This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Neuromorphic Integrated Sensing and Communications

Jiechen Chen, Nicolas Skatchkovsky, and Osvaldo Simeone
The authors are with the King’s Communications, Learning and Information Processing (KCLIP) lab, King’s College London, London, WC2R 2LS, UK. (email:{jiechen.chen, nicolas.skatchkovsky, osvaldo.simeone}@kcl.ac.uk).This work of Osvaldo Simeone and Nicolas Skatchkovsky was supported by the European Research Council (ERC) under the European Union’s Horizon 2020 Research and Innovation Programme (grant agreement No. 725731), and the work by Jiechen Chen was funded by the China Scholarship Council and King’s College London for their Joint Full-Scholarship (K-CSC) under Grant CSC202108440223.
Abstract

Neuromorphic computing is an emerging technology that support event-driven data processing for applications requiring efficient online inference and/or control. Recent work has introduced the concept of neuromorphic communications, whereby neuromorphic computing is integrated with impulse radio (IR) transmission to implement low-energy and low-latency remote inference in wireless Internet-of-Things (IoT) networks. In this paper, we introduce neuromorphic integrated sensing and communications (N-ISAC), a novel solution that enables efficient online data decoding and radar sensing. N-ISAC leverages a common IR waveform for the dual purpose of conveying digital information and of detecting the presence or absence of a radar target. A spiking neural network (SNN) is deployed at the receiver to decode digital data and to detect the radar target using directly the received signal. The SNN operation is optimized by balancing performance metrics for data communications and radar sensing, highlighting synergies and trade-offs between the two applications.

I Introduction

Integrated sensing and communications (ISAC), a key enabling technology for 6G systems, leverages shared radio resources and hardware to realize the functions of sensing and communication. ISAC can enhance energy and spectral efficiencies by supporting context-aware decision making, whereby wireless devices, such as mobile phones and vehicles, act based on information about their surrounding environment [1].

As an example of an application that can benefit from ISAC, consider the inter-vehicle communication scenario in Fig. 1. In it, a car wishes to send a message to a second car, while also enabling the latter to detect the presence of a possible target, e.g., of a pedestrian. While conventional systems would use two separate radio resources for data transmission and radar detection, ISAC solutions reuse the same transmitted waveform for the dual role of carrier of digital information and radar signal [2, 1]. A natural radio interface to serve this dual function is impulse radio (IR), also known as ultrawideband (UWB). In fact, IR encodes information in the timing of pulses, which can in turn be repurposed for radar detection [3, 4].

This paper proposes to leverage the synergy between IR transmission and neuromorphic computing [5, 6] to realize efficient ISAC systems. Neuromorphic computing is an emerging computing technology that can efficiently process information encoded in binary signals known as spikes [7]. With the aim of reducing energy consumption and facilitating online and always-on operation on specialized hardware, as illustrated in Fig. 1, we introduce a neuromorphic ISAC (N-ISAC) receiver that leverages spiking neural network (SNN)-based processing to demodulate digital information and detect the radar signal.

Refer to caption
Figure 1: This paper studies an ISAC system, in which the same IR (or UWB) signal is used for transmission and radar detection of the presence of a target. The key novel element is the use of neuromorphic computing at the ISAC receiver to simultaneously demodulate digital data and provide an online estimate of the presence or absence of the radar target.

I-A Related Work

IR is widely used for low-power communications, e.g., in the IEEE 802.15.4z standard [8], and is envisaged to be part of the “gearbox” of the physical layer of 6G systems [9]. Among the key advantages of IR is the possibility to implement receivers that can operate using efficient analog or neuromorphic hardware [10, 11, 12]. The integration of IR and neuromorphic computing was investigated in [5, 6], which proposed an end-to-end neuromorphic architecture for remote inference that replaces traditional digital blocks with SNNs as encoder and decoder. Hardware implementations includes [10], which introduced an IR-based communication protocol to convey digital packets between SNN chips (see also [13]); and reference [11], which proposed an all-digital spike-based IR wireless transmission scheme for miniaturized biomedical applications.

One of the key research directions for ISAC systems is optimal waveform design [14]. For instance, reference [15] studied ISAC based on delay alignment modulation techniques for Terahertz massive MIMO.

I-B Main Contributions

To our best of knowledge, this is the first work to propose the implementation of ISAC via neuromorphic computing. The main contributions of this letter are summarized as follows.

  • We introduce the novel N-ISAC system illustrated in Fig. 2, which exploits neuromorphic computing and IR to achieve simultaneous data transmission and target detection. The proposed SNN-based architecture demodulates digital data and detects the presence of a radar target in an online fashion;

  • We propose a supervised learning method for the design of the N-ISAC receiver in Fig. 2;

  • Numerical results are provided that demonstrate the advantages of the proposed N-ISAC system over conventional separate sensing and communication (SSAC) solutions.

The remainder of the paper is organized as follows. Section II presents the system model. The neuromorphic receiver processing is detailed in Section III, while Section IV presents the experimental setting and results. Finally, Section V concludes the paper.

II System Model

Refer to caption
Figure 2: N-ISAC: Digital data is transmitted by an IR transmitter via pulse-position modulation (PPM) as illustrated in Fig. 3; while the receiver simultaneously decodes digital data, and performs radar detection by means of an SNN, which can be efficiently implemented on neuromorphic hardware.

As illustrated in Fig. 1 and Fig. 2, we consider an ISAC system in which digital communication and radar sensing leverage the same IR transmitted signal. In order to efficiently and simultaneously decode the digital data and detect the possible presence of a target at a known delay cell, the receiver processes the received signal via an SNN. Given the use of time-encoded information and neuromorphic computing, we refer to the proposed system as neuromorphic ISAC (N-ISAC).

II-A IR Transmission

The IR transmitter modulates and transmits digital data xl{0,1}x_{l}\in\{0,1\}, for each discrete-time instant l=1,,Ll=1,\ldots,L, using pulse position modulation (PPM) through a single antenna. Each bit xlx_{l} is encoded within the llth time slot of duration TT seconds. Specifically, given an information bit sequence {x1,,xL}\{x_{1},\ldots,x_{L}\} of LL bits, the PPM-modulated signal is given as [16]

s(t)=l=1Lϕ(t(l1)TxlLbTc),\displaystyle s(t)=\sum_{l=1}^{L}\phi\big{(}t-(l-1)T-x_{l}L_{b}T_{c}\big{)}, (1)

where ϕ(t)\phi(t) is the pulse waveform of bandwidth 1/Tc1/T_{c}; and TcT_{c} is the chip time. The number of chips within each slot is T/Tc=2LbT/T_{c}=2L_{b}, where integer Lb1L_{b}\geq 1 is referred to as the bandwidth expansion factor. Accordingly, as illustrated in Fig. 3, in each slot ll, bit xlx_{l} is encoded by a pulse on the first chip when xl=0x_{l}=0, and by a pulse in the middle of the slot, i.e., at the Lb+1L_{b}+1th chip, when xl=1x_{l}=1. The energy of the pulse waveform ϕ(t)\phi(t) is constrained to be smaller than a given value EbE_{b}, i.e., +ϕ2(t)Eb\int_{-\infty}^{+\infty}\phi^{2}(t)\leq E_{b}.

Refer to caption
Figure 3: PPM modulation: Each digital data xl{0,1}x_{l}\in\{0,1\} at time slot ll is modulated via PPM, in which a spike at the first chip encodes xl=0x_{l}=0, while a spike at the (Lb+1)(L_{b}+1)th chip encodes xl=1x_{l}=1. Due to the fading and multi-path effects of the channel, the PPM-modulated symbols {si}\{s_{i}\} are corrupted by the channel during transmission to produce the received symbols {yi}\{y_{i}\}.

II-B Multipath Channel and Radar Target

The modulated signal s(t)s(t) is transmitted over a multi-path fading channel to the receiver. The multi-path channel depends on the possible presence of a radar target, as well as on scatterers located between the transmitter and receiver that act as clutter for radar processing. We use the binary variable vv to indicate the presence or absence of the radar target, identified respectively by setting v=1v=1 and v=0v=0. Specifically, following a standard radar model (see, e.g., [17]), we assume that a target may or may not be present at a radar cell corresponding to a known propagation delay τ0\tau_{0}. Accordingly, the continuous-time channel response can be expressed as

h(t)=vβ0g(tτ0)+c=1Ncβcg(tτc),\displaystyle h(t)=v\beta_{0}g(t-\tau_{0})+\sum_{c=1}^{N_{c}}\beta_{c}g(t-\tau_{c}), (2)

where g(t)=ϕ(t)g(t)=\phi(-t) is the receiver filter response, which is matched to the transmitted waveform ϕ(t)\phi(t); the amplitude β0\beta_{0} of the target follows a complex Gaussian distribution with power σ02\sigma_{0}^{2}, i.e., β0𝒞𝒩(0,σ02)\beta_{0}\sim\mathcal{CN}(0,\sigma_{0}^{2}); and the amplitudes {βc}c=1Nc\{\beta_{c}\}_{c=1}^{N_{c}} of the NcN_{c} clutter components are independent with uniform phases and Weibull absolute values having shape parameter κ[0.25,2]\kappa\in[0.25,2] and scale parameter λ(0,)\lambda\in(0,\infty) [17]. With κ=2\kappa=2, the amplitudes {βc}c=1NC\{\beta_{c}\}_{c=1}^{N_{C}} are complex Gaussian random variables [17]. The amplitudes β0\beta_{0} and {βc}c=1Nc\{\beta_{c}\}_{c=1}^{N_{c}} and delays {τc}c=1Nc\{\tau_{c}\}_{c=1}^{N_{c}} are assumed to be unknown.

We note that the model (2) could be generalized to allow for a time-varying presence/absence pattern for the target, in the sense that the variable vv could change over the time slot index ll. We will not consider this situation in this paper, although the extension is straightforward.

II-C Receiver Processing

The signal obtained by the single-antenna receiver is given by

y(t)=s(t)h(t)+z(t),\displaystyle y(t)=s(t)*h(t)+z(t), (3)

where the channel response h(t)h(t) is given in (2); z(t)z(t) is additive white Gaussian noise with power spectral density N0N_{0}; and “*” denotes the convolution operation. The receiver samples the received signal y(t)y(t) at the chip rate 1/Tc1/T_{c}, yielding the discrete-time signal yi=y(iTc)y_{i}=y(iT_{c}), for i=1,2,,2LbLi=1,2,\ldots,2L_{b}L. For each slot time ll, we collect the 2Lb2L_{b} samples 𝒚l={yi}il\mbox{\boldmath{$y$}}_{l}=\{y_{i}\}_{i\in\mathcal{I}_{l}}, with il={2(l1)Lb+1,,2lLb}i\in\mathcal{I}_{l}=\{2(l-1)L_{b}+1,\ldots,2lL_{b}\}. Assuming a maximum delay spread ThT_{h}, upon sampling, the effective discrete-time channel has Lh=Th/TcL_{h}=T_{h}/T_{c} taps. Accordingly, the channel between the transmitter and the receiver is described by the Lh×1L_{h}\times 1 vector 𝒉=[h(0),h(Tc),,h((Lh1)Tc)]T\mbox{\boldmath{$h$}}=[h(0),h(T_{c}),\ldots,h((L_{h}-1)T_{c})]^{T}. Note that, if Lh<LbL_{h}<L_{b}, there is no interference between pulses transmitted in successive slots; while, otherwise, transmission of the pulse encoding the llth bit xlx_{l} may interfere with the pulse encoding the following bits {xl}l>l\{x_{l^{\prime}}\}_{l^{\prime}>l}.

Using (3), the received discrete-time signal yiy_{i} for the iith chip can be expressed as

yi=𝒉T𝒔i+zi,\displaystyle y_{i}=\mbox{\boldmath{$h$}}^{T}\mbox{\boldmath{$s$}}_{i}+z_{i}, (4)

where we have defined the Lh×1L_{h}\times 1 vector 𝒔i=[si,si1,,siLh+1]T\mbox{\boldmath{$s$}}_{i}=[s_{i},s_{i-1},\ldots,\\ s_{i-L_{h}+1}]^{T}, with si=s(iTc)s_{i}=s(iT_{c}) and si=0s_{i}=0 if i0i\leq 0; and zi=zn(iTc)𝒞𝒩(0,N0B)z_{i}=z_{n}(iT_{c})\sim\mathcal{CN}(0,N_{0}B) are the noise samples, where B=1/TcB=1/T_{c} is the pulse bandwidth. By the assumed PPM scheme, for each slot ll, we have all zero samples {si}il\{s_{i}\}_{i\in\mathcal{I}_{l}} except for one sample, namely s2(l1)Lb+1=1s_{2(l-1)L_{b}+1}=1 if xl=0x_{l}=0 and s2(l1/2)Lb+1=1s_{2(l-1/2)L_{b}+1}=1 if xl=1x_{l}=1.

The receiver feeds the received samples {yi}i\{y_{i}\}_{i\in\mathcal{I}} to the SNN successively for each slot ll. To this end, we collect the received samples {yi}i\{y_{i}\}_{i\in\mathcal{I}} corresponding to the time slot ll into a 2Lb×12L_{b}\times 1 vector 𝒚l\mbox{\boldmath{$y$}}_{l}. Since 𝒚l\mbox{\boldmath{$y$}}_{l} is generally complex, we define the 4Lb×14L_{b}\times 1 real-value vector

𝒚¯l=[(𝒚l)T,𝔖(𝒚l)T]T,\displaystyle\bar{\mbox{\boldmath{$y$}}}_{l}=[\mathfrak{R}(\mbox{\boldmath{$y$}}_{l})^{T},~{}\mathfrak{S}(\mbox{\boldmath{$y$}}_{l})^{T}]^{T}, (5)

with ()\mathfrak{R}(\cdot) and 𝔖()\mathfrak{S}(\cdot) being the element-wise real and imaginary parts of the input vector, respectively. The received signal 𝒚¯l\bar{\mbox{\boldmath{$y$}}}_{l} is input to the SNN at each time step ll.

As described in the next section, an SNN is a recurrent discrete-time model that operates along the slot index ll. It takes as input the 2Lb2L_{b} real samples 𝒚¯l\bar{\mbox{\boldmath{$y$}}}_{l}, with one output neuron producing the decoding output x^l{0,1}\hat{x}_{l}\in\{0,1\}, which provides an estimate of the data symbol xlx_{l}, and the other output neuron producing the sensing output v^l\hat{v}_{l}, which estimates the binary variable vl{0,1}v_{l}\in\{0,1\} representing the presence or absence of the target. Note that the detection decision v^l\hat{v}_{l} about the target varies over time as more information is acquired by the receiver.

III Neuromorphic Receiver Processing

In this section, we first describe the SNN model used at the receiver, and then we detail the proposed data-aided optimization of the model parameters of the SNN.

III-A Spiking Neural Network Model

An SNN is specified as a network connecting a set of spiking neurons via an arbitrary directed graph, in which a directed edge represents a synapse. To model the spiking neurons, we adopt the standard discrete-time spike response model (SRM), in which each spiking neuron outputs a binary signal bl{0,1}b_{l}\in\{0,1\}, with “1” representing the emission of a spike and “0” an idle neuron at time step l=1,,Ll=1,\ldots,L. Each neuron kk maintains an internal analog state variable ok,lo_{k,l}, known as the membrane potential, over time step ll.

The membrane potential ok,lo_{k,l} evolves over time l=1,2,l=1,2,\ldots as a function of the spikes that neuron kk receives from the neurons that have synapses ending at neuron kk. The neuron spikes when the membrane potential crosses a threshold, after which the membrane potential is reduced below the threshold. Mathematically, the membrane potential ok,lo_{k,l} is defined by the sum of filtered contributions from incoming spikes and from the neuron kk’s own past outputs. Accordingly, the evolution of the membrane potential is modelled as

ok,l=j𝒫kwk,j(αlbk,l)+βlbk,l,\displaystyle o_{k,l}=\sum_{j\in\mathcal{P}_{k}}w_{k,j}\cdot(\alpha_{l}*b_{k,l})+\beta_{l}*b_{k,l}, (6)

where 𝒫k\mathcal{P}_{k} is the set of neurons with synapses ending at neuron kk; wk,jw_{k,j} is the synaptic weight between neuron j𝒫kj\in\mathcal{P}_{k} and neuron kk; αl\alpha_{l} represents the synaptic response to a spike from a neuron j𝒫kj\in\mathcal{P}_{k}; βl\beta_{l} describes the synaptic response to the spike emitted by neuron kk itself; and “*” is the convolution operator. Typical choices for synaptic spike responses include the first-order feedback filter βl=exp(l/τref)\beta_{l}=\exp(-l/\tau_{\rm ref}), and the second-order synaptic filer αl=exp(l/τmem)exp(l/τsyn)\alpha_{l}=\exp(-l/{\tau_{\rm mem}})-\exp(-l/{\tau_{\rm syn}}), for l=1,2,l=1,2,\ldots, with finite positive constants τref\tau_{\rm ref}, τmem\tau_{\rm mem} and τsyn\tau_{\rm syn}. We refer to [18, 19] for further details.

Neuron kk outputs a spike at time step ll if its membrane potential ok,lo_{k,l} passes some fixed threshold ϑ\vartheta. Accordingly, the output of neuron kk can be expressed as

bk,l=Θ(ok,lϑ),\displaystyle b_{k,l}=\Theta(o_{k,l}-\vartheta), (7)

where Θ()\Theta(\cdot) is the Heaviside step function (Θ(x)=1\Theta(x)=1 if x>0x>0 and Θ(x)=0\Theta(x)=0 otherwise). We denote as 𝜽\theta the vector of all parameters {wk,j}\{w_{k,j}\} for the SNN of the receiver.

The SNN at the receiver has two read-out neurons producing decisions x^l\hat{x}_{l} and v^l\hat{v}_{l}. Denoting as kck^{c} the index of the communication readout neuron, and as ksk^{s} the index of the radar readout neuron, by (7) we have the estimates x^l=bkc,l\hat{x}_{l}=b_{k^{c},l} and v^l=bks,l\hat{v}_{l}=b_{k^{s},l}.

III-B Optimization

To optimize the model parameters of the SNN, we adopt a supervised learning approach, and we assume the availability of a dataset 𝒟\mathcal{D} consisting of examples of the form (𝒚¯,𝒙,v)(\bar{\mbox{\boldmath{$y$}}},\mbox{\boldmath{$x$}},v). Each example (𝒚¯,𝒙,v)(\bar{\mbox{\boldmath{$y$}}},\mbox{\boldmath{$x$}},v) contains the sequence of LL transmitted bits 𝒙={xl}l=1L\mbox{\boldmath{$x$}}=\{x_{l}\}_{l=1}^{L} with xl{0,1}x_{l}\in\{0,1\}; the corresponding LL received samples 𝒚¯={𝒚¯l}l=1L\bar{\mbox{\boldmath{$y$}}}=\{\bar{\mbox{\boldmath{$y$}}}_{l}\}_{l=1}^{L} obtained via (5); and the binary value vv indicating the presence or absence of the target, which is assumed to be the same across LL samples. For each example (𝒚¯,𝒙,v)(\bar{\mbox{\boldmath{$y$}}},\mbox{\boldmath{$x$}},v), at each llth step, the received signal 𝒚¯l\bar{\mbox{\boldmath{$y$}}}_{l} serves as input to the SNN, while xlx_{l} and vv are ground-truth labels for data decoding and target detection, respectively.

To define the training criterion, we evaluate the performance of communication and sensing via two separate cross-entropy losses. To this end, defining the sigmoid function σ(x)=(1+ex)1\sigma(x)=(1+e^{-x})^{-1}, we write the probability plc(𝜽)=σ(okc,l)p^{c}_{l}(\mbox{\boldmath{$\theta$}})=\sigma(o_{k^{c},l}) of the communication readout neuron to produce the estimate x^l=1\hat{x}_{l}=1; and the probability pls(𝜽)=σ(oks,l)p^{s}_{l}(\mbox{\boldmath{$\theta$}})=\sigma(o_{k^{s},l}) of the radar readout neuron to produce the estimate v^l=1\hat{v}_{l}=1. They are both functions of the model parameters 𝜽\theta. The training loss related to data decoding is then measured by the cross-entropy loss

lc(𝜽)=xllog(plc(𝜽))(1xl)log(1plc(𝜽)),\displaystyle\ell^{c}_{l}(\mbox{\boldmath{$\theta$}})=-x_{l}\log(p_{l}^{c}(\mbox{\boldmath{$\theta$}}))-(1-x_{l})\log(1-p_{l}^{c}(\mbox{\boldmath{$\theta$}})), (8)

while the training loss for sensing is similarly defined as

ls(𝜽)=vlog(pls(𝜽))(1v)log(1pls(𝜽)).\displaystyle\ell^{s}_{l}(\mbox{\boldmath{$\theta$}})=-v\log(p_{l}^{s}(\mbox{\boldmath{$\theta$}}))-(1-v)\log(1-p_{l}^{s}(\mbox{\boldmath{$\theta$}})). (9)

The overall training losses for each data point are defined as the sums over time Lc(𝜽)=l=1Llc(𝜽)L^{c}(\mbox{\boldmath{$\theta$}})=\sum_{l=1}^{L}\ell_{l}^{c}(\mbox{\boldmath{$\theta$}}) and Ls(𝜽)=l=1Lls(𝜽)L^{s}(\mbox{\boldmath{$\theta$}})=\sum_{l=1}^{L}\ell_{l}^{s}(\mbox{\boldmath{$\theta$}}). For the considered SNN architecture, we adopt the weighted sum

LISAC(𝜽)=βLc(𝜽)+(1β)Ls(𝜽)\displaystyle L^{ISAC}(\mbox{\boldmath{$\theta$}})=\beta L^{c}(\mbox{\boldmath{$\theta$}})+(1-\beta)L^{s}(\mbox{\boldmath{$\theta$}}) (10)

of the communication and sensing losses, where β[0,1]\beta\in[0,1] is a weight factor determining the relative priority between the two losses. The model parameters 𝜽\theta are updated based on stochastic gradient descent (SGD). To this end, we address the nondifferentiable threshold activation (7) via surrogate gradient [20] by replacing the Heaviside step function in (7) with a differentiable surrogate function, namely the sigmoid σ(x)\sigma(x), during training.

IV Experiments

In this section, we provide experimental results on the proposed N-ISAC system. We start by describing setting and benchmarks.

IV-A Setting

The system operates over L=80L=80 slots. The information bits {xl}l=1L\{x_{l}\}_{l=1}^{L} and target vv are i.i.d. generated as 1/21/2-Bernoulli variables, i.e., xlBern(0.5)x_{l}\sim\text{Bern}(0.5), and vBern(0.5)v\sim\text{Bern}(0.5). The target delay is set to τ0=0\tau_{0}=0, and the amplitudes {βc}c=0Nc\{\beta_{c}\}_{c=0}^{N_{c}} are all i.i.d. βc𝒞𝒩(0,1)\beta_{c}\sim\mathcal{CN}(0,1) variables, while the delays {τc}c=1Nc\{\tau_{c}\}_{c=1}^{N_{c}} are uniformly distributed between 0 and 4Tc4T_{c}. We set the number of clutter paths in the channel (2) as Nc=5N_{c}=5. We generate 60,00060,000 training examples and 10,00010,000 test examples as described in Section II-B. The SNN has a fully connected architecture with a single hidden layer, with 4Lb4L_{b} input neurons and 66 or 1010 hidden neurons. The average signal-to-noise ratio (SNR) is defined as SNR=𝔼[𝒉2]Eb/(N0B)\mathrm{SNR}=\mathbb{E}[\|\mbox{\boldmath{$h$}}\|^{2}]E_{b}/(N_{0}B), where 𝔼[𝒉2]\mathbb{E}[\|\mbox{\boldmath{$h$}}\|^{2}] is the average squared norm of the channel. We set the SNR to 1010dB.

IV-B Benchmark

For comparison, we consider a conventional SSAC scheme. SSAC divides the LL slots into αL\lceil\alpha L\rceil slots used to transmit information, and LαLL-\lceil\alpha L\rceil slots used for radar sensing, where α[0,1]\alpha\in[0,1]. The transmitted signal for radar sensing is given by the PPM waveform (1) with bits fixed to {xl=1}l=αL+1L\{x_{l}=1\}_{l=\lceil\alpha L\rceil+1}^{L}. For SSAC, two SNNs are implemented at the receiver, one performing data decoding for the first αL\lceil\alpha L\rceil slots, and the other responsible for radar sensing in the rest of the time slots. The architecture of both SNNs is as described above, with each SNN having 66 hidden neurons.

IV-C Results

We adopt the following performance metrics for data transmission and radar sensing:

  • Normalized test throughput, i.e., the ratio 𝔼[Lsucc]/L\mathbb{E}[L_{\rm succ}]/L of the average number Lsucc<LL_{\rm succ}<L of correctly decoded bits over the total number of time slots LL;

  • Radar test detection error, i.e., the probability that the sensing decision v^\hat{v} is not correctly taken upon processing all time slots. The final decision v^\hat{v} for each example is made based on the majority rule, predicting the presence of a target (v^=1)(\hat{v}=1) if the SNN produces the decision v^l=1\hat{v}_{l}=1 for a majority of the time slots l=1,,Ll=1,\ldots,L.

Refer to caption
Figure 4: Normalized test throughput versus radar test detection error for ISAC and SSAC (Lb=1(L_{b}=1)).
Refer to caption
Refer to caption
Figure 5: (Top) Normalized test throughput and (Bottom) radar test detection error versus bandwidth expansion factor LbL_{b} for ISAC and SSAC (α=β=0.5(\alpha=\beta=0.5)).

We demonstrate the normalized test throughput versus the radar test detection error for ISAC and SSAC when there is no bandwidth expansion, e.g., for Lb=1L_{b}=1, in Fig. 4. For the ISAC scheme, we vary β\beta in the loss (10), while we change the fraction α\alpha for SSAC. As β\beta increases, more priority is given by ISAC to communication over radar detection; and, similarly, as α\alpha increases, SSAC assigns more slots to communications. The performance of ISAC with an SNN having 1010 hidden neurons is essentially independent of β\beta for any 0.25<β<0.750.25<\beta<0.75. A first observation is that, for SSAC, there is a trade-off between communication and sensing performance levels caused by the slot allocation. A similar trade-off is also observed for ISAC when using an SNN with 66 hidden neurons. This is due to the limited capacity of the shared common hidden layer of the SNN. In contrast, when 1010 hidden neurons are available at the SNN, ISAC is seen to optimize both data decoding and target sensing performance, obtaining significant gains over SSAC.

In Fig. 5, we demonstrate the normalized test throughput and radar test detection error versus the bandwidth expansion factor LbL_{b} for ISAC and SSAC by setting α=β=0.5\alpha=\beta=0.5. Both ISAC and SSAC are observed to benefit from the bandwidth expansion due to the reduced inter-slot interference. However, the throughput achievable by SSAC is bounded by α=0.5\alpha=0.5, while ISAC can obtain larger throughputs; and a similar behavior is observed also in terms of the probability of detection error. Furthermore, when the bandwidth expansion LbL_{b} is sufficiently large, e.g., when Lb=6L_{b}=6, ISAC with 66 hidden neurons obtains a similar performance as that with 1010 neurons, which indicates a larger bandwidth simplifies receiver design in terms of SNN’s capacity.

Refer to caption
Figure 6: Top: Transmitted signal consisting of two frames in which the transmitter is active separated by an idle frame. Bottom: Corresponding spike count for the SNN (β=0.5\beta=0.5, SNR=10dB).

Finally, Fig. 6 illustrates how the SNN receiver can leverage the temporal sparsity of the IR signals to enhance energy efficiency. In this regard, we recall that energy consumption in an SNN is essentially proportional to the number of spikes produced by the SNN, given extremely low idle energy of neuromorphic chips [7]. The top panel shows the transmitted IR signal consisting of two frames of transmitted signals with Lb=1L_{b}=1, separated by an idle frame of duration of 2020 slots. We observe that in the idle frame, the spike count is significantly reduced, showing that the neuromorphic receiver can adjust its energy consumption to the activity level of the transmitter.

V Conclusions

In this paper, we have proposed a novel ISAC solution that leverages the synergy of neuromorphic computing and IR transmission for both data transmission and radar detection. Data are encoded on an IR waveform that is used for the dual purpose of data decoding and target sensing. A SNN-based receiver architecture is considered to estimate data and the presence/absence of a target. Experiments have demonstrated the advantage of the proposed neuromorphic ISAC over conventional separate sensing and communications in terms of normalized test throughput and radar test detection error. We have also highlighted the capacity of the neuromorphic receiver to adapt its computing energy consumption to the activity level of the transmitter.

References

  • [1] F. Liu, C. Masouros, A. P. Petropulu, H. Griffiths, and L. Hanzo, “Joint radar and communication design: applications, state-of-the-art, and the road ahead,” IEEE Transactions on Communications, vol. 68, no. 6, pp. 3834–3862, 2020.
  • [2] S. Jeong, O. Simeone, A. Haimovich, and J. Kang, “Beamforming design for joint localization and data transmission in distributed antenna system,” IEEE Transactions on Vehicular Technology, vol. 64, no. 1, pp. 62–76, 2014.
  • [3] A. Nezirovic, A. G. Yarovoy, and L. P. Ligthart, “Signal processing for improved detection of trapped victims using UWB radar,” IEEE Transactions on Geoscience and Remote Sensing, vol. 48, no. 4, pp. 2005–2014, 2009.
  • [4] C. Zhang, M. J. Kuhn, B. C. Merkl, A. E. Fathy, and M. R. Mahfouz, “Real-time noncoherent UWB positioning radar with millimeter range accuracy: theory and experiment,” IEEE Transactions on Microwave Theory and Techniques, vol. 58, no. 1, pp. 9–20, 2009.
  • [5] N. Skatchkovsky, H. Jang, and O. Simeone, “End-to-end learning of neuromorphic wireless systems for low-power edge artificial intelligence,” in Proc. Asilomar Conference on Signals, Systems, and Computers, pp. 166–173, 2020.
  • [6] J. Chen, N. Skatchkovsky, and O. Simeone, “Neuromorphic wireless cognition: event-driven semantic communications for remote inference,” arXiv preprint arXiv:2206.06047, 2022.
  • [7] M. Davies, N. Srinivasa, T.-H. Lin, G. Chinya, Y. Cao, S. H. Choday, G. Dimou, P. Joshi, N. Imam, S. Jain et al., “Loihi: A neuromorphic manycore processor with on-chip learning,” IEEE Micro, vol. 38, no. 1, pp. 82–99, 2018.
  • [8] M. Z. Win and R. A. Scholtz, “Impulse radio: how it works,” IEEE Communications letters, vol. 2, no. 2, pp. 36–38, 1998.
  • [9] G. P. Fettweis and H. Boche, “6G: the personal tactile Internet—and open questions for information theory,” IEEE BITS the Information Theory Magazine, vol. 1, no. 1, pp. 71–82, 2021.
  • [10] A. Cassidy, Z. Zhang, and A. G. Andreou, “Impulse radio address event interconnects for body area networks and neural prostheses,” in Proc. IEEE Argentine School of Micro-Nanoelectronics, Technology and Applications, pp. 87–92, 2008.
  • [11] A. Shahshahani, M. Shahshahani, P. M. Ros, A. Bonanno, M. Crepaldi, M. Martina, D. Demarchi, and G. Masera, “An all-digital spike-based ultra-low-power IR-UWB dynamic average threshold crossing scheme for muscle force wireless transmission,” in Proc. IEEE Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1479–1484, 2015.
  • [12] Z. Jouni, T. Soupizet, S. Wang, A. Benlarbi-Delai, and P. M. Ferreira, “1.2 nW neuromorphic enhanced wake-up radio,” in Proc. ACM IEEE Symp. Integr. Circuits Syst. Design, 2022.
  • [13] F. Roth, N. Bidoul, T. Rosca, M. Dörpinghaus, D. Flandre, A. M. Ionescu, and G. Fettweis, “Spike-based sensing and communication for highly energy-efficient sensor edge nodes,” in Proc. IEEE International Symposium on Joint Communications & Sensing (JC&S), pp. 1–6, 2022.
  • [14] J. A. Zhang, F. Liu, C. Masouros, R. W. Heath, Z. Feng, L. Zheng, and A. Petropulu, “An overview of signal processing techniques for joint communication and radar sensing,” IEEE Journal of Selected Topics in Signal Processing, vol. 15, no. 6, pp. 1295–1315, 2021.
  • [15] Z. Xiao and Y. Zeng, “Integrated sensing and communication with delay alignment modulation: performance analysis and beamforming optimization,” arXiv preprint arXiv:2207.03647, 2022.
  • [16] M. Z. Win and R. A. Scholtz, “Ultra-wide bandwidth time-hopping spread-spectrum impulse radio for wireless multiple-access communications,” IEEE Transactions on Communications, vol. 48, no. 4, pp. 679–689, 2000.
  • [17] D. A. Shnidman, “Generalized radar clutter model,” IEEE Transactions on Aerospace and Electronic Systems, vol. 35, no. 3, pp. 857–865, 1999.
  • [18] N. Skatchkovsky, H. Jang, and O. Simeone, “Spiking neural networks—Part II: Detecting spatio-temporal patterns,” IEEE Communications Letters, vol. 25, no. 6, pp. 1741–1745, 2021.
  • [19] H. Jang, O. Simeone, B. Gardner, and A. Gruning, “An introduction to probabilistic spiking neural networks: probabilistic models, learning rules, and applications,” IEEE Signal Processing Magazine, vol. 36, no. 6, pp. 64–77, 2019.
  • [20] E. O. Neftci, H. Mostafa, and F. Zenke, “Surrogate gradient learning in spiking neural networks: bringing the power of gradient-based optimization to spiking neural networks,” IEEE Signal Processing Magazine, vol. 36, no. 6, pp. 51–63, 2019.