6 research outputs found
Recommended from our members
Multi-sensor multi-rate fusion estimation for networked systems: Advances and perspectives
National Natural Science Foundation of China under Grants 62103095, 61873058, 61873148 and 61933007; AHPU Youth Top-notch Talent Support Program of China under Grant 2018BJRC009; Natural Science Foundation of Anhui Province of China under Grant 2108085MA07; Royal Society of the UK; Alexander von Humboldt Foundation of Germany
Recommended from our members
Particle Filtering for Nonlinear/Non-Gaussian Systems with Energy Harvesting Sensors Subject to Randomly Occurring Sensor Saturations
Deanship of Scientific Research; 10.13039/501100004054-King Abdulaziz University; 10.13039/501100001809-National Natural Science Foundation of China; 10.13039/501100004543-China Scholarship Council; Alexander von Humboldt Foundation of Germany
Sensor Signal and Information Processing II
In the current age of information explosion, newly invented technological sensors and software are now tightly integrated with our everyday lives. Many sensor processing algorithms have incorporated some forms of computational intelligence as part of their core framework in problem solving. These algorithms have the capacity to generalize and discover knowledge for themselves and learn new information whenever unseen data are captured. The primary aim of sensor processing is to develop techniques to interpret, understand, and act on information contained in the data. The interest of this book is in developing intelligent signal processing in order to pave the way for smart sensors. This involves mathematical advancement of nonlinear signal processing theory and its applications that extend far beyond traditional techniques. It bridges the boundary between theory and application, developing novel theoretically inspired methodologies targeting both longstanding and emergent signal processing applications. The topic ranges from phishing detection to integration of terrestrial laser scanning, and from fault diagnosis to bio-inspiring filtering. The book will appeal to established practitioners, along with researchers and students in the emerging field of smart sensors processing
Data-Driven Approach based on Deep Learning and Probabilistic Models for PHY-Layer Security in AI-enabled Cognitive Radio IoT.
PhD Theses.Cognitive Radio Internet of Things (CR-IoT) has revolutionized almost every eld of life
and reshaped the technological world. Several tiny devices are seamlessly connected in
a CR-IoT network to perform various tasks in many applications. Nevertheless, CR-IoT
su ers from malicious attacks that pulverize communication and perturb network performance.
Therefore, recently it is envisaged to introduce higher-level Arti cial Intelligence
(AI) by incorporating Self-Awareness (SA) capabilities into CR-IoT objects to facilitate
CR-IoT networks to establish secure transmission against vicious attacks autonomously.
In this context, sub-band information from the Orthogonal Frequency Division Multiplexing
(OFDM) modulated transmission in the spectrum has been extracted from the
radio device receiver terminal, and a generalized state vector (GS) is formed containing
low dimension in-phase and quadrature components. Accordingly, a probabilistic method
based on learning a switching Dynamic Bayesian Network (DBN) from OFDM transmission
with no abnormalities has been proposed to statistically model signal behaviors
inside the CR-IoT spectrum. A Bayesian lter, Markov Jump Particle Filter (MJPF),
is implemented to perform state estimation and capture malicious attacks.
Subsequently, GS containing a higher number of subcarriers has been investigated. In
this connection, Variational autoencoders (VAE) is used as a deep learning technique
to extract features from high dimension radio signals into low dimension latent space
z, and DBN is learned based on GS containing latent space data. Afterward, to perform
state estimation and capture abnormalities in a spectrum, Adapted-Markov Jump
Particle Filter (A-MJPF) is deployed. The proposed method can capture anomaly that
appears due to either jammer attacks in transmission or cognitive devices in a network
experiencing di erent transmission sources that have not been observed previously. The
performance is assessed using the receiver
Generalized averaged Gaussian quadrature and applications
A simple numerical method for constructing the optimal generalized averaged Gaussian quadrature formulas will be presented. These formulas exist in many cases in which real positive GaussKronrod formulas do not exist, and can be used as an adequate alternative in order to estimate the error of a Gaussian rule. We also investigate the conditions under which the optimal averaged Gaussian quadrature formulas and their truncated variants are internal
MS FT-2-2 7 Orthogonal polynomials and quadrature: Theory, computation, and applications
Quadrature rules find many applications in science and engineering. Their analysis is a classical area of applied mathematics and continues to attract considerable attention. This seminar brings together speakers with expertise in a large variety of quadrature rules. It is the aim of the seminar to provide an overview of recent developments in the analysis of quadrature rules. The computation of error estimates and novel applications also are described