2,928 research outputs found

    Spatial Statistical Data Fusion on Java-enabled Machines in Ubiquitous Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSN) consist of small, cheap devices that have a combination of sensing, computing and communication capabilities. They must be able to communicate and process data efficiently using minimum amount of energy and cover an area of interest with the minimum number of sensors. This thesis proposes the use of techniques that were designed for Geostatistics and applies them to WSN field. Kriging and Cokriging interpolation that can be considered as Information Fusion algorithms were tested to prove the feasibility of the methods to increase coverage. To reduce energy consumption, a compression method that models correlations based on variograms was developed. A second challenge is to establish the communication to the external networks and to react to unexpected events. A demonstrator that uses commercial Java-enabled devices was implemented. It is able to perform remote monitoring, send SMS alarms and deploy remote updates

    On Distributed Linear Estimation With Observation Model Uncertainties

    Full text link
    We consider distributed estimation of a Gaussian source in a heterogenous bandwidth constrained sensor network, where the source is corrupted by independent multiplicative and additive observation noises, with incomplete statistical knowledge of the multiplicative noise. For multi-bit quantizers, we derive the closed-form mean-square-error (MSE) expression for the linear minimum MSE (LMMSE) estimator at the FC. For both error-free and erroneous communication channels, we propose several rate allocation methods named as longest root to leaf path, greedy and integer relaxation to (i) minimize the MSE given a network bandwidth constraint, and (ii) minimize the required network bandwidth given a target MSE. We also derive the Bayesian Cramer-Rao lower bound (CRLB) and compare the MSE performance of our proposed methods against the CRLB. Our results corroborate that, for low power multiplicative observation noises and adequate network bandwidth, the gaps between the MSE of our proposed methods and the CRLB are negligible, while the performance of other methods like individual rate allocation and uniform is not satisfactory

    On Power Allocation for Distributed Detection with Correlated Observations and Linear Fusion

    Full text link
    We consider a binary hypothesis testing problem in an inhomogeneous wireless sensor network, where a fusion center (FC) makes a global decision on the underlying hypothesis. We assume sensors observations are correlated Gaussian and sensors are unaware of this correlation when making decisions. Sensors send their modulated decisions over fading channels, subject to individual and/or total transmit power constraints. For parallel-access channel (PAC) and multiple-access channel (MAC) models, we derive modified deflection coefficient (MDC) of the test statistic at the FC with coherent reception.We propose a transmit power allocation scheme, which maximizes MDC of the test statistic, under three different sets of transmit power constraints: total power constraint, individual and total power constraints, individual power constraints only. When analytical solutions to our constrained optimization problems are elusive, we discuss how these problems can be converted to convex ones. We study how correlation among sensors observations, reliability of local decisions, communication channel model and channel qualities and transmit power constraints affect the reliability of the global decision and power allocation of inhomogeneous sensors

    Joint Secure Communication and Radar Beamforming: A Secrecy-Estimation Rate-Based Design

    Full text link
    This paper considers transmit beamforming in dual-function radar-communication (DFRC) system, where a DFRC transmitter simultaneously communicates with a communication user and detects a malicious target with the same waveform. Since the waveform is embedded with information, the information is risked to be intercepted by the target. To address this problem, physical-layer security technique is exploited. By using secrecy rate and estimation rate as performance measure for communication and radar, respectively, three secrecy rate maximization (SRM) problems are formulated, including the SRM with and without artificial noise (AN), and robust SRM. For the SRM beamforming, we prove that the optimal beamformer can be computed in closed form. For the AN-aided SRM, by leveraging alternating optimization similar closed-form solution is obtained for the beamformer and the AN covariance matrix. Finally, the imperfect CSI of the target is also considered under the premise of a moment-based random phase-error model on the direction of arrival at the target. Simulation results demonstrate the efficacy and robustness of the proposed designs.Comment: 14 page
    • …
    corecore