2,039 research outputs found
On Distributed Linear Estimation With Observation Model Uncertainties
We consider distributed estimation of a Gaussian source in a heterogenous
bandwidth constrained sensor network, where the source is corrupted by
independent multiplicative and additive observation noises, with incomplete
statistical knowledge of the multiplicative noise. For multi-bit quantizers, we
derive the closed-form mean-square-error (MSE) expression for the linear
minimum MSE (LMMSE) estimator at the FC. For both error-free and erroneous
communication channels, we propose several rate allocation methods named as
longest root to leaf path, greedy and integer relaxation to (i) minimize the
MSE given a network bandwidth constraint, and (ii) minimize the required
network bandwidth given a target MSE. We also derive the Bayesian Cramer-Rao
lower bound (CRLB) and compare the MSE performance of our proposed methods
against the CRLB. Our results corroborate that, for low power multiplicative
observation noises and adequate network bandwidth, the gaps between the MSE of
our proposed methods and the CRLB are negligible, while the performance of
other methods like individual rate allocation and uniform is not satisfactory
Euclidean Distance Matrices: Essential Theory, Algorithms and Applications
Euclidean distance matrices (EDM) are matrices of squared distances between
points. The definition is deceivingly simple: thanks to their many useful
properties they have found applications in psychometrics, crystallography,
machine learning, wireless sensor networks, acoustics, and more. Despite the
usefulness of EDMs, they seem to be insufficiently known in the signal
processing community. Our goal is to rectify this mishap in a concise tutorial.
We review the fundamental properties of EDMs, such as rank or
(non)definiteness. We show how various EDM properties can be used to design
algorithms for completing and denoising distance data. Along the way, we
demonstrate applications to microphone position calibration, ultrasound
tomography, room reconstruction from echoes and phase retrieval. By spelling
out the essential algorithms, we hope to fast-track the readers in applying
EDMs to their own problems. Matlab code for all the described algorithms, and
to generate the figures in the paper, is available online. Finally, we suggest
directions for further research.Comment: - 17 pages, 12 figures, to appear in IEEE Signal Processing Magazine
- change of title in the last revisio
Sparse Signal Processing Concepts for Efficient 5G System Design
As it becomes increasingly apparent that 4G will not be able to meet the
emerging demands of future mobile communication systems, the question what
could make up a 5G system, what are the crucial challenges and what are the key
drivers is part of intensive, ongoing discussions. Partly due to the advent of
compressive sensing, methods that can optimally exploit sparsity in signals
have received tremendous attention in recent years. In this paper we will
describe a variety of scenarios in which signal sparsity arises naturally in 5G
wireless systems. Signal sparsity and the associated rich collection of tools
and algorithms will thus be a viable source for innovation in 5G wireless
system design. We will discribe applications of this sparse signal processing
paradigm in MIMO random access, cloud radio access networks, compressive
channel-source network coding, and embedded security. We will also emphasize
important open problem that may arise in 5G system design, for which sparsity
will potentially play a key role in their solution.Comment: 18 pages, 5 figures, accepted for publication in IEEE Acces
Solving Complex Data-Streaming Problems by Applying Economic-Based Principles to Mobile and Wireless Resource Constraint Networks
The applications that employ mobile networks depend on the continuous input of reliable data collected by sensing devices. A common application is in military systems, where as an example, drones that are sent on a mission can communicate with each other, exchange sensed data, and autonomously make decisions. Although the mobility of nodes enhances the network coverage, connectivity, and scalability, it introduces pressing issues in data reliability compounded by restrictions in sensor energy resources, as well as limitations in available memory, and computational capacity.
This dissertation investigates the issues that mobile networks encounter in providing reliable data. Our research goal is to develop a diverse set of novel data handling solutions for mobile sensor systems providing reliable data by considering the dynamic trajectory behavior relationships among nodes, and the constraints inherent to mobile nodes. We study the applicability of economic models, which are simplified versions of real-world situations that let us observe and make predictions about economic behavior, to our domain. First, we develop a data cleaning method by introducing the notion of “beta,” a measure that quantifies the risk associated with trusting the accuracy of the data provided by a node based on trajectory behavior similarity. Next, we study the reconstruction of highly incomplete data streams. Our method determines the level of trust in data accuracy by assigning variable “weights” considering the quality and the origin of data. Thirdly, we design a behavior-based data reduction and trend prediction technique using Japanese candlesticks. This method reduces the dataset to 5% of its original size while preserving the behavioral patterns. Finally, we develop a data cleaning distribution method for energy-harvesting networks. Based on the Leontief Input-Output model, this method increases the data that is run through cleaning and the network uptime
Preserving Privacy in Automotive Tire Pressure Monitoring Systems
The automotive industry is moving towards a more connected ecosystem, with connectivity achieved through multiple wireless systems. However, in the pursuit of these technological advances and to quickly satisfy requirements imposed on manufacturers, the security of these systems is often an afterthought. It has been shown that systems in a standard new automobile that one would not expect to be vulnerable can be exploited for a variety of harmful effects. This thesis considers a seemingly benign, but government mandated, safety feature of modern vehicles; the Tire Pressure Monitoring System (TPMS). Typical implementations have no security-oriented features, leaking data that can be used for reliable tracking by a determined attacker, and being completely open to spoofing attacks. This research investigates potential privacy concerns of TPMS, first by demonstrating the feasibility of both identifying vehicles and reconstructing their routes without prohibitive cost or expertise. Then, an ID obfuscating scheme is proposed, called TPMS Obfuscation through Rolling ID (TORI), to mitigate these privacy threats while remaining true to the design requirements of TPMS. Various conditions are tested using a modified traffic simulator, which validate the ability to reconstruct the identities of vehicles even from sparse detections
Recommended from our members
Optimized Node Selection for Compressive Sleeping Wireless Sensor Networks
In this paper, we propose an active node selection framework for compressive sleeping wireless sensor networks (WSNs) in order to improve signal acquisition performance, network lifetime and the use of spectrum resources. While conventional compressive sleeping WSNs only exploit the spatial correlation of SNs, the proposed approach further exploits the temporal correlation by selecting active nodes using the support of the data reconstructed in the previous time instant. The node selection problem is framed as the design of a specialized sensing matrix, where the sensing matrix consists of selected rows of an identity matrix. By capitalizing on a genie-aided reconstruction procedure, we formulate the active node selection problem into an optimization problem, which is then approximated by a constrained convex relaxation plus a rounding scheme. Simulation results show that our proposed active node selection approach leads to an improved reconstruction performance, network lifetime and spectrum usage in comparison to various node selection schemes for compressive sleeping WSNs.This is the accepted manuscript. The final published version is available from IEEE at http://dx.doi.org/10.1109/TVT.2015.2400635
- …