http://arxiv.org/api/e3ZRHWMj3rfSH/XxrNh6tM1yezw 2025-04-22T00:00:00-04:00 49781 15 15 http://arxiv.org/abs/2504.14778v1 2025-04-21T00:31:22Z 2025-04-21T00:31:22Z Optimal Linear MAP Decoding of Convolutional Codes In this paper, we propose a linear representation of BCJR maximum a posteriori probability (MAP) decoding of a rate 1/2 convolutional code (CC), referred to as the linear MAP decoding (LMAP). We discover that the MAP forward and backward decoding can be implemented by the corresponding dual soft input and soft output (SISO) encoders using shift registers. The bidrectional MAP decoding output can be obtained by combining the contents of respective forward and backward dual encoders. Represented using simple shift-registers, LMAP decoder maps naturally to hardware registers and thus can be easily implemented. Simulation results demonstrate that the LMAP decoding achieves the same performance as the BCJR MAP decoding, but has a significantly reduced decoding delay. For the block length 64, the CC of the memory length 14 with LMAP decoding surpasses the random coding union (RCU) bound by approximately 0.5 dB at a BLER of $10^{-3}$, and closely approaches both the normal approximation (NA) and meta-converse (MC) bounds. Yonghui Li Chentao Yue Branka Vucetic Accepted by ISIT 2025 http://arxiv.org/abs/2501.12365v2 2025-04-21T00:23:46Z 2025-01-21T18:45:09Z Efficient Algorithm for Sparse Fourier Transform of Generalized $q$-ary Functions Computing the Fourier transform of a $q$-ary function $f:\mathbb{Z}_{q}^n\rightarrow \mathbb{R}$, which maps $q$-ary sequences to real numbers, is an important problem in mathematics with wide-ranging applications in biology, signal processing, and machine learning. Previous studies have shown that, under the sparsity assumption, the Fourier transform can be computed efficiently using fast and sample-efficient algorithms. However, in most practical settings, the function is defined over a more general space -- the space of generalized $q$-ary sequences $\mathbb{Z}_{q_1} \times \mathbb{Z}_{q_2} \times \cdots \times \mathbb{Z}_{q_n}$ -- where each $\mathbb{Z}_{q_i}$ corresponds to integers modulo $q_i$. Herein, we develop GFast, a coding theoretic algorithm that computes the $S$-sparse Fourier transform of $f$ with a sample complexity of $O(Sn)$, computational complexity of $O(Sn \log N)$, and a failure probability that approaches zero as $N=\prod_{i=1}^n q_i \rightarrow \infty$ with $S = N^\delta$ for some $0 \leq \delta < 1$. We show that a noise-robust version of GFast computes the transform with a sample complexity of $O(Sn^2)$ and computational complexity of $O(Sn^2 \log N)$ under the same high probability guarantees. Additionally, we demonstrate that GFast computes the sparse Fourier transform of generalized $q$-ary functions $8\times$ faster using $16\times$ fewer samples on synthetic experiments, and enables explaining real-world heart disease diagnosis and protein fitness models using up to $13\times$ fewer samples compared to existing Fourier algorithms applied to the most efficient parameterization of the models as $q$-ary functions. Darin Tsui Kunal Talreja Amirali Aghazadeh http://arxiv.org/abs/2504.14730v1 2025-04-20T20:04:41Z 2025-04-20T20:04:41Z Optimal Additive Noise Mechanisms for Differential Privacy We propose a unified optimization framework for designing continuous and discrete noise distributions that ensure differential privacy (DP) by minimizing R\'enyi DP, a variant of DP, under a cost constraint. R\'enyi DP has the advantage that by considering different values of the R\'enyi parameter $\alpha$, we can tailor our optimization for any number of compositions. To solve the optimization problem, we reduce it to a finite-dimensional convex formulation and perform preconditioned gradient descent. The resulting noise distributions are then compared to their Gaussian and Laplace counterparts. Numerical results demonstrate that our optimized distributions are consistently better, with significant improvements in $(\varepsilon, \delta)$-DP guarantees in the moderate composition regimes, compared to Gaussian and Laplace distributions with the same variance. Atefeh Gilani Juan Felipe Gomez Shahab Asoodeh Flavio P. Calmon Oliver Kosut Lalitha Sankar http://arxiv.org/abs/2504.14702v1 2025-04-20T18:31:25Z 2025-04-20T18:31:25Z Additive energy, uncertainty principle and signal recovery mechanisms Given a signal $f:G\to\mathbb{C}$, where $G$ is a finite abelian group, under what reasonable assumptions can we guarantee the exact recovery of $f$ from a proper subset of its Fourier coefficients? In 1989, Donoho and Stark established a result \cite{DS89} using the classical uncertainty principle, which states that $|\text{supp}(f)|\cdot|\text{supp}(\hat{f})|\geq |G|$ for any nonzero signal $f$. Another result, first proven by Santose and Symes \cite{SS86}, was based on the Logan phenomenon \cite{L65}. In particular, the result showcases how the $L^1$ and $L^2$ minimizing signals with matching Fourier frequencies often recovers the original signal. The purpose of this paper is to relate these recovery mechanisms to additive energy, a combinatorial measure denoted and defined by $$\Lambda(A)=\left| \left\{ (x_1, x_2, x_3, x_4) \in A^4 \mid x_1 + x_2 = x_3 + x_4 \right\} \right|,$$ where $A\subset\mathbb{Z}_N^d$. In the first part of this paper, we use combinatorial techniques to establish an improved variety of the uncertainty principle in terms of additive energy. In a similar fashion as the Donoho-Stark argument, we use this principle to establish an often stronger recovery condition. In the latter half of the paper, we invoke these combinatorial methods to demonstrate two $L^p$ minimizing recovery results. K. Aldahleh A. Iosevich J. Iosevich J. Jaimangal A. Mayeli S. Pack http://arxiv.org/abs/2504.14696v1 2025-04-20T18:20:11Z 2025-04-20T18:20:11Z Reveal-or-Obscure: A Differentially Private Sampling Algorithm for Discrete Distributions We introduce a differentially private (DP) algorithm called reveal-or-obscure (ROO) to generate a single representative sample from a dataset of $n$ observations drawn i.i.d. from an unknown discrete distribution $P$. Unlike methods that add explicit noise to the estimated empirical distribution, ROO achieves $\epsilon$-differential privacy by randomly choosing whether to "reveal" or "obscure" the empirical distribution. While ROO is structurally identical to Algorithm 1 proposed by Cheu and Nayak (arXiv:2412.10512), we prove a strictly better bound on the sampling complexity than that established in Theorem 12 of (arXiv:2412.10512). To further improve the privacy-utility trade-off, we propose a novel generalized sampling algorithm called Data-Specific ROO (DS-ROO), where the probability of obscuring the empirical distribution of the dataset is chosen adaptively. We prove that DS-ROO satisfies $\epsilon$-DP, and provide empirical evidence that DS-ROO can achieve better utility under the same privacy budget of vanilla ROO. Naima Tasnim Atefeh Gilani Lalitha Sankar Oliver Kosut 8 pages, 3 figures http://arxiv.org/abs/2504.14674v1 2025-04-20T16:33:57Z 2025-04-20T16:33:57Z Binary cyclic codes from permutation polynomials over $\mathbb{F}_{2^m}$ Binary cyclic codes having large dimensions and minimum distances close to the square-root bound are highly valuable in applications where high-rate transmission and robust error correction are both essential. They provide an optimal trade-off between these two factors, making them suitable for demanding communication and storage systems, post-quantum cryptography, radar and sonar systems, wireless sensor networks, and space communications. This paper aims to investigate cyclic codes by an efficient approach introduced by Ding \cite{SETA5} from several known classes of permutation monomials and trinomials over $\mathbb{F}_{2^m}$. We present several infinite families of binary cyclic codes of length $2^m-1$ with dimensions larger than $(2^m-1)/2$. By applying the Hartmann-Tzeng bound, some of the lower bounds on the minimum distances of these cyclic codes are relatively close to the square root bound. Moreover, we obtain a new infinite family of optimal binary cyclic codes with parameters $[2^m-1,2^m-2-3m,8]$, where $m\geq 5$ is odd, according to the sphere-packing bound. Mrinal Kanti Bose Udaya Parampalli Abhay Kumar Singh http://arxiv.org/abs/2504.14659v1 2025-04-20T15:42:41Z 2025-04-20T15:42:41Z Markovian Continuity of the MMSE Minimum mean square error (MMSE) estimation is widely used in signal processing and related fields. While it is known to be non-continuous with respect to all standard notions of stochastic convergence, it remains robust in practical applications. In this work, we review the known counterexamples to the continuity of the MMSE. We observe that, in these counterexamples, the discontinuity arises from an element in the converging measurement sequence providing more information about the estimand than the limit of the measurement sequence. We argue that this behavior is uncharacteristic of real-world applications and introduce a new stochastic convergence notion, termed Markovian convergence, to address this issue. We prove that the MMSE is, in fact, continuous under this new notion. We supplement this result with semi-continuity and continuity guarantees of the MMSE in other settings and prove the continuity of the MMSE under linear estimation. Elad Domanovitz Anatoly Khina http://arxiv.org/abs/2504.14653v1 2025-04-20T15:25:58Z 2025-04-20T15:25:58Z Wireless Large AI Model: Shaping the AI-Native Future of 6G and Beyond The emergence of sixth-generation and beyond communication systems is expected to fundamentally transform digital experiences through introducing unparalleled levels of intelligence, efficiency, and connectivity. A promising technology poised to enable this revolutionary vision is the wireless large AI model (WLAM), characterized by its exceptional capabilities in data processing, inference, and decision-making. In light of these remarkable capabilities, this paper provides a comprehensive survey of WLAM, elucidating its fundamental principles, diverse applications, critical challenges, and future research opportunities. We begin by introducing the background of WLAM and analyzing the key synergies with wireless networks, emphasizing the mutual benefits. Subsequently, we explore the foundational characteristics of WLAM, delving into their unique relevance in wireless environments. Then, the role of WLAM in optimizing wireless communication systems across various use cases and the reciprocal benefits are systematically investigated. Furthermore, we discuss the integration of WLAM with emerging technologies, highlighting their potential to enable transformative capabilities and breakthroughs in wireless communication. Finally, we thoroughly examine the high-level challenges hindering the practical implementation of WLAM and discuss pivotal future research directions. Fenghao Zhu Xinquan Wang Xinyi Li Maojun Zhang Yixuan Chen Chongwen Huang Zhaohui Yang Xiaoming Chen Zhaoyang Zhang Richeng Jin Yongming Huang Wei Feng Tingting Yang Baoming Bai Feifei Gao Kun Yang Yuanwen Liu Sami Muhaidat Chau Yuen Kaibin Huang Kai-Kit Wong Dusit Niyato Mérouane Debbah http://arxiv.org/abs/2501.06801v2 2025-04-20T14:05:01Z 2025-01-12T12:48:49Z Optimizing Sequencing Coverage Depth in DNA Storage: Insights From DNA Storage Data DNA storage is now being considered as a new archival storage method for its durability and high information density, but still facing some challenges like high costs and low throughput. By reducing sequencing sample size for decoding digital data, minimizing DNA coverage depth helps lower both costs and system latency. Previous studies have mainly focused on minimizing coverage depth in uniform distribution channels under theoretical assumptions. In contrast, our work uses real DNA storage experimental data to extend this problem to log-normal distribution channels, a conclusion derived from our PCR and sequencing data analysis. In this framework, we investigate both noiseless and noisy channels. We first demonstrate a detailed positive correlation between MDS code rate and the expected minimum sequencing coverage depth. Moreover, we observe that the probability of successfully decoding all information in a single sequencing run decreases and then increases as code rate rises, when the sample size is optimized for complete decoding. Then we extend the lower bounds of the DNA coverage depth from uniform to log-normal noisy channels. The findings of this study provide valuable insights for the efficient execution of DNA storage experiments. Ruiying Cao Xin Chen This version adds a reference in the introduction, improves the problem description in Section 2, replaces the original Figure 5 with Table 2, and corrects minor grammatical and punctuation issues http://arxiv.org/abs/2504.14615v1 2025-04-20T13:46:26Z 2025-04-20T13:46:26Z Semantic HARQ for Intelligent Transportation Systems: Joint Source-Channel Coding-Powered Reliable Retransmissions The surge of data traffic in Intelligent Transportation Systems (ITS) places a significant challenge on limited wireless resources. Semantic communication, which transmits essential semantics of the raw data, offers a promising solution by reducing redundancy and improving spectrum efficiency. However, high vehicle mobility, dynamic channel conditions, and dense vehicular networks severely impact transmission reliability in ITS. To address these limitations, we integrate Hybrid Automatic Repeat reQuest (HARQ) with Joint Source-Channel Coding (JSCC) to provide reliable semantic communications for ITS. To counteract the adverse effects of time-varying fading channels and noise, we propose a generative signal reconstructor module supported by a local knowledge base, which employs a discriminator for channel error detection and a conditional generative network for error correction. We propose three innovative semantic HARQ (sem-HARQ) schemes, Type I sem-HARQ (sem-HARQ-I), sem-HARQ with weighted combining (sem-HARQ-WC), and sem-HARQ with synonymous combining (sem-HARQ-SC) to enable reliable JSCC-based semantic communications. At the transmitter, both sem-HARQ-I and sem-HARQ-WC retransmit the same semantic signals, while sem-HARQ-SC introduces redundant semantics across different HARQ rounds through synonymous mapping. At the receiver, sem-HARQ-I performs semantic decoding based solely on the currently received signal. In contrast, sem-HARQ-WC enhances reliability by fusing the current received semantic signal with prior erroneous signals at the feature or decision level, thereby exploiting semantic information from failed HARQ rounds. Similarly, sem-HARQ-SC employs feature-level combining, leveraging incremental semantic redundancy to merge semantic features from retransmissions. Yongkang Li Xu Wang Zheng Shi Yaru Fu http://arxiv.org/abs/2504.09580v2 2025-04-20T13:42:21Z 2025-04-13T14:01:10Z Bounds and Optimal Constructions of Generalized Merge-Convertible Codes for Code Conversion into LRCs Error-correcting codes are essential for ensuring fault tolerance in modern distributed data storage systems. However, in practice, factors such as the failure rates of storage devices can vary significantly over time, resulting in changes to the optimal code parameters. To reduce storage cost while maintaining efficiency, Maturana and Rashmi introduced a theoretical framework known as code conversion, which enables dynamic adjustment of code parameters according to device performance. In this paper, we focus exclusively on the bounds and constructions of generalized merge-convertible codes. First, we establish a new lower bound on the access cost when the final code is an $(r,\delta)$-LRC. This bound unifies and generalizes all previously known bounds for merge conversion, where the initial and final codes are either LRCs or MDS codes. We then construct a family of access-optimal MDS convertible codes by leveraging subgroups of the automorphism group of a rational function field. It is worth noting that our construction is also per-symbol read access-optimal. Next, we further extend our MDS-based construction to design access-optimal convertible codes for the conversion between $(r,\delta)$-LRCs with parameters that have not been previously reported. Finally, using the parity-check matrix approach, we present a construction of access-optimal convertible codes that enable merge conversion from MDS codes to an $(r,\delta)$-LRC. To the best of our knowledge, this is the first explicit optimal construction of code conversion between MDS codes and LRCs. All of our constructions are performed over finite fields whose sizes grow linearly with the code length. Haoming Shi Weijun Fang Yuan Gao http://arxiv.org/abs/2504.14605v1 2025-04-20T13:09:21Z 2025-04-20T13:09:21Z Generalized Derangetropy Functionals for Modeling Cyclical Information Flow This paper introduces a framework for modeling cyclical and feedback-driven information flow through a generalized family of entropy-modulated transformations called derangetropy functionals. Unlike scalar and static entropy measures such as Shannon entropy, these functionals act directly on probability densities and provide a topographical representation of information structure across the support of the distribution. The framework captures periodic and self-referential aspects of information distribution and encodes them through functional operators governed by nonlinear differential equations. When applied recursively, these operators induce a spectral diffusion process governed by the heat equation, leading to convergence toward a Gaussian characteristic function. This convergence theorem provides a unified analytical foundation for describing the long-term dynamics of information under cyclic modulation. The proposed framework offers new tools for analyzing the temporal evolution of information in systems characterized by periodic structure, stochastic feedback, and delayed interaction, with applications in artificial neural networks, communication theory, and non-equilibrium statistical mechanics. Masoud Ataei Xiaogang Wang http://arxiv.org/abs/2504.09745v2 2025-04-20T07:48:09Z 2025-04-13T22:44:23Z SegOTA: Accelerating Over-the-Air Federated Learning with Segmented Transmission Federated learning (FL) with over-the-air computation efficiently utilizes the communication resources, but it can still experience significant latency when each device transmits a large number of model parameters to the server. This paper proposes the Segmented Over-The-Air (SegOTA) method for FL, which reduces latency by partitioning devices into groups and letting each group transmit only one segment of the model parameters in each communication round. Considering a multi-antenna server, we model the SegOTA transmission and reception process to establish an upper bound on the expected model learning optimality gap. We minimize this upper bound, by formulating the per-round online optimization of device grouping and joint transmit-receive beamforming, for which we derive efficient closed-form solutions. Simulation results show that our proposed SegOTA substantially outperforms the conventional full-model OTA approach and other common alternatives. Chong Zhang Min Dong Ben Liang Ali Afana Yahia Ahmed 8 pages, 4 figures. Accepted by the International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt), 2025 http://arxiv.org/abs/2504.14463v1 2025-04-20T02:49:12Z 2025-04-20T02:49:12Z Joint Channel Estimation and Signal Detection for MIMO-OFDM: A Novel Data-Aided Approach with Reduced Computational Overhead The acquisition of channel state information (CSI) is essential in MIMO-OFDM communication systems. Data-aided enhanced receivers, by incorporating domain knowledge, effectively mitigate performance degradation caused by imperfect CSI, particularly in dynamic wireless environments. However, existing methodologies face notable challenges: they either refine channel estimates within MIMO subsystems separately, which proves ineffective due to deviations from assumptions regarding the time-varying nature of channels, or fully exploit the time-frequency characteristics but incur significantly high computational overhead due to dimensional concatenation. To address these issues, this study introduces a novel data-aided method aimed at reducing complexity, particularly suited for fast-fading scenarios in fifth-generation (5G) and beyond networks. We derive a general form of a data-aided linear minimum mean-square error (LMMSE)-based algorithm, optimized for iterative joint channel estimation and signal detection. Additionally, we propose a computationally efficient alternative to this algorithm, which achieves comparable performance with significantly reduced complexity. Empirical evaluations reveal that our proposed algorithms outperform several state-of-the-art approaches across various MIMO-OFDM configurations, pilot sequence lengths, and in the presence of time variability. Comparative analysis with basis expansion model-based iterative receivers highlights the superiority of our algorithms in achieving an effective trade-off between accuracy and computational complexity. Xinjie Li Jing Zhang Xingyu Zhou Chao-Kai Wen Shi Jin This work has been submitted to the IEEE for possible publication http://arxiv.org/abs/2504.14410v1 2025-04-19T21:50:21Z 2025-04-19T21:50:21Z On the Redundancy of Function-Correcting Codes over Finite Fields Function-correcting codes (FCCs) are a class of codes introduced by Lenz et al. (2023) that protect specific function evaluations of a message against errors, imposing a less stringent distance requirement than classical error-correcting codes (ECCs) and thereby allowing for reduced redundancy. For FCCs over binary field, a lower bound on the optimal redundancy for function correction was established by Lenz et al., and we derive an upper bound that remains within a logarithmic factor of this lower bound. We extend this result by proving that the same lower bound holds for any q-ary finite field. Furthermore, we show that for sufficiently large fields, this bound is tight by proving it also serves as an upper bound. In addition, we construct an encoding scheme that achieves this optimal redundancy. Finally, motivated by these two extremal regimes, we conjecture that our bound continues to serve as a valid upper bound across all finite fields. Hoang Ly Emina Soljanin