entry_id
stringlengths
33
33
published
stringlengths
14
14
title
stringlengths
17
179
authors
sequence
primary_category
stringlengths
5
18
categories
sequence
text
stringlengths
15
240k
http://arxiv.org/abs/2303.06806v1
20230313012855
Neural Diarization with Non-autoregressive Intermediate Attractors
[ "Yusuke Fujita", "Tatsuya Komatsu", "Robin Scheibler", "Yusuke Kida", "Tetsuji Ogawa" ]
eess.AS
[ "eess.AS", "cs.CL", "cs.SD" ]
Boosting Source Code Learning with Data Augmentation: An Empirical Study Jianjun Zhao ======================================================================== End-to-end neural diarization (EEND) with encoder-decoder-based attractors (EDA) is a promising method to handle the whole speaker diarization problem simultaneously with a single neural network. While the EEND model can produce all frame-level speaker labels simultaneously, it disregards output label dependency. In this work, we propose a novel EEND model that introduces the label dependency between frames. The proposed method generates non-autoregressive intermediate attractors to produce speaker labels at the lower layers and conditions the subsequent layers with these labels. While the proposed model works in a non-autoregressive manner, the speaker labels are refined by referring to the whole sequence of intermediate labels. The experiments with the two-speaker CALLHOME dataset show that the intermediate labels with the proposed non-autoregressive intermediate attractors boost the diarization performance. The proposed method with the deeper network benefits more from the intermediate labels, resulting in better performance and training throughput than EEND-EDA. end-to-end neural diarization, intermediate objective, self-conditioning, attractor, speaker diarization § INTRODUCTION Speaker diarization is the task of detecting multi-speaker speech activity in audio recordings. It has been actively studied as an essential component for conversational speech understanding <cit.>. The task has been evaluated in telephone conversations (CALLHOME <cit.>), meetings (ICSI <cit.>, AMI <cit.>), web videos (VoxConverse <cit.>) and various hard scenarios (DIHARD Challenges <cit.>). A standard approach to speaker diarization is speaker embedding clustering <cit.>, which first extracts speaker-discriminative embeddings like x-vectors <cit.> and d-vectors <cit.> for fixed-length speech segments, and then merges homogeneous segments to the same speaker by applying a clustering algorithm such as spectral clustering <cit.> and agglomerative hierarchical clustering <cit.>. For speaker embedding clustering, voice activity detection should be done in advance to determine speech/non-speech boundaries, and overlapping speech segments have to be eliminated with some pre- or post-processing methods<cit.>. As an alternative to speaker embedding clustering, end-to-end neural diarization (EEND) <cit.> has been proposed. EEND learns a neural network to directly produce full speaker diarization labels containing speech/non-speech boundaries and overlapping speech segments, as well as speaker assignments for the detected speech segments. Since the speaker diarization labels have permutation ambiguity due to the arbitrary order of speaker indices, the EEND network is trained with permutation-invariant training objectives. Various network architectures have been investigated for EEND including Transformer <cit.>, time-dilated convolutional neural network <cit.>, and Conformer <cit.>. Encoder-decoder-based attractor (EDA) <cit.> is a promising network architecture for EEND, which first generates an attractor vector for each speaker from an embedding sequence, and then generates the speaker's activity by measuring the similarity between the embedding sequence and the attractor vector. Although the EEND-EDA model is found to be effective compared with speaker embedding clustering, there are two points of improvement. First, the model assumes conditional independence between frame-level speaker labels, which limits their performance. The EEND-EDA model runs in a non-autoregressive manner and produces all frame-level speaker labels in parallel. However, such non-autoregressive models disregard the potential benefit of the output label dependency between frames. Second, the long-short term memory (LSTM)-based encoder in EDA receives the frame-level embeddings recursively. The well-known vanishing gradient problem of LSTM hinders the optimization of the lower layers. In related fields, researchers have studied the use of “intermediate” labels to relax the conditional independence assumption in such non-autoregressive models. For non-autoregressive automatic speech recognition (ASR) based on connectionist temporal classification (CTC), Intermediate CTC <cit.> is proposed to introduce auxiliary tasks of predicting labels inside the network by inserting the same CTC losses to the intermediate predictions. Self-conditioned CTC <cit.> further utilizes the intermediate labels at the lower layer as conditions for enhancing the predictions at the upper layers. This self-conditioning technique achieves the best performance among the non-autoregressive ASR systems <cit.>. For EEND, a similar intermediate speaker label prediction technique <cit.> is proposed, which uses the same permutation-invariant training objectives for the intermediate speaker labels. However, the intermediate speaker labels are not utilized for the self-conditioning features. These prior studies motivate us to introduce the self-conditioning technique in EEND models. In this paper, we propose a novel network architecture for EEND that uses intermediate speaker labels to condition the subsequent network layers. For producing the intermediate speaker labels, the proposed method extracts intermediate attractors at every encoder layer. The auxiliary permutation-invariant training losses are introduced for optimizing the intermediate labels. For conditioning the subsequent network layers, the proposed method adds the weighted intermediate attractors to the frame-level embeddings. While the proposed network still works in a non-autoregressive manner, the speaker labels are iteratively refined by referring to the whole sequence of intermediate speaker labels. For the vanishing gradient problem in the EDA's LSTM, we adopt the attention mechanism <cit.>. Unlike LSTM, it does not suffer from vanishing gradients, thus facilitating optimization of the lower layers. Another advantage of the attention mechanism is that it is non-autoregressive, so training throughput is much higher than LSTM when interacting with the intermediate training objectives. The experimental results with the two-speaker CALLHOME dataset show that the intermediate labels with the proposed non-autoregressive intermediate attractors boost the diarization performance while the original EDA cannot get benefit from the intermediate labels. The proposed method with the deeper network benefits more from the intermediate labels, resulting in better performance and training throughput than EEND-EDA. § METHOD This section briefly introduces EEND-EDA as our baseline system, followed by our proposed method: intermediate attractors. §.§ End-to-end Neural Diarization EEND formulates the speaker diarization problem as a frame-wise multi-label classification task <cit.>. In this paper, we denote X ∈ℝ^D× T as a T-length sequence of D-dimensional audio features. A neural network accepts X and produces the same-length sequence of speaker label posteriors Y ∈ [0,1]^C× T, where C is the number of speakers and [Y]_c,t is the probability that c-th speaker is speaking at time t. The network is trained to minimize the binary cross-entropy loss between the ground-truth speaker labels Y^* ∈{0,1}^C× T and the estimated label posteriors Y: ℒ_𝖯𝖨𝖳(Y^*, Y) = 1/CTmin_ϕ∈𝒫(C)∑_c=1^C ∑_t=1^T 𝖡𝖢𝖤([Y^*]_ϕ_c,t, [Y]_c,t), where 𝖡𝖢𝖤(y^*,y) = - y^*log y - (1-y^*)log(1-y), 𝒫(C) is the set of all permutations of a sequence {1,…,C}. This permutation-invariant training scheme <cit.> correctly handles the label ambiguity caused by the arbitrary order of speaker indices. §.§ EEND with Encoder-decoder-based Attractors The neural network for EEND adopted in <cit.> comprises of a stack of Transformer encoders: E_l = 𝖤𝗇𝖼𝗈𝖽𝖾𝗋𝖫𝖺𝗒𝖾𝗋_l(E_l-1) ∈ℝ^D× T (1 ≤ l ≤ L), where L is the number of Transformer layers and E_0 = X [In this paper, we assume X is subsampled beforehand.]. Whereas the vanilla EEND <cit.> simply transforms E_L to Y by a linear layer followed by a sigmoid function, EDA <cit.> first generates speaker-wise attractor vectors A = [a_1, …, a_C] ∈ℝ^D× C: A = 𝖤𝖣𝖠(E_L). Here, this EDA function is implemented using long short-term memory (LSTM) layers: (h_t, c_t) = 𝖫𝖲𝖳𝖬_𝖾𝗇𝖼(h_t-1, c_t-1, [E_L]_:,t) (1 ≤ t ≤ T), (a_c, d_c) = 𝖫𝖲𝖳𝖬_𝖽𝖾𝖼(a_c-1, d_c-1, 0) (1 ≤ c ≤ C), where 𝖫𝖲𝖳𝖬_𝖾𝗇𝖼() is an unidirectional LSTM layer that sequentially reads an embedding vector for time t, [E_L]_:,t is the embedding vector from the t-th column of E_L, h_t ∈ℝ^D is a hidden state, c_t ∈ℝ^D is a cell state. 𝖫𝖲𝖳𝖬_𝖽𝖾𝖼() is another unidirectional LSTM layer with the initial hidden state a_0 = h_T and the initial cell state d_0 = c_T. The decoder LSTM receives zero vector C times to produce the speaker-wise attractor vector a_c for C speakers. EEND-EDA estimates the speaker label by comparing the embedding sequence E_L with the speaker-wise attractors A: Y = 𝖲𝗂𝗀𝗆𝗈𝗂𝖽(A^⊤E_L). As the number of attractor vectors can vary with the number of iterations C in Eq. <ref>, EDA can handle an unknown number of speakers by jointly estimating the number of iterations. In this paper, we fix the number of iterations to two since we only evaluate the method on two-speaker conversations. With EEND-EDA described above, the speaker labels at all frames are estimated in parallel. This parallel estimator lacks a mechanism handling the label dependency between frames. In the next subsection, we consider the label dependency between frames by using intermediate speaker labels. §.§ Intermediate Attractors Considering the label dependency between frames, we extract “intermediate” speaker labels and feed them into the subsequent network layers. Because the upper layer can refer to the whole sequence of intermediate speaker labels from the lower layer, conditional independence between frames is relaxed. The overview of the proposed method with the four-layer EEND-EDA model is depicted in Fig. <ref>. For producing the intermediate speaker labels, intermediate attractors are generated with EDA. Using the same EDA components in Eq. <ref>, intermediate attractors for the l-th layer are calculated as follows: A_l = 𝖤𝖣𝖠(E_l). Then, intermediate speaker labels Y_l for each layer are estimated using the intermediate attractors A_l, similar to Eq. <ref>: Y_l = 𝖲𝗂𝗀𝗆𝗈𝗂𝖽(A_l^⊤E_l) (1 ≤ l ≤ L-1) The auxiliary permutation-invariant training loss is introduced for the intermediate speaker labels, and the model is trained with the summation of the original loss (Eq. <ref>) and the intermediate losses [We can take the weighted loss by introducing a mixing ratio. However, we ignore the hyperparameter in this work.]: ℒ_𝗂𝗇𝗍𝖾𝗋 = ℒ_𝖯𝖨𝖳(Y^*, Y) + 1/L-1∑_l=1^L-1ℒ_𝖯𝖨𝖳(Y^*, Y_l). For conditioning the subsequent network layers, the weighted intermediate attractors are added to the input embeddings. Eq. <ref> is modified by inserting the conditioning function for the input embedding: E_l = 𝖤𝗇𝖼𝗈𝖽𝖾𝗋𝖫𝖺𝗒𝖾𝗋_l(𝖢𝗈𝗇𝖽𝗂𝗍𝗂𝗈𝗇(E_l-1)), 𝖢𝗈𝗇𝖽𝗂𝗍𝗂𝗈𝗇(E_l) = E_l + W A_l Y_l, where W ∈ℝ^D× D is learnable parameters that control the weights of intermediate predictions.W is the only additional parameter introduced for the proposed method and is shared among L-1 layers. A_l Y_l in Eq. <ref> can be interpreted as a T-length sequence of weighted averages of attractor vectors, and the weights are determined by the intermediate speaker labels. Through the intermediate attractors, the subsequent layers are conditioned on the intermediate speaker labels. §.§ Non-autoregressive Attractor Extraction For training efficiency with the intermediate speaker labels, we propose a non-autoregressive extraction of speaker-wise attractors instead of the LSTM-based autoregressive extractor used in EDA <cit.>. The difference is depicted in Fig. <ref>. We prepare query vectors Q ∈ℝ^C× D for the attractors as learnable parameters through training. A cross-attention module extracts the attractors by using the query vector and the frame-wise embeddings E_L as keys and values: A = 𝖠𝗍𝗍𝗇(Q, E_L, E_L), where 𝖠𝗍𝗍𝗇 is a multi-head attention layer used in Transformer decoders <cit.>. The intermediate attractors are extracted by using the same attention layer: A_l = 𝖠𝗍𝗍𝗇(Q, E_l, E_l) (1 ≤ l ≤ L-1). Speaker labels and their intermediates are estimated using Eqs. <ref> and <ref>, respectively. The intermediate labels are utilized to condition the subsequent layers using Eqs.<ref> and <ref>. Note that the original EDA can work with an unknown number of speakers, while our non-autoregressive extraction generates a fixed number of attractors. Our method can be extended to an unknown number of speakers by adding a speaker-counting objective for the attractors, similar to EDA <cit.>. § EXPERIMENTS §.§ Data The statistics of the datasets are listed in Table <ref>. We followed the family of EEND works <cit.> to prepare test data for two-speaker telephone conversations extracted from CALLHOME [The data preparation code is available at <https://github.com/hitachi-speech/EEND>]. We call CH-adapt for the adaptation dataset and CH-test for the test dataset. Simulated two-speaker audio mixtures were used for a training set. The source audio corpora were Switchboard-2 (PhaseI, II, III), Switchboard Cellular(Part1, 2), and the NIST Speaker Recognition Evaluation (2004, 2005, 2006, 2008). MUSAN corpus <cit.> was used for adding noise. With a recently proposed mixture simulation algorithm <cit.>, simulated conversations (SimConv) were prepared using the statistics of the CH-adapt dataset. Note that reverberation was not applied, which was the best configuration in <cit.>. §.§ Model Configurations EEND-EDA: We used PyTorch-based implementation of EEND-EDA [<https://github.com/BUTSpeechFIT/EEND>] used in <cit.>. Our baseline EEND-EDA model was exactly the same configuration as described in <cit.>, which is also the same as the original EEND-EDA paper <cit.>. Audio features were 23-dimensional log-scale Mel-filterbanks computed every 10 msec. For input to the neural network, 15 consecutive audio features were stacked to form 345-dimensional vectors every 100 msec. We used four Transformer encoder layers with 256 attention units containing four heads. Training configuration was also the same as <cit.>. The training batch was a collection of 50-sec segments in the training set. The batch size was 32. Adam optimizer was used with the Noam learning scheduler and 200k linear warm-up steps. The training was run for 100 epochs with the training set. For adaptation, we run 100 epochs using the adaptation set with a learning rate of 10^-5. After training, the last 10 model checkpoints were averaged. EEND-EDA+InterLoss: The model is built with additional computations (Eqs. <ref>-<ref>) introducing intermediate losses to the EEND-EDA model as described in Section <ref>. EEND-EDA+SelfCond is built with additional computations (Eqs. <ref>-<ref>) to apply the self-conditioning technique with the intermediate attractors. EEND-NA: We built a model named EEND-NA as EEND with the proposed non-autoregressive attractor extraction as described in Sec. <ref>. An +InterLoss model and a +SelfCond model were built on top of the EEND-NA model, similar to the EEND-EDA models. EEND-EDA-deep and EEND-NA-deep: We investigated the effect of deeper networks by increasing the number of Transformer blocks from four to eight. §.§ Metrics The diarization error rates (DERs) were evaluated with a forgiveness collar of 0.25s. We also showed DER breakdown into miss, false alarm (FA), and confusion (CF) error rates, followed by speech activity detection (SAD) miss and false alarm errors. The number of parameters (#Params) and training throughput (Tp) for each model were shown to discuss the results with training efficiency. The training throughput was calculated on a Tesla V100 32G GPU. §.§ Results Table <ref> shows the DERs on CH-test. The first three rows show that the conventional EEND-EDA model could not benefit from the proposed intermediate labels and the self-conditioning technique. Training throughput was down to one-third. The results indicate that the LSTM-based autoregressive attractors cannot optimize the intermediate frame-level embeddings. On the other hand, the proposed EEND-NA model showed performance improvement with the intermediate labels and the self-conditioning technique. The training throughput of the proposed model was higher than that of the EEND-EDA model, and the slowdown by introducing the intermediate labels and self-conditioning was in an acceptable range. The EEND-NA+SelfCond model reached a similar performance to the EEND-EDA model, while the proposed model has less number of parameters and higher throughput than the EEND-EDA model. The results suggest that the non-autoregressive attractors can help optimize the intermediate frame-level embeddings, unlike EDA. The EEND-NA model itself was worse than EEND-EDA, although the intermediate labels reduce the difference. The disadvantage of the non-autoregressive attractors may come from the conditional independence between speakers. Using conditional inference on previously estimated speakers, like in the decoder part of EDA, may improve performance. Table <ref> also shows the results of deeper (eight-layer) models. The proposed EEND-NA-deep+SelfCond model achieved the best performance among the evaluated models. While the conventional EEND-EDA-deep model achieved better performance than the original four-layer EEND-EDA model, we could not get the results with intermediate labels because of the slow training. We expect that the EEND-EDA-deep model cannot benefit from the intermediate labels as with the baseline EEND-EDA models. §.§ Results with Intermediate Speaker Labels Table <ref> shows diarization error rates with intermediate speaker labels produced by the EEND-NA-deep+SelfCond model. The errors were consistently reduced layer by layer. The results indicate that optimizing the speaker label at the lower layers improves the final diarization performance. Unexpectedly, the seventh-layer results were better than the last eighth-layer results. We think that conditioning with the intermediate labels could be enhanced by selecting the set of intermediate layers: not all the layers. § CONCLUSION We proposed an end-to-end diarization model that uses intermediate speaker labels to condition the subsequent network layers. The experiments showed that the intermediate labels with the non-autoregressive intermediate attractors boosted the diarization performance. The proposed method with the deeper network benefits more from the intermediate labels, resulting in better performance and training throughput than EEND-EDA. IEEEbib
http://arxiv.org/abs/2303.06776v1
20230312233142
Robot Health Indicator: A Visual Cue to Improve Level of Autonomy Switching Systems
[ "Aniketh Ramesh", "Madeleine Englund", "Andreas Theodorou", "Rustam Stolkin", "Manolis Chiou" ]
cs.RO
[ "cs.RO", "cs.HC", "I.2.9" ]
Axr1050@student.bham.ac.uk Extreme Robotics Laboratory, University of Birmingham Edgbaston Birmingham England B15 2TT Maen0191@student.umu.se Andreas.Theodorou@umu.se Umeå university MIT-huset Umeå Sweden 901 87 R.Stolkin@bham.ac.uk M.Chiou@bham.ac.uk Extreme Robotics Laboratory, University of Birmingham Edgbaston Birmingham England B15 2TT Using different Levels of Autonomy (LoA), a human operator can vary the extent of control they have over a robot's actions. LoAs enable operators to mitigate a robot's performance degradation or limitations in the its autonomous capabilities. However, LoA regulation and other tasks may often overload an operator's cognitive abilities. Inspired by video game user interfaces, we study if adding a Robot Health Bar to the robot control UI can reduce the cognitive demand and perceptual effort required for LoA regulation while promoting trust and transparency. This Health Bar uses the robot vitals and robot health framework to quantify and present runtime performance degradation in robots. Results from our pilot study indicate that when using a health bar, operators used to manual control more to minimise the risk of robot failure during high performance degradation. It also gave us insights and lessons to inform subsequent experiments on human-robot teaming. Robot Health Indicator: A Visual Cue to Improve Level of Autonomy Switching Systems Manolis Chiou =================================================================================== § INTRODUCTION AND RELATED WORK During mobile robot navigation tasks, factors like uneven terrain, obstacles, sensor noise etc. can degrade a robot's performance. If left unattended, performance degradation can cause robots to fail or perform sub-optimally <cit.>. Timely operator intervention or triggering of recovery behaviours can mitigate this. Using Levels of Autonomy (LoA) <cit.>, the extent of control that a human operator has over the robot's actions can be varied. For example during high performance degradation, an autonomous robot can be switched to manual control by an experienced human operator. The LoA can be switched back once the robot is capable of functioning autonomously again. In Human Initiative (HI) LoA switching systems, the robot operator is in charge of LoA regulation during the task. Compared to fully autonomous robots, manually controlled robots, and other implementations of variable autonomy systems, HI-LoA shows better task performance during remote navigation tasks in unknown environments <cit.>. However, the additional perceptual and mental effort required to monitor robot operation data and determine if LoA switching is needed, imposes comparatively higher levels of cognitive workload on the operator. While overloading an operator's cognitive abilities for prolonged periods can reduce task performance <cit.> due to stress, fatigue and varying levels of trust in the system <cit.>, low workload can cause out-of-loop performance problems like complacency and over-trusting the system <cit.>. Effective HI-LoA system design remains an open problem in existing literature <cit.>. A well-designed system should keep operator cognitive workload within a sweet spot <cit.> (i.e., acceptable levels). LoA switches by operators should be due to a clear understanding of the robot's capabilities and limitations, not due to trust issues. Transparent design, i.e., where the operator can accurately interpret the robot's capabilities, goals, and its progress, have reported effective calibration of trust <cit.>, even with increasing levels of automation <cit.>. Systems where information about the robot is presented over the graphic/visual modalities are trusted more than the audio and textual modalities <cit.>. Independent of systems design considerations, significant differences still exist in people's perceived reliability of variable autonomy systems. However, they can be minimised through standardised training <cit.>. Video games serve as inspiration to understand how real-time information can be presented in a transparent manner, while keeping the operator cognitive workload in the sweet spot. Video game players report that they are receptive to information presented through visual cues as long as they are clear and consistent <cit.>. Game visual cues are usually colour coded UI elements overlayed on the interface during gameplay, e.g. the Health Bar. In popular online games[See https://overwatch.blizzard.com/en-us/], remotely situated players use these cues to get their teammates attention. Similarly, robot operators can use colour coded visual cues to acquire quick situational awareness <cit.> while operating a robot with minimum perceptual effort. For robot interfaces, Murphy et al. <cit.> recommend that visual cues may be added to the robot control UI, without blocking useful information. The existing literature shows that effective trust calibration, system transparency and standardised training are crucial for a well designed HI-LoA switching system. Information to assist the operator with making decisions about LoA regulation can be presented through properly designed visual cues. Therefore, in this study, we present our pilot experiments to explore how visual cues about a robot's performance degradation can help LoA regulation decisions during high cognitive workload situations. Based on the Robot Vitals and Robot Health framework <cit.> to quantify performance degradation, we design a colour coded Robot Health Bar UI element. We hypothesise that using the Health Bar will reduce the perceptual effort required by operators to make LoA switching decisions, improve task performance, and result in a lower overall cognitive workload. We also took feedback from the participants about their overall trust in the system, its transparency and recommendation for improving the Health Bar design. § SYSTEM DESIGN The experiment consisted of two tasks, similar to the experiments setup by Chiou et al. <cit.>. The primary task was a mobile robot navigation task using the Clearpath Husky Robot, simulated on Gazebo. As shown in Figure <ref>, these arenas were designed to mimic urban search and rescue scenarios, and were populated with performance degrading factors commonly found in them like - obstacles, uneven terrain and laser noise. A 2D laser scan of an empty map (Figure <ref> - Right) was generated before the performance degrading factors were added. The difference between the map used for robot navigation and the actual arena affects robot navigation planning, thereby adding another performance degrading factor. Two different arenas were created to compare operator performance with (condition A) and without the Health Bar (condition B). RViz was used to visualise the robot map, sensor data, and give commands to the robot. The standard RViz interface in Figure <ref> was used for Condition B, and the interface with a Robot Health Bar shown in Figure <ref> was used for Condition A. The Husky robot used two LoAs - 1) Waypoint-based navigation and 2) Manual Control by an operator using a Joystick. The Robot Health at each instant was calculated using the Robot Vitals and Robot Health framework <cit.>, and the Health Bar was created and displayed using the JSK Visualisations[http://wiki.ros.org/jsk_visualization/] ROS Package. Here, Robot Health is defined as an overall scalar estimate of a robot’s ability to carry out its tasks without its capabilities being impaired by any performance degrading factors . Therefore, an operator can monitor the health to detect situations where a robot is likely to fail, and trigger LoA switches to assist the robot. To improve readability, the Robot Health was standardised to the range [0,1]. The Red-Amber-Green colour coding convention was used for the Health Bar as shown in Figure <ref>. Based on preliminary experiments, health above 0.7 was decided as Healthy , and the colour of the Health Bar was green. Values between 0.5-0.7 were coloured in amber, and values below 0.5 were coloured red. Instead of sharp colour changes, the Health Bar gradually went from green to amber to red. This was done to minimise rapid colour changes due to small fluctuations in health near the threshold values. The secondary task was a 3D object rotation task <cit.>, used to induce additional cognitive workload for the operator. Here participants were successively presented with two 3D objects. They had to determine whether the objects were the same or different. Instead of having a fixed time limit like in Chiou et al.<cit.>, here the participants did this task throughout the runtime. Both the primary and secondary tasks were displayed on adjacent screens. Participants were explicitly instructed to prioritise the robot navigation task and minimise the likelihood of robot failure . They were also told to simultaneously do the secondary task to the best of their ability, and that they were not being evaluated on their performance in it. § EXPERIMENT METHODOLOGY Eight test subjects participated in the experiment and performed both conditions (i.e. within subjects design). The order of the conditions was counterbalanced to minimise learning and fatigue effects. First, participants had to fill out background information (see appendix <ref>). Then they were introduced to basic robot navigation in a training arena similar to the one used in Chiou et al.<cit.>. All participants trained on this arena till they were able to demonstrate a minimum proficiency in robot navigation. This ensured that confounding factors due to a variation in skill levels were minimised. Next, they were shown the 2 different LoA, how to switch between them and were given some time to practice LoA switching on the training arena. Participants were then introduced to the interface with the Health Bar and asked open-ended questions without prior explanation (see appendix <ref>). After answering the questions, they were given the following instructions regarding the Health Bar: “The Robot Health Bar indicates how much a robot’s performance is degraded by environmental factors. These environmental factors can be anything ranging from bad terrain to laser noise. During low health, the Health Bar will become redder. During high health, the Health Bar will become greener. The lower the robot's health, the more likely it will fail. You may use the Health Bar to help you determine when the robot requires a LoA switching”. The effect of performance degrading factors on the Health Bar was demonstrated by introducing obstacles and laser noise in the training arena. Participants were also given time to familiarise themselves with the interface before starting the navigation task. Next participants were familiarised only with the secondary task, and allowed multiple practice runs till they felt comfortable with it. Their baseline on the secondary task alone was measured before the experiment. Before each condition, participants were shown the start and finish points in the navigation task and told that the next waypoint would be assigned automatically on reaching the current one. Then the participants carried out each experimental condition followed by a NASA-TLX form to evaluate the perceived cognitive workload during the task. Lastly, participants completed open-ended questions and a transparency/trust questionnaire after the experimental trials and the NASA-TLX forms (see <ref> and <ref>). § RESULTS Robot health values under 0.7 were classified as unhealthy . This criterion was heuristically determined based on previous studies on the robot vitals and robot health framework <cit.>. Results from the experiments conducted on 8 participants were computed and tested for statistical differences using two-tailed pairwise T-Tests. These results are summarised in table <ref>. The total percentage of runtime that the robot was autonomous, manually controlled and unhealthy was calculated for each experimental condition. The percentage of run time that the robot health was unhealthy showed no statistical differences between the two conditions. Similarly, no significant differences were observed in the percentage of run time the robot was manually controlled. However, the percentage of run time that the robot was manually controlled when it was unhealthy, showed a significant (p <0.05, t = -2.36) difference between both conditions. That is, operators manually controlled unhealthy robots for longer when the health of the robot was displayed (i.e., Condition A). As a result, the robot was unhealthy for an average of 61.91% of the runtime in condition A, but 78.03% of the runtime in condition B. The change in perceptual effort required to carry out LoA switching tasks was measured using the operator's accuracy on the secondary task. When the health bar was not displayed (Condition B), operators showed significantly higher levels of accuracy (p <0.05, t = 2.36) on the secondary task. This indicates the perceptual effort required to use the interface with the robot health bar, is higher. However, the NASA-TLX scores showed no significant differences in the overall cognitive workload imposed by both conditions. Open-ended questions asked before the experiment showed that some participants were slightly confused about what the Robot Health Bar was. One participant said - "The health bar looks like a timer, because it has a number. I thought it meant seconds". Others successfully grasped the idea behind the UI element. Another participant thought "When the number goes down the robot dies", indicating a game-like perception of the Health Bar's function. However, all participants understood it was there to assist or alert an operator performance degradation. Most participants preferred the interface of condition A (with the Robot Health bar ), finding it intuitive for regulating LoA - "When the health was low, it was better to manually control the robot". One participant said - "Without the health bar I had to actively use my brain to detect when the robot needed help". Three participants, however, felt that the colours were sometimes inaccurate and did not match the robot's state. One of them pointed out that while red and green clearly helped indicate which LoA was better, amber was confusing because they did not know what to do. Although not significant, operators that had experience with operating robots (according to the background information) seemed to prefer more transparency in the UI, while the rest preferred less transparency. Novice operators (as reported by the background information), instead, stated that they responded to the colours of the UI to a greater extent than the participants with more experience in operating robots. Pearson's correlation showed a significant negative trend between how often the participants operated remote-controlled vehicles and how easy it was to know when to change LoA for alternative 1 (Figure <ref>) in the questionnaire (p <0.01). Significant positive trends were also observed for how often they used AI for work and how easy it was to know when to change LoA for alternative 3 in the questionnaire (Figure <ref>) (p <0.05), and how easy it was to understand why to change LoA for alternative 2 (Figure <ref>) (p <0.01) and alternative 3 in the questionnaire(Figure <ref>) (p <0.01) (see Table <ref>). In terms of determining when to change LoA for the alternatives in the questionnaire, four participants rated either the highest or both the lowest and highest levels of transparency equally highly on the Likert scale (Figure <ref>). Conversely, the remaining four participants rated the lowest level of transparency highest in comparison to the other two levels. Overall, the medium level of transparency was rated the lowest. As for why to change LoA, six participants either increased or maintained their rating for each increase in the level of transparency, resulting in the highest level of transparency being rated the highest (Figure <ref>). However, two participants decreased their rating on the Likert scale for each increase in the level of transparency. § DISCUSSION AND INSIGHTS Our experimental results illustrate how informing an operator about a robot's performance degradation through visual cues can affect the operator's driving and LoA regulation style. When shown the health bar, operators triggered LoA switches to mitigate situations where the robot was unhealthy . This style of HI-LoA regulation reduces the aggregate risk of robot failure. The interface with the health bar did not impose a significant additional cognitive workload on the operator during the experiment, and did not significantly change the task completion time. Contrary to our hypothesis, LoA regulation using the Health Bar required significantly (p<0.05) higher perceptual effort. In condition A, Participants carried out fewer rotations and gave less accurate answers. One likely explanation for this is that adding a Health Bar increased the number of points on the UI the operator had to focus on, which increased the perceptual effort for the primary task. Table <ref> shows that novice robot prefer significantly less transparency than experienced robot operators. Participant feedback revealed that while novice operators responded more to the colours of the health bar, experienced operators preferred having more information displayed to inform their LoA switching decisions. This indicates that participants value transparency only when they understand the necessity of transparency. People with different levels of experience have varied mental models about the Robot, leading them to perceive the system and the Health Bar differently. This makes it difficult to standardise explanations. Depending on their experience, each participant may want to clarify different aspects of the Human-Robot System, leading to differences in the way they are primed for the experiment. Therefore, rigorous training coupled with detailed explanations about the different components of the system are required to minimise the differences in perception. Finally, the major limitation of this study is the small sample size. Therefore all the results and insights presented in this study can require validation with a larger set of participants. §.§.§ Participant Recommendations to improve the Robot Health Bar and User Interface Design: * Make the Health Bar more Salient, so that it attract attention when necessary * Do not include a drop down-menu in the Health Bar as shown in the Questionnaire * Use a percentage to the health value instead of a value between [0,1] * To attract attention to 'low health' use multi-modal awareness cues like sound alerts or UI elements e.g. By Shaking or Blinking the health bar after a threshold value. § CONCLUSION AND FUTURE WORK In this study, we explored if visual cues about a robot's performance degradation can reduce the perceptual effort required to make LoA switching decisions for remote mobile robot navigation tasks. Inspired by video games, we designed a 'Robot Health Bar'. This health bar displayed the total runtime performance degradation the robot is facing. A total of 8 participants carried out a mobile robot navigation task with and without the health bar UI element under high cognitive workload, and their performance was measured. Adding a Robot Health Bar to the robot control UI significantly changed how the operator makes Level of Autonomy Switching Decisions. When the Health Bar was displayed, operators were more attentive and took control of the robot more to minimise the risk of the robots failing. Visual cues that indicate a robot's health can serve as an effective way of ensuring safer control of robots, especially in extreme environments where robot missions have high levels of risk and environmental adversities. In the future, we aim to explore how the insights gained from this study can scale to multi-robot systems. unsrtnat § OPEN-ENDED QUESTIONS AND QUESTIONNAIRES §.§ Background information questionnaire The background questionnaire consisted of the following questions: Q1: How often do you operate or use to operate remote controlled vehicles (e.g. Robots, Drones, Heavy machinery) Q2: How often do you play or used to play video games involving driving, flight simulation and third person shooters, RPG and sports? Q3: Do you use AI (e.g. Autonomous Robots, Machine Learning Algorithms, AI Tools ) for work? Q4: Do you use AI (e.g. Personal Assistant) in your personal life? The possible answers ranged between 1-5; i.e., least to most often. §.§ Open-ended questions Questions asked before participants had performed the experiment under both conditions are listed below: Q1: What are you thinking as you look at this? Q2: What is your first impression of this UI element? Q3: What do you think this UI element does or will do? All questions asked after participants had performed the experiment under both conditions are listed below: Q1: Was anything surprising or did not perform as expected in either of the interfaces? Q2: Was the interface without the Robot Health Bar easy to understand? Q3: Was the interface with the health bar easy to understand? Q4: What did you think about the colours used in the health bar when the health changed? Q5: Was the LoA switching behaviour of the interface without the Robot Health Bar transparent? Q6: Was the LoA switching behaviour of the interface with the Robot Health Bar transparent? Q7: Is there anything else that you can think of, specific to the UI and UX to improve the use of LoA switching Robots? §.§ Transparency/trust questionnaire The transparency/trust questionnaire consisted of images of three different alternatives of a health bar ranging from low to high transparency and a 7-point Likert scale for each image (Figure <ref>). The questions were the following pair, for each alternative: Q1: It is easy to understand WHEN to change Level of Autonomy (LoA) based ONLY on alternative 1? Q2: It is easy to understand WHY to change or not change Level of Autonomy (LoA) based ONLY on alternative 1? § RESULTS tablesection figuresection
http://arxiv.org/abs/2303.07208v1
20230313154006
Social network analysis of Japanese manga: similarities to real-world social networks and trends over decades
[ "Kashin Sugishita", "Naoki Masuda" ]
physics.soc-ph
[ "physics.soc-ph", "cs.SI" ]
APS/123-QED Department of Transdisciplinary Science and Engineering, Tokyo Institute of Technology, 152-8550 Tokyo, Japan naokimas@buffalo.edu Department of Mathematics, State University of New York at Buffalo, Buffalo, NY 14260-2900, USA Computational and Data-Enabled Science and Engineering Program, State University of New York at Buffalo, Buffalo, NY 14260-5030, USA Manga, Japanese comics, has been popular on a global scale. Social networks among characters, which are often called character networks, may be a significant contributor to their popularity. We collected data from 162 popular manga that span over 70 years and analyzed their character networks. First, we found that many of static and temporal properties of the character networks are similar to those of real human social networks. Second, the character networks of most manga are protagonist-centered such that a single protagonist interacts with the majority of other characters. Third, the character networks for manga mainly targeting boys have shifted to denser and less protagonist-centered networks and with fewer characters over decades. Manga mainly targeting girls showed the opposite trend except for the downward trend in the number of characters. The present study, which relies on manga data sampled on an unprecedented scale, paves the way for further population studies of character networks and other aspects of comics. Social network analysis of Japanese manga: similarities to real-world social networks and trends over decades Naoki Masuda March 30, 2023 ============================================================================================================= § INTRODUCTION The global comic market has been rapidly growing. The market size was valued at USD 14.7 billion in 2021 and is expected to expand at a compound annual growth rate of 4.8% from 2022 to 2029 <cit.>. A driving force underlying the rapid expansion of the market is the widespread availability of e-books, which enables us to easily access comics around the world. The COVID-19 pandemic also helped the growth of the comic market because the lockdown in many countries increased the demand for comics. Manga, Japanese comics, has been especially popular on a global scale. Many manga have been translated into different languages. For example, over 510 million copies of One Piece have circulated worldwide; One Piece is recorded in the Guinness Book of Records as the best-selling comic in the history <cit.>. The history of the development of manga culture in Japan, its social background, and its global prevalence have been studied <cit.>. Our social networks are complex but characterized by common properties such as heterogeneity and community structure <cit.>. Because literally all storylines of manga rely on interactions among characters, social networks among characters, which are often called character networks, may provide a backbone of the story of manga and influence its popularity. More generally, character networks have been analyzed for quantitatively characterizing fiction works <cit.>. A number of problems can be addressed through analyses of character networks, such as summarization <cit.>, classification <cit.>, and role detection <cit.>. Character networks have been studied for a variety of fiction such as novels <cit.>, plays <cit.>, movies <cit.>, and TV series <cit.>. However, character networks for comics have been rarely explored except for Marvel comics <cit.> and a few manga titles <cit.>. One possible reason for this is the difficulty of automating data collection for comics <cit.>. In the present study, we analyze character networks of 162 popular Japanese manga that span decades and test the following two hypotheses. First, we expect that popular manga tend to produce realistic social networks. Therefore, we hypothesize that structural and temporal properties of the character networks of manga are similar to those of human social networks. Second, our data enables us to investigate how trends of manga have changed over approximately 70 years. Therefore, we hypothesize that character networks of modern manga and old ones are systematically different. We also examine differences in the network structure between manga mainly targeting boys versus girls. § RESULTS §.§ Similarities to Empirical Social Networks Our original data are equivalent to a temporal bipartite graph in which the two types of nodes are characters and pages, and the edges connect characters to the pages in which they appear. The pages are ordered in time. We show the degree distribution for the character nodes for One Piece and the Poisson distribution with the same mean in Fig. <ref>A. The coefficient of variation (CV), which is defined as the standard deviation divided by the average, of the original degree distribution is 1.66. This value is approximately 11.1 times larger than that of the Poisson distribution. Therefore, similar to human social networks <cit.>, the characters in manga have heterogeneous numbers of connections, and there are a small number of characters that appear disproportionately frequently on various pages. We obtained similar results for the other manga (see https://github.com/KS-92/MangaSI file). In contrast, the CV of the degree distribution for the page nodes is 0.462 for One Piece. The CV for the Poisson distribution with the same mean is 0.580. Therefore, we argue that the characters do not appear uniformly randomly over the pages. As we show in Fig. <ref>B, there are typically two or three characters on a page in One Piece, and pages containing none or just one character are relatively rare. We obtained similar results for the other manga (see https://github.com/KS-92/MangaSI file). These results suggest that the high heterogeneity of the characters in terms of the frequency of appearance on pages and the tendency of a page typically containing two or three characters are two common properties of manga. Therefore, in the following analyses, we consider the bipartite configuration model, in which the degrees of all character and page nodes are preserved and the edges are otherwise randomly placed, as a null model. Then, we examine properties of character networks that we can explain by the null model versus those we cannot. We show the weighted character network, which is the projection of the bipartite graph onto the space of character nodes, for One Piece in Fig. <ref> (see https://github.com/KS-92/MangaSI Fig. S1 for the networks for all 162 manga). By definition, the edge weight is equal to the number of pages in which the two characters simultaneously appear. The character networks vary widely in size from manga to manga. Specifically, the number of nodes, N, ranges from 8 to 124, with mean± standard deviation=32.6 ± 16.6. The number of edges, M, ranges from 19 to 950, with mean± standard deviation=156.1 ± 128.9. We define the protagonist as the node with the largest node strength (i.e., weighted degree) in the character network. The protagonist is the character that appears in the largest number of pages for most manga (97.5%). In fact, the protagonist for One Piece, indicated by an arrow in Fig <ref>, is Monkey D. Luffy, who is generally known as the most central character in One Piece. We compared various properties of character networks between the empirical character networks and their randomization obtained by the one-mode projection of the bipartite network generated by the bipartite configuration model. We first compare three strength-related indices, i.e., the average strength, ⟨ s ⟩, the CV of the strength, s_ CV, and the strength of the protagonist, s_P, of the character networks for all 162 manga between the original and randomized networks in Figs. <ref>A-C. These figures suggest that randomized character networks well explain the strength-related indices of the original character networks. Figure <ref>A shows the strength distribution for One Piece. We find that the strength obeys a heavy-tailed distribution over some scale. This result is consistent with Fig. <ref>B, which shows that the CV of the strength for most manga is substantially larger than 1; the CV for One Piece is 1.48. Note that the exponential distribution, which lacks a heavy tail, yields CV=1. The heavy-tailed strength distributions shown in Fig. <ref>A for One Piece and implied in Fig. <ref>B for a majority of manga are consistent with those for empirical social networks <cit.>. In contrast to the strength-related indices, the randomized character networks do not explain the degree-related indices of the original character networks. The randomized networks tend to overestimate the average degree, ⟨ k ⟩, of the original character networks (see Fig. <ref>D). This result suggests that characters tend to repeat interacting with relatively few characters. The CV of the degree, k_ CV, for the original networks tends to be larger than that for the randomized networks (see Fig. <ref>E). The fraction of the other characters that the protagonist is adjacent to, k_ P/(N-1), is 0.900 ± 0.103 ( mean± standard deviation based on the 162 manga) and 0.971 ± 0.0413 for the original and randomized character networks, respectively (see Fig. <ref>F). Therefore, the protagonist is adjacent to most of the other characters in both original and randomized networks. Based on these results, we conclude that the character networks are strongly protagonist-centered, in which the protagonist interacts with most of the other characters, while other characters tend to interact only with fewer characters than expected for the randomized networks, but including the protagonist. This interpretation is consistent with the aforementioned observation that ⟨ k⟩ and k_ CV are smaller and larger for the original than randomized networks, respectively. We show the degree distribution for One Piece in Fig. <ref>B. The CV of the degree, k_ CV, for One Piece is 0.77. Figure <ref>E shows that the CV of the degree for most of the manga is smaller than 1. In fact, this result is consistent with that for empirical social networks with similar number of nodes <cit.>, while large empirical social networks tend to have heavy-tailed degree distributions implying a large CV <cit.>. We found that the strength is super-linearly scaled with the degree, i.e., s_i ∝ k_i^α with α>1, in the character networks, where ∝ indicates “proportional to”. Note that the absence of correlation between the strength and degree would yield α=1 <cit.>. Specifically, in Fig. <ref>C, we show the relationship between k_i and s_i for One Piece. We obtained α=1.94 with the coefficient of determination R^2=0.847. We obtained similar results for the other manga (see Fig. <ref>G). These results are consistent with power-law relationships between the strength and degree with α > 1, which has been observed in empirical social networks <cit.>. Note that the randomized character networks also yield α > 1 and that α for the original and randomized networks are highly correlated with a small number of exceptions. The character networks are disassortative. The degree assortativity coefficient, denoted by r, of the character network is -0.345 on average. In fact, the values of r for all but two manga are negative (see Fig. <ref>H). This result is in stark contrast with various observations that social networks are more often than not assortative with positive r <cit.>. We argue that the character networks are disassortative because they are strongly protagonist-centered. In fact, star graphs are disassortative with large negative values of r <cit.>. The degree disassortativity is also observed for empirical egocentric social networks <cit.>. Figure <ref>H indicates that r is also negative for the randomized character networks although the correlation between r for the original and randomized networks is low. Therefore, we conclude that the degree disassortativity in our character networks is a consequence of the protagonist-centered nature of the original character-page bipartite network. The character networks are highly clustered. The clustering coefficient, denoted by C, over the different manga is 0.790 with the minimum value of 0.598 (see Fig. <ref>I). This result is consistent with the observations that empirical social networks have high clustering coefficients <cit.>. In fact, randomized character networks also have similarly large C although the spread is large between the empirical and randomized networks. Therefore, we conclude that a high clustering coefficient is a consequence of one-mode projection of the bipartite graph, which is known <cit.>. We found that heavy-tailed distributions of interevent times (IETs) are simultaneously present for nodes and edges in the character networks. Copresence of two characters on a page defines a time-stamped event on the edge, where we identify the page number as discrete time. A time-stamped event for a given node is the presence of the character on a page. We show the survival functions of the IETs (i.e., probability that the IET, denoted by τ, is larger than the specified value) for individual nodes and edges in One Piece in Figs. <ref>A and <ref>B, respectively. The relatively slow decay in Fig. <ref> suggests heavy-tailed distributions for both nodes and edges across some scales of τ. The CV values for IETs on nodes and edges for One Piece are 1.72 ± 0.697 and 1.92 ± 0.535, respectively. We obtained similar results for the other manga, as we show in Figs. <ref>J and <ref>K. These figures also indicate that the randomization of the bipartite network does not preserve this feature, yielding CV values close to 1 regardless of the CV value for the original temporal character networks. It should be noted that a Poisson process produces an exponential IET distribution, which yields CV = 1. These results support that IETs for nodes and edges in the original character networks are non-Poissonian and heterogeneously distributed, which is consistent with properties of empirical social networks <cit.>. Related to heavy-tailed IET distributions, we found that epidemic spreading occurs more slowly in the temporal character networks than in randomized counterparts. We ran the susceptible-infectious (SI) model. By assumption, an infectious character independently infects each susceptible character coappearing on the same page with probability β=0.2. We ran the SI dynamics N times, with the ith character being the only initially infectious one in the ith run. For One Piece, we show in Fig. <ref> the time course of the fraction of the infectious characters averaged over the N runs. We also show the corresponding averaged time courses for each of the 1,000 randomized temporal networks by the blue lines. Figure <ref> indicates that the infection occurs more slowly in the original temporal network than in the randomized temporal networks. We obtained similar results for the other manga (see Fig. <ref>L). These results are qualitatively the same as those observed for empirical social temporal networks <cit.>. §.§ Trends of Network Structure over Decades The 162 manga span nearly 70 years, from Astro Boy with the first volume being published in 1952 to Jujutsu Kaisen in 2018 (see https://github.com/KS-92/MangaSI file for detailed information on the 162 manga). The trend of the structure of manga character networks may have changed over the ≈ 70 years, reflecting the transitions of Japanese society including in economics and fashion. In this section, we explore possible existence of such trends. We first calculated the Pearson correlation coefficient between the year of publication of the first volume, denoted by y, and various indices of network structure on the basis of all 162 manga. We show the correlation coefficients and their 95% confidence intervals (CIs) in Fig. <ref>A. We find that the number of characters, N, tends to decrease over decades (i.e., negative correlation between N and y). The CV of the node degree, k_ CV, and that of the node strength, s_ CV, are negatively correlated with y with moderate effect sizes. In general, these and other network indices may be affected by the number of nodes, N <cit.>. Therefore, we also examined the partial correlation coefficient between y and each index by partialing out the effect of N. The results of the partial correlation coefficient for k_ CV and s_ CV, shown by the lines with squares in Fig. <ref>A, are consistent with those of the Pearson correlation coefficient, although the partial correlation is closer to 0 than the Pearson correlation. We also find that the average degree, ⟨ k ⟩, is positively correlated with y in terms of the partial correlation. These results suggest that more recent manga tend to be denser and more homogeneous in the node's connectivity, such that various characters, not just the protagonist, tend to have more connections in more recent manga. How the trend of the character network changes over time may depend on genres of manga. A most major categorization of Japanese manga is the one based on the gender of their main readership <cit.>. Therefore, we classify the 162 manga into 124 boys' and 38 girls' manga based on the genre section on their Wikipedia pages (see https://github.com/KS-92/MangaSI file for the genre of each manga), while their classification is necessarily subjective. We show the Pearson and partial correlation coefficients between each index and y, separately for the boys' and girls' manga in Figs. <ref>B and <ref>C, respectively. We find that there tend to be less characters for more recent manga for both boys' and girls' manga. The boy's and girls' manga are different in the following aspects in terms of the partial correlation coefficients, i.e., when we control for the number of characters. The trends that we identified for all the 162 manga are even more pronounced in the boys' manga. The effect sizes of the partial correlation for ⟨ k ⟩, k_ CV, and s_ CV for the boys' manga are larger than those for the 162 manga. In addition, the degree assortativity coefficient, r, is positively correlated with y. Because r is negative for most manga, this result implies that r tends to be closer to 0 for more recent boys' manga. On the other hand, the two protagonist-related indices, i.e., k_ P/(N-1) and s_ P, are not correlated with y. These results suggest that the character networks in more recent boys' manga tend to be less protagonist-centered, in which non-protagonist characters have more connections among them. The trend for the girls' manga is opposite to that for the boys' manga except that the downward trend in the number of characters is common. The two indices for which the partial correlation was negative for the boys' manga, i.e., k_ CV and s_ CV, are positively correlated with y for the girls' manga in terms of the partial correlation. On the other hand, the two indices for which the partial correlation was positive for the boys' manga, i.e., ⟨ k ⟩ and r, are negatively correlated with y for the girls' manga. Furthermore, the normalized degree of the protagonist, k_ P/(N-1), for which we did not confirm a correlation for the boys' manga, is positively correlated with y. Overall, these results indicate that the character networks in the girls' manga have shifted toward more protagonist-centered networks. § DISCUSSION We found that the empirical character networks have various features consistent with empirical social networks. The bipartite configuration model, which is a standard random bipartite graph, has been shown to be reasonably accurate at explaining some features of the empirical character networks including statistics of the node's strength, α values, disassortativity, and the high clustering coefficients. In contrast, there are other features of the empirical character networks that deviate from the expectation from the bipartite configuration graph. Such features include statistics of the degree, the IET distributions, and speeds of epidemic spreading. We suggested that part of these differences originates from the protagonist-centered nature of the character networks. In other words, the protagonist interacts with most characters, while non-protagonist characters tend to interact only with the protagonist and a smaller number of other characters than expected by the configuration model. There are positive support of protagonist-centered social networks in the real world when the network is egocentric <cit.>. Similarities between character networks and human social networks have been investigated for some fictions such as Marvel comics <cit.>, Shakespeare's plays <cit.>, and myths <cit.>. Our results of the high clustering coefficient and the heavy-tailed distribution of the strength in the character networks are consistent with these previous studies. However, we ascribe the high clustering coefficient to the effect of one-mode projection rather than to similarity to empirical social networks because the randomized character networks also have high clustering. Our results of the disassortativity is also consistent with the results for Marvel comics <cit.> and myths <cit.>. Therefore, we infer that the heavy-tailed distribution of the strength and disassortativity in the character networks are common properties for various types of fictions. Although the aforementioned previous studies investigated only the static properties of the character networks, we further revealed temporal properties of the character networks, such as the long-tailed IET distributions, which are in fact consistent with empirical social networks <cit.>. We also found that the trend of the manga character networks has shifted over decades. Specifically, more modern manga tend to have fewer characters, denser and be less protagonist-centered for the boys’ manga, which may reflect a modern change in the society that places more emphasis on diversity and teamwork <cit.>. In contrast, the character networks in the girls' manga have shifted toward more protagonist-centered, although the downward trend in the number of characters is common. In general, girls' manga in Japan tend to revolve around issues of love and friendship with a focus on inner feelings of the protagonist <cit.>. Our results suggest that more recent girls' manga may describe the relationships between the protagonist and a few other characters in depth. There are many future directions of investigation. First, we focused on 162 manga with high circulations. By analyzing manga with low circulation as well, we may be able to discover static and temporal properties of character networks that readers favor, contributing to understanding why some manga are more popular than others. Second, we analyzed only the first three volumes of each manga. Examining all volumes would allow us to understand the narrative structure, which have been analyzed for novels <cit.>, movies <cit.>, and TV series <cit.>. For this purpose, a wide variety of time series and temporal network analysis tools, such as change-point detection, temporal centrality, and temporal community structure, may be useful <cit.>. Third, character networks are probably signed in most cases, connecting characters by positive or negative ties. It is worth to deploy sentiment analysis based on text <cit.> and facial expressions <cit.> to construct and analyze signed networks of characters in manga. Temporal network analysis of signed character networks may also reveal complicated dynamics of relationships among characters (e.g., an enemy later becomes an ally). Fourth, manga in different genres such as action, adventure, sports, and comedy, may have different structures of character networks. In addition, we have only analyzed the manga that have been published in the paperback pocket edition, which is the most common for the boys' and girls' manga in Japan. Analyzing manga of other sizes may help us understand variation of character networks over a wider range of genres. Fifth, studying character networks in comics in countries other than Japan warrants future work. For example, character networks may reflect societal differences from country to country. In conclusion, to the best of our knowledge, the present study of character networks for 162 manga titles is unprecedented in scale in quantitative studies of comics and has enabled us to discover their general features. We also introduced new tools and views to the analysis of fiction character network data, such as the bipartite configuration model, the concept of protagonist-centeredness, and temporal network analysis. We hope that this study triggers further quantitative studies of character networks in manga and other types of fictions. § MATERIALS AND METHODS §.§ Data Collection We focus on manga of which more than 10 million copies have been published in Japan as of January 2021 <cit.>. Since the physical size of the manga may affect the number of panels per page and we adopted the page as the unit of analysis, we excluded the manga that had not been published in the paperback pocket edition (112 mm× 174 mm). Note that the paperback pocket edition is the most common for the boys' and girls' manga in Japan. As a result, we included 162 manga (see https://github.com/KS-92/MangaSI file for the list of the 162 manga). We prepared a data table of time-stamped copresence of characters for each manga as follows. For each manga, we manually examined volumes one through three. All the selected 162 manga had at least three volumes. Then, we first extracted all the characters whose name, blood relation to a named character, or job title that uniquely identifies the character, is known. To ensure the reproducibility of this work, we avoided to use any other information sources (e.g., other volumes of the same manga, the Internet, or anime) to attempt to identify more characters. In practice, such additional information sources would not contribute to identifying many more characters. Second, we recorded the copresence of characters on each page as interaction between the characters. Note that the copresence is the most common definition of interaction in constructing character networks in fictional works <cit.>. We used copresence on a page rather than in a single panel within a page because it is common that characters appearing in different panels on the same page have some interactions (e.g., two characters talk to each other by using alternately occupying successive panels). §.§ Bipartite Configuration Model The original data from which we construct the temporal and static character networks are equivalent to a temporal bipartite graph in which the two types of nodes are characters and pages, and an edge connects a character and a page in which the character appears. To generate a randomized bipartite network, we choose a pair of edges in this bipartite graph uniformly at random, denoted by (c, p) and (c', p'), where c and c' are characters and p and p' are pages. If c and c' are the same or p and p' are the same, we discard the pairs and redraw them. Then, we rewire the two original edges to (c, p') and (c', p). We repeat this procedure 1,000 times excluding the discarded edge pairs to generate a randomized temporal bipartite network. We construct a static randomized character network from the generated randomized bipartite graph by one-mode projection. In other words, we connect two characters by an edge whose weight is the number of pages on which the two characters are copresent. §.§ SI Model We use the SI model <cit.> to numerically investigate contagion. We assume that just one character is initially infectious and that the other N-1 characters are initially susceptible. If a susceptible character co-appears with an infectious character on a page, the susceptible character becomes infectious with probability β. Different infectious characters appearing on the same page independently attempt to infect each susceptible character on the page. Once a character contracts infection, it stays infectious forever. We run the SI dynamics with each of the N characters as the sole character that is initially infectious. §.§ Temporal Correlation Coefficient We quantify the persistence of edges over time by the temporal correlation coefficient <cit.>. First, we calculate the topological overlap for node i at time t by O_it = ∑_j=1^N A_ij^t A_ij^t+1/√(∑_j=1^N A_ij^t∑_j=1^N A_ij^t+1) , where A_ij^t is the adjacency matrix of an unweighted network at time step t. In other words, A_ij^t = 1 if characters i and j are copresent on page t, and A_ij^t = 0 otherwise. We then define the average topological overlap for node i by O_i = 1/T-1∑_t=1^T-1 O_it , where T is the number of pages. The temporal correlation coefficient for the entire temporal network is given by O = 1/N∑_i=1^N O_i . We thank Juyong Park for valuable discussion. K.S. thanks the financial support by the Japan Society for the Promotion of Science (under Grant No. 19K23531 and 22K14438). N.M. thanks the financial support by AFOSR European Office (under Grant No. FA9550-19-1-7024), the Japan Science and Technology Agency (JST) Moonshot R&D (under Grant No. JPMJMS2021), and the National Science Foundation (under Grant No. 2052720 and 2204936).
http://arxiv.org/abs/2303.06772v1
20230312231542
Matrices whose field of values is inscribed in a polygon
[ "Matthew J. Fyfe", "Yesenia Hernandez", "Pietro Paparella", "Malini Rajbhandari" ]
math.RA
[ "math.RA", "math.SP", "15A60" ]
[label1]Supported by NSF Award https://www.nsf.gov/awardsearch/showAward?AWD_ID=2150511DMS-2150511. bgsu]Matthew J. Fyfe mjfyfe@bgsu.edu [bgsu] organization=Bowling Green State University, city=Bowling Green, postcode=43403, state=OH, country=U.S.A. bmc]Yesenia Hernandez yhernandez@brynmawr.edu [bmc] organization=Bryn Mahr College, city=Bryan Mahr, postcode=19010, state=PA, country=U.S.A. uwb]Pietro Paparellacor1 pietrop@uw.edu [url]http://faculty.washington.edu/pietrop/ [cor1]Corresponding author. [uwb] organization=Division of Engineering & Mathematics, addressline=University of Washington Bothell, city=Bothell, postcode=98011-8246, state=WA, country=U.S.A. bmc]Malini Rajbhandari mrajbhanda@brynmawr.edu In this work, it is shown that if A is an n-by-n convexoid matrix (i.e., its field of values coincides with the convex hull of its eigenvalues), then the field of any (n-1)-by-(n-1) principal submatrix of A is inscribed in the field of A, i.e., the field is tangent to every side of the polygon corresondping to the boundary of the field of A. This result generalizes a special case established by Johnson and Paparella [Amer. Math. Monthly 127 (2020), no. 1, 45–53]. convexoid matrix field of values numerical range polygon principal submatrix [2020] 15A60 § INTRODUCTION The field of values (or numerical range) of a matrix A is the image of the two-norm unit-sphere in complex Euclidean space with respect to the map x ⟼ x^∗ A x. Recently, Johnson and Paparella <cit.> used various concepts from matrix analysis, including the discrete Fourier transform matrix, the field of values, trace vectors, and differentiators, to provide a framework that admits short proofs of the Gauss–Lucas and Bôcher–Grace–Marden theorems (the latter is often simply referred to as Marden's theorem), which are classical results in the geometry of polynomials. In particular, and germane to what follows, Johnson and Paparella <cit.> proved that if A = FDF^∗, where D = (λ_1,…,λ_n) and F is the n-by-n discrete Fourier transform matrix, then the principal submatrix F(A_(1)), obtained by deleting the first-row and first column of A, is tangent to the midpoints of every side of the polygon ∂ F(A) = ∂(λ_1,…,λ_n). In this work, this result is generalized to the fullest extent possible—in particular, it is shown that if A is convexoid, i.e., F(A) coincides with the convex hull of its eigenvalues, then F(A_(k)) is inscribed in the polygon ∂ F(A), ∀ k ∈{1,…,n}. § NOTATION AND BACKGROUND The set of m-by-n matrices with entries over ℂ is denoted by 𝖬_m × n(ℂ); when m = n, 𝖬_n × n(ℂ) is abbreviated to 𝖬_n. The set of all n-by-1 column vectors is identified with the set of all ordered n-tuples with entries in ℂ and thus denoted by ℂ^n. If x ∈ℂ^n, then x_i denotes the ith entry of x. The n-by-n identity matrix is denoted by I = I_n and e_k denotes the kth column of I. Given A ∈𝖬_n, we let * σ(A) denote the spectrum (i.e., multiset of eigenvalues) of A; * A_(k) denote the (n-1)-by-(n-1) principal submatrix obtained by deleting the kth row and kth column of A); and * A^∗ denotes the conjugate transpose of A. If A ∈𝖬_n and B ∈𝖬_m, then the direct sum of A and B, denoted by A ⊕ B, is defined by A ⊕ B =[ A 0; 0 B ]. If U ∈𝖬_n, then U is called unitary if U^* U = I. If A ∈𝖬_n, then A is called normal if A^* A = A A^*. A matrix A is normal if and only if there is a unitary matrix U and a diagonal matrix D such that A = U D U^* <cit.>. The field (of values) or numerical range of A ∈𝖬_n), denoted by F(A), is defined by F(A) = { x^*A x | x^*x = 1 }⊆ℂ. A general reference for the field is <cit.>. If S = {λ_1,…,λ_n }⊂ℂ (repetitions allowed), then the convex hull of S is denoted by S = (S). The following well-known properties will be useful in the sequel: fvprops If A = [a_ij] ∈𝖬_n and B ∈𝖬_m, then: * σ(A) ⊆ F(A) <cit.>; * F(A) = (σ(A)), whenever A is normal <cit.>; * ds F ( A⊕ B ) = (F(A) ∪ F(B)) <cit.>; * F(A_(k)) ⊆ F(A), ∀ k ∈{1,…, n } <cit.>; and * F(A) is convex <cit.>. For completeness, we give a proof of Property 1.2.11 <cit.>, which generalizes part <ref>, given that it is ubiquitous in the literature; the proof-strategy suggested by Horn and Johnson is tedious; and ideas presented in the demonstration will be used in the sequel. To this end, let α = {α_1, …, α_m } be a nonempty subset of {1, …, n} (if α = ∅, then F(A[α]) = ∅⊆ F(A)) and denote by A[α] the m-by-m matrix whose (i,j) entry is a_α_i, α_j, 1 ≤ i,j ≤ m. If P:= [ e_α_1 ⋯ e_α_m ], then a_α_i, α_j = e_α_i^⊤ A e_α_j = [ P^⊤ A P]_ij, i.e., A[α] = P^⊤ A P. If z ∈ F(A[α]), then z = x^*F(A[α])x, where x^* x = 1. If y:=Px, then y^*y=x^*P^⊤ Px = x^*I_m x= x^*x=1. Furthermore, z = x^* A[α] x = x^* P^⊤ A P x=(Px)^*APx = y^*Ay ∈ F(A), i.e, F(A[α]) ⊆ F(A). If A ∈𝖬_n(ℂ), then A is called convexoid if F(A) = (σ(A)). Johnson <cit.> gave the following characterization of convexoid matrices. convexoid If A ∈𝖬_n(ℂ), then A is convexoid if and only if A is normal or there is a unitary matrix U such that U^∗ A U = [ A_1 0; 0 A_2 ], where A_1 is normal and F(A_2) ⊆ F(A_1). By fvprops(<ref>), if A is normal and λ_1,…,λ_n are its eigenvalues (repetitions included), then F(A) = (λ_1,…,λ_n). Without loss of generality, we may label the vertices as λ_1,…, λ_d, 1 ≤ d ≤ n. Notice that ∂ F(A) = ⋃_k=1^d (λ_k,λ_k+1), where, for convenience, d + 1 := 1. We say that F(A_(k)) is inscribed in F(A) if F(A_(k)) ∩(λ_k,λ_k+1)∅, ∀ k ∈{1,…,d}. § MAIN RESULT rotevec Let Av= λ v, where v ≠ 0 and v_k ≠ 0. If v_k = rexp(i θ), where θ∈ (-π,π], then w:= exp(-iθ)v is an eigenvector such that v _2 = w _2 and w_k > 0. The conclusion that w is an eigenvector with the same length as v follows from the fact that |exp(-iθ)| = 1. Lastly, notice that w_k = exp(-iθ) (rexp(i θ)) = r > 0. projection Let α = {α_1, …, α_m } be a nonempty subset of {1, …, n}, let P:= [ e_α_1 ⋯ e_α_m ], and let y ∈ℂ^n be any vector such that y_k = 0 whenever k ∉α. If x:= P^⊤ y ∈ℂ^m, then y = Px and y^∗ y = x^∗ x. Since PP^⊤ = ∑_k=1^m e_α_ke_α_k^⊤, it follows that Px = P(P^⊤ y) = (P P^⊤) y = ( ∑_k=1^m e_α_ke_α_k^⊤) y = ∑_k=1^m e_α_k y_α_k. If z := ∑_k=1^m e_α_k, then z_k = 0 whenever k ∉α. Thus, y = Px and y^∗ y = (Px)^∗ (Px) = x^∗ P^⊤ P x = x^∗ I_m x = x^∗ x, as desired. main If A is convexoid, then F(A_(k)) is inscribed in the polygon ∂ F(A), ∀ k ∈{1,…,n}. In view of fvprops<ref> and convexoid, it suffices to consider the case when A is normal. To this end, if A is normal, then there is a diagonal matrix D = (λ_1,…,λ_n) and a unitary matrix U such that A = UDU^*. Let λ_i and λ_j be adjacent vertices of the polygon ∂(λ_1,…,λ_n), let v := U e_i, and let w := Ue_j. Note that v^∗ v = w^∗ w = 1 and v^∗ w = w^∗ v = 0. We distinguish the following cases: * v_k = 0 or w_k =0. If γ := {1,…,n }\{k} = {γ_1,…, γ_n-1}, P := [ e_γ_1 ⋯ e_γ_n-1 ], and x := P^⊤ v, then v = Px and x^∗ x = 1 by projection. Thus, λ_i = v^∗ Av = (Px)^∗ A (Px) = x^∗ P^⊤ A P x = x^∗ A_(k) x ∈ F(A_(k)), i.e., F(A_(k)) ∩(λ_i-1,λ_i)∅ and F(A_(k)) ∩(λ_i,λ_i+1)∅ (if i=1, then i-1 := d). Similarly, if w_k = 0, then λ_j ∈ F(A_(k)). If v_k = w_k = 0, then the line-segment (λ_i,λ_j)⊆ F(A_(k)) by fvprops<ref>. * v_k 0 and w_k 0. By rotevec, it may be assumed, without loss of generality, that v_k > 0 and w_k > 0. If α := ∓ w_k/√(v_k^2 + w_k^2) and β := ± v_k/√(v_k^2 + w_k^2), then α and β are nonzero reals such that α^2 + β^2 = 1. If u := α v + β w, then u_k = α v_k + β w_k = ∓ v_k w_k/√(v_k^2 + w_k^2) + ± v_k w_k/√(v_k^2 + w_k^2) = 0 and, since v^∗ v = w^∗ w = 1 and v^∗ w = w^∗ v = 0, it follows that u^∗ u = (α v^∗ + β w^∗)(α v + β w) = α^2v^∗ v + αβ v^∗ w + βα w^∗ v + β^2 w^∗ w = α^2 + β^2 = 1 and u^∗ A u = (α v^∗ + β w^∗) (α A v + β Aw) = (α v^* + β w^*)(αλ_i v + βλ_j w) = α^2 λ_i v^∗ v + αβ v^∗ w + βα w^∗ v + β^2 λ_jw^∗ w = α^2 λ_i + β^2 λ_j. Because α^2 + β^2 = 1, α^2 > 0, and β^2 > 0, it follows that u^∗ A u lies in the interior of the line-segment (λ_i,λ_j). Finally, if x := P^⊤ u ∈ℂ^n-1, where γ and P are defined as in (<ref>) and (<ref>), respectively, then u = Px and x^∗ x = 1 (by projection) and α^2 λ_i + β^2 λ_j = u^∗ A u = x^∗ P^⊤ A P x = x^∗ A_(k) x ∈ F(A_(k)). Thus, F(A_(k)) ∩(λ_i,λ_j)∅. In all cases, F(A_(k)) ∩(λ_k,λ_k+1)∅, ∀ k ∈{1,…,d}. Although there are two possible choices for α and β, the convex combination α^2 + β^2 = 1 is unique. Therefore, in the case that v_k 0 and w_k 0, F(A_(k)) intersects the interior of the line segment (λ_i,λ_j) at a single point. If U = [ 1/2 √(3)/2 0 0; 1/2 -√(3)/6 0 √(6)/3; 1/2 -√(3)/6 √(2)/2 -√(6)/6; 1/2 -√(3)/6 -√(2)/2 -√(6)/6; ], then U^⊤ U = I_4. If A = UDU^⊤, where D = (-1-5i,-2,3-2i,2+5i), then A is normal. Figure <ref> illustrates main. dftcor If λ_1,…,λ_n are complex numbers, F denotes the n-by-n discrete Fourier transform matrix, D=(λ_1,…,λ_n), and A = FDF^∗, then F(A_(k)) is inscribed in the polygon ∂(λ_1,…,λ_n) and the points of tangency occur at the midpoints of sides of ∂(λ_1,…,λ_n). Since f_ij = ω^(i-1)(j-1)/√(n), where ω := exp(-2 π i/n), it follows that α = -1/√(n)/√(1/n + 1/n) = -1/√(n)/√(2)/√(n) = -1/√(2), β = 1/√(n)/√(1/n + 1/n) = 1/√(n)/√(2)/√(n) = 1/√(2), and α^2 = β^2 = 1/2, where α and β are defined as in (<ref>). § ACKNOWLEDGEMENTS The authors thank the National Science Foundation for funding and the University of Washington Bothell for hosting REU Site: Tiling Theory, Knot Theory, Optimization, Matrix Analysis, and Image Reconstruction. In addition, we thank Casey Mann and Milagros Loreto for their efforts. abbrv
http://arxiv.org/abs/2303.06950v1
20230313093519
Reconfigurable Distributed Antennas and Reflecting Surface (RDARS): A New Architecture for Wireless Communications
[ "Chengzhi Ma", "Xi Yang", "Jintao Wang", "Guanghua Yang", "Shaodan Ma" ]
cs.IT
[ "cs.IT", "eess.SP", "math.IT" ]
Reconfigurable Distributed Antennas and Reflecting Surface (RDARS): A New Architecture for Wireless Communications Chengzhi Ma, Xi Yang, Jintao Wang, Guanghua Yang, and Shaodan Ma, Senior Member, IEEE C. Ma, J. Wang and S. Ma are with the State Key Laboratory of Internet of Things for Smart City and the Department of Electrical and Computer Engineering, University of Macau, Macao SAR, China (e-mails: yc07499@um.edu.mo; wang.jintao@connect.um.edu.mo; shaodanma@um.edu.mo). X. Yang is with the Shanghai Key Laboratory of Multidimensional Information Processing, East China Normal University, Shanghai 200241, China (e-mail: xyang@cee.ecnu.edu.cn). G. Yang is with the School of Intelligent Systems Science and Engineering and GBA and B&R International Joint Research Center for Smart Logistics, Jinan University, Zhuhai 519070, China (e-mail: ghyang@jnu.edu.cn). ============================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================ Reconfigurable intelligent surfaces (RISs) have drawn much attention recently for their appealing advantages in shaping wireless channels to improve the spectral and energy efficiencies of wireless communications. However, conventional fully-passive RISs generally suffer from the so-called “multiplicative fading” effect and necessitate a large number of passive reflecting units to provide satisfying performance, which thereby limits RISs' practicability and manufacturability. In this paper, a novel architecture of “Reconfigurable Distributed Antennas and Reflecting Surfaces (RDARS)” is first proposed to overcome this limitation from the “multiplicative fading” effect. Specifically, unlike existing active RIS variants, RDARS inherits the low-cost and low-energy-consumption benefits of fully-passive RISs by default configuring all the elements as passive to perform the reflection mode. On the other hand, based on the design of the additional direct-through state, any element of the RDARS can be dynamically programmed to connect with the base station (BS) via fibers and perform the connected mode as remote distributed antennas of the BS to receive signals. Consequently, a controllable trade-off between the reflection gain and the distribution gain can be achieved via RDARS at the BS. To unveil the system behavior of the RDARS-aided system, we analyze the received signal-to-noise ratio (SNR) under maximum ratio combining (MRC) at BS. Closed-form outage probability and ergodic achievable rate are also provided and are verified through extensive simulations. To demonstrate the superiority of the proposed RDARS, we further compare the performance of RDARS with the fully-passive RIS-aided systems under different system settings, and experiments are carried out using a prototype of RDARS with a total number of 256 elements. Experiment results revealed that, compared to the fully-passive RIS, an extra 76% throughput improvement could be achieved by deploying RDARS with only three elements performing connected mode. This thus confirms the effectiveness of the proposed RDARS and envisions it as a promising candidate for future 6G wireless systems. Reconfigurable distributed antennas and reflecting surfaces (RDARS), reconfigurable intelligent surfaces (RIS), distributed antenna systems (DAS), outage probability, ergodic achievable rate. § INTRODUCTION The development of 5G cellular systems accelerates the invention of new technologies to meet high-demand communications needs, including massive multiple-input multiple-out (massive MIMO), ultra-dense network (UDN), and millimeter wave (mmWave) communication, to name a few<cit.>. The success of 5G commercial deployment has motivated both industry and academia to look for new disruptive technologies to achieve unprecedented requirements aiming at ubiquitous coverage, ultra high-rate throughput, and so on <cit.>. To accomplish these ambitious goals, reconfigurable intelligent surface (RIS), also known as intelligent reflecting surface (IRS), has been proposed as a promising technology to extend the coverage while maintaining a low cost and energy consumption for improving spectrum efficiency (SE) and energy efficiency (EE) of the communication network <cit.>. Specifically, RIS is a planar array that is composed of a large number of passive elements, where each of them imposes an independent phase shift on the incident signals. By smartly tuning the phase shifts, the wireless propagation environment becomes controllable and programmable, which thus provides an extra degree of freedom to optimize communication performance. Thanks to the above advantages, RIS has been widely investigated w.r.t. its fundamental performance limits <cit.>, channel modeling <cit.> as well as prototype implementation <cit.>. In particular, in <cit.>, the joint active and passive beamforming design for a RIS-aided system is proposed, and the asymptotic performance of RIS passive beamforming with an infinitely large number of reflecting elements is presented, where the "squared power gain" brought by deploying RIS is unveiled. Also, it is shown that even with discrete phase shifts, through proper optimization, the RIS is still capable of boosting system performance<cit.>. Moreover, as demonstrated in <cit.>, 26 dB power gain is introduced by the RIS prototype with 1100 elements working at 5.8 GHz. Though RIS has revealed its ability to extend the coverage area by creating an extra link between the source-destination when the direct link is blocked. A large number of reflecting elements is generally needed for RIS to achieve the same performance even with ideal phase-shifting as compared to other technologies, e.g., decode-and-forward (DF) relaying <cit.>. The reason lies in the fact that the channel gain of the RIS reflective link suffers from the “multiplicative fading” effect, i.e., the equivalent channel gain of the transmitter-RIS-receiver link is the product of the transmitter-RIS and RIS-receiver channel gains <cit.>. Therefore, the path loss over the RIS reflective link may be high due to the "multiplicative fading", which limits the practical contribution of RIS. Moreover, the fully passive nature of conventional RIS imposes challenges in channel estimations since the number of channel coefficients to be estimated scales linearly with the product of the numbers of antennas at the BS, UE and the elements on RIS <cit.>. Even with the proper design of the channel estimation schemes and leveraging the channel characteristics, e.g., sparsity, the pilot overhead is still large and becomes unaffordable when deploying a large number of passive elements for performance enhancement<cit.>. To overcome these challenges, several variants of RIS architectures are proposed, namely, active RIS, hybrid relay-reflecting intelligent surface (HR-RIS), and so on <cit.>. In particular, different from fully-passive RIS, the elements of active RIS are integrated with amplifiers to amplify the incident signal. Instead of enabling all the elements with the capability to amplify the signal, the HR-RIS proposed replacing only a few passive elements with active ones to relay the signal. To some extent, these variants can partially compensate for the “multiplicative fading” effect by introducing active elements for amplifying or relaying. However, they also introduce additional power consumption and require a much more complicated implementation of the surface. Moreover, the practicability and manufacturability of these variants are still debatable. To amend the aforementioned limitations of fully-passive RIS while maintaining its appealing advantages, we start to think outside the box and revisit the successful technologies proposed in communication society in the past to gain inspiration. While RIS is recognized as a promising technology to combat signal blockages and extend the coverage area, the effort toward dealing with coverage problems is not new. Among all of them, one of the successful and revolutionary examples is the Distributed Antenna System (DAS) <cit.>. In DAS, instead of deploying co-located antennas in the base station (BS), antenna modules are geographically distributed and connected to a central processor by fiber or coaxial cable.[Here, antenna modules refer to entities with sophisticated signal processing capabilities and energy-demanding components, e.g., RF chains and power amplifiers. ] In this way, DAS enables the efficient utilization of space resources by potentially shorting the distance between BS and users and also providing extra spatial diversity. Though the original DAS is introduced to cover the blind spots in wireless communications <cit.>, studies have also identified its potential in improving system energy efficiency and system capacity <cit.>. However, to acquire a satisfactory distributed antenna gain with DAS, many distributed antenna modules should be well allocated in the entire cell, and large antenna arrays are preferred to be deployed in each module to obtain sufficient antenna gain and alleviate interference. This undoubtedly introduces tremendous hardware cost and energy consumption, thus limiting its applications. Motivated by DAS, a natural question arises: Can we introduce the concepts of DAS into the current passive RIS architecture to boost the system performance while still maintaining RIS's low-cost and low-energy consumption advantages? In this paper, we propose, for the first time, a novel “Reconfigurable Distributed Antennas and Reflecting Surfaces (RDARS),” and present both theoretical analysis and experiment results to answer this question. The main contributions of this paper can be summarized as follows: * We propose a novel RDARS architecture, which preserves the appealing advantages of both DAS and the fully-passive RIS. Specifically, each element of RDARS can be dynamically programmed to perform either two modes, i.e., reflect signals as a conventional fully-passive RIS element under reflection mode or perform as a remote antenna for BS to receive signals under connected mode. By introducing the connected mode, the “multiplicative fading” effect in conventional RIS-aided systems can be well compensated without extra power and hardware complexity for amplifying or relaying at the surface. Moreover, a controllable trade-off between the reflection gain and the distribution gain can be achieved via RDARS at the BS. * We analyze the performance of the RDARS-aided system under MRC. Closed-form expressions for bounds of ergodic achievable rate and outage probability are provided. Besides, by setting all elements at RDARS as reflection mode or connected mode, existing results for fully-passive RIS-aided systems or DAS consisting of two distributed antenna sets can be regarded as special cases of our proposed RDARS-aided system. * We investigate the impacts of the number of elements performing different modes and the deployment location of RDARS on its performance. Furthermore, to unveil the superiority of the proposed RDARS, we compare the outage probability and the ergodic achievable rate of RDARS with the fully-passive RIS under various scenarios via extensive simulation results. * We conduct practical experiments to compare the performance of the proposed RDARS and the passive RIS (with all the elements on RDARS performing reflection mode) by establishing an RDARS-aided communication system prototype. The experiment results demonstrate the superiority of the proposed RDARS in terms of performance gain and manufacturability. The rest of the paper is orginized as follows. In Section II and In Section III, we propose the idea of the RDARS architecture and the system model of the RDARS-aided system. Then the performance of RDARS-aided system is analyzed in Section IV. Simulation results are given in Section V, followed by experimental results in Section VI. Further discussion and conclusion are drawn in Section VII and VIII. Notations: Throughout the paper, numbers, vectors, and matrices are denoted by lower-case, bold-face lower-case, and bold-face upper-case letters, respectively. (·)^T, (·)^H denote the transpose and conjugate transpose of a matrix or vector. diag(𝐯) denotes a diagonal matrix with each diagonal element being the corresponding element in 𝐯. Furthermore, |·| denotes modulus of complex number, and 𝔼[·] represent the expected value of a random variable. § PROPOSED RDARS The architecture of the RDARS-aided system is presented in Fig. 1. The total number of elements in RDARS is N, and each element can switch between two modes, namely, the reflection mode and the connected mode. The RDARS controller can dynamically configure the specific mode of each element. When working under reflection mode, the elements work as passive reflecting units similar to the elements in fully-passive RIS. When working under connected mode, the elements act as a remote antenna connected to the BS via dedicated wires or fibers and can receive the incoming wireless signal. Denote the number of elements working on connected mode as a. Then, for a = 0, the RDARS-aided system becomes a fully-passive RIS-aided system; for a = N, the RDARS-aided system can be interpreted as a DAS which has two distributed antenna sets, and one set has N antennas located at a remote place while the other set of antennas is deployed at the BS <cit.>. To maintain the appealing advantages of fully-passive RIS, we only consider the case where the number of elements performing connected mode is very small, i.e., a << N. To better characterize the configuration of this architecture, we introduce a diagonal indicating matrix 𝐀, i.e., 𝐀 is a diagonal matrix with element 𝐀(i,i) ∈{0,1}. Specifically, 𝐀(i,i) = 1 means the i^th element works at connected mode, while 𝐀(j,j) = 0 indicates that the j^th element operates at reflection mode, i.e., the j^th element can only alter the phase of incoming signals. Let 𝐯 = [v_1, ⋯, v_N] denote the RDARS reflection-coefficient vector where v_i = e^jθ_i, ∀ i, and θ_i is the phase shift the i^th element will induce. As such, the equivalent RDARS reflection-coefficient matrix can be modeled as (𝐈-𝐀) diag(𝐯). Unlike active RIS <cit.> or HR-RIS <cit.>, which requires additional reflection-type amplifiers for elements, the realization of the element of RDARS can be built merely upon phase-shift circuits with a slight modification without much additional hardware complexity. However, the detailed implementation of RDARS is out of the scope of this paper. We focus on presenting the idea of the RDARS architecture, analyzing the performance, and further demonstrating its superiority with simulation and experiment results. § SYSTEM MODEL In this paper, we consider RDARS-aided uplink communications where an RDARS is deployed to assist the communications from the user equipment (UE) to the BS. To gain more insight into the system performance of this novel architecture, we consider single-antenna UE and single-antenna BS. The channels between UE-BS, RDARS-BS, and UE-RDARS are all i.i.d. Rayleigh channel, i.e., h_UB∼𝒞𝒩(0, ρ_UB^2) ∈ℂ, 𝐡_RB∼𝒞𝒩(0,ρ_RB^2𝐈_N) ∈ℂ^N× 1 and 𝐡_UR∼𝒞𝒩(0, ρ_UR^2𝐈_N) ∈ℂ^N× 1, where 𝒞𝒩(·,·) denote the complex univariate or multivariate Gaussian distribution. §.§ Signal Model Armed with the notation of indicating matrix 𝐀, the received signal y ∈ℂ from the single antenna of BS and the received signal 𝐮∈ℂ^N × 1 from the a elements acting with connected mode at the RDARS can be expressed as[Here we only consider single-bounce signal reflected by the passive reflecting units since the multi-bounce signal has much small power and thus is omitted here <cit.>.] [ y^T𝐮^T ]^T_∈ℂ^(1+N) × 1 = [ h_UB + 𝐡_RB^H𝐁𝐡_UR ^ ∈ℂ^1 × 1; 𝐀𝐡_UR_∈ℂ^N × 1 ]_∈ℂ^(1+N) × 1x_∈ℂ + [ n_BS; 𝐀𝐧_R ]_∈ℂ^(1+N) × 1 = 𝐡 x + 𝐧 where x ∈ℂ is the signal transmitted from the UE to BS with total power 𝔼[|x|^2] ≤ P. n_BS∼𝒞𝒩(0, σ_BS^2) is the additive white Gaussian noise (AWGN) received at BS. 𝐀𝐧_R is the equivalent noise vector, i.e., [𝐀𝐧_R]_i ∼𝒞𝒩(0, σ_R^2), ∀𝐀(i,i) ≠ 0. It should be noted that if the 𝐀(i,i) = 0, then [𝐀𝐧_R]_i = 0. Since the received signal is jointly processed at BS and advanced technology can be applied to pre-process signal, we assume the noises at RDARS and BS have equal power after some basic pre-processing, i.e., σ_BS = σ_R = σ. Also, 𝐁 in (<ref>) is defined as 𝐁 = (𝐈 - 𝐀) diag(𝐯) to simplify the notation. By defining 𝐡 as the equivalent channel as above, the whole system can be regarded as a special SIMO system. To effectively combine the received signal, the maximum-ratio-combining (MRC), which is a low-complexity combining scheme, is adopted in this paper. As such, the signal after MRC is written as 𝐡^H[ y^T 𝐮^T ]^T_∈ℂ^(1+N) × 1 = 𝐡^H𝐡 x + 𝐡^H𝐧 . Accordingly, with some simple algebra manipulation, the received SNR γ is given by γ = γ ( | h_UB + 𝐡_RB^H𝐁𝐡_UR |^2 + 𝐡_UR^H𝐀^H𝐀𝐡_UR ) , where γ = P/σ^2 is the transmit SNR. It is clear that the indicator matrix 𝐀 and the reflection coefficient vector 𝐯 affect the value of γ. Some insightful observations can be found by considering different system parameter configurations as follows: * When a = 0 (or 𝐀 = 0_N), γ becomes the received SNR of a fully-passive RIS-aided SISO system with a direct link <cit.>. * When a = N (or 𝐀 = 𝐈_N), γ is the received SNR of a DAS with two distributed antenna sets where one set is the home-based station with one antenna and the other deployed at the remote RDARS consists of N co-located antennas <cit.>. The optimal phase shift for the passive reflecting units with perfect channel state information (CSI) at BS in the above system setup can be obtained in closed-form as: θ_i = arg (h_UB) - arg( h_RB,i h_UR,i ) , ∀𝐀(i,i) = 0, where v_i = exp(jθ_i), and arg(·) retrieves the phase of the input complex number. Also, h_RB,i and h_UR,i are the i^th element of the channel vectors 𝐡_RB and 𝐡_UR, respectively. The proof can be obtained by leveraging the triangle inequality similar to <cit.> thus omitted here for brevity. It is clear that the optimal phase shift design for elements performing reflection mode is the same as the traditional RIS system<cit.>. This indicates that the optimal phase shift design for the above RDARS-aided system does not require additional complexity in phase shift design in this system setup. With optimal phase shift, the received SNR can be further formulated as γ = γ [ (|h_UB| + ∑_i=1^N(1-a_i)|h_RB,i||h_UR,i| )^2 + 𝐡_UR^H𝐀^H𝐀𝐡_UR ) ], where a_i = 𝐀(i,i). Here we define (|h_UB| + |𝐡_RB^H𝐁𝐡_UR| )^2 as the reflection gain provided by elements in RDARS performing reflection mode similar to the conventional fully-passive RIS-aided system, while 𝐡_UR^H𝐀^H𝐀𝐡_UR as the distribution gain provided by the elements in RDARS working under connected mode. It can be deduced that the reflection gain of RDARS should be smaller or equal (when a = 0) to the conventional fully-passive RIS-aided systems. However, with the introduced distribution gain, the proposed RDARS is anticipated to greatly outperform the corresponding fully-passive RIS-aided systems. To fully uncover the benefits of the proposed RDARS, we conduct the performance analysis by first analyzing the distribution of γ, comparing the received signal power of RDARS-aided systems with that of traditional fully-passive RIS-aided systems, and deriving closed-form expressions for ergodic achievable rate and outage probability in the following section. § PERFORMANCE ANALYSIS We assume the BS has perfect CSI and the passive reflecting units on RDARS are able to alter the signal with continuous phase shifts. Hence, the results obtained under these assumptions serve as performance upper bounds. To fully unveil the potential of RDARS, we consider the optimal phase shifts configuration for elements performing reflection mode, i.e., θ_i = arg (h_UB) - arg( h_RB,i h_UR,i ) , ∀𝐀(i,i) = 0, and then derive the distribution of γ for a given indicating matrix 𝐀.[ For simplicity, we consider given indicating matrix 𝐀 for analysis. However, the design of 𝐀 provides an extra degree of freedom in optimization for RDARS-aided systems and will be our future research direction.] It can be seen from (<ref>) that γ involves the sum of random variables (RVs). In particular, the reflection gain in γ provided by the passive reflecting units and the direct link involves the square of the sum of RVs, i.e., (|h_UB| + ∑_i=1^N(1-a_i)|h_RB,i||h_UR,i| )^2. Therefore, obtaining the exact distribution of γ involves multiple integrals, convolution, and transformation of RVs and thus makes γ intractable. To obtain more insight into γ and acquire a tractable analytical expression for the distribution of γ to reveal the system behavior, we resort to moment matching based approximation. Specifically, by approximating γ as a Gamma RV via matching their first and second moments, i.e., 𝔼[γ] and 𝔼[γ^2], the result is formalized in the following Theorem. With the optimal phase shift configuration, the distribution of γ given an indicator matrix 𝐀 can be approximated as γ approx∼Γ(k, p ), with shape and scale parameters obtained as k = 𝔼[γ]^2/𝔼[γ^2] - 𝔼[γ]^2, p = 𝔼[γ^2] - 𝔼[γ]^2/𝔼[γ], where the first and second moments of γ, i.e., 𝔼[γ] and 𝔼[γ^2], can be evaluated as 𝔼[γ] = γ[ N^2 ( π^2/16ρ_UI^2ρ_IB^2 ) + ρ_UI^2ρ_IB^2 ( N(1 - π^2/8a^2 - π^2/16) + π^2/16(a^2 + a - 1) ) + ρ_UBρ_UIρ_IB( π/4√(π)(N-a) ) + aρ_UI^2 + ρ_UB^2 ], 𝔼[γ^2] = γ^2 𝔼[ ( (γ_1 + γ_2)^2 + γ_3)^2 ], = γ [2ρ_UB^4 + ρ_UB^2 *((N-a)(1+ π^2/16(N-a-1)) ρ_UR^2ρ_RB^2) + 2* 3/4√(π)ρ_UB^3 *((N-a) π/4ρ_URρ_RB) + ρ_UB^2 *((N-a)(1+ π^2/16(N-a-1)) ρ_UR^2ρ_RB^2) + C_4 ρ_UR^4ρ_RB^4 + 2*1/2√(π)ρ_UB *(C_3 ρ_UR^3 ρ_RB^3) + 2*3/4√(π)ρ_UB^3 * ((N-a) π/4ρ_URρ_RB) + 2*1/2√(π)ρ_UB*(C_3 ρ_UR^3 ρ_RB^3) + 4*ρ_UB^2* ((N-a)(1+ π^2/16(N-a-1)) ρ_UR^2ρ_RB^2) + 2*ρ_UB^2 *a ρ_UR^2 + 2 ((N-a)(1+ π^2/16(N-a-1)) ρ_UR^2ρ_RB^2) a ρ_UR^2 + 4 1/2√(π)ρ_UB (N-a) π/4ρ_URρ_RB a ρ_UR^2 + a(a+1) ρ_UR^4 ]. The proof can be found in Appendix A. The Gamma moments matching is shown to be accurate by well capturing the probability mass of γ. This has been validated by the simulation results in Section 5. Moreover, the average received power after MRC combining P_RDARS can be obtained as P_RDARS = P [ ρ_UB^2 + (N-a) π/4√(π)ρ_UBρ_URρ_RB + (N-a)(1+ π^2/16(N-a-1)) ρ_UR^2ρ_RB^2 + aρ_UR^2 ]. Note that P_RDARS covers the existing results for the conventional RIS-aided SISO systems (a=0) with or without (ρ_UB^2 ≠ 0 or ρ_UB^2 = 0) direct link as special cases <cit.>. It can also be seen that P_RDARS is affected by the large-scale channel parameters as well as the total number of elements N and the number of elements performing connected mode a. As such, to unveil the benefits of the proposed RDARS, we compare the average received power of the RDARS-aided system with that of the conventional RIS-aided system and determine the condition under which the RDARS-aided system performs better than the conventional RIS-aided system in terms of the average received power in the following theorem. Regardless of the number of elements performing connected mode a (∀ a ≤ N and a>0), the RDARS-aided system will provide higher average received power than the corresponding conventional RIS-aided system if the following condition is satisfied: N < 16/π^2(1/ρ_RB^2 -1) + 1 - 4√(π)/πρ_UB/ρ_RBρ_UR . The received powers of the RDARS-aided system and the RIS-aided system are obtained as P_RDARS = P [ ρ_UB^2 + (N-a) π/4√(π)ρ_UBρ_URρ_RB + (N-a)(1+ π^2/16(N-a-1)) ρ_UR^2ρ_RB^2 + aρ_UR^2 ], P_RIS = P [ ρ_UB^2 + Nπ/4√(π)ρ_UBρ_URρ_RB + (N)(1+ π^2/16(N-1)) ρ_UR^2ρ_RB^2]. Let P_RDARS> P_RIS, we have N < 8/π^2(1/ρ_RB^2 -1) + a+1/2 - 2√(π)/πρ_UB/ρ_RBρ_UR. Since a ≤ N, the right-hand-side (RHS) of (<ref>) should be greater than a. As a result, we have the condition for a as a < 16/π^2(1/ρ_RB^2 -1) + 1 - 4√(π)/πρ_UB/ρ_RBρ_UR. Plugging (<ref>) into the RHS of (<ref>), we have (<ref>). Thus we complete the proof. Moreover, when the direct link between the user and BS is blocked (i.e., ρ_UB^2 = 0), we have the following corollary. The RDARS-aided system (without a direct link) will provide higher average received power as compared to the corresponding conventional RIS-aided system (without a direct link), regardless of the number of elements performing connected mode a (∀ a ≤ N and a>0), if the following condition of the total number of elements N is satisfied: N < 16/π^2(1/ρ_RB^2 -1) + 1 . By setting ρ_UB^2 = 0 in (<ref>), the result is obtained. From Theorem <ref> and Corollary <ref>, the condition that the RDARS-aided system outperforms the corresponding conventional RIS-aided system involves an upper bound of N for any given a. This can be interpreted by comparing the reflection gain and distribution gain: When N is extremely large, the reflection gain will dominate for a given transmit power P. Since the reflection gain of the RDARS-aided system is less than the RIS-aided system given an exact total number of N, the corresponding conventional RIS-aided system will perform slightly better than the RDARS-aided system. However, for a practical number of N, the reflection gain is much smaller due to the “multiplicative fading” effect and thus becomes subordinate when a direct link exists <cit.>. In addition, since there is an extra distribution gain in the RDARS-aided system, a point where the average received powers of these two systems are equal to each other should exist. This thus leads to the above upper bounds. Moreover, it should be noted that the average received power of the RDARS-aided system is always higher or equal (when a=N) to DAS which has no aid of passive reflecting units. This can be easily proved by inspecting (<ref>) with ρ_RB=0 and finding that the average received power of the RDARS-aided system has more positive terms than that of the DAS (under the assumption of a ≤ N). §.§ Outage probability Since the SNR γ is approximated as Gamma RV, the closed-form outage probability, which is defined as P_o(x) = Pr(γ < x), can be obtained as P_o(x) = γ(k,x/p)/Γ(k) = (x/p)^k/kΓ(k)_1F_1 (k,k+1,-x/p) , where _1F_1(·,·,·) is the confluent hypergeometric function of the first kind <cit.>. §.§ Ergodic Achievable Rate Here we present the closed-form ergodic achievable rate and its upper bounds to provide insights. §.§.§ Gamma Moment Matching Since γ is approximated as a Gamma RV, the closed-form ergodic achievable rate can be obtained as R = 𝔼[(log_2(1+γ))] = 1/Γ(k)ln(2) H_3, 2^1, 3[ p | (1,1) , (1,1) , (-k+1,1) (1,1) , (0,1) ] , where H(z) = H_p, q^m, n[ p | (a_i,A_i)_1,p (b_i,B_i)_1,q], is the Fox's H-function (FHF) defined via the Mellin-Barnes type integral <cit.>. Define 1/pγ = y, we have R = ∫_0^∞log_2(1+γ) f_γ(γ) dγ, = 1/Γ(k)∫_0^∞ y^k-2log_2(1+py) y exp(-y) dy . Then by expressing log_2(1+py) and y exp(-y) as FHF, we have R = 1/Γ(k) ln(2) ∫_0^∞ y^k-2 H_2, 2^1, 2[ py | (1,1) (1,1) (1,1) (0,1) ] H_0, 1^1, 0[ y | – (1,1) ] dy. By using the integral involving the product of two FHFs from <cit.>, we obtain (<ref>). §.§.§ Upper bound Though the ergodic achievable rate using (<ref>) is accurate which has been verified by the simulation results, calculating the FHF still involves high computational complexity and also hinders the extraction of meaningful insights. As such, we derive the upper bound for the ergodic achievable rate by using Jensen's inequalities as follows: 𝔼[(log_2(1+γ))] ≤ log_2(1+𝔼[γ]) = R^U. Hence, by applying the first and second moments of γ given by (<ref>) and (<ref>), the upper bound R^U obtained as R^U = log_2 [ 1 + N^2 ( π^2/16ρ_UI^2ρ_IB^2 ) + ρ_UI^2ρ_IB^2 ( N(1 - π^2/8a^2 - π^2/16) + π^2/16(a^2 + a - 1) ) + ρ_UBρ_UIρ_IB( π/4√(π)(N-a) ) + aρ_UI^2 + ρ_UB^2 ]. It can be seen that the upper bound R^U in (<ref>) is scaling up with N^2. Though this is obtained for a limited number of N, the result coincides with the power scaling law for conventional RIS <cit.>. This indicates that the RDARS-aided system (using MRC) and the corresponding RIS-aided system perform similarly in the asymptotic regime (with optimal phase shifts), i.e., N →∞. However, as compared to the recently proposed active RIS-aided system <cit.>[The performance of HR-RIS has not been thoroughly investigated yet <cit.>. Therefore, we only mention active RIS as a representative variant.], where the SNR only scales linearly with N in the asymptotic regime due to the additional noises introduced by the use of active components, the RDARS-aided system is still scaling up with N^2 without additional power for amplification. Moreover, as shown in Theorem <ref> and the simulation results provided in Section 5, the RDARS-aided system will perform better than the RIS-aided system for the practical number of N by compensating the “multiplicative fading” effect with distribution gain provided by the elements performing connected mode. These emphasize the practical application value of the proposed RDARS architecture. § SIMULATION RESULTS In this section, numerical results are presented to validate the effectiveness of the proposed architecture and the correctness of the corresponding analysis. To fully unveil the superiority of the proposed architecture, the optimal phase shift as in (<ref>) for passive reflecting units is adopted for both RDARS and RIS-aided systems. The system layout used in this paper is similar to <cit.>, i.e., the BS and the UE are located at points (0,0) and (90,0), respectively, as shown in Fig. 2. The parameter h is chosen to be 10 m (if not specified otherwise), whereas d is varied across simulations. The distance-dependent path loss model is considered and is given by L(d) = C_0 (d/D_0)^-α, where C_0 is the path loss at the reference distance D_0 = 1 m, d denotes the link distance, and α represents the path loss exponent. The path loss exponent of UE-RDARS(RIS) is set to be α_UR = 2.1 while the path loss exponent of RDARS(RIS)-BS will be specified later to study its effects on the system performance. Due to the relatively large distance between the UE-BS link, we set the path loss exponent α_UB = 3.2. All the theoretical results are verified via Monte-Carlo simulations, with each running 30000 channel realizations. Furthermore, we set γ = 60 dB (or P = -20 dBm and σ^2 = -80 dBm when comparing the average received power) and C_0 = -30 dB unless specified. In the following, we first verify the correctness of the analysis in Section IV and then study the performance of the proposed RDARS-aided system under various system setups. §.§ Verification of Analysis In this subsection, we first validate the accuracy of the proposed approximation and bounds by comparing the result of Theorem 2 in (<ref>), the outage probability in (<ref>), and the ergodic achievable rate in (<ref>) and (<ref>) with the Monte-Carlo simulation results. Note that we set d = 20 m and α_RB = 2.2, while the parameters N and a are specified in each figure. In Fig. 3, the PDFs of γ using Monte-Carlo simulations and the proposed analytical approximation are presented. It is clear that the approximation proposed in Theorem 1 is valid for different settings of a. Also, the proposed approximation becomes more accurate with an increasing number of a as shown in Fig. 3.(a)-Fig. 3.(d) (and Fig. 3.(e)-Fig. 3.(h)). This is because the distribution gain becomes dominant with the increasing a. Next, in Fig. 4, the outage probability versus the outage threshold with different system settings is presented. Consistently to Fig. 3, the analytical approximation becomes more and more accurate with the increase of a under various numbers of N. Though some mismatches between the approximation and the simulated results exist in the tail of the outage probability, the derived approximation still provides a good fit by capturing most of the probability mass of γ <cit.>. Finally, in Fig. 5, the ergodic achievable rate versus the total number of elements N (Fig. 5.(a), Fig. 5.(b)) and transmit power (Fig. 5.(c), Fig. 5.(d)) with the different number of a are presented. For thorough comparison, the lower bound based on the method from <cit.> is also provided. It is observed that the proposed ergodic achievable rate approximation (<ref>) matches well with the simulation results under various settings for both scenarios with and without a direct link. Moreover, the lower <cit.> and the upper bounds (<ref>) become tighter as a increases. §.§ Comparison between RDARS and RIS In this subsection, we first validate the proposed theorem and corollary in Section IV, which determine the condition when RDARS outperforms the conventional RIS in different system setups. Then, we investigate the impact of the deployment location of RDARS and compare it with the conventional fully-passive RIS-aided system. Finally, the outage probability and ergodic achievable rate achieved by the RDARS-aided system are compared with that of the corresponding RIS-aided system to unveil the superiority of the proposed RDARS. §.§.§ Is RDARS promising? First, we verify the condition presented in Theorem <ref>. Since (<ref>) is valid regardless of the number of elements performing connected mode, we choose two representative scenarios, i.e., a = 1 and a = N, to verify Theorem <ref>. Intuitively, using a large value of d generally results in small ρ_RB, and thus the condition of N in (<ref>) becomes large. To ease the computation burden, we set d = 10 m, h = 10 m, and ρ_RB = 2 in Fig. 6. To highlight the correctness of our analysis, instead of calculating the difference of average received powers between the RDARS-aided system and the conventional RIS-aided system, we plot the difference of the average SNR[Here, the average SNR refers to 𝔼[γ] where the expectation is taken w.r.t. different channel realizations. Therefore, we have 𝔼[γ_RDARS] = P_RDARS/σ^2 which does not affect our analysis.], i.e., 𝔼[γ_RDARS] - 𝔼[γ_RIS] versus the total number of N for a = 1 and a = N as shown in Fig. 6. It can be seen that the difference of the average SNR between the RDARS-aided and the RIS-aided systems is positively large for small N and decreases with the number of N. The SNR difference approaches zero with N ≈ 4800 when a = 1 and N ≈ 9700 when a = N. This coincides with the results obtained by directly calculating (<ref>) and (<ref>), which are 9713 and 4857 as presented in TABLE 1 and TABLE 2. Moreover, since the large-scale channel coefficient is affected by the distance d and the path loss exponent α_RB, the condition of N for the required number of elements of RIS to outperform RDARS in terms of average received power is also influenced by d and α_RB. For fixed a, larger values of d and α_RB lead to larger 1/ρ_RB^2 and consequently make 1/ρ_RB^2 dominate in (<ref>) and (<ref>), thus calling for more elements in RIS to achieve comparable performance to RDARS. Also, for fixed d and α_RB (or equivalently, fixed ρ_RB), the condition of N only increases linearly with a, which thus confirms the correctness of (<ref>). Notably, as shown in TABLEs 1 and 2, the required N is generally large, e.g., N≥ 4000. Thus we can conclude that for most of the practical number of N, deploying RDARS will provide more benefits than the conventional RIS-aided system in terms of the average received power. In Fig. 7, the average received power for the RDARS(RIS)-aided system versus BS-RDARS(RIS) horizontal distance is presented with N = 256. It is obvious that the RDARS-aided system significantly outperforms the RIS-aided system with different d in the above system setup. Note that the average received power of the RDARS-aided and the RIS-aided systems varies differently with the BS-RDARS(RIS) horizontal distance when N and a are fixed. For example, defining P_RDARS(d) ( or P_RIS(d) ) as the average received power for RDARS-aided system (or RIS-aided system) along d, we have P_RDARS(30) < P_RDARS(60) and P_RIS(30) ≈ P_RIS(60) when the other parameters are fixed. Research in <cit.> has pointed out that deployment of RIS generally should be either near the BS or UE to boost the system performance, and the average received power provided by RIS is almost symmetrical about the midpoint of the position of UE and BS when considering single-user scenarios as in <cit.>. However, as demonstrated in Fig. 7, for a moderate size of the surface (i.e., having a limited number of total elements, e.g., N = 256 in our setting), a large performance gain can be achieved by deploying RDARS near the UE via the obtained distribution gain. Nonetheless, if d is extremely large (i.e., RDARS is far from the receiver (BS) ), the cost for connecting the elements performing connected mode with BS may be unaffordable. Fortunately, as shown in Fig. 7, deploying RDARS near the BS (or receiver side) still seems like a promising choice as it also provides substantial gain over conventional RIS-aided systems and has an acceptable cost for connecting elements performing connected mode on RDARS at the meantime. §.§.§ Outage Probability Here, we investigate the outage probability of the RDARS-aided and the RIS-aided systems under different RDARS(RIS) locations. We set d = 30 m and d =45 m in Fig. 8.(a) and Fig. 8.(b), respectively. As can be seen from Fig. 8.(a) and Fig. 8.(b), for fixed a, the SNR to achieve the same outage probability of the RDARS-aided system decreases with the increasing N thanks to the increasing reflection gain brought by the passive units of RDARS. Besides, when comparing the RDARS-aided and the conventional RIS-aided systems with N = 256 in Fig. 8, a substantial SNR improvement can be achieved with only one element on RDARS performing connected mode, i.e., the 4 dB and 8 dB SNR gains are attained at the outage probability of 0.1 for d = 30, 45 m, respectively. It can also be observed that the gain introduced by increasing the number of elements performing connected mode exhibits a diminishing marginal effect when the total number of elements N is large. This indicates that the performance enhancement may be fulfilled by programming only a few elements in RDARS to perform connected mode. §.§.§ Ergodic Achievable Rate In Fig. 9.(a), the ergodic achievable rate versus the total number of elements N for both RIS and RADRS-aided systems with different a is presented. Here we set γ = 60 dB and α_RB = 2.2, and the scenario where the RIS and the RDARS are both deployed near the receiver (BS) for lowering the cost of connection for elements performing connected mode, i.e., d = 30 m, is considered. As compared to the traditional RIS-aided system, the RDARS-aided system brings 0.8, 1.5, 1.9 bps/Hz rate improvements with only 1, 2, 3 elements performing connected mode, respectively, when N = 256. Note that the rate gain provided by RDARS also vanishes with the increasing N as shown in Fig. 9.(a). This is because the reflection gain will become dominant for relatively large N, and from Remark 2, the ergodic achievable rate of the RDARS-aided system (using MRC combiner) and the conventional RIS-aided system perform similarly in the asymptotic regime of N under optimal phase shift configurations. It is worth mentioning that, although the passive reflecting elements for RIS are designed in sub-wavelength size, achieving a satisfying performance with a RIS-aided system usually requires a large N and thus may result in an overall large size reflecting surface <cit.>. In contrast, by replacing RIS with RDARS, the total size of the surface can be greatly reduced, which makes it more flexible and convenient to be deployed on the surface of walls or buildings to assist practical communications. In Fig. 9.(b), we compare the ergodic achievable rate versus the transmit power for both RIS and RDARS-aided systems with different N and a. It is clear that the RDARS with 3, 2, 1 elements performing connected mode brings 11, 10, 6 dB gains, respectively, to obtain the 6 bps/Hz ergodic achievable rate as compared to the conventional RIS-aided system. This thereby demonstrates the superiority of RDARS in saving the transmit power. § EXPERIMENTAL RESULT In this section, experiment results are presented using a fabricated prototype of RDARS to verify the performance of this proof-of-concept. Fig. 10 presents the picture of the proposed RDARS-aided wireless communication system. The system is composed of one transmitter (UE), one receiver (BS), and one RDARS. Both the transmitter and receiver consist of a computer, a Universal Software Radio Peripheral (USRP), and an antenna.[Note that only one antenna is connected to the USRP at the receiver (BS) as shown in Fig. 10.(b).] The detailed system parameters are presented in TABLE 3. Specifically, the RDARS is made of 16 unit cells per column and per row, i.e., 16× 16=256 total elements. Each element of RDARS has 2-bit phase resolution when performing reflection mode, and will switch to the connected mode when has been programmed and cable is connected to its port in advance at the back of the surface as shown in Fig. 11.(b). The mode and the phase shift of each element can be dynamically and independently controlled by the RDARS controller with a total 512-bit control signal delivered through the control link using User Datagram Protocol (UDP). Since this experiment aims to verify the proposed architecture's effectiveness, we mainly focus on the performance comparison of the RDARS-aided and the conventional RIS-aided systems under the same system configurations. As shown in Fig. 10.(c), RDARS is deployed to assist in uplink communication between UE and BS in a relatively static scenario. Since the RDARS is designed to have a Uniform Planer Array (UPA) form, the optimal phase shift is determined by searching through the codebook and finding the codeword that gives the maximum received power, as mentioned in<cit.>. Once determined, the optimal phase shift is fixed for all schemes during the experiment conducted in a short time period for a fair comparison. The experimental results are presented in Table 4 with three performance metrics, i.e., the received SNR[ Here the received SNR refers to the symbol SNR in dB for the given sequance of IQ samples and is calculated based on Error-Vector-Magnitude (EVM), i.e., SNR [dB] = -20 log_10(EVM).], the data transmission throughput, and the block error rate (BLER). The throughput improvement in Table 4 is calculated between the RDARS-aided and the RIS-aided systems based on the optimal phase shift. One example of the throughput measurements in the experiments is shown in Fig. 12 for clear illustration. As seen from Table 4, for optimal phase shift design, when RIS is deployed, the throughput is improved, i.e., from 2.5 Mbps to 15.0 Mbps. The received SNR is improved by 0.76 dB, i.e., from 10.09 dB to 10.85 dB, and the BLER is reduced by 46%, i.e., from 0.911% to 0.451%. This validated the positive impact of RIS in improving the system performance to a certain extent. However, compared to RIS, RDARS is shown to greatly improve system performance as clearly demonstrated in Table 4, e.g., the RDARS with three elements performing connected mode brought a 76% throughput improvement, i.e., from 15.0 Mbps to 26.4 Mbps, as compared to the RIS-aided system. Also, the received SNR is improved by 2.26 dB, i.e., from 10.85 dB to 13.11 dB, and the BLER is reduced by 41.7%, i.e., from 45.1% to 3.4%. This demonstrates the superiority of RDARS by well compensating the “multiplicative fading" effect. Notably, the gain introduced by increasing the number of elements performing connected mode shows a diminishing marginal effect, e.g., 4.4 Mbps and 1 Mbps throughput improvement from a = 1 to a = 2 and from a = 2 to a = 3, respectively. This indicates that for practical deployment of RDARS, only a few elements performing connected mode are sufficient to greatly improve performance with moderate cost. The experiment results have validated the effectiveness of the proposed RDARS, and its potential in assisting wireless communications systems by greatly boosting the performance as compared to RIS. In fact, in the conventional fully-passive RIS setting, a control link is needed for delivering the control signal for phase shift design. Though our prototype adopts two separate links for RDARS-controller (or RIS-controller by setting all the elements under reflection mode) and the connection of elements performing connected mode with BS (using dedicated cable), we envision that these two links could be integrated together. Research in <cit.> has pointed out that the design of the RIS phase shift based on statistical CSI can provide similar gain as compared to instantaneous CSI. As such, the phase shift information delivery through the controller only needs to be updated on a large-time scale where the remaining time block could be utilized to deliver the signal received at elements performing connected mode on RDARS. This could potentially boost the performance of the RDARS-aided system in terms of achievable rate further. § FURTHER DISCUSSION From the numerical and experiment results, we reveal the effectiveness of the proposed RDARS architecture. However, the potential of RDARS is far beyond what is mentioned in this paper. For example, obtaining global CSI is possible with RDARS whereas only cascaded CSI is available for conventional RIS <cit.>. In fact, the proposed channel estimation methods for “semi-passive RIS” could be utilized as a potential channel estimation scheme for the RDARS-assisted system<cit.>. It should be noted that the original “semi-passive RIS” was proposed merely for channel estimation and the received pilot signals were mainly processed locally on RIS with low-cost signal processing units, this may limit the estimation accuracy. On the contrary, the RDARS-assisted system has the freedom to jointly process signals at BS with more advanced signal processing units while still maintaining low-cost and low-energy-consumption for RDARS. Also, though we focus on unveiling the positive impact of RDARS-aided uplink communication in this paper, RDARS has the potential to assist downlink communication, e.g., the joint active and passive beamforming design for the antenna at BS, the elements acting as remote antennas at RDARS, and the elements performing reflection mode on RDARS. As such, it is worthy of further unveiling the potential of RDARS in various scenarios and combining RDARS with other advanced technologies for future wireless communications. § CONCLUSION This paper proposed the architecture of “Reconfigurable distributed antennas and reflecting surfaces (RDARS)” to overcome the “multiplicative fading” effect, one of the bottlenecks of the conventional fully-passive RIS. Specifically, the elements of RDARS can perform either reflection mode, which acts as passive reflecting units, or connected mode, which performs as remote antennas for BS collecting signal. Therefore, with joint processing of signals at the receiver, a significant gain can be achieved with the controllable trade-off between the reflection gain and the distribution gain in an RDARS-aided system. To characterize the performance of the proposed RDARS-aided system, we analyzed the received SNR under MRC with the system configuration of SISO. Closed-form expressions of outage probability and ergodic achievable rate were also derived. Moreover, the performance of the RDARS-aided and the fully-passive RIS-aided systems was compared under various system parameters to unveil the superiority of the RDARS-aided systems. Finally, to demonstrate the practicability and manufacturability of the proposed RDARS, we conducted experiments by establishing an RDARS prototype. Both simulation and experimental results confirmed the effectiveness of the proposed RDARS architecture, thus envisioning RDARS as a promising candidate for future 6G wireless systems. § THE FIRST AND THE SECOND MOMENTS OF Γ Recall that γ = γ ( (γ_1 + γ_2)^2 + γ_3 ), where we define γ_1 = |h_UB|, γ_2 = ∑_i=1^N(1-a_i)|h_RB,i||h_UR,i|, and γ_3 = 𝐡_UR^H𝐀^H𝐀𝐡_UR. To obtain the first and second moments of γ, we need the following statistical information: the first to the fourth moments of γ_1, γ_2, and the first and the second moments of γ_3. To simplify the notation, we define x_i=(1-a_i)|h_UR,i||h_RB,i|. Below we derive the aforementioned required statistics. §.§ γ_1 The first to fourth moments of h_UB can be easily obtained as 𝔼[γ_1] = 1/2√(π)ρ_UB, 𝔼[γ_1^2] = ρ_UB^2, 𝔼[γ_1^3] = 3/4√(π)ρ_UB^3 and 𝔼[γ_1^4] = 2ρ_UB^4. §.§ γ_2 §.§.§ 𝔼[γ_2] 𝔼[γ_2] = ∑_i=1^N(1-a_i) 𝔼[|h_UR,i|] 𝔼[|h_RB,i|]= (N-a) π/4ρ_URρ_RB. §.§.§ 𝔼[γ_2^2] 𝔼[γ_2^2] = 𝔼[∑_i=1^N (1-a_i)^2 |h_UR,i|^2 |h_RB,i|^2 + ∑_i ≠ j^N (1-a_i) (1-a_j) |h_UR,i| |h_RB,i| |h_UR,j| |h_RB,j|], = (N-a)(1+ π^2/16(N-a-1)) ρ_UR^2ρ_RB^2. §.§.§ 𝔼[γ_2^3] 𝔼[γ_2^3] = 𝔼[∑_i=1^N x_i^3 + ∑_i≠ j^N x_i^2 x_j + ∑_i ≠ j ≠ k^N x_i x_j x_k ], we have 𝔼[∑_i=1^N x_i^3] = (N-a) 9/16πρ_UR^3 ρ_RB^3, 𝔼[∑_i≠ j^N x_i^2 x_j] = C_3^1C_N-a^2C_2^11/4πρ_UR^3 ρ_RB^3, and 𝔼 [∑_i ≠ j ≠ k^N x_i x_j x_k] = =C_N-a^3C_3^1C_2^11/64π^3 ρ_UR^3 ρ_RB^3 where C_N^M = N!/M!(N-M)!. Therefore we have 𝔼 [γ_2^3] = C_3 ρ_UR^3 ρ_RB^3, where C_3 = (N-a) 9/16π + 3(N-a)(N-a-1) 1/4π + (N-a)(N-a-1)(N-a-2) 1/64π^3. §.§.§ 𝔼[γ_2^4] 𝔼[γ_2^4] = 𝔼[ ∑_i=1^N x_i^4 + ∑_i ≠ j^N x_i^3 x_j^1 + ∑_i ≠ j^N x_i^2 x_j^2 + ∑_i ≠ j ≠ k ^N x_i^2 x_j x_l + ∑_i ≠ j ≠ k ≠ l^N x_i^2 x_j^2 x_k^2 x_l^2 ], We have 𝔼 [ ∑_i=1^N x_i^4] = 4(N-a) ρ_UR^4ρ_RB^4, 𝔼 [ ∑_i ≠ j^N x_i^3 x_j^1] = C_4^1C_N-a^2C_2^19/64π^2ρ_UR^4ρ_RB^4, 𝔼 [ ∑_i ≠ j^N x_i^2 x_j^2] = C_4^2C_N-a^2ρ_UR^4ρ_RB^4, 𝔼[∑_i ≠ j ≠ k ^N x_i^2 x_j x_l] = C_N-a^3C_4^2C_3^1C_2^1C_2^1π^2/16ρ_UR^4ρ_RB^4, and 𝔼 [ ∑_i ≠ j ≠ k ≠ l^N x_i x_j x_k x_l] = C_N-a^4C_4^1C_3^1C_2^11/256π^4ρ_UR^4ρ_RB^4. Thus it yields 𝔼 [γ_2^4] = C_4 ρ_UR^4ρ_RB^4, where C_4 = 4(N-a) + 9/16(N - a)(N-a-1) π^2 + 3 (N-a) (N-a-1) + 6(N-a)(N-a-1)(N-a-2) π^2/16 + 1/256(N-a)(N-a-1)(N-a-2)(N-a-3) π^4. §.§ γ_3 𝐡_UI^H𝐀^H𝐀𝐡_UI = ∑_i=1^N a_i^2 |h_UR,i|^2 = ∑_i=1^N a_i^2 y_i , where a_i = 𝐀(i,i) and y_i = |h_UR,i|^2. Note that y_i/1/2ρ_UI^2 follows Chi-square distribution with two degrees of freedom, i.e., y_i/1/2ρ_UR^2 ∼χ^2(2). And y_i = ρ_UR^2/2y_i/1/2ρ_UR^2 follows Gamma distribution, i.e., y_i ∼Γ(1, ρ_UR^2). Therefore we have 𝐡_UR^H𝐀^H𝐀𝐡_UR∼Γ(a, ρ_UR^2), and the first and second moments are obtained as 𝔼[γ_3] = 𝔼[𝐡_UR^H𝐀^H𝐀𝐡_UR] = a ρ_UR^2, 𝔼[γ_3^2] = 𝔼[(𝐡_UR^H𝐀^H𝐀𝐡_UR)^2] = ∑_i=1^N a_i^2 𝔼[|h_UR,i|^4] + ∑_i ≠ j^N a_i a_j 𝔼[|h_UR,i|^2] 𝔼[|h_UR,j|^2] = a(a+1) ρ_UR^4 Armed with the above statistics, the first and second moments of γ are derived. IEEEtran
http://arxiv.org/abs/2303.07161v1
20230313143615
Quantum estimation of a charge distance from a hole-spin qubit in Si quantum dots
[ "Gaia Forghieri", "Andrea Secchi", "Andrea Bertoni", "Paolo Bordone", "Filippo Troiani" ]
cond-mat.mes-hall
[ "cond-mat.mes-hall", "quant-ph" ]
"\n\n\n\n\n\n\n\n\n\n\n^1Università di Modena e Reggio Emilia, I-41125 Modena, Italy\n ^2Centro S3,(...TRUNCATED)
http://arxiv.org/abs/2303.06679v1
20230312145048
RotoGBML: Towards Out-of-Distribution Generalization for Gradient-Based Meta-Learning
[ "Min Zhang", "Zifeng Zhuang", "Zhitao Wang", "Donglin Wang", "Wenbin Li" ]
cs.CV
[ "cs.CV" ]
"\n\n\n\n\n\n\n\nJournal of Class Files, Vol. 14, No. 8, August 2021\nShell et al.: A Sample Ar(...TRUNCATED)
http://arxiv.org/abs/2303.06933v1
20230313085659
Distributionally Robust Chance-Constrained Optimization for Hierarchical UAV-based MEC
[ "Can Cui", "Ziye Jia", "Chao Dong", "Zhuang Ling", "Jiahao You", "Qihui Wu" ]
cs.NI
[ "cs.NI", "eess.SP" ]
"\n\n\n\n\n\n\n\n\n\n\n\n\n\nDistributionally Robust Chance-Constrained Optimization for Hierarchica(...TRUNCATED)
http://arxiv.org/abs/2303.06858v1
20230313050301
"Continuous-Time Zeroth-Order Dynamics with Projection Maps: Model-Free Feedback Optimization with S(...TRUNCATED)
[ "Xin Chen", "Jorge I. Poveda", "Na Li" ]
math.OC
[ "math.OC", "cs.SY", "eess.SY" ]
"\n\n\n\n\n\nContinuous-Time Zeroth-Order Dynamics with Projection Maps: Model-Free Feedback Optimiz(...TRUNCATED)
http://arxiv.org/abs/2303.07141v1
20230313140940
"An Improved Baseline Framework for Pose Estimation Challenge at ECCV 2022 Visual Perception for Nav(...TRUNCATED)
[ "Jiajun Fu", "Yonghao Dang", "Ruoqi Yin", "Shaojie Zhang", "Feng Zhou", "Wending Zhao", "Jianqin Yin" ]
cs.CV
[ "cs.CV" ]
"\n\n\n\nheadings\n16SubNumber*** \n\n \n\n\n\n\n\n\nBeijing University of Posts and Telecommunicat(...TRUNCATED)

Dataset Card for "arxiv-march-2023"

More Information needed

Downloads last month
42
Edit dataset card