-
ARA-O-RAN: End-to-End Programmable O-RAN Living Lab for Agriculture and Rural Communities
Authors:
Tianyi Zhang,
Joshua Ofori Boateng,
Taimoor UI Islam,
Arsalan Ahmad,
Hongwei Zhang,
Daji Qiao
Abstract:
As wireless networks evolve towards open architectures like O-RAN, testing, and integration platforms are crucial to address challenges like interoperability. This paper describes ARA-O-RAN, a novel O-RAN testbed established through the NSF Platforms for Advanced Wireless Research (PAWR) ARA platform. ARA provides an at-scale rural wireless living lab focused on technologies for digital agricultur…
▽ More
As wireless networks evolve towards open architectures like O-RAN, testing, and integration platforms are crucial to address challenges like interoperability. This paper describes ARA-O-RAN, a novel O-RAN testbed established through the NSF Platforms for Advanced Wireless Research (PAWR) ARA platform. ARA provides an at-scale rural wireless living lab focused on technologies for digital agriculture and rural communities. As an O-RAN Alliance certified Open Testing and Integration Centre (OTIC), ARA launched ARA-O-RAN -- the first public O-RAN testbed tailored to rural and agriculture use cases, together with the end-to-end, whole-stack programmability. ARA-O-RAN uniquely combines support for outdoor testing across a university campus, surrounding farmlands, and rural communities with a 50-node indoor sandbox. The testbed facilitates vital R\&D to implement open architectures that can meet rural connectivity needs. The paper outlines ARA-O-RAN's hardware system design, software architecture, and enabled research experiments. It also discusses plans aligned with national spectrum policy and rural spectrum innovation. ARA-O-RAN exemplifies the value of purpose-built wireless testbeds in accelerating impactful wireless research.
△ Less
Submitted 14 June, 2024;
originally announced July 2024.
-
Wireless Spectrum in Rural Farmlands: Status, Challenges and Opportunities
Authors:
Mukaram Shahid,
Kunal Das,
Taimoor Ul Islam,
Christ Somiah,
Daji Qiao,
Arsalan Ahmad,
Jimming Song,
Zhengyuan Zhu,
Sarath Babu,
Yong Guan,
Tusher Chakraborty,
Suraj Jog,
Ranveer Chandra,
Hongwei Zhang
Abstract:
Due to factors such as low population density and expansive geographical distances, network deployment falls behind in rural regions, leading to a broadband divide. Wireless spectrum serves as the blood and flesh of wireless communications. Shared white spaces such as those in the TVWS and CBRS spectrum bands offer opportunities to expand connectivity, innovate, and provide affordable access to hi…
▽ More
Due to factors such as low population density and expansive geographical distances, network deployment falls behind in rural regions, leading to a broadband divide. Wireless spectrum serves as the blood and flesh of wireless communications. Shared white spaces such as those in the TVWS and CBRS spectrum bands offer opportunities to expand connectivity, innovate, and provide affordable access to high-speed Internet in under-served areas without additional cost to expensive licensed spectrum. However, the current methods to utilize these white spaces are inefficient due to very conservative models and spectrum policies, causing under-utilization of valuable spectrum resources. This hampers the full potential of innovative wireless technologies that could benefit farmers, small Internet Service Providers (ISPs) or Mobile Network Operators (MNOs) operating in rural regions. This study explores the challenges faced by farmers and service providers when using shared spectrum bands to deploy their networks while ensuring maximum system performance and minimizing interference with other users. Additionally, we discuss how spatiotemporal spectrum models, in conjunction with database-driven spectrum-sharing solutions, can enhance the allocation and management of spectrum resources, ultimately improving the efficiency and reliability of wireless networks operating in shared spectrum bands.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Stable Minima Cannot Overfit in Univariate ReLU Networks: Generalization by Large Step Sizes
Authors:
Dan Qiao,
Kaiqi Zhang,
Esha Singh,
Daniel Soudry,
Yu-Xiang Wang
Abstract:
We study the generalization of two-layer ReLU neural networks in a univariate nonparametric regression problem with noisy labels. This is a problem where kernels (\emph{e.g.} NTK) are provably sub-optimal and benign overfitting does not happen, thus disqualifying existing theory for interpolating (0-loss, global optimal) solutions. We present a new theory of generalization for local minima that gr…
▽ More
We study the generalization of two-layer ReLU neural networks in a univariate nonparametric regression problem with noisy labels. This is a problem where kernels (\emph{e.g.} NTK) are provably sub-optimal and benign overfitting does not happen, thus disqualifying existing theory for interpolating (0-loss, global optimal) solutions. We present a new theory of generalization for local minima that gradient descent with a constant learning rate can \emph{stably} converge to. We show that gradient descent with a fixed learning rate $η$ can only find local minima that represent smooth functions with a certain weighted \emph{first order total variation} bounded by $1/η- 1/2 + \widetilde{O}(σ+ \sqrt{\mathrm{MSE}})$ where $σ$ is the label noise level, $\mathrm{MSE}$ is short for mean squared error against the ground truth, and $\widetilde{O}(\cdot)$ hides a logarithmic factor. Under mild assumptions, we also prove a nearly-optimal MSE bound of $\widetilde{O}(n^{-4/5})$ within the strict interior of the support of the $n$ data points. Our theoretical results are validated by extensive simulation that demonstrates large learning rate training induces sparse linear spline fits. To the best of our knowledge, we are the first to obtain generalization bound via minima stability in the non-interpolation case and the first to show ReLU NNs without regularization can achieve near-optimal rates in nonparametric regression.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
OpenBA-V2: Reaching 77.3% High Compression Ratio with Fast Multi-Stage Pruning
Authors:
Dan Qiao,
Yi Su,
Pinzheng Wang,
Jing Ye,
Wenjing Xie,
Yuechi Zhou,
Yuyang Ding,
Zecheng Tang,
Jikai Wang,
Yixin Ji,
Yue Wang,
Pei Guo,
Zechen Sun,
Zikang Zhang,
Juntao Li,
Pingfu Chao,
Wenliang Chen,
Guohong Fu,
Guodong Zhou,
Qiaoming Zhu,
Min Zhang
Abstract:
Large Language Models (LLMs) have played an important role in many fields due to their powerful capabilities.However, their massive number of parameters leads to high deployment requirements and incurs significant inference costs, which impedes their practical applications. Training smaller models is an effective way to address this problem. Therefore, we introduce OpenBA-V2, a 3.4B model derived…
▽ More
Large Language Models (LLMs) have played an important role in many fields due to their powerful capabilities.However, their massive number of parameters leads to high deployment requirements and incurs significant inference costs, which impedes their practical applications. Training smaller models is an effective way to address this problem. Therefore, we introduce OpenBA-V2, a 3.4B model derived from multi-stage compression and continual pre-training from the original 15B OpenBA model. OpenBA-V2 utilizes more data, more flexible training objectives, and techniques such as layer pruning, neural pruning, and vocabulary pruning to achieve a compression rate of 77.3\% with minimal performance loss. OpenBA-V2 demonstrates competitive performance compared to other open-source models of similar size, achieving results close to or on par with the 15B OpenBA model in downstream tasks such as common sense reasoning and Named Entity Recognition (NER). OpenBA-V2 illustrates that LLMs can be compressed into smaller ones with minimal performance loss by employing advanced training objectives and data strategies, which may help deploy LLMs in resource-limited scenarios.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
Exploring Wireless Channels in Rural Areas: A Comprehensive Measurement Study
Authors:
Tianyi Zhang,
Guoying Zu,
Taimoor Ul Islam,
Evan Gossling,
Sarath Babu,
Daji Qiao,
Hongwei Zhang
Abstract:
The study of wireless channel behavior has been an active research topic for many years. However, there exists a noticeable scarcity of studies focusing on wireless channel characteristics in rural areas. With the advancement of smart agriculture practices in rural regions, there has been an increasing demand for affordable, high-capacity, and low-latency wireless networks to support various preci…
▽ More
The study of wireless channel behavior has been an active research topic for many years. However, there exists a noticeable scarcity of studies focusing on wireless channel characteristics in rural areas. With the advancement of smart agriculture practices in rural regions, there has been an increasing demand for affordable, high-capacity, and low-latency wireless networks to support various precision agriculture applications such as plant phenotyping, livestock health monitoring, and agriculture automation. To address this research gap, we conducted a channel measurement study on multiple wireless frequency bands at various crop and livestock farms near Ames, Iowa, based on Iowa State University~(ISU)'s ARA Wireless Living lab - one of the NSF PAWR platforms. We specifically investigate the impact of weather conditions, humidity, temperature, and farm buildings on wireless channel behavior. The resulting measurement dataset, which will soon be made publicly accessible, represents a valuable resource for researchers interested in wireless channel prediction and optimization.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
Differentially Private Reinforcement Learning with Self-Play
Authors:
Dan Qiao,
Yu-Xiang Wang
Abstract:
We study the problem of multi-agent reinforcement learning (multi-agent RL) with differential privacy (DP) constraints. This is well-motivated by various real-world applications involving sensitive data, where it is critical to protect users' private information. We first extend the definitions of Joint DP (JDP) and Local DP (LDP) to two-player zero-sum episodic Markov Games, where both definition…
▽ More
We study the problem of multi-agent reinforcement learning (multi-agent RL) with differential privacy (DP) constraints. This is well-motivated by various real-world applications involving sensitive data, where it is critical to protect users' private information. We first extend the definitions of Joint DP (JDP) and Local DP (LDP) to two-player zero-sum episodic Markov Games, where both definitions ensure trajectory-wise privacy protection. Then we design a provably efficient algorithm based on optimistic Nash value iteration and privatization of Bernstein-type bonuses. The algorithm is able to satisfy JDP and LDP requirements when instantiated with appropriate privacy mechanisms. Furthermore, for both notions of DP, our regret bound generalizes the best known result under the single-agent RL case, while our regret could also reduce to the best known result for multi-agent RL without privacy constraints. To the best of our knowledge, these are the first line of results towards understanding trajectory-wise privacy protection in multi-agent RL.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
Improving behavior based authentication against adversarial attack using XAI
Authors:
Dong Qin,
George Amariucai,
Daji Qiao,
Yong Guan
Abstract:
In recent years, machine learning models, especially deep neural networks, have been widely used for classification tasks in the security domain. However, these models have been shown to be vulnerable to adversarial manipulation: small changes learned by an adversarial attack model, when applied to the input, can cause significant changes in the output. Most research on adversarial attacks and cor…
▽ More
In recent years, machine learning models, especially deep neural networks, have been widely used for classification tasks in the security domain. However, these models have been shown to be vulnerable to adversarial manipulation: small changes learned by an adversarial attack model, when applied to the input, can cause significant changes in the output. Most research on adversarial attacks and corresponding defense methods focuses only on scenarios where adversarial samples are directly generated by the attack model. In this study, we explore a more practical scenario in behavior-based authentication, where adversarial samples are collected from the attacker. The generated adversarial samples from the model are replicated by attackers with a certain level of discrepancy. We propose an eXplainable AI (XAI) based defense strategy against adversarial attacks in such scenarios. A feature selector, trained with our method, can be used as a filter in front of the original authenticator. It filters out features that are more vulnerable to adversarial attacks or irrelevant to authentication, while retaining features that are more robust. Through comprehensive experiments, we demonstrate that our XAI based defense strategy is effective against adversarial attacks and outperforms other defense strategies, such as adversarial training and defensive distillation.
△ Less
Submitted 10 March, 2024; v1 submitted 26 February, 2024;
originally announced February 2024.
-
Near-Optimal Reinforcement Learning with Self-Play under Adaptivity Constraints
Authors:
Dan Qiao,
Yu-Xiang Wang
Abstract:
We study the problem of multi-agent reinforcement learning (MARL) with adaptivity constraints -- a new problem motivated by real-world applications where deployments of new policies are costly and the number of policy updates must be minimized. For two-player zero-sum Markov Games, we design a (policy) elimination based algorithm that achieves a regret of $\widetilde{O}(\sqrt{H^3 S^2 ABK})$, while…
▽ More
We study the problem of multi-agent reinforcement learning (MARL) with adaptivity constraints -- a new problem motivated by real-world applications where deployments of new policies are costly and the number of policy updates must be minimized. For two-player zero-sum Markov Games, we design a (policy) elimination based algorithm that achieves a regret of $\widetilde{O}(\sqrt{H^3 S^2 ABK})$, while the batch complexity is only $O(H+\log\log K)$. In the above, $S$ denotes the number of states, $A,B$ are the number of actions for the two players respectively, $H$ is the horizon and $K$ is the number of episodes. Furthermore, we prove a batch complexity lower bound $Ω(\frac{H}{\log_{A}K}+\log\log K)$ for all algorithms with $\widetilde{O}(\sqrt{K})$ regret bound, which matches our upper bound up to logarithmic factors. As a byproduct, our techniques naturally extend to learning bandit games and reward-free MARL within near optimal batch complexity. To the best of our knowledge, these are the first line of results towards understanding MARL with low adaptivity.
△ Less
Submitted 1 February, 2024;
originally announced February 2024.
-
Spectral Clustering for Discrete Distributions
Authors:
Zixiao Wang,
Dong Qiao,
Jicong Fan
Abstract:
Discrete distribution clustering (D2C) was often solved by Wasserstein barycenter methods. These methods are under a common assumption that clusters can be well represented by barycenters, which may not hold in many real applications. In this work, we propose a simple yet effective framework based on spectral clustering and distribution affinity measures (e.g., maximum mean discrepancy and Wassers…
▽ More
Discrete distribution clustering (D2C) was often solved by Wasserstein barycenter methods. These methods are under a common assumption that clusters can be well represented by barycenters, which may not hold in many real applications. In this work, we propose a simple yet effective framework based on spectral clustering and distribution affinity measures (e.g., maximum mean discrepancy and Wasserstein distance) for D2C. To improve the scalability, we propose to use linear optimal transport to construct affinity matrices efficiently on large datasets. We provide theoretical guarantees for the success of the proposed methods in clustering distributions. Experiments on synthetic and real data show that our methods outperform the baselines largely in terms of both clustering accuracy and computational efficiency.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
AI and Jobs: Has the Inflection Point Arrived? Evidence from an Online Labor Platform
Authors:
Dandan Qiao,
Huaxia Rui,
Qian Xiong
Abstract:
Artificial intelligence (AI) refers to the ability of machines or software to mimic or even surpass human intelligence in a given cognitive task. While humans learn by both induction and deduction, the success of current AI is rooted in induction, relying on its ability to detect statistical regularities in task input -- an ability learnt from a vast amount of training data using enormous computat…
▽ More
Artificial intelligence (AI) refers to the ability of machines or software to mimic or even surpass human intelligence in a given cognitive task. While humans learn by both induction and deduction, the success of current AI is rooted in induction, relying on its ability to detect statistical regularities in task input -- an ability learnt from a vast amount of training data using enormous computation resources. We examine the performance of such a statistical AI in a human task through the lens of four factors, including task learnability, statistical resource, computation resource, and learning techniques, and then propose a three-phase visual framework to understand the evolving relation between AI and jobs. Based on this conceptual framework, we develop a simple economic model of competition to show the existence of an inflection point for each occupation. Before AI performance crosses the inflection point, human workers always benefit from an improvement in AI performance, but after the inflection point, human workers become worse off whenever such an improvement occurs. To offer empirical evidence, we first argue that AI performance has passed the inflection point for the occupation of translation but not for the occupation of web development. We then study how the launch of ChatGPT, which led to significant improvement of AI performance on many tasks, has affected workers in these two occupations on a large online labor platform. Consistent with the inflection point conjecture, we find that translators are negatively affected by the shock both in terms of the number of accepted jobs and the earnings from those jobs, while web developers are positively affected by the very same shock. Given the potentially large disruption of AI on employment, more studies on more occupations using data from different platforms are urgently needed.
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
A Comprehensive and Reliable Feature Attribution Method: Double-sided Remove and Reconstruct (DoRaR)
Authors:
Dong Qin,
George Amariucai,
Daji Qiao,
Yong Guan,
Shen Fu
Abstract:
The limited transparency of the inner decision-making mechanism in deep neural networks (DNN) and other machine learning (ML) models has hindered their application in several domains. In order to tackle this issue, feature attribution methods have been developed to identify the crucial features that heavily influence decisions made by these black box models. However, many feature attribution metho…
▽ More
The limited transparency of the inner decision-making mechanism in deep neural networks (DNN) and other machine learning (ML) models has hindered their application in several domains. In order to tackle this issue, feature attribution methods have been developed to identify the crucial features that heavily influence decisions made by these black box models. However, many feature attribution methods have inherent downsides. For example, one category of feature attribution methods suffers from the artifacts problem, which feeds out-of-distribution masked inputs directly through the classifier that was originally trained on natural data points. Another category of feature attribution method finds explanations by using jointly trained feature selectors and predictors. While avoiding the artifacts problem, this new category suffers from the Encoding Prediction in the Explanation (EPITE) problem, in which the predictor's decisions rely not on the features, but on the masks that selects those features. As a result, the credibility of attribution results is undermined by these downsides. In this research, we introduce the Double-sided Remove and Reconstruct (DoRaR) feature attribution method based on several improvement methods that addresses these issues. By conducting thorough testing on MNIST, CIFAR10 and our own synthetic dataset, we demonstrate that the DoRaR feature attribution method can effectively bypass the above issues and can aid in training a feature selector that outperforms other state-of-the-art feature attribution methods. Our code is available at https://github.com/dxq21/DoRaR.
△ Less
Submitted 27 October, 2023;
originally announced October 2023.
-
CoBEVFusion: Cooperative Perception with LiDAR-Camera Bird's-Eye View Fusion
Authors:
Donghao Qiao,
Farhana Zulkernine
Abstract:
Autonomous Vehicles (AVs) use multiple sensors to gather information about their surroundings. By sharing sensor data between Connected Autonomous Vehicles (CAVs), the safety and reliability of these vehicles can be improved through a concept known as cooperative perception. However, recent approaches in cooperative perception only share single sensor information such as cameras or LiDAR. In this…
▽ More
Autonomous Vehicles (AVs) use multiple sensors to gather information about their surroundings. By sharing sensor data between Connected Autonomous Vehicles (CAVs), the safety and reliability of these vehicles can be improved through a concept known as cooperative perception. However, recent approaches in cooperative perception only share single sensor information such as cameras or LiDAR. In this research, we explore the fusion of multiple sensor data sources and present a framework, called CoBEVFusion, that fuses LiDAR and camera data to create a Bird's-Eye View (BEV) representation. The CAVs process the multi-modal data locally and utilize a Dual Window-based Cross-Attention (DWCA) module to fuse the LiDAR and camera features into a unified BEV representation. The fused BEV feature maps are shared among the CAVs, and a 3D Convolutional Neural Network is applied to aggregate the features from the CAVs. Our CoBEVFusion framework was evaluated on the cooperative perception dataset OPV2V for two perception tasks: BEV semantic segmentation and 3D object detection. The results show that our DWCA LiDAR-camera fusion model outperforms perception models with single-modal data and state-of-the-art BEV fusion models. Our overall cooperative perception architecture, CoBEVFusion, also achieves comparable performance with other cooperative perception models.
△ Less
Submitted 9 October, 2023;
originally announced October 2023.
-
OpenBA: An Open-sourced 15B Bilingual Asymmetric seq2seq Model Pre-trained from Scratch
Authors:
Juntao Li,
Zecheng Tang,
Yuyang Ding,
Pinzheng Wang,
Pei Guo,
Wangjie You,
Dan Qiao,
Wenliang Chen,
Guohong Fu,
Qiaoming Zhu,
Guodong Zhou,
Min Zhang
Abstract:
Large language models (LLMs) with billions of parameters have demonstrated outstanding performance on various natural language processing tasks. This report presents OpenBA, an open-sourced 15B bilingual asymmetric seq2seq model, to contribute an LLM variant to the Chinese-oriented open-source model community. We enhance OpenBA with effective and efficient techniques as well as adopt a three-stage…
▽ More
Large language models (LLMs) with billions of parameters have demonstrated outstanding performance on various natural language processing tasks. This report presents OpenBA, an open-sourced 15B bilingual asymmetric seq2seq model, to contribute an LLM variant to the Chinese-oriented open-source model community. We enhance OpenBA with effective and efficient techniques as well as adopt a three-stage training strategy to train the model from scratch. Our solution can also achieve very competitive performance with only 380B tokens, which is better than LLaMA-70B on the BELEBELE benchmark, BLOOM-176B on the MMLU benchmark, GLM-130B on the C-Eval (hard) benchmark. This report provides the main details to pre-train an analogous model, including pre-training data processing, Bilingual Flan data collection, the empirical observations that inspire our model architecture design, training objectives of different stages, and other enhancement techniques. Additionally, we also provide the fine-tuning details of OpenBA on four downstream tasks. We have refactored our code to follow the design principles of the Huggingface Transformers Library, making it more convenient for developers to use, and released checkpoints of different training stages at https://huggingface.co/openBA. More details of our project are available at https://github.com/OpenNLG/openBA.git.
△ Less
Submitted 1 October, 2023; v1 submitted 19 September, 2023;
originally announced September 2023.
-
GameEval: Evaluating LLMs on Conversational Games
Authors:
Dan Qiao,
Chenfei Wu,
Yaobo Liang,
Juntao Li,
Nan Duan
Abstract:
The rapid advancements in large language models (LLMs) have presented challenges in evaluating those models. Existing evaluation methods are either reference-based or preference based, which inevitably need human intervention or introduce test bias caused by evaluator models. In this paper, we propose GameEval, a novel approach to evaluating LLMs through goal-driven conversational games, overcomin…
▽ More
The rapid advancements in large language models (LLMs) have presented challenges in evaluating those models. Existing evaluation methods are either reference-based or preference based, which inevitably need human intervention or introduce test bias caused by evaluator models. In this paper, we propose GameEval, a novel approach to evaluating LLMs through goal-driven conversational games, overcoming the limitations of previous methods. GameEval treats LLMs as game players and assigns them distinct roles with specific goals achieved by launching conversations of various forms, including discussion, question answering, and voting. We design three unique games with cooperative or adversarial objectives, accompanied by corresponding evaluation metrics, to show how this new paradigm comprehensively evaluates model performance.Through extensive experiments, we show that GameEval can effectively differentiate the capabilities of various LLMs, providing a comprehensive assessment of their integrated abilities to solve complex problems. Our public anonymous code is available at https://github.com/GameEval/GameEval.
△ Less
Submitted 19 August, 2023;
originally announced August 2023.
-
Offline Policy Evaluation for Reinforcement Learning with Adaptively Collected Data
Authors:
Sunil Madhow,
Dan Qiao,
Ming Yin,
Yu-Xiang Wang
Abstract:
Developing theoretical guarantees on the sample complexity of offline RL methods is an important step towards making data-hungry RL algorithms practically viable. Currently, most results hinge on unrealistic assumptions about the data distribution -- namely that it comprises a set of i.i.d. trajectories collected by a single logging policy. We consider a more general setting where the dataset may…
▽ More
Developing theoretical guarantees on the sample complexity of offline RL methods is an important step towards making data-hungry RL algorithms practically viable. Currently, most results hinge on unrealistic assumptions about the data distribution -- namely that it comprises a set of i.i.d. trajectories collected by a single logging policy. We consider a more general setting where the dataset may have been gathered adaptively. We develop theory for the TMIS Offline Policy Evaluation (OPE) estimator in this generalized setting for tabular MDPs, deriving high-probability, instance-dependent bounds on its estimation error. We also recover minimax-optimal offline learning in the adaptive setting. Finally, we conduct simulations to empirically analyze the behavior of these estimators under adaptive and non-adaptive regimes.
△ Less
Submitted 30 April, 2024; v1 submitted 24 June, 2023;
originally announced June 2023.
-
Semantically Aligned Task Decomposition in Multi-Agent Reinforcement Learning
Authors:
Wenhao Li,
Dan Qiao,
Baoxiang Wang,
Xiangfeng Wang,
Bo Jin,
Hongyuan Zha
Abstract:
The difficulty of appropriately assigning credit is particularly heightened in cooperative MARL with sparse reward, due to the concurrent time and structural scales involved. Automatic subgoal generation (ASG) has recently emerged as a viable MARL approach inspired by utilizing subgoals in intrinsically motivated reinforcement learning. However, end-to-end learning of complex task planning from sp…
▽ More
The difficulty of appropriately assigning credit is particularly heightened in cooperative MARL with sparse reward, due to the concurrent time and structural scales involved. Automatic subgoal generation (ASG) has recently emerged as a viable MARL approach inspired by utilizing subgoals in intrinsically motivated reinforcement learning. However, end-to-end learning of complex task planning from sparse rewards without prior knowledge, undoubtedly requires massive training samples. Moreover, the diversity-promoting nature of existing ASG methods can lead to the "over-representation" of subgoals, generating numerous spurious subgoals of limited relevance to the actual task reward and thus decreasing the sample efficiency of the algorithm. To address this problem and inspired by the disentangled representation learning, we propose a novel "disentangled" decision-making method, Semantically Aligned task decomposition in MARL (SAMA), that prompts pretrained language models with chain-of-thought that can suggest potential goals, provide suitable goal decomposition and subgoal allocation as well as self-reflection-based replanning. Additionally, SAMA incorporates language-grounded RL to train each agent's subgoal-conditioned policy. SAMA demonstrates considerable advantages in sample efficiency compared to state-of-the-art ASG methods, as evidenced by its performance on two challenging sparse-reward tasks, Overcooked and MiniRTS.
△ Less
Submitted 30 September, 2023; v1 submitted 18 May, 2023;
originally announced May 2023.
-
Logarithmic Switching Cost in Reinforcement Learning beyond Linear MDPs
Authors:
Dan Qiao,
Ming Yin,
Yu-Xiang Wang
Abstract:
In many real-life reinforcement learning (RL) problems, deploying new policies is costly. In those scenarios, algorithms must solve exploration (which requires adaptivity) while switching the deployed policy sparsely (which limits adaptivity). In this paper, we go beyond the existing state-of-the-art on this problem that focused on linear Markov Decision Processes (MDPs) by considering linear Bell…
▽ More
In many real-life reinforcement learning (RL) problems, deploying new policies is costly. In those scenarios, algorithms must solve exploration (which requires adaptivity) while switching the deployed policy sparsely (which limits adaptivity). In this paper, we go beyond the existing state-of-the-art on this problem that focused on linear Markov Decision Processes (MDPs) by considering linear Bellman-complete MDPs with low inherent Bellman error. We propose the ELEANOR-LowSwitching algorithm that achieves the near-optimal regret with a switching cost logarithmic in the number of episodes and linear in the time-horizon $H$ and feature dimension $d$. We also prove a lower bound proportional to $dH$ among all algorithms with sublinear regret. In addition, we show the ``doubling trick'' used in ELEANOR-LowSwitching can be further leveraged for the generalized linear function approximation, under which we design a sample-efficient algorithm with near-optimal switching cost.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
Near-Optimal Differentially Private Reinforcement Learning
Authors:
Dan Qiao,
Yu-Xiang Wang
Abstract:
Motivated by personalized healthcare and other applications involving sensitive data, we study online exploration in reinforcement learning with differential privacy (DP) constraints. Existing work on this problem established that no-regret learning is possible under joint differential privacy (JDP) and local differential privacy (LDP) but did not provide an algorithm with optimal regret. We close…
▽ More
Motivated by personalized healthcare and other applications involving sensitive data, we study online exploration in reinforcement learning with differential privacy (DP) constraints. Existing work on this problem established that no-regret learning is possible under joint differential privacy (JDP) and local differential privacy (LDP) but did not provide an algorithm with optimal regret. We close this gap for the JDP case by designing an $ε$-JDP algorithm with a regret of $\widetilde{O}(\sqrt{SAH^2T}+S^2AH^3/ε)$ which matches the information-theoretic lower bound of non-private learning for all choices of $ε> S^{1.5}A^{0.5} H^2/\sqrt{T}$. In the above, $S$, $A$ denote the number of states and actions, $H$ denotes the planning horizon, and $T$ is the number of steps. To the best of our knowledge, this is the first private RL algorithm that achieves \emph{privacy for free} asymptotically as $T\rightarrow \infty$. Our techniques -- which could be of independent interest -- include privately releasing Bernstein-type exploration bonuses and an improved method for releasing visitation statistics. The same techniques also imply a slightly improved regret bound for the LDP case.
△ Less
Submitted 21 February, 2023; v1 submitted 9 December, 2022;
originally announced December 2022.
-
SelfMix: Robust Learning Against Textual Label Noise with Self-Mixup Training
Authors:
Dan Qiao,
Chenchen Dai,
Yuyang Ding,
Juntao Li,
Qiang Chen,
Wenliang Chen,
Min Zhang
Abstract:
The conventional success of textual classification relies on annotated data, and the new paradigm of pre-trained language models (PLMs) still requires a few labeled data for downstream tasks. However, in real-world applications, label noise inevitably exists in training data, damaging the effectiveness, robustness, and generalization of the models constructed on such data. Recently, remarkable ach…
▽ More
The conventional success of textual classification relies on annotated data, and the new paradigm of pre-trained language models (PLMs) still requires a few labeled data for downstream tasks. However, in real-world applications, label noise inevitably exists in training data, damaging the effectiveness, robustness, and generalization of the models constructed on such data. Recently, remarkable achievements have been made to mitigate this dilemma in visual data, while only a few explore textual data. To fill this gap, we present SelfMix, a simple yet effective method, to handle label noise in text classification tasks. SelfMix uses the Gaussian Mixture Model to separate samples and leverages semi-supervised learning. Unlike previous works requiring multiple models, our method utilizes the dropout mechanism on a single model to reduce the confirmation bias in self-training and introduces a textual-level mixup training strategy. Experimental results on three text classification benchmarks with different types of text show that the performance of our proposed method outperforms these strong baselines designed for both textual and visual data under different noise ratios and noise types. Our code is available at https://github.com/noise-learning/SelfMix.
△ Less
Submitted 10 October, 2022; v1 submitted 10 October, 2022;
originally announced October 2022.
-
Near-Optimal Deployment Efficiency in Reward-Free Reinforcement Learning with Linear Function Approximation
Authors:
Dan Qiao,
Yu-Xiang Wang
Abstract:
We study the problem of deployment efficient reinforcement learning (RL) with linear function approximation under the \emph{reward-free} exploration setting. This is a well-motivated problem because deploying new policies is costly in real-life RL applications. Under the linear MDP setting with feature dimension $d$ and planning horizon $H$, we propose a new algorithm that collects at most…
▽ More
We study the problem of deployment efficient reinforcement learning (RL) with linear function approximation under the \emph{reward-free} exploration setting. This is a well-motivated problem because deploying new policies is costly in real-life RL applications. Under the linear MDP setting with feature dimension $d$ and planning horizon $H$, we propose a new algorithm that collects at most $\widetilde{O}(\frac{d^2H^5}{ε^2})$ trajectories within $H$ deployments to identify $ε$-optimal policy for any (possibly data-dependent) choice of reward functions. To the best of our knowledge, our approach is the first to achieve optimal deployment complexity and optimal $d$ dependence in sample complexity at the same time, even if the reward is known ahead of time. Our novel techniques include an exploration-preserving policy discretization and a generalized G-optimal experiment design, which could be of independent interest. Lastly, we analyze the related problem of regret minimization in low-adaptive RL and provide information-theoretic lower bounds for switching cost and batch complexity.
△ Less
Submitted 21 February, 2023; v1 submitted 2 October, 2022;
originally announced October 2022.
-
Doubly Fair Dynamic Pricing
Authors:
Jianyu Xu,
Dan Qiao,
Yu-Xiang Wang
Abstract:
We study the problem of online dynamic pricing with two types of fairness constraints: a "procedural fairness" which requires the proposed prices to be equal in expectation among different groups, and a "substantive fairness" which requires the accepted prices to be equal in expectation among different groups. A policy that is simultaneously procedural and substantive fair is referred to as "doubl…
▽ More
We study the problem of online dynamic pricing with two types of fairness constraints: a "procedural fairness" which requires the proposed prices to be equal in expectation among different groups, and a "substantive fairness" which requires the accepted prices to be equal in expectation among different groups. A policy that is simultaneously procedural and substantive fair is referred to as "doubly fair". We show that a doubly fair policy must be random to have higher revenue than the best trivial policy that assigns the same price to different groups. In a two-group setting, we propose an online learning algorithm for the 2-group pricing problems that achieves $\tilde{O}(\sqrt{T})$ regret, zero procedural unfairness and $\tilde{O}(\sqrt{T})$ substantive unfairness over $T$ rounds of learning. We also prove two lower bounds showing that these results on regret and unfairness are both information-theoretically optimal up to iterated logarithmic factors. To the best of our knowledge, this is the first dynamic pricing algorithm that learns to price while satisfying two fairness constraints at the same time.
△ Less
Submitted 23 September, 2022;
originally announced September 2022.
-
A Web Application for Experimenting and Validating Remote Measurement of Vital Signs
Authors:
Amtul Haq Ayesha,
Donghao Qiao,
Farhana Zulkernine
Abstract:
With a surge in online medical advising remote monitoring of patient vitals is required. This can be facilitated with the Remote Photoplethysmography (rPPG) techniques that compute vital signs from facial videos. It involves processing video frames to obtain skin pixels, extracting the cardiac data from it and applying signal processing filters to extract the Blood Volume Pulse (BVP) signal. Diffe…
▽ More
With a surge in online medical advising remote monitoring of patient vitals is required. This can be facilitated with the Remote Photoplethysmography (rPPG) techniques that compute vital signs from facial videos. It involves processing video frames to obtain skin pixels, extracting the cardiac data from it and applying signal processing filters to extract the Blood Volume Pulse (BVP) signal. Different algorithms are applied to the BVP signal to estimate the various vital signs. We implemented a web application framework to measure a person's Heart Rate (HR), Heart Rate Variability (HRV), Oxygen Saturation (SpO2), Respiration Rate (RR), Blood Pressure (BP), and stress from the face video. The rPPG technique is highly sensitive to illumination and motion variation. The web application guides the users to reduce the noise due to these variations and thereby yield a cleaner BVP signal. The accuracy and robustness of the framework was validated with the help of volunteers.
△ Less
Submitted 21 August, 2022;
originally announced August 2022.
-
Adaptive Feature Fusion for Cooperative Perception using LiDAR Point Clouds
Authors:
Donghao Qiao,
Farhana Zulkernine
Abstract:
Cooperative perception allows a Connected Autonomous Vehicle (CAV) to interact with the other CAVs in the vicinity to enhance perception of surrounding objects to increase safety and reliability. It can compensate for the limitations of the conventional vehicular perception such as blind spots, low resolution, and weather effects. An effective feature fusion model for the intermediate fusion metho…
▽ More
Cooperative perception allows a Connected Autonomous Vehicle (CAV) to interact with the other CAVs in the vicinity to enhance perception of surrounding objects to increase safety and reliability. It can compensate for the limitations of the conventional vehicular perception such as blind spots, low resolution, and weather effects. An effective feature fusion model for the intermediate fusion methods of cooperative perception can improve feature selection and information aggregation to further enhance the perception accuracy. We propose adaptive feature fusion models with trainable feature selection modules. One of our proposed models Spatial-wise Adaptive feature Fusion (S-AdaFusion) outperforms all other State-of-the-Arts (SOTAs) on two subsets of the OPV2V dataset: Default CARLA Towns for vehicle detection and the Culver City for domain adaptation. In addition, previous studies have only tested cooperative perception for vehicle detection. A pedestrian, however, is much more likely to be seriously injured in a traffic accident. We evaluate the performance of cooperative perception for both vehicle and pedestrian detection using the CODD dataset. Our architecture achieves higher Average Precision (AP) than other existing models for both vehicle and pedestrian detection on the CODD dataset. The experiments demonstrate that cooperative perception also improves the pedestrian detection accuracy compared to the conventional single vehicle perception process.
△ Less
Submitted 12 January, 2023; v1 submitted 29 July, 2022;
originally announced August 2022.
-
Delay-aware Multiple Access Design for Intelligent Reflecting Surface Aided Uplink Transmission
Authors:
Piao Zeng,
Guangji Chen,
Qingqing Wu,
Deli Qiao,
Abbas Jamalipour
Abstract:
In this paper, we develop a hybrid multiple access (MA) protocol for an intelligent reflecting surface (IRS) aided uplink transmission network by incorporating the IRS-aided time-division MA (I-TDMA) protocol and the IRS-aided non-orthogonal MA (I-NOMA) protocol as special cases. Two typical communication scenarios, namely the transmit power limited case and the transmit energy limited case are co…
▽ More
In this paper, we develop a hybrid multiple access (MA) protocol for an intelligent reflecting surface (IRS) aided uplink transmission network by incorporating the IRS-aided time-division MA (I-TDMA) protocol and the IRS-aided non-orthogonal MA (I-NOMA) protocol as special cases. Two typical communication scenarios, namely the transmit power limited case and the transmit energy limited case are considered, where the device's rearranged order, time and power allocation, as well as dynamic IRS beamforming patterns over time are jointly optimized to minimize the sum transmission delay. To shed light on the superiority of the proposed IRS-aided hybrid MA (I-HMA) protocol over conventional protocols, the conditions under which I-HMA outperforms I-TDMA and I-NOMA are revealed by characterizing their corresponding optimal solution. Then, a computationally efficient algorithm is proposed to obtain the high-quality solution to the corresponding optimization problems. Simulation results validate our theoretical findings, demonstrate the superiority of the proposed design, and draw some useful insights. Specifically, it is found that the proposed protocol can significantly reduce the sum transmission delay by combining the additional gain of dynamic IRS beamforming with the high spectral efficiency of NOMA, which thus reveals that integrating IRS into the proposed HMA protocol is an effective solution for delay-aware optimization. Furthermore, it reveals that the proposed design reduces the time consumption not only from the system-centric view, but also from the device-centric view.
△ Less
Submitted 26 June, 2023; v1 submitted 18 June, 2022;
originally announced June 2022.
-
ReViSe: Remote Vital Signs Measurement Using Smartphone Camera
Authors:
Donghao Qiao,
Amtul Haq Ayesha,
Farhana Zulkernine,
Raihan Masroor,
Nauman Jaffar
Abstract:
We propose an end-to-end framework to measure people's vital signs including Heart Rate (HR), Heart Rate Variability (HRV), Oxygen Saturation (SpO2) and Blood Pressure (BP) based on the rPPG methodology from the video of a user's face captured with a smartphone camera. We extract face landmarks with a deep learning-based neural network model in real-time. Multiple face patches also called Regions-…
▽ More
We propose an end-to-end framework to measure people's vital signs including Heart Rate (HR), Heart Rate Variability (HRV), Oxygen Saturation (SpO2) and Blood Pressure (BP) based on the rPPG methodology from the video of a user's face captured with a smartphone camera. We extract face landmarks with a deep learning-based neural network model in real-time. Multiple face patches also called Regions-of-Interest (RoIs) are extracted by using the predicted face landmarks. Several filters are applied to reduce the noise from the RoIs in the extracted cardiac signals called Blood Volume Pulse (BVP) signal. The measurements of HR, HRV and SpO2 are validated on two public rPPG datasets namely the TokyoTech rPPG and the Pulse Rate Detection (PURE) datasets, on which our models achieved the following Mean Absolute Errors (MAE): a) for HR, 1.73Beats-Per-Minute (bpm) and 3.95bpm respectively; b) for HRV, 18.55ms and 25.03ms respectively, and c) for SpO2, an MAE of 1.64% on the PURE dataset. We validated our end-to-end rPPG framework, ReViSe, in daily living environment, and thereby created the Video-HR dataset. Our HR estimation model achieved an MAE of 2.49bpm on this dataset. Since no publicly available rPPG datasets existed for BP measurement with face videos, we used a dataset with signals from fingertip sensor to train our deep learning-based BP estimation model and also created our own video dataset, Video-BP. On our Video-BP dataset, our BP estimation model achieved an MAE of 6.7mmHg for Systolic Blood Pressure (SBP), and an MAE of 9.6mmHg for Diastolic Blood Pressure (DBP). ReViSe framework has been validated on datasets with videos recorded in daily living environment as opposed to less noisy laboratory environment as reported by most state-of-the-art techniques.
△ Less
Submitted 22 December, 2022; v1 submitted 13 June, 2022;
originally announced June 2022.
-
Offline Reinforcement Learning with Differential Privacy
Authors:
Dan Qiao,
Yu-Xiang Wang
Abstract:
The offline reinforcement learning (RL) problem is often motivated by the need to learn data-driven decision policies in financial, legal and healthcare applications. However, the learned policy could retain sensitive information of individuals in the training data (e.g., treatment and outcome of patients), thus susceptible to various privacy risks. We design offline RL algorithms with differentia…
▽ More
The offline reinforcement learning (RL) problem is often motivated by the need to learn data-driven decision policies in financial, legal and healthcare applications. However, the learned policy could retain sensitive information of individuals in the training data (e.g., treatment and outcome of patients), thus susceptible to various privacy risks. We design offline RL algorithms with differential privacy guarantees which provably prevent such risks. These algorithms also enjoy strong instance-dependent learning bounds under both tabular and linear Markov decision process (MDP) settings. Our theory and simulation suggest that the privacy guarantee comes at (almost) no drop in utility comparing to the non-private counterpart for a medium-size dataset.
△ Less
Submitted 3 January, 2023; v1 submitted 1 June, 2022;
originally announced June 2022.
-
Differentially Private Linear Sketches: Efficient Implementations and Applications
Authors:
Fuheng Zhao,
Dan Qiao,
Rachel Redberg,
Divyakant Agrawal,
Amr El Abbadi,
Yu-Xiang Wang
Abstract:
Linear sketches have been widely adopted to process fast data streams, and they can be used to accurately answer frequency estimation, approximate top K items, and summarize data distributions. When data are sensitive, it is desirable to provide privacy guarantees for linear sketches to preserve private information while delivering useful results with theoretical bounds. We show that linear sketch…
▽ More
Linear sketches have been widely adopted to process fast data streams, and they can be used to accurately answer frequency estimation, approximate top K items, and summarize data distributions. When data are sensitive, it is desirable to provide privacy guarantees for linear sketches to preserve private information while delivering useful results with theoretical bounds. We show that linear sketches can ensure privacy and maintain their unique properties with a small amount of noise added at initialization. From the differentially private linear sketches, we showcase that the state-of-the-art quantile sketch in the turnstile model can also be private and maintain high performance. Experiments further demonstrate that our proposed differentially private sketches are quantitatively and qualitatively similar to noise-free sketches with high utilization on synthetic and real datasets.
△ Less
Submitted 14 October, 2022; v1 submitted 19 May, 2022;
originally announced May 2022.
-
How to Minimize the Weighted Sum AoI in Multi-Source Status Update Systems: OMA or NOMA?
Authors:
Jixuan Wang,
Deli Qiao
Abstract:
In this paper, the minimization of the weighted sum average age of information (AoI) in a multi-source status update communication system is studied. Multiple independent sources send update packets to a common destination node in a time-slotted manner under the limit of maximum retransmission rounds. Different multiple access schemes, i.e., orthogonal multiple access (OMA) and non-orthogonal mult…
▽ More
In this paper, the minimization of the weighted sum average age of information (AoI) in a multi-source status update communication system is studied. Multiple independent sources send update packets to a common destination node in a time-slotted manner under the limit of maximum retransmission rounds. Different multiple access schemes, i.e., orthogonal multiple access (OMA) and non-orthogonal multiple access (NOMA) are exploited here over a block-fading multiple access channel (MAC). Constrained Markov decision process (CMDP) problems are formulated to describe the AoI minimization problems considering both transmission schemes. The Lagrangian method is utilised to convert CMDP problems to unconstraint Markov decision process (MDP) problems and corresponding algorithms to derive the power allocation policies are obtained. On the other hand, for the case of unknown environments, two online reinforcement learning approaches considering both multiple access schemes are proposed to achieve near-optimal age performance. Numerical simulations validate the improvement of the proposed policy in terms of weighted sum AoI compared to the fixed power transmission policy, and illustrate that NOMA is more favorable in case of larger packet size.
△ Less
Submitted 20 May, 2022; v1 submitted 6 May, 2022;
originally announced May 2022.
-
Sample-Efficient Reinforcement Learning with loglog(T) Switching Cost
Authors:
Dan Qiao,
Ming Yin,
Ming Min,
Yu-Xiang Wang
Abstract:
We study the problem of reinforcement learning (RL) with low (policy) switching cost - a problem well-motivated by real-life RL applications in which deployments of new policies are costly and the number of policy updates must be low. In this paper, we propose a new algorithm based on stage-wise exploration and adaptive policy elimination that achieves a regret of $\widetilde{O}(\sqrt{H^4S^2AT})$…
▽ More
We study the problem of reinforcement learning (RL) with low (policy) switching cost - a problem well-motivated by real-life RL applications in which deployments of new policies are costly and the number of policy updates must be low. In this paper, we propose a new algorithm based on stage-wise exploration and adaptive policy elimination that achieves a regret of $\widetilde{O}(\sqrt{H^4S^2AT})$ while requiring a switching cost of $O(HSA \log\log T)$. This is an exponential improvement over the best-known switching cost $O(H^2SA\log T)$ among existing methods with $\widetilde{O}(\mathrm{poly}(H,S,A)\sqrt{T})$ regret. In the above, $S,A$ denotes the number of states and actions in an $H$-horizon episodic Markov Decision Process model with unknown transitions, and $T$ is the number of steps. As a byproduct of our new techniques, we also derive a reward-free exploration algorithm with a switching cost of $O(HSA)$. Furthermore, we prove a pair of information-theoretical lower bounds which say that (1) Any no-regret algorithm must have a switching cost of $Ω(HSA)$; (2) Any $\widetilde{O}(\sqrt{T})$ regret algorithm must incur a switching cost of $Ω(HSA\log\log T)$. Both our algorithms are thus optimal in their switching costs.
△ Less
Submitted 4 June, 2022; v1 submitted 13 February, 2022;
originally announced February 2022.
-
Throughput Maximization for Active Intelligent Reflecting Surface Aided Wireless Powered Communications
Authors:
Piao Zeng,
Deli Qiao,
Qingqing Wu,
Yuan Wu
Abstract:
This paper considers an active intelligent reflecting surface (IRS)-aided wireless powered communication network (WPCN), where devices first harvest energy and then transmit information to a hybrid access point (HAP). Different from the existing works on passive IRS-aided WPCNs, this is the first work that introduces the active IRS in WPCNs. To guarantee fairness, the problem is formulated as an a…
▽ More
This paper considers an active intelligent reflecting surface (IRS)-aided wireless powered communication network (WPCN), where devices first harvest energy and then transmit information to a hybrid access point (HAP). Different from the existing works on passive IRS-aided WPCNs, this is the first work that introduces the active IRS in WPCNs. To guarantee fairness, the problem is formulated as an amplifying power-limited weighted sum throughput (WST) maximization problem, which is solved by successive convex approximation technique and fractional programming alternatively. To balance the performance and complexity tradeoff, three beamforming setups are considered at the active IRS, namely user-adaptive IRS beamforming, uplink-adaptive IRS beamforming, and static IRS beamforming. Numerical results demonstrate the significant superiority of employing active IRS in WPCNs and the benefits of dynamic IRS beamforming. Specifically, it is found that compared to the passive IRS, the active IRS not only improves the WST greatly, but also is more energy-efficient and can significantly extend the transmission coverage. Moreover, different from the symmetric deployment strategy of passive IRS, it is more preferable to deploy the active IRS near the devices.
△ Less
Submitted 11 January, 2022; v1 submitted 22 November, 2021;
originally announced November 2021.
-
Energy Minimization for IRS-aided WPCNs with Non-linear Energy Harvesting Model
Authors:
Piao Zeng,
Qingqing Wu,
Deli Qiao
Abstract:
This paper considers an intelligent reflecting surface(IRS)-aided wireless powered communication network (WPCN), where devices first harvest energy from a power station (PS) in the downlink (DL) and then transmit information using non-orthogonal multiple access (NOMA) to a data sink in the uplink (UL). However, most existing works on WPCNs adopted the simplified linear energy-harvesting model and…
▽ More
This paper considers an intelligent reflecting surface(IRS)-aided wireless powered communication network (WPCN), where devices first harvest energy from a power station (PS) in the downlink (DL) and then transmit information using non-orthogonal multiple access (NOMA) to a data sink in the uplink (UL). However, most existing works on WPCNs adopted the simplified linear energy-harvesting model and also cannot guarantee strict user quality-of-service requirements. To address these issues, we aim to minimize the total transmit energy consumption at the PS by jointly optimizing the resource allocation and IRS phase shifts over time, subject to the minimum throughput requirements of all devices. The formulated problem is decomposed into two subproblems, and solved iteratively in an alternative manner by employing difference of convex functions programming, successive convex approximation, and penalty-based algorithm. Numerical results demonstrate the significant performance gains achieved by the proposed algorithm over benchmark schemes and reveal the benefits of integrating IRS into WPCNs. In particular, employing different IRS phase shifts over UL and DL outperforms the case with static IRS beamforming.
△ Less
Submitted 1 September, 2021; v1 submitted 30 August, 2021;
originally announced August 2021.
-
Joint Beamforming Design for IRS-Aided Communications with Channel Estimation Errors
Authors:
Piao Zeng,
Deli Qiao,
Haifeng Qian
Abstract:
This paper investigates the joint design of the beamforming scheme in intelligent reflecting surface (IRS) assisted multiuser (MU) multiple-input multiple-output (MIMO) downlink transmissions. Channel estimation errors associated with the minimum mean square error (MMSE) estimation are assumed and the weighted sum rate (WSR) is adopted as the performance metric. Low-resolution phase shifters (PSs)…
▽ More
This paper investigates the joint design of the beamforming scheme in intelligent reflecting surface (IRS) assisted multiuser (MU) multiple-input multiple-output (MIMO) downlink transmissions. Channel estimation errors associated with the minimum mean square error (MMSE) estimation are assumed and the weighted sum rate (WSR) is adopted as the performance metric. Low-resolution phase shifters (PSs) in practical implementations are taken into account as well. Under the constraint of the transmit power and discrete phase shifters (PSs), an optimization problem is formulated to maximize the WSR of all users. To obtain the optimal beamforming matrices at the IRS, two solutions based on the majorization-minimization (MM) and successive convex approximation (SCA) methods, respectively, are proposed. Through simulation results, both of the proposed two schemes achieve a significant improvement in WSR. Furthermore, the superiority of the SCA-based solution is demonstrated. Overall, two viable solutions to the joint beamforming design in IRS-aided MU-MIMO downlink communication systems with channel estimation errors are provided.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
Alternate Distributed Beamforming for Buffer-Aided Multi-Antenna Relay Systems
Authors:
Jiayu Zhou,
Deli Qiao,
Haifeng Qian
Abstract:
In this paper, link selection is investigated in half-duplex (HD) dual-hop cooperative systems with multiple antennas at the relays. Alternate distributed beamforming (ADB) scheme is revisited for buffer-aided multi-antenna relay systems, in which the relays are divided into two groups, with one group receiving the same information broadcast from the source and the other group transmitting the com…
▽ More
In this paper, link selection is investigated in half-duplex (HD) dual-hop cooperative systems with multiple antennas at the relays. Alternate distributed beamforming (ADB) scheme is revisited for buffer-aided multi-antenna relay systems, in which the relays are divided into two groups, with one group receiving the same information broadcast from the source and the other group transmitting the common messages to the destination via distributed beamforming in each time slot. It is worth noting that the relays used for reception and transmission are determined without the need of instantaneous channel state information (CSI). Theoretical analysis of the achievable throughput of the proposed scheme in Rayleigh fading is provided and the approximate closed-form expressions are derived. Simulation results are given to verify the theoretical analysis. Through numerical results, it is shown that compared with existing link selection policies, the fixed scheduling ADB scheme achieves a significant improvement in achievable throughput. It is also shown that for the ADB scheme, the throughput performance of increasing the number of antennas equipped at each relay is better than that of increasing the number of relays equipped with a single antenna when the total number of antennas at the relays is fixed.
△ Less
Submitted 15 May, 2020;
originally announced May 2020.
-
Mimicking Full-Duplex Secure Communications for Buffer-Aided Multi-Relay Systems
Authors:
Jiayu Zhou,
Deli Qiao,
Haifeng Qian
Abstract:
This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes. A new max-ratio relaying protocol is proposed, in which different relays are chosen for reception and transmission according to the ratio of the legitimate channels to the eavesdropper channels,…
▽ More
This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes. A new max-ratio relaying protocol is proposed, in which different relays are chosen for reception and transmission according to the ratio of the legitimate channels to the eavesdropper channels, so that the relay selected for reception and the relay selected for transmission can receive and transmit at the same time. It is worth noting that the relay employs a randomize-and-forward (RF) strategy such that the eavesdropper can only decode the signals received in the two hops independently. Theoretical analysis of the secrecy throughput of the proposed scheme is provided and the approximate closed-form expressions are derived, which are verified by simulations. Through numerical results, it is shown that the proposed scheme achieves a significant improvement in secrecy throughput compared with existing relay selection policies.
△ Less
Submitted 15 May, 2020;
originally announced May 2020.
-
Age-Energy Tradeoff in Fading Channels with Packet-Based Transmissions
Authors:
Haitao Huang,
Deli Qiao,
M. Cenk Gursoy
Abstract:
The optimal transmission strategy to minimize the weighted combination of age of information (AoI) and total energy consumption is studied in this paper. It is assumed that the status update information is obtained and transmitted at fixed rate over a Rayleigh fading channel in a packet-based wireless communication system. A maximum transmission round on each packet is enforced to guarantee certai…
▽ More
The optimal transmission strategy to minimize the weighted combination of age of information (AoI) and total energy consumption is studied in this paper. It is assumed that the status update information is obtained and transmitted at fixed rate over a Rayleigh fading channel in a packet-based wireless communication system. A maximum transmission round on each packet is enforced to guarantee certain reliability of the update packets. Given fixed average transmission power, the age-energy tradeoff can be formulated as a constrained Markov decision process (CMDP) problem considering the sensing power consumption as well. Employing the Lagrangian relaxation, the CMDP problem is transformed into a Markov decision process (MDP) problem. An algorithm is proposed to obtain the optimal power allocation policy. Through simulation results, it is shown that both age and energy efficiency can be improved by the proposed optimal policy compared with two benchmark schemes. Also, age can be effectively reduced at the expense of higher energy cost, and more emphasis on energy consumption leads to higher average age at the same energy efficiency. Overall, the tradeoff between average age and energy efficiency is identified.
△ Less
Submitted 12 May, 2020;
originally announced May 2020.
-
D3S: A Framework for Enabling Unmanned Aerial Vehicles as a Service
Authors:
Farid Naït-Abdesselam,
Ahmad Alsharoa,
Mohamed Selim,
Daji Qiao,
Ahmed E. Kamal
Abstract:
In this paper, we consider the use of UAVs to provide wireless connectivity services, for example after failures of wireless network components or to simply provide additional bandwidth on demand, and introduce the concept of UAVs as a service (UaaS). To facilitate UaaS, we introduce a novel framework, dubbed D3S, which consists of four phases: demand, decision, deployment, and service. The main o…
▽ More
In this paper, we consider the use of UAVs to provide wireless connectivity services, for example after failures of wireless network components or to simply provide additional bandwidth on demand, and introduce the concept of UAVs as a service (UaaS). To facilitate UaaS, we introduce a novel framework, dubbed D3S, which consists of four phases: demand, decision, deployment, and service. The main objective of this framework is to develop efficient and realistic solutions to implement these four phases. The technical problems include determining the type and number of UAVs to be deployed, and also their final locations (e.g., hovering or on-ground), which is important for serving certain applications. These questions will be part of the decision phase. They also include trajectory planning of UAVs when they have to travel between charging stations and deployment locations and may have to do this several times. These questions will be part of the deployment phase. The service phase includes the implementation of the backbone communication and data routing between UAVs and between UAVs and ground control stations.
△ Less
Submitted 31 December, 2019;
originally announced January 2020.
-
Alternate Distributed Beamforming for Decode-and-Forward Multi-Relay Systems Using Buffers
Authors:
Jiayu Zhou,
Deli Qiao
Abstract:
In this paper, link selection for half-duplex buffer-aided relay systems is revisited. A new fixed scheduling policy referred as alternate distributed beamforming (ADB) is proposed, in which the relays are divided into two groups, with one group receiving the same information broadcast from the source and the other group transmitting the common messages to the destination via distributed beamformi…
▽ More
In this paper, link selection for half-duplex buffer-aided relay systems is revisited. A new fixed scheduling policy referred as alternate distributed beamforming (ADB) is proposed, in which the relays are divided into two groups, with one group receiving the same information broadcast from the source and the other group transmitting the common messages to the destination via distributed beamforming in each time slot. It is worth noting that the relays used for reception and transmission are determined without the need of instantaneous channel state information (CSI). Theoretical analysis of the achievable throughput of the proposed scheme in Rayleigh fading is provided and the approximate closed-form expressions are derived. Through numerical results, it is shown that compared with existing link selection policies, the proposed fixed scheduling ADB achieves a significant improvement in achievable throughput.
△ Less
Submitted 9 October, 2019;
originally announced October 2019.
-
Age-Optimal Power Control for Status Update Systems with Packet Based Transmissions
Authors:
Deli Qiao,
M. Cenk Gursoy
Abstract:
This paper investigates the average age of information (AoI) minimization in status update systems in which the update packets are transmitted with fixed rate. It is assumed that the source avoids queue-induced delay by generating and sending a new status update packet in each time slot. Assuming that the transmit power can be adapted based on the number of successive NACKs (negative acknowledgeme…
▽ More
This paper investigates the average age of information (AoI) minimization in status update systems in which the update packets are transmitted with fixed rate. It is assumed that the source avoids queue-induced delay by generating and sending a new status update packet in each time slot. Assuming that the transmit power can be adapted based on the number of successive NACKs (negative acknowledgements) received, a closed-form expression for the average AoI is derived considering transmissions over block fading channel models. An optimization problem for minimizing the average AoI under average power constraints is formulated and a stochastic optimization algorithm for obtaining a feasible solution is proposed. Numerical results on the proposed power control policy show that more power is preferred to be allocated to packets after a certain number of failure packets in the low-power regime and the proposed power control reduces the average AoI compared to the constant power policy. An alternative on-off power control policy is also proposed and shown to achieve satisfactory performance.
△ Less
Submitted 15 August, 2019; v1 submitted 6 August, 2019;
originally announced August 2019.
-
Outage Analysis of Heterogeneous mmWave Cellular Networks Employing JSDM
Authors:
Jun Chen,
Deli Qiao
Abstract:
In this paper, the outage performance of a two-tier heterogeneous mmWave cellular networks employing joint spatial division and multiplexing (JSDM) is investigated. It is assumed that macro base stations (BSs) equipped with a large number of antennas and pico BSs equipped with single antenna serve users simultaneously. The two-tier BSs and users are distributed according to independent Poisson poi…
▽ More
In this paper, the outage performance of a two-tier heterogeneous mmWave cellular networks employing joint spatial division and multiplexing (JSDM) is investigated. It is assumed that macro base stations (BSs) equipped with a large number of antennas and pico BSs equipped with single antenna serve users simultaneously. The two-tier BSs and users are distributed according to independent Poisson point processes (PPPs). Theoretical analysis of the signal-to-interference-plus-noise ratio (SINR) outage probability of the typical user is first provided. The all SINR outage probability of the two tiers is then derived. Simulation results in accordance with theoretical analysis demonstrating the performance improvement of two-tier networks compare with the single-tier network are provided. By using the noise-limited assumption for mmWave networks, a simpler expression to analyze the outage performance is obtained.
△ Less
Submitted 18 January, 2019;
originally announced January 2019.
-
Space-Time Block Coding Based Beamforming for Beam Squint Compensation
Authors:
Ximei Liu,
Deli Qiao
Abstract:
In this paper, the beam squint problem, which causes significant variations in radiated beam gain over frequencies in millimeter wave communication system, is investigated. A constant modulus beamformer design, which is formulated to maximize the expected average beam gain within the bandwidth with limited variation over frequencies within the bandwidth, is proposed. A semidefinite relaxation (SDR…
▽ More
In this paper, the beam squint problem, which causes significant variations in radiated beam gain over frequencies in millimeter wave communication system, is investigated. A constant modulus beamformer design, which is formulated to maximize the expected average beam gain within the bandwidth with limited variation over frequencies within the bandwidth, is proposed. A semidefinite relaxation (SDR) method is developed to solve the optimization problem under the constant modulus constraints. Depending on the eigenvalues of the optimal solution, either direct beamforming or transmit diversity based beamforming is employed for data transmissions. Through numerical results, the proposed transmission scheme can compensate for beam squint effectively and improve system throughput. Overall, a transmission scheme for beam squint compensation in wideband wireless communication systems is provided.
△ Less
Submitted 30 August, 2018;
originally announced August 2018.
-
Performance Analysis of Indoor THz Communications with One-Bit Precoding
Authors:
Dan Li,
Deli Qiao,
Lei Zhang,
Geoffrey Ye Li
Abstract:
In this paper, the performance of indoor Terahertz (THz) communication systems with one-bit digital-to-analog converters (DACs) is investigated. Array-of-subarrays architecture is assumed for the antennas at the access points, where each RF chain uniquely activates a disjoint subset of antennas, each of which is connected to an exclusive phase shifter. Hybrid precoding, including maximum ratio tra…
▽ More
In this paper, the performance of indoor Terahertz (THz) communication systems with one-bit digital-to-analog converters (DACs) is investigated. Array-of-subarrays architecture is assumed for the antennas at the access points, where each RF chain uniquely activates a disjoint subset of antennas, each of which is connected to an exclusive phase shifter. Hybrid precoding, including maximum ratio transmission (MRT) and zero-forcing (ZF) precoding, is considered. The best beamsteering direction for the phase shifter in the large subarray antenna regime is first proved to be the direction of the line-of-sight (LOS) path. Subsequently, the closed-form expression of the lower-bound of the achievable rate in the large subarray antenna regime is derived, which is the same for both MRT and ZF and is independent of the transmit power. Numerical results validating the analysis are provided as well.
△ Less
Submitted 1 July, 2018;
originally announced July 2018.
-
Outage Analysis of Relay-Assisted mmWave Cellular Systems Employing JSDM
Authors:
Jun Chen,
Deli Qiao
Abstract:
In this paper, the outage performance of relay-assisted millimeter wave (mmWave) cellular systems employing joint spatial division and multiplexing (JSDM) is investigated. It is assumed that the macro base station (BS) equipped with a large number of antennas serves the single antenna pico BS (as a relay) and users simultaneously, and that the pico BS is located at the edge of the macro cell. Theo…
▽ More
In this paper, the outage performance of relay-assisted millimeter wave (mmWave) cellular systems employing joint spatial division and multiplexing (JSDM) is investigated. It is assumed that the macro base station (BS) equipped with a large number of antennas serves the single antenna pico BS (as a relay) and users simultaneously, and that the pico BS is located at the edge of the macro cell. Theoretical analysis of the signal-to-interference-plus-noise ratio (SINR) outage probability of each user is first obtained. The cell SINR outage probability is then derived. Under the noise-limited assumption, simplified closed-form expressions of the outage probability are given as well. Simulation results demonstrating the performance improvement due to the relay introduced by the pico BS are provided. Overall, the impact of deploying pico BS as a relay in the mmWave cellular systems is characterized.
△ Less
Submitted 25 June, 2018;
originally announced June 2018.
-
Outage Effective Capacity of Buffer-Aided Diamond Relay Systems Using HARQ with Incremental Redundancy
Authors:
Deli Qiao
Abstract:
In this paper, transmission over buffer-aided diamond relay systems under statistical quality of service (QoS) constraints is studied. The statistical QoS constraints are imposed as limitations on delay violation probabilities. In the absence of channel state information (CSI) at the transmitter, truncated hybrid automatic repeat request-incremental redundancy (HARQ-IR) is incorporated to make bet…
▽ More
In this paper, transmission over buffer-aided diamond relay systems under statistical quality of service (QoS) constraints is studied. The statistical QoS constraints are imposed as limitations on delay violation probabilities. In the absence of channel state information (CSI) at the transmitter, truncated hybrid automatic repeat request-incremental redundancy (HARQ-IR) is incorporated to make better use of the wireless channel and the resources for each communication link. The packets that cannot be successfully received upon the maximum number of transmissions will be removed from buffer, i.e., outage occurs. The \emph{outage effective capacity} of a communication link is defined as the maximum constant arrival rate to the source that can be supported by the \emph{goodput} departure processes, i.e., the departure that can be successfully received by the receiver. Then, the outage effective capacity for the buffer-aided diamond relay system is obtained for HARQ-IR incorporated transmission strategy under the \emph{end-to-end} delay constraints. In comparison with the DF protocol with perfect CSI at the transmitters, it is shown that HARQ-IR can achieve superior performance when the SNR levels at the relay are not so large or when the delay constraints are stringent.
△ Less
Submitted 21 November, 2016;
originally announced November 2016.
-
Effective Capacity of Buffer-Aided Full-Duplex Relay Systems with Selection Relaying
Authors:
Deli Qiao
Abstract:
In this work, the achievable rate of three-node relay systems with selection relaying under statistical delay constraints, imposed on the limitations of the maximum end-to-end delay violation probabilities, is investigated. It is assumed that there are queues of infinite size at both the source and relay node, and the source can select the relay or destination for data reception. Given selection r…
▽ More
In this work, the achievable rate of three-node relay systems with selection relaying under statistical delay constraints, imposed on the limitations of the maximum end-to-end delay violation probabilities, is investigated. It is assumed that there are queues of infinite size at both the source and relay node, and the source can select the relay or destination for data reception. Given selection relaying policy, the effective bandwidth of the arrival processes of the queue at the relay is derived. Then, the maximum constant arrival rate can be identified as the maximum effective capacity as a function of the statistical end-to-end queueing delay constraints, signal-to-noise ratios (SNR) at the source and relay, the fading distributions of the links, and the relay policy. Subsequently, a relay policy that incorporates the statistical delay constraints is proposed. It is shown that the proposed relay policy can achieve better performance than existing protocols. Moreover, it is demonstrated that buffering relay model can still help improve the throughput of relay systems in the presence of statistical delay constraints and source-destination link.
△ Less
Submitted 12 October, 2015;
originally announced October 2015.
-
Single-Carrier Modulation for Large-Scale Antenna Systems
Authors:
Yinsheng Liu,
Geoffrey Ye Li,
Zhenhui Tan,
Deli Qiao
Abstract:
Large-scale antenna (LSA) has gained a lot of attention due to its great potential to significantly improve system throughput. In most existing works on LSA systems, orthogonal frequency division multiplexing (OFDM) is presumed to deal with frequency selectivity of wireless channels. Although LSA-OFDM is a natural evolution from multiple-input multiple-output OFDM (MIMO-OFDM), the drawbacks of LSA…
▽ More
Large-scale antenna (LSA) has gained a lot of attention due to its great potential to significantly improve system throughput. In most existing works on LSA systems, orthogonal frequency division multiplexing (OFDM) is presumed to deal with frequency selectivity of wireless channels. Although LSA-OFDM is a natural evolution from multiple-input multiple-output OFDM (MIMO-OFDM), the drawbacks of LSA-OFDM are inevitable, especially when used for the uplink. In this paper, we investigate single-carrier (SC) modulation for the uplink transmission in LSA systems based on a novel waveform recovery theory, where the receiver is designed to recover the transmit waveform while the information-bearing symbols can be recovered by directly sampling the recovered waveform. The waveform recovery adopts the assumption that the antenna number is infinite and the channels at different antennas are independent. In practical environments, however, the antenna number is always finite and the channels at different antennas are also correlated when placing hundreds of antennas in a small area. Therefore, we will also analyze the impacts of such non-ideal environments.
△ Less
Submitted 2 January, 2016; v1 submitted 1 August, 2015;
originally announced August 2015.
-
Broadbeam for Massive MIMO Systems
Authors:
Deli Qiao,
Haifeng Qian,
Geoffrey Ye Li
Abstract:
Massive MIMO has been identified as one of the promising disruptive air interface techniques to address the huge capacity requirement demanded by 5G wireless communications. For practical deployment of such systems, the control message need to be broadcast to all users reliably in the cell using broadbeam. A broadbeam is expected to have the same radiated power in all directions to cover users in…
▽ More
Massive MIMO has been identified as one of the promising disruptive air interface techniques to address the huge capacity requirement demanded by 5G wireless communications. For practical deployment of such systems, the control message need to be broadcast to all users reliably in the cell using broadbeam. A broadbeam is expected to have the same radiated power in all directions to cover users in any place in a cell. In this paper, we will show that there is no perfect broadbeam. Therefore, we develop a method for generating broadbeam that can allow tiny fluctuations in radiated power. Overall, this can serve as an ingredient for practical deployment of the massive MIMO systems.
△ Less
Submitted 23 March, 2015;
originally announced March 2015.
-
Statistical Delay Tradeoffs in Buffer-Aided Two-Hop Wireless Communication Systems
Authors:
Deli Qiao,
M. Cenk Gursoy
Abstract:
This paper analyzes the impact of statistical delay constraints on the achievable rate of a two-hop wireless communication link, in which the communication between a source and a destination is accomplished via a buffer-aided relay node. It is assumed that there is no direct link between the source and the destination, and the buffer-aided relay forwards the information to the destination by emplo…
▽ More
This paper analyzes the impact of statistical delay constraints on the achievable rate of a two-hop wireless communication link, in which the communication between a source and a destination is accomplished via a buffer-aided relay node. It is assumed that there is no direct link between the source and the destination, and the buffer-aided relay forwards the information to the destination by employing the decode-and-forward scheme. Given statistical delay constraints specified via maximum delay and delay violation probability, the tradeoff between the statistical delay constraints imposed on any two concatenated queues is identified. With this characterization, the maximum constant arrival rates that can be supported by this two-hop link are obtained by determining the effective capacity of such links as a function of the statistical delay constraints, signal-to-noise ratios (SNR) at the source and relay, and the fading distributions of the links. It is shown that asymmetric statistical delay constraints at the buffers of the source and relay node can improve the achievable rate. Overall, the impact of the statistical delay tradeoff on the achievable throughput is provided.
△ Less
Submitted 23 March, 2016; v1 submitted 16 November, 2014;
originally announced November 2014.
-
Effective Capacity of Two-Hop Wireless Communication Systems
Authors:
Deli Qiao,
Mustafa Cenk Gursoy,
Senem Velipasalar
Abstract:
A two-hop wireless communication link in which a source sends data to a destination with the aid of an intermediate relay node is studied. It is assumed that there is no direct link between the source and the destination, and the relay forwards the information to the destination by employing the decode-and-forward scheme. Both the source and intermediate relay nodes are assumed to operate under st…
▽ More
A two-hop wireless communication link in which a source sends data to a destination with the aid of an intermediate relay node is studied. It is assumed that there is no direct link between the source and the destination, and the relay forwards the information to the destination by employing the decode-and-forward scheme. Both the source and intermediate relay nodes are assumed to operate under statistical quality of service (QoS) constraints imposed as limitations on the buffer overflow probabilities. The maximum constant arrival rates that can be supported by this two-hop link in the presence of QoS constraints are characterized by determining the effective capacity of such links as a function of the QoS parameters and signal-to-noise ratios at the source and relay, and the fading distributions of the links. The analysis is performed for both full-duplex and half-duplex relaying. Through this study, the impact upon the throughput of having buffer constraints at the source and intermediate relay nodes is identified. The interactions between the buffer constraints in different nodes and how they affect the performance are studied. The optimal time-sharing parameter in half-duplex relaying is determined, and performance with half-duplex relaying is investigated.
△ Less
Submitted 21 July, 2011;
originally announced July 2011.
-
Secure Wireless Communication and Optimal Power Control under Statistical Queueing Constraints
Authors:
Deli Qiao,
Mustafa Cenk Gursoy,
Senem Velipasalar
Abstract:
In this paper, secure transmission of information over fading broadcast channels is studied in the presence of statistical queueing constraints. Effective capacity is employed as a performance metric to identify the secure throughput of the system, i.e., effective secure throughput. It is assumed that perfect channel side information (CSI) is available at both the transmitter and the receivers. In…
▽ More
In this paper, secure transmission of information over fading broadcast channels is studied in the presence of statistical queueing constraints. Effective capacity is employed as a performance metric to identify the secure throughput of the system, i.e., effective secure throughput. It is assumed that perfect channel side information (CSI) is available at both the transmitter and the receivers. Initially, the scenario in which the transmitter sends common messages to two receivers and confidential messages to one receiver is considered. For this case, effective secure throughput region, which is the region of constant arrival rates of common and confidential messages that can be supported by the buffer-constrained transmitter and fading broadcast channel, is defined. It is proven that this effective throughput region is convex. Then, the optimal power control policies that achieve the boundary points of the effective secure throughput region are investigated and an algorithm for the numerical computation of the optimal power adaptation schemes is provided. Subsequently, the special case in which the transmitter sends only confidential messages to one receiver, is addressed in more detail. For this case, effective secure throughput is formulated and two different power adaptation policies are studied. In particular, it is noted that opportunistic transmission is no longer optimal under buffer constraints and the transmitter should not wait to send the data at a high rate until the main channel is much better than the eavesdropper channel.
△ Less
Submitted 30 November, 2010;
originally announced December 2010.
-
On the Effective Capacity of Two-Hop Communication Systems
Authors:
Deli Qiao,
Mustafa Cenk Gursoy,
Senem Velipasalar
Abstract:
In this paper, two-hop communication between a source and a destination with the aid of an intermediate relay node is considered. Both the source and intermediate relay node are assumed to operate under statistical quality of service (QoS) constraints imposed as limitations on the buffer overflow probabilities. It is further assumed that the nodes send the information at fixed power levels and hav…
▽ More
In this paper, two-hop communication between a source and a destination with the aid of an intermediate relay node is considered. Both the source and intermediate relay node are assumed to operate under statistical quality of service (QoS) constraints imposed as limitations on the buffer overflow probabilities. It is further assumed that the nodes send the information at fixed power levels and have perfect channel side information. In this scenario, the maximum constant arrival rates that can be supported by this two-hop link are characterized by finding the effective capacity. Through this analysis, the impact upon the throughput of having buffer constraints at the source and intermediate-hop nodes is identified.
△ Less
Submitted 30 September, 2010;
originally announced September 2010.