http://arxiv.org/api/e3ZRHWMj3rfSH/XxrNh6tM1yezw
2025-04-22T00:00:00-04:00
49781
15
15
http://arxiv.org/abs/2504.14778v1
2025-04-21T00:31:22Z
2025-04-21T00:31:22Z
Optimal Linear MAP Decoding of Convolutional Codes
In this paper, we propose a linear representation of BCJR maximum a
posteriori probability (MAP) decoding of a rate 1/2 convolutional code (CC),
referred to as the linear MAP decoding (LMAP). We discover that the MAP forward
and backward decoding can be implemented by the corresponding dual soft input
and soft output (SISO) encoders using shift registers. The bidrectional MAP
decoding output can be obtained by combining the contents of respective forward
and backward dual encoders. Represented using simple shift-registers, LMAP
decoder maps naturally to hardware registers and thus can be easily
implemented. Simulation results demonstrate that the LMAP decoding achieves the
same performance as the BCJR MAP decoding, but has a significantly reduced
decoding delay. For the block length 64, the CC of the memory length 14 with
LMAP decoding surpasses the random coding union (RCU) bound by approximately
0.5 dB at a BLER of $10^{-3}$, and closely approaches both the normal
approximation (NA) and meta-converse (MC) bounds.
Yonghui Li
Chentao Yue
Branka Vucetic
Accepted by ISIT 2025
http://arxiv.org/abs/2501.12365v2
2025-04-21T00:23:46Z
2025-01-21T18:45:09Z
Efficient Algorithm for Sparse Fourier Transform of Generalized $q$-ary
Functions
Computing the Fourier transform of a $q$-ary function
$f:\mathbb{Z}_{q}^n\rightarrow \mathbb{R}$, which maps $q$-ary sequences to
real numbers, is an important problem in mathematics with wide-ranging
applications in biology, signal processing, and machine learning. Previous
studies have shown that, under the sparsity assumption, the Fourier transform
can be computed efficiently using fast and sample-efficient algorithms.
However, in most practical settings, the function is defined over a more
general space -- the space of generalized $q$-ary sequences $\mathbb{Z}_{q_1}
\times \mathbb{Z}_{q_2} \times \cdots \times \mathbb{Z}_{q_n}$ -- where each
$\mathbb{Z}_{q_i}$ corresponds to integers modulo $q_i$. Herein, we develop
GFast, a coding theoretic algorithm that computes the $S$-sparse Fourier
transform of $f$ with a sample complexity of $O(Sn)$, computational complexity
of $O(Sn \log N)$, and a failure probability that approaches zero as
$N=\prod_{i=1}^n q_i \rightarrow \infty$ with $S = N^\delta$ for some $0 \leq
\delta < 1$. We show that a noise-robust version of GFast computes the
transform with a sample complexity of $O(Sn^2)$ and computational complexity of
$O(Sn^2 \log N)$ under the same high probability guarantees. Additionally, we
demonstrate that GFast computes the sparse Fourier transform of generalized
$q$-ary functions $8\times$ faster using $16\times$ fewer samples on synthetic
experiments, and enables explaining real-world heart disease diagnosis and
protein fitness models using up to $13\times$ fewer samples compared to
existing Fourier algorithms applied to the most efficient parameterization of
the models as $q$-ary functions.
Darin Tsui
Kunal Talreja
Amirali Aghazadeh
http://arxiv.org/abs/2504.14730v1
2025-04-20T20:04:41Z
2025-04-20T20:04:41Z
Optimal Additive Noise Mechanisms for Differential Privacy
We propose a unified optimization framework for designing continuous and
discrete noise distributions that ensure differential privacy (DP) by
minimizing R\'enyi DP, a variant of DP, under a cost constraint. R\'enyi DP has
the advantage that by considering different values of the R\'enyi parameter
$\alpha$, we can tailor our optimization for any number of compositions. To
solve the optimization problem, we reduce it to a finite-dimensional convex
formulation and perform preconditioned gradient descent. The resulting noise
distributions are then compared to their Gaussian and Laplace counterparts.
Numerical results demonstrate that our optimized distributions are consistently
better, with significant improvements in $(\varepsilon, \delta)$-DP guarantees
in the moderate composition regimes, compared to Gaussian and Laplace
distributions with the same variance.
Atefeh Gilani
Juan Felipe Gomez
Shahab Asoodeh
Flavio P. Calmon
Oliver Kosut
Lalitha Sankar
http://arxiv.org/abs/2504.14702v1
2025-04-20T18:31:25Z
2025-04-20T18:31:25Z
Additive energy, uncertainty principle and signal recovery mechanisms
Given a signal $f:G\to\mathbb{C}$, where $G$ is a finite abelian group, under
what reasonable assumptions can we guarantee the exact recovery of $f$ from a
proper subset of its Fourier coefficients? In 1989, Donoho and Stark
established a result \cite{DS89} using the classical uncertainty principle,
which states that $|\text{supp}(f)|\cdot|\text{supp}(\hat{f})|\geq |G|$ for any
nonzero signal $f$. Another result, first proven by Santose and Symes
\cite{SS86}, was based on the Logan phenomenon \cite{L65}. In particular, the
result showcases how the $L^1$ and $L^2$ minimizing signals with matching
Fourier frequencies often recovers the original signal.
The purpose of this paper is to relate these recovery mechanisms to additive
energy, a combinatorial measure denoted and defined by $$\Lambda(A)=\left|
\left\{ (x_1, x_2, x_3, x_4) \in A^4 \mid x_1 + x_2 = x_3 + x_4 \right\}
\right|,$$ where $A\subset\mathbb{Z}_N^d$. In the first part of this paper, we
use combinatorial techniques to establish an improved variety of the
uncertainty principle in terms of additive energy. In a similar fashion as the
Donoho-Stark argument, we use this principle to establish an often stronger
recovery condition. In the latter half of the paper, we invoke these
combinatorial methods to demonstrate two $L^p$ minimizing recovery results.
K. Aldahleh
A. Iosevich
J. Iosevich
J. Jaimangal
A. Mayeli
S. Pack
http://arxiv.org/abs/2504.14696v1
2025-04-20T18:20:11Z
2025-04-20T18:20:11Z
Reveal-or-Obscure: A Differentially Private Sampling Algorithm for
Discrete Distributions
We introduce a differentially private (DP) algorithm called reveal-or-obscure
(ROO) to generate a single representative sample from a dataset of $n$
observations drawn i.i.d. from an unknown discrete distribution $P$. Unlike
methods that add explicit noise to the estimated empirical distribution, ROO
achieves $\epsilon$-differential privacy by randomly choosing whether to
"reveal" or "obscure" the empirical distribution. While ROO is structurally
identical to Algorithm 1 proposed by Cheu and Nayak (arXiv:2412.10512), we
prove a strictly better bound on the sampling complexity than that established
in Theorem 12 of (arXiv:2412.10512). To further improve the privacy-utility
trade-off, we propose a novel generalized sampling algorithm called
Data-Specific ROO (DS-ROO), where the probability of obscuring the empirical
distribution of the dataset is chosen adaptively. We prove that DS-ROO
satisfies $\epsilon$-DP, and provide empirical evidence that DS-ROO can achieve
better utility under the same privacy budget of vanilla ROO.
Naima Tasnim
Atefeh Gilani
Lalitha Sankar
Oliver Kosut
8 pages, 3 figures
http://arxiv.org/abs/2504.14674v1
2025-04-20T16:33:57Z
2025-04-20T16:33:57Z
Binary cyclic codes from permutation polynomials over $\mathbb{F}_{2^m}$
Binary cyclic codes having large dimensions and minimum distances close to
the square-root bound are highly valuable in applications where high-rate
transmission and robust error correction are both essential. They provide an
optimal trade-off between these two factors, making them suitable for demanding
communication and storage systems, post-quantum cryptography, radar and sonar
systems, wireless sensor networks, and space communications. This paper aims to
investigate cyclic codes by an efficient approach introduced by Ding
\cite{SETA5} from several known classes of permutation monomials and trinomials
over $\mathbb{F}_{2^m}$. We present several infinite families of binary cyclic
codes of length $2^m-1$ with dimensions larger than $(2^m-1)/2$. By applying
the Hartmann-Tzeng bound, some of the lower bounds on the minimum distances of
these cyclic codes are relatively close to the square root bound. Moreover, we
obtain a new infinite family of optimal binary cyclic codes with parameters
$[2^m-1,2^m-2-3m,8]$, where $m\geq 5$ is odd, according to the sphere-packing
bound.
Mrinal Kanti Bose
Udaya Parampalli
Abhay Kumar Singh
http://arxiv.org/abs/2504.14659v1
2025-04-20T15:42:41Z
2025-04-20T15:42:41Z
Markovian Continuity of the MMSE
Minimum mean square error (MMSE) estimation is widely used in signal
processing and related fields. While it is known to be non-continuous with
respect to all standard notions of stochastic convergence, it remains robust in
practical applications. In this work, we review the known counterexamples to
the continuity of the MMSE. We observe that, in these counterexamples, the
discontinuity arises from an element in the converging measurement sequence
providing more information about the estimand than the limit of the measurement
sequence. We argue that this behavior is uncharacteristic of real-world
applications and introduce a new stochastic convergence notion, termed
Markovian convergence, to address this issue. We prove that the MMSE is, in
fact, continuous under this new notion. We supplement this result with
semi-continuity and continuity guarantees of the MMSE in other settings and
prove the continuity of the MMSE under linear estimation.
Elad Domanovitz
Anatoly Khina
http://arxiv.org/abs/2504.14653v1
2025-04-20T15:25:58Z
2025-04-20T15:25:58Z
Wireless Large AI Model: Shaping the AI-Native Future of 6G and Beyond
The emergence of sixth-generation and beyond communication systems is
expected to fundamentally transform digital experiences through introducing
unparalleled levels of intelligence, efficiency, and connectivity. A promising
technology poised to enable this revolutionary vision is the wireless large AI
model (WLAM), characterized by its exceptional capabilities in data processing,
inference, and decision-making. In light of these remarkable capabilities, this
paper provides a comprehensive survey of WLAM, elucidating its fundamental
principles, diverse applications, critical challenges, and future research
opportunities. We begin by introducing the background of WLAM and analyzing the
key synergies with wireless networks, emphasizing the mutual benefits.
Subsequently, we explore the foundational characteristics of WLAM, delving into
their unique relevance in wireless environments. Then, the role of WLAM in
optimizing wireless communication systems across various use cases and the
reciprocal benefits are systematically investigated. Furthermore, we discuss
the integration of WLAM with emerging technologies, highlighting their
potential to enable transformative capabilities and breakthroughs in wireless
communication. Finally, we thoroughly examine the high-level challenges
hindering the practical implementation of WLAM and discuss pivotal future
research directions.
Fenghao Zhu
Xinquan Wang
Xinyi Li
Maojun Zhang
Yixuan Chen
Chongwen Huang
Zhaohui Yang
Xiaoming Chen
Zhaoyang Zhang
Richeng Jin
Yongming Huang
Wei Feng
Tingting Yang
Baoming Bai
Feifei Gao
Kun Yang
Yuanwen Liu
Sami Muhaidat
Chau Yuen
Kaibin Huang
Kai-Kit Wong
Dusit Niyato
Mérouane Debbah
http://arxiv.org/abs/2501.06801v2
2025-04-20T14:05:01Z
2025-01-12T12:48:49Z
Optimizing Sequencing Coverage Depth in DNA Storage: Insights From DNA
Storage Data
DNA storage is now being considered as a new archival storage method for its
durability and high information density, but still facing some challenges like
high costs and low throughput. By reducing sequencing sample size for decoding
digital data, minimizing DNA coverage depth helps lower both costs and system
latency. Previous studies have mainly focused on minimizing coverage depth in
uniform distribution channels under theoretical assumptions. In contrast, our
work uses real DNA storage experimental data to extend this problem to
log-normal distribution channels, a conclusion derived from our PCR and
sequencing data analysis. In this framework, we investigate both noiseless and
noisy channels. We first demonstrate a detailed positive correlation between
MDS code rate and the expected minimum sequencing coverage depth. Moreover, we
observe that the probability of successfully decoding all information in a
single sequencing run decreases and then increases as code rate rises, when the
sample size is optimized for complete decoding. Then we extend the lower bounds
of the DNA coverage depth from uniform to log-normal noisy channels. The
findings of this study provide valuable insights for the efficient execution of
DNA storage experiments.
Ruiying Cao
Xin Chen
This version adds a reference in the introduction, improves the
problem description in Section 2, replaces the original Figure 5 with Table
2, and corrects minor grammatical and punctuation issues
http://arxiv.org/abs/2504.14615v1
2025-04-20T13:46:26Z
2025-04-20T13:46:26Z
Semantic HARQ for Intelligent Transportation Systems: Joint
Source-Channel Coding-Powered Reliable Retransmissions
The surge of data traffic in Intelligent Transportation Systems (ITS) places
a significant challenge on limited wireless resources. Semantic communication,
which transmits essential semantics of the raw data, offers a promising
solution by reducing redundancy and improving spectrum efficiency. However,
high vehicle mobility, dynamic channel conditions, and dense vehicular networks
severely impact transmission reliability in ITS. To address these limitations,
we integrate Hybrid Automatic Repeat reQuest (HARQ) with Joint Source-Channel
Coding (JSCC) to provide reliable semantic communications for ITS. To
counteract the adverse effects of time-varying fading channels and noise, we
propose a generative signal reconstructor module supported by a local knowledge
base, which employs a discriminator for channel error detection and a
conditional generative network for error correction. We propose three
innovative semantic HARQ (sem-HARQ) schemes, Type I sem-HARQ (sem-HARQ-I),
sem-HARQ with weighted combining (sem-HARQ-WC), and sem-HARQ with synonymous
combining (sem-HARQ-SC) to enable reliable JSCC-based semantic communications.
At the transmitter, both sem-HARQ-I and sem-HARQ-WC retransmit the same
semantic signals, while sem-HARQ-SC introduces redundant semantics across
different HARQ rounds through synonymous mapping. At the receiver, sem-HARQ-I
performs semantic decoding based solely on the currently received signal. In
contrast, sem-HARQ-WC enhances reliability by fusing the current received
semantic signal with prior erroneous signals at the feature or decision level,
thereby exploiting semantic information from failed HARQ rounds. Similarly,
sem-HARQ-SC employs feature-level combining, leveraging incremental semantic
redundancy to merge semantic features from retransmissions.
Yongkang Li
Xu Wang
Zheng Shi
Yaru Fu
http://arxiv.org/abs/2504.09580v2
2025-04-20T13:42:21Z
2025-04-13T14:01:10Z
Bounds and Optimal Constructions of Generalized Merge-Convertible Codes
for Code Conversion into LRCs
Error-correcting codes are essential for ensuring fault tolerance in modern
distributed data storage systems. However, in practice, factors such as the
failure rates of storage devices can vary significantly over time, resulting in
changes to the optimal code parameters. To reduce storage cost while
maintaining efficiency, Maturana and Rashmi introduced a theoretical framework
known as code conversion, which enables dynamic adjustment of code parameters
according to device performance. In this paper, we focus exclusively on the
bounds and constructions of generalized merge-convertible codes. First, we
establish a new lower bound on the access cost when the final code is an
$(r,\delta)$-LRC. This bound unifies and generalizes all previously known
bounds for merge conversion, where the initial and final codes are either LRCs
or MDS codes. We then construct a family of access-optimal MDS convertible
codes by leveraging subgroups of the automorphism group of a rational function
field. It is worth noting that our construction is also per-symbol read
access-optimal. Next, we further extend our MDS-based construction to design
access-optimal convertible codes for the conversion between $(r,\delta)$-LRCs
with parameters that have not been previously reported. Finally, using the
parity-check matrix approach, we present a construction of access-optimal
convertible codes that enable merge conversion from MDS codes to an
$(r,\delta)$-LRC. To the best of our knowledge, this is the first explicit
optimal construction of code conversion between MDS codes and LRCs. All of our
constructions are performed over finite fields whose sizes grow linearly with
the code length.
Haoming Shi
Weijun Fang
Yuan Gao
http://arxiv.org/abs/2504.14605v1
2025-04-20T13:09:21Z
2025-04-20T13:09:21Z
Generalized Derangetropy Functionals for Modeling Cyclical Information
Flow
This paper introduces a framework for modeling cyclical and feedback-driven
information flow through a generalized family of entropy-modulated
transformations called derangetropy functionals. Unlike scalar and static
entropy measures such as Shannon entropy, these functionals act directly on
probability densities and provide a topographical representation of information
structure across the support of the distribution. The framework captures
periodic and self-referential aspects of information distribution and encodes
them through functional operators governed by nonlinear differential equations.
When applied recursively, these operators induce a spectral diffusion process
governed by the heat equation, leading to convergence toward a Gaussian
characteristic function. This convergence theorem provides a unified analytical
foundation for describing the long-term dynamics of information under cyclic
modulation. The proposed framework offers new tools for analyzing the temporal
evolution of information in systems characterized by periodic structure,
stochastic feedback, and delayed interaction, with applications in artificial
neural networks, communication theory, and non-equilibrium statistical
mechanics.
Masoud Ataei
Xiaogang Wang
http://arxiv.org/abs/2504.09745v2
2025-04-20T07:48:09Z
2025-04-13T22:44:23Z
SegOTA: Accelerating Over-the-Air Federated Learning with Segmented
Transmission
Federated learning (FL) with over-the-air computation efficiently utilizes
the communication resources, but it can still experience significant latency
when each device transmits a large number of model parameters to the server.
This paper proposes the Segmented Over-The-Air (SegOTA) method for FL, which
reduces latency by partitioning devices into groups and letting each group
transmit only one segment of the model parameters in each communication round.
Considering a multi-antenna server, we model the SegOTA transmission and
reception process to establish an upper bound on the expected model learning
optimality gap. We minimize this upper bound, by formulating the per-round
online optimization of device grouping and joint transmit-receive beamforming,
for which we derive efficient closed-form solutions. Simulation results show
that our proposed SegOTA substantially outperforms the conventional full-model
OTA approach and other common alternatives.
Chong Zhang
Min Dong
Ben Liang
Ali Afana
Yahia Ahmed
8 pages, 4 figures. Accepted by the International Symposium on
Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt),
2025
http://arxiv.org/abs/2504.14463v1
2025-04-20T02:49:12Z
2025-04-20T02:49:12Z
Joint Channel Estimation and Signal Detection for MIMO-OFDM: A Novel
Data-Aided Approach with Reduced Computational Overhead
The acquisition of channel state information (CSI) is essential in MIMO-OFDM
communication systems. Data-aided enhanced receivers, by incorporating domain
knowledge, effectively mitigate performance degradation caused by imperfect
CSI, particularly in dynamic wireless environments. However, existing
methodologies face notable challenges: they either refine channel estimates
within MIMO subsystems separately, which proves ineffective due to deviations
from assumptions regarding the time-varying nature of channels, or fully
exploit the time-frequency characteristics but incur significantly high
computational overhead due to dimensional concatenation. To address these
issues, this study introduces a novel data-aided method aimed at reducing
complexity, particularly suited for fast-fading scenarios in fifth-generation
(5G) and beyond networks. We derive a general form of a data-aided linear
minimum mean-square error (LMMSE)-based algorithm, optimized for iterative
joint channel estimation and signal detection. Additionally, we propose a
computationally efficient alternative to this algorithm, which achieves
comparable performance with significantly reduced complexity. Empirical
evaluations reveal that our proposed algorithms outperform several
state-of-the-art approaches across various MIMO-OFDM configurations, pilot
sequence lengths, and in the presence of time variability. Comparative analysis
with basis expansion model-based iterative receivers highlights the superiority
of our algorithms in achieving an effective trade-off between accuracy and
computational complexity.
Xinjie Li
Jing Zhang
Xingyu Zhou
Chao-Kai Wen
Shi Jin
This work has been submitted to the IEEE for possible publication
http://arxiv.org/abs/2504.14410v1
2025-04-19T21:50:21Z
2025-04-19T21:50:21Z
On the Redundancy of Function-Correcting Codes over Finite Fields
Function-correcting codes (FCCs) are a class of codes introduced by Lenz et
al. (2023) that protect specific function evaluations of a message against
errors, imposing a less stringent distance requirement than classical
error-correcting codes (ECCs) and thereby allowing for reduced redundancy. For
FCCs over binary field, a lower bound on the optimal redundancy for function
correction was established by Lenz et al., and we derive an upper bound that
remains within a logarithmic factor of this lower bound. We extend this result
by proving that the same lower bound holds for any q-ary finite field.
Furthermore, we show that for sufficiently large fields, this bound is tight by
proving it also serves as an upper bound. In addition, we construct an encoding
scheme that achieves this optimal redundancy. Finally, motivated by these two
extremal regimes, we conjecture that our bound continues to serve as a valid
upper bound across all finite fields.
Hoang Ly
Emina Soljanin