http://arxiv.org/api/BiNrA0IHDL+CPuwrUcskS+dDDJU2025-04-21T00:00:00-04:0049781015http://arxiv.org/abs/2503.13395v32025-04-21T17:51:57Z2025-03-17T17:28:46ZCausal Emergence 2.0: Quantifying emergent complexity Complex systems can be described at myriad different scales, and their causal
workings often have multiscale structure (e.g., a computer can be described at
the microscale of its hardware circuitry, the mesoscale of its machine code,
and the macroscale of its operating system). While scientists study and model
systems across the full hierarchy of their scales, from microphysics to
macroeconomics, there is debate about what the macroscales of systems can
possibly add beyond mere compression. To resolve this longstanding issue, here
a new theory of emergence is introduced wherein the different scales of a
system are treated like slices of a higher-dimensional object. The theory can
distinguish which of these scales possess unique causal contributions, and
which are not causally relevant. Constructed from an axiomatic notion of
causation, the theory's application is demonstrated in coarse-grains of Markov
chains. It identifies all cases of macroscale causation: instances where
reduction to a microscale is possible, yet lossy about causation. Furthermore,
the theory posits a causal apportioning schema that calculates the causal
contribution of each scale, showing what each uniquely adds. Finally, it
reveals a novel measure of emergent complexity: how widely distributed a
system's causal workings are across its hierarchy of scales.
Erik Hoelv3: minor wording edits; added Supplementary Information (1 new
figure); results unchangedhttp://arxiv.org/abs/2504.15231v12025-04-21T17:08:28Z2025-04-21T17:08:28ZLinear Complementary Pairs of Quasi-Cyclic and Quasi-Twisted Codes In this paper, we provide a polynomial characterization of linear
complementary pairs of quasi-cyclic and quasi-twisted codes of index 2. We also
give several examples of linear complementary pairs of quasi-cyclic and
quasi-twisted codes with (almost) optimal security parameters.
Kanat AbdukhalikovDuy HoSan LingGyanendra K. Vermahttp://arxiv.org/abs/2504.15204v12025-04-21T16:20:13Z2025-04-21T16:20:13ZSoft-Output from Covered Space Decoding of Product Codes In this work, we propose a new soft-in soft-out decoder called soft-output
from covered space (SOCS) decoder. It estimates the a posteriori reliability
based on the space explored by a list decoder, i.e., the set of vectors for
which the list decoder knows whether they are codewords. This approach enables
a more accurate calculation of the a posteriori reliability and results in
gains of up to 0.25$\,$dB for turbo product decoding with SOCS decoding
compared to Chase-Pyndiah decoding.
Tim JanzSimon ObermüllerAndreas ZunkerStephan ten Brink6 pages, 2 figures, 2 tableshttp://arxiv.org/abs/2504.15202v12025-04-21T16:17:53Z2025-04-21T16:17:53ZExtending the ElGamal Cryptosystem to the Third Group of Units of
$\Z_{n}$ In this paper, we extend the ElGamal cryptosystem to the third group of units
of the ring $\Z_{n}$, which we prove to be more secure than the previous
extensions. We describe the arithmetic needed in the new setting. We also
provide some numerical simulations that shows the security and efficiency of
our proposed cryptosystem.
Jana HamzaMohammad EL HindiSeifeddine KadriTherrar KadriYahya Awad11 pages, 1 figurehttp://arxiv.org/abs/2412.13616v22025-04-21T16:03:51Z2024-12-18T08:54:37ZQuantum Codes from Group Ring Codes This article examines group ring codes over finite fields and finite groups.
We also present a section on two-dimensional cyclic codes in the quotient ring
$\mathbb{F}_q[x, y] / \langle x^{l} - 1, y^{m} - 1 \rangle$. These
two-dimensional cyclic codes can be analyzed using the group ring
$\mathbb{F}_q(C_{l} \times C_{m})$, where $C_{l}$ and $C_{m}$ represent cyclic
groups of orders $l$ and $m$, respectively. The aim is to show that studying
group ring codes provides a more compact approach compared to the quotient ring
method. We further extend this group ring framework to study codes over other
group structures, such as the dihedral group, direct products of cyclic and
dihedral groups, direct products of two cyclic groups, and semidirect products
of two groups. Additionally, we explore necessary and sufficient conditions for
such group ring codes to be self-orthogonal under Euclidean, Hermitian, and
symplectic inner products and propose a construction for quantum codes.
Kanat AbdukhalikovUAEUTushar BagLIP, QINFODaniel Panariohttp://arxiv.org/abs/2504.09597v32025-04-21T15:18:42Z2025-04-13T14:31:52ZUnderstanding LLM Behaviors via Compression: Data Generation, Knowledge
Acquisition and Scaling Laws Large Language Models (LLMs) have demonstrated remarkable capabilities across
numerous tasks, yet principled explanations for their underlying mechanisms and
several phenomena, such as scaling laws, hallucinations, and related behaviors,
remain elusive. In this work, we revisit the classical relationship between
compression and prediction, grounded in Kolmogorov complexity and Shannon
information theory, to provide deeper insights into LLM behaviors. By
leveraging the Kolmogorov Structure Function and interpreting LLM compression
as a two-part coding process, we offer a detailed view of how LLMs acquire and
store information across increasing model and data scales -- from pervasive
syntactic patterns to progressively rarer knowledge elements. Motivated by this
theoretical perspective and natural assumptions inspired by Heap's and Zipf's
laws, we introduce a simplified yet representative hierarchical data-generation
framework called the Syntax-Knowledge model. Under the Bayesian setting, we
show that prediction and compression within this model naturally lead to
diverse learning and scaling behaviors of LLMs. In particular, our theoretical
analysis offers intuitive and principled explanations for both data and model
scaling laws, the dynamics of knowledge acquisition during training and
fine-tuning, factual knowledge hallucinations in LLMs. The experimental results
validate our theoretical predictions.
Zhixuan PanShaowen WangJian Lihttp://arxiv.org/abs/2504.15043v12025-04-21T11:54:40Z2025-04-21T11:54:40ZEnergy-Efficient UAV-Mounted RIS for IoT: A Hybrid Energy Harvesting and
DRL Approach Many future Internet of Things (IoT) applications are expected to rely
heavily on reconfigurable intelligent surface (RIS)-aided unmanned aerial
vehicles (UAVs). However, the endurance of such systems is constrained by the
limited onboard energy, where frequent recharging or battery replacements are
required. This consequently disrupts continuous operation and may be
impractical in disaster scenarios. To address this challenge, we explore a dual
energy harvesting (EH) framework that integrates time-switching (TS),
power-splitting (PS), and element-splitting (ES) EH protocols for radio
frequency energy, along with solar energy as a renewable source. First, we
present the proposed system architecture and EH operating protocols,
introducing the proposed hybrid ES-TS-PS EH strategy to extend UAV-mounted RIS
endurance. Next, we outline key application scenarios and the associated design
challenges. After that, a deep reinforcement learning-based framework is
introduced to maximize the EH efficiency by jointly optimizing UAV trajectory,
RIS phase shifts, and EH strategies. The framework considers dual EH, hardware
impairments, and channel state information imperfections to reflect real-world
deployment conditions. The optimization problem is formulated as a Markov
decision process and solved using an enhanced deep deterministic policy
gradient algorithm, incorporating clipped double Q-learning and softmax-based
Q-value estimation for improved stability and efficiency. The results
demonstrate significant performance gains compared to the considered baseline
approaches. Finally, possible challenges and open research directions are
presented, highlighting the transformative potential of energy-efficient
UAV-mounted RIS networks for IoT systems.
Mahmoud M. SalimKhaled M. RabieAli H. Muqaibelhttp://arxiv.org/abs/2504.15031v12025-04-21T11:40:33Z2025-04-21T11:40:33ZEnergy-Efficient Irregular RIS-aided UAV-Assisted Optimization: A Deep
Reinforcement Learning Approach Reconfigurable intelligent surfaces (RISs) enhance unmanned aerial vehicles
(UAV)-assisted communication by extending coverage, improving efficiency, and
enabling adaptive beamforming. This paper investigates a multiple-input
single-output system where a base station (BS) communicates with multiple
single-antenna users through a UAV-assisted RIS, dynamically adapting to user
mobility to maintain seamless connectivity. To extend UAV-RIS operational time,
we propose a hybrid energy-harvesting resource allocation (HERA) strategy that
leverages the irregular RIS ON/OFF capability while adapting to BS-RIS and
RIS-user channels. The HERA strategy dynamically allocates resources by
integrating non-linear radio frequency energy harvesting (EH) based on the
time-switching (TS) approach and renewable energy as a complementary source. A
non-convex mixed-integer nonlinear programming problem is formulated to
maximize EH efficiency while satisfying quality-of-service, power, and energy
constraints under channel state information and hardware impairments. The
optimization jointly considers BS transmit power, RIS phase shifts, TS factor,
and RIS element selection as decision variables. To solve this problem, we
introduce the energy-efficient deep deterministic policy gradient (EE-DDPG)
algorithm. This deep reinforcement learning (DRL)-based approach integrates
action clipping and softmax-weighted Q-value estimation to mitigate estimation
errors. Simulation results demonstrate that the proposed HERA method
significantly improves EH efficiency, reaching up to 81.5\% and 73.2\% in
single-user and multi-user scenarios, respectively, contributing to extended
UAV operational time. Additionally, the proposed EE-DDPG model outperforms
existing DRL algorithms while maintaining practical computational complexity.
Mahmoud M. SalimKhaled M. RabieAli H. Muqaibelhttp://arxiv.org/abs/2411.06291v32025-04-21T10:22:14Z2024-11-09T21:26:59ZTinyML NLP Scheme for Semantic Wireless Sentiment Classification with
Privacy Preservation Natural Language Processing (NLP) operations, such as semantic sentiment
analysis and text synthesis, often raise privacy concerns and demand
significant on-device computational resources. Centralized learning (CL) on the
edge provides an energy-efficient alternative but requires collecting raw data,
compromising user privacy. While federated learning (FL) enhances privacy, it
imposes high computational energy demands on resource-constrained devices. This
study provides insights into deploying privacy-preserving, energy-efficient NLP
models on edge devices. We introduce semantic split learning (SL) as an
energy-efficient, privacy-preserving tiny machine learning (TinyML) framework
and compare it to FL and CL in the presence of Rayleigh fading and additive
noise. Our results show that SL significantly reduces computational power and
CO2 emissions while enhancing privacy, as evidenced by a fourfold increase in
reconstruction error compared to FL and nearly eighteen times that of CL. In
contrast, FL offers a balanced trade-off between privacy and efficiency. Our
code is available for replication at our GitHub repository:
https://github.com/AhmedRadwan02/TinyEco2AI-NLP.
Ahmed Y. RadwanMohammad ShehabMohamed-Slim AlouiniAccepted at EuCNC & 6G Summit 2025http://arxiv.org/abs/2504.15006v12025-04-21T10:12:00Z2025-04-21T10:12:00ZSum-Rate Maximization for NOMA-Assisted Pinching-Antenna Systems In this letter, we investigate a non-orthogonal multiple access (NOMA)
assisted downlink pinching-antenna system. Leveraging the ability of pinching
antennas to flexibly adjust users' wireless channel conditions, we formulate an
optimization problem to maximize the sum rate by optimizing both the users'
power allocation coefficients and the positions of pinching antennas. The
optimal power allocation coefficients are obtained in closed-form by using the
Karush-Kuhn-Tucker (KKT) conditions. The optimization problem of pinching
antenna placements is more challenging than the power allocation problem, and
is solved by a bisection-based search algorithm. In particular, the algorithm
first optimizes the antenna placements to create favorable channel disparities
between users, followed by fine-tuning the antenna positions to ensure the
phase alignment for users, thus maximizing the sum rate. Simulation results
demonstrate that, compared to conventional-antenna systems, pinching antennas
can significantly enhance the sum rate in NOMA scenarios, and the proposed
bisection-based search algorithm can achieve a sum rate nearly equivalent to
that of an exhaustive search.
Ziwu ZhouZheng YangGaojie Chen Zhiguo Dinghttp://arxiv.org/abs/2411.18316v22025-04-21T08:47:46Z2024-11-27T13:13:14ZDecoding convolutional codes over finite rings. A linear dynamical
systems approach Observable convolutional codes defined over Zpr with the Predictable Degree
Property admits minimal input state output representations that behaves well
under restriction of scalars. We make use of this fact to present Rosenthal's
decoding algorithm for these convolutional codes. When combined with the
Greferath-Vellbinger algorithm and a modified version of the
Torrecillas-Lobillo-Navarro algorithm, the decoding problem reduces to
selecting two decoding algorithms for linear block codes over a field. Finally,
we analyze both the theoretical and practical error-correction capabilities of
the combined algorithm,
Ángel Luis Muñoz CastañedaNoemí Decastro-GarcíaMiguel V. Carriegoshttp://arxiv.org/abs/2501.02917v42025-04-21T08:03:33Z2025-01-06T10:56:13ZOn Achievable Rates Over Noisy Nanopore Channels In this paper, we consider a recent channel model of a nanopore sequencer
proposed by McBain, Viterbo, and Saunderson (2024), termed the \emph{noisy
nanopore channel} (NNC). In essence, an NNC is a duplication channel with
structured, Markov inputs, that is corrupted by memoryless noise. We first
discuss a (tight) lower bound on the capacity of the NNC in the absence of
random noise. Next, we present bounds on the channel capacity of general noisy
nanopore channels, via simple information-theoretic inequalities. We then
consider two interesting regimes of operation of an NNC: first, where the
memory of the input process is large and the random noise introduces erasures,
and second, where the rate of measurements of the electric current (also called
the sampling rate) is high. For these regimes, we show that it is possible to
achieve information rates close to the noise-free capacity, using simple
encoding and decoding schemes. In particular, our decoder for the regime of
high sampling rates makes use of a change-point detection procedure -- a
subroutine of immediate relevance for practitioners.
V. Arvind RameshwarNir Weinberger34 pages, 2 figureshttp://arxiv.org/abs/2504.14842v12025-04-21T03:54:27Z2025-04-21T03:54:27ZA Short Proof of Coding Theorems for Reed-Muller Codes In this paper, we present a short proof that ReedMuller (RM) codes are
entropy-achieving as source coding for Bernoulli sources and capacity-achieving
as channel coding for binary memoryless symmetric (BMS) channels, also known as
memoryless binary-input output-symmetric (BIOS) channels, in terms of bit error
rate (BER) under maximum-likelihood (ML) decoding.
Xiao Ma4 pages, 1 figurehttp://arxiv.org/abs/2410.18301v22025-04-21T03:25:53Z2024-10-23T22:19:48ZLEO-based Positioning: Foundations, Signal Design, and Receiver
Enhancements for 6G NTN The integration of non-terrestrial networks (NTN) into 5G new radio (NR) has
opened up the possibility of developing a new positioning infrastructure using
NR signals from Low-Earth Orbit (LEO) satellites. Compared to existing Global
Navigation Satellite Systems (GNSS), LEO-based cellular positioning offers
several advantages, such as a superior link budget, higher operating bandwidth,
and large forthcoming constellations. Due to these factors, LEO-based
positioning, navigation, and timing (PNT) is a potential enhancement for NTN in
6G cellular networks. However, extending the existing terrestrial cellular
positioning methods to LEO-based NTN positioning requires key fundamental
enhancements. These include creating broad positioning beams orthogonal to
conventional communication beams, time-domain processing at the user equipment
(UE) to resolve large delay and Doppler uncertainties, and efficiently
accommodating positioning reference signals (PRS) from multiple satellites
within the communication resource grid. In this paper, we present the first set
of design insights by incorporating these enhancements and thoroughly
evaluating LEO-based positioning, considering the constraints and capabilities
of the NR-NTN physical layer. To evaluate the performance of LEO-based NTN
positioning, we develop a comprehensive NR-compliant simulation framework,
including LEO orbit simulation, transmission (Tx) and receiver (Rx)
architectures, and a positioning engine incorporating the necessary
enhancements. Our findings suggest that LEO-based NTN positioning could serve
as a complementary infrastructure to GNSS and, with appropriate enhancements,
may also offer a viable alternative.
Harish K. DureppagariChiranjib SahaHarikumar KrishnamurthyXiao Feng WangAlberto Rico-AlvariñoR. Michael BuehrerHarpreet S. DhillonAccepted for Publication in IEEE Communications Magazinehttp://arxiv.org/abs/2412.17062v22025-04-21T02:29:09Z2024-12-22T15:18:42ZHybrid Beamforming Design for RSMA-enabled Near-Field Integrated Sensing
and Communications Integrated sensing and communication (ISAC) networks leverage extremely large
antenna arrays and high frequencies. This inevitably extends the Rayleigh
distance, making near-field (NF) spherical wave propagation dominant. This
unlocks numerous spatial degrees of freedom, raising the challenge of
optimizing them for communication and sensing tradeoffs. To this end, we
propose a rate-splitting multiple access (RSMA)-based NF-ISAC transmit scheme
utilizing hybrid analog-digital antennas. RSMA enhances interference
management, while a variable number of dedicated sensing beams adds beamforming
flexibility. The objective is to maximize the minimum communication rate while
ensuring multi-target sensing performance by jointly optimizing receive
filters, analog and digital beamformers, common rate allocation, and the
sensing beam count. To address uncertainty in sensing beam allocation, a
rank-zero solution reconstruction method demonstrates that dedicated sensing
beams are unnecessary for NF multi-target detection. A penalty dual
decomposition (PDD)-based double-loop algorithm is introduced, employing
weighted minimum mean-squared error (WMMSE) and quadratic transforms to
reformulate communication and sensing rates. Simulations reveal that the
proposed scheme: 1) achieves performance comparable to fully digital
beamforming with fewer RF chains, (2) maintains NF multi-target detection
without compromising communication rates, and 3) significantly outperforms
conventional multiple access schemes and far-field ISAC systems.
Jiasi ZhouChintha TellamburaGeoffrey Ye Li13 pages and 9 figures