2,039 research outputs found

    On Distributed Linear Estimation With Observation Model Uncertainties

    Full text link
    We consider distributed estimation of a Gaussian source in a heterogenous bandwidth constrained sensor network, where the source is corrupted by independent multiplicative and additive observation noises, with incomplete statistical knowledge of the multiplicative noise. For multi-bit quantizers, we derive the closed-form mean-square-error (MSE) expression for the linear minimum MSE (LMMSE) estimator at the FC. For both error-free and erroneous communication channels, we propose several rate allocation methods named as longest root to leaf path, greedy and integer relaxation to (i) minimize the MSE given a network bandwidth constraint, and (ii) minimize the required network bandwidth given a target MSE. We also derive the Bayesian Cramer-Rao lower bound (CRLB) and compare the MSE performance of our proposed methods against the CRLB. Our results corroborate that, for low power multiplicative observation noises and adequate network bandwidth, the gaps between the MSE of our proposed methods and the CRLB are negligible, while the performance of other methods like individual rate allocation and uniform is not satisfactory

    Euclidean Distance Matrices: Essential Theory, Algorithms and Applications

    Get PDF
    Euclidean distance matrices (EDM) are matrices of squared distances between points. The definition is deceivingly simple: thanks to their many useful properties they have found applications in psychometrics, crystallography, machine learning, wireless sensor networks, acoustics, and more. Despite the usefulness of EDMs, they seem to be insufficiently known in the signal processing community. Our goal is to rectify this mishap in a concise tutorial. We review the fundamental properties of EDMs, such as rank or (non)definiteness. We show how various EDM properties can be used to design algorithms for completing and denoising distance data. Along the way, we demonstrate applications to microphone position calibration, ultrasound tomography, room reconstruction from echoes and phase retrieval. By spelling out the essential algorithms, we hope to fast-track the readers in applying EDMs to their own problems. Matlab code for all the described algorithms, and to generate the figures in the paper, is available online. Finally, we suggest directions for further research.Comment: - 17 pages, 12 figures, to appear in IEEE Signal Processing Magazine - change of title in the last revisio

    Sparse Signal Processing Concepts for Efficient 5G System Design

    Full text link
    As it becomes increasingly apparent that 4G will not be able to meet the emerging demands of future mobile communication systems, the question what could make up a 5G system, what are the crucial challenges and what are the key drivers is part of intensive, ongoing discussions. Partly due to the advent of compressive sensing, methods that can optimally exploit sparsity in signals have received tremendous attention in recent years. In this paper we will describe a variety of scenarios in which signal sparsity arises naturally in 5G wireless systems. Signal sparsity and the associated rich collection of tools and algorithms will thus be a viable source for innovation in 5G wireless system design. We will discribe applications of this sparse signal processing paradigm in MIMO random access, cloud radio access networks, compressive channel-source network coding, and embedded security. We will also emphasize important open problem that may arise in 5G system design, for which sparsity will potentially play a key role in their solution.Comment: 18 pages, 5 figures, accepted for publication in IEEE Acces

    Solving Complex Data-Streaming Problems by Applying Economic-Based Principles to Mobile and Wireless Resource Constraint Networks

    Get PDF
    The applications that employ mobile networks depend on the continuous input of reliable data collected by sensing devices. A common application is in military systems, where as an example, drones that are sent on a mission can communicate with each other, exchange sensed data, and autonomously make decisions. Although the mobility of nodes enhances the network coverage, connectivity, and scalability, it introduces pressing issues in data reliability compounded by restrictions in sensor energy resources, as well as limitations in available memory, and computational capacity. This dissertation investigates the issues that mobile networks encounter in providing reliable data. Our research goal is to develop a diverse set of novel data handling solutions for mobile sensor systems providing reliable data by considering the dynamic trajectory behavior relationships among nodes, and the constraints inherent to mobile nodes. We study the applicability of economic models, which are simplified versions of real-world situations that let us observe and make predictions about economic behavior, to our domain. First, we develop a data cleaning method by introducing the notion of “beta,” a measure that quantifies the risk associated with trusting the accuracy of the data provided by a node based on trajectory behavior similarity. Next, we study the reconstruction of highly incomplete data streams. Our method determines the level of trust in data accuracy by assigning variable “weights” considering the quality and the origin of data. Thirdly, we design a behavior-based data reduction and trend prediction technique using Japanese candlesticks. This method reduces the dataset to 5% of its original size while preserving the behavioral patterns. Finally, we develop a data cleaning distribution method for energy-harvesting networks. Based on the Leontief Input-Output model, this method increases the data that is run through cleaning and the network uptime

    Preserving Privacy in Automotive Tire Pressure Monitoring Systems

    Get PDF
    The automotive industry is moving towards a more connected ecosystem, with connectivity achieved through multiple wireless systems. However, in the pursuit of these technological advances and to quickly satisfy requirements imposed on manufacturers, the security of these systems is often an afterthought. It has been shown that systems in a standard new automobile that one would not expect to be vulnerable can be exploited for a variety of harmful effects. This thesis considers a seemingly benign, but government mandated, safety feature of modern vehicles; the Tire Pressure Monitoring System (TPMS). Typical implementations have no security-oriented features, leaking data that can be used for reliable tracking by a determined attacker, and being completely open to spoofing attacks. This research investigates potential privacy concerns of TPMS, first by demonstrating the feasibility of both identifying vehicles and reconstructing their routes without prohibitive cost or expertise. Then, an ID obfuscating scheme is proposed, called TPMS Obfuscation through Rolling ID (TORI), to mitigate these privacy threats while remaining true to the design requirements of TPMS. Various conditions are tested using a modified traffic simulator, which validate the ability to reconstruct the identities of vehicles even from sparse detections

    Random access compressed sensing over fading and noisy communication channels

    Full text link
    • …
    corecore