-
Boosting Reward Model with Preference-Conditional Multi-Aspect Synthetic Data Generation
Authors:
Jiaming Shen,
Ran Xu,
Yennie Jun,
Zhen Qin,
Tianqi Liu,
Carl Yang,
Yi Liang,
Simon Baumgartner,
Michael Bendersky
Abstract:
Reward models (RMs) are crucial for aligning large language models (LLMs) with human preferences. They are trained using preference datasets where each example consists of one input prompt, two responses, and a preference label. As curating a high-quality human labeled preference dataset is both time-consuming and expensive, people often rely on existing powerful LLMs for preference label generati…
▽ More
Reward models (RMs) are crucial for aligning large language models (LLMs) with human preferences. They are trained using preference datasets where each example consists of one input prompt, two responses, and a preference label. As curating a high-quality human labeled preference dataset is both time-consuming and expensive, people often rely on existing powerful LLMs for preference label generation. This can potentially introduce noise and impede RM training. In this work, we present RMBoost, a novel synthetic preference data generation paradigm to boost reward model quality. Unlike traditional methods, which generate two responses before obtaining the preference label, RMBoost first generates one response and selects a preference label, followed by generating the second more (or less) preferred response conditioned on the pre-selected preference label and the first response. This approach offers two main advantages. First, RMBoost reduces labeling noise since preference pairs are constructed intentionally. Second, RMBoost facilitates the creation of more diverse responses by incorporating various quality aspects (e.g., helpfulness, relevance, completeness) into the prompts. We conduct extensive experiments across three diverse datasets and demonstrate that RMBoost outperforms other synthetic preference data generation techniques and significantly boosts the performance of four distinct reward models.
△ Less
Submitted 22 July, 2024;
originally announced July 2024.
-
Slice-Consistent 3D Volumetric Brain CT-to-MRI Translation with 2D Brownian Bridge Diffusion Model
Authors:
Kyobin Choo,
Youngjun Jun,
Mijin Yun,
Seong Jae Hwang
Abstract:
In neuroimaging, generally, brain CT is more cost-effective and accessible imaging option compared to MRI. Nevertheless, CT exhibits inferior soft-tissue contrast and higher noise levels, yielding less precise structural clarity. In response, leveraging more readily available CT to construct its counterpart MRI, namely, medical image-to-image translation (I2I), serves as a promising solution. Part…
▽ More
In neuroimaging, generally, brain CT is more cost-effective and accessible imaging option compared to MRI. Nevertheless, CT exhibits inferior soft-tissue contrast and higher noise levels, yielding less precise structural clarity. In response, leveraging more readily available CT to construct its counterpart MRI, namely, medical image-to-image translation (I2I), serves as a promising solution. Particularly, while diffusion models (DMs) have recently risen as a powerhouse, they also come with a few practical caveats for medical I2I. First, DMs' inherent stochasticity from random noise sampling cannot guarantee consistent MRI generation that faithfully reflects its CT. Second, for 3D volumetric images which are prevalent in medical imaging, naively using 2D DMs leads to slice inconsistency, e.g., abnormal structural and brightness changes. While 3D DMs do exist, significant training costs and data dependency bring hesitation. As a solution, we propose novel style key conditioning (SKC) and inter-slice trajectory alignment (ISTA) sampling for the 2D Brownian bridge diffusion model. Specifically, SKC ensures a consistent imaging style (e.g., contrast) across slices, and ISTA interconnects the independent sampling of each slice, deterministically achieving style and shape consistent 3D CT-to-MRI translation. To the best of our knowledge, this study is the first to achieve high-quality 3D medical I2I based only on a 2D DM with no extra architectural models. Our experimental results show superior 3D medical I2I than existing 2D and 3D baselines, using in-house CT-MRI dataset and BraTS2023 FLAIR-T1 MRI dataset.
△ Less
Submitted 6 July, 2024;
originally announced July 2024.
-
Dynamic Order Template Prediction for Generative Aspect-Based Sentiment Analysis
Authors:
Yonghyun Jun,
Hwanhee Lee
Abstract:
Aspect-based sentiment analysis (ABSA) assesses sentiments towards specific aspects within texts, resulting in detailed sentiment tuples. Previous ABSA models often use static templates to predict all of the elements in the tuples, and these models often fail to accurately capture dependencies between elements. Multi-view prompting method improves the performance of ABSA by predicting tuples with…
▽ More
Aspect-based sentiment analysis (ABSA) assesses sentiments towards specific aspects within texts, resulting in detailed sentiment tuples. Previous ABSA models often use static templates to predict all of the elements in the tuples, and these models often fail to accurately capture dependencies between elements. Multi-view prompting method improves the performance of ABSA by predicting tuples with various templates and then ensembling the results. However, this method suffers from inefficiencies and out-of-distribution errors. In this paper, we propose a Dynamic Order Template (DOT) method for ABSA, which dynamically generates necessary views for each instance based on instance-level entropy. Ensuring the diverse and relevant view generation, our proposed method improves F1-scores on ASQP and ACOS datasets while significantly reducing inference time.
△ Less
Submitted 16 June, 2024;
originally announced June 2024.
-
SRGS: Super-Resolution 3D Gaussian Splatting
Authors:
Xiang Feng,
Yongbo He,
Yubo Wang,
Yan Yang,
Wen Li,
Yifei Chen,
Zhenzhong Kuang,
Jiajun ding,
Jianping Fan,
Yu Jun
Abstract:
Recently, 3D Gaussian Splatting (3DGS) has gained popularity as a novel explicit 3D representation. This approach relies on the representation power of Gaussian primitives to provide a high-quality rendering. However, primitives optimized at low resolution inevitably exhibit sparsity and texture deficiency, posing a challenge for achieving high-resolution novel view synthesis (HRNVS). To address t…
▽ More
Recently, 3D Gaussian Splatting (3DGS) has gained popularity as a novel explicit 3D representation. This approach relies on the representation power of Gaussian primitives to provide a high-quality rendering. However, primitives optimized at low resolution inevitably exhibit sparsity and texture deficiency, posing a challenge for achieving high-resolution novel view synthesis (HRNVS). To address this problem, we propose Super-Resolution 3D Gaussian Splatting (SRGS) to perform the optimization in a high-resolution (HR) space. The sub-pixel constraint is introduced for the increased viewpoints in HR space, exploiting the sub-pixel cross-view information of the multiple low-resolution (LR) views. The gradient accumulated from more viewpoints will facilitate the densification of primitives. Furthermore, a pre-trained 2D super-resolution model is integrated with the sub-pixel constraint, enabling these dense primitives to learn faithful texture features. In general, our method focuses on densification and texture learning to effectively enhance the representation ability of primitives. Experimentally, our method achieves high rendering quality on HRNVS only with LR inputs, outperforming state-of-the-art methods on challenging datasets such as Mip-NeRF 360 and Tanks & Temples. Related codes will be released upon acceptance.
△ Less
Submitted 18 June, 2024; v1 submitted 16 April, 2024;
originally announced April 2024.
-
NLCG-Net: A Model-Based Zero-Shot Learning Framework for Undersampled Quantitative MRI Reconstruction
Authors:
Xinrui Jiang,
Yohan Jun,
Jaejin Cho,
Mengze Gao,
Xingwang Yong,
Berkin Bilgic
Abstract:
Typical quantitative MRI (qMRI) methods estimate parameter maps after image reconstructing, which is prone to biases and error propagation. We propose a Nonlinear Conjugate Gradient (NLCG) optimizer for model-based T2/T1 estimation, which incorporates U-Net regularization trained in a scan-specific manner. This end-to-end method directly estimates qMRI maps from undersampled k-space data using mon…
▽ More
Typical quantitative MRI (qMRI) methods estimate parameter maps after image reconstructing, which is prone to biases and error propagation. We propose a Nonlinear Conjugate Gradient (NLCG) optimizer for model-based T2/T1 estimation, which incorporates U-Net regularization trained in a scan-specific manner. This end-to-end method directly estimates qMRI maps from undersampled k-space data using mono-exponential signal modeling with zero-shot scan-specific neural network regularization to enable high fidelity T1 and T2 mapping. T2 and T1 mapping results demonstrate the ability of the proposed NLCG-Net to improve estimation quality compared to subspace reconstruction at high accelerations.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Trusted Source Alignment in Large Language Models
Authors:
Vasilisa Bashlovkina,
Zhaobin Kuang,
Riley Matthews,
Edward Clifford,
Yennie Jun,
William W. Cohen,
Simon Baumgartner
Abstract:
Large language models (LLMs) are trained on web-scale corpora that inevitably include contradictory factual information from sources of varying reliability. In this paper, we propose measuring an LLM property called trusted source alignment (TSA): the model's propensity to align with content produced by trusted publishers in the face of uncertainty or controversy. We present FactCheckQA, a TSA eva…
▽ More
Large language models (LLMs) are trained on web-scale corpora that inevitably include contradictory factual information from sources of varying reliability. In this paper, we propose measuring an LLM property called trusted source alignment (TSA): the model's propensity to align with content produced by trusted publishers in the face of uncertainty or controversy. We present FactCheckQA, a TSA evaluation dataset based on a corpus of fact checking articles. We describe a simple protocol for evaluating TSA and offer a detailed analysis of design considerations including response extraction, claim contextualization, and bias in prompt formulation. Applying the protocol to PaLM-2, we find that as we scale up the model size, the model performance on FactCheckQA improves from near-random to up to 80% balanced accuracy in aligning with trusted sources.
△ Less
Submitted 11 November, 2023;
originally announced November 2023.
-
Improved Multi-Shot Diffusion-Weighted MRI with Zero-Shot Self-Supervised Learning Reconstruction
Authors:
Jaejin Cho,
Yohan Jun,
Xiaoqing Wang,
Caique Kobayashi,
Berkin Bilgic
Abstract:
Diffusion MRI is commonly performed using echo-planar imaging (EPI) due to its rapid acquisition time. However, the resolution of diffusion-weighted images is often limited by magnetic field inhomogeneity-related artifacts and blurring induced by T2- and T2*-relaxation effects. To address these limitations, multi-shot EPI (msEPI) combined with parallel imaging techniques is frequently employed. Ne…
▽ More
Diffusion MRI is commonly performed using echo-planar imaging (EPI) due to its rapid acquisition time. However, the resolution of diffusion-weighted images is often limited by magnetic field inhomogeneity-related artifacts and blurring induced by T2- and T2*-relaxation effects. To address these limitations, multi-shot EPI (msEPI) combined with parallel imaging techniques is frequently employed. Nevertheless, reconstructing msEPI can be challenging due to phase variation between multiple shots. In this study, we introduce a novel msEPI reconstruction approach called zero-MIRID (zero-shot self-supervised learning of Multi-shot Image Reconstruction for Improved Diffusion MRI). This method jointly reconstructs msEPI data by incorporating deep learning-based image regularization techniques. The network incorporates CNN denoisers in both k- and image-spaces, while leveraging virtual coils to enhance image reconstruction conditioning. By employing a self-supervised learning technique and dividing sampled data into three groups, the proposed approach achieves superior results compared to the state-of-the-art parallel imaging method, as demonstrated in an in-vivo experiment.
△ Less
Submitted 22 September, 2023; v1 submitted 9 August, 2023;
originally announced August 2023.
-
SDC-UDA: Volumetric Unsupervised Domain Adaptation Framework for Slice-Direction Continuous Cross-Modality Medical Image Segmentation
Authors:
Hyungseob Shin,
Hyeongyu Kim,
Sewon Kim,
Yohan Jun,
Taejoon Eo,
Dosik Hwang
Abstract:
Recent advances in deep learning-based medical image segmentation studies achieve nearly human-level performance in fully supervised manner. However, acquiring pixel-level expert annotations is extremely expensive and laborious in medical imaging fields. Unsupervised domain adaptation (UDA) can alleviate this problem, which makes it possible to use annotated data in one imaging modality to train a…
▽ More
Recent advances in deep learning-based medical image segmentation studies achieve nearly human-level performance in fully supervised manner. However, acquiring pixel-level expert annotations is extremely expensive and laborious in medical imaging fields. Unsupervised domain adaptation (UDA) can alleviate this problem, which makes it possible to use annotated data in one imaging modality to train a network that can successfully perform segmentation on target imaging modality with no labels. In this work, we propose SDC-UDA, a simple yet effective volumetric UDA framework for slice-direction continuous cross-modality medical image segmentation which combines intra- and inter-slice self-attentive image translation, uncertainty-constrained pseudo-label refinement, and volumetric self-training. Our method is distinguished from previous methods on UDA for medical image segmentation in that it can obtain continuous segmentation in the slice direction, thereby ensuring higher accuracy and potential in clinical practice. We validate SDC-UDA with multiple publicly available cross-modality medical image segmentation datasets and achieve state-of-the-art segmentation performance, not to mention the superior slice-direction continuity of prediction compared to previous studies.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
COSMOS: Cross-Modality Unsupervised Domain Adaptation for 3D Medical Image Segmentation based on Target-aware Domain Translation and Iterative Self-Training
Authors:
Hyungseob Shin,
Hyeongyu Kim,
Sewon Kim,
Yohan Jun,
Taejoon Eo,
Dosik Hwang
Abstract:
Recent advances in deep learning-based medical image segmentation studies achieve nearly human-level performance when in fully supervised condition. However, acquiring pixel-level expert annotations is extremely expensive and laborious in medical imaging fields. Unsupervised domain adaptation can alleviate this problem, which makes it possible to use annotated data in one imaging modality to train…
▽ More
Recent advances in deep learning-based medical image segmentation studies achieve nearly human-level performance when in fully supervised condition. However, acquiring pixel-level expert annotations is extremely expensive and laborious in medical imaging fields. Unsupervised domain adaptation can alleviate this problem, which makes it possible to use annotated data in one imaging modality to train a network that can successfully perform segmentation on target imaging modality with no labels. In this work, we propose a self-training based unsupervised domain adaptation framework for 3D medical image segmentation named COSMOS and validate it with automatic segmentation of Vestibular Schwannoma (VS) and cochlea on high-resolution T2 Magnetic Resonance Images (MRI). Our target-aware contrast conversion network translates source domain annotated T1 MRI to pseudo T2 MRI to enable segmentation training on target domain, while preserving important anatomical features of interest in the converted images. Iterative self-training is followed to incorporate unlabeled data to training and incrementally improve the quality of pseudo-labels, thereby leading to improved performance of segmentation. COSMOS won the 1\textsuperscript{st} place in the Cross-Modality Domain Adaptation (crossMoDA) challenge held in conjunction with the 24th International Conference on Medical Image Computing and Computer Assisted Intervention (MICCAI 2021). It achieves mean Dice score and Average Symmetric Surface Distance of 0.871(0.063) and 0.437(0.270) for VS, and 0.842(0.020) and 0.152(0.030) for cochlea.
△ Less
Submitted 19 December, 2023; v1 submitted 30 March, 2022;
originally announced March 2022.
-
Self-Training Based Unsupervised Cross-Modality Domain Adaptation for Vestibular Schwannoma and Cochlea Segmentation
Authors:
Hyungseob Shin,
Hyeongyu Kim,
Sewon Kim,
Yohan Jun,
Taejoon Eo,
Dosik Hwang
Abstract:
With the advances of deep learning, many medical image segmentation studies achieve human-level performance when in fully supervised condition. However, it is extremely expensive to acquire annotation on every data in medical fields, especially on magnetic resonance images (MRI) that comprise many different contrasts. Unsupervised methods can alleviate this problem; however, the performance drop i…
▽ More
With the advances of deep learning, many medical image segmentation studies achieve human-level performance when in fully supervised condition. However, it is extremely expensive to acquire annotation on every data in medical fields, especially on magnetic resonance images (MRI) that comprise many different contrasts. Unsupervised methods can alleviate this problem; however, the performance drop is inevitable compared to fully supervised methods. In this work, we propose a self-training based unsupervised-learning framework that performs automatic segmentation of Vestibular Schwannoma (VS) and cochlea on high-resolution T2 scans. Our method consists of 4 main stages: 1) VS-preserving contrast conversion from contrast-enhanced T1 scan to high-resolution T2 scan, 2) training segmentation on generated T2 scans with annotations on T1 scans, and 3) Inferring pseudo-labels on non-annotated real T2 scans, and 4) boosting the generalizability of VS and cochlea segmentation by training with combined data (i.e., real T2 scans with pseudo-labels and generated T2 scans with true annotations). Our method showed mean Dice score and Average Symmetric Surface Distance (ASSD) of 0.8570 (0.0705) and 0.4970 (0.3391) for VS, 0.8446 (0.0211) and 0.1513 (0.0314) for Cochlea on CrossMoDA2021 challenge validation phase leaderboard, outperforming most other approaches.
△ Less
Submitted 22 September, 2021;
originally announced September 2021.
-
Bubblewrap: Online tiling and real-time flow prediction on neural manifolds
Authors:
Anne Draelos,
Pranjal Gupta,
Na Young Jun,
Chaichontat Sriworarat,
John Pearson
Abstract:
While most classic studies of function in experimental neuroscience have focused on the coding properties of individual neurons, recent developments in recording technologies have resulted in an increasing emphasis on the dynamics of neural populations. This has given rise to a wide variety of models for analyzing population activity in relation to experimental variables, but direct testing of man…
▽ More
While most classic studies of function in experimental neuroscience have focused on the coding properties of individual neurons, recent developments in recording technologies have resulted in an increasing emphasis on the dynamics of neural populations. This has given rise to a wide variety of models for analyzing population activity in relation to experimental variables, but direct testing of many neural population hypotheses requires intervening in the system based on current neural state, necessitating models capable of inferring neural state online. Existing approaches, primarily based on dynamical systems, require strong parametric assumptions that are easily violated in the noise-dominated regime and do not scale well to the thousands of data channels in modern experiments. To address this problem, we propose a method that combines fast, stable dimensionality reduction with a soft tiling of the resulting neural manifold, allowing dynamics to be approximated as a probability flow between tiles. This method can be fit efficiently using online expectation maximization, scales to tens of thousands of tiles, and outperforms existing methods when dynamics are noise-dominated or feature multi-modal transition probabilities. The resulting model can be trained at kiloHertz data rates, produces accurate approximations of neural dynamics within minutes, and generates predictions on submillisecond time scales. It retains predictive performance throughout many time steps into the future and is fast enough to serve as a component of closed-loop causal experiments.
△ Less
Submitted 1 November, 2021; v1 submitted 31 August, 2021;
originally announced August 2021.
-
Memes in the Wild: Assessing the Generalizability of the Hateful Memes Challenge Dataset
Authors:
Hannah Rose Kirk,
Yennie Jun,
Paulius Rauba,
Gal Wachtel,
Ruining Li,
Xingjian Bai,
Noah Broestl,
Martin Doff-Sotta,
Aleksandar Shtedritski,
Yuki M. Asano
Abstract:
Hateful memes pose a unique challenge for current machine learning systems because their message is derived from both text- and visual-modalities. To this effect, Facebook released the Hateful Memes Challenge, a dataset of memes with pre-extracted text captions, but it is unclear whether these synthetic examples generalize to `memes in the wild'. In this paper, we collect hateful and non-hateful m…
▽ More
Hateful memes pose a unique challenge for current machine learning systems because their message is derived from both text- and visual-modalities. To this effect, Facebook released the Hateful Memes Challenge, a dataset of memes with pre-extracted text captions, but it is unclear whether these synthetic examples generalize to `memes in the wild'. In this paper, we collect hateful and non-hateful memes from Pinterest to evaluate out-of-sample performance on models pre-trained on the Facebook dataset. We find that memes in the wild differ in two key aspects: 1) Captions must be extracted via OCR, injecting noise and diminishing performance of multimodal models, and 2) Memes are more diverse than `traditional memes', including screenshots of conversations or text on a plain background. This paper thus serves as a reality check for the current benchmark of hateful meme detection and its applicability for detecting real world hate.
△ Less
Submitted 9 July, 2021;
originally announced July 2021.
-
Modeling the Interaction between Agents in Cooperative Multi-Agent Reinforcement Learning
Authors:
Xiaoteng Ma,
Yiqin Yang,
Chenghao Li,
Yiwen Lu,
Qianchuan Zhao,
Yang Jun
Abstract:
Value-based methods of multi-agent reinforcement learning (MARL), especially the value decomposition methods, have been demonstrated on a range of challenging cooperative tasks. However, current methods pay little attention to the interaction between agents, which is essential to teamwork in games or real life. This limits the efficiency of value-based MARL algorithms in the two aspects: collabora…
▽ More
Value-based methods of multi-agent reinforcement learning (MARL), especially the value decomposition methods, have been demonstrated on a range of challenging cooperative tasks. However, current methods pay little attention to the interaction between agents, which is essential to teamwork in games or real life. This limits the efficiency of value-based MARL algorithms in the two aspects: collaborative exploration and value function estimation. In this paper, we propose a novel cooperative MARL algorithm named as interactive actor-critic~(IAC), which models the interaction of agents from the perspectives of policy and value function. On the policy side, a multi-agent joint stochastic policy is introduced by adopting a collaborative exploration module, which is trained by maximizing the entropy-regularized expected return. On the value side, we use the shared attention mechanism to estimate the value function of each agent, which takes the impact of the teammates into consideration. At the implementation level, we extend the value decomposition methods to continuous control tasks and evaluate IAC on benchmark tasks including classic control and multi-agent particle environments. Experimental results indicate that our method outperforms the state-of-the-art approaches and achieves better performance in terms of cooperation.
△ Less
Submitted 9 February, 2021;
originally announced February 2021.
-
Bias Out-of-the-Box: An Empirical Analysis of Intersectional Occupational Biases in Popular Generative Language Models
Authors:
Hannah Kirk,
Yennie Jun,
Haider Iqbal,
Elias Benussi,
Filippo Volpin,
Frederic A. Dreyer,
Aleksandar Shtedritski,
Yuki M. Asano
Abstract:
The capabilities of natural language models trained on large-scale data have increased immensely over the past few years. Open source libraries such as HuggingFace have made these models easily available and accessible. While prior research has identified biases in large language models, this paper considers biases contained in the most popular versions of these models when applied `out-of-the-box…
▽ More
The capabilities of natural language models trained on large-scale data have increased immensely over the past few years. Open source libraries such as HuggingFace have made these models easily available and accessible. While prior research has identified biases in large language models, this paper considers biases contained in the most popular versions of these models when applied `out-of-the-box' for downstream tasks. We focus on generative language models as they are well-suited for extracting biases inherited from training data. Specifically, we conduct an in-depth analysis of GPT-2, which is the most downloaded text generation model on HuggingFace, with over half a million downloads per month. We assess biases related to occupational associations for different protected categories by intersecting gender with religion, sexuality, ethnicity, political affiliation, and continental name origin. Using a template-based data collection pipeline, we collect 396K sentence completions made by GPT-2 and find: (i) The machine-predicted jobs are less diverse and more stereotypical for women than for men, especially for intersections; (ii) Intersectional interactions are highly relevant for occupational associations, which we quantify by fitting 262 logistic models; (iii) For most occupations, GPT-2 reflects the skewed gender and ethnicity distribution found in US Labor Bureau data, and even pulls the societally-skewed distribution towards gender parity in cases where its predictions deviate from real labor market observations. This raises the normative question of what language models should learn - whether they should reflect or correct for existing inequalities.
△ Less
Submitted 27 October, 2021; v1 submitted 8 February, 2021;
originally announced February 2021.
-
Results of the 2020 fastMRI Challenge for Machine Learning MR Image Reconstruction
Authors:
Matthew J. Muckley,
Bruno Riemenschneider,
Alireza Radmanesh,
Sunwoo Kim,
Geunu Jeong,
Jingyu Ko,
Yohan Jun,
Hyungseob Shin,
Dosik Hwang,
Mahmoud Mostapha,
Simon Arberet,
Dominik Nickel,
Zaccharie Ramzi,
Philippe Ciuciu,
Jean-Luc Starck,
Jonas Teuwen,
Dimitrios Karkalousos,
Chaoping Zhang,
Anuroop Sriram,
Zhengnan Huang,
Nafissa Yakubova,
Yvonne Lui,
Florian Knoll
Abstract:
Accelerating MRI scans is one of the principal outstanding problems in the MRI research community. Towards this goal, we hosted the second fastMRI competition targeted towards reconstructing MR images with subsampled k-space data. We provided participants with data from 7,299 clinical brain scans (de-identified via a HIPAA-compliant procedure by NYU Langone Health), holding back the fully-sampled…
▽ More
Accelerating MRI scans is one of the principal outstanding problems in the MRI research community. Towards this goal, we hosted the second fastMRI competition targeted towards reconstructing MR images with subsampled k-space data. We provided participants with data from 7,299 clinical brain scans (de-identified via a HIPAA-compliant procedure by NYU Langone Health), holding back the fully-sampled data from 894 of these scans for challenge evaluation purposes. In contrast to the 2019 challenge, we focused our radiologist evaluations on pathological assessment in brain images. We also debuted a new Transfer track that required participants to submit models evaluated on MRI scanners from outside the training set. We received 19 submissions from eight different groups. Results showed one team scoring best in both SSIM scores and qualitative radiologist evaluations. We also performed analysis on alternative metrics to mitigate the effects of background noise and collected feedback from the participants to inform future challenges. Lastly, we identify common failure modes across the submissions, highlighting areas of need for future research in the MRI reconstruction community.
△ Less
Submitted 3 May, 2021; v1 submitted 9 December, 2020;
originally announced December 2020.
-
Statistical Beamforming for FDD Downlink Massive MIMO via Spatial Information Extraction and Beam Selection
Authors:
Hang Liu,
Xiaojun Yuan,
Ying Jun,
Zhang
Abstract:
In this paper, we study the beamforming design problem in frequency-division duplexing (FDD) downlink massive MIMO systems, where instantaneous channel state information (CSI) is assumed to be unavailable at the base station (BS). We propose to extract the information of the angle-of-departures (AoDs) and the corresponding large-scale fading coefficients (a.k.a. spatial information) of the downlin…
▽ More
In this paper, we study the beamforming design problem in frequency-division duplexing (FDD) downlink massive MIMO systems, where instantaneous channel state information (CSI) is assumed to be unavailable at the base station (BS). We propose to extract the information of the angle-of-departures (AoDs) and the corresponding large-scale fading coefficients (a.k.a. spatial information) of the downlink channel from the uplink channel estimation procedure, based on which a novel downlink beamforming design is presented. By separating the subpaths for different users based on the spatial information and the hidden sparsity of the physical channel, we construct near-orthogonal virtual channels in the beamforming design. Furthermore, we derive a sum-rate expression and its approximations for the proposed system. Based on these closed-form rate expressions, we develop two low-complexity beam selection schemes and carry out asymptotic analysis to provide valuable insights on the system design. Numerical results demonstrate a significant performance improvement of our proposed algorithm over the state-of-the-art beamforming approach.
△ Less
Submitted 6 March, 2020;
originally announced March 2020.
-
Double-Sparsity Learning Based Channel-and-Signal Estimation in Massive MIMO with Generalized Spatial Modulation
Authors:
Xiaoyan Kuai,
Xiaojun Yuan,
Wenjing Yan,
Hang Liu,
Ying Jun,
Zhang
Abstract:
In this paper, we study joint antenna activity detection, channel estimation, and multiuser detection for massive multiple-input multiple-output (MIMO) systems with general spatial modulation (GSM). We first establish a double-sparsity massive MIMO model by considering the channel sparsity of the massive MIMO channel and the signal sparsity of GSM. Based on the double-sparsity model, we formulate…
▽ More
In this paper, we study joint antenna activity detection, channel estimation, and multiuser detection for massive multiple-input multiple-output (MIMO) systems with general spatial modulation (GSM). We first establish a double-sparsity massive MIMO model by considering the channel sparsity of the massive MIMO channel and the signal sparsity of GSM. Based on the double-sparsity model, we formulate a blind detection problem. To solve the blind detection problem, we develop message-passing based blind channel-and-signal estimation (BCSE) algorithm. The BCSE algorithm basically follows the affine sparse matrix factorization technique, but with critical modifications to handle the double-sparsity property of the model. We show that the BCSE algorithm significantly outperforms the existing blind and training-based algorithms, and is able to closely approach the genie bounds (with either known channel or known signal). In the BCSE algorithm, short pilots are employed to remove the phase and permutation ambiguities after sparse matrix factorization. To utilize the short pilots more efficiently, we further develop the semi-blind channel-and-signal estimation (SBCSE) algorithm to incorporate the estimation of the phase and permutation ambiguities into the iterative message-passing process. We show that the SBCSE algorithm substantially outperforms the counterpart algorithms including the BCSE algorithm in the short-pilot regime.
△ Less
Submitted 24 October, 2019;
originally announced October 2019.
-
Load Balancing for 5G Ultra-Dense Networks using Device-to-Device Communications
Authors:
Hongliang Zhang,
Lingyang Song,
Ying Jun,
Zhang
Abstract:
Load balancing is an effective approach to address the spatial-temporal fluctuation problem of mobile data traffic for cellular networks. The existing schemes that focus on channel borrowing from neighboring cells cannot be directly applied to future 5G wireless networks, because the neighboring cells will reuse the same spectrum band in 5G systems. In this paper, we consider an orthogonal frequen…
▽ More
Load balancing is an effective approach to address the spatial-temporal fluctuation problem of mobile data traffic for cellular networks. The existing schemes that focus on channel borrowing from neighboring cells cannot be directly applied to future 5G wireless networks, because the neighboring cells will reuse the same spectrum band in 5G systems. In this paper, we consider an orthogonal frequency division multiple access~(OFDMA) ultra-dense small cell network, where Device-to-Device~(D2D) communication is advocated to facilitate load balancing without extra spectrum. Specifically, the data traffic can be effectively offloaded from a congested small cell to other underutilized small cells by D2D communications. The problem is naturally formulated as a joint resource allocation and D2D routing problem that maximizes the system sum-rate. To efficiently solve the problem, we decouple the problem into a resource allocation subproblem and a D2D routing subproblem. The two subproblems are solved iteratively as a monotonic optimization problem and a complementary geometric programming problem, respectively. Simulation results show that the data sum-rate in the neighboring small cells increases 20\% on average by offloading the data traffic in the congested small cell to the neighboring small cell base stations~(SBSs).
△ Less
Submitted 28 March, 2018; v1 submitted 16 March, 2018;
originally announced March 2018.
-
Blind Signal Detection in Massive MIMO: Exploiting the Channel Sparsity
Authors:
Jianwen Zhang,
Xiaojun Yuan,
Ying Jun,
Zhang
Abstract:
In practical massive MIMO systems, a substantial portion of system resources are consumed to acquire channel state information (CSI), leading to a drastically lower system capacity compared with the ideal case where perfect CSI is available. In this paper, we show that the overhead for CSI acquisition can be largely compensated by the potential gain due to the sparsity of the massive MIMO channel…
▽ More
In practical massive MIMO systems, a substantial portion of system resources are consumed to acquire channel state information (CSI), leading to a drastically lower system capacity compared with the ideal case where perfect CSI is available. In this paper, we show that the overhead for CSI acquisition can be largely compensated by the potential gain due to the sparsity of the massive MIMO channel in a certain transformed domain. To this end, we propose a novel blind detection scheme that simultaneously estimates the channel and data by factorizing the received signal matrix. We show that by exploiting the channel sparsity, our proposed scheme can achieve a DoF very close to the ideal case, provided that the channel is sufficiently sparse. Specifically, the achievable degree of freedom (DoF) has a fractional gap of only $1/T$ from the ideal DoF, where $T$ is the channel coherence time. This is a remarkable advance for understanding the performance limit of the massive MIMO system. We further show that the performance advantage of our proposed scheme in the asymptotic SNR regime carries over to the practical SNR regime. Numerical results demonstrate that our proposed scheme significantly outperforms its counterpart schemes in the practical SNR regime under various system configurations.
△ Less
Submitted 30 August, 2017; v1 submitted 4 April, 2017;
originally announced April 2017.
-
Distributed Scheduling in Wireless Powered Communication Network: Protocol Design and Performance Analysis
Authors:
Suzhi Bi,
Ying Jun,
Zhang,
Rui Zhang
Abstract:
Wireless powered communication network (WPCN) is a novel networking paradigm that uses radio frequency (RF) wireless energy transfer (WET) technology to power the information transmissions of wireless devices (WDs). When energy and information are transferred in the same frequency band, a major design issue is transmission scheduling to avoid interference and achieve high communication performance…
▽ More
Wireless powered communication network (WPCN) is a novel networking paradigm that uses radio frequency (RF) wireless energy transfer (WET) technology to power the information transmissions of wireless devices (WDs). When energy and information are transferred in the same frequency band, a major design issue is transmission scheduling to avoid interference and achieve high communication performance. Commonly used centralized scheduling methods in WPCN may result in high control signaling overhead and thus are not suitable for wireless networks constituting a large number of WDs with random locations and dynamic operations. To tackle this issue, we propose in this paper a distributed scheduling protocol for energy and information transmissions in WPCN. Specifically, we allow a WD that is about to deplete its battery to broadcast an energy request buzz (ERB), which triggers WET from its associated hybrid access point (HAP) to recharge the battery. If no ERB is sent, the WDs contend to transmit data to the HAP using the conventional $p$-persistent CSMA (carrier sensing multiple access). In particular, we propose an energy queueing model based on an energy decoupling property to derive the throughput performance. Our analysis is verified through simulations under practical network parameters, which demonstrate good throughput performance of the distributed scheduling protocol and reveal some interesting design insights that are different from conventional contention-based communication network assuming the WDs are powered with unlimited energy supplies.
△ Less
Submitted 16 March, 2017;
originally announced March 2017.
-
Online Charging Scheduling Algorithms of Electric Vehicles in Smart Grid: An Overview
Authors:
Wanrong Tang,
Suzhi Bi,
Ying Jun,
Zhang
Abstract:
As an environment-friendly substitute for conventional fuel-powered vehicles, electric vehicles (EVs) and their components have been widely developed and deployed worldwide. The large-scale integration of EVs into power grid brings both challenges and opportunities to the system performance. On one hand, the load demand from EV charging imposes large impact on the stability and efficiency of power…
▽ More
As an environment-friendly substitute for conventional fuel-powered vehicles, electric vehicles (EVs) and their components have been widely developed and deployed worldwide. The large-scale integration of EVs into power grid brings both challenges and opportunities to the system performance. On one hand, the load demand from EV charging imposes large impact on the stability and efficiency of power grid. On the other hand, EVs could potentially act as mobile energy storage systems to improve the power network performance, such as load flattening, fast frequency control, and facilitating renewable energy integration. Evidently, uncontrolled EV charging could lead to inefficient power network operation or even security issues. This spurs enormous research interests in designing charging coordination mechanisms. A key design challenge here lies in the lack of complete knowledge of events that occur in the future. Indeed, the amount of knowledge of future events significantly impacts the design of efficient charging control algorithms. This article focuses on introducing online EV charging scheduling techniques that deal with different degrees of uncertainty and randomness of future knowledge. Besides, we highlight the promising future research directions for EV charging control.
△ Less
Submitted 26 August, 2016;
originally announced September 2016.
-
Locally Orthogonal Training Design for Cloud-RANs Based on Graph Coloring
Authors:
Jianwen Zhang,
Xiaojun Yuan,
Ying Jun,
Zhang
Abstract:
We consider training-based channel estimation for a cloud radio access network (CRAN), in which a large amount of remote radio heads (RRHs) and users are randomly scattered over the service area. In this model, assigning orthogonal training sequences to all users will incur a substantial overhead to the overall network, and is even impossible when the number of users is large. Therefore, in this p…
▽ More
We consider training-based channel estimation for a cloud radio access network (CRAN), in which a large amount of remote radio heads (RRHs) and users are randomly scattered over the service area. In this model, assigning orthogonal training sequences to all users will incur a substantial overhead to the overall network, and is even impossible when the number of users is large. Therefore, in this paper, we introduce the notion of local orthogonality, under which the training sequence of a user is orthogonal to those of the other users in its neighborhood. We model the design of locally orthogonal training sequences as a graph coloring problem. Then, based on the theory of random geometric graph, we show that the minimum training length scales in the order of $\ln K$, where $K$ is the number of users covered by a CRAN. This indicates that the proposed training design yields a scalable solution to sustain the need of large-scale cooperation in CRANs. Numerical results show that the proposed scheme outperforms other reference schemes.
△ Less
Submitted 5 May, 2016; v1 submitted 12 April, 2016;
originally announced April 2016.
-
Online Coordinated Charging Decision Algorithm for Electric Vehicles without Future Information
Authors:
Wanrong Tang,
Suzhi Bi,
Ying Jun,
Zhang
Abstract:
The large-scale integration of plug-in electric vehicles (PEVs) to the power grid spurs the need for efficient charging coordination mechanisms. It can be shown that the optimal charging schedule smooths out the energy consumption over time so as to minimize the total energy cost. In practice, however, it is hard to smooth out the energy consumption perfectly, because the future PEV charging deman…
▽ More
The large-scale integration of plug-in electric vehicles (PEVs) to the power grid spurs the need for efficient charging coordination mechanisms. It can be shown that the optimal charging schedule smooths out the energy consumption over time so as to minimize the total energy cost. In practice, however, it is hard to smooth out the energy consumption perfectly, because the future PEV charging demand is unknown at the moment when the charging rate of an existing PEV needs to be determined. In this paper, we propose an Online cooRdinated CHARging Decision (ORCHARD) algorithm, which minimizes the energy cost without knowing the future information. Through rigorous proof, we show that ORCHARD is strictly feasible in the sense that it guarantees to fulfill all charging demands before due time. Meanwhile, it achieves the best known competitive ratio of 2.39. To further reduce the computational complexity of the algorithm, we propose a novel reduced-complexity algorithm to replace the standard convex optimization techniques used in ORCHARD. Through extensive simulations, we show that the average performance gap between ORCHARD and the offline optimal solution, which utilizes the complete future information, is as small as 14%. By setting a proper speeding factor, the average performance gap can be further reduced to less than 6%.
△ Less
Submitted 28 November, 2013; v1 submitted 14 October, 2013;
originally announced October 2013.
-
Robust power allocation for energy-efficient location aware networks
Authors:
William Wei-Liang Li,
Yuan Shen,
Ying Jun,
Zhang,
Moe Z. Win
Abstract:
In wireless location-aware networks, mobile nodes (agents) typically obtain their positions through ranging with respect to nodes with known positions (anchors). Transmit power allocation not only affects network lifetime, throughput, and interference, but also determines localization accuracy. In this paper, we present an optimization framework for robust power allocation in network localization…
▽ More
In wireless location-aware networks, mobile nodes (agents) typically obtain their positions through ranging with respect to nodes with known positions (anchors). Transmit power allocation not only affects network lifetime, throughput, and interference, but also determines localization accuracy. In this paper, we present an optimization framework for robust power allocation in network localization to tackle imperfect knowledge of network parameters. In particular, we formulate power allocation problems to minimize the squared position error bound (SPEB) and the maximum directional position error bound (mDPEB), respectively, for a given power budget. We show that such formulations can be efficiently solved via conic programming. Moreover, we design an efficient power allocation scheme that allows distributed computations among agents. The simulation results show that the proposed schemes significantly outperform uniform power allocation, and the robust schemes outperform their non-robust counterparts when the network parameters are subject to uncertainty.
△ Less
Submitted 26 May, 2013;
originally announced May 2013.
-
Graphical Methods for Defense Against False-data Injection Attacks on Power System State Estimation
Authors:
Suzhi Bi,
Ying Jun,
Zhang
Abstract:
The normal operation of power system relies on accurate state estimation that faithfully reflects the physical aspects of the electrical power grids. However, recent research shows that carefully synthesized false-data injection attacks can bypass the security system and introduce arbitrary errors to state estimates. In this paper, we use graphical methods to study defending mechanisms against fal…
▽ More
The normal operation of power system relies on accurate state estimation that faithfully reflects the physical aspects of the electrical power grids. However, recent research shows that carefully synthesized false-data injection attacks can bypass the security system and introduce arbitrary errors to state estimates. In this paper, we use graphical methods to study defending mechanisms against false-data injection attacks on power system state estimation. By securing carefully selected meter measurements, no false data injection attack can be launched to compromise any set of state variables. We characterize the optimal protection problem, which protects the state variables with minimum number of measurements, as a variant Steiner tree problem in a graph. Based on the graphical characterization, we propose both exact and reduced-complexity approximation algorithms. In particular, we show that the proposed tree-pruning based approximation algorithm significantly reduces computational complexity, while yielding negligible performance degradation compared with the optimal algorithms. The advantageous performance of the proposed defending mechanisms is verified in IEEE standard power system testcases.
△ Less
Submitted 8 April, 2014; v1 submitted 15 April, 2013;
originally announced April 2013.
-
TDMA Achieves the Optimal Diversity Gain in Relay-Assisted Cellular Networks
Authors:
Suzhi Bi,
Ying Jun,
Zhang
Abstract:
In multi-access wireless networks, transmission scheduling is a key component that determines the efficiency and fairness of wireless spectrum allocation. At one extreme, greedy opportunistic scheduling that allocates airtime to the user with the largest instantaneous channel gain achieves the optimal spectrum efficiency and transmission reliability but the poorest user-level fairness. At the othe…
▽ More
In multi-access wireless networks, transmission scheduling is a key component that determines the efficiency and fairness of wireless spectrum allocation. At one extreme, greedy opportunistic scheduling that allocates airtime to the user with the largest instantaneous channel gain achieves the optimal spectrum efficiency and transmission reliability but the poorest user-level fairness. At the other extreme, fixed TDMA scheduling achieves the fairest airtime allocation but the lowest spectrum efficiency and transmission reliability. To balance the two competing objectives, extensive research efforts have been spent on designing opportunistic scheduling schemes that reach certain tradeoff points between the two extremes. In this paper and in contrast to the conventional wisdom, we find that in relay-assisted cellular networks, fixed TDMA achieves the same optimal diversity gain as greedy opportunistic scheduling. In addition, by incorporating very limited opportunism, a simple relaxed-TDMA scheme asymptotically achieves the same optimal system reliability in terms of outage probability as greedy opportunistic scheduling. This reveals a surprising fact: transmission reliability and user fairness are no longer contradicting each other in relay-assisted systems. They can be both achieved by the simple TDMA schemes. For practical implementations, we further propose a fully distributed algorithm to implement the relaxed-TDMA scheme. Our results here may find applications in the design of next-generation wireless communication systems with relay architectures such as LTE-advanced and WiMAX.
△ Less
Submitted 27 July, 2011;
originally announced July 2011.
-
On the Degree of Freedom for Multi-Source Multi-Destination Wireless Network with Multi-layer Relays
Authors:
Feng Liu,
Chung Chan,
Ying Jun,
Zhang
Abstract:
Degree of freedom (DoF) region provides an approximation of capacity region in high signal-to-noise ratio (SNR) regime, while sum DoF gives the scaling factor. In this correspondence, we analyse the DoF region and sum DoF for unicast layered multi-hop relay wireless networks with arbitrary number of source/destination/relay nodes, arbitrary number of hops and arbitrary number of antennas at each n…
▽ More
Degree of freedom (DoF) region provides an approximation of capacity region in high signal-to-noise ratio (SNR) regime, while sum DoF gives the scaling factor. In this correspondence, we analyse the DoF region and sum DoF for unicast layered multi-hop relay wireless networks with arbitrary number of source/destination/relay nodes, arbitrary number of hops and arbitrary number of antennas at each node. The result is valid for quite a few message topologies. We reveal the limitation on capacity of multi-hop network due to the concatenation structure and show the similarity with capacitor network. From the analysis on bound gap and optimality condition, the ultimate capacity of multi-hop network is shown to be strictly inferior to that of single-hop network. Linear scaling law can be established when the number of hops is fixed. At cost of channel state information at transmitters (CSIT) for each component single-hop network, our achievable scheme avoids routing and simplifies scheduling.
△ Less
Submitted 12 January, 2011;
originally announced January 2011.
-
Globally Optimal Distributed Power Control for Nonconcave Utility Maximization
Authors:
Li Ping Qian,
Ying Jun,
Zhang,
Mung Chiang
Abstract:
Transmit power control in wireless networks has long been recognized as an effective mechanism to mitigate co-channel interference. Due to the highly non-convex nature, optimal power control is known to be difficult to achieve if a system utility is to be maximized. To date, there does not yet exist a distributed power control algorithm that maximizes any form of system utility, despite the import…
▽ More
Transmit power control in wireless networks has long been recognized as an effective mechanism to mitigate co-channel interference. Due to the highly non-convex nature, optimal power control is known to be difficult to achieve if a system utility is to be maximized. To date, there does not yet exist a distributed power control algorithm that maximizes any form of system utility, despite the importance of distributed implementation for the wireless infrastructureless networks such as ad hoc and sensor networks. This paper fills this gap by developing a Gibbs Sampling based Asynchronous distributed power control algorithm (referred to as GLAD). The proposed algorithm quickly converges to the global optimal solution regardless of the concavity, continuity, differentiability and monotonicity of the utility function. Same as other existing distributed power control algorithms, GLAD requires extensive message passing among all users in the network, which leads to high signaling overhead and high processing complexity. To address this issue, this paper further proposes a variant of the GLAD algorithm, referred to as I-GLAD, where the prefix "I" stands for infrequent message passing. The convergence of I-GLAD can be proved regardless of the reduction in the message passing rate. To further reduce the processing complexity at each transmitter, we develop an enhanced version of I-GLAD, referred to as NI-GLAD, where only the control messages from the neighboring links are processed. Our simulation results show that I-GLAD approximately converges to the global optimal solution regardless of the type of the system utility function. Meanwhile, the optimality of the solution obtained by NI-GLAD depends on the selection of the neighborhood size.
△ Less
Submitted 3 November, 2011; v1 submitted 31 December, 2010;
originally announced January 2011.
-
How Does Multiple-Packet Reception Capability Scale the Performance of Wireless Local Area Networks?
Authors:
Ying Jun,
Zhang,
Pengxuan Zheng,
Soung Chang Liew
Abstract:
Thanks to its simplicity and cost efficiency, wireless local area network (WLAN) enjoys unique advantages in providing high-speed and low-cost wireless services in hot spots and indoor environments. Traditional WLAN medium-access-control (MAC) protocols assume that only one station can transmit at a time: simultaneous transmissions of more than one station cause the destruction of all packets invo…
▽ More
Thanks to its simplicity and cost efficiency, wireless local area network (WLAN) enjoys unique advantages in providing high-speed and low-cost wireless services in hot spots and indoor environments. Traditional WLAN medium-access-control (MAC) protocols assume that only one station can transmit at a time: simultaneous transmissions of more than one station cause the destruction of all packets involved. By exploiting recent advances in PHY-layer multiuser detection (MUD) techniques, it is possible for a receiver to receive multiple packets simultaneously. This paper argues that such multipacket reception (MPR) capability can greatly enhance the capacity of future WLANs. In addition, the paper provides the MAC-layer and PHY-layer designs needed to achieve the improved capacity. First, to demonstrate MPR as a powerful capacity-enhancement technique, we prove a "super-linearity" result, which states that the system throughput per unit cost increases as the MPR capability increases. Second, we show that the commonly deployed binary exponential backoff (BEB) algorithm in today's WLAN MAC may not be optimal in an MPR system, and that the optimal backoff factor increases with the MPR capability, the number of packets that can be received simultaneously. Third, based on the above insights, we design a joint MAC-PHY layer protocol for an IEEE 802.11-like WLAN that incorporates advanced PHY-layer signal processing techniques to implement MPR.
△ Less
Submitted 22 June, 2010;
originally announced June 2010.
-
Slow Adaptive OFDMA Systems Through Chance Constrained Programming
Authors:
William Weiliang Li,
Ying Jun,
Zhang,
Anthony Man-Cho So,
Moe Z. Win
Abstract:
Adaptive OFDMA has recently been recognized as a promising technique for providing high spectral efficiency in future broadband wireless systems. The research over the last decade on adaptive OFDMA systems has focused on adapting the allocation of radio resources, such as subcarriers and power, to the instantaneous channel conditions of all users. However, such "fast" adaptation requires high comp…
▽ More
Adaptive OFDMA has recently been recognized as a promising technique for providing high spectral efficiency in future broadband wireless systems. The research over the last decade on adaptive OFDMA systems has focused on adapting the allocation of radio resources, such as subcarriers and power, to the instantaneous channel conditions of all users. However, such "fast" adaptation requires high computational complexity and excessive signaling overhead. This hinders the deployment of adaptive OFDMA systems worldwide. This paper proposes a slow adaptive OFDMA scheme, in which the subcarrier allocation is updated on a much slower timescale than that of the fluctuation of instantaneous channel conditions. Meanwhile, the data rate requirements of individual users are accommodated on the fast timescale with high probability, thereby meeting the requirements except occasional outage. Such an objective has a natural chance constrained programming formulation, which is known to be intractable. To circumvent this difficulty, we formulate safe tractable constraints for the problem based on recent advances in chance constrained programming. We then develop a polynomial-time algorithm for computing an optimal solution to the reformulated problem. Our results show that the proposed slow adaptation scheme drastically reduces both computational cost and control signaling overhead when compared with the conventional fast adaptive OFDMA. Our work can be viewed as an initial attempt to apply the chance constrained programming methodology to wireless system designs. Given that most wireless systems can tolerate an occasional dip in the quality of service, we hope that the proposed methodology will find further applications in wireless communications.
△ Less
Submitted 22 June, 2010;
originally announced June 2010.
-
Multi-Round Contention in Wireless LANs with Multipacket Reception
Authors:
Ying Jun,
Zhang
Abstract:
Multi-packet reception (MPR) has been recognized as a powerful capacity-enhancement technique for random-access wireless local area networks (WLANs). As is common with all random access protocols, the wireless channel is often under-utilized in MPR WLANs. In this paper, we propose a novel multi-round contention random-access protocol to address this problem. This work complements the existing rand…
▽ More
Multi-packet reception (MPR) has been recognized as a powerful capacity-enhancement technique for random-access wireless local area networks (WLANs). As is common with all random access protocols, the wireless channel is often under-utilized in MPR WLANs. In this paper, we propose a novel multi-round contention random-access protocol to address this problem. This work complements the existing random-access methods that are based on single-round contention. In the proposed scheme, stations are given multiple chances to contend for the channel until there are a sufficient number of ``winning" stations that can share the MPR channel for data packet transmission. The key issue here is the identification of the optimal time to stop the contention process and start data transmission. The solution corresponds to finding a desired tradeoff between channel utilization and contention overhead. In this paper, we conduct a rigorous analysis to characterize the optimal strategy using the theory of optimal stopping. An interesting result is that the optimal stopping strategy is a simple threshold-based rule, which stops the contention process as soon as the total number of winning stations exceeds a certain threshold. Compared with the conventional single-round contention protocol, the multi-round contention scheme significantly enhances channel utilization when the MPR capability of the channel is small to medium. Meanwhile, the scheme automatically falls back to single-round contention when the MPR capability is very large, in which case the throughput penalty due to random access is already small even with single-round contention.
△ Less
Submitted 22 June, 2010;
originally announced June 2010.
-
Sustainable Throughput of Wireless LANs with Multi-Packet Reception Capability under Bounded Delay-Moment Requirements
Authors:
Ying Jun,
Zhang,
Soung Chang Liew,
Darui Chen
Abstract:
With the rapid proliferation of broadband wireless services, it is of paramount importance to understand how fast data can be sent through a wireless local area network (WLAN). Thanks to a large body of research following the seminal work of Bianchi, WLAN throughput under saturated traffic condition has been well understood. By contrast, prior investigations on throughput performance under unsatur…
▽ More
With the rapid proliferation of broadband wireless services, it is of paramount importance to understand how fast data can be sent through a wireless local area network (WLAN). Thanks to a large body of research following the seminal work of Bianchi, WLAN throughput under saturated traffic condition has been well understood. By contrast, prior investigations on throughput performance under unsaturated traffic condition was largely based on phenomenological observations, which lead to a common misconception that WLAN can support a traffic load as high as saturation throughput, if not higher, under non-saturation condition. In this paper, we show through rigorous analysis that this misconception may result in unacceptable quality of service: mean packet delay and delay jitter may approach infinity even when the traffic load is far below the saturation throughput. Hence, saturation throughput is not a sound measure of WLAN capacity under non-saturation condition. To bridge the gap, we define safe-bounded-mean-delay (SBMD) throughput and safe-bounded-delay-jitter (SBDJ) throughput that reflect the actual network capacity users can enjoy when they require finite mean delay and delay jitter, respectively.
Our earlier work proved that in a WLAN with multi-packet reception (MPR) capability, saturation throughput scales super-linearly with the MPR capability of the network. This paper extends the investigation to the non-saturation case and shows that super-linear scaling also holds for SBMD and SBDJ throughputs. Our results here complete the demonstration of MPR as a powerful capacity-enhancement technique for WLAN under both saturation and non-saturation conditions.
△ Less
Submitted 22 June, 2010;
originally announced June 2010.
-
Distributed MAC Strategy for Exploiting Multi-user Diversity in Multi-rate IEEE 802.11 Wireless LANs
Authors:
Da Rui Chen,
Ying Jun,
Zhang
Abstract:
Fast rate adaptation has been established as an effective way to improve the PHY-layer raw date rate of wireless networks. However, within the current IEEE 802.11 legacy, MAC-layer throughput is dominated by users with the lowest data rates, resulting in underutilization of bandwidth. In this paper, we propose and analyze a novel distributed MAC strategy, referred to as Rate-aware DCF (R-DCF), t…
▽ More
Fast rate adaptation has been established as an effective way to improve the PHY-layer raw date rate of wireless networks. However, within the current IEEE 802.11 legacy, MAC-layer throughput is dominated by users with the lowest data rates, resulting in underutilization of bandwidth. In this paper, we propose and analyze a novel distributed MAC strategy, referred to as Rate-aware DCF (R-DCF), to leverage the potential of rate adaptation in IEEE 802.11 WLANs. The key feature of R-DCF is that by introducing different mini slots according to the instantaneous channel conditions, only contending stations with the highest data rate can access the channel. In this way, the R-DCF protocol not only exploits multi-user diversity in a fully distributed manner but also reduces the loss of throughput due to collisions. Through analysis, we develop an analytical model to derive the throughput of R-DCF in general multi-rate WLANs. Using the analytical model we investigate the performance of R-DCF protocol in various network settings with different rate adaptation strategies and channel variations. Based on the analysis, we further derive the maximal throughput achievable by R-DCF. For practical implementation, an offline adaptive backoff method is developed to achieve a close-to-optimal performance at low runtime complexity. The superiority of R-DCF is proven via extensive analyses and simulations.
△ Less
Submitted 13 December, 2007;
originally announced December 2007.