2 (pp 7-9).

Marco Tomamichel May 31 2015 22:07 UTC

Thanks for the comment! This is a good idea, I will do that in the next arXiv version.