200 results
Search Results
2. Statistical methods for inter-view depth enhancement
- Abstract
This paper briefly presents and evaluates recent advances in statistical methods for improving inter-view inconsistency in multiview depth imagery. View synthesis is vital in free-viewpoint television in order to allow viewers to move freely in a dynamic scene. Here, depth image-based rendering plays a pivotal role by synthesizing an arbitrary number of novel views by using a subset of captured views and corresponding depth maps only. Usually, each depth map is estimated individually at different viewpoints by stereo matching and, hence, shows lack of inter-view consistency. This lack of consistency affects the quality of view synthesis negatively. This paper discusses two different approaches to enhance the inter-view depth consistency. The first one uses generative models based on multiview color and depth classification to assign a probabilistic weight to each depth pixel. The weighted depth pixels are utilized to enhance depth maps. The second one performs inter-view consistency testing in depth difference space to enhance the depth maps at multiple viewpoints. We comparatively evaluate these two methods and discuss their pros and cons for future work., QC 20150109
- Published
- 2014
- Full Text
- View/download PDF
3. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
4. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
5. Dynamic decode-and-forward relaying with rate-compatible LDPC convolutional codes
- Abstract
Dynamic decode-and-forward (DDF) is an improved decode-and-forward (DF) protocol under which the relay decides based on its received channel-state information (CSI) when to switch from listening mode to transmission mode without knowing the CSI of other links. In this paper we propose to apply rate-compatible LDPC convolutional (RC-LDPCC) codes to the DDF relay channel. The RC-LDPCC codes are constructed by successive graph extensions, and they have been proved analytically to be capacity achieving over the binary erasure channel. In this paper we show that the RC-LDPCC codes fit well with the DDF relaying, and the regularity of degree distributions simplifies the code optimization. Numerical results in terms of bit erasure rate and achievable rate are provided to evaluate the performance of the system. The results show that the RC-LDPCC codes are able to provide high achievable rates for the DDF relay channel., QC 20120831
- Published
- 2012
- Full Text
- View/download PDF
6. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
7. Impact of mobility in cooperative spectrum sensing : Theory vs. simulation
- Abstract
This work addresses the problem of cooperative spectrum sensing in cognitive radio networks, focusing on the impact of mobility on performance of cooperative sensing. First, a review of the most recent results on cooperative spectrum sensing is provided, resulting in the identification of measurement correlation and frame error rate in the reporting channel as the main parameters influencing the performance of cooperative sensing schemes. Next, the paper discusses the extension of the analysis to the case of mobile sensors, and determines the set of assumptions made in existing literature when taking into account mobility in sensing. The paper moves then to remove some of such assumptions, by presenting simulation results obtained in presence of realistic models for propagation in the considered area, as well as of a realistic mobility model. A comparison between theoretical derivation and simulation results shows that correlation among measurements taken by different sensors and the selected mobility model may significantly affect the sensing performance., QC 20130128
- Published
- 2012
- Full Text
- View/download PDF
8. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
9. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
10. Encoder-controller design for control over the binary-input Gaussian channel
- Abstract
In this paper, we consider the problem of the joint optimization of encoder-controller for closed-loop control with state feedback over a binary-input Gaussian channel (BGC). The objective is to minimize the expected linear quadratic cost over a finite horizon. Thisencoder-controller optimization problem is hard in general, mostly because of the curse of dimensionality. The result of this paper is a synthesis technique for a computationally feasible suboptimal controller which exploits both the soft and hard information of thechannel outputs. The proposed controller is efficient in the sense that it embraces measurement quantization, error protection and control over a finite-input infinite-output noisy channel. How to effectively implement this controller is also addressed in the paper. In particular, this is done by using Hadamard techniques. Numerical experiments are carried out to verify the promising gain offered by the combined controller, in comparison to the hard-information-based controller., QC 20120124
- Published
- 2010
- Full Text
- View/download PDF
11. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
12. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
13. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
14. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
15. Analysis of Network Coded HARQ for Multiple Unicast Flows
- Abstract
In this paper, we consider network coded (NCed)Hybrid-ARQ (HARQ) for multiple unicast flows. The main contribution of the paper is the derivation of throughput expressionfor NCed HARQ with arbitrary number of users in i.i.d. channels.We apply the result to Rayleigh fading channels for incrementalredundancy (IR) and chase combining (CC) based NCed HARQ.We verify the analytical approach with simulations. We observesubstantial SNR improvements over regular ARQ with networkcoding as well as classical (H)ARQ. The SNR gains in the highand low throughput regimes are mainly due to the networkcoding and HARQ aspects, respectively. For low SNRs, NCedHARQ with IR surpasses the CC performance., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Qc 20120203
- Published
- 2010
16. Binary weight distribution of non-binary LDPC codes
- Abstract
This paper is the first part of an investigation if the capacity of a binary-input memoryless symmetric channel under ML decoding can be achieved asymptotically by using non-binary LDPC codes. We consider (l.r)-regular LDPC codes both over finite fields and over the general linear group and compute their asymptotic binary weight distributions in the limit of large blocklength and of large alphabet size. A surprising fact, the average binary weight distributions that we obtain do not tend to the binomial one for values of normalized binary weights ω smaller than 1-2-l/r. However, it does not mean that non-binary codes do not achieve the capacity asymptotically, but rather that there exists some exponentially small fraction of codes in the ensemble, which contains an exponentially large number of codewords of poor weight. The justification of this fact is beyond the scope of this paper and will be given in [1]., QC 20141010
- Published
- 2009
- Full Text
- View/download PDF
17. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
18. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
19. CrossZig : Combating Cros-Technology Interference in Low-Power Wireless Networks
- Abstract
Low-power wireless devices suffer notoriously from Cross- Technology Interference (CTI). To enable co-existence, researchers have proposed a variety of interference mitigation strategies. Existing solutions, however, are designed to work with the limitations of currently available radio chips. In this paper, we investigate how to exploit physical layer properties of 802.15.4 signals to better address CTI. We present CrossZig, a cross-layer solution that takes advantage of physical layer information and processing to improve low-power communication under CTI. To this end, CrossZig utilizes physical layer information to detect presence of CTI in a corrupted packet and to apply an adaptive packet recovery which incorporates a novel cross-layer based packet merging and an adaptive FEC coding. We implement a prototype of CrossZig for the low-power IEEE 802.15.4 in a software-defined radio platform. We show the adaptability and the performance gain of CrossZig through experimental evaluation considering both micro-benchmarking and system performance under various interference patterns. Our results demonstrate that CrossZig can achieve a high accuracy in error localization (94.3% accuracy) and interference type identification (less than 5% error rate for SINR ranges below 3 dB). Moreover, our system shows consistent performance improvements under interference from various interfering technologies., QC 20160408
- Published
- 2016
- Full Text
- View/download PDF
20. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
21. CrossZig : Combating Cros-Technology Interference in Low-Power Wireless Networks
- Abstract
Low-power wireless devices suffer notoriously from Cross- Technology Interference (CTI). To enable co-existence, researchers have proposed a variety of interference mitigation strategies. Existing solutions, however, are designed to work with the limitations of currently available radio chips. In this paper, we investigate how to exploit physical layer properties of 802.15.4 signals to better address CTI. We present CrossZig, a cross-layer solution that takes advantage of physical layer information and processing to improve low-power communication under CTI. To this end, CrossZig utilizes physical layer information to detect presence of CTI in a corrupted packet and to apply an adaptive packet recovery which incorporates a novel cross-layer based packet merging and an adaptive FEC coding. We implement a prototype of CrossZig for the low-power IEEE 802.15.4 in a software-defined radio platform. We show the adaptability and the performance gain of CrossZig through experimental evaluation considering both micro-benchmarking and system performance under various interference patterns. Our results demonstrate that CrossZig can achieve a high accuracy in error localization (94.3% accuracy) and interference type identification (less than 5% error rate for SINR ranges below 3 dB). Moreover, our system shows consistent performance improvements under interference from various interfering technologies., QC 20160408
- Published
- 2016
- Full Text
- View/download PDF
22. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
23. CrossZig : Combating Cros-Technology Interference in Low-Power Wireless Networks
- Abstract
Low-power wireless devices suffer notoriously from Cross- Technology Interference (CTI). To enable co-existence, researchers have proposed a variety of interference mitigation strategies. Existing solutions, however, are designed to work with the limitations of currently available radio chips. In this paper, we investigate how to exploit physical layer properties of 802.15.4 signals to better address CTI. We present CrossZig, a cross-layer solution that takes advantage of physical layer information and processing to improve low-power communication under CTI. To this end, CrossZig utilizes physical layer information to detect presence of CTI in a corrupted packet and to apply an adaptive packet recovery which incorporates a novel cross-layer based packet merging and an adaptive FEC coding. We implement a prototype of CrossZig for the low-power IEEE 802.15.4 in a software-defined radio platform. We show the adaptability and the performance gain of CrossZig through experimental evaluation considering both micro-benchmarking and system performance under various interference patterns. Our results demonstrate that CrossZig can achieve a high accuracy in error localization (94.3% accuracy) and interference type identification (less than 5% error rate for SINR ranges below 3 dB). Moreover, our system shows consistent performance improvements under interference from various interfering technologies., QC 20160408
- Published
- 2016
- Full Text
- View/download PDF
24. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
25. CrossZig : Combating Cros-Technology Interference in Low-Power Wireless Networks
- Abstract
Low-power wireless devices suffer notoriously from Cross- Technology Interference (CTI). To enable co-existence, researchers have proposed a variety of interference mitigation strategies. Existing solutions, however, are designed to work with the limitations of currently available radio chips. In this paper, we investigate how to exploit physical layer properties of 802.15.4 signals to better address CTI. We present CrossZig, a cross-layer solution that takes advantage of physical layer information and processing to improve low-power communication under CTI. To this end, CrossZig utilizes physical layer information to detect presence of CTI in a corrupted packet and to apply an adaptive packet recovery which incorporates a novel cross-layer based packet merging and an adaptive FEC coding. We implement a prototype of CrossZig for the low-power IEEE 802.15.4 in a software-defined radio platform. We show the adaptability and the performance gain of CrossZig through experimental evaluation considering both micro-benchmarking and system performance under various interference patterns. Our results demonstrate that CrossZig can achieve a high accuracy in error localization (94.3% accuracy) and interference type identification (less than 5% error rate for SINR ranges below 3 dB). Moreover, our system shows consistent performance improvements under interference from various interfering technologies., QC 20160408
- Published
- 2016
- Full Text
- View/download PDF
26. CrossZig : Combating Cros-Technology Interference in Low-Power Wireless Networks
- Abstract
Low-power wireless devices suffer notoriously from Cross- Technology Interference (CTI). To enable co-existence, researchers have proposed a variety of interference mitigation strategies. Existing solutions, however, are designed to work with the limitations of currently available radio chips. In this paper, we investigate how to exploit physical layer properties of 802.15.4 signals to better address CTI. We present CrossZig, a cross-layer solution that takes advantage of physical layer information and processing to improve low-power communication under CTI. To this end, CrossZig utilizes physical layer information to detect presence of CTI in a corrupted packet and to apply an adaptive packet recovery which incorporates a novel cross-layer based packet merging and an adaptive FEC coding. We implement a prototype of CrossZig for the low-power IEEE 802.15.4 in a software-defined radio platform. We show the adaptability and the performance gain of CrossZig through experimental evaluation considering both micro-benchmarking and system performance under various interference patterns. Our results demonstrate that CrossZig can achieve a high accuracy in error localization (94.3% accuracy) and interference type identification (less than 5% error rate for SINR ranges below 3 dB). Moreover, our system shows consistent performance improvements under interference from various interfering technologies., QC 20160408
- Published
- 2016
- Full Text
- View/download PDF
27. Capacity analysis of uplink WCDMA systems with imperfect channel state information
- Abstract
This paper considers the capacity limit of an uplink wideband CDMA (WCDMA) system assuming imperfect channel state information at the receiver (CSIR). In order to make the studied results useful for the performance assessment of real cellular networks, various realistic assumptions are included in the problem. A discrete-time channel model is derived based on the mismatched filtering at the receiver. Capacity inner bounds are then characterized based on the discrete-time channel model considering different assumptions on decoding strategy. Numerical results are also provided to show the effect of imperfect CSIR on the capacity., QC 20151211
- Published
- 2015
- Full Text
- View/download PDF
28. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
29. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
30. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
31. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
32. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
33. Secure Successive Refinement with Degraded Side Information
- Abstract
In this paper, we investigate the problem of successive refinement with side information (SI) under secrecy constraint. In particular, under classical successive refinement coding scheme, there are degraded SI sequences Y-n and Z(n) at two decoders and E-n at the eavesdropper. Based on the status of two switches, three different cases are investigated. In case 1 and 3, the eavesdropper only observes output of encoder 1 and 2, respectively, while in case 2, the eavesdropper observes outputs of both encoder 1 and 2. The Markov chain X - Y - (Z, E) holds in all cases. The equivocation is measured by the normalized entropy of source sequence conditioned on the observation of eavesdropper. We completely characterize the rate-distortion-equivocation regions for all three cases, and show that layered coding is optimal. Finally, a binary source example is given., QC 20150227
- Published
- 2014
- Full Text
- View/download PDF
34. Supremus typicality
- Abstract
This paper investigates a new type of typicality for sequences, termed Supremus typical sequences, in both the strong and the weak senses. It is seen that Supremus typicality is a condition stronger than classic typicality in both the strong and the weak senses. Even though Supremus typical sequences form a (often strictly smaller) subset of classic typical sequences, the Asymptotic Equipartion Property is still valid for Supremus typical sequences. Furthermore, Supremus typicality leads to a generalized typicality lemma that is more accessible and easier to analyze than its classic counterpart., QC 20150227
- Published
- 2014
- Full Text
- View/download PDF
35. Test-Bed Implementation of Iterative Interference Alignment and Power Control for Wireless MIMO Interference Networks
- Abstract
This paper presents for the first time the testbed implementation of an iterative interference alignment and power control algorithm for downlink transmission in a multiple-input multiple-output (MIMO) cellular network. The network is composed of three cells where within each cell one base station (BS) communicates with one mobile station (MS). Each terminal is equipped with two antennas. All the BSs transmit at the same time and the same frequency band. Transmitter beamforming vectors and receiver filtering vectors are computed according to the interference alignment concept, and power control is performed to guarantee successful communication of each BS-MS pair at a desired fixed rate. The indoor measurements performed on an universal software radio peripheral (USRP) based test-bed, show that the power can be reduced by at least 4 dB, 90% of the time, while at the same time reducing the bit-error-rate (BER)., QC 20150227
- Published
- 2014
- Full Text
- View/download PDF
36. Graph-Based Construction and Assessment of Motion-Adaptive Transforms
- Abstract
In this paper, we propose two algorithms to construct motion-adaptive transforms that are based on vertex-weighted graphs. The graphs are constructed by motion vector information. The weights of the vertices are given by scale factors that are used to accommodate proper concentration of energy in transforms. The vertex-weighted graph defines a one dimensional linear subspace. Thus, our transform basis is subspace constrained. We propose two algorithms. The first is based on the Gram-Schmidt orthonormalization of the discrete cosine transform (DCT) basis. The second combines the rotation of the DCT basis and the Gram-Schmidt orthonormalization. We assess both algorithms in terms of energy compaction. Moreover, we compare to prior work on graph-based rotation of the DCT basis and on so-called motion-compensated orthogonal transforms (MCOT). In our experiments, both algorithms outperform MCOT in terms of energy compaction. However, their performance is similar to that of graph-based rotation of the DCT basis., QC 20140312
- Published
- 2013
- Full Text
- View/download PDF
37. Simultaneous polling mechanism with uplink power control for low power sensor nodes
- Abstract
Collecting sensory data at access point (AP) from large number of sensor nodes with low latency is a critical issue. In Wi-Fi, prior to uplink data delivery, AP typically needs to poll large number of sensor nodes sequentially and allocate channel resources to individual node resulting in large latency. An efficient method to reduce the latency and power consumption in wireless sensor networks is to parallelize the polling operation so that multiple nodes can concurrently respond to the poll request of an AP by sending orthogonal sequences with uplink power control. In this paper, we present a conceptually simple uplink power control scheme for the parallel polling operation between AP and low power sensor nodes. We formulate the uplink power control problem as a sequence design problem and show that uplink channel state information (CSI) required to achieve a given target receive SNR can be significantly reduced by carefully designing sequences. We further develop a low complexity instantaneous (fast) power control scheme in order to reduce the number of computations required by the low power sensor node. We also analyze and compare the detection performance of the instantaneous (fast) and average (slow) power control schemes in terms of diversity gain., QC 20140317
- Published
- 2013
- Full Text
- View/download PDF
38. Analytical model of proportional fair scheduling in interference-limited OFDMA/LTE networks
- Abstract
Various system tasks like interference coordination, handover decisions, admission control etc. in upcoming cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, upcoming cellular systems will be interference-limited, hence, the way interference is modeled is crucial for the accuracy. In this paper we present an analytical model for the SINR distribution of the scheduled subcarriers of an OFDMA system with proportional fair scheduling. The model takes the precise SINR distribution into account. We furthermore refine our model with respect to uniform modulation and coding, as applied in LTE networks. The derived models are validated by means of simulations. In additon, we show that our models are approximate estimators for the performance of rate-based proportional fair scheduling, while they outperform some simpler prediction models from related work significantly., QC 20140102
- Published
- 2013
- Full Text
- View/download PDF
39. Multiview Depth Map Enhancement by Variational Bayes Inference Estimation of Dirichlet Mixture Models
- Abstract
High quality view synthesis is a prerequisite for future free-viewpointtelevision. It will enable viewers to move freely in a dynamicreal world scene. Depth image based rendering algorithms willplay a pivotal role when synthesizing an arbitrary number of novelviews by using a subset of captured views and corresponding depthmaps only. Usually, each depth map is estimated individually bystereo-matching algorithms and, hence, shows lack of inter-viewconsistency. This inconsistency affects the quality of view synthesis negatively. This paper enhances the inter-view consistency ofmultiview depth imagery. First, our approach classifies the colorinformation in the multiview color imagery by modeling color witha mixture of Dirichlet distributions where the model parameters areestimated in a Bayesian framework with variational inference. Second, using the resulting color clusters, we classify the correspondingdepth values in the multiview depth imagery. Each clustered depthimage is subject to further sub-clustering. Finally, the resultingmean of each sub-cluster is used to enhance the depth imagery atmultiple viewpoints. Experiments show that our approach improvesthe average quality of virtual views by up to 0.8 dB when comparedto views synthesized by using conventionally estimated depth maps., QC 20140224
- Published
- 2013
- Full Text
- View/download PDF
40. Multi-Cell Cooperation with Random User Locations under Arbitrary Signaling
- Abstract
Base station cooperation in cellular networks has been recently recognized as a key technology for mitigating interference, providing thus significant improvements in the system performance. In this paper, we consider a simple scenario consisting of two one-dimensional cells, where the base stations have fixed locations, while the user terminals are randomly distributed on a line. Exploiting the replica method from statistical physics, we derive the ergodic sum-rate under arbitrary signaling for both cooperative and non-cooperative scenarios, when the system size grows large. The obtained results are analytically tractable and can be used to optimize the system parameters in a simple manner. The numerical examples show that the analysis provides good approximations for finite-sized systems., QC 20140131
- Published
- 2013
- Full Text
- View/download PDF
41. Capacity Region of a Class of Interfering Relay Channels
- Abstract
This paper studies a new model for cooperative communication, the interfering relay channels. We show that thehash-forward scheme introduced by Kim for the primitive relay channel is capacity achieving for a class of semideterministic interfering relay channels. The obtained capacity result generalizes and unifies earlier capacity results for a class of primitive relay channels and a class of deterministic interference channels., QC 20140225
- Published
- 2013
- Full Text
- View/download PDF
42. High SNR performance of amplify-and-forward relaying in Rayleigh fading wiretap channels
- Abstract
This paper investigates amplify-and-forward (AF) relaying for secrecy in quasi-static Rayleigh fading channels. We consider a four-node network where a helping node intends to enhance secrecy of the transmission between the source and the destination in presence of a passive eavesdropper. In this scenario, the common assumption of full CSI on the eavesdropper's channels is not realistic, and thus, we study the performance of cooperation from an outage perspective. Starting from the secrecy outage probability, we introduce a novel measure, the conditional secrecy outage probability to analyze the performance of AF. In particular, we derive closed-form expressions for AF for these two secrecy measures under a high SNR assumption. Moreover, we use numerical examples to illustrate our results and to characterize the effect of the nodes' geometry. We also show numerically how AF improves the secrecy performance in comparison to direct transmission in terms of outage probability and secure throughput., QC 20131112
- Published
- 2013
- Full Text
- View/download PDF
43. Analytical model of proportional fair scheduling in interference-limited OFDMA/LTE networks
- Abstract
Various system tasks like interference coordination, handover decisions, admission control etc. in upcoming cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, upcoming cellular systems will be interference-limited, hence, the way interference is modeled is crucial for the accuracy. In this paper we present an analytical model for the SINR distribution of the scheduled subcarriers of an OFDMA system with proportional fair scheduling. The model takes the precise SINR distribution into account. We furthermore refine our model with respect to uniform modulation and coding, as applied in LTE networks. The derived models are validated by means of simulations. In additon, we show that our models are approximate estimators for the performance of rate-based proportional fair scheduling, while they outperform some simpler prediction models from related work significantly., QC 20140102
- Published
- 2013
- Full Text
- View/download PDF
44. Analytical model of proportional fair scheduling in interference-limited OFDMA/LTE networks
- Abstract
Various system tasks like interference coordination, handover decisions, admission control etc. in upcoming cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, upcoming cellular systems will be interference-limited, hence, the way interference is modeled is crucial for the accuracy. In this paper we present an analytical model for the SINR distribution of the scheduled subcarriers of an OFDMA system with proportional fair scheduling. The model takes the precise SINR distribution into account. We furthermore refine our model with respect to uniform modulation and coding, as applied in LTE networks. The derived models are validated by means of simulations. In additon, we show that our models are approximate estimators for the performance of rate-based proportional fair scheduling, while they outperform some simpler prediction models from related work significantly., QC 20140102
- Published
- 2013
- Full Text
- View/download PDF
45. Analytical model of proportional fair scheduling in interference-limited OFDMA/LTE networks
- Abstract
Various system tasks like interference coordination, handover decisions, admission control etc. in upcoming cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, upcoming cellular systems will be interference-limited, hence, the way interference is modeled is crucial for the accuracy. In this paper we present an analytical model for the SINR distribution of the scheduled subcarriers of an OFDMA system with proportional fair scheduling. The model takes the precise SINR distribution into account. We furthermore refine our model with respect to uniform modulation and coding, as applied in LTE networks. The derived models are validated by means of simulations. In additon, we show that our models are approximate estimators for the performance of rate-based proportional fair scheduling, while they outperform some simpler prediction models from related work significantly., QC 20140102
- Published
- 2013
- Full Text
- View/download PDF
46. Analytical model of proportional fair scheduling in interference-limited OFDMA/LTE networks
- Abstract
Various system tasks like interference coordination, handover decisions, admission control etc. in upcoming cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, upcoming cellular systems will be interference-limited, hence, the way interference is modeled is crucial for the accuracy. In this paper we present an analytical model for the SINR distribution of the scheduled subcarriers of an OFDMA system with proportional fair scheduling. The model takes the precise SINR distribution into account. We furthermore refine our model with respect to uniform modulation and coding, as applied in LTE networks. The derived models are validated by means of simulations. In additon, we show that our models are approximate estimators for the performance of rate-based proportional fair scheduling, while they outperform some simpler prediction models from related work significantly., QC 20140102
- Published
- 2013
- Full Text
- View/download PDF
47. On selection of search space dimension in compressive sampling matching pursuit
- Abstract
Compressive Sampling Matching Pursuit (CoSaMP) is one of the popular greedy methods in the emerging field of Compressed Sensing (CS). In addition to the appealing empirical performance, CoSaMP has also splendid theoretical guarantees for convergence. In this paper, we propose a modification in CoSaMP to adaptively choose the dimension of search space in each iteration, using a threshold based approach. Using Monte Carlo simulations, we show that this modification improves the reconstruction capability of the CoSaMP algorithm in clean as well as noisy measurement cases. From empirical observations, we also propose an optimum value for the threshold to use in applications., QC 20130226
- Published
- 2012
- Full Text
- View/download PDF
48. Subspace pursuit embedded in orthogonal matching pursuit
- Abstract
Orthogonal Matching Pursuit (OMP) is a popular greedy pursuit algorithm widely used for sparse signal recovery from an undersampled measurement system. However, one of the main shortcomings of OMP is its irreversible selection procedure of columns of measurement matrix. i.e., OMP does not allow removal of the columns wrongly estimated in any of the previous iterations. In this paper, we propose a modification in OMP, using the well known Subspace Pursuit (SP), to refine the subspace estimated by OMP at any iteration and hence boost the sparse signal recovery performance of OMP. Using simulations we show that the proposed scheme improves the performance of OMP in clean and noisy measurement cases., QC 20130226
- Published
- 2012
- Full Text
- View/download PDF
49. Cooperation for Secure Broadcasting in Cognitive Radio Networks
- Abstract
This paper explores the trade-off between cooperation and secrecy in cognitive radio networks. We consider a scenario consisting of a primary and a secondary system. In the simplest case, each system is represented by a pair of transmitter and receiver. We assume a secrecy constraint on the transmission in the sense that the message of the primary transmitter has to be concealed from the secondary receiver. Both situations where the secondary transmitter is aware and unaware of the primary message are investigated and compared. In the first case, the secondary transmitter helps by allocating power for jamming, which increases the secrecy of the first message. In the latter case, it can also act as a relay for the primary message, thus improving the reliability of the primary transmission. Furthermore, we extend our results to the scenario where the secondary system comprises multiple receivers. For each case we present achievable rate regions. We then provide numerical illustrations for these rate regions. Our main result is that, in spite of the secrecy constraint, cooperation is beneficial in terms of the achievable rates. In particular, the secondary system can achieve a significant rate without decreasing the primary rate below the benchmark rate achievable without the help of the secondary transmitter. Finally, we investigate the influence of the distances between users on the system's performance., QC 20121219
- Published
- 2012
- Full Text
- View/download PDF
50. Analysis of Sparse Representations Using Bi-Orthogonal Dictionaries
- Abstract
The sparse representation problem of recovering an N dimensional sparse vector x from M < N linear observations y = Dx given dictionary D is considered. The standard approach is to let the elements of the dictionary be independent and identically distributed (IID) zero-mean Gaussian and minimize the l1-norm of x under the constraint y = Dx. In this paper, the performance of l1-reconstruction is analyzed, when the dictionary is bi-orthogonal D = [O1 O2], where O1, O 2 are independent and drawn uniformly according to the Haar measure on the group of orthogonal M × M matrices. By an application of the replica method, we obtain the critical conditions under which perfect l 1-recovery is possible with bi-orthogonal dictionaries., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.