116 results
Search Results
2. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
3. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
4. Dynamic decode-and-forward relaying with rate-compatible LDPC convolutional codes
- Abstract
Dynamic decode-and-forward (DDF) is an improved decode-and-forward (DF) protocol under which the relay decides based on its received channel-state information (CSI) when to switch from listening mode to transmission mode without knowing the CSI of other links. In this paper we propose to apply rate-compatible LDPC convolutional (RC-LDPCC) codes to the DDF relay channel. The RC-LDPCC codes are constructed by successive graph extensions, and they have been proved analytically to be capacity achieving over the binary erasure channel. In this paper we show that the RC-LDPCC codes fit well with the DDF relaying, and the regularity of degree distributions simplifies the code optimization. Numerical results in terms of bit erasure rate and achievable rate are provided to evaluate the performance of the system. The results show that the RC-LDPCC codes are able to provide high achievable rates for the DDF relay channel., QC 20120831
- Published
- 2012
- Full Text
- View/download PDF
5. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
6. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
7. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
8. Encoder-controller design for control over the binary-input Gaussian channel
- Abstract
In this paper, we consider the problem of the joint optimization of encoder-controller for closed-loop control with state feedback over a binary-input Gaussian channel (BGC). The objective is to minimize the expected linear quadratic cost over a finite horizon. Thisencoder-controller optimization problem is hard in general, mostly because of the curse of dimensionality. The result of this paper is a synthesis technique for a computationally feasible suboptimal controller which exploits both the soft and hard information of thechannel outputs. The proposed controller is efficient in the sense that it embraces measurement quantization, error protection and control over a finite-input infinite-output noisy channel. How to effectively implement this controller is also addressed in the paper. In particular, this is done by using Hadamard techniques. Numerical experiments are carried out to verify the promising gain offered by the combined controller, in comparison to the hard-information-based controller., QC 20120124
- Published
- 2010
- Full Text
- View/download PDF
9. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
10. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
11. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
12. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
13. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
14. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
15. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
16. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
17. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
18. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
19. Secure Successive Refinement with Degraded Side Information
- Abstract
In this paper, we investigate the problem of successive refinement with side information (SI) under secrecy constraint. In particular, under classical successive refinement coding scheme, there are degraded SI sequences Y-n and Z(n) at two decoders and E-n at the eavesdropper. Based on the status of two switches, three different cases are investigated. In case 1 and 3, the eavesdropper only observes output of encoder 1 and 2, respectively, while in case 2, the eavesdropper observes outputs of both encoder 1 and 2. The Markov chain X - Y - (Z, E) holds in all cases. The equivocation is measured by the normalized entropy of source sequence conditioned on the observation of eavesdropper. We completely characterize the rate-distortion-equivocation regions for all three cases, and show that layered coding is optimal. Finally, a binary source example is given., QC 20150227
- Published
- 2014
- Full Text
- View/download PDF
20. Test-Bed Implementation of Iterative Interference Alignment and Power Control for Wireless MIMO Interference Networks
- Abstract
This paper presents for the first time the testbed implementation of an iterative interference alignment and power control algorithm for downlink transmission in a multiple-input multiple-output (MIMO) cellular network. The network is composed of three cells where within each cell one base station (BS) communicates with one mobile station (MS). Each terminal is equipped with two antennas. All the BSs transmit at the same time and the same frequency band. Transmitter beamforming vectors and receiver filtering vectors are computed according to the interference alignment concept, and power control is performed to guarantee successful communication of each BS-MS pair at a desired fixed rate. The indoor measurements performed on an universal software radio peripheral (USRP) based test-bed, show that the power can be reduced by at least 4 dB, 90% of the time, while at the same time reducing the bit-error-rate (BER)., QC 20150227
- Published
- 2014
- Full Text
- View/download PDF
21. Multi-Cell Cooperation with Random User Locations under Arbitrary Signaling
- Abstract
Base station cooperation in cellular networks has been recently recognized as a key technology for mitigating interference, providing thus significant improvements in the system performance. In this paper, we consider a simple scenario consisting of two one-dimensional cells, where the base stations have fixed locations, while the user terminals are randomly distributed on a line. Exploiting the replica method from statistical physics, we derive the ergodic sum-rate under arbitrary signaling for both cooperative and non-cooperative scenarios, when the system size grows large. The obtained results are analytically tractable and can be used to optimize the system parameters in a simple manner. The numerical examples show that the analysis provides good approximations for finite-sized systems., QC 20140131
- Published
- 2013
- Full Text
- View/download PDF
22. Capacity Region of a Class of Interfering Relay Channels
- Abstract
This paper studies a new model for cooperative communication, the interfering relay channels. We show that thehash-forward scheme introduced by Kim for the primitive relay channel is capacity achieving for a class of semideterministic interfering relay channels. The obtained capacity result generalizes and unifies earlier capacity results for a class of primitive relay channels and a class of deterministic interference channels., QC 20140225
- Published
- 2013
- Full Text
- View/download PDF
23. High SNR performance of amplify-and-forward relaying in Rayleigh fading wiretap channels
- Abstract
This paper investigates amplify-and-forward (AF) relaying for secrecy in quasi-static Rayleigh fading channels. We consider a four-node network where a helping node intends to enhance secrecy of the transmission between the source and the destination in presence of a passive eavesdropper. In this scenario, the common assumption of full CSI on the eavesdropper's channels is not realistic, and thus, we study the performance of cooperation from an outage perspective. Starting from the secrecy outage probability, we introduce a novel measure, the conditional secrecy outage probability to analyze the performance of AF. In particular, we derive closed-form expressions for AF for these two secrecy measures under a high SNR assumption. Moreover, we use numerical examples to illustrate our results and to characterize the effect of the nodes' geometry. We also show numerically how AF improves the secrecy performance in comparison to direct transmission in terms of outage probability and secure throughput., QC 20131112
- Published
- 2013
- Full Text
- View/download PDF
24. Cooperation for Secure Broadcasting in Cognitive Radio Networks
- Abstract
This paper explores the trade-off between cooperation and secrecy in cognitive radio networks. We consider a scenario consisting of a primary and a secondary system. In the simplest case, each system is represented by a pair of transmitter and receiver. We assume a secrecy constraint on the transmission in the sense that the message of the primary transmitter has to be concealed from the secondary receiver. Both situations where the secondary transmitter is aware and unaware of the primary message are investigated and compared. In the first case, the secondary transmitter helps by allocating power for jamming, which increases the secrecy of the first message. In the latter case, it can also act as a relay for the primary message, thus improving the reliability of the primary transmission. Furthermore, we extend our results to the scenario where the secondary system comprises multiple receivers. For each case we present achievable rate regions. We then provide numerical illustrations for these rate regions. Our main result is that, in spite of the secrecy constraint, cooperation is beneficial in terms of the achievable rates. In particular, the secondary system can achieve a significant rate without decreasing the primary rate below the benchmark rate achievable without the help of the secondary transmitter. Finally, we investigate the influence of the distances between users on the system's performance., QC 20121219
- Published
- 2012
- Full Text
- View/download PDF
25. Analysis of Sparse Representations Using Bi-Orthogonal Dictionaries
- Abstract
The sparse representation problem of recovering an N dimensional sparse vector x from M < N linear observations y = Dx given dictionary D is considered. The standard approach is to let the elements of the dictionary be independent and identically distributed (IID) zero-mean Gaussian and minimize the l1-norm of x under the constraint y = Dx. In this paper, the performance of l1-reconstruction is analyzed, when the dictionary is bi-orthogonal D = [O1 O2], where O1, O 2 are independent and drawn uniformly according to the Haar measure on the group of orthogonal M × M matrices. By an application of the replica method, we obtain the critical conditions under which perfect l 1-recovery is possible with bi-orthogonal dictionaries., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
26. A new inner bound for the interference relay channel
- Abstract
This paper proposes a new coding scheme for the discrete memoryless interference channel with a dedicated relay. The scheme is built upon rate-splitting encoding, layered noisy network coding, and joint decoding. The result is extended to two Gaussian channels. For the Gaussian channel whose relay is connected to the destinations via orthogonal links we indirectly show that the proposed scheme achieves a bounded gap to the capacity region under certain channel conditions. For the Gaussian channel wherein the relay receives and transmits in the same spectral resource with the transmitters the numerical results show that the proposed scheme achieves higher sum rate than other compress-forward-based schemes. This work, together with our previous work [1], shows that noisy network coding can be extended by the well-known rate-splitting technique of the interference channel to achieve a bounded gap to the capacity region of some multi-unicast networks., QC 20121212
- Published
- 2012
- Full Text
- View/download PDF
27. Ground Plane Feature Detection in Mobile Vision-Aided Inertial Navigation
- Abstract
In this paper, a method for determining ground plane features in a sequence of images captured by a mobile camera is presented. The hardware of the mobile system consists of a monocular camera that is mounted on an inertial measurement unit (IMU). An image processing procedure is proposed, first to extract image features and match them across consecutive image frames, and second to detect the ground plane features using a two-step algorithm. In the first step, the planar homography of the ground plane is constructed using an IMU-camera motion estimation approach. The obtained homography constraints are used to detect the most likely ground features in the sequence of images. To reject the remaining outliers, as the second step, a new plane normal vector computation approach is proposed. To obtain the normal vector of the ground plane, only three pairs of corresponding features are used for a general camera transformation. The normal-based computation approach generalizes the existing methods that are developed for specific camera transformations. Experimental results on real data validate the reliability of the proposed method., QC 20121107
- Published
- 2012
- Full Text
- View/download PDF
28. Layered quantize-forward for the two-way relay channel
- Abstract
This paper proposes two new coding schemes for the discretememoryless two-way relay channel. The main target is to show thebenefits of compress-forward without Wyner-Ziv binning and oflayered relaying in networks wherein a relay is to help multipledestinations, that may have unequal channel quality and/or haveaccess to different side information. Numerical results for aGaussian channel show that the new coding schemes outperformvariants of compress-forward relaying and offer a good trade-offbetween achievable rates and complexity and decoding delay. The ideacan also be applied to other relay networks., QC 20121115
- Published
- 2012
- Full Text
- View/download PDF
29. On the asymptotic sum-rate of the relay-assisted amplify-and-forward cognitive MIMO channel
- Abstract
This paper studies the asymptotic sum-rate of the primary network within the relay-assisted multi-antenna cognitive radio system performing amplify-and-forward relaying. The achievable sum-rates are derived in the large-system limit by means of the replica method. A closed-form expression for the sum-rate of the primary network is obtained for large antenna arrays as a function of parameters obtained by solving a set of fixed-point equations. Numerical simulations confirm the validity of the results even for systems with only a few antennas at each terminal., QC 20121219
- Published
- 2012
- Full Text
- View/download PDF
30. FROGS : A serial reversible greedy search algorithm
- Abstract
For compressed sensing, in the framework of greedy search reconstruction algorithms, we introduce the notion of initial support-set. The initial support-set is an estimate given to a reconstruction algorithm to improve the performance of the reconstruction. Furthermore, we classify existing greedy search algorithms as being serial or parallel. Based on this classification and the goal of robustness to errors in the initial support-sets we develop a new greedy search algorithm called FROGS. We end the paper with careful numerical experiments concluding that FROGS perform well compared to existing algorithms (both in terms of performance and execution time) and that it is robust against errors in the initial support-set., QC 20121108
- Published
- 2012
- Full Text
- View/download PDF
31. Ground Plane Feature Detection in Mobile Vision-Aided Inertial Navigation
- Abstract
In this paper, a method for determining ground plane features in a sequence of images captured by a mobile camera is presented. The hardware of the mobile system consists of a monocular camera that is mounted on an inertial measurement unit (IMU). An image processing procedure is proposed, first to extract image features and match them across consecutive image frames, and second to detect the ground plane features using a two-step algorithm. In the first step, the planar homography of the ground plane is constructed using an IMU-camera motion estimation approach. The obtained homography constraints are used to detect the most likely ground features in the sequence of images. To reject the remaining outliers, as the second step, a new plane normal vector computation approach is proposed. To obtain the normal vector of the ground plane, only three pairs of corresponding features are used for a general camera transformation. The normal-based computation approach generalizes the existing methods that are developed for specific camera transformations. Experimental results on real data validate the reliability of the proposed method., QC 20121107
- Published
- 2012
- Full Text
- View/download PDF
32. Ground Plane Feature Detection in Mobile Vision-Aided Inertial Navigation
- Abstract
In this paper, a method for determining ground plane features in a sequence of images captured by a mobile camera is presented. The hardware of the mobile system consists of a monocular camera that is mounted on an inertial measurement unit (IMU). An image processing procedure is proposed, first to extract image features and match them across consecutive image frames, and second to detect the ground plane features using a two-step algorithm. In the first step, the planar homography of the ground plane is constructed using an IMU-camera motion estimation approach. The obtained homography constraints are used to detect the most likely ground features in the sequence of images. To reject the remaining outliers, as the second step, a new plane normal vector computation approach is proposed. To obtain the normal vector of the ground plane, only three pairs of corresponding features are used for a general camera transformation. The normal-based computation approach generalizes the existing methods that are developed for specific camera transformations. Experimental results on real data validate the reliability of the proposed method., QC 20121107
- Published
- 2012
- Full Text
- View/download PDF
33. FROGS : A serial reversible greedy search algorithm
- Abstract
For compressed sensing, in the framework of greedy search reconstruction algorithms, we introduce the notion of initial support-set. The initial support-set is an estimate given to a reconstruction algorithm to improve the performance of the reconstruction. Furthermore, we classify existing greedy search algorithms as being serial or parallel. Based on this classification and the goal of robustness to errors in the initial support-sets we develop a new greedy search algorithm called FROGS. We end the paper with careful numerical experiments concluding that FROGS perform well compared to existing algorithms (both in terms of performance and execution time) and that it is robust against errors in the initial support-set., QC 20121108
- Published
- 2012
- Full Text
- View/download PDF
34. Ground Plane Feature Detection in Mobile Vision-Aided Inertial Navigation
- Abstract
In this paper, a method for determining ground plane features in a sequence of images captured by a mobile camera is presented. The hardware of the mobile system consists of a monocular camera that is mounted on an inertial measurement unit (IMU). An image processing procedure is proposed, first to extract image features and match them across consecutive image frames, and second to detect the ground plane features using a two-step algorithm. In the first step, the planar homography of the ground plane is constructed using an IMU-camera motion estimation approach. The obtained homography constraints are used to detect the most likely ground features in the sequence of images. To reject the remaining outliers, as the second step, a new plane normal vector computation approach is proposed. To obtain the normal vector of the ground plane, only three pairs of corresponding features are used for a general camera transformation. The normal-based computation approach generalizes the existing methods that are developed for specific camera transformations. Experimental results on real data validate the reliability of the proposed method., QC 20121107
- Published
- 2012
- Full Text
- View/download PDF
35. FROGS : A serial reversible greedy search algorithm
- Abstract
For compressed sensing, in the framework of greedy search reconstruction algorithms, we introduce the notion of initial support-set. The initial support-set is an estimate given to a reconstruction algorithm to improve the performance of the reconstruction. Furthermore, we classify existing greedy search algorithms as being serial or parallel. Based on this classification and the goal of robustness to errors in the initial support-sets we develop a new greedy search algorithm called FROGS. We end the paper with careful numerical experiments concluding that FROGS perform well compared to existing algorithms (both in terms of performance and execution time) and that it is robust against errors in the initial support-set., QC 20121108
- Published
- 2012
- Full Text
- View/download PDF
36. FROGS : A serial reversible greedy search algorithm
- Abstract
For compressed sensing, in the framework of greedy search reconstruction algorithms, we introduce the notion of initial support-set. The initial support-set is an estimate given to a reconstruction algorithm to improve the performance of the reconstruction. Furthermore, we classify existing greedy search algorithms as being serial or parallel. Based on this classification and the goal of robustness to errors in the initial support-sets we develop a new greedy search algorithm called FROGS. We end the paper with careful numerical experiments concluding that FROGS perform well compared to existing algorithms (both in terms of performance and execution time) and that it is robust against errors in the initial support-set., QC 20121108
- Published
- 2012
- Full Text
- View/download PDF
37. FROGS : A serial reversible greedy search algorithm
- Abstract
For compressed sensing, in the framework of greedy search reconstruction algorithms, we introduce the notion of initial support-set. The initial support-set is an estimate given to a reconstruction algorithm to improve the performance of the reconstruction. Furthermore, we classify existing greedy search algorithms as being serial or parallel. Based on this classification and the goal of robustness to errors in the initial support-sets we develop a new greedy search algorithm called FROGS. We end the paper with careful numerical experiments concluding that FROGS perform well compared to existing algorithms (both in terms of performance and execution time) and that it is robust against errors in the initial support-set., QC 20121108
- Published
- 2012
- Full Text
- View/download PDF
38. Ground Plane Feature Detection in Mobile Vision-Aided Inertial Navigation
- Abstract
In this paper, a method for determining ground plane features in a sequence of images captured by a mobile camera is presented. The hardware of the mobile system consists of a monocular camera that is mounted on an inertial measurement unit (IMU). An image processing procedure is proposed, first to extract image features and match them across consecutive image frames, and second to detect the ground plane features using a two-step algorithm. In the first step, the planar homography of the ground plane is constructed using an IMU-camera motion estimation approach. The obtained homography constraints are used to detect the most likely ground features in the sequence of images. To reject the remaining outliers, as the second step, a new plane normal vector computation approach is proposed. To obtain the normal vector of the ground plane, only three pairs of corresponding features are used for a general camera transformation. The normal-based computation approach generalizes the existing methods that are developed for specific camera transformations. Experimental results on real data validate the reliability of the proposed method., QC 20121107
- Published
- 2012
- Full Text
- View/download PDF
39. Outage Performances for Amplify-and-Forward, Decode-and-Forward and Cooperative Jamming Strategies for the Wiretap Channel
- Abstract
In this paper, we investigate the wiretap channel in the presence of a cooperative relay node. We analyze and compare the outage performance of three cooperatives schemes: cooperative jamming (CJ), decode-and-forward (DF), and amplify-and-forward (AF) for the Rayleigh slow fading channel. In particular, we derive a closed-form expression for the outage probability for the DF and CJ strategies, which allows an optimal strategy selection in terms of outage performance. We compare the three cooperative schemes through numerical simulations., QC 20111208
- Published
- 2011
- Full Text
- View/download PDF
40. Outage Performance and Power Allocation for Decode-and-Forward Relaying and Cooperative Jamming for the Wiretap Channel
- Abstract
In this paper, we investigate the wiretap channel in the presence of a cooperative helping node. We derive a closed-form expression for the secrecy outage probability for the decode-and-forward (DF) relaying and cooperative jamming (CJ) strategies for the Rayleigh slow fading channel. We investigate the power allocation at the source and helping node, and compare the secrecy outage performance of the two schemes., QC 20111208
- Published
- 2011
- Full Text
- View/download PDF
41. A joint design of code and training sequence for frequency-selective block fading channels with partial CSI
- Abstract
In this paper, we propose an iterative algorithm to jointly design codes and trainingsequences for frequency-selective block fading channels with partial channel state information (CSI) at the receiver. After showing that the maximum-likelihood (ML) decoding metric over channels with partial CSI can be well approximated by the joint maximum-likelihood (JML) decoding metric for combined channel estimation and data detection, we propose to use the JML criterion to search for good codes and training sequences in an iterative fashion. Simulations show that the code and training sequence found by our method can outperform a typical system using a channel code with a separately designedtraining sequence, in particular when codes of low rates are considered., QC 20120207
- Published
- 2011
- Full Text
- View/download PDF
42. On the use of Compressive Sampling for Wide-band Spectrum Sensing
- Abstract
In a scenario where a cognitive radio unit wishes to transmit, it needs to know over which frequency bands it can operate. It can obtain thisknowledge by estimating the power spectral density from a Nyquist-rate sampled signal. For wide-band signals sampling at the Nyquistrate is a major challenge and may be unfeasible. In this paper we accurately detect spectrum holes in sub-Nyquist frequencies without assuming wide sense stationarity in the compressed sampled signal. A novel extension to further reduce the sub-Nyquist samples is thenpresented by introducing a memory based compressed sensing thatrelies on the spectrum to be slowly varying., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20110707
- Published
- 2010
- Full Text
- View/download PDF
43. On the use of Compressive Sampling for Wide-band Spectrum Sensing
- Abstract
In a scenario where a cognitive radio unit wishes to transmit, it needs to know over which frequency bands it can operate. It can obtain thisknowledge by estimating the power spectral density from a Nyquist-rate sampled signal. For wide-band signals sampling at the Nyquistrate is a major challenge and may be unfeasible. In this paper we accurately detect spectrum holes in sub-Nyquist frequencies without assuming wide sense stationarity in the compressed sampled signal. A novel extension to further reduce the sub-Nyquist samples is thenpresented by introducing a memory based compressed sensing thatrelies on the spectrum to be slowly varying., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20110707
- Published
- 2010
- Full Text
- View/download PDF
44. On the use of Compressive Sampling for Wide-band Spectrum Sensing
- Abstract
In a scenario where a cognitive radio unit wishes to transmit, it needs to know over which frequency bands it can operate. It can obtain thisknowledge by estimating the power spectral density from a Nyquist-rate sampled signal. For wide-band signals sampling at the Nyquistrate is a major challenge and may be unfeasible. In this paper we accurately detect spectrum holes in sub-Nyquist frequencies without assuming wide sense stationarity in the compressed sampled signal. A novel extension to further reduce the sub-Nyquist samples is thenpresented by introducing a memory based compressed sensing thatrelies on the spectrum to be slowly varying., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20110707
- Published
- 2010
- Full Text
- View/download PDF
45. On the use of Compressive Sampling for Wide-band Spectrum Sensing
- Abstract
In a scenario where a cognitive radio unit wishes to transmit, it needs to know over which frequency bands it can operate. It can obtain thisknowledge by estimating the power spectral density from a Nyquist-rate sampled signal. For wide-band signals sampling at the Nyquistrate is a major challenge and may be unfeasible. In this paper we accurately detect spectrum holes in sub-Nyquist frequencies without assuming wide sense stationarity in the compressed sampled signal. A novel extension to further reduce the sub-Nyquist samples is thenpresented by introducing a memory based compressed sensing thatrelies on the spectrum to be slowly varying., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20110707
- Published
- 2010
- Full Text
- View/download PDF
46. On the use of Compressive Sampling for Wide-band Spectrum Sensing
- Abstract
In a scenario where a cognitive radio unit wishes to transmit, it needs to know over which frequency bands it can operate. It can obtain thisknowledge by estimating the power spectral density from a Nyquist-rate sampled signal. For wide-band signals sampling at the Nyquistrate is a major challenge and may be unfeasible. In this paper we accurately detect spectrum holes in sub-Nyquist frequencies without assuming wide sense stationarity in the compressed sampled signal. A novel extension to further reduce the sub-Nyquist samples is thenpresented by introducing a memory based compressed sensing thatrelies on the spectrum to be slowly varying., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20110707
- Published
- 2010
- Full Text
- View/download PDF
47. Optimized rate allocation for state feedback control over noisy channels
- Abstract
Optimal rate allocation in a networked control system with highly limited communication resources is instrumental to achieve satisfactory overall performance. In this paper, we propose a rate allocation technique for state feedback control in linear dynamic systems over a noisy channel. Our method consists of two steps: (i) the overall distortion is expressed as a function of rates at all time instants by means of high-rate quantization theory, and (ii) a constrained optimization problem to minimize the overall distortion is solved. We show that a non-uniform quantization is in general the best strategy for state feedback control over noisy channels. Monte Carlo simulations illustrate the proposed scheme, which is shown to have good performance compared to arbitrarily selected rate allocations., QC 20120215
- Published
- 2009
- Full Text
- View/download PDF
48. Encoder-decoder design for event-triggered feedback control over bandlimited channels
- Abstract
Bandwidth limitations and energy constraints set severe restrictions on the design of control systems that utilize wireless sensor and actuator networks. It is common in these systems that a sensor node needs not be continuously monitored, but communicates to the controller only at certain instances when it detects a disturbance event. In this paper, such a scenario is studied and particular emphasis is on efficient utilization of the shared communication resources. Encoder-decoder design for an event-based control system with the plant affected by pulse disturbances is considered. A new iterative procedure is proposed which can jointly optimize encoder-decoder pairs for a certainty equivalent controller. The goal is to minimize a design criterion, in particular, a linear quadratic cost over a finite horizon. The algorithm leads to a feasible design of time-varying non-uniform encoder-decoder pairs. Numerical results demonstrate significant improvements in performance compared to a system using uniform quantization., © 2006 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20101221
- Published
- 2006
- Full Text
- View/download PDF
49. Encoder-decoder design for event-triggered feedback control over bandlimited channels
- Abstract
Bandwidth limitations and energy constraints set severe restrictions on the design of control systems that utilize wireless sensor and actuator networks. It is common in these systems that a sensor node needs not be continuously monitored, but communicates to the controller only at certain instances when it detects a disturbance event. In this paper, such a scenario is studied and particular emphasis is on efficient utilization of the shared communication resources. Encoder-decoder design for an event-based control system with the plant affected by pulse disturbances is considered. A new iterative procedure is proposed which can jointly optimize encoder-decoder pairs for a certainty equivalent controller. The goal is to minimize a design criterion, in particular, a linear quadratic cost over a finite horizon. The algorithm leads to a feasible design of time-varying non-uniform encoder-decoder pairs. Numerical results demonstrate significant improvements in performance compared to a system using uniform quantization., © 2006 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20101221
- Published
- 2006
- Full Text
- View/download PDF
50. Encoder-decoder design for event-triggered feedback control over bandlimited channels
- Abstract
Bandwidth limitations and energy constraints set severe restrictions on the design of control systems that utilize wireless sensor and actuator networks. It is common in these systems that a sensor node needs not be continuously monitored, but communicates to the controller only at certain instances when it detects a disturbance event. In this paper, such a scenario is studied and particular emphasis is on efficient utilization of the shared communication resources. Encoder-decoder design for an event-based control system with the plant affected by pulse disturbances is considered. A new iterative procedure is proposed which can jointly optimize encoder-decoder pairs for a certainty equivalent controller. The goal is to minimize a design criterion, in particular, a linear quadratic cost over a finite horizon. The algorithm leads to a feasible design of time-varying non-uniform encoder-decoder pairs. Numerical results demonstrate significant improvements in performance compared to a system using uniform quantization., © 2006 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20101221
- Published
- 2006
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.