1,754 research outputs found
Class Algebra for Ontology Reasoning
Class algebra provides a natural framework for sharing of ISA hierarchies
between users that may be unaware of each other's definitions. This permits
data from relational databases, object-oriented databases, and tagged XML
documents to be unioned into one distributed ontology, sharable by all users
without the need for prior negotiation or the development of a "standard"
ontology for each field. Moreover, class algebra produces a functional
correspondence between a class's class algebraic definition (i.e. its "intent")
and the set of all instances which satisfy the expression (i.e. its "extent").
The framework thus provides assistance in quickly locating examples and
counterexamples of various definitions. This kind of information is very
valuable when developing models of the real world, and serves as an invaluable
tool assisting in the proof of theorems concerning these class algebra
expressions. Finally, the relative frequencies of objects in the ISA hierarchy
can produce a useful Boolean algebra of probabilities. The probabilities can be
used by traditional information-theoretic classification methodologies to
obtain optimal ways of classifying objects in the database.Comment: pp.2-1
Approximate Joint MAP Detection of Co-Channel Signals
We consider joint detection of co-channel signals---specifically, signals
which do not possess a natural separability due to, for example, the multiple
access technique or the use of multiple antennas. Iterative joint detection and
decoding is a well known approach for utilizing the error correction code to
improve detection performance. However, the joint maximum a posteriori
probability (MAP) detector may be prohibitively complex, especially in a
multipath channel. In this paper, we present an approximation to the joint MAP
detector motivated by a factor graph model of the received signal. The proposed
algorithm is designed to approximate the joint MAP detector as closely as
possible within the computational capability of the receiver.Comment: Proc. 2015 IEEE MILCOM, 6 page
A Tractable Metric for Evaluating Base Station Geometries in Cellular Network Localization
In this letter, we present a new metric for characterizing the geometric
conditions encountered in cellular positioning based on the angular spread of
the base stations (BSs). The metric is shown to be closely related to the
geometric-dilution-of-precision (GDOP), yet has the benefit of being
characterizable in terms of the network parameters for BS layouts modeled
according to a Poisson point process (PPP). As an additional benefit, the
metric is shown to immediately yield a device's probability of being inside or
outside the convex hull of the BSs, which localization researchers will
widely-recognize as being a strong indicator of localization performance.Comment: Submitted to IEEE Wireless Communications Letter
Towards a Tractable Analysis of Localization Fundamentals in Cellular Networks
When dedicated positioning systems, such as GPS, are unavailable, a mobile
device has no choice but to fall back on its cellular network for localization.
Due to random variations in the channel conditions to its surrounding base
stations (BS), the mobile device is likely to face a mix of both favorable and
unfavorable geometries for localization. Analytical studies of localization
performance (e.g., using the Cram\'{e}r-Rao lower bound) usually require that
one fix the BS geometry, and favorable geometries have always been the
preferred choice in the literature. However, not only are the resulting
analytical results constrained to the selected geometry, this practice is
likely to lead to overly-optimistic expectations of typical localization
performance. Ideally, localization performance should be studied across all
possible geometric setups, thereby also removing any selection bias. This,
however, is known to be hard and has been carried out only in simulation. In
this paper, we develop a new tractable approach where we endow the BS locations
with a distribution by modeling them as a Poisson point process (PPP), and use
tools from stochastic geometry to obtain easy-to-use expressions for key
performance metrics. In particular, we focus on the probability of detecting
some minimum number of BSs, which is shown to be closely coupled with a network
operator's ability to obtain satisfactory localization performance (e.g., meet
FCC E911 requirements). This metric is indifferent to the localization
technique (e.g., TOA, TDOA, AOA, or hybrids thereof), though different
techniques will presumably lead to different BS hearability requirements. In
order to mitigate excessive interference due to the presence of dominant
interferers in the form of other BSs, we incorporate both BS coordination and
frequency reuse in the proposed framework and quantify the resulting
performance gains analytically.Comment: To appear in IEEE Transactions on Wireless Communication
On Jamming Against Wireless Networks
In this paper, we study jamming attacks against wireless networks.
Specifically, we consider a network of base stations (BS) or access points (AP)
and investigate the impact of a fixed number of jammers that are randomly
deployed according to a Binomial point process. We shed light on the network
performance in terms of a) the outage probability and b) the error probability
of a victim receiver in the downlink of this wireless network. We derive
analytical expressions for both these metrics and discuss in detail how the
jammer network must adapt to the various wireless network parameters in order
to effectively attack the victim receivers. For instance, we will show that
with only 1 jammer per BS/AP a) the outage probability of the wireless network
can be increased from 1% (as seen in the non-jamming case) to 80% and b) when
retransmissions are used, the jammers cause the effective network activity
factor (and hence the interference among the BSs) to be doubled. Furthermore,
we show that the behavior of the jammer network as a function of the BS/AP
density is not obvious. In particular, an interesting concave-type behavior is
seen which indicates that the number of jammers required to attack the wireless
network must scale with the BS density only until a certain value beyond which
it decreases. In the context of error probability of the victim receiver, we
study whether or not some recent results related to jamming in the
point-to-point link scenario can be extended to the case of jamming against
wireless networks. Numerical results are presented to validate the theoretical
inferences presented.Comment: 32 double-spaced pages, 18 figures. Submitted to IEEE Transactions on
Wireless Communication
A Tractable Analysis of the Improvement in Unique Localizability Through Collaboration
In this paper, we mathematically characterize the improvement in device
localizability achieved by allowing collaboration among devices. Depending on
the detection sensitivity of the receivers in the devices, it is not unusual
for a device to be localized to lack a sufficient number of detectable
positioning signals from localized devices to determine its location without
ambiguity (i.e., to be uniquely localizable). This occurrence is well-known to
be a limiting factor in localization performance, especially in communications
systems. In cellular positioning, for example, cellular network designers call
this the hearability problem. We study the conditions required for unique
localizability and use tools from stochastic geometry to derive accurate
analytic expressions for the probabilities of meeting these conditions in the
noncollaborative and collaborative cases. We consider the scenario without
shadowing, the scenario with shadowing and universal frequency reuse, and,
finally, the shadowing scenario with random frequency reuse. The results from
the latter scenario, which apply particularly to cellular networks, reveal that
collaboration between two devices separated by only a short distance yields
drastic improvements in both devices' abilities to uniquely determine their
positions. The results from this analysis are very promising and motivate
delving further into techniques which enhance cellular positioning with
small-scale collaborative ranging observations among nearby devices.Comment: 33 double-spaced pages, 12 figures. Submitted to IEEE Transactions on
Wireless Communication
A Mathematical Justification for Exponentially Distributed NLOS Bias
In the past few decades, the localization literature has seen many models
attempting to characterize the non-line-of-sight (NLOS) bias error commonly
experienced in range measurements. These models have either been based on
specific measurement data or chosen due to attractive features of a particular
distribution, yet to date, none have been backed by rigorous analysis.
Leveraging tools from stochastic geometry, this paper attempts to fill this
void by providing the first analytical backing for an NLOS bias error model.
Using a Boolean model to statistically characterize the random locations,
orientations, and sizes of reflectors, and assuming first-order (i.e.,
single-bounce) reflections, the distance traversed by the first-arriving NLOS
path is characterized. Under these assumptions, this analysis reveals that NLOS
bias exhibits an exponential form and can in fact be well approximated by an
exponential distribution -- a result consistent with previous NLOS bias error
models in the literature. This analytically derived distribution is then
compared to a common exponential model from the literature, revealing this
distribution to be a close match in some cases and a lower bound in others.
Lastly, the assumptions under which these results were derived suggest this
model is aptly suited to characterize NLOS bias in 5G millimeter wave systems
as well.Comment: Submitted to the 2019 IEEE Global Communications Conference,
Waikoloa, HI, USA; [v2, comments] Minor grammatical changes made to improve
clarit
A Statistical Characterization of Localization Performance in Wireless Networks
Localization performance in wireless networks has been traditionally
benchmarked using the Cramer-Rao lower bound (CRLB), given a fixed geometry of
anchor nodes and a target. However, by endowing the target and anchor locations
with distributions, this paper recasts this traditional, scalar benchmark as a
random variable. The goal of this work is to derive an analytical expression
for the distribution of this now random CRLB, in the context of
Time-of-Arrival-based positioning.
To derive this distribution, this work first analyzes how the CRLB is
affected by the order statistics of the angles between consecutive
participating anchors (i.e., internodal angles). This analysis reveals an
intimate connection between the second largest internodal angle and the CRLB,
which leads to an accurate approximation of the CRLB. Using this approximation,
a closed-form expression for the distribution of the CRLB, conditioned on the
number of participating anchors, is obtained.
Next, this conditioning is eliminated to derive an analytical expression for
the marginal CRLB distribution. Since this marginal distribution accounts for
all target and anchor positions, across all numbers of participating anchors,
it therefore statistically characterizes localization error throughout an
entire wireless network. This paper concludes with a comprehensive analysis of
this new network-wide-CRLB paradigm.Comment: Submitted to IEEE Transactions on Wireless Communication
Community Microfinance and Finance Education Intiative
IMPACT. 1: To raise funds of over $5000 before the end of 2017 to begin our loan program. -- 2. By the end of the 2017-2018 school year, provide at least two loans to clients. -- 3. Obtain Non-Profit status as an organization to best encourage accelerated fundraising efforts.OSU PARTNERS: Fisher College of BusinessCOMMUNITY PARTNERS: None yet, potentially Kiva FinancialPRIMARY CONTACT: Grant Buehrer ([email protected])The goal of our organization is to facilitate a loan program that will allow for members of our community to have an alternative to predatory loan companies when faced with unexpected household expenses. We also aim to provide consulting services to community members regarding personal finance and what community resources exist to aid them in pursuing their financial goals, personal or business. At our core, we hope that providing these services develops our members professionally
Towards Optimal Secure Distributed Storage Systems with Exact Repair
Distributed storage systems in the presence of a wiretapper are considered. A
distributed storage system (DSS) is parameterized by three parameters (n, k,d),
in which a file stored across n distributed nodes, can be recovered from any k
out of n nodes. If a node fails, any d out of (n-1) nodes help in the repair of
the failed node. For such a (n,k,d)-DSS, two types of wiretapping scenarios are
investigated: (a) Type-I (node) adversary which can wiretap the data stored on
any l<k nodes; and a more severe (b) Type-II (repair data) adversary which can
wiretap the contents of the repair data that is used to repair a set of l
failed nodes over time. The focus of this work is on the practically relevant
setting of exact repair regeneration in which the repair process must replace a
failed node by its exact replica. We make new progress on several non-trivial
instances of this problem which prior to this work have been open. The main
contribution of this paper is the optimal characterization of the secure
storage-vs-exact-repair-bandwidth tradeoff region of a (n,k,d)-DSS, with n<=4
and any l<k in the presence of both Type-I and Type-II adversaries. While the
problem remains open for a general (n,k,d)-DSS with n>4, we present extensions
of these results to a (n, n-1,n-1)-DSS, in presence of a Type-II adversary that
can observe the repair data of any l=(n-2) nodes. The key technical
contribution of this work is in developing novel information theoretic converse
proofs for the Type-II adversarial scenario. From our results, we show that in
the presence of Type-II attacks, the only efficient point in the
storage-vs-exact-repair-bandwidth tradeoff is the MBR (minimum bandwidth
regenerating) point. This is in sharp contrast to the case of a Type-I attack
in which the storage-vs-exact-repair-bandwidth tradeoff allows a spectrum of
operating points beyond the MBR point.Comment: submitted to IEEE Transactions on Information Theor
- …