1,754 research outputs found

    Class Algebra for Ontology Reasoning

    Full text link
    Class algebra provides a natural framework for sharing of ISA hierarchies between users that may be unaware of each other's definitions. This permits data from relational databases, object-oriented databases, and tagged XML documents to be unioned into one distributed ontology, sharable by all users without the need for prior negotiation or the development of a "standard" ontology for each field. Moreover, class algebra produces a functional correspondence between a class's class algebraic definition (i.e. its "intent") and the set of all instances which satisfy the expression (i.e. its "extent"). The framework thus provides assistance in quickly locating examples and counterexamples of various definitions. This kind of information is very valuable when developing models of the real world, and serves as an invaluable tool assisting in the proof of theorems concerning these class algebra expressions. Finally, the relative frequencies of objects in the ISA hierarchy can produce a useful Boolean algebra of probabilities. The probabilities can be used by traditional information-theoretic classification methodologies to obtain optimal ways of classifying objects in the database.Comment: pp.2-1

    Approximate Joint MAP Detection of Co-Channel Signals

    Full text link
    We consider joint detection of co-channel signals---specifically, signals which do not possess a natural separability due to, for example, the multiple access technique or the use of multiple antennas. Iterative joint detection and decoding is a well known approach for utilizing the error correction code to improve detection performance. However, the joint maximum a posteriori probability (MAP) detector may be prohibitively complex, especially in a multipath channel. In this paper, we present an approximation to the joint MAP detector motivated by a factor graph model of the received signal. The proposed algorithm is designed to approximate the joint MAP detector as closely as possible within the computational capability of the receiver.Comment: Proc. 2015 IEEE MILCOM, 6 page

    A Tractable Metric for Evaluating Base Station Geometries in Cellular Network Localization

    Full text link
    In this letter, we present a new metric for characterizing the geometric conditions encountered in cellular positioning based on the angular spread of the base stations (BSs). The metric is shown to be closely related to the geometric-dilution-of-precision (GDOP), yet has the benefit of being characterizable in terms of the network parameters for BS layouts modeled according to a Poisson point process (PPP). As an additional benefit, the metric is shown to immediately yield a device's probability of being inside or outside the convex hull of the BSs, which localization researchers will widely-recognize as being a strong indicator of localization performance.Comment: Submitted to IEEE Wireless Communications Letter

    Towards a Tractable Analysis of Localization Fundamentals in Cellular Networks

    Full text link
    When dedicated positioning systems, such as GPS, are unavailable, a mobile device has no choice but to fall back on its cellular network for localization. Due to random variations in the channel conditions to its surrounding base stations (BS), the mobile device is likely to face a mix of both favorable and unfavorable geometries for localization. Analytical studies of localization performance (e.g., using the Cram\'{e}r-Rao lower bound) usually require that one fix the BS geometry, and favorable geometries have always been the preferred choice in the literature. However, not only are the resulting analytical results constrained to the selected geometry, this practice is likely to lead to overly-optimistic expectations of typical localization performance. Ideally, localization performance should be studied across all possible geometric setups, thereby also removing any selection bias. This, however, is known to be hard and has been carried out only in simulation. In this paper, we develop a new tractable approach where we endow the BS locations with a distribution by modeling them as a Poisson point process (PPP), and use tools from stochastic geometry to obtain easy-to-use expressions for key performance metrics. In particular, we focus on the probability of detecting some minimum number of BSs, which is shown to be closely coupled with a network operator's ability to obtain satisfactory localization performance (e.g., meet FCC E911 requirements). This metric is indifferent to the localization technique (e.g., TOA, TDOA, AOA, or hybrids thereof), though different techniques will presumably lead to different BS hearability requirements. In order to mitigate excessive interference due to the presence of dominant interferers in the form of other BSs, we incorporate both BS coordination and frequency reuse in the proposed framework and quantify the resulting performance gains analytically.Comment: To appear in IEEE Transactions on Wireless Communication

    On Jamming Against Wireless Networks

    Full text link
    In this paper, we study jamming attacks against wireless networks. Specifically, we consider a network of base stations (BS) or access points (AP) and investigate the impact of a fixed number of jammers that are randomly deployed according to a Binomial point process. We shed light on the network performance in terms of a) the outage probability and b) the error probability of a victim receiver in the downlink of this wireless network. We derive analytical expressions for both these metrics and discuss in detail how the jammer network must adapt to the various wireless network parameters in order to effectively attack the victim receivers. For instance, we will show that with only 1 jammer per BS/AP a) the outage probability of the wireless network can be increased from 1% (as seen in the non-jamming case) to 80% and b) when retransmissions are used, the jammers cause the effective network activity factor (and hence the interference among the BSs) to be doubled. Furthermore, we show that the behavior of the jammer network as a function of the BS/AP density is not obvious. In particular, an interesting concave-type behavior is seen which indicates that the number of jammers required to attack the wireless network must scale with the BS density only until a certain value beyond which it decreases. In the context of error probability of the victim receiver, we study whether or not some recent results related to jamming in the point-to-point link scenario can be extended to the case of jamming against wireless networks. Numerical results are presented to validate the theoretical inferences presented.Comment: 32 double-spaced pages, 18 figures. Submitted to IEEE Transactions on Wireless Communication

    A Tractable Analysis of the Improvement in Unique Localizability Through Collaboration

    Full text link
    In this paper, we mathematically characterize the improvement in device localizability achieved by allowing collaboration among devices. Depending on the detection sensitivity of the receivers in the devices, it is not unusual for a device to be localized to lack a sufficient number of detectable positioning signals from localized devices to determine its location without ambiguity (i.e., to be uniquely localizable). This occurrence is well-known to be a limiting factor in localization performance, especially in communications systems. In cellular positioning, for example, cellular network designers call this the hearability problem. We study the conditions required for unique localizability and use tools from stochastic geometry to derive accurate analytic expressions for the probabilities of meeting these conditions in the noncollaborative and collaborative cases. We consider the scenario without shadowing, the scenario with shadowing and universal frequency reuse, and, finally, the shadowing scenario with random frequency reuse. The results from the latter scenario, which apply particularly to cellular networks, reveal that collaboration between two devices separated by only a short distance yields drastic improvements in both devices' abilities to uniquely determine their positions. The results from this analysis are very promising and motivate delving further into techniques which enhance cellular positioning with small-scale collaborative ranging observations among nearby devices.Comment: 33 double-spaced pages, 12 figures. Submitted to IEEE Transactions on Wireless Communication

    A Mathematical Justification for Exponentially Distributed NLOS Bias

    Full text link
    In the past few decades, the localization literature has seen many models attempting to characterize the non-line-of-sight (NLOS) bias error commonly experienced in range measurements. These models have either been based on specific measurement data or chosen due to attractive features of a particular distribution, yet to date, none have been backed by rigorous analysis. Leveraging tools from stochastic geometry, this paper attempts to fill this void by providing the first analytical backing for an NLOS bias error model. Using a Boolean model to statistically characterize the random locations, orientations, and sizes of reflectors, and assuming first-order (i.e., single-bounce) reflections, the distance traversed by the first-arriving NLOS path is characterized. Under these assumptions, this analysis reveals that NLOS bias exhibits an exponential form and can in fact be well approximated by an exponential distribution -- a result consistent with previous NLOS bias error models in the literature. This analytically derived distribution is then compared to a common exponential model from the literature, revealing this distribution to be a close match in some cases and a lower bound in others. Lastly, the assumptions under which these results were derived suggest this model is aptly suited to characterize NLOS bias in 5G millimeter wave systems as well.Comment: Submitted to the 2019 IEEE Global Communications Conference, Waikoloa, HI, USA; [v2, comments] Minor grammatical changes made to improve clarit

    A Statistical Characterization of Localization Performance in Wireless Networks

    Full text link
    Localization performance in wireless networks has been traditionally benchmarked using the Cramer-Rao lower bound (CRLB), given a fixed geometry of anchor nodes and a target. However, by endowing the target and anchor locations with distributions, this paper recasts this traditional, scalar benchmark as a random variable. The goal of this work is to derive an analytical expression for the distribution of this now random CRLB, in the context of Time-of-Arrival-based positioning. To derive this distribution, this work first analyzes how the CRLB is affected by the order statistics of the angles between consecutive participating anchors (i.e., internodal angles). This analysis reveals an intimate connection between the second largest internodal angle and the CRLB, which leads to an accurate approximation of the CRLB. Using this approximation, a closed-form expression for the distribution of the CRLB, conditioned on the number of participating anchors, is obtained. Next, this conditioning is eliminated to derive an analytical expression for the marginal CRLB distribution. Since this marginal distribution accounts for all target and anchor positions, across all numbers of participating anchors, it therefore statistically characterizes localization error throughout an entire wireless network. This paper concludes with a comprehensive analysis of this new network-wide-CRLB paradigm.Comment: Submitted to IEEE Transactions on Wireless Communication

    Community Microfinance and Finance Education Intiative

    Get PDF
    IMPACT. 1: To raise funds of over $5000 before the end of 2017 to begin our loan program. -- 2. By the end of the 2017-2018 school year, provide at least two loans to clients. -- 3. Obtain Non-Profit status as an organization to best encourage accelerated fundraising efforts.OSU PARTNERS: Fisher College of BusinessCOMMUNITY PARTNERS: None yet, potentially Kiva FinancialPRIMARY CONTACT: Grant Buehrer ([email protected])The goal of our organization is to facilitate a loan program that will allow for members of our community to have an alternative to predatory loan companies when faced with unexpected household expenses. We also aim to provide consulting services to community members regarding personal finance and what community resources exist to aid them in pursuing their financial goals, personal or business. At our core, we hope that providing these services develops our members professionally

    Towards Optimal Secure Distributed Storage Systems with Exact Repair

    Full text link
    Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (n, k,d), in which a file stored across n distributed nodes, can be recovered from any k out of n nodes. If a node fails, any d out of (n-1) nodes help in the repair of the failed node. For such a (n,k,d)-DSS, two types of wiretapping scenarios are investigated: (a) Type-I (node) adversary which can wiretap the data stored on any l<k nodes; and a more severe (b) Type-II (repair data) adversary which can wiretap the contents of the repair data that is used to repair a set of l failed nodes over time. The focus of this work is on the practically relevant setting of exact repair regeneration in which the repair process must replace a failed node by its exact replica. We make new progress on several non-trivial instances of this problem which prior to this work have been open. The main contribution of this paper is the optimal characterization of the secure storage-vs-exact-repair-bandwidth tradeoff region of a (n,k,d)-DSS, with n<=4 and any l<k in the presence of both Type-I and Type-II adversaries. While the problem remains open for a general (n,k,d)-DSS with n>4, we present extensions of these results to a (n, n-1,n-1)-DSS, in presence of a Type-II adversary that can observe the repair data of any l=(n-2) nodes. The key technical contribution of this work is in developing novel information theoretic converse proofs for the Type-II adversarial scenario. From our results, we show that in the presence of Type-II attacks, the only efficient point in the storage-vs-exact-repair-bandwidth tradeoff is the MBR (minimum bandwidth regenerating) point. This is in sharp contrast to the case of a Type-I attack in which the storage-vs-exact-repair-bandwidth tradeoff allows a spectrum of operating points beyond the MBR point.Comment: submitted to IEEE Transactions on Information Theor
    • …
    corecore