30,483 research outputs found

    Blind multiuser detection using hidden markov models theory

    Get PDF
    We present an adaptive algorithm based on the theory of hidden Markov models (HMM) which is capable of jointly detecting the users in a DS-CDMA system. The proposed technique is near-far resistant and completely blind in the sense that no knowledge of the signature sequences, channel state information or training sequences is required for any user. In addition to this, an estimate of the signature of each user convolved with its physical channel impulse response (CIR), and an estimate of the background noise variance are provided once convergence is achieved (as well as estimated data sequences). At this moment, and using that CIR estimate, we can switch to any decision-directed (DD) adaptation scheme.Peer ReviewedPostprint (published version

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    Knowledge-aided STAP in heterogeneous clutter using a hierarchical bayesian algorithm

    Get PDF
    This paper addresses the problem of estimating the covariance matrix of a primary vector from heterogeneous samples and some prior knowledge, under the framework of knowledge-aided space-time adaptive processing (KA-STAP). More precisely, a Gaussian scenario is considered where the covariance matrix of the secondary data may differ from the one of interest. Additionally, some knowledge on the primary data is supposed to be available and summarized into a prior matrix. Two KA-estimation schemes are presented in a Bayesian framework whereby the minimum mean square error (MMSE) estimates are derived. The first scheme is an extension of a previous work and takes into account the non-homogeneity via an original relation. {In search of simplicity and to reduce the computational load, a second estimation scheme, less complex, is proposed and omits the fact that the environment may be heterogeneous.} Along the estimation process, not only the covariance matrix is estimated but also some parameters representing the degree of \emph{a priori} and/or the degree of heterogeneity. Performance of the two approaches are then compared using STAP synthetic data. STAP filter shapes are analyzed and also compared with a colored loading technique

    Overview of methods to analyse dynamic data

    Get PDF
    This book gives an overview of existing data analysis methods to analyse the dynamic data obtained from full scale testing, with their advantages and drawbacks. The overview of full scale testing and dynamic data analysis is limited to energy performance characterization of either building components or whole buildings. The methods range from averaging and regression methods to dynamic approaches based on system identification techniques. These methods are discussed in relation to their application in following in situ measurements: -measurement of thermal transmittance of building components based on heat flux meters; -measurement of thermal and solar transmittance of building components tested in outdoor calorimetric test cells; -measurement of heat transfer coefficient and solar aperture of whole buildings based on co-heating or transient heating tests; -characterisation of the energy performance of whole buildings based on energy use monitoring

    A resilient approach for distributed MPC-based economic dispatch in interconnected microgrids

    Get PDF
    © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Economic dispatch of interconnected microgrids that is based on distributed model predictive control (DMPC) requires the cooperation of all agents (microgrids). This paper discusses the case in which some of the agents might not comply with the decisions computed by performing a DMPC algorithm. In this regard, these agents could obtain a better performance at the cost of degrading the performance of the network as a whole. A resilient distributed method that can deal with such issues is proposed and studied in this paper. The method consists of two parts. The first part is to ensure that the decisions obtained from the algorithm are robustly feasible against most of the attacks with high confidence. In this part, we employ a two-step randomization-based approach to obtain a feasible solution with a predefined level of confidence. The second part consists in the identification and mitigation of the adversarial agents, which utilizes hypothesis testing with Bayesian inference and requires each agent to solve a mixed-integer problem to decide the connections with its neighbors. In addition, an analysis of the decisions computed using the stochastic approach and the outcome of the identification and mitigation method is provided. The performance of the proposed approach is also shown through numerical simulations.Peer ReviewedPostprint (author's final draft
    • …
    corecore