14,616 research outputs found

    Causal discovery with general non-linear relationships using non-linear ICA

    Get PDF
    We consider the problem of inferring causal relationships between two or more passively observed variables. While the problem of such causal discovery has been extensively studied, especially in the bivariate setting, the majority of current methods assume a linear causal relationship, and the few methods which consider non-linear relations usually make the assumption of additive noise. Here, we propose a framework through which we can perform causal discovery in the presence of general non-linear relationships. The proposed method is based on recent progress in non-linear independent component analysis (ICA) and exploits the non-stationarity of observations in order to recover the underlying sources. We show rigorously that in the case of bivariate causal discovery, such non-linear ICA can be used to infer causal direction via a series of independence tests. We further propose an alternative measure for inferring causal direction based on asymptotic approximations to the likelihood ratio, as well as an extension to multivariate causal discovery. We demonstrate the capabilities of the proposed method via a series of simulation studies and conclude with an application to neuroimaging data

    Energy Efficient and Reliable ARQ Scheme (ER-ACK) for Mission Critical M2M/IoT Services

    Get PDF
    Wireless sensor networks (WSNs) are the main infrastructure for machine to machine (M2M) and Internet of thing (IoT). Since various sophisticated M2M/IoT services have their own quality-of-service (QoS) requirements, reliable data transmission in WSNs is becoming more important. However, WSNs have strict constraints on resources due to the crowded wireless frequency, which results in high collision probability. Therefore a more efficient data delivering scheme that minimizes both the transmission delay and energy consumption is required. This paper proposes energy efficient and reliable data transmission ARQ scheme, called energy efficient and reliable ACK (ER-ACK), to minimize transmission delay and energy consumption at the same time. The proposed scheme has three aspects of advantages compared to the legacy ARQ schemes such as ACK, NACK and implicit-ACK (I-ACK). It consumes smaller energy than ACK, has smaller transmission delay than NACK, and prevents the duplicated retransmission problem of I-ACK. In addition, resource considered reliability (RCR) is suggested to quantify the improvement of the proposed scheme, and mathematical analysis of the transmission delay and energy consumption are also presented. The simulation results show that the ER-ACK scheme achieves high RCR by significantly reducing transmission delay and energy consumption

    An Optimized Round-Robin Scheduling of Speakers for Peers-to-Peers-Based Byzantine Faulty Tolerance

    Full text link
    © 2018 IEEE. Blockchain technology has been showing its strong performance on decentralized security when integrating with Internet of Things network. However, the trilemma of scalability-security-decentralization exists in Blockchain-based IoT. Therein the typical round-robin scheduling implemented in the Byzantine Faulty Tolerance (BFT) proposed by Neo's Blockchain has a significant delay when consecutive faulty miners exist. This paper proposes a novel analysis model for evaluating the network performance collapse in general, followed by an optimized round-robin scheduling for the case when the mutual latency difference is not significant enough for ranking. Based on the model, the optimized mechanism is able to increase the block rate for a specific subset of consecutive faulty miners by nearly 50% and provide a linearly positive growth rate of the mitigation with respect to the fail rate of a single miner, which strongly promotes the efficiency of the P2P-based BFT consensus algorithm

    Delay-Guaranteed Admission Control for LAA Coexisting with WiFi

    Full text link
    © 2012 IEEE. Licensed-assisted-access (LAA) is used to extend the LTE link into the unlicensed band. How to guarantee the quality-of-service (QoS) for LTE devices in the unlicensed band is a challenging problem due to the listen-before-talk contention access in 5-GHz unlicensed bands. In this letter, we quantitatively analyze the medium access control delay for tagged LAA eNBs and propose a delay-guaranteed admission control scheme. We consider the freezing time of busy slots caused by collision or successful transmission, and introduce the exponential backoff mechanism for delay analysis. Validated by simulation results, our method provides important insights into the system admission performance and fairness of access

    Designed Dynamic Reference with Model Predictive Control for Bidirectional EV Chargers

    Full text link
    © 2013 IEEE. This paper presents a finite control set model predictive control (MPC) using a designed dynamic reference for bidirectional electric vehicle (EV) chargers. In the conventional MPC scheme, a PI controller is involved to generate an active power reference from the DC voltage reference. It is hard to find one fixed set of coefficients for all working conditions. In this paper, a designed dynamic reference based MPC strategy is proposed to replace the PI control loop. In the proposed method, a DC voltage dynamic reference is developed to formulate the inherent relationship between the DC voltage reference and the active power reference. Multi-objective control can be achieved in the proposed scheme, including controlling of the DC voltage, battery charging/discharging current, active power and reactive power, independently. Bidirectional power flow is operated effectively between the EV- and the grid-side. Experimental results are obtained from a laboratory three-phase two-stage bidirectional EV charger controlled by dSPACE DS1104. The results show that fast dynamic and good steady state performance of tracking the above objectives can be achieved with the proposed method. Compared with the system performance obtained by the conventional MPC method, the proposed method generates less active power ripples and produces a better grid current performance

    Rigidity and volume preserving deformation on degenerate simplices

    Full text link
    Given a degenerate (n+1)(n+1)-simplex in a dd-dimensional space MdM^d (Euclidean, spherical or hyperbolic space, and dnd\geq n), for each kk, 1kn1\leq k\leq n, Radon's theorem induces a partition of the set of kk-faces into two subsets. We prove that if the vertices of the simplex vary smoothly in MdM^d for d=nd=n, and the volumes of kk-faces in one subset are constrained only to decrease while in the other subset only to increase, then any sufficiently small motion must preserve the volumes of all kk-faces; and this property still holds in MdM^d for dn+1d\geq n+1 if an invariant ck1(αk1)c_{k-1}(\alpha^{k-1}) of the degenerate simplex has the desired sign. This answers a question posed by the author, and the proof relies on an invariant ck(ω)c_k(\omega) we discovered for any kk-stress ω\omega on a cell complex in MdM^d. We introduce a characteristic polynomial of the degenerate simplex by defining f(x)=i=0n+1(1)ici(αi)xn+1if(x)=\sum_{i=0}^{n+1}(-1)^{i}c_i(\alpha^i)x^{n+1-i}, and prove that the roots of f(x)f(x) are real for the Euclidean case. Some evidence suggests the same conjecture for the hyperbolic case.Comment: 27 pages, 2 figures. To appear in Discrete & Computational Geometr

    Blockchain Based Secure Package Delivery via Ridesharing

    Full text link
    © 2019 IEEE. Delivery service via ridesharing is a promising service to share travel costs and improve vehicle occupancy. Existing ridesharing systems require participating vehicles to periodically report individual private information (e.g., identity and location) to a central controller, which is a potential central point of failure, resulting in possible data leakage or tampering in case of controller break down or under attack. In this paper, we propose a Blockchain secured ridesharing delivery system, where the immutability and distributed architecture of the Blockchain can effectively prevent data tampering. However, such tamper-resistance property comes at the cost of a long confirmation delay caused by the consensus process. A Hash-oriented Practical Byzantine Fault Tolerance (PBFT) based consensus algorithm is proposed to improve the Blockchain efficiency and reduce the transaction confirmation delay from 10 minutes to 15 seconds. The Hash-oriented PBFT effectively avoids the double-spending attack and Sybil attack. Security analysis and simulation results demonstrate that the proposed Blockchain secured ridesharing delivery system offers strong security guarantees and satisfies the quality of delivery service in terms of confirmation delay and transaction throughput
    corecore