1,329 results
Search Results
2. An investigation on mutual information for the linear predictive system and the extrapolation of speech signals
- Abstract
Mutual information (MI) is an important information theoretic concept which has many applications in telecommunications, in blind source separation, and in machine learning. More recently, it has been also employed for the instrumental assessment of speech intelligibility where traditionally correlation based measures are used. In this paper, we address the difference between MI and correlation from the viewpoint of discovering dependencies between variables in the context of speech signals. We perform our investigation by considering the linear predictive approximation and the extrapolation of speech signals as examples. We compare a parametric MI estimation approach based on a Gaussian mixture model (GMM) with the k-nearest neighbor (KNN) approach which is a well-known non-parametric method available to estimate the MI. We show that the GMM-based MI estimator leads to more consistent results. © 2020 Sprachkommunikation - 10. ITG-Fachtagung. All rights reserved., QC 20201202
- Published
- 2020
3. Delay and Stability Analysis of Caching in Heterogeneous Cellular Networks
- Abstract
In this paper, we propose a general delay and stability performance analysis in Heterogeneous Cellular Caching Networks (HCCNs), based on queuing theory. We introduce new performance metrics in HCCNs and propose an optimization problem which minimizes the average experienced delay for users by ensuring the stability of the network. In addition, from the design perspective, we address the problem of finding the minimum cache size for the small cell base stations (SBSs) for having a tolerable average delay and also a stable network. Finally, the analytic expressions derived in this paper are validated through real trace-driven experiments on traffic of YouTube video requests., QC 20161209
- Published
- 2016
- Full Text
- View/download PDF
4. Cooperative Multi-Subarray Beam Training in Millimeter Wave Communication Systems
- Abstract
This paper studies beam training design for a codebook-based beamforming millimeter wave (mmwave) system where multiple antenna arrays are employed and each array is capable of beamforming independently. To reduce the training overhead and the complexity of subsequent beam direction search, we propose a cooperative multi-subarray beam training method. Specifically, from the perspective of excluding non-effective beam direction combinations and thus reducing search space, method and criterion of beam superposition are proposed to construct a wide beam from multiple narrow beams corresponding to multiple subarrays. Then, a cooperative multi-subarray beam training scheme is proposed based on the proposed criterion. Finally, simulation results show that the proposed scheme achieves a spectral efficiency close to that of the optimal exhaustive search scheme, while has greatly reduced training overhead and computational complexity., QC 20180507
- Published
- 2017
- Full Text
- View/download PDF
5. Performance of Wiretap Rayleigh Fading Channels under Statistical Delay Constraints
- Abstract
In this paper, we investigate the performance of the wiretap Rayleigh fading channel in the presence of statistical delay constraints. We invoke tools from stochastic network calculus to derive probabilistic bounds on the delay. This method requires a statistical characterization of the wiretap fading service process, which we derive in closed form. We then validate these analytical bounds via simulations. Interestingly, the analysis of the wiretap fading channel reveals close structural similarities with the interference channel in terms of service process characterization, which is derived in our prior work. In our numerical evaluations, we show that the delay performance of the wiretap fading channel is in particular sensitive to bursty arrival processes due to the high variance of the service process., QC 20170519
- Published
- 2017
- Full Text
- View/download PDF
6. Performance of Wiretap Rayleigh Fading Channels under Statistical Delay Constraints
- Abstract
In this paper, we investigate the performance of the wiretap Rayleigh fading channel in the presence of statistical delay constraints. We invoke tools from stochastic network calculus to derive probabilistic bounds on the delay. This method requires a statistical characterization of the wiretap fading service process, which we derive in closed form. We then validate these analytical bounds via simulations. Interestingly, the analysis of the wiretap fading channel reveals close structural similarities with the interference channel in terms of service process characterization, which is derived in our prior work. In our numerical evaluations, we show that the delay performance of the wiretap fading channel is in particular sensitive to bursty arrival processes due to the high variance of the service process., QC 20170519
- Published
- 2017
- Full Text
- View/download PDF
7. Performance of Wiretap Rayleigh Fading Channels under Statistical Delay Constraints
- Abstract
In this paper, we investigate the performance of the wiretap Rayleigh fading channel in the presence of statistical delay constraints. We invoke tools from stochastic network calculus to derive probabilistic bounds on the delay. This method requires a statistical characterization of the wiretap fading service process, which we derive in closed form. We then validate these analytical bounds via simulations. Interestingly, the analysis of the wiretap fading channel reveals close structural similarities with the interference channel in terms of service process characterization, which is derived in our prior work. In our numerical evaluations, we show that the delay performance of the wiretap fading channel is in particular sensitive to bursty arrival processes due to the high variance of the service process., QC 20170519
- Published
- 2017
- Full Text
- View/download PDF
8. Performance of Wiretap Rayleigh Fading Channels under Statistical Delay Constraints
- Abstract
In this paper, we investigate the performance of the wiretap Rayleigh fading channel in the presence of statistical delay constraints. We invoke tools from stochastic network calculus to derive probabilistic bounds on the delay. This method requires a statistical characterization of the wiretap fading service process, which we derive in closed form. We then validate these analytical bounds via simulations. Interestingly, the analysis of the wiretap fading channel reveals close structural similarities with the interference channel in terms of service process characterization, which is derived in our prior work. In our numerical evaluations, we show that the delay performance of the wiretap fading channel is in particular sensitive to bursty arrival processes due to the high variance of the service process., QC 20170519
- Published
- 2017
- Full Text
- View/download PDF
9. Performance of Wiretap Rayleigh Fading Channels under Statistical Delay Constraints
- Abstract
In this paper, we investigate the performance of the wiretap Rayleigh fading channel in the presence of statistical delay constraints. We invoke tools from stochastic network calculus to derive probabilistic bounds on the delay. This method requires a statistical characterization of the wiretap fading service process, which we derive in closed form. We then validate these analytical bounds via simulations. Interestingly, the analysis of the wiretap fading channel reveals close structural similarities with the interference channel in terms of service process characterization, which is derived in our prior work. In our numerical evaluations, we show that the delay performance of the wiretap fading channel is in particular sensitive to bursty arrival processes due to the high variance of the service process., QC 20170519
- Published
- 2017
- Full Text
- View/download PDF
10. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
11. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
12. Statistical methods for inter-view depth enhancement
- Abstract
This paper briefly presents and evaluates recent advances in statistical methods for improving inter-view inconsistency in multiview depth imagery. View synthesis is vital in free-viewpoint television in order to allow viewers to move freely in a dynamic scene. Here, depth image-based rendering plays a pivotal role by synthesizing an arbitrary number of novel views by using a subset of captured views and corresponding depth maps only. Usually, each depth map is estimated individually at different viewpoints by stereo matching and, hence, shows lack of inter-view consistency. This lack of consistency affects the quality of view synthesis negatively. This paper discusses two different approaches to enhance the inter-view depth consistency. The first one uses generative models based on multiview color and depth classification to assign a probabilistic weight to each depth pixel. The weighted depth pixels are utilized to enhance depth maps. The second one performs inter-view consistency testing in depth difference space to enhance the depth maps at multiple viewpoints. We comparatively evaluate these two methods and discuss their pros and cons for future work., QC 20150109
- Published
- 2014
- Full Text
- View/download PDF
13. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
14. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
15. Wiretap Codes for Secure Multi-Party Computation
- Abstract
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code., QC 20150521
- Published
- 2014
- Full Text
- View/download PDF
16. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
17. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
18. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
19. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
20. On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
- Abstract
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models., QC 20130830
- Published
- 2013
21. Variational Inference for Watson Mixture Model
- Abstract
This paper addresses modelling data using the Watson distribution. The Watson distribution is one of the simplest distributions for analyzing axially symmetric data. This distribution has gained some attention in recent years due to its modeling capability. However, its Bayesian inference is fairly understudied due to difficulty in handling the normalization factor. Recent development of Markov chain Monte Carlo (MCMC) sampling methods can be applied for this purpose. However, these methods can be prohibitively slow for practical applications. A deterministic alternative is provided by variational methods that convert inference problems into optimization problems. In this paper, we present a variational inference for Watson mixture models. First, the variational framework is used to side-step the intractability arising from the coupling of latent states and parameters. Second, the variational free energy is further lower bounded in order to avoid intractable moment computation. The proposed approach provides a lower bound on the log marginal likelihood and retains distributional information over all parameters. Moreover, we show that it can regulate its own complexity by pruning unnecessary mixture components while avoiding over-fitting. We discuss potential applications of the modeling with Watson distributions in the problem of blind source separation, and clustering gene expression data sets., QC 20161012
- Published
- 2016
- Full Text
- View/download PDF
22. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
23. Secret key generation over noisy channels with common randomness
- Abstract
This paper investigates the problem of secret key generation over a wiretap channel when the terminals have access to correlated sources. These sources are independent of the main channel and the users observe them before the transmission takes place. A novel achievable scheme for this model is proposed and is shown to be optimal under certain less noisy conditions. This result improves upon the existing literature where the more stringent condition of degradedness was needed., QC 20161121
- Published
- 2016
- Full Text
- View/download PDF
24. Feature-Based Multi-User Authentication for Parallel Uplink Transmissions
- Abstract
We study a multi-user up-link scenario where an attacker tries to impersonate the legitimate transmitters. We present a new framework for deriving a posteriori attack probabilities from the channel observations at the access point, which enables fast intrusion detection and authentication at the physical layer and can be exploited to reduce the security overhead by offtoading higher-layer authentication schemes. This is highly relevant for delay-sensitive applications that are targeted in 5G where the security overhead may limit the real-time performance. We take a factor-graph approach that can easily be extended to take into account other features, channel models, and radio access schemes. While related works only consider single-link scenarios, the multi-user approach in this paper allows us to exploit the cross-channel correlation of the large-scale fading parameters that is due to the propagation environment for improving the detection performance. As numerical results show, especially for slowly changing channels with high correlation our approach provides significant performance gains., QC 20161209, CERCES
- Published
- 2016
- Full Text
- View/download PDF
25. Video coding using multi-reference motion-adaptive transforms based on graphs
- Abstract
The purpose of the work is to produce jointly coded frames for efficient video coding. We use motion-adaptive transforms in the temporal domain to generate the temporal subbands. The motion information is used to form graphs for transform construction. In our previous work, the motion-adaptive transform allows only one reference pixel to be the lowband coefficient. In this paper, we extend the motion-adaptive transform such that it permits multiple references and produces multiple lowband coefficients, which can be used in the case of bidirectional or multihypothesis motion estimation. The multi-reference motion-adaptive transform (MRMAT) is always orthonormal, thus, the energy is preserved by the transform. We compare MRMAT and the motion-compensated orthogonal transform (MCOT) [1], while HEVC intra coding is used to encode the temporal subbands. The experimental results show that MRMAT outperforms MCOT by about 0.6dB., QC 20170228
- Published
- 2016
- Full Text
- View/download PDF
26. On the tightness of linear policies for stabilization of linear systems over Gaussian networks
- Abstract
In this paper, we consider stabilization of multi-dimensional linear systems driven by Gaussian noise controlled over parallel Gaussian channels. For such systems, it has been recognized that for stabilization in the sense of asymptotic stationarity or stability in probability, Shannon capacity of a channel is an appropriate measure on characterizing whether a system can be made stable when controlled over the channel. However, this is in general not the case for quadratic stabilization. On a related problem of joint-source channel coding, in the information theory literature, the source-channel matching principle has been shown to lead to optimality of uncoded or analog transmission and when such matching conditions occur, it has been shown that capacity is also a relevant figure of merit for quadratic stabilization. A special case of this result is applicable to a scalar LQG system controlled over a scalar Gaussian channel. In this paper, we show that even in the absence of source-channel matching, to achieve quadratic stability, it may suffice that information capacity (in Shannon’s sense) is greater than the sum of the logarithm of unstable eigenvalue magnitudes. In particular, we show that periodic linear time varying coding policies are optimal in the sense of obtaining a finite second moment for the state of the system with minimum transmit power requirements for a large class of vector Gaussian channels. Our findings also extend the literature which has considered noise-free systems., QC 20160126
- Published
- 2016
- Full Text
- View/download PDF
27. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
28. Lifetime Maximization for Sensor Networks with Wireless Energy Transfer
- Abstract
In Wireless Sensor Networks (WSNs), to supply energy to the sensor nodes, wireless energy transfer (WET) is a promising technique. One of the most efficient procedures to transfer energy to the sensor nodes consists in using a sharp wireless energy beam from the base station to each node at a time. A natural fundamental question is what is the lifetime ensured by WET and how to maximize the network lifetime by scheduling the transmissions of the energy beams. In this paper, such a question is addressed by posing a new lifetime maximization problem for WET enabled WSNs. The binary nature of the energy transmission process introduces a binary constraint in the optimization problem, which makes challenging the investigation of the fundamental properties of WET and the computation of the optimal solution. The sufficient condition for which the WET makes WSNs immortal is established as function of the WET parameters. When such a condition is not met, a solution algorithm to the maximum lifetime problem is proposed. The numerical results show that the lifetime achieved by the proposed algorithm increases by about 50% compared to the case without WET, for a WSN with a small to medium size number of nodes. This suggests that it is desirable to schedule WET to prolong lifetime of WSNs having small or medium network sizes., QC 20170131
- Published
- 2016
- Full Text
- View/download PDF
29. Statistical Delay Bound for WirelessHART Networks
- Abstract
In this paper we provide a performance analysis framework for wireless industrial networks by deriving a service curve and a bound on the delay violation probability. For this purpose we use the (min; ×) stochastic network calculus as well as a recently presented recursive formula for an end-To-end delay bound of wireless heterogeneous networks. The derived results are mapped to WirelessHART networks used in process automation and validated via simulations. In addition to WirelessHART, our results can be applied to any wireless network whose physical layer conforms the IEEE 802.15.4 standard, while itsMAC protocol incorporates channel hopping and TDMA, like e.g. ISA100.11a or TSCHbased networks. The provided delay analysis is especially useful during the network design phase, offering further research potential towards optimal routing and power management in QoS-constrained wireless industrial networks., QC 20160923
- Published
- 2016
- Full Text
- View/download PDF
30. Model-Checking Assisted Protocol Design for Ultra-Reliable Low-Latency Wireless Networks
- Abstract
Recently, the wireless networking community is getting more and more interested in novel protocol designs for safety-critical applications. These new applications come with unprecedented latency and reliability constraints which poses many open challenges. A particularly important one relates to the question how to develop such systems. Traditionally, development of wireless systems has mainly relied on simulations to identify viable architectures. However, in this case the drawbacks of simulations – in particular increasing run-times – rule out its application. Instead, in this paper we propose to use probabilistic model checking, a formal model-based verification technique, to evaluate different system variants during the design phase. Apart from allowing evaluations and therefore design iterations with much smaller periods, probabilistic model checking provides bounds on the reliability of the considered design choices. We demonstrate these salient features with respect to the novel EchoRing protocol, which is a token-based system designed for safety-critical industrial applications. Several mechanisms for dealing with a token loss are modeled and evaluated through probabilistic model checking, showing its potential as suitable evaluation tool for such novel wireless protocols. In particular, we show by probabilistic model checking that wireless tokenpassing systems can benefit tremendously from the considered fault-tolerant methods. The obtained performance guarantees for the different mechanisms even provide reasonable bounds for experimental results obtained from a real-world implementation., QC 20161010
- Published
- 2016
- Full Text
- View/download PDF
31. Throughput Analysis of Proportional Fair Scheduling for Sparse and Ultra-Dense Interference-Limited OFDMA/LTE Networks
- Abstract
Various system tasks, such as interference coordination, handover decisions, admission control, and so on in current cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, LTE cellular systems are interference limited; hence, the way interference is modeled is crucial for the accuracy. In this paper, we present a closed-form analytical model for the throughput expectation of proportional fair scheduling in orthogonal frequency division multiple access/LTE networks. The model takes into account a precise signal-to-interference-and-noise ratio (SINR) distribution as well as considering limitations with respect to modulation and coding, as encountered in LTE networks. Furthermore, the analysis is extended to ultradense deployments likely to happen in the 5th generation of cellular networks. The resulting analytical performance model is validated by means of simulations, considering realistic network deployments. Compared with related work, the model introduced in this paper demonstrates a significantly higher accuracy for mid-term throughput estimation., QCR 20161118
- Published
- 2016
- Full Text
- View/download PDF
32. Optimal Transmission with Per-antenna Power Constraints for Multiantenna Bidirectional Broadcast Channels
- Abstract
This paper considers the optimal transmit strategy for multi-antenna bidirectional broadcast channels with per-antenna power constraints. First, an equivalent formulation of the weighted rate sum maximization problem is provided. This allows us to come up with an effective solution to characterize the boundary of the capacity region which relies on the weighted rate sum optimal rate pair. To that end, an iterative algorithm to find the optimal transmit strategy is derived, the convergence to the optimum is proved, and a closed-form solution of the corresponding off-diagonal elements of the optimal transmit strategy is provided. Further, we provide a parametrization of the curved section of the capacity region. Finally, the theoretical results and algorithm performance are illustrated by numerical examples., QC 20160901
- Published
- 2016
- Full Text
- View/download PDF
33. On the Energy Efficiency in Multi-user Multi-relayCoded Network
- Abstract
In this paper, the energy efficiency (EE) of a cooperative diversity system with maximum diversity network coding (MDNC) is studied. In the considered system, channel state information (CSI) is only available at the receivers for all the channels. We formulate the problem of maximizing the EEunder the constraint on the outage probability. The problem is NP-hard due to the non-convexity of the outage probability function and the nonlinear fractional structure of the introducedEE. To solve the optimization problem efficiently, first, the outage probability function is tightly approximated as a log-convex form in the high signal-to-noise ratio (SNR) region. Further, based on the fractional programming, we transform the introduced EEinto a subtractive-form, which is proved to be a convex form. The tradeoff between outage probability and EE is given. The results show that our power allocation (PA) policy can substantially increase the EE. We show that EE can be increased if more relays forward the messages. Additionally, we also investigate the effect of the relay locations on the EE and demonstrate that the increase in the transmission distance in the first hop causes the loss of the EE. The loss can be reduced by our PA policy., QC 20160923
- Published
- 2016
- Full Text
- View/download PDF
34. Performance Analysis of Cooperative ARQ Systems for Industrial Wireless Networks
- Abstract
The proliferation of wireless communications has lead to a high interest to establish this technology in industrial settings. The main arguments in favor of wireless are reduced costs in deployment and maintenance, as well as increased flexibility. In contrast to home and office environments, industrial settings include mission-critical machine-to-machine applications, demanding stringent requirements for reliability and latency in the area of 1-10-9 PDR and 1ms, respectively. One way to achieve both is cooperative Automatic Repeat reQuest (ARQ), which leverages spatial diversity. This paper presents a wireless multi-user Time Division Multiple Access system with cooperative ARQ for mission-critical communication. We evaluate two design options analytically, using an outage-capacity model, to investigate whether the relaying of messages should be performed centrally at a multi-antenna AP with perfect Channel State Information (CSI) or decentrally at simultaneously transmitting stations with average CSI. Results indicate that both options are able to achieve the targeted communication guarantees when a certain degree of diversity is implemented, showing a stable system performance even with an increasing number of stations., QC 20160512
- Published
- 2016
- Full Text
- View/download PDF
35. CrossZig : Combating Cros-Technology Interference in Low-Power Wireless Networks
- Abstract
Low-power wireless devices suffer notoriously from Cross- Technology Interference (CTI). To enable co-existence, researchers have proposed a variety of interference mitigation strategies. Existing solutions, however, are designed to work with the limitations of currently available radio chips. In this paper, we investigate how to exploit physical layer properties of 802.15.4 signals to better address CTI. We present CrossZig, a cross-layer solution that takes advantage of physical layer information and processing to improve low-power communication under CTI. To this end, CrossZig utilizes physical layer information to detect presence of CTI in a corrupted packet and to apply an adaptive packet recovery which incorporates a novel cross-layer based packet merging and an adaptive FEC coding. We implement a prototype of CrossZig for the low-power IEEE 802.15.4 in a software-defined radio platform. We show the adaptability and the performance gain of CrossZig through experimental evaluation considering both micro-benchmarking and system performance under various interference patterns. Our results demonstrate that CrossZig can achieve a high accuracy in error localization (94.3% accuracy) and interference type identification (less than 5% error rate for SINR ranges below 3 dB). Moreover, our system shows consistent performance improvements under interference from various interfering technologies., QC 20160408
- Published
- 2016
- Full Text
- View/download PDF
36. Learning-based resource allocation scheme for TDD-based 5G CRAN system
- Abstract
Provision of high data rates with always-onconnectivity to high mobility users is one of the motivations for design of fifth generation (5G) systems. High system capacity can be achieved by coordination between large number of antennas, which is done using the cloud radio access network (CRAN) design in 5G systems. In terms of baseband processing, allocation of appropriate resources to the users is necessary to achieve high system capacity, for which the state of the art uses the users' channel state information (CSI); however, they do not take into account the associated overhead, which poses a major bottleneck for the effective system performance. In contrast to this approach, this paper proposes the use of machine learning for allocating resources to high mobility users using only their position estimates. Specifically, the 'random forest' algorithm, a supervised machine learning technique, is used to design a learning-based resource allocation scheme by exploiting the relationships between the system parameters and the users' position estimates. In this way, the overhead for CSI acquisition is avoided by using the position estimates instead, with better spectrum utilization. While the initial numerical investigations, with minimum number of users in the system, show that the proposed learning-based scheme achieves 86% of the efficiency achieved by the perfect CSI-based scheme, if the effect of overhead is factored in, the proposed scheme performs better than the CSI-based approach. In a realistic scenario, with multiple users in the system, the significant increase in overhead for the CSI-based scheme leads to a performance gain of 100%, or more, by using the proposed scheme, and thus proving the proposed scheme to be more efficient in terms of system performance., QC 20170314
- Published
- 2016
- Full Text
- View/download PDF
37. Error Performance of Sparse Code Multiple Access Networks with Joint ML Detection
- Abstract
This paper investigates error performance of sparse code multiple access (SCMA) networks with multiple access channels (MAC) and broadcast channels (BC). We give the closedform expression for the pairwise error probability (PEP) of joint maximum likelihood (ML) detection for multiuser signals over additive white Gaussian noise (AWGN) and Rayleigh fading channels with an arbitrary number of users and multidimensional codebooks. An upper bound for the average symbol error rate (SER) is calculated. The bound is tight in both AWGN channel and Rayleigh fading channels for high SNR regions. The analytical bounds are compared with simulations, and the results confirm the effectiveness of the analysis for both AWGN and Rayleigh fading channels., QC 20161208
- Published
- 2016
- Full Text
- View/download PDF
38. Rate of prefix-free codes in LQG control systems
- Abstract
In this paper, we consider a discrete time linear quadratic Gaussian (LQG) control problem in which state information of the plant is encoded in a variable-length binary codeword at every time step, and a control input is determined based on the codewords generated in the past. We derive a lower bound of the rate achievable by the class of prefix-free codes attaining the required LQG control performance. This lower bound coincides with the infimum of a certain directed information expression, and is computable by semidefinite programming (SDP). Based on a technique by Silva et al., we also provide an upper bound of the best achievable rate by constructing a controller equipped with a uniform quantizer with subtractive dither and Shannon-Fano coding. The gap between the obtained lower and upper bounds is less than 0:754r + 1 bits per time step regardless of the required LQG control performance, where r is the rank of a signal-to-noise ratio matrix obtained by SDP, which is no greater than the dimension of the state., QC 20161122
- Published
- 2016
- Full Text
- View/download PDF
39. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
40. Lifetime Maximization for Sensor Networks with Wireless Energy Transfer
- Abstract
In Wireless Sensor Networks (WSNs), to supply energy to the sensor nodes, wireless energy transfer (WET) is a promising technique. One of the most efficient procedures to transfer energy to the sensor nodes consists in using a sharp wireless energy beam from the base station to each node at a time. A natural fundamental question is what is the lifetime ensured by WET and how to maximize the network lifetime by scheduling the transmissions of the energy beams. In this paper, such a question is addressed by posing a new lifetime maximization problem for WET enabled WSNs. The binary nature of the energy transmission process introduces a binary constraint in the optimization problem, which makes challenging the investigation of the fundamental properties of WET and the computation of the optimal solution. The sufficient condition for which the WET makes WSNs immortal is established as function of the WET parameters. When such a condition is not met, a solution algorithm to the maximum lifetime problem is proposed. The numerical results show that the lifetime achieved by the proposed algorithm increases by about 50% compared to the case without WET, for a WSN with a small to medium size number of nodes. This suggests that it is desirable to schedule WET to prolong lifetime of WSNs having small or medium network sizes., QC 20170131
- Published
- 2016
- Full Text
- View/download PDF
41. Model-Checking Assisted Protocol Design for Ultra-Reliable Low-Latency Wireless Networks
- Abstract
Recently, the wireless networking community is getting more and more interested in novel protocol designs for safety-critical applications. These new applications come with unprecedented latency and reliability constraints which poses many open challenges. A particularly important one relates to the question how to develop such systems. Traditionally, development of wireless systems has mainly relied on simulations to identify viable architectures. However, in this case the drawbacks of simulations – in particular increasing run-times – rule out its application. Instead, in this paper we propose to use probabilistic model checking, a formal model-based verification technique, to evaluate different system variants during the design phase. Apart from allowing evaluations and therefore design iterations with much smaller periods, probabilistic model checking provides bounds on the reliability of the considered design choices. We demonstrate these salient features with respect to the novel EchoRing protocol, which is a token-based system designed for safety-critical industrial applications. Several mechanisms for dealing with a token loss are modeled and evaluated through probabilistic model checking, showing its potential as suitable evaluation tool for such novel wireless protocols. In particular, we show by probabilistic model checking that wireless tokenpassing systems can benefit tremendously from the considered fault-tolerant methods. The obtained performance guarantees for the different mechanisms even provide reasonable bounds for experimental results obtained from a real-world implementation., QC 20161010
- Published
- 2016
- Full Text
- View/download PDF
42. Statistical Delay Bound for WirelessHART Networks
- Abstract
In this paper we provide a performance analysis framework for wireless industrial networks by deriving a service curve and a bound on the delay violation probability. For this purpose we use the (min; ×) stochastic network calculus as well as a recently presented recursive formula for an end-To-end delay bound of wireless heterogeneous networks. The derived results are mapped to WirelessHART networks used in process automation and validated via simulations. In addition to WirelessHART, our results can be applied to any wireless network whose physical layer conforms the IEEE 802.15.4 standard, while itsMAC protocol incorporates channel hopping and TDMA, like e.g. ISA100.11a or TSCHbased networks. The provided delay analysis is especially useful during the network design phase, offering further research potential towards optimal routing and power management in QoS-constrained wireless industrial networks., QC 20160923
- Published
- 2016
- Full Text
- View/download PDF
43. Performance Analysis of Cooperative ARQ Systems for Industrial Wireless Networks
- Abstract
The proliferation of wireless communications has lead to a high interest to establish this technology in industrial settings. The main arguments in favor of wireless are reduced costs in deployment and maintenance, as well as increased flexibility. In contrast to home and office environments, industrial settings include mission-critical machine-to-machine applications, demanding stringent requirements for reliability and latency in the area of 1-10-9 PDR and 1ms, respectively. One way to achieve both is cooperative Automatic Repeat reQuest (ARQ), which leverages spatial diversity. This paper presents a wireless multi-user Time Division Multiple Access system with cooperative ARQ for mission-critical communication. We evaluate two design options analytically, using an outage-capacity model, to investigate whether the relaying of messages should be performed centrally at a multi-antenna AP with perfect Channel State Information (CSI) or decentrally at simultaneously transmitting stations with average CSI. Results indicate that both options are able to achieve the targeted communication guarantees when a certain degree of diversity is implemented, showing a stable system performance even with an increasing number of stations., QC 20160512
- Published
- 2016
- Full Text
- View/download PDF
44. Optimal Transmission with Per-antenna Power Constraints for Multiantenna Bidirectional Broadcast Channels
- Abstract
This paper considers the optimal transmit strategy for multi-antenna bidirectional broadcast channels with per-antenna power constraints. First, an equivalent formulation of the weighted rate sum maximization problem is provided. This allows us to come up with an effective solution to characterize the boundary of the capacity region which relies on the weighted rate sum optimal rate pair. To that end, an iterative algorithm to find the optimal transmit strategy is derived, the convergence to the optimum is proved, and a closed-form solution of the corresponding off-diagonal elements of the optimal transmit strategy is provided. Further, we provide a parametrization of the curved section of the capacity region. Finally, the theoretical results and algorithm performance are illustrated by numerical examples., QC 20160901
- Published
- 2016
- Full Text
- View/download PDF
45. CrossZig : Combating Cros-Technology Interference in Low-Power Wireless Networks
- Abstract
Low-power wireless devices suffer notoriously from Cross- Technology Interference (CTI). To enable co-existence, researchers have proposed a variety of interference mitigation strategies. Existing solutions, however, are designed to work with the limitations of currently available radio chips. In this paper, we investigate how to exploit physical layer properties of 802.15.4 signals to better address CTI. We present CrossZig, a cross-layer solution that takes advantage of physical layer information and processing to improve low-power communication under CTI. To this end, CrossZig utilizes physical layer information to detect presence of CTI in a corrupted packet and to apply an adaptive packet recovery which incorporates a novel cross-layer based packet merging and an adaptive FEC coding. We implement a prototype of CrossZig for the low-power IEEE 802.15.4 in a software-defined radio platform. We show the adaptability and the performance gain of CrossZig through experimental evaluation considering both micro-benchmarking and system performance under various interference patterns. Our results demonstrate that CrossZig can achieve a high accuracy in error localization (94.3% accuracy) and interference type identification (less than 5% error rate for SINR ranges below 3 dB). Moreover, our system shows consistent performance improvements under interference from various interfering technologies., QC 20160408
- Published
- 2016
- Full Text
- View/download PDF
46. On the Energy Efficiency in Multi-user Multi-relayCoded Network
- Abstract
In this paper, the energy efficiency (EE) of a cooperative diversity system with maximum diversity network coding (MDNC) is studied. In the considered system, channel state information (CSI) is only available at the receivers for all the channels. We formulate the problem of maximizing the EEunder the constraint on the outage probability. The problem is NP-hard due to the non-convexity of the outage probability function and the nonlinear fractional structure of the introducedEE. To solve the optimization problem efficiently, first, the outage probability function is tightly approximated as a log-convex form in the high signal-to-noise ratio (SNR) region. Further, based on the fractional programming, we transform the introduced EEinto a subtractive-form, which is proved to be a convex form. The tradeoff between outage probability and EE is given. The results show that our power allocation (PA) policy can substantially increase the EE. We show that EE can be increased if more relays forward the messages. Additionally, we also investigate the effect of the relay locations on the EE and demonstrate that the increase in the transmission distance in the first hop causes the loss of the EE. The loss can be reduced by our PA policy., QC 20160923
- Published
- 2016
- Full Text
- View/download PDF
47. Lifetime Maximization for Sensor Networks with Wireless Energy Transfer
- Abstract
In Wireless Sensor Networks (WSNs), to supply energy to the sensor nodes, wireless energy transfer (WET) is a promising technique. One of the most efficient procedures to transfer energy to the sensor nodes consists in using a sharp wireless energy beam from the base station to each node at a time. A natural fundamental question is what is the lifetime ensured by WET and how to maximize the network lifetime by scheduling the transmissions of the energy beams. In this paper, such a question is addressed by posing a new lifetime maximization problem for WET enabled WSNs. The binary nature of the energy transmission process introduces a binary constraint in the optimization problem, which makes challenging the investigation of the fundamental properties of WET and the computation of the optimal solution. The sufficient condition for which the WET makes WSNs immortal is established as function of the WET parameters. When such a condition is not met, a solution algorithm to the maximum lifetime problem is proposed. The numerical results show that the lifetime achieved by the proposed algorithm increases by about 50% compared to the case without WET, for a WSN with a small to medium size number of nodes. This suggests that it is desirable to schedule WET to prolong lifetime of WSNs having small or medium network sizes., QC 20170131
- Published
- 2016
- Full Text
- View/download PDF
48. Statistical Delay Bound for WirelessHART Networks
- Abstract
In this paper we provide a performance analysis framework for wireless industrial networks by deriving a service curve and a bound on the delay violation probability. For this purpose we use the (min; ×) stochastic network calculus as well as a recently presented recursive formula for an end-To-end delay bound of wireless heterogeneous networks. The derived results are mapped to WirelessHART networks used in process automation and validated via simulations. In addition to WirelessHART, our results can be applied to any wireless network whose physical layer conforms the IEEE 802.15.4 standard, while itsMAC protocol incorporates channel hopping and TDMA, like e.g. ISA100.11a or TSCHbased networks. The provided delay analysis is especially useful during the network design phase, offering further research potential towards optimal routing and power management in QoS-constrained wireless industrial networks., QC 20160923
- Published
- 2016
- Full Text
- View/download PDF
49. Model-Checking Assisted Protocol Design for Ultra-Reliable Low-Latency Wireless Networks
- Abstract
Recently, the wireless networking community is getting more and more interested in novel protocol designs for safety-critical applications. These new applications come with unprecedented latency and reliability constraints which poses many open challenges. A particularly important one relates to the question how to develop such systems. Traditionally, development of wireless systems has mainly relied on simulations to identify viable architectures. However, in this case the drawbacks of simulations – in particular increasing run-times – rule out its application. Instead, in this paper we propose to use probabilistic model checking, a formal model-based verification technique, to evaluate different system variants during the design phase. Apart from allowing evaluations and therefore design iterations with much smaller periods, probabilistic model checking provides bounds on the reliability of the considered design choices. We demonstrate these salient features with respect to the novel EchoRing protocol, which is a token-based system designed for safety-critical industrial applications. Several mechanisms for dealing with a token loss are modeled and evaluated through probabilistic model checking, showing its potential as suitable evaluation tool for such novel wireless protocols. In particular, we show by probabilistic model checking that wireless tokenpassing systems can benefit tremendously from the considered fault-tolerant methods. The obtained performance guarantees for the different mechanisms even provide reasonable bounds for experimental results obtained from a real-world implementation., QC 20161010
- Published
- 2016
- Full Text
- View/download PDF
50. Throughput Analysis of Proportional Fair Scheduling for Sparse and Ultra-Dense Interference-Limited OFDMA/LTE Networks
- Abstract
Various system tasks, such as interference coordination, handover decisions, admission control, and so on in current cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, LTE cellular systems are interference limited; hence, the way interference is modeled is crucial for the accuracy. In this paper, we present a closed-form analytical model for the throughput expectation of proportional fair scheduling in orthogonal frequency division multiple access/LTE networks. The model takes into account a precise signal-to-interference-and-noise ratio (SINR) distribution as well as considering limitations with respect to modulation and coding, as encountered in LTE networks. Furthermore, the analysis is extended to ultradense deployments likely to happen in the 5th generation of cellular networks. The resulting analytical performance model is validated by means of simulations, considering realistic network deployments. Compared with related work, the model introduced in this paper demonstrates a significantly higher accuracy for mid-term throughput estimation., QCR 20161118
- Published
- 2016
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.